ELF: Move dyn_relocs to struct elf_link_hash_entry
[deliverable/binutils-gdb.git] / bfd / elf32-arc.c
1 /* ARC-specific support for 32-bit ELF
2 Copyright (C) 1994-2020 Free Software Foundation, Inc.
3 Contributed by Cupertino Miranda (cmiranda@synopsys.com).
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "libbfd.h"
25 #include "elf-bfd.h"
26 #include "elf/arc.h"
27 #include "libiberty.h"
28 #include "opcode/arc-func.h"
29 #include "opcode/arc.h"
30 #include "arc-plt.h"
31
32 #define FEATURE_LIST_NAME bfd_feature_list
33 #define CONFLICT_LIST bfd_conflict_list
34 #include "opcode/arc-attrs.h"
35
36 /* #define ARC_ENABLE_DEBUG 1 */
37 #ifdef ARC_ENABLE_DEBUG
38 static const char *
39 name_for_global_symbol (struct elf_link_hash_entry *h)
40 {
41 static char *local_str = "(local)";
42 if (h == NULL)
43 return local_str;
44 return h->root.root.string;
45 }
46 #define ARC_DEBUG(fmt, args...) fprintf (stderr, fmt, ##args)
47 #else
48 #define ARC_DEBUG(...)
49 #endif
50
51
52 #define ADD_RELA(BFD, SECTION, OFFSET, SYM_IDX, TYPE, ADDEND) \
53 { \
54 struct elf_link_hash_table *_htab = elf_hash_table (info); \
55 Elf_Internal_Rela _rel; \
56 bfd_byte * _loc; \
57 \
58 if (_htab->dynamic_sections_created == TRUE) \
59 { \
60 BFD_ASSERT (_htab->srel##SECTION &&_htab->srel##SECTION->contents); \
61 _loc = _htab->srel##SECTION->contents \
62 + ((_htab->srel##SECTION->reloc_count) \
63 * sizeof (Elf32_External_Rela)); \
64 _htab->srel##SECTION->reloc_count++; \
65 _rel.r_addend = ADDEND; \
66 _rel.r_offset = (_htab->s##SECTION)->output_section->vma \
67 + (_htab->s##SECTION)->output_offset + OFFSET; \
68 BFD_ASSERT ((long) SYM_IDX != -1); \
69 _rel.r_info = ELF32_R_INFO (SYM_IDX, TYPE); \
70 bfd_elf32_swap_reloca_out (BFD, &_rel, _loc); \
71 } \
72 }
73
74 #define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
75 case VALUE: \
76 return "R_" #TYPE; \
77 break;
78
79 static ATTRIBUTE_UNUSED const char *
80 reloc_type_to_name (unsigned int type)
81 {
82 switch (type)
83 {
84 #include "elf/arc-reloc.def"
85
86 default:
87 return "UNKNOWN";
88 break;
89 }
90 }
91
92 #undef ARC_RELOC_HOWTO
93
94 /* Try to minimize the amount of space occupied by relocation tables
95 on the ROM (not that the ROM won't be swamped by other ELF overhead). */
96
97 #define USE_REL 1
98
99 /* Similar with bfd_get_32 but taking into account the
100 middle-endianess of the ARC CPUs. Only to be used in code
101 sections. */
102
103 static bfd_vma
104 bfd_get_32_me (bfd * abfd,const unsigned char * data)
105 {
106 bfd_vma value = 0;
107
108 if (bfd_big_endian (abfd))
109 value = bfd_get_32 (abfd, data);
110 else
111 {
112 value = ((bfd_get_8 (abfd, data) & 255) << 16);
113 value |= ((bfd_get_8 (abfd, data + 1) & 255) << 24);
114 value |= (bfd_get_8 (abfd, data + 2) & 255);
115 value |= ((bfd_get_8 (abfd, data + 3) & 255) << 8);
116 }
117
118 return value;
119 }
120
121 static void
122 bfd_put_32_me (bfd *abfd, bfd_vma value,unsigned char *data)
123 {
124 bfd_put_16 (abfd, (value & 0xffff0000) >> 16, data);
125 bfd_put_16 (abfd, value & 0xffff, data + 2);
126 }
127
128 static ATTRIBUTE_UNUSED bfd_boolean
129 is_reloc_PC_relative (reloc_howto_type *howto)
130 {
131 return (strstr (howto->name, "PC") != NULL) ? TRUE : FALSE;
132 }
133
134 static bfd_boolean
135 is_reloc_SDA_relative (reloc_howto_type *howto)
136 {
137 return (strstr (howto->name, "SDA") != NULL) ? TRUE : FALSE;
138 }
139
140 static bfd_boolean
141 is_reloc_for_GOT (reloc_howto_type * howto)
142 {
143 if (strstr (howto->name, "TLS") != NULL)
144 return FALSE;
145 return (strstr (howto->name, "GOT") != NULL) ? TRUE : FALSE;
146 }
147
148 static bfd_boolean
149 is_reloc_for_PLT (reloc_howto_type * howto)
150 {
151 return (strstr (howto->name, "PLT") != NULL) ? TRUE : FALSE;
152 }
153
154 static bfd_boolean
155 is_reloc_for_TLS (reloc_howto_type *howto)
156 {
157 return (strstr (howto->name, "TLS") != NULL) ? TRUE : FALSE;
158 }
159
160 struct arc_relocation_data
161 {
162 bfd_signed_vma reloc_offset;
163 bfd_signed_vma reloc_addend;
164 bfd_signed_vma got_offset_value;
165
166 bfd_signed_vma sym_value;
167 asection * sym_section;
168
169 reloc_howto_type *howto;
170
171 asection * input_section;
172
173 bfd_signed_vma sdata_begin_symbol_vma;
174 bfd_boolean sdata_begin_symbol_vma_set;
175 bfd_signed_vma got_symbol_vma;
176
177 bfd_boolean should_relocate;
178
179 const char * symbol_name;
180 };
181
182 /* ARC ELF linker hash entry. */
183 struct elf_arc_link_hash_entry
184 {
185 struct elf_link_hash_entry root;
186
187 struct got_entry *got_ents;
188 };
189
190
191 /* Should be included at this location due to static declarations
192 defined before this point. */
193 #include "arc-got.h"
194
195 #define arc_bfd_get_8(A,B,C) bfd_get_8(A,B)
196 #define arc_bfd_get_16(A,B,C) bfd_get_16(A,B)
197 #define arc_bfd_get_32(A,B,C) bfd_get_32(A,B)
198 #define arc_bfd_put_8(A,B,C,D) bfd_put_8(A,B,C)
199 #define arc_bfd_put_16(A,B,C,D) bfd_put_16(A,B,C)
200 #define arc_bfd_put_32(A,B,C,D) bfd_put_32(A,B,C)
201
202
203 static bfd_reloc_status_type
204 arc_elf_reloc (bfd *abfd ATTRIBUTE_UNUSED,
205 arelent *reloc_entry,
206 asymbol *symbol_in,
207 void *data ATTRIBUTE_UNUSED,
208 asection *input_section,
209 bfd *output_bfd,
210 char ** error_message ATTRIBUTE_UNUSED)
211 {
212 if (output_bfd != NULL)
213 {
214 reloc_entry->address += input_section->output_offset;
215
216 /* In case of relocateable link and if the reloc is against a
217 section symbol, the addend needs to be adjusted according to
218 where the section symbol winds up in the output section. */
219 if ((symbol_in->flags & BSF_SECTION_SYM) && symbol_in->section)
220 reloc_entry->addend += symbol_in->section->output_offset;
221
222 return bfd_reloc_ok;
223 }
224
225 return bfd_reloc_continue;
226 }
227
228
229 #define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
230 TYPE = VALUE,
231
232 enum howto_list
233 {
234 #include "elf/arc-reloc.def"
235 HOWTO_LIST_LAST
236 };
237
238 #undef ARC_RELOC_HOWTO
239
240 #define ARC_RELOC_HOWTO(TYPE, VALUE, RSIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
241 [TYPE] = HOWTO (R_##TYPE, 0, RSIZE, BITSIZE, FALSE, 0, \
242 complain_overflow_##OVERFLOW, arc_elf_reloc, \
243 "R_" #TYPE, FALSE, 0, 0, FALSE),
244
245 static struct reloc_howto_struct elf_arc_howto_table[] =
246 {
247 #include "elf/arc-reloc.def"
248 /* Example of what is generated by the preprocessor. Currently kept as an
249 example.
250 HOWTO (R_ARC_NONE, // Type.
251 0, // Rightshift.
252 2, // Size (0 = byte, 1 = short, 2 = long).
253 32, // Bitsize.
254 FALSE, // PC_relative.
255 0, // Bitpos.
256 complain_overflow_bitfield, // Complain_on_overflow.
257 bfd_elf_generic_reloc, // Special_function.
258 "R_ARC_NONE", // Name.
259 TRUE, // Partial_inplace.
260 0, // Src_mask.
261 0, // Dst_mask.
262 FALSE), // PCrel_offset.
263 */
264 };
265 #undef ARC_RELOC_HOWTO
266
267 static void
268 arc_elf_howto_init (void)
269 {
270 #define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
271 elf_arc_howto_table[TYPE].pc_relative = \
272 (strstr (#FORMULA, " P ") != NULL || strstr (#FORMULA, " PDATA ") != NULL); \
273 elf_arc_howto_table[TYPE].dst_mask = RELOC_FUNCTION(0, ~0); \
274 /* Only 32 bit data relocations should be marked as ME. */ \
275 if (strstr (#FORMULA, " ME ") != NULL) \
276 { \
277 BFD_ASSERT (SIZE == 2); \
278 }
279
280 #include "elf/arc-reloc.def"
281
282 }
283 #undef ARC_RELOC_HOWTO
284
285
286 #define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
287 [TYPE] = VALUE,
288
289 const int howto_table_lookup[] =
290 {
291 #include "elf/arc-reloc.def"
292 };
293
294 #undef ARC_RELOC_HOWTO
295
296 static reloc_howto_type *
297 arc_elf_howto (unsigned int r_type)
298 {
299 if (elf_arc_howto_table[R_ARC_32].dst_mask == 0)
300 arc_elf_howto_init ();
301 return &elf_arc_howto_table[r_type];
302 }
303
304 /* Map BFD reloc types to ARC ELF reloc types. */
305
306 struct arc_reloc_map
307 {
308 bfd_reloc_code_real_type bfd_reloc_val;
309 unsigned char elf_reloc_val;
310 };
311
312 /* ARC ELF linker hash table. */
313 struct elf_arc_link_hash_table
314 {
315 struct elf_link_hash_table elf;
316 };
317
318 static struct bfd_hash_entry *
319 elf_arc_link_hash_newfunc (struct bfd_hash_entry *entry,
320 struct bfd_hash_table *table,
321 const char *string)
322 {
323 struct elf_arc_link_hash_entry * ret =
324 (struct elf_arc_link_hash_entry *) entry;
325
326 /* Allocate the structure if it has not already been allocated by a
327 subclass. */
328 if (ret == NULL)
329 ret = (struct elf_arc_link_hash_entry *)
330 bfd_hash_allocate (table, sizeof (struct elf_arc_link_hash_entry));
331 if (ret == NULL)
332 return (struct bfd_hash_entry *) ret;
333
334 /* Call the allocation method of the superclass. */
335 ret = ((struct elf_arc_link_hash_entry *)
336 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
337 table, string));
338 if (ret != NULL)
339 {
340 ret->got_ents = NULL;
341 }
342
343 return (struct bfd_hash_entry *) ret;
344 }
345
346 /* Destroy an ARC ELF linker hash table. */
347 static void
348 elf_arc_link_hash_table_free (bfd *obfd)
349 {
350 _bfd_elf_link_hash_table_free (obfd);
351 }
352
353 /* Create an ARC ELF linker hash table. */
354
355 static struct bfd_link_hash_table *
356 arc_elf_link_hash_table_create (bfd *abfd)
357 {
358 struct elf_arc_link_hash_table *ret;
359
360 ret = (struct elf_arc_link_hash_table *) bfd_zmalloc (sizeof (*ret));
361 if (ret == NULL)
362 return NULL;
363
364 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
365 elf_arc_link_hash_newfunc,
366 sizeof (struct elf_arc_link_hash_entry),
367 ARC_ELF_DATA))
368 {
369 free (ret);
370 return NULL;
371 }
372
373 ret->elf.root.hash_table_free = elf_arc_link_hash_table_free;
374
375 return &ret->elf.root;
376 }
377
378 #define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
379 { BFD_RELOC_##TYPE, R_##TYPE },
380
381 static const struct arc_reloc_map arc_reloc_map[] =
382 {
383 #include "elf/arc-reloc.def"
384
385 {BFD_RELOC_NONE, R_ARC_NONE},
386 {BFD_RELOC_8, R_ARC_8},
387 {BFD_RELOC_16, R_ARC_16},
388 {BFD_RELOC_24, R_ARC_24},
389 {BFD_RELOC_32, R_ARC_32},
390 };
391
392 #undef ARC_RELOC_HOWTO
393
394 typedef ATTRIBUTE_UNUSED bfd_vma (*replace_func) (unsigned, int ATTRIBUTE_UNUSED);
395
396 #define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
397 case TYPE: \
398 func = (void *) RELOC_FUNCTION; \
399 break;
400
401 static replace_func
402 get_replace_function (bfd *abfd, unsigned int r_type)
403 {
404 void *func = NULL;
405
406 switch (r_type)
407 {
408 #include "elf/arc-reloc.def"
409 }
410
411 if (func == replace_bits24 && bfd_big_endian (abfd))
412 func = replace_bits24_be;
413
414 return (replace_func) func;
415 }
416 #undef ARC_RELOC_HOWTO
417
418 static reloc_howto_type *
419 arc_elf32_bfd_reloc_type_lookup (bfd * abfd ATTRIBUTE_UNUSED,
420 bfd_reloc_code_real_type code)
421 {
422 unsigned int i;
423
424 for (i = ARRAY_SIZE (arc_reloc_map); i--;)
425 {
426 if (arc_reloc_map[i].bfd_reloc_val == code)
427 return arc_elf_howto (arc_reloc_map[i].elf_reloc_val);
428 }
429
430 return NULL;
431 }
432
433 /* Function to set the ELF flag bits. */
434 static bfd_boolean
435 arc_elf_set_private_flags (bfd *abfd, flagword flags)
436 {
437 elf_elfheader (abfd)->e_flags = flags;
438 elf_flags_init (abfd) = TRUE;
439 return TRUE;
440 }
441
442 /* Print private flags. */
443 static bfd_boolean
444 arc_elf_print_private_bfd_data (bfd *abfd, void * ptr)
445 {
446 FILE *file = (FILE *) ptr;
447 flagword flags;
448
449 BFD_ASSERT (abfd != NULL && ptr != NULL);
450
451 /* Print normal ELF private data. */
452 _bfd_elf_print_private_bfd_data (abfd, ptr);
453
454 flags = elf_elfheader (abfd)->e_flags;
455 fprintf (file, _("private flags = 0x%lx:"), (unsigned long) flags);
456
457 switch (flags & EF_ARC_MACH_MSK)
458 {
459 case EF_ARC_CPU_ARCV2HS : fprintf (file, " -mcpu=ARCv2HS"); break;
460 case EF_ARC_CPU_ARCV2EM : fprintf (file, " -mcpu=ARCv2EM"); break;
461 case E_ARC_MACH_ARC600 : fprintf (file, " -mcpu=ARC600"); break;
462 case E_ARC_MACH_ARC601 : fprintf (file, " -mcpu=ARC601"); break;
463 case E_ARC_MACH_ARC700 : fprintf (file, " -mcpu=ARC700"); break;
464 default:
465 fprintf (file, "-mcpu=unknown");
