x86: refine when to trigger optimizations
[deliverable/binutils-gdb.git] / bfd / elf32-arc.c
1 /* ARC-specific support for 32-bit ELF
2 Copyright (C) 1994-2020 Free Software Foundation, Inc.
3 Contributed by Cupertino Miranda (cmiranda@synopsys.com).
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "libbfd.h"
25 #include "elf-bfd.h"
26 #include "elf/arc.h"
27 #include "libiberty.h"
28 #include "opcode/arc-func.h"
29 #include "opcode/arc.h"
30 #include "arc-plt.h"
31
32 #define FEATURE_LIST_NAME bfd_feature_list
33 #define CONFLICT_LIST bfd_conflict_list
34 #include "opcode/arc-attrs.h"
35
36 /* #define ARC_ENABLE_DEBUG 1 */
37 #ifdef ARC_ENABLE_DEBUG
38 static const char *
39 name_for_global_symbol (struct elf_link_hash_entry *h)
40 {
41 static char *local_str = "(local)";
42 if (h == NULL)
43 return local_str;
44 return h->root.root.string;
45 }
46 #define ARC_DEBUG(fmt, args...) fprintf (stderr, fmt, ##args)
47 #else
48 #define ARC_DEBUG(...)
49 #endif
50
51
52 #define ADD_RELA(BFD, SECTION, OFFSET, SYM_IDX, TYPE, ADDEND) \
53 { \
54 struct elf_link_hash_table *_htab = elf_hash_table (info); \
55 Elf_Internal_Rela _rel; \
56 bfd_byte * _loc; \
57 \
58 if (_htab->dynamic_sections_created == TRUE) \
59 { \
60 BFD_ASSERT (_htab->srel##SECTION &&_htab->srel##SECTION->contents); \
61 _loc = _htab->srel##SECTION->contents \
62 + ((_htab->srel##SECTION->reloc_count) \
63 * sizeof (Elf32_External_Rela)); \
64 _htab->srel##SECTION->reloc_count++; \
65 _rel.r_addend = ADDEND; \
66 _rel.r_offset = (_htab->s##SECTION)->output_section->vma \
67 + (_htab->s##SECTION)->output_offset + OFFSET; \
68 BFD_ASSERT ((long) SYM_IDX != -1); \
69 _rel.r_info = ELF32_R_INFO (SYM_IDX, TYPE); \
70 bfd_elf32_swap_reloca_out (BFD, &_rel, _loc); \
71 } \
72 }
73
74 #define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
75 case VALUE: \
76 return "R_" #TYPE; \
77 break;
78
79 static ATTRIBUTE_UNUSED const char *
80 reloc_type_to_name (unsigned int type)
81 {
82 switch (type)
83 {
84 #include "elf/arc-reloc.def"
85
86 default:
87 return "UNKNOWN";
88 break;
89 }
90 }
91
92 #undef ARC_RELOC_HOWTO
93
94 /* Try to minimize the amount of space occupied by relocation tables
95 on the ROM (not that the ROM won't be swamped by other ELF overhead). */
96
97 #define USE_REL 1
98
99 /* Similar with bfd_get_32 but taking into account the
100 middle-endianess of the ARC CPUs. Only to be used in code
101 sections. */
102
103 static bfd_vma
104 bfd_get_32_me (bfd * abfd,const unsigned char * data)
105 {
106 bfd_vma value = 0;
107
108 if (bfd_big_endian (abfd))
109 value = bfd_get_32 (abfd, data);
110 else
111 {
112 value = ((bfd_get_8 (abfd, data) & 255) << 16);
113 value |= ((bfd_get_8 (abfd, data + 1) & 255) << 24);
114 value |= (bfd_get_8 (abfd, data + 2) & 255);
115 value |= ((bfd_get_8 (abfd, data + 3) & 255) << 8);
116 }
117
118 return value;
119 }
120
121 static void
122 bfd_put_32_me (bfd *abfd, bfd_vma value,unsigned char *data)
123 {
124 bfd_put_16 (abfd, (value & 0xffff0000) >> 16, data);
125 bfd_put_16 (abfd, value & 0xffff, data + 2);
126 }
127
128 static ATTRIBUTE_UNUSED bfd_boolean
129 is_reloc_PC_relative (reloc_howto_type *howto)
130 {
131 return (strstr (howto->name, "PC") != NULL) ? TRUE : FALSE;
132 }
133
134 static bfd_boolean
135 is_reloc_SDA_relative (reloc_howto_type *howto)
136 {
137 return (strstr (howto->name, "SDA") != NULL) ? TRUE : FALSE;
138 }
139
140 static bfd_boolean
141 is_reloc_for_GOT (reloc_howto_type * howto)
142 {
143 if (strstr (howto->name, "TLS") != NULL)
144 return FALSE;
145 return (strstr (howto->name, "GOT") != NULL) ? TRUE : FALSE;
146 }
147
148 static bfd_boolean
149 is_reloc_for_PLT (reloc_howto_type * howto)
150 {
151 return (strstr (howto->name, "PLT") != NULL) ? TRUE : FALSE;
152 }
153
154 static bfd_boolean
155 is_reloc_for_TLS (reloc_howto_type *howto)
156 {
157 return (strstr (howto->name, "TLS") != NULL) ? TRUE : FALSE;
158 }
159
160 struct arc_relocation_data
161 {
162 bfd_signed_vma reloc_offset;
163 bfd_signed_vma reloc_addend;
164 bfd_signed_vma got_offset_value;
165
166 bfd_signed_vma sym_value;
167 asection * sym_section;
168
169 reloc_howto_type *howto;
170
171 asection * input_section;
172
173 bfd_signed_vma sdata_begin_symbol_vma;
174 bfd_boolean sdata_begin_symbol_vma_set;
175 bfd_signed_vma got_symbol_vma;
176
177 bfd_boolean should_relocate;
178
179 const char * symbol_name;
180 };
181
182 /* ARC ELF linker hash entry. */
183 struct elf_arc_link_hash_entry
184 {
185 struct elf_link_hash_entry root;
186
187 /* Track dynamic relocs copied for this symbol. */
188 struct elf_dyn_relocs *dyn_relocs;
189
190 struct got_entry *got_ents;
191 };
192
193
194 /* Should be included at this location due to static declarations
195 defined before this point. */
196 #include "arc-got.h"
197
198 #define arc_bfd_get_8(A,B,C) bfd_get_8(A,B)
199 #define arc_bfd_get_16(A,B,C) bfd_get_16(A,B)
200 #define arc_bfd_get_32(A,B,C) bfd_get_32(A,B)
201 #define arc_bfd_put_8(A,B,C,D) bfd_put_8(A,B,C)
202 #define arc_bfd_put_16(A,B,C,D) bfd_put_16(A,B,C)
203 #define arc_bfd_put_32(A,B,C,D) bfd_put_32(A,B,C)
204
205
206 static bfd_reloc_status_type
207 arc_elf_reloc (bfd *abfd ATTRIBUTE_UNUSED,
208 arelent *reloc_entry,
209 asymbol *symbol_in,
210 void *data ATTRIBUTE_UNUSED,
211 asection *input_section,
212 bfd *output_bfd,
213 char ** error_message ATTRIBUTE_UNUSED)
214 {
215 if (output_bfd != NULL)
216 {
217 reloc_entry->address += input_section->output_offset;
218
219 /* In case of relocateable link and if the reloc is against a
220 section symbol, the addend needs to be adjusted according to
221 where the section symbol winds up in the output section. */
222 if ((symbol_in->flags & BSF_SECTION_SYM) && symbol_in->section)
223 reloc_entry->addend += symbol_in->section->output_offset;
224
225 return bfd_reloc_ok;
226 }
227
228 return bfd_reloc_continue;
229 }
230
231
232 #define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
233 TYPE = VALUE,
234
235 enum howto_list
236 {
237 #include "elf/arc-reloc.def"
238 HOWTO_LIST_LAST
239 };
240
241 #undef ARC_RELOC_HOWTO
242
243 #define ARC_RELOC_HOWTO(TYPE, VALUE, RSIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
244 [TYPE] = HOWTO (R_##TYPE, 0, RSIZE, BITSIZE, FALSE, 0, \
245 complain_overflow_##OVERFLOW, arc_elf_reloc, \
246 "R_" #TYPE, FALSE, 0, 0, FALSE),
247
248 static struct reloc_howto_struct elf_arc_howto_table[] =
249 {
250 #include "elf/arc-reloc.def"
251 /* Example of what is generated by the preprocessor. Currently kept as an
252 example.
253 HOWTO (R_ARC_NONE, // Type.
254 0, // Rightshift.
255 2, // Size (0 = byte, 1 = short, 2 = long).
256 32, // Bitsize.
257 FALSE, // PC_relative.
258 0, // Bitpos.
259 complain_overflow_bitfield, // Complain_on_overflow.
260 bfd_elf_generic_reloc, // Special_function.
261 "R_ARC_NONE", // Name.
262 TRUE, // Partial_inplace.
263 0, // Src_mask.
264 0, // Dst_mask.
265 FALSE), // PCrel_offset.
266 */
267 };
268 #undef ARC_RELOC_HOWTO
269
270 static void
271 arc_elf_howto_init (void)
272 {
273 #define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
274 elf_arc_howto_table[TYPE].pc_relative = \
275 (strstr (#FORMULA, " P ") != NULL || strstr (#FORMULA, " PDATA ") != NULL); \
276 elf_arc_howto_table[TYPE].dst_mask = RELOC_FUNCTION(0, ~0); \
277 /* Only 32 bit data relocations should be marked as ME. */ \
278 if (strstr (#FORMULA, " ME ") != NULL) \
279 { \
280 BFD_ASSERT (SIZE == 2); \
281 }
282
283 #include "elf/arc-reloc.def"
284
285 }
286 #undef ARC_RELOC_HOWTO
287
288
289 #define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
290 [TYPE] = VALUE,
291
292 const int howto_table_lookup[] =
293 {
294 #include "elf/arc-reloc.def"
295 };
296
297 #undef ARC_RELOC_HOWTO
298
299 static reloc_howto_type *
300 arc_elf_howto (unsigned int r_type)
301 {
302 if (elf_arc_howto_table[R_ARC_32].dst_mask == 0)
303 arc_elf_howto_init ();
304 return &elf_arc_howto_table[r_type];
305 }
306
307 /* Map BFD reloc types to ARC ELF reloc types. */
308
309 struct arc_reloc_map
310 {
311 bfd_reloc_code_real_type bfd_reloc_val;
312 unsigned char elf_reloc_val;
313 };
314
315 /* ARC ELF linker hash table. */
316 struct elf_arc_link_hash_table
317 {
318 struct elf_link_hash_table elf;
319 };
320
321 static struct bfd_hash_entry *
322 elf_arc_link_hash_newfunc (struct bfd_hash_entry *entry,
323 struct bfd_hash_table *table,
324 const char *string)
325 {
326 struct elf_arc_link_hash_entry * ret =
327 (struct elf_arc_link_hash_entry *) entry;
328
329 /* Allocate the structure if it has not already been allocated by a
330 subclass. */
331 if (ret == NULL)
332 ret = (struct elf_arc_link_hash_entry *)
333 bfd_hash_allocate (table, sizeof (struct elf_arc_link_hash_entry));
334 if (ret == NULL)
335 return (struct bfd_hash_entry *) ret;
336
337 /* Call the allocation method of the superclass. */
338 ret = ((struct elf_arc_link_hash_entry *)
339 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
340 table, string));
341 if (ret != NULL)
342 {
343 ret->dyn_relocs = NULL;
344 ret->got_ents = NULL;
345 }
346
347 return (struct bfd_hash_entry *) ret;
348 }
349
350 /* Destroy an ARC ELF linker hash table. */
351 static void
352 elf_arc_link_hash_table_free (bfd *obfd)
353 {
354 _bfd_elf_link_hash_table_free (obfd);
355 }
356
357 /* Create an ARC ELF linker hash table. */
358
359 static struct bfd_link_hash_table *
360 arc_elf_link_hash_table_create (bfd *abfd)
361 {
362 struct elf_arc_link_hash_table *ret;
363
364 ret = (struct elf_arc_link_hash_table *) bfd_zmalloc (sizeof (*ret));
365 if (ret == NULL)
366 return NULL;
367
368 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
369 elf_arc_link_hash_newfunc,
370 sizeof (struct elf_arc_link_hash_entry),
371 ARC_ELF_DATA))
372 {
373 free (ret);
374 return NULL;
375 }
376
377 ret->elf.root.hash_table_free = elf_arc_link_hash_table_free;
378
379 return &ret->elf.root;
380 }
381
382 #define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
383 { BFD_RELOC_##TYPE, R_##TYPE },
384
385 static const struct arc_reloc_map arc_reloc_map[] =
386 {
387 #include "elf/arc-reloc.def"
388
389 {BFD_RELOC_NONE, R_ARC_NONE},
390 {BFD_RELOC_8, R_ARC_8},
391 {BFD_RELOC_16, R_ARC_16},
392 {BFD_RELOC_24, R_ARC_24},
393 {BFD_RELOC_32, R_ARC_32},
394 };
395
396 #undef ARC_RELOC_HOWTO
397
398 typedef ATTRIBUTE_UNUSED bfd_vma (*replace_func) (unsigned, int ATTRIBUTE_UNUSED);
399
400 #define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
401 case TYPE: \
402 func = (void *) RELOC_FUNCTION; \
403 break;
404
405 static replace_func
406 get_replace_function (bfd *abfd, unsigned int r_type)
407 {
408 void *func = NULL;
409
410 switch (r_type)
411 {
412 #include "elf/arc-reloc.def"
413 }
414
415 if (func == replace_bits24 && bfd_big_endian (abfd))
416 func = replace_bits24_be;
417
418 return (replace_func) func;
419 }
420 #undef ARC_RELOC_HOWTO
421
422 static reloc_howto_type *
423 arc_elf32_bfd_reloc_type_lookup (bfd * abfd ATTRIBUTE_UNUSED,
424 bfd_reloc_code_real_type code)
425 {
426 unsigned int i;
427
428 for (i = ARRAY_SIZE (arc_reloc_map); i--;)
429 {
430 if (arc_reloc_map[i].bfd_reloc_val == code)
431 return arc_elf_howto (arc_reloc_map[i].elf_reloc_val);
432 }
433
434 return NULL;
435 }
436
437 /* Function to set the ELF flag bits. */
438 static bfd_boolean
439 arc_elf_set_private_flags (bfd *abfd, flagword flags)
440 {
441 elf_elfheader (abfd)->e_flags = flags;
442 elf_flags_init (abfd) = TRUE;
443 return TRUE;
444 }
445
446 /* Print private flags. */
447 static bfd_boolean
448 arc_elf_print_private_bfd_data (bfd *abfd, void * ptr)
449 {
450 FILE *file = (FILE *) ptr;
451 flagword flags;
452
453 BFD_ASSERT (abfd != NULL && ptr != NULL);
454
455 /* Print normal ELF private data. */
456 _bfd_elf_print_private_bfd_data (abfd, ptr);
457
458 flags = elf_elfheader (abfd)->e_flags;
459 fprintf (file, _("private flags = 0x%lx:"), (unsigned long) flags);
460
461 switch (flags & EF_ARC_MACH_MSK)
462 {
463 case EF_ARC_CPU_ARCV2HS : fprintf (file, " -mcpu=ARCv2HS"); break;
464 case EF_ARC_CPU_ARCV2EM : fprintf (file, " -mcpu=ARCv2EM"); break;
465 case E_ARC_MACH_ARC600 : fprintf (file, " -mcpu=ARC600"); break;
466 case E_ARC_MACH_ARC601 : fprintf (file, " -mcpu=ARC601"); break;
467 case E_ARC_MACH_ARC700 : fprintf (file, " -mcpu=ARC700"); break;
