Help diagnose problems with the metag target when mixing static and shared binaries.
[deliverable/binutils-gdb.git] / bfd / elf32-metag.c
1 /* Meta support for 32-bit ELF
2 Copyright (C) 2013-2016 Free Software Foundation, Inc.
3 Contributed by Imagination Technologies Ltd.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "libbfd.h"
25 #include "elf-bfd.h"
26 #include "elf32-metag.h"
27 #include "elf/metag.h"
28
29 #define GOT_ENTRY_SIZE 4
30 #define ELF_DYNAMIC_INTERPRETER "/lib/ld-uClibc.so.0"
31
32 /* ABI version:
33 0 - original
34 1 - with GOT offset */
35 #define METAG_ELF_ABI_VERSION 1
36
37 static const unsigned int plt0_entry[] =
38 {
39 0x02000005, /* MOVT D0Re0, #HI(GOT+4) */
40 0x02000000, /* ADD D0Re0, D0Re0, #LO(GOT+4) */
41 0xb70001e3, /* SETL [A0StP++], D0Re0, D1Re0 */
42 0xc600012a, /* GETD PC, [D0Re0+#4] */
43 0xa0fffffe /* NOP */
44 };
45
46 static const unsigned int plt0_pic_entry[] =
47 {
48 0x82900001, /* ADDT A0.2, CPC0, #0 */
49 0x82100000, /* ADD A0.2, A0.2, #0 */
50 0xa3100c20, /* MOV D0Re0, A0.2 */
51 0xb70001e3, /* SETL [A0StP++], D0Re0, D1Re0 */
52 0xc600012a, /* GETD PC, [D0Re0+#4] */
53 };
54
55 static const unsigned int plt_entry[] =
56 {
57 0x82100005, /* MOVT A0.2, #HI(GOT+off) */
58 0x82100000, /* ADD A0.2, A0.2, #LO(GOT+off) */
59 0xc600806a, /* GETD PC, [A0.2] */
60 0x03000004, /* MOV D1Re0, #LO(offset) */
61 0xa0000000 /* B PLT0 */
62 };
63
64 static const unsigned int plt_pic_entry[] =
65 {
66 0x82900001, /* ADDT A0.2, CPC0, #HI(GOT+off) */
67 0x82100000, /* ADD A0.2, A0.2, #LO(GOT+off) */
68 0xc600806a, /* GETD PC, [A0.2] */
69 0x03000004, /* MOV D1Re0, #LO(offset) */
70 0xa0000000 /* B PLT0 */
71 };
72
73 /* Variable names follow a coding style.
74 Please follow this (Apps Hungarian) style:
75
76 Structure/Variable Prefix
77 elf_link_hash_table "etab"
78 elf_link_hash_entry "eh"
79
80 elf_metag_link_hash_table "htab"
81 elf_metag_link_hash_entry "hh"
82
83 bfd_link_hash_table "btab"
84 bfd_link_hash_entry "bh"
85
86 bfd_hash_table containing stubs "bstab"
87 elf_metag_stub_hash_entry "hsh"
88
89 elf_metag_dyn_reloc_entry "hdh"
90
91 Always remember to use GNU Coding Style. */
92
93 #define PLT_ENTRY_SIZE sizeof(plt_entry)
94
95 static reloc_howto_type elf_metag_howto_table[] =
96 {
97 /* High order 16 bit absolute. */
98 HOWTO (R_METAG_HIADDR16, /* type */
99 16, /* rightshift */
100 2, /* size (0 = byte, 1 = short, 2 = long) */
101 16, /* bitsize */
102 FALSE, /* pc_relative */
103 3, /* bitpos */
104 complain_overflow_dont, /* complain_on_overflow */
105 bfd_elf_generic_reloc, /* special_function */
106 "R_METAG_HIADDR16", /* name */
107 FALSE, /* partial_inplace */
108 0, /* src_mask */
109 0x0007fff8, /* dst_mask */
110 FALSE), /* pcrel_offset */
111
112 /* Low order 16 bit absolute. */
113 HOWTO (R_METAG_LOADDR16, /* type */
114 0, /* rightshift */
115 2, /* size (0 = byte, 1 = short, 2 = long) */
116 16, /* bitsize */
117 FALSE, /* pc_relative */
118 3, /* bitpos */
119 complain_overflow_dont,/* complain_on_overflow */
120 bfd_elf_generic_reloc, /* special_function */
121 "R_METAG_LOADDR16", /* name */
122 FALSE, /* partial_inplace */
123 0, /* src_mask */
124 0x0007fff8, /* dst_mask */
125 FALSE), /* pcrel_offset */
126
127 /* 32 bit absolute. */
128 HOWTO (R_METAG_ADDR32, /* type */
129 0, /* rightshift */
130 2, /* size (0 = byte, 1 = short, 2 = long) */
131 32, /* bitsize */
132 FALSE, /* pc_relative */
133 0, /* bitpos */
134 complain_overflow_bitfield, /* complain_on_overflow */
135 bfd_elf_generic_reloc, /* special_function */
136 "R_METAG_ADDR32", /* name */
137 FALSE, /* partial_inplace */
138 0x00000000, /* src_mask */
139 0xffffffff, /* dst_mask */
140 FALSE), /* pcrel_offset */
141
142 /* No relocation. */
143 HOWTO (R_METAG_NONE, /* type */
144 0, /* rightshift */
145 3, /* size (0 = byte, 1 = short, 2 = long) */
146 0, /* bitsize */
147 FALSE, /* pc_relative */
148 0, /* bitpos */
149 complain_overflow_dont, /* complain_on_overflow */
150 bfd_elf_generic_reloc, /* special_function */
151 "R_METAG_NONE", /* name */
152 FALSE, /* partial_inplace */
153 0, /* src_mask */
154 0, /* dst_mask */
155 FALSE), /* pcrel_offset */
156
157 /* 19 bit pc relative */
158 HOWTO (R_METAG_RELBRANCH, /* type */
159 2, /* rightshift */
160 2, /* size (0 = byte, 1 = short, 2 = long) */
161 19, /* bitsize */
162 TRUE, /* pc_relative */
163 5, /* bitpos */
164 complain_overflow_signed, /* complain_on_overflow */
165 bfd_elf_generic_reloc, /* special_function */
166 "R_METAG_RELBRANCH", /* name */
167 FALSE, /* partial_inplace */
168 0, /* src_mask */
169 0x00ffffe0, /* dst_mask */
170 FALSE), /* pcrel_offset */
171
172 /* GET/SET offset */
173 HOWTO (R_METAG_GETSETOFF, /* type */
174 0, /* rightshift */
175 1, /* size (0 = byte, 1 = short, 2 = long) */
176 12, /* bitsize */
177 FALSE, /* pc_relative */
178 7, /* bitpos */
179 complain_overflow_dont, /* complain_on_overflow */
180 bfd_elf_generic_reloc, /* special_function */
181 "R_METAG_GETSETOFF", /* name */
182 FALSE, /* partial_inplace */
183 0, /* src_mask */
184 0, /* dst_mask */
185 FALSE), /* pcrel_offset */
186
187 EMPTY_HOWTO (6),
188 EMPTY_HOWTO (7),
189 EMPTY_HOWTO (8),
190 EMPTY_HOWTO (9),
191 EMPTY_HOWTO (10),
192 EMPTY_HOWTO (11),
193 EMPTY_HOWTO (12),
194 EMPTY_HOWTO (13),
195 EMPTY_HOWTO (14),
196 EMPTY_HOWTO (15),
197 EMPTY_HOWTO (16),
198 EMPTY_HOWTO (17),
199 EMPTY_HOWTO (18),
200 EMPTY_HOWTO (19),
201 EMPTY_HOWTO (20),
202 EMPTY_HOWTO (21),
203 EMPTY_HOWTO (22),
204 EMPTY_HOWTO (23),
205 EMPTY_HOWTO (24),
206 EMPTY_HOWTO (25),
207 EMPTY_HOWTO (26),
208 EMPTY_HOWTO (27),
209 EMPTY_HOWTO (28),
210 EMPTY_HOWTO (29),
211
212 HOWTO (R_METAG_GNU_VTINHERIT, /* type */
213 0, /* rightshift */
214 2, /* size (0 = byte, 1 = short, 2 = long) */
215 0, /* bitsize */
216 FALSE, /* pc_relative */
217 0, /* bitpos */
218 complain_overflow_dont, /* complain_on_overflow */
219 NULL, /* special_function */
220 "R_METAG_GNU_VTINHERIT", /* name */
221 FALSE, /* partial_inplace */
222 0, /* src_mask */
223 0, /* dst_mask */
224 FALSE), /* pcrel_offset */
225
226 HOWTO (R_METAG_GNU_VTENTRY, /* type */
227 0, /* rightshift */
228 2, /* size (0 = byte, 1 = short, 2 = long) */
229 0, /* bitsize */
230 FALSE, /* pc_relative */
231 0, /* bitpos */
232 complain_overflow_dont, /* complain_on_overflow */
233 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
234 "R_METAG_GNU_VTENTRY", /* name */
235 FALSE, /* partial_inplace */
236 0, /* src_mask */
237 0, /* dst_mask */
238 FALSE), /* pcrel_offset */
239
240 /* High order 16 bit GOT offset */
241 HOWTO (R_METAG_HI16_GOTOFF, /* type */
242 16, /* rightshift */
243 2, /* size (0 = byte, 1 = short, 2 = long) */
244 16, /* bitsize */
245 FALSE, /* pc_relative */
246 3, /* bitpos */
247 complain_overflow_dont, /* complain_on_overflow */
248 bfd_elf_generic_reloc, /* special_function */
249 "R_METAG_HI16_GOTOFF", /* name */
250 FALSE, /* partial_inplace */
251 0, /* src_mask */
252 0x0007fff8, /* dst_mask */
253 FALSE), /* pcrel_offset */
254
255 /* Low order 16 bit GOT offset */
256 HOWTO (R_METAG_LO16_GOTOFF, /* type */
257 0, /* rightshift */
258 2, /* size (0 = byte, 1 = short, 2 = long) */
259 16, /* bitsize */
260 FALSE, /* pc_relative */
261 3, /* bitpos */
262 complain_overflow_dont, /* complain_on_overflow */
263 bfd_elf_generic_reloc, /* special_function */
264 "R_METAG_LO16_GOTOFF", /* name */
265 FALSE, /* partial_inplace */
266 0, /* src_mask */
267 0x0007fff8, /* dst_mask */
268 FALSE), /* pcrel_offset */
269
270 /* GET/SET GOT offset */
271 HOWTO (R_METAG_GETSET_GOTOFF, /* type */
272 0, /* rightshift */
273 1, /* size (0 = byte, 1 = short, 2 = long) */
274 12, /* bitsize */
275 FALSE, /* pc_relative */
276 7, /* bitpos */
277 complain_overflow_dont, /* complain_on_overflow */
278 bfd_elf_generic_reloc, /* special_function */
279 "R_METAG_GETSET_GOTOFF", /* name */
280 FALSE, /* partial_inplace */
281 0, /* src_mask */
282 0, /* dst_mask */
283 FALSE), /* pcrel_offset */
284
285 /* GET/SET GOT relative */
286 HOWTO (R_METAG_GETSET_GOT, /* type */
287 0, /* rightshift */
288 1, /* size (0 = byte, 1 = short, 2 = long) */
289 12, /* bitsize */
290 FALSE, /* pc_relative */
291 7, /* bitpos */
292 complain_overflow_dont, /* complain_on_overflow */
293 bfd_elf_generic_reloc, /* special_function */
294 "R_METAG_GETSET_GOT", /* name */
295 FALSE, /* partial_inplace */
296 0, /* src_mask */
297 0, /* dst_mask */
298 FALSE), /* pcrel_offset */
299
300 /* High order 16 bit GOT reference */
301 HOWTO (R_METAG_HI16_GOTPC, /* type */
302 16, /* rightshift */
303 2, /* size (0 = byte, 1 = short, 2 = long) */
304 16, /* bitsize */
305 FALSE, /* pc_relative */
306 3, /* bitpos */
307 complain_overflow_dont, /* complain_on_overflow */
308 bfd_elf_generic_reloc, /* special_function */
309 "R_METAG_HI16_GOTPC", /* name */
310 FALSE, /* partial_inplace */
311 0, /* src_mask */
312 0x0007fff8, /* dst_mask */
313 FALSE), /* pcrel_offset */
314
315 /* Low order 16 bit GOT reference */
316 HOWTO (R_METAG_LO16_GOTPC, /* type */
317 0, /* rightshift */
318 2, /* size (0 = byte, 1 = short, 2 = long) */
319 16, /* bitsize */
320 FALSE, /* pc_relative */
321 3, /* bitpos */
322 complain_overflow_dont, /* complain_on_overflow */
323 bfd_elf_generic_reloc, /* special_function */
324 "R_METAG_LO16_GOTPC", /* name */
325 FALSE, /* partial_inplace */
326 0, /* src_mask */
327 0x0007fff8, /* dst_mask */
328 FALSE), /* pcrel_offset */
329
330 /* High order 16 bit PLT */
331 HOWTO (R_METAG_HI16_PLT, /* type */
332 16, /* rightshift */
333 2, /* size (0 = byte, 1 = short, 2 = long) */
334 16, /* bitsize */
335 FALSE, /* pc_relative */
336 3, /* bitpos */
337 complain_overflow_dont, /* complain_on_overflow */
338 bfd_elf_generic_reloc, /* special_function */
339 "R_METAG_HI16_PLT", /* name */
340 FALSE, /* partial_inplace */
341 0, /* src_mask */
342 0x0007fff8, /* dst_mask */
343 FALSE), /* pcrel_offset */
344
345 /* Low order 16 bit PLT */
346 HOWTO (R_METAG_LO16_PLT, /* type */
347 0, /* rightshift */
348 2, /* size (0 = byte, 1 = short, 2 = long) */
349 16, /* bitsize */
350 FALSE, /* pc_relative */
351 3, /* bitpos */
352 complain_overflow_dont, /* complain_on_overflow */
353 bfd_elf_generic_reloc, /* special_function */
354 "R_METAG_LO16_PLT", /* name */
355 FALSE, /* partial_inplace */
356 0, /* src_mask */
357 0xffffffff, /* dst_mask */
358 FALSE), /* pcrel_offset */
359
360 HOWTO (R_METAG_RELBRANCH_PLT, /* type */
361 2, /* rightshift */
362 2, /* size (0 = byte, 1 = short, 2 = long) */
363 19, /* bitsize */
364 TRUE, /* pc_relative */
365 5, /* bitpos */
366 complain_overflow_signed, /* complain_on_overflow */
367 bfd_elf_generic_reloc, /* special_function */
368 "R_METAG_RELBRANCH_PLT", /* name */
369 FALSE, /* partial_inplace */
370 0, /* src_mask */
371 0x00ffffe0, /* dst_mask */
372 FALSE), /* pcrel_offset */
373
374 /* Dummy relocs used by the linker internally. */
375 HOWTO (R_METAG_GOTOFF, /* type */
376 0, /* rightshift */
377 2, /* size (0 = byte, 1 = short, 2 = long) */
378 32, /* bitsize */
379 FALSE, /* pc_relative */
380 0, /* bitpos */
381 complain_overflow_bitfield, /* complain_on_overflow */
382 bfd_elf_generic_reloc, /* special_function */
383 "R_METAG_GOTOFF", /* name */
384 FALSE, /* partial_inplace */
385 0xffffffff, /* src_mask */
386 0xffffffff, /* dst_mask */
387 FALSE), /* pcrel_offset */
388
389 HOWTO (R_METAG_PLT, /* type */
390 0, /* rightshift */
391 2, /* size (0 = byte, 1 = short, 2 = long) */
392 32, /* bitsize */
393 FALSE, /* pc_relative */
394 0, /* bitpos */
395 complain_overflow_bitfield, /* complain_on_overflow */
396 bfd_elf_generic_reloc, /* special_function */
397 "R_METAG_GOTOFF", /* name */
398 FALSE, /* partial_inplace */
399 0xffffffff, /* src_mask */
400 0xffffffff, /* dst_mask */
401 FALSE), /* pcrel_offset */
402
403 /* This is used only by the dynamic linker. The symbol should exist
404 both in the object being run and in some shared library. The
405 dynamic linker copies the data addressed by the symbol from the
406 shared library into the object, because the object being
407 run has to have the data at some particular address. */
408 HOWTO (R_METAG_COPY, /* type */
409 0, /* rightshift */
410 2, /* size (0 = byte, 1 = short, 2 = long) */
411 32, /* bitsize */
412 FALSE, /* pc_relative */
413 0, /* bitpos */
414 complain_overflow_bitfield, /* complain_on_overflow */
415 bfd_elf_generic_reloc, /* special_function */
416 "R_METAG_COPY", /* name */
417 FALSE, /* partial_inplace */
418 0xffffffff, /* src_mask */
419 0xffffffff, /* dst_mask */
420 FALSE), /* pcrel_offset */
421
422 /* Marks a procedure linkage table entry for a symbol. */
423 HOWTO (R_METAG_JMP_SLOT, /* type */
424 0, /* rightshift */
425 2, /* size (0 = byte, 1 = short, 2 = long) */
426 32, /* bitsize */
427 FALSE, /* pc_relative */
428 0, /* bitpos */
429 complain_overflow_bitfield, /* complain_on_overflow */
430 bfd_elf_generic_reloc, /* special_function */
431 "R_METAG_JMP_SLOT", /* name */
432 FALSE, /* partial_inplace */
433 0xffffffff, /* src_mask */
434 0xffffffff, /* dst_mask */
435 FALSE), /* pcrel_offset */
436
437 /* Used only by the dynamic linker. When the object is run, this
438 longword is set to the load address of the object, plus the
439 addend. */
440 HOWTO (R_METAG_RELATIVE, /* type */
441 0, /* rightshift */
442 2, /* size (0 = byte, 1 = short, 2 = long) */
443 32, /* bitsize */
444 FALSE, /* pc_relative */
445 0, /* bitpos */
446 complain_overflow_bitfield, /* complain_on_overflow */
447 bfd_elf_generic_reloc, /* special_function */
448 "R_METAG_RELATIVE", /* name */
449 FALSE, /* partial_inplace */
450 0xffffffff, /* src_mask */
451 0xffffffff, /* dst_mask */
452 FALSE), /* pcrel_offset */
453
454 HOWTO (R_METAG_GLOB_DAT, /* type */
455 0, /* rightshift */
456 2, /* size (0 = byte, 1 = short, 2 = long) */
457 32, /* bitsize */
458 FALSE, /* pc_relative */
459 0, /* bitpos */
460 complain_overflow_bitfield, /* complain_on_overflow */
461 bfd_elf_generic_reloc, /* special_function */
462 "R_METAG_GLOB_DAT", /* name */
463 FALSE, /* partial_inplace */
464 0xffffffff, /* src_mask */
465 0xffffffff, /* dst_mask */
466 FALSE), /* pcrel_offset */
467
468 HOWTO (R_METAG_TLS_GD, /* type */
469 0, /* rightshift */
470 2, /* size (0 = byte, 1 = short, 2 = long) */
471 16, /* bitsize */
472 FALSE, /* pc_relative */
473 3, /* bitpos */
474 complain_overflow_dont, /* complain_on_overflow */
475 bfd_elf_generic_reloc, /* special_function */
476 "R_METAG_TLS_GD", /* name */
477 FALSE, /* partial_inplace */
478 0, /* src_mask */
479 0x0007fff8, /* dst_mask */
480 FALSE), /* pcrel_offset */
481
482 HOWTO (R_METAG_TLS_LDM, /* type */
483 0, /* rightshift */
484 2, /* size (0 = byte, 1 = short, 2 = long) */
485 16, /* bitsize */
486 FALSE, /* pc_relative */
487 3, /* bitpos */
488 complain_overflow_bitfield, /* complain_on_overflow */
489 bfd_elf_generic_reloc, /* special_function */
490 "R_METAG_TLS_LDM", /* name */
491 FALSE, /* partial_inplace */
492 0, /* src_mask */
493 0x0007fff8, /* dst_mask */
494 FALSE), /* pcrel_offset */
495
496 HOWTO (R_METAG_TLS_LDO_HI16, /* type */
497 16, /* rightshift */
498 2, /* size (0 = byte, 1 = short, 2 = long) */
499 16, /* bitsize */
500 FALSE, /* pc_relative */
501 3, /* bitpos */
502 complain_overflow_bitfield, /* complain_on_overflow */
503 bfd_elf_generic_reloc, /* special_function */
504 "R_METAG_TLS_LDO_HI16", /* name */
505 FALSE, /* partial_inplace */
506 0, /* src_mask */
507 0x0007fff8, /* dst_mask */
508 FALSE), /* pcrel_offset */
509
510 HOWTO (R_METAG_TLS_LDO_LO16, /* type */
511 0, /* rightshift */
512 2, /* size (0 = byte, 1 = short, 2 = long) */
513 16, /* bitsize */
514 FALSE, /* pc_relative */
515 3, /* bitpos */
516 complain_overflow_bitfield, /* complain_on_overflow */
517 bfd_elf_generic_reloc, /* special_function */
518 "R_METAG_TLS_LDO_LO16", /* name */
519 FALSE, /* partial_inplace */
520 0, /* src_mask */
521 0x0007fff8, /* dst_mask */
522 FALSE), /* pcrel_offset */
523
524 /* Dummy reloc used by the linker internally. */
525 HOWTO (R_METAG_TLS_LDO, /* type */
526 0, /* rightshift */
527 2, /* size (0 = byte, 1 = short, 2 = long) */
528 16, /* bitsize */
529 FALSE, /* pc_relative */
530 3, /* bitpos */
531 complain_overflow_bitfield, /* complain_on_overflow */
532 bfd_elf_generic_reloc, /* special_function */
533 "R_METAG_TLS_LDO", /* name */
534 FALSE, /* partial_inplace */
535 0, /* src_mask */
536 0x0007fff8, /* dst_mask */
537 FALSE), /* pcrel_offset */
538
539 HOWTO (R_METAG_TLS_IE, /* type */
540 2, /* rightshift */
541 2, /* size (0 = byte, 1 = short, 2 = long) */
542 12, /* bitsize */
543 FALSE, /* pc_relative */
544 7, /* bitpos */
545 complain_overflow_dont, /* complain_on_overflow */
546 bfd_elf_generic_reloc, /* special_function */
547 "R_METAG_TLS_IE", /* name */
548 FALSE, /* partial_inplace */
549 0, /* src_mask */
550 0x0007ff80, /* dst_mask */
551 FALSE), /* pcrel_offset */
552
553 /* Dummy reloc used by the linker internally. */
554 HOWTO (R_METAG_TLS_IENONPIC, /* type */
555 0, /* rightshift */
556 2, /* size (0 = byte, 1 = short, 2 = long) */
557 16, /* bitsize */
558 FALSE, /* pc_relative */
559 3, /* bitpos */
560 complain_overflow_dont, /* complain_on_overflow */
561 bfd_elf_generic_reloc, /* special_function */
562 "R_METAG_TLS_IENONPIC", /* name */
563 FALSE, /* partial_inplace */
564 0, /* src_mask */
565 0x0007fff8, /* dst_mask */
566 FALSE), /* pcrel_offset */
567
568 HOWTO (R_METAG_TLS_IENONPIC_HI16,/* type */
569 16, /* rightshift */
570 2, /* size (0 = byte, 1 = short, 2 = long) */
571 16, /* bitsize */
572 FALSE, /* pc_relative */
573 3, /* bitpos */
574 complain_overflow_dont, /* complain_on_overflow */