466 break;
467 }
468
469 switch (flags & EF_ARC_OSABI_MSK)
470 {
471 case E_ARC_OSABI_ORIG : fprintf (file, " (ABI:legacy)"); break;
472 case E_ARC_OSABI_V2 : fprintf (file, " (ABI:v2)"); break;
473 case E_ARC_OSABI_V3 : fprintf (file, " (ABI:v3)"); break;
474 case E_ARC_OSABI_V4 : fprintf (file, " (ABI:v4)"); break;
475 default:
476 fprintf (file, " (ABI:unknown)");
477 break;
478 }
479
480 fputc ('\n', file);
481 return TRUE;
482 }
483
484 /* Copy backend specific data from one object module to another. */
485
486 static bfd_boolean
487 arc_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
488 {
489 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
490 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
491 return TRUE;
492
493 BFD_ASSERT (!elf_flags_init (obfd)
494 || elf_elfheader (obfd)->e_flags == elf_elfheader (ibfd)->e_flags);
495
496 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
497 elf_flags_init (obfd) = TRUE;
498
499 /* Copy object attributes. */
500 _bfd_elf_copy_obj_attributes (ibfd, obfd);
501
502 return _bfd_elf_copy_private_bfd_data (ibfd, obfd);
503 }
504
505 static reloc_howto_type *
506 bfd_elf32_bfd_reloc_name_lookup (bfd * abfd ATTRIBUTE_UNUSED,
507 const char *r_name)
508 {
509 unsigned int i;
510
511 for (i = 0; i < ARRAY_SIZE (elf_arc_howto_table); i++)
512 if (elf_arc_howto_table[i].name != NULL
513 && strcasecmp (elf_arc_howto_table[i].name, r_name) == 0)
514 return arc_elf_howto (i);
515
516 return NULL;
517 }
518
519 /* Set the howto pointer for an ARC ELF reloc. */
520
521 static bfd_boolean
522 arc_info_to_howto_rel (bfd * abfd,
523 arelent * cache_ptr,
524 Elf_Internal_Rela * dst)
525 {
526 unsigned int r_type;
527
528 r_type = ELF32_R_TYPE (dst->r_info);
529 if (r_type >= (unsigned int) R_ARC_max)
530 {
531 /* xgettext:c-format */
532 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
533 abfd, r_type);
534 bfd_set_error (bfd_error_bad_value);
535 return FALSE;
536 }
537
538 cache_ptr->howto = arc_elf_howto (r_type);
539 return TRUE;
540 }
541
542 /* Extract CPU features from an NTBS. */
543
544 static unsigned
545 arc_extract_features (const char *p)
546 {
547 unsigned i, r = 0;
548
549 if (!p)
550 return 0;
551
552 for (i = 0; i < ARRAY_SIZE (bfd_feature_list); i++)
553 {
554 char *t = strstr (p, bfd_feature_list[i].attr);
555 unsigned l = strlen (bfd_feature_list[i].attr);
556 if ((t != NULL)
557 && (t[l] == ','
558 || t[l] == '\0'))
559 r |= bfd_feature_list[i].feature;
560 }
561
562 return r;
563 }
564
565 /* Concatenate two strings. s1 can be NULL but not
566 s2. */
567
568 static char *
569 arc_stralloc (char * s1, const char * s2)
570 {
571 char *p;
572
573 /* Only s1 can be null. */
574 BFD_ASSERT (s2);
575
576 p = s1 ? concat (s1, ",", s2, NULL) : (char *)s2;
577
578 return p;
579 }
580
581 /* Merge ARC object attributes from IBFD into OBFD. Raise an error if
582 there are conflicting attributes. */
583
584 static bfd_boolean
585 arc_elf_merge_attributes (bfd *ibfd, struct bfd_link_info *info)
586 {
587 bfd *obfd = info->output_bfd;
588 obj_attribute *in_attr;
589 obj_attribute *out_attr;
590 int i;
591 bfd_boolean result = TRUE;
592 const char *sec_name = get_elf_backend_data (ibfd)->obj_attrs_section;
593 char *tagname = NULL;
594
595 /* Skip the linker stubs file. This preserves previous behavior
596 of accepting unknown attributes in the first input file - but
597 is that a bug? */
598 if (ibfd->flags & BFD_LINKER_CREATED)
599 return TRUE;
600
601 /* Skip any input that hasn't attribute section.
602 This enables to link object files without attribute section with
603 any others. */
604 if (bfd_get_section_by_name (ibfd, sec_name) == NULL)
605 return TRUE;
606
607 if (!elf_known_obj_attributes_proc (obfd)[0].i)
608 {
609 /* This is the first object. Copy the attributes. */
610 _bfd_elf_copy_obj_attributes (ibfd, obfd);
611
612 out_attr = elf_known_obj_attributes_proc (obfd);
613
614 /* Use the Tag_null value to indicate the attributes have been
615 initialized. */
616 out_attr[0].i = 1;
617
618 return TRUE;
619 }
620
621 in_attr = elf_known_obj_attributes_proc (ibfd);
622 out_attr = elf_known_obj_attributes_proc (obfd);
623
624 for (i = LEAST_KNOWN_OBJ_ATTRIBUTE; i < NUM_KNOWN_OBJ_ATTRIBUTES; i++)
625 {
626 /* Merge this attribute with existing attributes. */
627 switch (i)
628 {
629 case Tag_ARC_PCS_config:
630 if (out_attr[i].i == 0)
631 out_attr[i].i = in_attr[i].i;
632 else if (in_attr[i].i != 0 && out_attr[i].i != in_attr[i].i)
633 {
634 const char *tagval[] = { "Absent", "Bare-metal/mwdt",
635 "Bare-metal/newlib", "Linux/uclibc",
636 "Linux/glibc" };
637 BFD_ASSERT (in_attr[i].i < 5);
638 BFD_ASSERT (out_attr[i].i < 5);
639 /* It's sometimes ok to mix different configs, so this is only
640 a warning. */
641 _bfd_error_handler
642 (_("warning: %pB: conflicting platform configuration "
643 "%s with %s"), ibfd,
644 tagval[in_attr[i].i],
645 tagval[out_attr[i].i]);
646 }
647 break;
648
649 case Tag_ARC_CPU_base:
650 if (out_attr[i].i == 0)
651 out_attr[i].i = in_attr[i].i;
652 else if (in_attr[i].i != 0 && out_attr[i].i != in_attr[i].i
653 && ((out_attr[i].i + in_attr[i].i) < 6))
654 {
655 const char *tagval[] = { "Absent", "ARC6xx", "ARC7xx",
656 "ARCEM", "ARCHS" };
657 BFD_ASSERT (in_attr[i].i < 5);
658 BFD_ASSERT (out_attr[i].i < 5);
659 /* We cannot mix code for different CPUs. */
660 _bfd_error_handler
661 (_("error: %pB: unable to merge CPU base attributes "
662 "%s with %s"),
663 obfd,
664 tagval[in_attr[i].i],
665 tagval[out_attr[i].i]);
666 result = FALSE;
667 break;
668 }
669 else
670 {
671 /* The CPUs may be different, check if we can still mix
672 the objects against the output choosen CPU. */
673 unsigned in_feature = 0;
674 unsigned out_feature = 0;
675 char *p1 = in_attr[Tag_ARC_ISA_config].s;
676 char *p2 = out_attr[Tag_ARC_ISA_config].s;
677 unsigned j;
678 unsigned cpu_out;
679 unsigned opcode_map[] = {0, ARC_OPCODE_ARC600, ARC_OPCODE_ARC700,
680 ARC_OPCODE_ARCv2EM, ARC_OPCODE_ARCv2HS};
681
682 BFD_ASSERT (in_attr[i].i < (sizeof (opcode_map)
683 / sizeof (unsigned)));
684 BFD_ASSERT (out_attr[i].i < (sizeof (opcode_map)
685 / sizeof (unsigned)));
686 cpu_out = opcode_map[out_attr[i].i];
687
688 in_feature = arc_extract_features (p1);
689 out_feature = arc_extract_features (p2);
690
691 /* First, check if a feature is compatible with the
692 output object chosen CPU. */
693 for (j = 0; j < ARRAY_SIZE (bfd_feature_list); j++)
694 if (((in_feature | out_feature) & bfd_feature_list[j].feature)
695 && (!(cpu_out & bfd_feature_list[j].cpus)))
696 {
697 _bfd_error_handler
698 (_("error: %pB: unable to merge ISA extension attributes "
699 "%s"),
700 obfd, bfd_feature_list[j].name);
701 result = FALSE;
702 break;
703 }
704 /* Second, if we have compatible features with the
705 chosen CPU, check if they are compatible among
706 them. */
707 for (j = 0; j < ARRAY_SIZE (bfd_conflict_list); j++)
708 if (((in_feature | out_feature) & bfd_conflict_list[j])
709 == bfd_conflict_list[j])
710 {
711 unsigned k;
712 for (k = 0; k < ARRAY_SIZE (bfd_feature_list); k++)
713 {
714 if (in_feature & bfd_feature_list[k].feature
715 & bfd_conflict_list[j])
716 p1 = (char *) bfd_feature_list[k].name;
717 if (out_feature & bfd_feature_list[k].feature
718 & bfd_conflict_list[j])
719 p2 = (char *) bfd_feature_list[k].name;
720 }
721 _bfd_error_handler
722 (_("error: %pB: conflicting ISA extension attributes "
723 "%s with %s"),
724 obfd, p1, p2);
725 result = FALSE;
726 break;
727 }
728 /* Everithing is alright. */
729 out_feature |= in_feature;
730 p1 = NULL;
731 for (j = 0; j < ARRAY_SIZE (bfd_feature_list); j++)
732 if (out_feature & bfd_feature_list[j].feature)
733 p1 = arc_stralloc (p1, bfd_feature_list[j].attr);
734 if (p1)
735 out_attr[Tag_ARC_ISA_config].s =
736 _bfd_elf_attr_strdup (obfd, p1);
737 }
738 /* Fall through. */
739 case Tag_ARC_CPU_variation:
740 case Tag_ARC_ISA_mpy_option:
741 case Tag_ARC_ABI_osver:
742 /* Use the largest value specified. */
743 if (in_attr[i].i > out_attr[i].i)
744 out_attr[i].i = in_attr[i].i;
745 break;
746
747 /* The CPU name is given by the vendor, just choose an
748 existing one if missing or different. There are no fail
749 criteria if they different or both missing. */
750 case Tag_ARC_CPU_name:
751 if (!out_attr[i].s && in_attr[i].s)
752 out_attr[i].s = _bfd_elf_attr_strdup (obfd, in_attr[i].s);
753 break;
754
755 case Tag_ARC_ABI_rf16:
756 if (out_attr[i].i == 0)
757 out_attr[i].i = in_attr[i].i;
758 else if (out_attr[i].i != in_attr[i].i)
759 {
760 /* We cannot mix code with rf16 and without. */
761 _bfd_error_handler
762 (_("error: %pB: cannot mix rf16 with full register set %pB"),
763 obfd, ibfd);
764 result = FALSE;
765 }
766 break;
767
768 case Tag_ARC_ABI_pic:
769 tagname = "PIC";
770 /* fall through */
771 case Tag_ARC_ABI_sda:
772 if (!tagname)
773 tagname = "SDA";
774 /* fall through */
775 case Tag_ARC_ABI_tls:
776 {
777 const char *tagval[] = { "Absent", "MWDT", "GNU" };
778
779 if (!tagname)
780 tagname = "TLS";
781
782 BFD_ASSERT (in_attr[i].i < 3);
783 BFD_ASSERT (out_attr[i].i < 3);
784 if (out_attr[i].i == 0)
785 out_attr[i].i = in_attr[i].i;
786 else if (out_attr[i].i != 0 && in_attr[i].i != 0
787 && out_attr[i].i != in_attr[i].i)
788 {
789 _bfd_error_handler
790 (_("error: %pB: conflicting attributes %s: %s with %s"),
791 obfd, tagname,
792 tagval[in_attr[i].i],
793 tagval[out_attr[i].i]);
794 result = FALSE;
795 }
796 tagname = NULL;
797 break;
798 }
799
800 case Tag_ARC_ABI_double_size:
801 tagname = "Double size";
802 /* fall through */
803 case Tag_ARC_ABI_enumsize:
804 if (!tagname)
805 tagname = "Enum size";
806 /* fall through */
807 case Tag_ARC_ABI_exceptions:
808 if (!tagname)
809 tagname = "ABI exceptions";
810
811 if (out_attr[i].i == 0)
812 out_attr[i].i = in_attr[i].i;
813 else if (out_attr[i].i != 0 && in_attr[i].i != 0
814 && out_attr[i].i != in_attr[i].i)
815 {
816 _bfd_error_handler
817 (_("error: %pB: conflicting attributes %s"),
818 obfd, tagname);
819 result = FALSE;
820 }
821 break;
822
823 case Tag_ARC_ISA_apex:
824 break; /* Do nothing for APEX attributes. */
825
826 case Tag_ARC_ISA_config:
827 /* It is handled in Tag_ARC_CPU_base. */
828 break;
829
830 case Tag_ARC_ATR_version:
831 if (out_attr[i].i == 0)
832 out_attr[i].i = in_attr[i].i;
833 break;
834
835 default:
836 result
837 = result && _bfd_elf_merge_unknown_attribute_low (ibfd, obfd, i);
838 }
839
840 /* If out_attr was copied from in_attr then it won't have a type yet. */
841 if (in_attr[i].type && !out_attr[i].type)
842 out_attr[i].type = in_attr[i].type;
843 }
844
845 /* Merge Tag_compatibility attributes and any common GNU ones. */
846 if (!_bfd_elf_merge_object_attributes (ibfd, info))
847 return FALSE;
848
849 /* Check for any attributes not known on ARC. */
850 result &= _bfd_elf_merge_unknown_attribute_list (ibfd, obfd);
851
852 return result;
853 }
854
855 /* Merge backend specific data from an object file to the output
856 object file when linking. */
857
858 static bfd_boolean
859 arc_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
860 {
861 bfd *obfd = info->output_bfd;
862 unsigned short mach_ibfd;
863 static unsigned short mach_obfd = EM_NONE;
864 flagword out_flags;
865 flagword in_flags;
866 asection *sec;
867
868 /* Check if we have the same endianess. */
869 if (! _bfd_generic_verify_endian_match (ibfd, info))
870 return FALSE;
871
872 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
873 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
874 return TRUE;
875
876 /* Collect ELF flags. */
877 in_flags = elf_elfheader (ibfd)->e_flags & EF_ARC_MACH_MSK;
878 out_flags = elf_elfheader (obfd)->e_flags & EF_ARC_MACH_MSK;
879
880 if (!elf_flags_init (obfd)) /* First call, no flags set. */
881 {
882 elf_flags_init (obfd) = TRUE;
883 out_flags = in_flags;
884 }
885
886 if (!arc_elf_merge_attributes (ibfd, info))
887 return FALSE;
888
889 /* Check to see if the input BFD actually contains any sections. Do
890 not short-circuit dynamic objects; their section list may be
891 emptied by elf_link_add_object_symbols. */
892 if (!(ibfd->flags & DYNAMIC))
893 {
894 bfd_boolean null_input_bfd = TRUE;
895 bfd_boolean only_data_sections = TRUE;
896