468 default:
469 fprintf (file, "-mcpu=unknown");
470 break;
471 }
472
473 switch (flags & EF_ARC_OSABI_MSK)
474 {
475 case E_ARC_OSABI_ORIG : fprintf (file, " (ABI:legacy)"); break;
476 case E_ARC_OSABI_V2 : fprintf (file, " (ABI:v2)"); break;
477 case E_ARC_OSABI_V3 : fprintf (file, " (ABI:v3)"); break;
478 case E_ARC_OSABI_V4 : fprintf (file, " (ABI:v4)"); break;
479 default:
480 fprintf (file, " (ABI:unknown)");
481 break;
482 }
483
484 fputc ('\n', file);
485 return TRUE;
486 }
487
488 /* Copy backend specific data from one object module to another. */
489
490 static bfd_boolean
491 arc_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
492 {
493 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
494 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
495 return TRUE;
496
497 BFD_ASSERT (!elf_flags_init (obfd)
498 || elf_elfheader (obfd)->e_flags == elf_elfheader (ibfd)->e_flags);
499
500 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
501 elf_flags_init (obfd) = TRUE;
502
503 /* Copy object attributes. */
504 _bfd_elf_copy_obj_attributes (ibfd, obfd);
505
506 return _bfd_elf_copy_private_bfd_data (ibfd, obfd);
507 }
508
509 static reloc_howto_type *
510 bfd_elf32_bfd_reloc_name_lookup (bfd * abfd ATTRIBUTE_UNUSED,
511 const char *r_name)
512 {
513 unsigned int i;
514
515 for (i = 0; i < ARRAY_SIZE (elf_arc_howto_table); i++)
516 if (elf_arc_howto_table[i].name != NULL
517 && strcasecmp (elf_arc_howto_table[i].name, r_name) == 0)
518 return arc_elf_howto (i);
519
520 return NULL;
521 }
522
523 /* Set the howto pointer for an ARC ELF reloc. */
524
525 static bfd_boolean
526 arc_info_to_howto_rel (bfd * abfd,
527 arelent * cache_ptr,
528 Elf_Internal_Rela * dst)
529 {
530 unsigned int r_type;
531
532 r_type = ELF32_R_TYPE (dst->r_info);
533 if (r_type >= (unsigned int) R_ARC_max)
534 {
535 /* xgettext:c-format */
536 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
537 abfd, r_type);
538 bfd_set_error (bfd_error_bad_value);
539 return FALSE;
540 }
541
542 cache_ptr->howto = arc_elf_howto (r_type);
543 return TRUE;
544 }
545
546 /* Extract CPU features from an NTBS. */
547
548 static unsigned
549 arc_extract_features (const char *p)
550 {
551 unsigned i, r = 0;
552
553 if (!p)
554 return 0;
555
556 for (i = 0; i < ARRAY_SIZE (bfd_feature_list); i++)
557 {
558 char *t = strstr (p, bfd_feature_list[i].attr);
559 unsigned l = strlen (bfd_feature_list[i].attr);
560 if ((t != NULL)
561 && (t[l] == ','
562 || t[l] == '\0'))
563 r |= bfd_feature_list[i].feature;
564 }
565
566 return r;
567 }
568
569 /* Concatenate two strings. s1 can be NULL but not
570 s2. */
571
572 static char *
573 arc_stralloc (char * s1, const char * s2)
574 {
575 char *p;
576
577 /* Only s1 can be null. */
578 BFD_ASSERT (s2);
579
580 p = s1 ? concat (s1, ",", s2, NULL) : (char *)s2;
581
582 return p;
583 }
584
585 /* Merge ARC object attributes from IBFD into OBFD. Raise an error if
586 there are conflicting attributes. */
587
588 static bfd_boolean
589 arc_elf_merge_attributes (bfd *ibfd, struct bfd_link_info *info)
590 {
591 bfd *obfd = info->output_bfd;
592 obj_attribute *in_attr;
593 obj_attribute *out_attr;
594 int i;
595 bfd_boolean result = TRUE;
596 const char *sec_name = get_elf_backend_data (ibfd)->obj_attrs_section;
597 char *tagname = NULL;
598
599 /* Skip the linker stubs file. This preserves previous behavior
600 of accepting unknown attributes in the first input file - but
601 is that a bug? */
602 if (ibfd->flags & BFD_LINKER_CREATED)
603 return TRUE;
604
605 /* Skip any input that hasn't attribute section.
606 This enables to link object files without attribute section with
607 any others. */
608 if (bfd_get_section_by_name (ibfd, sec_name) == NULL)
609 return TRUE;
610
611 if (!elf_known_obj_attributes_proc (obfd)[0].i)
612 {
613 /* This is the first object. Copy the attributes. */
614 _bfd_elf_copy_obj_attributes (ibfd, obfd);
615
616 out_attr = elf_known_obj_attributes_proc (obfd);
617
618 /* Use the Tag_null value to indicate the attributes have been
619 initialized. */
620 out_attr[0].i = 1;
621
622 return TRUE;
623 }
624
625 in_attr = elf_known_obj_attributes_proc (ibfd);
626 out_attr = elf_known_obj_attributes_proc (obfd);
627
628 for (i = LEAST_KNOWN_OBJ_ATTRIBUTE; i < NUM_KNOWN_OBJ_ATTRIBUTES; i++)
629 {
630 /* Merge this attribute with existing attributes. */
631 switch (i)
632 {
633 case Tag_ARC_PCS_config:
634 if (out_attr[i].i == 0)
635 out_attr[i].i = in_attr[i].i;
636 else if (in_attr[i].i != 0 && out_attr[i].i != in_attr[i].i)
637 {
638 const char *tagval[] = { "Absent", "Bare-metal/mwdt",
639 "Bare-metal/newlib", "Linux/uclibc",
640 "Linux/glibc" };
641 BFD_ASSERT (in_attr[i].i < 5);
642 BFD_ASSERT (out_attr[i].i < 5);
643 /* It's sometimes ok to mix different configs, so this is only
644 a warning. */
645 _bfd_error_handler
646 (_("warning: %pB: conflicting platform configuration "
647 "%s with %s"), ibfd,
648 tagval[in_attr[i].i],
649 tagval[out_attr[i].i]);
650 }
651 break;
652
653 case Tag_ARC_CPU_base:
654 if (out_attr[i].i == 0)
655 out_attr[i].i = in_attr[i].i;
656 else if (in_attr[i].i != 0 && out_attr[i].i != in_attr[i].i
657 && ((out_attr[i].i + in_attr[i].i) < 6))
658 {
659 const char *tagval[] = { "Absent", "ARC6xx", "ARC7xx",
660 "ARCEM", "ARCHS" };
661 BFD_ASSERT (in_attr[i].i < 5);
662 BFD_ASSERT (out_attr[i].i < 5);
663 /* We cannot mix code for different CPUs. */
664 _bfd_error_handler
665 (_("error: %pB: unable to merge CPU base attributes "
666 "%s with %s"),
667 obfd,
668 tagval[in_attr[i].i],
669 tagval[out_attr[i].i]);
670 result = FALSE;
671 break;
672 }
673 else
674 {
675 /* The CPUs may be different, check if we can still mix
676 the objects against the output choosen CPU. */
677 unsigned in_feature = 0;
678 unsigned out_feature = 0;
679 char *p1 = in_attr[Tag_ARC_ISA_config].s;
680 char *p2 = out_attr[Tag_ARC_ISA_config].s;
681 unsigned j;
682 unsigned cpu_out;
683 unsigned opcode_map[] = {0, ARC_OPCODE_ARC600, ARC_OPCODE_ARC700,
684 ARC_OPCODE_ARCv2EM, ARC_OPCODE_ARCv2HS};
685
686 BFD_ASSERT (in_attr[i].i < (sizeof (opcode_map)
687 / sizeof (unsigned)));
688 BFD_ASSERT (out_attr[i].i < (sizeof (opcode_map)
689 / sizeof (unsigned)));
690 cpu_out = opcode_map[out_attr[i].i];
691
692 in_feature = arc_extract_features (p1);
693 out_feature = arc_extract_features (p2);
694
695 /* First, check if a feature is compatible with the
696 output object chosen CPU. */
697 for (j = 0; j < ARRAY_SIZE (bfd_feature_list); j++)
698 if (((in_feature | out_feature) & bfd_feature_list[j].feature)
699 && (!(cpu_out & bfd_feature_list[j].cpus)))
700 {
701 _bfd_error_handler
702 (_("error: %pB: unable to merge ISA extension attributes "
703 "%s"),
704 obfd, bfd_feature_list[j].name);
705 result = FALSE;
706 break;
707 }
708 /* Second, if we have compatible features with the
709 chosen CPU, check if they are compatible among
710 them. */
711 for (j = 0; j < ARRAY_SIZE (bfd_conflict_list); j++)
712 if (((in_feature | out_feature) & bfd_conflict_list[j])
713 == bfd_conflict_list[j])
714 {
715 unsigned k;
716 for (k = 0; k < ARRAY_SIZE (bfd_feature_list); k++)
717 {
718 if (in_feature & bfd_feature_list[k].feature
719 & bfd_conflict_list[j])
720 p1 = (char *) bfd_feature_list[k].name;
721 if (out_feature & bfd_feature_list[k].feature
722 & bfd_conflict_list[j])
723 p2 = (char *) bfd_feature_list[k].name;
724 }
725 _bfd_error_handler
726 (_("error: %pB: conflicting ISA extension attributes "
727 "%s with %s"),
728 obfd, p1, p2);
729 result = FALSE;
730 break;
731 }
732 /* Everithing is alright. */
733 out_feature |= in_feature;
734 p1 = NULL;
735 for (j = 0; j < ARRAY_SIZE (bfd_feature_list); j++)
736 if (out_feature & bfd_feature_list[j].feature)
737 p1 = arc_stralloc (p1, bfd_feature_list[j].attr);
738 if (p1)
739 out_attr[Tag_ARC_ISA_config].s =
740 _bfd_elf_attr_strdup (obfd, p1);
741 }
742 /* Fall through. */
743 case Tag_ARC_CPU_variation:
744 case Tag_ARC_ISA_mpy_option:
745 case Tag_ARC_ABI_osver:
746 /* Use the largest value specified. */
747 if (in_attr[i].i > out_attr[i].i)
748 out_attr[i].i = in_attr[i].i;
749 break;
750
751 /* The CPU name is given by the vendor, just choose an
752 existing one if missing or different. There are no fail
753 criteria if they different or both missing. */
754 case Tag_ARC_CPU_name:
755 if (!out_attr[i].s && in_attr[i].s)
756 out_attr[i].s = _bfd_elf_attr_strdup (obfd, in_attr[i].s);
757 break;
758
759 case Tag_ARC_ABI_rf16:
760 if (out_attr[i].i == 0)
761 out_attr[i].i = in_attr[i].i;
762 else if (out_attr[i].i != in_attr[i].i)
763 {
764 /* We cannot mix code with rf16 and without. */
765 _bfd_error_handler
766 (_("error: %pB: cannot mix rf16 with full register set %pB"),
767 obfd, ibfd);
768 result = FALSE;
769 }
770 break;
771
772 case Tag_ARC_ABI_pic:
773 tagname = "PIC";
774 /* fall through */
775 case Tag_ARC_ABI_sda:
776 if (!tagname)
777 tagname = "SDA";
778 /* fall through */
779 case Tag_ARC_ABI_tls:
780 {
781 const char *tagval[] = { "Absent", "MWDT", "GNU" };
782
783 if (!tagname)
784 tagname = "TLS";
785
786 BFD_ASSERT (in_attr[i].i < 3);
787 BFD_ASSERT (out_attr[i].i < 3);
788 if (out_attr[i].i == 0)
789 out_attr[i].i = in_attr[i].i;
790 else if (out_attr[i].i != 0 && in_attr[i].i != 0
791 && out_attr[i].i != in_attr[i].i)
792 {
793 _bfd_error_handler
794 (_("error: %pB: conflicting attributes %s: %s with %s"),
795 obfd, tagname,
796 tagval[in_attr[i].i],
797 tagval[out_attr[i].i]);
798 result = FALSE;
799 }
800 tagname = NULL;
801 break;
802 }
803
804 case Tag_ARC_ABI_double_size:
805 tagname = "Double size";
806 /* fall through */
807 case Tag_ARC_ABI_enumsize:
808 if (!tagname)
809 tagname = "Enum size";
810 /* fall through */
811 case Tag_ARC_ABI_exceptions:
812 if (!tagname)
813 tagname = "ABI exceptions";
814
815 if (out_attr[i].i == 0)
816 out_attr[i].i = in_attr[i].i;
817 else if (out_attr[i].i != 0 && in_attr[i].i != 0
818 && out_attr[i].i != in_attr[i].i)
819 {
820 _bfd_error_handler
821 (_("error: %pB: conflicting attributes %s"),
822 obfd, tagname);
823 result = FALSE;
824 }
825 break;
826
827 case Tag_ARC_ISA_apex:
828 break; /* Do nothing for APEX attributes. */
829
830 case Tag_ARC_ISA_config:
831 /* It is handled in Tag_ARC_CPU_base. */
832 break;
833
834 case Tag_ARC_ATR_version:
835 if (out_attr[i].i == 0)
836 out_attr[i].i = in_attr[i].i;
837 break;
838
839 default:
840 result
841 = result && _bfd_elf_merge_unknown_attribute_low (ibfd, obfd, i);
842 }
843
844 /* If out_attr was copied from in_attr then it won't have a type yet. */
845 if (in_attr[i].type && !out_attr[i].type)
846 out_attr[i].type = in_attr[i].type;
847 }
848
849 /* Merge Tag_compatibility attributes and any common GNU ones. */
850 if (!_bfd_elf_merge_object_attributes (ibfd, info))
851 return FALSE;
852
853 /* Check for any attributes not known on ARC. */
854 result &= _bfd_elf_merge_unknown_attribute_list (ibfd, obfd);
855
856 return result;
857 }
858
859 /* Merge backend specific data from an object file to the output
860 object file when linking. */
861
862 static bfd_boolean
863 arc_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
864 {
865 bfd *obfd = info->output_bfd;
866 unsigned short mach_ibfd;
867 static unsigned short mach_obfd = EM_NONE;
868 flagword out_flags;
869 flagword in_flags;
870 asection *sec;
871
872 /* Check if we have the same endianess. */
873 if (! _bfd_generic_verify_endian_match (ibfd, info))
874 return FALSE;
875
876 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
877 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
878 return TRUE;
879
880 /* Collect ELF flags. */
881 in_flags = elf_elfheader (ibfd)->e_flags & EF_ARC_MACH_MSK;
882 out_flags = elf_elfheader (obfd)->e_flags & EF_ARC_MACH_MSK;
883
884 if (!elf_flags_init (obfd)) /* First call, no flags set. */
885 {
886 elf_flags_init (obfd) = TRUE;
887 out_flags = in_flags;
888 }
889
890 if (!arc_elf_merge_attributes (ibfd, info))
891 return FALSE;
892
893 /* Check to see if the input BFD actually contains any sections. Do
894 not short-circuit dynamic objects; their section list may be
895 emptied by elf_link_add_object_symbols. */
896 if (!(ibfd->flags & DYNAMIC))
897 {
898 bfd_boolean null_input_bfd = TRUE;
