Convert generic probe interface to C++ (and perform some cleanups)
[deliverable/binutils-gdb.git] / bfd / elf32-bfin.c
CommitLineData
3b55e94a 1/* ADI Blackfin BFD support for 32-bit ELF.
2571583a 2 Copyright (C) 2005-2017 Free Software Foundation, Inc.
0f64bb02
CM
3
4 This file is part of BFD, the Binary File Descriptor library.
5
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
cd123cb7 8 the Free Software Foundation; either version 3 of the License, or
0f64bb02
CM
9 (at your option) any later version.
10
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
15
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
cd123cb7
NC
18 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
19 MA 02110-1301, USA. */
0f64bb02 20
0f64bb02 21#include "sysdep.h"
3db64b00 22#include "bfd.h"
0f64bb02
CM
23#include "libbfd.h"
24#include "elf-bfd.h"
25#include "elf/bfin.h"
fa8f86ff 26#include "dwarf2.h"
48d502e1 27#include "hashtab.h"
0f64bb02 28
0f64bb02
CM
29/* FUNCTION : bfin_pltpc_reloc
30 ABSTRACT : TODO : figure out how to handle pltpc relocs. */
31static bfd_reloc_status_type
32bfin_pltpc_reloc (
33 bfd *abfd ATTRIBUTE_UNUSED,
34 arelent *reloc_entry ATTRIBUTE_UNUSED,
35 asymbol *symbol ATTRIBUTE_UNUSED,
2c3fc389 36 void * data ATTRIBUTE_UNUSED,
0f64bb02
CM
37 asection *input_section ATTRIBUTE_UNUSED,
38 bfd *output_bfd ATTRIBUTE_UNUSED,
3b55e94a 39 char **error_message ATTRIBUTE_UNUSED)
0f64bb02
CM
40{
41 bfd_reloc_status_type flag = bfd_reloc_ok;
3b55e94a 42 return flag;
0f64bb02
CM
43}
44\f
45
46static bfd_reloc_status_type
47bfin_pcrel24_reloc (bfd *abfd,
48 arelent *reloc_entry,
49 asymbol *symbol,
2c3fc389 50 void * data,
0f64bb02
CM
51 asection *input_section,
52 bfd *output_bfd,
53 char **error_message ATTRIBUTE_UNUSED)
54{
55 bfd_vma relocation;
56 bfd_size_type addr = reloc_entry->address;
57 bfd_vma output_base = 0;
58 reloc_howto_type *howto = reloc_entry->howto;
59 asection *output_section;
60 bfd_boolean relocatable = (output_bfd != NULL);
61
62 if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
63 return bfd_reloc_outofrange;
64
3b55e94a
BS
65 if (bfd_is_und_section (symbol->section)
66 && (symbol->flags & BSF_WEAK) == 0
67 && !relocatable)
68 return bfd_reloc_undefined;
69
70 if (bfd_is_com_section (symbol->section))
71 relocation = 0;
0f64bb02 72 else
3b55e94a 73 relocation = symbol->value;
0f64bb02 74
3b55e94a
BS
75 output_section = symbol->section->output_section;
76
77 if (relocatable)
78 output_base = 0;
79 else
80 output_base = output_section->vma;
81
82 if (!relocatable || !strcmp (symbol->name, symbol->section->name))
83 relocation += output_base + symbol->section->output_offset;
0f64bb02 84
3b55e94a
BS
85 if (!relocatable && !strcmp (symbol->name, symbol->section->name))
86 relocation += reloc_entry->addend;
0f64bb02 87
0f64bb02
CM
88 relocation -= input_section->output_section->vma + input_section->output_offset;
89 relocation -= reloc_entry->address;
90
91 if (howto->complain_on_overflow != complain_overflow_dont)
92 {
93 bfd_reloc_status_type status;
3b55e94a
BS
94 status = bfd_check_overflow (howto->complain_on_overflow,
95 howto->bitsize,
96 howto->rightshift,
97 bfd_arch_bits_per_address(abfd),
98 relocation);
0f64bb02
CM
99 if (status != bfd_reloc_ok)
100 return status;
101 }
3b55e94a 102
0f64bb02
CM
103 /* if rightshift is 1 and the number odd, return error. */
104 if (howto->rightshift && (relocation & 0x01))
105 {
4eca0228 106 _bfd_error_handler (_("relocation should be even number"));
0f64bb02
CM
107 return bfd_reloc_overflow;
108 }
109
110 relocation >>= (bfd_vma) howto->rightshift;
111 /* Shift everything up to where it's going to be used. */
112
113 relocation <<= (bfd_vma) howto->bitpos;
114
115 if (relocatable)
116 {
117 reloc_entry->address += input_section->output_offset;
118 reloc_entry->addend += symbol->section->output_offset;
119 }
120
121 {
122 short x;
123
124 /* We are getting reloc_entry->address 2 byte off from
3b55e94a
BS
125 the start of instruction. Assuming absolute postion
126 of the reloc data. But, following code had been written assuming
127 reloc address is starting at begining of instruction.
128 To compensate that I have increased the value of
129 relocation by 1 (effectively 2) and used the addr -2 instead of addr. */
0f64bb02
CM
130
131 relocation += 1;
132 x = bfd_get_16 (abfd, (bfd_byte *) data + addr - 2);
133 x = (x & 0xff00) | ((relocation >> 16) & 0xff);
134 bfd_put_16 (abfd, x, (unsigned char *) data + addr - 2);
135
136 x = bfd_get_16 (abfd, (bfd_byte *) data + addr);
137 x = relocation & 0xFFFF;
138 bfd_put_16 (abfd, x, (unsigned char *) data + addr );
139 }
140 return bfd_reloc_ok;
141}
142
143static bfd_reloc_status_type
3b55e94a
BS
144bfin_imm16_reloc (bfd *abfd,
145 arelent *reloc_entry,
146 asymbol *symbol,
2c3fc389 147 void * data,
3b55e94a
BS
148 asection *input_section,
149 bfd *output_bfd,
150 char **error_message ATTRIBUTE_UNUSED)
0f64bb02 151{
3b55e94a
BS
152 bfd_vma relocation, x;
153 bfd_size_type reloc_addr = reloc_entry->address;
0f64bb02 154 bfd_vma output_base = 0;
3b55e94a 155 reloc_howto_type *howto = reloc_entry->howto;
0f64bb02
CM
156 asection *output_section;
157 bfd_boolean relocatable = (output_bfd != NULL);
158
3b55e94a
BS
159 /* Is the address of the relocation really within the section? */
160 if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
161 return bfd_reloc_outofrange;
162
0f64bb02
CM
163 if (bfd_is_und_section (symbol->section)
164 && (symbol->flags & BSF_WEAK) == 0
165 && !relocatable)
166 return bfd_reloc_undefined;
167
0f64bb02 168 output_section = symbol->section->output_section;
3b55e94a 169 relocation = symbol->value;
0f64bb02
CM
170
171 /* Convert input-section-relative symbol value to absolute. */
172 if (relocatable)
173 output_base = 0;
174 else
175 output_base = output_section->vma;
176
3b55e94a 177 if (!relocatable || !strcmp (symbol->name, symbol->section->name))
0f64bb02
CM
178 relocation += output_base + symbol->section->output_offset;
179
180 /* Add in supplied addend. */
181 relocation += reloc_entry->addend;
182
183 if (relocatable)
184 {
185 reloc_entry->address += input_section->output_offset;
186 reloc_entry->addend += symbol->section->output_offset;
187 }
0f64bb02
CM
188 else
189 {
190 reloc_entry->addend = 0;
191 }
192
193 if (howto->complain_on_overflow != complain_overflow_dont)
194 {
195 bfd_reloc_status_type flag;
196 flag = bfd_check_overflow (howto->complain_on_overflow,
3b55e94a
BS
197 howto->bitsize,
198 howto->rightshift,
199 bfd_arch_bits_per_address(abfd),
200 relocation);
0f64bb02 201 if (flag != bfd_reloc_ok)
3b55e94a 202 return flag;
0f64bb02
CM
203 }
204
0f64bb02
CM
205 /* Here the variable relocation holds the final address of the
206 symbol we are relocating against, plus any addend. */
207
0f64bb02
CM
208 relocation >>= (bfd_vma) howto->rightshift;
209 x = relocation;
210 bfd_put_16 (abfd, x, (unsigned char *) data + reloc_addr);
211 return bfd_reloc_ok;
212}
213
214
215static bfd_reloc_status_type
216bfin_byte4_reloc (bfd *abfd,
217 arelent *reloc_entry,
218 asymbol *symbol,
2c3fc389 219 void * data,
0f64bb02
CM
220 asection *input_section,
221 bfd *output_bfd,
3b55e94a 222 char **error_message ATTRIBUTE_UNUSED)
0f64bb02
CM
223{
224 bfd_vma relocation, x;
225 bfd_size_type addr = reloc_entry->address;
226 bfd_vma output_base = 0;
227 asection *output_section;
228 bfd_boolean relocatable = (output_bfd != NULL);
229
230 /* Is the address of the relocation really within the section? */
231 if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
232 return bfd_reloc_outofrange;
233
3b55e94a
BS
234 if (bfd_is_und_section (symbol->section)
235 && (symbol->flags & BSF_WEAK) == 0
236 && !relocatable)
237 return bfd_reloc_undefined;
0f64bb02 238
3b55e94a
BS
239 output_section = symbol->section->output_section;
240 relocation = symbol->value;
241 /* Convert input-section-relative symbol value to absolute. */
242 if (relocatable)
243 output_base = 0;
0f64bb02 244 else
3b55e94a
BS
245 output_base = output_section->vma;
246
247 if ((symbol->name
248 && symbol->section->name
249 && !strcmp (symbol->name, symbol->section->name))
250 || !relocatable)
0f64bb02 251 {
3b55e94a 252 relocation += output_base + symbol->section->output_offset;
0f64bb02
CM
253 }
254
3b55e94a
BS
255 relocation += reloc_entry->addend;
256
0f64bb02 257 if (relocatable)
3b55e94a 258 {
0f64bb02
CM
259 /* This output will be relocatable ... like ld -r. */
260 reloc_entry->address += input_section->output_offset;
261 reloc_entry->addend += symbol->section->output_offset;
262 }
263 else
264 {
265 reloc_entry->addend = 0;
266 }
267
268 /* Here the variable relocation holds the final address of the
269 symbol we are relocating against, plus any addend. */
270 x = relocation & 0xFFFF0000;
271 x >>=16;
272 bfd_put_16 (abfd, x, (unsigned char *) data + addr + 2);
3b55e94a 273
0f64bb02
CM
274 x = relocation & 0x0000FFFF;
275 bfd_put_16 (abfd, x, (unsigned char *) data + addr);
276 return bfd_reloc_ok;
277}
278
279/* bfin_bfd_reloc handles the blackfin arithmetic relocations.
