* elfxx-mips.c (mips_elf_create_dynamic_relocation): Return early
[deliverable/binutils-gdb.git] / bfd / elf32-arm.c
CommitLineData
252b5132 1/* 32-bit ELF support for ARM
d1f161ea
NC
2 Copyright 1998, 1999, 2000, 2001, 2002, 2003, 2004
3 Free Software Foundation, Inc.
252b5132
RH
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
20
7f266840
DJ
21#include "elf/arm.h"
22#include "bfd.h"
23#include "sysdep.h"
24#include "libbfd.h"
25#include "elf-bfd.h"
26
27#ifndef NUM_ELEM
28#define NUM_ELEM(a) (sizeof (a) / (sizeof (a)[0]))
29#endif
30
31#define USE_REL 1
32
33#define elf_info_to_howto 0
34#define elf_info_to_howto_rel elf32_arm_info_to_howto
35
36#define ARM_ELF_ABI_VERSION 0
37#define ARM_ELF_OS_ABI_VERSION ELFOSABI_ARM
38
39static reloc_howto_type * elf32_arm_reloc_type_lookup
40 PARAMS ((bfd * abfd, bfd_reloc_code_real_type code));
41static bfd_boolean elf32_arm_nabi_grok_prstatus
42 PARAMS ((bfd *abfd, Elf_Internal_Note *note));
43static bfd_boolean elf32_arm_nabi_grok_psinfo
44 PARAMS ((bfd *abfd, Elf_Internal_Note *note));
45
46/* Note: code such as elf32_arm_reloc_type_lookup expect to use e.g.
47 R_ARM_PC24 as an index into this, and find the R_ARM_PC24 HOWTO
48 in that slot. */
49
50static reloc_howto_type elf32_arm_howto_table[] =
51{
52 /* No relocation */
53 HOWTO (R_ARM_NONE, /* type */
54 0, /* rightshift */
55 0, /* size (0 = byte, 1 = short, 2 = long) */
56 0, /* bitsize */
57 FALSE, /* pc_relative */
58 0, /* bitpos */
59 complain_overflow_dont,/* complain_on_overflow */
60 bfd_elf_generic_reloc, /* special_function */
61 "R_ARM_NONE", /* name */
62 FALSE, /* partial_inplace */
63 0, /* src_mask */
64 0, /* dst_mask */
65 FALSE), /* pcrel_offset */
66
67 HOWTO (R_ARM_PC24, /* type */
68 2, /* rightshift */
69 2, /* size (0 = byte, 1 = short, 2 = long) */
70 24, /* bitsize */
71 TRUE, /* pc_relative */
72 0, /* bitpos */
73 complain_overflow_signed,/* complain_on_overflow */
74 bfd_elf_generic_reloc, /* special_function */
75 "R_ARM_PC24", /* name */
76 FALSE, /* partial_inplace */
77 0x00ffffff, /* src_mask */
78 0x00ffffff, /* dst_mask */
79 TRUE), /* pcrel_offset */
80
81 /* 32 bit absolute */
82 HOWTO (R_ARM_ABS32, /* type */
83 0, /* rightshift */
84 2, /* size (0 = byte, 1 = short, 2 = long) */
85 32, /* bitsize */
86 FALSE, /* pc_relative */
87 0, /* bitpos */
88 complain_overflow_bitfield,/* complain_on_overflow */
89 bfd_elf_generic_reloc, /* special_function */
90 "R_ARM_ABS32", /* name */
91 FALSE, /* partial_inplace */
92 0xffffffff, /* src_mask */
93 0xffffffff, /* dst_mask */
94 FALSE), /* pcrel_offset */
95
96 /* standard 32bit pc-relative reloc */
97 HOWTO (R_ARM_REL32, /* type */
98 0, /* rightshift */
99 2, /* size (0 = byte, 1 = short, 2 = long) */
100 32, /* bitsize */
101 TRUE, /* pc_relative */
102 0, /* bitpos */
103 complain_overflow_bitfield,/* complain_on_overflow */
104 bfd_elf_generic_reloc, /* special_function */
105 "R_ARM_REL32", /* name */
106 FALSE, /* partial_inplace */
107 0xffffffff, /* src_mask */
108 0xffffffff, /* dst_mask */
109 TRUE), /* pcrel_offset */
110
111 /* 8 bit absolute */
112 HOWTO (R_ARM_PC13, /* type */
113 0, /* rightshift */
114 0, /* size (0 = byte, 1 = short, 2 = long) */
115 8, /* bitsize */
116 FALSE, /* pc_relative */
117 0, /* bitpos */
118 complain_overflow_bitfield,/* complain_on_overflow */
119 bfd_elf_generic_reloc, /* special_function */
120 "R_ARM_PC13", /* name */
121 FALSE, /* partial_inplace */
122 0x000000ff, /* src_mask */
123 0x000000ff, /* dst_mask */
124 FALSE), /* pcrel_offset */
125
126 /* 16 bit absolute */
127 HOWTO (R_ARM_ABS16, /* type */
128 0, /* rightshift */
129 1, /* size (0 = byte, 1 = short, 2 = long) */
130 16, /* bitsize */
131 FALSE, /* pc_relative */
132 0, /* bitpos */
133 complain_overflow_bitfield,/* complain_on_overflow */
134 bfd_elf_generic_reloc, /* special_function */
135 "R_ARM_ABS16", /* name */
136 FALSE, /* partial_inplace */
137 0x0000ffff, /* src_mask */
138 0x0000ffff, /* dst_mask */
139 FALSE), /* pcrel_offset */
140
141 /* 12 bit absolute */
142 HOWTO (R_ARM_ABS12, /* type */
143 0, /* rightshift */
144 2, /* size (0 = byte, 1 = short, 2 = long) */
145 12, /* bitsize */
146 FALSE, /* pc_relative */
147 0, /* bitpos */
148 complain_overflow_bitfield,/* complain_on_overflow */
149 bfd_elf_generic_reloc, /* special_function */
150 "R_ARM_ABS12", /* name */
151 FALSE, /* partial_inplace */
152 0x000008ff, /* src_mask */
153 0x000008ff, /* dst_mask */
154 FALSE), /* pcrel_offset */
155
156 HOWTO (R_ARM_THM_ABS5, /* type */
157 6, /* rightshift */
158 1, /* size (0 = byte, 1 = short, 2 = long) */
159 5, /* bitsize */
160 FALSE, /* pc_relative */
161 0, /* bitpos */
162 complain_overflow_bitfield,/* complain_on_overflow */
163 bfd_elf_generic_reloc, /* special_function */
164 "R_ARM_THM_ABS5", /* name */
165 FALSE, /* partial_inplace */
166 0x000007e0, /* src_mask */
167 0x000007e0, /* dst_mask */
168 FALSE), /* pcrel_offset */
169
170 /* 8 bit absolute */
171 HOWTO (R_ARM_ABS8, /* type */
172 0, /* rightshift */
173 0, /* size (0 = byte, 1 = short, 2 = long) */
174 8, /* bitsize */
175 FALSE, /* pc_relative */
176 0, /* bitpos */
177 complain_overflow_bitfield,/* complain_on_overflow */
178 bfd_elf_generic_reloc, /* special_function */
179 "R_ARM_ABS8", /* name */
180 FALSE, /* partial_inplace */
181 0x000000ff, /* src_mask */
182 0x000000ff, /* dst_mask */
183 FALSE), /* pcrel_offset */
184
185 HOWTO (R_ARM_SBREL32, /* type */
186 0, /* rightshift */
187 2, /* size (0 = byte, 1 = short, 2 = long) */
188 32, /* bitsize */
189 FALSE, /* pc_relative */
190 0, /* bitpos */
191 complain_overflow_dont,/* complain_on_overflow */
192 bfd_elf_generic_reloc, /* special_function */
193 "R_ARM_SBREL32", /* name */
194 FALSE, /* partial_inplace */
195 0xffffffff, /* src_mask */
196 0xffffffff, /* dst_mask */
197 FALSE), /* pcrel_offset */
198
199 HOWTO (R_ARM_THM_PC22, /* type */
200 1, /* rightshift */
201 2, /* size (0 = byte, 1 = short, 2 = long) */
202 23, /* bitsize */
203 TRUE, /* pc_relative */
204 0, /* bitpos */
205 complain_overflow_signed,/* complain_on_overflow */
206 bfd_elf_generic_reloc, /* special_function */
207 "R_ARM_THM_PC22", /* name */
208 FALSE, /* partial_inplace */
209 0x07ff07ff, /* src_mask */
210 0x07ff07ff, /* dst_mask */
211 TRUE), /* pcrel_offset */
212
213 HOWTO (R_ARM_THM_PC8, /* type */
214 1, /* rightshift */
215 1, /* size (0 = byte, 1 = short, 2 = long) */
216 8, /* bitsize */
217 TRUE, /* pc_relative */
218 0, /* bitpos */
219 complain_overflow_signed,/* complain_on_overflow */
220 bfd_elf_generic_reloc, /* special_function */
221 "R_ARM_THM_PC8", /* name */
222 FALSE, /* partial_inplace */
223 0x000000ff, /* src_mask */
224 0x000000ff, /* dst_mask */
225 TRUE), /* pcrel_offset */
226
227 HOWTO (R_ARM_AMP_VCALL9, /* type */
228 1, /* rightshift */
229 1, /* size (0 = byte, 1 = short, 2 = long) */
230 8, /* bitsize */
231 TRUE, /* pc_relative */
232 0, /* bitpos */
233 complain_overflow_signed,/* complain_on_overflow */
234 bfd_elf_generic_reloc, /* special_function */
235 "R_ARM_AMP_VCALL9", /* name */
236 FALSE, /* partial_inplace */
237 0x000000ff, /* src_mask */
238 0x000000ff, /* dst_mask */
239 TRUE), /* pcrel_offset */
240
241 HOWTO (R_ARM_SWI24, /* type */
242 0, /* rightshift */
243 0, /* size (0 = byte, 1 = short, 2 = long) */
244 0, /* bitsize */
245 FALSE, /* pc_relative */
246 0, /* bitpos */
247 complain_overflow_signed,/* complain_on_overflow */
248 bfd_elf_generic_reloc, /* special_function */
249 "R_ARM_SWI24", /* name */
250 FALSE, /* partial_inplace */
251 0x00000000, /* src_mask */
252 0x00000000, /* dst_mask */
253 FALSE), /* pcrel_offset */
254
255 HOWTO (R_ARM_THM_SWI8, /* type */
256 0, /* rightshift */
257 0, /* size (0 = byte, 1 = short, 2 = long) */
258 0, /* bitsize */
259 FALSE, /* pc_relative */
260 0, /* bitpos */
261 complain_overflow_signed,/* complain_on_overflow */
262 bfd_elf_generic_reloc, /* special_function */
263 "R_ARM_SWI8", /* name */
264 FALSE, /* partial_inplace */
265 0x00000000, /* src_mask */
266 0x00000000, /* dst_mask */
267 FALSE), /* pcrel_offset */
268
269 /* BLX instruction for the ARM. */
270 HOWTO (R_ARM_XPC25, /* type */
271 2, /* rightshift */
272 2, /* size (0 = byte, 1 = short, 2 = long) */
273 25, /* bitsize */
274 TRUE, /* pc_relative */
275 0, /* bitpos */
276 complain_overflow_signed,/* complain_on_overflow */
277 bfd_elf_generic_reloc, /* special_function */
278 "R_ARM_XPC25", /* name */
279 FALSE, /* partial_inplace */
280 0x00ffffff, /* src_mask */
281 0x00ffffff, /* dst_mask */
282 TRUE), /* pcrel_offset */
283
284 /* BLX instruction for the Thumb. */
285 HOWTO (R_ARM_THM_XPC22, /* type */
286 2, /* rightshift */
287 2, /* size (0 = byte, 1 = short, 2 = long) */
288 22, /* bitsize */
289 TRUE, /* pc_relative */
290 0, /* bitpos */
291 complain_overflow_signed,/* complain_on_overflow */
292 bfd_elf_generic_reloc, /* special_function */
293 "R_ARM_THM_XPC22", /* name */
294 FALSE, /* partial_inplace */
295 0x07ff07ff, /* src_mask */
296 0x07ff07ff, /* dst_mask */
297 TRUE), /* pcrel_offset */
298
299 /* These next three relocs are not defined, but we need to fill the space. */
300
301 HOWTO (R_ARM_NONE, /* type */
302 0, /* rightshift */
303 0, /* size (0 = byte, 1 = short, 2 = long) */
304 0, /* bitsize */
305 FALSE, /* pc_relative */
306 0, /* bitpos */
307 complain_overflow_dont,/* complain_on_overflow */
308 bfd_elf_generic_reloc, /* special_function */
309 "R_ARM_unknown_17", /* name */
310 FALSE, /* partial_inplace */
311 0, /* src_mask */
312 0, /* dst_mask */
313 FALSE), /* pcrel_offset */
314
315 HOWTO (R_ARM_NONE, /* type */
316 0, /* rightshift */
317 0, /* size (0 = byte, 1 = short, 2 = long) */
318 0, /* bitsize */
319 FALSE, /* pc_relative */
320 0, /* bitpos */
321 complain_overflow_dont,/* complain_on_overflow */
322 bfd_elf_generic_reloc, /* special_function */
323 "R_ARM_unknown_18", /* name */
324 FALSE, /* partial_inplace */
325 0, /* src_mask */
326 0, /* dst_mask */
327 FALSE), /* pcrel_offset */
328
329 HOWTO (R_ARM_NONE, /* type */
330 0, /* rightshift */
331 0, /* size (0 = byte, 1 = short, 2 = long) */
332 0, /* bitsize */
333 FALSE, /* pc_relative */
334 0, /* bitpos */
335 complain_overflow_dont,/* complain_on_overflow */
336 bfd_elf_generic_reloc, /* special_function */
337 "R_ARM_unknown_19", /* name */
338 FALSE, /* partial_inplace */
339 0, /* src_mask */
340 0, /* dst_mask */
341 FALSE), /* pcrel_offset */
342
343 /* Relocs used in ARM Linux */
344
345 HOWTO (R_ARM_COPY, /* type */
346 0, /* rightshift */
347 2, /* size (0 = byte, 1 = short, 2 = long) */
348 32, /* bitsize */
349 FALSE, /* pc_relative */
350 0, /* bitpos */
351 complain_overflow_bitfield,/* complain_on_overflow */
352 bfd_elf_generic_reloc, /* special_function */
353 "R_ARM_COPY", /* name */
354 TRUE, /* partial_inplace */
355 0xffffffff, /* src_mask */
356 0xffffffff, /* dst_mask */
357 FALSE), /* pcrel_offset */
358
359 HOWTO (R_ARM_GLOB_DAT, /* type */
360 0, /* rightshift */
361 2, /* size (0 = byte, 1 = short, 2 = long) */
362 32, /* bitsize */
363 FALSE, /* pc_relative */
364 0, /* bitpos */
365 complain_overflow_bitfield,/* complain_on_overflow */
366 bfd_elf_generic_reloc, /* special_function */
367 "R_ARM_GLOB_DAT", /* name */
368 TRUE, /* partial_inplace */
369 0xffffffff, /* src_mask */
370 0xffffffff, /* dst_mask */
371 FALSE), /* pcrel_offset */
372
373 HOWTO (R_ARM_JUMP_SLOT, /* type */
374 0, /* rightshift */
375 2, /* size (0 = byte, 1 = short, 2 = long) */
376 32, /* bitsize */
377 FALSE, /* pc_relative */
378 0, /* bitpos */
379 complain_overflow_bitfield,/* complain_on_overflow */
380 bfd_elf_generic_reloc, /* special_function */
381 "R_ARM_JUMP_SLOT", /* name */
382 TRUE, /* partial_inplace */
383 0xffffffff, /* src_mask */
384 0xffffffff, /* dst_mask */
385 FALSE), /* pcrel_offset */
386
387 HOWTO (R_ARM_RELATIVE, /* type */
388 0, /* rightshift */
389 2, /* size (0 = byte, 1 = short, 2 = long) */
390 32, /* bitsize */
391 FALSE, /* pc_relative */
392 0, /* bitpos */
393 complain_overflow_bitfield,/* complain_on_overflow */
394 bfd_elf_generic_reloc, /* special_function */
395 "R_ARM_RELATIVE", /* name */
396 TRUE, /* partial_inplace */
397 0xffffffff, /* src_mask */
398 0xffffffff, /* dst_mask */
399 FALSE), /* pcrel_offset */
400
401 HOWTO (R_ARM_GOTOFF, /* type */
402 0, /* rightshift */
403 2, /* size (0 = byte, 1 = short, 2 = long) */
404 32, /* bitsize */
405 FALSE, /* pc_relative */
406 0, /* bitpos */
407 complain_overflow_bitfield,/* complain_on_overflow */
408 bfd_elf_generic_reloc, /* special_function */
409 "R_ARM_GOTOFF", /* name */
410 TRUE, /* partial_inplace */
411 0xffffffff, /* src_mask */
412 0xffffffff, /* dst_mask */
413 FALSE), /* pcrel_offset */
414
415 HOWTO (R_ARM_GOTPC, /* type */
416 0, /* rightshift */
417 2, /* size (0 = byte, 1 = short, 2 = long) */
418 32, /* bitsize */
419 TRUE, /* pc_relative */
420 0, /* bitpos */
421 complain_overflow_bitfield,/* complain_on_overflow */
422 bfd_elf_generic_reloc, /* special_function */
423 "R_ARM_GOTPC", /* name */
424 TRUE, /* partial_inplace */
425 0xffffffff, /* src_mask */
426 0xffffffff, /* dst_mask */
427 TRUE), /* pcrel_offset */
428
429 HOWTO (R_ARM_GOT32, /* type */
430 0, /* rightshift */
431 2, /* size (0 = byte, 1 = short, 2 = long) */
432 32, /* bitsize */
433 FALSE, /* pc_relative */
434 0, /* bitpos */
435 complain_overflow_bitfield,/* complain_on_overflow */
436 bfd_elf_generic_reloc, /* special_function */
437 "R_ARM_GOT32", /* name */
438 TRUE, /* partial_inplace */
439 0xffffffff, /* src_mask */
440 0xffffffff, /* dst_mask */
441 FALSE), /* pcrel_offset */
442
443 HOWTO (R_ARM_PLT32, /* type */
444 2, /* rightshift */
445 2, /* size (0 = byte, 1 = short, 2 = long) */
446 26, /* bitsize */
447 TRUE, /* pc_relative */
448 0, /* bitpos */
449 complain_overflow_bitfield,/* complain_on_overflow */
450 bfd_elf_generic_reloc, /* special_function */
451 "R_ARM_PLT32", /* name */
452 TRUE, /* partial_inplace */
453 0x00ffffff, /* src_mask */
454 0x00ffffff, /* dst_mask */
455 TRUE), /* pcrel_offset */
456
457 HOWTO (R_ARM_CALL, /* type */
458 2, /* rightshift */
459 2, /* size (0 = byte, 1 = short, 2 = long) */
460 24, /* bitsize */
461 TRUE, /* pc_relative */
462 0, /* bitpos */
463 complain_overflow_signed,/* complain_on_overflow */
464 bfd_elf_generic_reloc, /* special_function */
465 "R_ARM_CALL", /* name */
466 FALSE, /* partial_inplace */
467 0x00ffffff, /* src_mask */
468 0x00ffffff, /* dst_mask */
469 TRUE), /* pcrel_offset */
470
471 HOWTO (R_ARM_JUMP24, /* type */
472 2, /* rightshift */
473 2, /* size (0 = byte, 1 = short, 2 = long) */
474 24, /* bitsize */
475 TRUE, /* pc_relative */
476 0, /* bitpos */
477 complain_overflow_signed,/* complain_on_overflow */
478 bfd_elf_generic_reloc, /* special_function */
479 "R_ARM_JUMP24", /* name */
480 FALSE, /* partial_inplace */
481 0x00ffffff, /* src_mask */
482 0x00ffffff, /* dst_mask */
483 TRUE), /* pcrel_offset */
484
485 HOWTO (R_ARM_NONE, /* type */
486 0, /* rightshift */
487 0, /* size (0 = byte, 1 = short, 2 = long) */
488 0, /* bitsize */
489 FALSE, /* pc_relative */
490 0, /* bitpos */
491 complain_overflow_dont,/* complain_on_overflow */
492 bfd_elf_generic_reloc, /* special_function */
493 "R_ARM_unknown_30", /* name */
494 FALSE, /* partial_inplace */
495 0, /* src_mask */
496 0, /* dst_mask */
497 FALSE), /* pcrel_offset */
498
499 HOWTO (R_ARM_NONE, /* type */
500 0, /* rightshift */
501 0, /* size (0 = byte, 1 = short, 2 = long) */
502 0, /* bitsize */
503 FALSE, /* pc_relative */
504 0, /* bitpos */
505 complain_overflow_dont,/* complain_on_overflow */
506 bfd_elf_generic_reloc, /* special_function */
507 "R_ARM_unknown_31", /* name */
508 FALSE, /* partial_inplace */
509 0, /* src_mask */
510 0, /* dst_mask */
511 FALSE), /* pcrel_offset */
512
513 HOWTO (R_ARM_ALU_PCREL7_0, /* type */
514 0, /* rightshift */
515 2, /* size (0 = byte, 1 = short, 2 = long) */
516 12, /* bitsize */
517 TRUE, /* pc_relative */
518 0, /* bitpos */
519 complain_overflow_dont,/* complain_on_overflow */
520 bfd_elf_generic_reloc, /* special_function */
521 "R_ARM_ALU_PCREL_7_0", /* name */
522 FALSE, /* partial_inplace */
523 0x00000fff, /* src_mask */
524 0x00000fff, /* dst_mask */
525 TRUE), /* pcrel_offset */
526
527 HOWTO (R_ARM_ALU_PCREL15_8, /* type */
528 0, /* rightshift */
529 2, /* size (0 = byte, 1 = short, 2 = long) */
530 12, /* bitsize */
531 TRUE, /* pc_relative */
532 8, /* bitpos */
533 complain_overflow_dont,/* complain_on_overflow */
534 bfd_elf_generic_reloc, /* special_function */
535 "R_ARM_ALU_PCREL_15_8",/* name */
536 FALSE, /* partial_inplace */
537 0x00000fff, /* src_mask */
538 0x00000fff, /* dst_mask */
539 TRUE), /* pcrel_offset */
540
541 HOWTO (R_ARM_ALU_PCREL23_15, /* type */
542 0, /* rightshift */
543 2, /* size (0 = byte, 1 = short, 2 = long) */
544 12, /* bitsize */
545 TRUE, /* pc_relative */
546 16, /* bitpos */
547 complain_overflow_dont,/* complain_on_overflow */
548 bfd_elf_generic_reloc, /* special_function */
549 "R_ARM_ALU_PCREL_23_15",/* name */
550 FALSE, /* partial_inplace */
551 0x00000fff, /* src_mask */
552 0x00000fff, /* dst_mask */
553 TRUE), /* pcrel_offset */
554
555 HOWTO (R_ARM_LDR_SBREL_11_0, /* type */
556 0, /* rightshift */
557 2, /* size (0 = byte, 1 = short, 2 = long) */
558 12, /* bitsize */
559 FALSE, /* pc_relative */
560 0, /* bitpos */
561 complain_overflow_dont,/* complain_on_overflow */
562 bfd_elf_generic_reloc, /* special_function */
563 "R_ARM_LDR_SBREL_11_0",/* name */
564 FALSE, /* partial_inplace */
565 0x00000fff, /* src_mask */
566 0x00000fff, /* dst_mask */
567 FALSE), /* pcrel_offset */
568
569 HOWTO (R_ARM_ALU_SBREL_19_12, /* type */
570 0, /* rightshift */
571 2, /* size (0 = byte, 1 = short, 2 = long) */
572 8, /* bitsize */
573 FALSE, /* pc_relative */
574 12, /* bitpos */
575 complain_overflow_dont,/* complain_on_overflow */
576 bfd_elf_generic_reloc, /* special_function */
577 "R_ARM_ALU_SBREL_19_12",/* name */
578 FALSE, /* partial_inplace */
579 0x000ff000, /* src_mask */
580 0x000ff000, /* dst_mask */
581 FALSE), /* pcrel_offset */
582
583 HOWTO (R_ARM_ALU_SBREL_27_20, /* type */
584 0, /* rightshift */
585 2, /* size (0 = byte, 1 = short, 2 = long) */
586 8, /* bitsize */
587 FALSE, /* pc_relative */
588 20, /* bitpos */
589 complain_overflow_dont,/* complain_on_overflow */
590 bfd_elf_generic_reloc, /* special_function */
591 "R_ARM_ALU_SBREL_27_20",/* name */
592 FALSE, /* partial_inplace */
593 0x0ff00000, /* src_mask */
594 0x0ff00000, /* dst_mask */
595 FALSE), /* pcrel_offset */
596
597 HOWTO (R_ARM_TARGET1, /* type */
598 0, /* rightshift */
599 2, /* size (0 = byte, 1 = short, 2 = long) */
600 32, /* bitsize */
601 FALSE, /* pc_relative */
602 0, /* bitpos */
603 complain_overflow_dont,/* complain_on_overflow */
604 bfd_elf_generic_reloc, /* special_function */
605 "R_ARM_TARGET1", /* name */
606 FALSE, /* partial_inplace */
607 0xffffffff, /* src_mask */
608 0xffffffff, /* dst_mask */
609 FALSE), /* pcrel_offset */
610
611 HOWTO (R_ARM_ROSEGREL32, /* type */
612 0, /* rightshift */
613 2, /* size (0 = byte, 1 = short, 2 = long) */
614 32, /* bitsize */
615 FALSE, /* pc_relative */
616 0, /* bitpos */
617 complain_overflow_dont,/* complain_on_overflow */
618 bfd_elf_generic_reloc, /* special_function */
619 "R_ARM_ROSEGREL32", /* name */
620 FALSE, /* partial_inplace */
621 0xffffffff, /* src_mask */
622 0xffffffff, /* dst_mask */
623 FALSE), /* pcrel_offset */
624
625 HOWTO (R_ARM_V4BX, /* type */
626 0, /* rightshift */
627 2, /* size (0 = byte, 1 = short, 2 = long) */
628 32, /* bitsize */
629 FALSE, /* pc_relative */
630 0, /* bitpos */
631 complain_overflow_dont,/* complain_on_overflow */
632 bfd_elf_generic_reloc, /* special_function */
633 "R_ARM_V4BX", /* name */
634 FALSE, /* partial_inplace */
635 0xffffffff, /* src_mask */
636 0xffffffff, /* dst_mask */
637 FALSE), /* pcrel_offset */
638
639 HOWTO (R_ARM_TARGET2, /* type */
640 0, /* rightshift */
641 2, /* size (0 = byte, 1 = short, 2 = long) */
642 32, /* bitsize */
643 FALSE, /* pc_relative */
644 0, /* bitpos */
645 complain_overflow_signed,/* complain_on_overflow */
646 bfd_elf_generic_reloc, /* special_function */
647 "R_ARM_TARGET2", /* name */
648 FALSE, /* partial_inplace */
649 0xffffffff, /* src_mask */
650 0xffffffff, /* dst_mask */
651 TRUE), /* pcrel_offset */
652
653 HOWTO (R_ARM_PREL31, /* type */
654 0, /* rightshift */
655 2, /* size (0 = byte, 1 = short, 2 = long) */
656 31, /* bitsize */
657 TRUE, /* pc_relative */
658 0, /* bitpos */
659 complain_overflow_signed,/* complain_on_overflow */
660 bfd_elf_generic_reloc, /* special_function */
661 "R_ARM_PREL31", /* name */
662 FALSE, /* partial_inplace */
663 0x7fffffff, /* src_mask */
664 0x7fffffff, /* dst_mask */
665 TRUE), /* pcrel_offset */
666};
667
668 /* GNU extension to record C++ vtable hierarchy */
669static reloc_howto_type elf32_arm_vtinherit_howto =
670 HOWTO (R_ARM_GNU_VTINHERIT, /* type */
671 0, /* rightshift */
672 2, /* size (0 = byte, 1 = short, 2 = long) */
673 0, /* bitsize */
674 FALSE, /* pc_relative */
675 0, /* bitpos */
676 complain_overflow_dont, /* complain_on_overflow */
677 NULL, /* special_function */
678 "R_ARM_GNU_VTINHERIT", /* name */
679 FALSE, /* partial_inplace */
680 0, /* src_mask */
681 0, /* dst_mask */
682 FALSE); /* pcrel_offset */
683
684 /* GNU extension to record C++ vtable member usage */
685static reloc_howto_type elf32_arm_vtentry_howto =
686 HOWTO (R_ARM_GNU_VTENTRY, /* type */
687 0, /* rightshift */
688 2, /* size (0 = byte, 1 = short, 2 = long) */
689 0, /* bitsize */
690 FALSE, /* pc_relative */
691 0, /* bitpos */
692 complain_overflow_dont, /* complain_on_overflow */
693 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
694 "R_ARM_GNU_VTENTRY", /* name */
695 FALSE, /* partial_inplace */
696 0, /* src_mask */
697 0, /* dst_mask */
698 FALSE); /* pcrel_offset */
699
700 /* 12 bit pc relative */
701static reloc_howto_type elf32_arm_thm_pc11_howto =
702 HOWTO (R_ARM_THM_PC11, /* type */
703 1, /* rightshift */
704 1, /* size (0 = byte, 1 = short, 2 = long) */
705 11, /* bitsize */
706 TRUE, /* pc_relative */
707 0, /* bitpos */
708 complain_overflow_signed, /* complain_on_overflow */
709 bfd_elf_generic_reloc, /* special_function */
710 "R_ARM_THM_PC11", /* name */
711 FALSE, /* partial_inplace */
712 0x000007ff, /* src_mask */
713 0x000007ff, /* dst_mask */
714 TRUE); /* pcrel_offset */
715
716 /* 12 bit pc relative */
717static reloc_howto_type elf32_arm_thm_pc9_howto =
718 HOWTO (R_ARM_THM_PC9, /* type */
719 1, /* rightshift */
720 1, /* size (0 = byte, 1 = short, 2 = long) */
721 8, /* bitsize */
722 TRUE, /* pc_relative */
723 0, /* bitpos */
724 complain_overflow_signed, /* complain_on_overflow */
725 bfd_elf_generic_reloc, /* special_function */
726 "R_ARM_THM_PC9", /* name */
727 FALSE, /* partial_inplace */
728 0x000000ff, /* src_mask */
729 0x000000ff, /* dst_mask */
730 TRUE); /* pcrel_offset */
731
732/* Place relative GOT-indirect. */
733static reloc_howto_type elf32_arm_got_prel =
734 HOWTO (R_ARM_GOT_PREL, /* type */
735 0, /* rightshift */
736 2, /* size (0 = byte, 1 = short, 2 = long) */
737 32, /* bitsize */
738 TRUE, /* pc_relative */
739 0, /* bitpos */
740 complain_overflow_dont, /* complain_on_overflow */
741 bfd_elf_generic_reloc, /* special_function */
742 "R_ARM_GOT_PREL", /* name */
743 FALSE, /* partial_inplace */
744 0xffffffff, /* src_mask */
745 0xffffffff, /* dst_mask */
746 TRUE); /* pcrel_offset */
747
748/* Currently unused relocations. */
749static reloc_howto_type elf32_arm_r_howto[4] =
750{
751 HOWTO (R_ARM_RREL32, /* type */
752 0, /* rightshift */
753 0, /* size (0 = byte, 1 = short, 2 = long) */
754 0, /* bitsize */
755 FALSE, /* pc_relative */
756 0, /* bitpos */
757 complain_overflow_dont,/* complain_on_overflow */
758 bfd_elf_generic_reloc, /* special_function */
759 "R_ARM_RREL32", /* name */
760 FALSE, /* partial_inplace */
761 0, /* src_mask */
762 0, /* dst_mask */
763 FALSE), /* pcrel_offset */
764
765 HOWTO (R_ARM_RABS32, /* type */
766 0, /* rightshift */
767 0, /* size (0 = byte, 1 = short, 2 = long) */
768 0, /* bitsize */
769 FALSE, /* pc_relative */
770 0, /* bitpos */
771 complain_overflow_dont,/* complain_on_overflow */
772 bfd_elf_generic_reloc, /* special_function */
773 "R_ARM_RABS32", /* name */
774 FALSE, /* partial_inplace */
775 0, /* src_mask */
776 0, /* dst_mask */
777 FALSE), /* pcrel_offset */