575 bfd_elf_generic_reloc, /* special_function */
576 "R_METAG_TLS_IENONPIC_HI16", /* name */
577 FALSE, /* partial_inplace */
578 0, /* src_mask */
579 0x0007fff8, /* dst_mask */
580 FALSE), /* pcrel_offset */
581
582 HOWTO (R_METAG_TLS_IENONPIC_LO16,/* type */
583 0, /* rightshift */
584 2, /* size (0 = byte, 1 = short, 2 = long) */
585 16, /* bitsize */
586 FALSE, /* pc_relative */
587 3, /* bitpos */
588 complain_overflow_dont, /* complain_on_overflow */
589 bfd_elf_generic_reloc, /* special_function */
590 "R_METAG_TLS_IENONPIC_LO16", /* name */
591 FALSE, /* partial_inplace */
592 0, /* src_mask */
593 0x0007fff8, /* dst_mask */
594 FALSE), /* pcrel_offset */
595
596 HOWTO (R_METAG_TLS_TPOFF, /* type */
597 0, /* rightshift */
598 2, /* size (0 = byte, 1 = short, 2 = long) */
599 32, /* bitsize */
600 FALSE, /* pc_relative */
601 0, /* bitpos */
602 complain_overflow_bitfield, /* complain_on_overflow */
603 bfd_elf_generic_reloc, /* special_function */
604 "R_METAG_TLS_TPOFF", /* name */
605 FALSE, /* partial_inplace */
606 0, /* src_mask */
607 0xffffffff, /* dst_mask */
608 FALSE), /* pcrel_offset */
609
610 HOWTO (R_METAG_TLS_DTPMOD, /* type */
611 0, /* rightshift */
612 2, /* size (0 = byte, 1 = short, 2 = long) */
613 32, /* bitsize */
614 FALSE, /* pc_relative */
615 0, /* bitpos */
616 complain_overflow_bitfield, /* complain_on_overflow */
617 bfd_elf_generic_reloc, /* special_function */
618 "R_METAG_TLS_DTPMOD", /* name */
619 FALSE, /* partial_inplace */
620 0, /* src_mask */
621 0xffffffff, /* dst_mask */
622 FALSE), /* pcrel_offset */
623
624 HOWTO (R_METAG_TLS_DTPOFF, /* type */
625 0, /* rightshift */
626 2, /* size (0 = byte, 1 = short, 2 = long) */
627 32, /* bitsize */
628 FALSE, /* pc_relative */
629 0, /* bitpos */
630 complain_overflow_bitfield, /* complain_on_overflow */
631 bfd_elf_generic_reloc, /* special_function */
632 "R_METAG_TLS_DTPOFF", /* name */
633 FALSE, /* partial_inplace */
634 0, /* src_mask */
635 0xffffffff, /* dst_mask */
636 FALSE), /* pcrel_offset */
637
638 /* Dummy reloc used by the linker internally. */
639 HOWTO (R_METAG_TLS_LE, /* type */
640 0, /* rightshift */
641 2, /* size (0 = byte, 1 = short, 2 = long) */
642 32, /* bitsize */
643 FALSE, /* pc_relative */
644 0, /* bitpos */
645 complain_overflow_bitfield, /* complain_on_overflow */
646 bfd_elf_generic_reloc, /* special_function */
647 "R_METAG_TLS_LE", /* name */
648 FALSE, /* partial_inplace */
649 0, /* src_mask */
650 0xffffffff, /* dst_mask */
651 FALSE), /* pcrel_offset */
652
653 HOWTO (R_METAG_TLS_LE_HI16, /* type */
654 16, /* rightshift */
655 2, /* size (0 = byte, 1 = short, 2 = long) */
656 16, /* bitsize */
657 FALSE, /* pc_relative */
658 3, /* bitpos */
659 complain_overflow_dont, /* complain_on_overflow */
660 bfd_elf_generic_reloc, /* special_function */
661 "R_METAG_TLS_LE_HI16", /* name */
662 FALSE, /* partial_inplace */
663 0, /* src_mask */
664 0x0007fff8, /* dst_mask */
665 FALSE), /* pcrel_offset */
666
667 HOWTO (R_METAG_TLS_LE_LO16, /* type */
668 0, /* rightshift */
669 2, /* size (0 = byte, 1 = short, 2 = long) */
670 16, /* bitsize */
671 FALSE, /* pc_relative */
672 3, /* bitpos */
673 complain_overflow_dont, /* complain_on_overflow */
674 bfd_elf_generic_reloc, /* special_function */
675 "R_METAG_TLS_LE_LO16", /* name */
676 FALSE, /* partial_inplace */
677 0, /* src_mask */
678 0x0007fff8, /* dst_mask */
679 FALSE), /* pcrel_offset */
680
681 };
682
683 #define BRANCH_BITS 19
684
685 /* The GOT is typically accessed using a [GS]ETD instruction. The size of the
686 immediate offset which can be used in such instructions therefore limits
687 the usable size of the GOT. If the base register for the [GS]ETD (A1LbP)
688 is pointing to the base of the GOT then the size is limited to the maximum
689 11 bits unsigned dword offset, or 2^13 = 0x2000 bytes. However the offset
690 in a [GS]ETD instruction is signed, so by setting the base address register
691 to an offset of that 0x2000 byte maximum unsigned offset from the base of
692 the GOT we can use negative offsets in addition to positive. This
693 effectively doubles the usable GOT size to 0x4000 bytes. */
694 #define GOT_REG_OFFSET 0x2000
695
696 struct metag_reloc_map
697 {
698 bfd_reloc_code_real_type bfd_reloc_val;
699 unsigned int metag_reloc_val;
700 };
701
702 static const struct metag_reloc_map metag_reloc_map [] =
703 {
704 { BFD_RELOC_NONE, R_METAG_NONE },
705 { BFD_RELOC_32, R_METAG_ADDR32 },
706 { BFD_RELOC_METAG_HIADDR16, R_METAG_HIADDR16 },
707 { BFD_RELOC_METAG_LOADDR16, R_METAG_LOADDR16 },
708 { BFD_RELOC_METAG_RELBRANCH, R_METAG_RELBRANCH },
709 { BFD_RELOC_METAG_GETSETOFF, R_METAG_GETSETOFF },
710 { BFD_RELOC_VTABLE_INHERIT, R_METAG_GNU_VTINHERIT },
711 { BFD_RELOC_VTABLE_ENTRY, R_METAG_GNU_VTENTRY },
712 { BFD_RELOC_METAG_REL8, R_METAG_REL8 },
713 { BFD_RELOC_METAG_REL16, R_METAG_REL16 },
714 { BFD_RELOC_METAG_HI16_GOTOFF, R_METAG_HI16_GOTOFF },
715 { BFD_RELOC_METAG_LO16_GOTOFF, R_METAG_LO16_GOTOFF },
716 { BFD_RELOC_METAG_GETSET_GOTOFF, R_METAG_GETSET_GOTOFF },
717 { BFD_RELOC_METAG_GETSET_GOT, R_METAG_GETSET_GOT },
718 { BFD_RELOC_METAG_HI16_GOTPC, R_METAG_HI16_GOTPC },
719 { BFD_RELOC_METAG_LO16_GOTPC, R_METAG_LO16_GOTPC },
720 { BFD_RELOC_METAG_HI16_PLT, R_METAG_HI16_PLT },
721 { BFD_RELOC_METAG_LO16_PLT, R_METAG_LO16_PLT },
722 { BFD_RELOC_METAG_RELBRANCH_PLT, R_METAG_RELBRANCH_PLT },
723 { BFD_RELOC_METAG_GOTOFF, R_METAG_GOTOFF },
724 { BFD_RELOC_METAG_PLT, R_METAG_PLT },
725 { BFD_RELOC_METAG_COPY, R_METAG_COPY },
726 { BFD_RELOC_METAG_JMP_SLOT, R_METAG_JMP_SLOT },
727 { BFD_RELOC_METAG_RELATIVE, R_METAG_RELATIVE },
728 { BFD_RELOC_METAG_GLOB_DAT, R_METAG_GLOB_DAT },
729 { BFD_RELOC_METAG_TLS_GD, R_METAG_TLS_GD },
730 { BFD_RELOC_METAG_TLS_LDM, R_METAG_TLS_LDM },
731 { BFD_RELOC_METAG_TLS_LDO_HI16, R_METAG_TLS_LDO_HI16 },
732 { BFD_RELOC_METAG_TLS_LDO_LO16, R_METAG_TLS_LDO_LO16 },
733 { BFD_RELOC_METAG_TLS_LDO, R_METAG_TLS_LDO },
734 { BFD_RELOC_METAG_TLS_IE, R_METAG_TLS_IE },
735 { BFD_RELOC_METAG_TLS_IENONPIC, R_METAG_TLS_IENONPIC },
736 { BFD_RELOC_METAG_TLS_IENONPIC_HI16, R_METAG_TLS_IENONPIC_HI16 },
737 { BFD_RELOC_METAG_TLS_IENONPIC_LO16, R_METAG_TLS_IENONPIC_LO16 },
738 { BFD_RELOC_METAG_TLS_TPOFF, R_METAG_TLS_TPOFF },
739 { BFD_RELOC_METAG_TLS_DTPMOD, R_METAG_TLS_DTPMOD },
740 { BFD_RELOC_METAG_TLS_DTPOFF, R_METAG_TLS_DTPOFF },
741 { BFD_RELOC_METAG_TLS_LE, R_METAG_TLS_LE },
742 { BFD_RELOC_METAG_TLS_LE_HI16, R_METAG_TLS_LE_HI16 },
743 { BFD_RELOC_METAG_TLS_LE_LO16, R_METAG_TLS_LE_LO16 },
744 };
745
746 enum elf_metag_stub_type
747 {
748 metag_stub_long_branch,
749 metag_stub_long_branch_shared,
750 metag_stub_none
751 };
752
753 struct elf_metag_stub_hash_entry
754 {
755 /* Base hash table entry structure. */
756 struct bfd_hash_entry bh_root;
757
758 /* The stub section. */
759 asection *stub_sec;
760
761 /* Offset within stub_sec of the beginning of this stub. */
762 bfd_vma stub_offset;
763
764 /* Given the symbol's value and its section we can determine its final
765 value when building the stubs (so the stub knows where to jump. */
766 bfd_vma target_value;
767 asection *target_section;
768
769 enum elf_metag_stub_type stub_type;
770
771 /* The symbol table entry, if any, that this was derived from. */
772 struct elf_metag_link_hash_entry *hh;
773
774 /* And the reloc addend that this was derived from. */
775 bfd_vma addend;
776
777 /* Where this stub is being called from, or, in the case of combined
778 stub sections, the first input section in the group. */
779 asection *id_sec;
780 };
781
782 struct elf_metag_link_hash_entry
783 {
784 struct elf_link_hash_entry eh;
785
786 /* A pointer to the most recently used stub hash entry against this
787 symbol. */
788 struct elf_metag_stub_hash_entry *hsh_cache;
789
790 /* Used to count relocations for delayed sizing of relocation
791 sections. */
792 struct elf_metag_dyn_reloc_entry {
793
794 /* Next relocation in the chain. */
795 struct elf_metag_dyn_reloc_entry *hdh_next;
796
797 /* The input section of the reloc. */
798 asection *sec;
799
800 /* Number of relocs copied in this section. */
801 bfd_size_type count;
802
803 /* Number of relative relocs copied for the input section. */
804 bfd_size_type relative_count;
805 } *dyn_relocs;
806
807 enum
808 {
809 GOT_UNKNOWN = 0, GOT_NORMAL = 1, GOT_TLS_IE = 2, GOT_TLS_LDM = 4, GOT_TLS_GD = 8
810 } tls_type;
811 };
812
813 struct elf_metag_link_hash_table
814 {
815 /* The main hash table. */
816 struct elf_link_hash_table etab;
817
818 /* The stub hash table. */
819 struct bfd_hash_table bstab;
820
821 /* Linker stub bfd. */
822 bfd *stub_bfd;
823
824 /* Linker call-backs. */
825 asection * (*add_stub_section) (const char *, asection *);
826 void (*layout_sections_again) (void);
827
828 /* Array to keep track of which stub sections have been created, and
829 information on stub grouping. */
830 struct map_stub
831 {
832 /* This is the section to which stubs in the group will be
833 attached. */
834 asection *link_sec;
835 /* The stub section. */
836 asection *stub_sec;
837 } *stub_group;
838
839 /* Assorted information used by elf_metag_size_stubs. */
840 unsigned int bfd_count;
841 unsigned int top_index;
842 asection **input_list;
843 Elf_Internal_Sym **all_local_syms;
844
845 /* Short-cuts to get to dynamic linker sections. */
846 asection *sgot;
847 asection *sgotplt;
848 asection *srelgot;
849 asection *splt;
850 asection *srelplt;
851 asection *sdynbss;
852 asection *srelbss;
853
854 /* Small local sym cache. */
855 struct sym_cache sym_cache;
856
857 /* Data for LDM relocations. */
858 union
859 {
860 bfd_signed_vma refcount;
861 bfd_vma offset;
862 } tls_ldm_got;
863 };
864
865 /* Return the base vma address which should be subtracted from the
866 real address when resolving a dtpoff relocation. This is PT_TLS
867 segment p_vaddr. */
868 static bfd_vma
869 dtpoff_base (struct bfd_link_info *info)
870 {
871 /* If tls_sec is NULL, we should have signalled an error already. */
872 if (elf_hash_table (info)->tls_sec == NULL)
873 return 0;
874 return elf_hash_table (info)->tls_sec->vma;
875 }
876
877 /* Return the relocation value for R_METAG_TLS_IE */
878 static bfd_vma
879 tpoff (struct bfd_link_info *info, bfd_vma address)
880 {
881 /* If tls_sec is NULL, we should have signalled an error already. */
882 if (elf_hash_table (info)->tls_sec == NULL)
883 return 0;
884 /* METAG TLS ABI is variant I and static TLS blocks start just after
885 tcbhead structure which has 2 pointer fields. */
886 return (address - elf_hash_table (info)->tls_sec->vma
887 + align_power ((bfd_vma) 8,
888 elf_hash_table (info)->tls_sec->alignment_power));
889 }
890
891 static void
892 metag_info_to_howto_rela (bfd *abfd ATTRIBUTE_UNUSED,
893 arelent *cache_ptr,
894 Elf_Internal_Rela *dst)
895 {
896 unsigned int r_type;
897
898 r_type = ELF32_R_TYPE (dst->r_info);
899 if (r_type >= (unsigned int) R_METAG_MAX)
900 {
901 /* xgettext:c-format */
902 _bfd_error_handler (_("%B: invalid METAG reloc number: %d"), abfd, r_type);
903 r_type = 0;
904 }
905 cache_ptr->howto = & elf_metag_howto_table [r_type];
906 }
907
908 static reloc_howto_type *
909 metag_reloc_type_lookup (bfd * abfd ATTRIBUTE_UNUSED,
910 bfd_reloc_code_real_type code)
911 {
912 unsigned int i;
913
914 for (i = 0; i < sizeof (metag_reloc_map) / sizeof (metag_reloc_map[0]); i++)
915 if (metag_reloc_map [i].bfd_reloc_val == code)
916 return & elf_metag_howto_table [metag_reloc_map[i].metag_reloc_val];
917
918 return NULL;
919 }
920
921 static reloc_howto_type *
922 metag_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
923 const char *r_name)
924 {
925 unsigned int i;
926
927 for (i = 0; i < sizeof (elf_metag_howto_table) / sizeof (elf_metag_howto_table[0]); i++)
928 if (elf_metag_howto_table[i].name != NULL
929 && strcasecmp (elf_metag_howto_table[i].name, r_name) == 0)
930 return &elf_metag_howto_table[i];
931
932 return NULL;
933 }
934
935 /* Various hash macros and functions. */
936 #define metag_link_hash_table(p) \
937 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
938 == METAG_ELF_DATA ? ((struct elf_metag_link_hash_table *) ((p)->hash)) : NULL)
939
940 #define metag_elf_hash_entry(ent) \
941 ((struct elf_metag_link_hash_entry *)(ent))
942
943 #define metag_stub_hash_entry(ent) \
944 ((struct elf_metag_stub_hash_entry *)(ent))
945
946 #define metag_stub_hash_lookup(table, string, create, copy) \
947 ((struct elf_metag_stub_hash_entry *) \
948 bfd_hash_lookup ((table), (string), (create), (copy)))
949
950 #define metag_elf_local_got_tls_type(abfd) \
951 ((char *)(elf_local_got_offsets (abfd) + (elf_tdata (abfd)->symtab_hdr.sh_info)))
952
953 /* Assorted hash table functions. */
954
955 /* Initialize an entry in the stub hash table. */
956
957 static struct bfd_hash_entry *
958 stub_hash_newfunc (struct bfd_hash_entry *entry,
959 struct bfd_hash_table *table,
960 const char *string)
961 {
962 /* Allocate the structure if it has not already been allocated by a
963 subclass. */
964 if (entry == NULL)
965 {
966 entry = bfd_hash_allocate (table,
967 sizeof (struct elf_metag_stub_hash_entry));
968 if (entry == NULL)
969 return entry;
970 }
971
972 /* Call the allocation method of the superclass. */
973 entry = bfd_hash_newfunc (entry, table, string);
974 if (entry != NULL)
975 {
976 struct elf_metag_stub_hash_entry *hsh;
977
978 /* Initialize the local fields. */
979 hsh = (struct elf_metag_stub_hash_entry *) entry;
980 hsh->stub_sec = NULL;
981 hsh->stub_offset = 0;
982 hsh->target_value = 0;
983 hsh->target_section = NULL;
984 hsh->stub_type = metag_stub_long_branch;
985 hsh->hh = NULL;
986 hsh->id_sec = NULL;
987 }
988
989 return entry;
990 }
991
992 /* Initialize an entry in the link hash table. */
993
994 static struct bfd_hash_entry *
995 metag_link_hash_newfunc (struct bfd_hash_entry *entry,
996 struct bfd_hash_table *table,
997 const char *string)
998 {
999 /* Allocate the structure if it has not already been allocated by a
1000 subclass. */
1001 if (entry == NULL)
1002 {
1003 entry = bfd_hash_allocate (table,
1004 sizeof (struct elf_metag_link_hash_entry));
1005 if (entry == NULL)
1006 return entry;
1007 }
1008
1009 /* Call the allocation method of the superclass. */
1010 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
1011 if (entry != NULL)
1012 {
1013 struct elf_metag_link_hash_entry *hh;
1014
1015 /* Initialize the local fields. */
1016 hh = (struct elf_metag_link_hash_entry *) entry;
1017 hh->hsh_cache = NULL;
1018 hh->dyn_relocs = NULL;
1019 hh->tls_type = GOT_UNKNOWN;
1020 }
1021
1022 return entry;
1023 }
1024
1025 /* Free the derived linker hash table. */
1026
1027 static void
1028 elf_metag_link_hash_table_free (bfd *obfd)
1029 {
1030 struct elf_metag_link_hash_table *htab
1031 = (struct elf_metag_link_hash_table *) obfd->link.hash;
1032
1033 bfd_hash_table_free (&htab->bstab);
1034 _bfd_elf_link_hash_table_free (obfd);
1035 }
1036
1037 /* Create the derived linker hash table. The Meta ELF port uses the derived
1038 hash table to keep information specific to the Meta ELF linker (without
1039 using static variables). */
1040
1041 static struct bfd_link_hash_table *
1042 elf_metag_link_hash_table_create (bfd *abfd)
1043 {
1044 struct elf_metag_link_hash_table *htab;
1045 bfd_size_type amt = sizeof (*htab);
1046
1047 htab = bfd_zmalloc (amt);
1048 if (htab == NULL)
1049 return NULL;
1050
1051 if (!_bfd_elf_link_hash_table_init (&htab->etab, abfd,
1052 metag_link_hash_newfunc,
1053 sizeof (struct elf_metag_link_hash_entry),
1054 METAG_ELF_DATA))
1055 {
1056 free (htab);
1057 return NULL;
1058 }
1059
1060 /* Init the stub hash table too. */
1061 if (!bfd_hash_table_init (&htab->bstab, stub_hash_newfunc,
1062 sizeof (struct elf_metag_stub_hash_entry)))
1063 {
1064 _bfd_elf_link_hash_table_free (abfd);
1065 return NULL;
1066 }
1067 htab->etab.root.hash_table_free = elf_metag_link_hash_table_free;
1068
1069 return &htab->etab.root;
1070 }
1071
1072 /* Section name for stubs is the associated section name plus this
1073 string. */
1074 #define STUB_SUFFIX ".stub"
1075
1076 /* Build a name for an entry in the stub hash table. */
1077
1078 static char *
1079 metag_stub_name (const asection *input_section,
1080 const asection *sym_sec,
1081 const struct elf_metag_link_hash_entry *hh,
1082 const Elf_Internal_Rela *rel)
1083 {
1084 char *stub_name;
1085 bfd_size_type len;
1086
1087 if (hh)
1088 {
1089 len = 8 + 1 + strlen (hh->eh.root.root.string) + 1 + 8 + 1;
1090 stub_name = bfd_malloc (len);
1091 if (stub_name != NULL)
1092 {
1093 sprintf (stub_name, "%08x_%s+%x",
1094 input_section->id & 0xffffffff,
1095 hh->eh.root.root.string,
1096 (int) rel->r_addend & 0xffffffff);
1097 }
1098 }
1099 else
1100 {
1101 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
1102 stub_name = bfd_malloc (len);
1103 if (stub_name != NULL)
1104 {
1105 sprintf (stub_name, "%08x_%x:%x+%x",
1106 input_section->id & 0xffffffff,
1107 sym_sec->id & 0xffffffff,
1108 (int) ELF32_R_SYM (rel->r_info) & 0xffffffff,
1109 (int) rel->r_addend & 0xffffffff);
1110 }
1111 }
1112 return stub_name;
1113 }
1114
1115 /* Look up an entry in the stub hash. Stub entries are cached because
1116 creating the stub name takes a bit of time. */
1117
1118 static struct elf_metag_stub_hash_entry *
1119 metag_get_stub_entry (const asection *input_section,
1120 const asection *sym_sec,
1121 struct elf_metag_link_hash_entry *hh,
1122 const Elf_Internal_Rela *rel,
1123 struct elf_metag_link_hash_table *htab)
1124 {
1125 struct elf_metag_stub_hash_entry *hsh;
1126 const asection *id_sec;
1127
1128 /* If this input section is part of a group of sections sharing one
1129 stub section, then use the id of the first section in the group.