280 Use this instead of bfd_perform_relocation. */
281static bfd_reloc_status_type
282bfin_bfd_reloc (bfd *abfd,
283 arelent *reloc_entry,
284 asymbol *symbol,
2c3fc389 285 void * data,
0f64bb02
CM
286 asection *input_section,
287 bfd *output_bfd,
288 char **error_message ATTRIBUTE_UNUSED)
289{
290 bfd_vma relocation;
291 bfd_size_type addr = reloc_entry->address;
292 bfd_vma output_base = 0;
293 reloc_howto_type *howto = reloc_entry->howto;
294 asection *output_section;
295 bfd_boolean relocatable = (output_bfd != NULL);
296
297 /* Is the address of the relocation really within the section? */
298 if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
299 return bfd_reloc_outofrange;
300
3b55e94a
BS
301 if (bfd_is_und_section (symbol->section)
302 && (symbol->flags & BSF_WEAK) == 0
303 && !relocatable)
304 return bfd_reloc_undefined;
305
306 /* Get symbol value. (Common symbols are special.) */
307 if (bfd_is_com_section (symbol->section))
308 relocation = 0;
0f64bb02 309 else
3b55e94a
BS
310 relocation = symbol->value;
311
312 output_section = symbol->section->output_section;
313
314 /* Convert input-section-relative symbol value to absolute. */
315 if (relocatable)
316 output_base = 0;
317 else
318 output_base = output_section->vma;
319
320 if (!relocatable || !strcmp (symbol->name, symbol->section->name))
321 relocation += output_base + symbol->section->output_offset;
322
323 if (!relocatable && !strcmp (symbol->name, symbol->section->name))
0f64bb02 324 {
3b55e94a
BS
325 /* Add in supplied addend. */
326 relocation += reloc_entry->addend;
0f64bb02 327 }
3b55e94a 328
0f64bb02
CM
329 /* Here the variable relocation holds the final address of the
330 symbol we are relocating against, plus any addend. */
331
535b785f 332 if (howto->pc_relative)
0f64bb02
CM
333 {
334 relocation -= input_section->output_section->vma + input_section->output_offset;
335
535b785f 336 if (howto->pcrel_offset)
0f64bb02
CM
337 relocation -= reloc_entry->address;
338 }
339
340 if (relocatable)
341 {
342 reloc_entry->address += input_section->output_offset;
343 reloc_entry->addend += symbol->section->output_offset;
344 }
345
346 if (howto->complain_on_overflow != complain_overflow_dont)
347 {
348 bfd_reloc_status_type status;
349
3b55e94a 350 status = bfd_check_overflow (howto->complain_on_overflow,
0f64bb02 351 howto->bitsize,
3b55e94a 352 howto->rightshift,
0f64bb02
CM
353 bfd_arch_bits_per_address(abfd),
354 relocation);
355 if (status != bfd_reloc_ok)
356 return status;
357 }
3b55e94a 358
0f64bb02
CM
359 /* If rightshift is 1 and the number odd, return error. */
360 if (howto->rightshift && (relocation & 0x01))
361 {
4eca0228 362 _bfd_error_handler (_("relocation should be even number"));
0f64bb02
CM
363 return bfd_reloc_overflow;
364 }
365
366 relocation >>= (bfd_vma) howto->rightshift;
367
368 /* Shift everything up to where it's going to be used. */
369
370 relocation <<= (bfd_vma) howto->bitpos;
371
3b55e94a 372#define DOIT(x) \
0f64bb02
CM
373 x = ( (x & ~howto->dst_mask) | (relocation & howto->dst_mask))
374
375 /* handle 8 and 16 bit relocations here. */
376 switch (howto->size)
377 {
378 case 0:
379 {
380 char x = bfd_get_8 (abfd, (char *) data + addr);
381 DOIT (x);
382 bfd_put_8 (abfd, x, (unsigned char *) data + addr);
383 }
384 break;
385
386 case 1:
387 {
388 unsigned short x = bfd_get_16 (abfd, (bfd_byte *) data + addr);
389 DOIT (x);
390 bfd_put_16 (abfd, (bfd_vma) x, (unsigned char *) data + addr);
391 }
392 break;
393
394 default:
395 return bfd_reloc_other;
396 }
397
3b55e94a 398 return bfd_reloc_ok;
0f64bb02
CM
399}
400
0f64bb02
CM
401/* HOWTO Table for blackfin.
402 Blackfin relocations are fairly complicated.
403 Some of the salient features are
404 a. Even numbered offsets. A number of (not all) relocations are
405 even numbered. This means that the rightmost bit is not stored.
406 Needs to right shift by 1 and check to see if value is not odd
407 b. A relocation can be an expression. An expression takes on
408 a variety of relocations arranged in a stack.
409 As a result, we cannot use the standard generic function as special
410 function. We will have our own, which is very similar to the standard
411 generic function except that it understands how to get the value from
412 the relocation stack. . */
413
414#define BFIN_RELOC_MIN 0
48d502e1 415#define BFIN_RELOC_MAX 0x21
0f64bb02
CM
416#define BFIN_GNUEXT_RELOC_MIN 0x40
417#define BFIN_GNUEXT_RELOC_MAX 0x43
418#define BFIN_ARELOC_MIN 0xE0
419#define BFIN_ARELOC_MAX 0xF3
420
421static reloc_howto_type bfin_howto_table [] =
422{
423 /* This reloc does nothing. . */
cb88ce9f 424 HOWTO (R_BFIN_UNUSED0, /* type. */
0f64bb02 425 0, /* rightshift. */
6346d5ca
AM
426 3, /* size (0 = byte, 1 = short, 2 = long). */
427 0, /* bitsize. */
0f64bb02
CM
428 FALSE, /* pc_relative. */
429 0, /* bitpos. */
6346d5ca 430 complain_overflow_dont, /* complain_on_overflow. */
0f64bb02 431 bfd_elf_generic_reloc, /* special_function. */
cb88ce9f 432 "R_BFIN_UNUSED0", /* name. */
0f64bb02
CM
433 FALSE, /* partial_inplace. */
434 0, /* src_mask. */
435 0, /* dst_mask. */
436 FALSE), /* pcrel_offset. */
437
cb88ce9f 438 HOWTO (R_BFIN_PCREL5M2, /* type. */
0f64bb02
CM
439 1, /* rightshift. */
440 1, /* size (0 = byte, 1 = short, 2 = long).. */
441 4, /* bitsize. */
442 TRUE, /* pc_relative. */
443 0, /* bitpos. */
444 complain_overflow_unsigned, /* complain_on_overflow. */
445 bfin_bfd_reloc, /* special_function. */
cb88ce9f 446 "R_BFIN_PCREL5M2", /* name. */
0f64bb02 447 FALSE, /* partial_inplace. */
f4707595 448 0, /* src_mask. */
0f64bb02
CM
449 0x0000000F, /* dst_mask. */
450 FALSE), /* pcrel_offset. */
451
cb88ce9f 452 HOWTO (R_BFIN_UNUSED1, /* type. */
0f64bb02 453 0, /* rightshift. */
6346d5ca
AM
454 3, /* size (0 = byte, 1 = short, 2 = long). */
455 0, /* bitsize. */
0f64bb02
CM
456 FALSE, /* pc_relative. */
457 0, /* bitpos. */
6346d5ca 458 complain_overflow_dont, /* complain_on_overflow. */
0f64bb02 459 bfd_elf_generic_reloc, /* special_function. */
cb88ce9f 460 "R_BFIN_UNUSED1", /* name. */
0f64bb02
CM
461 FALSE, /* partial_inplace. */
462 0, /* src_mask. */
463 0, /* dst_mask. */
464 FALSE), /* pcrel_offset. */
465
cb88ce9f 466 HOWTO (R_BFIN_PCREL10, /* type. */
0f64bb02
CM
467 1, /* rightshift. */
468 1, /* size (0 = byte, 1 = short, 2 = long). */
469 10, /* bitsize. */
470 TRUE, /* pc_relative. */
471 0, /* bitpos. */
472 complain_overflow_signed, /* complain_on_overflow. */
473 bfin_bfd_reloc, /* special_function. */
cb88ce9f 474 "R_BFIN_PCREL10", /* name. */
0f64bb02 475 FALSE, /* partial_inplace. */
f4707595 476 0, /* src_mask. */
0f64bb02
CM
477 0x000003FF, /* dst_mask. */
478 TRUE), /* pcrel_offset. */
3b55e94a 479
cb88ce9f 480 HOWTO (R_BFIN_PCREL12_JUMP, /* type. */
0f64bb02
CM
481 1, /* rightshift. */
482 /* the offset is actually 13 bit
483 aligned on a word boundary so
484 only 12 bits have to be used.
485 Right shift the rightmost bit.. */
486 1, /* size (0 = byte, 1 = short, 2 = long). */
487 12, /* bitsize. */
488 TRUE, /* pc_relative. */
489 0, /* bitpos. */
490 complain_overflow_signed, /* complain_on_overflow. */
491 bfin_bfd_reloc, /* special_function. */
cb88ce9f 492 "R_BFIN_PCREL12_JUMP", /* name. */
0f64bb02 493 FALSE, /* partial_inplace. */
f4707595 494 0, /* src_mask. */
0f64bb02
CM
495 0x0FFF, /* dst_mask. */
496 TRUE), /* pcrel_offset. */
497
cb88ce9f 498 HOWTO (R_BFIN_RIMM16, /* type. */
0f64bb02
CM
499 0, /* rightshift. */
500 1, /* size (0 = byte, 1 = short, 2 = long). */
501 16, /* bitsize. */
502 FALSE, /* pc_relative. */
503 0, /* bitpos. */
504 complain_overflow_signed, /* complain_on_overflow. */
505 bfin_imm16_reloc, /* special_function. */
cb88ce9f 506 "R_BFIN_RIMM16", /* name. */
0f64bb02 507 FALSE, /* partial_inplace. */
f4707595 508 0, /* src_mask. */
0f64bb02
CM
509 0x0000FFFF, /* dst_mask. */
510 TRUE), /* pcrel_offset. */
511
cb88ce9f 512 HOWTO (R_BFIN_LUIMM16, /* type. */
0f64bb02
CM
513 0, /* rightshift. */
514 1, /* size (0 = byte, 1 = short, 2 = long). */
515 16, /* bitsize. */
516 FALSE, /* pc_relative. */
517 0, /* bitpos. */
518 complain_overflow_dont, /* complain_on_overflow. */
519 bfin_imm16_reloc, /* special_function. */
cb88ce9f 520 "R_BFIN_LUIMM16", /* name. */
0f64bb02 521 FALSE, /* partial_inplace. */
f4707595 522 0, /* src_mask. */
0f64bb02
CM
523 0x0000FFFF, /* dst_mask. */
524 TRUE), /* pcrel_offset. */
3b55e94a 525
cb88ce9f 526 HOWTO (R_BFIN_HUIMM16, /* type. */
0f64bb02
CM
527 16, /* rightshift. */
528 1, /* size (0 = byte, 1 = short, 2 = long). */
529 16, /* bitsize. */
530 FALSE, /* pc_relative. */
531 0, /* bitpos. */
532 complain_overflow_unsigned, /* complain_on_overflow. */
533 bfin_imm16_reloc, /* special_function. */
cb88ce9f 534 "R_BFIN_HUIMM16", /* name. */
0f64bb02 535 FALSE, /* partial_inplace. */
f4707595 536 0, /* src_mask. */
0f64bb02
CM
537 0x0000FFFF, /* dst_mask. */
538 TRUE), /* pcrel_offset. */
539
cb88ce9f 540 HOWTO (R_BFIN_PCREL12_JUMP_S, /* type. */
0f64bb02
CM
541 1, /* rightshift. */
542 1, /* size (0 = byte, 1 = short, 2 = long). */
543 12, /* bitsize. */
544 TRUE, /* pc_relative. */
545 0, /* bitpos. */
546 complain_overflow_signed, /* complain_on_overflow. */
547 bfin_bfd_reloc, /* special_function. */
cb88ce9f 548 "R_BFIN_PCREL12_JUMP_S", /* name. */
0f64bb02 549 FALSE, /* partial_inplace. */
f4707595 550 0, /* src_mask. */
0f64bb02
CM
551 0x00000FFF, /* dst_mask. */
552 TRUE), /* pcrel_offset. */
553
cb88ce9f 554 HOWTO (R_BFIN_PCREL24_JUMP_X, /* type. */
0f64bb02
CM
555 1, /* rightshift. */
556 2, /* size (0 = byte, 1 = short, 2 = long). */
557 24, /* bitsize. */
558 TRUE, /* pc_relative. */
559 0, /* bitpos. */
560 complain_overflow_signed, /* complain_on_overflow. */
561 bfin_pcrel24_reloc, /* special_function. */
cb88ce9f 562 "R_BFIN_PCREL24_JUMP_X", /* name. */
0f64bb02 563 FALSE, /* partial_inplace. */
f4707595 564 0, /* src_mask. */
0f64bb02
CM
565 0x00FFFFFF, /* dst_mask. */
566 TRUE), /* pcrel_offset. */
567
cb88ce9f 568 HOWTO (R_BFIN_PCREL24, /* type. */
0f64bb02
CM
569 1, /* rightshift. */
570 2, /* size (0 = byte, 1 = short, 2 = long). */
571 24, /* bitsize. */