778
779 HOWTO (R_ARM_RPC24, /* type */
780 0, /* rightshift */
781 0, /* size (0 = byte, 1 = short, 2 = long) */
782 0, /* bitsize */
783 FALSE, /* pc_relative */
784 0, /* bitpos */
785 complain_overflow_dont,/* complain_on_overflow */
786 bfd_elf_generic_reloc, /* special_function */
787 "R_ARM_RPC24", /* name */
788 FALSE, /* partial_inplace */
789 0, /* src_mask */
790 0, /* dst_mask */
791 FALSE), /* pcrel_offset */
792
793 HOWTO (R_ARM_RBASE, /* type */
794 0, /* rightshift */
795 0, /* size (0 = byte, 1 = short, 2 = long) */
796 0, /* bitsize */
797 FALSE, /* pc_relative */
798 0, /* bitpos */
799 complain_overflow_dont,/* complain_on_overflow */
800 bfd_elf_generic_reloc, /* special_function */
801 "R_ARM_RBASE", /* name */
802 FALSE, /* partial_inplace */
803 0, /* src_mask */
804 0, /* dst_mask */
805 FALSE) /* pcrel_offset */
806};
807
808static reloc_howto_type *
809elf32_arm_howto_from_type (unsigned int r_type)
810{
811 if (r_type < NUM_ELEM (elf32_arm_howto_table))
812 return &elf32_arm_howto_table[r_type];
813
814 switch (r_type)
815 {
816 case R_ARM_GOT_PREL:
817 return &elf32_arm_got_prel;
818
819 case R_ARM_GNU_VTINHERIT:
820 return &elf32_arm_vtinherit_howto;
821
822 case R_ARM_GNU_VTENTRY:
823 return &elf32_arm_vtentry_howto;
824
825 case R_ARM_THM_PC11:
826 return &elf32_arm_thm_pc11_howto;
827
828 case R_ARM_THM_PC9:
829 return &elf32_arm_thm_pc9_howto;
830
831 case R_ARM_RREL32:
832 case R_ARM_RABS32:
833 case R_ARM_RPC24:
834 case R_ARM_RBASE:
835 return &elf32_arm_r_howto[r_type - R_ARM_RREL32];
836
837 default:
838 return NULL;
839 }
840}
841
842static void
843elf32_arm_info_to_howto (bfd * abfd ATTRIBUTE_UNUSED, arelent * bfd_reloc,
844 Elf_Internal_Rela * elf_reloc)
845{
846 unsigned int r_type;
847
848 r_type = ELF32_R_TYPE (elf_reloc->r_info);
849 bfd_reloc->howto = elf32_arm_howto_from_type (r_type);
850}
851
852struct elf32_arm_reloc_map
853 {
854 bfd_reloc_code_real_type bfd_reloc_val;
855 unsigned char elf_reloc_val;
856 };
857
858/* All entries in this list must also be present in elf32_arm_howto_table. */
859static const struct elf32_arm_reloc_map elf32_arm_reloc_map[] =
860 {
861 {BFD_RELOC_NONE, R_ARM_NONE},
862 {BFD_RELOC_ARM_PCREL_BRANCH, R_ARM_PC24},
863 {BFD_RELOC_ARM_PCREL_BLX, R_ARM_XPC25},
864 {BFD_RELOC_THUMB_PCREL_BLX, R_ARM_THM_XPC22},
865 {BFD_RELOC_32, R_ARM_ABS32},
866 {BFD_RELOC_32_PCREL, R_ARM_REL32},
867 {BFD_RELOC_8, R_ARM_ABS8},
868 {BFD_RELOC_16, R_ARM_ABS16},
869 {BFD_RELOC_ARM_OFFSET_IMM, R_ARM_ABS12},
870 {BFD_RELOC_ARM_THUMB_OFFSET, R_ARM_THM_ABS5},
871 {BFD_RELOC_THUMB_PCREL_BRANCH23, R_ARM_THM_PC22},
872 {BFD_RELOC_ARM_COPY, R_ARM_COPY},
873 {BFD_RELOC_ARM_GLOB_DAT, R_ARM_GLOB_DAT},
874 {BFD_RELOC_ARM_JUMP_SLOT, R_ARM_JUMP_SLOT},
875 {BFD_RELOC_ARM_RELATIVE, R_ARM_RELATIVE},
876 {BFD_RELOC_ARM_GOTOFF, R_ARM_GOTOFF},
877 {BFD_RELOC_ARM_GOTPC, R_ARM_GOTPC},
878 {BFD_RELOC_ARM_GOT32, R_ARM_GOT32},
879 {BFD_RELOC_ARM_PLT32, R_ARM_PLT32},
880 {BFD_RELOC_ARM_TARGET1, R_ARM_TARGET1},
881 {BFD_RELOC_ARM_ROSEGREL32, R_ARM_ROSEGREL32},
882 {BFD_RELOC_ARM_SBREL32, R_ARM_SBREL32},
883 {BFD_RELOC_ARM_PREL31, R_ARM_PREL31},
884 {BFD_RELOC_ARM_TARGET2, R_ARM_TARGET2}
885 };
886
887static reloc_howto_type *
888elf32_arm_reloc_type_lookup (abfd, code)
889 bfd *abfd ATTRIBUTE_UNUSED;
890 bfd_reloc_code_real_type code;
891{
892 unsigned int i;
893
894 switch (code)
895 {
896 case BFD_RELOC_VTABLE_INHERIT:
897 return & elf32_arm_vtinherit_howto;
898
899 case BFD_RELOC_VTABLE_ENTRY:
900 return & elf32_arm_vtentry_howto;
901
902 case BFD_RELOC_THUMB_PCREL_BRANCH12:
903 return & elf32_arm_thm_pc11_howto;
904
905 case BFD_RELOC_THUMB_PCREL_BRANCH9:
906 return & elf32_arm_thm_pc9_howto;
907
908 default:
909 for (i = 0; i < NUM_ELEM (elf32_arm_reloc_map); i ++)
910 if (elf32_arm_reloc_map[i].bfd_reloc_val == code)
911 return & elf32_arm_howto_table[elf32_arm_reloc_map[i].elf_reloc_val];
912
913 return NULL;
914 }
915}
916
917/* Support for core dump NOTE sections */
918static bfd_boolean
919elf32_arm_nabi_grok_prstatus (abfd, note)
920 bfd *abfd;
921 Elf_Internal_Note *note;
922{
923 int offset;
924 size_t size;
925
926 switch (note->descsz)
927 {
928 default:
929 return FALSE;
930
931 case 148: /* Linux/ARM 32-bit*/
932 /* pr_cursig */
933 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
934
935 /* pr_pid */
936 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 24);
937
938 /* pr_reg */
939 offset = 72;
940 size = 72;
941
942 break;
943 }
944
945 /* Make a ".reg/999" section. */
946 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
947 size, note->descpos + offset);
948}
949
950static bfd_boolean
951elf32_arm_nabi_grok_psinfo (abfd, note)
952 bfd *abfd;
953 Elf_Internal_Note *note;
954{
955 switch (note->descsz)
956 {
957 default:
958 return FALSE;
959
960 case 124: /* Linux/ARM elf_prpsinfo */
961 elf_tdata (abfd)->core_program
962 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
963 elf_tdata (abfd)->core_command
964 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
965 }
966
967 /* Note that for some reason, a spurious space is tacked
968 onto the end of the args in some (at least one anyway)
969 implementations, so strip it off if it exists. */
970
971 {
972 char *command = elf_tdata (abfd)->core_command;
973 int n = strlen (command);
974
975 if (0 < n && command[n - 1] == ' ')
976 command[n - 1] = '\0';
977 }
978
979 return TRUE;
980}
981
982#define TARGET_LITTLE_SYM bfd_elf32_littlearm_vec
983#define TARGET_LITTLE_NAME "elf32-littlearm"
984#define TARGET_BIG_SYM bfd_elf32_bigarm_vec
985#define TARGET_BIG_NAME "elf32-bigarm"
986
987#define elf_backend_grok_prstatus elf32_arm_nabi_grok_prstatus
988#define elf_backend_grok_psinfo elf32_arm_nabi_grok_psinfo
989
acf8aed4
AM
990#ifndef USE_REL
991#define USE_REL 0
992#endif
993
252b5132
RH
994typedef unsigned long int insn32;
995typedef unsigned short int insn16;
996
8cb51566 997/* In lieu of proper flags, assume all EABIv4 objects are interworkable. */
57e8b36a 998#define INTERWORK_FLAG(abfd) \
8cb51566 999 (EF_ARM_EABI_VERSION (elf_elfheader (abfd)->e_flags) == EF_ARM_EABI_VER4 \
85a84e7a 1000 || (elf_elfheader (abfd)->e_flags & EF_ARM_INTERWORK))
9b485d32 1001
252b5132
RH
1002/* The linker script knows the section names for placement.
1003 The entry_names are used to do simple name mangling on the stubs.
1004 Given a function name, and its type, the stub can be found. The
9b485d32 1005 name can be changed. The only requirement is the %s be present. */
252b5132
RH
1006#define THUMB2ARM_GLUE_SECTION_NAME ".glue_7t"
1007#define THUMB2ARM_GLUE_ENTRY_NAME "__%s_from_thumb"
1008
1009#define ARM2THUMB_GLUE_SECTION_NAME ".glue_7"
1010#define ARM2THUMB_GLUE_ENTRY_NAME "__%s_from_arm"
1011
1012/* The name of the dynamic interpreter. This is put in the .interp
1013 section. */
1014#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
1015
5e681ec4
PB
1016#ifdef FOUR_WORD_PLT
1017
252b5132
RH
1018/* The first entry in a procedure linkage table looks like
1019 this. It is set up so that any shared library function that is
59f2c4e7 1020 called before the relocation has been set up calls the dynamic
9b485d32 1021 linker first. */
e5a52504 1022static const bfd_vma elf32_arm_plt0_entry [] =
5e681ec4
PB
1023 {
1024 0xe52de004, /* str lr, [sp, #-4]! */
1025 0xe59fe010, /* ldr lr, [pc, #16] */
1026 0xe08fe00e, /* add lr, pc, lr */
1027 0xe5bef008, /* ldr pc, [lr, #8]! */
1028 };
1029
1030/* Subsequent entries in a procedure linkage table look like
1031 this. */
e5a52504 1032static const bfd_vma elf32_arm_plt_entry [] =
5e681ec4
PB
1033 {
1034 0xe28fc600, /* add ip, pc, #NN */
1035 0xe28cca00, /* add ip, ip, #NN */
1036 0xe5bcf000, /* ldr pc, [ip, #NN]! */
1037 0x00000000, /* unused */
1038 };
1039
1040#else
1041
5e681ec4
PB
1042/* The first entry in a procedure linkage table looks like
1043 this. It is set up so that any shared library function that is
1044 called before the relocation has been set up calls the dynamic
1045 linker first. */
e5a52504 1046static const bfd_vma elf32_arm_plt0_entry [] =
917583ad 1047 {
5e681ec4
PB
1048 0xe52de004, /* str lr, [sp, #-4]! */
1049 0xe59fe004, /* ldr lr, [pc, #4] */
1050 0xe08fe00e, /* add lr, pc, lr */
1051 0xe5bef008, /* ldr pc, [lr, #8]! */
1052 0x00000000, /* &GOT[0] - . */
917583ad 1053 };
252b5132
RH
1054
1055/* Subsequent entries in a procedure linkage table look like
1056 this. */
e5a52504 1057static const bfd_vma elf32_arm_plt_entry [] =
5e681ec4
PB
1058 {
1059 0xe28fc600, /* add ip, pc, #0xNN00000 */
1060 0xe28cca00, /* add ip, ip, #0xNN000 */
1061 0xe5bcf000, /* ldr pc, [ip, #0xNNN]! */
1062 };
1063
1064#endif
252b5132 1065
e5a52504
MM
1066/* The entries in a PLT when using a DLL-based target with multiple
1067 address spaces. */
1068static const bfd_vma elf32_arm_symbian_plt_entry [] =
1069 {
1070 0xe51ff004, /* ldr pr, [pc, #-4] */
1071 0x00000000, /* dcd R_ARM_GLOB_DAT(X) */
1072 };
1073
e489d0ae
PB
1074/* Used to build a map of a section. This is required for mixed-endian
1075 code/data. */
1076
1077typedef struct elf32_elf_section_map
1078{
1079 bfd_vma vma;
1080 char type;
1081}
1082elf32_arm_section_map;
1083
1084struct _arm_elf_section_data
1085{
1086 struct bfd_elf_section_data elf;
1087 int mapcount;
1088 elf32_arm_section_map *map;
1089};
1090
1091#define elf32_arm_section_data(sec) \
1092 ((struct _arm_elf_section_data *) elf_section_data (sec))
1093
252b5132
RH
1094/* The ARM linker needs to keep track of the number of relocs that it
1095 decides to copy in check_relocs for each symbol. This is so that
1096 it can discard PC relative relocs if it doesn't need them when
1097 linking with -Bsymbolic. We store the information in a field
1098 extending the regular ELF linker hash table. */
1099
1100/* This structure keeps track of the number of PC relative relocs we
1101 have copied for a given symbol. */
5e681ec4 1102struct elf32_arm_relocs_copied
917583ad
NC
1103 {
1104 /* Next section. */
5e681ec4 1105 struct elf32_arm_relocs_copied * next;
917583ad
NC
1106 /* A section in dynobj. */
1107 asection * section;
1108 /* Number of relocs copied in this section. */
1109 bfd_size_type count;
1110 };
252b5132 1111
ba96a88f 1112/* Arm ELF linker hash entry. */
252b5132 1113struct elf32_arm_link_hash_entry
917583ad
NC
1114 {
1115 struct elf_link_hash_entry root;
252b5132 1116
917583ad 1117 /* Number of PC relative relocs copied for this symbol. */
5e681ec4 1118 struct elf32_arm_relocs_copied * relocs_copied;
917583ad 1119 };
252b5132 1120
252b5132 1121/* Traverse an arm ELF linker hash table. */
252b5132
RH
1122#define elf32_arm_link_hash_traverse(table, func, info) \
1123 (elf_link_hash_traverse \
1124 (&(table)->root, \
57e8b36a 1125 (bfd_boolean (*) (struct elf_link_hash_entry *, void *))) (func), \
252b5132
RH
1126 (info)))
1127
1128/* Get the ARM elf linker hash table from a link_info structure. */
1129#define elf32_arm_hash_table(info) \
1130 ((struct elf32_arm_link_hash_table *) ((info)->hash))
1131
9b485d32 1132/* ARM ELF linker hash table. */
252b5132 1133struct elf32_arm_link_hash_table
917583ad
NC
1134 {
1135 /* The main hash table. */
1136 struct elf_link_hash_table root;
252b5132 1137
4cc11e76 1138 /* The size in bytes of the section containing the Thumb-to-ARM glue. */
dc810e39 1139 bfd_size_type thumb_glue_size;
252b5132 1140
4cc11e76 1141 /* The size in bytes of the section containing the ARM-to-Thumb glue. */
dc810e39 1142 bfd_size_type arm_glue_size;
252b5132 1143
4cc11e76 1144 /* An arbitrary input BFD chosen to hold the glue sections. */
917583ad 1145 bfd * bfd_of_glue_owner;
ba96a88f 1146
917583ad
NC
1147 /* A boolean indicating whether knowledge of the ARM's pipeline
1148 length should be applied by the linker. */
1149 int no_pipeline_knowledge;
5e681ec4 1150
e489d0ae
PB
1151 /* Nonzero to output a BE8 image. */
1152 int byteswap_code;
1153
9c504268
PB
1154 /* Zero if R_ARM_TARGET1 means R_ARM_ABS32.
1155 Nonzero if R_ARM_TARGET1 means R_ARM_ABS32. */
1156 int target1_is_rel;
1157
eb043451
PB
1158 /* The relocation to use for R_ARM_TARGET2 relocations. */
1159 int target2_reloc;
1160
e5a52504
MM
1161 /* The number of bytes in the initial entry in the PLT. */
1162 bfd_size_type plt_header_size;
1163
1164 /* The number of bytes in the subsequent PLT etries. */
1165 bfd_size_type plt_entry_size;
1166
1167 /* True if the target system is Symbian OS. */
1168 int symbian_p;
1169
5e681ec4
PB
1170 /* Short-cuts to get to dynamic linker sections. */
1171 asection *sgot;
1172 asection *sgotplt;
1173 asection *srelgot;
1174 asection *splt;
1175 asection *srelplt;
1176 asection *sdynbss;
1177 asection *srelbss;
1178
1179 /* Small local sym to section mapping cache. */
1180 struct sym_sec_cache sym_sec;
917583ad 1181 };
252b5132 1182
780a67af
NC
1183/* Create an entry in an ARM ELF linker hash table. */
1184
1185static struct bfd_hash_entry *
57e8b36a
NC
1186elf32_arm_link_hash_newfunc (struct bfd_hash_entry * entry,
1187 struct bfd_hash_table * table,
1188 const char * string)
780a67af
NC
1189{
1190 struct elf32_arm_link_hash_entry * ret =
1191 (struct elf32_arm_link_hash_entry *) entry;
1192
1193 /* Allocate the structure if it has not already been allocated by a
1194 subclass. */
1195 if (ret == (struct elf32_arm_link_hash_entry *) NULL)
57e8b36a
NC
1196 ret = bfd_hash_allocate (table, sizeof (struct elf32_arm_link_hash_entry));
1197 if (ret == NULL)
780a67af
NC
1198 return (struct bfd_hash_entry *) ret;
1199
1200 /* Call the allocation method of the superclass. */
1201 ret = ((struct elf32_arm_link_hash_entry *)
1202 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
1203 table, string));
57e8b36a 1204 if (ret != NULL)
5e681ec4 1205 ret->relocs_copied = NULL;
780a67af
NC
1206
1207 return (struct bfd_hash_entry *) ret;
1208}
1209
5e681ec4
PB
1210/* Create .got, .gotplt, and .rel.got sections in DYNOBJ, and set up
1211 shortcuts to them in our hash table. */
1212
1213static bfd_boolean
57e8b36a 1214create_got_section (bfd *dynobj, struct bfd_link_info *info)
5e681ec4
PB
1215{
1216 struct elf32_arm_link_hash_table *htab;
1217
e5a52504
MM
1218 htab = elf32_arm_hash_table (info);
1219 /* BPABI objects never have a GOT, or associated sections. */
1220 if (htab->symbian_p)
1221 return TRUE;
1222
5e681ec4
PB
1223 if (! _bfd_elf_create_got_section (dynobj, info))
1224 return FALSE;
1225
5e681ec4
PB
1226 htab->sgot = bfd_get_section_by_name (dynobj, ".got");
1227 htab->sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
1228 if (!htab->sgot || !htab->sgotplt)
1229 abort ();
1230
1231 htab->srelgot = bfd_make_section (dynobj, ".rel.got");
1232 if (htab->srelgot == NULL
1233 || ! bfd_set_section_flags (dynobj, htab->srelgot,
1234 (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
1235 | SEC_IN_MEMORY | SEC_LINKER_CREATED
1236 | SEC_READONLY))
1237 || ! bfd_set_section_alignment (dynobj, htab->srelgot, 2))
1238 return FALSE;
1239 return TRUE;
1240}
1241
1242/* Create .plt, .rel.plt, .got, .got.plt, .rel.got, .dynbss, and
1243 .rel.bss sections in DYNOBJ, and set up shortcuts to them in our
1244 hash table. */
1245
1246static bfd_boolean
57e8b36a 1247elf32_arm_create_dynamic_sections (bfd *dynobj, struct bfd_link_info *info)
5e681ec4
PB
1248{
1249 struct elf32_arm_link_hash_table *htab;
1250
1251 htab = elf32_arm_hash_table (info);
1252 if (!htab->sgot && !create_got_section (dynobj, info))
1253 return FALSE;
1254
1255 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
1256 return FALSE;
1257
1258 htab->splt = bfd_get_section_by_name (dynobj, ".plt");
1259 htab->srelplt = bfd_get_section_by_name (dynobj, ".rel.plt");
1260 htab->sdynbss = bfd_get_section_by_name (dynobj, ".dynbss");
1261 if (!info->shared)
1262 htab->srelbss = bfd_get_section_by_name (dynobj, ".rel.bss");
1263
e5a52504
MM
1264 if (!htab->splt
1265 || !htab->srelplt
1266 || !htab->sdynbss
5e681ec4
PB
1267 || (!info->shared && !htab->srelbss))
1268 abort ();
1269
1270 return TRUE;
1271}
1272
1273/* Copy the extra info we tack onto an elf_link_hash_entry. */
1274
1275static void
1276elf32_arm_copy_indirect_symbol (const struct elf_backend_data *bed,
1277 struct elf_link_hash_entry *dir,
1278 struct elf_link_hash_entry *ind)
1279{
1280 struct elf32_arm_link_hash_entry *edir, *eind;
1281
1282 edir = (struct elf32_arm_link_hash_entry *) dir;
1283 eind = (struct elf32_arm_link_hash_entry *) ind;
1284
1285 if (eind->relocs_copied != NULL)
1286 {
1287 if (edir->relocs_copied != NULL)
1288 {
1289 struct elf32_arm_relocs_copied **pp;
1290 struct elf32_arm_relocs_copied *p;
1291
1292 if (ind->root.type == bfd_link_hash_indirect)
1293 abort ();
1294
1295 /* Add reloc counts against the weak sym to the strong sym
1296 list. Merge any entries against the same section. */
1297 for (pp = &eind->relocs_copied; (p = *pp) != NULL; )
1298 {
1299 struct elf32_arm_relocs_copied *q;
1300
1301 for (q = edir->relocs_copied; q != NULL; q = q->next)
1302 if (q->section == p->section)
1303 {
5e681ec4
PB
1304 q->count += p->count;
1305 *pp = p->next;
1306 break;
1307 }
1308 if (q == NULL)
1309 pp = &p->next;
1310 }
1311 *pp = edir->relocs_copied;
1312 }
1313
1314 edir->relocs_copied = eind->relocs_copied;
1315 eind->relocs_copied = NULL;
1316 }
1317
1318 _bfd_elf_link_hash_copy_indirect (bed, dir, ind);
1319}
1320
9b485d32 1321/* Create an ARM elf linker hash table. */
252b5132
RH
1322
1323static struct bfd_link_hash_table *
57e8b36a 1324elf32_arm_link_hash_table_create (bfd *abfd)
252b5132
RH
1325{
1326 struct elf32_arm_link_hash_table *ret;
dc810e39 1327 bfd_size_type amt = sizeof (struct elf32_arm_link_hash_table);
252b5132 1328
57e8b36a
NC
1329 ret = bfd_malloc (amt);
1330 if (ret == NULL)
252b5132
RH
1331 return NULL;
1332
57e8b36a 1333 if (!_bfd_elf_link_hash_table_init (& ret->root, abfd,
780a67af 1334 elf32_arm_link_hash_newfunc))
252b5132 1335 {
e2d34d7d 1336 free (ret);
252b5132
RH
1337 return NULL;
1338 }
1339
5e681ec4
PB
1340 ret->sgot = NULL;
1341 ret->sgotplt = NULL;
1342 ret->srelgot = NULL;
1343 ret->splt = NULL;
1344 ret->srelplt = NULL;
1345 ret->sdynbss = NULL;
1346 ret->srelbss = NULL;
252b5132
RH
1347 ret->thumb_glue_size = 0;
1348 ret->arm_glue_size = 0;
1349 ret->bfd_of_glue_owner = NULL;
ba96a88f 1350 ret->no_pipeline_knowledge = 0;
e489d0ae 1351 ret->byteswap_code = 0;
9c504268 1352 ret->target1_is_rel = 0;
eb043451 1353 ret->target2_reloc = R_ARM_NONE;
e5a52504
MM
1354#ifdef FOUR_WORD_PLT
1355 ret->plt_header_size = 16;
1356 ret->plt_entry_size = 16;
1357#else
1358 ret->plt_header_size = 20;
1359 ret->plt_entry_size = 12;
1360#endif
1361 ret->symbian_p = 0;
5e681ec4 1362 ret->sym_sec.abfd = NULL;
252b5132
RH
1363
1364 return &ret->root.root;
1365}
1366
9b485d32
NC
1367/* Locate the Thumb encoded calling stub for NAME. */
1368
252b5132 1369static struct elf_link_hash_entry *
57e8b36a
NC
1370find_thumb_glue (struct bfd_link_info *link_info,
1371 const char *name,
1372 bfd *input_bfd)
252b5132
RH
1373{
1374 char *tmp_name;
1375 struct elf_link_hash_entry *hash;
1376 struct elf32_arm_link_hash_table *hash_table;
1377
1378 /* We need a pointer to the armelf specific hash table. */
1379 hash_table = elf32_arm_hash_table (link_info);
1380
57e8b36a
NC
1381 tmp_name = bfd_malloc ((bfd_size_type) strlen (name)
1382 + strlen (THUMB2ARM_GLUE_ENTRY_NAME) + 1);
252b5132
RH
1383
1384 BFD_ASSERT (tmp_name);
1385
1386 sprintf (tmp_name, THUMB2ARM_GLUE_ENTRY_NAME, name);
1387
1388 hash = elf_link_hash_lookup
b34976b6 1389 (&(hash_table)->root, tmp_name, FALSE, FALSE, TRUE);
252b5132
RH
1390
1391 if (hash == NULL)
1392 /* xgettext:c-format */
d003868e
AM
1393 (*_bfd_error_handler) (_("%B: unable to find THUMB glue '%s' for `%s'"),
1394 input_bfd, tmp_name, name);
252b5132
RH
1395
1396 free (tmp_name);
1397
1398 return hash;
1399}
1400
9b485d32
NC
1401/* Locate the ARM encoded calling stub for NAME. */
1402
252b5132 1403static struct elf_link_hash_entry *
57e8b36a
NC
1404find_arm_glue (struct bfd_link_info *link_info,
1405 const char *name,
1406 bfd *input_bfd)
252b5132
RH
1407{
1408 char *tmp_name;
1409 struct elf_link_hash_entry *myh;
1410 struct elf32_arm_link_hash_table *hash_table;
1411
1412 /* We need a pointer to the elfarm specific hash table. */
1413 hash_table = elf32_arm_hash_table (link_info);
1414
57e8b36a
NC
1415 tmp_name = bfd_malloc ((bfd_size_type) strlen (name)
1416 + strlen (ARM2THUMB_GLUE_ENTRY_NAME) + 1);
252b5132
RH
1417
1418 BFD_ASSERT (tmp_name);
1419
1420 sprintf (tmp_name, ARM2THUMB_GLUE_ENTRY_NAME, name);
1421
1422 myh = elf_link_hash_lookup
b34976b6 1423 (&(hash_table)->root, tmp_name, FALSE, FALSE, TRUE);
252b5132
RH
1424
1425 if (myh == NULL)
1426 /* xgettext:c-format */
d003868e
AM
1427 (*_bfd_error_handler) (_("%B: unable to find ARM glue '%s' for `%s'"),
1428 input_bfd, tmp_name, name);
252b5132
RH
1429
1430 free (tmp_name);
1431
1432 return myh;
1433}
1434
9b485d32 1435/* ARM->Thumb glue:
252b5132
RH
1436
1437 .arm
1438 __func_from_arm:
1439 ldr r12, __func_addr
1440 bx r12
1441 __func_addr:
9b485d32 1442 .word func @ behave as if you saw a ARM_32 reloc. */
252b5132
RH
1443
1444#define ARM2THUMB_GLUE_SIZE 12
1445static const insn32 a2t1_ldr_insn = 0xe59fc000;
1446static const insn32 a2t2_bx_r12_insn = 0xe12fff1c;
1447static const insn32 a2t3_func_addr_insn = 0x00000001;
1448
9b485d32 1449/* Thumb->ARM: Thumb->(non-interworking aware) ARM
252b5132
RH
1450
1451 .thumb .thumb
1452 .align 2 .align 2
1453 __func_from_thumb: __func_from_thumb:
1454 bx pc push {r6, lr}
1455 nop ldr r6, __func_addr
1456 .arm mov lr, pc
1457 __func_change_to_arm: bx r6
1458 b func .arm
1459 __func_back_to_thumb:
1460 ldmia r13! {r6, lr}
1461 bx lr
1462 __func_addr:
9b485d32 1463 .word func */
252b5132
RH
1464
1465#define THUMB2ARM_GLUE_SIZE 8
1466static const insn16 t2a1_bx_pc_insn = 0x4778;
1467static const insn16 t2a2_noop_insn = 0x46c0;
1468static const insn32 t2a3_b_insn = 0xea000000;
1469
7e392df6 1470#ifndef ELFARM_NABI_C_INCLUDED
b34976b6 1471bfd_boolean
57e8b36a 1472bfd_elf32_arm_allocate_interworking_sections (struct bfd_link_info * info)
252b5132
RH
1473{
1474 asection * s;
1475 bfd_byte * foo;
1476 struct elf32_arm_link_hash_table * globals;
1477
1478 globals = elf32_arm_hash_table (info);
1479
1480 BFD_ASSERT (globals != NULL);
1481
1482 if (globals->arm_glue_size != 0)
1483 {
1484 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
1485
dc810e39
AM
1486 s = bfd_get_section_by_name (globals->bfd_of_glue_owner,
1487 ARM2THUMB_GLUE_SECTION_NAME);
252b5132
RH
1488
1489 BFD_ASSERT (s != NULL);
1490
57e8b36a 1491 foo = bfd_alloc (globals->bfd_of_glue_owner, globals->arm_glue_size);
252b5132 1492
eea6121a 1493 s->size = globals->arm_glue_size;
252b5132
RH
1494 s->contents = foo;
1495 }
1496
1497 if (globals->thumb_glue_size != 0)
1498 {
1499 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
1500
1501 s = bfd_get_section_by_name
1502 (globals->bfd_of_glue_owner, THUMB2ARM_GLUE_SECTION_NAME);
1503
1504 BFD_ASSERT (s != NULL);
1505
57e8b36a 1506 foo = bfd_alloc (globals->bfd_of_glue_owner, globals->thumb_glue_size);
252b5132 1507
eea6121a 1508 s->size = globals->thumb_glue_size;
252b5132
RH
1509 s->contents = foo;
1510 }
1511
b34976b6 1512 return TRUE;
252b5132
RH
1513}
1514
1515static void
57e8b36a
NC
1516record_arm_to_thumb_glue (struct bfd_link_info * link_info,
1517 struct elf_link_hash_entry * h)
252b5132
RH
1518{
1519 const char * name = h->root.root.string;
63b0f745 1520 asection * s;
252b5132
RH
1521 char * tmp_name;
1522 struct elf_link_hash_entry * myh;
14a793b2 1523 struct bfd_link_hash_entry * bh;
252b5132 1524 struct elf32_arm_link_hash_table * globals;
dc810e39 1525 bfd_vma val;
252b5132
RH
1526
1527 globals = elf32_arm_hash_table (link_info);
1528
1529 BFD_ASSERT (globals != NULL);
1530 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
1531
1532 s = bfd_get_section_by_name
1533 (globals->bfd_of_glue_owner, ARM2THUMB_GLUE_SECTION_NAME);
1534
252b5132
RH
1535 BFD_ASSERT (s != NULL);
1536
57e8b36a 1537 tmp_name = bfd_malloc ((bfd_size_type) strlen (name) + strlen (ARM2THUMB_GLUE_ENTRY_NAME) + 1);
252b5132
RH
1538
1539 BFD_ASSERT (tmp_name);
1540
1541 sprintf (tmp_name, ARM2THUMB_GLUE_ENTRY_NAME, name);
1542
1543 myh = elf_link_hash_lookup
b34976b6 1544 (&(globals)->root, tmp_name, FALSE, FALSE, TRUE);
252b5132
RH
1545
1546 if (myh != NULL)
1547 {
9b485d32 1548 /* We've already seen this guy. */
252b5132 1549 free (tmp_name);
9b485d32 1550 return;
252b5132
RH
1551 }
1552
57e8b36a
NC
1553 /* The only trick here is using hash_table->arm_glue_size as the value.