897 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
898 {
899 if ((bfd_section_flags (sec)
900 & (SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS))
901 == (SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS))
902 only_data_sections = FALSE;
903
904 null_input_bfd = FALSE;
905 }
906
907 if (null_input_bfd || only_data_sections)
908 return TRUE;
909 }
910
911 /* Complain about various flag/architecture mismatches. */
912 mach_ibfd = elf_elfheader (ibfd)->e_machine;
913 if (mach_obfd == EM_NONE)
914 {
915 mach_obfd = mach_ibfd;
916 }
917 else
918 {
919 if (mach_ibfd != mach_obfd)
920 {
921 /* xgettext:c-format */
922 _bfd_error_handler (_("error: attempting to link %pB "
923 "with a binary %pB of different architecture"),
924 ibfd, obfd);
925 return FALSE;
926 }
927 else if ((in_flags != out_flags)
928 /* If we have object attributes, then we already
929 checked the objects compatibility, skip it. */
930 && !bfd_elf_get_obj_attr_int (ibfd, OBJ_ATTR_PROC,
931 Tag_ARC_CPU_base))
932 {
933 if (in_flags && out_flags)
934 {
935 /* Warn if different flags. */
936 _bfd_error_handler
937 /* xgettext:c-format */
938 (_("%pB: uses different e_flags (%#x) fields than "
939 "previous modules (%#x)"),
940 ibfd, in_flags, out_flags);
941 return FALSE;
942 }
943 /* MWDT doesnt set the eflags hence make sure we choose the
944 eflags set by gcc. */
945 in_flags = in_flags > out_flags ? in_flags : out_flags;
946 }
947 else
948 {
949 /* Everything is correct; don't change the output flags. */
950 in_flags = out_flags;
951 }
952 }
953
954 /* Update the flags. */
955 elf_elfheader (obfd)->e_flags = in_flags;
956
957 if (bfd_get_mach (obfd) < bfd_get_mach (ibfd))
958 {
959 return bfd_set_arch_mach (obfd, bfd_arch_arc, bfd_get_mach (ibfd));
960 }
961
962 return TRUE;
963 }
964
965 /* Return a best guess for the machine number based on the attributes. */
966
967 static unsigned int
968 bfd_arc_get_mach_from_attributes (bfd * abfd)
969 {
970 int arch = bfd_elf_get_obj_attr_int (abfd, OBJ_ATTR_PROC, Tag_ARC_CPU_base);
971 unsigned e_machine = elf_elfheader (abfd)->e_machine;
972
973 switch (arch)
974 {
975 case TAG_CPU_ARC6xx:
976 return bfd_mach_arc_arc600;
977 case TAG_CPU_ARC7xx:
978 return bfd_mach_arc_arc700;
979 case TAG_CPU_ARCEM:
980 case TAG_CPU_ARCHS:
981 return bfd_mach_arc_arcv2;
982 default:
983 break;
984 }
985 return (e_machine == EM_ARC_COMPACT)
986 ? bfd_mach_arc_arc700 : bfd_mach_arc_arcv2;
987 }
988
989 /* Set the right machine number for an ARC ELF file. */
990 static bfd_boolean
991 arc_elf_object_p (bfd * abfd)
992 {
993 /* Make sure this is initialised, or you'll have the potential of passing
994 garbage---or misleading values---into the call to
995 bfd_default_set_arch_mach (). */
996 unsigned int mach = bfd_mach_arc_arc700;
997 unsigned long arch = elf_elfheader (abfd)->e_flags & EF_ARC_MACH_MSK;
998 unsigned e_machine = elf_elfheader (abfd)->e_machine;
999
1000 if (e_machine == EM_ARC_COMPACT || e_machine == EM_ARC_COMPACT2)
1001 {
1002 switch (arch)
1003 {
1004 case E_ARC_MACH_ARC600:
1005 mach = bfd_mach_arc_arc600;
1006 break;
1007 case E_ARC_MACH_ARC601:
1008 mach = bfd_mach_arc_arc601;
1009 break;
1010 case E_ARC_MACH_ARC700:
1011 mach = bfd_mach_arc_arc700;
1012 break;
1013 case EF_ARC_CPU_ARCV2HS:
1014 case EF_ARC_CPU_ARCV2EM:
1015 mach = bfd_mach_arc_arcv2;
1016 break;
1017 default:
1018 mach = bfd_arc_get_mach_from_attributes (abfd);
1019 break;
1020 }
1021 }
1022 else
1023 {
1024 if (e_machine == EM_ARC)
1025 {
1026 _bfd_error_handler
1027 (_("error: the ARC4 architecture is no longer supported"));
1028 return FALSE;
1029 }
1030 else
1031 {
1032 _bfd_error_handler
1033 (_("warning: unset or old architecture flags; "
1034 "use default machine"));
1035 }
1036 }
1037
1038 return bfd_default_set_arch_mach (abfd, bfd_arch_arc, mach);
1039 }
1040
1041 /* The final processing done just before writing out an ARC ELF object file.
1042 This gets the ARC architecture right based on the machine number. */
1043
1044 static bfd_boolean
1045 arc_elf_final_write_processing (bfd *abfd)
1046 {
1047 unsigned long emf;
1048 int osver = bfd_elf_get_obj_attr_int (abfd, OBJ_ATTR_PROC,
1049 Tag_ARC_ABI_osver);
1050 flagword e_flags = elf_elfheader (abfd)->e_flags & ~EF_ARC_OSABI_MSK;
1051
1052 switch (bfd_get_mach (abfd))
1053 {
1054 case bfd_mach_arc_arcv2:
1055 emf = EM_ARC_COMPACT2;
1056 break;
1057 default:
1058 emf = EM_ARC_COMPACT;
1059 break;
1060 }
1061
1062 elf_elfheader (abfd)->e_machine = emf;
1063
1064 /* Record whatever is the current syscall ABI version. */
1065 if (osver)
1066 e_flags |= ((osver & 0x0f) << 8);
1067 else
1068 e_flags |= E_ARC_OSABI_V3;
1069
1070 elf_elfheader (abfd)->e_flags |= e_flags;
1071 return _bfd_elf_final_write_processing (abfd);
1072 }
1073
1074 #ifdef ARC_ENABLE_DEBUG
1075 #define DEBUG_ARC_RELOC(A) debug_arc_reloc (A)
1076
1077 static void
1078 debug_arc_reloc (struct arc_relocation_data reloc_data)
1079 {
1080 ARC_DEBUG ("Reloc type=%s, should_relocate = %s\n",
1081 reloc_data.howto->name,
1082 reloc_data.should_relocate ? "true" : "false");
1083 ARC_DEBUG (" offset = 0x%x, addend = 0x%x\n",
1084 (unsigned int) reloc_data.reloc_offset,
1085 (unsigned int) reloc_data.reloc_addend);
1086 ARC_DEBUG (" Symbol:\n");
1087 ARC_DEBUG (" value = 0x%08x\n",
1088 (unsigned int) reloc_data.sym_value);
1089 if (reloc_data.sym_section != NULL)
1090 {
1091 ARC_DEBUG (" Symbol Section:\n");
1092 ARC_DEBUG (" section name = %s, output_offset 0x%08x",
1093 reloc_data.sym_section->name,
1094 (unsigned int) reloc_data.sym_section->output_offset);
1095 if (reloc_data.sym_section->output_section != NULL)
1096 ARC_DEBUG (", output_section->vma = 0x%08x",
1097 ((unsigned int) reloc_data.sym_section->output_section->vma));
1098 ARC_DEBUG ("\n");
1099 if (reloc_data.sym_section->owner
1100 && reloc_data.sym_section->owner->filename)
1101 ARC_DEBUG (" file: %s\n", reloc_data.sym_section->owner->filename);
1102 }
1103 else
1104 {
1105 ARC_DEBUG (" symbol section is NULL\n");
1106 }
1107
1108 ARC_DEBUG (" Input_section:\n");
1109 if (reloc_data.input_section != NULL)
1110 {
1111 ARC_DEBUG (" section name = %s, output_offset 0x%08x, output_section->vma = 0x%08x\n",
1112 reloc_data.input_section->name,
1113 (unsigned int) reloc_data.input_section->output_offset,
1114 (unsigned int) reloc_data.input_section->output_section->vma);
1115 ARC_DEBUG (" changed_address = 0x%08x\n",
1116 (unsigned int) (reloc_data.input_section->output_section->vma
1117 + reloc_data.input_section->output_offset
1118 + reloc_data.reloc_offset));
1119 ARC_DEBUG (" file: %s\n", reloc_data.input_section->owner->filename);
1120 }
1121 else
1122 {
1123 ARC_DEBUG (" input section is NULL\n");
1124 }
1125 }
1126 #else
1127 #define DEBUG_ARC_RELOC(A)
1128 #endif /* ARC_ENABLE_DEBUG */
1129
1130 static bfd_vma
1131 middle_endian_convert (bfd_vma insn, bfd_boolean do_it)
1132 {
1133 if (do_it)
1134 {
1135 insn
1136 = ((insn & 0xffff0000) >> 16)
1137 | ((insn & 0xffff) << 16);
1138 }
1139 return insn;
1140 }
1141
1142 /* This function is called for relocations that are otherwise marked as NOT
1143 requiring overflow checks. In here we perform non-standard checks of
1144 the relocation value. */
1145
1146 static inline bfd_reloc_status_type
1147 arc_special_overflow_checks (const struct arc_relocation_data reloc_data,
1148 bfd_signed_vma relocation,
1149 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1150 {
1151 switch (reloc_data.howto->type)
1152 {
1153 case R_ARC_NPS_CMEM16:
1154 if (((relocation >> 16) & 0xffff) != NPS_CMEM_HIGH_VALUE)
1155 {
1156 if (reloc_data.reloc_addend == 0)
1157 _bfd_error_handler
1158 /* xgettext:c-format */
1159 (_("%pB(%pA+%#" PRIx64 "): CMEM relocation to `%s' is invalid, "
1160 "16 MSB should be %#x (value is %#" PRIx64 ")"),
1161 reloc_data.input_section->owner,
1162 reloc_data.input_section,
1163 (uint64_t) reloc_data.reloc_offset,
1164 reloc_data.symbol_name,
1165 NPS_CMEM_HIGH_VALUE,
1166 (uint64_t) relocation);
1167 else
1168 _bfd_error_handler
1169 /* xgettext:c-format */
1170 (_("%pB(%pA+%#" PRIx64 "): CMEM relocation to `%s+%#" PRIx64
1171 "' is invalid, 16 MSB should be %#x (value is %#" PRIx64 ")"),
1172 reloc_data.input_section->owner,
1173 reloc_data.input_section,
1174 (uint64_t) reloc_data.reloc_offset,
1175 reloc_data.symbol_name,
1176 (uint64_t) reloc_data.reloc_addend,
1177 NPS_CMEM_HIGH_VALUE,
1178 (uint64_t) relocation);
1179 return bfd_reloc_overflow;
1180 }
1181 break;
1182
1183 default:
1184 break;
1185 }
1186
1187 return bfd_reloc_ok;
1188 }
1189
1190 #define ME(reloc) (reloc)
1191
1192 #define IS_ME(FORMULA,BFD) ((strstr (FORMULA, "ME") != NULL) \
1193 && (!bfd_big_endian (BFD)))
1194
1195 #define S ((bfd_signed_vma) (reloc_data.sym_value \
1196 + (reloc_data.sym_section->output_section != NULL ? \
1197 (reloc_data.sym_section->output_offset \
1198 + reloc_data.sym_section->output_section->vma) : 0)))
1199 #define L ((bfd_signed_vma) (reloc_data.sym_value \
1200 + (reloc_data.sym_section->output_section != NULL ? \
1201 (reloc_data.sym_section->output_offset \
1202 + reloc_data.sym_section->output_section->vma) : 0)))
1203 #define A (reloc_data.reloc_addend)
1204 #define B (0)
1205 #define G (reloc_data.got_offset_value)
1206 #define GOT (reloc_data.got_symbol_vma)
1207 #define GOT_BEGIN (htab->sgot->output_section->vma)
1208
1209 #define MES (0)
1210 /* P: relative offset to PCL The offset should be to the
1211 current location aligned to 32 bits. */
1212 #define P ((bfd_signed_vma) ( \
1213 ( \
1214 (reloc_data.input_section->output_section != NULL ? \
1215 reloc_data.input_section->output_section->vma : 0) \
1216 + reloc_data.input_section->output_offset \
1217 + (reloc_data.reloc_offset - (bitsize >= 32 ? 4 : 0))) \
1218 & ~0x3))
1219 #define PDATA ((bfd_signed_vma) ( \
1220 (reloc_data.input_section->output_section->vma \
1221 + reloc_data.input_section->output_offset \
1222 + (reloc_data.reloc_offset))))
1223 #define SECTSTART (bfd_signed_vma) (reloc_data.sym_section->output_section->vma \
1224 + reloc_data.sym_section->output_offset)
1225 #define FINAL_SECTSTART \
1226 (bfd_signed_vma) (reloc_data.sym_section->output_section->vma)
1227 #define JLI (bfd_signed_vma) (reloc_data.sym_section->output_section->vma)
1228 #define _SDA_BASE_ (bfd_signed_vma) (reloc_data.sdata_begin_symbol_vma)
1229 #define TLS_REL (bfd_signed_vma) \
1230 ((elf_hash_table (info))->tls_sec->output_section->vma)
1231 #define TLS_TBSS (align_power(TCB_SIZE, \
1232 reloc_data.sym_section->alignment_power))
1233
1234 #define none (0)
1235
1236 #ifdef ARC_ENABLE_DEBUG
1237 #define PRINT_DEBUG_RELOC_INFO_BEFORE(FORMULA, TYPE) \
1238 do \
1239 { \
1240 asection *sym_section = reloc_data.sym_section; \
1241 asection *input_section = reloc_data.input_section; \
1242 ARC_DEBUG ("RELOC_TYPE = " TYPE "\n"); \
1243 ARC_DEBUG ("FORMULA = " FORMULA "\n"); \
1244 ARC_DEBUG ("S = %#lx\n", S); \
1245 ARC_DEBUG ("A = %#lx\n", A); \
1246 ARC_DEBUG ("L = %lx\n", L); \
1247 if (sym_section->output_section != NULL) \
1248 ARC_DEBUG ("symbol_section->vma = %#lx\n", \
1249 sym_section->output_section->vma \
1250 + sym_section->output_offset); \
1251 else \
1252 ARC_DEBUG ("symbol_section->vma = NULL\n"); \
1253 if (input_section->output_section != NULL) \
1254 ARC_DEBUG ("input_section->vma = %#lx\n", \
1255 input_section->output_section->vma \
1256 + input_section->output_offset); \
1257 else \
1258 ARC_DEBUG ("input_section->vma = NULL\n"); \
1259 ARC_DEBUG ("PCL = %#lx\n", P); \
1260 ARC_DEBUG ("P = %#lx\n", P); \
1261 ARC_DEBUG ("G = %#lx\n", G); \
1262 ARC_DEBUG ("SDA_OFFSET = %#lx\n", _SDA_BASE_); \
1263 ARC_DEBUG ("SDA_SET = %d\n", reloc_data.sdata_begin_symbol_vma_set); \
1264 ARC_DEBUG ("GOT_OFFSET = %#lx\n", GOT); \
1265 ARC_DEBUG ("relocation = %#08lx\n", relocation); \
1266 ARC_DEBUG ("before = %#08x\n", (unsigned) insn); \
1267 ARC_DEBUG ("data = %08x (%u) (%d)\n", (unsigned) relocation, \
1268 (unsigned) relocation, (int) relocation); \
1269 } \
1270 while (0)
1271
1272 #define PRINT_DEBUG_RELOC_INFO_AFTER \
1273 do \
1274 { \
1275 ARC_DEBUG ("after = 0x%08x\n", (unsigned int) insn); \
1276 } \
1277 while (0)
1278
1279 #else
1280
1281 #define PRINT_DEBUG_RELOC_INFO_BEFORE(...)