572 TRUE, /* pc_relative. */
573 0, /* bitpos. */
574 complain_overflow_signed, /* complain_on_overflow. */
575 bfin_pcrel24_reloc, /* special_function. */
cb88ce9f 576 "R_BFIN_PCREL24", /* name. */
0f64bb02 577 FALSE, /* partial_inplace. */
f4707595 578 0, /* src_mask. */
0f64bb02
CM
579 0x00FFFFFF, /* dst_mask. */
580 TRUE), /* pcrel_offset. */
581
cb88ce9f 582 HOWTO (R_BFIN_UNUSEDB, /* type. */
0f64bb02 583 0, /* rightshift. */
6346d5ca
AM
584 3, /* size (0 = byte, 1 = short, 2 = long). */
585 0, /* bitsize. */
0f64bb02
CM
586 FALSE, /* pc_relative. */
587 0, /* bitpos. */
588 complain_overflow_dont, /* complain_on_overflow. */
589 bfd_elf_generic_reloc, /* special_function. */
cb88ce9f 590 "R_BFIN_UNUSEDB", /* name. */
0f64bb02
CM
591 FALSE, /* partial_inplace. */
592 0, /* src_mask. */
593 0, /* dst_mask. */
594 FALSE), /* pcrel_offset. */
595
cb88ce9f 596 HOWTO (R_BFIN_UNUSEDC, /* type. */
0f64bb02 597 0, /* rightshift. */
6346d5ca
AM
598 3, /* size (0 = byte, 1 = short, 2 = long). */
599 0, /* bitsize. */
0f64bb02
CM
600 FALSE, /* pc_relative. */
601 0, /* bitpos. */
602 complain_overflow_dont, /* complain_on_overflow. */
603 bfd_elf_generic_reloc, /* special_function. */
cb88ce9f 604 "R_BFIN_UNUSEDC", /* name. */
0f64bb02
CM
605 FALSE, /* partial_inplace. */
606 0, /* src_mask. */
607 0, /* dst_mask. */
608 FALSE), /* pcrel_offset. */
609
cb88ce9f 610 HOWTO (R_BFIN_PCREL24_JUMP_L, /* type. */
0f64bb02
CM
611 1, /* rightshift. */
612 2, /* size (0 = byte, 1 = short, 2 = long). */
613 24, /* bitsize. */
614 TRUE, /* pc_relative. */
615 0, /* bitpos. */
616 complain_overflow_signed, /* complain_on_overflow. */
617 bfin_pcrel24_reloc, /* special_function. */
cb88ce9f 618 "R_BFIN_PCREL24_JUMP_L", /* name. */
0f64bb02 619 FALSE, /* partial_inplace. */
f4707595 620 0, /* src_mask. */
0f64bb02
CM
621 0x00FFFFFF, /* dst_mask. */
622 TRUE), /* pcrel_offset. */
623
cb88ce9f 624 HOWTO (R_BFIN_PCREL24_CALL_X, /* type. */
0f64bb02
CM
625 1, /* rightshift. */
626 2, /* size (0 = byte, 1 = short, 2 = long). */
627 24, /* bitsize. */
628 TRUE, /* pc_relative. */
629 0, /* bitpos. */
630 complain_overflow_signed, /* complain_on_overflow. */
631 bfin_pcrel24_reloc, /* special_function. */
cb88ce9f 632 "R_BFIN_PCREL24_CALL_X", /* name. */
0f64bb02 633 FALSE, /* partial_inplace. */
f4707595 634 0, /* src_mask. */
0f64bb02
CM
635 0x00FFFFFF, /* dst_mask. */
636 TRUE), /* pcrel_offset. */
637
cb88ce9f 638 HOWTO (R_BFIN_VAR_EQ_SYMB, /* type. */
0f64bb02
CM
639 0, /* rightshift. */
640 2, /* size (0 = byte, 1 = short, 2 = long). */
641 32, /* bitsize. */
642 FALSE, /* pc_relative. */
643 0, /* bitpos. */
644 complain_overflow_bitfield, /* complain_on_overflow. */
645 bfin_bfd_reloc, /* special_function. */
cb88ce9f 646 "R_BFIN_VAR_EQ_SYMB", /* name. */
0f64bb02
CM
647 FALSE, /* partial_inplace. */
648 0, /* src_mask. */
649 0, /* dst_mask. */
650 FALSE), /* pcrel_offset. */
651
cb88ce9f 652 HOWTO (R_BFIN_BYTE_DATA, /* type. */
0f64bb02
CM
653 0, /* rightshift. */
654 0, /* size (0 = byte, 1 = short, 2 = long). */
655 8, /* bitsize. */
656 FALSE, /* pc_relative. */
657 0, /* bitpos. */
658 complain_overflow_unsigned, /* complain_on_overflow. */
659 bfin_bfd_reloc, /* special_function. */
cb88ce9f 660 "R_BFIN_BYTE_DATA", /* name. */
0f64bb02 661 FALSE, /* partial_inplace. */
f4707595 662 0, /* src_mask. */
0f64bb02
CM
663 0xFF, /* dst_mask. */
664 TRUE), /* pcrel_offset. */
665
cb88ce9f 666 HOWTO (R_BFIN_BYTE2_DATA, /* type. */
0f64bb02
CM
667 0, /* rightshift. */
668 1, /* size (0 = byte, 1 = short, 2 = long). */
669 16, /* bitsize. */
670 FALSE, /* pc_relative. */
671 0, /* bitpos. */
672 complain_overflow_signed, /* complain_on_overflow. */
673 bfin_bfd_reloc, /* special_function. */
cb88ce9f 674 "R_BFIN_BYTE2_DATA", /* name. */
0f64bb02 675 FALSE, /* partial_inplace. */
f4707595 676 0, /* src_mask. */
0f64bb02
CM
677 0xFFFF, /* dst_mask. */
678 TRUE), /* pcrel_offset. */
679
cb88ce9f 680 HOWTO (R_BFIN_BYTE4_DATA, /* type. */
0f64bb02
CM
681 0, /* rightshift. */
682 2, /* size (0 = byte, 1 = short, 2 = long). */
683 32, /* bitsize. */
684 FALSE, /* pc_relative. */
685 0, /* bitpos. */
686 complain_overflow_unsigned, /* complain_on_overflow. */
687 bfin_byte4_reloc, /* special_function. */
cb88ce9f 688 "R_BFIN_BYTE4_DATA", /* name. */
0f64bb02 689 FALSE, /* partial_inplace. */
f4707595 690 0, /* src_mask. */
0f64bb02
CM
691 0xFFFFFFFF, /* dst_mask. */
692 TRUE), /* pcrel_offset. */
693
cb88ce9f 694 HOWTO (R_BFIN_PCREL11, /* type. */
0f64bb02
CM
695 1, /* rightshift. */
696 1, /* size (0 = byte, 1 = short, 2 = long). */
697 10, /* bitsize. */
698 TRUE, /* pc_relative. */
699 0, /* bitpos. */
700 complain_overflow_unsigned, /* complain_on_overflow. */
701 bfin_bfd_reloc, /* special_function. */
cb88ce9f 702 "R_BFIN_PCREL11", /* name. */
0f64bb02 703 FALSE, /* partial_inplace. */
f4707595 704 0, /* src_mask. */
0f64bb02
CM
705 0x000003FF, /* dst_mask. */
706 FALSE), /* pcrel_offset. */
48d502e1
BS
707
708
709 /* A 18-bit signed operand with the GOT offset for the address of
710 the symbol. */
711 HOWTO (R_BFIN_GOT17M4, /* type */
712 2, /* rightshift */
713 1, /* size (0 = byte, 1 = short, 2 = long) */
714 16, /* bitsize */
715 FALSE, /* pc_relative */
716 0, /* bitpos */
717 complain_overflow_signed, /* complain_on_overflow */
718 bfd_elf_generic_reloc, /* special_function */
5dff4664 719 "R_BFIN_GOT17M4", /* name */
48d502e1
BS
720 FALSE, /* partial_inplace */
721 0xffff, /* src_mask */
722 0xffff, /* dst_mask */
723 FALSE), /* pcrel_offset */
724
725 /* The upper 16 bits of the GOT offset for the address of the
726 symbol. */
727 HOWTO (R_BFIN_GOTHI, /* type */
728 0, /* rightshift */
729 1, /* size (0 = byte, 1 = short, 2 = long) */
730 16, /* bitsize */
731 FALSE, /* pc_relative */
732 0, /* bitpos */
733 complain_overflow_dont, /* complain_on_overflow */
734 bfd_elf_generic_reloc, /* special_function */
735 "R_BFIN_GOTHI", /* name */
736 FALSE, /* partial_inplace */
737 0xffff, /* src_mask */
738 0xffff, /* dst_mask */
739 FALSE), /* pcrel_offset */
740
741 /* The lower 16 bits of the GOT offset for the address of the
742 symbol. */
743 HOWTO (R_BFIN_GOTLO, /* type */
744 0, /* rightshift */
745 1, /* size (0 = byte, 1 = short, 2 = long) */
746 16, /* bitsize */
747 FALSE, /* pc_relative */
748 0, /* bitpos */
749 complain_overflow_dont, /* complain_on_overflow */
750 bfd_elf_generic_reloc, /* special_function */
751 "R_BFIN_GOTLO", /* name */
752 FALSE, /* partial_inplace */
753 0xffff, /* src_mask */
754 0xffff, /* dst_mask */
755 FALSE), /* pcrel_offset */
756
757 /* The 32-bit address of the canonical descriptor of a function. */
758 HOWTO (R_BFIN_FUNCDESC, /* type */
759 0, /* rightshift */
760 2, /* size (0 = byte, 1 = short, 2 = long) */
761 32, /* bitsize */
762 FALSE, /* pc_relative */
763 0, /* bitpos */
764 complain_overflow_bitfield, /* complain_on_overflow */
765 bfd_elf_generic_reloc, /* special_function */
766 "R_BFIN_FUNCDESC", /* name */
767 FALSE, /* partial_inplace */
768 0xffffffff, /* src_mask */
769 0xffffffff, /* dst_mask */
770 FALSE), /* pcrel_offset */
771
772 /* A 12-bit signed operand with the GOT offset for the address of
773 canonical descriptor of a function. */
774 HOWTO (R_BFIN_FUNCDESC_GOT17M4, /* type */
775 2, /* rightshift */
776 1, /* size (0 = byte, 1 = short, 2 = long) */
777 16, /* bitsize */
778 FALSE, /* pc_relative */
779 0, /* bitpos */
780 complain_overflow_signed, /* complain_on_overflow */
781 bfd_elf_generic_reloc, /* special_function */
782 "R_BFIN_FUNCDESC_GOT17M4", /* name */
783 FALSE, /* partial_inplace */
784 0xffff, /* src_mask */
785 0xffff, /* dst_mask */
786 FALSE), /* pcrel_offset */
787
788 /* The upper 16 bits of the GOT offset for the address of the
789 canonical descriptor of a function. */
790 HOWTO (R_BFIN_FUNCDESC_GOTHI, /* type */
791 0, /* rightshift */
792 1, /* size (0 = byte, 1 = short, 2 = long) */
793 16, /* bitsize */
794 FALSE, /* pc_relative */
795 0, /* bitpos */
796 complain_overflow_dont, /* complain_on_overflow */
797 bfd_elf_generic_reloc, /* special_function */
798 "R_BFIN_FUNCDESC_GOTHI", /* name */
799 FALSE, /* partial_inplace */
800 0xffff, /* src_mask */
801 0xffff, /* dst_mask */
802 FALSE), /* pcrel_offset */
803
804 /* The lower 16 bits of the GOT offset for the address of the
805 canonical descriptor of a function. */
806 HOWTO (R_BFIN_FUNCDESC_GOTLO, /* type */
807 0, /* rightshift */
808 1, /* size (0 = byte, 1 = short, 2 = long) */
809 16, /* bitsize */
810 FALSE, /* pc_relative */
811 0, /* bitpos */
812 complain_overflow_dont, /* complain_on_overflow */
813 bfd_elf_generic_reloc, /* special_function */
814 "R_BFIN_FUNCDESC_GOTLO", /* name */
815 FALSE, /* partial_inplace */
816 0xffff, /* src_mask */
817 0xffff, /* dst_mask */
818 FALSE), /* pcrel_offset */
819
820 /* The 32-bit address of the canonical descriptor of a function. */
821 HOWTO (R_BFIN_FUNCDESC_VALUE, /* type */
822 0, /* rightshift */
823 2, /* size (0 = byte, 1 = short, 2 = long) */
824 64, /* bitsize */
825 FALSE, /* pc_relative */
826 0, /* bitpos */
827 complain_overflow_bitfield, /* complain_on_overflow */
828 bfd_elf_generic_reloc, /* special_function */
829 "R_BFIN_FUNCDESC_VALUE", /* name */
830 FALSE, /* partial_inplace */
831 0xffffffff, /* src_mask */
832 0xffffffff, /* dst_mask */
833 FALSE), /* pcrel_offset */
834
835 /* A 12-bit signed operand with the GOT offset for the address of
836 canonical descriptor of a function. */
837 HOWTO (R_BFIN_FUNCDESC_GOTOFF17M4, /* type */
838 2, /* rightshift */
839 1, /* size (0 = byte, 1 = short, 2 = long) */
840 16, /* bitsize */
841 FALSE, /* pc_relative */
842 0, /* bitpos */
843 complain_overflow_signed, /* complain_on_overflow */
844 bfd_elf_generic_reloc, /* special_function */
845 "R_BFIN_FUNCDESC_GOTOFF17M4", /* name */
846 FALSE, /* partial_inplace */
847 0xffff, /* src_mask */
848 0xffff, /* dst_mask */
849 FALSE), /* pcrel_offset */
850
851 /* The upper 16 bits of the GOT offset for the address of the
852 canonical descriptor of a function. */
853 HOWTO (R_BFIN_FUNCDESC_GOTOFFHI, /* type */
