PR26132, ar creates invalid libraries for some targets with plugins enabled
[deliverable/binutils-gdb.git] / bfd / elfnn-riscv.c
CommitLineData
e23eba97 1/* RISC-V-specific support for NN-bit ELF.
b3adc24a 2 Copyright (C) 2011-2020 Free Software Foundation, Inc.
e23eba97
NC
3
4 Contributed by Andrew Waterman (andrew@sifive.com).
5 Based on TILE-Gx and MIPS targets.
6
7 This file is part of BFD, the Binary File Descriptor library.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
20 along with this program; see the file COPYING3. If not,
21 see <http://www.gnu.org/licenses/>. */
22
23/* This file handles RISC-V ELF targets. */
24
25#include "sysdep.h"
26#include "bfd.h"
27#include "libbfd.h"
28#include "bfdlink.h"
29#include "genlink.h"
30#include "elf-bfd.h"
31#include "elfxx-riscv.h"
32#include "elf/riscv.h"
33#include "opcode/riscv.h"
34
ff6f4d9b
PD
35/* Internal relocations used exclusively by the relaxation pass. */
36#define R_RISCV_DELETE (R_RISCV_max + 1)
37
e23eba97
NC
38#define ARCH_SIZE NN
39
40#define MINUS_ONE ((bfd_vma)0 - 1)
41
42#define RISCV_ELF_LOG_WORD_BYTES (ARCH_SIZE == 32 ? 2 : 3)
43
44#define RISCV_ELF_WORD_BYTES (1 << RISCV_ELF_LOG_WORD_BYTES)
45
46/* The name of the dynamic interpreter. This is put in the .interp
47 section. */
48
49#define ELF64_DYNAMIC_INTERPRETER "/lib/ld.so.1"
50#define ELF32_DYNAMIC_INTERPRETER "/lib32/ld.so.1"
51
52#define ELF_ARCH bfd_arch_riscv
53#define ELF_TARGET_ID RISCV_ELF_DATA
54#define ELF_MACHINE_CODE EM_RISCV
55#define ELF_MAXPAGESIZE 0x1000
56#define ELF_COMMONPAGESIZE 0x1000
57
e23eba97
NC
58/* RISC-V ELF linker hash entry. */
59
60struct riscv_elf_link_hash_entry
61{
62 struct elf_link_hash_entry elf;
63
e23eba97
NC
64#define GOT_UNKNOWN 0
65#define GOT_NORMAL 1
66#define GOT_TLS_GD 2
67#define GOT_TLS_IE 4
68#define GOT_TLS_LE 8
69 char tls_type;
70};
71
72#define riscv_elf_hash_entry(ent) \
73 ((struct riscv_elf_link_hash_entry *)(ent))
74
75struct _bfd_riscv_elf_obj_tdata
76{
77 struct elf_obj_tdata root;
78
79 /* tls_type for each local got entry. */
80 char *local_got_tls_type;
81};
82
83#define _bfd_riscv_elf_tdata(abfd) \
84 ((struct _bfd_riscv_elf_obj_tdata *) (abfd)->tdata.any)
85
86#define _bfd_riscv_elf_local_got_tls_type(abfd) \
87 (_bfd_riscv_elf_tdata (abfd)->local_got_tls_type)
88
89#define _bfd_riscv_elf_tls_type(abfd, h, symndx) \
90 (*((h) != NULL ? &riscv_elf_hash_entry (h)->tls_type \
91 : &_bfd_riscv_elf_local_got_tls_type (abfd) [symndx]))
92
93#define is_riscv_elf(bfd) \
94 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
95 && elf_tdata (bfd) != NULL \
96 && elf_object_id (bfd) == RISCV_ELF_DATA)
97
fc46e8bd
NC
98static bfd_boolean
99elfNN_riscv_mkobject (bfd *abfd)
100{
101 return bfd_elf_allocate_object (abfd,
102 sizeof (struct _bfd_riscv_elf_obj_tdata),
103 RISCV_ELF_DATA);
104}
105
e23eba97
NC
106#include "elf/common.h"
107#include "elf/internal.h"
108
109struct riscv_elf_link_hash_table
110{
111 struct elf_link_hash_table elf;
112
113 /* Short-cuts to get to dynamic linker sections. */
e23eba97
NC
114 asection *sdyntdata;
115
116 /* Small local sym to section mapping cache. */
117 struct sym_cache sym_cache;
fc3c5343
L
118
119 /* The max alignment of output sections. */
120 bfd_vma max_alignment;
e23eba97
NC
121};
122
123
124/* Get the RISC-V ELF linker hash table from a link_info structure. */
125#define riscv_elf_hash_table(p) \
126 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
127 == RISCV_ELF_DATA ? ((struct riscv_elf_link_hash_table *) ((p)->hash)) : NULL)
128
f3185997 129static bfd_boolean
0aa13fee 130riscv_info_to_howto_rela (bfd *abfd,
e23eba97
NC
131 arelent *cache_ptr,
132 Elf_Internal_Rela *dst)
133{
0aa13fee 134 cache_ptr->howto = riscv_elf_rtype_to_howto (abfd, ELFNN_R_TYPE (dst->r_info));
f3185997 135 return cache_ptr->howto != NULL;
e23eba97
NC
136}
137
138static void
139riscv_elf_append_rela (bfd *abfd, asection *s, Elf_Internal_Rela *rel)
140{
141 const struct elf_backend_data *bed;
142 bfd_byte *loc;
143
144 bed = get_elf_backend_data (abfd);
145 loc = s->contents + (s->reloc_count++ * bed->s->sizeof_rela);
146 bed->s->swap_reloca_out (abfd, rel, loc);
147}
148
149/* PLT/GOT stuff. */
150
151#define PLT_HEADER_INSNS 8
152#define PLT_ENTRY_INSNS 4
153#define PLT_HEADER_SIZE (PLT_HEADER_INSNS * 4)
154#define PLT_ENTRY_SIZE (PLT_ENTRY_INSNS * 4)
155
156#define GOT_ENTRY_SIZE RISCV_ELF_WORD_BYTES
157
158#define GOTPLT_HEADER_SIZE (2 * GOT_ENTRY_SIZE)
159
160#define sec_addr(sec) ((sec)->output_section->vma + (sec)->output_offset)
161
162static bfd_vma
163riscv_elf_got_plt_val (bfd_vma plt_index, struct bfd_link_info *info)
164{
165 return sec_addr (riscv_elf_hash_table (info)->elf.sgotplt)
166 + GOTPLT_HEADER_SIZE + (plt_index * GOT_ENTRY_SIZE);
167}
168
169#if ARCH_SIZE == 32
170# define MATCH_LREG MATCH_LW
171#else
172# define MATCH_LREG MATCH_LD
173#endif
174
175/* Generate a PLT header. */
176
5ef23793
JW
177static bfd_boolean
178riscv_make_plt_header (bfd *output_bfd, bfd_vma gotplt_addr, bfd_vma addr,
179 uint32_t *entry)
e23eba97
NC
180{
181 bfd_vma gotplt_offset_high = RISCV_PCREL_HIGH_PART (gotplt_addr, addr);
182 bfd_vma gotplt_offset_low = RISCV_PCREL_LOW_PART (gotplt_addr, addr);
183
5ef23793
JW
184 /* RVE has no t3 register, so this won't work, and is not supported. */
185 if (elf_elfheader (output_bfd)->e_flags & EF_RISCV_RVE)
186 {
187 _bfd_error_handler (_("%pB: warning: RVE PLT generation not supported"),
188 output_bfd);
189 return FALSE;
190 }
191
e23eba97 192 /* auipc t2, %hi(.got.plt)
07d6d2b8 193 sub t1, t1, t3 # shifted .got.plt offset + hdr size + 12
e23eba97
NC
194 l[w|d] t3, %lo(.got.plt)(t2) # _dl_runtime_resolve
195 addi t1, t1, -(hdr size + 12) # shifted .got.plt offset
196 addi t0, t2, %lo(.got.plt) # &.got.plt
197 srli t1, t1, log2(16/PTRSIZE) # .got.plt offset
07d6d2b8
AM
198 l[w|d] t0, PTRSIZE(t0) # link map
199 jr t3 */
e23eba97
NC
200
201 entry[0] = RISCV_UTYPE (AUIPC, X_T2, gotplt_offset_high);
202 entry[1] = RISCV_RTYPE (SUB, X_T1, X_T1, X_T3);
203 entry[2] = RISCV_ITYPE (LREG, X_T3, X_T2, gotplt_offset_low);
204 entry[3] = RISCV_ITYPE (ADDI, X_T1, X_T1, -(PLT_HEADER_SIZE + 12));
205 entry[4] = RISCV_ITYPE (ADDI, X_T0, X_T2, gotplt_offset_low);
206 entry[5] = RISCV_ITYPE (SRLI, X_T1, X_T1, 4 - RISCV_ELF_LOG_WORD_BYTES);
207 entry[6] = RISCV_ITYPE (LREG, X_T0, X_T0, RISCV_ELF_WORD_BYTES);
208 entry[7] = RISCV_ITYPE (JALR, 0, X_T3, 0);
5ef23793
JW
209
210 return TRUE;
e23eba97
NC
211}
212
213/* Generate a PLT entry. */
214
5ef23793
JW
215static bfd_boolean
216riscv_make_plt_entry (bfd *output_bfd, bfd_vma got, bfd_vma addr,
217 uint32_t *entry)
e23eba97 218{
5ef23793
JW
219 /* RVE has no t3 register, so this won't work, and is not supported. */
220 if (elf_elfheader (output_bfd)->e_flags & EF_RISCV_RVE)
221 {
222 _bfd_error_handler (_("%pB: warning: RVE PLT generation not supported"),
223 output_bfd);
224 return FALSE;
225 }
226
e23eba97
NC
227 /* auipc t3, %hi(.got.plt entry)
228 l[w|d] t3, %lo(.got.plt entry)(t3)
229 jalr t1, t3
230 nop */
231
232 entry[0] = RISCV_UTYPE (AUIPC, X_T3, RISCV_PCREL_HIGH_PART (got, addr));
1d65abb5 233 entry[1] = RISCV_ITYPE (LREG, X_T3, X_T3, RISCV_PCREL_LOW_PART (got, addr));
e23eba97
NC
234 entry[2] = RISCV_ITYPE (JALR, X_T1, X_T3, 0);
235 entry[3] = RISCV_NOP;
5ef23793
JW
236
237 return TRUE;
e23eba97
NC
238}
239
240/* Create an entry in an RISC-V ELF linker hash table. */
241
242static struct bfd_hash_entry *
243link_hash_newfunc (struct bfd_hash_entry *entry,
244 struct bfd_hash_table *table, const char *string)
245{
246 /* Allocate the structure if it has not already been allocated by a
247 subclass. */
248 if (entry == NULL)
249 {
250 entry =
251 bfd_hash_allocate (table,
252 sizeof (struct riscv_elf_link_hash_entry));
253 if (entry == NULL)
254 return entry;
255 }
256
257 /* Call the allocation method of the superclass. */
258 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
259 if (entry != NULL)
260 {
261 struct riscv_elf_link_hash_entry *eh;
262
263 eh = (struct riscv_elf_link_hash_entry *) entry;
e23eba97
NC
264 eh->tls_type = GOT_UNKNOWN;
265 }
266
267 return entry;
268}
269
270/* Create a RISC-V ELF linker hash table. */
271
272static struct bfd_link_hash_table *
273riscv_elf_link_hash_table_create (bfd *abfd)
274{
275 struct riscv_elf_link_hash_table *ret;
986f0783 276 size_t amt = sizeof (struct riscv_elf_link_hash_table);
e23eba97
NC
277
278 ret = (struct riscv_elf_link_hash_table *) bfd_zmalloc (amt);
279 if (ret == NULL)
280 return NULL;
281
282 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, link_hash_newfunc,
283 sizeof (struct riscv_elf_link_hash_entry),
284 RISCV_ELF_DATA))
285 {
286 free (ret);
287 return NULL;
288 }
289
fc3c5343 290 ret->max_alignment = (bfd_vma) -1;
e23eba97
NC
291 return &ret->elf.root;
292}
293
294/* Create the .got section. */
295
296static bfd_boolean
297riscv_elf_create_got_section (bfd *abfd, struct bfd_link_info *info)
298{
299 flagword flags;
300 asection *s, *s_got;
301 struct elf_link_hash_entry *h;
302 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
303 struct elf_link_hash_table *htab = elf_hash_table (info);
304
305 /* This function may be called more than once. */
ce558b89 306 if (htab->sgot != NULL)
e23eba97
NC
307 return TRUE;
308
309 flags = bed->dynamic_sec_flags;
310
311 s = bfd_make_section_anyway_with_flags (abfd,
312 (bed->rela_plts_and_copies_p
313 ? ".rela.got" : ".rel.got"),
314 (bed->dynamic_sec_flags
315 | SEC_READONLY));
316 if (s == NULL
fd361982 317 || !bfd_set_section_alignment (s, bed->s->log_file_align))
e23eba97
NC
318 return FALSE;
319 htab->srelgot = s;
320
321 s = s_got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
322 if (s == NULL
fd361982 323 || !bfd_set_section_alignment (s, bed->s->log_file_align))
e23eba97
NC
324 return FALSE;
325 htab->sgot = s;
326
327 /* The first bit of the global offset table is the header. */
328 s->size += bed->got_header_size;
329
330 if (bed->want_got_plt)
331 {
332 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
333 if (s == NULL
fd361982 334 || !bfd_set_section_alignment (s, bed->s->log_file_align))
e23eba97
NC
335 return FALSE;
336 htab->sgotplt = s;
337
338 /* Reserve room for the header. */
339 s->size += GOTPLT_HEADER_SIZE;
340 }
341
342 if (bed->want_got_sym)
343 {
344 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the .got
345 section. We don't do this in the linker script because we don't want
346 to define the symbol if we are not creating a global offset
347 table. */
348 h = _bfd_elf_define_linkage_sym (abfd, info, s_got,
349 "_GLOBAL_OFFSET_TABLE_");
350 elf_hash_table (info)->hgot = h;
351 if (h == NULL)
352 return FALSE;
353 }
354
355 return TRUE;
356}
357
358/* Create .plt, .rela.plt, .got, .got.plt, .rela.got, .dynbss, and
359 .rela.bss sections in DYNOBJ, and set up shortcuts to them in our
360 hash table. */
361
362static bfd_boolean
363riscv_elf_create_dynamic_sections (bfd *dynobj,
364 struct bfd_link_info *info)
365{
366 struct riscv_elf_link_hash_table *htab;
367
368 htab = riscv_elf_hash_table (info);
369 BFD_ASSERT (htab != NULL);
370
371 if (!riscv_elf_create_got_section (dynobj, info))
372 return FALSE;
373
374 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
375 return FALSE;
376
e23eba97
NC
377 if (!bfd_link_pic (info))
378 {
3e7bd7f2
JW
379 /* Technically, this section doesn't have contents. It is used as the
380 target of TLS copy relocs, to copy TLS data from shared libraries into
381 the executable. However, if we don't mark it as loadable, then it
382 matches the IS_TBSS test in ldlang.c, and there is no run-time address
383 space allocated for it even though it has SEC_ALLOC. That test is
384 correct for .tbss, but not correct for this section. There is also
385 a second problem that having a section with no contents can only work
386 if it comes after all sections with contents in the same segment,
387 but the linker script does not guarantee that. This is just mixed in
388 with other .tdata.* sections. We can fix both problems by lying and
389 saying that there are contents. This section is expected to be small
390 so this should not cause a significant extra program startup cost. */
e23eba97
NC
391 htab->sdyntdata =
392 bfd_make_section_anyway_with_flags (dynobj, ".tdata.dyn",
13755f40 393 (SEC_ALLOC | SEC_THREAD_LOCAL
3e7bd7f2
JW
394 | SEC_LOAD | SEC_DATA
395 | SEC_HAS_CONTENTS
13755f40 396 | SEC_LINKER_CREATED));
e23eba97
NC
397 }
398
9d19e4fd
AM
399 if (!htab->elf.splt || !htab->elf.srelplt || !htab->elf.sdynbss
400 || (!bfd_link_pic (info) && (!htab->elf.srelbss || !htab->sdyntdata)))
e23eba97
NC
401 abort ();
402
403 return TRUE;
404}
405
406/* Copy the extra info we tack onto an elf_link_hash_entry. */
407
408static void
409riscv_elf_copy_indirect_symbol (struct bfd_link_info *info,
410 struct elf_link_hash_entry *dir,
411 struct elf_link_hash_entry *ind)
412{
413 struct riscv_elf_link_hash_entry *edir, *eind;
414
415 edir = (struct riscv_elf_link_hash_entry *) dir;
416 eind = (struct riscv_elf_link_hash_entry *) ind;
417
e23eba97
NC
418 if (ind->root.type == bfd_link_hash_indirect
419 && dir->got.refcount <= 0)
420 {
421 edir->tls_type = eind->tls_type;
422 eind->tls_type = GOT_UNKNOWN;
423 }
424 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
425}
426
427static bfd_boolean
428riscv_elf_record_tls_type (bfd *abfd, struct elf_link_hash_entry *h,
429 unsigned long symndx, char tls_type)
430{
431 char *new_tls_type = &_bfd_riscv_elf_tls_type (abfd, h, symndx);
432
433 *new_tls_type |= tls_type;
434 if ((*new_tls_type & GOT_NORMAL) && (*new_tls_type & ~GOT_NORMAL))
435 {
436 (*_bfd_error_handler)
871b3ab2 437 (_("%pB: `%s' accessed both as normal and thread local symbol"),
e23eba97
NC
438 abfd, h ? h->root.root.string : "<local>");
439 return FALSE;
440 }
441 return TRUE;
442}
443
444static bfd_boolean
445riscv_elf_record_got_reference (bfd *abfd, struct bfd_link_info *info,
446 struct elf_link_hash_entry *h, long symndx)
447{
448 struct riscv_elf_link_hash_table *htab = riscv_elf_hash_table (info);
449 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
450
451 if (htab->elf.sgot == NULL)
452 {
453 if (!riscv_elf_create_got_section (htab->elf.dynobj, info))
454 return FALSE;
455 }
456
457 if (h != NULL)
458 {
459 h->got.refcount += 1;
460 return TRUE;
461 }
462
463 /* This is a global offset table entry for a local symbol. */
464 if (elf_local_got_refcounts (abfd) == NULL)
465 {
466 bfd_size_type size = symtab_hdr->sh_info * (sizeof (bfd_vma) + 1);
467 if (!(elf_local_got_refcounts (abfd) = bfd_zalloc (abfd, size)))
468 return FALSE;
469 _bfd_riscv_elf_local_got_tls_type (abfd)
470 = (char *) (elf_local_got_refcounts (abfd) + symtab_hdr->sh_info);
471 }
472 elf_local_got_refcounts (abfd) [symndx] += 1;
473
474 return TRUE;
475}
476
477static bfd_boolean
478bad_static_reloc (bfd *abfd, unsigned r_type, struct elf_link_hash_entry *h)
479{
f3185997
NC
480 reloc_howto_type * r = riscv_elf_rtype_to_howto (abfd, r_type);
481
e23eba97 482 (*_bfd_error_handler)
871b3ab2 483 (_("%pB: relocation %s against `%s' can not be used when making a shared "
e23eba97 484 "object; recompile with -fPIC"),
f3185997
NC
485 abfd, r ? r->name : _("<unknown>"),
486 h != NULL ? h->root.root.string : "a local symbol");
e23eba97
NC
487 bfd_set_error (bfd_error_bad_value);
488 return FALSE;
489}
490/* Look through the relocs for a section during the first phase, and
491 allocate space in the global offset table or procedure linkage
492 table. */
493
494static bfd_boolean
495riscv_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
496 asection *sec, const Elf_Internal_Rela *relocs)
497{
498 struct riscv_elf_link_hash_table *htab;
499 Elf_Internal_Shdr *symtab_hdr;
500 struct elf_link_hash_entry **sym_hashes;
501 const Elf_Internal_Rela *rel;
502 asection *sreloc = NULL;
503
504 if (bfd_link_relocatable (info))
505 return TRUE;
506
507 htab = riscv_elf_hash_table (info);
508 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
509 sym_hashes = elf_sym_hashes (abfd);
510
511 if (htab->elf.dynobj == NULL)
512 htab->elf.dynobj = abfd;
513
514 for (rel = relocs; rel < relocs + sec->reloc_count; rel++)
515 {
516 unsigned int r_type;
d42c267e 517 unsigned int r_symndx;
e23eba97
NC
518 struct elf_link_hash_entry *h;
519
520 r_symndx = ELFNN_R_SYM (rel->r_info);
521 r_type = ELFNN_R_TYPE (rel->r_info);
522
523 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
524 {
871b3ab2 525 (*_bfd_error_handler) (_("%pB: bad symbol index: %d"),
e23eba97
NC
526 abfd, r_symndx);
527 return FALSE;
528 }
529
530 if (r_symndx < symtab_hdr->sh_info)
531 h = NULL;
532 else
533 {
534 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
535 while (h->root.type == bfd_link_hash_indirect
536 || h->root.type == bfd_link_hash_warning)
537 h = (struct elf_link_hash_entry *) h->root.u.i.link;
e23eba97
NC
538 }
539
540 switch (r_type)
541 {
542 case R_RISCV_TLS_GD_HI20:
543 if (!riscv_elf_record_got_reference (abfd, info, h, r_symndx)
544 || !riscv_elf_record_tls_type (abfd, h, r_symndx, GOT_TLS_GD))
545 return FALSE;
546 break;
547
548 case R_RISCV_TLS_GOT_HI20:
549 if (bfd_link_pic (info))
550 info->flags |= DF_STATIC_TLS;
551 if (!riscv_elf_record_got_reference (abfd, info, h, r_symndx)
552 || !riscv_elf_record_tls_type (abfd, h, r_symndx, GOT_TLS_IE))
553 return FALSE;
554 break;
555
556 case R_RISCV_GOT_HI20:
557 if (!riscv_elf_record_got_reference (abfd, info, h, r_symndx)
558 || !riscv_elf_record_tls_type (abfd, h, r_symndx, GOT_NORMAL))
559 return FALSE;
560 break;
561
562 case R_RISCV_CALL_PLT:
563 /* This symbol requires a procedure linkage table entry. We
564 actually build the entry in adjust_dynamic_symbol,
565 because this might be a case of linking PIC code without
566 linking in any dynamic objects, in which case we don't
567 need to generate a procedure linkage table after all. */
568
569 if (h != NULL)
570 {
571 h->needs_plt = 1;
572 h->plt.refcount += 1;
573 }
574 break;
575
576 case R_RISCV_CALL:
577 case R_RISCV_JAL:
578 case R_RISCV_BRANCH:
579 case R_RISCV_RVC_BRANCH:
580 case R_RISCV_RVC_JUMP:
581 case R_RISCV_PCREL_HI20:
582 /* In shared libraries, these relocs are known to bind locally. */
583 if (bfd_link_pic (info))
584 break;
585 goto static_reloc;
586
587 case R_RISCV_TPREL_HI20:
588 if (!bfd_link_executable (info))
589 return bad_static_reloc (abfd, r_type, h);
590 if (h != NULL)
591 riscv_elf_record_tls_type (abfd, h, r_symndx, GOT_TLS_LE);
592 goto static_reloc;
593
594 case R_RISCV_HI20:
595 if (bfd_link_pic (info))
596 return bad_static_reloc (abfd, r_type, h);
597 /* Fall through. */
598
599 case R_RISCV_COPY:
600 case R_RISCV_JUMP_SLOT:
601 case R_RISCV_RELATIVE:
602 case R_RISCV_64:
603 case R_RISCV_32:
604 /* Fall through. */
605
606 static_reloc:
607 /* This reloc might not bind locally. */
608 if (h != NULL)
609 h->non_got_ref = 1;
610
611 if (h != NULL && !bfd_link_pic (info))
612 {
613 /* We may need a .plt entry if the function this reloc
614 refers to is in a shared lib. */
615 h->plt.refcount += 1;
616 }
617
618 /* If we are creating a shared library, and this is a reloc
619 against a global symbol, or a non PC relative reloc
620 against a local symbol, then we need to copy the reloc
621 into the shared library. However, if we are linking with
622 -Bsymbolic, we do not need to copy a reloc against a
623 global symbol which is defined in an object we are
624 including in the link (i.e., DEF_REGULAR is set). At
625 this point we have not seen all the input files, so it is
626 possible that DEF_REGULAR is not set now but will be set
627 later (it is never cleared). In case of a weak definition,
628 DEF_REGULAR may be cleared later by a strong definition in
629 a shared library. We account for that possibility below by
630 storing information in the relocs_copied field of the hash
631 table entry. A similar situation occurs when creating
632 shared libraries and symbol visibility changes render the
633 symbol local.