1130 Stub names need to include a section id, as there may well be
1131 more than one stub used to reach say, printf, and we need to
1132 distinguish between them. */
1133 id_sec = htab->stub_group[input_section->id].link_sec;
1134
1135 if (hh != NULL && hh->hsh_cache != NULL
1136 && hh->hsh_cache->hh == hh
1137 && hh->hsh_cache->id_sec == id_sec)
1138 {
1139 hsh = hh->hsh_cache;
1140 }
1141 else
1142 {
1143 char *stub_name;
1144
1145 stub_name = metag_stub_name (id_sec, sym_sec, hh, rel);
1146 if (stub_name == NULL)
1147 return NULL;
1148
1149 hsh = metag_stub_hash_lookup (&htab->bstab,
1150 stub_name, FALSE, FALSE);
1151
1152 if (hh != NULL)
1153 hh->hsh_cache = hsh;
1154
1155 free (stub_name);
1156 }
1157
1158 return hsh;
1159 }
1160
1161 /* Add a new stub entry to the stub hash. Not all fields of the new
1162 stub entry are initialised. */
1163
1164 static struct elf_metag_stub_hash_entry *
1165 metag_add_stub (const char *stub_name,
1166 asection *section,
1167 struct elf_metag_link_hash_table *htab)
1168 {
1169 asection *link_sec;
1170 asection *stub_sec;
1171 struct elf_metag_stub_hash_entry *hsh;
1172
1173 link_sec = htab->stub_group[section->id].link_sec;
1174 stub_sec = htab->stub_group[section->id].stub_sec;
1175 if (stub_sec == NULL)
1176 {
1177 stub_sec = htab->stub_group[link_sec->id].stub_sec;
1178 if (stub_sec == NULL)
1179 {
1180 size_t namelen;
1181 bfd_size_type len;
1182 char *s_name;
1183
1184 namelen = strlen (link_sec->name);
1185 len = namelen + sizeof (STUB_SUFFIX);
1186 s_name = bfd_alloc (htab->stub_bfd, len);
1187 if (s_name == NULL)
1188 return NULL;
1189
1190 memcpy (s_name, link_sec->name, namelen);
1191 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
1192
1193 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
1194 if (stub_sec == NULL)
1195 return NULL;
1196 htab->stub_group[link_sec->id].stub_sec = stub_sec;
1197 }
1198 htab->stub_group[section->id].stub_sec = stub_sec;
1199 }
1200
1201 /* Enter this entry into the linker stub hash table. */
1202 hsh = metag_stub_hash_lookup (&htab->bstab, stub_name,
1203 TRUE, FALSE);
1204 if (hsh == NULL)
1205 {
1206 /* xgettext:c-format */
1207 _bfd_error_handler (_("%B: cannot create stub entry %s"),
1208 section->owner, stub_name);
1209 return NULL;
1210 }
1211
1212 hsh->stub_sec = stub_sec;
1213 hsh->stub_offset = 0;
1214 hsh->id_sec = link_sec;
1215 return hsh;
1216 }
1217
1218 /* Check a signed integer value can be represented in the given number
1219 of bits. */
1220
1221 static bfd_boolean
1222 within_signed_range (int value, unsigned int bits)
1223 {
1224 int min_val = -(1 << (bits - 1));
1225 int max_val = (1 << (bits - 1)) - 1;
1226 return (value <= max_val) && (value >= min_val);
1227 }
1228
1229 /* Perform a relocation as part of a final link. */
1230
1231 static bfd_reloc_status_type
1232 metag_final_link_relocate (reloc_howto_type *howto,
1233 bfd *input_bfd,
1234 asection *input_section,
1235 bfd_byte *contents,
1236 Elf_Internal_Rela *rel,
1237 bfd_vma relocation,
1238 struct elf_metag_link_hash_entry *hh,
1239 struct elf_metag_link_hash_table *htab,
1240 asection *sym_sec)
1241 {
1242 bfd_reloc_status_type r = bfd_reloc_ok;
1243 bfd_byte *hit_data = contents + rel->r_offset;
1244 int opcode, op_shift, op_extended, l1, l2;
1245 bfd_signed_vma srel, addend = rel->r_addend;
1246 struct elf_metag_stub_hash_entry *hsh = NULL;
1247 bfd_vma location;
1248
1249 /* Find out where we are and where we're going. */
1250 location = (rel->r_offset +
1251 input_section->output_offset +
1252 input_section->output_section->vma);
1253
1254 switch (howto->type)
1255 {
1256 case R_METAG_RELBRANCH:
1257 case R_METAG_RELBRANCH_PLT:
1258 /* Make it a pc relative offset. */
1259 relocation -= location;
1260 break;
1261 case R_METAG_TLS_GD:
1262 case R_METAG_TLS_IE:
1263 relocation -= elf_gp (input_section->output_section->owner);
1264 break;
1265 default:
1266 break;
1267 }
1268
1269 switch (howto->type)
1270 {
1271 case R_METAG_RELBRANCH_PLT:
1272 case R_METAG_RELBRANCH:
1273 opcode = bfd_get_32 (input_bfd, hit_data);
1274
1275 srel = (bfd_signed_vma) relocation;
1276 srel += addend;
1277
1278 /* If the branch is out of reach, then redirect the
1279 call to the local stub for this function. */
1280 if (srel > ((1 << (BRANCH_BITS + 1)) - 1) ||
1281 (srel < - (1 << (BRANCH_BITS + 1))))
1282 {
1283 if (sym_sec == NULL)
1284 break;
1285
1286 hsh = metag_get_stub_entry (input_section, sym_sec,
1287 hh, rel, htab);
1288 if (hsh == NULL)
1289 return bfd_reloc_undefined;
1290
1291 /* Munge up the value and addend so that we call the stub
1292 rather than the procedure directly. */
1293 srel = (hsh->stub_offset
1294 + hsh->stub_sec->output_offset
1295 + hsh->stub_sec->output_section->vma);
1296 srel -= location;
1297 }
1298
1299 srel = srel >> 2;
1300
1301 if (!within_signed_range (srel, BRANCH_BITS))
1302 {
1303 if (hh && hh->eh.root.type == bfd_link_hash_undefweak)
1304 srel = 0;
1305 else
1306 return bfd_reloc_overflow;
1307 }
1308
1309 opcode &= ~(0x7ffff << 5);
1310 opcode |= ((srel & 0x7ffff) << 5);
1311
1312 bfd_put_32 (input_bfd, opcode, hit_data);
1313 break;
1314 case R_METAG_GETSETOFF:
1315 case R_METAG_GETSET_GOT:
1316 case R_METAG_GETSET_GOTOFF:
1317 opcode = bfd_get_32 (input_bfd, hit_data);
1318
1319 srel = (bfd_signed_vma) relocation;
1320 srel += addend;
1321
1322 /* Is this a standard or extended GET/SET? */
1323 if ((opcode & 0xf0000000) == 0xa0000000)
1324 {
1325 /* Extended GET/SET. */
1326 l1 = opcode & 0x2;
1327 l2 = opcode & 0x4;
1328 op_extended = 1;
1329 }
1330 else
1331 {
1332 /* Standard GET/SET. */
1333 l1 = opcode & 0x01000000;
1334 l2 = opcode & 0x04000000;
1335 op_extended = 0;
1336 }
1337
1338 /* Calculate the width of the GET/SET and how much we need to
1339 shift the result by. */
1340 if (l2)
1341 if (l1)
1342 op_shift = 3;
1343 else
1344 op_shift = 2;
1345 else
1346 if (l1)
1347 op_shift = 1;
1348 else
1349 op_shift = 0;
1350
1351 /* GET/SET offsets are scaled by the width of the transfer. */
1352 srel = srel >> op_shift;
1353
1354 /* Extended GET/SET has signed 12 bits of offset, standard has
1355 signed 6 bits. */
1356 if (op_extended)
1357 {
1358 if (!within_signed_range (srel, 12))
1359 {
1360 if (hh && hh->eh.root.type == bfd_link_hash_undefweak)
1361 srel = 0;
1362 else
1363 return bfd_reloc_overflow;
1364 }
1365 opcode &= ~(0xfff << 7);
1366 opcode |= ((srel & 0xfff) << 7);
1367 }
1368 else
1369 {
1370 if (!within_signed_range (srel, 5))
1371 {
1372 if (hh && hh->eh.root.type == bfd_link_hash_undefweak)
1373 srel = 0;
1374 else
1375 return bfd_reloc_overflow;
1376 }
1377 opcode &= ~(0x3f << 8);
1378 opcode |= ((srel & 0x3f) << 8);
1379 }
1380
1381 bfd_put_32 (input_bfd, opcode, hit_data);
1382 break;
1383 case R_METAG_TLS_GD:
1384 case R_METAG_TLS_LDM:
1385 opcode = bfd_get_32 (input_bfd, hit_data);
1386
1387 if ((bfd_signed_vma)relocation < 0)
1388 {
1389 /* sign extend immediate */
1390 if ((opcode & 0xf2000001) == 0x02000000)
1391 {
1392 /* ADD De.e,Dx.r,#I16 */
1393 /* set SE bit */
1394 opcode |= (1 << 1);
1395 } else
1396 return bfd_reloc_overflow;
1397 }
1398
1399 bfd_put_32 (input_bfd, opcode, hit_data);
1400
1401 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1402 contents, rel->r_offset,
1403 relocation, rel->r_addend);
1404 break;
1405 default:
1406 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1407 contents, rel->r_offset,
1408 relocation, rel->r_addend);
1409 }
1410
1411 return r;
1412 }
1413
1414 /* This is defined because R_METAG_NONE != 0...
1415 See RELOC_AGAINST_DISCARDED_SECTION for details. */
1416 #define METAG_RELOC_AGAINST_DISCARDED_SECTION(info, input_bfd, input_section, \
1417 rel, relend, howto, contents) \
1418 { \
1419 _bfd_clear_contents (howto, input_bfd, input_section, \
1420 contents + rel->r_offset); \
1421 \
1422 if (bfd_link_relocatable (info) \
1423 && (input_section->flags & SEC_DEBUGGING)) \
1424 { \
1425 /* Only remove relocations in debug sections since other \
1426 sections may require relocations. */ \
1427 Elf_Internal_Shdr *rel_hdr; \
1428 \
1429 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section); \
1430 \
1431 /* Avoid empty output section. */ \
1432 if (rel_hdr->sh_size > rel_hdr->sh_entsize) \
1433 { \
1434 rel_hdr->sh_size -= rel_hdr->sh_entsize; \
1435 rel_hdr = _bfd_elf_single_rel_hdr (input_section); \
1436 rel_hdr->sh_size -= rel_hdr->sh_entsize; \
1437 \
1438 memmove (rel, rel + 1, (relend - rel) * sizeof (*rel)); \
1439 \
1440 input_section->reloc_count--; \
1441 relend--; \
1442 rel--; \
1443 continue; \
1444 } \
1445 } \
1446 \
1447 rel->r_info = R_METAG_NONE; \
1448 rel->r_addend = 0; \
1449 continue; \
1450 }
1451
1452 /* Relocate a META ELF section.
1453
1454 The RELOCATE_SECTION function is called by the new ELF backend linker
1455 to handle the relocations for a section.
1456
1457 The relocs are always passed as Rela structures; if the section
1458 actually uses Rel structures, the r_addend field will always be
1459 zero.
1460
1461 This function is responsible for adjusting the section contents as
1462 necessary, and (if using Rela relocs and generating a relocatable
1463 output file) adjusting the reloc addend as necessary.
1464
1465 This function does not have to worry about setting the reloc
1466 address or the reloc symbol index.
1467
1468 LOCAL_SYMS is a pointer to the swapped in local symbols.
1469
1470 LOCAL_SECTIONS is an array giving the section in the input file
1471 corresponding to the st_shndx field of each local symbol.
1472
1473 The global hash table entry for the global symbols can be found
1474 via elf_sym_hashes (input_bfd).