1554 Even though the section isn't allocated yet, this is where we will be
1555 putting it. */
14a793b2 1556 bh = NULL;
dc810e39
AM
1557 val = globals->arm_glue_size + 1;
1558 _bfd_generic_link_add_one_symbol (link_info, globals->bfd_of_glue_owner,
1559 tmp_name, BSF_GLOBAL, s, val,
b34976b6 1560 NULL, TRUE, FALSE, &bh);
252b5132
RH
1561
1562 free (tmp_name);
1563
1564 globals->arm_glue_size += ARM2THUMB_GLUE_SIZE;
1565
1566 return;
1567}
1568
1569static void
57e8b36a
NC
1570record_thumb_to_arm_glue (struct bfd_link_info *link_info,
1571 struct elf_link_hash_entry *h)
252b5132
RH
1572{
1573 const char *name = h->root.root.string;
63b0f745 1574 asection *s;
252b5132
RH
1575 char *tmp_name;
1576 struct elf_link_hash_entry *myh;
14a793b2 1577 struct bfd_link_hash_entry *bh;
252b5132
RH
1578 struct elf32_arm_link_hash_table *hash_table;
1579 char bind;
dc810e39 1580 bfd_vma val;
252b5132
RH
1581
1582 hash_table = elf32_arm_hash_table (link_info);
1583
1584 BFD_ASSERT (hash_table != NULL);
1585 BFD_ASSERT (hash_table->bfd_of_glue_owner != NULL);
1586
1587 s = bfd_get_section_by_name
1588 (hash_table->bfd_of_glue_owner, THUMB2ARM_GLUE_SECTION_NAME);
1589
1590 BFD_ASSERT (s != NULL);
1591
57e8b36a
NC
1592 tmp_name = bfd_malloc ((bfd_size_type) strlen (name)
1593 + strlen (THUMB2ARM_GLUE_ENTRY_NAME) + 1);
252b5132
RH
1594
1595 BFD_ASSERT (tmp_name);
1596
1597 sprintf (tmp_name, THUMB2ARM_GLUE_ENTRY_NAME, name);
1598
1599 myh = elf_link_hash_lookup
b34976b6 1600 (&(hash_table)->root, tmp_name, FALSE, FALSE, TRUE);
252b5132
RH
1601
1602 if (myh != NULL)
1603 {
9b485d32 1604 /* We've already seen this guy. */
252b5132 1605 free (tmp_name);
9b485d32 1606 return;
252b5132
RH
1607 }
1608
14a793b2 1609 bh = NULL;
dc810e39
AM
1610 val = hash_table->thumb_glue_size + 1;
1611 _bfd_generic_link_add_one_symbol (link_info, hash_table->bfd_of_glue_owner,
1612 tmp_name, BSF_GLOBAL, s, val,
b34976b6 1613 NULL, TRUE, FALSE, &bh);
252b5132 1614
9b485d32 1615 /* If we mark it 'Thumb', the disassembler will do a better job. */
14a793b2 1616 myh = (struct elf_link_hash_entry *) bh;
252b5132
RH
1617 bind = ELF_ST_BIND (myh->type);
1618 myh->type = ELF_ST_INFO (bind, STT_ARM_TFUNC);
1619
1620 free (tmp_name);
1621
252b5132
RH
1622#define CHANGE_TO_ARM "__%s_change_to_arm"
1623#define BACK_FROM_ARM "__%s_back_from_arm"
1624
9b485d32 1625 /* Allocate another symbol to mark where we switch to Arm mode. */
57e8b36a
NC
1626 tmp_name = bfd_malloc ((bfd_size_type) strlen (name)
1627 + strlen (CHANGE_TO_ARM) + 1);
252b5132
RH
1628
1629 BFD_ASSERT (tmp_name);
1630
1631 sprintf (tmp_name, CHANGE_TO_ARM, name);
1632
14a793b2 1633 bh = NULL;
dc810e39
AM
1634 val = hash_table->thumb_glue_size + 4,
1635 _bfd_generic_link_add_one_symbol (link_info, hash_table->bfd_of_glue_owner,
1636 tmp_name, BSF_LOCAL, s, val,
b34976b6 1637 NULL, TRUE, FALSE, &bh);
252b5132
RH
1638
1639 free (tmp_name);
1640
1641 hash_table->thumb_glue_size += THUMB2ARM_GLUE_SIZE;
1642
1643 return;
1644}
1645
8afb0e02
NC
1646/* Add the glue sections to ABFD. This function is called from the
1647 linker scripts in ld/emultempl/{armelf}.em. */
9b485d32 1648
b34976b6 1649bfd_boolean
57e8b36a
NC
1650bfd_elf32_arm_add_glue_sections_to_bfd (bfd *abfd,
1651 struct bfd_link_info *info)
252b5132 1652{
252b5132
RH
1653 flagword flags;
1654 asection *sec;
1655
8afb0e02
NC
1656 /* If we are only performing a partial
1657 link do not bother adding the glue. */
1049f94e 1658 if (info->relocatable)
b34976b6 1659 return TRUE;
252b5132 1660
252b5132
RH
1661 sec = bfd_get_section_by_name (abfd, ARM2THUMB_GLUE_SECTION_NAME);
1662
1663 if (sec == NULL)
1664 {
57db232e
NC
1665 /* Note: we do not include the flag SEC_LINKER_CREATED, as this
1666 will prevent elf_link_input_bfd() from processing the contents
1667 of this section. */
811b4bf6 1668 flags = SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_CODE | SEC_READONLY;
252b5132
RH
1669
1670 sec = bfd_make_section (abfd, ARM2THUMB_GLUE_SECTION_NAME);
1671
1672 if (sec == NULL
1673 || !bfd_set_section_flags (abfd, sec, flags)
1674 || !bfd_set_section_alignment (abfd, sec, 2))
b34976b6 1675 return FALSE;
9a5aca8c 1676
57db232e
NC
1677 /* Set the gc mark to prevent the section from being removed by garbage
1678 collection, despite the fact that no relocs refer to this section. */
1679 sec->gc_mark = 1;
252b5132
RH
1680 }
1681
1682 sec = bfd_get_section_by_name (abfd, THUMB2ARM_GLUE_SECTION_NAME);
1683
1684 if (sec == NULL)
1685 {
57e8b36a
NC
1686 flags = SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1687 | SEC_CODE | SEC_READONLY;
252b5132
RH
1688
1689 sec = bfd_make_section (abfd, THUMB2ARM_GLUE_SECTION_NAME);
1690
1691 if (sec == NULL
1692 || !bfd_set_section_flags (abfd, sec, flags)
1693 || !bfd_set_section_alignment (abfd, sec, 2))
b34976b6 1694 return FALSE;
9a5aca8c 1695
57db232e 1696 sec->gc_mark = 1;
252b5132
RH
1697 }
1698
b34976b6 1699 return TRUE;
8afb0e02
NC
1700}
1701
1702/* Select a BFD to be used to hold the sections used by the glue code.
1703 This function is called from the linker scripts in ld/emultempl/
1704 {armelf/pe}.em */
1705
b34976b6 1706bfd_boolean
57e8b36a 1707bfd_elf32_arm_get_bfd_for_interworking (bfd *abfd, struct bfd_link_info *info)
8afb0e02
NC
1708{
1709 struct elf32_arm_link_hash_table *globals;
1710
1711 /* If we are only performing a partial link
1712 do not bother getting a bfd to hold the glue. */
1049f94e 1713 if (info->relocatable)
b34976b6 1714 return TRUE;
8afb0e02
NC
1715
1716 globals = elf32_arm_hash_table (info);
1717
1718 BFD_ASSERT (globals != NULL);
1719
1720 if (globals->bfd_of_glue_owner != NULL)
b34976b6 1721 return TRUE;
8afb0e02 1722
252b5132
RH
1723 /* Save the bfd for later use. */
1724 globals->bfd_of_glue_owner = abfd;
cedb70c5 1725
b34976b6 1726 return TRUE;
252b5132
RH
1727}
1728
b34976b6 1729bfd_boolean
57e8b36a
NC
1730bfd_elf32_arm_process_before_allocation (bfd *abfd,
1731 struct bfd_link_info *link_info,
1732 int no_pipeline_knowledge,
eb043451 1733 int byteswap_code)
252b5132
RH
1734{
1735 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 1736 Elf_Internal_Rela *internal_relocs = NULL;
252b5132
RH
1737 Elf_Internal_Rela *irel, *irelend;
1738 bfd_byte *contents = NULL;
252b5132
RH
1739
1740 asection *sec;
1741 struct elf32_arm_link_hash_table *globals;
1742
1743 /* If we are only performing a partial link do not bother
1744 to construct any glue. */
1049f94e 1745 if (link_info->relocatable)
b34976b6 1746 return TRUE;
252b5132
RH
1747
1748 /* Here we have a bfd that is to be included on the link. We have a hook
1749 to do reloc rummaging, before section sizes are nailed down. */
252b5132
RH
1750 globals = elf32_arm_hash_table (link_info);
1751
1752 BFD_ASSERT (globals != NULL);
1753 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
1754
ba96a88f 1755 globals->no_pipeline_knowledge = no_pipeline_knowledge;
eb043451 1756
e489d0ae
PB
1757 if (byteswap_code && !bfd_big_endian (abfd))
1758 {
d003868e
AM
1759 _bfd_error_handler (_("%B: BE8 images only valid in big-endian mode."),
1760 abfd);
e489d0ae
PB
1761 return FALSE;
1762 }
1763 globals->byteswap_code = byteswap_code;
f21f3fe0 1764
252b5132
RH
1765 /* Rummage around all the relocs and map the glue vectors. */
1766 sec = abfd->sections;
1767
1768 if (sec == NULL)
b34976b6 1769 return TRUE;
252b5132
RH
1770
1771 for (; sec != NULL; sec = sec->next)
1772 {
1773 if (sec->reloc_count == 0)
1774 continue;
1775
1776 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
252b5132 1777
9b485d32 1778 /* Load the relocs. */
6cdc0ccc 1779 internal_relocs
57e8b36a 1780 = _bfd_elf_link_read_relocs (abfd, sec, (void *) NULL,
45d6a902 1781 (Elf_Internal_Rela *) NULL, FALSE);
252b5132 1782
6cdc0ccc
AM
1783 if (internal_relocs == NULL)
1784 goto error_return;
252b5132 1785
6cdc0ccc
AM
1786 irelend = internal_relocs + sec->reloc_count;
1787 for (irel = internal_relocs; irel < irelend; irel++)
252b5132
RH
1788 {
1789 long r_type;
1790 unsigned long r_index;
252b5132
RH
1791
1792 struct elf_link_hash_entry *h;
1793
1794 r_type = ELF32_R_TYPE (irel->r_info);
1795 r_index = ELF32_R_SYM (irel->r_info);
1796
9b485d32 1797 /* These are the only relocation types we care about. */
ba96a88f 1798 if ( r_type != R_ARM_PC24
5b5bb741
PB
1799#ifndef OLD_ARM_ABI
1800 && r_type != R_ARM_CALL
1801 && r_type != R_ARM_JUMP24
1802#endif
252b5132
RH
1803 && r_type != R_ARM_THM_PC22)
1804 continue;
1805
1806 /* Get the section contents if we haven't done so already. */
1807 if (contents == NULL)
1808 {
1809 /* Get cached copy if it exists. */
1810 if (elf_section_data (sec)->this_hdr.contents != NULL)
1811 contents = elf_section_data (sec)->this_hdr.contents;
1812 else
1813 {
1814 /* Go get them off disk. */
57e8b36a 1815 if (! bfd_malloc_and_get_section (abfd, sec, &contents))
252b5132
RH
1816 goto error_return;
1817 }
1818 }
1819
a7c10850 1820 /* If the relocation is not against a symbol it cannot concern us. */
252b5132
RH
1821 h = NULL;
1822
9b485d32 1823 /* We don't care about local symbols. */
252b5132
RH
1824 if (r_index < symtab_hdr->sh_info)
1825 continue;
1826
9b485d32 1827 /* This is an external symbol. */
252b5132
RH
1828 r_index -= symtab_hdr->sh_info;
1829 h = (struct elf_link_hash_entry *)
1830 elf_sym_hashes (abfd)[r_index];
1831
1832 /* If the relocation is against a static symbol it must be within
1833 the current section and so cannot be a cross ARM/Thumb relocation. */
1834 if (h == NULL)
1835 continue;
1836
1837 switch (r_type)
1838 {
1839 case R_ARM_PC24:
5b5bb741
PB
1840#ifndef OLD_ARM_ABI
1841 case R_ARM_CALL:
1842 case R_ARM_JUMP24:
1843#endif
252b5132 1844 /* This one is a call from arm code. We need to look up
2f0ca46a 1845 the target of the call. If it is a thumb target, we
252b5132 1846 insert glue. */
252b5132
RH
1847 if (ELF_ST_TYPE(h->type) == STT_ARM_TFUNC)
1848 record_arm_to_thumb_glue (link_info, h);
1849 break;
1850
1851 case R_ARM_THM_PC22:
f21f3fe0 1852 /* This one is a call from thumb code. We look
2f0ca46a 1853 up the target of the call. If it is not a thumb
bcbdc74c 1854 target, we insert glue. */
252b5132
RH
1855 if (ELF_ST_TYPE (h->type) != STT_ARM_TFUNC)
1856 record_thumb_to_arm_glue (link_info, h);
1857 break;
1858
1859 default:
1860 break;
1861 }
1862 }
6cdc0ccc
AM
1863
1864 if (contents != NULL
1865 && elf_section_data (sec)->this_hdr.contents != contents)
1866 free (contents);
1867 contents = NULL;
1868
1869 if (internal_relocs != NULL
1870 && elf_section_data (sec)->relocs != internal_relocs)
1871 free (internal_relocs);
1872 internal_relocs = NULL;
252b5132
RH
1873 }
1874
b34976b6 1875 return TRUE;
9a5aca8c 1876
252b5132 1877error_return:
6cdc0ccc
AM
1878 if (contents != NULL
1879 && elf_section_data (sec)->this_hdr.contents != contents)
1880 free (contents);
1881 if (internal_relocs != NULL
1882 && elf_section_data (sec)->relocs != internal_relocs)
1883 free (internal_relocs);
9a5aca8c 1884
b34976b6 1885 return FALSE;
252b5132 1886}
7e392df6 1887#endif
252b5132 1888
eb043451
PB
1889
1890#ifndef OLD_ARM_ABI
1891/* Set target relocation values needed during linking. */
1892
1893void
1894bfd_elf32_arm_set_target_relocs (struct bfd_link_info *link_info,
1895 int target1_is_rel,
1896 char * target2_type)
1897{
1898 struct elf32_arm_link_hash_table *globals;
1899
1900 globals = elf32_arm_hash_table (link_info);
1901
1902 globals->target1_is_rel = target1_is_rel;
1903 if (strcmp (target2_type, "rel") == 0)
1904 globals->target2_reloc = R_ARM_REL32;
eeac373a
PB
1905 else if (strcmp (target2_type, "abs") == 0)
1906 globals->target2_reloc = R_ARM_ABS32;
eb043451
PB
1907 else if (strcmp (target2_type, "got-rel") == 0)
1908 globals->target2_reloc = R_ARM_GOT_PREL;
1909 else
1910 {
1911 _bfd_error_handler (_("Invalid TARGET2 relocation type '%s'."),
1912 target2_type);
1913 }
1914}
1915#endif
1916
252b5132
RH
1917/* The thumb form of a long branch is a bit finicky, because the offset
1918 encoding is split over two fields, each in it's own instruction. They
f21f3fe0 1919 can occur in any order. So given a thumb form of long branch, and an
252b5132 1920 offset, insert the offset into the thumb branch and return finished
f21f3fe0 1921 instruction.
252b5132 1922
f21f3fe0 1923 It takes two thumb instructions to encode the target address. Each has
4cc11e76 1924 11 bits to invest. The upper 11 bits are stored in one (identified by
f21f3fe0
UD
1925 H-0.. see below), the lower 11 bits are stored in the other (identified
1926 by H-1).
252b5132 1927
f21f3fe0 1928 Combine together and shifted left by 1 (it's a half word address) and
252b5132
RH
1929 there you have it.
1930
1931 Op: 1111 = F,
1932 H-0, upper address-0 = 000
1933 Op: 1111 = F,
1934 H-1, lower address-0 = 800
1935
f21f3fe0 1936 They can be ordered either way, but the arm tools I've seen always put
252b5132
RH
1937 the lower one first. It probably doesn't matter. krk@cygnus.com
1938
1939 XXX: Actually the order does matter. The second instruction (H-1)
1940 moves the computed address into the PC, so it must be the second one
1941 in the sequence. The problem, however is that whilst little endian code
1942 stores the instructions in HI then LOW order, big endian code does the
dfc5f959 1943 reverse. nickc@cygnus.com. */
252b5132 1944
dfc5f959
NC
1945#define LOW_HI_ORDER 0xF800F000
1946#define HI_LOW_ORDER 0xF000F800
252b5132
RH
1947
1948static insn32
57e8b36a 1949insert_thumb_branch (insn32 br_insn, int rel_off)
252b5132
RH
1950{
1951 unsigned int low_bits;
1952 unsigned int high_bits;
1953
252b5132
RH
1954 BFD_ASSERT ((rel_off & 1) != 1);
1955
dfc5f959
NC
1956 rel_off >>= 1; /* Half word aligned address. */
1957 low_bits = rel_off & 0x000007FF; /* The bottom 11 bits. */
1958 high_bits = (rel_off >> 11) & 0x000007FF; /* The top 11 bits. */
252b5132
RH
1959
1960 if ((br_insn & LOW_HI_ORDER) == LOW_HI_ORDER)
1961 br_insn = LOW_HI_ORDER | (low_bits << 16) | high_bits;
1962 else if ((br_insn & HI_LOW_ORDER) == HI_LOW_ORDER)
1963 br_insn = HI_LOW_ORDER | (high_bits << 16) | low_bits;
1964 else
9b485d32 1965 /* FIXME: abort is probably not the right call. krk@cygnus.com */
57e8b36a 1966 abort (); /* Error - not a valid branch instruction form. */
252b5132 1967
252b5132
RH
1968 return br_insn;
1969}
1970
9b485d32
NC
1971/* Thumb code calling an ARM function. */
1972
252b5132 1973static int
57e8b36a
NC
1974elf32_thumb_to_arm_stub (struct bfd_link_info * info,
1975 const char * name,
1976 bfd * input_bfd,
1977 bfd * output_bfd,
1978 asection * input_section,
1979 bfd_byte * hit_data,
1980 asection * sym_sec,
1981 bfd_vma offset,
1982 bfd_signed_vma addend,
1983 bfd_vma val)
252b5132 1984{
bcbdc74c 1985 asection * s = 0;
dc810e39 1986 bfd_vma my_offset;
252b5132
RH
1987 unsigned long int tmp;
1988 long int ret_offset;
bcbdc74c
NC
1989 struct elf_link_hash_entry * myh;
1990 struct elf32_arm_link_hash_table * globals;
252b5132
RH
1991
1992 myh = find_thumb_glue (info, name, input_bfd);
1993 if (myh == NULL)
b34976b6 1994 return FALSE;
252b5132
RH
1995
1996 globals = elf32_arm_hash_table (info);
1997
1998 BFD_ASSERT (globals != NULL);
1999 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
2000
2001 my_offset = myh->root.u.def.value;
2002
2003 s = bfd_get_section_by_name (globals->bfd_of_glue_owner,
2004 THUMB2ARM_GLUE_SECTION_NAME);
2005
2006 BFD_ASSERT (s != NULL);
2007 BFD_ASSERT (s->contents != NULL);
2008 BFD_ASSERT (s->output_section != NULL);
2009
2010 if ((my_offset & 0x01) == 0x01)
2011 {
2012 if (sym_sec != NULL
2013 && sym_sec->owner != NULL
2014 && !INTERWORK_FLAG (sym_sec->owner))
2015 {
8f615d07 2016 (*_bfd_error_handler)
d003868e
AM
2017 (_("%B(%s): warning: interworking not enabled.\n"
2018 " first occurrence: %B: thumb call to arm"),
2019 sym_sec->owner, input_bfd, name);
252b5132 2020
b34976b6 2021 return FALSE;
252b5132
RH
2022 }
2023
2024 --my_offset;
2025 myh->root.u.def.value = my_offset;
2026
dc810e39 2027 bfd_put_16 (output_bfd, (bfd_vma) t2a1_bx_pc_insn,
252b5132
RH
2028 s->contents + my_offset);
2029
dc810e39 2030 bfd_put_16 (output_bfd, (bfd_vma) t2a2_noop_insn,
252b5132
RH
2031 s->contents + my_offset + 2);
2032
2033 ret_offset =
9b485d32
NC
2034 /* Address of destination of the stub. */
2035 ((bfd_signed_vma) val)
252b5132 2036 - ((bfd_signed_vma)
57e8b36a
NC
2037 /* Offset from the start of the current section
2038 to the start of the stubs. */
9b485d32
NC
2039 (s->output_offset
2040 /* Offset of the start of this stub from the start of the stubs. */
2041 + my_offset
2042 /* Address of the start of the current section. */
2043 + s->output_section->vma)
2044 /* The branch instruction is 4 bytes into the stub. */
2045 + 4
2046 /* ARM branches work from the pc of the instruction + 8. */
2047 + 8);
252b5132
RH
2048
2049 bfd_put_32 (output_bfd,
dc810e39 2050 (bfd_vma) t2a3_b_insn | ((ret_offset >> 2) & 0x00FFFFFF),
252b5132
RH
2051 s->contents + my_offset + 4);
2052 }
2053
2054 BFD_ASSERT (my_offset <= globals->thumb_glue_size);
2055
427bfd90
NC
2056 /* Now go back and fix up the original BL insn to point to here. */
2057 ret_offset =
2058 /* Address of where the stub is located. */
2059 (s->output_section->vma + s->output_offset + my_offset)
2060 /* Address of where the BL is located. */
57e8b36a
NC
2061 - (input_section->output_section->vma + input_section->output_offset
2062 + offset)
427bfd90
NC
2063 /* Addend in the relocation. */
2064 - addend
2065 /* Biassing for PC-relative addressing. */
2066 - 8;
252b5132
RH
2067
2068 tmp = bfd_get_32 (input_bfd, hit_data
2069 - input_section->vma);
2070
2071 bfd_put_32 (output_bfd,
dc810e39 2072 (bfd_vma) insert_thumb_branch (tmp, ret_offset),
252b5132
RH
2073 hit_data - input_section->vma);
2074
b34976b6 2075 return TRUE;
252b5132
RH
2076}
2077
9b485d32
NC
2078/* Arm code calling a Thumb function. */
2079
252b5132 2080static int
57e8b36a
NC
2081elf32_arm_to_thumb_stub (struct bfd_link_info * info,
2082 const char * name,
2083 bfd * input_bfd,
2084 bfd * output_bfd,
2085 asection * input_section,
2086 bfd_byte * hit_data,
2087 asection * sym_sec,
2088 bfd_vma offset,
2089 bfd_signed_vma addend,
2090 bfd_vma val)
252b5132
RH
2091{
2092 unsigned long int tmp;
dc810e39 2093 bfd_vma my_offset;
bcbdc74c 2094 asection * s;
252b5132 2095 long int ret_offset;
bcbdc74c
NC
2096 struct elf_link_hash_entry * myh;
2097 struct elf32_arm_link_hash_table * globals;
252b5132
RH
2098
2099 myh = find_arm_glue (info, name, input_bfd);
2100 if (myh == NULL)
b34976b6 2101 return FALSE;
252b5132
RH
2102
2103 globals = elf32_arm_hash_table (info);
2104
2105 BFD_ASSERT (globals != NULL);
2106 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
2107
2108 my_offset = myh->root.u.def.value;
2109 s = bfd_get_section_by_name (globals->bfd_of_glue_owner,
2110 ARM2THUMB_GLUE_SECTION_NAME);
2111 BFD_ASSERT (s != NULL);
2112 BFD_ASSERT (s->contents != NULL);
2113 BFD_ASSERT (s->output_section != NULL);
2114
2115 if ((my_offset & 0x01) == 0x01)
2116 {
2117 if (sym_sec != NULL
2118 && sym_sec->owner != NULL
2119 && !INTERWORK_FLAG (sym_sec->owner))
2120 {
8f615d07 2121 (*_bfd_error_handler)
d003868e
AM
2122 (_("%B(%s): warning: interworking not enabled.\n"
2123 " first occurrence: %B: arm call to thumb"),
2124 sym_sec->owner, input_bfd, name);
252b5132 2125 }
9b485d32 2126
252b5132
RH
2127 --my_offset;
2128 myh->root.u.def.value = my_offset;
2129
dc810e39 2130 bfd_put_32 (output_bfd, (bfd_vma) a2t1_ldr_insn,
252b5132
RH
2131 s->contents + my_offset);
2132
dc810e39 2133 bfd_put_32 (output_bfd, (bfd_vma) a2t2_bx_r12_insn,
252b5132
RH
2134 s->contents + my_offset + 4);
2135
2136 /* It's a thumb address. Add the low order bit. */
2137 bfd_put_32 (output_bfd, val | a2t3_func_addr_insn,
2138 s->contents + my_offset + 8);
2139 }
2140
2141 BFD_ASSERT (my_offset <= globals->arm_glue_size);
2142
2143 tmp = bfd_get_32 (input_bfd, hit_data);
2144 tmp = tmp & 0xFF000000;
2145
9b485d32 2146 /* Somehow these are both 4 too far, so subtract 8. */
dc810e39
AM
2147 ret_offset = (s->output_offset
2148 + my_offset
2149 + s->output_section->vma
2150 - (input_section->output_offset
2151 + input_section->output_section->vma
2152 + offset + addend)
2153 - 8);
9a5aca8c 2154
252b5132
RH
2155 tmp = tmp | ((ret_offset >> 2) & 0x00FFFFFF);
2156
dc810e39 2157 bfd_put_32 (output_bfd, (bfd_vma) tmp, hit_data - input_section->vma);
252b5132 2158
b34976b6 2159 return TRUE;
252b5132
RH
2160}
2161
eb043451
PB
2162
2163#ifndef OLD_ARM_ABI
2164/* Some relocations map to different relocations depending on the
2165 target. Return the real relocation. */
2166static int
2167arm_real_reloc_type (struct elf32_arm_link_hash_table * globals,
2168 int r_type)
2169{
2170 switch (r_type)
2171 {
2172 case R_ARM_TARGET1:
2173 if (globals->target1_is_rel)
2174 return R_ARM_REL32;
2175 else
2176 return R_ARM_ABS32;
2177
2178 case R_ARM_TARGET2:
2179 return globals->target2_reloc;
2180
2181 default:
2182 return r_type;
2183 }
2184}
2185#endif /* OLD_ARM_ABI */
2186
2187
252b5132 2188/* Perform a relocation as part of a final link. */
9b485d32 2189
252b5132 2190static bfd_reloc_status_type
57e8b36a
NC
2191elf32_arm_final_link_relocate (reloc_howto_type * howto,
2192 bfd * input_bfd,
2193 bfd * output_bfd,
2194 asection * input_section,
2195 bfd_byte * contents,
2196 Elf_Internal_Rela * rel,
2197 bfd_vma value,
2198 struct bfd_link_info * info,
2199 asection * sym_sec,
2200 const char * sym_name,
2201 int sym_flags,
2202 struct elf_link_hash_entry * h)
252b5132
RH
2203{
2204 unsigned long r_type = howto->type;
2205 unsigned long r_symndx;
2206 bfd_byte * hit_data = contents + rel->r_offset;
2207 bfd * dynobj = NULL;
2208 Elf_Internal_Shdr * symtab_hdr;
2209 struct elf_link_hash_entry ** sym_hashes;
2210 bfd_vma * local_got_offsets;
2211 asection * sgot = NULL;
2212 asection * splt = NULL;
2213 asection * sreloc = NULL;
252b5132 2214 bfd_vma addend;
ba96a88f
NC
2215 bfd_signed_vma signed_addend;
2216 struct elf32_arm_link_hash_table * globals;
f21f3fe0 2217
9c504268
PB
2218 globals = elf32_arm_hash_table (info);
2219
2220#ifndef OLD_ARM_ABI
2221 /* Some relocation type map to different relocations depending on the
2222 target. We pick the right one here. */
eb043451
PB
2223 r_type = arm_real_reloc_type (globals, r_type);
2224 if (r_type != howto->type)
2225 howto = elf32_arm_howto_from_type (r_type);
9c504268
PB
2226#endif /* OLD_ARM_ABI */
2227
cac15327
NC
2228 /* If the start address has been set, then set the EF_ARM_HASENTRY
2229 flag. Setting this more than once is redundant, but the cost is
2230 not too high, and it keeps the code simple.