899 bfd_boolean only_data_sections = TRUE;
900
901 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
902 {
903 if ((bfd_section_flags (sec)
904 & (SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS))
905 == (SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS))
906 only_data_sections = FALSE;
907
908 null_input_bfd = FALSE;
909 }
910
911 if (null_input_bfd || only_data_sections)
912 return TRUE;
913 }
914
915 /* Complain about various flag/architecture mismatches. */
916 mach_ibfd = elf_elfheader (ibfd)->e_machine;
917 if (mach_obfd == EM_NONE)
918 {
919 mach_obfd = mach_ibfd;
920 }
921 else
922 {
923 if (mach_ibfd != mach_obfd)
924 {
925 /* xgettext:c-format */
926 _bfd_error_handler (_("error: attempting to link %pB "
927 "with a binary %pB of different architecture"),
928 ibfd, obfd);
929 return FALSE;
930 }
931 else if ((in_flags != out_flags)
932 /* If we have object attributes, then we already
933 checked the objects compatibility, skip it. */
934 && !bfd_elf_get_obj_attr_int (ibfd, OBJ_ATTR_PROC,
935 Tag_ARC_CPU_base))
936 {
937 if (in_flags && out_flags)
938 {
939 /* Warn if different flags. */
940 _bfd_error_handler
941 /* xgettext:c-format */
942 (_("%pB: uses different e_flags (%#x) fields than "
943 "previous modules (%#x)"),
944 ibfd, in_flags, out_flags);
945 return FALSE;
946 }
947 /* MWDT doesnt set the eflags hence make sure we choose the
948 eflags set by gcc. */
949 in_flags = in_flags > out_flags ? in_flags : out_flags;
950 }
951 else
952 {
953 /* Everything is correct; don't change the output flags. */
954 in_flags = out_flags;
955 }
956 }
957
958 /* Update the flags. */
959 elf_elfheader (obfd)->e_flags = in_flags;
960
961 if (bfd_get_mach (obfd) < bfd_get_mach (ibfd))
962 {
963 return bfd_set_arch_mach (obfd, bfd_arch_arc, bfd_get_mach (ibfd));
964 }
965
966 return TRUE;
967 }
968
969 /* Return a best guess for the machine number based on the attributes. */
970
971 static unsigned int
972 bfd_arc_get_mach_from_attributes (bfd * abfd)
973 {
974 int arch = bfd_elf_get_obj_attr_int (abfd, OBJ_ATTR_PROC, Tag_ARC_CPU_base);
975 unsigned e_machine = elf_elfheader (abfd)->e_machine;
976
977 switch (arch)
978 {
979 case TAG_CPU_ARC6xx:
980 return bfd_mach_arc_arc600;
981 case TAG_CPU_ARC7xx:
982 return bfd_mach_arc_arc700;
983 case TAG_CPU_ARCEM:
984 case TAG_CPU_ARCHS:
985 return bfd_mach_arc_arcv2;
986 default:
987 break;
988 }
989 return (e_machine == EM_ARC_COMPACT)
990 ? bfd_mach_arc_arc700 : bfd_mach_arc_arcv2;
991 }
992
993 /* Set the right machine number for an ARC ELF file. */
994 static bfd_boolean
995 arc_elf_object_p (bfd * abfd)
996 {
997 /* Make sure this is initialised, or you'll have the potential of passing
998 garbage---or misleading values---into the call to
999 bfd_default_set_arch_mach (). */
1000 unsigned int mach = bfd_mach_arc_arc700;
1001 unsigned long arch = elf_elfheader (abfd)->e_flags & EF_ARC_MACH_MSK;
1002 unsigned e_machine = elf_elfheader (abfd)->e_machine;
1003
1004 if (e_machine == EM_ARC_COMPACT || e_machine == EM_ARC_COMPACT2)
1005 {
1006 switch (arch)
1007 {
1008 case E_ARC_MACH_ARC600:
1009 mach = bfd_mach_arc_arc600;
1010 break;
1011 case E_ARC_MACH_ARC601:
1012 mach = bfd_mach_arc_arc601;
1013 break;
1014 case E_ARC_MACH_ARC700:
1015 mach = bfd_mach_arc_arc700;
1016 break;
1017 case EF_ARC_CPU_ARCV2HS:
1018 case EF_ARC_CPU_ARCV2EM:
1019 mach = bfd_mach_arc_arcv2;
1020 break;
1021 default:
1022 mach = bfd_arc_get_mach_from_attributes (abfd);
1023 break;
1024 }
1025 }
1026 else
1027 {
1028 if (e_machine == EM_ARC)
1029 {
1030 _bfd_error_handler
1031 (_("error: the ARC4 architecture is no longer supported"));
1032 return FALSE;
1033 }
1034 else
1035 {
1036 _bfd_error_handler
1037 (_("warning: unset or old architecture flags; "
1038 "use default machine"));
1039 }
1040 }
1041
1042 return bfd_default_set_arch_mach (abfd, bfd_arch_arc, mach);
1043 }
1044
1045 /* The final processing done just before writing out an ARC ELF object file.
1046 This gets the ARC architecture right based on the machine number. */
1047
1048 static bfd_boolean
1049 arc_elf_final_write_processing (bfd *abfd)
1050 {
1051 unsigned long emf;
1052 int osver = bfd_elf_get_obj_attr_int (abfd, OBJ_ATTR_PROC,
1053 Tag_ARC_ABI_osver);
1054 flagword e_flags = elf_elfheader (abfd)->e_flags & ~EF_ARC_OSABI_MSK;
1055
1056 switch (bfd_get_mach (abfd))
1057 {
1058 case bfd_mach_arc_arcv2:
1059 emf = EM_ARC_COMPACT2;
1060 break;
1061 default:
1062 emf = EM_ARC_COMPACT;
1063 break;
1064 }
1065
1066 elf_elfheader (abfd)->e_machine = emf;
1067
1068 /* Record whatever is the current syscall ABI version. */
1069 if (osver)
1070 e_flags |= ((osver & 0x0f) << 8);
1071 else
1072 e_flags |= E_ARC_OSABI_V3;
1073
1074 elf_elfheader (abfd)->e_flags |= e_flags;
1075 return _bfd_elf_final_write_processing (abfd);
1076 }
1077
1078 #ifdef ARC_ENABLE_DEBUG
1079 #define DEBUG_ARC_RELOC(A) debug_arc_reloc (A)
1080
1081 static void
1082 debug_arc_reloc (struct arc_relocation_data reloc_data)
1083 {
1084 ARC_DEBUG ("Reloc type=%s, should_relocate = %s\n",
1085 reloc_data.howto->name,
1086 reloc_data.should_relocate ? "true" : "false");
1087 ARC_DEBUG (" offset = 0x%x, addend = 0x%x\n",
1088 (unsigned int) reloc_data.reloc_offset,
1089 (unsigned int) reloc_data.reloc_addend);
1090 ARC_DEBUG (" Symbol:\n");
1091 ARC_DEBUG (" value = 0x%08x\n",
1092 (unsigned int) reloc_data.sym_value);
1093 if (reloc_data.sym_section != NULL)
1094 {
1095 ARC_DEBUG (" Symbol Section:\n");
1096 ARC_DEBUG (" section name = %s, output_offset 0x%08x",
1097 reloc_data.sym_section->name,
1098 (unsigned int) reloc_data.sym_section->output_offset);
1099 if (reloc_data.sym_section->output_section != NULL)
1100 ARC_DEBUG (", output_section->vma = 0x%08x",
1101 ((unsigned int) reloc_data.sym_section->output_section->vma));
1102 ARC_DEBUG ("\n");
1103 if (reloc_data.sym_section->owner
1104 && reloc_data.sym_section->owner->filename)
1105 ARC_DEBUG (" file: %s\n", reloc_data.sym_section->owner->filename);
1106 }
1107 else
1108 {
1109 ARC_DEBUG (" symbol section is NULL\n");
1110 }
1111
1112 ARC_DEBUG (" Input_section:\n");
1113 if (reloc_data.input_section != NULL)
1114 {
1115 ARC_DEBUG (" section name = %s, output_offset 0x%08x, output_section->vma = 0x%08x\n",
1116 reloc_data.input_section->name,
1117 (unsigned int) reloc_data.input_section->output_offset,
1118 (unsigned int) reloc_data.input_section->output_section->vma);
1119 ARC_DEBUG (" changed_address = 0x%08x\n",
1120 (unsigned int) (reloc_data.input_section->output_section->vma
1121 + reloc_data.input_section->output_offset
1122 + reloc_data.reloc_offset));
1123 ARC_DEBUG (" file: %s\n", reloc_data.input_section->owner->filename);
1124 }
1125 else
1126 {
1127 ARC_DEBUG (" input section is NULL\n");
1128 }
1129 }
1130 #else
1131 #define DEBUG_ARC_RELOC(A)
1132 #endif /* ARC_ENABLE_DEBUG */
1133
1134 static bfd_vma
1135 middle_endian_convert (bfd_vma insn, bfd_boolean do_it)
1136 {
1137 if (do_it)
1138 {
1139 insn
1140 = ((insn & 0xffff0000) >> 16)
1141 | ((insn & 0xffff) << 16);
1142 }
1143 return insn;
1144 }
1145
1146 /* This function is called for relocations that are otherwise marked as NOT
1147 requiring overflow checks. In here we perform non-standard checks of
1148 the relocation value. */
1149
1150 static inline bfd_reloc_status_type
1151 arc_special_overflow_checks (const struct arc_relocation_data reloc_data,
1152 bfd_signed_vma relocation,
1153 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1154 {
1155 switch (reloc_data.howto->type)
1156 {
1157 case R_ARC_NPS_CMEM16:
1158 if (((relocation >> 16) & 0xffff) != NPS_CMEM_HIGH_VALUE)
1159 {
1160 if (reloc_data.reloc_addend == 0)
1161 _bfd_error_handler
1162 /* xgettext:c-format */
1163 (_("%pB(%pA+%#" PRIx64 "): CMEM relocation to `%s' is invalid, "
1164 "16 MSB should be %#x (value is %#" PRIx64 ")"),
1165 reloc_data.input_section->owner,
1166 reloc_data.input_section,
1167 (uint64_t) reloc_data.reloc_offset,
1168 reloc_data.symbol_name,
1169 NPS_CMEM_HIGH_VALUE,
1170 (uint64_t) relocation);
1171 else
1172 _bfd_error_handler
1173 /* xgettext:c-format */
1174 (_("%pB(%pA+%#" PRIx64 "): CMEM relocation to `%s+%#" PRIx64
1175 "' is invalid, 16 MSB should be %#x (value is %#" PRIx64 ")"),
1176 reloc_data.input_section->owner,
1177 reloc_data.input_section,
1178 (uint64_t) reloc_data.reloc_offset,
1179 reloc_data.symbol_name,
1180 (uint64_t) reloc_data.reloc_addend,
1181 NPS_CMEM_HIGH_VALUE,
1182 (uint64_t) relocation);
1183 return bfd_reloc_overflow;
1184 }
1185 break;
1186
1187 default:
1188 break;
1189 }
1190
1191 return bfd_reloc_ok;
1192 }
1193
1194 #define ME(reloc) (reloc)
1195
1196 #define IS_ME(FORMULA,BFD) ((strstr (FORMULA, "ME") != NULL) \
1197 && (!bfd_big_endian (BFD)))
1198
1199 #define S ((bfd_signed_vma) (reloc_data.sym_value \
1200 + (reloc_data.sym_section->output_section != NULL ? \
1201 (reloc_data.sym_section->output_offset \
1202 + reloc_data.sym_section->output_section->vma) : 0)))
1203 #define L ((bfd_signed_vma) (reloc_data.sym_value \
1204 + (reloc_data.sym_section->output_section != NULL ? \
1205 (reloc_data.sym_section->output_offset \
1206 + reloc_data.sym_section->output_section->vma) : 0)))
1207 #define A (reloc_data.reloc_addend)
1208 #define B (0)
1209 #define G (reloc_data.got_offset_value)
1210 #define GOT (reloc_data.got_symbol_vma)
1211 #define GOT_BEGIN (htab->sgot->output_section->vma)
1212
1213 #define MES (0)
1214 /* P: relative offset to PCL The offset should be to the
1215 current location aligned to 32 bits. */
1216 #define P ((bfd_signed_vma) ( \
1217 ( \
1218 (reloc_data.input_section->output_section != NULL ? \
1219 reloc_data.input_section->output_section->vma : 0) \
1220 + reloc_data.input_section->output_offset \
1221 + (reloc_data.reloc_offset - (bitsize >= 32 ? 4 : 0))) \
1222 & ~0x3))
1223 #define PDATA ((bfd_signed_vma) ( \
1224 (reloc_data.input_section->output_section->vma \
1225 + reloc_data.input_section->output_offset \
1226 + (reloc_data.reloc_offset))))
1227 #define SECTSTART (bfd_signed_vma) (reloc_data.sym_section->output_section->vma \
1228 + reloc_data.sym_section->output_offset)
1229 #define FINAL_SECTSTART \
1230 (bfd_signed_vma) (reloc_data.sym_section->output_section->vma)
1231 #define JLI (bfd_signed_vma) (reloc_data.sym_section->output_section->vma)
1232 #define _SDA_BASE_ (bfd_signed_vma) (reloc_data.sdata_begin_symbol_vma)
1233 #define TLS_REL (bfd_signed_vma) \
1234 ((elf_hash_table (info))->tls_sec->output_section->vma)
1235 #define TLS_TBSS (align_power(TCB_SIZE, \
1236 reloc_data.sym_section->alignment_power))
1237
1238 #define none (0)
1239
1240 #ifdef ARC_ENABLE_DEBUG
1241 #define PRINT_DEBUG_RELOC_INFO_BEFORE(FORMULA, TYPE) \
1242 do \
1243 { \
1244 asection *sym_section = reloc_data.sym_section; \
1245 asection *input_section = reloc_data.input_section; \
1246 ARC_DEBUG ("RELOC_TYPE = " TYPE "\n"); \
1247 ARC_DEBUG ("FORMULA = " FORMULA "\n"); \
1248 ARC_DEBUG ("S = %#lx\n", S); \
1249 ARC_DEBUG ("A = %#lx\n", A); \
1250 ARC_DEBUG ("L = %lx\n", L); \
1251 if (sym_section->output_section != NULL) \
1252 ARC_DEBUG ("symbol_section->vma = %#lx\n", \
1253 sym_section->output_section->vma \
1254 + sym_section->output_offset); \
1255 else \
1256 ARC_DEBUG ("symbol_section->vma = NULL\n"); \
1257 if (input_section->output_section != NULL) \
1258 ARC_DEBUG ("symbol_section->vma = %#lx\n", \
1259 input_section->output_section->vma \
1260 + input_section->output_offset); \
1261 else \
1262 ARC_DEBUG ("symbol_section->vma = NULL\n"); \
1263 ARC_DEBUG ("PCL = %#lx\n", P); \
1264 ARC_DEBUG ("P = %#lx\n", P); \
1265 ARC_DEBUG ("G = %#lx\n", G); \
1266 ARC_DEBUG ("SDA_OFFSET = %#lx\n", _SDA_BASE_); \
1267 ARC_DEBUG ("SDA_SET = %d\n", reloc_data.sdata_begin_symbol_vma_set); \
1268 ARC_DEBUG ("GOT_OFFSET = %#lx\n", GOT); \
1269 ARC_DEBUG ("relocation = %#08lx\n", relocation); \
1270 ARC_DEBUG ("before = %#08x\n", (unsigned) insn); \
1271 ARC_DEBUG ("data = %08x (%u) (%d)\n", (unsigned) relocation, \
1272 (unsigned) relocation, (int) relocation); \
1273 } \
1274 while (0)
1275
1276 #define PRINT_DEBUG_RELOC_INFO_AFTER \
1277 do \
1278 { \
1279 ARC_DEBUG ("after = 0x%08x\n", (unsigned int) insn); \
1280 } \
1281 while (0)
1282
1283 #else
1284
1285 #define PRINT_DEBUG_RELOC_INFO_BEFORE(...)