1475
1476 When generating relocatable output, this function must handle
1477 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
1478 going to be the section symbol corresponding to the output
1479 section, which means that the addend must be adjusted
1480 accordingly. */
1481
1482 static bfd_boolean
1483 elf_metag_relocate_section (bfd *output_bfd,
1484 struct bfd_link_info *info,
1485 bfd *input_bfd,
1486 asection *input_section,
1487 bfd_byte *contents,
1488 Elf_Internal_Rela *relocs,
1489 Elf_Internal_Sym *local_syms,
1490 asection **local_sections)
1491 {
1492 bfd_vma *local_got_offsets;
1493 Elf_Internal_Shdr *symtab_hdr;
1494 struct elf_link_hash_entry **eh_syms;
1495 struct elf_metag_link_hash_table *htab;
1496 Elf_Internal_Rela *rel;
1497 Elf_Internal_Rela *relend;
1498 asection *sreloc;
1499
1500 symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr;
1501 eh_syms = elf_sym_hashes (input_bfd);
1502 relend = relocs + input_section->reloc_count;
1503
1504 htab = metag_link_hash_table (info);
1505 local_got_offsets = elf_local_got_offsets (input_bfd);
1506
1507 sreloc = NULL;
1508
1509 for (rel = relocs; rel < relend; rel ++)
1510 {
1511 reloc_howto_type *howto;
1512 unsigned long r_symndx;
1513 Elf_Internal_Sym *sym;
1514 asection *sec;
1515 struct elf_metag_link_hash_entry *hh;
1516 bfd_vma relocation;
1517 bfd_reloc_status_type r;
1518 const char *name;
1519 int r_type;
1520
1521 r_type = ELF32_R_TYPE (rel->r_info);
1522
1523 if (r_type == R_METAG_GNU_VTINHERIT
1524 || r_type == R_METAG_GNU_VTENTRY
1525 || r_type == R_METAG_NONE)
1526 continue;
1527
1528 r_symndx = ELF32_R_SYM (rel->r_info);
1529
1530 howto = elf_metag_howto_table + ELF32_R_TYPE (rel->r_info);
1531 hh = NULL;
1532 sym = NULL;
1533 sec = NULL;
1534
1535 if (r_symndx < symtab_hdr->sh_info)
1536 {
1537 sym = local_syms + r_symndx;
1538 sec = local_sections [r_symndx];
1539 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
1540
1541 name = bfd_elf_string_from_elf_section
1542 (input_bfd, symtab_hdr->sh_link, sym->st_name);
1543 name = (name == NULL) ? bfd_section_name (input_bfd, sec) : name;
1544 }
1545 else
1546 {
1547 struct elf_link_hash_entry *eh;
1548 bfd_boolean unresolved_reloc, warned, ignored;
1549
1550 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1551 r_symndx, symtab_hdr, eh_syms,
1552 eh, sec, relocation,
1553 unresolved_reloc, warned, ignored);
1554
1555 name = eh->root.root.string;
1556 hh = (struct elf_metag_link_hash_entry *) eh;
1557 }
1558
1559 if (sec != NULL && discarded_section (sec))
1560 METAG_RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
1561 rel, relend, howto, contents);
1562
1563 if (bfd_link_relocatable (info))
1564 continue;
1565
1566 switch (r_type)
1567 {
1568 case R_METAG_ADDR32:
1569 case R_METAG_RELBRANCH:
1570 if ((input_section->flags & SEC_ALLOC) == 0)
1571 break;
1572
1573 if ((bfd_link_pic (info)
1574 && r_symndx != STN_UNDEF
1575 && (input_section->flags & SEC_ALLOC) != 0
1576 && (r_type != R_METAG_RELBRANCH
1577 || !SYMBOL_CALLS_LOCAL (info, &hh->eh)))
1578 || (!bfd_link_pic (info)
1579 && hh != NULL
1580 && hh->eh.dynindx != -1
1581 && !hh->eh.non_got_ref
1582 && ((hh->eh.def_dynamic
1583 && !hh->eh.def_regular)
1584 || hh->eh.root.type == bfd_link_hash_undefweak
1585 || hh->eh.root.type == bfd_link_hash_undefined)))
1586 {
1587 Elf_Internal_Rela outrel;
1588 bfd_boolean skip, relocate;
1589 bfd_byte *loc;
1590
1591 /* When generating a shared object, these relocations
1592 are copied into the output file to be resolved at run
1593 time. */
1594
1595 sreloc = elf_section_data (input_section)->sreloc;
1596 BFD_ASSERT (sreloc != NULL);
1597
1598 skip = FALSE;
1599 relocate = FALSE;
1600
1601 outrel.r_offset = _bfd_elf_section_offset (output_bfd,
1602 info,
1603 input_section,
1604 rel->r_offset);
1605 if (outrel.r_offset == (bfd_vma) -1)
1606 skip = TRUE;
1607 else if (outrel.r_offset == (bfd_vma) -2)
1608 skip = TRUE, relocate = TRUE;
1609 outrel.r_offset += (input_section->output_section->vma
1610 + input_section->output_offset);
1611
1612 if (skip)
1613 {
1614 memset (&outrel, 0, sizeof outrel);
1615 outrel.r_info = ELF32_R_INFO (0, R_METAG_NONE);
1616 }
1617 else if (r_type == R_METAG_RELBRANCH)
1618 {
1619 BFD_ASSERT (hh != NULL && hh->eh.dynindx != -1);
1620 outrel.r_info = ELF32_R_INFO (hh->eh.dynindx, r_type);
1621 outrel.r_addend = rel->r_addend;
1622 }
1623 else
1624 {
1625 /* h->dynindx may be -1 if this symbol was marked to
1626 become local. */
1627 if (hh == NULL
1628 || ((info->symbolic || hh->eh.dynindx == -1)
1629 && hh->eh.def_regular))
1630 {
1631 relocate = TRUE;
1632 outrel.r_info = ELF32_R_INFO (0, R_METAG_RELATIVE);
1633 outrel.r_addend = relocation + rel->r_addend;
1634 }
1635 else
1636 {
1637 BFD_ASSERT (hh->eh.dynindx != -1);
1638 outrel.r_info = ELF32_R_INFO (hh->eh.dynindx, r_type);
1639 outrel.r_addend = rel->r_addend;
1640 }
1641 }
1642
1643 loc = sreloc->contents;
1644 loc += sreloc->reloc_count * sizeof(Elf32_External_Rela);
1645 bfd_elf32_swap_reloca_out (output_bfd, &outrel,loc);
1646 ++sreloc->reloc_count;
1647
1648 /* If this reloc is against an external symbol, we do
1649 not want to fiddle with the addend. Otherwise, we
1650 need to include the symbol value so that it becomes
1651 an addend for the dynamic reloc. */
1652 if (! relocate)
1653 continue;
1654 }
1655 break;
1656
1657 case R_METAG_RELBRANCH_PLT:
1658 /* Relocation is to the entry for this symbol in the
1659 procedure linkage table. */
1660
1661 if (hh == NULL)
1662 break;
1663
1664 if (hh->eh.forced_local)
1665 break;
1666
1667 if (hh->eh.plt.offset == (bfd_vma) -1 ||
1668 htab->splt == NULL)
1669 {
1670 /* We didn't make a PLT entry for this symbol. This
1671 happens when statically linking PIC code, or when
1672 using -Bsymbolic. */
1673 break;
1674 }
1675
1676 relocation = (htab->splt->output_section->vma
1677 + htab->splt->output_offset
1678 + hh->eh.plt.offset);
1679 break;
1680 case R_METAG_HI16_GOTPC:
1681 case R_METAG_LO16_GOTPC:
1682 BFD_ASSERT (htab->sgot != NULL);
1683
1684 relocation = (htab->sgot->output_section->vma +
1685 htab->sgot->output_offset);
1686 relocation += GOT_REG_OFFSET;
1687 relocation -= (input_section->output_section->vma
1688 + input_section->output_offset
1689 + rel->r_offset);
1690 break;
1691 case R_METAG_HI16_GOTOFF:
1692 case R_METAG_LO16_GOTOFF:
1693 case R_METAG_GETSET_GOTOFF:
1694 BFD_ASSERT (htab->sgot != NULL);
1695
1696 relocation -= (htab->sgot->output_section->vma +
1697 htab->sgot->output_offset);
1698 relocation -= GOT_REG_OFFSET;
1699 break;
1700 case R_METAG_GETSET_GOT:
1701 {
1702 bfd_vma off;
1703 bfd_boolean do_got = 0;
1704
1705 /* Relocation is to the entry for this symbol in the
1706 global offset table. */
1707 if (hh != NULL)
1708 {
1709 bfd_boolean dyn;
1710
1711 off = hh->eh.got.offset;
1712 dyn = htab->etab.dynamic_sections_created;
1713 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
1714 bfd_link_pic (info),
1715 &hh->eh))
1716 {
1717 /* If we aren't going to call finish_dynamic_symbol,
1718 then we need to handle initialisation of the .got
1719 entry and create needed relocs here. Since the
1720 offset must always be a multiple of 4, we use the
1721 least significant bit to record whether we have
1722 initialised it already. */
1723 if ((off & 1) != 0)
1724 off &= ~1;
1725 else
1726 {
1727 hh->eh.got.offset |= 1;
1728 do_got = 1;
1729 }
1730 }
1731 }
1732 else
1733 {
1734 /* Local symbol case. */
1735 if (local_got_offsets == NULL)
1736 abort ();
1737
1738 off = local_got_offsets[r_symndx];
1739
1740 /* The offset must always be a multiple of 4. We use
1741 the least significant bit to record whether we have
1742 already generated the necessary reloc. */
1743 if ((off & 1) != 0)
1744 off &= ~1;
1745 else
1746 {
1747 local_got_offsets[r_symndx] |= 1;
1748 do_got = 1;
1749 }
1750 }
1751
1752 if (do_got)
1753 {
1754 if (bfd_link_pic (info))
1755 {
1756 /* Output a dynamic relocation for this GOT entry.
1757 In this case it is relative to the base of the
1758 object because the symbol index is zero. */
1759 Elf_Internal_Rela outrel;
1760 bfd_byte *loc;
1761 asection *s = htab->srelgot;
1762
1763 outrel.r_offset = (off
1764 + htab->sgot->output_offset
1765 + htab->sgot->output_section->vma);
1766 outrel.r_info = ELF32_R_INFO (0, R_METAG_RELATIVE);
1767 outrel.r_addend = relocation;
1768 loc = s->contents;
1769 loc += s->reloc_count++ * sizeof (Elf32_External_Rela);
1770 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1771 }
1772 else
1773 bfd_put_32 (output_bfd, relocation,
1774 htab->sgot->contents + off);
1775 }
1776
1777 if (off >= (bfd_vma) -2)
1778 abort ();
1779
1780 relocation = off - GOT_REG_OFFSET;
1781 }
1782 break;
1783 case R_METAG_TLS_GD:
1784 case R_METAG_TLS_IE:
1785 {
1786 /* XXXMJF There is room here for optimisations. For example
1787 converting from GD->IE, etc. */
1788 bfd_vma off;
1789 int indx;
1790 char tls_type;
1791
1792 if (htab->sgot == NULL)
1793 abort();
1794
1795 indx = 0;
1796 if (hh != NULL)
1797 {
1798 bfd_boolean dyn;
1799 dyn = htab->etab.dynamic_sections_created;
1800
1801 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
1802 bfd_link_pic (info),
1803 &hh->eh)
1804 && (!bfd_link_pic (info)
1805 || !SYMBOL_REFERENCES_LOCAL (info, &hh->eh)))
1806 {
1807 indx = hh->eh.dynindx;
1808 }
1809 off = hh->eh.got.offset;
1810 tls_type = hh->tls_type;
1811 }
1812 else
1813 {
1814 /* Local symbol case. */
1815 if (local_got_offsets == NULL)
1816 abort ();
1817
1818 off = local_got_offsets[r_symndx];
1819 tls_type = metag_elf_local_got_tls_type (input_bfd) [r_symndx];
1820 }
1821
1822 if (tls_type == GOT_UNKNOWN)
1823 abort ();
1824
1825 if ((off & 1) != 0)
1826 off &= ~1;
1827 else
1828 {
1829 bfd_boolean need_relocs = FALSE;
1830 Elf_Internal_Rela outrel;
1831 bfd_byte *loc = NULL;
1832 int cur_off = off;
1833
1834 /* The GOT entries have not been initialized yet. Do it
1835 now, and emit any relocations. If both an IE GOT and a
1836 GD GOT are necessary, we emit the GD first. */
1837
1838 if ((bfd_link_pic (info) || indx != 0)
1839 && (hh == NULL
1840 || ELF_ST_VISIBILITY (hh->eh.other) == STV_DEFAULT
1841 || hh->eh.root.type != bfd_link_hash_undefweak))
1842 {
1843 need_relocs = TRUE;
1844 loc = htab->srelgot->contents;
1845 /* FIXME (CAO): Should this be reloc_count++ ? */
1846 loc += htab->srelgot->reloc_count * sizeof (Elf32_External_Rela);
1847 }
1848
1849 if (tls_type & GOT_TLS_GD)
1850 {
1851 if (need_relocs)
1852 {
1853 outrel.r_offset = (cur_off
1854 + htab->sgot->output_section->vma
1855 + htab->sgot->output_offset);
1856 outrel.r_info = ELF32_R_INFO (indx, R_METAG_TLS_DTPMOD);
1857 outrel.r_addend = 0;
1858 bfd_put_32 (output_bfd, 0, htab->sgot->contents + cur_off);
1859
1860 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1861 htab->srelgot->reloc_count++;
1862 loc += sizeof (Elf32_External_Rela);
1863
1864 if (indx == 0)
1865 bfd_put_32 (output_bfd, 0,
1866 htab->sgot->contents + cur_off + 4);
1867 else
1868 {
1869 bfd_put_32 (output_bfd, 0,
1870 htab->sgot->contents + cur_off + 4);
1871 outrel.r_info = ELF32_R_INFO (indx,
1872 R_METAG_TLS_DTPOFF);
1873 outrel.r_offset += 4;
1874 bfd_elf32_swap_reloca_out (output_bfd,
1875 &outrel, loc);
1876 htab->srelgot->reloc_count++;
1877 loc += sizeof (Elf32_External_Rela);
1878 }
1879 }
1880 else
1881 {
1882 /* We don't support changing the TLS model. */
1883 /* PR 20675 */
1884 if (bfd_link_pic (info))
1885 _bfd_error_handler (_("%B(%A): multiple TLS models are not supported"),
1886 input_bfd, input_section, name);
1887 else
1888 _bfd_error_handler (_("%B(%A): shared library symbol %s encountered whilst performing a static link"),
1889 input_bfd, input_section, name);
1890 return FALSE;
1891 }
1892
1893 cur_off += 8;
1894 }
1895
1896 if (tls_type & GOT_TLS_IE)
1897 {
1898 if (need_relocs)
1899 {
1900 outrel.r_offset = (cur_off
1901 + htab->sgot->output_section->vma
1902 + htab->sgot->output_offset);
1903 outrel.r_info = ELF32_R_INFO (indx, R_METAG_TLS_TPOFF);
1904
1905 if (indx == 0)
1906 outrel.r_addend = relocation - dtpoff_base (info);
1907 else
1908 outrel.r_addend = 0;
1909
1910 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1911 htab->srelgot->reloc_count++;
1912 loc += sizeof (Elf32_External_Rela);
1913 }
1914 else
1915 bfd_put_32 (output_bfd, tpoff (info, relocation),
1916 htab->sgot->contents + cur_off);
1917
1918 cur_off += 4;
1919 }
1920
1921 if (hh != NULL)
1922 hh->eh.got.offset |= 1;
1923 else
1924 local_got_offsets[r_symndx] |= 1;
1925 }
1926
1927 /* Add the base of the GOT to the relocation value. */
1928 relocation = off - GOT_REG_OFFSET;
1929
1930 break;
1931 }
1932
1933 case R_METAG_TLS_IENONPIC_HI16:
1934 case R_METAG_TLS_IENONPIC_LO16:
1935 case R_METAG_TLS_LE_HI16:
1936 case R_METAG_TLS_LE_LO16:
1937 if (bfd_link_pic (info))
1938 {
1939 _bfd_error_handler
1940 /* xgettext:c-format */
1941 (_("%B(%A+0x%lx): R_METAG_TLS_LE/IENONPIC relocation not permitted in shared object"),
1942 input_bfd, input_section,
1943 (long) rel->r_offset, howto->name);
1944 return FALSE;
1945 }
1946 else
1947 relocation = tpoff (info, relocation);
1948 break;
1949 case R_METAG_TLS_LDO_HI16:
1950 case R_METAG_TLS_LDO_LO16:
1951 if (! bfd_link_pic (info))
1952 relocation = tpoff (info, relocation);
1953 else
1954 relocation -= dtpoff_base (info);
1955 break;
1956 case R_METAG_TLS_LDM:
1957 {
1958 bfd_vma off;
1959
1960 if (htab->sgot == NULL)
1961 abort();
1962 off = htab->tls_ldm_got.offset;
1963 if (off & 1)
1964 off &= ~1;
1965 else
1966 {
1967 Elf_Internal_Rela outrel;
1968 bfd_byte *loc;
1969
1970 outrel.r_offset = (off
1971 + htab->sgot->output_section->vma
1972 + htab->sgot->output_offset);
1973
1974 outrel.r_addend = 0;
1975 outrel.r_info = ELF32_R_INFO (0, R_METAG_TLS_DTPMOD);
1976 loc = htab->srelgot->contents;
1977 loc += htab->srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
1978 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1979 htab->tls_ldm_got.offset |= 1;
1980 }
1981
1982 relocation = off - GOT_REG_OFFSET;
1983 break;
1984 }
1985 default:
1986 break;
1987 }
1988
1989 r = metag_final_link_relocate (howto, input_bfd, input_section,
1990 contents, rel, relocation, hh, htab,
1991 sec);
1992
1993 if (r != bfd_reloc_ok)
1994 {
1995 const char * msg = (const char *) NULL;
1996
1997 switch (r)
1998 {
1999 case bfd_reloc_overflow:
2000 (*info->callbacks->reloc_overflow)
2001 (info, (hh ? &hh->eh.root : NULL), name, howto->name,
2002 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
2003 break;
2004
2005 case bfd_reloc_undefined:
2006 (*info->callbacks->undefined_symbol)
2007 (info, name, input_bfd, input_section, rel->r_offset, TRUE);
2008 break;
2009
2010 case bfd_reloc_outofrange:
2011 msg = _("internal error: out of range error");
2012 break;
2013
2014 case bfd_reloc_notsupported:
2015 msg = _("internal error: unsupported relocation error");
2016 break;
2017
2018 case bfd_reloc_dangerous:
2019 msg = _("internal error: dangerous relocation");
2020 break;
2021
2022 default:
2023 msg = _("internal error: unknown error");
2024 break;
2025 }
2026
2027 if (msg)
2028 (*info->callbacks->warning) (info, msg, name, input_bfd,
2029 input_section, rel->r_offset);
2030 }
2031 }
2032
2033 return TRUE;
2034 }
2035
2036 /* Create the .plt and .got sections, and set up our hash table
2037 short-cuts to various dynamic sections. */
2038
2039 static bfd_boolean
2040 elf_metag_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
2041 {
2042 struct elf_metag_link_hash_table *htab;
2043 struct elf_link_hash_entry *eh;
2044 struct bfd_link_hash_entry *bh;
2045 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
2046
2047 /* Don't try to create the .plt and .got twice. */
2048 htab = metag_link_hash_table (info);
2049 if (htab->splt != NULL)
2050 return TRUE;
2051
2052 /* Call the generic code to do most of the work. */
2053 if (! _bfd_elf_create_dynamic_sections (abfd, info))
2054 return FALSE;
2055
2056 htab->sgot = bfd_get_linker_section (abfd, ".got");
2057 if (! htab->sgot)
2058 return FALSE;
2059
2060 htab->sgotplt = bfd_make_section_with_flags (abfd, ".got.plt",
2061 (SEC_ALLOC | SEC_LOAD |
2062 SEC_HAS_CONTENTS |
2063 SEC_IN_MEMORY |
2064 SEC_LINKER_CREATED));
2065 if (htab->sgotplt == NULL
2066 || !bfd_set_section_alignment (abfd, htab->sgotplt, 2))
2067 return FALSE;
2068
2069 /* Define the symbol __GLOBAL_OFFSET_TABLE__ at the start of the .got
2070 section. We don't do this in the linker script because we don't want
2071 to define the symbol if we are not creating a global offset table. */
2072 bh = NULL;
2073 if (!(_bfd_generic_link_add_one_symbol
2074 (info, abfd, "__GLOBAL_OFFSET_TABLE__", BSF_GLOBAL, htab->sgot,
2075 (bfd_vma) 0, NULL, FALSE, bed->collect, &bh)))
2076 return FALSE;
2077 eh = (struct elf_link_hash_entry *) bh;
2078 eh->def_regular = 1;
2079 eh->type = STT_OBJECT;
2080 eh->other = STV_HIDDEN;
2081
2082 if (! bfd_link_executable (info)
2083 && ! bfd_elf_link_record_dynamic_symbol (info, eh))
2084 return FALSE;
2085
2086 elf_hash_table (info)->hgot = eh;
2087
2088 htab->splt = bfd_get_linker_section (abfd, ".plt");
2089 htab->srelplt = bfd_get_linker_section (abfd, ".rela.plt");
2090
2091 htab->srelgot = bfd_get_linker_section (abfd, ".rela.got");
2092
2093 htab->sdynbss = bfd_get_linker_section (abfd, ".dynbss");
2094 htab->srelbss = bfd_get_linker_section (abfd, ".rela.bss");
2095
2096 return TRUE;
2097 }
2098
2099 /* Look through the relocs for a section during the first phase, and
2100 calculate needed space in the global offset table, procedure linkage
2101 table, and dynamic reloc sections. At this point we haven't
2102 necessarily read all the input files. */
2103
2104 static bfd_boolean
2105 elf_metag_check_relocs (bfd *abfd,
2106 struct bfd_link_info *info,
2107 asection *sec,