99e4ae17 2231
cac15327
NC
2232 The test is done here, rather than somewhere else, because the
2233 start address is only set just before the final link commences.
2234
2235 Note - if the user deliberately sets a start address of 0, the
2236 flag will not be set. */
2237 if (bfd_get_start_address (output_bfd) != 0)
2238 elf_elfheader (output_bfd)->e_flags |= EF_ARM_HASENTRY;
99e4ae17 2239
252b5132
RH
2240 dynobj = elf_hash_table (info)->dynobj;
2241 if (dynobj)
2242 {
2243 sgot = bfd_get_section_by_name (dynobj, ".got");
2244 splt = bfd_get_section_by_name (dynobj, ".plt");
2245 }
2246 symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr;
2247 sym_hashes = elf_sym_hashes (input_bfd);
2248 local_got_offsets = elf_local_got_offsets (input_bfd);
2249 r_symndx = ELF32_R_SYM (rel->r_info);
2250
acf8aed4 2251#if USE_REL
ba96a88f
NC
2252 addend = bfd_get_32 (input_bfd, hit_data) & howto->src_mask;
2253
2254 if (addend & ((howto->src_mask + 1) >> 1))
2255 {
2256 signed_addend = -1;
2257 signed_addend &= ~ howto->src_mask;
2258 signed_addend |= addend;
2259 }
2260 else
2261 signed_addend = addend;
252b5132 2262#else
ba96a88f 2263 addend = signed_addend = rel->r_addend;
252b5132 2264#endif
f21f3fe0 2265
252b5132
RH
2266 switch (r_type)
2267 {
2268 case R_ARM_NONE:
2269 return bfd_reloc_ok;
2270
2271 case R_ARM_PC24:
2272 case R_ARM_ABS32:
2273 case R_ARM_REL32:
dfc5f959 2274#ifndef OLD_ARM_ABI
5b5bb741
PB
2275 case R_ARM_CALL:
2276 case R_ARM_JUMP24:
dfc5f959 2277 case R_ARM_XPC25:
eb043451 2278 case R_ARM_PREL31:
dfc5f959 2279#endif
7359ea65 2280 case R_ARM_PLT32:
5e681ec4
PB
2281 /* r_symndx will be zero only for relocs against symbols
2282 from removed linkonce sections, or sections discarded by
2283 a linker script. */
2284 if (r_symndx == 0)
2285 return bfd_reloc_ok;
2286
7359ea65
DJ
2287 /* Handle relocations which should use the PLT entry. ABS32/REL32
2288 will use the symbol's value, which may point to a PLT entry, but we
2289 don't need to handle that here. If we created a PLT entry, all
2290 branches in this object should go to it. */
ee06dc07 2291 if ((r_type != R_ARM_ABS32 && r_type != R_ARM_REL32)
7359ea65 2292 && h != NULL
c84cd8ee 2293 && splt != NULL
7359ea65
DJ
2294 && h->plt.offset != (bfd_vma) -1)
2295 {
c84cd8ee
DJ
2296 /* If we've created a .plt section, and assigned a PLT entry to
2297 this function, it should not be known to bind locally. If
2298 it were, we would have cleared the PLT entry. */
7359ea65
DJ
2299 BFD_ASSERT (!SYMBOL_CALLS_LOCAL (info, h));
2300
2301 value = (splt->output_section->vma
2302 + splt->output_offset
2303 + h->plt.offset);
2304 return _bfd_final_link_relocate (howto, input_bfd, input_section,
2305 contents, rel->r_offset, value,
2306 (bfd_vma) 0);
2307 }
2308
252b5132 2309 /* When generating a shared object, these relocations are copied
9b485d32 2310 into the output file to be resolved at run time. */
7359ea65
DJ
2311 if (info->shared
2312 && (input_section->flags & SEC_ALLOC)
ee06dc07
PB
2313 && (r_type != R_ARM_REL32
2314 || !SYMBOL_CALLS_LOCAL (info, h))
7359ea65
DJ
2315 && (h == NULL
2316 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2317 || h->root.type != bfd_link_hash_undefweak)
2318 && r_type != R_ARM_PC24
5b5bb741
PB
2319#ifndef OLD_ARM_ABI
2320 && r_type != R_ARM_CALL
2321 && r_type != R_ARM_JUMP24
ee06dc07 2322 && r_type != R_ARM_PREL31
5b5bb741 2323#endif
7359ea65 2324 && r_type != R_ARM_PLT32)
252b5132 2325 {
947216bf
AM
2326 Elf_Internal_Rela outrel;
2327 bfd_byte *loc;
b34976b6 2328 bfd_boolean skip, relocate;
f21f3fe0 2329
252b5132
RH
2330 if (sreloc == NULL)
2331 {
2332 const char * name;
f21f3fe0 2333
252b5132
RH
2334 name = (bfd_elf_string_from_elf_section
2335 (input_bfd,
2336 elf_elfheader (input_bfd)->e_shstrndx,
2337 elf_section_data (input_section)->rel_hdr.sh_name));
2338 if (name == NULL)
2339 return bfd_reloc_notsupported;
f21f3fe0 2340
252b5132
RH
2341 BFD_ASSERT (strncmp (name, ".rel", 4) == 0
2342 && strcmp (bfd_get_section_name (input_bfd,
2343 input_section),
2344 name + 4) == 0);
f21f3fe0 2345
252b5132
RH
2346 sreloc = bfd_get_section_by_name (dynobj, name);
2347 BFD_ASSERT (sreloc != NULL);
2348 }
f21f3fe0 2349
b34976b6
AM
2350 skip = FALSE;
2351 relocate = FALSE;
f21f3fe0 2352
c629eae0
JJ
2353 outrel.r_offset =
2354 _bfd_elf_section_offset (output_bfd, info, input_section,
2355 rel->r_offset);
2356 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 2357 skip = TRUE;
0bb2d96a 2358 else if (outrel.r_offset == (bfd_vma) -2)
b34976b6 2359 skip = TRUE, relocate = TRUE;
252b5132
RH
2360 outrel.r_offset += (input_section->output_section->vma
2361 + input_section->output_offset);
f21f3fe0 2362
252b5132 2363 if (skip)
0bb2d96a 2364 memset (&outrel, 0, sizeof outrel);
5e681ec4
PB
2365 else if (h != NULL
2366 && h->dynindx != -1
7359ea65 2367 && (!info->shared
5e681ec4 2368 || !info->symbolic
f5385ebf 2369 || !h->def_regular))
5e681ec4 2370 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
252b5132
RH
2371 else
2372 {
a16385dc
MM
2373 int symbol;
2374
5e681ec4
PB
2375 /* This symbol is local, or marked to become local. */
2376 relocate = TRUE;
a16385dc 2377 if (globals->symbian_p)
6366ff1e
MM
2378 {
2379 /* On Symbian OS, the data segment and text segement
2380 can be relocated independently. Therefore, we
2381 must indicate the segment to which this
2382 relocation is relative. The BPABI allows us to
2383 use any symbol in the right segment; we just use
2384 the section symbol as it is convenient. (We
2385 cannot use the symbol given by "h" directly as it
2386 will not appear in the dynamic symbol table.) */
2387 symbol = elf_section_data (sym_sec->output_section)->dynindx;
2388 BFD_ASSERT (symbol != 0);
2389 }
a16385dc
MM
2390 else
2391 /* On SVR4-ish systems, the dynamic loader cannot
2392 relocate the text and data segments independently,
2393 so the symbol does not matter. */
2394 symbol = 0;
2395 outrel.r_info = ELF32_R_INFO (symbol, R_ARM_RELATIVE);
252b5132 2396 }
f21f3fe0 2397
947216bf
AM
2398 loc = sreloc->contents;
2399 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rel);
2400 bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
9a5aca8c 2401
f21f3fe0 2402 /* If this reloc is against an external symbol, we do not want to
252b5132 2403 fiddle with the addend. Otherwise, we need to include the symbol
9b485d32 2404 value so that it becomes an addend for the dynamic reloc. */
252b5132
RH
2405 if (! relocate)
2406 return bfd_reloc_ok;
9a5aca8c 2407
f21f3fe0 2408 return _bfd_final_link_relocate (howto, input_bfd, input_section,
252b5132
RH
2409 contents, rel->r_offset, value,
2410 (bfd_vma) 0);
2411 }
2412 else switch (r_type)
2413 {
dfc5f959
NC
2414#ifndef OLD_ARM_ABI
2415 case R_ARM_XPC25: /* Arm BLX instruction. */
5b5bb741
PB
2416 case R_ARM_CALL:
2417 case R_ARM_JUMP24:
dfc5f959
NC
2418#endif
2419 case R_ARM_PC24: /* Arm B/BL instruction */
7359ea65 2420 case R_ARM_PLT32:
dfc5f959
NC
2421#ifndef OLD_ARM_ABI
2422 if (r_type == R_ARM_XPC25)
252b5132 2423 {
dfc5f959
NC
2424 /* Check for Arm calling Arm function. */
2425 /* FIXME: Should we translate the instruction into a BL
2426 instruction instead ? */
2427 if (sym_flags != STT_ARM_TFUNC)
d003868e
AM
2428 (*_bfd_error_handler)
2429 (_("\%B: Warning: Arm BLX instruction targets Arm function '%s'."),
2430 input_bfd,
2431 h ? h->root.root.string : "(local)");
dfc5f959
NC
2432 }
2433 else
2434#endif
2435 {
2436 /* Check for Arm calling Thumb function. */
2437 if (sym_flags == STT_ARM_TFUNC)
2438 {
57e8b36a
NC
2439 elf32_arm_to_thumb_stub (info, sym_name, input_bfd,
2440 output_bfd, input_section,
2441 hit_data, sym_sec, rel->r_offset,
dfc5f959
NC
2442 signed_addend, value);
2443 return bfd_reloc_ok;
2444 }
252b5132 2445 }
ba96a88f
NC
2446
2447 if ( strcmp (bfd_get_target (input_bfd), "elf32-littlearm-oabi") == 0
2448 || strcmp (bfd_get_target (input_bfd), "elf32-bigarm-oabi") == 0)
2449 {
2450 /* The old way of doing things. Trearing the addend as a
2451 byte sized field and adding in the pipeline offset. */
ba96a88f
NC
2452 value -= (input_section->output_section->vma
2453 + input_section->output_offset);
2454 value -= rel->r_offset;
2455 value += addend;
f21f3fe0 2456
ba96a88f
NC
2457 if (! globals->no_pipeline_knowledge)
2458 value -= 8;
2459 }
2460 else
2461 {
2462 /* The ARM ELF ABI says that this reloc is computed as: S - P + A
2463 where:
2464 S is the address of the symbol in the relocation.
2465 P is address of the instruction being relocated.
2466 A is the addend (extracted from the instruction) in bytes.
f21f3fe0 2467
ba96a88f 2468 S is held in 'value'.
57e8b36a
NC
2469 P is the base address of the section containing the
2470 instruction plus the offset of the reloc into that
2471 section, ie:
ba96a88f
NC
2472 (input_section->output_section->vma +
2473 input_section->output_offset +
2474 rel->r_offset).
2475 A is the addend, converted into bytes, ie:
2476 (signed_addend * 4)
2477
2478 Note: None of these operations have knowledge of the pipeline
57e8b36a
NC
2479 size of the processor, thus it is up to the assembler to
2480 encode this information into the addend. */
ba96a88f
NC
2481 value -= (input_section->output_section->vma
2482 + input_section->output_offset);
2483 value -= rel->r_offset;
2484 value += (signed_addend << howto->size);
f21f3fe0 2485
57e8b36a
NC
2486 /* Previous versions of this code also used to add in the
2487 pipeline offset here. This is wrong because the linker is
2488 not supposed to know about such things, and one day it might
2489 change. In order to support old binaries that need the old
2490 behaviour however, so we attempt to detect which ABI was
2491 used to create the reloc. */
ba96a88f 2492 if (! globals->no_pipeline_knowledge)
f21f3fe0 2493 {
ba96a88f 2494 Elf_Internal_Ehdr * i_ehdrp; /* Elf file header, internal form */
f21f3fe0 2495
ba96a88f 2496 i_ehdrp = elf_elfheader (input_bfd);
f21f3fe0 2497
ba96a88f
NC
2498 if (i_ehdrp->e_ident[EI_OSABI] == 0)
2499 value -= 8;
2500 }
2501 }
23080146 2502
dcb5e6e6
NC
2503 signed_addend = value;
2504 signed_addend >>= howto->rightshift;
9a5aca8c 2505
59f2c4e7
NC
2506 /* It is not an error for an undefined weak reference to be
2507 out of range. Any program that branches to such a symbol
9a5aca8c
AM
2508 is going to crash anyway, so there is no point worrying
2509 about getting the destination exactly right. */
59f2c4e7
NC
2510 if (! h || h->root.type != bfd_link_hash_undefweak)
2511 {
9b485d32 2512 /* Perform a signed range check. */
dcb5e6e6 2513 if ( signed_addend > ((bfd_signed_vma) (howto->dst_mask >> 1))
59f2c4e7
NC
2514 || signed_addend < - ((bfd_signed_vma) ((howto->dst_mask + 1) >> 1)))
2515 return bfd_reloc_overflow;
2516 }
9a5aca8c 2517
dcb5e6e6
NC
2518#ifndef OLD_ARM_ABI
2519 /* If necessary set the H bit in the BLX instruction. */
2520 if (r_type == R_ARM_XPC25 && ((value & 2) == 2))
2521 value = (signed_addend & howto->dst_mask)
2522 | (bfd_get_32 (input_bfd, hit_data) & (~ howto->dst_mask))
2523 | (1 << 24);
2524 else
2525#endif
2526 value = (signed_addend & howto->dst_mask)
2527 | (bfd_get_32 (input_bfd, hit_data) & (~ howto->dst_mask));
252b5132 2528 break;
f21f3fe0 2529
252b5132
RH
2530 case R_ARM_ABS32:
2531 value += addend;
2532 if (sym_flags == STT_ARM_TFUNC)
2533 value |= 1;
2534 break;
f21f3fe0 2535
252b5132
RH
2536 case R_ARM_REL32:
2537 value -= (input_section->output_section->vma
62efb346 2538 + input_section->output_offset + rel->r_offset);
252b5132
RH
2539 value += addend;
2540 break;
eb043451
PB
2541
2542#ifndef OLD_ARM_ABI
2543 case R_ARM_PREL31:
2544 value -= (input_section->output_section->vma
2545 + input_section->output_offset + rel->r_offset);
2546 value += signed_addend;
2547 if (! h || h->root.type != bfd_link_hash_undefweak)
2548 {
2549 /* Check for overflow */
2550 if ((value ^ (value >> 1)) & (1 << 30))
2551 return bfd_reloc_overflow;
2552 }
2553 value &= 0x7fffffff;
2554 value |= (bfd_get_32 (input_bfd, hit_data) & 0x80000000);
2555 if (sym_flags == STT_ARM_TFUNC)
2556 value |= 1;
2557 break;
2558#endif
252b5132 2559 }
f21f3fe0 2560
252b5132
RH
2561 bfd_put_32 (input_bfd, value, hit_data);
2562 return bfd_reloc_ok;
2563
2564 case R_ARM_ABS8:
2565 value += addend;
2566 if ((long) value > 0x7f || (long) value < -0x80)
2567 return bfd_reloc_overflow;
2568
2569 bfd_put_8 (input_bfd, value, hit_data);
2570 return bfd_reloc_ok;
2571
2572 case R_ARM_ABS16:
2573 value += addend;
2574
2575 if ((long) value > 0x7fff || (long) value < -0x8000)
2576 return bfd_reloc_overflow;
2577
2578 bfd_put_16 (input_bfd, value, hit_data);
2579 return bfd_reloc_ok;
2580
2581 case R_ARM_ABS12:
2582 /* Support ldr and str instruction for the arm */
2583 /* Also thumb b (unconditional branch). ??? Really? */
2584 value += addend;
2585
2586 if ((long) value > 0x7ff || (long) value < -0x800)
2587 return bfd_reloc_overflow;
2588
2589 value |= (bfd_get_32 (input_bfd, hit_data) & 0xfffff000);
2590 bfd_put_32 (input_bfd, value, hit_data);
2591 return bfd_reloc_ok;
2592
2593 case R_ARM_THM_ABS5:
9b485d32 2594 /* Support ldr and str instructions for the thumb. */
acf8aed4 2595#if USE_REL
252b5132
RH
2596 /* Need to refetch addend. */
2597 addend = bfd_get_16 (input_bfd, hit_data) & howto->src_mask;
2598 /* ??? Need to determine shift amount from operand size. */
2599 addend >>= howto->rightshift;
2600#endif
2601 value += addend;
2602
2603 /* ??? Isn't value unsigned? */
2604 if ((long) value > 0x1f || (long) value < -0x10)
2605 return bfd_reloc_overflow;
2606
2607 /* ??? Value needs to be properly shifted into place first. */
2608 value |= bfd_get_16 (input_bfd, hit_data) & 0xf83f;
2609 bfd_put_16 (input_bfd, value, hit_data);
2610 return bfd_reloc_ok;
2611
dfc5f959
NC
2612#ifndef OLD_ARM_ABI
2613 case R_ARM_THM_XPC22:
2614#endif
252b5132 2615 case R_ARM_THM_PC22:
dfc5f959 2616 /* Thumb BL (branch long instruction). */
252b5132 2617 {
b34976b6
AM
2618 bfd_vma relocation;
2619 bfd_boolean overflow = FALSE;
2620 bfd_vma upper_insn = bfd_get_16 (input_bfd, hit_data);
2621 bfd_vma lower_insn = bfd_get_16 (input_bfd, hit_data + 2);
df212a7e 2622 bfd_signed_vma reloc_signed_max = ((1 << (howto->bitsize - 1)) - 1) >> howto->rightshift;
ba96a88f 2623 bfd_signed_vma reloc_signed_min = ~ reloc_signed_max;
b34976b6 2624 bfd_vma check;
252b5132 2625 bfd_signed_vma signed_check;
252b5132 2626
acf8aed4 2627#if USE_REL
252b5132
RH
2628 /* Need to refetch the addend and squish the two 11 bit pieces
2629 together. */
2630 {
ba96a88f
NC
2631 bfd_vma upper = upper_insn & 0x7ff;
2632 bfd_vma lower = lower_insn & 0x7ff;
9b485d32 2633 upper = (upper ^ 0x400) - 0x400; /* Sign extend. */
252b5132 2634 addend = (upper << 12) | (lower << 1);
ba96a88f 2635 signed_addend = addend;
252b5132
RH
2636 }
2637#endif
dfc5f959
NC
2638#ifndef OLD_ARM_ABI
2639 if (r_type == R_ARM_THM_XPC22)
2640 {
2641 /* Check for Thumb to Thumb call. */
2642 /* FIXME: Should we translate the instruction into a BL
2643 instruction instead ? */
2644 if (sym_flags == STT_ARM_TFUNC)
d003868e
AM
2645 (*_bfd_error_handler)
2646 (_("%B: Warning: Thumb BLX instruction targets thumb function '%s'."),
2647 input_bfd,
2648 h ? h->root.root.string : "(local)");
dfc5f959
NC
2649 }
2650 else
2651#endif
252b5132 2652 {
dfc5f959
NC
2653 /* If it is not a call to Thumb, assume call to Arm.
2654 If it is a call relative to a section name, then it is not a
2655 function call at all, but rather a long jump. */
2656 if (sym_flags != STT_ARM_TFUNC && sym_flags != STT_SECTION)
2657 {
2658 if (elf32_thumb_to_arm_stub
2659 (info, sym_name, input_bfd, output_bfd, input_section,
2660 hit_data, sym_sec, rel->r_offset, signed_addend, value))
2661 return bfd_reloc_ok;
2662 else
2663 return bfd_reloc_dangerous;
2664 }
252b5132 2665 }
f21f3fe0 2666
ba96a88f 2667 relocation = value + signed_addend;
f21f3fe0 2668
252b5132 2669 relocation -= (input_section->output_section->vma
ba96a88f
NC
2670 + input_section->output_offset
2671 + rel->r_offset);
9a5aca8c 2672
ba96a88f
NC
2673 if (! globals->no_pipeline_knowledge)
2674 {
9b485d32 2675 Elf_Internal_Ehdr * i_ehdrp; /* Elf file header, internal form. */
9a5aca8c 2676
ba96a88f 2677 i_ehdrp = elf_elfheader (input_bfd);
f21f3fe0 2678
ba96a88f
NC
2679 /* Previous versions of this code also used to add in the pipline
2680 offset here. This is wrong because the linker is not supposed
2681 to know about such things, and one day it might change. In order
2682 to support old binaries that need the old behaviour however, so
2683 we attempt to detect which ABI was used to create the reloc. */
2684 if ( strcmp (bfd_get_target (input_bfd), "elf32-littlearm-oabi") == 0
2685 || strcmp (bfd_get_target (input_bfd), "elf32-bigarm-oabi") == 0
2686 || i_ehdrp->e_ident[EI_OSABI] == 0)
2687 relocation += 4;
2688 }
f21f3fe0 2689
252b5132
RH
2690 check = relocation >> howto->rightshift;
2691
2692 /* If this is a signed value, the rightshift just dropped
2693 leading 1 bits (assuming twos complement). */
2694 if ((bfd_signed_vma) relocation >= 0)
2695 signed_check = check;
2696 else
2697 signed_check = check | ~((bfd_vma) -1 >> howto->rightshift);
2698
252b5132 2699 /* Assumes two's complement. */
ba96a88f 2700 if (signed_check > reloc_signed_max || signed_check < reloc_signed_min)
b34976b6 2701 overflow = TRUE;
252b5132 2702
df425bc0 2703#ifndef OLD_ARM_ABI
4f3c3dbb
NC
2704 if (r_type == R_ARM_THM_XPC22
2705 && ((lower_insn & 0x1800) == 0x0800))
c62e1cc3
NC
2706 /* For a BLX instruction, make sure that the relocation is rounded up
2707 to a word boundary. This follows the semantics of the instruction
2708 which specifies that bit 1 of the target address will come from bit
2709 1 of the base address. */
2710 relocation = (relocation + 2) & ~ 3;
99e4ae17 2711#endif
c62e1cc3
NC
2712 /* Put RELOCATION back into the insn. */
2713 upper_insn = (upper_insn & ~(bfd_vma) 0x7ff) | ((relocation >> 12) & 0x7ff);
2714 lower_insn = (lower_insn & ~(bfd_vma) 0x7ff) | ((relocation >> 1) & 0x7ff);
2715
252b5132
RH
2716 /* Put the relocated value back in the object file: */
2717 bfd_put_16 (input_bfd, upper_insn, hit_data);
2718 bfd_put_16 (input_bfd, lower_insn, hit_data + 2);
2719
2720 return (overflow ? bfd_reloc_overflow : bfd_reloc_ok);
2721 }
2722 break;
2723
51c5503b
NC
2724 case R_ARM_THM_PC11:
2725 /* Thumb B (branch) instruction). */
2726 {
6cf9e9fe 2727 bfd_signed_vma relocation;
51c5503b
NC
2728 bfd_signed_vma reloc_signed_max = (1 << (howto->bitsize - 1)) - 1;
2729 bfd_signed_vma reloc_signed_min = ~ reloc_signed_max;
51c5503b
NC
2730 bfd_signed_vma signed_check;
2731
acf8aed4 2732#if USE_REL
51c5503b
NC
2733 /* Need to refetch addend. */
2734 addend = bfd_get_16 (input_bfd, hit_data) & howto->src_mask;
6cf9e9fe
NC
2735 if (addend & ((howto->src_mask + 1) >> 1))
2736 {
2737 signed_addend = -1;
2738 signed_addend &= ~ howto->src_mask;
2739 signed_addend |= addend;
2740 }
2741 else
2742 signed_addend = addend;
2743 /* The value in the insn has been right shifted. We need to
2744 undo this, so that we can perform the address calculation
2745 in terms of bytes. */
2746 signed_addend <<= howto->rightshift;
51c5503b 2747#endif
6cf9e9fe 2748 relocation = value + signed_addend;
51c5503b
NC
2749
2750 relocation -= (input_section->output_section->vma
2751 + input_section->output_offset
2752 + rel->r_offset);
2753
6cf9e9fe
NC
2754 relocation >>= howto->rightshift;
2755 signed_check = relocation;
2756 relocation &= howto->dst_mask;
51c5503b 2757 relocation |= (bfd_get_16 (input_bfd, hit_data) & (~ howto->dst_mask));
cedb70c5 2758
51c5503b
NC
2759 bfd_put_16 (input_bfd, relocation, hit_data);
2760
2761 /* Assumes two's complement. */
2762 if (signed_check > reloc_signed_max || signed_check < reloc_signed_min)
2763 return bfd_reloc_overflow;
2764
2765 return bfd_reloc_ok;
2766 }
cedb70c5 2767
1f433d93 2768#ifndef OLD_ARM_ABI
8375c36b
PB
2769 case R_ARM_ALU_PCREL7_0:
2770 case R_ARM_ALU_PCREL15_8:
2771 case R_ARM_ALU_PCREL23_15:
2772 {
2773 bfd_vma insn;
2774 bfd_vma relocation;
2775
2776 insn = bfd_get_32 (input_bfd, hit_data);
2777#if USE_REL
2778 /* Extract the addend. */
2779 addend = (insn & 0xff) << ((insn & 0xf00) >> 7);
2780 signed_addend = addend;
2781#endif
2782 relocation = value + signed_addend;
2783
2784 relocation -= (input_section->output_section->vma
2785 + input_section->output_offset
2786 + rel->r_offset);
2787 insn = (insn & ~0xfff)
2788 | ((howto->bitpos << 7) & 0xf00)
2789 | ((relocation >> howto->bitpos) & 0xff);
2790 bfd_put_32 (input_bfd, value, hit_data);
2791 }
2792 return bfd_reloc_ok;
1f433d93 2793#endif
8375c36b 2794
252b5132
RH
2795 case R_ARM_GNU_VTINHERIT:
2796 case R_ARM_GNU_VTENTRY:
2797 return bfd_reloc_ok;
2798
2799 case R_ARM_COPY:
2800 return bfd_reloc_notsupported;
2801
2802 case R_ARM_GLOB_DAT:
2803 return bfd_reloc_notsupported;
2804
2805 case R_ARM_JUMP_SLOT:
2806 return bfd_reloc_notsupported;
2807
2808 case R_ARM_RELATIVE:
2809 return bfd_reloc_notsupported;
2810
2811 case R_ARM_GOTOFF:
2812 /* Relocation is relative to the start of the
2813 global offset table. */
2814
2815 BFD_ASSERT (sgot != NULL);
2816 if (sgot == NULL)
2817 return bfd_reloc_notsupported;
9a5aca8c 2818
cedb70c5 2819 /* If we are addressing a Thumb function, we need to adjust the
ee29b9fb
RE
2820 address by one, so that attempts to call the function pointer will
2821 correctly interpret it as Thumb code. */
2822 if (sym_flags == STT_ARM_TFUNC)
2823 value += 1;
2824
252b5132
RH
2825 /* Note that sgot->output_offset is not involved in this
2826 calculation. We always want the start of .got. If we
2827 define _GLOBAL_OFFSET_TABLE in a different way, as is
2828 permitted by the ABI, we might have to change this
9b485d32 2829 calculation. */
252b5132 2830 value -= sgot->output_section->vma;
f21f3fe0 2831 return _bfd_final_link_relocate (howto, input_bfd, input_section,
99e4ae17
AJ
2832 contents, rel->r_offset, value,
2833 (bfd_vma) 0);
252b5132
RH
2834
2835 case R_ARM_GOTPC:
a7c10850 2836 /* Use global offset table as symbol value. */
252b5132 2837 BFD_ASSERT (sgot != NULL);
f21f3fe0 2838
252b5132
RH
2839 if (sgot == NULL)
2840 return bfd_reloc_notsupported;
2841
2842 value = sgot->output_section->vma;
f21f3fe0 2843 return _bfd_final_link_relocate (howto, input_bfd, input_section,
99e4ae17
AJ
2844 contents, rel->r_offset, value,
2845 (bfd_vma) 0);
f21f3fe0 2846
252b5132 2847 case R_ARM_GOT32:
eb043451
PB
2848#ifndef OLD_ARM_ABI
2849 case R_ARM_GOT_PREL:
2850#endif
252b5132 2851 /* Relocation is to the entry for this symbol in the
9b485d32 2852 global offset table. */
252b5132
RH
2853 if (sgot == NULL)
2854 return bfd_reloc_notsupported;
f21f3fe0 2855
252b5132
RH
2856 if (h != NULL)
2857 {
2858 bfd_vma off;
5e681ec4 2859 bfd_boolean dyn;
f21f3fe0 2860
252b5132
RH
2861 off = h->got.offset;
2862 BFD_ASSERT (off != (bfd_vma) -1);
5e681ec4 2863 dyn = globals->root.dynamic_sections_created;
f21f3fe0 2864
5e681ec4 2865 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
50d6c878 2866 || (info->shared
5e681ec4
PB
2867 && SYMBOL_REFERENCES_LOCAL (info, h))
2868 || (ELF_ST_VISIBILITY (h->other)
2869 && h->root.type == bfd_link_hash_undefweak))
252b5132
RH
2870 {
2871 /* This is actually a static link, or it is a -Bsymbolic link
2872 and the symbol is defined locally. We must initialize this
2873 entry in the global offset table. Since the offset must
2874 always be a multiple of 4, we use the least significant bit
2875 to record whether we have initialized it already.