1286 #define PRINT_DEBUG_RELOC_INFO_AFTER
1287
1288 #endif /* ARC_ENABLE_DEBUG */
1289
1290 #define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
1291 case R_##TYPE: \
1292 { \
1293 bfd_signed_vma bitsize ATTRIBUTE_UNUSED = BITSIZE; \
1294 relocation = FORMULA ; \
1295 PRINT_DEBUG_RELOC_INFO_BEFORE (#FORMULA, #TYPE); \
1296 insn = middle_endian_convert (insn, IS_ME (#FORMULA, abfd)); \
1297 insn = (* get_replace_function (abfd, TYPE)) (insn, relocation); \
1298 insn = middle_endian_convert (insn, IS_ME (#FORMULA, abfd)); \
1299 PRINT_DEBUG_RELOC_INFO_AFTER; \
1300 } \
1301 break;
1302
1303 static bfd_reloc_status_type
1304 arc_do_relocation (bfd_byte * contents,
1305 struct arc_relocation_data reloc_data,
1306 struct bfd_link_info *info)
1307 {
1308 bfd_signed_vma relocation = 0;
1309 bfd_vma insn;
1310 bfd_vma orig_insn ATTRIBUTE_UNUSED;
1311 bfd * abfd = reloc_data.input_section->owner;
1312 struct elf_link_hash_table *htab ATTRIBUTE_UNUSED = elf_hash_table (info);
1313 bfd_reloc_status_type flag;
1314
1315 if (!reloc_data.should_relocate)
1316 return bfd_reloc_ok;
1317
1318 switch (reloc_data.howto->size)
1319 {
1320 case 2:
1321 insn = arc_bfd_get_32 (abfd,
1322 contents + reloc_data.reloc_offset,
1323 reloc_data.input_section);
1324 break;
1325 case 1:
1326 insn = arc_bfd_get_16 (abfd,
1327 contents + reloc_data.reloc_offset,
1328 reloc_data.input_section);
1329 break;
1330 case 0:
1331 insn = arc_bfd_get_8 (abfd,
1332 contents + reloc_data.reloc_offset,
1333 reloc_data.input_section);
1334 break;
1335 default:
1336 insn = 0;
1337 BFD_ASSERT (0);
1338 break;
1339 }
1340
1341 orig_insn = insn;
1342
1343 switch (reloc_data.howto->type)
1344 {
1345 #include "elf/arc-reloc.def"
1346
1347 default:
1348 BFD_ASSERT (0);
1349 break;
1350 }
1351
1352 /* Check for relocation overflow. */
1353 if (reloc_data.howto->complain_on_overflow != complain_overflow_dont)
1354 flag = bfd_check_overflow (reloc_data.howto->complain_on_overflow,
1355 reloc_data.howto->bitsize,
1356 reloc_data.howto->rightshift,
1357 bfd_arch_bits_per_address (abfd),
1358 relocation);
1359 else
1360 flag = arc_special_overflow_checks (reloc_data, relocation, info);
1361
1362 if (flag != bfd_reloc_ok)
1363 {
1364 ARC_DEBUG ("Relocation overflows !\n");
1365 DEBUG_ARC_RELOC (reloc_data);
1366 ARC_DEBUG ("Relocation value = signed -> %d, unsigned -> %u"
1367 ", hex -> (0x%08x)\n",
1368 (int) relocation, (unsigned) relocation, (int) relocation);
1369
1370 return flag;
1371 }
1372
1373 /* Write updated instruction back to memory. */
1374 switch (reloc_data.howto->size)
1375 {
1376 case 2:
1377 arc_bfd_put_32 (abfd, insn,
1378 contents + reloc_data.reloc_offset,
1379 reloc_data.input_section);
1380 break;
1381 case 1:
1382 arc_bfd_put_16 (abfd, insn,
1383 contents + reloc_data.reloc_offset,
1384 reloc_data.input_section);
1385 break;
1386 case 0:
1387 arc_bfd_put_8 (abfd, insn,
1388 contents + reloc_data.reloc_offset,
1389 reloc_data.input_section);
1390 break;
1391 default:
1392 ARC_DEBUG ("size = %d\n", reloc_data.howto->size);
1393 BFD_ASSERT (0);
1394 break;
1395 }
1396
1397 return bfd_reloc_ok;
1398 }
1399 #undef S
1400 #undef A
1401 #undef B
1402 #undef G
1403 #undef GOT
1404 #undef L
1405 #undef MES
1406 #undef P
1407 #undef SECTSTAR
1408 #undef SECTSTART
1409 #undef JLI
1410 #undef _SDA_BASE_
1411 #undef none
1412
1413 #undef ARC_RELOC_HOWTO
1414
1415
1416 /* Relocate an arc ELF section.
1417 Function : elf_arc_relocate_section
1418 Brief : Relocate an arc section, by handling all the relocations
1419 appearing in that section.
1420 Args : output_bfd : The bfd being written to.
1421 info : Link information.
1422 input_bfd : The input bfd.
1423 input_section : The section being relocated.
1424 contents : contents of the section being relocated.
1425 relocs : List of relocations in the section.
1426 local_syms : is a pointer to the swapped in local symbols.
1427 local_section : is an array giving the section in the input file
1428 corresponding to the st_shndx field of each
1429 local symbol. */
1430 static bfd_boolean
1431 elf_arc_relocate_section (bfd * output_bfd,
1432 struct bfd_link_info * info,
1433 bfd * input_bfd,
1434 asection * input_section,
1435 bfd_byte * contents,
1436 Elf_Internal_Rela * relocs,
1437 Elf_Internal_Sym * local_syms,
1438 asection ** local_sections)
1439 {
1440 Elf_Internal_Shdr * symtab_hdr;
1441 struct elf_link_hash_entry ** sym_hashes;
1442 Elf_Internal_Rela * rel;
1443 Elf_Internal_Rela * wrel;
1444 Elf_Internal_Rela * relend;
1445 struct elf_link_hash_table * htab = elf_hash_table (info);
1446
1447 symtab_hdr = &((elf_tdata (input_bfd))->symtab_hdr);
1448 sym_hashes = elf_sym_hashes (input_bfd);
1449
1450 rel = wrel = relocs;
1451 relend = relocs + input_section->reloc_count;
1452 for (; rel < relend; wrel++, rel++)
1453 {
1454 enum elf_arc_reloc_type r_type;
1455 reloc_howto_type * howto;
1456 unsigned long r_symndx;
1457 struct elf_link_hash_entry * h;
1458 Elf_Internal_Sym * sym;
1459 asection * sec;
1460 struct elf_link_hash_entry * h2;
1461 const char * msg;
1462 bfd_boolean unresolved_reloc = FALSE;
1463
1464 struct arc_relocation_data reloc_data =
1465 {
1466 .reloc_offset = 0,
1467 .reloc_addend = 0,
1468 .got_offset_value = 0,
1469 .sym_value = 0,
1470 .sym_section = NULL,
1471 .howto = NULL,
1472 .input_section = NULL,
1473 .sdata_begin_symbol_vma = 0,
1474 .sdata_begin_symbol_vma_set = FALSE,
1475 .got_symbol_vma = 0,
1476 .should_relocate = FALSE
1477 };
1478
1479 r_type = ELF32_R_TYPE (rel->r_info);
1480
1481 if (r_type >= (int) R_ARC_max)
1482 {
1483 bfd_set_error (bfd_error_bad_value);
1484 return FALSE;
1485 }
1486 howto = arc_elf_howto (r_type);
1487
1488 r_symndx = ELF32_R_SYM (rel->r_info);
1489
1490 /* If we are generating another .o file and the symbol in not
1491 local, skip this relocation. */
1492 if (bfd_link_relocatable (info))
1493 {
1494 /* This is a relocateable link. We don't have to change
1495 anything, unless the reloc is against a section symbol,
1496 in which case we have to adjust according to where the
1497 section symbol winds up in the output section. */
1498
1499 /* Checks if this is a local symbol and thus the reloc
1500 might (will??) be against a section symbol. */
1501 if (r_symndx < symtab_hdr->sh_info)
1502 {
1503 sym = local_syms + r_symndx;
1504 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
1505 {
1506 sec = local_sections[r_symndx];
1507
1508 /* For RELA relocs. Just adjust the addend
1509 value in the relocation entry. */
1510 rel->r_addend += sec->output_offset + sym->st_value;
1511
1512 ARC_DEBUG ("local symbols reloc (section=%d %s) seen in %s\n",
1513 (int) r_symndx, local_sections[r_symndx]->name,
1514 __PRETTY_FUNCTION__);
1515 }
1516 }
1517 }
1518
1519 h2 = elf_link_hash_lookup (elf_hash_table (info), "__SDATA_BEGIN__",
1520 FALSE, FALSE, TRUE);
1521
1522 if (!reloc_data.sdata_begin_symbol_vma_set
1523 && h2 != NULL && h2->root.type != bfd_link_hash_undefined
1524 && h2->root.u.def.section->output_section != NULL)
1525 /* TODO: Verify this condition. */
1526 {
1527 reloc_data.sdata_begin_symbol_vma =
1528 (h2->root.u.def.value
1529 + h2->root.u.def.section->output_section->vma);
1530 reloc_data.sdata_begin_symbol_vma_set = TRUE;
1531 }
1532
1533 reloc_data.input_section = input_section;
1534 reloc_data.howto = howto;
1535 reloc_data.reloc_offset = rel->r_offset;
1536 reloc_data.reloc_addend = rel->r_addend;
1537
1538 /* This is a final link. */
1539 h = NULL;
1540 sym = NULL;
1541 sec = NULL;
1542
1543 if (r_symndx < symtab_hdr->sh_info) /* A local symbol. */
1544 {
1545 sym = local_syms + r_symndx;
1546 sec = local_sections[r_symndx];
1547 }
1548 else
1549 {
1550 bfd_boolean warned, ignored;
1551 bfd_vma relocation ATTRIBUTE_UNUSED;
1552
1553 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1554 r_symndx, symtab_hdr, sym_hashes,
1555 h, sec, relocation,
1556 unresolved_reloc, warned, ignored);
1557
1558 /* TODO: This code is repeated from below. We should
1559 clean it and remove duplications.
1560 Sec is used check for discarded sections.
1561 Need to redesign code below. */
1562
1563 /* Get the symbol's entry in the symtab. */
1564 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1565
1566 while (h->root.type == bfd_link_hash_indirect
1567 || h->root.type == bfd_link_hash_warning)
1568 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1569
1570 /* If we have encountered a definition for this symbol. */
1571 if (h->root.type == bfd_link_hash_defined
1572 || h->root.type == bfd_link_hash_defweak)
1573 {
1574 reloc_data.sym_value = h->root.u.def.value;
1575 sec = h->root.u.def.section;
1576 }
1577 }
1578
1579 /* Clean relocs for symbols in discarded sections. */
1580 if (sec != NULL && discarded_section (sec))
1581 {
1582 _bfd_clear_contents (howto, input_bfd, input_section,
1583 contents, rel->r_offset);
1584 rel->r_info = 0;
1585 rel->r_addend = 0;
1586
1587 /* For ld -r, remove relocations in debug sections against
1588 sections defined in discarded sections. Not done for
1589 eh_frame editing code expects to be present. */
1590 if (bfd_link_relocatable (info)
1591 && (input_section->flags & SEC_DEBUGGING))
1592 wrel--;
1593
1594 continue;
1595 }
1596
1597 if (bfd_link_relocatable (info))
1598 {
1599 if (wrel != rel)
1600 *wrel = *rel;
1601 continue;
1602 }
1603
1604 if (r_symndx < symtab_hdr->sh_info) /* A local symbol. */
1605 {
1606 reloc_data.sym_value = sym->st_value;
1607 reloc_data.sym_section = sec;
1608 reloc_data.symbol_name =
1609 bfd_elf_string_from_elf_section (input_bfd,
1610 symtab_hdr->sh_link,
1611 sym->st_name);
1612
1613 /* Mergeable section handling. */
1614 if ((sec->flags & SEC_MERGE)
1615 && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
1616 {
1617 asection *msec;
1618 msec = sec;
1619 rel->r_addend = _bfd_elf_rel_local_sym (output_bfd, sym,
1620 &msec, rel->r_addend);
1621 rel->r_addend -= (sec->output_section->vma
1622 + sec->output_offset
1623 + sym->st_value);
1624 rel->r_addend += msec->output_section->vma + msec->output_offset;
1625
1626 reloc_data.reloc_addend = rel->r_addend;
1627 }
1628
1629 BFD_ASSERT (htab->sgot != NULL || !is_reloc_for_GOT (howto));
1630 if (htab->sgot != NULL)
1631 reloc_data.got_symbol_vma = htab->sgot->output_section->vma
1632 + htab->sgot->output_offset;
1633
1634 reloc_data.should_relocate = TRUE;
1635 }
1636 else /* Global symbol. */
1637 {
1638 /* FIXME: We should use the RELOC_FOR_GLOBAL_SYMBOL macro
1639 (defined in elf-bfd.h) here. */
1640
1641 /* Get the symbol's entry in the symtab. */
1642 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1643
1644 while (h->root.type == bfd_link_hash_indirect
1645 || h->root.type == bfd_link_hash_warning)
1646 {
1647 struct elf_arc_link_hash_entry *ah_old =
1648 (struct elf_arc_link_hash_entry *) h;
1649 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1650 struct elf_arc_link_hash_entry *ah =
1651 (struct elf_arc_link_hash_entry *) h;
1652
1653 if (ah->got_ents == 0 && ah_old->got_ents != ah->got_ents)
1654 ah->got_ents = ah_old->got_ents;
1655 }
1656
1657 /* TODO: Need to validate what was the intention. */
1658 /* BFD_ASSERT ((h->dynindx == -1) || (h->forced_local != 0)); */
1659 reloc_data.symbol_name = h->root.root.string;
1660
1661 /* If we have encountered a definition for this symbol. */
1662 if (h->root.type == bfd_link_hash_defined
1663 || h->root.type == bfd_link_hash_defweak)
1664 {
1665 reloc_data.sym_value = h->root.u.def.value;
1666 reloc_data.sym_section = h->root.u.def.section;
1667
1668 reloc_data.should_relocate = TRUE;
1669
1670 if (is_reloc_for_GOT (howto) && !bfd_link_pic (info))
1671 {
1672 struct elf_arc_link_hash_entry *ah =
1673 (struct elf_arc_link_hash_entry *) h;
1674 /* TODO: Change it to use arc_do_relocation with
1675 ARC_32 reloc. Try to use ADD_RELA macro. */
1676 bfd_vma relocation =
1677 reloc_data.sym_value + reloc_data.reloc_addend
1678 + (reloc_data.sym_section->output_section != NULL ?