2108 const Elf_Internal_Rela *relocs)
2109 {
2110 Elf_Internal_Shdr *symtab_hdr;
2111 struct elf_link_hash_entry **eh_syms;
2112 const Elf_Internal_Rela *rel;
2113 const Elf_Internal_Rela *rel_end;
2114 struct elf_metag_link_hash_table *htab;
2115 asection *sreloc;
2116 bfd *dynobj;
2117 int tls_type = GOT_UNKNOWN, old_tls_type = GOT_UNKNOWN;
2118
2119 if (bfd_link_relocatable (info))
2120 return TRUE;
2121
2122 htab = metag_link_hash_table (info);
2123 dynobj = htab->etab.dynobj;
2124 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2125 eh_syms = elf_sym_hashes (abfd);
2126 sreloc = NULL;
2127
2128 if (htab == NULL)
2129 return FALSE;
2130
2131 rel_end = relocs + sec->reloc_count;
2132 for (rel = relocs; rel < rel_end; rel++)
2133 {
2134 int r_type;
2135 struct elf_metag_link_hash_entry *hh;
2136 Elf_Internal_Sym *isym;
2137 unsigned long r_symndx;
2138
2139 r_symndx = ELF32_R_SYM (rel->r_info);
2140 r_type = ELF32_R_TYPE (rel->r_info);
2141 if (r_symndx < symtab_hdr->sh_info)
2142 {
2143 /* A local symbol. */
2144 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
2145 abfd, r_symndx);
2146 if (isym == NULL)
2147 return FALSE;
2148
2149 hh = NULL;
2150 }
2151 else
2152 {
2153 isym = NULL;
2154
2155 hh = (struct elf_metag_link_hash_entry *)
2156 eh_syms[r_symndx - symtab_hdr->sh_info];
2157 while (hh->eh.root.type == bfd_link_hash_indirect
2158 || hh->eh.root.type == bfd_link_hash_warning)
2159 hh = (struct elf_metag_link_hash_entry *) hh->eh.root.u.i.link;
2160
2161 /* PR15323, ref flags aren't set for references in the same
2162 object. */
2163 hh->eh.root.non_ir_ref = 1;
2164 }
2165
2166 /* Some relocs require a global offset table. */
2167 if (htab->sgot == NULL)
2168 {
2169 switch (r_type)
2170 {
2171 case R_METAG_TLS_GD:
2172 case R_METAG_TLS_LDM:
2173 case R_METAG_TLS_IE:
2174 if (bfd_link_pic (info))
2175 info->flags |= DF_STATIC_TLS;
2176 /* Fall through. */
2177
2178 case R_METAG_HI16_GOTOFF:
2179 case R_METAG_LO16_GOTOFF:
2180 case R_METAG_GETSET_GOTOFF:
2181 case R_METAG_GETSET_GOT:
2182 case R_METAG_HI16_GOTPC:
2183 case R_METAG_LO16_GOTPC:
2184 if (dynobj == NULL)
2185 htab->etab.dynobj = dynobj = abfd;
2186 if (!elf_metag_create_dynamic_sections (dynobj, info))
2187 return FALSE;
2188 break;
2189
2190 default:
2191 break;
2192 }
2193 }
2194
2195 switch (r_type)
2196 {
2197 case R_METAG_TLS_IE:
2198 case R_METAG_TLS_GD:
2199 case R_METAG_GETSET_GOT:
2200 switch (r_type)
2201 {
2202 default:
2203 tls_type = GOT_NORMAL;
2204 break;
2205 case R_METAG_TLS_IE:
2206 tls_type = GOT_TLS_IE;
2207 break;
2208 case R_METAG_TLS_GD:
2209 tls_type = GOT_TLS_GD;
2210 break;
2211 }
2212
2213 if (hh != NULL)
2214 {
2215 hh->eh.got.refcount += 1;
2216 old_tls_type = hh->tls_type;
2217 }
2218 else
2219 {
2220 bfd_signed_vma *local_got_refcounts;
2221
2222 /* This is a global offset table entry for a local
2223 symbol. */
2224 local_got_refcounts = elf_local_got_refcounts (abfd);
2225 if (local_got_refcounts == NULL)
2226 {
2227 bfd_size_type size;
2228
2229 size = symtab_hdr->sh_info;
2230 size *= sizeof (bfd_signed_vma);
2231 /* Add in space to store the local GOT TLS types. */
2232 size += symtab_hdr->sh_info;
2233 local_got_refcounts = ((bfd_signed_vma *)
2234 bfd_zalloc (abfd, size));
2235 if (local_got_refcounts == NULL)
2236 return FALSE;
2237 elf_local_got_refcounts (abfd) = local_got_refcounts;
2238 memset (metag_elf_local_got_tls_type (abfd),
2239 GOT_UNKNOWN, symtab_hdr->sh_info);
2240 }
2241 local_got_refcounts[r_symndx] += 1;
2242 old_tls_type = metag_elf_local_got_tls_type (abfd) [r_symndx];
2243 }
2244
2245 if (old_tls_type != tls_type)
2246 {
2247 if (hh != NULL)
2248 {
2249 hh->tls_type = tls_type;
2250 }
2251 else
2252 {
2253 metag_elf_local_got_tls_type (abfd) [r_symndx] = tls_type;
2254 }
2255 }
2256
2257 break;
2258
2259 case R_METAG_TLS_LDM:
2260 metag_link_hash_table (info)->tls_ldm_got.refcount += 1;
2261 break;
2262
2263 case R_METAG_RELBRANCH_PLT:
2264 /* This symbol requires a procedure linkage table entry. We
2265 actually build the entry in adjust_dynamic_symbol,
2266 because this might be a case of linking PIC code without
2267 linking in any dynamic objects, in which case we don't
2268 need to generate a procedure linkage table after all. */
2269
2270 /* If this is a local symbol, we resolve it directly without
2271 creating a procedure linkage table entry. */
2272 if (hh == NULL)
2273 continue;
2274
2275 if (hh->eh.forced_local)
2276 break;
2277
2278 hh->eh.needs_plt = 1;
2279 hh->eh.plt.refcount += 1;
2280 break;
2281
2282 case R_METAG_HIADDR16:
2283 case R_METAG_LOADDR16:
2284 /* Let's help debug shared library creation. These relocs
2285 cannot be used in shared libs. Don't error out for
2286 sections we don't care about, such as debug sections or
2287 non-constant sections. */
2288 if (bfd_link_pic (info)
2289 && (sec->flags & SEC_ALLOC) != 0
2290 && (sec->flags & SEC_READONLY) != 0)
2291 {
2292 const char *name;
2293
2294 if (hh)
2295 name = hh->eh.root.root.string;
2296 else
2297 name = bfd_elf_sym_name (abfd, symtab_hdr, isym, NULL);
2298 _bfd_error_handler
2299 /* xgettext:c-format */
2300 (_("%B: relocation %s against `%s' can not be used when making a shared object; recompile with -fPIC"),
2301 abfd, elf_metag_howto_table[r_type].name, name);
2302 bfd_set_error (bfd_error_bad_value);
2303 return FALSE;
2304 }
2305
2306 /* Fall through. */
2307 case R_METAG_ADDR32:
2308 case R_METAG_RELBRANCH:
2309 case R_METAG_GETSETOFF:
2310 if (hh != NULL && !bfd_link_pic (info))
2311 {
2312 hh->eh.non_got_ref = 1;
2313 hh->eh.plt.refcount += 1;
2314 }
2315
2316 /* If we are creating a shared library, and this is a reloc
2317 against a global symbol, or a non PC relative reloc
2318 against a local symbol, then we need to copy the reloc
2319 into the shared library. However, if we are linking with
2320 -Bsymbolic, we do not need to copy a reloc against a
2321 global symbol which is defined in an object we are
2322 including in the link (i.e., DEF_REGULAR is set). At
2323 this point we have not seen all the input files, so it is
2324 possible that DEF_REGULAR is not set now but will be set
2325 later (it is never cleared). We account for that
2326 possibility below by storing information in the
2327 dyn_relocs field of the hash table entry. A similar
2328 situation occurs when creating shared libraries and symbol
2329 visibility changes render the symbol local.
2330
2331 If on the other hand, we are creating an executable, we
2332 may need to keep relocations for symbols satisfied by a
2333 dynamic library if we manage to avoid copy relocs for the
2334 symbol. */
2335 if ((bfd_link_pic (info)
2336 && (sec->flags & SEC_ALLOC) != 0
2337 && (r_type != R_METAG_RELBRANCH
2338 || (hh != NULL
2339 && (! info->symbolic
2340 || hh->eh.root.type == bfd_link_hash_defweak
2341 || !hh->eh.def_regular))))
2342 || (!bfd_link_pic (info)
2343 && (sec->flags & SEC_ALLOC) != 0
2344 && hh != NULL
2345 && (hh->eh.root.type == bfd_link_hash_defweak
2346 || !hh->eh.def_regular)))
2347 {
2348 struct elf_metag_dyn_reloc_entry *hdh_p;
2349 struct elf_metag_dyn_reloc_entry **hdh_head;
2350
2351 if (dynobj == NULL)
2352 htab->etab.dynobj = dynobj = abfd;
2353
2354 /* When creating a shared object, we must copy these
2355 relocs into the output file. We create a reloc
2356 section in dynobj and make room for the reloc. */
2357 if (sreloc == NULL)
2358 {
2359 sreloc = _bfd_elf_make_dynamic_reloc_section
2360 (sec, htab->etab.dynobj, 2, abfd, /*rela?*/ TRUE);
2361
2362 if (sreloc == NULL)
2363 {
2364 bfd_set_error (bfd_error_bad_value);
2365 return FALSE;
2366 }
2367
2368 elf_section_data (sec)->sreloc = sreloc;
2369 }
2370
2371 /* If this is a global symbol, we count the number of
2372 relocations we need for this symbol. */
2373 if (hh != NULL)
2374 hdh_head = &((struct elf_metag_link_hash_entry *) hh)->dyn_relocs;
2375 else
2376 {
2377 /* Track dynamic relocs needed for local syms too. */
2378 asection *sr;
2379 void *vpp;
2380
2381 sr = bfd_section_from_elf_index (abfd, isym->st_shndx);
2382 if (sr == NULL)
2383 sr = sec;
2384
2385 vpp = &elf_section_data (sr)->local_dynrel;
2386 hdh_head = (struct elf_metag_dyn_reloc_entry **) vpp;
2387 }
2388
2389 hdh_p = *hdh_head;
2390 if (hdh_p == NULL || hdh_p->sec != sec)
2391 {
2392 hdh_p = ((struct elf_metag_dyn_reloc_entry *)
2393 bfd_alloc (dynobj, sizeof *hdh_p));
2394 if (hdh_p == NULL)
2395 return FALSE;
2396 hdh_p->hdh_next = *hdh_head;
2397 *hdh_head = hdh_p;
2398 hdh_p->sec = sec;
2399 hdh_p->count = 0;
2400 hdh_p->relative_count = 0;
2401 }
2402
2403 hdh_p->count += 1;
2404 if (ELF32_R_TYPE (rel->r_info) == R_METAG_RELBRANCH)
2405 hdh_p->relative_count += 1;
2406 }
2407 break;
2408
2409 /* This relocation describes the C++ object vtable hierarchy.
2410 Reconstruct it for later use during GC. */
2411 case R_METAG_GNU_VTINHERIT:
2412 if (!bfd_elf_gc_record_vtinherit (abfd, sec, &hh->eh,
2413 rel->r_offset))
2414 return FALSE;
2415 break;
2416
2417 /* This relocation describes which C++ vtable entries are actually
2418 used. Record for later use during GC. */
2419 case R_METAG_GNU_VTENTRY:
2420 BFD_ASSERT (hh != NULL);
2421 if (hh != NULL
2422 && !bfd_elf_gc_record_vtentry (abfd, sec, &hh->eh, rel->r_addend))
2423 return FALSE;
2424 break;
2425 }
2426 }
2427
2428 return TRUE;
2429 }
2430
2431 /* Copy the extra info we tack onto an elf_link_hash_entry. */
2432
2433 static void
2434 elf_metag_copy_indirect_symbol (struct bfd_link_info *info,
2435 struct elf_link_hash_entry *eh_dir,
2436 struct elf_link_hash_entry *eh_ind)
2437 {
2438 struct elf_metag_link_hash_entry *hh_dir, *hh_ind;
2439
2440 hh_dir = metag_elf_hash_entry (eh_dir);
2441 hh_ind = metag_elf_hash_entry (eh_ind);
2442
2443 if (hh_ind->dyn_relocs != NULL)
2444 {
2445 if (hh_dir->dyn_relocs != NULL)
2446 {
2447 struct elf_metag_dyn_reloc_entry **hdh_pp;
2448 struct elf_metag_dyn_reloc_entry *hdh_p;
2449
2450 if (eh_ind->root.type == bfd_link_hash_indirect)
2451 abort ();
2452
2453 /* Add reloc counts against the weak sym to the strong sym
2454 list. Merge any entries against the same section. */
2455 for (hdh_pp = &hh_ind->dyn_relocs; (hdh_p = *hdh_pp) != NULL; )
2456 {
2457 struct elf_metag_dyn_reloc_entry *hdh_q;
2458
2459 for (hdh_q = hh_dir->dyn_relocs; hdh_q != NULL;
2460 hdh_q = hdh_q->hdh_next)
2461 if (hdh_q->sec == hdh_p->sec)
2462 {
2463 hdh_q->relative_count += hdh_p->relative_count;
2464 hdh_q->count += hdh_p->count;
2465 *hdh_pp = hdh_p->hdh_next;
2466 break;
2467 }
2468 if (hdh_q == NULL)
2469 hdh_pp = &hdh_p->hdh_next;
2470 }
2471 *hdh_pp = hh_dir->dyn_relocs;
2472 }
2473
2474 hh_dir->dyn_relocs = hh_ind->dyn_relocs;
2475 hh_ind->dyn_relocs = NULL;
2476 }
2477
2478 if (eh_ind->root.type == bfd_link_hash_indirect
2479 && eh_dir->got.refcount <= 0)
2480 {
2481 hh_dir->tls_type = hh_ind->tls_type;
2482 hh_ind->tls_type = GOT_UNKNOWN;
2483 }
2484
2485 _bfd_elf_link_hash_copy_indirect (info, eh_dir, eh_ind);
2486 }
2487
2488 /* Adjust a symbol defined by a dynamic object and referenced by a
2489 regular object. The current definition is in some section of the
2490 dynamic object, but we're not including those sections. We have to
2491 change the definition to something the rest of the link can
2492 understand. */
2493
2494 static bfd_boolean
2495 elf_metag_adjust_dynamic_symbol (struct bfd_link_info *info,
2496 struct elf_link_hash_entry *eh)
2497 {
2498 struct elf_metag_link_hash_table *htab;
2499 struct elf_metag_link_hash_entry *hh;
2500 struct elf_metag_dyn_reloc_entry *hdh_p;
2501 asection *s;
2502
2503 /* If this is a function, put it in the procedure linkage table. We
2504 will fill in the contents of the procedure linkage table later,
2505 when we know the address of the .got section. */
2506 if (eh->type == STT_FUNC
2507 || eh->needs_plt)
2508 {
2509 if (eh->plt.refcount <= 0
2510 || SYMBOL_CALLS_LOCAL (info, eh)
2511 || (ELF_ST_VISIBILITY (eh->other) != STV_DEFAULT
2512 && eh->root.type == bfd_link_hash_undefweak))
2513 {
2514 /* This case can occur if we saw a PLT reloc in an input
2515 file, but the symbol was never referred to by a dynamic
2516 object. In such a case, we don't actually need to build
2517 a procedure linkage table, and we can just do a PCREL
2518 reloc instead. */
2519 eh->plt.offset = (bfd_vma) -1;
2520 eh->needs_plt = 0;
2521 }
2522
2523 return TRUE;
2524 }
2525 else
2526 eh->plt.offset = (bfd_vma) -1;
2527
2528 /* If this is a weak symbol, and there is a real definition, the
2529 processor independent code will have arranged for us to see the
2530 real definition first, and we can just use the same value. */
2531 if (eh->u.weakdef != NULL)
2532 {
2533 if (eh->u.weakdef->root.type != bfd_link_hash_defined
2534 && eh->u.weakdef->root.type != bfd_link_hash_defweak)
2535 abort ();
2536 eh->root.u.def.section = eh->u.weakdef->root.u.def.section;
2537 eh->root.u.def.value = eh->u.weakdef->root.u.def.value;
2538 eh->non_got_ref = eh->u.weakdef->non_got_ref;
2539 return TRUE;
2540 }
2541
2542 /* This is a reference to a symbol defined by a dynamic object which
2543 is not a function. */
2544
2545 /* If we are creating a shared library, we must presume that the
2546 only references to the symbol are via the global offset table.
2547 For such cases we need not do anything here; the relocations will
2548 be handled correctly by relocate_section. */
2549 if (bfd_link_pic (info))
2550 return TRUE;
2551
2552 /* If there are no references to this symbol that do not use the
2553 GOT, we don't need to generate a copy reloc. */
2554 if (!eh->non_got_ref)
2555 return TRUE;
2556
2557 /* If -z nocopyreloc was given, we won't generate them either. */
2558 if (info->nocopyreloc)
2559 {
2560 eh->non_got_ref = 0;
2561 return TRUE;
2562 }
2563
2564 hh = (struct elf_metag_link_hash_entry *) eh;
2565 for (hdh_p = hh->dyn_relocs; hdh_p != NULL; hdh_p = hdh_p->hdh_next)
2566 {
2567 s = hdh_p->sec->output_section;
2568 if (s != NULL && (s->flags & SEC_READONLY) != 0)
2569 break;
2570 }
2571
2572 /* If we didn't find any dynamic relocs in read-only sections, then
2573 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
2574 if (hdh_p == NULL)
2575 {
2576 eh->non_got_ref = 0;
2577 return TRUE;
2578 }
2579
2580 /* We must allocate the symbol in our .dynbss section, which will
2581 become part of the .bss section of the executable. There will be
2582 an entry for this symbol in the .dynsym section. The dynamic
2583 object will contain position independent code, so all references
2584 from the dynamic object to this symbol will go through the global
2585 offset table. The dynamic linker will use the .dynsym entry to
2586 determine the address it must put in the global offset table, so
2587 both the dynamic object and the regular object will refer to the
2588 same memory location for the variable. */
2589
2590 htab = metag_link_hash_table (info);
2591
2592 /* We must generate a COPY reloc to tell the dynamic linker to
2593 copy the initial value out of the dynamic object and into the
2594 runtime process image. */
2595 if ((eh->root.u.def.section->flags & SEC_ALLOC) != 0 && eh->size != 0)
2596 {
2597 htab->srelbss->size += sizeof (Elf32_External_Rela);
2598 eh->needs_copy = 1;
2599 }
2600
2601 s = htab->sdynbss;
2602
2603 return _bfd_elf_adjust_dynamic_copy (info, eh, s);
2604 }
2605
2606 /* Allocate space in .plt, .got and associated reloc sections for
2607 global syms. */
2608
2609 static bfd_boolean
2610 allocate_dynrelocs (struct elf_link_hash_entry *eh, void *inf)
2611 {
2612 struct bfd_link_info *info;
2613 struct elf_metag_link_hash_table *htab;
2614 struct elf_metag_link_hash_entry *hh;
2615 struct elf_metag_dyn_reloc_entry *hdh_p;
2616
2617 if (eh->root.type == bfd_link_hash_indirect)
2618 return TRUE;
2619
2620 if (eh->root.type == bfd_link_hash_warning)
2621 eh = (struct elf_link_hash_entry *) eh->root.u.i.link;
2622
2623 info = inf;
2624 htab = metag_link_hash_table (info);
2625
2626 if (htab->etab.dynamic_sections_created
2627 && eh->plt.refcount > 0)
2628 {
2629 /* Make sure this symbol is output as a dynamic symbol.
2630 Undefined weak syms won't yet be marked as dynamic. */
2631 if (eh->dynindx == -1
2632 && !eh->forced_local)
2633 {
2634 if (! bfd_elf_link_record_dynamic_symbol (info, eh))
2635 return FALSE;
2636 }
2637
2638 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, bfd_link_pic (info), eh))
2639 {
2640 asection *s = htab->splt;
2641
2642 /* If this is the first .plt entry, make room for the special
2643 first entry. */
2644 if (s->size == 0)
2645 s->size += PLT_ENTRY_SIZE;
2646
2647 eh->plt.offset = s->size;
2648
2649 /* If this symbol is not defined in a regular file, and we are
2650 not generating a shared library, then set the symbol to this
2651 location in the .plt. This is required to make function
2652 pointers compare as equal between the normal executable and
2653 the shared library. */
2654 if (! bfd_link_pic (info)
2655 && !eh->def_regular)
2656 {
2657 eh->root.u.def.section = s;
2658 eh->root.u.def.value = eh->plt.offset;
2659 }
2660
2661 /* Make room for this entry. */
2662 s->size += PLT_ENTRY_SIZE;
2663
2664 /* We also need to make an entry in the .got.plt section, which
2665 will be placed in the .got section by the linker script. */
2666 htab->sgotplt->size += 4;
2667
2668 /* We also need to make an entry in the .rel.plt section. */
2669 htab->srelplt->size += sizeof (Elf32_External_Rela);
2670 }
2671 else
2672 {
2673 eh->plt.offset = (bfd_vma) -1;
2674 eh->needs_plt = 0;
2675 }
2676 }
2677 else
2678 {
2679 eh->plt.offset = (bfd_vma) -1;
2680 eh->needs_plt = 0;
2681 }
2682
2683 if (eh->got.refcount > 0)
2684 {
2685 asection *s;
2686 bfd_boolean dyn;
2687 int tls_type = metag_elf_hash_entry (eh)->tls_type;
2688
2689 /* Make sure this symbol is output as a dynamic symbol.