634
635 If on the other hand, we are creating an executable, we
636 may need to keep relocations for symbols satisfied by a
637 dynamic library if we manage to avoid copy relocs for the
638 symbol. */
f3185997
NC
639 reloc_howto_type * r = riscv_elf_rtype_to_howto (abfd, r_type);
640
e23eba97
NC
641 if ((bfd_link_pic (info)
642 && (sec->flags & SEC_ALLOC) != 0
f3185997 643 && ((r != NULL && ! r->pc_relative)
e23eba97
NC
644 || (h != NULL
645 && (! info->symbolic
646 || h->root.type == bfd_link_hash_defweak
647 || !h->def_regular))))
648 || (!bfd_link_pic (info)
649 && (sec->flags & SEC_ALLOC) != 0
650 && h != NULL
651 && (h->root.type == bfd_link_hash_defweak
652 || !h->def_regular)))
653 {
3bf083ed
AM
654 struct elf_dyn_relocs *p;
655 struct elf_dyn_relocs **head;
e23eba97
NC
656
657 /* When creating a shared object, we must copy these
658 relocs into the output file. We create a reloc
659 section in dynobj and make room for the reloc. */
660 if (sreloc == NULL)
661 {
662 sreloc = _bfd_elf_make_dynamic_reloc_section
663 (sec, htab->elf.dynobj, RISCV_ELF_LOG_WORD_BYTES,
664 abfd, /*rela?*/ TRUE);
665
666 if (sreloc == NULL)
667 return FALSE;
668 }
669
670 /* If this is a global symbol, we count the number of
671 relocations we need for this symbol. */
672 if (h != NULL)
190eb1dd 673 head = &h->dyn_relocs;
e23eba97
NC
674 else
675 {
676 /* Track dynamic relocs needed for local syms too.
677 We really need local syms available to do this
678 easily. Oh well. */
679
680 asection *s;
681 void *vpp;
682 Elf_Internal_Sym *isym;
683
684 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
685 abfd, r_symndx);
686 if (isym == NULL)
687 return FALSE;
688
689 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
690 if (s == NULL)
691 s = sec;
692
693 vpp = &elf_section_data (s)->local_dynrel;
3bf083ed 694 head = (struct elf_dyn_relocs **) vpp;
e23eba97
NC
695 }
696
697 p = *head;
698 if (p == NULL || p->sec != sec)
699 {
986f0783 700 size_t amt = sizeof *p;
3bf083ed 701 p = ((struct elf_dyn_relocs *)
e23eba97
NC
702 bfd_alloc (htab->elf.dynobj, amt));
703 if (p == NULL)
704 return FALSE;
705 p->next = *head;
706 *head = p;
707 p->sec = sec;
708 p->count = 0;
709 p->pc_count = 0;
710 }
711
712 p->count += 1;
f3185997 713 p->pc_count += r == NULL ? 0 : r->pc_relative;
e23eba97
NC
714 }
715
716 break;
717
718 case R_RISCV_GNU_VTINHERIT:
719 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
720 return FALSE;
721 break;
722
723 case R_RISCV_GNU_VTENTRY:
724 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
725 return FALSE;
726 break;
727
728 default:
729 break;
730 }
731 }
732
733 return TRUE;
734}
735
736static asection *
737riscv_elf_gc_mark_hook (asection *sec,
738 struct bfd_link_info *info,
739 Elf_Internal_Rela *rel,
740 struct elf_link_hash_entry *h,
741 Elf_Internal_Sym *sym)
742{
743 if (h != NULL)
744 switch (ELFNN_R_TYPE (rel->r_info))
745 {
746 case R_RISCV_GNU_VTINHERIT:
747 case R_RISCV_GNU_VTENTRY:
748 return NULL;
749 }
750
751 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
752}
753
e23eba97
NC
754/* Adjust a symbol defined by a dynamic object and referenced by a
755 regular object. The current definition is in some section of the
756 dynamic object, but we're not including those sections. We have to
757 change the definition to something the rest of the link can
758 understand. */
759
760static bfd_boolean
761riscv_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
762 struct elf_link_hash_entry *h)
763{
764 struct riscv_elf_link_hash_table *htab;
765 struct riscv_elf_link_hash_entry * eh;
e23eba97 766 bfd *dynobj;
5474d94f 767 asection *s, *srel;
e23eba97
NC
768
769 htab = riscv_elf_hash_table (info);
770 BFD_ASSERT (htab != NULL);
771
772 dynobj = htab->elf.dynobj;
773
774 /* Make sure we know what is going on here. */
775 BFD_ASSERT (dynobj != NULL
776 && (h->needs_plt
777 || h->type == STT_GNU_IFUNC
60d67dc8 778 || h->is_weakalias
e23eba97
NC
779 || (h->def_dynamic
780 && h->ref_regular
781 && !h->def_regular)));
782
783 /* If this is a function, put it in the procedure linkage table. We
784 will fill in the contents of the procedure linkage table later
785 (although we could actually do it here). */
786 if (h->type == STT_FUNC || h->type == STT_GNU_IFUNC || h->needs_plt)
787 {
788 if (h->plt.refcount <= 0
789 || SYMBOL_CALLS_LOCAL (info, h)
790 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
791 && h->root.type == bfd_link_hash_undefweak))
792 {
793 /* This case can occur if we saw a R_RISCV_CALL_PLT reloc in an
794 input file, but the symbol was never referred to by a dynamic
795 object, or if all references were garbage collected. In such
796 a case, we don't actually need to build a PLT entry. */
797 h->plt.offset = (bfd_vma) -1;
798 h->needs_plt = 0;
799 }
800
801 return TRUE;
802 }
803 else
804 h->plt.offset = (bfd_vma) -1;
805
806 /* If this is a weak symbol, and there is a real definition, the
807 processor independent code will have arranged for us to see the
808 real definition first, and we can just use the same value. */
60d67dc8 809 if (h->is_weakalias)
e23eba97 810 {
60d67dc8
AM
811 struct elf_link_hash_entry *def = weakdef (h);
812 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
813 h->root.u.def.section = def->root.u.def.section;
814 h->root.u.def.value = def->root.u.def.value;
e23eba97
NC
815 return TRUE;
816 }
817
818 /* This is a reference to a symbol defined by a dynamic object which
819 is not a function. */
820
821 /* If we are creating a shared library, we must presume that the
822 only references to the symbol are via the global offset table.
823 For such cases we need not do anything here; the relocations will
824 be handled correctly by relocate_section. */
825 if (bfd_link_pic (info))
826 return TRUE;
827
828 /* If there are no references to this symbol that do not use the
829 GOT, we don't need to generate a copy reloc. */
830 if (!h->non_got_ref)
831 return TRUE;
832
833 /* If -z nocopyreloc was given, we won't generate them either. */
834 if (info->nocopyreloc)
835 {
836 h->non_got_ref = 0;
837 return TRUE;
838 }
839
3bf083ed 840 /* If we don't find any dynamic relocs in read-only sections, then
e23eba97 841 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
5dbc8b37 842 if (!_bfd_elf_readonly_dynrelocs (h))
e23eba97
NC
843 {
844 h->non_got_ref = 0;
845 return TRUE;
846 }
847
848 /* We must allocate the symbol in our .dynbss section, which will
849 become part of the .bss section of the executable. There will be
850 an entry for this symbol in the .dynsym section. The dynamic
851 object will contain position independent code, so all references
852 from the dynamic object to this symbol will go through the global
853 offset table. The dynamic linker will use the .dynsym entry to
854 determine the address it must put in the global offset table, so
855 both the dynamic object and the regular object will refer to the
856 same memory location for the variable. */
857
858 /* We must generate a R_RISCV_COPY reloc to tell the dynamic linker
859 to copy the initial value out of the dynamic object and into the
860 runtime process image. We need to remember the offset into the
861 .rel.bss section we are going to use. */
3bf083ed 862 eh = (struct riscv_elf_link_hash_entry *) h;
3df5cd13
AW
863 if (eh->tls_type & ~GOT_NORMAL)
864 {
865 s = htab->sdyntdata;
866 srel = htab->elf.srelbss;
867 }
868 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
5474d94f
AM
869 {
870 s = htab->elf.sdynrelro;
871 srel = htab->elf.sreldynrelro;
872 }
873 else
874 {
875 s = htab->elf.sdynbss;
876 srel = htab->elf.srelbss;
877 }
e23eba97
NC
878 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
879 {
5474d94f 880 srel->size += sizeof (ElfNN_External_Rela);
e23eba97
NC
881 h->needs_copy = 1;
882 }
883
5474d94f 884 return _bfd_elf_adjust_dynamic_copy (info, h, s);
e23eba97
NC
885}
886
887/* Allocate space in .plt, .got and associated reloc sections for
888 dynamic relocs. */
889
890static bfd_boolean
891allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
892{
893 struct bfd_link_info *info;
894 struct riscv_elf_link_hash_table *htab;
3bf083ed 895 struct elf_dyn_relocs *p;
e23eba97
NC
896
897 if (h->root.type == bfd_link_hash_indirect)
898 return TRUE;
899
900 info = (struct bfd_link_info *) inf;
901 htab = riscv_elf_hash_table (info);
902 BFD_ASSERT (htab != NULL);
903
904 if (htab->elf.dynamic_sections_created
905 && h->plt.refcount > 0)
906 {
907 /* Make sure this symbol is output as a dynamic symbol.
908 Undefined weak syms won't yet be marked as dynamic. */
909 if (h->dynindx == -1
910 && !h->forced_local)
911 {
912 if (! bfd_elf_link_record_dynamic_symbol (info, h))
913 return FALSE;
914 }
915
916 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, bfd_link_pic (info), h))
917 {
918 asection *s = htab->elf.splt;
919
920 if (s->size == 0)
921 s->size = PLT_HEADER_SIZE;
922
923 h->plt.offset = s->size;
924
925 /* Make room for this entry. */
926 s->size += PLT_ENTRY_SIZE;
927
928 /* We also need to make an entry in the .got.plt section. */
929 htab->elf.sgotplt->size += GOT_ENTRY_SIZE;
930
931 /* We also need to make an entry in the .rela.plt section. */
932 htab->elf.srelplt->size += sizeof (ElfNN_External_Rela);
933
934 /* If this symbol is not defined in a regular file, and we are
935 not generating a shared library, then set the symbol to this
936 location in the .plt. This is required to make function
937 pointers compare as equal between the normal executable and
938 the shared library. */
939 if (! bfd_link_pic (info)
940 && !h->def_regular)
941 {
942 h->root.u.def.section = s;
943 h->root.u.def.value = h->plt.offset;
944 }
945 }
946 else
947 {
948 h->plt.offset = (bfd_vma) -1;
949 h->needs_plt = 0;
950 }
951 }
952 else
953 {
954 h->plt.offset = (bfd_vma) -1;
955 h->needs_plt = 0;
956 }
957
958 if (h->got.refcount > 0)
959 {
960 asection *s;
961 bfd_boolean dyn;
962 int tls_type = riscv_elf_hash_entry (h)->tls_type;
963
964 /* Make sure this symbol is output as a dynamic symbol.
965 Undefined weak syms won't yet be marked as dynamic. */
966 if (h->dynindx == -1
967 && !h->forced_local)
968 {
969 if (! bfd_elf_link_record_dynamic_symbol (info, h))
970 return FALSE;
971 }
972
973 s = htab->elf.sgot;
974 h->got.offset = s->size;
975 dyn = htab->elf.dynamic_sections_created;
976 if (tls_type & (GOT_TLS_GD | GOT_TLS_IE))
977 {
978 /* TLS_GD needs two dynamic relocs and two GOT slots. */
979 if (tls_type & GOT_TLS_GD)
980 {
981 s->size += 2 * RISCV_ELF_WORD_BYTES;
982 htab->elf.srelgot->size += 2 * sizeof (ElfNN_External_Rela);
983 }
984
985 /* TLS_IE needs one dynamic reloc and one GOT slot. */
986 if (tls_type & GOT_TLS_IE)
987 {
988 s->size += RISCV_ELF_WORD_BYTES;
989 htab->elf.srelgot->size += sizeof (ElfNN_External_Rela);
990 }
991 }
992 else
993 {
994 s->size += RISCV_ELF_WORD_BYTES;
6487709f
JW
995 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, bfd_link_pic (info), h)
996 && ! UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
e23eba97
NC
997 htab->elf.srelgot->size += sizeof (ElfNN_External_Rela);
998 }
999 }
1000 else
1001 h->got.offset = (bfd_vma) -1;
1002
190eb1dd 1003 if (h->dyn_relocs == NULL)
e23eba97
NC
1004 return TRUE;
1005
1006 /* In the shared -Bsymbolic case, discard space allocated for
1007 dynamic pc-relative relocs against symbols which turn out to be
1008 defined in regular objects. For the normal shared case, discard
1009 space for pc-relative relocs that have become local due to symbol
1010 visibility changes. */
1011
1012 if (bfd_link_pic (info))
1013 {
1014 if (SYMBOL_CALLS_LOCAL (info, h))
1015 {
3bf083ed 1016 struct elf_dyn_relocs **pp;
e23eba97 1017
190eb1dd 1018 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
e23eba97
NC
1019 {
1020 p->count -= p->pc_count;
1021 p->pc_count = 0;
1022 if (p->count == 0)
1023 *pp = p->next;
1024 else
1025 pp = &p->next;
1026 }
1027 }
1028
1029 /* Also discard relocs on undefined weak syms with non-default
1030 visibility. */
190eb1dd 1031 if (h->dyn_relocs != NULL
e23eba97
NC
1032 && h->root.type == bfd_link_hash_undefweak)
1033 {
6487709f
JW
1034 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1035 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
190eb1dd 1036 h->dyn_relocs = NULL;
e23eba97
NC
1037
1038 /* Make sure undefined weak symbols are output as a dynamic
1039 symbol in PIEs. */
1040 else if (h->dynindx == -1
1041 && !h->forced_local)
1042 {
1043 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1044 return FALSE;
1045 }
1046 }
1047 }
1048 else
1049 {
1050 /* For the non-shared case, discard space for relocs against
1051 symbols which turn out to need copy relocs or are not
1052 dynamic. */
1053
1054 if (!h->non_got_ref
1055 && ((h->def_dynamic
1056 && !h->def_regular)
1057 || (htab->elf.dynamic_sections_created
1058 && (h->root.type == bfd_link_hash_undefweak
1059 || h->root.type == bfd_link_hash_undefined))))
1060 {
1061 /* Make sure this symbol is output as a dynamic symbol.