1679 (reloc_data.sym_section->output_offset
1680 + reloc_data.sym_section->output_section->vma)
1681 : 0);
1682
1683 BFD_ASSERT (ah->got_ents);
1684 bfd_vma got_offset = ah->got_ents->offset;
1685 bfd_put_32 (output_bfd, relocation,
1686 htab->sgot->contents + got_offset);
1687 }
1688 if (is_reloc_for_PLT (howto) && h->plt.offset != (bfd_vma) -1)
1689 {
1690 /* TODO: This is repeated up here. */
1691 reloc_data.sym_value = h->plt.offset;
1692 reloc_data.sym_section = htab->splt;
1693 }
1694 }
1695 else if (h->root.type == bfd_link_hash_undefweak)
1696 {
1697 /* Is weak symbol and has no definition. */
1698 if (is_reloc_for_GOT (howto))
1699 {
1700 reloc_data.sym_value = h->root.u.def.value;
1701 reloc_data.sym_section = htab->sgot;
1702 reloc_data.should_relocate = TRUE;
1703 }
1704 else if (is_reloc_for_PLT (howto)
1705 && h->plt.offset != (bfd_vma) -1)
1706 {
1707 /* TODO: This is repeated up here. */
1708 reloc_data.sym_value = h->plt.offset;
1709 reloc_data.sym_section = htab->splt;
1710 reloc_data.should_relocate = TRUE;
1711 }
1712 else
1713 continue;
1714 }
1715 else
1716 {
1717 if (is_reloc_for_GOT (howto))
1718 {
1719 reloc_data.sym_value = h->root.u.def.value;
1720 reloc_data.sym_section = htab->sgot;
1721
1722 reloc_data.should_relocate = TRUE;
1723 }
1724 else if (is_reloc_for_PLT (howto))
1725 {
1726 /* Fail if it is linking for PIE and the symbol is
1727 undefined. */
1728 if (bfd_link_executable (info))
1729 (*info->callbacks->undefined_symbol)
1730 (info, h->root.root.string, input_bfd, input_section,
1731 rel->r_offset, TRUE);
1732 reloc_data.sym_value = h->plt.offset;
1733 reloc_data.sym_section = htab->splt;
1734
1735 reloc_data.should_relocate = TRUE;
1736 }
1737 else if (!bfd_link_pic (info) || bfd_link_executable (info))
1738 (*info->callbacks->undefined_symbol)
1739 (info, h->root.root.string, input_bfd, input_section,
1740 rel->r_offset, TRUE);
1741 }
1742
1743 BFD_ASSERT (htab->sgot != NULL || !is_reloc_for_GOT (howto));
1744 if (htab->sgot != NULL)
1745 reloc_data.got_symbol_vma = htab->sgot->output_section->vma
1746 + htab->sgot->output_offset;
1747 }
1748
1749 if ((is_reloc_for_GOT (howto)
1750 || is_reloc_for_TLS (howto)))
1751 {
1752 reloc_data.should_relocate = TRUE;
1753
1754 struct got_entry **list
1755 = get_got_entry_list_for_symbol (input_bfd, r_symndx, h);
1756
1757 reloc_data.got_offset_value
1758 = relocate_fix_got_relocs_for_got_info (list,
1759 tls_type_for_reloc (howto),
1760 info,
1761 output_bfd,
1762 r_symndx,
1763 local_syms,
1764 local_sections,
1765 h,
1766 &reloc_data);
1767
1768 if (h == NULL)
1769 {
1770 create_got_dynrelocs_for_single_entry (
1771 got_entry_for_type (list,
1772 arc_got_entry_type_for_reloc (howto)),
1773 output_bfd, info, NULL);
1774 }
1775 }
1776
1777
1778 #define IS_ARC_PCREL_TYPE(TYPE) \
1779 ( (TYPE == R_ARC_PC32) \
1780 || (TYPE == R_ARC_32_PCREL))
1781
1782 switch (r_type)
1783 {
1784 case R_ARC_32:
1785 case R_ARC_32_ME:
1786 case R_ARC_PC32:
1787 case R_ARC_32_PCREL:
1788 if (bfd_link_pic (info)
1789 && (!IS_ARC_PCREL_TYPE (r_type)
1790 || (h != NULL
1791 && h->dynindx != -1
1792 && !h->def_regular
1793 && (!info->symbolic || !h->def_regular))))
1794 {
1795 Elf_Internal_Rela outrel;
1796 bfd_byte *loc;
1797 bfd_boolean skip = FALSE;
1798 bfd_boolean relocate = FALSE;
1799 asection *sreloc = _bfd_elf_get_dynamic_reloc_section
1800 (input_bfd, input_section,
1801 /*RELA*/ TRUE);
1802
1803 BFD_ASSERT (sreloc != NULL);
1804
1805 outrel.r_offset = _bfd_elf_section_offset (output_bfd,
1806 info,
1807 input_section,
1808 rel->r_offset);
1809
1810 if (outrel.r_offset == (bfd_vma) -1)
1811 skip = TRUE;
1812
1813 outrel.r_addend = rel->r_addend;
1814 outrel.r_offset += (input_section->output_section->vma
1815 + input_section->output_offset);
1816
1817 if (skip)
1818 {
1819 memset (&outrel, 0, sizeof outrel);
1820 relocate = FALSE;
1821 }
1822 else if (h != NULL
1823 && h->dynindx != -1
1824 && (IS_ARC_PCREL_TYPE (r_type)
1825 || !(bfd_link_executable (info)
1826 || SYMBOLIC_BIND (info, h))
1827 || ! h->def_regular))
1828 {
1829 BFD_ASSERT (h != NULL);
1830 if ((input_section->flags & SEC_ALLOC) != 0)
1831 relocate = FALSE;
1832 else
1833 relocate = TRUE;
1834
1835 BFD_ASSERT (h->dynindx != -1);
1836 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1837 }
1838 else
1839 {
1840 /* Handle local symbols, they either do not have a
1841 global hash table entry (h == NULL), or are
1842 forced local due to a version script
1843 (h->forced_local), or the third condition is
1844 legacy, it appears to say something like, for
1845 links where we are pre-binding the symbols, or
1846 there's not an entry for this symbol in the
1847 dynamic symbol table, and it's a regular symbol
1848 not defined in a shared object, then treat the
1849 symbol as local, resolve it now. */
1850 relocate = TRUE;
1851 /* outrel.r_addend = 0; */
1852 outrel.r_info = ELF32_R_INFO (0, R_ARC_RELATIVE);
1853 }
1854
1855 BFD_ASSERT (sreloc->contents != 0);
1856
1857 loc = sreloc->contents;
1858 loc += sreloc->reloc_count * sizeof (Elf32_External_Rela);
1859 sreloc->reloc_count += 1;
1860
1861 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1862
1863 if (!relocate)
1864 continue;
1865 }
1866 break;
1867 default:
1868 break;
1869 }
1870
1871 if (is_reloc_SDA_relative (howto)
1872 && !reloc_data.sdata_begin_symbol_vma_set)
1873 {
1874 _bfd_error_handler
1875 ("error: linker symbol __SDATA_BEGIN__ not found");
1876 bfd_set_error (bfd_error_bad_value);
1877 return FALSE;
1878 }
1879
1880 DEBUG_ARC_RELOC (reloc_data);
1881
1882 /* Make sure we have with a dynamic linker. In case of GOT and PLT
1883 the sym_section should point to .got or .plt respectively. */
1884 if ((is_reloc_for_GOT (howto) || is_reloc_for_PLT (howto))
1885 && reloc_data.sym_section == NULL)
1886 {
1887 _bfd_error_handler
1888 (_("GOT and PLT relocations cannot be fixed with a non dynamic linker"));
1889 bfd_set_error (bfd_error_bad_value);
1890 return FALSE;
1891 }
1892
1893 msg = NULL;
1894 switch (arc_do_relocation (contents, reloc_data, info))
1895 {
1896 case bfd_reloc_ok:
1897 continue; /* The reloc processing loop. */
1898
1899 case bfd_reloc_overflow:
1900 (*info->callbacks->reloc_overflow)
1901 (info, (h ? &h->root : NULL), reloc_data.symbol_name, howto->name, (bfd_vma) 0,
1902 input_bfd, input_section, rel->r_offset);
1903 break;
1904
1905 case bfd_reloc_undefined:
1906 (*info->callbacks->undefined_symbol)
1907 (info, reloc_data.symbol_name, input_bfd, input_section, rel->r_offset, TRUE);
1908 break;
1909
1910 case bfd_reloc_other:
1911 /* xgettext:c-format */
1912 msg = _("%pB(%pA): warning: unaligned access to symbol '%s' in the small data area");
1913 break;
1914
1915 case bfd_reloc_outofrange:
1916 /* xgettext:c-format */
1917 msg = _("%pB(%pA): internal error: out of range error");
1918 break;
1919
1920 case bfd_reloc_notsupported:
1921 /* xgettext:c-format */
1922 msg = _("%pB(%pA): internal error: unsupported relocation error");
1923 break;
1924
1925 case bfd_reloc_dangerous:
1926 /* xgettext:c-format */
1927 msg = _("%pB(%pA): internal error: dangerous relocation");
1928 break;
1929
1930 default:
1931 /* xgettext:c-format */
1932 msg = _("%pB(%pA): internal error: unknown error");
1933 break;
1934 }
1935
1936 if (msg)
1937 _bfd_error_handler (msg, input_bfd, input_section, reloc_data.symbol_name);
1938 return FALSE;
1939 }
1940
1941 return TRUE;
1942 }
1943
1944 #define elf_arc_hash_table(p) \
1945 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
1946 == ARC_ELF_DATA ? ((struct elf_arc_link_hash_table *) ((p)->hash)) : NULL)
1947
1948 static bfd_boolean
1949 elf_arc_check_relocs (bfd * abfd,
1950 struct bfd_link_info * info,
1951 asection * sec,
1952 const Elf_Internal_Rela * relocs)
1953 {
1954 Elf_Internal_Shdr * symtab_hdr;
1955 struct elf_link_hash_entry ** sym_hashes;
1956 const Elf_Internal_Rela * rel;
1957 const Elf_Internal_Rela * rel_end;
1958 bfd * dynobj;
1959 asection * sreloc = NULL;
1960 struct elf_link_hash_table * htab = elf_hash_table (info);
1961
1962 if (bfd_link_relocatable (info))
1963 return TRUE;
1964
1965 if (htab->dynobj == NULL)
1966 htab->dynobj = abfd;
1967
1968 dynobj = (elf_hash_table (info))->dynobj;
1969 symtab_hdr = &((elf_tdata (abfd))->symtab_hdr);
1970 sym_hashes = elf_sym_hashes (abfd);
1971
1972 rel_end = relocs + sec->reloc_count;
1973 for (rel = relocs; rel < rel_end; rel++)
1974 {
1975 enum elf_arc_reloc_type r_type;
1976 reloc_howto_type *howto;
1977 unsigned long r_symndx;
1978 struct elf_link_hash_entry *h;
1979
1980 r_type = ELF32_R_TYPE (rel->r_info);
1981
1982 if (r_type >= (int) R_ARC_max)
1983 {
1984 bfd_set_error (bfd_error_bad_value);
1985 return FALSE;
1986 }
1987 howto = arc_elf_howto (r_type);
1988
1989 /* Load symbol information. */
1990 r_symndx = ELF32_R_SYM (rel->r_info);
1991 if (r_symndx < symtab_hdr->sh_info) /* Is a local symbol. */
1992 h = NULL;
1993 else /* Global one. */
1994 {
1995 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1996 while (h->root.type == bfd_link_hash_indirect
1997 || h->root.type == bfd_link_hash_warning)
1998 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1999 }
2000
2001
2002 switch (r_type)
2003 {
2004 case R_ARC_32:
2005 case R_ARC_32_ME:
2006 /* During shared library creation, these relocs should not
2007 appear in a shared library (as memory will be read only
2008 and the dynamic linker can not resolve these. However
2009 the error should not occur for e.g. debugging or
2010 non-readonly sections. */
2011 if (h != NULL
2012 && (bfd_link_dll (info) && !bfd_link_pie (info))
2013 && (sec->flags & SEC_ALLOC) != 0
2014 && (sec->flags & SEC_READONLY) != 0
2015 && ((sec->flags & SEC_CODE) != 0
2016 || (sec->flags & SEC_DEBUGGING) != 0))
2017 {
2018 const char *name;
2019 if (h)
2020 name = h->root.root.string;
2021 else
2022 name = "UNKNOWN";
2023 _bfd_error_handler
2024 /* xgettext:c-format */
2025 (_("%pB: relocation %s against `%s' can not be used"
2026 " when making a shared object; recompile with -fPIC"),
2027 abfd,
2028 arc_elf_howto (r_type)->name,
2029 name);
2030 bfd_set_error (bfd_error_bad_value);
2031 return FALSE;
2032 }
2033
2034 /* In some cases we are not setting the 'non_got_ref'
2035 flag, even though the relocations don't require a GOT
2036 access. We should extend the testing in this area to
2037 ensure that no significant cases are being missed. */
2038 if (h)
2039 h->non_got_ref = 1;
2040 /* FALLTHROUGH */
2041 case R_ARC_PC32:
2042 case R_ARC_32_PCREL:
2043 if ((bfd_link_pic (info))
2044 && ((r_type != R_ARC_PC32 && r_type != R_ARC_32_PCREL)
2045 || (h != NULL
2046 && (!info->symbolic || !h->def_regular))))
2047 {
2048 if (sreloc == NULL)
2049 {
2050 if (info->dynamic
2051 && ! htab->dynamic_sections_created
2052 && ! _bfd_elf_link_create_dynamic_sections (abfd, info))
2053 return FALSE;
2054 sreloc = _bfd_elf_make_dynamic_reloc_section (sec, dynobj,
2055 2, abfd,
2056 /*rela*/
2057 TRUE);
2058
2059 if (sreloc == NULL)
2060 return FALSE;
2061 }
2062 sreloc->size += sizeof (Elf32_External_Rela);
2063
2064 }
2065 default:
2066 break;
2067 }
2068
2069 if (is_reloc_for_PLT (howto))
2070 {