1282 #define PRINT_DEBUG_RELOC_INFO_AFTER
1283
1284 #endif /* ARC_ENABLE_DEBUG */
1285
1286 #define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
1287 case R_##TYPE: \
1288 { \
1289 bfd_signed_vma bitsize ATTRIBUTE_UNUSED = BITSIZE; \
1290 relocation = FORMULA ; \
1291 PRINT_DEBUG_RELOC_INFO_BEFORE (#FORMULA, #TYPE); \
1292 insn = middle_endian_convert (insn, IS_ME (#FORMULA, abfd)); \
1293 insn = (* get_replace_function (abfd, TYPE)) (insn, relocation); \
1294 insn = middle_endian_convert (insn, IS_ME (#FORMULA, abfd)); \
1295 PRINT_DEBUG_RELOC_INFO_AFTER; \
1296 } \
1297 break;
1298
1299 static bfd_reloc_status_type
1300 arc_do_relocation (bfd_byte * contents,
1301 struct arc_relocation_data reloc_data,
1302 struct bfd_link_info *info)
1303 {
1304 bfd_signed_vma relocation = 0;
1305 bfd_vma insn;
1306 bfd_vma orig_insn ATTRIBUTE_UNUSED;
1307 bfd * abfd = reloc_data.input_section->owner;
1308 struct elf_link_hash_table *htab ATTRIBUTE_UNUSED = elf_hash_table (info);
1309 bfd_reloc_status_type flag;
1310
1311 if (!reloc_data.should_relocate)
1312 return bfd_reloc_ok;
1313
1314 switch (reloc_data.howto->size)
1315 {
1316 case 2:
1317 insn = arc_bfd_get_32 (abfd,
1318 contents + reloc_data.reloc_offset,
1319 reloc_data.input_section);
1320 break;
1321 case 1:
1322 insn = arc_bfd_get_16 (abfd,
1323 contents + reloc_data.reloc_offset,
1324 reloc_data.input_section);
1325 break;
1326 case 0:
1327 insn = arc_bfd_get_8 (abfd,
1328 contents + reloc_data.reloc_offset,
1329 reloc_data.input_section);
1330 break;
1331 default:
1332 insn = 0;
1333 BFD_ASSERT (0);
1334 break;
1335 }
1336
1337 orig_insn = insn;
1338
1339 switch (reloc_data.howto->type)
1340 {
1341 #include "elf/arc-reloc.def"
1342
1343 default:
1344 BFD_ASSERT (0);
1345 break;
1346 }
1347
1348 /* Check for relocation overflow. */
1349 if (reloc_data.howto->complain_on_overflow != complain_overflow_dont)
1350 flag = bfd_check_overflow (reloc_data.howto->complain_on_overflow,
1351 reloc_data.howto->bitsize,
1352 reloc_data.howto->rightshift,
1353 bfd_arch_bits_per_address (abfd),
1354 relocation);
1355 else
1356 flag = arc_special_overflow_checks (reloc_data, relocation, info);
1357
1358 if (flag != bfd_reloc_ok)
1359 {
1360 ARC_DEBUG ("Relocation overflows !\n");
1361 DEBUG_ARC_RELOC (reloc_data);
1362 ARC_DEBUG ("Relocation value = signed -> %d, unsigned -> %u"
1363 ", hex -> (0x%08x)\n",
1364 (int) relocation, (unsigned) relocation, (int) relocation);
1365
1366 return flag;
1367 }
1368
1369 /* Write updated instruction back to memory. */
1370 switch (reloc_data.howto->size)
1371 {
1372 case 2:
1373 arc_bfd_put_32 (abfd, insn,
1374 contents + reloc_data.reloc_offset,
1375 reloc_data.input_section);
1376 break;
1377 case 1:
1378 arc_bfd_put_16 (abfd, insn,
1379 contents + reloc_data.reloc_offset,
1380 reloc_data.input_section);
1381 break;
1382 case 0:
1383 arc_bfd_put_8 (abfd, insn,
1384 contents + reloc_data.reloc_offset,
1385 reloc_data.input_section);
1386 break;
1387 default:
1388 ARC_DEBUG ("size = %d\n", reloc_data.howto->size);
1389 BFD_ASSERT (0);
1390 break;
1391 }
1392
1393 return bfd_reloc_ok;
1394 }
1395 #undef S
1396 #undef A
1397 #undef B
1398 #undef G
1399 #undef GOT
1400 #undef L
1401 #undef MES
1402 #undef P
1403 #undef SECTSTAR
1404 #undef SECTSTART
1405 #undef JLI
1406 #undef _SDA_BASE_
1407 #undef none
1408
1409 #undef ARC_RELOC_HOWTO
1410
1411
1412 /* Relocate an arc ELF section.
1413 Function : elf_arc_relocate_section
1414 Brief : Relocate an arc section, by handling all the relocations
1415 appearing in that section.
1416 Args : output_bfd : The bfd being written to.
1417 info : Link information.
1418 input_bfd : The input bfd.
1419 input_section : The section being relocated.
1420 contents : contents of the section being relocated.
1421 relocs : List of relocations in the section.
1422 local_syms : is a pointer to the swapped in local symbols.
1423 local_section : is an array giving the section in the input file
1424 corresponding to the st_shndx field of each
1425 local symbol. */
1426 static bfd_boolean
1427 elf_arc_relocate_section (bfd * output_bfd,
1428 struct bfd_link_info * info,
1429 bfd * input_bfd,
1430 asection * input_section,
1431 bfd_byte * contents,
1432 Elf_Internal_Rela * relocs,
1433 Elf_Internal_Sym * local_syms,
1434 asection ** local_sections)
1435 {
1436 Elf_Internal_Shdr * symtab_hdr;
1437 struct elf_link_hash_entry ** sym_hashes;
1438 Elf_Internal_Rela * rel;
1439 Elf_Internal_Rela * wrel;
1440 Elf_Internal_Rela * relend;
1441 struct elf_link_hash_table * htab = elf_hash_table (info);
1442
1443 symtab_hdr = &((elf_tdata (input_bfd))->symtab_hdr);
1444 sym_hashes = elf_sym_hashes (input_bfd);
1445
1446 rel = wrel = relocs;
1447 relend = relocs + input_section->reloc_count;
1448 for (; rel < relend; wrel++, rel++)
1449 {
1450 enum elf_arc_reloc_type r_type;
1451 reloc_howto_type * howto;
1452 unsigned long r_symndx;
1453 struct elf_link_hash_entry * h;
1454 Elf_Internal_Sym * sym;
1455 asection * sec;
1456 struct elf_link_hash_entry * h2;
1457 const char * msg;
1458 bfd_boolean unresolved_reloc = FALSE;
1459
1460 struct arc_relocation_data reloc_data =
1461 {
1462 .reloc_offset = 0,
1463 .reloc_addend = 0,
1464 .got_offset_value = 0,
1465 .sym_value = 0,
1466 .sym_section = NULL,
1467 .howto = NULL,
1468 .input_section = NULL,
1469 .sdata_begin_symbol_vma = 0,
1470 .sdata_begin_symbol_vma_set = FALSE,
1471 .got_symbol_vma = 0,
1472 .should_relocate = FALSE
1473 };
1474
1475 r_type = ELF32_R_TYPE (rel->r_info);
1476
1477 if (r_type >= (int) R_ARC_max)
1478 {
1479 bfd_set_error (bfd_error_bad_value);
1480 return FALSE;
1481 }
1482 howto = arc_elf_howto (r_type);
1483
1484 r_symndx = ELF32_R_SYM (rel->r_info);
1485
1486 /* If we are generating another .o file and the symbol in not
1487 local, skip this relocation. */
1488 if (bfd_link_relocatable (info))
1489 {
1490 /* This is a relocateable link. We don't have to change
1491 anything, unless the reloc is against a section symbol,
1492 in which case we have to adjust according to where the
1493 section symbol winds up in the output section. */
1494
1495 /* Checks if this is a local symbol and thus the reloc
1496 might (will??) be against a section symbol. */
1497 if (r_symndx < symtab_hdr->sh_info)
1498 {
1499 sym = local_syms + r_symndx;
1500 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
1501 {
1502 sec = local_sections[r_symndx];
1503
1504 /* For RELA relocs. Just adjust the addend
1505 value in the relocation entry. */
1506 rel->r_addend += sec->output_offset + sym->st_value;
1507
1508 ARC_DEBUG ("local symbols reloc (section=%d %s) seen in %s\n",
1509 (int) r_symndx, local_sections[r_symndx]->name,
1510 __PRETTY_FUNCTION__);
1511 }
1512 }
1513 }
1514
1515 h2 = elf_link_hash_lookup (elf_hash_table (info), "__SDATA_BEGIN__",
1516 FALSE, FALSE, TRUE);
1517
1518 if (!reloc_data.sdata_begin_symbol_vma_set
1519 && h2 != NULL && h2->root.type != bfd_link_hash_undefined
1520 && h2->root.u.def.section->output_section != NULL)
1521 /* TODO: Verify this condition. */
1522 {
1523 reloc_data.sdata_begin_symbol_vma =
1524 (h2->root.u.def.value
1525 + h2->root.u.def.section->output_section->vma);
1526 reloc_data.sdata_begin_symbol_vma_set = TRUE;
1527 }
1528
1529 reloc_data.input_section = input_section;
1530 reloc_data.howto = howto;
1531 reloc_data.reloc_offset = rel->r_offset;
1532 reloc_data.reloc_addend = rel->r_addend;
1533
1534 /* This is a final link. */
1535 h = NULL;
1536 sym = NULL;
1537 sec = NULL;
1538
1539 if (r_symndx < symtab_hdr->sh_info) /* A local symbol. */
1540 {
1541 sym = local_syms + r_symndx;
1542 sec = local_sections[r_symndx];
1543 }
1544 else
1545 {
1546 bfd_boolean warned, ignored;
1547 bfd_vma relocation ATTRIBUTE_UNUSED;
1548
1549 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1550 r_symndx, symtab_hdr, sym_hashes,
1551 h, sec, relocation,
1552 unresolved_reloc, warned, ignored);
1553
1554 /* TODO: This code is repeated from below. We should
1555 clean it and remove duplications.
1556 Sec is used check for discarded sections.
1557 Need to redesign code below. */
1558
1559 /* Get the symbol's entry in the symtab. */
1560 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1561
1562 while (h->root.type == bfd_link_hash_indirect
1563 || h->root.type == bfd_link_hash_warning)
1564 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1565
1566 /* If we have encountered a definition for this symbol. */
1567 if (h->root.type == bfd_link_hash_defined
1568 || h->root.type == bfd_link_hash_defweak)
1569 {
1570 reloc_data.sym_value = h->root.u.def.value;
1571 sec = h->root.u.def.section;
1572 }
1573 }
1574
1575 /* Clean relocs for symbols in discarded sections. */
1576 if (sec != NULL && discarded_section (sec))
1577 {
1578 _bfd_clear_contents (howto, input_bfd, input_section,
1579 contents, rel->r_offset);
1580 rel->r_info = 0;
1581 rel->r_addend = 0;
1582
1583 /* For ld -r, remove relocations in debug sections against
1584 sections defined in discarded sections. Not done for
1585 eh_frame editing code expects to be present. */
1586 if (bfd_link_relocatable (info)
1587 && (input_section->flags & SEC_DEBUGGING))
1588 wrel--;
1589
1590 continue;
1591 }
1592
1593 if (bfd_link_relocatable (info))
1594 {
1595 if (wrel != rel)
1596 *wrel = *rel;
1597 continue;
1598 }
1599
1600 if (r_symndx < symtab_hdr->sh_info) /* A local symbol. */
1601 {
1602 reloc_data.sym_value = sym->st_value;
1603 reloc_data.sym_section = sec;
1604 reloc_data.symbol_name =
1605 bfd_elf_string_from_elf_section (input_bfd,
1606 symtab_hdr->sh_link,
1607 sym->st_name);
1608
1609 /* Mergeable section handling. */
1610 if ((sec->flags & SEC_MERGE)
1611 && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
1612 {
1613 asection *msec;
1614 msec = sec;
1615 rel->r_addend = _bfd_elf_rel_local_sym (output_bfd, sym,
1616 &msec, rel->r_addend);
1617 rel->r_addend -= (sec->output_section->vma
1618 + sec->output_offset
1619 + sym->st_value);
1620 rel->r_addend += msec->output_section->vma + msec->output_offset;
1621
1622 reloc_data.reloc_addend = rel->r_addend;
1623 }
1624
1625 BFD_ASSERT (htab->sgot != NULL || !is_reloc_for_GOT (howto));
1626 if (htab->sgot != NULL)
1627 reloc_data.got_symbol_vma = htab->sgot->output_section->vma
1628 + htab->sgot->output_offset;
1629
1630 reloc_data.should_relocate = TRUE;
1631 }
1632 else /* Global symbol. */
1633 {
1634 /* FIXME: We should use the RELOC_FOR_GLOBAL_SYMBOL macro
1635 (defined in elf-bfd.h) here. */
1636
1637 /* Get the symbol's entry in the symtab. */
1638 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1639
1640 while (h->root.type == bfd_link_hash_indirect
1641 || h->root.type == bfd_link_hash_warning)
1642 {
1643 struct elf_arc_link_hash_entry *ah_old =
1644 (struct elf_arc_link_hash_entry *) h;
1645 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1646 struct elf_arc_link_hash_entry *ah =
1647 (struct elf_arc_link_hash_entry *) h;
1648
1649 if (ah->got_ents == 0 && ah_old->got_ents != ah->got_ents)
1650 ah->got_ents = ah_old->got_ents;
1651 }
1652
1653 /* TODO: Need to validate what was the intention. */
1654 /* BFD_ASSERT ((h->dynindx == -1) || (h->forced_local != 0)); */
1655 reloc_data.symbol_name = h->root.root.string;
1656
1657 /* If we have encountered a definition for this symbol. */
1658 if (h->root.type == bfd_link_hash_defined
1659 || h->root.type == bfd_link_hash_defweak)
1660 {
1661 reloc_data.sym_value = h->root.u.def.value;
1662 reloc_data.sym_section = h->root.u.def.section;
1663
1664 reloc_data.should_relocate = TRUE;
1665
1666 if (is_reloc_for_GOT (howto) && !bfd_link_pic (info))
1667 {
1668 struct elf_arc_link_hash_entry *ah =
1669 (struct elf_arc_link_hash_entry *) h;
1670 /* TODO: Change it to use arc_do_relocation with
1671 ARC_32 reloc. Try to use ADD_RELA macro. */
1672 bfd_vma relocation =
1673 reloc_data.sym_value + reloc_data.reloc_addend
1674 + (reloc_data.sym_section->output_section != NULL ?