2690 Undefined weak syms won't yet be marked as dynamic. */
2691 if (eh->dynindx == -1
2692 && !eh->forced_local)
2693 {
2694 if (! bfd_elf_link_record_dynamic_symbol (info, eh))
2695 return FALSE;
2696 }
2697
2698 s = htab->sgot;
2699
2700 eh->got.offset = s->size;
2701 s->size += 4;
2702 /* R_METAG_TLS_GD needs 2 consecutive GOT slots. */
2703 if (tls_type == GOT_TLS_GD)
2704 s->size += 4;
2705 dyn = htab->etab.dynamic_sections_created;
2706 /* R_METAG_TLS_IE needs one dynamic relocation if dynamic,
2707 R_METAG_TLS_GD needs one if local symbol and two if global. */
2708 if ((tls_type == GOT_TLS_GD && eh->dynindx == -1)
2709 || (tls_type == GOT_TLS_IE && dyn))
2710 htab->srelgot->size += sizeof (Elf32_External_Rela);
2711 else if (tls_type == GOT_TLS_GD)
2712 htab->srelgot->size += 2 * sizeof (Elf32_External_Rela);
2713 else if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
2714 bfd_link_pic (info),
2715 eh))
2716 htab->srelgot->size += sizeof (Elf32_External_Rela);
2717 }
2718 else
2719 eh->got.offset = (bfd_vma) -1;
2720
2721 hh = (struct elf_metag_link_hash_entry *) eh;
2722 if (hh->dyn_relocs == NULL)
2723 return TRUE;
2724
2725 /* If this is a -Bsymbolic shared link, then we need to discard all
2726 space allocated for dynamic pc-relative relocs against symbols
2727 defined in a regular object. For the normal shared case, discard
2728 space for relocs that have become local due to symbol visibility
2729 changes. */
2730 if (bfd_link_pic (info))
2731 {
2732 if (SYMBOL_CALLS_LOCAL (info, eh))
2733 {
2734 struct elf_metag_dyn_reloc_entry **hdh_pp;
2735
2736 for (hdh_pp = &hh->dyn_relocs; (hdh_p = *hdh_pp) != NULL; )
2737 {
2738 hdh_p->count -= hdh_p->relative_count;
2739 hdh_p->relative_count = 0;
2740 if (hdh_p->count == 0)
2741 *hdh_pp = hdh_p->hdh_next;
2742 else
2743 hdh_pp = &hdh_p->hdh_next;
2744 }
2745 }
2746
2747 /* Also discard relocs on undefined weak syms with non-default
2748 visibility. */
2749 if (hh->dyn_relocs != NULL
2750 && eh->root.type == bfd_link_hash_undefweak)
2751 {
2752 if (ELF_ST_VISIBILITY (eh->other) != STV_DEFAULT)
2753 hh->dyn_relocs = NULL;
2754
2755 /* Make sure undefined weak symbols are output as a dynamic
2756 symbol in PIEs. */
2757 else if (eh->dynindx == -1
2758 && !eh->forced_local)
2759 {
2760 if (! bfd_elf_link_record_dynamic_symbol (info, eh))
2761 return FALSE;
2762 }
2763 }
2764 }
2765 else
2766 {
2767 /* For the non-shared case, discard space for relocs against
2768 symbols which turn out to need copy relocs or are not
2769 dynamic. */
2770 if (!eh->non_got_ref
2771 && ((eh->def_dynamic
2772 && !eh->def_regular)
2773 || (htab->etab.dynamic_sections_created
2774 && (eh->root.type == bfd_link_hash_undefweak
2775 || eh->root.type == bfd_link_hash_undefined))))
2776 {
2777 /* Make sure this symbol is output as a dynamic symbol.
2778 Undefined weak syms won't yet be marked as dynamic. */
2779 if (eh->dynindx == -1
2780 && !eh->forced_local)
2781 {
2782 if (! bfd_elf_link_record_dynamic_symbol (info, eh))
2783 return FALSE;
2784 }
2785
2786 /* If that succeeded, we know we'll be keeping all the
2787 relocs. */
2788 if (eh->dynindx != -1)
2789 goto keep;
2790 }
2791
2792 hh->dyn_relocs = NULL;
2793 return TRUE;
2794
2795 keep: ;
2796 }
2797
2798 /* Finally, allocate space. */
2799 for (hdh_p = hh->dyn_relocs; hdh_p != NULL; hdh_p = hdh_p->hdh_next)
2800 {
2801 asection *sreloc = elf_section_data (hdh_p->sec)->sreloc;
2802 sreloc->size += hdh_p->count * sizeof (Elf32_External_Rela);
2803 }
2804
2805 return TRUE;
2806 }
2807
2808 /* Find any dynamic relocs that apply to read-only sections. */
2809
2810 static bfd_boolean
2811 readonly_dynrelocs (struct elf_link_hash_entry *eh, void *inf)
2812 {
2813 struct elf_metag_link_hash_entry *hh;
2814 struct elf_metag_dyn_reloc_entry *hdh_p;
2815
2816 if (eh->root.type == bfd_link_hash_warning)
2817 eh = (struct elf_link_hash_entry *) eh->root.u.i.link;
2818
2819 hh = (struct elf_metag_link_hash_entry *) eh;
2820 for (hdh_p = hh->dyn_relocs; hdh_p != NULL; hdh_p = hdh_p->hdh_next)
2821 {
2822 asection *s = hdh_p->sec->output_section;
2823
2824 if (s != NULL && (s->flags & SEC_READONLY) != 0)
2825 {
2826 struct bfd_link_info *info = inf;
2827
2828 info->flags |= DF_TEXTREL;
2829
2830 /* Not an error, just cut short the traversal. */
2831 return FALSE;
2832 }
2833 }
2834 return TRUE;
2835 }
2836
2837 /* Set the sizes of the dynamic sections. */
2838
2839 static bfd_boolean
2840 elf_metag_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2841 struct bfd_link_info *info)
2842 {
2843 struct elf_metag_link_hash_table *htab;
2844 bfd *dynobj;
2845 bfd *ibfd;
2846 asection *s;
2847 bfd_boolean relocs;
2848
2849 htab = metag_link_hash_table (info);
2850 dynobj = htab->etab.dynobj;
2851 if (dynobj == NULL)
2852 abort ();
2853
2854 if (htab->etab.dynamic_sections_created)
2855 {
2856 /* Set the contents of the .interp section to the interpreter. */
2857 if (bfd_link_executable (info) && !info->nointerp)
2858 {
2859 s = bfd_get_linker_section (dynobj, ".interp");
2860 if (s == NULL)
2861 abort ();
2862 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2863 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2864 }
2865 }
2866
2867 /* Set up .got offsets for local syms, and space for local dynamic
2868 relocs. */
2869 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
2870 {
2871 bfd_signed_vma *local_got;
2872 bfd_signed_vma *end_local_got;
2873 bfd_size_type locsymcount;
2874 Elf_Internal_Shdr *symtab_hdr;
2875 asection *srel;
2876 char *local_tls_type;
2877
2878 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
2879 continue;
2880
2881 for (s = ibfd->sections; s != NULL; s = s->next)
2882 {
2883 struct elf_metag_dyn_reloc_entry *hdh_p;
2884
2885 for (hdh_p = ((struct elf_metag_dyn_reloc_entry *)
2886 elf_section_data (s)->local_dynrel);
2887 hdh_p != NULL;
2888 hdh_p = hdh_p->hdh_next)
2889 {
2890 if (!bfd_is_abs_section (hdh_p->sec)
2891 && bfd_is_abs_section (hdh_p->sec->output_section))
2892 {
2893 /* Input section has been discarded, either because
2894 it is a copy of a linkonce section or due to
2895 linker script /DISCARD/, so we'll be discarding
2896 the relocs too. */
2897 }
2898 else if (hdh_p->count != 0)
2899 {
2900 srel = elf_section_data (hdh_p->sec)->sreloc;
2901 srel->size += hdh_p->count * sizeof (Elf32_External_Rela);
2902 if ((hdh_p->sec->output_section->flags & SEC_READONLY) != 0)
2903 info->flags |= DF_TEXTREL;
2904 }
2905 }
2906 }
2907
2908 local_got = elf_local_got_refcounts (ibfd);
2909 if (!local_got)
2910 continue;
2911
2912 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
2913 locsymcount = symtab_hdr->sh_info;
2914 end_local_got = local_got + locsymcount;
2915 local_tls_type = metag_elf_local_got_tls_type (ibfd);
2916 s = htab->sgot;
2917 srel = htab->srelgot;
2918 for (; local_got < end_local_got; ++local_got)
2919 {
2920 if (*local_got > 0)
2921 {
2922 *local_got = s->size;
2923 s->size += GOT_ENTRY_SIZE;
2924 /* R_METAG_TLS_GD relocs need 2 consecutive GOT entries. */
2925 if (*local_tls_type == GOT_TLS_GD)
2926 s->size += 4;
2927 if (bfd_link_pic (info))
2928 srel->size += sizeof (Elf32_External_Rela);
2929 }
2930 else
2931 *local_got = (bfd_vma) -1;
2932 ++local_tls_type;
2933 }
2934 }
2935
2936 if (htab->tls_ldm_got.refcount > 0)
2937 {
2938 /* Allocate 2 got entries and 1 dynamic reloc for R_METAG_TLS_LDM
2939 reloc. */
2940 htab->tls_ldm_got.offset = htab->sgot->size;
2941 htab->sgot->size += 8;
2942 htab->srelgot->size += sizeof (Elf32_External_Rela);
2943 }
2944 else
2945 htab->tls_ldm_got.offset = -1;
2946
2947 /* Allocate global sym .plt and .got entries, and space for global
2948 sym dynamic relocs. */
2949 elf_link_hash_traverse (&htab->etab, allocate_dynrelocs, info);
2950
2951 /* We now have determined the sizes of the various dynamic sections.
2952 Allocate memory for them. */
2953 relocs = FALSE;
2954 for (s = dynobj->sections; s != NULL; s = s->next)
2955 {
2956 bfd_boolean reloc_section = FALSE;
2957
2958 if ((s->flags & SEC_LINKER_CREATED) == 0)
2959 continue;
2960
2961 if (s == htab->splt
2962 || s == htab->sgot
2963 || s == htab->sgotplt
2964 || s == htab->sdynbss)
2965 {
2966 /* Strip this section if we don't need it; see the
2967 comment below. */
2968 }
2969 else if (CONST_STRNEQ (bfd_get_section_name (dynobj, s), ".rela"))
2970 {
2971 if (s->size != 0 && s != htab->srelplt)
2972 relocs = TRUE;
2973
2974 /* We use the reloc_count field as a counter if we need
2975 to copy relocs into the output file. */
2976 s->reloc_count = 0;
2977 reloc_section = TRUE;
2978 }
2979 else
2980 {
2981 /* It's not one of our sections, so don't allocate space. */
2982 continue;
2983 }
2984
2985 if (s->size == 0)
2986 {
2987 /* If we don't need this section, strip it from the
2988 output file. This is mostly to handle .rela.bss and
2989 .rela.plt. We must create both sections in
2990 create_dynamic_sections, because they must be created
2991 before the linker maps input sections to output
2992 sections. The linker does that before
2993 adjust_dynamic_symbol is called, and it is that
2994 function which decides whether anything needs to go
2995 into these sections. */
2996 s->flags |= SEC_EXCLUDE;
2997 continue;
2998 }
2999
3000 if ((s->flags & SEC_HAS_CONTENTS) == 0)
3001 continue;
3002
3003 /* Allocate memory for the section contents. */
3004 s->contents = bfd_zalloc (dynobj, s->size);
3005 if (s->contents == NULL)
3006 return FALSE;
3007 else if (reloc_section)
3008 {
3009 unsigned char *contents = s->contents;
3010 Elf32_External_Rela reloc;
3011
3012 /* Fill the reloc section with a R_METAG_NONE type reloc. */
3013 memset(&reloc, 0, sizeof(Elf32_External_Rela));
3014 reloc.r_info[0] = R_METAG_NONE;
3015 for (; contents < (s->contents + s->size);
3016 contents += sizeof(Elf32_External_Rela))
3017 {
3018 memcpy(contents, &reloc, sizeof(Elf32_External_Rela));
3019 }
3020 }
3021 }
3022
3023 if (htab->etab.dynamic_sections_created)
3024 {
3025 /* Add some entries to the .dynamic section. We fill in the
3026 values later, in elf_metag_finish_dynamic_sections, but we
3027 must add the entries now so that we get the correct size for
3028 the .dynamic section. The DT_DEBUG entry is filled in by the
3029 dynamic linker and used by the debugger. */
3030 #define add_dynamic_entry(TAG, VAL) \
3031 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
3032
3033 if (!add_dynamic_entry (DT_PLTGOT, 0))
3034 return FALSE;
3035
3036 if (bfd_link_executable (info))
3037 {
3038 if (!add_dynamic_entry (DT_DEBUG, 0))
3039 return FALSE;
3040 }
3041
3042 if (htab->srelplt->size != 0)
3043 {
3044 if (!add_dynamic_entry (DT_PLTRELSZ, 0)
3045 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
3046 || !add_dynamic_entry (DT_JMPREL, 0))
3047 return FALSE;
3048 }
3049
3050 if (relocs)
3051 {
3052 if (!add_dynamic_entry (DT_RELA, 0)
3053 || !add_dynamic_entry (DT_RELASZ, 0)
3054 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
3055 return FALSE;
3056
3057 /* If any dynamic relocs apply to a read-only section,
3058 then we need a DT_TEXTREL entry. */
3059 if ((info->flags & DF_TEXTREL) == 0)
3060 elf_link_hash_traverse (&htab->etab, readonly_dynrelocs, info);
3061
3062 if ((info->flags & DF_TEXTREL) != 0)
3063 {
3064 if (!add_dynamic_entry (DT_TEXTREL, 0))
3065 return FALSE;
3066 }
3067 }
3068 }
3069 #undef add_dynamic_entry
3070
3071 return TRUE;
3072 }
3073
3074 /* Finish up dynamic symbol handling. We set the contents of various
3075 dynamic sections here. */
3076
3077 static bfd_boolean
3078 elf_metag_finish_dynamic_symbol (bfd *output_bfd,
3079 struct bfd_link_info *info,
3080 struct elf_link_hash_entry *eh,
3081 Elf_Internal_Sym *sym)
3082 {
3083 struct elf_metag_link_hash_table *htab;
3084 Elf_Internal_Rela rel;
3085 bfd_byte *loc;
3086
3087 htab = metag_link_hash_table (info);
3088
3089 if (eh->plt.offset != (bfd_vma) -1)
3090 {
3091 asection *splt;
3092 asection *sgot;
3093 asection *srela;
3094
3095 bfd_vma plt_index;
3096 bfd_vma got_offset;
3097 bfd_vma got_entry;
3098
3099 if (eh->plt.offset & 1)
3100 abort ();
3101
3102 BFD_ASSERT (eh->dynindx != -1);
3103
3104 splt = htab->splt;
3105 sgot = htab->sgotplt;
3106 srela = htab->srelplt;
3107 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
3108
3109 /* Get the index in the procedure linkage table which
3110 corresponds to this symbol. This is the index of this symbol
3111 in all the symbols for which we are making plt entries. The
3112 first entry in the procedure linkage table is reserved. */
3113 plt_index = eh->plt.offset / PLT_ENTRY_SIZE - 1;
3114
3115 /* Get the offset into the .got.plt table of the entry that
3116 corresponds to this function. */
3117 got_offset = plt_index * GOT_ENTRY_SIZE;
3118
3119 BFD_ASSERT (got_offset < (1 << 16));
3120
3121 got_entry = sgot->output_section->vma
3122 + sgot->output_offset
3123 + got_offset;
3124
3125 BFD_ASSERT (plt_index < (1 << 16));
3126
3127 /* Fill in the entry in the procedure linkage table. */
3128 if (! bfd_link_pic (info))
3129 {
3130 bfd_put_32 (output_bfd,
3131 (plt_entry[0]
3132 | (((got_entry >> 16) & 0xffff) << 3)),
3133 splt->contents + eh->plt.offset);
3134 bfd_put_32 (output_bfd,
3135 (plt_entry[1]
3136 | ((got_entry & 0xffff) << 3)),
3137 splt->contents + eh->plt.offset + 4);
3138 bfd_put_32 (output_bfd, plt_entry[2],
3139 splt->contents + eh->plt.offset + 8);
3140 bfd_put_32 (output_bfd,
3141 (plt_entry[3] | (plt_index << 3)),
3142 splt->contents + eh->plt.offset + 12);
3143 bfd_put_32 (output_bfd,
3144 (plt_entry[4]
3145 | ((((unsigned int) ((- (eh->plt.offset + 16)) >> 2)) & 0x7ffff) << 5)),
3146 splt->contents + eh->plt.offset + 16);
3147 }
3148 else
3149 {
3150 bfd_vma addr = got_entry - (splt->output_section->vma +
3151 splt->output_offset + eh->plt.offset);
3152
3153 bfd_put_32 (output_bfd,
3154 plt_pic_entry[0] | (((addr >> 16) & 0xffff) << 3),
3155 splt->contents + eh->plt.offset);
3156 bfd_put_32 (output_bfd,
3157 plt_pic_entry[1] | ((addr & 0xffff) << 3),
3158 splt->contents + eh->plt.offset + 4);
3159 bfd_put_32 (output_bfd, plt_pic_entry[2],
3160 splt->contents + eh->plt.offset + 8);
3161 bfd_put_32 (output_bfd,
3162 (plt_pic_entry[3] | (plt_index << 3)),
3163 splt->contents + eh->plt.offset + 12);
3164 bfd_put_32 (output_bfd,
3165 (plt_pic_entry[4]
3166 + ((((unsigned int) ((- (eh->plt.offset + 16)) >> 2)) & 0x7ffff) << 5)),
3167 splt->contents + eh->plt.offset + 16);
3168 }
3169
3170 /* Fill in the entry in the global offset table. */
3171 bfd_put_32 (output_bfd,
3172 (splt->output_section->vma
3173 + splt->output_offset
3174 + eh->plt.offset
3175 + 12), /* offset within PLT entry */
3176 sgot->contents + got_offset);
3177
3178 /* Fill in the entry in the .rela.plt section. */
3179 rel.r_offset = (sgot->output_section->vma
3180 + sgot->output_offset
3181 + got_offset);
3182 rel.r_info = ELF32_R_INFO (eh->dynindx, R_METAG_JMP_SLOT);
3183 rel.r_addend = 0;
3184 loc = htab->srelplt->contents;
3185 loc += plt_index * sizeof(Elf32_External_Rela);
3186 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
3187
3188 if (!eh->def_regular)
3189 {
3190 /* Mark the symbol as undefined, rather than as defined in
3191 the .plt section. Leave the value alone. */
3192 sym->st_shndx = SHN_UNDEF;
3193 }
3194 }
3195
3196 if (eh->got.offset != (bfd_vma) -1
3197 && (metag_elf_hash_entry (eh)->tls_type & GOT_TLS_GD) == 0
3198 && (metag_elf_hash_entry (eh)->tls_type & GOT_TLS_IE) == 0)
3199 {
3200 /* This symbol has an entry in the global offset table. Set it
3201 up. */
3202
3203 rel.r_offset = ((eh->got.offset &~ (bfd_vma) 1)
3204 + htab->sgot->output_offset
3205 + htab->sgot->output_section->vma);
3206
3207 /* If this is a -Bsymbolic link and the symbol is defined
3208 locally or was forced to be local because of a version file,
3209 we just want to emit a RELATIVE reloc. The entry in the
3210 global offset table will already have been initialized in the
3211 relocate_section function. */
3212 if (bfd_link_pic (info)
3213 && (info->symbolic || eh->dynindx == -1)
3214 && eh->def_regular)
3215 {
3216 rel.r_info = ELF32_R_INFO (0, R_METAG_RELATIVE);
3217 rel.r_addend = (eh->root.u.def.value
3218 + eh->root.u.def.section->output_offset
3219 + eh->root.u.def.section->output_section->vma);
3220 }
3221 else
3222 {
3223 if ((eh->got.offset & 1) != 0)
3224 abort ();
3225 bfd_put_32 (output_bfd, 0, htab->sgot->contents + eh->got.offset);
3226 rel.r_info = ELF32_R_INFO (eh->dynindx, R_METAG_GLOB_DAT);
3227 rel.r_addend = 0;
3228 }
3229
3230 loc = htab->srelgot->contents;
3231 loc += htab->srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
3232 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
3233 }
3234
3235 if (eh->needs_copy)
3236 {
3237 asection *s;
3238
3239 /* This symbol needs a copy reloc. Set it up. */
3240
3241 if (! (eh->dynindx != -1
3242 && (eh->root.type == bfd_link_hash_defined
3243 || eh->root.type == bfd_link_hash_defweak)))
3244 abort ();
3245
3246 s = htab->srelbss;
3247
3248 rel.r_offset = (eh->root.u.def.value
3249 + eh->root.u.def.section->output_offset
3250 + eh->root.u.def.section->output_section->vma);
3251 rel.r_addend = 0;
3252 rel.r_info = ELF32_R_INFO (eh->dynindx, R_METAG_COPY);
3253 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
3254 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
3255 }
3256
3257 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
3258 if (eh->root.root.string[0] == '_'
3259 && (strcmp (eh->root.root.string, "_DYNAMIC") == 0
3260 || eh == htab->etab.hgot))
3261 {
3262 sym->st_shndx = SHN_ABS;
3263 }
3264
3265 return TRUE;
3266 }
3267
3268 /* Set the Meta ELF ABI version. */
3269
3270 static void
3271 elf_metag_post_process_headers (bfd * abfd, struct bfd_link_info * link_info)
3272 {
3273 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
3274
3275 _bfd_elf_post_process_headers (abfd, link_info);
3276 i_ehdrp = elf_elfheader (abfd);
3277 i_ehdrp->e_ident[EI_ABIVERSION] = METAG_ELF_ABI_VERSION;
3278 }
3279
3280 /* Used to decide how to sort relocs in an optimal manner for the
3281 dynamic linker, before writing them out. */
3282
3283 static enum elf_reloc_type_class
3284 elf_metag_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
3285 const asection *rel_sec ATTRIBUTE_UNUSED,
3286 const Elf_Internal_Rela *rela)
3287 {
3288 switch ((int) ELF32_R_TYPE (rela->r_info))
3289 {
3290 case R_METAG_RELATIVE:
3291 return reloc_class_relative;
3292 case R_METAG_JMP_SLOT:
3293 return reloc_class_plt;
3294 case R_METAG_COPY:
3295 return reloc_class_copy;
3296 default:
3297 return reloc_class_normal;
3298 }
3299 }
3300
3301 /* Finish up the dynamic sections. */
3302
3303 static bfd_boolean
3304 elf_metag_finish_dynamic_sections (bfd *output_bfd,
3305 struct bfd_link_info *info)
3306 {
3307 bfd *dynobj;
3308 struct elf_metag_link_hash_table *htab;
3309 asection *sdyn;
3310
3311 htab = metag_link_hash_table (info);
3312 dynobj = htab->etab.dynobj;
3313
3314 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
3315
3316 if (htab->etab.dynamic_sections_created)
3317 {
3318 asection *splt;
3319 Elf32_External_Dyn *dyncon, *dynconend;
3320
3321 if (sdyn == NULL)
3322 abort ();
3323
3324 dyncon = (Elf32_External_Dyn *) sdyn->contents;
3325 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
3326 for (; dyncon < dynconend; dyncon++)
3327 {
3328 Elf_Internal_Dyn dyn;
3329 asection *s;
3330
3331 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
3332
3333 switch (dyn.d_tag)
3334 {
3335 default:
3336 continue;
3337
3338 case DT_PLTGOT:
3339 s = htab->sgot;
3340 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3341 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
3342 break;
3343
3344 case DT_JMPREL:
3345 s = htab->srelplt;
3346 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3347 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
3348 break;
3349
3350 case DT_PLTRELSZ:
3351 s = htab->srelplt;
3352 dyn.d_un.d_val = s->size;
3353 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
3354 break;
3355
3356 case DT_RELASZ:
3357 /* Don't count procedure linkage table relocs in the
3358 overall reloc count. */
3359 if (htab->srelplt) {
3360 s = htab->srelplt;
3361 dyn.d_un.d_val -= s->size;
3362 }
3363 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
3364 break;
3365
3366 case DT_RELA:
3367 /* We may not be using the standard ELF linker script.