2071 if (h == NULL)
2072 continue;
2073 else
2074 if (h->forced_local == 0)
2075 h->needs_plt = 1;
2076 }
2077
2078 /* Add info to the symbol got_entry_list. */
2079 if (is_reloc_for_GOT (howto)
2080 || is_reloc_for_TLS (howto))
2081 {
2082 if (bfd_link_dll (info) && !bfd_link_pie (info)
2083 && (r_type == R_ARC_TLS_LE_32 || r_type == R_ARC_TLS_LE_S9))
2084 {
2085 const char *name;
2086 if (h)
2087 name = h->root.root.string;
2088 else
2089 /* bfd_elf_sym_name (abfd, symtab_hdr, isym, NULL); */
2090 name = "UNKNOWN";
2091 _bfd_error_handler
2092 /* xgettext:c-format */
2093 (_("%pB: relocation %s against `%s' can not be used"
2094 " when making a shared object; recompile with -fPIC"),
2095 abfd,
2096 arc_elf_howto (r_type)->name,
2097 name);
2098 bfd_set_error (bfd_error_bad_value);
2099 return FALSE;
2100 }
2101 if (! _bfd_elf_create_got_section (dynobj, info))
2102 return FALSE;
2103
2104 arc_fill_got_info_for_reloc (
2105 arc_got_entry_type_for_reloc (howto),
2106 get_got_entry_list_for_symbol (abfd, r_symndx, h),
2107 info,
2108 h);
2109 }
2110 }
2111
2112 return TRUE;
2113 }
2114
2115 #define ELF_DYNAMIC_INTERPRETER "/sbin/ld-uClibc.so"
2116
2117 static struct plt_version_t *
2118 arc_get_plt_version (struct bfd_link_info *info)
2119 {
2120 int i;
2121
2122 for (i = 0; i < 1; i++)
2123 {
2124 ARC_DEBUG ("%d: size1 = %d, size2 = %d\n", i,
2125 (int) plt_versions[i].entry_size,
2126 (int) plt_versions[i].elem_size);
2127 }
2128
2129 if (bfd_get_mach (info->output_bfd) == bfd_mach_arc_arcv2)
2130 {
2131 if (bfd_link_pic (info))
2132 return &(plt_versions[ELF_ARCV2_PIC]);
2133 else
2134 return &(plt_versions[ELF_ARCV2_ABS]);
2135 }
2136 else
2137 {
2138 if (bfd_link_pic (info))
2139 return &(plt_versions[ELF_ARC_PIC]);
2140 else
2141 return &(plt_versions[ELF_ARC_ABS]);
2142 }
2143 }
2144
2145 static bfd_vma
2146 add_symbol_to_plt (struct bfd_link_info *info)
2147 {
2148 struct elf_link_hash_table *htab = elf_hash_table (info);
2149 bfd_vma ret;
2150
2151 struct plt_version_t *plt_data = arc_get_plt_version (info);
2152
2153 /* If this is the first .plt entry, make room for the special first
2154 entry. */
2155 if (htab->splt->size == 0)
2156 htab->splt->size += plt_data->entry_size;
2157
2158 ret = htab->splt->size;
2159
2160 htab->splt->size += plt_data->elem_size;
2161 ARC_DEBUG ("PLT_SIZE = %d\n", (int) htab->splt->size);
2162
2163 htab->sgotplt->size += 4;
2164 htab->srelplt->size += sizeof (Elf32_External_Rela);
2165
2166 return ret;
2167 }
2168
2169 #define PLT_DO_RELOCS_FOR_ENTRY(ABFD, DS, RELOCS) \
2170 plt_do_relocs_for_symbol (ABFD, DS, RELOCS, 0, 0)
2171
2172 static void
2173 plt_do_relocs_for_symbol (bfd *abfd,
2174 struct elf_link_hash_table *htab,
2175 const struct plt_reloc *reloc,
2176 bfd_vma plt_offset,
2177 bfd_vma symbol_got_offset)
2178 {
2179 while (SYM_ONLY (reloc->symbol) != LAST_RELOC)
2180 {
2181 bfd_vma relocation = 0;
2182
2183 switch (SYM_ONLY (reloc->symbol))
2184 {
2185 case SGOT:
2186 relocation
2187 = htab->sgotplt->output_section->vma
2188 + htab->sgotplt->output_offset + symbol_got_offset;
2189 break;
2190 }
2191 relocation += reloc->addend;
2192
2193 if (IS_RELATIVE (reloc->symbol))
2194 {
2195 bfd_vma reloc_offset = reloc->offset;
2196 reloc_offset -= (IS_INSN_32 (reloc->symbol)) ? 4 : 0;
2197 reloc_offset -= (IS_INSN_24 (reloc->symbol)) ? 2 : 0;
2198
2199 relocation -= htab->splt->output_section->vma
2200 + htab->splt->output_offset
2201 + plt_offset + reloc_offset;
2202 }
2203
2204 /* TODO: being ME is not a property of the relocation but of the
2205 section of which is applying the relocation. */
2206 if (IS_MIDDLE_ENDIAN (reloc->symbol) && !bfd_big_endian (abfd))
2207 {
2208 relocation
2209 = ((relocation & 0xffff0000) >> 16)
2210 | ((relocation & 0xffff) << 16);
2211 }
2212
2213 switch (reloc->size)
2214 {
2215 case 32:
2216 bfd_put_32 (htab->splt->output_section->owner,
2217 relocation,
2218 htab->splt->contents + plt_offset + reloc->offset);
2219 break;
2220 }
2221
2222 reloc = &(reloc[1]); /* Jump to next relocation. */
2223 }
2224 }
2225
2226 static void
2227 relocate_plt_for_symbol (bfd *output_bfd,
2228 struct bfd_link_info *info,
2229 struct elf_link_hash_entry *h)
2230 {
2231 struct plt_version_t *plt_data = arc_get_plt_version (info);
2232 struct elf_link_hash_table *htab = elf_hash_table (info);
2233
2234 bfd_vma plt_index = (h->plt.offset - plt_data->entry_size)
2235 / plt_data->elem_size;
2236 bfd_vma got_offset = (plt_index + 3) * 4;
2237
2238 ARC_DEBUG ("arc_info: PLT_OFFSET = %#lx, PLT_ENTRY_VMA = %#lx, \
2239 GOT_ENTRY_OFFSET = %#lx, GOT_ENTRY_VMA = %#lx, for symbol %s\n",
2240 (long) h->plt.offset,
2241 (long) (htab->splt->output_section->vma
2242 + htab->splt->output_offset
2243 + h->plt.offset),
2244 (long) got_offset,
2245 (long) (htab->sgotplt->output_section->vma
2246 + htab->sgotplt->output_offset
2247 + got_offset),
2248 h->root.root.string);
2249
2250 {
2251 bfd_vma i = 0;
2252 uint16_t *ptr = (uint16_t *) plt_data->elem;
2253
2254 for (i = 0; i < plt_data->elem_size/2; i++)
2255 {
2256 uint16_t data = ptr[i];
2257 bfd_put_16 (output_bfd,
2258 (bfd_vma) data,
2259 htab->splt->contents + h->plt.offset + (i*2));
2260 }
2261 }
2262
2263 plt_do_relocs_for_symbol (output_bfd, htab,
2264 plt_data->elem_relocs,
2265 h->plt.offset,
2266 got_offset);
2267
2268 /* Fill in the entry in the global offset table. */
2269 bfd_put_32 (output_bfd,
2270 (bfd_vma) (htab->splt->output_section->vma
2271 + htab->splt->output_offset),
2272 htab->sgotplt->contents + got_offset);
2273
2274 /* TODO: Fill in the entry in the .rela.plt section. */
2275 {
2276 Elf_Internal_Rela rel;
2277 bfd_byte *loc;
2278
2279 rel.r_offset = (htab->sgotplt->output_section->vma
2280 + htab->sgotplt->output_offset
2281 + got_offset);
2282 rel.r_addend = 0;
2283
2284 BFD_ASSERT (h->dynindx != -1);
2285 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARC_JMP_SLOT);
2286
2287 loc = htab->srelplt->contents;
2288 loc += plt_index * sizeof (Elf32_External_Rela); /* relA */
2289 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
2290 }
2291 }
2292
2293 static void
2294 relocate_plt_for_entry (bfd *abfd,
2295 struct bfd_link_info *info)
2296 {
2297 struct plt_version_t *plt_data = arc_get_plt_version (info);
2298 struct elf_link_hash_table *htab = elf_hash_table (info);
2299
2300 {
2301 bfd_vma i = 0;
2302 uint16_t *ptr = (uint16_t *) plt_data->entry;
2303 for (i = 0; i < plt_data->entry_size/2; i++)
2304 {
2305 uint16_t data = ptr[i];
2306 bfd_put_16 (abfd,
2307 (bfd_vma) data,
2308 htab->splt->contents + (i*2));
2309 }
2310 }
2311 PLT_DO_RELOCS_FOR_ENTRY (abfd, htab, plt_data->entry_relocs);
2312 }
2313
2314 /* Desc : Adjust a symbol defined by a dynamic object and referenced
2315 by a regular object. The current definition is in some section of
2316 the dynamic object, but we're not including those sections. We
2317 have to change the definition to something the rest of the link can
2318 understand. */
2319
2320 static bfd_boolean
2321 elf_arc_adjust_dynamic_symbol (struct bfd_link_info *info,
2322 struct elf_link_hash_entry *h)
2323 {
2324 asection *s;
2325 bfd *dynobj = (elf_hash_table (info))->dynobj;
2326 struct elf_link_hash_table *htab = elf_hash_table (info);
2327
2328 if (h->type == STT_FUNC
2329 || h->type == STT_GNU_IFUNC
2330 || h->needs_plt == 1)
2331 {
2332 if (!bfd_link_pic (info) && !h->def_dynamic && !h->ref_dynamic)
2333 {
2334 /* This case can occur if we saw a PLT32 reloc in an input
2335 file, but the symbol was never referred to by a dynamic
2336 object. In such a case, we don't actually need to build
2337 a procedure linkage table, and we can just do a PC32
2338 reloc instead. */
2339 BFD_ASSERT (h->needs_plt);
2340 return TRUE;
2341 }
2342
2343 /* Make sure this symbol is output as a dynamic symbol. */
2344 if (h->dynindx == -1 && !h->forced_local
2345 && !bfd_elf_link_record_dynamic_symbol (info, h))
2346 return FALSE;
2347
2348 if (bfd_link_pic (info)
2349 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
2350 {
2351 bfd_vma loc = add_symbol_to_plt (info);
2352
2353 if (bfd_link_executable (info) && !h->def_regular)
2354 {
2355 h->root.u.def.section = htab->splt;
2356 h->root.u.def.value = loc;
2357 }
2358 h->plt.offset = loc;
2359 }
2360 else
2361 {
2362 h->plt.offset = (bfd_vma) -1;
2363 h->needs_plt = 0;
2364 }
2365 return TRUE;
2366 }
2367
2368 /* If this is a weak symbol, and there is a real definition, the
2369 processor independent code will have arranged for us to see the
2370 real definition first, and we can just use the same value. */
2371 if (h->is_weakalias)
2372 {
2373 struct elf_link_hash_entry *def = weakdef (h);
2374 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
2375 h->root.u.def.section = def->root.u.def.section;
2376 h->root.u.def.value = def->root.u.def.value;
2377 return TRUE;
2378 }
2379
2380 /* This is a reference to a symbol defined by a dynamic object which
2381 is not a function. */
2382
2383 /* If we are creating a shared library, we must presume that the
2384 only references to the symbol are via the global offset table.
2385 For such cases we need not do anything here; the relocations will
2386 be handled correctly by relocate_section. */
2387 if (!bfd_link_executable (info))
2388 return TRUE;
2389
2390 /* If there are no non-GOT references, we do not need a copy
2391 relocation. */
2392 if (!h->non_got_ref)
2393 return TRUE;
2394
2395 /* If -z nocopyreloc was given, we won't generate them either. */
2396 if (info->nocopyreloc)
2397 {
2398 h->non_got_ref = 0;
2399 return TRUE;
2400 }
2401
2402 /* We must allocate the symbol in our .dynbss section, which will
2403 become part of the .bss section of the executable. There will be
2404 an entry for this symbol in the .dynsym section. The dynamic
2405 object will contain position independent code, so all references
2406 from the dynamic object to this symbol will go through the global
2407 offset table. The dynamic linker will use the .dynsym entry to
2408 determine the address it must put in the global offset table, so
2409 both the dynamic object and the regular object will refer to the
2410 same memory location for the variable. */
2411
2412 if (htab == NULL)
2413 return FALSE;
2414
2415 /* We must generate a R_ARC_COPY reloc to tell the dynamic linker to
2416 copy the initial value out of the dynamic object and into the
2417 runtime process image. We need to remember the offset into the
2418 .rela.bss section we are going to use. */
2419 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
2420 {
2421 struct elf_arc_link_hash_table *arc_htab = elf_arc_hash_table (info);
2422
2423 BFD_ASSERT (arc_htab->elf.srelbss != NULL);
2424 arc_htab->elf.srelbss->size += sizeof (Elf32_External_Rela);
2425 h->needs_copy = 1;
2426 }
2427
2428 /* TODO: Move this also to arc_hash_table. */
2429 s = bfd_get_section_by_name (dynobj, ".dynbss");
2430 BFD_ASSERT (s != NULL);
2431
2432 return _bfd_elf_adjust_dynamic_copy (info, h, s);
2433 }
2434
2435 /* Function : elf_arc_finish_dynamic_symbol
2436 Brief : Finish up dynamic symbol handling. We set the
2437 contents of various dynamic sections here.