854 0, /* rightshift */
855 1, /* size (0 = byte, 1 = short, 2 = long) */
856 16, /* bitsize */
857 FALSE, /* pc_relative */
858 0, /* bitpos */
859 complain_overflow_dont, /* complain_on_overflow */
860 bfd_elf_generic_reloc, /* special_function */
861 "R_BFIN_FUNCDESC_GOTOFFHI", /* name */
862 FALSE, /* partial_inplace */
863 0xffff, /* src_mask */
864 0xffff, /* dst_mask */
865 FALSE), /* pcrel_offset */
866
867 /* The lower 16 bits of the GOT offset for the address of the
868 canonical descriptor of a function. */
869 HOWTO (R_BFIN_FUNCDESC_GOTOFFLO, /* type */
870 0, /* rightshift */
871 1, /* size (0 = byte, 1 = short, 2 = long) */
872 16, /* bitsize */
873 FALSE, /* pc_relative */
874 0, /* bitpos */
875 complain_overflow_dont, /* complain_on_overflow */
876 bfd_elf_generic_reloc, /* special_function */
877 "R_BFIN_FUNCDESC_GOTOFFLO", /* name */
878 FALSE, /* partial_inplace */
879 0xffff, /* src_mask */
880 0xffff, /* dst_mask */
881 FALSE), /* pcrel_offset */
882
883 /* A 12-bit signed operand with the GOT offset for the address of
884 the symbol. */
885 HOWTO (R_BFIN_GOTOFF17M4, /* type */
886 2, /* rightshift */
887 1, /* size (0 = byte, 1 = short, 2 = long) */
888 16, /* bitsize */
889 FALSE, /* pc_relative */
890 0, /* bitpos */
891 complain_overflow_signed, /* complain_on_overflow */
892 bfd_elf_generic_reloc, /* special_function */
893 "R_BFIN_GOTOFF17M4", /* name */
894 FALSE, /* partial_inplace */
895 0xffff, /* src_mask */
896 0xffff, /* dst_mask */
897 FALSE), /* pcrel_offset */
898
899 /* The upper 16 bits of the GOT offset for the address of the
900 symbol. */
901 HOWTO (R_BFIN_GOTOFFHI, /* type */
902 0, /* rightshift */
903 1, /* size (0 = byte, 1 = short, 2 = long) */
904 16, /* bitsize */
905 FALSE, /* pc_relative */
906 0, /* bitpos */
907 complain_overflow_dont, /* complain_on_overflow */
908 bfd_elf_generic_reloc, /* special_function */
909 "R_BFIN_GOTOFFHI", /* name */
910 FALSE, /* partial_inplace */
911 0xffff, /* src_mask */
912 0xffff, /* dst_mask */
913 FALSE), /* pcrel_offset */
914
915 /* The lower 16 bits of the GOT offset for the address of the
916 symbol. */
917 HOWTO (R_BFIN_GOTOFFLO, /* type */
918 0, /* rightshift */
919 1, /* size (0 = byte, 1 = short, 2 = long) */
920 16, /* bitsize */
921 FALSE, /* pc_relative */
922 0, /* bitpos */
923 complain_overflow_dont, /* complain_on_overflow */
924 bfd_elf_generic_reloc, /* special_function */
925 "R_BFIN_GOTOFFLO", /* name */
926 FALSE, /* partial_inplace */
927 0xffff, /* src_mask */
928 0xffff, /* dst_mask */
929 FALSE), /* pcrel_offset */
0f64bb02
CM
930};
931
0f64bb02
CM
932static reloc_howto_type bfin_gnuext_howto_table [] =
933{
cb88ce9f 934 HOWTO (R_BFIN_PLTPC, /* type. */
0f64bb02
CM
935 0, /* rightshift. */
936 1, /* size (0 = byte, 1 = short, 2 = long). */
937 16, /* bitsize. */
938 FALSE, /* pc_relative. */
939 0, /* bitpos. */
940 complain_overflow_bitfield, /* complain_on_overflow. */
941 bfin_pltpc_reloc, /* special_function. */
cb88ce9f 942 "R_BFIN_PLTPC", /* name. */
0f64bb02
CM
943 FALSE, /* partial_inplace. */
944 0xffff, /* src_mask. */
945 0xffff, /* dst_mask. */
946 FALSE), /* pcrel_offset. */
947
cb88ce9f 948 HOWTO (R_BFIN_GOT, /* type. */
0f64bb02
CM
949 0, /* rightshift. */
950 1, /* size (0 = byte, 1 = short, 2 = long). */
951 16, /* bitsize. */
952 FALSE, /* pc_relative. */
953 0, /* bitpos. */
954 complain_overflow_bitfield, /* complain_on_overflow. */
955 bfd_elf_generic_reloc, /* special_function. */
cb88ce9f 956 "R_BFIN_GOT", /* name. */
0f64bb02
CM
957 FALSE, /* partial_inplace. */
958 0x7fff, /* src_mask. */
959 0x7fff, /* dst_mask. */
960 FALSE), /* pcrel_offset. */
961
962/* GNU extension to record C++ vtable hierarchy. */
963 HOWTO (R_BFIN_GNU_VTINHERIT, /* type. */
964 0, /* rightshift. */
965 2, /* size (0 = byte, 1 = short, 2 = long). */
966 0, /* bitsize. */
967 FALSE, /* pc_relative. */
968 0, /* bitpos. */
969 complain_overflow_dont, /* complain_on_overflow. */
970 NULL, /* special_function. */
971 "R_BFIN_GNU_VTINHERIT", /* name. */
972 FALSE, /* partial_inplace. */
973 0, /* src_mask. */
974 0, /* dst_mask. */
975 FALSE), /* pcrel_offset. */
976
977/* GNU extension to record C++ vtable member usage. */
978 HOWTO (R_BFIN_GNU_VTENTRY, /* type. */
979 0, /* rightshift. */
980 2, /* size (0 = byte, 1 = short, 2 = long). */
981 0, /* bitsize. */
982 FALSE, /* pc_relative. */
983 0, /* bitpos. */
984 complain_overflow_dont, /* complain_on_overflow. */
985 _bfd_elf_rel_vtable_reloc_fn, /* special_function. */
986 "R_BFIN_GNU_VTENTRY", /* name. */
987 FALSE, /* partial_inplace. */
988 0, /* src_mask. */
989 0, /* dst_mask. */
990 FALSE) /* pcrel_offset. */
991};
992
993struct bfin_reloc_map
994{
995 bfd_reloc_code_real_type bfd_reloc_val;
996 unsigned int bfin_reloc_val;
997};
998
999static const struct bfin_reloc_map bfin_reloc_map [] =
1000{
cb88ce9f
BS
1001 { BFD_RELOC_NONE, R_BFIN_UNUSED0 },
1002 { BFD_RELOC_BFIN_5_PCREL, R_BFIN_PCREL5M2 },
1003 { BFD_RELOC_NONE, R_BFIN_UNUSED1 },
1004 { BFD_RELOC_BFIN_10_PCREL, R_BFIN_PCREL10 },
1005 { BFD_RELOC_BFIN_12_PCREL_JUMP, R_BFIN_PCREL12_JUMP },
1006 { BFD_RELOC_BFIN_16_IMM, R_BFIN_RIMM16 },
1007 { BFD_RELOC_BFIN_16_LOW, R_BFIN_LUIMM16 },
1008 { BFD_RELOC_BFIN_16_HIGH, R_BFIN_HUIMM16 },
1009 { BFD_RELOC_BFIN_12_PCREL_JUMP_S, R_BFIN_PCREL12_JUMP_S },
1010 { BFD_RELOC_24_PCREL, R_BFIN_PCREL24 },
1011 { BFD_RELOC_24_PCREL, R_BFIN_PCREL24 },
1012 { BFD_RELOC_BFIN_24_PCREL_JUMP_L, R_BFIN_PCREL24_JUMP_L },
1013 { BFD_RELOC_NONE, R_BFIN_UNUSEDB },
1014 { BFD_RELOC_NONE, R_BFIN_UNUSEDC },
1015 { BFD_RELOC_BFIN_24_PCREL_CALL_X, R_BFIN_PCREL24_CALL_X },
1016 { BFD_RELOC_8, R_BFIN_BYTE_DATA },
1017 { BFD_RELOC_16, R_BFIN_BYTE2_DATA },
1018 { BFD_RELOC_32, R_BFIN_BYTE4_DATA },
1019 { BFD_RELOC_BFIN_11_PCREL, R_BFIN_PCREL11 },
1020 { BFD_RELOC_BFIN_GOT, R_BFIN_GOT },
1021 { BFD_RELOC_BFIN_PLTPC, R_BFIN_PLTPC },
48d502e1
BS
1022
1023 { BFD_RELOC_BFIN_GOT17M4, R_BFIN_GOT17M4 },
1024 { BFD_RELOC_BFIN_GOTHI, R_BFIN_GOTHI },
1025 { BFD_RELOC_BFIN_GOTLO, R_BFIN_GOTLO },
1026 { BFD_RELOC_BFIN_FUNCDESC, R_BFIN_FUNCDESC },
1027 { BFD_RELOC_BFIN_FUNCDESC_GOT17M4, R_BFIN_FUNCDESC_GOT17M4 },
1028 { BFD_RELOC_BFIN_FUNCDESC_GOTHI, R_BFIN_FUNCDESC_GOTHI },
1029 { BFD_RELOC_BFIN_FUNCDESC_GOTLO, R_BFIN_FUNCDESC_GOTLO },
1030 { BFD_RELOC_BFIN_FUNCDESC_VALUE, R_BFIN_FUNCDESC_VALUE },
1031 { BFD_RELOC_BFIN_FUNCDESC_GOTOFF17M4, R_BFIN_FUNCDESC_GOTOFF17M4 },
1032 { BFD_RELOC_BFIN_FUNCDESC_GOTOFFHI, R_BFIN_FUNCDESC_GOTOFFHI },
1033 { BFD_RELOC_BFIN_FUNCDESC_GOTOFFLO, R_BFIN_FUNCDESC_GOTOFFLO },
1034 { BFD_RELOC_BFIN_GOTOFF17M4, R_BFIN_GOTOFF17M4 },
1035 { BFD_RELOC_BFIN_GOTOFFHI, R_BFIN_GOTOFFHI },
1036 { BFD_RELOC_BFIN_GOTOFFLO, R_BFIN_GOTOFFLO },
1037
0f64bb02
CM
1038 { BFD_RELOC_VTABLE_INHERIT, R_BFIN_GNU_VTINHERIT },
1039 { BFD_RELOC_VTABLE_ENTRY, R_BFIN_GNU_VTENTRY },
0f64bb02
CM
1040};
1041
1042
1043static void
1044bfin_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
1045 arelent *cache_ptr,
1046 Elf_Internal_Rela *dst)
1047{
1048 unsigned int r_type;
1049
1050 r_type = ELF32_R_TYPE (dst->r_info);
1051
1052 if (r_type <= BFIN_RELOC_MAX)
1053 cache_ptr->howto = &bfin_howto_table [r_type];
1054
0f64bb02
CM
1055 else if (r_type >= BFIN_GNUEXT_RELOC_MIN && r_type <= BFIN_GNUEXT_RELOC_MAX)
1056 cache_ptr->howto = &bfin_gnuext_howto_table [r_type - BFIN_GNUEXT_RELOC_MIN];
1057
1058 else
1059 cache_ptr->howto = (reloc_howto_type *) NULL;
0f64bb02 1060}
157090f7 1061
0f64bb02
CM
1062/* Given a BFD reloc type, return the howto. */
1063static reloc_howto_type *
1064bfin_bfd_reloc_type_lookup (bfd * abfd ATTRIBUTE_UNUSED,
1065 bfd_reloc_code_real_type code)
1066{
1067 unsigned int i;
0ba38529 1068 unsigned int r_type = (unsigned int) -1;
0f64bb02 1069
0ba38529 1070 for (i = sizeof (bfin_reloc_map) / sizeof (bfin_reloc_map[0]); i--;)
0f64bb02
CM
1071 if (bfin_reloc_map[i].bfd_reloc_val == code)
1072 r_type = bfin_reloc_map[i].bfin_reloc_val;
1073
0ba38529 1074 if (r_type <= BFIN_RELOC_MAX)
0f64bb02
CM
1075 return &bfin_howto_table [r_type];
1076
0f64bb02
CM
1077 else if (r_type >= BFIN_GNUEXT_RELOC_MIN && r_type <= BFIN_GNUEXT_RELOC_MAX)
1078 return &bfin_gnuext_howto_table [r_type - BFIN_GNUEXT_RELOC_MIN];
1079
1080 return (reloc_howto_type *) NULL;
157090f7 1081}
0f64bb02 1082
157090f7
AM
1083static reloc_howto_type *
1084bfin_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1085 const char *r_name)
1086{
1087 unsigned int i;
1088
1089 for (i = 0;
1090 i < (sizeof (bfin_howto_table)
1091 / sizeof (bfin_howto_table[0]));
1092 i++)
1093 if (bfin_howto_table[i].name != NULL
1094 && strcasecmp (bfin_howto_table[i].name, r_name) == 0)
1095 return &bfin_howto_table[i];
1096
1097 for (i = 0;
1098 i < (sizeof (bfin_gnuext_howto_table)
1099 / sizeof (bfin_gnuext_howto_table[0]));
1100 i++)
1101 if (bfin_gnuext_howto_table[i].name != NULL
1102 && strcasecmp (bfin_gnuext_howto_table[i].name, r_name) == 0)
1103 return &bfin_gnuext_howto_table[i];
1104
1105 return NULL;
0f64bb02 1106}
157090f7 1107
0f64bb02
CM
1108/* Given a bfin relocation type, return the howto. */
1109static reloc_howto_type *
1110bfin_reloc_type_lookup (bfd * abfd ATTRIBUTE_UNUSED,
2c3fc389 1111 unsigned int r_type)
0f64bb02
CM
1112{
1113 if (r_type <= BFIN_RELOC_MAX)
1114 return &bfin_howto_table [r_type];
1115
0f64bb02
CM
1116 else if (r_type >= BFIN_GNUEXT_RELOC_MIN && r_type <= BFIN_GNUEXT_RELOC_MAX)
1117 return &bfin_gnuext_howto_table [r_type - BFIN_GNUEXT_RELOC_MIN];
1118
1119 return (reloc_howto_type *) NULL;
0f64bb02
CM
1120}
1121
781303ce
MF
1122/* Set by ld emulation if --code-in-l1. */
1123bfd_boolean elf32_bfin_code_in_l1 = 0;
1124
1125/* Set by ld emulation if --data-in-l1. */
1126bfd_boolean elf32_bfin_data_in_l1 = 0;
1127
1128static void
1129elf32_bfin_final_write_processing (bfd *abfd,
1130 bfd_boolean linker ATTRIBUTE_UNUSED)
1131{
1132 if (elf32_bfin_code_in_l1)
1133 elf_elfheader (abfd)->e_flags |= EF_BFIN_CODE_IN_L1;
1134 if (elf32_bfin_data_in_l1)
1135 elf_elfheader (abfd)->e_flags |= EF_BFIN_DATA_IN_L1;
1136}
1137
0f64bb02
CM
1138/* Return TRUE if the name is a local label.