1062 Undefined weak syms won't yet be marked as dynamic. */
1063 if (h->dynindx == -1
1064 && !h->forced_local)
1065 {
1066 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1067 return FALSE;
1068 }
1069
1070 /* If that succeeded, we know we'll be keeping all the
1071 relocs. */
1072 if (h->dynindx != -1)
1073 goto keep;
1074 }
1075
190eb1dd 1076 h->dyn_relocs = NULL;
e23eba97
NC
1077
1078 keep: ;
1079 }
1080
1081 /* Finally, allocate space. */
190eb1dd 1082 for (p = h->dyn_relocs; p != NULL; p = p->next)
e23eba97
NC
1083 {
1084 asection *sreloc = elf_section_data (p->sec)->sreloc;
1085 sreloc->size += p->count * sizeof (ElfNN_External_Rela);
1086 }
1087
1088 return TRUE;
1089}
1090
e23eba97
NC
1091static bfd_boolean
1092riscv_elf_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
1093{
1094 struct riscv_elf_link_hash_table *htab;
1095 bfd *dynobj;
1096 asection *s;
1097 bfd *ibfd;
1098
1099 htab = riscv_elf_hash_table (info);
1100 BFD_ASSERT (htab != NULL);
1101 dynobj = htab->elf.dynobj;
1102 BFD_ASSERT (dynobj != NULL);
1103
1104 if (elf_hash_table (info)->dynamic_sections_created)
1105 {
1106 /* Set the contents of the .interp section to the interpreter. */
1107 if (bfd_link_executable (info) && !info->nointerp)
1108 {
1109 s = bfd_get_linker_section (dynobj, ".interp");
1110 BFD_ASSERT (s != NULL);
1111 s->size = strlen (ELFNN_DYNAMIC_INTERPRETER) + 1;
1112 s->contents = (unsigned char *) ELFNN_DYNAMIC_INTERPRETER;
1113 }
1114 }
1115
1116 /* Set up .got offsets for local syms, and space for local dynamic
1117 relocs. */
1118 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1119 {
1120 bfd_signed_vma *local_got;
1121 bfd_signed_vma *end_local_got;
1122 char *local_tls_type;
1123 bfd_size_type locsymcount;
1124 Elf_Internal_Shdr *symtab_hdr;
1125 asection *srel;
1126
1127 if (! is_riscv_elf (ibfd))
1128 continue;
1129
1130 for (s = ibfd->sections; s != NULL; s = s->next)
1131 {
3bf083ed 1132 struct elf_dyn_relocs *p;
e23eba97
NC
1133
1134 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
1135 {
1136 if (!bfd_is_abs_section (p->sec)
1137 && bfd_is_abs_section (p->sec->output_section))
1138 {
1139 /* Input section has been discarded, either because
1140 it is a copy of a linkonce section or due to
1141 linker script /DISCARD/, so we'll be discarding
1142 the relocs too. */
1143 }
1144 else if (p->count != 0)
1145 {
1146 srel = elf_section_data (p->sec)->sreloc;
1147 srel->size += p->count * sizeof (ElfNN_External_Rela);
1148 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
1149 info->flags |= DF_TEXTREL;
1150 }
1151 }
1152 }
1153
1154 local_got = elf_local_got_refcounts (ibfd);
1155 if (!local_got)
1156 continue;
1157
1158 symtab_hdr = &elf_symtab_hdr (ibfd);
1159 locsymcount = symtab_hdr->sh_info;
1160 end_local_got = local_got + locsymcount;
1161 local_tls_type = _bfd_riscv_elf_local_got_tls_type (ibfd);
1162 s = htab->elf.sgot;
1163 srel = htab->elf.srelgot;
1164 for (; local_got < end_local_got; ++local_got, ++local_tls_type)
1165 {
1166 if (*local_got > 0)
1167 {
1168 *local_got = s->size;
1169 s->size += RISCV_ELF_WORD_BYTES;
1170 if (*local_tls_type & GOT_TLS_GD)
1171 s->size += RISCV_ELF_WORD_BYTES;
1172 if (bfd_link_pic (info)
1173 || (*local_tls_type & (GOT_TLS_GD | GOT_TLS_IE)))
1174 srel->size += sizeof (ElfNN_External_Rela);
1175 }
1176 else
1177 *local_got = (bfd_vma) -1;
1178 }
1179 }
1180
1181 /* Allocate global sym .plt and .got entries, and space for global
1182 sym dynamic relocs. */
1183 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
1184
1185 if (htab->elf.sgotplt)
1186 {
1187 struct elf_link_hash_entry *got;
1188 got = elf_link_hash_lookup (elf_hash_table (info),
1189 "_GLOBAL_OFFSET_TABLE_",
1190 FALSE, FALSE, FALSE);
1191
1192 /* Don't allocate .got.plt section if there are no GOT nor PLT
1193 entries and there is no refeence to _GLOBAL_OFFSET_TABLE_. */
1194 if ((got == NULL
1195 || !got->ref_regular_nonweak)
1196 && (htab->elf.sgotplt->size == GOTPLT_HEADER_SIZE)
1197 && (htab->elf.splt == NULL
1198 || htab->elf.splt->size == 0)
1199 && (htab->elf.sgot == NULL
1200 || (htab->elf.sgot->size
1201 == get_elf_backend_data (output_bfd)->got_header_size)))
1202 htab->elf.sgotplt->size = 0;
1203 }
1204
1205 /* The check_relocs and adjust_dynamic_symbol entry points have
1206 determined the sizes of the various dynamic sections. Allocate
1207 memory for them. */
1208 for (s = dynobj->sections; s != NULL; s = s->next)
1209 {
1210 if ((s->flags & SEC_LINKER_CREATED) == 0)
1211 continue;
1212
1213 if (s == htab->elf.splt
1214 || s == htab->elf.sgot
1215 || s == htab->elf.sgotplt
5474d94f 1216 || s == htab->elf.sdynbss
3e1b4df8
JW
1217 || s == htab->elf.sdynrelro
1218 || s == htab->sdyntdata)
e23eba97
NC
1219 {
1220 /* Strip this section if we don't need it; see the
1221 comment below. */
1222 }
1223 else if (strncmp (s->name, ".rela", 5) == 0)
1224 {
1225 if (s->size != 0)
1226 {
1227 /* We use the reloc_count field as a counter if we need
1228 to copy relocs into the output file. */
1229 s->reloc_count = 0;
1230 }
1231 }
1232 else
1233 {
1234 /* It's not one of our sections. */
1235 continue;
1236 }
1237
1238 if (s->size == 0)
1239 {
1240 /* If we don't need this section, strip it from the
1241 output file. This is mostly to handle .rela.bss and
1242 .rela.plt. We must create both sections in
1243 create_dynamic_sections, because they must be created
1244 before the linker maps input sections to output
1245 sections. The linker does that before
1246 adjust_dynamic_symbol is called, and it is that
1247 function which decides whether anything needs to go
1248 into these sections. */
1249 s->flags |= SEC_EXCLUDE;
1250 continue;
1251 }
1252
1253 if ((s->flags & SEC_HAS_CONTENTS) == 0)
1254 continue;
1255
1256 /* Allocate memory for the section contents. Zero the memory
1257 for the benefit of .rela.plt, which has 4 unused entries
1258 at the beginning, and we don't want garbage. */
1259 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
1260 if (s->contents == NULL)
1261 return FALSE;
1262 }
1263
1264 if (elf_hash_table (info)->dynamic_sections_created)
1265 {
1266 /* Add some entries to the .dynamic section. We fill in the
1267 values later, in riscv_elf_finish_dynamic_sections, but we
1268 must add the entries now so that we get the correct size for
1269 the .dynamic section. The DT_DEBUG entry is filled in by the
1270 dynamic linker and used by the debugger. */
1271#define add_dynamic_entry(TAG, VAL) \
1272 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
1273
1274 if (bfd_link_executable (info))
1275 {
1276 if (!add_dynamic_entry (DT_DEBUG, 0))
1277 return FALSE;
1278 }
1279
1280 if (htab->elf.srelplt->size != 0)
1281 {
1282 if (!add_dynamic_entry (DT_PLTGOT, 0)
1283 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1284 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1285 || !add_dynamic_entry (DT_JMPREL, 0))
1286 return FALSE;
1287 }
1288
1289 if (!add_dynamic_entry (DT_RELA, 0)
1290 || !add_dynamic_entry (DT_RELASZ, 0)
1291 || !add_dynamic_entry (DT_RELAENT, sizeof (ElfNN_External_Rela)))
1292 return FALSE;
1293
1294 /* If any dynamic relocs apply to a read-only section,
1295 then we need a DT_TEXTREL entry. */
1296 if ((info->flags & DF_TEXTREL) == 0)
d49e5065
L
1297 elf_link_hash_traverse (&htab->elf,
1298 _bfd_elf_maybe_set_textrel, info);
e23eba97
NC
1299
1300 if (info->flags & DF_TEXTREL)
1301 {
1302 if (!add_dynamic_entry (DT_TEXTREL, 0))
1303 return FALSE;
1304 }
1305 }
1306#undef add_dynamic_entry
1307
1308 return TRUE;
1309}
1310
1311#define TP_OFFSET 0
1312#define DTP_OFFSET 0x800
1313
1314/* Return the relocation value for a TLS dtp-relative reloc. */
1315
1316static bfd_vma
1317dtpoff (struct bfd_link_info *info, bfd_vma address)
1318{
1319 /* If tls_sec is NULL, we should have signalled an error already. */
1320 if (elf_hash_table (info)->tls_sec == NULL)
1321 return 0;
1322 return address - elf_hash_table (info)->tls_sec->vma - DTP_OFFSET;
1323}
1324
1325/* Return the relocation value for a static TLS tp-relative relocation. */
1326
1327static bfd_vma
1328tpoff (struct bfd_link_info *info, bfd_vma address)
1329{
1330 /* If tls_sec is NULL, we should have signalled an error already. */
1331 if (elf_hash_table (info)->tls_sec == NULL)
1332 return 0;
1333 return address - elf_hash_table (info)->tls_sec->vma - TP_OFFSET;
1334}
1335
1336/* Return the global pointer's value, or 0 if it is not in use. */
1337
1338static bfd_vma
1339riscv_global_pointer_value (struct bfd_link_info *info)
1340{
1341 struct bfd_link_hash_entry *h;
1342
b5292032 1343 h = bfd_link_hash_lookup (info->hash, RISCV_GP_SYMBOL, FALSE, FALSE, TRUE);
e23eba97
NC
1344 if (h == NULL || h->type != bfd_link_hash_defined)
1345 return 0;
1346
1347 return h->u.def.value + sec_addr (h->u.def.section);
1348}
1349
1350/* Emplace a static relocation. */
1351
1352static bfd_reloc_status_type
1353perform_relocation (const reloc_howto_type *howto,
1354 const Elf_Internal_Rela *rel,
1355 bfd_vma value,
1356 asection *input_section,
1357 bfd *input_bfd,
1358 bfd_byte *contents)
1359{
1360 if (howto->pc_relative)
1361 value -= sec_addr (input_section) + rel->r_offset;
1362 value += rel->r_addend;
1363
1364 switch (ELFNN_R_TYPE (rel->r_info))
1365 {
1366 case R_RISCV_HI20:
1367 case R_RISCV_TPREL_HI20:
1368 case R_RISCV_PCREL_HI20:
1369 case R_RISCV_GOT_HI20:
1370 case R_RISCV_TLS_GOT_HI20:
1371 case R_RISCV_TLS_GD_HI20:
1372 if (ARCH_SIZE > 32 && !VALID_UTYPE_IMM (RISCV_CONST_HIGH_PART (value)))
1373 return bfd_reloc_overflow;
1374 value = ENCODE_UTYPE_IMM (RISCV_CONST_HIGH_PART (value));
1375 break;
1376
1377 case R_RISCV_LO12_I:
1378 case R_RISCV_GPREL_I:
1379 case R_RISCV_TPREL_LO12_I:
45f76423 1380 case R_RISCV_TPREL_I:
e23eba97
NC
1381 case R_RISCV_PCREL_LO12_I:
1382 value = ENCODE_ITYPE_IMM (value);
1383 break;
1384
1385 case R_RISCV_LO12_S:
1386 case R_RISCV_GPREL_S:
1387 case R_RISCV_TPREL_LO12_S:
45f76423 1388 case R_RISCV_TPREL_S:
e23eba97
NC
1389 case R_RISCV_PCREL_LO12_S:
1390 value = ENCODE_STYPE_IMM (value);
1391 break;
1392
1393 case R_RISCV_CALL:
1394 case R_RISCV_CALL_PLT:
1395 if (ARCH_SIZE > 32 && !VALID_UTYPE_IMM (RISCV_CONST_HIGH_PART (value)))
1396 return bfd_reloc_overflow;
1397 value = ENCODE_UTYPE_IMM (RISCV_CONST_HIGH_PART (value))
1398 | (ENCODE_ITYPE_IMM (value) << 32);
1399 break;
1400
1401 case R_RISCV_JAL:
1402 if (!VALID_UJTYPE_IMM (value))
1403 return bfd_reloc_overflow;
1404 value = ENCODE_UJTYPE_IMM (value);
1405 break;
1406
1407 case R_RISCV_BRANCH:
1408 if (!VALID_SBTYPE_IMM (value))
1409 return bfd_reloc_overflow;
1410 value = ENCODE_SBTYPE_IMM (value);
1411 break;
1412
1413 case R_RISCV_RVC_BRANCH:
1414 if (!VALID_RVC_B_IMM (value))
1415 return bfd_reloc_overflow;
1416 value = ENCODE_RVC_B_IMM (value);
1417 break;
1418
1419 case R_RISCV_RVC_JUMP:
1420 if (!VALID_RVC_J_IMM (value))
1421 return bfd_reloc_overflow;
1422 value = ENCODE_RVC_J_IMM (value);
1423 break;
1424
1425 case R_RISCV_RVC_LUI:
080a4883
JW
1426 if (RISCV_CONST_HIGH_PART (value) == 0)
1427 {
1428 /* Linker relaxation can convert an address equal to or greater than
1429 0x800 to slightly below 0x800. C.LUI does not accept zero as a
1430 valid immediate. We can fix this by converting it to a C.LI. */
1431 bfd_vma insn = bfd_get (howto->bitsize, input_bfd,
1432 contents + rel->r_offset);
1433 insn = (insn & ~MATCH_C_LUI) | MATCH_C_LI;
1434 bfd_put (howto->bitsize, input_bfd, insn, contents + rel->r_offset);
1435 value = ENCODE_RVC_IMM (0);
1436 }
1437 else if (!VALID_RVC_LUI_IMM (RISCV_CONST_HIGH_PART (value)))
e23eba97 1438 return bfd_reloc_overflow;
080a4883
JW
1439 else
1440 value = ENCODE_RVC_LUI_IMM (RISCV_CONST_HIGH_PART (value));
e23eba97
NC
1441 break;
1442
1443 case R_RISCV_32:
1444 case R_RISCV_64:
1445 case R_RISCV_ADD8:
1446 case R_RISCV_ADD16:
1447 case R_RISCV_ADD32:
1448 case R_RISCV_ADD64:
45f76423 1449 case R_RISCV_SUB6:
e23eba97
NC
1450 case R_RISCV_SUB8:
1451 case R_RISCV_SUB16:
1452 case R_RISCV_SUB32:
1453 case R_RISCV_SUB64:
45f76423
AW
1454 case R_RISCV_SET6:
1455 case R_RISCV_SET8:
1456 case R_RISCV_SET16:
1457 case R_RISCV_SET32:
a6cbf936 1458 case R_RISCV_32_PCREL:
e23eba97
NC
1459 case R_RISCV_TLS_DTPREL32:
1460 case R_RISCV_TLS_DTPREL64:
1461 break;
1462
ff6f4d9b
PD
1463 case R_RISCV_DELETE:
1464 return bfd_reloc_ok;
1465
e23eba97
NC
1466 default:
1467 return bfd_reloc_notsupported;
1468 }
1469
1470 bfd_vma word = bfd_get (howto->bitsize, input_bfd, contents + rel->r_offset);
1471 word = (word & ~howto->dst_mask) | (value & howto->dst_mask);
1472 bfd_put (howto->bitsize, input_bfd, word, contents + rel->r_offset);
1473
1474 return bfd_reloc_ok;
1475}
1476
1477/* Remember all PC-relative high-part relocs we've encountered to help us
1478 later resolve the corresponding low-part relocs. */
1479
1480typedef struct
1481{
1482 bfd_vma address;
1483 bfd_vma value;
1484} riscv_pcrel_hi_reloc;
1485
1486typedef struct riscv_pcrel_lo_reloc
1487{
07d6d2b8
AM
1488 asection * input_section;
1489 struct bfd_link_info * info;
1490 reloc_howto_type * howto;
1491 const Elf_Internal_Rela * reloc;
1492 bfd_vma addr;
1493 const char * name;
1494 bfd_byte * contents;
1495 struct riscv_pcrel_lo_reloc * next;
e23eba97
NC
1496} riscv_pcrel_lo_reloc;
1497
1498typedef struct
1499{
1500 htab_t hi_relocs;
1501 riscv_pcrel_lo_reloc *lo_relocs;
1502} riscv_pcrel_relocs;
1503
1504static hashval_t
1505riscv_pcrel_reloc_hash (const void *entry)
1506{
1507 const riscv_pcrel_hi_reloc *e = entry;
1508 return (hashval_t)(e->address >> 2);
1509}
1510
1511static bfd_boolean
1512riscv_pcrel_reloc_eq (const void *entry1, const void *entry2)
1513{
1514 const riscv_pcrel_hi_reloc *e1 = entry1, *e2 = entry2;
1515 return e1->address == e2->address;
1516}
1517
1518static bfd_boolean
1519riscv_init_pcrel_relocs (riscv_pcrel_relocs *p)
1520{
1521
1522 p->lo_relocs = NULL;
1523 p->hi_relocs = htab_create (1024, riscv_pcrel_reloc_hash,
1524 riscv_pcrel_reloc_eq, free);
1525 return p->hi_relocs != NULL;
1526}
1527
1528static void
1529riscv_free_pcrel_relocs (riscv_pcrel_relocs *p)
1530{
1531 riscv_pcrel_lo_reloc *cur = p->lo_relocs;
1532
1533 while (cur != NULL)
1534 {
1535 riscv_pcrel_lo_reloc *next = cur->next;
1536 free (cur);
1537 cur = next;
1538 }
1539
1540 htab_delete (p->hi_relocs);
1541}
1542
1543static bfd_boolean
b1308d2c
PD
1544riscv_zero_pcrel_hi_reloc (Elf_Internal_Rela *rel,
1545 struct bfd_link_info *info,
1546 bfd_vma pc,
1547 bfd_vma addr,
1548 bfd_byte *contents,
1549 const reloc_howto_type *howto,
1550 bfd *input_bfd)
e23eba97 1551{
b1308d2c
PD
1552 /* We may need to reference low addreses in PC-relative modes even when the
1553 * PC is far away from these addresses. For example, undefweak references
1554 * need to produce the address 0 when linked. As 0 is far from the arbitrary
1555 * addresses that we can link PC-relative programs at, the linker can't
1556 * actually relocate references to those symbols. In order to allow these
1557 * programs to work we simply convert the PC-relative auipc sequences to
1558 * 0-relative lui sequences. */
1559 if (bfd_link_pic (info))
1560 return FALSE;
1561
1562 /* If it's possible to reference the symbol using auipc we do so, as that's
1563 * more in the spirit of the PC-relative relocations we're processing. */
1564 bfd_vma offset = addr - pc;
1565 if (ARCH_SIZE == 32 || VALID_UTYPE_IMM (RISCV_CONST_HIGH_PART (offset)))
1566 return FALSE;
1567
1568 /* If it's impossible to reference this with a LUI-based offset then don't
1569 * bother to convert it at all so users still see the PC-relative relocation
1570 * in the truncation message. */
1571 if (ARCH_SIZE > 32 && !VALID_UTYPE_IMM (RISCV_CONST_HIGH_PART (addr)))
1572 return FALSE;
1573
1574 rel->r_info = ELFNN_R_INFO(addr, R_RISCV_HI20);
1575
1576 bfd_vma insn = bfd_get(howto->bitsize, input_bfd, contents + rel->r_offset);
1577 insn = (insn & ~MASK_AUIPC) | MATCH_LUI;
1578 bfd_put(howto->bitsize, input_bfd, insn, contents + rel->r_offset);
1579 return TRUE;
1580}
1581
1582static bfd_boolean
1583riscv_record_pcrel_hi_reloc (riscv_pcrel_relocs *p, bfd_vma addr,
1584 bfd_vma value, bfd_boolean absolute)
1585{
1586 bfd_vma offset = absolute ? value : value - addr;
1587 riscv_pcrel_hi_reloc entry = {addr, offset};
e23eba97
NC
1588 riscv_pcrel_hi_reloc **slot =
1589 (riscv_pcrel_hi_reloc **) htab_find_slot (p->hi_relocs, &entry, INSERT);
1590
1591 BFD_ASSERT (*slot == NULL);
1592 *slot = (riscv_pcrel_hi_reloc *) bfd_malloc (sizeof (riscv_pcrel_hi_reloc));
1593 if (*slot == NULL)
1594 return FALSE;
1595 **slot = entry;
1596 return TRUE;
1597}
1598
1599static bfd_boolean
1600riscv_record_pcrel_lo_reloc (riscv_pcrel_relocs *p,
1601 asection *input_section,
1602 struct bfd_link_info *info,
1603 reloc_howto_type *howto,
1604 const Elf_Internal_Rela *reloc,
1605 bfd_vma addr,
1606 const char *name,
1607 bfd_byte *contents)
1608{
1609 riscv_pcrel_lo_reloc *entry;
1610 entry = (riscv_pcrel_lo_reloc *) bfd_malloc (sizeof (riscv_pcrel_lo_reloc));
1611 if (entry == NULL)
1612 return FALSE;
1613 *entry = (riscv_pcrel_lo_reloc) {input_section, info, howto, reloc, addr,
1614 name, contents, p->lo_relocs};
1615 p->lo_relocs = entry;
1616 return TRUE;
1617}
1618
1619static bfd_boolean
1620riscv_resolve_pcrel_lo_relocs (riscv_pcrel_relocs *p)
1621{
1622 riscv_pcrel_lo_reloc *r;
1623
1624 for (r = p->lo_relocs; r != NULL; r = r->next)
1625 {
1626 bfd *input_bfd = r->input_section->owner;
1627
1628 riscv_pcrel_hi_reloc search = {r->addr, 0};
1629 riscv_pcrel_hi_reloc *entry = htab_find (p->hi_relocs, &search);
551703cf
JW
1630 if (entry == NULL
1631 /* Check for overflow into bit 11 when adding reloc addend. */
1632 || (! (entry->value & 0x800)
1633 && ((entry->value + r->reloc->r_addend) & 0x800)))
07d6d2b8 1634 {
551703cf
JW
1635 char *string = (entry == NULL
1636 ? "%pcrel_lo missing matching %pcrel_hi"
1637 : "%pcrel_lo overflow with an addend");
1638 (*r->info->callbacks->reloc_dangerous)
1639 (r->info, string, input_bfd, r->input_section, r->reloc->r_offset);
e23eba97 1640 return TRUE;
07d6d2b8 1641 }
e23eba97
NC
1642
1643 perform_relocation (r->howto, r->reloc, entry->value, r->input_section,
1644 input_bfd, r->contents);
1645 }
1646
1647 return TRUE;
1648}
1649
1650/* Relocate a RISC-V ELF section.
1651
1652 The RELOCATE_SECTION function is called by the new ELF backend linker
1653 to handle the relocations for a section.
1654
1655 The relocs are always passed as Rela structures.
1656
1657 This function is responsible for adjusting the section contents as
1658 necessary, and (if generating a relocatable output file) adjusting
1659 the reloc addend as necessary.
1660
1661 This function does not have to worry about setting the reloc
1662 address or the reloc symbol index.
1663
1664 LOCAL_SYMS is a pointer to the swapped in local symbols.
1665
1666 LOCAL_SECTIONS is an array giving the section in the input file
1667 corresponding to the st_shndx field of each local symbol.
1668
1669 The global hash table entry for the global symbols can be found
1670 via elf_sym_hashes (input_bfd).
1671
1672 When generating relocatable output, this function must handle
1673 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
1674 going to be the section symbol corresponding to the output
1675 section, which means that the addend must be adjusted
1676 accordingly. */
1677
1678static bfd_boolean
1679riscv_elf_relocate_section (bfd *output_bfd,
1680 struct bfd_link_info *info,
1681 bfd *input_bfd,
1682 asection *input_section,
1683 bfd_byte *contents,
1684 Elf_Internal_Rela *relocs,
1685 Elf_Internal_Sym *local_syms,
1686 asection **local_sections)
1687{
1688 Elf_Internal_Rela *rel;
1689 Elf_Internal_Rela *relend;
1690 riscv_pcrel_relocs pcrel_relocs;
1691 bfd_boolean ret = FALSE;
1692 asection *sreloc = elf_section_data (input_section)->sreloc;
1693 struct riscv_elf_link_hash_table *htab = riscv_elf_hash_table (info);
1694 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_bfd);
1695 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
1696 bfd_vma *local_got_offsets = elf_local_got_offsets (input_bfd);
b1308d2c 1697 bfd_boolean absolute;
e23eba97
NC
1698
1699 if (!riscv_init_pcrel_relocs (&pcrel_relocs))
1700 return FALSE;
1701
1702 relend = relocs + input_section->reloc_count;
1703 for (rel = relocs; rel < relend; rel++)
1704 {
1705 unsigned long r_symndx;
1706 struct elf_link_hash_entry *h;
1707 Elf_Internal_Sym *sym;
1708 asection *sec;
1709 bfd_vma relocation;
1710 bfd_reloc_status_type r = bfd_reloc_ok;
1711 const char *name;
1712 bfd_vma off, ie_off;
1713 bfd_boolean unresolved_reloc, is_ie = FALSE;
1714 bfd_vma pc = sec_addr (input_section) + rel->r_offset;
1715 int r_type = ELFNN_R_TYPE (rel->r_info), tls_type;
0aa13fee 1716 reloc_howto_type *howto = riscv_elf_rtype_to_howto (input_bfd, r_type);
e23eba97 1717 const char *msg = NULL;
330a6637 1718 char *msg_buf = NULL;
6487709f 1719 bfd_boolean resolved_to_zero;
e23eba97 1720
f3185997
NC
1721 if (howto == NULL
1722 || r_type == R_RISCV_GNU_VTINHERIT || r_type == R_RISCV_GNU_VTENTRY)
e23eba97
NC
1723 continue;
1724
1725 /* This is a final link. */
1726 r_symndx = ELFNN_R_SYM (rel->r_info);
1727 h = NULL;
1728 sym = NULL;
1729 sec = NULL;
1730 unresolved_reloc = FALSE;
1731 if (r_symndx < symtab_hdr->sh_info)
1732 {
1733 sym = local_syms + r_symndx;
1734 sec = local_sections[r_symndx];
1735 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
1736 }
1737 else
1738 {
1739 bfd_boolean warned, ignored;
1740
1741 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1742 r_symndx, symtab_hdr, sym_hashes,
1743 h, sec, relocation,
1744 unresolved_reloc, warned, ignored);
1745 if (warned)
1746 {
1747 /* To avoid generating warning messages about truncated
1748 relocations, set the relocation's address to be the same as
1749 the start of this section. */
1750 if (input_section->output_section != NULL)
1751 relocation = input_section->output_section->vma;
1752 else
1753 relocation = 0;
1754 }
1755 }
1756
1757 if (sec != NULL && discarded_section (sec))
1758 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
1759 rel, 1, relend, howto, 0, contents);
1760
1761 if (bfd_link_relocatable (info))
1762 continue;
1763
1764 if (h != NULL)
1765 name = h->root.root.string;
1766 else
1767 {
1768 name = (bfd_elf_string_from_elf_section
1769 (input_bfd, symtab_hdr->sh_link, sym->st_name));
1770 if (name == NULL || *name == '\0')
fd361982 1771 name = bfd_section_name (sec);
e23eba97
NC
1772 }
1773
6487709f
JW
1774 resolved_to_zero = (h != NULL
1775 && UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
1776
e23eba97
NC
1777 switch (r_type)
1778 {
1779 case R_RISCV_NONE:
45f76423 1780 case R_RISCV_RELAX:
e23eba97
NC
1781 case R_RISCV_TPREL_ADD:
1782 case R_RISCV_COPY:
1783 case R_RISCV_JUMP_SLOT:
1784 case R_RISCV_RELATIVE:
1785 /* These require nothing of us at all. */
1786 continue;
1787
1788 case R_RISCV_HI20:
1789 case R_RISCV_BRANCH:
1790 case R_RISCV_RVC_BRANCH:
1791 case R_RISCV_RVC_LUI:
1792 case R_RISCV_LO12_I:
1793 case R_RISCV_LO12_S:
45f76423
AW
1794 case R_RISCV_SET6:
1795 case R_RISCV_SET8:
1796 case R_RISCV_SET16:
1797 case R_RISCV_SET32:
a6cbf936 1798 case R_RISCV_32_PCREL:
ff6f4d9b 1799 case R_RISCV_DELETE:
e23eba97
NC
1800 /* These require no special handling beyond perform_relocation. */
1801 break;
1802
1803 case R_RISCV_GOT_HI20:
1804 if (h != NULL)
1805 {
1806 bfd_boolean dyn, pic;
1807
1808 off = h->got.offset;
1809 BFD_ASSERT (off != (bfd_vma) -1);
1810 dyn = elf_hash_table (info)->dynamic_sections_created;
1811 pic = bfd_link_pic (info);
1812
1813 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, pic, h)
1814 || (pic && SYMBOL_REFERENCES_LOCAL (info, h)))
1815 {
1816 /* This is actually a static link, or it is a
1817 -Bsymbolic link and the symbol is defined
1818 locally, or the symbol was forced to be local
1819 because of a version file. We must initialize
1820 this entry in the global offset table. Since the
1821 offset must always be a multiple of the word size,
1822 we use the least significant bit to record whether
1823 we have initialized it already.