2438 Args : output_bfd :
2439 info :
2440 h :
2441 sym :
2442 Returns : True/False as the return status. */
2443
2444 static bfd_boolean
2445 elf_arc_finish_dynamic_symbol (bfd * output_bfd,
2446 struct bfd_link_info *info,
2447 struct elf_link_hash_entry *h,
2448 Elf_Internal_Sym * sym)
2449 {
2450 if (h->plt.offset != (bfd_vma) -1)
2451 {
2452 relocate_plt_for_symbol (output_bfd, info, h);
2453
2454 if (!h->def_regular)
2455 {
2456 /* Mark the symbol as undefined, rather than as defined in
2457 the .plt section. Leave the value alone. */
2458 sym->st_shndx = SHN_UNDEF;
2459 }
2460 }
2461
2462
2463 /* This function traverses list of GOT entries and
2464 create respective dynamic relocs. */
2465 /* TODO: Make function to get list and not access the list directly. */
2466 /* TODO: Move function to relocate_section create this relocs eagerly. */
2467 struct elf_arc_link_hash_entry *ah =
2468 (struct elf_arc_link_hash_entry *) h;
2469 create_got_dynrelocs_for_got_info (&ah->got_ents,
2470 output_bfd,
2471 info,
2472 h);
2473
2474 if (h->needs_copy)
2475 {
2476 struct elf_arc_link_hash_table *arc_htab = elf_arc_hash_table (info);
2477
2478 if (arc_htab == NULL)
2479 return FALSE;
2480
2481 if (h->dynindx == -1
2482 || (h->root.type != bfd_link_hash_defined
2483 && h->root.type != bfd_link_hash_defweak)
2484 || arc_htab->elf.srelbss == NULL)
2485 abort ();
2486
2487 bfd_vma rel_offset = (h->root.u.def.value
2488 + h->root.u.def.section->output_section->vma
2489 + h->root.u.def.section->output_offset);
2490
2491 bfd_byte * loc = arc_htab->elf.srelbss->contents
2492 + (arc_htab->elf.srelbss->reloc_count * sizeof (Elf32_External_Rela));
2493 arc_htab->elf.srelbss->reloc_count++;
2494
2495 Elf_Internal_Rela rel;
2496 rel.r_addend = 0;
2497 rel.r_offset = rel_offset;
2498
2499 BFD_ASSERT (h->dynindx != -1);
2500 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARC_COPY);
2501
2502 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
2503 }
2504
2505 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
2506 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
2507 || strcmp (h->root.root.string, "__DYNAMIC") == 0
2508 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
2509 sym->st_shndx = SHN_ABS;
2510
2511 return TRUE;
2512 }
2513
2514 #define GET_SYMBOL_OR_SECTION(TAG, SYMBOL, SECTION) \
2515 case TAG: \
2516 if (SYMBOL != NULL) \
2517 h = elf_link_hash_lookup (elf_hash_table (info), \
2518 SYMBOL, FALSE, FALSE, TRUE); \
2519 else if (SECTION != NULL) \
2520 s = bfd_get_linker_section (dynobj, SECTION); \
2521 break;
2522
2523
2524 struct obfd_info_group {
2525 bfd *output_bfd;
2526 struct bfd_link_info *info;
2527 };
2528
2529 static bfd_boolean
2530 arc_create_forced_local_got_entries_for_tls (struct bfd_hash_entry *bh,
2531 void *data)
2532 {
2533 struct elf_arc_link_hash_entry * h =
2534 (struct elf_arc_link_hash_entry *) bh;
2535 struct obfd_info_group *tmp = (struct obfd_info_group *) data;
2536
2537 if (h->got_ents != NULL)
2538 {
2539 BFD_ASSERT (h);
2540
2541 struct got_entry *list = h->got_ents;
2542
2543 while (list != NULL)
2544 {
2545 create_got_dynrelocs_for_single_entry (list, tmp->output_bfd,
2546 tmp->info,
2547 (struct elf_link_hash_entry *) h);
2548 list = list->next;
2549 }
2550 }
2551
2552 return TRUE;
2553 }
2554
2555
2556 /* Function : elf_arc_finish_dynamic_sections
2557 Brief : Finish up the dynamic sections handling.
2558 Args : output_bfd :
2559 info :
2560 h :
2561 sym :
2562 Returns : True/False as the return status. */
2563
2564 static bfd_boolean
2565 elf_arc_finish_dynamic_sections (bfd * output_bfd,
2566 struct bfd_link_info *info)
2567 {
2568 struct elf_link_hash_table *htab = elf_hash_table (info);
2569 bfd *dynobj = (elf_hash_table (info))->dynobj;
2570 asection *sdyn = bfd_get_linker_section (dynobj, ".dynamic");
2571
2572 if (sdyn)
2573 {
2574 Elf32_External_Dyn *dyncon, *dynconend;
2575
2576 dyncon = (Elf32_External_Dyn *) sdyn->contents;
2577 dynconend
2578 = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
2579 for (; dyncon < dynconend; dyncon++)
2580 {
2581 Elf_Internal_Dyn internal_dyn;
2582 bfd_boolean do_it = FALSE;
2583
2584 struct elf_link_hash_entry *h = NULL;
2585 asection *s = NULL;
2586
2587 bfd_elf32_swap_dyn_in (dynobj, dyncon, &internal_dyn);
2588
2589 switch (internal_dyn.d_tag)
2590 {
2591 GET_SYMBOL_OR_SECTION (DT_INIT, info->init_function, NULL)
2592 GET_SYMBOL_OR_SECTION (DT_FINI, info->fini_function, NULL)
2593 GET_SYMBOL_OR_SECTION (DT_PLTGOT, NULL, ".plt")
2594 GET_SYMBOL_OR_SECTION (DT_JMPREL, NULL, ".rela.plt")
2595 GET_SYMBOL_OR_SECTION (DT_PLTRELSZ, NULL, ".rela.plt")
2596 GET_SYMBOL_OR_SECTION (DT_VERSYM, NULL, ".gnu.version")
2597 GET_SYMBOL_OR_SECTION (DT_VERDEF, NULL, ".gnu.version_d")
2598 GET_SYMBOL_OR_SECTION (DT_VERNEED, NULL, ".gnu.version_r")
2599 default:
2600 break;
2601 }
2602
2603 /* In case the dynamic symbols should be updated with a symbol. */
2604 if (h != NULL
2605 && (h->root.type == bfd_link_hash_defined
2606 || h->root.type == bfd_link_hash_defweak))
2607 {
2608 asection *asec_ptr;
2609
2610 internal_dyn.d_un.d_val = h->root.u.def.value;
2611 asec_ptr = h->root.u.def.section;
2612 if (asec_ptr->output_section != NULL)
2613 {
2614 internal_dyn.d_un.d_val +=
2615 (asec_ptr->output_section->vma
2616 + asec_ptr->output_offset);
2617 }
2618 else
2619 {
2620 /* The symbol is imported from another shared
2621 library and does not apply to this one. */
2622 internal_dyn.d_un.d_val = 0;
2623 }
2624 do_it = TRUE;
2625 }
2626 else if (s != NULL) /* With a section information. */
2627 {
2628 switch (internal_dyn.d_tag)
2629 {
2630 case DT_PLTGOT:
2631 case DT_JMPREL:
2632 case DT_VERSYM:
2633 case DT_VERDEF:
2634 case DT_VERNEED:
2635 internal_dyn.d_un.d_ptr = (s->output_section->vma
2636 + s->output_offset);
2637 do_it = TRUE;
2638 break;
2639
2640 case DT_PLTRELSZ:
2641 internal_dyn.d_un.d_val = s->size;
2642 do_it = TRUE;
2643 break;
2644
2645 default:
2646 break;
2647 }
2648 }
2649
2650 if (do_it)
2651 bfd_elf32_swap_dyn_out (output_bfd, &internal_dyn, dyncon);
2652 }
2653
2654 if (htab->splt->size > 0)
2655 {
2656 relocate_plt_for_entry (output_bfd, info);
2657 }
2658
2659 /* TODO: Validate this. */
2660 if (htab->srelplt->output_section != bfd_abs_section_ptr)
2661 elf_section_data (htab->srelplt->output_section)
2662 ->this_hdr.sh_entsize = 12;
2663 }
2664
2665 /* Fill in the first three entries in the global offset table. */
2666 if (htab->sgot)
2667 {
2668 struct elf_link_hash_entry *h;
2669 h = elf_link_hash_lookup (elf_hash_table (info), "_GLOBAL_OFFSET_TABLE_",
2670 FALSE, FALSE, TRUE);
2671
2672 if (h != NULL && h->root.type != bfd_link_hash_undefined
2673 && h->root.u.def.section != NULL)
2674 {
2675 asection *sec = h->root.u.def.section;
2676
2677 if (sdyn == NULL)
2678 bfd_put_32 (output_bfd, (bfd_vma) 0,
2679 sec->contents);
2680 else
2681 bfd_put_32 (output_bfd,
2682 sdyn->output_section->vma + sdyn->output_offset,
2683 sec->contents);
2684 bfd_put_32 (output_bfd, (bfd_vma) 0, sec->contents + 4);
2685 bfd_put_32 (output_bfd, (bfd_vma) 0, sec->contents + 8);
2686 }
2687 }
2688
2689 struct obfd_info_group group;
2690 group.output_bfd = output_bfd;
2691 group.info = info;
2692 bfd_hash_traverse (&info->hash->table,
2693 arc_create_forced_local_got_entries_for_tls, &group);
2694
2695 return TRUE;
2696 }
2697
2698 #define ADD_DYNAMIC_SYMBOL(NAME, TAG) \
2699 h = elf_link_hash_lookup (elf_hash_table (info), \
2700 NAME, FALSE, FALSE, FALSE); \
2701 if ((h != NULL && (h->ref_regular || h->def_regular))) \
2702 if (! _bfd_elf_add_dynamic_entry (info, TAG, 0)) \
2703 return FALSE;
2704
2705 /* Set the sizes of the dynamic sections. */
2706 static bfd_boolean
2707 elf_arc_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2708 struct bfd_link_info *info)
2709 {
2710 bfd *dynobj;
2711 asection *s;
2712 bfd_boolean relocs_exist = FALSE;
2713 bfd_boolean reltext_exist = FALSE;
2714 struct elf_link_hash_table *htab = elf_hash_table (info);
2715
2716 dynobj = htab->dynobj;
2717 BFD_ASSERT (dynobj != NULL);
2718
2719 if (htab->dynamic_sections_created)
2720 {
2721 struct elf_link_hash_entry *h;
2722
2723 /* Set the contents of the .interp section to the
2724 interpreter. */
2725 if (bfd_link_executable (info) && !info->nointerp)
2726 {
2727 s = bfd_get_section_by_name (dynobj, ".interp");
2728 BFD_ASSERT (s != NULL);
2729 s->size = sizeof (ELF_DYNAMIC_INTERPRETER);
2730 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2731 }
2732
2733 /* Add some entries to the .dynamic section. We fill in some of
2734 the values later, in elf_bfd_final_link, but we must add the
2735 entries now so that we know the final size of the .dynamic
2736 section. Checking if the .init section is present. We also
2737 create DT_INIT and DT_FINI entries if the init_str has been
2738 changed by the user. */
2739 ADD_DYNAMIC_SYMBOL (info->init_function, DT_INIT);
2740 ADD_DYNAMIC_SYMBOL (info->fini_function, DT_FINI);
2741 }
2742 else
2743 {
2744 /* We may have created entries in the .rela.got section.