3368 If .rela.plt is the first .rela section, we adjust
3369 DT_RELA to not include it. */
3370 if (htab->srelplt) {
3371 s = htab->srelplt;
3372 if (dyn.d_un.d_ptr == s->output_section->vma + s->output_offset)
3373 dyn.d_un.d_ptr += s->size;
3374 }
3375 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
3376 break;
3377 }
3378
3379 }
3380
3381 /* Fill in the first entry in the procedure linkage table. */
3382 splt = htab->splt;
3383 if (splt && splt->size > 0)
3384 {
3385 unsigned long addr;
3386 /* addr = .got + 4 */
3387 addr = htab->sgot->output_section->vma +
3388 htab->sgot->output_offset + 4;
3389 if (bfd_link_pic (info))
3390 {
3391 addr -= splt->output_section->vma + splt->output_offset;
3392 bfd_put_32 (output_bfd,
3393 plt0_pic_entry[0] | (((addr >> 16) & 0xffff) << 3),
3394 splt->contents);
3395 bfd_put_32 (output_bfd,
3396 plt0_pic_entry[1] | ((addr & 0xffff) << 3),
3397 splt->contents + 4);
3398 bfd_put_32 (output_bfd, plt0_pic_entry[2], splt->contents + 8);
3399 bfd_put_32 (output_bfd, plt0_pic_entry[3], splt->contents + 12);
3400 bfd_put_32 (output_bfd, plt0_pic_entry[4], splt->contents + 16);
3401 }
3402 else
3403 {
3404 bfd_put_32 (output_bfd,
3405 plt0_entry[0] | (((addr >> 16) & 0xffff) << 3),
3406 splt->contents);
3407 bfd_put_32 (output_bfd,
3408 plt0_entry[1] | ((addr & 0xffff) << 3),
3409 splt->contents + 4);
3410 bfd_put_32 (output_bfd, plt0_entry[2], splt->contents + 8);
3411 bfd_put_32 (output_bfd, plt0_entry[3], splt->contents + 12);
3412 bfd_put_32 (output_bfd, plt0_entry[4], splt->contents + 16);
3413 }
3414
3415 elf_section_data (splt->output_section)->this_hdr.sh_entsize =
3416 PLT_ENTRY_SIZE;
3417 }
3418 }
3419
3420 if (htab->sgot != NULL && htab->sgot->size != 0)
3421 {
3422 /* Fill in the first entry in the global offset table.
3423 We use it to point to our dynamic section, if we have one. */
3424 bfd_put_32 (output_bfd,
3425 sdyn ? sdyn->output_section->vma + sdyn->output_offset : 0,
3426 htab->sgot->contents);
3427
3428 /* The second entry is reserved for use by the dynamic linker. */
3429 memset (htab->sgot->contents + GOT_ENTRY_SIZE, 0, GOT_ENTRY_SIZE);
3430
3431 /* Set .got entry size. */
3432 elf_section_data (htab->sgot->output_section)
3433 ->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
3434 }
3435
3436 return TRUE;
3437 }
3438
3439 /* Return the section that should be marked against GC for a given
3440 relocation. */
3441
3442 static asection *
3443 elf_metag_gc_mark_hook (asection *sec,
3444 struct bfd_link_info *info,
3445 Elf_Internal_Rela *rela,
3446 struct elf_link_hash_entry *hh,
3447 Elf_Internal_Sym *sym)
3448 {
3449 if (hh != NULL)
3450 switch ((unsigned int) ELF32_R_TYPE (rela->r_info))
3451 {
3452 case R_METAG_GNU_VTINHERIT:
3453 case R_METAG_GNU_VTENTRY:
3454 return NULL;
3455 }
3456
3457 return _bfd_elf_gc_mark_hook (sec, info, rela, hh, sym);
3458 }
3459
3460 /* Update the got and plt entry reference counts for the section being
3461 removed. */
3462
3463 static bfd_boolean
3464 elf_metag_gc_sweep_hook (bfd *abfd ATTRIBUTE_UNUSED,
3465 struct bfd_link_info *info ATTRIBUTE_UNUSED,
3466 asection *sec ATTRIBUTE_UNUSED,
3467 const Elf_Internal_Rela *relocs ATTRIBUTE_UNUSED)
3468 {
3469 Elf_Internal_Shdr *symtab_hdr;
3470 struct elf_link_hash_entry **eh_syms;
3471 bfd_signed_vma *local_got_refcounts;
3472 bfd_signed_vma *local_plt_refcounts;
3473 const Elf_Internal_Rela *rel, *relend;
3474
3475 if (bfd_link_relocatable (info))
3476 return TRUE;
3477
3478 elf_section_data (sec)->local_dynrel = NULL;
3479
3480 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3481 eh_syms = elf_sym_hashes (abfd);
3482 local_got_refcounts = elf_local_got_refcounts (abfd);
3483 local_plt_refcounts = local_got_refcounts;
3484 if (local_plt_refcounts != NULL)
3485 local_plt_refcounts += symtab_hdr->sh_info;
3486
3487 relend = relocs + sec->reloc_count;
3488 for (rel = relocs; rel < relend; rel++)
3489 {
3490 unsigned long r_symndx;
3491 unsigned int r_type;
3492 struct elf_link_hash_entry *eh = NULL;
3493
3494 r_symndx = ELF32_R_SYM (rel->r_info);
3495 if (r_symndx >= symtab_hdr->sh_info)
3496 {
3497 struct elf_metag_link_hash_entry *hh;
3498 struct elf_metag_dyn_reloc_entry **hdh_pp;
3499 struct elf_metag_dyn_reloc_entry *hdh_p;
3500
3501 eh = eh_syms[r_symndx - symtab_hdr->sh_info];
3502 while (eh->root.type == bfd_link_hash_indirect
3503 || eh->root.type == bfd_link_hash_warning)
3504 eh = (struct elf_link_hash_entry *) eh->root.u.i.link;
3505 hh = (struct elf_metag_link_hash_entry *) eh;
3506
3507 for (hdh_pp = &hh->dyn_relocs; (hdh_p = *hdh_pp) != NULL;
3508 hdh_pp = &hdh_p->hdh_next)
3509 if (hdh_p->sec == sec)
3510 {
3511 /* Everything must go for SEC. */
3512 *hdh_pp = hdh_p->hdh_next;
3513 break;
3514 }
3515 }
3516
3517 r_type = ELF32_R_TYPE (rel->r_info);
3518 switch (r_type)
3519 {
3520 case R_METAG_TLS_LDM:
3521 if (metag_link_hash_table (info)->tls_ldm_got.refcount > 0)
3522 metag_link_hash_table (info)->tls_ldm_got.refcount -= 1;
3523 break;
3524 case R_METAG_TLS_IE:
3525 case R_METAG_TLS_GD:
3526 case R_METAG_GETSET_GOT:
3527 if (eh != NULL)
3528 {
3529 if (eh->got.refcount > 0)
3530 eh->got.refcount -= 1;
3531 }
3532 else if (local_got_refcounts != NULL)
3533 {
3534 if (local_got_refcounts[r_symndx] > 0)
3535 local_got_refcounts[r_symndx] -= 1;
3536 }
3537 break;
3538
3539 case R_METAG_RELBRANCH_PLT:
3540 if (eh != NULL)
3541 {
3542 if (eh->plt.refcount > 0)
3543 eh->plt.refcount -= 1;
3544 }
3545 break;
3546
3547 case R_METAG_ADDR32:
3548 case R_METAG_HIADDR16:
3549 case R_METAG_LOADDR16:
3550 case R_METAG_GETSETOFF:
3551 case R_METAG_RELBRANCH:
3552 if (eh != NULL)
3553 {
3554 struct elf_metag_link_hash_entry *hh;
3555 struct elf_metag_dyn_reloc_entry **hdh_pp;
3556 struct elf_metag_dyn_reloc_entry *hdh_p;
3557
3558 if (!bfd_link_pic (info) && eh->plt.refcount > 0)
3559 eh->plt.refcount -= 1;
3560
3561 hh = (struct elf_metag_link_hash_entry *) eh;
3562
3563 for (hdh_pp = &hh->dyn_relocs; (hdh_p = *hdh_pp) != NULL;
3564 hdh_pp = &hdh_p->hdh_next)
3565 if (hdh_p->sec == sec)
3566 {
3567 if (ELF32_R_TYPE (rel->r_info) == R_METAG_RELBRANCH)
3568 hdh_p->relative_count -= 1;
3569 hdh_p->count -= 1;
3570 if (hdh_p->count == 0)
3571 *hdh_pp = hdh_p->hdh_next;
3572 break;
3573 }
3574 }
3575 break;
3576
3577 default:
3578 break;
3579 }
3580 }
3581
3582 return TRUE;
3583 }
3584
3585 /* Determine the type of stub needed, if any, for a call. */
3586
3587 static enum elf_metag_stub_type
3588 metag_type_of_stub (asection *input_sec,
3589 const Elf_Internal_Rela *rel,
3590 struct elf_metag_link_hash_entry *hh,
3591 bfd_vma destination,
3592 struct bfd_link_info *info ATTRIBUTE_UNUSED)
3593 {
3594 bfd_vma location;
3595 bfd_vma branch_offset;
3596 bfd_vma max_branch_offset;
3597
3598 if (hh != NULL &&
3599 !(hh->eh.root.type == bfd_link_hash_defined
3600 || hh->eh.root.type == bfd_link_hash_defweak))
3601 return metag_stub_none;
3602
3603 /* Determine where the call point is. */
3604 location = (input_sec->output_offset
3605 + input_sec->output_section->vma
3606 + rel->r_offset);
3607
3608 branch_offset = destination - location;
3609
3610 /* Determine if a long branch stub is needed. Meta branch offsets
3611 are signed 19 bits 4 byte aligned. */
3612 max_branch_offset = (1 << (BRANCH_BITS-1)) << 2;
3613
3614 if (branch_offset + max_branch_offset >= 2*max_branch_offset)
3615 {
3616 if (bfd_link_pic (info))
3617 return metag_stub_long_branch_shared;
3618 else
3619 return metag_stub_long_branch;
3620 }
3621
3622 return metag_stub_none;
3623 }
3624
3625 #define MOVT_A0_3 0x82180005
3626 #define JUMP_A0_3 0xac180003
3627
3628 #define MOVT_A1LBP 0x83080005
3629 #define ADD_A1LBP 0x83080000
3630
3631 #define ADDT_A0_3_CPC 0x82980001
3632 #define ADD_A0_3_A0_3 0x82180000
3633 #define MOV_PC_A0_3 0xa3180ca0
3634
3635 static bfd_boolean
3636 metag_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg ATTRIBUTE_UNUSED)
3637 {
3638 struct elf_metag_stub_hash_entry *hsh;
3639 asection *stub_sec;
3640 bfd *stub_bfd;
3641 bfd_byte *loc;
3642 bfd_vma sym_value;
3643 int size;
3644
3645 /* Massage our args to the form they really have. */
3646 hsh = (struct elf_metag_stub_hash_entry *) gen_entry;
3647
3648 stub_sec = hsh->stub_sec;
3649
3650 /* Make a note of the offset within the stubs for this entry. */
3651 hsh->stub_offset = stub_sec->size;
3652 loc = stub_sec->contents + hsh->stub_offset;
3653
3654 stub_bfd = stub_sec->owner;
3655
3656 switch (hsh->stub_type)
3657 {
3658 case metag_stub_long_branch_shared:
3659 /* A PIC long branch stub is an ADDT and an ADD instruction used to
3660 calculate the jump target using A0.3 as a temporary. Then a MOV
3661 to PC carries out the jump. */
3662 sym_value = (hsh->target_value
3663 + hsh->target_section->output_offset
3664 + hsh->target_section->output_section->vma
3665 + hsh->addend);
3666
3667 sym_value -= (hsh->stub_offset
3668 + stub_sec->output_offset
3669 + stub_sec->output_section->vma);
3670
3671 bfd_put_32 (stub_bfd, ADDT_A0_3_CPC | (((sym_value >> 16) & 0xffff) << 3),
3672 loc);
3673
3674 bfd_put_32 (stub_bfd, ADD_A0_3_A0_3 | ((sym_value & 0xffff) << 3),
3675 loc + 4);
3676
3677 bfd_put_32 (stub_bfd, MOV_PC_A0_3, loc + 8);
3678
3679 size = 12;
3680 break;
3681 case metag_stub_long_branch:
3682 /* A standard long branch stub is a MOVT instruction followed by a
3683 JUMP instruction using the A0.3 register as a temporary. This is
3684 the same method used by the LDLK linker (patch.c). */
3685 sym_value = (hsh->target_value
3686 + hsh->target_section->output_offset
3687 + hsh->target_section->output_section->vma
3688 + hsh->addend);
3689
3690 bfd_put_32 (stub_bfd, MOVT_A0_3 | (((sym_value >> 16) & 0xffff) << 3),
3691 loc);
3692
3693 bfd_put_32 (stub_bfd, JUMP_A0_3 | ((sym_value & 0xffff) << 3), loc + 4);
3694
3695 size = 8;
3696 break;
3697 default:
3698 BFD_FAIL ();
3699 return FALSE;
3700 }
3701
3702 stub_sec->size += size;
3703 return TRUE;
3704 }
3705
3706 /* As above, but don't actually build the stub. Just bump offset so
3707 we know stub section sizes. */
3708
3709 static bfd_boolean
3710 metag_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg ATTRIBUTE_UNUSED)
3711 {
3712 struct elf_metag_stub_hash_entry *hsh;
3713 int size = 0;
3714
3715 /* Massage our args to the form they really have. */
3716 hsh = (struct elf_metag_stub_hash_entry *) gen_entry;
3717
3718 if (hsh->stub_type == metag_stub_long_branch)
3719 size = 8;
3720 else if (hsh->stub_type == metag_stub_long_branch_shared)
3721 size = 12;
3722
3723 hsh->stub_sec->size += size;
3724 return TRUE;
3725 }
3726
3727 /* Set up various things so that we can make a list of input sections
3728 for each output section included in the link. Returns -1 on error,
3729 0 when no stubs will be needed, and 1 on success. */
3730
3731 int
3732 elf_metag_setup_section_lists (bfd *output_bfd, struct bfd_link_info *info)
3733 {
3734 bfd *input_bfd;
3735 unsigned int bfd_count;
3736 unsigned int top_id, top_index;
3737 asection *section;
3738 asection **input_list, **list;
3739 bfd_size_type amt;
3740 struct elf_metag_link_hash_table *htab = metag_link_hash_table (info);
3741
3742 /* Count the number of input BFDs and find the top input section id. */
3743 for (input_bfd = info->input_bfds, bfd_count = 0, top_id = 0;
3744 input_bfd != NULL;
3745 input_bfd = input_bfd->link.next)
3746 {
3747 bfd_count += 1;
3748 for (section = input_bfd->sections;
3749 section != NULL;
3750 section = section->next)
3751 {
3752 if (top_id < section->id)
3753 top_id = section->id;
3754 }
3755 }
3756
3757 htab->bfd_count = bfd_count;
3758
3759 amt = sizeof (struct map_stub) * (top_id + 1);
3760 htab->stub_group = bfd_zmalloc (amt);
3761 if (htab->stub_group == NULL)
3762 return -1;
3763
3764 /* We can't use output_bfd->section_count here to find the top output
3765 section index as some sections may have been removed, and
3766 strip_excluded_output_sections doesn't renumber the indices. */
3767 for (section = output_bfd->sections, top_index = 0;
3768 section != NULL;
3769 section = section->next)
3770 {
3771 if (top_index < section->index)
3772 top_index = section->index;
3773 }
3774
3775 htab->top_index = top_index;
3776 amt = sizeof (asection *) * (top_index + 1);
3777 input_list = bfd_malloc (amt);
3778 htab->input_list = input_list;
3779 if (input_list == NULL)
3780 return -1;
3781
3782 /* For sections we aren't interested in, mark their entries with a
3783 value we can check later. */
3784 list = input_list + top_index;
3785 do
3786 *list = bfd_abs_section_ptr;
3787 while (list-- != input_list);
3788
3789 for (section = output_bfd->sections;
3790 section != NULL;
3791 section = section->next)
3792 {
3793 /* FIXME: This is a bit of hack. Currently our .ctors and .dtors
3794 * have PC relative relocs in them but no code flag set. */
3795 if (((section->flags & SEC_CODE) != 0) ||
3796 strcmp(".ctors", section->name) ||
3797 strcmp(".dtors", section->name))
3798 input_list[section->index] = NULL;
3799 }
3800
3801 return 1;
3802 }
3803
3804 /* The linker repeatedly calls this function for each input section,
3805 in the order that input sections are linked into output sections.