1675 (reloc_data.sym_section->output_offset
1676 + reloc_data.sym_section->output_section->vma)
1677 : 0);
1678
1679 BFD_ASSERT (ah->got_ents);
1680 bfd_vma got_offset = ah->got_ents->offset;
1681 bfd_put_32 (output_bfd, relocation,
1682 htab->sgot->contents + got_offset);
1683 }
1684 if (is_reloc_for_PLT (howto) && h->plt.offset != (bfd_vma) -1)
1685 {
1686 /* TODO: This is repeated up here. */
1687 reloc_data.sym_value = h->plt.offset;
1688 reloc_data.sym_section = htab->splt;
1689 }
1690 }
1691 else if (h->root.type == bfd_link_hash_undefweak)
1692 {
1693 /* Is weak symbol and has no definition. */
1694 if (is_reloc_for_GOT (howto))
1695 {
1696 reloc_data.sym_value = h->root.u.def.value;
1697 reloc_data.sym_section = htab->sgot;
1698 reloc_data.should_relocate = TRUE;
1699 }
1700 else if (is_reloc_for_PLT (howto)
1701 && h->plt.offset != (bfd_vma) -1)
1702 {
1703 /* TODO: This is repeated up here. */
1704 reloc_data.sym_value = h->plt.offset;
1705 reloc_data.sym_section = htab->splt;
1706 reloc_data.should_relocate = TRUE;
1707 }
1708 else
1709 continue;
1710 }
1711 else
1712 {
1713 if (is_reloc_for_GOT (howto))
1714 {
1715 reloc_data.sym_value = h->root.u.def.value;
1716 reloc_data.sym_section = htab->sgot;
1717
1718 reloc_data.should_relocate = TRUE;
1719 }
1720 else if (is_reloc_for_PLT (howto))
1721 {
1722 /* Fail if it is linking for PIE and the symbol is
1723 undefined. */
1724 if (bfd_link_executable (info))
1725 (*info->callbacks->undefined_symbol)
1726 (info, h->root.root.string, input_bfd, input_section,
1727 rel->r_offset, TRUE);
1728 reloc_data.sym_value = h->plt.offset;
1729 reloc_data.sym_section = htab->splt;
1730
1731 reloc_data.should_relocate = TRUE;
1732 }
1733 else if (!bfd_link_pic (info) || bfd_link_executable (info))
1734 (*info->callbacks->undefined_symbol)
1735 (info, h->root.root.string, input_bfd, input_section,
1736 rel->r_offset, TRUE);
1737 }
1738
1739 BFD_ASSERT (htab->sgot != NULL || !is_reloc_for_GOT (howto));
1740 if (htab->sgot != NULL)
1741 reloc_data.got_symbol_vma = htab->sgot->output_section->vma
1742 + htab->sgot->output_offset;
1743 }
1744
1745 if ((is_reloc_for_GOT (howto)
1746 || is_reloc_for_TLS (howto)))
1747 {
1748 reloc_data.should_relocate = TRUE;
1749
1750 struct got_entry **list
1751 = get_got_entry_list_for_symbol (input_bfd, r_symndx, h);
1752
1753 reloc_data.got_offset_value
1754 = relocate_fix_got_relocs_for_got_info (list,
1755 tls_type_for_reloc (howto),
1756 info,
1757 output_bfd,
1758 r_symndx,
1759 local_syms,
1760 local_sections,
1761 h,
1762 &reloc_data);
1763
1764 if (h == NULL)
1765 {
1766 create_got_dynrelocs_for_single_entry (
1767 got_entry_for_type (list,
1768 arc_got_entry_type_for_reloc (howto)),
1769 output_bfd, info, NULL);
1770 }
1771 }
1772
1773
1774 #define IS_ARC_PCREL_TYPE(TYPE) \
1775 ( (TYPE == R_ARC_PC32) \
1776 || (TYPE == R_ARC_32_PCREL))
1777
1778 switch (r_type)
1779 {
1780 case R_ARC_32:
1781 case R_ARC_32_ME:
1782 case R_ARC_PC32:
1783 case R_ARC_32_PCREL:
1784 if (bfd_link_pic (info)
1785 && (!IS_ARC_PCREL_TYPE (r_type)
1786 || (h != NULL
1787 && h->dynindx != -1
1788 && !h->def_regular
1789 && (!info->symbolic || !h->def_regular))))
1790 {
1791 Elf_Internal_Rela outrel;
1792 bfd_byte *loc;
1793 bfd_boolean skip = FALSE;
1794 bfd_boolean relocate = FALSE;
1795 asection *sreloc = _bfd_elf_get_dynamic_reloc_section
1796 (input_bfd, input_section,
1797 /*RELA*/ TRUE);
1798
1799 BFD_ASSERT (sreloc != NULL);
1800
1801 outrel.r_offset = _bfd_elf_section_offset (output_bfd,
1802 info,
1803 input_section,
1804 rel->r_offset);
1805
1806 if (outrel.r_offset == (bfd_vma) -1)
1807 skip = TRUE;
1808
1809 outrel.r_addend = rel->r_addend;
1810 outrel.r_offset += (input_section->output_section->vma
1811 + input_section->output_offset);
1812
1813 if (skip)
1814 {
1815 memset (&outrel, 0, sizeof outrel);
1816 relocate = FALSE;
1817 }
1818 else if (h != NULL
1819 && h->dynindx != -1
1820 && (IS_ARC_PCREL_TYPE (r_type)
1821 || !(bfd_link_executable (info)
1822 || SYMBOLIC_BIND (info, h))
1823 || ! h->def_regular))
1824 {
1825 BFD_ASSERT (h != NULL);
1826 if ((input_section->flags & SEC_ALLOC) != 0)
1827 relocate = FALSE;
1828 else
1829 relocate = TRUE;
1830
1831 BFD_ASSERT (h->dynindx != -1);
1832 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1833 }
1834 else
1835 {
1836 /* Handle local symbols, they either do not have a
1837 global hash table entry (h == NULL), or are
1838 forced local due to a version script
1839 (h->forced_local), or the third condition is
1840 legacy, it appears to say something like, for
1841 links where we are pre-binding the symbols, or
1842 there's not an entry for this symbol in the
1843 dynamic symbol table, and it's a regular symbol
1844 not defined in a shared object, then treat the
1845 symbol as local, resolve it now. */
1846 relocate = TRUE;
1847 /* outrel.r_addend = 0; */
1848 outrel.r_info = ELF32_R_INFO (0, R_ARC_RELATIVE);
1849 }
1850
1851 BFD_ASSERT (sreloc->contents != 0);
1852
1853 loc = sreloc->contents;
1854 loc += sreloc->reloc_count * sizeof (Elf32_External_Rela);
1855 sreloc->reloc_count += 1;
1856
1857 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1858
1859 if (!relocate)
1860 continue;
1861 }
1862 break;
1863 default:
1864 break;
1865 }
1866
1867 if (is_reloc_SDA_relative (howto)
1868 && !reloc_data.sdata_begin_symbol_vma_set)
1869 {
1870 _bfd_error_handler
1871 ("error: linker symbol __SDATA_BEGIN__ not found");
1872 bfd_set_error (bfd_error_bad_value);
1873 return FALSE;
1874 }
1875
1876 DEBUG_ARC_RELOC (reloc_data);
1877
1878 /* Make sure we have with a dynamic linker. In case of GOT and PLT
1879 the sym_section should point to .got or .plt respectively. */
1880 if ((is_reloc_for_GOT (howto) || is_reloc_for_PLT (howto))
1881 && reloc_data.sym_section == NULL)
1882 {
1883 _bfd_error_handler
1884 (_("GOT and PLT relocations cannot be fixed with a non dynamic linker"));
1885 bfd_set_error (bfd_error_bad_value);
1886 return FALSE;
1887 }
1888
1889 msg = NULL;
1890 switch (arc_do_relocation (contents, reloc_data, info))
1891 {
1892 case bfd_reloc_ok:
1893 continue; /* The reloc processing loop. */
1894
1895 case bfd_reloc_overflow:
1896 (*info->callbacks->reloc_overflow)
1897 (info, (h ? &h->root : NULL), reloc_data.symbol_name, howto->name, (bfd_vma) 0,
1898 input_bfd, input_section, rel->r_offset);
1899 break;
1900
1901 case bfd_reloc_undefined:
1902 (*info->callbacks->undefined_symbol)
1903 (info, reloc_data.symbol_name, input_bfd, input_section, rel->r_offset, TRUE);
1904 break;
1905
1906 case bfd_reloc_other:
1907 /* xgettext:c-format */
1908 msg = _("%pB(%pA): warning: unaligned access to symbol '%s' in the small data area");
1909 break;
1910
1911 case bfd_reloc_outofrange:
1912 /* xgettext:c-format */
1913 msg = _("%pB(%pA): internal error: out of range error");
1914 break;
1915
1916 case bfd_reloc_notsupported:
1917 /* xgettext:c-format */
1918 msg = _("%pB(%pA): internal error: unsupported relocation error");
1919 break;
1920
1921 case bfd_reloc_dangerous:
1922 /* xgettext:c-format */
1923 msg = _("%pB(%pA): internal error: dangerous relocation");
1924 break;
1925
1926 default:
1927 /* xgettext:c-format */
1928 msg = _("%pB(%pA): internal error: unknown error");
1929 break;
1930 }
1931
1932 if (msg)
1933 _bfd_error_handler (msg, input_bfd, input_section, reloc_data.symbol_name);
1934 return FALSE;
1935 }
1936
1937 return TRUE;
1938 }
1939
1940 #define elf_arc_hash_table(p) \
1941 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
1942 == ARC_ELF_DATA ? ((struct elf_arc_link_hash_table *) ((p)->hash)) : NULL)
1943
1944 static bfd_boolean
1945 elf_arc_check_relocs (bfd * abfd,
1946 struct bfd_link_info * info,
1947 asection * sec,
1948 const Elf_Internal_Rela * relocs)
1949 {
1950 Elf_Internal_Shdr * symtab_hdr;
1951 struct elf_link_hash_entry ** sym_hashes;
1952 const Elf_Internal_Rela * rel;
1953 const Elf_Internal_Rela * rel_end;
1954 bfd * dynobj;
1955 asection * sreloc = NULL;
1956 struct elf_link_hash_table * htab = elf_hash_table (info);
1957
1958 if (bfd_link_relocatable (info))
1959 return TRUE;
1960
1961 if (htab->dynobj == NULL)
1962 htab->dynobj = abfd;
1963
1964 dynobj = (elf_hash_table (info))->dynobj;
1965 symtab_hdr = &((elf_tdata (abfd))->symtab_hdr);
1966 sym_hashes = elf_sym_hashes (abfd);
1967
1968 rel_end = relocs + sec->reloc_count;
1969 for (rel = relocs; rel < rel_end; rel++)
1970 {
1971 enum elf_arc_reloc_type r_type;
1972 reloc_howto_type *howto;
1973 unsigned long r_symndx;
1974 struct elf_link_hash_entry *h;
1975
1976 r_type = ELF32_R_TYPE (rel->r_info);
1977
1978 if (r_type >= (int) R_ARC_max)
1979 {
1980 bfd_set_error (bfd_error_bad_value);
1981 return FALSE;
1982 }
1983 howto = arc_elf_howto (r_type);
1984
1985 /* Load symbol information. */
1986 r_symndx = ELF32_R_SYM (rel->r_info);
1987 if (r_symndx < symtab_hdr->sh_info) /* Is a local symbol. */
1988 h = NULL;
1989 else /* Global one. */
1990 {
1991 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1992 while (h->root.type == bfd_link_hash_indirect
1993 || h->root.type == bfd_link_hash_warning)
1994 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1995 }
1996
1997
1998 switch (r_type)
1999 {
2000 case R_ARC_32:
2001 case R_ARC_32_ME:
2002 /* During shared library creation, these relocs should not
2003 appear in a shared library (as memory will be read only
2004 and the dynamic linker can not resolve these. However
2005 the error should not occur for e.g. debugging or
2006 non-readonly sections. */
2007 if (h != NULL
2008 && (bfd_link_dll (info) && !bfd_link_pie (info))
2009 && (sec->flags & SEC_ALLOC) != 0
2010 && (sec->flags & SEC_READONLY) != 0
2011 && ((sec->flags & SEC_CODE) != 0
2012 || (sec->flags & SEC_DEBUGGING) != 0))
2013 {
2014 const char *name;
2015 if (h)
2016 name = h->root.root.string;
2017 else
2018 name = "UNKNOWN";
2019 _bfd_error_handler
2020 /* xgettext:c-format */
2021 (_("%pB: relocation %s against `%s' can not be used"
2022 " when making a shared object; recompile with -fPIC"),
2023 abfd,
2024 arc_elf_howto (r_type)->name,
2025 name);
2026 bfd_set_error (bfd_error_bad_value);
2027 return FALSE;
2028 }
2029
2030 /* In some cases we are not setting the 'non_got_ref'
2031 flag, even though the relocations don't require a GOT
2032 access. We should extend the testing in this area to
2033 ensure that no significant cases are being missed. */
2034 if (h)
2035 h->non_got_ref = 1;
2036 /* FALLTHROUGH */
2037 case R_ARC_PC32:
2038 case R_ARC_32_PCREL:
2039 if ((bfd_link_pic (info))
2040 && ((r_type != R_ARC_PC32 && r_type != R_ARC_32_PCREL)
2041 || (h != NULL
2042 && (!info->symbolic || !h->def_regular))))
2043 {
2044 if (sreloc == NULL)
2045 {
2046 if (info->dynamic
2047 && ! htab->dynamic_sections_created
2048 && ! _bfd_elf_link_create_dynamic_sections (abfd, info))
2049 return FALSE;
2050 sreloc = _bfd_elf_make_dynamic_reloc_section (sec, dynobj,
2051 2, abfd,
2052 /*rela*/
2053 TRUE);
2054
2055 if (sreloc == NULL)
2056 return FALSE;
2057 }
2058 sreloc->size += sizeof (Elf32_External_Rela);
2059
2060 }
2061 default:
2062 break;
2063 }
2064
2065 if (is_reloc_for_PLT (howto))
2066 {