f21f3fe0 2876
252b5132 2877 When doing a dynamic link, we create a .rel.got relocation
f21f3fe0 2878 entry to initialize the value. This is done in the
9b485d32 2879 finish_dynamic_symbol routine. */
252b5132
RH
2880 if ((off & 1) != 0)
2881 off &= ~1;
2882 else
2883 {
ee29b9fb
RE
2884 /* If we are addressing a Thumb function, we need to
2885 adjust the address by one, so that attempts to
2886 call the function pointer will correctly
2887 interpret it as Thumb code. */
2888 if (sym_flags == STT_ARM_TFUNC)
2889 value |= 1;
2890
252b5132
RH
2891 bfd_put_32 (output_bfd, value, sgot->contents + off);
2892 h->got.offset |= 1;
2893 }
2894 }
f21f3fe0 2895
252b5132
RH
2896 value = sgot->output_offset + off;
2897 }
2898 else
2899 {
2900 bfd_vma off;
f21f3fe0 2901
252b5132
RH
2902 BFD_ASSERT (local_got_offsets != NULL &&
2903 local_got_offsets[r_symndx] != (bfd_vma) -1);
f21f3fe0 2904
252b5132 2905 off = local_got_offsets[r_symndx];
f21f3fe0 2906
252b5132
RH
2907 /* The offset must always be a multiple of 4. We use the
2908 least significant bit to record whether we have already
9b485d32 2909 generated the necessary reloc. */
252b5132
RH
2910 if ((off & 1) != 0)
2911 off &= ~1;
2912 else
2913 {
2914 bfd_put_32 (output_bfd, value, sgot->contents + off);
f21f3fe0 2915
252b5132
RH
2916 if (info->shared)
2917 {
2918 asection * srelgot;
947216bf
AM
2919 Elf_Internal_Rela outrel;
2920 bfd_byte *loc;
f21f3fe0 2921
252b5132
RH
2922 srelgot = bfd_get_section_by_name (dynobj, ".rel.got");
2923 BFD_ASSERT (srelgot != NULL);
f21f3fe0 2924
252b5132 2925 outrel.r_offset = (sgot->output_section->vma
f21f3fe0 2926 + sgot->output_offset
252b5132
RH
2927 + off);
2928 outrel.r_info = ELF32_R_INFO (0, R_ARM_RELATIVE);
947216bf
AM
2929 loc = srelgot->contents;
2930 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rel);
2931 bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
252b5132 2932 }
f21f3fe0 2933
252b5132
RH
2934 local_got_offsets[r_symndx] |= 1;
2935 }
f21f3fe0 2936
252b5132
RH
2937 value = sgot->output_offset + off;
2938 }
eb043451
PB
2939 if (r_type != R_ARM_GOT32)
2940 value += sgot->output_section->vma;
9a5aca8c 2941
f21f3fe0 2942 return _bfd_final_link_relocate (howto, input_bfd, input_section,
99e4ae17
AJ
2943 contents, rel->r_offset, value,
2944 (bfd_vma) 0);
f21f3fe0 2945
252b5132
RH
2946 case R_ARM_SBREL32:
2947 return bfd_reloc_notsupported;
2948
2949 case R_ARM_AMP_VCALL9:
2950 return bfd_reloc_notsupported;
2951
2952 case R_ARM_RSBREL32:
2953 return bfd_reloc_notsupported;
2954
2955 case R_ARM_THM_RPC22:
2956 return bfd_reloc_notsupported;
2957
2958 case R_ARM_RREL32:
2959 return bfd_reloc_notsupported;
2960
2961 case R_ARM_RABS32:
2962 return bfd_reloc_notsupported;
2963
2964 case R_ARM_RPC24:
2965 return bfd_reloc_notsupported;
2966
2967 case R_ARM_RBASE:
2968 return bfd_reloc_notsupported;
2969
2970 default:
2971 return bfd_reloc_notsupported;
2972 }
2973}
2974
acf8aed4 2975#if USE_REL
98c1d4aa
NC
2976/* Add INCREMENT to the reloc (of type HOWTO) at ADDRESS. */
2977static void
57e8b36a
NC
2978arm_add_to_rel (bfd * abfd,
2979 bfd_byte * address,
2980 reloc_howto_type * howto,
2981 bfd_signed_vma increment)
98c1d4aa 2982{
98c1d4aa
NC
2983 bfd_signed_vma addend;
2984
9a5aca8c 2985 if (howto->type == R_ARM_THM_PC22)
98c1d4aa 2986 {
9a5aca8c
AM
2987 int upper_insn, lower_insn;
2988 int upper, lower;
98c1d4aa 2989
9a5aca8c
AM
2990 upper_insn = bfd_get_16 (abfd, address);
2991 lower_insn = bfd_get_16 (abfd, address + 2);
2992 upper = upper_insn & 0x7ff;
2993 lower = lower_insn & 0x7ff;
2994
2995 addend = (upper << 12) | (lower << 1);
ddda4409 2996 addend += increment;
9a5aca8c 2997 addend >>= 1;
98c1d4aa 2998
9a5aca8c
AM
2999 upper_insn = (upper_insn & 0xf800) | ((addend >> 11) & 0x7ff);
3000 lower_insn = (lower_insn & 0xf800) | (addend & 0x7ff);
3001
dc810e39
AM
3002 bfd_put_16 (abfd, (bfd_vma) upper_insn, address);
3003 bfd_put_16 (abfd, (bfd_vma) lower_insn, address + 2);
9a5aca8c
AM
3004 }
3005 else
3006 {
3007 bfd_vma contents;
3008
3009 contents = bfd_get_32 (abfd, address);
3010
3011 /* Get the (signed) value from the instruction. */
3012 addend = contents & howto->src_mask;
3013 if (addend & ((howto->src_mask + 1) >> 1))
3014 {
3015 bfd_signed_vma mask;
3016
3017 mask = -1;
3018 mask &= ~ howto->src_mask;
3019 addend |= mask;
3020 }
3021
3022 /* Add in the increment, (which is a byte value). */
3023 switch (howto->type)
3024 {
3025 default:
3026 addend += increment;
3027 break;
3028
3029 case R_ARM_PC24:
5b5bb741
PB
3030#ifndef OLD_ARM_ABI
3031 case R_ARM_CALL:
3032 case R_ARM_JUMP24:
3033#endif
9a5aca8c 3034 addend <<= howto->size;
dc810e39 3035 addend += increment;
9a5aca8c
AM
3036
3037 /* Should we check for overflow here ? */
3038
3039 /* Drop any undesired bits. */
3040 addend >>= howto->rightshift;
3041 break;
3042 }
3043
3044 contents = (contents & ~ howto->dst_mask) | (addend & howto->dst_mask);
3045
3046 bfd_put_32 (abfd, contents, address);
ddda4409 3047 }
98c1d4aa
NC
3048}
3049#endif /* USE_REL */
252b5132
RH
3050
3051/* Relocate an ARM ELF section. */
b34976b6 3052static bfd_boolean
57e8b36a
NC
3053elf32_arm_relocate_section (bfd * output_bfd,
3054 struct bfd_link_info * info,
3055 bfd * input_bfd,
3056 asection * input_section,
3057 bfd_byte * contents,
3058 Elf_Internal_Rela * relocs,
3059 Elf_Internal_Sym * local_syms,
3060 asection ** local_sections)
252b5132 3061{
b34976b6
AM
3062 Elf_Internal_Shdr *symtab_hdr;
3063 struct elf_link_hash_entry **sym_hashes;
3064 Elf_Internal_Rela *rel;
3065 Elf_Internal_Rela *relend;
3066 const char *name;
252b5132 3067
acf8aed4 3068#if !USE_REL
1049f94e 3069 if (info->relocatable)
b34976b6 3070 return TRUE;
b491616a
AM
3071#endif
3072
252b5132
RH
3073 symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr;
3074 sym_hashes = elf_sym_hashes (input_bfd);
3075
3076 rel = relocs;
3077 relend = relocs + input_section->reloc_count;
3078 for (; rel < relend; rel++)
3079 {
ba96a88f
NC
3080 int r_type;
3081 reloc_howto_type * howto;
3082 unsigned long r_symndx;
3083 Elf_Internal_Sym * sym;
3084 asection * sec;
252b5132 3085 struct elf_link_hash_entry * h;
ba96a88f
NC
3086 bfd_vma relocation;
3087 bfd_reloc_status_type r;
3088 arelent bfd_reloc;
f21f3fe0 3089
252b5132 3090 r_symndx = ELF32_R_SYM (rel->r_info);
ba96a88f 3091 r_type = ELF32_R_TYPE (rel->r_info);
252b5132 3092
ba96a88f
NC
3093 if ( r_type == R_ARM_GNU_VTENTRY
3094 || r_type == R_ARM_GNU_VTINHERIT)
252b5132
RH
3095 continue;
3096
dc810e39 3097 elf32_arm_info_to_howto (input_bfd, & bfd_reloc, rel);
ba96a88f 3098 howto = bfd_reloc.howto;
252b5132 3099
acf8aed4 3100#if USE_REL
1049f94e 3101 if (info->relocatable)
252b5132 3102 {
1049f94e 3103 /* This is a relocatable link. We don't have to change
252b5132
RH
3104 anything, unless the reloc is against a section symbol,
3105 in which case we have to adjust according to where the
3106 section symbol winds up in the output section. */
3107 if (r_symndx < symtab_hdr->sh_info)
3108 {
3109 sym = local_syms + r_symndx;
3110 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
3111 {
3112 sec = local_sections[r_symndx];
98c1d4aa 3113 arm_add_to_rel (input_bfd, contents + rel->r_offset,
dc810e39
AM
3114 howto,
3115 (bfd_signed_vma) (sec->output_offset
3116 + sym->st_value));
252b5132
RH
3117 }
3118 }
3119
3120 continue;
3121 }
b491616a 3122#endif
252b5132
RH
3123
3124 /* This is a final link. */
3125 h = NULL;
3126 sym = NULL;
3127 sec = NULL;
9b485d32 3128
252b5132
RH
3129 if (r_symndx < symtab_hdr->sh_info)
3130 {
3131 sym = local_syms + r_symndx;
3132 sec = local_sections[r_symndx];
acf8aed4 3133#if USE_REL
252b5132
RH
3134 relocation = (sec->output_section->vma
3135 + sec->output_offset
3136 + sym->st_value);
f8df10f4
JJ
3137 if ((sec->flags & SEC_MERGE)
3138 && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
3139 {
3140 asection *msec;
3141 bfd_vma addend, value;
3142
3143 if (howto->rightshift)
3144 {
3145 (*_bfd_error_handler)
d003868e
AM
3146 (_("%B(%A+0x%lx): %s relocation against SEC_MERGE section"),
3147 input_bfd, input_section,
f8df10f4 3148 (long) rel->r_offset, howto->name);
b34976b6 3149 return FALSE;
f8df10f4
JJ
3150 }
3151
3152 value = bfd_get_32 (input_bfd, contents + rel->r_offset);
3153
3154 /* Get the (signed) value from the instruction. */
3155 addend = value & howto->src_mask;
3156 if (addend & ((howto->src_mask + 1) >> 1))
3157 {
3158 bfd_signed_vma mask;
3159
3160 mask = -1;
3161 mask &= ~ howto->src_mask;
3162 addend |= mask;
3163 }
3164 msec = sec;
3165 addend =
c629eae0 3166 _bfd_elf_rel_local_sym (output_bfd, sym, &msec, addend)
f8df10f4
JJ
3167 - relocation;
3168 addend += msec->output_section->vma + msec->output_offset;
3169 value = (value & ~ howto->dst_mask) | (addend & howto->dst_mask);
3170 bfd_put_32 (input_bfd, value, contents + rel->r_offset);
3171 }
3172#else
8517fae7 3173 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
f8df10f4 3174#endif
252b5132
RH
3175 }
3176 else
3177 {
560e09e9
NC
3178 bfd_boolean warned;
3179 bfd_boolean unresolved_reloc;
3180
b2a8e766
AM
3181 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
3182 r_symndx, symtab_hdr, sym_hashes,
3183 h, sec, relocation,
3184 unresolved_reloc, warned);
57e8b36a 3185
560e09e9 3186 if (unresolved_reloc || relocation != 0)
252b5132 3187 {
252b5132 3188 /* In these cases, we don't need the relocation value.
f21f3fe0 3189 We check specially because in some obscure cases
9b485d32 3190 sec->output_section will be NULL. */
252b5132
RH
3191 switch (r_type)
3192 {
3193 case R_ARM_PC24:
5b5bb741
PB
3194#ifndef OLD_ARM_ABI
3195 case R_ARM_CALL:
3196 case R_ARM_JUMP24:
ee06dc07 3197 case R_ARM_PREL31:
5b5bb741 3198#endif
252b5132 3199 case R_ARM_ABS32:
6a360bf4 3200 case R_ARM_THM_PC22:
ecb2d096
DJ
3201 case R_ARM_PLT32:
3202
252b5132 3203 if (info->shared
f5385ebf
AM
3204 && ((!info->symbolic && h->dynindx != -1)
3205 || !h->def_regular)
5e681ec4 3206 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
05924f36
PB
3207 && ((input_section->flags & SEC_ALLOC) != 0
3208 /* DWARF will emit R_ARM_ABS32 relocations in its
3209 sections against symbols defined externally
3210 in shared libraries. We can't do anything
3211 with them here. */
3212 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 3213 && h->def_dynamic))
252b5132 3214 )
560e09e9 3215 relocation = 0;
252b5132 3216 break;
f21f3fe0 3217
252b5132 3218 case R_ARM_GOTPC:
560e09e9 3219 relocation = 0;
252b5132 3220 break;
f21f3fe0 3221
252b5132 3222 case R_ARM_GOT32:
eb043451
PB
3223#ifndef OLD_ARM_ABI
3224 case R_ARM_GOT_PREL:
3225#endif
50d6c878 3226 if ((WILL_CALL_FINISH_DYNAMIC_SYMBOL
560e09e9 3227 (elf_hash_table (info)->dynamic_sections_created,
50d6c878
DJ
3228 info->shared, h))
3229 && (!info->shared
252b5132 3230 || (!info->symbolic && h->dynindx != -1)
f5385ebf 3231 || !h->def_regular))
560e09e9 3232 relocation = 0;
252b5132 3233 break;
f21f3fe0 3234
252b5132 3235 default:
560e09e9
NC
3236 if (unresolved_reloc)
3237 _bfd_error_handler
d003868e
AM
3238 (_("%B(%A): warning: unresolvable relocation %d against symbol `%s'"),
3239 input_bfd, input_section,
560e09e9 3240 r_type,
d003868e 3241 h->root.root.string);
560e09e9 3242 break;
252b5132 3243 }
252b5132
RH
3244 }
3245 }
3246
3247 if (h != NULL)
3248 name = h->root.root.string;
3249 else
3250 {
3251 name = (bfd_elf_string_from_elf_section
3252 (input_bfd, symtab_hdr->sh_link, sym->st_name));
3253 if (name == NULL || *name == '\0')
3254 name = bfd_section_name (input_bfd, sec);
3255 }
f21f3fe0 3256
252b5132
RH
3257 r = elf32_arm_final_link_relocate (howto, input_bfd, output_bfd,
3258 input_section, contents, rel,
3259 relocation, info, sec, name,
3260 (h ? ELF_ST_TYPE (h->type) :
780a67af 3261 ELF_ST_TYPE (sym->st_info)), h);
252b5132
RH
3262
3263 if (r != bfd_reloc_ok)
3264 {
3265 const char * msg = (const char *) 0;
3266
3267 switch (r)
3268 {
3269 case bfd_reloc_overflow:
cf919dfd
PB
3270 /* If the overflowing reloc was to an undefined symbol,
3271 we have already printed one error message and there
3272 is no point complaining again. */
3273 if ((! h ||
3274 h->root.type != bfd_link_hash_undefined)
3275 && (!((*info->callbacks->reloc_overflow)
dfeffb9f
L
3276 (info, (h ? &h->root : NULL), name, howto->name,
3277 (bfd_vma) 0, input_bfd, input_section,
3278 rel->r_offset))))
b34976b6 3279 return FALSE;
252b5132
RH
3280 break;
3281
3282 case bfd_reloc_undefined:
3283 if (!((*info->callbacks->undefined_symbol)
3284 (info, name, input_bfd, input_section,
b34976b6
AM
3285 rel->r_offset, TRUE)))
3286 return FALSE;
252b5132
RH
3287 break;
3288
3289 case bfd_reloc_outofrange:
9b485d32 3290 msg = _("internal error: out of range error");
252b5132
RH
3291 goto common_error;
3292
3293 case bfd_reloc_notsupported:
9b485d32 3294 msg = _("internal error: unsupported relocation error");
252b5132
RH
3295 goto common_error;
3296
3297 case bfd_reloc_dangerous:
9b485d32 3298 msg = _("internal error: dangerous error");
252b5132
RH
3299 goto common_error;
3300
3301 default:
9b485d32 3302 msg = _("internal error: unknown error");
252b5132
RH
3303 /* fall through */
3304
3305 common_error:
3306 if (!((*info->callbacks->warning)
3307 (info, msg, name, input_bfd, input_section,
3308 rel->r_offset)))
b34976b6 3309 return FALSE;
252b5132
RH
3310 break;
3311 }
3312 }
3313 }
3314
b34976b6 3315 return TRUE;
252b5132
RH
3316}
3317
c178919b
NC
3318/* Set the right machine number. */
3319
3320static bfd_boolean
57e8b36a 3321elf32_arm_object_p (bfd *abfd)
c178919b 3322{
5a6c6817 3323 unsigned int mach;
57e8b36a 3324
5a6c6817 3325 mach = bfd_arm_get_mach_from_notes (abfd, ARM_NOTE_SECTION);
c178919b 3326
5a6c6817
NC
3327 if (mach != bfd_mach_arm_unknown)
3328 bfd_default_set_arch_mach (abfd, bfd_arch_arm, mach);
3329
3330 else if (elf_elfheader (abfd)->e_flags & EF_ARM_MAVERICK_FLOAT)
3331 bfd_default_set_arch_mach (abfd, bfd_arch_arm, bfd_mach_arm_ep9312);
e16bb312 3332
e16bb312 3333 else
5a6c6817 3334 bfd_default_set_arch_mach (abfd, bfd_arch_arm, mach);
c178919b
NC
3335
3336 return TRUE;
3337}
3338
fc830a83 3339/* Function to keep ARM specific flags in the ELF header. */
3c9458e9 3340
b34976b6 3341static bfd_boolean
57e8b36a 3342elf32_arm_set_private_flags (bfd *abfd, flagword flags)
252b5132
RH
3343{
3344 if (elf_flags_init (abfd)
3345 && elf_elfheader (abfd)->e_flags != flags)
3346 {
fc830a83
NC
3347 if (EF_ARM_EABI_VERSION (flags) == EF_ARM_EABI_UNKNOWN)
3348 {
fd2ec330 3349 if (flags & EF_ARM_INTERWORK)
d003868e
AM
3350 (*_bfd_error_handler)
3351 (_("Warning: Not setting interworking flag of %B since it has already been specified as non-interworking"),
3352 abfd);
fc830a83 3353 else
d003868e
AM
3354 _bfd_error_handler
3355 (_("Warning: Clearing the interworking flag of %B due to outside request"),
3356 abfd);
fc830a83 3357 }
252b5132
RH
3358 }
3359 else
3360 {
3361 elf_elfheader (abfd)->e_flags = flags;
b34976b6 3362 elf_flags_init (abfd) = TRUE;
252b5132
RH
3363 }
3364
b34976b6 3365 return TRUE;
252b5132
RH
3366}
3367
fc830a83 3368/* Copy backend specific data from one object module to another. */
9b485d32 3369
b34976b6 3370static bfd_boolean
57e8b36a 3371elf32_arm_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
252b5132
RH
3372{
3373 flagword in_flags;
3374 flagword out_flags;
3375
fc830a83 3376 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
252b5132 3377 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 3378 return TRUE;
252b5132 3379
fc830a83 3380 in_flags = elf_elfheader (ibfd)->e_flags;
252b5132
RH
3381 out_flags = elf_elfheader (obfd)->e_flags;
3382
fc830a83
NC
3383 if (elf_flags_init (obfd)
3384 && EF_ARM_EABI_VERSION (out_flags) == EF_ARM_EABI_UNKNOWN
3385 && in_flags != out_flags)
252b5132 3386 {
252b5132 3387 /* Cannot mix APCS26 and APCS32 code. */
fd2ec330 3388 if ((in_flags & EF_ARM_APCS_26) != (out_flags & EF_ARM_APCS_26))
b34976b6 3389 return FALSE;
252b5132
RH
3390
3391 /* Cannot mix float APCS and non-float APCS code. */
fd2ec330 3392 if ((in_flags & EF_ARM_APCS_FLOAT) != (out_flags & EF_ARM_APCS_FLOAT))
b34976b6 3393 return FALSE;
252b5132
RH
3394
3395 /* If the src and dest have different interworking flags
3396 then turn off the interworking bit. */
fd2ec330 3397 if ((in_flags & EF_ARM_INTERWORK) != (out_flags & EF_ARM_INTERWORK))
252b5132 3398 {
fd2ec330 3399 if (out_flags & EF_ARM_INTERWORK)
d003868e
AM
3400 _bfd_error_handler
3401 (_("Warning: Clearing the interworking flag of %B because non-interworking code in %B has been linked with it"),
3402 obfd, ibfd);
252b5132 3403
fd2ec330 3404 in_flags &= ~EF_ARM_INTERWORK;
252b5132 3405 }
1006ba19
PB
3406
3407 /* Likewise for PIC, though don't warn for this case. */
fd2ec330
PB
3408 if ((in_flags & EF_ARM_PIC) != (out_flags & EF_ARM_PIC))
3409 in_flags &= ~EF_ARM_PIC;
252b5132
RH
3410 }
3411
3412 elf_elfheader (obfd)->e_flags = in_flags;
b34976b6 3413 elf_flags_init (obfd) = TRUE;
252b5132 3414
b34976b6 3415 return TRUE;
252b5132
RH
3416}
3417
3418/* Merge backend specific data from an object file to the output
3419 object file when linking. */
9b485d32 3420
b34976b6 3421static bfd_boolean
57e8b36a 3422elf32_arm_merge_private_bfd_data (bfd * ibfd, bfd * obfd)
252b5132
RH
3423{
3424 flagword out_flags;
3425 flagword in_flags;
b34976b6 3426 bfd_boolean flags_compatible = TRUE;
cf919dfd 3427 asection *sec;
252b5132 3428
9b485d32 3429 /* Check if we have the same endianess. */
82e51918 3430 if (! _bfd_generic_verify_endian_match (ibfd, obfd))
b34976b6 3431 return FALSE;
1fe494a5 3432
252b5132
RH
3433 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
3434 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 3435 return TRUE;
252b5132 3436
252b5132
RH
3437 /* The input BFD must have had its flags initialised. */
3438 /* The following seems bogus to me -- The flags are initialized in
3439 the assembler but I don't think an elf_flags_init field is
9b485d32 3440 written into the object. */
252b5132
RH
3441 /* BFD_ASSERT (elf_flags_init (ibfd)); */
3442
3443 in_flags = elf_elfheader (ibfd)->e_flags;
3444 out_flags = elf_elfheader (obfd)->e_flags;
3445
3446 if (!elf_flags_init (obfd))
3447 {
fe077fa6
NC
3448 /* If the input is the default architecture and had the default
3449 flags then do not bother setting the flags for the output
3450 architecture, instead allow future merges to do this. If no
3451 future merges ever set these flags then they will retain their
3452 uninitialised values, which surprise surprise, correspond
252b5132 3453 to the default values. */
fe077fa6
NC
3454 if (bfd_get_arch_info (ibfd)->the_default
3455 && elf_elfheader (ibfd)->e_flags == 0)
b34976b6 3456 return TRUE;
252b5132 3457
b34976b6 3458 elf_flags_init (obfd) = TRUE;
252b5132
RH
3459 elf_elfheader (obfd)->e_flags = in_flags;
3460
3461 if (bfd_get_arch (obfd) == bfd_get_arch (ibfd)
3462 && bfd_get_arch_info (obfd)->the_default)
3463 return bfd_set_arch_mach (obfd, bfd_get_arch (ibfd), bfd_get_mach (ibfd));
3464
b34976b6 3465 return TRUE;
252b5132
RH
3466 }
3467
5a6c6817
NC
3468 /* Determine what should happen if the input ARM architecture
3469 does not match the output ARM architecture. */
3470 if (! bfd_arm_merge_machines (ibfd, obfd))
3471 return FALSE;
e16bb312 3472
1006ba19 3473 /* Identical flags must be compatible. */
252b5132 3474 if (in_flags == out_flags)
b34976b6 3475 return TRUE;
252b5132 3476
35a0f415
DJ
3477 /* Check to see if the input BFD actually contains any sections. If
3478 not, its flags may not have been initialised either, but it
3479 cannot actually cause any incompatibility. Do not short-circuit
3480 dynamic objects; their section list may be emptied by
d1f161ea 3481 elf_link_add_object_symbols.