1824
1825 When doing a dynamic link, we create a .rela.got
1826 relocation entry to initialize the value. This
1827 is done in the finish_dynamic_symbol routine. */
1828 if ((off & 1) != 0)
1829 off &= ~1;
1830 else
1831 {
1832 bfd_put_NN (output_bfd, relocation,
1833 htab->elf.sgot->contents + off);
1834 h->got.offset |= 1;
1835 }
1836 }
1837 else
1838 unresolved_reloc = FALSE;
1839 }
1840 else
1841 {
1842 BFD_ASSERT (local_got_offsets != NULL
1843 && local_got_offsets[r_symndx] != (bfd_vma) -1);
1844
1845 off = local_got_offsets[r_symndx];
1846
1847 /* The offset must always be a multiple of the word size.
1848 So, we can use the least significant bit to record
1849 whether we have already processed this entry. */
1850 if ((off & 1) != 0)
1851 off &= ~1;
1852 else
1853 {
1854 if (bfd_link_pic (info))
1855 {
1856 asection *s;
1857 Elf_Internal_Rela outrel;
1858
1859 /* We need to generate a R_RISCV_RELATIVE reloc
1860 for the dynamic linker. */
1861 s = htab->elf.srelgot;
1862 BFD_ASSERT (s != NULL);
1863
1864 outrel.r_offset = sec_addr (htab->elf.sgot) + off;
1865 outrel.r_info =
1866 ELFNN_R_INFO (0, R_RISCV_RELATIVE);
1867 outrel.r_addend = relocation;
1868 relocation = 0;
1869 riscv_elf_append_rela (output_bfd, s, &outrel);
1870 }
1871
1872 bfd_put_NN (output_bfd, relocation,
1873 htab->elf.sgot->contents + off);
1874 local_got_offsets[r_symndx] |= 1;
1875 }
1876 }
1877 relocation = sec_addr (htab->elf.sgot) + off;
b1308d2c
PD
1878 absolute = riscv_zero_pcrel_hi_reloc (rel,
1879 info,
1880 pc,
1881 relocation,
1882 contents,
1883 howto,
1884 input_bfd);
1885 r_type = ELFNN_R_TYPE (rel->r_info);
0aa13fee 1886 howto = riscv_elf_rtype_to_howto (input_bfd, r_type);
f3185997
NC
1887 if (howto == NULL)
1888 r = bfd_reloc_notsupported;
1889 else if (!riscv_record_pcrel_hi_reloc (&pcrel_relocs, pc,
1890 relocation, absolute))
e23eba97
NC
1891 r = bfd_reloc_overflow;
1892 break;
1893
1894 case R_RISCV_ADD8:
1895 case R_RISCV_ADD16:
1896 case R_RISCV_ADD32:
1897 case R_RISCV_ADD64:
1898 {
1899 bfd_vma old_value = bfd_get (howto->bitsize, input_bfd,
1900 contents + rel->r_offset);
1901 relocation = old_value + relocation;
1902 }
1903 break;
1904
45f76423 1905 case R_RISCV_SUB6:
e23eba97
NC
1906 case R_RISCV_SUB8:
1907 case R_RISCV_SUB16:
1908 case R_RISCV_SUB32:
1909 case R_RISCV_SUB64:
1910 {
1911 bfd_vma old_value = bfd_get (howto->bitsize, input_bfd,
1912 contents + rel->r_offset);
1913 relocation = old_value - relocation;
1914 }
1915 break;
1916
e23eba97 1917 case R_RISCV_CALL:
85f78364 1918 case R_RISCV_CALL_PLT:
cf7a5066
JW
1919 /* Handle a call to an undefined weak function. This won't be
1920 relaxed, so we have to handle it here. */
1921 if (h != NULL && h->root.type == bfd_link_hash_undefweak
85f78364 1922 && (!bfd_link_pic (info) || h->plt.offset == MINUS_ONE))
cf7a5066
JW
1923 {
1924 /* We can use x0 as the base register. */
1925 bfd_vma insn = bfd_get_32 (input_bfd,
1926 contents + rel->r_offset + 4);
1927 insn &= ~(OP_MASK_RS1 << OP_SH_RS1);
1928 bfd_put_32 (input_bfd, insn, contents + rel->r_offset + 4);
1929 /* Set the relocation value so that we get 0 after the pc
1930 relative adjustment. */
1931 relocation = sec_addr (input_section) + rel->r_offset;
1932 }
1933 /* Fall through. */
1934
e23eba97
NC
1935 case R_RISCV_JAL:
1936 case R_RISCV_RVC_JUMP:
85f78364 1937 /* This line has to match the check in _bfd_riscv_relax_section. */
e23eba97
NC
1938 if (bfd_link_pic (info) && h != NULL && h->plt.offset != MINUS_ONE)
1939 {
1940 /* Refer to the PLT entry. */
1941 relocation = sec_addr (htab->elf.splt) + h->plt.offset;
1942 unresolved_reloc = FALSE;
1943 }
1944 break;
1945
1946 case R_RISCV_TPREL_HI20:
1947 relocation = tpoff (info, relocation);
1948 break;
1949
1950 case R_RISCV_TPREL_LO12_I:
1951 case R_RISCV_TPREL_LO12_S:
45f76423
AW
1952 relocation = tpoff (info, relocation);
1953 break;
1954
1955 case R_RISCV_TPREL_I:
1956 case R_RISCV_TPREL_S:
e23eba97
NC
1957 relocation = tpoff (info, relocation);
1958 if (VALID_ITYPE_IMM (relocation + rel->r_addend))
1959 {
1960 /* We can use tp as the base register. */
1961 bfd_vma insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
1962 insn &= ~(OP_MASK_RS1 << OP_SH_RS1);
1963 insn |= X_TP << OP_SH_RS1;
1964 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
1965 }
45f76423
AW
1966 else
1967 r = bfd_reloc_overflow;
e23eba97
NC
1968 break;
1969
1970 case R_RISCV_GPREL_I:
1971 case R_RISCV_GPREL_S:
1972 {
1973 bfd_vma gp = riscv_global_pointer_value (info);
1974 bfd_boolean x0_base = VALID_ITYPE_IMM (relocation + rel->r_addend);
1975 if (x0_base || VALID_ITYPE_IMM (relocation + rel->r_addend - gp))
1976 {
1977 /* We can use x0 or gp as the base register. */
1978 bfd_vma insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
1979 insn &= ~(OP_MASK_RS1 << OP_SH_RS1);
1980 if (!x0_base)
1981 {
1982 rel->r_addend -= gp;
1983 insn |= X_GP << OP_SH_RS1;
1984 }
1985 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
1986 }
1987 else
1988 r = bfd_reloc_overflow;
1989 break;
1990 }
1991
1992 case R_RISCV_PCREL_HI20:
b1308d2c
PD
1993 absolute = riscv_zero_pcrel_hi_reloc (rel,
1994 info,
1995 pc,
1996 relocation,
1997 contents,
1998 howto,
1999 input_bfd);
2000 r_type = ELFNN_R_TYPE (rel->r_info);
0aa13fee 2001 howto = riscv_elf_rtype_to_howto (input_bfd, r_type);
f3185997
NC
2002 if (howto == NULL)
2003 r = bfd_reloc_notsupported;
2004 else if (!riscv_record_pcrel_hi_reloc (&pcrel_relocs, pc,
2005 relocation + rel->r_addend,
2006 absolute))
e23eba97
NC
2007 r = bfd_reloc_overflow;
2008 break;
2009
2010 case R_RISCV_PCREL_LO12_I:
2011 case R_RISCV_PCREL_LO12_S:
551703cf
JW
2012 /* We don't allow section symbols plus addends as the auipc address,
2013 because then riscv_relax_delete_bytes would have to search through
2014 all relocs to update these addends. This is also ambiguous, as
2015 we do allow offsets to be added to the target address, which are
2016 not to be used to find the auipc address. */
a9f5a551
JW
2017 if (((sym != NULL && (ELF_ST_TYPE (sym->st_info) == STT_SECTION))
2018 || (h != NULL && h->type == STT_SECTION))
2019 && rel->r_addend)
2a0d9853 2020 {
330a6637 2021 msg = _("%pcrel_lo section symbol with an addend");
2a0d9853
JW
2022 r = bfd_reloc_dangerous;
2023 break;
2024 }
2025
e23eba97
NC
2026 if (riscv_record_pcrel_lo_reloc (&pcrel_relocs, input_section, info,
2027 howto, rel, relocation, name,
2028 contents))
2029 continue;
2030 r = bfd_reloc_overflow;
2031 break;
2032
2033 case R_RISCV_TLS_DTPREL32:
2034 case R_RISCV_TLS_DTPREL64:
2035 relocation = dtpoff (info, relocation);
2036 break;
2037
2038 case R_RISCV_32:
2039 case R_RISCV_64:
2040 if ((input_section->flags & SEC_ALLOC) == 0)
2041 break;
2042
2043 if ((bfd_link_pic (info)
2044 && (h == NULL
6487709f
JW
2045 || (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2046 && !resolved_to_zero)
e23eba97
NC
2047 || h->root.type != bfd_link_hash_undefweak)
2048 && (! howto->pc_relative
2049 || !SYMBOL_CALLS_LOCAL (info, h)))
2050 || (!bfd_link_pic (info)
2051 && h != NULL
2052 && h->dynindx != -1
2053 && !h->non_got_ref
2054 && ((h->def_dynamic
2055 && !h->def_regular)
2056 || h->root.type == bfd_link_hash_undefweak
2057 || h->root.type == bfd_link_hash_undefined)))
2058 {
2059 Elf_Internal_Rela outrel;
2060 bfd_boolean skip_static_relocation, skip_dynamic_relocation;
2061
2062 /* When generating a shared object, these relocations
2063 are copied into the output file to be resolved at run
2064 time. */
2065
2066 outrel.r_offset =
2067 _bfd_elf_section_offset (output_bfd, info, input_section,
2068 rel->r_offset);
2069 skip_static_relocation = outrel.r_offset != (bfd_vma) -2;
2070 skip_dynamic_relocation = outrel.r_offset >= (bfd_vma) -2;
2071 outrel.r_offset += sec_addr (input_section);
2072
2073 if (skip_dynamic_relocation)
2074 memset (&outrel, 0, sizeof outrel);
2075 else if (h != NULL && h->dynindx != -1
2076 && !(bfd_link_pic (info)
2077 && SYMBOLIC_BIND (info, h)
2078 && h->def_regular))
2079 {
2080 outrel.r_info = ELFNN_R_INFO (h->dynindx, r_type);
2081 outrel.r_addend = rel->r_addend;
2082 }
2083 else
2084 {
2085 outrel.r_info = ELFNN_R_INFO (0, R_RISCV_RELATIVE);
2086 outrel.r_addend = relocation + rel->r_addend;
2087 }
2088
2089 riscv_elf_append_rela (output_bfd, sreloc, &outrel);
2090 if (skip_static_relocation)
2091 continue;
2092 }
2093 break;
2094
2095 case R_RISCV_TLS_GOT_HI20:
2096 is_ie = TRUE;
2097 /* Fall through. */
2098
2099 case R_RISCV_TLS_GD_HI20:
2100 if (h != NULL)
2101 {
2102 off = h->got.offset;
2103 h->got.offset |= 1;
2104 }
2105 else
2106 {
2107 off = local_got_offsets[r_symndx];
2108 local_got_offsets[r_symndx] |= 1;
2109 }
2110
2111 tls_type = _bfd_riscv_elf_tls_type (input_bfd, h, r_symndx);
2112 BFD_ASSERT (tls_type & (GOT_TLS_IE | GOT_TLS_GD));
2113 /* If this symbol is referenced by both GD and IE TLS, the IE
2114 reference's GOT slot follows the GD reference's slots. */
2115 ie_off = 0;
2116 if ((tls_type & GOT_TLS_GD) && (tls_type & GOT_TLS_IE))
2117 ie_off = 2 * GOT_ENTRY_SIZE;
2118
2119 if ((off & 1) != 0)
2120 off &= ~1;
2121 else
2122 {
2123 Elf_Internal_Rela outrel;
2124 int indx = 0;
2125 bfd_boolean need_relocs = FALSE;
2126
2127 if (htab->elf.srelgot == NULL)
2128 abort ();
2129
2130 if (h != NULL)
2131 {
2132 bfd_boolean dyn, pic;
2133 dyn = htab->elf.dynamic_sections_created;
2134 pic = bfd_link_pic (info);
2135
2136 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, pic, h)
2137 && (!pic || !SYMBOL_REFERENCES_LOCAL (info, h)))
2138 indx = h->dynindx;
2139 }
2140
2141 /* The GOT entries have not been initialized yet. Do it
07d6d2b8 2142 now, and emit any relocations. */
e23eba97
NC
2143 if ((bfd_link_pic (info) || indx != 0)
2144 && (h == NULL
2145 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2146 || h->root.type != bfd_link_hash_undefweak))
2147 need_relocs = TRUE;
2148
2149 if (tls_type & GOT_TLS_GD)
2150 {
2151 if (need_relocs)
2152 {
2153 outrel.r_offset = sec_addr (htab->elf.sgot) + off;
2154 outrel.r_addend = 0;
2155 outrel.r_info = ELFNN_R_INFO (indx, R_RISCV_TLS_DTPMODNN);
2156 bfd_put_NN (output_bfd, 0,
2157 htab->elf.sgot->contents + off);
2158 riscv_elf_append_rela (output_bfd, htab->elf.srelgot, &outrel);
2159 if (indx == 0)
2160 {
2161 BFD_ASSERT (! unresolved_reloc);
2162 bfd_put_NN (output_bfd,
2163 dtpoff (info, relocation),
2164 (htab->elf.sgot->contents + off +
2165 RISCV_ELF_WORD_BYTES));
2166 }
2167 else
2168 {
2169 bfd_put_NN (output_bfd, 0,
2170 (htab->elf.sgot->contents + off +
2171 RISCV_ELF_WORD_BYTES));
2172 outrel.r_info = ELFNN_R_INFO (indx, R_RISCV_TLS_DTPRELNN);
2173 outrel.r_offset += RISCV_ELF_WORD_BYTES;
2174 riscv_elf_append_rela (output_bfd, htab->elf.srelgot, &outrel);
2175 }
2176 }
2177 else
2178 {
2179 /* If we are not emitting relocations for a
2180 general dynamic reference, then we must be in a
2181 static link or an executable link with the
2182 symbol binding locally. Mark it as belonging
2183 to module 1, the executable. */
2184 bfd_put_NN (output_bfd, 1,
2185 htab->elf.sgot->contents + off);
2186 bfd_put_NN (output_bfd,
2187 dtpoff (info, relocation),
2188 (htab->elf.sgot->contents + off +
2189 RISCV_ELF_WORD_BYTES));
2190 }
2191 }
2192
2193 if (tls_type & GOT_TLS_IE)
2194 {
2195 if (need_relocs)
2196 {
2197 bfd_put_NN (output_bfd, 0,
2198 htab->elf.sgot->contents + off + ie_off);
2199 outrel.r_offset = sec_addr (htab->elf.sgot)
2200 + off + ie_off;
2201 outrel.r_addend = 0;
2202 if (indx == 0)
2203 outrel.r_addend = tpoff (info, relocation);
2204 outrel.r_info = ELFNN_R_INFO (indx, R_RISCV_TLS_TPRELNN);
2205 riscv_elf_append_rela (output_bfd, htab->elf.srelgot, &outrel);
2206 }
2207 else
2208 {
2209 bfd_put_NN (output_bfd, tpoff (info, relocation),
2210 htab->elf.sgot->contents + off + ie_off);
2211 }
2212 }
2213 }
2214
2215 BFD_ASSERT (off < (bfd_vma) -2);
2216 relocation = sec_addr (htab->elf.sgot) + off + (is_ie ? ie_off : 0);
b1308d2c
PD
2217 if (!riscv_record_pcrel_hi_reloc (&pcrel_relocs, pc,
2218 relocation, FALSE))
e23eba97
NC
2219 r = bfd_reloc_overflow;
2220 unresolved_reloc = FALSE;
2221 break;
2222
2223 default:
2224 r = bfd_reloc_notsupported;
2225 }
2226
2227 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
2228 because such sections are not SEC_ALLOC and thus ld.so will
2229 not process them. */
2230 if (unresolved_reloc
2231 && !((input_section->flags & SEC_DEBUGGING) != 0
2232 && h->def_dynamic)
2233 && _bfd_elf_section_offset (output_bfd, info, input_section,
2234 rel->r_offset) != (bfd_vma) -1)
2235 {
330a6637
JW
2236 switch (r_type)
2237 {
2238 case R_RISCV_CALL:
2239 case R_RISCV_JAL:
2240 case R_RISCV_RVC_JUMP:
2241 if (asprintf (&msg_buf,
2242 _("%%X%%P: relocation %s against `%s' can "
2243 "not be used when making a shared object; "
2244 "recompile with -fPIC\n"),
2245 howto->name,
2246 h->root.root.string) == -1)
2247 msg_buf = NULL;
2248 break;
2249
2250 default:
2251 if (asprintf (&msg_buf,
2252 _("%%X%%P: unresolvable %s relocation against "
2253 "symbol `%s'\n"),
2254 howto->name,
2255 h->root.root.string) == -1)
2256 msg_buf = NULL;
2257 break;
2258 }
2259
2260 msg = msg_buf;
2261 r = bfd_reloc_notsupported;
e23eba97
NC
2262 }
2263
2264 if (r == bfd_reloc_ok)
2265 r = perform_relocation (howto, rel, relocation, input_section,
2266 input_bfd, contents);
2267
330a6637
JW
2268 /* We should have already detected the error and set message before.