2067 if (h == NULL)
2068 continue;
2069 else
2070 if (h->forced_local == 0)
2071 h->needs_plt = 1;
2072 }
2073
2074 /* Add info to the symbol got_entry_list. */
2075 if (is_reloc_for_GOT (howto)
2076 || is_reloc_for_TLS (howto))
2077 {
2078 if (bfd_link_dll (info) && !bfd_link_pie (info)
2079 && (r_type == R_ARC_TLS_LE_32 || r_type == R_ARC_TLS_LE_S9))
2080 {
2081 const char *name;
2082 if (h)
2083 name = h->root.root.string;
2084 else
2085 /* bfd_elf_sym_name (abfd, symtab_hdr, isym, NULL); */
2086 name = "UNKNOWN";
2087 _bfd_error_handler
2088 /* xgettext:c-format */
2089 (_("%pB: relocation %s against `%s' can not be used"
2090 " when making a shared object; recompile with -fPIC"),
2091 abfd,
2092 arc_elf_howto (r_type)->name,
2093 name);
2094 bfd_set_error (bfd_error_bad_value);
2095 return FALSE;
2096 }
2097 if (! _bfd_elf_create_got_section (dynobj, info))
2098 return FALSE;
2099
2100 arc_fill_got_info_for_reloc (
2101 arc_got_entry_type_for_reloc (howto),
2102 get_got_entry_list_for_symbol (abfd, r_symndx, h),
2103 info,
2104 h);
2105 }
2106 }
2107
2108 return TRUE;
2109 }
2110
2111 #define ELF_DYNAMIC_INTERPRETER "/sbin/ld-uClibc.so"
2112
2113 static struct plt_version_t *
2114 arc_get_plt_version (struct bfd_link_info *info)
2115 {
2116 int i;
2117
2118 for (i = 0; i < 1; i++)
2119 {
2120 ARC_DEBUG ("%d: size1 = %d, size2 = %d\n", i,
2121 (int) plt_versions[i].entry_size,
2122 (int) plt_versions[i].elem_size);
2123 }
2124
2125 if (bfd_get_mach (info->output_bfd) == bfd_mach_arc_arcv2)
2126 {
2127 if (bfd_link_pic (info))
2128 return &(plt_versions[ELF_ARCV2_PIC]);
2129 else
2130 return &(plt_versions[ELF_ARCV2_ABS]);
2131 }
2132 else
2133 {
2134 if (bfd_link_pic (info))
2135 return &(plt_versions[ELF_ARC_PIC]);
2136 else
2137 return &(plt_versions[ELF_ARC_ABS]);
2138 }
2139 }
2140
2141 static bfd_vma
2142 add_symbol_to_plt (struct bfd_link_info *info)
2143 {
2144 struct elf_link_hash_table *htab = elf_hash_table (info);
2145 bfd_vma ret;
2146
2147 struct plt_version_t *plt_data = arc_get_plt_version (info);
2148
2149 /* If this is the first .plt entry, make room for the special first
2150 entry. */
2151 if (htab->splt->size == 0)
2152 htab->splt->size += plt_data->entry_size;
2153
2154 ret = htab->splt->size;
2155
2156 htab->splt->size += plt_data->elem_size;
2157 ARC_DEBUG ("PLT_SIZE = %d\n", (int) htab->splt->size);
2158
2159 htab->sgotplt->size += 4;
2160 htab->srelplt->size += sizeof (Elf32_External_Rela);
2161
2162 return ret;
2163 }
2164
2165 #define PLT_DO_RELOCS_FOR_ENTRY(ABFD, DS, RELOCS) \
2166 plt_do_relocs_for_symbol (ABFD, DS, RELOCS, 0, 0)
2167
2168 static void
2169 plt_do_relocs_for_symbol (bfd *abfd,
2170 struct elf_link_hash_table *htab,
2171 const struct plt_reloc *reloc,
2172 bfd_vma plt_offset,
2173 bfd_vma symbol_got_offset)
2174 {
2175 while (SYM_ONLY (reloc->symbol) != LAST_RELOC)
2176 {
2177 bfd_vma relocation = 0;
2178
2179 switch (SYM_ONLY (reloc->symbol))
2180 {
2181 case SGOT:
2182 relocation
2183 = htab->sgotplt->output_section->vma
2184 + htab->sgotplt->output_offset + symbol_got_offset;
2185 break;
2186 }
2187 relocation += reloc->addend;
2188
2189 if (IS_RELATIVE (reloc->symbol))
2190 {
2191 bfd_vma reloc_offset = reloc->offset;
2192 reloc_offset -= (IS_INSN_32 (reloc->symbol)) ? 4 : 0;
2193 reloc_offset -= (IS_INSN_24 (reloc->symbol)) ? 2 : 0;
2194
2195 relocation -= htab->splt->output_section->vma
2196 + htab->splt->output_offset
2197 + plt_offset + reloc_offset;
2198 }
2199
2200 /* TODO: being ME is not a property of the relocation but of the
2201 section of which is applying the relocation. */
2202 if (IS_MIDDLE_ENDIAN (reloc->symbol) && !bfd_big_endian (abfd))
2203 {
2204 relocation
2205 = ((relocation & 0xffff0000) >> 16)
2206 | ((relocation & 0xffff) << 16);
2207 }
2208
2209 switch (reloc->size)
2210 {
2211 case 32:
2212 bfd_put_32 (htab->splt->output_section->owner,
2213 relocation,
2214 htab->splt->contents + plt_offset + reloc->offset);
2215 break;
2216 }
2217
2218 reloc = &(reloc[1]); /* Jump to next relocation. */
2219 }
2220 }
2221
2222 static void
2223 relocate_plt_for_symbol (bfd *output_bfd,
2224 struct bfd_link_info *info,
2225 struct elf_link_hash_entry *h)
2226 {
2227 struct plt_version_t *plt_data = arc_get_plt_version (info);
2228 struct elf_link_hash_table *htab = elf_hash_table (info);
2229
2230 bfd_vma plt_index = (h->plt.offset - plt_data->entry_size)
2231 / plt_data->elem_size;
2232 bfd_vma got_offset = (plt_index + 3) * 4;
2233
2234 ARC_DEBUG ("arc_info: PLT_OFFSET = %#lx, PLT_ENTRY_VMA = %#lx, \
2235 GOT_ENTRY_OFFSET = %#lx, GOT_ENTRY_VMA = %#lx, for symbol %s\n",
2236 (long) h->plt.offset,
2237 (long) (htab->splt->output_section->vma
2238 + htab->splt->output_offset
2239 + h->plt.offset),
2240 (long) got_offset,
2241 (long) (htab->sgotplt->output_section->vma
2242 + htab->sgotplt->output_offset
2243 + got_offset),
2244 h->root.root.string);
2245
2246 {
2247 bfd_vma i = 0;
2248 uint16_t *ptr = (uint16_t *) plt_data->elem;
2249
2250 for (i = 0; i < plt_data->elem_size/2; i++)
2251 {
2252 uint16_t data = ptr[i];
2253 bfd_put_16 (output_bfd,
2254 (bfd_vma) data,
2255 htab->splt->contents + h->plt.offset + (i*2));
2256 }
2257 }
2258
2259 plt_do_relocs_for_symbol (output_bfd, htab,
2260 plt_data->elem_relocs,
2261 h->plt.offset,
2262 got_offset);
2263
2264 /* Fill in the entry in the global offset table. */
2265 bfd_put_32 (output_bfd,
2266 (bfd_vma) (htab->splt->output_section->vma
2267 + htab->splt->output_offset),
2268 htab->sgotplt->contents + got_offset);
2269
2270 /* TODO: Fill in the entry in the .rela.plt section. */
2271 {
2272 Elf_Internal_Rela rel;
2273 bfd_byte *loc;
2274
2275 rel.r_offset = (htab->sgotplt->output_section->vma
2276 + htab->sgotplt->output_offset
2277 + got_offset);
2278 rel.r_addend = 0;
2279
2280 BFD_ASSERT (h->dynindx != -1);
2281 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARC_JMP_SLOT);
2282
2283 loc = htab->srelplt->contents;
2284 loc += plt_index * sizeof (Elf32_External_Rela); /* relA */
2285 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
2286 }
2287 }
2288
2289 static void
2290 relocate_plt_for_entry (bfd *abfd,
2291 struct bfd_link_info *info)
2292 {
2293 struct plt_version_t *plt_data = arc_get_plt_version (info);
2294 struct elf_link_hash_table *htab = elf_hash_table (info);
2295
2296 {
2297 bfd_vma i = 0;
2298 uint16_t *ptr = (uint16_t *) plt_data->entry;
2299 for (i = 0; i < plt_data->entry_size/2; i++)
2300 {
2301 uint16_t data = ptr[i];
2302 bfd_put_16 (abfd,
2303 (bfd_vma) data,
2304 htab->splt->contents + (i*2));
2305 }
2306 }
2307 PLT_DO_RELOCS_FOR_ENTRY (abfd, htab, plt_data->entry_relocs);
2308 }
2309
2310 /* Desc : Adjust a symbol defined by a dynamic object and referenced
2311 by a regular object. The current definition is in some section of
2312 the dynamic object, but we're not including those sections. We
2313 have to change the definition to something the rest of the link can
2314 understand. */
2315
2316 static bfd_boolean
2317 elf_arc_adjust_dynamic_symbol (struct bfd_link_info *info,
2318 struct elf_link_hash_entry *h)
2319 {
2320 asection *s;
2321 bfd *dynobj = (elf_hash_table (info))->dynobj;
2322 struct elf_link_hash_table *htab = elf_hash_table (info);
2323
2324 if (h->type == STT_FUNC
2325 || h->type == STT_GNU_IFUNC
2326 || h->needs_plt == 1)
2327 {
2328 if (!bfd_link_pic (info) && !h->def_dynamic && !h->ref_dynamic)
2329 {
2330 /* This case can occur if we saw a PLT32 reloc in an input
2331 file, but the symbol was never referred to by a dynamic
2332 object. In such a case, we don't actually need to build
2333 a procedure linkage table, and we can just do a PC32
2334 reloc instead. */
2335 BFD_ASSERT (h->needs_plt);
2336 return TRUE;
2337 }
2338
2339 /* Make sure this symbol is output as a dynamic symbol. */
2340 if (h->dynindx == -1 && !h->forced_local
2341 && !bfd_elf_link_record_dynamic_symbol (info, h))
2342 return FALSE;
2343
2344 if (bfd_link_pic (info)
2345 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
2346 {
2347 bfd_vma loc = add_symbol_to_plt (info);
2348
2349 if (bfd_link_executable (info) && !h->def_regular)
2350 {
2351 h->root.u.def.section = htab->splt;
2352 h->root.u.def.value = loc;
2353 }
2354 h->plt.offset = loc;
2355 }
2356 else
2357 {
2358 h->plt.offset = (bfd_vma) -1;
2359 h->needs_plt = 0;
2360 }
2361 return TRUE;
2362 }
2363
2364 /* If this is a weak symbol, and there is a real definition, the
2365 processor independent code will have arranged for us to see the
2366 real definition first, and we can just use the same value. */
2367 if (h->is_weakalias)
2368 {
2369 struct elf_link_hash_entry *def = weakdef (h);
2370 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
2371 h->root.u.def.section = def->root.u.def.section;
2372 h->root.u.def.value = def->root.u.def.value;
2373 return TRUE;
2374 }
2375
2376 /* This is a reference to a symbol defined by a dynamic object which
2377 is not a function. */
2378
2379 /* If we are creating a shared library, we must presume that the
2380 only references to the symbol are via the global offset table.
2381 For such cases we need not do anything here; the relocations will
2382 be handled correctly by relocate_section. */
2383 if (!bfd_link_executable (info))
2384 return TRUE;
2385
2386 /* If there are no non-GOT references, we do not need a copy
2387 relocation. */
2388 if (!h->non_got_ref)
2389 return TRUE;
2390
2391 /* If -z nocopyreloc was given, we won't generate them either. */
2392 if (info->nocopyreloc)
2393 {
2394 h->non_got_ref = 0;
2395 return TRUE;
2396 }
2397
2398 /* We must allocate the symbol in our .dynbss section, which will
2399 become part of the .bss section of the executable. There will be
2400 an entry for this symbol in the .dynsym section. The dynamic
2401 object will contain position independent code, so all references
2402 from the dynamic object to this symbol will go through the global
2403 offset table. The dynamic linker will use the .dynsym entry to
2404 determine the address it must put in the global offset table, so
2405 both the dynamic object and the regular object will refer to the
2406 same memory location for the variable. */
2407
2408 if (htab == NULL)
2409 return FALSE;
2410
2411 /* We must generate a R_ARC_COPY reloc to tell the dynamic linker to
2412 copy the initial value out of the dynamic object and into the
2413 runtime process image. We need to remember the offset into the
2414 .rela.bss section we are going to use. */
2415 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
2416 {
2417 struct elf_arc_link_hash_table *arc_htab = elf_arc_hash_table (info);
2418
2419 BFD_ASSERT (arc_htab->elf.srelbss != NULL);
2420 arc_htab->elf.srelbss->size += sizeof (Elf32_External_Rela);
2421 h->needs_copy = 1;
2422 }
2423
2424 /* TODO: Move this also to arc_hash_table. */
2425 s = bfd_get_section_by_name (dynobj, ".dynbss");
2426 BFD_ASSERT (s != NULL);
2427
2428 return _bfd_elf_adjust_dynamic_copy (info, h, s);
2429 }
2430
2431 /* Function : elf_arc_finish_dynamic_symbol
2432 Brief : Finish up dynamic symbol handling. We set the
2433 contents of various dynamic sections here.