35a0f415 3482
d1f161ea
NC
3483 Also check to see if there are no code sections in the input.
3484 In this case there is no need to check for code specific flags.
3485 XXX - do we need to worry about floating-point format compatability
3486 in data sections ? */
35a0f415 3487 if (!(ibfd->flags & DYNAMIC))
cf919dfd 3488 {
35a0f415 3489 bfd_boolean null_input_bfd = TRUE;
d1f161ea 3490 bfd_boolean only_data_sections = TRUE;
35a0f415
DJ
3491
3492 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
cf919dfd 3493 {
35a0f415
DJ
3494 /* Ignore synthetic glue sections. */
3495 if (strcmp (sec->name, ".glue_7")
3496 && strcmp (sec->name, ".glue_7t"))
3497 {
d1f161ea
NC
3498 if ((bfd_get_section_flags (ibfd, sec)
3499 & (SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS))
3500 == (SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS))
3501 only_data_sections = FALSE;
3502
35a0f415
DJ
3503 null_input_bfd = FALSE;
3504 break;
3505 }
cf919dfd 3506 }
d1f161ea
NC
3507
3508 if (null_input_bfd || only_data_sections)
35a0f415 3509 return TRUE;
cf919dfd 3510 }
cf919dfd 3511
252b5132 3512 /* Complain about various flag mismatches. */
fc830a83
NC
3513 if (EF_ARM_EABI_VERSION (in_flags) != EF_ARM_EABI_VERSION (out_flags))
3514 {
d003868e 3515 _bfd_error_handler
3656d5e3 3516 (_("ERROR: Source object %B has EABI version %d, but target %B has EABI version %d"),
d003868e
AM
3517 ibfd, obfd,
3518 (in_flags & EF_ARM_EABIMASK) >> 24,
3519 (out_flags & EF_ARM_EABIMASK) >> 24);
b34976b6 3520 return FALSE;
fc830a83 3521 }
252b5132 3522
1006ba19
PB
3523 /* Not sure what needs to be checked for EABI versions >= 1. */
3524 if (EF_ARM_EABI_VERSION (in_flags) == EF_ARM_EABI_UNKNOWN)
3525 {
fd2ec330 3526 if ((in_flags & EF_ARM_APCS_26) != (out_flags & EF_ARM_APCS_26))
1006ba19 3527 {
d003868e
AM
3528 _bfd_error_handler
3529 (_("ERROR: %B is compiled for APCS-%d, whereas target %B uses APCS-%d"),
3530 ibfd, obfd,
3531 in_flags & EF_ARM_APCS_26 ? 26 : 32,
3532 out_flags & EF_ARM_APCS_26 ? 26 : 32);
b34976b6 3533 flags_compatible = FALSE;
1006ba19 3534 }
252b5132 3535
fd2ec330 3536 if ((in_flags & EF_ARM_APCS_FLOAT) != (out_flags & EF_ARM_APCS_FLOAT))
1006ba19 3537 {
5eefb65f 3538 if (in_flags & EF_ARM_APCS_FLOAT)
d003868e
AM
3539 _bfd_error_handler
3540 (_("ERROR: %B passes floats in float registers, whereas %B passes them in integer registers"),
3541 ibfd, obfd);
5eefb65f 3542 else
d003868e
AM
3543 _bfd_error_handler
3544 (_("ERROR: %B passes floats in integer registers, whereas %B passes them in float registers"),
3545 ibfd, obfd);
63b0f745 3546
b34976b6 3547 flags_compatible = FALSE;
1006ba19 3548 }
252b5132 3549
96a846ea 3550 if ((in_flags & EF_ARM_VFP_FLOAT) != (out_flags & EF_ARM_VFP_FLOAT))
1006ba19 3551 {
96a846ea 3552 if (in_flags & EF_ARM_VFP_FLOAT)
d003868e
AM
3553 _bfd_error_handler
3554 (_("ERROR: %B uses VFP instructions, whereas %B does not"),
3555 ibfd, obfd);
5eefb65f 3556 else
d003868e
AM
3557 _bfd_error_handler
3558 (_("ERROR: %B uses FPA instructions, whereas %B does not"),
3559 ibfd, obfd);
fde78edd
NC
3560
3561 flags_compatible = FALSE;
3562 }
3563
3564 if ((in_flags & EF_ARM_MAVERICK_FLOAT) != (out_flags & EF_ARM_MAVERICK_FLOAT))
3565 {
3566 if (in_flags & EF_ARM_MAVERICK_FLOAT)
d003868e
AM
3567 _bfd_error_handler
3568 (_("ERROR: %B uses Maverick instructions, whereas %B does not"),
3569 ibfd, obfd);
fde78edd 3570 else
d003868e
AM
3571 _bfd_error_handler
3572 (_("ERROR: %B does not use Maverick instructions, whereas %B does"),
3573 ibfd, obfd);
63b0f745 3574
b34976b6 3575 flags_compatible = FALSE;
1006ba19 3576 }
96a846ea
RE
3577
3578#ifdef EF_ARM_SOFT_FLOAT
3579 if ((in_flags & EF_ARM_SOFT_FLOAT) != (out_flags & EF_ARM_SOFT_FLOAT))
3580 {
3581 /* We can allow interworking between code that is VFP format
3582 layout, and uses either soft float or integer regs for
3583 passing floating point arguments and results. We already
3584 know that the APCS_FLOAT flags match; similarly for VFP
3585 flags. */
3586 if ((in_flags & EF_ARM_APCS_FLOAT) != 0
3587 || (in_flags & EF_ARM_VFP_FLOAT) == 0)
3588 {
3589 if (in_flags & EF_ARM_SOFT_FLOAT)
d003868e
AM
3590 _bfd_error_handler
3591 (_("ERROR: %B uses software FP, whereas %B uses hardware FP"),
3592 ibfd, obfd);
96a846ea 3593 else
d003868e
AM
3594 _bfd_error_handler
3595 (_("ERROR: %B uses hardware FP, whereas %B uses software FP"),
3596 ibfd, obfd);
96a846ea 3597
b34976b6 3598 flags_compatible = FALSE;
96a846ea
RE
3599 }
3600 }
ee43f35e 3601#endif
252b5132 3602
1006ba19 3603 /* Interworking mismatch is only a warning. */
fd2ec330 3604 if ((in_flags & EF_ARM_INTERWORK) != (out_flags & EF_ARM_INTERWORK))
8f615d07 3605 {
e3c8793a
NC
3606 if (in_flags & EF_ARM_INTERWORK)
3607 {
d003868e
AM
3608 _bfd_error_handler
3609 (_("Warning: %B supports interworking, whereas %B does not"),
3610 ibfd, obfd);
e3c8793a
NC
3611 }
3612 else
3613 {
d003868e
AM
3614 _bfd_error_handler
3615 (_("Warning: %B does not support interworking, whereas %B does"),
3616 ibfd, obfd);
e3c8793a 3617 }
8f615d07 3618 }
252b5132 3619 }
63b0f745 3620
1006ba19 3621 return flags_compatible;
252b5132
RH
3622}
3623
9b485d32
NC
3624/* Display the flags field. */
3625
b34976b6 3626static bfd_boolean
57e8b36a 3627elf32_arm_print_private_bfd_data (bfd *abfd, void * ptr)
252b5132 3628{
fc830a83
NC
3629 FILE * file = (FILE *) ptr;
3630 unsigned long flags;
252b5132
RH
3631
3632 BFD_ASSERT (abfd != NULL && ptr != NULL);
3633
3634 /* Print normal ELF private data. */
3635 _bfd_elf_print_private_bfd_data (abfd, ptr);
3636
fc830a83 3637 flags = elf_elfheader (abfd)->e_flags;
9b485d32
NC
3638 /* Ignore init flag - it may not be set, despite the flags field
3639 containing valid data. */
252b5132
RH
3640
3641 /* xgettext:c-format */
9b485d32 3642 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
252b5132 3643
fc830a83
NC
3644 switch (EF_ARM_EABI_VERSION (flags))
3645 {
3646 case EF_ARM_EABI_UNKNOWN:
4cc11e76 3647 /* The following flag bits are GNU extensions and not part of the
fc830a83
NC
3648 official ARM ELF extended ABI. Hence they are only decoded if
3649 the EABI version is not set. */
fd2ec330 3650 if (flags & EF_ARM_INTERWORK)
9b485d32 3651 fprintf (file, _(" [interworking enabled]"));
9a5aca8c 3652
fd2ec330 3653 if (flags & EF_ARM_APCS_26)
6c571f00 3654 fprintf (file, " [APCS-26]");
fc830a83 3655 else
6c571f00 3656 fprintf (file, " [APCS-32]");
9a5aca8c 3657
96a846ea
RE
3658 if (flags & EF_ARM_VFP_FLOAT)
3659 fprintf (file, _(" [VFP float format]"));
fde78edd
NC
3660 else if (flags & EF_ARM_MAVERICK_FLOAT)
3661 fprintf (file, _(" [Maverick float format]"));
96a846ea
RE
3662 else
3663 fprintf (file, _(" [FPA float format]"));
3664
fd2ec330 3665 if (flags & EF_ARM_APCS_FLOAT)
9b485d32 3666 fprintf (file, _(" [floats passed in float registers]"));
9a5aca8c 3667
fd2ec330 3668 if (flags & EF_ARM_PIC)
9b485d32 3669 fprintf (file, _(" [position independent]"));
fc830a83 3670
fd2ec330 3671 if (flags & EF_ARM_NEW_ABI)
9b485d32 3672 fprintf (file, _(" [new ABI]"));
9a5aca8c 3673
fd2ec330 3674 if (flags & EF_ARM_OLD_ABI)
9b485d32 3675 fprintf (file, _(" [old ABI]"));
9a5aca8c 3676
fd2ec330 3677 if (flags & EF_ARM_SOFT_FLOAT)
9b485d32 3678 fprintf (file, _(" [software FP]"));
9a5aca8c 3679
96a846ea
RE
3680 flags &= ~(EF_ARM_INTERWORK | EF_ARM_APCS_26 | EF_ARM_APCS_FLOAT
3681 | EF_ARM_PIC | EF_ARM_NEW_ABI | EF_ARM_OLD_ABI
fde78edd
NC
3682 | EF_ARM_SOFT_FLOAT | EF_ARM_VFP_FLOAT
3683 | EF_ARM_MAVERICK_FLOAT);
fc830a83 3684 break;
9a5aca8c 3685
fc830a83 3686 case EF_ARM_EABI_VER1:
9b485d32 3687 fprintf (file, _(" [Version1 EABI]"));
9a5aca8c 3688
fc830a83 3689 if (flags & EF_ARM_SYMSARESORTED)
9b485d32 3690 fprintf (file, _(" [sorted symbol table]"));
fc830a83 3691 else
9b485d32 3692 fprintf (file, _(" [unsorted symbol table]"));
9a5aca8c 3693
fc830a83
NC
3694 flags &= ~ EF_ARM_SYMSARESORTED;
3695 break;
9a5aca8c 3696
fd2ec330
PB
3697 case EF_ARM_EABI_VER2:
3698 fprintf (file, _(" [Version2 EABI]"));
3699
3700 if (flags & EF_ARM_SYMSARESORTED)
3701 fprintf (file, _(" [sorted symbol table]"));
3702 else
3703 fprintf (file, _(" [unsorted symbol table]"));
3704
3705 if (flags & EF_ARM_DYNSYMSUSESEGIDX)
3706 fprintf (file, _(" [dynamic symbols use segment index]"));
3707
3708 if (flags & EF_ARM_MAPSYMSFIRST)
3709 fprintf (file, _(" [mapping symbols precede others]"));
3710
99e4ae17 3711 flags &= ~(EF_ARM_SYMSARESORTED | EF_ARM_DYNSYMSUSESEGIDX
fd2ec330
PB
3712 | EF_ARM_MAPSYMSFIRST);
3713 break;
3714
d507cf36
PB
3715 case EF_ARM_EABI_VER3:
3716 fprintf (file, _(" [Version3 EABI]"));
8cb51566
PB
3717 break;
3718
3719 case EF_ARM_EABI_VER4:
3720 fprintf (file, _(" [Version4 EABI]"));
d507cf36
PB
3721
3722 if (flags & EF_ARM_BE8)
3723 fprintf (file, _(" [BE8]"));
3724
3725 if (flags & EF_ARM_LE8)
3726 fprintf (file, _(" [LE8]"));
3727
3728 flags &= ~(EF_ARM_LE8 | EF_ARM_BE8);
3729 break;
3730
fc830a83 3731 default:
9b485d32 3732 fprintf (file, _(" <EABI version unrecognised>"));
fc830a83
NC
3733 break;
3734 }
252b5132 3735
fc830a83 3736 flags &= ~ EF_ARM_EABIMASK;
252b5132 3737
fc830a83 3738 if (flags & EF_ARM_RELEXEC)
9b485d32 3739 fprintf (file, _(" [relocatable executable]"));
252b5132 3740
fc830a83 3741 if (flags & EF_ARM_HASENTRY)
9b485d32 3742 fprintf (file, _(" [has entry point]"));
252b5132 3743
fc830a83
NC
3744 flags &= ~ (EF_ARM_RELEXEC | EF_ARM_HASENTRY);
3745
3746 if (flags)
9b485d32 3747 fprintf (file, _("<Unrecognised flag bits set>"));
9a5aca8c 3748
252b5132
RH
3749 fputc ('\n', file);
3750
b34976b6 3751 return TRUE;
252b5132
RH
3752}
3753
3754static int
57e8b36a 3755elf32_arm_get_symbol_type (Elf_Internal_Sym * elf_sym, int type)
252b5132 3756{
2f0ca46a
NC
3757 switch (ELF_ST_TYPE (elf_sym->st_info))
3758 {
3759 case STT_ARM_TFUNC:
3760 return ELF_ST_TYPE (elf_sym->st_info);
ce855c42 3761
2f0ca46a
NC
3762 case STT_ARM_16BIT:
3763 /* If the symbol is not an object, return the STT_ARM_16BIT flag.
3764 This allows us to distinguish between data used by Thumb instructions
3765 and non-data (which is probably code) inside Thumb regions of an
3766 executable. */
3767 if (type != STT_OBJECT)
3768 return ELF_ST_TYPE (elf_sym->st_info);
3769 break;
9a5aca8c 3770
ce855c42
NC
3771 default:
3772 break;
2f0ca46a
NC
3773 }
3774
3775 return type;
252b5132 3776}
f21f3fe0 3777
252b5132 3778static asection *
57e8b36a
NC
3779elf32_arm_gc_mark_hook (asection * sec,
3780 struct bfd_link_info * info ATTRIBUTE_UNUSED,
3781 Elf_Internal_Rela * rel,
3782 struct elf_link_hash_entry * h,
3783 Elf_Internal_Sym * sym)
252b5132
RH
3784{
3785 if (h != NULL)
3786 {
3787 switch (ELF32_R_TYPE (rel->r_info))
3788 {
3789 case R_ARM_GNU_VTINHERIT:
3790 case R_ARM_GNU_VTENTRY:
3791 break;
3792
3793 default:
3794 switch (h->root.type)
3795 {
3796 case bfd_link_hash_defined:
3797 case bfd_link_hash_defweak:
3798 return h->root.u.def.section;
3799
3800 case bfd_link_hash_common:
3801 return h->root.u.c.p->section;
e049a0de
ILT
3802
3803 default:
3804 break;
252b5132
RH
3805 }
3806 }
3807 }
3808 else
1e2f5b6e 3809 return bfd_section_from_elf_index (sec->owner, sym->st_shndx);
9ad5cbcf 3810
252b5132
RH
3811 return NULL;
3812}
3813
780a67af
NC
3814/* Update the got entry reference counts for the section being removed. */
3815
b34976b6 3816static bfd_boolean
57e8b36a
NC
3817elf32_arm_gc_sweep_hook (bfd * abfd ATTRIBUTE_UNUSED,
3818 struct bfd_link_info * info ATTRIBUTE_UNUSED,
3819 asection * sec ATTRIBUTE_UNUSED,
3820 const Elf_Internal_Rela * relocs ATTRIBUTE_UNUSED)
252b5132 3821{
5e681ec4
PB
3822 Elf_Internal_Shdr *symtab_hdr;
3823 struct elf_link_hash_entry **sym_hashes;
3824 bfd_signed_vma *local_got_refcounts;
3825 const Elf_Internal_Rela *rel, *relend;
3826 unsigned long r_symndx;
3827 struct elf_link_hash_entry *h;
eb043451
PB
3828 struct elf32_arm_link_hash_table * globals;
3829
3830 globals = elf32_arm_hash_table (info);
5e681ec4
PB
3831
3832 elf_section_data (sec)->local_dynrel = NULL;
3833
3834 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3835 sym_hashes = elf_sym_hashes (abfd);
3836 local_got_refcounts = elf_local_got_refcounts (abfd);
3837
3838 relend = relocs + sec->reloc_count;
3839 for (rel = relocs; rel < relend; rel++)
eb043451
PB
3840 {
3841 int r_type;
5e681ec4 3842
eb043451 3843 r_type = ELF32_R_TYPE (rel->r_info);
b6ee372a 3844#ifndef OLD_ARM_ABI
eb043451 3845 r_type = arm_real_reloc_type (globals, r_type);
b6ee372a 3846#endif
eb043451
PB
3847 switch (r_type)
3848 {
3849 case R_ARM_GOT32:
3850#ifndef OLD_ARM_ABI
3851 case R_ARM_GOT_PREL:
3852#endif
3853 r_symndx = ELF32_R_SYM (rel->r_info);
3854 if (r_symndx >= symtab_hdr->sh_info)
3855 {
3856 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3857 if (h->got.refcount > 0)
3858 h->got.refcount -= 1;
3859 }
3860 else if (local_got_refcounts != NULL)
3861 {
3862 if (local_got_refcounts[r_symndx] > 0)
3863 local_got_refcounts[r_symndx] -= 1;
3864 }
3865 break;
3866
3867 case R_ARM_ABS32:
3868 case R_ARM_REL32:
3869 case R_ARM_PC24:
3870 case R_ARM_PLT32:
3871#ifndef OLD_ARM_ABI
5b5bb741
PB
3872 case R_ARM_CALL:
3873 case R_ARM_JUMP24:
eb043451
PB
3874 case R_ARM_PREL31:
3875#endif
3876 r_symndx = ELF32_R_SYM (rel->r_info);
3877 if (r_symndx >= symtab_hdr->sh_info)
3878 {
3879 struct elf32_arm_link_hash_entry *eh;
3880 struct elf32_arm_relocs_copied **pp;
3881 struct elf32_arm_relocs_copied *p;
5e681ec4 3882
eb043451 3883 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5e681ec4 3884
eb043451
PB
3885 if (h->plt.refcount > 0)
3886 h->plt.refcount -= 1;
5e681ec4 3887
eb043451 3888 if (r_type == R_ARM_ABS32
eb043451
PB
3889 || r_type == R_ARM_REL32)
3890 {
3891 eh = (struct elf32_arm_link_hash_entry *) h;
3892
3893 for (pp = &eh->relocs_copied; (p = *pp) != NULL;
3894 pp = &p->next)
3895 if (p->section == sec)
3896 {
3897 p->count -= 1;
3898 if (p->count == 0)
3899 *pp = p->next;
3900 break;
3901 }
3902 }
3903 }
3904 break;
5e681ec4 3905
eb043451
PB
3906 default:
3907 break;
3908 }
3909 }
5e681ec4 3910
b34976b6 3911 return TRUE;
252b5132
RH
3912}
3913
780a67af
NC
3914/* Look through the relocs for a section during the first phase. */
3915
b34976b6 3916static bfd_boolean
57e8b36a
NC
3917elf32_arm_check_relocs (bfd *abfd, struct bfd_link_info *info,
3918 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 3919{
b34976b6
AM
3920 Elf_Internal_Shdr *symtab_hdr;
3921 struct elf_link_hash_entry **sym_hashes;
3922 struct elf_link_hash_entry **sym_hashes_end;
3923 const Elf_Internal_Rela *rel;
3924 const Elf_Internal_Rela *rel_end;
3925 bfd *dynobj;
5e681ec4 3926 asection *sreloc;
b34976b6 3927 bfd_vma *local_got_offsets;
5e681ec4 3928 struct elf32_arm_link_hash_table *htab;
9a5aca8c 3929
1049f94e 3930 if (info->relocatable)
b34976b6 3931 return TRUE;
9a5aca8c 3932
5e681ec4
PB
3933 htab = elf32_arm_hash_table (info);
3934 sreloc = NULL;
9a5aca8c 3935
252b5132
RH
3936 dynobj = elf_hash_table (info)->dynobj;
3937 local_got_offsets = elf_local_got_offsets (abfd);
f21f3fe0 3938
252b5132
RH
3939 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3940 sym_hashes = elf_sym_hashes (abfd);
9b485d32
NC
3941 sym_hashes_end = sym_hashes
3942 + symtab_hdr->sh_size / sizeof (Elf32_External_Sym);
3943
252b5132
RH
3944 if (!elf_bad_symtab (abfd))
3945 sym_hashes_end -= symtab_hdr->sh_info;
9b485d32 3946
252b5132
RH
3947 rel_end = relocs + sec->reloc_count;
3948 for (rel = relocs; rel < rel_end; rel++)
3949 {
3950 struct elf_link_hash_entry *h;
3951 unsigned long r_symndx;
eb043451 3952 int r_type;
9a5aca8c 3953
252b5132 3954 r_symndx = ELF32_R_SYM (rel->r_info);
eb043451
PB
3955 r_type = ELF32_R_TYPE (rel->r_info);
3956#ifndef OLD_ARM_ABI
3957 r_type = arm_real_reloc_type (htab, r_type);
3958#endif
252b5132
RH
3959 if (r_symndx < symtab_hdr->sh_info)
3960 h = NULL;
3961 else
3962 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
9a5aca8c 3963
eb043451 3964 switch (r_type)
252b5132 3965 {
5e681ec4 3966 case R_ARM_GOT32:
eb043451
PB
3967#ifndef OLD_ARM_ABI
3968 case R_ARM_GOT_PREL:
3969#endif
5e681ec4 3970 /* This symbol requires a global offset table entry. */
252b5132
RH
3971 if (h != NULL)
3972 {
5e681ec4 3973 h->got.refcount++;
252b5132
RH
3974 }
3975 else
3976 {
5e681ec4
PB
3977 bfd_signed_vma *local_got_refcounts;
3978
3979 /* This is a global offset table entry for a local symbol. */
3980 local_got_refcounts = elf_local_got_refcounts (abfd);
3981 if (local_got_refcounts == NULL)
252b5132 3982 {
dc810e39 3983 bfd_size_type size;
252b5132 3984
dc810e39 3985 size = symtab_hdr->sh_info;
57e8b36a
NC
3986 size *= (sizeof (bfd_signed_vma) + sizeof (char));
3987 local_got_refcounts = bfd_zalloc (abfd, size);
5e681ec4 3988 if (local_got_refcounts == NULL)
b34976b6 3989 return FALSE;
5e681ec4 3990 elf_local_got_refcounts (abfd) = local_got_refcounts;
252b5132 3991 }
5e681ec4 3992 local_got_refcounts[r_symndx] += 1;
252b5132 3993 }
eb043451
PB
3994 if (r_type == R_ARM_GOT32)
3995 break;
3996 /* Fall through. */
252b5132 3997
5e681ec4
PB
3998 case R_ARM_GOTOFF:
3999 case R_ARM_GOTPC:
4000 if (htab->sgot == NULL)
4001 {
4002 if (htab->root.dynobj == NULL)
4003 htab->root.dynobj = abfd;
4004 if (!create_got_section (htab->root.dynobj, info))
4005 return FALSE;
4006 }
252b5132
RH
4007 break;
4008
4009 case R_ARM_ABS32:
4010 case R_ARM_REL32:
4011 case R_ARM_PC24:
7359ea65 4012 case R_ARM_PLT32:
eb043451 4013#ifndef OLD_ARM_ABI
5b5bb741
PB
4014 case R_ARM_CALL:
4015 case R_ARM_JUMP24:
eb043451
PB
4016 case R_ARM_PREL31:
4017#endif
7359ea65 4018 if (h != NULL)
5e681ec4
PB
4019 {
4020 /* If this reloc is in a read-only section, we might
4021 need a copy reloc. We can't check reliably at this
4022 stage whether the section is read-only, as input
4023 sections have not yet been mapped to output sections.
4024 Tentatively set the flag for now, and correct in
4025 adjust_dynamic_symbol. */
7359ea65 4026 if (!info->shared)
f5385ebf 4027 h->non_got_ref = 1;
7359ea65 4028
5e681ec4 4029 /* We may need a .plt entry if the function this reloc
c84cd8ee
DJ
4030 refers to is in a different object. We can't tell for
4031 sure yet, because something later might force the
4032 symbol local. */
eb043451 4033 if (r_type == R_ARM_PC24
5b5bb741
PB
4034#ifndef OLD_ARM_ABI
4035 || r_type == R_ARM_CALL
4036 || r_type == R_ARM_JUMP24
ee06dc07 4037 || r_type == R_ARM_PREL31
5b5bb741 4038#endif
eb043451 4039 || r_type == R_ARM_PLT32)
f5385ebf 4040 h->needs_plt = 1;
4f199be3
DJ
4041
4042 /* If we create a PLT entry, this relocation will reference
4043 it, even if it's an ABS32 relocation. */
4044 h->plt.refcount += 1;
5e681ec4
PB
4045 }
4046
252b5132
RH
4047 /* If we are creating a shared library, and this is a reloc
4048 against a global symbol, or a non PC relative reloc
4049 against a local symbol, then we need to copy the reloc
4050 into the shared library. However, if we are linking with
4051 -Bsymbolic, we do not need to copy a reloc against a
4052 global symbol which is defined in an object we are
4053 including in the link (i.e., DEF_REGULAR is set). At
4054 this point we have not seen all the input files, so it is
4055 possible that DEF_REGULAR is not set now but will be set
4056 later (it is never cleared). We account for that
4057 possibility below by storing information in the
5e681ec4 4058 relocs_copied field of the hash table entry. */
252b5132 4059 if (info->shared
5e681ec4 4060 && (sec->flags & SEC_ALLOC) != 0
eb043451
PB
4061 && ((r_type != R_ARM_PC24
4062 && r_type != R_ARM_PLT32
b6ee372a 4063#ifndef OLD_ARM_ABI
5b5bb741
PB
4064 && r_type != R_ARM_CALL
4065 && r_type != R_ARM_JUMP24
eb043451 4066 && r_type != R_ARM_PREL31
b6ee372a 4067#endif
eb043451 4068 && r_type != R_ARM_REL32)
5e681ec4
PB
4069 || (h != NULL
4070 && (! info->symbolic
f5385ebf 4071 || !h->def_regular))))
252b5132 4072 {
5e681ec4
PB
4073 struct elf32_arm_relocs_copied *p, **head;
4074
252b5132
RH
4075 /* When creating a shared object, we must copy these
4076 reloc types into the output file. We create a reloc
4077 section in dynobj and make room for this reloc. */
4078 if (sreloc == NULL)
4079 {
4080 const char * name;
4081
4082 name = (bfd_elf_string_from_elf_section
4083 (abfd,
4084 elf_elfheader (abfd)->e_shstrndx,
4085 elf_section_data (sec)->rel_hdr.sh_name));
4086 if (name == NULL)
b34976b6 4087 return FALSE;
252b5132
RH
4088
4089 BFD_ASSERT (strncmp (name, ".rel", 4) == 0
99e4ae17 4090 && strcmp (bfd_get_section_name (abfd, sec),
252b5132
RH
4091 name + 4) == 0);
4092
4093 sreloc = bfd_get_section_by_name (dynobj, name);
4094 if (sreloc == NULL)
4095 {
4096 flagword flags;
4097
4098 sreloc = bfd_make_section (dynobj, name);
4099 flags = (SEC_HAS_CONTENTS | SEC_READONLY
4100 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
e5a52504
MM
4101 if ((sec->flags & SEC_ALLOC) != 0
4102 /* BPABI objects never have dynamic
4103 relocations mapped. */
4104 && !htab->symbian_p)
252b5132
RH
4105 flags |= SEC_ALLOC | SEC_LOAD;
4106 if (sreloc == NULL
4107 || ! bfd_set_section_flags (dynobj, sreloc, flags)
4108 || ! bfd_set_section_alignment (dynobj, sreloc, 2))
b34976b6 4109 return FALSE;
252b5132 4110 }
5e681ec4
PB
4111
4112 elf_section_data (sec)->sreloc = sreloc;
252b5132
RH
4113 }
4114
5e681ec4
PB
4115 /* If this is a global symbol, we count the number of
4116 relocations we need for this symbol. */
4117 if (h != NULL)
252b5132 4118 {
5e681ec4
PB
4119 head = &((struct elf32_arm_link_hash_entry *) h)->relocs_copied;
4120 }
4121 else
4122 {
4123 /* Track dynamic relocs needed for local syms too.
4124 We really need local syms available to do this
4125 easily. Oh well. */
57e8b36a 4126
5e681ec4
PB
4127 asection *s;
4128 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
4129 sec, r_symndx);
4130 if (s == NULL)
4131 return FALSE;
57e8b36a 4132
5e681ec4
PB
4133 head = ((struct elf32_arm_relocs_copied **)
4134 &elf_section_data (s)->local_dynrel);
4135 }
57e8b36a 4136
5e681ec4
PB
4137 p = *head;
4138 if (p == NULL || p->section != sec)
4139 {
4140 bfd_size_type amt = sizeof *p;
57e8b36a 4141
5e681ec4 4142 p = bfd_alloc (htab->root.dynobj, amt);
252b5132 4143 if (p == NULL)
5e681ec4
PB
4144 return FALSE;
4145 p->next = *head;
4146 *head = p;
4147 p->section = sec;
4148 p->count = 0;
252b5132 4149 }
57e8b36a 4150
eb043451 4151 if (r_type == R_ARM_ABS32
eb043451 4152 || r_type == R_ARM_REL32)
7359ea65 4153 p->count += 1;
252b5132
RH
4154 }
4155 break;
4156
4157 /* This relocation describes the C++ object vtable hierarchy.