1139 bfin local labels begin with L$. */
1140static bfd_boolean
2c3fc389 1141bfin_is_local_label_name (bfd *abfd, const char *label)
0f64bb02
CM
1142{
1143 if (label[0] == 'L' && label[1] == '$' )
1144 return TRUE;
1145
1146 return _bfd_elf_is_local_label_name (abfd, label);
1147}
c96a8570
BS
1148\f
1149/* Look through the relocs for a section during the first phase, and
1150 allocate space in the global offset table or procedure linkage
1151 table. */
0f64bb02 1152
c96a8570
BS
1153static bfd_boolean
1154bfin_check_relocs (bfd * abfd,
1155 struct bfd_link_info *info,
1156 asection *sec,
1157 const Elf_Internal_Rela *relocs)
48d502e1 1158{
c96a8570
BS
1159 bfd *dynobj;
1160 Elf_Internal_Shdr *symtab_hdr;
1161 struct elf_link_hash_entry **sym_hashes;
1162 bfd_signed_vma *local_got_refcounts;
1163 const Elf_Internal_Rela *rel;
1164 const Elf_Internal_Rela *rel_end;
48d502e1 1165 asection *sgot;
c96a8570 1166 asection *srelgot;
2c3fc389 1167
0e1862bb 1168 if (bfd_link_relocatable (info))
c96a8570 1169 return TRUE;
48d502e1 1170
c96a8570
BS
1171 dynobj = elf_hash_table (info)->dynobj;
1172 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1173 sym_hashes = elf_sym_hashes (abfd);
1174 local_got_refcounts = elf_local_got_refcounts (abfd);
48d502e1 1175
c96a8570
BS
1176 sgot = NULL;
1177 srelgot = NULL;
48d502e1 1178
c96a8570
BS
1179 rel_end = relocs + sec->reloc_count;
1180 for (rel = relocs; rel < rel_end; rel++)
48d502e1 1181 {
c96a8570
BS
1182 unsigned long r_symndx;
1183 struct elf_link_hash_entry *h;
48d502e1 1184
c96a8570
BS
1185 r_symndx = ELF32_R_SYM (rel->r_info);
1186 if (r_symndx < symtab_hdr->sh_info)
1187 h = NULL;
1188 else
81fbe831
AM
1189 {
1190 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1191
1192 /* PR15323, ref flags aren't set for references in the same
1193 object. */
bc4e12de 1194 h->root.non_ir_ref_regular = 1;
81fbe831 1195 }
48d502e1 1196
c96a8570
BS
1197 switch (ELF32_R_TYPE (rel->r_info))
1198 {
1199 /* This relocation describes the C++ object vtable hierarchy.
1200 Reconstruct it for later use during GC. */
1201 case R_BFIN_GNU_VTINHERIT:
1202 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
1203 return FALSE;
1204 break;
48d502e1 1205
c96a8570
BS
1206 /* This relocation describes which C++ vtable entries
1207 are actually used. Record for later use during GC. */
1208 case R_BFIN_GNU_VTENTRY:
1209 BFD_ASSERT (h != NULL);
1210 if (h != NULL
1211 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
1212 return FALSE;
1213 break;
48d502e1 1214
cb88ce9f 1215 case R_BFIN_GOT:
c96a8570
BS
1216 if (h != NULL
1217 && strcmp (h->root.root.string, "__GLOBAL_OFFSET_TABLE_") == 0)
1218 break;
1219 /* Fall through. */
48d502e1 1220
c96a8570
BS
1221 if (dynobj == NULL)
1222 {
1223 /* Create the .got section. */
1224 elf_hash_table (info)->dynobj = dynobj = abfd;
1225 if (!_bfd_elf_create_got_section (dynobj, info))
1226 return FALSE;
1227 }
48d502e1 1228
ce558b89
AM
1229 sgot = elf_hash_table (info)->sgot;
1230 srelgot = elf_hash_table (info)->srelgot;
1231 BFD_ASSERT (sgot != NULL);
48d502e1 1232
c96a8570
BS
1233 if (h != NULL)
1234 {
1235 if (h->got.refcount == 0)
1236 {
1237 /* Make sure this symbol is output as a dynamic symbol. */
1238 if (h->dynindx == -1 && !h->forced_local)
1239 {
1240 if (!bfd_elf_link_record_dynamic_symbol (info, h))
1241 return FALSE;
1242 }
48d502e1 1243
c96a8570
BS
1244 /* Allocate space in the .got section. */
1245 sgot->size += 4;
1246 /* Allocate relocation space. */
1247 srelgot->size += sizeof (Elf32_External_Rela);
1248 }
1249 h->got.refcount++;
1250 }
1251 else
1252 {
1253 /* This is a global offset table entry for a local symbol. */
1254 if (local_got_refcounts == NULL)
1255 {
1256 bfd_size_type size;
48d502e1 1257
c96a8570
BS
1258 size = symtab_hdr->sh_info;
1259 size *= sizeof (bfd_signed_vma);
1260 local_got_refcounts = ((bfd_signed_vma *)
1261 bfd_zalloc (abfd, size));
1262 if (local_got_refcounts == NULL)
1263 return FALSE;
1264 elf_local_got_refcounts (abfd) = local_got_refcounts;
1265 }
1266 if (local_got_refcounts[r_symndx] == 0)
1267 {
1268 sgot->size += 4;
0e1862bb 1269 if (bfd_link_pic (info))
c96a8570
BS
1270 {
1271 /* If we are generating a shared object, we need to
1272 output a R_68K_RELATIVE reloc so that the dynamic
1273 linker can adjust this GOT entry. */
1274 srelgot->size += sizeof (Elf32_External_Rela);
1275 }
1276 }
1277 local_got_refcounts[r_symndx]++;
1278 }
1279 break;
48d502e1 1280
c96a8570
BS
1281 default:
1282 break;
1283 }
1284 }
1285
1286 return TRUE;
48d502e1
BS
1287}
1288
c96a8570 1289static enum elf_reloc_type_class
7e612e98
AM
1290elf32_bfin_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
1291 const asection *rel_sec ATTRIBUTE_UNUSED,
1292 const Elf_Internal_Rela * rela)
48d502e1 1293{
c96a8570
BS
1294 switch ((int) ELF32_R_TYPE (rela->r_info))
1295 {
1296 default:
1297 return reloc_class_normal;
1298 }
1299}
1300\f
1301static bfd_reloc_status_type
1302bfin_final_link_relocate (Elf_Internal_Rela *rel, reloc_howto_type *howto,
1303 bfd *input_bfd, asection *input_section,
1304 bfd_byte *contents, bfd_vma address,
1305 bfd_vma value, bfd_vma addend)
1306{
1307 int r_type = ELF32_R_TYPE (rel->r_info);
48d502e1 1308
cb88ce9f 1309 if (r_type == R_BFIN_PCREL24 || r_type == R_BFIN_PCREL24_JUMP_L)
c96a8570
BS
1310 {
1311 bfd_reloc_status_type r = bfd_reloc_ok;
1312 bfd_vma x;
48d502e1 1313
c96a8570
BS
1314 if (address > bfd_get_section_limit (input_bfd, input_section))
1315 return bfd_reloc_outofrange;
48d502e1 1316
c96a8570 1317 value += addend;
48d502e1 1318
c96a8570
BS
1319 /* Perform usual pc-relative correction. */
1320 value -= input_section->output_section->vma + input_section->output_offset;
1321 value -= address;
48d502e1 1322
c96a8570
BS
1323 /* We are getting reloc_entry->address 2 byte off from
1324 the start of instruction. Assuming absolute postion
1325 of the reloc data. But, following code had been written assuming
1326 reloc address is starting at begining of instruction.