2434 Args : output_bfd :
2435 info :
2436 h :
2437 sym :
2438 Returns : True/False as the return status. */
2439
2440 static bfd_boolean
2441 elf_arc_finish_dynamic_symbol (bfd * output_bfd,
2442 struct bfd_link_info *info,
2443 struct elf_link_hash_entry *h,
2444 Elf_Internal_Sym * sym)
2445 {
2446 if (h->plt.offset != (bfd_vma) -1)
2447 {
2448 relocate_plt_for_symbol (output_bfd, info, h);
2449
2450 if (!h->def_regular)
2451 {
2452 /* Mark the symbol as undefined, rather than as defined in
2453 the .plt section. Leave the value alone. */
2454 sym->st_shndx = SHN_UNDEF;
2455 }
2456 }
2457
2458
2459 /* This function traverses list of GOT entries and
2460 create respective dynamic relocs. */
2461 /* TODO: Make function to get list and not access the list directly. */
2462 /* TODO: Move function to relocate_section create this relocs eagerly. */
2463 struct elf_arc_link_hash_entry *ah =
2464 (struct elf_arc_link_hash_entry *) h;
2465 create_got_dynrelocs_for_got_info (&ah->got_ents,
2466 output_bfd,
2467 info,
2468 h);
2469
2470 if (h->needs_copy)
2471 {
2472 struct elf_arc_link_hash_table *arc_htab = elf_arc_hash_table (info);
2473
2474 if (arc_htab == NULL)
2475 return FALSE;
2476
2477 if (h->dynindx == -1
2478 || (h->root.type != bfd_link_hash_defined
2479 && h->root.type != bfd_link_hash_defweak)
2480 || arc_htab->elf.srelbss == NULL)
2481 abort ();
2482
2483 bfd_vma rel_offset = (h->root.u.def.value
2484 + h->root.u.def.section->output_section->vma
2485 + h->root.u.def.section->output_offset);
2486
2487 bfd_byte * loc = arc_htab->elf.srelbss->contents
2488 + (arc_htab->elf.srelbss->reloc_count * sizeof (Elf32_External_Rela));
2489 arc_htab->elf.srelbss->reloc_count++;
2490
2491 Elf_Internal_Rela rel;
2492 rel.r_addend = 0;
2493 rel.r_offset = rel_offset;
2494
2495 BFD_ASSERT (h->dynindx != -1);
2496 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARC_COPY);
2497
2498 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
2499 }
2500
2501 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
2502 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
2503 || strcmp (h->root.root.string, "__DYNAMIC") == 0
2504 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
2505 sym->st_shndx = SHN_ABS;
2506
2507 return TRUE;
2508 }
2509
2510 #define GET_SYMBOL_OR_SECTION(TAG, SYMBOL, SECTION) \
2511 case TAG: \
2512 if (SYMBOL != NULL) \
2513 h = elf_link_hash_lookup (elf_hash_table (info), \
2514 SYMBOL, FALSE, FALSE, TRUE); \
2515 else if (SECTION != NULL) \
2516 s = bfd_get_linker_section (dynobj, SECTION); \
2517 break;
2518
2519
2520 struct obfd_info_group {
2521 bfd *output_bfd;
2522 struct bfd_link_info *info;
2523 };
2524
2525 static bfd_boolean
2526 arc_create_forced_local_got_entries_for_tls (struct bfd_hash_entry *bh,
2527 void *data)
2528 {
2529 struct elf_arc_link_hash_entry * h =
2530 (struct elf_arc_link_hash_entry *) bh;
2531 struct obfd_info_group *tmp = (struct obfd_info_group *) data;
2532
2533 if (h->got_ents != NULL)
2534 {
2535 BFD_ASSERT (h);
2536
2537 struct got_entry *list = h->got_ents;
2538
2539 while (list != NULL)
2540 {
2541 create_got_dynrelocs_for_single_entry (list, tmp->output_bfd,
2542 tmp->info,
2543 (struct elf_link_hash_entry *) h);
2544 list = list->next;
2545 }
2546 }
2547
2548 return TRUE;
2549 }
2550
2551
2552 /* Function : elf_arc_finish_dynamic_sections
2553 Brief : Finish up the dynamic sections handling.
2554 Args : output_bfd :
2555 info :
2556 h :
2557 sym :
2558 Returns : True/False as the return status. */
2559
2560 static bfd_boolean
2561 elf_arc_finish_dynamic_sections (bfd * output_bfd,
2562 struct bfd_link_info *info)
2563 {
2564 struct elf_link_hash_table *htab = elf_hash_table (info);
2565 bfd *dynobj = (elf_hash_table (info))->dynobj;
2566 asection *sdyn = bfd_get_linker_section (dynobj, ".dynamic");
2567
2568 if (sdyn)
2569 {
2570 Elf32_External_Dyn *dyncon, *dynconend;
2571
2572 dyncon = (Elf32_External_Dyn *) sdyn->contents;
2573 dynconend
2574 = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
2575 for (; dyncon < dynconend; dyncon++)
2576 {
2577 Elf_Internal_Dyn internal_dyn;
2578 bfd_boolean do_it = FALSE;
2579
2580 struct elf_link_hash_entry *h = NULL;
2581 asection *s = NULL;
2582
2583 bfd_elf32_swap_dyn_in (dynobj, dyncon, &internal_dyn);
2584
2585 switch (internal_dyn.d_tag)
2586 {
2587 GET_SYMBOL_OR_SECTION (DT_INIT, info->init_function, NULL)
2588 GET_SYMBOL_OR_SECTION (DT_FINI, info->fini_function, NULL)
2589 GET_SYMBOL_OR_SECTION (DT_PLTGOT, NULL, ".plt")
2590 GET_SYMBOL_OR_SECTION (DT_JMPREL, NULL, ".rela.plt")
2591 GET_SYMBOL_OR_SECTION (DT_PLTRELSZ, NULL, ".rela.plt")
2592 GET_SYMBOL_OR_SECTION (DT_VERSYM, NULL, ".gnu.version")
2593 GET_SYMBOL_OR_SECTION (DT_VERDEF, NULL, ".gnu.version_d")
2594 GET_SYMBOL_OR_SECTION (DT_VERNEED, NULL, ".gnu.version_r")
2595 default:
2596 break;
2597 }
2598
2599 /* In case the dynamic symbols should be updated with a symbol. */
2600 if (h != NULL
2601 && (h->root.type == bfd_link_hash_defined
2602 || h->root.type == bfd_link_hash_defweak))
2603 {
2604 asection *asec_ptr;
2605
2606 internal_dyn.d_un.d_val = h->root.u.def.value;
2607 asec_ptr = h->root.u.def.section;
2608 if (asec_ptr->output_section != NULL)
2609 {
2610 internal_dyn.d_un.d_val +=
2611 (asec_ptr->output_section->vma
2612 + asec_ptr->output_offset);
2613 }
2614 else
2615 {
2616 /* The symbol is imported from another shared
2617 library and does not apply to this one. */
2618 internal_dyn.d_un.d_val = 0;
2619 }
2620 do_it = TRUE;
2621 }
2622 else if (s != NULL) /* With a section information. */
2623 {
2624 switch (internal_dyn.d_tag)
2625 {
2626 case DT_PLTGOT:
2627 case DT_JMPREL:
2628 case DT_VERSYM:
2629 case DT_VERDEF:
2630 case DT_VERNEED:
2631 internal_dyn.d_un.d_ptr = (s->output_section->vma
2632 + s->output_offset);
2633 do_it = TRUE;
2634 break;
2635
2636 case DT_PLTRELSZ:
2637 internal_dyn.d_un.d_val = s->size;
2638 do_it = TRUE;
2639 break;
2640
2641 default:
2642 break;
2643 }
2644 }
2645
2646 if (do_it)
2647 bfd_elf32_swap_dyn_out (output_bfd, &internal_dyn, dyncon);
2648 }
2649
2650 if (htab->splt->size > 0)
2651 {
2652 relocate_plt_for_entry (output_bfd, info);
2653 }
2654
2655 /* TODO: Validate this. */
2656 if (htab->srelplt->output_section != bfd_abs_section_ptr)
2657 elf_section_data (htab->srelplt->output_section)
2658 ->this_hdr.sh_entsize = 12;
2659 }
2660
2661 /* Fill in the first three entries in the global offset table. */
2662 if (htab->sgot)
2663 {
2664 struct elf_link_hash_entry *h;
2665 h = elf_link_hash_lookup (elf_hash_table (info), "_GLOBAL_OFFSET_TABLE_",
2666 FALSE, FALSE, TRUE);
2667
2668 if (h != NULL && h->root.type != bfd_link_hash_undefined
2669 && h->root.u.def.section != NULL)
2670 {
2671 asection *sec = h->root.u.def.section;
2672
2673 if (sdyn == NULL)
2674 bfd_put_32 (output_bfd, (bfd_vma) 0,
2675 sec->contents);
2676 else
2677 bfd_put_32 (output_bfd,
2678 sdyn->output_section->vma + sdyn->output_offset,
2679 sec->contents);
2680 bfd_put_32 (output_bfd, (bfd_vma) 0, sec->contents + 4);
2681 bfd_put_32 (output_bfd, (bfd_vma) 0, sec->contents + 8);
2682 }
2683 }
2684
2685 struct obfd_info_group group;
2686 group.output_bfd = output_bfd;
2687 group.info = info;
2688 bfd_hash_traverse (&info->hash->table,
2689 arc_create_forced_local_got_entries_for_tls, &group);
2690
2691 return TRUE;
2692 }
2693
2694 #define ADD_DYNAMIC_SYMBOL(NAME, TAG) \
2695 h = elf_link_hash_lookup (elf_hash_table (info), \
2696 NAME, FALSE, FALSE, FALSE); \
2697 if ((h != NULL && (h->ref_regular || h->def_regular))) \
2698 if (! _bfd_elf_add_dynamic_entry (info, TAG, 0)) \
2699 return FALSE;
2700
2701 /* Set the sizes of the dynamic sections. */
2702 static bfd_boolean
2703 elf_arc_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2704 struct bfd_link_info *info)
2705 {
2706 bfd *dynobj;
2707 asection *s;
2708 bfd_boolean relocs_exist = FALSE;
2709 bfd_boolean reltext_exist = FALSE;
2710 struct elf_link_hash_table *htab = elf_hash_table (info);
2711
2712 dynobj = htab->dynobj;
2713 BFD_ASSERT (dynobj != NULL);
2714
2715 if (htab->dynamic_sections_created)
2716 {
2717 struct elf_link_hash_entry *h;
2718
2719 /* Set the contents of the .interp section to the
2720 interpreter. */
2721 if (bfd_link_executable (info) && !info->nointerp)
2722 {
2723 s = bfd_get_section_by_name (dynobj, ".interp");
2724 BFD_ASSERT (s != NULL);
2725 s->size = sizeof (ELF_DYNAMIC_INTERPRETER);
2726 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2727 }
2728
2729 /* Add some entries to the .dynamic section. We fill in some of
2730 the values later, in elf_bfd_final_link, but we must add the
2731 entries now so that we know the final size of the .dynamic
2732 section. Checking if the .init section is present. We also
2733 create DT_INIT and DT_FINI entries if the init_str has been
2734 changed by the user. */
2735 ADD_DYNAMIC_SYMBOL (info->init_function, DT_INIT);
2736 ADD_DYNAMIC_SYMBOL (info->fini_function, DT_FINI);
2737 }
2738 else
2739 {
2740 /* We may have created entries in the .rela.got section.