4158 Reconstruct it for later use during GC. */
4159 case R_ARM_GNU_VTINHERIT:
c152c796 4160 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 4161 return FALSE;
252b5132 4162 break;
9a5aca8c 4163
252b5132
RH
4164 /* This relocation describes which C++ vtable entries are actually
4165 used. Record for later use during GC. */
4166 case R_ARM_GNU_VTENTRY:
c152c796 4167 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_offset))
b34976b6 4168 return FALSE;
252b5132
RH
4169 break;
4170 }
4171 }
f21f3fe0 4172
b34976b6 4173 return TRUE;
252b5132
RH
4174}
4175
b34976b6 4176static bfd_boolean
0367ecfb 4177is_arm_mapping_symbol_name (const char * name)
252b5132 4178{
0367ecfb
NC
4179 return (name != NULL)
4180 && (name[0] == '$')
4181 && ((name[1] == 'a') || (name[1] == 't') || (name[1] == 'd'))
4182 && (name[2] == 0);
4183}
f21f3fe0 4184
3c9458e9
NC
4185/* Treat mapping symbols as special target symbols. */
4186
4187static bfd_boolean
4188elf32_arm_is_target_special_symbol (bfd * abfd ATTRIBUTE_UNUSED, asymbol * sym)
4189{
4190 return is_arm_mapping_symbol_name (sym->name);
4191}
4192
0367ecfb
NC
4193/* This is a copy of elf_find_function() from elf.c except that
4194 ARM mapping symbols are ignored when looking for function names
4195 and STT_ARM_TFUNC is considered to a function type. */
252b5132 4196
0367ecfb
NC
4197static bfd_boolean
4198arm_elf_find_function (bfd * abfd ATTRIBUTE_UNUSED,
4199 asection * section,
4200 asymbol ** symbols,
4201 bfd_vma offset,
4202 const char ** filename_ptr,
4203 const char ** functionname_ptr)
4204{
4205 const char * filename = NULL;
4206 asymbol * func = NULL;
4207 bfd_vma low_func = 0;
4208 asymbol ** p;
252b5132
RH
4209
4210 for (p = symbols; *p != NULL; p++)
4211 {
4212 elf_symbol_type *q;
4213
4214 q = (elf_symbol_type *) *p;
4215
252b5132
RH
4216 switch (ELF_ST_TYPE (q->internal_elf_sym.st_info))
4217 {
4218 default:
4219 break;
4220 case STT_FILE:
4221 filename = bfd_asymbol_name (&q->symbol);
4222 break;
252b5132
RH
4223 case STT_FUNC:
4224 case STT_ARM_TFUNC:
0367ecfb
NC
4225 /* Skip $a and $t symbols. */
4226 if ((q->symbol.flags & BSF_LOCAL)
4227 && is_arm_mapping_symbol_name (q->symbol.name))
4228 continue;
4229 /* Fall through. */
4230 case STT_NOTYPE:
6b40fcba 4231 if (bfd_get_section (&q->symbol) == section
252b5132
RH
4232 && q->symbol.value >= low_func
4233 && q->symbol.value <= offset)
4234 {
4235 func = (asymbol *) q;
4236 low_func = q->symbol.value;
4237 }
4238 break;
4239 }
4240 }
4241
4242 if (func == NULL)
b34976b6 4243 return FALSE;
252b5132 4244
0367ecfb
NC
4245 if (filename_ptr)
4246 *filename_ptr = filename;
4247 if (functionname_ptr)
4248 *functionname_ptr = bfd_asymbol_name (func);
4249
4250 return TRUE;
4251}
4252
4253
4254/* Find the nearest line to a particular section and offset, for error
4255 reporting. This code is a duplicate of the code in elf.c, except
4256 that it uses arm_elf_find_function. */
4257
4258static bfd_boolean
4259elf32_arm_find_nearest_line (bfd * abfd,
4260 asection * section,
4261 asymbol ** symbols,
4262 bfd_vma offset,
4263 const char ** filename_ptr,
4264 const char ** functionname_ptr,
4265 unsigned int * line_ptr)
4266{
4267 bfd_boolean found = FALSE;
4268
4269 /* We skip _bfd_dwarf1_find_nearest_line since no known ARM toolchain uses it. */
4270
4271 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4272 filename_ptr, functionname_ptr,
4273 line_ptr, 0,
4274 & elf_tdata (abfd)->dwarf2_find_line_info))
4275 {
4276 if (!*functionname_ptr)
4277 arm_elf_find_function (abfd, section, symbols, offset,
4278 *filename_ptr ? NULL : filename_ptr,
4279 functionname_ptr);
f21f3fe0 4280
0367ecfb
NC
4281 return TRUE;
4282 }
4283
4284 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4285 & found, filename_ptr,
4286 functionname_ptr, line_ptr,
4287 & elf_tdata (abfd)->line_info))
4288 return FALSE;
4289
4290 if (found && (*functionname_ptr || *line_ptr))
4291 return TRUE;
4292
4293 if (symbols == NULL)
4294 return FALSE;
4295
4296 if (! arm_elf_find_function (abfd, section, symbols, offset,
4297 filename_ptr, functionname_ptr))
4298 return FALSE;
4299
4300 *line_ptr = 0;
b34976b6 4301 return TRUE;
252b5132
RH
4302}
4303
4304/* Adjust a symbol defined by a dynamic object and referenced by a
4305 regular object. The current definition is in some section of the
4306 dynamic object, but we're not including those sections. We have to
4307 change the definition to something the rest of the link can
4308 understand. */
4309
b34976b6 4310static bfd_boolean
57e8b36a
NC
4311elf32_arm_adjust_dynamic_symbol (struct bfd_link_info * info,
4312 struct elf_link_hash_entry * h)
252b5132
RH
4313{
4314 bfd * dynobj;
4315 asection * s;
4316 unsigned int power_of_two;
4317
4318 dynobj = elf_hash_table (info)->dynobj;
4319
4320 /* Make sure we know what is going on here. */
4321 BFD_ASSERT (dynobj != NULL
f5385ebf 4322 && (h->needs_plt
f6e332e6 4323 || h->u.weakdef != NULL
f5385ebf
AM
4324 || (h->def_dynamic
4325 && h->ref_regular
4326 && !h->def_regular)));
252b5132
RH
4327
4328 /* If this is a function, put it in the procedure linkage table. We
4329 will fill in the contents of the procedure linkage table later,
4330 when we know the address of the .got section. */
24a1ba0f 4331 if (h->type == STT_FUNC
f5385ebf 4332 || h->needs_plt)
252b5132 4333 {
5e681ec4
PB
4334 if (h->plt.refcount <= 0
4335 || SYMBOL_CALLS_LOCAL (info, h)
4336 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
4337 && h->root.type == bfd_link_hash_undefweak))
252b5132
RH
4338 {
4339 /* This case can occur if we saw a PLT32 reloc in an input
5e681ec4
PB
4340 file, but the symbol was never referred to by a dynamic
4341 object, or if all references were garbage collected. In
4342 such a case, we don't actually need to build a procedure
4343 linkage table, and we can just do a PC24 reloc instead. */
4344 h->plt.offset = (bfd_vma) -1;
f5385ebf 4345 h->needs_plt = 0;
252b5132
RH
4346 }
4347
b34976b6 4348 return TRUE;
252b5132 4349 }
5e681ec4
PB
4350 else
4351 /* It's possible that we incorrectly decided a .plt reloc was
5b5bb741
PB
4352 needed for an R_ARM_PC24 or similar reloc to a non-function sym
4353 in check_relocs. We can't decide accurately between function
4354 and non-function syms in check-relocs; Objects loaded later in
5e681ec4
PB
4355 the link may change h->type. So fix it now. */
4356 h->plt.offset = (bfd_vma) -1;
252b5132
RH
4357
4358 /* If this is a weak symbol, and there is a real definition, the
4359 processor independent code will have arranged for us to see the
4360 real definition first, and we can just use the same value. */
f6e332e6 4361 if (h->u.weakdef != NULL)
252b5132 4362 {
f6e332e6
AM
4363 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
4364 || h->u.weakdef->root.type == bfd_link_hash_defweak);
4365 h->root.u.def.section = h->u.weakdef->root.u.def.section;
4366 h->root.u.def.value = h->u.weakdef->root.u.def.value;
b34976b6 4367 return TRUE;
252b5132
RH
4368 }
4369
4370 /* This is a reference to a symbol defined by a dynamic object which
4371 is not a function. */
4372
4373 /* If we are creating a shared library, we must presume that the
4374 only references to the symbol are via the global offset table.
4375 For such cases we need not do anything here; the relocations will
4376 be handled correctly by relocate_section. */
4377 if (info->shared)
b34976b6 4378 return TRUE;
252b5132
RH
4379
4380 /* We must allocate the symbol in our .dynbss section, which will
4381 become part of the .bss section of the executable. There will be
4382 an entry for this symbol in the .dynsym section. The dynamic
4383 object will contain position independent code, so all references
4384 from the dynamic object to this symbol will go through the global
4385 offset table. The dynamic linker will use the .dynsym entry to
4386 determine the address it must put in the global offset table, so
4387 both the dynamic object and the regular object will refer to the
4388 same memory location for the variable. */
252b5132
RH
4389 s = bfd_get_section_by_name (dynobj, ".dynbss");
4390 BFD_ASSERT (s != NULL);
4391
4392 /* We must generate a R_ARM_COPY reloc to tell the dynamic linker to
4393 copy the initial value out of the dynamic object and into the
4394 runtime process image. We need to remember the offset into the
4395 .rel.bss section we are going to use. */
4396 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
4397 {
4398 asection *srel;
4399
4400 srel = bfd_get_section_by_name (dynobj, ".rel.bss");
4401 BFD_ASSERT (srel != NULL);
eea6121a 4402 srel->size += sizeof (Elf32_External_Rel);
f5385ebf 4403 h->needs_copy = 1;
252b5132
RH
4404 }
4405
4406 /* We need to figure out the alignment required for this symbol. I
4407 have no idea how ELF linkers handle this. */
4408 power_of_two = bfd_log2 (h->size);
4409 if (power_of_two > 3)
4410 power_of_two = 3;
4411
4412 /* Apply the required alignment. */
eea6121a 4413 s->size = BFD_ALIGN (s->size, (bfd_size_type) (1 << power_of_two));
252b5132
RH
4414 if (power_of_two > bfd_get_section_alignment (dynobj, s))
4415 {
4416 if (! bfd_set_section_alignment (dynobj, s, power_of_two))
b34976b6 4417 return FALSE;
252b5132
RH
4418 }
4419
4420 /* Define the symbol as being at this point in the section. */
4421 h->root.u.def.section = s;
eea6121a 4422 h->root.u.def.value = s->size;
252b5132
RH
4423
4424 /* Increment the section size to make room for the symbol. */
eea6121a 4425 s->size += h->size;
252b5132 4426
b34976b6 4427 return TRUE;
252b5132
RH
4428}
4429
5e681ec4
PB
4430/* Allocate space in .plt, .got and associated reloc sections for
4431 dynamic relocs. */
4432
4433static bfd_boolean
57e8b36a 4434allocate_dynrelocs (struct elf_link_hash_entry *h, void * inf)
5e681ec4
PB
4435{
4436 struct bfd_link_info *info;
4437 struct elf32_arm_link_hash_table *htab;
4438 struct elf32_arm_link_hash_entry *eh;
4439 struct elf32_arm_relocs_copied *p;
4440
4441 if (h->root.type == bfd_link_hash_indirect)
4442 return TRUE;
4443
4444 if (h->root.type == bfd_link_hash_warning)
4445 /* When warning symbols are created, they **replace** the "real"
4446 entry in the hash table, thus we never get to see the real
4447 symbol in a hash traversal. So look at it now. */
4448 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4449
4450 info = (struct bfd_link_info *) inf;
4451 htab = elf32_arm_hash_table (info);
4452
4453 if (htab->root.dynamic_sections_created
4454 && h->plt.refcount > 0)
4455 {
4456 /* Make sure this symbol is output as a dynamic symbol.
4457 Undefined weak syms won't yet be marked as dynamic. */
4458 if (h->dynindx == -1
f5385ebf 4459 && !h->forced_local)
5e681ec4 4460 {
c152c796 4461 if (! bfd_elf_link_record_dynamic_symbol (info, h))
5e681ec4
PB
4462 return FALSE;
4463 }
4464
4465 if (info->shared
7359ea65 4466 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
5e681ec4
PB
4467 {
4468 asection *s = htab->splt;
4469
4470 /* If this is the first .plt entry, make room for the special
4471 first entry. */
eea6121a 4472 if (s->size == 0)
e5a52504 4473 s->size += htab->plt_header_size;
5e681ec4 4474
eea6121a 4475 h->plt.offset = s->size;
5e681ec4
PB
4476
4477 /* If this symbol is not defined in a regular file, and we are
4478 not generating a shared library, then set the symbol to this
4479 location in the .plt. This is required to make function
4480 pointers compare as equal between the normal executable and
4481 the shared library. */
4482 if (! info->shared
f5385ebf 4483 && !h->def_regular)
5e681ec4
PB
4484 {
4485 h->root.u.def.section = s;
4486 h->root.u.def.value = h->plt.offset;
4487 }
4488
4489 /* Make room for this entry. */
e5a52504 4490 s->size += htab->plt_entry_size;
5e681ec4 4491
e5a52504
MM
4492 if (!htab->symbian_p)
4493 /* We also need to make an entry in the .got.plt section, which
4494 will be placed in the .got section by the linker script. */
4495 htab->sgotplt->size += 4;
5e681ec4
PB
4496
4497 /* We also need to make an entry in the .rel.plt section. */
eea6121a 4498 htab->srelplt->size += sizeof (Elf32_External_Rel);
5e681ec4
PB
4499 }
4500 else
4501 {
4502 h->plt.offset = (bfd_vma) -1;
f5385ebf 4503 h->needs_plt = 0;
5e681ec4
PB
4504 }
4505 }
4506 else
4507 {
4508 h->plt.offset = (bfd_vma) -1;
f5385ebf 4509 h->needs_plt = 0;
5e681ec4
PB
4510 }
4511
4512 if (h->got.refcount > 0)
4513 {
4514 asection *s;
4515 bfd_boolean dyn;
4516
4517 /* Make sure this symbol is output as a dynamic symbol.
4518 Undefined weak syms won't yet be marked as dynamic. */
4519 if (h->dynindx == -1
f5385ebf 4520 && !h->forced_local)
5e681ec4 4521 {
c152c796 4522 if (! bfd_elf_link_record_dynamic_symbol (info, h))
5e681ec4
PB
4523 return FALSE;
4524 }
4525
e5a52504
MM
4526 if (!htab->symbian_p)
4527 {
4528 s = htab->sgot;
4529 h->got.offset = s->size;
4530 s->size += 4;
4531 dyn = htab->root.dynamic_sections_created;
4532 if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
4533 || h->root.type != bfd_link_hash_undefweak)
4534 && (info->shared
4535 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
4536 htab->srelgot->size += sizeof (Elf32_External_Rel);
4537 }
5e681ec4
PB
4538 }
4539 else
4540 h->got.offset = (bfd_vma) -1;
4541
4542 eh = (struct elf32_arm_link_hash_entry *) h;
4543 if (eh->relocs_copied == NULL)
4544 return TRUE;
4545
4546 /* In the shared -Bsymbolic case, discard space allocated for
4547 dynamic pc-relative relocs against symbols which turn out to be
4548 defined in regular objects. For the normal shared case, discard
4549 space for pc-relative relocs that have become local due to symbol
4550 visibility changes. */
4551
4552 if (info->shared)
4553 {
7359ea65
DJ
4554 /* Discard relocs on undefined weak syms with non-default
4555 visibility. */
5e681ec4
PB
4556 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
4557 && h->root.type == bfd_link_hash_undefweak)
4558 eh->relocs_copied = NULL;
4559 }
4560 else
4561 {
4562 /* For the non-shared case, discard space for relocs against
4563 symbols which turn out to need copy relocs or are not
4564 dynamic. */
4565
f5385ebf
AM
4566 if (!h->non_got_ref
4567 && ((h->def_dynamic
4568 && !h->def_regular)
5e681ec4
PB
4569 || (htab->root.dynamic_sections_created
4570 && (h->root.type == bfd_link_hash_undefweak
4571 || h->root.type == bfd_link_hash_undefined))))
4572 {
4573 /* Make sure this symbol is output as a dynamic symbol.
4574 Undefined weak syms won't yet be marked as dynamic. */
4575 if (h->dynindx == -1
f5385ebf 4576 && !h->forced_local)
5e681ec4 4577 {
c152c796 4578 if (! bfd_elf_link_record_dynamic_symbol (info, h))
5e681ec4
PB
4579 return FALSE;
4580 }
4581
4582 /* If that succeeded, we know we'll be keeping all the
4583 relocs. */
4584 if (h->dynindx != -1)
4585 goto keep;
4586 }
4587
4588 eh->relocs_copied = NULL;
4589
4590 keep: ;
4591 }
4592
4593 /* Finally, allocate space. */
4594 for (p = eh->relocs_copied; p != NULL; p = p->next)
4595 {
4596 asection *sreloc = elf_section_data (p->section)->sreloc;
eea6121a 4597 sreloc->size += p->count * sizeof (Elf32_External_Rel);
5e681ec4
PB
4598 }
4599
4600 return TRUE;
4601}
4602
08d1f311
DJ
4603/* Find any dynamic relocs that apply to read-only sections. */
4604
4605static bfd_boolean
4606elf32_arm_readonly_dynrelocs (struct elf_link_hash_entry *h, PTR inf)
4607{
4608 struct elf32_arm_link_hash_entry *eh;
4609 struct elf32_arm_relocs_copied *p;
4610
4611 if (h->root.type == bfd_link_hash_warning)
4612 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4613
4614 eh = (struct elf32_arm_link_hash_entry *) h;
4615 for (p = eh->relocs_copied; p != NULL; p = p->next)
4616 {
4617 asection *s = p->section;
4618
4619 if (s != NULL && (s->flags & SEC_READONLY) != 0)
4620 {
4621 struct bfd_link_info *info = (struct bfd_link_info *) inf;
4622
4623 info->flags |= DF_TEXTREL;
4624
4625 /* Not an error, just cut short the traversal. */
4626 return FALSE;
4627 }
4628 }
4629 return TRUE;
4630}
4631
252b5132
RH
4632/* Set the sizes of the dynamic sections. */
4633
b34976b6 4634static bfd_boolean
57e8b36a
NC
4635elf32_arm_size_dynamic_sections (bfd * output_bfd ATTRIBUTE_UNUSED,
4636 struct bfd_link_info * info)
252b5132
RH
4637{
4638 bfd * dynobj;
4639 asection * s;
b34976b6
AM
4640 bfd_boolean plt;
4641 bfd_boolean relocs;
5e681ec4
PB
4642 bfd *ibfd;
4643 struct elf32_arm_link_hash_table *htab;
252b5132 4644
5e681ec4 4645 htab = elf32_arm_hash_table (info);
252b5132
RH
4646 dynobj = elf_hash_table (info)->dynobj;
4647 BFD_ASSERT (dynobj != NULL);
4648
4649 if (elf_hash_table (info)->dynamic_sections_created)
4650 {
4651 /* Set the contents of the .interp section to the interpreter. */
893c4fe2 4652 if (info->executable)
252b5132
RH
4653 {
4654 s = bfd_get_section_by_name (dynobj, ".interp");
4655 BFD_ASSERT (s != NULL);
eea6121a 4656 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
252b5132
RH
4657 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
4658 }
4659 }
5e681ec4
PB
4660
4661 /* Set up .got offsets for local syms, and space for local dynamic
4662 relocs. */
4663 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
252b5132 4664 {
5e681ec4
PB
4665 bfd_signed_vma *local_got;
4666 bfd_signed_vma *end_local_got;
4667 char *local_tls_type;
4668 bfd_size_type locsymcount;
4669 Elf_Internal_Shdr *symtab_hdr;
4670 asection *srel;
4671
4672 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
4673 continue;
4674
4675 for (s = ibfd->sections; s != NULL; s = s->next)
4676 {
4677 struct elf32_arm_relocs_copied *p;
4678
4679 for (p = *((struct elf32_arm_relocs_copied **)
4680 &elf_section_data (s)->local_dynrel);
4681 p != NULL;
4682 p = p->next)
4683 {
4684 if (!bfd_is_abs_section (p->section)
4685 && bfd_is_abs_section (p->section->output_section))
4686 {
4687 /* Input section has been discarded, either because
4688 it is a copy of a linkonce section or due to
4689 linker script /DISCARD/, so we'll be discarding
4690 the relocs too. */
4691 }
4692 else if (p->count != 0)
4693 {
4694 srel = elf_section_data (p->section)->sreloc;
eea6121a 4695 srel->size += p->count * sizeof (Elf32_External_Rel);
5e681ec4
PB
4696 if ((p->section->output_section->flags & SEC_READONLY) != 0)
4697 info->flags |= DF_TEXTREL;
4698 }
4699 }
4700 }
4701
4702 local_got = elf_local_got_refcounts (ibfd);
4703 if (!local_got)
4704 continue;
4705
4706 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
4707 locsymcount = symtab_hdr->sh_info;
4708 end_local_got = local_got + locsymcount;
4709 s = htab->sgot;
4710 srel = htab->srelgot;
4711 for (; local_got < end_local_got; ++local_got, ++local_tls_type)
4712 {
4713 if (*local_got > 0)
4714 {
eea6121a
AM
4715 *local_got = s->size;
4716 s->size += 4;
5e681ec4 4717 if (info->shared)
eea6121a 4718 srel->size += sizeof (Elf32_External_Rel);
5e681ec4
PB
4719 }
4720 else
4721 *local_got = (bfd_vma) -1;
4722 }
252b5132
RH
4723 }
4724
5e681ec4
PB
4725 /* Allocate global sym .plt and .got entries, and space for global
4726 sym dynamic relocs. */
57e8b36a 4727 elf_link_hash_traverse (& htab->root, allocate_dynrelocs, info);
252b5132
RH
4728
4729 /* The check_relocs and adjust_dynamic_symbol entry points have
4730 determined the sizes of the various dynamic sections. Allocate
4731 memory for them. */
b34976b6
AM
4732 plt = FALSE;
4733 relocs = FALSE;
252b5132
RH
4734 for (s = dynobj->sections; s != NULL; s = s->next)
4735 {
4736 const char * name;
b34976b6 4737 bfd_boolean strip;
252b5132
RH
4738
4739 if ((s->flags & SEC_LINKER_CREATED) == 0)
4740 continue;
4741
4742 /* It's OK to base decisions on the section name, because none
4743 of the dynobj section names depend upon the input files. */
4744 name = bfd_get_section_name (dynobj, s);
4745
b34976b6 4746 strip = FALSE;
252b5132 4747
24a1ba0f 4748 if (strcmp (name, ".plt") == 0)
252b5132 4749 {
eea6121a 4750 if (s->size == 0)
252b5132
RH
4751 {
4752 /* Strip this section if we don't need it; see the
4753 comment below. */
b34976b6 4754 strip = TRUE;
252b5132
RH
4755 }
4756 else
4757 {
4758 /* Remember whether there is a PLT. */
b34976b6 4759 plt = TRUE;
252b5132
RH
4760 }
4761 }
4762 else if (strncmp (name, ".rel", 4) == 0)
4763 {
eea6121a 4764 if (s->size == 0)
252b5132
RH
4765 {
4766 /* If we don't need this section, strip it from the
4767 output file. This is mostly to handle .rel.bss and
4768 .rel.plt. We must create both sections in
4769 create_dynamic_sections, because they must be created
4770 before the linker maps input sections to output
4771 sections. The linker does that before
4772 adjust_dynamic_symbol is called, and it is that
4773 function which decides whether anything needs to go
4774 into these sections. */
b34976b6 4775 strip = TRUE;
252b5132
RH
4776 }
4777 else
4778 {
252b5132
RH
4779 /* Remember whether there are any reloc sections other
4780 than .rel.plt. */
4781 if (strcmp (name, ".rel.plt") != 0)
b34976b6 4782 relocs = TRUE;
252b5132
RH
4783
4784 /* We use the reloc_count field as a counter if we need
4785 to copy relocs into the output file. */
4786 s->reloc_count = 0;
4787 }
4788 }
4789 else if (strncmp (name, ".got", 4) != 0)
4790 {
4791 /* It's not one of our sections, so don't allocate space. */
4792 continue;
4793 }
4794
4795 if (strip)
4796 {
52585bb8 4797 _bfd_strip_section_from_output (info, s);
252b5132
RH
4798 continue;
4799 }
4800
4801 /* Allocate memory for the section contents. */
eea6121a
AM
4802 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
4803 if (s->contents == NULL && s->size != 0)
b34976b6 4804 return FALSE;
252b5132
RH
4805 }
4806
4807 if (elf_hash_table (info)->dynamic_sections_created)
4808 {
4809 /* Add some entries to the .dynamic section. We fill in the
4810 values later, in elf32_arm_finish_dynamic_sections, but we
4811 must add the entries now so that we get the correct size for
4812 the .dynamic section. The DT_DEBUG entry is filled in by the
4813 dynamic linker and used by the debugger. */
dc810e39 4814#define add_dynamic_entry(TAG, VAL) \
5a580b3a 4815 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39
AM
4816
4817 if (!info->shared)
252b5132 4818 {
dc810e39 4819 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 4820 return FALSE;
252b5132
RH
4821 }
4822
4823 if (plt)
4824 {
dc810e39
AM
4825 if ( !add_dynamic_entry (DT_PLTGOT, 0)
4826 || !add_dynamic_entry (DT_PLTRELSZ, 0)
4827 || !add_dynamic_entry (DT_PLTREL, DT_REL)
4828 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 4829 return FALSE;
252b5132
RH
4830 }
4831
4832 if (relocs)
4833 {
dc810e39
AM
4834 if ( !add_dynamic_entry (DT_REL, 0)
4835 || !add_dynamic_entry (DT_RELSZ, 0)
4836 || !add_dynamic_entry (DT_RELENT, sizeof (Elf32_External_Rel)))
b34976b6 4837 return FALSE;
252b5132
RH
4838 }
4839
08d1f311
DJ
4840 /* If any dynamic relocs apply to a read-only section,
4841 then we need a DT_TEXTREL entry. */
4842 if ((info->flags & DF_TEXTREL) == 0)
4843 elf_link_hash_traverse (&htab->root, elf32_arm_readonly_dynrelocs,
4844 (PTR) info);
4845
99e4ae17 4846 if ((info->flags & DF_TEXTREL) != 0)
252b5132 4847 {
dc810e39 4848 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 4849 return FALSE;
d6cf2879 4850 info->flags |= DF_TEXTREL;
252b5132
RH
4851 }
4852 }
dc810e39 4853#undef add_synamic_entry
252b5132 4854
b34976b6 4855 return TRUE;
252b5132
RH
4856}
4857
252b5132
RH
4858/* Finish up dynamic symbol handling. We set the contents of various
4859 dynamic sections here. */
4860
b34976b6 4861static bfd_boolean
57e8b36a
NC
4862elf32_arm_finish_dynamic_symbol (bfd * output_bfd, struct bfd_link_info * info,
4863 struct elf_link_hash_entry * h, Elf_Internal_Sym * sym)
252b5132
RH
4864{
4865 bfd * dynobj;
e5a52504 4866 struct elf32_arm_link_hash_table *htab;
252b5132
RH
4867
4868 dynobj = elf_hash_table (info)->dynobj;
e5a52504 4869 htab = elf32_arm_hash_table (info);
252b5132
RH
4870
4871 if (h->plt.offset != (bfd_vma) -1)
4872 {
4873 asection * splt;
252b5132 4874 asection * srel;
e5a52504 4875 bfd_byte *loc;
24a1ba0f 4876 bfd_vma plt_index;
947216bf 4877 Elf_Internal_Rela rel;
252b5132
RH
4878
4879 /* This symbol has an entry in the procedure linkage table. Set
4880 it up. */
4881
4882 BFD_ASSERT (h->dynindx != -1);
4883
4884 splt = bfd_get_section_by_name (dynobj, ".plt");
252b5132 4885 srel = bfd_get_section_by_name (dynobj, ".rel.plt");
e5a52504 4886 BFD_ASSERT (splt != NULL && srel != NULL);
252b5132 4887
24a1ba0f
NC
4888 /* Get the index in the procedure linkage table which
4889 corresponds to this symbol. This is the index of this symbol
4890 in all the symbols for which we are making plt entries. The
4891 first entry in the procedure linkage table is reserved. */
e5a52504
MM
4892 plt_index = ((h->plt.offset - htab->plt_header_size)
4893 / htab->plt_entry_size);
252b5132 4894
e5a52504
MM
4895 /* Fill in the entry in the procedure linkage table. */
4896 if (htab->symbian_p)
4897 {
4898 unsigned i;
4899 for (i = 0; i < htab->plt_entry_size / 4; ++i)
4900 bfd_put_32 (output_bfd,
4901 elf32_arm_symbian_plt_entry[i],
4902 splt->contents + h->plt.offset + 4 * i);
4903
4904 /* Fill in the entry in the .rel.plt section. */
2a1b9a48
MM
4905 rel.r_offset = (splt->output_section->vma
4906 + splt->output_offset
e5a52504
MM
4907 + h->plt.offset + 4 * (i - 1));
4908 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARM_GLOB_DAT);
4909 }
4910 else
4911 {
4912 bfd_vma got_offset;
4913 bfd_vma got_displacement;
4914 asection * sgot;
4915
4916 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
4917 BFD_ASSERT (sgot != NULL);
4918
4919 /* Get the offset into the .got table of the entry that
4920 corresponds to this function. Each .got entry is 4 bytes.
4921 The first three are reserved. */
4922 got_offset = (plt_index + 3) * 4;
4923
4924 /* Calculate the displacement between the PLT slot and the
4925 entry in the GOT. */
4926 got_displacement = (sgot->output_section->vma
4927 + sgot->output_offset
4928 + got_offset
4929 - splt->output_section->vma
4930 - splt->output_offset
4931 - h->plt.offset
4932 - 8);
5e681ec4 4933
e5a52504 4934 BFD_ASSERT ((got_displacement & 0xf0000000) == 0);
5e681ec4 4935
e5a52504
MM
4936 bfd_put_32 (output_bfd, elf32_arm_plt_entry[0] | ((got_displacement & 0x0ff00000) >> 20),
4937 splt->contents + h->plt.offset + 0);
4938 bfd_put_32 (output_bfd, elf32_arm_plt_entry[1] | ((got_displacement & 0x000ff000) >> 12),
4939 splt->contents + h->plt.offset + 4);
4940 bfd_put_32 (output_bfd, elf32_arm_plt_entry[2] | (got_displacement & 0x00000fff),
4941 splt->contents + h->plt.offset + 8);
5e681ec4 4942#ifdef FOUR_WORD_PLT
e5a52504
MM
4943 bfd_put_32 (output_bfd, elf32_arm_plt_entry[3],
4944 splt->contents + h->plt.offset + 12);
5e681ec4 4945#endif
252b5132 4946
e5a52504
MM
4947 /* Fill in the entry in the global offset table. */
4948 bfd_put_32 (output_bfd,
4949 (splt->output_section->vma
4950 + splt->output_offset),
4951 sgot->contents + got_offset);
4952
4953 /* Fill in the entry in the .rel.plt section. */
4954 rel.r_offset = (sgot->output_section->vma
4955 + sgot->output_offset
4956 + got_offset);
4957 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARM_JUMP_SLOT);
4958 }
57e8b36a 4959
947216bf
AM
4960 loc = srel->contents + plt_index * sizeof (Elf32_External_Rel);
4961 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
252b5132 4962
f5385ebf 4963 if (!h->def_regular)
252b5132
RH
4964 {
4965 /* Mark the symbol as undefined, rather than as defined in
4966 the .plt section. Leave the value alone. */
4967 sym->st_shndx = SHN_UNDEF;
d982ba73
PB
4968 /* If the symbol is weak, we do need to clear the value.