1327 To compensate that I have increased the value of
1328 relocation by 1 (effectively 2) and used the addr -2 instead of addr. */
48d502e1 1329
c96a8570
BS
1330 value += 2;
1331 address -= 2;
48d502e1 1332
c96a8570
BS
1333 if ((value & 0xFF000000) != 0
1334 && (value & 0xFF000000) != 0xFF000000)
1335 r = bfd_reloc_overflow;
48d502e1 1336
c96a8570 1337 value >>= 1;
48d502e1 1338
c96a8570
BS
1339 x = bfd_get_16 (input_bfd, contents + address);
1340 x = (x & 0xff00) | ((value >> 16) & 0xff);
1341 bfd_put_16 (input_bfd, x, contents + address);
48d502e1 1342
c96a8570
BS
1343 x = bfd_get_16 (input_bfd, contents + address + 2);
1344 x = value & 0xFFFF;
1345 bfd_put_16 (input_bfd, x, contents + address + 2);
1346 return r;
1347 }
48d502e1 1348
c96a8570
BS
1349 return _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
1350 rel->r_offset, value, addend);
48d502e1 1351
48d502e1
BS
1352}
1353
c96a8570
BS
1354static bfd_boolean
1355bfin_relocate_section (bfd * output_bfd,
1356 struct bfd_link_info *info,
1357 bfd * input_bfd,
1358 asection * input_section,
1359 bfd_byte * contents,
1360 Elf_Internal_Rela * relocs,
1361 Elf_Internal_Sym * local_syms,
1362 asection ** local_sections)
48d502e1 1363{
c96a8570
BS
1364 bfd *dynobj;
1365 Elf_Internal_Shdr *symtab_hdr;
1366 struct elf_link_hash_entry **sym_hashes;
1367 bfd_vma *local_got_offsets;
1368 asection *sgot;
c96a8570
BS
1369 Elf_Internal_Rela *rel;
1370 Elf_Internal_Rela *relend;
1371 int i = 0;
48d502e1 1372
c96a8570
BS
1373 dynobj = elf_hash_table (info)->dynobj;
1374 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1375 sym_hashes = elf_sym_hashes (input_bfd);
1376 local_got_offsets = elf_local_got_offsets (input_bfd);
48d502e1 1377
c96a8570 1378 sgot = NULL;
48d502e1 1379
c96a8570
BS
1380 rel = relocs;
1381 relend = relocs + input_section->reloc_count;
1382 for (; rel < relend; rel++, i++)
1383 {
1384 int r_type;
1385 reloc_howto_type *howto;
1386 unsigned long r_symndx;
1387 struct elf_link_hash_entry *h;
1388 Elf_Internal_Sym *sym;
1389 asection *sec;
1390 bfd_vma relocation = 0;
1391 bfd_boolean unresolved_reloc;
1392 bfd_reloc_status_type r;
1393 bfd_vma address;
48d502e1 1394
c96a8570
BS
1395 r_type = ELF32_R_TYPE (rel->r_info);
1396 if (r_type < 0 || r_type >= 243)
1397 {
1398 bfd_set_error (bfd_error_bad_value);
1399 return FALSE;
1400 }
48d502e1 1401
c96a8570
BS
1402 if (r_type == R_BFIN_GNU_VTENTRY
1403 || r_type == R_BFIN_GNU_VTINHERIT)
1404 continue;
48d502e1 1405
c96a8570
BS
1406 howto = bfin_reloc_type_lookup (input_bfd, r_type);
1407 if (howto == NULL)
1408 {
1409 bfd_set_error (bfd_error_bad_value);
1410 return FALSE;
1411 }
1412 r_symndx = ELF32_R_SYM (rel->r_info);
48d502e1 1413
c96a8570
BS
1414 h = NULL;
1415 sym = NULL;
1416 sec = NULL;
1417 unresolved_reloc = FALSE;
48d502e1 1418
c96a8570
BS
1419 if (r_symndx < symtab_hdr->sh_info)
1420 {
1421 sym = local_syms + r_symndx;
1422 sec = local_sections[r_symndx];
1423 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
1424 }
1425 else
1426 {
62d887d4 1427 bfd_boolean warned, ignored;
48d502e1 1428
c96a8570
BS
1429 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1430 r_symndx, symtab_hdr, sym_hashes,
1431 h, sec, relocation,
62d887d4 1432 unresolved_reloc, warned, ignored);
c96a8570 1433 }
48d502e1 1434
dbaa2011 1435 if (sec != NULL && discarded_section (sec))
e4067dbb 1436 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 1437 rel, 1, relend, howto, 0, contents);
48d502e1 1438
0e1862bb 1439 if (bfd_link_relocatable (info))
c96a8570 1440 continue;
48d502e1 1441
c96a8570 1442 address = rel->r_offset;
48d502e1 1443
c96a8570
BS
1444 /* Then, process normally. */
1445 switch (r_type)
1446 {
1447 case R_BFIN_GNU_VTINHERIT:
1448 case R_BFIN_GNU_VTENTRY:
1449 return bfd_reloc_ok;
48d502e1 1450
cb88ce9f 1451 case R_BFIN_GOT:
c96a8570
BS
1452 /* Relocation is to the address of the entry for this symbol
1453 in the global offset table. */
1454 if (h != NULL
1455 && strcmp (h->root.root.string, "__GLOBAL_OFFSET_TABLE_") == 0)
1456 goto do_default;
1457 /* Fall through. */
1458 /* Relocation is the offset of the entry for this symbol in
1459 the global offset table. */
48d502e1 1460
c96a8570
BS
1461 {
1462 bfd_vma off;
48d502e1 1463
ce558b89 1464 if (dynobj == NULL)
c96a8570 1465 {
ce558b89
AM
1466 /* Create the .got section. */
1467 elf_hash_table (info)->dynobj = dynobj = output_bfd;
1468 if (!_bfd_elf_create_got_section (dynobj, info))
1469 return FALSE;
c96a8570 1470 }
48d502e1 1471
ce558b89
AM
1472 sgot = elf_hash_table (info)->sgot;
1473 BFD_ASSERT (sgot != NULL);
1474
c96a8570
BS
1475 if (h != NULL)
1476 {
1477 bfd_boolean dyn;
48d502e1 1478
c96a8570
BS
1479 off = h->got.offset;
1480 BFD_ASSERT (off != (bfd_vma) - 1);
1481 dyn = elf_hash_table (info)->dynamic_sections_created;
48d502e1 1482
0e1862bb
L
1483 if (!WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
1484 bfd_link_pic (info),
1485 h)
1486 || (bfd_link_pic (info)
c96a8570
BS
1487 && (info->symbolic
1488 || h->dynindx == -1
1489 || h->forced_local)
1490 && h->def_regular))
1491 {
1492 /* This is actually a static link, or it is a
1493 -Bsymbolic link and the symbol is defined
1494 locally, or the symbol was forced to be local
1495 because of a version file.. We must initialize
1496 this entry in the global offset table. Since
1497 the offset must always be a multiple of 4, we
1498 use the least significant bit to record whether
1499 we have initialized it already.
48d502e1 1500
c96a8570
BS
1501 When doing a dynamic link, we create a .rela.got
1502 relocation entry to initialize the value. This
1503 is done in the finish_dynamic_symbol routine. */
1504 if ((off & 1) != 0)
1505 off &= ~1;
1506 else
1507 {
1508 bfd_put_32 (output_bfd, relocation,
1509 sgot->contents + off);
1510 h->got.offset |= 1;
1511 }
1512 }
1513 else
1514 unresolved_reloc = FALSE;
1515 }
1516 else
1517 {
1518 BFD_ASSERT (local_got_offsets != NULL);
1519 off = local_got_offsets[r_symndx];
1520 BFD_ASSERT (off != (bfd_vma) - 1);
48d502e1 1521
c96a8570
BS
1522 /* The offset must always be a multiple of 4. We use
1523 the least significant bit to record whether we have
1524 already generated the necessary reloc. */
1525 if ((off & 1) != 0)
1526 off &= ~1;
1527 else
1528 {
1529 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
48d502e1 1530
0e1862bb 1531 if (bfd_link_pic (info))
c96a8570
BS
1532 {
1533 asection *s;
1534 Elf_Internal_Rela outrel;
1535 bfd_byte *loc;
48d502e1 1536
ce558b89 1537 s = elf_hash_table (info)->srelgot;
c96a8570 1538 BFD_ASSERT (s != NULL);
48d502e1 1539
c96a8570
BS
1540 outrel.r_offset = (sgot->output_section->vma
1541 + sgot->output_offset + off);
1542 outrel.r_info =
cb88ce9f 1543 ELF32_R_INFO (0, R_BFIN_PCREL24);
c96a8570
BS
1544 outrel.r_addend = relocation;
1545 loc = s->contents;
1546 loc +=
1547 s->reloc_count++ * sizeof (Elf32_External_Rela);
1548 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1549 }
48d502e1 1550
c96a8570
BS
1551 local_got_offsets[r_symndx] |= 1;
1552 }
1553 }
48d502e1 1554
c96a8570
BS
1555 relocation = sgot->output_offset + off;
1556 rel->r_addend = 0;
1557 /* bfin : preg = [preg + 17bitdiv4offset] relocation is div by 4. */
1558 relocation /= 4;
1559 }
1560 goto do_default;
1561
1562 default:
1563 do_default:
1564 r = bfin_final_link_relocate (rel, howto, input_bfd, input_section,
1565 contents, address,
1566 relocation, rel->r_addend);
1567
1568 break;
48d502e1
BS
1569 }
1570
c96a8570
BS
1571 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
1572 because such sections are not SEC_ALLOC and thus ld.so will
1573 not process them. */
1574 if (unresolved_reloc
1d5316ab
AM
1575 && !((input_section->flags & SEC_DEBUGGING) != 0 && h->def_dynamic)
1576 && _bfd_elf_section_offset (output_bfd, info, input_section,
1577 rel->r_offset) != (bfd_vma) -1)
48d502e1 1578 {
4eca0228 1579 _bfd_error_handler
695344c0 1580 /* xgettext:c-format */
d42c267e 1581 (_("%B(%A+%#Lx): unresolvable relocation against symbol `%s'"),
c96a8570 1582 input_bfd,
d42c267e 1583 input_section, rel->r_offset, h->root.root.string);
c96a8570 1584 return FALSE;
48d502e1 1585 }
48d502e1 1586
c96a8570 1587 if (r != bfd_reloc_ok)
48d502e1 1588 {
c96a8570
BS
1589 const char *name;
1590
1591 if (h != NULL)
1592 name = h->root.root.string;
1593 else
48d502e1 1594 {
c96a8570
BS
1595 name = bfd_elf_string_from_elf_section (input_bfd,
1596 symtab_hdr->sh_link,
1597 sym->st_name);
1598 if (name == NULL)
1599 return FALSE;
1600 if (*name == '\0')
1601 name = bfd_section_name (input_bfd, sec);
48d502e1 1602 }
c96a8570
BS
1603
1604 if (r == bfd_reloc_overflow)
1a72702b
AM
1605 (*info->callbacks->reloc_overflow)
1606 (info, (h ? &h->root : NULL), name, howto->name,
1607 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
48d502e1
BS
1608 else
1609 {
4eca0228 1610 _bfd_error_handler
695344c0 1611 /* xgettext:c-format */
d42c267e
AM
1612 (_("%B(%A+%#Lx): reloc against `%s': error %d"),
1613 input_bfd, input_section, rel->r_offset, name, (int) r);
c96a8570 1614 return FALSE;
48d502e1 1615 }
48d502e1 1616 }
48d502e1
BS
1617 }
1618
c96a8570
BS
1619 return TRUE;
1620}
48d502e1 1621
c96a8570
BS
1622static asection *
1623bfin_gc_mark_hook (asection * sec,
1624 struct bfd_link_info *info,
1625 Elf_Internal_Rela * rel,
1626 struct elf_link_hash_entry *h,
1627 Elf_Internal_Sym * sym)
1628{
1629 if (h != NULL)
1630 switch (ELF32_R_TYPE (rel->r_info))
1631 {
1632 case R_BFIN_GNU_VTINHERIT:
1633 case R_BFIN_GNU_VTENTRY:
1634 return NULL;
1635 }
48d502e1 1636
c96a8570
BS
1637 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
1638}
c96a8570 1639\f
6d00b590
AM
1640extern const bfd_target bfin_elf32_fdpic_vec;
1641#define IS_FDPIC(bfd) ((bfd)->xvec == &bfin_elf32_fdpic_vec)
0f64bb02 1642
4dfe6ac6
NC
1643/* An extension of the elf hash table data structure,
1644 containing some additional Blackfin-specific data. */
c96a8570 1645struct bfinfdpic_elf_link_hash_table
c35e54f4 1646{
c96a8570 1647 struct elf_link_hash_table elf;
c35e54f4 1648
c96a8570
BS
1649 /* A pointer to the .rofixup section. */
1650 asection *sgotfixup;
c96a8570
BS
1651 /* GOT base offset. */
1652 bfd_vma got0;