3806 Build lists of input sections to determine groupings between which
3807 we may insert linker stubs. */
3808
3809 void
3810 elf_metag_next_input_section (struct bfd_link_info *info, asection *isec)
3811 {
3812 struct elf_metag_link_hash_table *htab = metag_link_hash_table (info);
3813
3814 if (isec->output_section->index <= htab->top_index)
3815 {
3816 asection **list = htab->input_list + isec->output_section->index;
3817 if (*list != bfd_abs_section_ptr)
3818 {
3819 /* Steal the link_sec pointer for our list. */
3820 #define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
3821 /* This happens to make the list in reverse order,
3822 which is what we want. */
3823 PREV_SEC (isec) = *list;
3824 *list = isec;
3825 }
3826 }
3827 }
3828
3829 /* See whether we can group stub sections together. Grouping stub
3830 sections may result in fewer stubs. More importantly, we need to
3831 put all .init* and .fini* stubs at the beginning of the .init or
3832 .fini output sections respectively, because glibc splits the
3833 _init and _fini functions into multiple parts. Putting a stub in
3834 the middle of a function is not a good idea. */
3835
3836 static void
3837 group_sections (struct elf_metag_link_hash_table *htab,
3838 bfd_size_type stub_group_size,
3839 bfd_boolean stubs_always_before_branch)
3840 {
3841 asection **list = htab->input_list + htab->top_index;
3842 do
3843 {
3844 asection *tail = *list;
3845 if (tail == bfd_abs_section_ptr)
3846 continue;
3847 while (tail != NULL)
3848 {
3849 asection *curr;
3850 asection *prev;
3851 bfd_size_type total;
3852 bfd_boolean big_sec;
3853
3854 curr = tail;
3855 total = tail->size;
3856 big_sec = total >= stub_group_size;
3857
3858 while ((prev = PREV_SEC (curr)) != NULL
3859 && ((total += curr->output_offset - prev->output_offset)
3860 < stub_group_size))
3861 curr = prev;
3862
3863 /* OK, the size from the start of CURR to the end is less
3864 than stub_group_size bytes and thus can be handled by one stub
3865 section. (or the tail section is itself larger than
3866 stub_group_size bytes, in which case we may be toast.)
3867 We should really be keeping track of the total size of
3868 stubs added here, as stubs contribute to the final output
3869 section size. */
3870 do
3871 {
3872 prev = PREV_SEC (tail);
3873 /* Set up this stub group. */
3874 htab->stub_group[tail->id].link_sec = curr;
3875 }
3876 while (tail != curr && (tail = prev) != NULL);
3877
3878 /* But wait, there's more! Input sections up to stub_group_size
3879 bytes before the stub section can be handled by it too.
3880 Don't do this if we have a really large section after the
3881 stubs, as adding more stubs increases the chance that
3882 branches may not reach into the stub section. */
3883 if (!stubs_always_before_branch && !big_sec)
3884 {
3885 total = 0;
3886 while (prev != NULL
3887 && ((total += tail->output_offset - prev->output_offset)
3888 < stub_group_size))
3889 {
3890 tail = prev;
3891 prev = PREV_SEC (tail);
3892 htab->stub_group[tail->id].link_sec = curr;
3893 }
3894 }
3895 tail = prev;
3896 }
3897 }
3898 while (list-- != htab->input_list);
3899 free (htab->input_list);
3900 #undef PREV_SEC
3901 }
3902
3903 /* Read in all local syms for all input bfds.
3904 Returns -1 on error, 0 otherwise. */
3905
3906 static int
3907 get_local_syms (bfd *output_bfd ATTRIBUTE_UNUSED, bfd *input_bfd,
3908 struct bfd_link_info *info)
3909 {
3910 unsigned int bfd_indx;
3911 Elf_Internal_Sym *local_syms, **all_local_syms;
3912 int stub_changed = 0;
3913 struct elf_metag_link_hash_table *htab = metag_link_hash_table (info);
3914
3915 /* We want to read in symbol extension records only once. To do this
3916 we need to read in the local symbols in parallel and save them for
3917 later use; so hold pointers to the local symbols in an array. */
3918 bfd_size_type amt = sizeof (Elf_Internal_Sym *) * htab->bfd_count;
3919 all_local_syms = bfd_zmalloc (amt);
3920 htab->all_local_syms = all_local_syms;
3921 if (all_local_syms == NULL)
3922 return -1;
3923
3924 /* Walk over all the input BFDs, swapping in local symbols. */
3925 for (bfd_indx = 0;
3926 input_bfd != NULL;
3927 input_bfd = input_bfd->link.next, bfd_indx++)
3928 {
3929 Elf_Internal_Shdr *symtab_hdr;
3930
3931 /* We'll need the symbol table in a second. */
3932 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3933 if (symtab_hdr->sh_info == 0)
3934 continue;
3935
3936 /* We need an array of the local symbols attached to the input bfd. */
3937 local_syms = (Elf_Internal_Sym *) symtab_hdr->contents;
3938 if (local_syms == NULL)
3939 {
3940 local_syms = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
3941 symtab_hdr->sh_info, 0,
3942 NULL, NULL, NULL);
3943 /* Cache them for elf_link_input_bfd. */
3944 symtab_hdr->contents = (unsigned char *) local_syms;
3945 }
3946 if (local_syms == NULL)
3947 return -1;
3948
3949 all_local_syms[bfd_indx] = local_syms;
3950 }
3951
3952 return stub_changed;
3953 }
3954
3955 /* Determine and set the size of the stub section for a final link.
3956
3957 The basic idea here is to examine all the relocations looking for
3958 PC-relative calls to a target that is unreachable with a "CALLR"
3959 instruction. */
3960
3961 /* See elf32-hppa.c and elf64-ppc.c. */
3962
3963 bfd_boolean
3964 elf_metag_size_stubs(bfd *output_bfd, bfd *stub_bfd,
3965 struct bfd_link_info *info,
3966 bfd_signed_vma group_size,
3967 asection * (*add_stub_section) (const char *, asection *),
3968 void (*layout_sections_again) (void))
3969 {
3970 bfd_size_type stub_group_size;
3971 bfd_boolean stubs_always_before_branch;
3972 bfd_boolean stub_changed;
3973 struct elf_metag_link_hash_table *htab = metag_link_hash_table (info);
3974
3975 /* Stash our params away. */
3976 htab->stub_bfd = stub_bfd;
3977 htab->add_stub_section = add_stub_section;
3978 htab->layout_sections_again = layout_sections_again;
3979 stubs_always_before_branch = group_size < 0;
3980 if (group_size < 0)
3981 stub_group_size = -group_size;
3982 else
3983 stub_group_size = group_size;
3984 if (stub_group_size == 1)
3985 {
3986 /* Default values. */
3987 /* FIXME: not sure what these values should be */
3988 if (stubs_always_before_branch)
3989 {
3990 stub_group_size = (1 << BRANCH_BITS);
3991 }
3992 else
3993 {
3994 stub_group_size = (1 << BRANCH_BITS);
3995 }
3996 }
3997
3998 group_sections (htab, stub_group_size, stubs_always_before_branch);
3999
4000 switch (get_local_syms (output_bfd, info->input_bfds, info))
4001 {
4002 default:
4003 if (htab->all_local_syms)
4004 goto error_ret_free_local;
4005 return FALSE;
4006
4007 case 0:
4008 stub_changed = FALSE;
4009 break;
4010
4011 case 1:
4012 stub_changed = TRUE;
4013 break;
4014 }
4015
4016 while (1)
4017 {
4018 bfd *input_bfd;
4019 unsigned int bfd_indx;
4020 asection *stub_sec;
4021
4022 for (input_bfd = info->input_bfds, bfd_indx = 0;
4023 input_bfd != NULL;
4024 input_bfd = input_bfd->link.next, bfd_indx++)
4025 {
4026 Elf_Internal_Shdr *symtab_hdr;
4027 asection *section;
4028 Elf_Internal_Sym *local_syms;
4029
4030 /* We'll need the symbol table in a second. */
4031 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
4032 if (symtab_hdr->sh_info == 0)
4033 continue;
4034
4035 local_syms = htab->all_local_syms[bfd_indx];
4036
4037 /* Walk over each section attached to the input bfd. */
4038 for (section = input_bfd->sections;
4039 section != NULL;
4040 section = section->next)
4041 {
4042 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
4043
4044 /* If there aren't any relocs, then there's nothing more
4045 to do. */
4046 if ((section->flags & SEC_RELOC) == 0
4047 || section->reloc_count == 0)
4048 continue;
4049
4050 /* If this section is a link-once section that will be
4051 discarded, then don't create any stubs. */
4052 if (section->output_section == NULL
4053 || section->output_section->owner != output_bfd)
4054 continue;
4055
4056 /* Get the relocs. */
4057 internal_relocs
4058 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
4059 info->keep_memory);
4060 if (internal_relocs == NULL)
4061 goto error_ret_free_local;
4062
4063 /* Now examine each relocation. */
4064 irela = internal_relocs;
4065 irelaend = irela + section->reloc_count;
4066 for (; irela < irelaend; irela++)
4067 {
4068 unsigned int r_type, r_indx;
4069 enum elf_metag_stub_type stub_type;
4070 struct elf_metag_stub_hash_entry *hsh;
4071 asection *sym_sec;
4072 bfd_vma sym_value;
4073 bfd_vma destination;
4074 struct elf_metag_link_hash_entry *hh;
4075 char *stub_name;
4076 const asection *id_sec;
4077
4078 r_type = ELF32_R_TYPE (irela->r_info);
4079 r_indx = ELF32_R_SYM (irela->r_info);
4080
4081 if (r_type >= (unsigned int) R_METAG_MAX)
4082 {
4083 bfd_set_error (bfd_error_bad_value);
4084 error_ret_free_internal:
4085 if (elf_section_data (section)->relocs == NULL)
4086 free (internal_relocs);
4087 goto error_ret_free_local;
4088 }
4089
4090 /* Only look for stubs on CALLR and B instructions. */
4091 if (!(r_type == (unsigned int) R_METAG_RELBRANCH ||
4092 r_type == (unsigned int) R_METAG_RELBRANCH_PLT))
4093 continue;
4094
4095 /* Now determine the call target, its name, value,
4096 section. */
4097 sym_sec = NULL;
4098 sym_value = 0;
4099 destination = 0;
4100 hh = NULL;
4101 if (r_indx < symtab_hdr->sh_info)
4102 {
4103 /* It's a local symbol. */
4104 Elf_Internal_Sym *sym;
4105 Elf_Internal_Shdr *hdr;
4106 unsigned int shndx;
4107
4108 sym = local_syms + r_indx;
4109 if (ELF_ST_TYPE (sym->st_info) != STT_SECTION)
4110 sym_value = sym->st_value;
4111 shndx = sym->st_shndx;
4112 if (shndx < elf_numsections (input_bfd))
4113 {
4114 hdr = elf_elfsections (input_bfd)[shndx];
4115 sym_sec = hdr->bfd_section;
4116 destination = (sym_value + irela->r_addend
4117 + sym_sec->output_offset
4118 + sym_sec->output_section->vma);
4119 }
4120 }
4121 else
4122 {
4123 /* It's an external symbol. */
4124 int e_indx;
4125
4126 e_indx = r_indx - symtab_hdr->sh_info;
4127 hh = ((struct elf_metag_link_hash_entry *)
4128 elf_sym_hashes (input_bfd)[e_indx]);
4129
4130 while (hh->eh.root.type == bfd_link_hash_indirect
4131 || hh->eh.root.type == bfd_link_hash_warning)
4132 hh = ((struct elf_metag_link_hash_entry *)
4133 hh->eh.root.u.i.link);
4134
4135 if (hh->eh.root.type == bfd_link_hash_defined
4136 || hh->eh.root.type == bfd_link_hash_defweak)
4137 {
4138 sym_sec = hh->eh.root.u.def.section;
4139 sym_value = hh->eh.root.u.def.value;
4140 if (hh->eh.plt.offset != (bfd_vma) -1
4141 && hh->eh.dynindx != -1
4142 && r_type == (unsigned int) R_METAG_RELBRANCH_PLT)
4143 {
4144 sym_sec = htab->splt;
4145 sym_value = hh->eh.plt.offset;
4146 }
4147
4148 if (sym_sec->output_section != NULL)
4149 destination = (sym_value + irela->r_addend
4150 + sym_sec->output_offset
4151 + sym_sec->output_section->vma);
4152 else
4153 continue;
4154 }
4155 else if (hh->eh.root.type == bfd_link_hash_undefweak)
4156 {
4157 if (! bfd_link_pic (info))
4158 continue;
4159 }
4160 else if (hh->eh.root.type == bfd_link_hash_undefined)
4161 {
4162 if (! (info->unresolved_syms_in_objects == RM_IGNORE
4163 && (ELF_ST_VISIBILITY (hh->eh.other)
4164 == STV_DEFAULT)))
4165 continue;
4166 }
4167 else
4168 {
4169 bfd_set_error (bfd_error_bad_value);
4170 goto error_ret_free_internal;
4171 }
4172 }
4173
4174 /* Determine what (if any) linker stub is needed. */
4175 stub_type = metag_type_of_stub (section, irela, hh,
4176 destination, info);
4177 if (stub_type == metag_stub_none)
4178 continue;
4179
4180 /* Support for grouping stub sections. */
4181 id_sec = htab->stub_group[section->id].link_sec;
4182
4183 /* Get the name of this stub. */
4184 stub_name = metag_stub_name (id_sec, sym_sec, hh, irela);
4185 if (!stub_name)
4186 goto error_ret_free_internal;
4187
4188 hsh = metag_stub_hash_lookup (&htab->bstab,
4189 stub_name,
4190 FALSE, FALSE);
4191 if (hsh != NULL)
4192 {
4193 /* The proper stub has already been created. */
4194 free (stub_name);
4195 continue;
4196 }
4197
4198 hsh = metag_add_stub (stub_name, section, htab);
4199 if (hsh == NULL)
4200 {
4201 free (stub_name);
4202 goto error_ret_free_internal;
4203 }
4204 hsh->target_value = sym_value;
4205 hsh->target_section = sym_sec;
4206 hsh->stub_type = stub_type;
4207 hsh->hh = hh;
4208 hsh->addend = irela->r_addend;
4209 stub_changed = TRUE;
4210 }
4211
4212 /* We're done with the internal relocs, free them. */
4213 if (elf_section_data (section)->relocs == NULL)
4214 free (internal_relocs);
4215 }
4216 }
4217
4218 if (!stub_changed)
4219 break;
4220
4221 /* OK, we've added some stubs. Find out the new size of the
4222 stub sections. */
4223 for (stub_sec = htab->stub_bfd->sections;
4224 stub_sec != NULL;
4225 stub_sec = stub_sec->next)
4226 stub_sec->size = 0;
4227
4228 bfd_hash_traverse (&htab->bstab, metag_size_one_stub, htab);
4229
4230 /* Ask the linker to do its stuff. */
4231 (*htab->layout_sections_again) ();
4232 stub_changed = FALSE;
4233 }
4234
4235 free (htab->all_local_syms);
4236 return TRUE;
4237
4238 error_ret_free_local:
4239 free (htab->all_local_syms);
4240 return FALSE;
4241 }
4242
4243 /* Build all the stubs associated with the current output file. The
4244 stubs are kept in a hash table attached to the main linker hash
4245 table. This function is called via metagelf_finish in the linker. */
4246
4247 bfd_boolean
4248 elf_metag_build_stubs (struct bfd_link_info *info)
4249 {
4250 asection *stub_sec;
4251 struct bfd_hash_table *table;
4252 struct elf_metag_link_hash_table *htab;
4253
4254 htab = metag_link_hash_table (info);
4255
4256 for (stub_sec = htab->stub_bfd->sections;
4257 stub_sec != NULL;
4258 stub_sec = stub_sec->next)
4259 {
4260 bfd_size_type size;
4261
4262 /* Allocate memory to hold the linker stubs. */
4263 size = stub_sec->size;
4264 stub_sec->contents = bfd_zalloc (htab->stub_bfd, size);
4265 if (stub_sec->contents == NULL && size != 0)
4266 return FALSE;
4267 stub_sec->size = 0;
4268 }
4269
4270 /* Build the stubs as directed by the stub hash table. */
4271 table = &htab->bstab;
4272 bfd_hash_traverse (table, metag_build_one_stub, info);
4273
4274 return TRUE;
4275 }
4276
4277 /* Return TRUE if SYM represents a local label symbol. */
4278
4279 static bfd_boolean
4280 elf_metag_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
4281 {
4282 if (name[0] == '$' && name[1] == 'L')
4283 return 1;
4284 return _bfd_elf_is_local_label_name (abfd, name);
4285 }
4286
4287 /* Return address for Ith PLT stub in section PLT, for relocation REL
4288 or (bfd_vma) -1 if it should not be included. */
4289
4290 static bfd_vma
4291 elf_metag_plt_sym_val (bfd_vma i, const asection *plt,
4292 const arelent *rel ATTRIBUTE_UNUSED)
4293 {
4294 return plt->vma + (i + 1) * PLT_ENTRY_SIZE;
4295 }
4296
4297 #define ELF_ARCH bfd_arch_metag
4298 #define ELF_TARGET_ID METAG_ELF_DATA
4299 #define ELF_MACHINE_CODE EM_METAG
4300 #define ELF_MINPAGESIZE 0x1000
4301 #define ELF_MAXPAGESIZE 0x4000
4302 #define ELF_COMMONPAGESIZE 0x1000
4303
4304 #define TARGET_LITTLE_SYM metag_elf32_vec
4305 #define TARGET_LITTLE_NAME "elf32-metag"
4306
4307 #define elf_symbol_leading_char '_'
4308
4309 #define elf_info_to_howto_rel NULL
4310 #define elf_info_to_howto metag_info_to_howto_rela
4311
4312 #define bfd_elf32_bfd_is_local_label_name elf_metag_is_local_label_name
4313 #define bfd_elf32_bfd_link_hash_table_create \
4314 elf_metag_link_hash_table_create
4315 #define elf_backend_relocate_section elf_metag_relocate_section
4316 #define elf_backend_gc_mark_hook elf_metag_gc_mark_hook
4317 #define elf_backend_gc_sweep_hook elf_metag_gc_sweep_hook
4318 #define elf_backend_check_relocs elf_metag_check_relocs
4319 #define elf_backend_create_dynamic_sections elf_metag_create_dynamic_sections
4320 #define elf_backend_adjust_dynamic_symbol elf_metag_adjust_dynamic_symbol
4321 #define elf_backend_finish_dynamic_symbol elf_metag_finish_dynamic_symbol
4322 #define elf_backend_finish_dynamic_sections elf_metag_finish_dynamic_sections
4323 #define elf_backend_size_dynamic_sections elf_metag_size_dynamic_sections
4324 #define elf_backend_omit_section_dynsym \
4325 ((bfd_boolean (*) (bfd *, struct bfd_link_info *, asection *)) bfd_true)
4326 #define elf_backend_post_process_headers elf_metag_post_process_headers
4327 #define elf_backend_reloc_type_class elf_metag_reloc_type_class
4328 #define elf_backend_copy_indirect_symbol elf_metag_copy_indirect_symbol
4329 #define elf_backend_plt_sym_val elf_metag_plt_sym_val
4330
4331 #define elf_backend_can_gc_sections 1
4332 #define elf_backend_can_refcount 1
4333 #define elf_backend_got_header_size 12
4334 #define elf_backend_rela_normal 1
4335 #define elf_backend_want_got_sym 0
4336 #define elf_backend_want_plt_sym 0
4337 #define elf_backend_plt_readonly 1
4338
4339 #define bfd_elf32_bfd_reloc_type_lookup metag_reloc_type_lookup
4340 #define bfd_elf32_bfd_reloc_name_lookup metag_reloc_name_lookup
4341
4342 #include "elf32-target.h"
This page took 0.180391 seconds and 5 git commands to generate.