2269 If the error message isn't set since the linker runs out of memory
2270 or we don't set it before, then we should set the default message
2271 with the "internal error" string here. */
e23eba97
NC
2272 switch (r)
2273 {
2274 case bfd_reloc_ok:
2275 continue;
2276
2277 case bfd_reloc_overflow:
2278 info->callbacks->reloc_overflow
2279 (info, (h ? &h->root : NULL), name, howto->name,
2280 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
2281 break;
2282
2283 case bfd_reloc_undefined:
2284 info->callbacks->undefined_symbol
2285 (info, name, input_bfd, input_section, rel->r_offset,
2286 TRUE);
2287 break;
2288
2289 case bfd_reloc_outofrange:
330a6637
JW
2290 if (msg == NULL)
2291 msg = _("%X%P: internal error: out of range error\n");
e23eba97
NC
2292 break;
2293
2294 case bfd_reloc_notsupported:
330a6637
JW
2295 if (msg == NULL)
2296 msg = _("%X%P: internal error: unsupported relocation error\n");
e23eba97
NC
2297 break;
2298
2299 case bfd_reloc_dangerous:
330a6637
JW
2300 /* The error message should already be set. */
2301 if (msg == NULL)
2302 msg = _("dangerous relocation error");
2a0d9853 2303 info->callbacks->reloc_dangerous
330a6637 2304 (info, msg, input_bfd, input_section, rel->r_offset);
e23eba97
NC
2305 break;
2306
2307 default:
2a0d9853 2308 msg = _("%X%P: internal error: unknown error\n");
e23eba97
NC
2309 break;
2310 }
2311
330a6637
JW
2312 /* Do not report error message for the dangerous relocation again. */
2313 if (msg && r != bfd_reloc_dangerous)
2a0d9853
JW
2314 info->callbacks->einfo (msg);
2315
c9594989
AM
2316 /* Free the unused `msg_buf`. */
2317 free (msg_buf);
330a6637 2318
3f48fe4a
JW
2319 /* We already reported the error via a callback, so don't try to report
2320 it again by returning false. That leads to spurious errors. */
ed01220c 2321 ret = TRUE;
e23eba97
NC
2322 goto out;
2323 }
2324
2325 ret = riscv_resolve_pcrel_lo_relocs (&pcrel_relocs);
dc1e8a47 2326 out:
e23eba97
NC
2327 riscv_free_pcrel_relocs (&pcrel_relocs);
2328 return ret;
2329}
2330
2331/* Finish up dynamic symbol handling. We set the contents of various
2332 dynamic sections here. */
2333
2334static bfd_boolean
2335riscv_elf_finish_dynamic_symbol (bfd *output_bfd,
2336 struct bfd_link_info *info,
2337 struct elf_link_hash_entry *h,
2338 Elf_Internal_Sym *sym)
2339{
2340 struct riscv_elf_link_hash_table *htab = riscv_elf_hash_table (info);
2341 const struct elf_backend_data *bed = get_elf_backend_data (output_bfd);
2342
2343 if (h->plt.offset != (bfd_vma) -1)
2344 {
2345 /* We've decided to create a PLT entry for this symbol. */
2346 bfd_byte *loc;
2347 bfd_vma i, header_address, plt_idx, got_address;
2348 uint32_t plt_entry[PLT_ENTRY_INSNS];
2349 Elf_Internal_Rela rela;
2350
2351 BFD_ASSERT (h->dynindx != -1);
2352
2353 /* Calculate the address of the PLT header. */
2354 header_address = sec_addr (htab->elf.splt);
2355
2356 /* Calculate the index of the entry. */
2357 plt_idx = (h->plt.offset - PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
2358
2359 /* Calculate the address of the .got.plt entry. */
2360 got_address = riscv_elf_got_plt_val (plt_idx, info);
2361
2362 /* Find out where the .plt entry should go. */
2363 loc = htab->elf.splt->contents + h->plt.offset;
2364
2365 /* Fill in the PLT entry itself. */
5ef23793
JW
2366 if (! riscv_make_plt_entry (output_bfd, got_address,
2367 header_address + h->plt.offset,
2368 plt_entry))
2369 return FALSE;
2370
e23eba97
NC
2371 for (i = 0; i < PLT_ENTRY_INSNS; i++)
2372 bfd_put_32 (output_bfd, plt_entry[i], loc + 4*i);
2373
2374 /* Fill in the initial value of the .got.plt entry. */
2375 loc = htab->elf.sgotplt->contents
2376 + (got_address - sec_addr (htab->elf.sgotplt));
2377 bfd_put_NN (output_bfd, sec_addr (htab->elf.splt), loc);
2378
2379 /* Fill in the entry in the .rela.plt section. */
2380 rela.r_offset = got_address;
2381 rela.r_addend = 0;
2382 rela.r_info = ELFNN_R_INFO (h->dynindx, R_RISCV_JUMP_SLOT);
2383
2384 loc = htab->elf.srelplt->contents + plt_idx * sizeof (ElfNN_External_Rela);
2385 bed->s->swap_reloca_out (output_bfd, &rela, loc);
2386
2387 if (!h->def_regular)
2388 {
2389 /* Mark the symbol as undefined, rather than as defined in
2390 the .plt section. Leave the value alone. */
2391 sym->st_shndx = SHN_UNDEF;
2392 /* If the symbol is weak, we do need to clear the value.
2393 Otherwise, the PLT entry would provide a definition for
2394 the symbol even if the symbol wasn't defined anywhere,
2395 and so the symbol would never be NULL. */
2396 if (!h->ref_regular_nonweak)
2397 sym->st_value = 0;
2398 }
2399 }
2400
2401 if (h->got.offset != (bfd_vma) -1
6487709f
JW
2402 && !(riscv_elf_hash_entry (h)->tls_type & (GOT_TLS_GD | GOT_TLS_IE))
2403 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
e23eba97
NC
2404 {
2405 asection *sgot;
2406 asection *srela;
2407 Elf_Internal_Rela rela;
2408
2409 /* This symbol has an entry in the GOT. Set it up. */
2410
2411 sgot = htab->elf.sgot;
2412 srela = htab->elf.srelgot;
2413 BFD_ASSERT (sgot != NULL && srela != NULL);
2414
2415 rela.r_offset = sec_addr (sgot) + (h->got.offset &~ (bfd_vma) 1);
2416
25eb8346
JW
2417 /* If this is a local symbol reference, we just want to emit a RELATIVE
2418 reloc. This can happen if it is a -Bsymbolic link, or a pie link, or
e23eba97
NC
2419 the symbol was forced to be local because of a version file.
2420 The entry in the global offset table will already have been
2421 initialized in the relocate_section function. */
2422 if (bfd_link_pic (info)
25eb8346 2423 && SYMBOL_REFERENCES_LOCAL (info, h))
e23eba97 2424 {
25eb8346 2425 BFD_ASSERT((h->got.offset & 1) != 0);
e23eba97
NC
2426 asection *sec = h->root.u.def.section;
2427 rela.r_info = ELFNN_R_INFO (0, R_RISCV_RELATIVE);
2428 rela.r_addend = (h->root.u.def.value
2429 + sec->output_section->vma
2430 + sec->output_offset);
2431 }
2432 else
2433 {
25eb8346 2434 BFD_ASSERT((h->got.offset & 1) == 0);
e23eba97
NC
2435 BFD_ASSERT (h->dynindx != -1);
2436 rela.r_info = ELFNN_R_INFO (h->dynindx, R_RISCV_NN);
2437 rela.r_addend = 0;
2438 }
2439
2440 bfd_put_NN (output_bfd, 0,
2441 sgot->contents + (h->got.offset & ~(bfd_vma) 1));
2442 riscv_elf_append_rela (output_bfd, srela, &rela);
2443 }
2444
2445 if (h->needs_copy)
2446 {
2447 Elf_Internal_Rela rela;
5474d94f 2448 asection *s;
e23eba97
NC
2449
2450 /* This symbols needs a copy reloc. Set it up. */
2451 BFD_ASSERT (h->dynindx != -1);
2452
2453 rela.r_offset = sec_addr (h->root.u.def.section) + h->root.u.def.value;
2454 rela.r_info = ELFNN_R_INFO (h->dynindx, R_RISCV_COPY);
2455 rela.r_addend = 0;
afbf7e8e 2456 if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f
AM
2457 s = htab->elf.sreldynrelro;
2458 else
2459 s = htab->elf.srelbss;
2460 riscv_elf_append_rela (output_bfd, s, &rela);
e23eba97
NC
2461 }
2462
2463 /* Mark some specially defined symbols as absolute. */
2464 if (h == htab->elf.hdynamic
2465 || (h == htab->elf.hgot || h == htab->elf.hplt))
2466 sym->st_shndx = SHN_ABS;
2467
2468 return TRUE;
2469}
2470
2471/* Finish up the dynamic sections. */
2472
2473static bfd_boolean
2474riscv_finish_dyn (bfd *output_bfd, struct bfd_link_info *info,
2475 bfd *dynobj, asection *sdyn)
2476{
2477 struct riscv_elf_link_hash_table *htab = riscv_elf_hash_table (info);
2478 const struct elf_backend_data *bed = get_elf_backend_data (output_bfd);
2479 size_t dynsize = bed->s->sizeof_dyn;
2480 bfd_byte *dyncon, *dynconend;
2481
2482 dynconend = sdyn->contents + sdyn->size;
2483 for (dyncon = sdyn->contents; dyncon < dynconend; dyncon += dynsize)
2484 {
2485 Elf_Internal_Dyn dyn;
2486 asection *s;
2487
2488 bed->s->swap_dyn_in (dynobj, dyncon, &dyn);
2489
2490 switch (dyn.d_tag)
2491 {
2492 case DT_PLTGOT:
2493 s = htab->elf.sgotplt;
2494 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
2495 break;
2496 case DT_JMPREL:
2497 s = htab->elf.srelplt;
2498 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
2499 break;
2500 case DT_PLTRELSZ:
2501 s = htab->elf.srelplt;
2502 dyn.d_un.d_val = s->size;
2503 break;
2504 default:
2505 continue;
2506 }
2507
2508 bed->s->swap_dyn_out (output_bfd, &dyn, dyncon);
2509 }
2510 return TRUE;
2511}
2512
2513static bfd_boolean
2514riscv_elf_finish_dynamic_sections (bfd *output_bfd,
2515 struct bfd_link_info *info)
2516{
2517 bfd *dynobj;
2518 asection *sdyn;
2519 struct riscv_elf_link_hash_table *htab;
2520
2521 htab = riscv_elf_hash_table (info);
2522 BFD_ASSERT (htab != NULL);
2523 dynobj = htab->elf.dynobj;
2524
2525 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
2526
2527 if (elf_hash_table (info)->dynamic_sections_created)
2528 {
2529 asection *splt;
2530 bfd_boolean ret;
2531
2532 splt = htab->elf.splt;
2533 BFD_ASSERT (splt != NULL && sdyn != NULL);
2534
2535 ret = riscv_finish_dyn (output_bfd, info, dynobj, sdyn);
2536
535b785f 2537 if (!ret)
e23eba97
NC
2538 return ret;
2539
2540 /* Fill in the head and tail entries in the procedure linkage table. */
2541 if (splt->size > 0)
2542 {
2543 int i;
2544 uint32_t plt_header[PLT_HEADER_INSNS];
5ef23793
JW
2545 ret = riscv_make_plt_header (output_bfd,
2546 sec_addr (htab->elf.sgotplt),
2547 sec_addr (splt), plt_header);
2548 if (!ret)
2549 return ret;
e23eba97
NC
2550
2551 for (i = 0; i < PLT_HEADER_INSNS; i++)
2552 bfd_put_32 (output_bfd, plt_header[i], splt->contents + 4*i);
e23eba97 2553
cc162427
AW
2554 elf_section_data (splt->output_section)->this_hdr.sh_entsize
2555 = PLT_ENTRY_SIZE;
2556 }
e23eba97
NC
2557 }
2558
2559 if (htab->elf.sgotplt)
2560 {
2561 asection *output_section = htab->elf.sgotplt->output_section;
2562
2563 if (bfd_is_abs_section (output_section))
2564 {
2565 (*_bfd_error_handler)
871b3ab2 2566 (_("discarded output section: `%pA'"), htab->elf.sgotplt);
e23eba97
NC
2567 return FALSE;
2568 }
2569
2570 if (htab->elf.sgotplt->size > 0)
2571 {
2572 /* Write the first two entries in .got.plt, needed for the dynamic
2573 linker. */
2574 bfd_put_NN (output_bfd, (bfd_vma) -1, htab->elf.sgotplt->contents);
2575 bfd_put_NN (output_bfd, (bfd_vma) 0,
2576 htab->elf.sgotplt->contents + GOT_ENTRY_SIZE);
2577 }
2578
2579 elf_section_data (output_section)->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
2580 }
2581
2582 if (htab->elf.sgot)
2583 {
2584 asection *output_section = htab->elf.sgot->output_section;
2585
2586 if (htab->elf.sgot->size > 0)
2587 {
2588 /* Set the first entry in the global offset table to the address of
2589 the dynamic section. */
2590 bfd_vma val = sdyn ? sec_addr (sdyn) : 0;
2591 bfd_put_NN (output_bfd, val, htab->elf.sgot->contents);
2592 }
2593
2594 elf_section_data (output_section)->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
2595 }
2596
2597 return TRUE;
2598}
2599
2600/* Return address for Ith PLT stub in section PLT, for relocation REL
2601 or (bfd_vma) -1 if it should not be included. */
2602
2603static bfd_vma
2604riscv_elf_plt_sym_val (bfd_vma i, const asection *plt,
2605 const arelent *rel ATTRIBUTE_UNUSED)
2606{
2607 return plt->vma + PLT_HEADER_SIZE + i * PLT_ENTRY_SIZE;
2608}
2609
2610static enum elf_reloc_type_class
2611riscv_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
2612 const asection *rel_sec ATTRIBUTE_UNUSED,
2613 const Elf_Internal_Rela *rela)
2614{
2615 switch (ELFNN_R_TYPE (rela->r_info))
2616 {
2617 case R_RISCV_RELATIVE:
2618 return reloc_class_relative;
2619 case R_RISCV_JUMP_SLOT:
2620 return reloc_class_plt;
2621 case R_RISCV_COPY:
2622 return reloc_class_copy;
2623 default:
2624 return reloc_class_normal;
2625 }
2626}
2627
0242af40
JW
2628/* Given the ELF header flags in FLAGS, it returns a string that describes the
2629 float ABI. */
2630
2631static const char *
2632riscv_float_abi_string (flagword flags)
2633{
2634 switch (flags & EF_RISCV_FLOAT_ABI)
2635 {
2636 case EF_RISCV_FLOAT_ABI_SOFT:
2637 return "soft-float";
2638 break;
2639 case EF_RISCV_FLOAT_ABI_SINGLE:
2640 return "single-float";
2641 break;
2642 case EF_RISCV_FLOAT_ABI_DOUBLE:
2643 return "double-float";
2644 break;
2645 case EF_RISCV_FLOAT_ABI_QUAD:
2646 return "quad-float";
2647 break;
2648 default:
2649 abort ();
2650 }
2651}
2652
7d7a7d7c
JW
2653/* The information of architecture attribute. */
2654static riscv_subset_list_t in_subsets;
2655static riscv_subset_list_t out_subsets;
2656static riscv_subset_list_t merged_subsets;
2657
2658/* Predicator for standard extension. */
2659
2660static bfd_boolean
2661riscv_std_ext_p (const char *name)
2662{
2663 return (strlen (name) == 1) && (name[0] != 'x') && (name[0] != 's');
2664}
2665
7d7a7d7c
JW
2666/* Error handler when version mis-match. */
2667
2668static void
2669riscv_version_mismatch (bfd *ibfd,
2670 struct riscv_subset_t *in,
2671 struct riscv_subset_t *out)
2672{
2673 _bfd_error_handler
acef8081 2674 (_("error: %pB: Mis-matched ISA version for '%s' extension. "
7d7a7d7c
JW
2675 "%d.%d vs %d.%d"),
2676 ibfd, in->name,
2677 in->major_version, in->minor_version,
2678 out->major_version, out->minor_version);
2679}
2680
2681/* Return true if subset is 'i' or 'e'. */
2682
2683static bfd_boolean
2684riscv_i_or_e_p (bfd *ibfd,
2685 const char *arch,
2686 struct riscv_subset_t *subset)
2687{
2688 if ((strcasecmp (subset->name, "e") != 0)
2689 && (strcasecmp (subset->name, "i") != 0))
2690 {
2691 _bfd_error_handler
acef8081
YC
2692 (_("error: %pB: corrupted ISA string '%s'. "
2693 "First letter should be 'i' or 'e' but got '%s'."),
7d7a7d7c
JW
2694 ibfd, arch, subset->name);
2695 return FALSE;
2696 }
2697 return TRUE;
2698}
2699
2700/* Merge standard extensions.
2701
2702 Return Value:
2703 Return FALSE if failed to merge.
2704
2705 Arguments:
2706 `bfd`: bfd handler.
2707 `in_arch`: Raw arch string for input object.
2708 `out_arch`: Raw arch string for output object.
2709 `pin`: subset list for input object, and it'll skip all merged subset after
2710 merge.
2711 `pout`: Like `pin`, but for output object. */
2712
2713static bfd_boolean
2714riscv_merge_std_ext (bfd *ibfd,
2715 const char *in_arch,
2716 const char *out_arch,
2717 struct riscv_subset_t **pin,
2718 struct riscv_subset_t **pout)
2719{
2720 const char *standard_exts = riscv_supported_std_ext ();
2721 const char *p;
2722 struct riscv_subset_t *in = *pin;
2723 struct riscv_subset_t *out = *pout;
2724
2725 /* First letter should be 'i' or 'e'. */
2726 if (!riscv_i_or_e_p (ibfd, in_arch, in))
2727 return FALSE;
2728
2729 if (!riscv_i_or_e_p (ibfd, out_arch, out))
2730 return FALSE;
2731
8f595e9b 2732 if (strcasecmp (in->name, out->name) != 0)
7d7a7d7c
JW
2733 {
2734 /* TODO: We might allow merge 'i' with 'e'. */
2735 _bfd_error_handler
2736 (_("error: %pB: Mis-matched ISA string to merge '%s' and '%s'."),
2737 ibfd, in->name, out->name);
2738 return FALSE;
2739 }
2740 else if ((in->major_version != out->major_version) ||
2741 (in->minor_version != out->minor_version))
2742 {
2743 /* TODO: Allow different merge policy. */
2744 riscv_version_mismatch (ibfd, in, out);
2745 return FALSE;
2746 }
2747 else
2748 riscv_add_subset (&merged_subsets,
2749 in->name, in->major_version, in->minor_version);
2750
2751 in = in->next;
2752 out = out->next;
2753
2754 /* Handle standard extension first. */
2755 for (p = standard_exts; *p; ++p)
2756 {
2757 char find_ext[2] = {*p, '\0'};
2758 struct riscv_subset_t *find_in =
2759 riscv_lookup_subset (&in_subsets, find_ext);
2760 struct riscv_subset_t *find_out =
2761 riscv_lookup_subset (&out_subsets, find_ext);
2762
2763 if (find_in == NULL && find_out == NULL)
2764 continue;
2765
2766 /* Check version is same or not. */
2767 /* TODO: Allow different merge policy. */
2768 if ((find_in != NULL && find_out != NULL)
2769 && ((find_in->major_version != find_out->major_version)
2770 || (find_in->minor_version != find_out->minor_version)))
2771 {
2772 riscv_version_mismatch (ibfd, in, out);
2773 return FALSE;
2774 }
2775
2776 struct riscv_subset_t *merged = find_in ? find_in : find_out;
2777 riscv_add_subset (&merged_subsets, merged->name,
2778 merged->major_version, merged->minor_version);
2779 }
2780
2781 /* Skip all standard extensions. */
2782 while ((in != NULL) && riscv_std_ext_p (in->name)) in = in->next;
2783 while ((out != NULL) && riscv_std_ext_p (out->name)) out = out->next;
2784
2785 *pin = in;
2786 *pout = out;
2787
2788 return TRUE;
2789}
2790
403d1bd9
JW
2791/* If C is a prefix class, then return the EXT string without the prefix.
2792 Otherwise return the entire EXT string. */
7d7a7d7c 2793
403d1bd9
JW
2794static const char *
2795riscv_skip_prefix (const char *ext, riscv_isa_ext_class_t c)
2796{
2797 switch (c)
2798 {
2799 case RV_ISA_CLASS_X: return &ext[1];
2800 case RV_ISA_CLASS_S: return &ext[1];
2801 case RV_ISA_CLASS_Z: return &ext[1];
2802 default: return ext;
2803 }
2804}
2805
2806/* Compare prefixed extension names canonically. */
2807
2808static int
2809riscv_prefix_cmp (const char *a, const char *b)
2810{
2811 riscv_isa_ext_class_t ca = riscv_get_prefix_class (a);
2812 riscv_isa_ext_class_t cb = riscv_get_prefix_class (b);
2813
2814 /* Extension name without prefix */
2815 const char *anp = riscv_skip_prefix (a, ca);
2816 const char *bnp = riscv_skip_prefix (b, cb);
2817
2818 if (ca == cb)
2819 return strcasecmp (anp, bnp);
2820
2821 return (int)ca - (int)cb;
2822}
2823
2824/* Merge multi letter extensions. PIN is a pointer to the head of the input
2825 object subset list. Likewise for POUT and the output object. Return TRUE
2826 on success and FALSE when a conflict is found. */
7d7a7d7c
JW
2827
2828static bfd_boolean
403d1bd9
JW
2829riscv_merge_multi_letter_ext (bfd *ibfd,
2830 riscv_subset_t **pin,
2831 riscv_subset_t **pout)
7d7a7d7c
JW
2832{
2833 riscv_subset_t *in = *pin;
2834 riscv_subset_t *out = *pout;
403d1bd9 2835 riscv_subset_t *tail;
7d7a7d7c 2836
403d1bd9 2837 int cmp;
7d7a7d7c 2838
403d1bd9 2839 while (in && out)
7d7a7d7c 2840 {
403d1bd9
JW
2841 cmp = riscv_prefix_cmp (in->name, out->name);
2842
2843 if (cmp < 0)
2844 {
2845 /* `in' comes before `out', append `in' and increment. */
2846 riscv_add_subset (&merged_subsets, in->name, in->major_version,
2847 in->minor_version);
2848 in = in->next;
2849 }
2850 else if (cmp > 0)
2851 {
2852 /* `out' comes before `in', append `out' and increment. */
2853 riscv_add_subset (&merged_subsets, out->name, out->major_version,
2854 out->minor_version);
2855 out = out->next;
2856 }
2857 else
7d7a7d7c 2858 {
403d1bd9
JW
2859 /* Both present, check version and increment both. */
2860 if ((in->major_version != out->major_version)
2861 || (in->minor_version != out->minor_version))
7d7a7d7c 2862 {
403d1bd9 2863 riscv_version_mismatch (ibfd, in, out);
7d7a7d7c
JW
2864 return FALSE;
2865 }
403d1bd9
JW
2866
2867 riscv_add_subset (&merged_subsets, out->name, out->major_version,
2868 out->minor_version);
2869 out = out->next;
2870 in = in->next;
7d7a7d7c 2871 }
7d7a7d7c
JW
2872 }
2873
403d1bd9
JW
2874 if (in || out) {
2875 /* If we're here, either `in' or `out' is running longer than
2876 the other. So, we need to append the corresponding tail. */
2877 tail = in ? in : out;
2878
2879 while (tail)
2880 {
2881 riscv_add_subset (&merged_subsets, tail->name, tail->major_version,
2882 tail->minor_version);
2883 tail = tail->next;
2884 }
2885 }
2886
7d7a7d7c
JW
2887 return TRUE;
2888}
2889
2890/* Merge Tag_RISCV_arch attribute. */
2891
2892static char *
2893riscv_merge_arch_attr_info (bfd *ibfd, char *in_arch, char *out_arch)
2894{
2895 riscv_subset_t *in, *out;
2896 char *merged_arch_str;
2897
2898 unsigned xlen_in, xlen_out;
2899 merged_subsets.head = NULL;
2900 merged_subsets.tail = NULL;
2901
2902 riscv_parse_subset_t rpe_in;
2903 riscv_parse_subset_t rpe_out;
2904
8f595e9b
NC
2905 /* Only assembler needs to check the default version of ISA, so just set
2906 the rpe_in.get_default_version and rpe_out.get_default_version to NULL. */
7d7a7d7c
JW
2907 rpe_in.subset_list = &in_subsets;
2908 rpe_in.error_handler = _bfd_error_handler;
2909 rpe_in.xlen = &xlen_in;
8f595e9b 2910 rpe_in.get_default_version = NULL;
7d7a7d7c
JW
2911
2912 rpe_out.subset_list = &out_subsets;
2913 rpe_out.error_handler = _bfd_error_handler;
2914 rpe_out.xlen = &xlen_out;
8f595e9b 2915 rpe_out.get_default_version = NULL;
7d7a7d7c
JW
2916
2917 if (in_arch == NULL && out_arch == NULL)
2918 return NULL;
2919
2920 if (in_arch == NULL && out_arch != NULL)
2921 return out_arch;
2922
2923 if (in_arch != NULL && out_arch == NULL)
2924 return in_arch;
2925
2926 /* Parse subset from arch string. */
2927 if (!riscv_parse_subset (&rpe_in, in_arch))
2928 return NULL;
2929
2930 if (!riscv_parse_subset (&rpe_out, out_arch))
2931 return NULL;
2932
2933 /* Checking XLEN. */
2934 if (xlen_out != xlen_in)
2935 {
2936 _bfd_error_handler
2937 (_("error: %pB: ISA string of input (%s) doesn't match "
2938 "output (%s)."), ibfd, in_arch, out_arch);
2939 return NULL;
2940 }
2941
2942 /* Merge subset list. */
2943 in = in_subsets.head;
2944 out = out_subsets.head;
2945
2946 /* Merge standard extension. */
2947 if (!riscv_merge_std_ext (ibfd, in_arch, out_arch, &in, &out))
2948 return NULL;
403d1bd9
JW
2949
2950 /* Merge all non-single letter extensions with single call. */
2951 if (!riscv_merge_multi_letter_ext (ibfd, &in, &out))
7d7a7d7c
JW
2952 return NULL;
2953
2954 if (xlen_in != xlen_out)
2955 {
2956 _bfd_error_handler
2957 (_("error: %pB: XLEN of input (%u) doesn't match "
2958 "output (%u)."), ibfd, xlen_in, xlen_out);
2959 return NULL;
2960 }
2961
2962 if (xlen_in != ARCH_SIZE)
2963 {
2964 _bfd_error_handler
acef8081 2965 (_("error: %pB: Unsupported XLEN (%u), you might be "
7d7a7d7c
JW
2966 "using wrong emulation."), ibfd, xlen_in);
2967 return NULL;
2968 }
2969
2970 merged_arch_str = riscv_arch_str (ARCH_SIZE, &merged_subsets);
2971
2972 /* Release the subset lists. */
2973 riscv_release_subset_list (&in_subsets);
2974 riscv_release_subset_list (&out_subsets);
2975 riscv_release_subset_list (&merged_subsets);
2976
2977 return merged_arch_str;
2978}
2979
2980/* Merge object attributes from IBFD into output_bfd of INFO.