1653 /* Location of the first non-lazy PLT entry, i.e., the number of
1654 bytes taken by lazy PLT entries. */
1655 bfd_vma plt0;
1656 /* A hash table holding information about which symbols were
1657 referenced with which PIC-related relocations. */
1658 struct htab *relocs_info;
6a9adeca
BS
1659 /* Summary reloc information collected by
1660 _bfinfdpic_count_got_plt_entries. */
1661 struct _bfinfdpic_dynamic_got_info *g;
c96a8570 1662};
c35e54f4 1663
c96a8570 1664/* Get the Blackfin ELF linker hash table from a link_info structure. */
c35e54f4 1665
c96a8570 1666#define bfinfdpic_hash_table(info) \
4dfe6ac6
NC
1667 (elf_hash_table_id ((struct elf_link_hash_table *) ((info)->hash)) \
1668 == BFIN_ELF_DATA ? ((struct bfinfdpic_elf_link_hash_table *) ((info)->hash)) : NULL)
c35e54f4 1669
c96a8570 1670#define bfinfdpic_got_section(info) \
ce558b89 1671 (bfinfdpic_hash_table (info)->elf.sgot)
c96a8570 1672#define bfinfdpic_gotrel_section(info) \
ce558b89 1673 (bfinfdpic_hash_table (info)->elf.srelgot)
c96a8570
BS
1674#define bfinfdpic_gotfixup_section(info) \
1675 (bfinfdpic_hash_table (info)->sgotfixup)
1676#define bfinfdpic_plt_section(info) \
ce558b89 1677 (bfinfdpic_hash_table (info)->elf.splt)
c96a8570 1678#define bfinfdpic_pltrel_section(info) \
ce558b89 1679 (bfinfdpic_hash_table (info)->elf.srelplt)
c96a8570
BS
1680#define bfinfdpic_relocs_info(info) \
1681 (bfinfdpic_hash_table (info)->relocs_info)
1682#define bfinfdpic_got_initial_offset(info) \
1683 (bfinfdpic_hash_table (info)->got0)
1684#define bfinfdpic_plt_initial_offset(info) \
1685 (bfinfdpic_hash_table (info)->plt0)
6a9adeca
BS
1686#define bfinfdpic_dynamic_got_plt_info(info) \
1687 (bfinfdpic_hash_table (info)->g)
c35e54f4 1688
c96a8570
BS
1689/* The name of the dynamic interpreter. This is put in the .interp
1690 section. */
c35e54f4 1691
c96a8570 1692#define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
c35e54f4 1693
c96a8570 1694#define DEFAULT_STACK_SIZE 0x20000
c35e54f4 1695
c96a8570
BS
1696/* This structure is used to collect the number of entries present in
1697 each addressable range of the got. */
1698struct _bfinfdpic_dynamic_got_info
1699{
1700 /* Several bits of information about the current link. */
1701 struct bfd_link_info *info;
1702 /* Total size needed for GOT entries within the 18- or 32-bit
1703 ranges. */
1704 bfd_vma got17m4, gothilo;
1705 /* Total size needed for function descriptor entries within the 18-
1706 or 32-bit ranges. */
1707 bfd_vma fd17m4, fdhilo;
1708 /* Total size needed function descriptor entries referenced in PLT
1709 entries, that would be profitable to place in offsets close to
1710 the PIC register. */
1711 bfd_vma fdplt;
1712 /* Total size needed by lazy PLT entries. */
1713 bfd_vma lzplt;
1714 /* Number of relocations carried over from input object files. */
1715 unsigned long relocs;
1716 /* Number of fixups introduced by relocations in input object files. */
1717 unsigned long fixups;
1718};
c35e54f4 1719
c96a8570 1720/* Create a Blackfin ELF linker hash table. */
c35e54f4 1721
c96a8570
BS
1722static struct bfd_link_hash_table *
1723bfinfdpic_elf_link_hash_table_create (bfd *abfd)
1724{
1725 struct bfinfdpic_elf_link_hash_table *ret;
1726 bfd_size_type amt = sizeof (struct bfinfdpic_elf_link_hash_table);
c35e54f4 1727
22cdc249 1728 ret = bfd_zmalloc (amt);
c96a8570
BS
1729 if (ret == NULL)
1730 return NULL;
c35e54f4 1731
c96a8570
BS
1732 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
1733 _bfd_elf_link_hash_newfunc,
4dfe6ac6
NC
1734 sizeof (struct elf_link_hash_entry),
1735 BFIN_ELF_DATA))
c96a8570
BS
1736 {
1737 free (ret);
1738 return NULL;
1739 }
c35e54f4 1740
c96a8570
BS
1741 return &ret->elf.root;
1742}
48d502e1 1743
c96a8570
BS
1744/* Decide whether a reference to a symbol can be resolved locally or
1745 not. If the symbol is protected, we want the local address, but
1746 its function descriptor must be assigned by the dynamic linker. */
1747#define BFINFDPIC_SYM_LOCAL(INFO, H) \
1748 (_bfd_elf_symbol_refs_local_p ((H), (INFO), 1) \
1749 || ! elf_hash_table (INFO)->dynamic_sections_created)
1750#define BFINFDPIC_FUNCDESC_LOCAL(INFO, H) \
1751 ((H)->dynindx == -1 || ! elf_hash_table (INFO)->dynamic_sections_created)
48d502e1 1752
c96a8570
BS
1753/* This structure collects information on what kind of GOT, PLT or
1754 function descriptors are required by relocations that reference a
1755 certain symbol. */
1756struct bfinfdpic_relocs_info
1757{
1758 /* The index of the symbol, as stored in the relocation r_info, if
1759 we have a local symbol; -1 otherwise. */
1760 long symndx;
1761 union
1762 {
1763 /* The input bfd in which the symbol is defined, if it's a local
1764 symbol. */
1765 bfd *abfd;
1766 /* If symndx == -1, the hash table entry corresponding to a global
1767 symbol (even if it turns out to bind locally, in which case it
1768 should ideally be replaced with section's symndx + addend). */
1769 struct elf_link_hash_entry *h;
1770 } d;
1771 /* The addend of the relocation that references the symbol. */
1772 bfd_vma addend;
48d502e1 1773
c96a8570
BS
1774 /* The fields above are used to identify an entry. The fields below
1775 contain information on how an entry is used and, later on, which
1776 locations it was assigned. */
1777 /* The following 2 fields record whether the symbol+addend above was
1778 ever referenced with a GOT relocation. The 17M4 suffix indicates a
1779 GOT17M4 relocation; hilo is used for GOTLO/GOTHI pairs. */
1780 unsigned got17m4;
1781 unsigned gothilo;
1782 /* Whether a FUNCDESC relocation references symbol+addend. */
1783 unsigned fd;
1784 /* Whether a FUNCDESC_GOT relocation references symbol+addend. */
1785 unsigned fdgot17m4;
1786 unsigned fdgothilo;
1787 /* Whether a FUNCDESC_GOTOFF relocation references symbol+addend. */
1788 unsigned fdgoff17m4;
1789 unsigned fdgoffhilo;
1790 /* Whether symbol+addend is referenced with GOTOFF17M4, GOTOFFLO or
1791 GOTOFFHI relocations. The addend doesn't really matter, since we
1792 envision that this will only be used to check whether the symbol
1793 is mapped to the same segment as the got. */
1794 unsigned gotoff;
1795 /* Whether symbol+addend is referenced by a LABEL24 relocation. */
1796 unsigned call;
1797 /* Whether symbol+addend is referenced by a 32 or FUNCDESC_VALUE
1798 relocation. */
1799 unsigned sym;
1800 /* Whether we need a PLT entry for a symbol. Should be implied by
1801 something like:
1802 (call && symndx == -1 && ! BFINFDPIC_SYM_LOCAL (info, d.h)) */
1803 unsigned plt:1;
1804 /* Whether a function descriptor should be created in this link unit
1805 for symbol+addend. Should be implied by something like:
1806 (plt || fdgotoff17m4 || fdgotofflohi
1807 || ((fd || fdgot17m4 || fdgothilo)
1808 && (symndx != -1 || BFINFDPIC_FUNCDESC_LOCAL (info, d.h)))) */
1809 unsigned privfd:1;
1810 /* Whether a lazy PLT entry is needed for this symbol+addend.
1811 Should be implied by something like:
1812 (privfd && symndx == -1 && ! BFINFDPIC_SYM_LOCAL (info, d.h)
1813 && ! (info->flags & DF_BIND_NOW)) */
1814 unsigned lazyplt:1;
1815 /* Whether we've already emitted GOT relocations and PLT entries as
1816 needed for this symbol. */
1817 unsigned done:1;
48d502e1 1818
cb88ce9f 1819 /* The number of R_BFIN_BYTE4_DATA, R_BFIN_FUNCDESC and R_BFIN_FUNCDESC_VALUE
c96a8570
BS
1820 relocations referencing the symbol. */
1821 unsigned relocs32, relocsfd, relocsfdv;
48d502e1 1822
c96a8570
BS
1823 /* The number of .rofixups entries and dynamic relocations allocated
1824 for this symbol, minus any that might have already been used. */
1825 unsigned fixups, dynrelocs;
48d502e1 1826
c96a8570
BS
1827 /* The offsets of the GOT entries assigned to symbol+addend, to the
1828 function descriptor's address, and to a function descriptor,
1829 respectively. Should be zero if unassigned. The offsets are
1830 counted from the value that will be assigned to the PIC register,
1831 not from the beginning of the .got section. */
1832 bfd_signed_vma got_entry, fdgot_entry, fd_entry;
1833 /* The offsets of the PLT entries assigned to symbol+addend,
1834 non-lazy and lazy, respectively. If unassigned, should be
1835 (bfd_vma)-1. */
1836 bfd_vma plt_entry, lzplt_entry;
1837};
48d502e1 1838
c96a8570
BS
1839/* Compute a hash with the key fields of an bfinfdpic_relocs_info entry. */
1840static hashval_t
1841bfinfdpic_relocs_info_hash (const void *entry_)
1842{
1843 const struct bfinfdpic_relocs_info *entry = entry_;
48d502e1 1844
c96a8570
BS
1845 return (entry->symndx == -1
1846 ? (long) entry->d.h->root.root.hash
1847 : entry->symndx + (long) entry->d.abfd->id * 257) + entry->addend;
1848}
f4707595 1849
c96a8570
BS
1850/* Test whether the key fields of two bfinfdpic_relocs_info entries are
1851 identical. */
1852static int
1853bfinfdpic_relocs_info_eq (const void *entry1, const void *entry2)
0f64bb02 1854{
c96a8570
BS
1855 const struct bfinfdpic_relocs_info *e1 = entry1;
1856 const struct bfinfdpic_relocs_info *e2 = entry2;
0f64bb02 1857
c96a8570
BS
1858 return e1->symndx == e2->symndx && e1->addend == e2->addend
1859 && (e1->symndx == -1 ? e1->d.h == e2->d.h : e1->d.abfd == e2->d.abfd);
1860}
48d502e1 1861
c96a8570
BS
1862/* Find or create an entry in a hash table HT that matches the key
1863 fields of the given ENTRY. If it's not found, memory for a new
1864 entry is allocated in ABFD's obstack. */
1865static struct bfinfdpic_relocs_info *
1866bfinfdpic_relocs_info_find (struct htab *ht,
1867 bfd *abfd,
1868 const struct bfinfdpic_relocs_info *entry,
1869 enum insert_option insert)
1870{
83fd9437
JZ
1871 struct bfinfdpic_relocs_info **loc;
1872
1873 if (!ht)
1874 return NULL;
1875
1876 loc = (struct bfinfdpic_relocs_info **) htab_find_slot (ht, entry, insert);
0f64bb02 1877
c96a8570
BS
1878 if (! loc)
1879 return NULL;
0f64bb02 1880
c96a8570
BS
1881 if (*loc)
1882 return *loc;
0f64bb02 1883
c96a8570 1884 *loc = bfd_zalloc (abfd, sizeof (**loc));
0f64bb02 1885
c96a8570
BS
1886 if (! *loc)
1887 return *loc;
0f64bb02 1888
c96a8570
BS
1889 (*loc)->symndx = entry->symndx;
1890 (*loc)->d = entry->d;
1891 (*loc)->addend = entry->addend;
1892 (*loc)->plt_entry = (bfd_vma)-1;