2745 However, if we are not creating the dynamic sections, we will
2746 not actually use these entries. Reset the size of .rela.got,
2747 which will cause it to get stripped from the output file
2748 below. */
2749 if (htab->srelgot != NULL)
2750 htab->srelgot->size = 0;
2751 }
2752
2753 for (s = dynobj->sections; s != NULL; s = s->next)
2754 {
2755 if ((s->flags & SEC_LINKER_CREATED) == 0)
2756 continue;
2757
2758 if (s == htab->splt
2759 || s == htab->sgot
2760 || s == htab->sgotplt
2761 || s == htab->sdynbss)
2762 {
2763 /* Strip this section if we don't need it. */
2764 }
2765 else if (strncmp (s->name, ".rela", 5) == 0)
2766 {
2767 if (s->size != 0 && s != htab->srelplt)
2768 {
2769 if (!reltext_exist)
2770 {
2771 const char *name = s->name + 5;
2772 bfd *ibfd;
2773 for (ibfd = info->input_bfds; ibfd; ibfd = ibfd->link.next)
2774 if (bfd_get_flavour (ibfd) == bfd_target_elf_flavour
2775 && ibfd->flags & DYNAMIC)
2776 {
2777 asection *target = bfd_get_section_by_name (ibfd, name);
2778 if (target != NULL
2779 && elf_section_data (target)->sreloc == s
2780 && ((target->output_section->flags
2781 & (SEC_READONLY | SEC_ALLOC))
2782 == (SEC_READONLY | SEC_ALLOC)))
2783 {
2784 reltext_exist = TRUE;
2785 break;
2786 }
2787 }
2788 }
2789 relocs_exist = TRUE;
2790 }
2791
2792 /* We use the reloc_count field as a counter if we need to
2793 copy relocs into the output file. */
2794 s->reloc_count = 0;
2795 }
2796 else
2797 {
2798 /* It's not one of our sections, so don't allocate space. */
2799 continue;
2800 }
2801
2802 if (s->size == 0)
2803 {
2804 s->flags |= SEC_EXCLUDE;
2805 continue;
2806 }
2807
2808 if ((s->flags & SEC_HAS_CONTENTS) == 0)
2809 continue;
2810
2811 /* Allocate memory for the section contents. */
2812 s->contents = bfd_zalloc (dynobj, s->size);
2813 if (s->contents == NULL)
2814 return FALSE;
2815 }
2816
2817 if (htab->dynamic_sections_created)
2818 {
2819 /* TODO: Check if this is needed. */
2820 if (!bfd_link_pic (info))
2821 if (!_bfd_elf_add_dynamic_entry (info, DT_DEBUG, 0))
2822 return FALSE;
2823
2824 if (htab->splt && (htab->splt->flags & SEC_EXCLUDE) == 0)
2825 if (!_bfd_elf_add_dynamic_entry (info, DT_PLTGOT, 0)
2826 || !_bfd_elf_add_dynamic_entry (info, DT_PLTRELSZ, 0)
2827 || !_bfd_elf_add_dynamic_entry (info, DT_PLTREL, DT_RELA)
2828 || !_bfd_elf_add_dynamic_entry (info, DT_JMPREL, 0))
2829 return FALSE;
2830
2831 if (relocs_exist)
2832 if (!_bfd_elf_add_dynamic_entry (info, DT_RELA, 0)
2833 || !_bfd_elf_add_dynamic_entry (info, DT_RELASZ, 0)
2834 || !_bfd_elf_add_dynamic_entry (info, DT_RELAENT,
2835 sizeof (Elf32_External_Rela)))
2836 return FALSE;
2837
2838 if (reltext_exist)
2839 if (!_bfd_elf_add_dynamic_entry (info, DT_TEXTREL, 0))
2840 return FALSE;
2841 }
2842
2843 return TRUE;
2844 }
2845
2846
2847 /* Classify dynamic relocs such that -z combreloc can reorder and combine
2848 them. */
2849 static enum elf_reloc_type_class
2850 elf32_arc_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
2851 const asection *rel_sec ATTRIBUTE_UNUSED,
2852 const Elf_Internal_Rela *rela)
2853 {
2854 switch ((int) ELF32_R_TYPE (rela->r_info))
2855 {
2856 case R_ARC_RELATIVE:
2857 return reloc_class_relative;
2858 case R_ARC_JMP_SLOT:
2859 return reloc_class_plt;
2860 case R_ARC_COPY:
2861 return reloc_class_copy;
2862 /* TODO: Needed in future to support ifunc. */
2863 /*
2864 case R_ARC_IRELATIVE:
2865 return reloc_class_ifunc;
2866 */
2867 default:
2868 return reloc_class_normal;
2869 }
2870 }
2871
2872 const struct elf_size_info arc_elf32_size_info =
2873 {
2874 sizeof (Elf32_External_Ehdr),
2875 sizeof (Elf32_External_Phdr),
2876 sizeof (Elf32_External_Shdr),
2877 sizeof (Elf32_External_Rel),
2878 sizeof (Elf32_External_Rela),
2879 sizeof (Elf32_External_Sym),
2880 sizeof (Elf32_External_Dyn),
2881 sizeof (Elf_External_Note),
2882 4,
2883 1,
2884 32, 2,
2885 ELFCLASS32, EV_CURRENT,
2886 bfd_elf32_write_out_phdrs,
2887 bfd_elf32_write_shdrs_and_ehdr,
2888 bfd_elf32_checksum_contents,
2889 bfd_elf32_write_relocs,
2890 bfd_elf32_swap_symbol_in,
2891 bfd_elf32_swap_symbol_out,
2892 bfd_elf32_slurp_reloc_table,
2893 bfd_elf32_slurp_symbol_table,
2894 bfd_elf32_swap_dyn_in,
2895 bfd_elf32_swap_dyn_out,
2896 bfd_elf32_swap_reloc_in,
2897 bfd_elf32_swap_reloc_out,
2898 bfd_elf32_swap_reloca_in,
2899 bfd_elf32_swap_reloca_out
2900 };
2901
2902 #define elf_backend_size_info arc_elf32_size_info
2903
2904 /* GDB expects general purpose registers to be in section .reg. However Linux
2905 kernel doesn't create this section and instead writes registers to NOTE
2906 section. It is up to the binutils to create a pseudo-section .reg from the
2907 contents of NOTE. Also BFD will read pid and signal number from NOTE. This
2908 function relies on offsets inside elf_prstatus structure in Linux to be
2909 stable. */
2910
2911 static bfd_boolean
2912 elf32_arc_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
2913 {
2914 int offset;
2915 size_t size;
2916
2917 switch (note->descsz)
2918 {
2919 default:
2920 return FALSE;
2921
2922 case 236: /* sizeof (struct elf_prstatus) on Linux/arc. */
2923 /* pr_cursig */
2924 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
2925 /* pr_pid */
2926 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
2927 /* pr_regs */
2928 offset = 72;
2929 size = (40 * 4); /* There are 40 registers in user_regs_struct. */
2930 break;
2931 }
2932 /* Make a ".reg/999" section. */
2933 return _bfd_elfcore_make_pseudosection (abfd, ".reg", size,
2934 note->descpos + offset);
2935 }
2936
2937 /* Determine whether an object attribute tag takes an integer, a
2938 string or both. */
2939
2940 static int
2941 elf32_arc_obj_attrs_arg_type (int tag)
2942 {
2943 if (tag == Tag_ARC_CPU_name
2944 || tag == Tag_ARC_ISA_config
2945 || tag == Tag_ARC_ISA_apex)
2946 return ATTR_TYPE_FLAG_STR_VAL;
2947 else if (tag < (Tag_ARC_ISA_mpy_option + 1))
2948 return ATTR_TYPE_FLAG_INT_VAL;
2949 else
2950 return (tag & 1) != 0 ? ATTR_TYPE_FLAG_STR_VAL : ATTR_TYPE_FLAG_INT_VAL;
2951 }
2952
2953 /* Attribute numbers >=14 can be safely ignored. */
2954
2955 static bfd_boolean
2956 elf32_arc_obj_attrs_handle_unknown (bfd *abfd, int tag)
2957 {
2958 if ((tag & 127) < (Tag_ARC_ISA_mpy_option + 1))
2959 {
2960 _bfd_error_handler
2961 (_("%pB: unknown mandatory ARC object attribute %d"),
2962 abfd, tag);
2963 bfd_set_error (bfd_error_bad_value);
2964 return FALSE;
2965 }
2966 else
2967 {
2968 _bfd_error_handler
2969 (_("warning: %pB: unknown ARC object attribute %d"),
2970 abfd, tag);
2971 return TRUE;
2972 }
2973 }
2974
2975 /* Handle an ARC specific section when reading an object file. This is
2976 called when bfd_section_from_shdr finds a section with an unknown
2977 type. */
2978
2979 static bfd_boolean
2980 elf32_arc_section_from_shdr (bfd *abfd,
2981 Elf_Internal_Shdr * hdr,
2982 const char *name,
2983 int shindex)
2984 {
2985 switch (hdr->sh_type)
2986 {
2987 case 0x0c: /* MWDT specific section, don't complain about it. */
2988 case SHT_ARC_ATTRIBUTES:
2989 break;
2990
2991 default:
2992 return FALSE;
2993 }
2994
2995 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2996 return FALSE;
2997
2998 return TRUE;
2999 }
3000
3001 /* Relaxation hook.
3002
3003 These are the current relaxing opportunities available:
3004
3005 * R_ARC_GOTPC32 => R_ARC_PCREL.
3006
3007 */
3008
3009 static bfd_boolean
3010 arc_elf_relax_section (bfd *abfd, asection *sec,
3011 struct bfd_link_info *link_info, bfd_boolean *again)
3012 {
3013 Elf_Internal_Shdr *symtab_hdr;
3014 Elf_Internal_Rela *internal_relocs;
3015 Elf_Internal_Rela *irel, *irelend;
3016 bfd_byte *contents = NULL;
3017 Elf_Internal_Sym *isymbuf = NULL;
3018
3019 /* Assume nothing changes. */
3020 *again = FALSE;
3021
3022 /* We don't have to do anything for a relocatable link, if this
3023 section does not have relocs, or if this is not a code
3024 section. */
3025 if (bfd_link_relocatable (link_info)
3026 || (sec->flags & SEC_RELOC) == 0
3027 || sec->reloc_count == 0
3028 || (sec->flags & SEC_CODE) == 0)
3029 return TRUE;
3030
3031 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3032
3033 /* Get a copy of the native relocations. */
3034 internal_relocs = _bfd_elf_link_read_relocs (abfd, sec, NULL, NULL,
3035 link_info->keep_memory);
3036 if (internal_relocs == NULL)
3037 goto error_return;
3038
3039 /* Walk through them looking for relaxing opportunities. */
3040 irelend = internal_relocs + sec->reloc_count;
3041 for (irel = internal_relocs; irel < irelend; irel++)
3042 {
3043 /* If this isn't something that can be relaxed, then ignore
3044 this reloc. */
3045 if (ELF32_R_TYPE (irel->r_info) != (int) R_ARC_GOTPC32)
3046 continue;
3047
3048 /* Get the section contents if we haven't done so already. */
3049 if (contents == NULL)
3050 {
3051 /* Get cached copy if it exists. */
3052 if (elf_section_data (sec)->this_hdr.contents != NULL)
3053 contents = elf_section_data (sec)->this_hdr.contents;
3054 /* Go get them off disk. */
3055 else if (!bfd_malloc_and_get_section (abfd, sec, &contents))
3056 goto error_return;
3057 }
3058
3059 /* Read this BFD's local symbols if we haven't done so already. */
3060 if (isymbuf == NULL && symtab_hdr->sh_info != 0)
3061 {
3062 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3063 if (isymbuf == NULL)
3064 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3065 symtab_hdr->sh_info, 0,
3066 NULL, NULL, NULL);
3067 if (isymbuf == NULL)
3068 goto error_return;
3069 }
3070
3071 struct elf_link_hash_entry *htop = NULL;
3072
3073 if (ELF32_R_SYM (irel->r_info) >= symtab_hdr->sh_info)
3074 {
3075 /* An external symbol. */
3076 unsigned int indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
3077 htop = elf_sym_hashes (abfd)[indx];
3078 }
3079
3080 if (ELF32_R_TYPE (irel->r_info) == (int) R_ARC_GOTPC32
3081 && SYMBOL_REFERENCES_LOCAL (link_info, htop))
3082 {
3083 unsigned int code;
3084
3085 /* Get the opcode. */
3086 code = bfd_get_32_me (abfd, contents + irel->r_offset - 4);
3087
3088 /* Note that we've changed the relocs, section contents, etc. */
3089 elf_section_data (sec)->relocs = internal_relocs;
3090 elf_section_data (sec)->this_hdr.contents = contents;
3091 symtab_hdr->contents = (unsigned char *) isymbuf;
3092
3093 /* Fix the relocation's type. */
3094 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info), R_ARC_PC32);
3095
3096 /* ld rA,[pcl,symbol@tgot] -> add rA,pcl,symbol@pcl. */
3097 /* 0010 0bbb aa11 0ZZX DBBB 1111 10AA AAAA.
3098 111 00 000 0111 xx xxxx*/
3099 code &= ~0x27307F80;
3100 BFD_ASSERT (code <= 62UL);
3101 code |= 0x27007F80;
3102
3103 /* Write back the new instruction. */
3104 bfd_put_32_me (abfd, code, contents + irel->r_offset - 4);
3105
3106 /* The size isn't changed, don't redo. */
3107 *again = FALSE;
3108 }
3109 }
3110
3111 if (isymbuf != NULL
3112 && symtab_hdr->contents != (unsigned char *) isymbuf)
3113 {
3114 if (!link_info->keep_memory)
3115 free (isymbuf);
3116 else
3117 /* Cache the symbols for elf_link_input_bfd. */
3118 symtab_hdr->contents = (unsigned char *) isymbuf;
3119 }
3120
3121 if (contents != NULL
3122 && elf_section_data (sec)->this_hdr.contents != contents)
3123 {
3124 if (!link_info->keep_memory)
3125 free (contents);
3126 else
3127 /* Cache the section contents for elf_link_input_bfd. */
3128 elf_section_data (sec)->this_hdr.contents = contents;
3129 }
3130
3131 if (internal_relocs != NULL
3132 && elf_section_data (sec)->relocs != internal_relocs)
3133 free (internal_relocs);
3134
3135 return TRUE;
3136
3137 error_return:
3138 if (isymbuf != NULL
3139 && symtab_hdr->contents != (unsigned char *) isymbuf)
3140 free (isymbuf);
3141 if (contents != NULL
3142 && elf_section_data (sec)->this_hdr.contents != contents)
3143 free (contents);
3144 if (internal_relocs != NULL
3145 && elf_section_data (sec)->relocs != internal_relocs)
3146 free (internal_relocs);
3147
3148 return FALSE;
3149 }
3150
3151 #define TARGET_LITTLE_SYM arc_elf32_le_vec
3152 #define TARGET_LITTLE_NAME "elf32-littlearc"
3153 #define TARGET_BIG_SYM arc_elf32_be_vec
3154 #define TARGET_BIG_NAME "elf32-bigarc"
3155 #define ELF_ARCH bfd_arch_arc
3156 #define ELF_TARGET_ID ARC_ELF_DATA
3157 #define ELF_MACHINE_CODE EM_ARC_COMPACT
3158 #define ELF_MACHINE_ALT1 EM_ARC_COMPACT2
3159 #define ELF_MAXPAGESIZE 0x2000
3160
3161 #define bfd_elf32_bfd_link_hash_table_create arc_elf_link_hash_table_create
3162
3163 #define bfd_elf32_bfd_merge_private_bfd_data arc_elf_merge_private_bfd_data
3164 #define bfd_elf32_bfd_reloc_type_lookup arc_elf32_bfd_reloc_type_lookup
3165 #define bfd_elf32_bfd_set_private_flags arc_elf_set_private_flags
3166 #define bfd_elf32_bfd_print_private_bfd_data arc_elf_print_private_bfd_data
3167 #define bfd_elf32_bfd_copy_private_bfd_data arc_elf_copy_private_bfd_data
3168 #define bfd_elf32_bfd_relax_section arc_elf_relax_section
3169
3170 #define elf_info_to_howto_rel arc_info_to_howto_rel
3171 #define elf_backend_object_p arc_elf_object_p
3172 #define elf_backend_final_write_processing arc_elf_final_write_processing
3173
3174 #define elf_backend_relocate_section elf_arc_relocate_section
3175 #define elf_backend_check_relocs elf_arc_check_relocs
3176 #define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
3177
3178 #define elf_backend_reloc_type_class elf32_arc_reloc_type_class
3179
3180 #define elf_backend_adjust_dynamic_symbol elf_arc_adjust_dynamic_symbol
3181 #define elf_backend_finish_dynamic_symbol elf_arc_finish_dynamic_symbol
3182
3183 #define elf_backend_finish_dynamic_sections elf_arc_finish_dynamic_sections
3184 #define elf_backend_size_dynamic_sections elf_arc_size_dynamic_sections
3185
3186 #define elf_backend_can_gc_sections 1
3187 #define elf_backend_want_got_plt 1
3188 #define elf_backend_plt_readonly 1
3189 #define elf_backend_rela_plts_and_copies_p 1
3190 #define elf_backend_want_plt_sym 0
3191 #define elf_backend_got_header_size 12
3192 #define elf_backend_dtrel_excludes_plt 1
3193
3194 #define elf_backend_may_use_rel_p 0
3195 #define elf_backend_may_use_rela_p 1
3196 #define elf_backend_default_use_rela_p 1
3197
3198 #define elf_backend_grok_prstatus elf32_arc_grok_prstatus
3199
3200 #define elf_backend_default_execstack 0
3201
3202 #undef elf_backend_obj_attrs_vendor
3203 #define elf_backend_obj_attrs_vendor "ARC"
3204 #undef elf_backend_obj_attrs_section
3205 #define elf_backend_obj_attrs_section ".ARC.attributes"
3206 #undef elf_backend_obj_attrs_arg_type
3207 #define elf_backend_obj_attrs_arg_type elf32_arc_obj_attrs_arg_type
3208 #undef elf_backend_obj_attrs_section_type
3209 #define elf_backend_obj_attrs_section_type SHT_ARC_ATTRIBUTES
3210 #define elf_backend_obj_attrs_handle_unknown elf32_arc_obj_attrs_handle_unknown
3211
3212 #define elf_backend_section_from_shdr elf32_arc_section_from_shdr
3213
3214 #include "elf32-target.h"
This page took 0.095311 seconds and 4 git commands to generate.