2981 Raise an error if there are conflicting attributes. */
2982
2983static bfd_boolean
2984riscv_merge_attributes (bfd *ibfd, struct bfd_link_info *info)
2985{
2986 bfd *obfd = info->output_bfd;
2987 obj_attribute *in_attr;
2988 obj_attribute *out_attr;
2989 bfd_boolean result = TRUE;
41285764
NC
2990 bfd_boolean priv_may_conflict = FALSE;
2991 bfd_boolean in_priv_zero = TRUE;
2992 bfd_boolean out_priv_zero = TRUE;
7d7a7d7c
JW
2993 const char *sec_name = get_elf_backend_data (ibfd)->obj_attrs_section;
2994 unsigned int i;
2995
2996 /* Skip linker created files. */
2997 if (ibfd->flags & BFD_LINKER_CREATED)
2998 return TRUE;
2999
3000 /* Skip any input that doesn't have an attribute section.
3001 This enables to link object files without attribute section with
3002 any others. */
3003 if (bfd_get_section_by_name (ibfd, sec_name) == NULL)
3004 return TRUE;
3005
3006 if (!elf_known_obj_attributes_proc (obfd)[0].i)
3007 {
3008 /* This is the first object. Copy the attributes. */
3009 _bfd_elf_copy_obj_attributes (ibfd, obfd);
3010
3011 out_attr = elf_known_obj_attributes_proc (obfd);
3012
3013 /* Use the Tag_null value to indicate the attributes have been
3014 initialized. */
3015 out_attr[0].i = 1;
3016
3017 return TRUE;
3018 }
3019
3020 in_attr = elf_known_obj_attributes_proc (ibfd);
3021 out_attr = elf_known_obj_attributes_proc (obfd);
3022
3023 for (i = LEAST_KNOWN_OBJ_ATTRIBUTE; i < NUM_KNOWN_OBJ_ATTRIBUTES; i++)
3024 {
3025 switch (i)
3026 {
3027 case Tag_RISCV_arch:
3028 if (!out_attr[Tag_RISCV_arch].s)
3029 out_attr[Tag_RISCV_arch].s = in_attr[Tag_RISCV_arch].s;
3030 else if (in_attr[Tag_RISCV_arch].s
3031 && out_attr[Tag_RISCV_arch].s)
3032 {
3033 /* Check arch compatible. */
3034 char *merged_arch =
3035 riscv_merge_arch_attr_info (ibfd,
3036 in_attr[Tag_RISCV_arch].s,
3037 out_attr[Tag_RISCV_arch].s);
3038 if (merged_arch == NULL)
3039 {
3040 result = FALSE;
3041 out_attr[Tag_RISCV_arch].s = "";
3042 }
3043 else
3044 out_attr[Tag_RISCV_arch].s = merged_arch;
3045 }
3046 break;
41285764 3047
7d7a7d7c
JW
3048 case Tag_RISCV_priv_spec:
3049 case Tag_RISCV_priv_spec_minor:
3050 case Tag_RISCV_priv_spec_revision:
41285764
NC
3051 if (in_attr[i].i != 0)
3052 in_priv_zero = FALSE;
3053 if (out_attr[i].i != 0)
3054 out_priv_zero = FALSE;
7d7a7d7c 3055 if (out_attr[i].i != in_attr[i].i)
41285764
NC
3056 priv_may_conflict = TRUE;
3057
3058 /* We check the priv version conflict when parsing the
3059 revision version. */
3060 if (i != Tag_RISCV_priv_spec_revision)
3061 break;
3062
3063 /* Allow to link the object without the priv setting. */
3064 if (out_priv_zero)
3065 {
3066 out_attr[i].i = in_attr[i].i;
3067 out_attr[Tag_RISCV_priv_spec].i =
3068 in_attr[Tag_RISCV_priv_spec].i;
3069 out_attr[Tag_RISCV_priv_spec_minor].i =
3070 in_attr[Tag_RISCV_priv_spec_minor].i;
3071 }
3072 else if (!in_priv_zero
3073 && priv_may_conflict)
7d7a7d7c
JW
3074 {
3075 _bfd_error_handler
41285764
NC
3076 (_("error: %pB use privilege spec version %u.%u.%u but "
3077 "the output use version %u.%u.%u."),
3078 ibfd,
3079 in_attr[Tag_RISCV_priv_spec].i,
3080 in_attr[Tag_RISCV_priv_spec_minor].i,
3081 in_attr[i].i,
3082 out_attr[Tag_RISCV_priv_spec].i,
3083 out_attr[Tag_RISCV_priv_spec_minor].i,
3084 out_attr[i].i);
7d7a7d7c
JW
3085 result = FALSE;
3086 }
3087 break;
41285764 3088
7d7a7d7c
JW
3089 case Tag_RISCV_unaligned_access:
3090 out_attr[i].i |= in_attr[i].i;
3091 break;
41285764 3092
7d7a7d7c
JW
3093 case Tag_RISCV_stack_align:
3094 if (out_attr[i].i == 0)
3095 out_attr[i].i = in_attr[i].i;
3096 else if (in_attr[i].i != 0
3097 && out_attr[i].i != 0
3098 && out_attr[i].i != in_attr[i].i)
3099 {
3100 _bfd_error_handler
3101 (_("error: %pB use %u-byte stack aligned but the output "
3102 "use %u-byte stack aligned."),
3103 ibfd, in_attr[i].i, out_attr[i].i);
3104 result = FALSE;
3105 }
3106 break;
41285764 3107
7d7a7d7c
JW
3108 default:
3109 result &= _bfd_elf_merge_unknown_attribute_low (ibfd, obfd, i);
3110 }
3111
3112 /* If out_attr was copied from in_attr then it won't have a type yet. */
3113 if (in_attr[i].type && !out_attr[i].type)
3114 out_attr[i].type = in_attr[i].type;
3115 }
3116
3117 /* Merge Tag_compatibility attributes and any common GNU ones. */
3118 if (!_bfd_elf_merge_object_attributes (ibfd, info))
3119 return FALSE;
3120
3121 /* Check for any attributes not known on RISC-V. */
3122 result &= _bfd_elf_merge_unknown_attribute_list (ibfd, obfd);
3123
3124 return result;
3125}
3126
e23eba97
NC
3127/* Merge backend specific data from an object file to the output
3128 object file when linking. */
3129
3130static bfd_boolean
3131_bfd_riscv_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
3132{
3133 bfd *obfd = info->output_bfd;
87f98bac 3134 flagword new_flags, old_flags;
e23eba97
NC
3135
3136 if (!is_riscv_elf (ibfd) || !is_riscv_elf (obfd))
3137 return TRUE;
3138
3139 if (strcmp (bfd_get_target (ibfd), bfd_get_target (obfd)) != 0)
3140 {
3141 (*_bfd_error_handler)
871b3ab2 3142 (_("%pB: ABI is incompatible with that of the selected emulation:\n"
96b0927d
PD
3143 " target emulation `%s' does not match `%s'"),
3144 ibfd, bfd_get_target (ibfd), bfd_get_target (obfd));
e23eba97
NC
3145 return FALSE;
3146 }
3147
3148 if (!_bfd_elf_merge_object_attributes (ibfd, info))
3149 return FALSE;
3150
7d7a7d7c
JW
3151 if (!riscv_merge_attributes (ibfd, info))
3152 return FALSE;
3153
87f98bac
JW
3154 new_flags = elf_elfheader (ibfd)->e_flags;
3155 old_flags = elf_elfheader (obfd)->e_flags;
3156
e23eba97
NC
3157 if (! elf_flags_init (obfd))
3158 {
3159 elf_flags_init (obfd) = TRUE;
3160 elf_elfheader (obfd)->e_flags = new_flags;
3161 return TRUE;
3162 }
3163
87f98bac
JW
3164 /* Check to see if the input BFD actually contains any sections. If not,
3165 its flags may not have been initialized either, but it cannot actually
3166 cause any incompatibility. Do not short-circuit dynamic objects; their
3167 section list may be emptied by elf_link_add_object_symbols.
3168
3169 Also check to see if there are no code sections in the input. In this
3170 case, there is no need to check for code specific flags. */
3171 if (!(ibfd->flags & DYNAMIC))
3172 {
3173 bfd_boolean null_input_bfd = TRUE;
3174 bfd_boolean only_data_sections = TRUE;
3175 asection *sec;
3176
3177 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
3178 {
fd361982 3179 if ((bfd_section_flags (sec)
87f98bac
JW
3180 & (SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS))
3181 == (SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS))
3182 only_data_sections = FALSE;
3183
3184 null_input_bfd = FALSE;
3185 break;
3186 }
3187
3188 if (null_input_bfd || only_data_sections)
3189 return TRUE;
3190 }
3191
2922d21d
AW
3192 /* Disallow linking different float ABIs. */
3193 if ((old_flags ^ new_flags) & EF_RISCV_FLOAT_ABI)
e23eba97
NC
3194 {
3195 (*_bfd_error_handler)
0242af40
JW
3196 (_("%pB: can't link %s modules with %s modules"), ibfd,
3197 riscv_float_abi_string (new_flags),
3198 riscv_float_abi_string (old_flags));
e23eba97
NC
3199 goto fail;
3200 }
3201
7f999549
JW
3202 /* Disallow linking RVE and non-RVE. */
3203 if ((old_flags ^ new_flags) & EF_RISCV_RVE)
3204 {
3205 (*_bfd_error_handler)
3206 (_("%pB: can't link RVE with other target"), ibfd);
3207 goto fail;
3208 }
3209
e23eba97
NC
3210 /* Allow linking RVC and non-RVC, and keep the RVC flag. */
3211 elf_elfheader (obfd)->e_flags |= new_flags & EF_RISCV_RVC;
3212
3213 return TRUE;
3214
dc1e8a47 3215 fail:
e23eba97
NC
3216 bfd_set_error (bfd_error_bad_value);
3217 return FALSE;
3218}
3219
3220/* Delete some bytes from a section while relaxing. */
3221
3222static bfd_boolean
7f02625e
JW
3223riscv_relax_delete_bytes (bfd *abfd, asection *sec, bfd_vma addr, size_t count,
3224 struct bfd_link_info *link_info)
e23eba97
NC
3225{
3226 unsigned int i, symcount;
3227 bfd_vma toaddr = sec->size;
3228 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (abfd);
3229 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3230 unsigned int sec_shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
3231 struct bfd_elf_section_data *data = elf_section_data (sec);
3232 bfd_byte *contents = data->this_hdr.contents;
3233
3234 /* Actually delete the bytes. */
3235 sec->size -= count;
3236 memmove (contents + addr, contents + addr + count, toaddr - addr - count);
3237
3238 /* Adjust the location of all of the relocs. Note that we need not
3239 adjust the addends, since all PC-relative references must be against
3240 symbols, which we will adjust below. */
3241 for (i = 0; i < sec->reloc_count; i++)
3242 if (data->relocs[i].r_offset > addr && data->relocs[i].r_offset < toaddr)
3243 data->relocs[i].r_offset -= count;
3244
3245 /* Adjust the local symbols defined in this section. */
3246 for (i = 0; i < symtab_hdr->sh_info; i++)
3247 {
3248 Elf_Internal_Sym *sym = (Elf_Internal_Sym *) symtab_hdr->contents + i;
3249 if (sym->st_shndx == sec_shndx)
3250 {
3251 /* If the symbol is in the range of memory we just moved, we
3252 have to adjust its value. */
3253 if (sym->st_value > addr && sym->st_value <= toaddr)
3254 sym->st_value -= count;
3255
3256 /* If the symbol *spans* the bytes we just deleted (i.e. its
3257 *end* is in the moved bytes but its *start* isn't), then we
788af978
JW
3258 must adjust its size.
3259
3260 This test needs to use the original value of st_value, otherwise
3261 we might accidentally decrease size when deleting bytes right
3262 before the symbol. But since deleted relocs can't span across
3263 symbols, we can't have both a st_value and a st_size decrease,
3264 so it is simpler to just use an else. */
3265 else if (sym->st_value <= addr
3266 && sym->st_value + sym->st_size > addr
3267 && sym->st_value + sym->st_size <= toaddr)
e23eba97
NC
3268 sym->st_size -= count;
3269 }
3270 }
3271
3272 /* Now adjust the global symbols defined in this section. */
3273 symcount = ((symtab_hdr->sh_size / sizeof (ElfNN_External_Sym))
3274 - symtab_hdr->sh_info);
3275
3276 for (i = 0; i < symcount; i++)
3277 {
3278 struct elf_link_hash_entry *sym_hash = sym_hashes[i];
3279
7f02625e
JW
3280 /* The '--wrap SYMBOL' option is causing a pain when the object file,
3281 containing the definition of __wrap_SYMBOL, includes a direct
3282 call to SYMBOL as well. Since both __wrap_SYMBOL and SYMBOL reference
3283 the same symbol (which is __wrap_SYMBOL), but still exist as two
3284 different symbols in 'sym_hashes', we don't want to adjust
137b5cbd
JW
3285 the global symbol __wrap_SYMBOL twice. */
3286 /* The same problem occurs with symbols that are versioned_hidden, as
3287 foo becomes an alias for foo@BAR, and hence they need the same
3288 treatment. */
3289 if (link_info->wrap_hash != NULL
3290 || sym_hash->versioned == versioned_hidden)
7f02625e
JW
3291 {
3292 struct elf_link_hash_entry **cur_sym_hashes;
3293
3294 /* Loop only over the symbols which have already been checked. */
3295 for (cur_sym_hashes = sym_hashes; cur_sym_hashes < &sym_hashes[i];
3296 cur_sym_hashes++)
3297 {
3298 /* If the current symbol is identical to 'sym_hash', that means
3299 the symbol was already adjusted (or at least checked). */
3300 if (*cur_sym_hashes == sym_hash)
3301 break;
3302 }
3303 /* Don't adjust the symbol again. */
3304 if (cur_sym_hashes < &sym_hashes[i])
3305 continue;
3306 }
3307
e23eba97
NC
3308 if ((sym_hash->root.type == bfd_link_hash_defined
3309 || sym_hash->root.type == bfd_link_hash_defweak)
3310 && sym_hash->root.u.def.section == sec)
3311 {
3312 /* As above, adjust the value if needed. */
3313 if (sym_hash->root.u.def.value > addr
3314 && sym_hash->root.u.def.value <= toaddr)
3315 sym_hash->root.u.def.value -= count;
3316
3317 /* As above, adjust the size if needed. */
788af978
JW
3318 else if (sym_hash->root.u.def.value <= addr
3319 && sym_hash->root.u.def.value + sym_hash->size > addr
3320 && sym_hash->root.u.def.value + sym_hash->size <= toaddr)
e23eba97
NC
3321 sym_hash->size -= count;
3322 }
3323 }
3324
3325 return TRUE;
3326}
3327
9d06997a
PD
3328/* A second format for recording PC-relative hi relocations. This stores the
3329 information required to relax them to GP-relative addresses. */
3330
3331typedef struct riscv_pcgp_hi_reloc riscv_pcgp_hi_reloc;
3332struct riscv_pcgp_hi_reloc
3333{
3334 bfd_vma hi_sec_off;
3335 bfd_vma hi_addend;
3336 bfd_vma hi_addr;
3337 unsigned hi_sym;
3338 asection *sym_sec;
9d1da81b 3339 bfd_boolean undefined_weak;
9d06997a
PD
3340 riscv_pcgp_hi_reloc *next;
3341};
3342
3343typedef struct riscv_pcgp_lo_reloc riscv_pcgp_lo_reloc;
3344struct riscv_pcgp_lo_reloc
3345{
3346 bfd_vma hi_sec_off;
3347 riscv_pcgp_lo_reloc *next;
3348};
3349
3350typedef struct
3351{
3352 riscv_pcgp_hi_reloc *hi;
3353 riscv_pcgp_lo_reloc *lo;
3354} riscv_pcgp_relocs;
3355
5f9aecea
JW
3356/* Initialize the pcgp reloc info in P. */
3357
9d06997a
PD
3358static bfd_boolean
3359riscv_init_pcgp_relocs (riscv_pcgp_relocs *p)
3360{
3361 p->hi = NULL;
3362 p->lo = NULL;
3363 return TRUE;
3364}
3365
5f9aecea
JW
3366/* Free the pcgp reloc info in P. */
3367
9d06997a
PD
3368static void
3369riscv_free_pcgp_relocs (riscv_pcgp_relocs *p,
3370 bfd *abfd ATTRIBUTE_UNUSED,
3371 asection *sec ATTRIBUTE_UNUSED)
3372{
3373 riscv_pcgp_hi_reloc *c;
3374 riscv_pcgp_lo_reloc *l;
3375
3376 for (c = p->hi; c != NULL;)
3377 {
3378 riscv_pcgp_hi_reloc *next = c->next;
3379 free (c);
3380 c = next;
3381 }
3382
3383 for (l = p->lo; l != NULL;)
3384 {
3385 riscv_pcgp_lo_reloc *next = l->next;
3386 free (l);
3387 l = next;
3388 }
3389}
3390
5f9aecea
JW
3391/* Record pcgp hi part reloc info in P, using HI_SEC_OFF as the lookup index.
3392 The HI_ADDEND, HI_ADDR, HI_SYM, and SYM_SEC args contain info required to
3393 relax the corresponding lo part reloc. */
3394
9d06997a
PD
3395static bfd_boolean
3396riscv_record_pcgp_hi_reloc (riscv_pcgp_relocs *p, bfd_vma hi_sec_off,
3397 bfd_vma hi_addend, bfd_vma hi_addr,
9d1da81b
JW
3398 unsigned hi_sym, asection *sym_sec,
3399 bfd_boolean undefined_weak)
9d06997a
PD
3400{
3401 riscv_pcgp_hi_reloc *new = bfd_malloc (sizeof(*new));
3402 if (!new)
3403 return FALSE;
3404 new->hi_sec_off = hi_sec_off;
3405 new->hi_addend = hi_addend;
3406 new->hi_addr = hi_addr;
3407 new->hi_sym = hi_sym;
3408 new->sym_sec = sym_sec;
9d1da81b 3409 new->undefined_weak = undefined_weak;
9d06997a
PD
3410 new->next = p->hi;
3411 p->hi = new;
3412 return TRUE;
3413}
3414
5f9aecea
JW
3415/* Look up hi part pcgp reloc info in P, using HI_SEC_OFF as the lookup index.
3416 This is used by a lo part reloc to find the corresponding hi part reloc. */
3417
9d06997a
PD
3418static riscv_pcgp_hi_reloc *
3419riscv_find_pcgp_hi_reloc(riscv_pcgp_relocs *p, bfd_vma hi_sec_off)
3420{
3421 riscv_pcgp_hi_reloc *c;
3422
3423 for (c = p->hi; c != NULL; c = c->next)
3424 if (c->hi_sec_off == hi_sec_off)
3425 return c;
3426 return NULL;
3427}
3428
5f9aecea
JW
3429/* Record pcgp lo part reloc info in P, using HI_SEC_OFF as the lookup info.
3430 This is used to record relocs that can't be relaxed. */
9d06997a
PD
3431
3432static bfd_boolean
3433riscv_record_pcgp_lo_reloc (riscv_pcgp_relocs *p, bfd_vma hi_sec_off)
3434{
3435 riscv_pcgp_lo_reloc *new = bfd_malloc (sizeof(*new));
3436 if (!new)
3437 return FALSE;
3438 new->hi_sec_off = hi_sec_off;
3439 new->next = p->lo;
3440 p->lo = new;
3441 return TRUE;
3442}
3443
5f9aecea
JW
3444/* Look up lo part pcgp reloc info in P, using HI_SEC_OFF as the lookup index.