2741 However, if we are not creating the dynamic sections, we will
2742 not actually use these entries. Reset the size of .rela.got,
2743 which will cause it to get stripped from the output file
2744 below. */
2745 if (htab->srelgot != NULL)
2746 htab->srelgot->size = 0;
2747 }
2748
2749 for (s = dynobj->sections; s != NULL; s = s->next)
2750 {
2751 if ((s->flags & SEC_LINKER_CREATED) == 0)
2752 continue;
2753
2754 if (s == htab->splt
2755 || s == htab->sgot
2756 || s == htab->sgotplt
2757 || s == htab->sdynbss)
2758 {
2759 /* Strip this section if we don't need it. */
2760 }
2761 else if (strncmp (s->name, ".rela", 5) == 0)
2762 {
2763 if (s->size != 0 && s != htab->srelplt)
2764 {
2765 if (!reltext_exist)
2766 {
2767 const char *name = s->name + 5;
2768 bfd *ibfd;
2769 for (ibfd = info->input_bfds; ibfd; ibfd = ibfd->link.next)
2770 if (bfd_get_flavour (ibfd) == bfd_target_elf_flavour
2771 && ibfd->flags & DYNAMIC)
2772 {
2773 asection *target = bfd_get_section_by_name (ibfd, name);
2774 if (target != NULL
2775 && elf_section_data (target)->sreloc == s
2776 && ((target->output_section->flags
2777 & (SEC_READONLY | SEC_ALLOC))
2778 == (SEC_READONLY | SEC_ALLOC)))
2779 {
2780 reltext_exist = TRUE;
2781 break;
2782 }
2783 }
2784 }
2785 relocs_exist = TRUE;
2786 }
2787
2788 /* We use the reloc_count field as a counter if we need to
2789 copy relocs into the output file. */
2790 s->reloc_count = 0;
2791 }
2792 else
2793 {
2794 /* It's not one of our sections, so don't allocate space. */
2795 continue;
2796 }
2797
2798 if (s->size == 0)
2799 {
2800 s->flags |= SEC_EXCLUDE;
2801 continue;
2802 }
2803
2804 if ((s->flags & SEC_HAS_CONTENTS) == 0)
2805 continue;
2806
2807 /* Allocate memory for the section contents. */
2808 s->contents = bfd_zalloc (dynobj, s->size);
2809 if (s->contents == NULL)
2810 return FALSE;
2811 }
2812
2813 if (htab->dynamic_sections_created)
2814 {
2815 /* TODO: Check if this is needed. */
2816 if (!bfd_link_pic (info))
2817 if (!_bfd_elf_add_dynamic_entry (info, DT_DEBUG, 0))
2818 return FALSE;
2819
2820 if (htab->splt && (htab->splt->flags & SEC_EXCLUDE) == 0)
2821 if (!_bfd_elf_add_dynamic_entry (info, DT_PLTGOT, 0)
2822 || !_bfd_elf_add_dynamic_entry (info, DT_PLTRELSZ, 0)
2823 || !_bfd_elf_add_dynamic_entry (info, DT_PLTREL, DT_RELA)
2824 || !_bfd_elf_add_dynamic_entry (info, DT_JMPREL, 0))
2825 return FALSE;
2826
2827 if (relocs_exist)
2828 if (!_bfd_elf_add_dynamic_entry (info, DT_RELA, 0)
2829 || !_bfd_elf_add_dynamic_entry (info, DT_RELASZ, 0)
2830 || !_bfd_elf_add_dynamic_entry (info, DT_RELAENT,
2831 sizeof (Elf32_External_Rela)))
2832 return FALSE;
2833
2834 if (reltext_exist)
2835 if (!_bfd_elf_add_dynamic_entry (info, DT_TEXTREL, 0))
2836 return FALSE;
2837 }
2838
2839 return TRUE;
2840 }
2841
2842
2843 /* Classify dynamic relocs such that -z combreloc can reorder and combine
2844 them. */
2845 static enum elf_reloc_type_class
2846 elf32_arc_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
2847 const asection *rel_sec ATTRIBUTE_UNUSED,
2848 const Elf_Internal_Rela *rela)
2849 {
2850 switch ((int) ELF32_R_TYPE (rela->r_info))
2851 {
2852 case R_ARC_RELATIVE:
2853 return reloc_class_relative;
2854 case R_ARC_JMP_SLOT:
2855 return reloc_class_plt;
2856 case R_ARC_COPY:
2857 return reloc_class_copy;
2858 /* TODO: Needed in future to support ifunc. */
2859 /*
2860 case R_ARC_IRELATIVE:
2861 return reloc_class_ifunc;
2862 */
2863 default:
2864 return reloc_class_normal;
2865 }
2866 }
2867
2868 const struct elf_size_info arc_elf32_size_info =
2869 {
2870 sizeof (Elf32_External_Ehdr),
2871 sizeof (Elf32_External_Phdr),
2872 sizeof (Elf32_External_Shdr),
2873 sizeof (Elf32_External_Rel),
2874 sizeof (Elf32_External_Rela),
2875 sizeof (Elf32_External_Sym),
2876 sizeof (Elf32_External_Dyn),
2877 sizeof (Elf_External_Note),
2878 4,
2879 1,
2880 32, 2,
2881 ELFCLASS32, EV_CURRENT,
2882 bfd_elf32_write_out_phdrs,
2883 bfd_elf32_write_shdrs_and_ehdr,
2884 bfd_elf32_checksum_contents,
2885 bfd_elf32_write_relocs,
2886 bfd_elf32_swap_symbol_in,
2887 bfd_elf32_swap_symbol_out,
2888 bfd_elf32_slurp_reloc_table,
2889 bfd_elf32_slurp_symbol_table,
2890 bfd_elf32_swap_dyn_in,
2891 bfd_elf32_swap_dyn_out,
2892 bfd_elf32_swap_reloc_in,
2893 bfd_elf32_swap_reloc_out,
2894 bfd_elf32_swap_reloca_in,
2895 bfd_elf32_swap_reloca_out
2896 };
2897
2898 #define elf_backend_size_info arc_elf32_size_info
2899
2900 /* GDB expects general purpose registers to be in section .reg. However Linux
2901 kernel doesn't create this section and instead writes registers to NOTE
2902 section. It is up to the binutils to create a pseudo-section .reg from the
2903 contents of NOTE. Also BFD will read pid and signal number from NOTE. This
2904 function relies on offsets inside elf_prstatus structure in Linux to be
2905 stable. */
2906
2907 static bfd_boolean
2908 elf32_arc_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
2909 {
2910 int offset;
2911 size_t size;
2912
2913 switch (note->descsz)
2914 {
2915 default:
2916 return FALSE;
2917
2918 case 236: /* sizeof (struct elf_prstatus) on Linux/arc. */
2919 /* pr_cursig */
2920 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
2921 /* pr_pid */
2922 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
2923 /* pr_regs */
2924 offset = 72;
2925 size = (40 * 4); /* There are 40 registers in user_regs_struct. */
2926 break;
2927 }
2928 /* Make a ".reg/999" section. */
2929 return _bfd_elfcore_make_pseudosection (abfd, ".reg", size,
2930 note->descpos + offset);
2931 }
2932
2933 /* Determine whether an object attribute tag takes an integer, a
2934 string or both. */
2935
2936 static int
2937 elf32_arc_obj_attrs_arg_type (int tag)
2938 {
2939 if (tag == Tag_ARC_CPU_name
2940 || tag == Tag_ARC_ISA_config
2941 || tag == Tag_ARC_ISA_apex)
2942 return ATTR_TYPE_FLAG_STR_VAL;
2943 else if (tag < (Tag_ARC_ISA_mpy_option + 1))
2944 return ATTR_TYPE_FLAG_INT_VAL;
2945 else
2946 return (tag & 1) != 0 ? ATTR_TYPE_FLAG_STR_VAL : ATTR_TYPE_FLAG_INT_VAL;
2947 }
2948
2949 /* Attribute numbers >=14 can be safely ignored. */
2950
2951 static bfd_boolean
2952 elf32_arc_obj_attrs_handle_unknown (bfd *abfd, int tag)
2953 {
2954 if ((tag & 127) < (Tag_ARC_ISA_mpy_option + 1))
2955 {
2956 _bfd_error_handler
2957 (_("%pB: unknown mandatory ARC object attribute %d"),
2958 abfd, tag);
2959 bfd_set_error (bfd_error_bad_value);
2960 return FALSE;
2961 }
2962 else
2963 {
2964 _bfd_error_handler
2965 (_("warning: %pB: unknown ARC object attribute %d"),
2966 abfd, tag);
2967 return TRUE;
2968 }
2969 }
2970
2971 /* Handle an ARC specific section when reading an object file. This is
2972 called when bfd_section_from_shdr finds a section with an unknown
2973 type. */
2974
2975 static bfd_boolean
2976 elf32_arc_section_from_shdr (bfd *abfd,
2977 Elf_Internal_Shdr * hdr,
2978 const char *name,
2979 int shindex)
2980 {
2981 switch (hdr->sh_type)
2982 {
2983 case 0x0c: /* MWDT specific section, don't complain about it. */
2984 case SHT_ARC_ATTRIBUTES:
2985 break;
2986
2987 default:
2988 return FALSE;
2989 }
2990
2991 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2992 return FALSE;
2993
2994 return TRUE;
2995 }
2996
2997 /* Relaxation hook.
2998
2999 These are the current relaxing opportunities available:
3000
3001 * R_ARC_GOTPC32 => R_ARC_PCREL.
3002
3003 */
3004
3005 static bfd_boolean
3006 arc_elf_relax_section (bfd *abfd, asection *sec,
3007 struct bfd_link_info *link_info, bfd_boolean *again)
3008 {
3009 Elf_Internal_Shdr *symtab_hdr;
3010 Elf_Internal_Rela *internal_relocs;
3011 Elf_Internal_Rela *irel, *irelend;
3012 bfd_byte *contents = NULL;
3013 Elf_Internal_Sym *isymbuf = NULL;
3014
3015 /* Assume nothing changes. */
3016 *again = FALSE;
3017
3018 /* We don't have to do anything for a relocatable link, if this
3019 section does not have relocs, or if this is not a code
3020 section. */
3021 if (bfd_link_relocatable (link_info)
3022 || (sec->flags & SEC_RELOC) == 0
3023 || sec->reloc_count == 0
3024 || (sec->flags & SEC_CODE) == 0)
3025 return TRUE;
3026
3027 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3028
3029 /* Get a copy of the native relocations. */
3030 internal_relocs = _bfd_elf_link_read_relocs (abfd, sec, NULL, NULL,
3031 link_info->keep_memory);
3032 if (internal_relocs == NULL)
3033 goto error_return;
3034
3035 /* Walk through them looking for relaxing opportunities. */
3036 irelend = internal_relocs + sec->reloc_count;
3037 for (irel = internal_relocs; irel < irelend; irel++)
3038 {
3039 /* If this isn't something that can be relaxed, then ignore
3040 this reloc. */
3041 if (ELF32_R_TYPE (irel->r_info) != (int) R_ARC_GOTPC32)
3042 continue;
3043
3044 /* Get the section contents if we haven't done so already. */
3045 if (contents == NULL)
3046 {
3047 /* Get cached copy if it exists. */
3048 if (elf_section_data (sec)->this_hdr.contents != NULL)
3049 contents = elf_section_data (sec)->this_hdr.contents;
3050 /* Go get them off disk. */
3051 else if (!bfd_malloc_and_get_section (abfd, sec, &contents))
3052 goto error_return;
3053 }
3054
3055 /* Read this BFD's local symbols if we haven't done so already. */
3056 if (isymbuf == NULL && symtab_hdr->sh_info != 0)
3057 {
3058 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3059 if (isymbuf == NULL)
3060 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3061 symtab_hdr->sh_info, 0,
3062 NULL, NULL, NULL);
3063 if (isymbuf == NULL)
3064 goto error_return;
3065 }
3066
3067 struct elf_link_hash_entry *htop = NULL;
3068
3069 if (ELF32_R_SYM (irel->r_info) >= symtab_hdr->sh_info)
3070 {
3071 /* An external symbol. */
3072 unsigned int indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
3073 htop = elf_sym_hashes (abfd)[indx];
3074 }
3075
3076 if (ELF32_R_TYPE (irel->r_info) == (int) R_ARC_GOTPC32
3077 && SYMBOL_REFERENCES_LOCAL (link_info, htop))
3078 {
3079 unsigned int code;
3080
3081 /* Get the opcode. */
3082 code = bfd_get_32_me (abfd, contents + irel->r_offset - 4);
3083
3084 /* Note that we've changed the relocs, section contents, etc. */
3085 elf_section_data (sec)->relocs = internal_relocs;
3086 elf_section_data (sec)->this_hdr.contents = contents;
3087 symtab_hdr->contents = (unsigned char *) isymbuf;
3088
3089 /* Fix the relocation's type. */
3090 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info), R_ARC_PC32);
3091
3092 /* ld rA,[pcl,symbol@tgot] -> add rA,pcl,symbol@pcl. */
3093 /* 0010 0bbb aa11 0ZZX DBBB 1111 10AA AAAA.
3094 111 00 000 0111 xx xxxx*/
3095 code &= ~0x27307F80;
3096 BFD_ASSERT (code <= 62UL);
3097 code |= 0x27007F80;
3098
3099 /* Write back the new instruction. */
3100 bfd_put_32_me (abfd, code, contents + irel->r_offset - 4);
3101
3102 /* The size isn't changed, don't redo. */
3103 *again = FALSE;
3104 }
3105 }
3106
3107 if (isymbuf != NULL
3108 && symtab_hdr->contents != (unsigned char *) isymbuf)
3109 {
3110 if (!link_info->keep_memory)
3111 free (isymbuf);
3112 else
3113 /* Cache the symbols for elf_link_input_bfd. */
3114 symtab_hdr->contents = (unsigned char *) isymbuf;
3115 }
3116
3117 if (contents != NULL
3118 && elf_section_data (sec)->this_hdr.contents != contents)
3119 {
3120 if (!link_info->keep_memory)
3121 free (contents);
3122 else
3123 /* Cache the section contents for elf_link_input_bfd. */
3124 elf_section_data (sec)->this_hdr.contents = contents;
3125 }
3126
3127 if (elf_section_data (sec)->relocs != internal_relocs)
3128 free (internal_relocs);
3129
3130 return TRUE;
3131
3132 error_return:
3133 if (symtab_hdr->contents != (unsigned char *) isymbuf)
3134 free (isymbuf);
3135 if (elf_section_data (sec)->this_hdr.contents != contents)
3136 free (contents);
3137 if (elf_section_data (sec)->relocs != internal_relocs)
3138 free (internal_relocs);
3139
3140 return FALSE;
3141 }
3142
3143 #define TARGET_LITTLE_SYM arc_elf32_le_vec
3144 #define TARGET_LITTLE_NAME "elf32-littlearc"
3145 #define TARGET_BIG_SYM arc_elf32_be_vec
3146 #define TARGET_BIG_NAME "elf32-bigarc"
3147 #define ELF_ARCH bfd_arch_arc
3148 #define ELF_TARGET_ID ARC_ELF_DATA
3149 #define ELF_MACHINE_CODE EM_ARC_COMPACT
3150 #define ELF_MACHINE_ALT1 EM_ARC_COMPACT2
3151 #define ELF_MAXPAGESIZE 0x2000
3152
3153 #define bfd_elf32_bfd_link_hash_table_create arc_elf_link_hash_table_create
3154
3155 #define bfd_elf32_bfd_merge_private_bfd_data arc_elf_merge_private_bfd_data
3156 #define bfd_elf32_bfd_reloc_type_lookup arc_elf32_bfd_reloc_type_lookup
3157 #define bfd_elf32_bfd_set_private_flags arc_elf_set_private_flags
3158 #define bfd_elf32_bfd_print_private_bfd_data arc_elf_print_private_bfd_data
3159 #define bfd_elf32_bfd_copy_private_bfd_data arc_elf_copy_private_bfd_data
3160 #define bfd_elf32_bfd_relax_section arc_elf_relax_section
3161
3162 #define elf_info_to_howto_rel arc_info_to_howto_rel
3163 #define elf_backend_object_p arc_elf_object_p
3164 #define elf_backend_final_write_processing arc_elf_final_write_processing
3165
3166 #define elf_backend_relocate_section elf_arc_relocate_section
3167 #define elf_backend_check_relocs elf_arc_check_relocs
3168 #define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
3169
3170 #define elf_backend_reloc_type_class elf32_arc_reloc_type_class
3171
3172 #define elf_backend_adjust_dynamic_symbol elf_arc_adjust_dynamic_symbol
3173 #define elf_backend_finish_dynamic_symbol elf_arc_finish_dynamic_symbol
3174
3175 #define elf_backend_finish_dynamic_sections elf_arc_finish_dynamic_sections
3176 #define elf_backend_size_dynamic_sections elf_arc_size_dynamic_sections
3177
3178 #define elf_backend_can_gc_sections 1
3179 #define elf_backend_want_got_plt 1
3180 #define elf_backend_plt_readonly 1
3181 #define elf_backend_rela_plts_and_copies_p 1
3182 #define elf_backend_want_plt_sym 0
3183 #define elf_backend_got_header_size 12
3184 #define elf_backend_dtrel_excludes_plt 1
3185
3186 #define elf_backend_may_use_rel_p 0
3187 #define elf_backend_may_use_rela_p 1
3188 #define elf_backend_default_use_rela_p 1
3189
3190 #define elf_backend_grok_prstatus elf32_arc_grok_prstatus
3191
3192 #define elf_backend_default_execstack 0
3193
3194 #undef elf_backend_obj_attrs_vendor
3195 #define elf_backend_obj_attrs_vendor "ARC"
3196 #undef elf_backend_obj_attrs_section
3197 #define elf_backend_obj_attrs_section ".ARC.attributes"
3198 #undef elf_backend_obj_attrs_arg_type
3199 #define elf_backend_obj_attrs_arg_type elf32_arc_obj_attrs_arg_type
3200 #undef elf_backend_obj_attrs_section_type
3201 #define elf_backend_obj_attrs_section_type SHT_ARC_ATTRIBUTES
3202 #define elf_backend_obj_attrs_handle_unknown elf32_arc_obj_attrs_handle_unknown
3203
3204 #define elf_backend_section_from_shdr elf32_arc_section_from_shdr
3205
3206 #include "elf32-target.h"
This page took 0.094563 seconds and 4 git commands to generate.