4969 Otherwise, the PLT entry would provide a definition for
4970 the symbol even if the symbol wasn't defined anywhere,
4971 and so the symbol would never be NULL. */
f5385ebf 4972 if (!h->ref_regular_nonweak)
d982ba73 4973 sym->st_value = 0;
252b5132
RH
4974 }
4975 }
4976
4977 if (h->got.offset != (bfd_vma) -1)
4978 {
4979 asection * sgot;
4980 asection * srel;
947216bf
AM
4981 Elf_Internal_Rela rel;
4982 bfd_byte *loc;
252b5132
RH
4983
4984 /* This symbol has an entry in the global offset table. Set it
4985 up. */
252b5132
RH
4986 sgot = bfd_get_section_by_name (dynobj, ".got");
4987 srel = bfd_get_section_by_name (dynobj, ".rel.got");
4988 BFD_ASSERT (sgot != NULL && srel != NULL);
4989
4990 rel.r_offset = (sgot->output_section->vma
4991 + sgot->output_offset
dc810e39 4992 + (h->got.offset &~ (bfd_vma) 1));
252b5132 4993
5e681ec4
PB
4994 /* If this is a static link, or it is a -Bsymbolic link and the
4995 symbol is defined locally or was forced to be local because
4996 of a version file, we just want to emit a RELATIVE reloc.
4997 The entry in the global offset table will already have been
4998 initialized in the relocate_section function. */
252b5132 4999 if (info->shared
5e681ec4
PB
5000 && SYMBOL_REFERENCES_LOCAL (info, h))
5001 {
5002 BFD_ASSERT((h->got.offset & 1) != 0);
5003 rel.r_info = ELF32_R_INFO (0, R_ARM_RELATIVE);
5004 }
252b5132
RH
5005 else
5006 {
5e681ec4 5007 BFD_ASSERT((h->got.offset & 1) == 0);
252b5132
RH
5008 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset);
5009 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARM_GLOB_DAT);
5010 }
5011
947216bf
AM
5012 loc = srel->contents + srel->reloc_count++ * sizeof (Elf32_External_Rel);
5013 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
252b5132
RH
5014 }
5015
f5385ebf 5016 if (h->needs_copy)
252b5132
RH
5017 {
5018 asection * s;
947216bf
AM
5019 Elf_Internal_Rela rel;
5020 bfd_byte *loc;
252b5132
RH
5021
5022 /* This symbol needs a copy reloc. Set it up. */
252b5132
RH
5023 BFD_ASSERT (h->dynindx != -1
5024 && (h->root.type == bfd_link_hash_defined
5025 || h->root.type == bfd_link_hash_defweak));
5026
5027 s = bfd_get_section_by_name (h->root.u.def.section->owner,
5028 ".rel.bss");
5029 BFD_ASSERT (s != NULL);
5030
5031 rel.r_offset = (h->root.u.def.value
5032 + h->root.u.def.section->output_section->vma
5033 + h->root.u.def.section->output_offset);
5034 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARM_COPY);
947216bf
AM
5035 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rel);
5036 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
252b5132
RH
5037 }
5038
5039 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
5040 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
5041 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
5042 sym->st_shndx = SHN_ABS;
5043
b34976b6 5044 return TRUE;
252b5132
RH
5045}
5046
5047/* Finish up the dynamic sections. */
5048
b34976b6 5049static bfd_boolean
57e8b36a 5050elf32_arm_finish_dynamic_sections (bfd * output_bfd, struct bfd_link_info * info)
252b5132
RH
5051{
5052 bfd * dynobj;
5053 asection * sgot;
5054 asection * sdyn;
5055
5056 dynobj = elf_hash_table (info)->dynobj;
5057
5058 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
229fcec5 5059 BFD_ASSERT (elf32_arm_hash_table (info)->symbian_p || sgot != NULL);
252b5132
RH
5060 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
5061
5062 if (elf_hash_table (info)->dynamic_sections_created)
5063 {
5064 asection *splt;
5065 Elf32_External_Dyn *dyncon, *dynconend;
229fcec5 5066 struct elf32_arm_link_hash_table *htab;
252b5132 5067
229fcec5 5068 htab = elf32_arm_hash_table (info);
252b5132 5069 splt = bfd_get_section_by_name (dynobj, ".plt");
24a1ba0f 5070 BFD_ASSERT (splt != NULL && sdyn != NULL);
252b5132
RH
5071
5072 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 5073 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
9b485d32 5074
252b5132
RH
5075 for (; dyncon < dynconend; dyncon++)
5076 {
5077 Elf_Internal_Dyn dyn;
5078 const char * name;
5079 asection * s;
5080
5081 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
5082
5083 switch (dyn.d_tag)
5084 {
229fcec5
MM
5085 unsigned int type;
5086
252b5132
RH
5087 default:
5088 break;
5089
229fcec5
MM
5090 case DT_HASH:
5091 name = ".hash";
5092 goto get_vma_if_bpabi;
5093 case DT_STRTAB:
5094 name = ".dynstr";
5095 goto get_vma_if_bpabi;
5096 case DT_SYMTAB:
5097 name = ".dynsym";
5098 goto get_vma_if_bpabi;
c0042f5d
MM
5099 case DT_VERSYM:
5100 name = ".gnu.version";
5101 goto get_vma_if_bpabi;
5102 case DT_VERDEF:
5103 name = ".gnu.version_d";
5104 goto get_vma_if_bpabi;
5105 case DT_VERNEED:
5106 name = ".gnu.version_r";
5107 goto get_vma_if_bpabi;
5108
252b5132
RH
5109 case DT_PLTGOT:
5110 name = ".got";
5111 goto get_vma;
5112 case DT_JMPREL:
5113 name = ".rel.plt";
5114 get_vma:
5115 s = bfd_get_section_by_name (output_bfd, name);
5116 BFD_ASSERT (s != NULL);
229fcec5
MM
5117 if (!htab->symbian_p)
5118 dyn.d_un.d_ptr = s->vma;
5119 else
5120 /* In the BPABI, tags in the PT_DYNAMIC section point
5121 at the file offset, not the memory address, for the
5122 convenience of the post linker. */
5123 dyn.d_un.d_ptr = s->filepos;
252b5132
RH
5124 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5125 break;
5126
229fcec5
MM
5127 get_vma_if_bpabi:
5128 if (htab->symbian_p)
5129 goto get_vma;
5130 break;
5131
252b5132
RH
5132 case DT_PLTRELSZ:
5133 s = bfd_get_section_by_name (output_bfd, ".rel.plt");
5134 BFD_ASSERT (s != NULL);
eea6121a 5135 dyn.d_un.d_val = s->size;
252b5132
RH
5136 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5137 break;
229fcec5 5138
252b5132 5139 case DT_RELSZ:
229fcec5
MM
5140 if (!htab->symbian_p)
5141 {
5142 /* My reading of the SVR4 ABI indicates that the
5143 procedure linkage table relocs (DT_JMPREL) should be
5144 included in the overall relocs (DT_REL). This is
5145 what Solaris does. However, UnixWare can not handle
5146 that case. Therefore, we override the DT_RELSZ entry
5147 here to make it not include the JMPREL relocs. Since
5148 the linker script arranges for .rel.plt to follow all
5149 other relocation sections, we don't have to worry
5150 about changing the DT_REL entry. */
5151 s = bfd_get_section_by_name (output_bfd, ".rel.plt");
5152 if (s != NULL)
5153 dyn.d_un.d_val -= s->size;
5154 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5155 break;
5156 }
5157 /* Fall through */
5158
5159 case DT_REL:
5160 case DT_RELA:
5161 case DT_RELASZ:
5162 /* In the BPABI, the DT_REL tag must point at the file
5163 offset, not the VMA, of the first relocation
5164 section. So, we use code similar to that in
5165 elflink.c, but do not check for SHF_ALLOC on the
5166 relcoation section, since relocations sections are
5167 never allocated under the BPABI. The comments above
5168 about Unixware notwithstanding, we include all of the
5169 relocations here. */
5170 if (htab->symbian_p)
5171 {
5172 unsigned int i;
5173 type = ((dyn.d_tag == DT_REL || dyn.d_tag == DT_RELSZ)
5174 ? SHT_REL : SHT_RELA);
5175 dyn.d_un.d_val = 0;
5176 for (i = 1; i < elf_numsections (output_bfd); i++)
5177 {
5178 Elf_Internal_Shdr *hdr
5179 = elf_elfsections (output_bfd)[i];
5180 if (hdr->sh_type == type)
5181 {
5182 if (dyn.d_tag == DT_RELSZ
5183 || dyn.d_tag == DT_RELASZ)
5184 dyn.d_un.d_val += hdr->sh_size;
5185 else if (dyn.d_un.d_val == 0
5186 || hdr->sh_offset < dyn.d_un.d_val)
5187 dyn.d_un.d_val = hdr->sh_offset;
5188 }
5189 }
5190 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5191 }
252b5132 5192 break;
88f7bcd5
NC
5193
5194 /* Set the bottom bit of DT_INIT/FINI if the
5195 corresponding function is Thumb. */
5196 case DT_INIT:
5197 name = info->init_function;
5198 goto get_sym;
5199 case DT_FINI:
5200 name = info->fini_function;
5201 get_sym:
5202 /* If it wasn't set by elf_bfd_final_link
4cc11e76 5203 then there is nothing to adjust. */
88f7bcd5
NC
5204 if (dyn.d_un.d_val != 0)
5205 {
5206 struct elf_link_hash_entry * eh;
5207
5208 eh = elf_link_hash_lookup (elf_hash_table (info), name,
b34976b6 5209 FALSE, FALSE, TRUE);
88f7bcd5
NC
5210 if (eh != (struct elf_link_hash_entry *) NULL
5211 && ELF_ST_TYPE (eh->type) == STT_ARM_TFUNC)
5212 {
5213 dyn.d_un.d_val |= 1;
b34976b6 5214 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
88f7bcd5
NC
5215 }
5216 }
5217 break;
252b5132
RH
5218 }
5219 }
5220
24a1ba0f 5221 /* Fill in the first entry in the procedure linkage table. */
e5a52504 5222 if (splt->size > 0 && elf32_arm_hash_table (info)->plt_header_size)
f7a74f8c 5223 {
5e681ec4
PB
5224 bfd_vma got_displacement;
5225
5226 /* Calculate the displacement between the PLT slot and &GOT[0]. */
5227 got_displacement = (sgot->output_section->vma
5228 + sgot->output_offset
5229 - splt->output_section->vma
5230 - splt->output_offset
5231 - 16);
5232
f7a74f8c
NC
5233 bfd_put_32 (output_bfd, elf32_arm_plt0_entry[0], splt->contents + 0);
5234 bfd_put_32 (output_bfd, elf32_arm_plt0_entry[1], splt->contents + 4);
5235 bfd_put_32 (output_bfd, elf32_arm_plt0_entry[2], splt->contents + 8);
5236 bfd_put_32 (output_bfd, elf32_arm_plt0_entry[3], splt->contents + 12);
5e681ec4
PB
5237#ifdef FOUR_WORD_PLT
5238 /* The displacement value goes in the otherwise-unused last word of
5239 the second entry. */
5240 bfd_put_32 (output_bfd, got_displacement, splt->contents + 28);
5241#else
5242 bfd_put_32 (output_bfd, got_displacement, splt->contents + 16);
5243#endif
f7a74f8c 5244 }
252b5132
RH
5245
5246 /* UnixWare sets the entsize of .plt to 4, although that doesn't
5247 really seem like the right value. */
5248 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 4;
5249 }
5250
5251 /* Fill in the first three entries in the global offset table. */
229fcec5 5252 if (sgot)
252b5132 5253 {
229fcec5
MM
5254 if (sgot->size > 0)
5255 {
5256 if (sdyn == NULL)
5257 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
5258 else
5259 bfd_put_32 (output_bfd,
5260 sdyn->output_section->vma + sdyn->output_offset,
5261 sgot->contents);
5262 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
5263 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
5264 }
252b5132 5265
229fcec5
MM
5266 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
5267 }
252b5132 5268
b34976b6 5269 return TRUE;
252b5132
RH
5270}
5271
ba96a88f 5272static void
57e8b36a 5273elf32_arm_post_process_headers (bfd * abfd, struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
ba96a88f 5274{
9b485d32 5275 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
e489d0ae 5276 struct elf32_arm_link_hash_table *globals;
ba96a88f
NC
5277
5278 i_ehdrp = elf_elfheader (abfd);
5279
5280 i_ehdrp->e_ident[EI_OSABI] = ARM_ELF_OS_ABI_VERSION;
5281 i_ehdrp->e_ident[EI_ABIVERSION] = ARM_ELF_ABI_VERSION;
e489d0ae 5282
93204d3a
PB
5283 if (link_info)
5284 {
5285 globals = elf32_arm_hash_table (link_info);
5286 if (globals->byteswap_code)
5287 i_ehdrp->e_flags |= EF_ARM_BE8;
5288 }
ba96a88f
NC
5289}
5290
99e4ae17 5291static enum elf_reloc_type_class
57e8b36a 5292elf32_arm_reloc_type_class (const Elf_Internal_Rela *rela)
99e4ae17 5293{
f51e552e 5294 switch ((int) ELF32_R_TYPE (rela->r_info))
99e4ae17
AJ
5295 {
5296 case R_ARM_RELATIVE:
5297 return reloc_class_relative;
5298 case R_ARM_JUMP_SLOT:
5299 return reloc_class_plt;
5300 case R_ARM_COPY:
5301 return reloc_class_copy;
5302 default:
5303 return reloc_class_normal;
5304 }
5305}
5306
e16bb312
NC
5307/* Set the right machine number for an Arm ELF file. */
5308
5309static bfd_boolean
57e8b36a 5310elf32_arm_section_flags (flagword *flags, const Elf_Internal_Shdr *hdr)
e16bb312
NC
5311{
5312 if (hdr->sh_type == SHT_NOTE)
5313 *flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_SAME_CONTENTS;
5314
5315 return TRUE;
5316}
5317
e489d0ae 5318static void
57e8b36a 5319elf32_arm_final_write_processing (bfd *abfd, bfd_boolean linker ATTRIBUTE_UNUSED)
e16bb312 5320{
5a6c6817 5321 bfd_arm_update_notes (abfd, ARM_NOTE_SECTION);
e16bb312
NC
5322}
5323
40a18ebd
NC
5324/* Return TRUE if this is an unwinding table entry. */
5325
5326static bfd_boolean
5327is_arm_elf_unwind_section_name (bfd * abfd ATTRIBUTE_UNUSED, const char * name)
5328{
5329 size_t len1, len2;
5330
5331 len1 = sizeof (ELF_STRING_ARM_unwind) - 1;
5332 len2 = sizeof (ELF_STRING_ARM_unwind_once) - 1;
5333 return (strncmp (name, ELF_STRING_ARM_unwind, len1) == 0
5334 || strncmp (name, ELF_STRING_ARM_unwind_once, len2) == 0);
5335}
5336
5337
5338/* Set the type and flags for an ARM section. We do this by
5339 the section name, which is a hack, but ought to work. */
5340
5341static bfd_boolean
5342elf32_arm_fake_sections (bfd * abfd, Elf_Internal_Shdr * hdr, asection * sec)
5343{
5344 const char * name;
5345
5346 name = bfd_get_section_name (abfd, sec);
5347
5348 if (is_arm_elf_unwind_section_name (abfd, name))
5349 {
5350 hdr->sh_type = SHT_ARM_EXIDX;
5351 hdr->sh_flags |= SHF_LINK_ORDER;
5352 }
5353 return TRUE;
5354}
5355
5356/* Handle an ARM specific section when reading an object file.
5357 This is called when elf.c finds a section with an unknown type. */
5358
5359static bfd_boolean
5360elf32_arm_section_from_shdr (bfd *abfd,
5361 Elf_Internal_Shdr * hdr,
5362 const char *name)
5363{
5364 /* There ought to be a place to keep ELF backend specific flags, but
5365 at the moment there isn't one. We just keep track of the
5366 sections by their name, instead. Fortunately, the ABI gives
5367 names for all the ARM specific sections, so we will probably get
5368 away with this. */
5369 switch (hdr->sh_type)
5370 {
5371 case SHT_ARM_EXIDX:
5372 break;
5373
5374 default:
5375 return FALSE;
5376 }
5377
5378 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name))
5379 return FALSE;
5380
5381 return TRUE;
5382}
e489d0ae
PB
5383
5384/* Called for each symbol. Builds a section map based on mapping symbols.
5385 Does not alter any of the symbols. */
5386
5387static bfd_boolean
5388elf32_arm_output_symbol_hook (struct bfd_link_info *info,
5389 const char *name,
5390 Elf_Internal_Sym *elfsym,
5391 asection *input_sec,
5392 struct elf_link_hash_entry *h ATTRIBUTE_UNUSED)
5393{
5394 int mapcount;
5395 elf32_arm_section_map *map;
5396 struct elf32_arm_link_hash_table *globals;
5397
5398 /* Only do this on final link. */
5399 if (info->relocatable)
5400 return TRUE;
5401
5402 /* Only build a map if we need to byteswap code. */
5403 globals = elf32_arm_hash_table (info);
5404 if (!globals->byteswap_code)
5405 return TRUE;
5406
5407 /* We only want mapping symbols. */
0367ecfb 5408 if (! is_arm_mapping_symbol_name (name))
e489d0ae
PB
5409 return TRUE;
5410
5411 mapcount = ++(elf32_arm_section_data (input_sec)->mapcount);
5412 map = elf32_arm_section_data (input_sec)->map;
5413 /* TODO: This may be inefficient, but we probably don't usually have many
5414 mapping symbols per section. */
5415 map = bfd_realloc (map, mapcount * sizeof (elf32_arm_section_map));
5416 elf32_arm_section_data (input_sec)->map = map;
57e8b36a 5417
e489d0ae
PB
5418 map[mapcount - 1].vma = elfsym->st_value;
5419 map[mapcount - 1].type = name[1];
5420 return TRUE;
5421}
5422
5423
5424/* Allocate target specific section data. */
5425
5426static bfd_boolean
5427elf32_arm_new_section_hook (bfd *abfd, asection *sec)
5428{
5429 struct _arm_elf_section_data *sdata;
5430 bfd_size_type amt = sizeof (*sdata);
5431
5432 sdata = bfd_zalloc (abfd, amt);
5433 if (sdata == NULL)
5434 return FALSE;
5435 sec->used_by_bfd = sdata;
5436
5437 return _bfd_elf_new_section_hook (abfd, sec);
5438}
5439
5440
5441/* Used to order a list of mapping symbols by address. */
5442
5443static int
5444elf32_arm_compare_mapping (const void * a, const void * b)
5445{
5446 return ((const elf32_arm_section_map *) a)->vma
5447 > ((const elf32_arm_section_map *) b)->vma;
5448}
5449
5450
5451/* Do code byteswapping. Return FALSE afterwards so that the section is
5452 written out as normal. */
5453
5454static bfd_boolean
5455elf32_arm_write_section (bfd *output_bfd ATTRIBUTE_UNUSED, asection *sec,
5456 bfd_byte *contents)
5457{
5458 int mapcount;
5459 elf32_arm_section_map *map;
5460 bfd_vma ptr;
5461 bfd_vma end;
5462 bfd_vma offset;
5463 bfd_byte tmp;
5464 int i;
57e8b36a 5465
e489d0ae
PB
5466 mapcount = elf32_arm_section_data (sec)->mapcount;
5467 map = elf32_arm_section_data (sec)->map;
5468
5469 if (mapcount == 0)
5470 return FALSE;
5471
5472 qsort (map, mapcount, sizeof (elf32_arm_section_map),
5473 elf32_arm_compare_mapping);
5474
5475 offset = sec->output_section->vma + sec->output_offset;
5476 ptr = map[0].vma - offset;
5477 for (i = 0; i < mapcount; i++)
5478 {
5479 if (i == mapcount - 1)
eea6121a 5480 end = sec->size;
e489d0ae
PB
5481 else
5482 end = map[i + 1].vma - offset;
57e8b36a 5483
e489d0ae
PB
5484 switch (map[i].type)
5485 {
5486 case 'a':
5487 /* Byte swap code words. */
5488 while (ptr + 3 < end)
5489 {
5490 tmp = contents[ptr];
5491 contents[ptr] = contents[ptr + 3];
5492 contents[ptr + 3] = tmp;
5493 tmp = contents[ptr + 1];
5494 contents[ptr + 1] = contents[ptr + 2];
5495 contents[ptr + 2] = tmp;
5496 ptr += 4;
5497 }
5498 break;
5499
5500 case 't':
5501 /* Byte swap code halfwords. */
5502 while (ptr + 1 < end)
5503 {
5504 tmp = contents[ptr];
5505 contents[ptr] = contents[ptr + 1];
5506 contents[ptr + 1] = tmp;
5507 ptr += 2;
5508 }
5509 break;
5510
5511 case 'd':
5512 /* Leave data alone. */
5513 break;
5514 }
5515 ptr = end;
5516 }
93204d3a 5517 free (map);
e489d0ae
PB
5518 return FALSE;
5519}
5520
252b5132
RH
5521#define ELF_ARCH bfd_arch_arm
5522#define ELF_MACHINE_CODE EM_ARM
d0facd1b
NC
5523#ifdef __QNXTARGET__
5524#define ELF_MAXPAGESIZE 0x1000
5525#else
f21f3fe0 5526#define ELF_MAXPAGESIZE 0x8000
d0facd1b 5527#endif
252b5132 5528
99e4ae17
AJ
5529#define bfd_elf32_bfd_copy_private_bfd_data elf32_arm_copy_private_bfd_data
5530#define bfd_elf32_bfd_merge_private_bfd_data elf32_arm_merge_private_bfd_data
252b5132
RH
5531#define bfd_elf32_bfd_set_private_flags elf32_arm_set_private_flags
5532#define bfd_elf32_bfd_print_private_bfd_data elf32_arm_print_private_bfd_data
5533#define bfd_elf32_bfd_link_hash_table_create elf32_arm_link_hash_table_create
dc810e39 5534#define bfd_elf32_bfd_reloc_type_lookup elf32_arm_reloc_type_lookup
252b5132 5535#define bfd_elf32_find_nearest_line elf32_arm_find_nearest_line
e489d0ae 5536#define bfd_elf32_new_section_hook elf32_arm_new_section_hook
3c9458e9 5537#define bfd_elf32_bfd_is_target_special_symbol elf32_arm_is_target_special_symbol
252b5132
RH
5538
5539#define elf_backend_get_symbol_type elf32_arm_get_symbol_type
5540#define elf_backend_gc_mark_hook elf32_arm_gc_mark_hook
5541#define elf_backend_gc_sweep_hook elf32_arm_gc_sweep_hook
5542#define elf_backend_check_relocs elf32_arm_check_relocs
dc810e39 5543#define elf_backend_relocate_section elf32_arm_relocate_section
e489d0ae 5544#define elf_backend_write_section elf32_arm_write_section
252b5132 5545#define elf_backend_adjust_dynamic_symbol elf32_arm_adjust_dynamic_symbol
5e681ec4 5546#define elf_backend_create_dynamic_sections elf32_arm_create_dynamic_sections
252b5132
RH
5547#define elf_backend_finish_dynamic_symbol elf32_arm_finish_dynamic_symbol
5548#define elf_backend_finish_dynamic_sections elf32_arm_finish_dynamic_sections
e489d0ae 5549#define elf_backend_link_output_symbol_hook elf32_arm_output_symbol_hook
252b5132 5550#define elf_backend_size_dynamic_sections elf32_arm_size_dynamic_sections
ba96a88f 5551#define elf_backend_post_process_headers elf32_arm_post_process_headers
99e4ae17 5552#define elf_backend_reloc_type_class elf32_arm_reloc_type_class
c178919b 5553#define elf_backend_object_p elf32_arm_object_p
e16bb312 5554#define elf_backend_section_flags elf32_arm_section_flags
40a18ebd
NC
5555#define elf_backend_fake_sections elf32_arm_fake_sections
5556#define elf_backend_section_from_shdr elf32_arm_section_from_shdr
e16bb312 5557#define elf_backend_final_write_processing elf32_arm_final_write_processing
5e681ec4 5558#define elf_backend_copy_indirect_symbol elf32_arm_copy_indirect_symbol
252b5132 5559
5e681ec4 5560#define elf_backend_can_refcount 1
252b5132
RH
5561#define elf_backend_can_gc_sections 1
5562#define elf_backend_plt_readonly 1
5563#define elf_backend_want_got_plt 1
5564#define elf_backend_want_plt_sym 0
acf8aed4 5565#if !USE_REL
b491616a
AM
5566#define elf_backend_rela_normal 1
5567#endif
252b5132 5568
04f7c78d 5569#define elf_backend_got_header_size 12
04f7c78d 5570
252b5132 5571#include "elf32-target.h"
7f266840
DJ
5572
5573/* Symbian OS Targets */
5574
5575#undef TARGET_LITTLE_SYM
5576#define TARGET_LITTLE_SYM bfd_elf32_littlearm_symbian_vec
5577#undef TARGET_LITTLE_NAME
5578#define TARGET_LITTLE_NAME "elf32-littlearm-symbian"
5579#undef TARGET_BIG_SYM
5580#define TARGET_BIG_SYM bfd_elf32_bigarm_symbian_vec
5581#undef TARGET_BIG_NAME
5582#define TARGET_BIG_NAME "elf32-bigarm-symbian"
5583
5584/* Like elf32_arm_link_hash_table_create -- but overrides
5585 appropriately for Symbian OS. */
5586static struct bfd_link_hash_table *
5587elf32_arm_symbian_link_hash_table_create (bfd *abfd)
5588{
5589 struct bfd_link_hash_table *ret;
5590
5591 ret = elf32_arm_link_hash_table_create (abfd);
5592 if (ret)
5593 {
5594 struct elf32_arm_link_hash_table *htab
5595 = (struct elf32_arm_link_hash_table *)ret;
5596 /* There is no PLT header for Symbian OS. */
5597 htab->plt_header_size = 0;
5598 /* The PLT entries are each three instructions. */
5599 htab->plt_entry_size = 4 * NUM_ELEM (elf32_arm_symbian_plt_entry);
5600 htab->symbian_p = 1;
5601 }
5602 return ret;
5603}
5604
5605/* In a BPABI executable, the dynamic linking sections do not go in
5606 the loadable read-only segment. The post-linker may wish to refer
5607 to these sections, but they are not part of the final program
5608 image. */
5609static struct bfd_elf_special_section const
5610 elf32_arm_symbian_special_sections[]=
5611{
5612 { ".dynamic", 8, 0, SHT_DYNAMIC, 0 },
5613 { ".dynstr", 7, 0, SHT_STRTAB, 0 },
5614 { ".dynsym", 7, 0, SHT_DYNSYM, 0 },
5615 { ".got", 4, 0, SHT_PROGBITS, 0 },
5616 { ".hash", 5, 0, SHT_HASH, 0 },
5617 { NULL, 0, 0, 0, 0 }
5618};
5619
c3c76620 5620static void
b34af79c
MM
5621elf32_arm_symbian_begin_write_processing (bfd *abfd,
5622 struct bfd_link_info *link_info
5623 ATTRIBUTE_UNUSED)
c3c76620
MM
5624{
5625 /* BPABI objects are never loaded directly by an OS kernel; they are
5626 processed by a postlinker first, into an OS-specific format. If
5627 the D_PAGED bit is set on the file, BFD will align segments on
5628 page boundaries, so that an OS can directly map the file. With
5629 BPABI objects, that just results in wasted space. In addition,
5630 because we clear the D_PAGED bit, map_sections_to_segments will
5631 recognize that the program headers should not be mapped into any
5632 loadable segment. */
5633 abfd->flags &= ~D_PAGED;
5634}
7f266840
DJ
5635
5636static bfd_boolean
b34af79c
MM
5637elf32_arm_symbian_modify_segment_map (bfd *abfd,
5638 struct bfd_link_info *info
5639 ATTRIBUTE_UNUSED)
7f266840
DJ
5640{
5641 struct elf_segment_map *m;
5642 asection *dynsec;
5643
7f266840
DJ
5644 /* BPABI shared libraries and executables should have a PT_DYNAMIC
5645 segment. However, because the .dynamic section is not marked
5646 with SEC_LOAD, the generic ELF code will not create such a
5647 segment. */
5648 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
5649 if (dynsec)
5650 {
5651 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
5652 m->next = elf_tdata (abfd)->segment_map;
5653 elf_tdata (abfd)->segment_map = m;
5654 }
5655
5656 return TRUE;
5657}
5658
5659#undef elf32_bed
5660#define elf32_bed elf32_arm_symbian_bed
5661
5662/* The dynamic sections are not allocated on SymbianOS; the postlinker
5663 will process them and then discard them. */
5664#undef ELF_DYNAMIC_SEC_FLAGS
5665#define ELF_DYNAMIC_SEC_FLAGS \
5666 (SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED)
5667
5668#undef bfd_elf32_bfd_link_hash_table_create
5669#define bfd_elf32_bfd_link_hash_table_create \
5670 elf32_arm_symbian_link_hash_table_create
5671
5672#undef elf_backend_special_sections
5673#define elf_backend_special_sections elf32_arm_symbian_special_sections
5674
c3c76620
MM
5675#undef elf_backend_begin_write_processing
5676#define elf_backend_begin_write_processing \
5677 elf32_arm_symbian_begin_write_processing
5678
7f266840
DJ
5679#undef elf_backend_modify_segment_map
5680#define elf_backend_modify_segment_map elf32_arm_symbian_modify_segment_map
5681
5682/* There is no .got section for BPABI objects, and hence no header. */
5683#undef elf_backend_got_header_size
5684#define elf_backend_got_header_size 0
5685
5686/* Similarly, there is no .got.plt section. */
5687#undef elf_backend_want_got_plt
5688#define elf_backend_want_got_plt 0
5689
5690#include "elf32-target.h"
5691
This page took 0.611815 seconds and 4 git commands to generate.