3445 This is used by a hi part reloc to find the corresponding lo part reloc. */
3446
9d06997a
PD
3447static bfd_boolean
3448riscv_find_pcgp_lo_reloc (riscv_pcgp_relocs *p, bfd_vma hi_sec_off)
3449{
3450 riscv_pcgp_lo_reloc *c;
3451
3452 for (c = p->lo; c != NULL; c = c->next)
3453 if (c->hi_sec_off == hi_sec_off)
3454 return TRUE;
3455 return FALSE;
3456}
3457
45f76423
AW
3458typedef bfd_boolean (*relax_func_t) (bfd *, asection *, asection *,
3459 struct bfd_link_info *,
3460 Elf_Internal_Rela *,
9d06997a 3461 bfd_vma, bfd_vma, bfd_vma, bfd_boolean *,
9d1da81b
JW
3462 riscv_pcgp_relocs *,
3463 bfd_boolean undefined_weak);
45f76423 3464
e23eba97
NC
3465/* Relax AUIPC + JALR into JAL. */
3466
3467static bfd_boolean
3468_bfd_riscv_relax_call (bfd *abfd, asection *sec, asection *sym_sec,
3469 struct bfd_link_info *link_info,
3470 Elf_Internal_Rela *rel,
3471 bfd_vma symval,
45f76423
AW
3472 bfd_vma max_alignment,
3473 bfd_vma reserve_size ATTRIBUTE_UNUSED,
9d06997a 3474 bfd_boolean *again,
9d1da81b
JW
3475 riscv_pcgp_relocs *pcgp_relocs ATTRIBUTE_UNUSED,
3476 bfd_boolean undefined_weak ATTRIBUTE_UNUSED)
e23eba97
NC
3477{
3478 bfd_byte *contents = elf_section_data (sec)->this_hdr.contents;
3479 bfd_signed_vma foff = symval - (sec_addr (sec) + rel->r_offset);
3480 bfd_boolean near_zero = (symval + RISCV_IMM_REACH/2) < RISCV_IMM_REACH;
3481 bfd_vma auipc, jalr;
3482 int rd, r_type, len = 4, rvc = elf_elfheader (abfd)->e_flags & EF_RISCV_RVC;
3483
3484 /* If the call crosses section boundaries, an alignment directive could
c6261a00
JW
3485 cause the PC-relative offset to later increase, so we need to add in the
3486 max alignment of any section inclusive from the call to the target.
3487 Otherwise, we only need to use the alignment of the current section. */
3488 if (VALID_UJTYPE_IMM (foff))
3489 {
3490 if (sym_sec->output_section == sec->output_section
3491 && sym_sec->output_section != bfd_abs_section_ptr)
3492 max_alignment = (bfd_vma) 1 << sym_sec->output_section->alignment_power;
3493 foff += (foff < 0 ? -max_alignment : max_alignment);
3494 }
e23eba97
NC
3495
3496 /* See if this function call can be shortened. */
3497 if (!VALID_UJTYPE_IMM (foff) && !(!bfd_link_pic (link_info) && near_zero))
3498 return TRUE;
3499
3500 /* Shorten the function call. */
3501 BFD_ASSERT (rel->r_offset + 8 <= sec->size);
3502
3503 auipc = bfd_get_32 (abfd, contents + rel->r_offset);
3504 jalr = bfd_get_32 (abfd, contents + rel->r_offset + 4);
3505 rd = (jalr >> OP_SH_RD) & OP_MASK_RD;
ae2b14c7 3506 rvc = rvc && VALID_RVC_J_IMM (foff);
e23eba97 3507
ae2b14c7
JW
3508 /* C.J exists on RV32 and RV64, but C.JAL is RV32-only. */
3509 rvc = rvc && (rd == 0 || (rd == X_RA && ARCH_SIZE == 32));
3510
3511 if (rvc)
e23eba97
NC
3512 {
3513 /* Relax to C.J[AL] rd, addr. */
3514 r_type = R_RISCV_RVC_JUMP;
3515 auipc = rd == 0 ? MATCH_C_J : MATCH_C_JAL;
3516 len = 2;
3517 }
3518 else if (VALID_UJTYPE_IMM (foff))
3519 {
3520 /* Relax to JAL rd, addr. */
3521 r_type = R_RISCV_JAL;
3522 auipc = MATCH_JAL | (rd << OP_SH_RD);
3523 }
3524 else /* near_zero */
3525 {
3526 /* Relax to JALR rd, x0, addr. */
3527 r_type = R_RISCV_LO12_I;
3528 auipc = MATCH_JALR | (rd << OP_SH_RD);
3529 }
3530
3531 /* Replace the R_RISCV_CALL reloc. */
3532 rel->r_info = ELFNN_R_INFO (ELFNN_R_SYM (rel->r_info), r_type);
3533 /* Replace the AUIPC. */
3534 bfd_put (8 * len, abfd, auipc, contents + rel->r_offset);
3535
3536 /* Delete unnecessary JALR. */
3537 *again = TRUE;
7f02625e
JW
3538 return riscv_relax_delete_bytes (abfd, sec, rel->r_offset + len, 8 - len,
3539 link_info);
e23eba97
NC
3540}
3541
3542/* Traverse all output sections and return the max alignment. */
3543
1d61f794 3544static bfd_vma
e23eba97
NC
3545_bfd_riscv_get_max_alignment (asection *sec)
3546{
3547 unsigned int max_alignment_power = 0;
3548 asection *o;
3549
3550 for (o = sec->output_section->owner->sections; o != NULL; o = o->next)
3551 {
3552 if (o->alignment_power > max_alignment_power)
3553 max_alignment_power = o->alignment_power;
3554 }
3555
1d61f794 3556 return (bfd_vma) 1 << max_alignment_power;
e23eba97
NC
3557}
3558
3559/* Relax non-PIC global variable references. */
3560
3561static bfd_boolean
3562_bfd_riscv_relax_lui (bfd *abfd,
3563 asection *sec,
3564 asection *sym_sec,
3565 struct bfd_link_info *link_info,
3566 Elf_Internal_Rela *rel,
3567 bfd_vma symval,
45f76423
AW
3568 bfd_vma max_alignment,
3569 bfd_vma reserve_size,
9d06997a 3570 bfd_boolean *again,
9d1da81b
JW
3571 riscv_pcgp_relocs *pcgp_relocs ATTRIBUTE_UNUSED,
3572 bfd_boolean undefined_weak)
e23eba97
NC
3573{
3574 bfd_byte *contents = elf_section_data (sec)->this_hdr.contents;
3575 bfd_vma gp = riscv_global_pointer_value (link_info);
3576 int use_rvc = elf_elfheader (abfd)->e_flags & EF_RISCV_RVC;
3577
e23eba97
NC
3578 BFD_ASSERT (rel->r_offset + 4 <= sec->size);
3579
d0f744f9
AW
3580 if (gp)
3581 {
507685a3
JW
3582 /* If gp and the symbol are in the same output section, which is not the
3583 abs section, then consider only that output section's alignment. */
d0f744f9 3584 struct bfd_link_hash_entry *h =
b5292032
PD
3585 bfd_link_hash_lookup (link_info->hash, RISCV_GP_SYMBOL, FALSE, FALSE,
3586 TRUE);
507685a3
JW
3587 if (h->u.def.section->output_section == sym_sec->output_section
3588 && sym_sec->output_section != bfd_abs_section_ptr)
d0f744f9
AW
3589 max_alignment = (bfd_vma) 1 << sym_sec->output_section->alignment_power;
3590 }
3591
e23eba97
NC
3592 /* Is the reference in range of x0 or gp?
3593 Valid gp range conservatively because of alignment issue. */
9d1da81b
JW
3594 if (undefined_weak
3595 || (VALID_ITYPE_IMM (symval)
3596 || (symval >= gp
3597 && VALID_ITYPE_IMM (symval - gp + max_alignment + reserve_size))
3598 || (symval < gp
3599 && VALID_ITYPE_IMM (symval - gp - max_alignment - reserve_size))))
e23eba97
NC
3600 {
3601 unsigned sym = ELFNN_R_SYM (rel->r_info);
3602 switch (ELFNN_R_TYPE (rel->r_info))
3603 {
3604 case R_RISCV_LO12_I:
9d1da81b
JW
3605 if (undefined_weak)
3606 {
3607 /* Change the RS1 to zero. */
3608 bfd_vma insn = bfd_get_32 (abfd, contents + rel->r_offset);
3609 insn &= ~(OP_MASK_RS1 << OP_SH_RS1);
3610 bfd_put_32 (abfd, insn, contents + rel->r_offset);
3611 }
3612 else
3613 rel->r_info = ELFNN_R_INFO (sym, R_RISCV_GPREL_I);
e23eba97
NC
3614 return TRUE;
3615
3616 case R_RISCV_LO12_S:
9d1da81b
JW
3617 if (undefined_weak)
3618 {
3619 /* Change the RS1 to zero. */
3620 bfd_vma insn = bfd_get_32 (abfd, contents + rel->r_offset);
3621 insn &= ~(OP_MASK_RS1 << OP_SH_RS1);
3622 bfd_put_32 (abfd, insn, contents + rel->r_offset);
3623 }
3624 else
3625 rel->r_info = ELFNN_R_INFO (sym, R_RISCV_GPREL_S);
e23eba97
NC
3626 return TRUE;
3627
3628 case R_RISCV_HI20:
3629 /* We can delete the unnecessary LUI and reloc. */
3630 rel->r_info = ELFNN_R_INFO (0, R_RISCV_NONE);
3631 *again = TRUE;
7f02625e
JW
3632 return riscv_relax_delete_bytes (abfd, sec, rel->r_offset, 4,
3633 link_info);
e23eba97
NC
3634
3635 default:
3636 abort ();
3637 }
3638 }
3639
3640 /* Can we relax LUI to C.LUI? Alignment might move the section forward;
0f52d45a
JW
3641 account for this assuming page alignment at worst. In the presence of
3642 RELRO segment the linker aligns it by one page size, therefore sections
3643 after the segment can be moved more than one page. */
3644
e23eba97
NC
3645 if (use_rvc
3646 && ELFNN_R_TYPE (rel->r_info) == R_RISCV_HI20
3647 && VALID_RVC_LUI_IMM (RISCV_CONST_HIGH_PART (symval))
0f52d45a
JW
3648 && VALID_RVC_LUI_IMM (RISCV_CONST_HIGH_PART (symval)
3649 + (link_info->relro ? 2 * ELF_MAXPAGESIZE
3650 : ELF_MAXPAGESIZE)))
e23eba97 3651 {
3342be5d 3652 /* Replace LUI with C.LUI if legal (i.e., rd != x0 and rd != x2/sp). */
e23eba97 3653 bfd_vma lui = bfd_get_32 (abfd, contents + rel->r_offset);
3342be5d
AW
3654 unsigned rd = ((unsigned)lui >> OP_SH_RD) & OP_MASK_RD;
3655 if (rd == 0 || rd == X_SP)
e23eba97
NC
3656 return TRUE;
3657
3658 lui = (lui & (OP_MASK_RD << OP_SH_RD)) | MATCH_C_LUI;
3659 bfd_put_32 (abfd, lui, contents + rel->r_offset);
3660
3661 /* Replace the R_RISCV_HI20 reloc. */
3662 rel->r_info = ELFNN_R_INFO (ELFNN_R_SYM (rel->r_info), R_RISCV_RVC_LUI);
3663
3664 *again = TRUE;
7f02625e
JW
3665 return riscv_relax_delete_bytes (abfd, sec, rel->r_offset + 2, 2,
3666 link_info);
e23eba97
NC
3667 }
3668
3669 return TRUE;
3670}
3671
3672/* Relax non-PIC TLS references. */
3673
3674static bfd_boolean
3675_bfd_riscv_relax_tls_le (bfd *abfd,
3676 asection *sec,
3677 asection *sym_sec ATTRIBUTE_UNUSED,
3678 struct bfd_link_info *link_info,
3679 Elf_Internal_Rela *rel,
3680 bfd_vma symval,
45f76423
AW
3681 bfd_vma max_alignment ATTRIBUTE_UNUSED,
3682 bfd_vma reserve_size ATTRIBUTE_UNUSED,
9d06997a 3683 bfd_boolean *again,
9d1da81b
JW
3684 riscv_pcgp_relocs *prcel_relocs ATTRIBUTE_UNUSED,
3685 bfd_boolean undefined_weak ATTRIBUTE_UNUSED)
e23eba97
NC
3686{
3687 /* See if this symbol is in range of tp. */
3688 if (RISCV_CONST_HIGH_PART (tpoff (link_info, symval)) != 0)
3689 return TRUE;
3690
e23eba97 3691 BFD_ASSERT (rel->r_offset + 4 <= sec->size);
45f76423
AW
3692 switch (ELFNN_R_TYPE (rel->r_info))
3693 {
3694 case R_RISCV_TPREL_LO12_I:
3695 rel->r_info = ELFNN_R_INFO (ELFNN_R_SYM (rel->r_info), R_RISCV_TPREL_I);
3696 return TRUE;
e23eba97 3697
45f76423
AW
3698 case R_RISCV_TPREL_LO12_S:
3699 rel->r_info = ELFNN_R_INFO (ELFNN_R_SYM (rel->r_info), R_RISCV_TPREL_S);
3700 return TRUE;
3701
3702 case R_RISCV_TPREL_HI20:
3703 case R_RISCV_TPREL_ADD:
3704 /* We can delete the unnecessary instruction and reloc. */
3705 rel->r_info = ELFNN_R_INFO (0, R_RISCV_NONE);
3706 *again = TRUE;
7f02625e 3707 return riscv_relax_delete_bytes (abfd, sec, rel->r_offset, 4, link_info);
45f76423
AW
3708
3709 default:
3710 abort ();
3711 }
e23eba97
NC
3712}
3713
3714/* Implement R_RISCV_ALIGN by deleting excess alignment NOPs. */
3715
3716static bfd_boolean
3717_bfd_riscv_relax_align (bfd *abfd, asection *sec,
9eb7b0ac 3718 asection *sym_sec,
7f02625e 3719 struct bfd_link_info *link_info,
e23eba97
NC
3720 Elf_Internal_Rela *rel,
3721 bfd_vma symval,
45f76423
AW
3722 bfd_vma max_alignment ATTRIBUTE_UNUSED,
3723 bfd_vma reserve_size ATTRIBUTE_UNUSED,
9d06997a 3724 bfd_boolean *again ATTRIBUTE_UNUSED,
9d1da81b
JW
3725 riscv_pcgp_relocs *pcrel_relocs ATTRIBUTE_UNUSED,
3726 bfd_boolean undefined_weak ATTRIBUTE_UNUSED)
e23eba97
NC
3727{
3728 bfd_byte *contents = elf_section_data (sec)->this_hdr.contents;
3729 bfd_vma alignment = 1, pos;
3730 while (alignment <= rel->r_addend)
3731 alignment *= 2;
3732
3733 symval -= rel->r_addend;
3734 bfd_vma aligned_addr = ((symval - 1) & ~(alignment - 1)) + alignment;
3735 bfd_vma nop_bytes = aligned_addr - symval;
3736
3737 /* Once we've handled an R_RISCV_ALIGN, we can't relax anything else. */
3738 sec->sec_flg0 = TRUE;
3739
3740 /* Make sure there are enough NOPs to actually achieve the alignment. */
3741 if (rel->r_addend < nop_bytes)
9eb7b0ac 3742 {
f2b740ac
AM
3743 _bfd_error_handler
3744 (_("%pB(%pA+%#" PRIx64 "): %" PRId64 " bytes required for alignment "
3745 "to %" PRId64 "-byte boundary, but only %" PRId64 " present"),
3746 abfd, sym_sec, (uint64_t) rel->r_offset,
3747 (int64_t) nop_bytes, (int64_t) alignment, (int64_t) rel->r_addend);
9eb7b0ac
PD
3748 bfd_set_error (bfd_error_bad_value);
3749 return FALSE;
3750 }
e23eba97
NC
3751
3752 /* Delete the reloc. */
3753 rel->r_info = ELFNN_R_INFO (0, R_RISCV_NONE);
3754
3755 /* If the number of NOPs is already correct, there's nothing to do. */
3756 if (nop_bytes == rel->r_addend)
3757 return TRUE;
3758
3759 /* Write as many RISC-V NOPs as we need. */
3760 for (pos = 0; pos < (nop_bytes & -4); pos += 4)
3761 bfd_put_32 (abfd, RISCV_NOP, contents + rel->r_offset + pos);
3762
3763 /* Write a final RVC NOP if need be. */
3764 if (nop_bytes % 4 != 0)
3765 bfd_put_16 (abfd, RVC_NOP, contents + rel->r_offset + pos);
3766
3767 /* Delete the excess bytes. */
3768 return riscv_relax_delete_bytes (abfd, sec, rel->r_offset + nop_bytes,
7f02625e 3769 rel->r_addend - nop_bytes, link_info);
e23eba97
NC
3770}
3771
ff6f4d9b
PD
3772/* Relax PC-relative references to GP-relative references. */
3773
9d06997a 3774static bfd_boolean
5f9aecea 3775_bfd_riscv_relax_pc (bfd *abfd ATTRIBUTE_UNUSED,
9d06997a
PD
3776 asection *sec,
3777 asection *sym_sec,
3778 struct bfd_link_info *link_info,
3779 Elf_Internal_Rela *rel,
3780 bfd_vma symval,
3781 bfd_vma max_alignment,
3782 bfd_vma reserve_size,
3783 bfd_boolean *again ATTRIBUTE_UNUSED,
9d1da81b
JW
3784 riscv_pcgp_relocs *pcgp_relocs,
3785 bfd_boolean undefined_weak)
9d06997a 3786{
9d1da81b 3787 bfd_byte *contents = elf_section_data (sec)->this_hdr.contents;
9d06997a
PD
3788 bfd_vma gp = riscv_global_pointer_value (link_info);
3789
3790 BFD_ASSERT (rel->r_offset + 4 <= sec->size);
3791
3792 /* Chain the _LO relocs to their cooresponding _HI reloc to compute the
3793 * actual target address. */
e65b1a78
MR
3794 riscv_pcgp_hi_reloc hi_reloc;
3795 memset (&hi_reloc, 0, sizeof (hi_reloc));
9d06997a
PD
3796 switch (ELFNN_R_TYPE (rel->r_info))
3797 {
3798 case R_RISCV_PCREL_LO12_I:
3799 case R_RISCV_PCREL_LO12_S:
3800 {
a05f27b6
JW
3801 /* If the %lo has an addend, it isn't for the label pointing at the
3802 hi part instruction, but rather for the symbol pointed at by the
3803 hi part instruction. So we must subtract it here for the lookup.
3804 It is still used below in the final symbol address. */
3805 bfd_vma hi_sec_off = symval - sec_addr (sym_sec) - rel->r_addend;
9d06997a 3806 riscv_pcgp_hi_reloc *hi = riscv_find_pcgp_hi_reloc (pcgp_relocs,
a05f27b6 3807 hi_sec_off);
9d06997a
PD
3808 if (hi == NULL)
3809 {
a05f27b6 3810 riscv_record_pcgp_lo_reloc (pcgp_relocs, hi_sec_off);
9d06997a
PD
3811 return TRUE;
3812 }
3813
3814 hi_reloc = *hi;
3815 symval = hi_reloc.hi_addr;
3816 sym_sec = hi_reloc.sym_sec;
9d1da81b
JW
3817
3818 /* We can not know whether the undefined weak symbol is referenced
3819 according to the information of R_RISCV_PCREL_LO12_I/S. Therefore,
3820 we have to record the 'undefined_weak' flag when handling the
3821 corresponding R_RISCV_HI20 reloc in riscv_record_pcgp_hi_reloc. */
3822 undefined_weak = hi_reloc.undefined_weak;
9d06997a
PD
3823 }
3824 break;
3825
3826 case R_RISCV_PCREL_HI20:
3827 /* Mergeable symbols and code might later move out of range. */
9d1da81b
JW
3828 if (! undefined_weak
3829 && sym_sec->flags & (SEC_MERGE | SEC_CODE))
9d06997a
PD
3830 return TRUE;
3831
3832 /* If the cooresponding lo relocation has already been seen then it's not
3833 * safe to relax this relocation. */
3834 if (riscv_find_pcgp_lo_reloc (pcgp_relocs, rel->r_offset))
07d6d2b8 3835 return TRUE;
9d06997a
PD
3836
3837 break;
3838
3839 default:
3840 abort ();
3841 }
3842
3843 if (gp)
3844 {
507685a3
JW
3845 /* If gp and the symbol are in the same output section, which is not the
3846 abs section, then consider only that output section's alignment. */
9d06997a 3847 struct bfd_link_hash_entry *h =
507685a3
JW
3848 bfd_link_hash_lookup (link_info->hash, RISCV_GP_SYMBOL, FALSE, FALSE,
3849 TRUE);
3850 if (h->u.def.section->output_section == sym_sec->output_section
3851 && sym_sec->output_section != bfd_abs_section_ptr)
9d06997a
PD
3852 max_alignment = (bfd_vma) 1 << sym_sec->output_section->alignment_power;
3853 }
3854
3855 /* Is the reference in range of x0 or gp?
3856 Valid gp range conservatively because of alignment issue. */
9d1da81b
JW
3857 if (undefined_weak
3858 || (VALID_ITYPE_IMM (symval)
3859 || (symval >= gp
3860 && VALID_ITYPE_IMM (symval - gp + max_alignment + reserve_size))
3861 || (symval < gp
3862 && VALID_ITYPE_IMM (symval - gp - max_alignment - reserve_size))))
9d06997a
PD
3863 {
3864 unsigned sym = hi_reloc.hi_sym;
3865 switch (ELFNN_R_TYPE (rel->r_info))
3866 {
3867 case R_RISCV_PCREL_LO12_I:
9d1da81b
JW
3868 if (undefined_weak)
3869 {
3870 /* Change the RS1 to zero, and then modify the relocation
3871 type to R_RISCV_LO12_I. */
3872 bfd_vma insn = bfd_get_32 (abfd, contents + rel->r_offset);
3873 insn &= ~(OP_MASK_RS1 << OP_SH_RS1);
3874 bfd_put_32 (abfd, insn, contents + rel->r_offset);
3875 rel->r_info = ELFNN_R_INFO (sym, R_RISCV_LO12_I);
3876 rel->r_addend = hi_reloc.hi_addend;
3877 }
3878 else
3879 {
3880 rel->r_info = ELFNN_R_INFO (sym, R_RISCV_GPREL_I);
3881 rel->r_addend += hi_reloc.hi_addend;
3882 }
5f9aecea 3883 return TRUE;
9d06997a
PD
3884
3885 case R_RISCV_PCREL_LO12_S:
9d1da81b
JW
3886 if (undefined_weak)
3887 {
3888 /* Change the RS1 to zero, and then modify the relocation
3889 type to R_RISCV_LO12_S. */
3890 bfd_vma insn = bfd_get_32 (abfd, contents + rel->r_offset);
3891 insn &= ~(OP_MASK_RS1 << OP_SH_RS1);
3892 bfd_put_32 (abfd, insn, contents + rel->r_offset);
3893 rel->r_info = ELFNN_R_INFO (sym, R_RISCV_LO12_S);
3894 rel->r_addend = hi_reloc.hi_addend;
3895 }
3896 else
3897 {
3898 rel->r_info = ELFNN_R_INFO (sym, R_RISCV_GPREL_S);
3899 rel->r_addend += hi_reloc.hi_addend;
3900 }
5f9aecea 3901 return TRUE;
9d06997a
PD
3902
3903 case R_RISCV_PCREL_HI20:
07d6d2b8 3904 riscv_record_pcgp_hi_reloc (pcgp_relocs,
9d06997a
PD
3905 rel->r_offset,
3906 rel->r_addend,
3907 symval,
3908 ELFNN_R_SYM(rel->r_info),
9d1da81b
JW
3909 sym_sec,
3910 undefined_weak);
9d06997a
PD
3911 /* We can delete the unnecessary AUIPC and reloc. */
3912 rel->r_info = ELFNN_R_INFO (0, R_RISCV_DELETE);
3913 rel->r_addend = 4;
5f9aecea 3914 return TRUE;
9d06997a
PD
3915
3916 default:
3917 abort ();
3918 }
3919 }
3920
3921 return TRUE;
3922}
3923
3924/* Relax PC-relative references to GP-relative references. */
3925
ff6f4d9b
PD
3926static bfd_boolean
3927_bfd_riscv_relax_delete (bfd *abfd,
3928 asection *sec,
3929 asection *sym_sec ATTRIBUTE_UNUSED,
7f02625e 3930 struct bfd_link_info *link_info,
ff6f4d9b
PD
3931 Elf_Internal_Rela *rel,
3932 bfd_vma symval ATTRIBUTE_UNUSED,
3933 bfd_vma max_alignment ATTRIBUTE_UNUSED,
3934 bfd_vma reserve_size ATTRIBUTE_UNUSED,
9d06997a 3935 bfd_boolean *again ATTRIBUTE_UNUSED,
9d1da81b
JW
3936 riscv_pcgp_relocs *pcgp_relocs ATTRIBUTE_UNUSED,
3937 bfd_boolean undefined_weak ATTRIBUTE_UNUSED)
ff6f4d9b 3938{
7f02625e
JW
3939 if (!riscv_relax_delete_bytes(abfd, sec, rel->r_offset, rel->r_addend,
3940 link_info))
ff6f4d9b
PD
3941 return FALSE;
3942 rel->r_info = ELFNN_R_INFO(0, R_RISCV_NONE);
3943 return TRUE;
3944}
3945
3946/* Relax a section. Pass 0 shortens code sequences unless disabled. Pass 1
3947 deletes the bytes that pass 0 made obselete. Pass 2, which cannot be
3948 disabled, handles code alignment directives. */
e23eba97
NC
3949
3950static bfd_boolean
3951_bfd_riscv_relax_section (bfd *abfd, asection *sec,
3952 struct bfd_link_info *info,
3953 bfd_boolean *again)
3954{
3955 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (abfd);
3956 struct riscv_elf_link_hash_table *htab = riscv_elf_hash_table (info);
3957 struct bfd_elf_section_data *data = elf_section_data (sec);
3958 Elf_Internal_Rela *relocs;
3959 bfd_boolean ret = FALSE;
3960 unsigned int i;
45f76423 3961 bfd_vma max_alignment, reserve_size = 0;
9d06997a 3962 riscv_pcgp_relocs pcgp_relocs;
e23eba97
NC
3963
3964 *again = FALSE;
3965
3966 if (bfd_link_relocatable (info)
3967 || sec->sec_flg0
3968 || (sec->flags & SEC_RELOC) == 0
3969 || sec->reloc_count == 0
3970 || (info->disable_target_specific_optimizations
3971 && info->relax_pass == 0))
3972 return TRUE;
3973
9d06997a
PD
3974 riscv_init_pcgp_relocs (&pcgp_relocs);
3975
e23eba97
NC
3976 /* Read this BFD's relocs if we haven't done so already. */
3977 if (data->relocs)
3978 relocs = data->relocs;
3979 else if (!(relocs = _bfd_elf_link_read_relocs (abfd, sec, NULL, NULL,
3980 info->keep_memory)))
3981 goto fail;
3982
fc3c5343
L
3983 if (htab)
3984 {
3985 max_alignment = htab->max_alignment;
3986 if (max_alignment == (bfd_vma) -1)
3987 {
3988 max_alignment = _bfd_riscv_get_max_alignment (sec);
3989 htab->max_alignment = max_alignment;
3990 }
3991 }
3992 else
3993 max_alignment = _bfd_riscv_get_max_alignment (sec);
e23eba97
NC
3994
3995 /* Examine and consider relaxing each reloc. */
3996 for (i = 0; i < sec->reloc_count; i++)
3997 {
3998 asection *sym_sec;
3999 Elf_Internal_Rela *rel = relocs + i;
45f76423 4000 relax_func_t relax_func;
e23eba97
NC
4001 int type = ELFNN_R_TYPE (rel->r_info);
4002 bfd_vma symval;
04b865dc 4003 char symtype;
9d1da81b 4004 bfd_boolean undefined_weak = FALSE;
e23eba97 4005
ff6f4d9b 4006 relax_func = NULL;
e23eba97
NC
4007 if (info->relax_pass == 0)
4008 {
4009 if (type == R_RISCV_CALL || type == R_RISCV_CALL_PLT)
4010 relax_func = _bfd_riscv_relax_call;
4011 else if (type == R_RISCV_HI20
4012 || type == R_RISCV_LO12_I
4013 || type == R_RISCV_LO12_S)
4014 relax_func = _bfd_riscv_relax_lui;
9d06997a
PD
4015 else if (!bfd_link_pic(info)
4016 && (type == R_RISCV_PCREL_HI20
4017 || type == R_RISCV_PCREL_LO12_I
4018 || type == R_RISCV_PCREL_LO12_S))
4019 relax_func = _bfd_riscv_relax_pc;
45f76423
AW
4020 else if (type == R_RISCV_TPREL_HI20
4021 || type == R_RISCV_TPREL_ADD
4022 || type == R_RISCV_TPREL_LO12_I
4023 || type == R_RISCV_TPREL_LO12_S)
e23eba97 4024 relax_func = _bfd_riscv_relax_tls_le;
45f76423
AW
4025 else
4026 continue;
4027
4028 /* Only relax this reloc if it is paired with R_RISCV_RELAX. */
4029 if (i == sec->reloc_count - 1
4030 || ELFNN_R_TYPE ((rel + 1)->r_info) != R_RISCV_RELAX
4031 || rel->r_offset != (rel + 1)->r_offset)
4032 continue;
4033
4034 /* Skip over the R_RISCV_RELAX. */
4035 i++;
e23eba97 4036 }
ff6f4d9b 4037 else if (info->relax_pass == 1 && type == R_RISCV_DELETE)
07d6d2b8 4038 relax_func = _bfd_riscv_relax_delete;
ff6f4d9b 4039 else if (info->relax_pass == 2 && type == R_RISCV_ALIGN)
e23eba97 4040 relax_func = _bfd_riscv_relax_align;
45f76423 4041 else
e23eba97
NC
4042 continue;
4043
4044 data->relocs = relocs;
4045
4046 /* Read this BFD's contents if we haven't done so already. */
4047 if (!data->this_hdr.contents
4048 && !bfd_malloc_and_get_section (abfd, sec, &data->this_hdr.contents))
4049 goto fail;
4050
4051 /* Read this BFD's symbols if we haven't done so already. */
4052 if (symtab_hdr->sh_info != 0
4053 && !symtab_hdr->contents
4054 && !(symtab_hdr->contents =
4055 (unsigned char *) bfd_elf_get_elf_syms (abfd, symtab_hdr,
4056 symtab_hdr->sh_info,
4057 0, NULL, NULL, NULL)))
4058 goto fail;
4059
4060 /* Get the value of the symbol referred to by the reloc. */
4061 if (ELFNN_R_SYM (rel->r_info) < symtab_hdr->sh_info)
4062 {
4063 /* A local symbol. */
4064 Elf_Internal_Sym *isym = ((Elf_Internal_Sym *) symtab_hdr->contents
4065 + ELFNN_R_SYM (rel->r_info));
45f76423
AW
4066 reserve_size = (isym->st_size - rel->r_addend) > isym->st_size
4067 ? 0 : isym->st_size - rel->r_addend;
e23eba97
NC
4068
4069 if (isym->st_shndx == SHN_UNDEF)
04b865dc 4070 sym_sec = sec, symval = rel->r_offset;
e23eba97
NC
4071 else
4072 {
4073 BFD_ASSERT (isym->st_shndx < elf_numsections (abfd));
4074 sym_sec = elf_elfsections (abfd)[isym->st_shndx]->bfd_section;
09ca4b9d
JW
4075#if 0
4076 /* The purpose of this code is unknown. It breaks linker scripts
4077 for embedded development that place sections at address zero.
4078 This code is believed to be unnecessary. Disabling it but not
4079 yet removing it, in case something breaks. */
e23eba97
NC
4080 if (sec_addr (sym_sec) == 0)
4081 continue;
09ca4b9d 4082#endif
04b865dc 4083 symval = isym->st_value;
e23eba97 4084 }
04b865dc 4085 symtype = ELF_ST_TYPE (isym->st_info);
e23eba97
NC
4086 }
4087 else
4088 {
4089 unsigned long indx;
4090 struct elf_link_hash_entry *h;
4091
4092 indx = ELFNN_R_SYM (rel->r_info) - symtab_hdr->sh_info;
4093 h = elf_sym_hashes (abfd)[indx];
4094
4095 while (h->root.type == bfd_link_hash_indirect
4096 || h->root.type == bfd_link_hash_warning)
4097 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4098
9d1da81b
JW
4099 if (h->root.type == bfd_link_hash_undefweak
4100 && (relax_func == _bfd_riscv_relax_lui
4101 || relax_func == _bfd_riscv_relax_pc))
4102 {
4103 /* For the lui and auipc relaxations, since the symbol
4104 value of an undefined weak symbol is always be zero,
4105 we can optimize the patterns into a single LI/MV/ADDI
4106 instruction.
4107
4108 Note that, creating shared libraries and pie output may
4109 break the rule above. Fortunately, since we do not relax
4110 pc relocs when creating shared libraries and pie output,
4111 and the absolute address access for R_RISCV_HI20 isn't
4112 allowed when "-fPIC" is set, the problem of creating shared
4113 libraries can not happen currently. Once we support the
4114 auipc relaxations when creating shared libraries, then we will
4115 need the more rigorous checking for this optimization. */
4116 undefined_weak = TRUE;
4117 }
4118
85f78364
JW
4119 /* This line has to match the check in riscv_elf_relocate_section
4120 in the R_RISCV_CALL[_PLT] case. */
4121 if (bfd_link_pic (info) && h->plt.offset != MINUS_ONE)
04b865dc
JW
4122 {
4123 sym_sec = htab->elf.splt;
4124 symval = h->plt.offset;
4125 }
9d1da81b
JW
4126 else if (undefined_weak)
4127 {
4128 symval = 0;
4129 sym_sec = bfd_und_section_ptr;
4130 }
a2714d6c
AM
4131 else if ((h->root.type == bfd_link_hash_defined
4132 || h->root.type == bfd_link_hash_defweak)
4133 && h->root.u.def.section != NULL
4134 && h->root.u.def.section->output_section != NULL)
04b865dc
JW
4135 {
4136 symval = h->root.u.def.value;
4137 sym_sec = h->root.u.def.section;
4138 }
a2714d6c
AM
4139 else
4140 continue;
e23eba97 4141
45f76423
AW
4142 if (h->type != STT_FUNC)
4143 reserve_size =
4144 (h->size - rel->r_addend) > h->size ? 0 : h->size - rel->r_addend;
04b865dc 4145 symtype = h->type;
e23eba97
NC
4146 }
4147
04b865dc
JW
4148 if (sym_sec->sec_info_type == SEC_INFO_TYPE_MERGE
4149 && (sym_sec->flags & SEC_MERGE))
4150 {
4151 /* At this stage in linking, no SEC_MERGE symbol has been
4152 adjusted, so all references to such symbols need to be
4153 passed through _bfd_merged_section_offset. (Later, in
4154 relocate_section, all SEC_MERGE symbols *except* for
4155 section symbols have been adjusted.)
4156
4157 gas may reduce relocations against symbols in SEC_MERGE
4158 sections to a relocation against the section symbol when
4159 the original addend was zero. When the reloc is against
4160 a section symbol we should include the addend in the
4161 offset passed to _bfd_merged_section_offset, since the
4162 location of interest is the original symbol. On the
4163 other hand, an access to "sym+addend" where "sym" is not
4164 a section symbol should not include the addend; Such an
4165 access is presumed to be an offset from "sym"; The
4166 location of interest is just "sym". */
4167 if (symtype == STT_SECTION)
4168 symval += rel->r_addend;
4169
4170 symval = _bfd_merged_section_offset (abfd, &sym_sec,
4171 elf_section_data (sym_sec)->sec_info,
4172 symval);
4173
4174 if (symtype != STT_SECTION)
4175 symval += rel->r_addend;
4176 }
4177 else
4178 symval += rel->r_addend;
4179
4180 symval += sec_addr (sym_sec);
e23eba97
NC
4181
4182 if (!relax_func (abfd, sec, sym_sec, info, rel, symval,
9d06997a 4183 max_alignment, reserve_size, again,
9d1da81b 4184 &pcgp_relocs, undefined_weak))
e23eba97
NC
4185 goto fail;
4186 }
4187
4188 ret = TRUE;
4189
dc1e8a47 4190 fail:
e23eba97
NC
4191 if (relocs != data->relocs)
4192 free (relocs);
9d06997a 4193 riscv_free_pcgp_relocs(&pcgp_relocs, abfd, sec);
e23eba97
NC
4194
4195 return ret;
4196}
4197
4198#if ARCH_SIZE == 32
79b8e8ab 4199# define PRSTATUS_SIZE 204
e23eba97
NC
4200# define PRSTATUS_OFFSET_PR_CURSIG 12
4201# define PRSTATUS_OFFSET_PR_PID 24
4202# define PRSTATUS_OFFSET_PR_REG 72
4203# define ELF_GREGSET_T_SIZE 128
4204# define PRPSINFO_SIZE 128
4205# define PRPSINFO_OFFSET_PR_PID 16
4206# define PRPSINFO_OFFSET_PR_FNAME 32
4207# define PRPSINFO_OFFSET_PR_PSARGS 48
4208#else
4209# define PRSTATUS_SIZE 376
4210# define PRSTATUS_OFFSET_PR_CURSIG 12
4211# define PRSTATUS_OFFSET_PR_PID 32
4212# define PRSTATUS_OFFSET_PR_REG 112
4213# define ELF_GREGSET_T_SIZE 256
4214# define PRPSINFO_SIZE 136
4215# define PRPSINFO_OFFSET_PR_PID 24
4216# define PRPSINFO_OFFSET_PR_FNAME 40
4217# define PRPSINFO_OFFSET_PR_PSARGS 56
4218#endif
4219
4220/* Support for core dump NOTE sections. */
4221
4222static bfd_boolean
4223riscv_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
4224{
4225 switch (note->descsz)
4226 {
4227 default:
4228 return FALSE;
4229
4230 case PRSTATUS_SIZE: /* sizeof(struct elf_prstatus) on Linux/RISC-V. */
4231 /* pr_cursig */
4232 elf_tdata (abfd)->core->signal
4233 = bfd_get_16 (abfd, note->descdata + PRSTATUS_OFFSET_PR_CURSIG);
4234
4235 /* pr_pid */
4236 elf_tdata (abfd)->core->lwpid
4237 = bfd_get_32 (abfd, note->descdata + PRSTATUS_OFFSET_PR_PID);
4238 break;
4239 }
4240
4241 /* Make a ".reg/999" section. */
4242 return _bfd_elfcore_make_pseudosection (abfd, ".reg", ELF_GREGSET_T_SIZE,
4243 note->descpos + PRSTATUS_OFFSET_PR_REG);
4244}
4245
4246static bfd_boolean
4247riscv_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
4248{
4249 switch (note->descsz)
4250 {
4251 default:
4252 return FALSE;
4253
4254 case PRPSINFO_SIZE: /* sizeof(struct elf_prpsinfo) on Linux/RISC-V. */
4255 /* pr_pid */
4256 elf_tdata (abfd)->core->pid
4257 = bfd_get_32 (abfd, note->descdata + PRPSINFO_OFFSET_PR_PID);
4258
4259 /* pr_fname */
4260 elf_tdata (abfd)->core->program = _bfd_elfcore_strndup
4261 (abfd, note->descdata + PRPSINFO_OFFSET_PR_FNAME, 16);
4262
4263 /* pr_psargs */
4264 elf_tdata (abfd)->core->command = _bfd_elfcore_strndup
4265 (abfd, note->descdata + PRPSINFO_OFFSET_PR_PSARGS, 80);
4266 break;
4267 }
4268
4269 /* Note that for some reason, a spurious space is tacked
4270 onto the end of the args in some (at least one anyway)
4271 implementations, so strip it off if it exists. */
4272
4273 {
4274 char *command = elf_tdata (abfd)->core->command;
4275 int n = strlen (command);
4276
4277 if (0 < n && command[n - 1] == ' ')
4278 command[n - 1] = '\0';
4279 }
4280
4281 return TRUE;
4282}
4283
640d6bfd
KLC
4284/* Set the right mach type. */
4285static bfd_boolean
4286riscv_elf_object_p (bfd *abfd)
4287{
4288 /* There are only two mach types in RISCV currently. */
4289 if (strcmp (abfd->xvec->name, "elf32-littleriscv") == 0)
4290 bfd_default_set_arch_mach (abfd, bfd_arch_riscv, bfd_mach_riscv32);
4291 else
4292 bfd_default_set_arch_mach (abfd, bfd_arch_riscv, bfd_mach_riscv64);
4293
4294 return TRUE;
4295}
4296
2dc8dd17
JW
4297/* Determine whether an object attribute tag takes an integer, a
4298 string or both. */
4299
4300static int
4301riscv_elf_obj_attrs_arg_type (int tag)
4302{
4303 return (tag & 1) != 0 ? ATTR_TYPE_FLAG_STR_VAL : ATTR_TYPE_FLAG_INT_VAL;
4304}
e23eba97
NC
4305
4306#define TARGET_LITTLE_SYM riscv_elfNN_vec
4307#define TARGET_LITTLE_NAME "elfNN-littleriscv"
4308
4309#define elf_backend_reloc_type_class riscv_reloc_type_class
4310
4311#define bfd_elfNN_bfd_reloc_name_lookup riscv_reloc_name_lookup
4312#define bfd_elfNN_bfd_link_hash_table_create riscv_elf_link_hash_table_create
4313#define bfd_elfNN_bfd_reloc_type_lookup riscv_reloc_type_lookup
4314#define bfd_elfNN_bfd_merge_private_bfd_data \
4315 _bfd_riscv_elf_merge_private_bfd_data
4316
4317#define elf_backend_copy_indirect_symbol riscv_elf_copy_indirect_symbol
4318#define elf_backend_create_dynamic_sections riscv_elf_create_dynamic_sections
4319#define elf_backend_check_relocs riscv_elf_check_relocs
4320#define elf_backend_adjust_dynamic_symbol riscv_elf_adjust_dynamic_symbol
4321#define elf_backend_size_dynamic_sections riscv_elf_size_dynamic_sections
4322#define elf_backend_relocate_section riscv_elf_relocate_section
4323#define elf_backend_finish_dynamic_symbol riscv_elf_finish_dynamic_symbol
4324#define elf_backend_finish_dynamic_sections riscv_elf_finish_dynamic_sections
4325#define elf_backend_gc_mark_hook riscv_elf_gc_mark_hook
e23eba97 4326#define elf_backend_plt_sym_val riscv_elf_plt_sym_val
07d6d2b8
AM
4327#define elf_backend_grok_prstatus riscv_elf_grok_prstatus
4328#define elf_backend_grok_psinfo riscv_elf_grok_psinfo
4329#define elf_backend_object_p riscv_elf_object_p
e23eba97
NC
4330#define elf_info_to_howto_rel NULL
4331#define elf_info_to_howto riscv_info_to_howto_rela
4332#define bfd_elfNN_bfd_relax_section _bfd_riscv_relax_section
fc46e8bd 4333#define bfd_elfNN_mkobject elfNN_riscv_mkobject
e23eba97
NC
4334
4335#define elf_backend_init_index_section _bfd_elf_init_1_index_section
4336
4337#define elf_backend_can_gc_sections 1
4338#define elf_backend_can_refcount 1
4339#define elf_backend_want_got_plt 1
4340#define elf_backend_plt_readonly 1
4341#define elf_backend_plt_alignment 4
4342#define elf_backend_want_plt_sym 1
4343#define elf_backend_got_header_size (ARCH_SIZE / 8)
5474d94f 4344#define elf_backend_want_dynrelro 1
e23eba97
NC
4345#define elf_backend_rela_normal 1
4346#define elf_backend_default_execstack 0
4347
2dc8dd17
JW
4348#undef elf_backend_obj_attrs_vendor
4349#define elf_backend_obj_attrs_vendor "riscv"
4350#undef elf_backend_obj_attrs_arg_type
4351#define elf_backend_obj_attrs_arg_type riscv_elf_obj_attrs_arg_type
4352#undef elf_backend_obj_attrs_section_type
4353#define elf_backend_obj_attrs_section_type SHT_RISCV_ATTRIBUTES
4354#undef elf_backend_obj_attrs_section
4355#define elf_backend_obj_attrs_section ".riscv.attributes"
4356
e23eba97 4357#include "elfNN-target.h"
This page took 0.447739 seconds and 4 git commands to generate.