1893 (*loc)->lzplt_entry = (bfd_vma)-1;
0f64bb02 1894
c96a8570
BS
1895 return *loc;
1896}
48d502e1 1897
c96a8570
BS
1898/* Obtain the address of the entry in HT associated with H's symbol +
1899 addend, creating a new entry if none existed. ABFD is only used
1900 for memory allocation purposes. */
1901inline static struct bfinfdpic_relocs_info *
1902bfinfdpic_relocs_info_for_global (struct htab *ht,
2c3fc389
NC
1903 bfd *abfd,
1904 struct elf_link_hash_entry *h,
1905 bfd_vma addend,
1906 enum insert_option insert)
c96a8570
BS
1907{
1908 struct bfinfdpic_relocs_info entry;
0f64bb02 1909
c96a8570
BS
1910 entry.symndx = -1;
1911 entry.d.h = h;
1912 entry.addend = addend;
f4707595 1913
c96a8570
BS
1914 return bfinfdpic_relocs_info_find (ht, abfd, &entry, insert);
1915}
48d502e1 1916
c96a8570
BS
1917/* Obtain the address of the entry in HT associated with the SYMNDXth
1918 local symbol of the input bfd ABFD, plus the addend, creating a new
1919 entry if none existed. */
1920inline static struct bfinfdpic_relocs_info *
1921bfinfdpic_relocs_info_for_local (struct htab *ht,
1922 bfd *abfd,
1923 long symndx,
1924 bfd_vma addend,
1925 enum insert_option insert)
1926{
1927 struct bfinfdpic_relocs_info entry;
ab96bf03 1928
c96a8570
BS
1929 entry.symndx = symndx;
1930 entry.d.abfd = abfd;
1931 entry.addend = addend;
48d502e1 1932
c96a8570
BS
1933 return bfinfdpic_relocs_info_find (ht, abfd, &entry, insert);
1934}
48d502e1 1935
c96a8570
BS
1936/* Merge fields set by check_relocs() of two entries that end up being
1937 mapped to the same (presumably global) symbol. */
0f64bb02 1938
c96a8570
BS
1939inline static void
1940bfinfdpic_pic_merge_early_relocs_info (struct bfinfdpic_relocs_info *e2,
2c3fc389 1941 struct bfinfdpic_relocs_info const *e1)
c96a8570
BS
1942{
1943 e2->got17m4 |= e1->got17m4;
1944 e2->gothilo |= e1->gothilo;
1945 e2->fd |= e1->fd;
1946 e2->fdgot17m4 |= e1->fdgot17m4;
1947 e2->fdgothilo |= e1->fdgothilo;
1948 e2->fdgoff17m4 |= e1->fdgoff17m4;
1949 e2->fdgoffhilo |= e1->fdgoffhilo;
1950 e2->gotoff |= e1->gotoff;
1951 e2->call |= e1->call;
1952 e2->sym |= e1->sym;
1953}
48d502e1 1954
c96a8570
BS
1955/* Every block of 65535 lazy PLT entries shares a single call to the
1956 resolver, inserted in the 32768th lazy PLT entry (i.e., entry #
1957 32767, counting from 0). All other lazy PLT entries branch to it
1958 in a single instruction. */
48d502e1 1959
c96a8570
BS
1960#define LZPLT_RESOLVER_EXTRA 10
1961#define LZPLT_NORMAL_SIZE 6
1962#define LZPLT_ENTRIES 1362
48d502e1 1963
c96a8570
BS
1964#define BFINFDPIC_LZPLT_BLOCK_SIZE ((bfd_vma) LZPLT_NORMAL_SIZE * LZPLT_ENTRIES + LZPLT_RESOLVER_EXTRA)
1965#define BFINFDPIC_LZPLT_RESOLV_LOC (LZPLT_NORMAL_SIZE * LZPLT_ENTRIES / 2)
48d502e1 1966
c96a8570 1967/* Add a dynamic relocation to the SRELOC section. */
48d502e1 1968
c96a8570
BS
1969inline static bfd_vma
1970_bfinfdpic_add_dyn_reloc (bfd *output_bfd, asection *sreloc, bfd_vma offset,
1971 int reloc_type, long dynindx, bfd_vma addend,
1972 struct bfinfdpic_relocs_info *entry)
1973{
1974 Elf_Internal_Rela outrel;
1975 bfd_vma reloc_offset;
0f64bb02 1976
c96a8570
BS
1977 outrel.r_offset = offset;
1978 outrel.r_info = ELF32_R_INFO (dynindx, reloc_type);
1979 outrel.r_addend = addend;
48d502e1 1980
c96a8570
BS
1981 reloc_offset = sreloc->reloc_count * sizeof (Elf32_External_Rel);
1982 BFD_ASSERT (reloc_offset < sreloc->size);
1983 bfd_elf32_swap_reloc_out (output_bfd, &outrel,
1984 sreloc->contents + reloc_offset);
1985 sreloc->reloc_count++;
48d502e1 1986
c96a8570
BS
1987 /* If the entry's index is zero, this relocation was probably to a
1988 linkonce section that got discarded. We reserved a dynamic
1989 relocation, but it was for another entry than the one we got at
1990 the time of emitting the relocation. Unfortunately there's no
1991 simple way for us to catch this situation, since the relocation
1992 is cleared right before calling relocate_section, at which point
1993 we no longer know what the relocation used to point to. */
1994 if (entry->symndx)
1995 {
1996 BFD_ASSERT (entry->dynrelocs > 0);
1997 entry->dynrelocs--;
1998 }
48d502e1 1999
c96a8570
BS
2000 return reloc_offset;
2001}
0f64bb02 2002
c96a8570 2003/* Add a fixup to the ROFIXUP section. */
48d502e1 2004
c96a8570
BS
2005static bfd_vma
2006_bfinfdpic_add_rofixup (bfd *output_bfd, asection *rofixup, bfd_vma offset,
2c3fc389 2007 struct bfinfdpic_relocs_info *entry)
c96a8570
BS
2008{
2009 bfd_vma fixup_offset;
8aafe8b4 2010
c96a8570
BS
2011 if (rofixup->flags & SEC_EXCLUDE)
2012 return -1;
0f64bb02 2013
c96a8570
BS
2014 fixup_offset = rofixup->reloc_count * 4;
2015 if (rofixup->contents)
2016 {
2017 BFD_ASSERT (fixup_offset < rofixup->size);
2018 bfd_put_32 (output_bfd, offset, rofixup->contents + fixup_offset);
2019 }
2020 rofixup->reloc_count++;
0f64bb02 2021
c96a8570
BS
2022 if (entry && entry->symndx)
2023 {
2024 /* See discussion about symndx == 0 in _bfinfdpic_add_dyn_reloc
2025 above. */
2026 BFD_ASSERT (entry->fixups > 0);
2027 entry->fixups--;
2028 }
f4707595 2029
c96a8570
BS
2030 return fixup_offset;
2031}
0f64bb02 2032
c96a8570
BS
2033/* Find the segment number in which OSEC, and output section, is
2034 located. */
ca889129 2035
c96a8570
BS
2036static unsigned
2037_bfinfdpic_osec_to_segment (bfd *output_bfd, asection *osec)
2038{
2039 Elf_Internal_Phdr *p = _bfd_elf_find_segment_containing_section (output_bfd, osec);
0f64bb02 2040
c96a8570
BS
2041 return (p != NULL) ? p - elf_tdata (output_bfd)->phdr : -1;
2042}
2043
2044inline static bfd_boolean
2045_bfinfdpic_osec_readonly_p (bfd *output_bfd, asection *osec)
2046{
2047 unsigned seg = _bfinfdpic_osec_to_segment (output_bfd, osec);
2048
2049 return ! (elf_tdata (output_bfd)->phdr[seg].p_flags & PF_W);
2050}
2051
2052/* Generate relocations for GOT entries, function descriptors, and
2053 code for PLT and lazy PLT entries. */
2054
2055inline static bfd_boolean
2056_bfinfdpic_emit_got_relocs_plt_entries (struct bfinfdpic_relocs_info *entry,
2057 bfd *output_bfd,
2058 struct bfd_link_info *info,
2059 asection *sec,
2060 Elf_Internal_Sym *sym,
2061 bfd_vma addend)
c96a8570 2062{
2c3fc389 2063 bfd_vma fd_lazy_rel_offset = (bfd_vma) -1;
c96a8570
BS
2064 int dynindx = -1;
2065
2066 if (entry->done)
2067 return TRUE;
2068 entry->done = 1;
2069
2070 if (entry->got_entry || entry->fdgot_entry || entry->fd_entry)
2071 {
2072 /* If the symbol is dynamic, consider it for dynamic
2073 relocations, otherwise decay to section + offset. */
2074 if (entry->symndx == -1 && entry->d.h->dynindx != -1)
2075 dynindx = entry->d.h->dynindx;
2076 else
2077 {
6a9adeca
BS
2078 if (sec
2079 && sec->output_section
c96a8570
BS
2080 && ! bfd_is_abs_section (sec->output_section)
2081 && ! bfd_is_und_section (sec->output_section))
2082 dynindx = elf_section_data (sec->output_section)->dynindx;
2083 else
2084 dynindx = 0;
2085 }
2086 }
2087
2088 /* Generate relocation for GOT entry pointing to the symbol. */
2089 if (entry->got_entry)
2090 {
2091 int idx = dynindx;
2092 bfd_vma ad = addend;
2093
2094 /* If the symbol is dynamic but binds locally, use
2095 section+offset. */
2096 if (sec && (entry->symndx != -1
2097 || BFINFDPIC_SYM_LOCAL (info, entry->d.h)))
2098 {
2099 if (entry->symndx == -1)
2100 ad += entry->d.h->root.u.def.value;
2101 else
2102 ad += sym->st_value;
2103 ad += sec->output_offset;
2104 if (sec->output_section && elf_section_data (sec->output_section))
2105 idx = elf_section_data (sec->output_section)->dynindx;
2106 else
2107 idx = 0;
2108 }
2109
2110 /* If we're linking an executable at a fixed address, we can
2111 omit the dynamic relocation as long as the symbol is local to
2112 this module. */
3cbc1e5e 2113 if (bfd_link_pde (info)
c96a8570
BS
2114 && (entry->symndx != -1
2115 || BFINFDPIC_SYM_LOCAL (info, entry->d.h)))
2116 {
2117 if (sec)
2118 ad += sec->output_section->vma;
2119 if (entry->symndx != -1
2120 || entry->d.h->root.type != bfd_link_hash_undefweak)
2121 _bfinfdpic_add_rofixup (output_bfd,
2122 bfinfdpic_gotfixup_section (info),
2123 bfinfdpic_got_section (info)->output_section
2124 ->vma
2125 + bfinfdpic_got_section (info)->output_offset
2126 + bfinfdpic_got_initial_offset (info)
2127 + entry->got_entry, entry);
2128 }
2129 else
2130 _bfinfdpic_add_dyn_reloc (output_bfd, bfinfdpic_gotrel_section (info),
2131 _bfd_elf_section_offset
2132 (output_bfd, info,
2133 bfinfdpic_got_section (info),
2134 bfinfdpic_got_initial_offset (info)
2135 + entry->got_entry)
2136 + bfinfdpic_got_section (info)
2137 ->output_section->vma
2138 + bfinfdpic_got_section (info)->output_offset,
cb88ce9f 2139 R_BFIN_BYTE4_DATA, idx, ad, entry);
c96a8570
BS
2140
2141 bfd_put_32 (output_bfd, ad,
2142 bfinfdpic_got_section (info)->contents
2143 + bfinfdpic_got_initial_offset (info)
2144 + entry->got_entry);
2145 }
2146
2147 /* Generate relocation for GOT entry pointing to a canonical
2148 function descriptor. */
2149 if (entry->fdgot_entry)
2150 {
2151 int reloc, idx;
2152 bfd_vma ad = 0;
2153
2154 if (! (entry->symndx == -1
2155 && entry->d.h->root.type == bfd_link_hash_undefweak
2156 && BFINFDPIC_SYM_LOCAL (info, entry->d.h)))
2157 {
2158 /* If the symbol is dynamic and there may be dynamic symbol
2159 resolution because we are, or are linked with, a shared
2160 library, emit a FUNCDESC relocation such that the dynamic
2161 linker will allocate the function descriptor. If the
2162 symbol needs a non-local function descriptor but binds
2163 locally (e.g., its visibility is protected, emit a
2164 dynamic relocation decayed to section+offset. */
2165 if (entry->symndx == -1
2166 && ! BFINFDPIC_FUNCDESC_LOCAL (info, entry->d.h)
2167 && BFINFDPIC_SYM_LOCAL (info, entry->d.h)
3cbc1e5e 2168 && !bfd_link_pde (info))
c96a8570
BS
2169 {
2170 reloc = R_BFIN_FUNCDESC;
2171 idx = elf_section_data (entry->d.h->root.u.def.section
2172 ->output_section)->dynindx;
2173 ad = entry->d.h->root.u.def.section->output_offset
2174 + entry->d.h->root.u.def.value;
2175 }
2176 else if (entry->symndx == -1
2177 && ! BFINFDPIC_FUNCDESC_LOCAL (info, entry->d.h))
2178 {
2179 reloc = R_BFIN_FUNCDESC;
2180 idx = dynindx;
2181 ad = addend;
2182 if (ad)
2183 return FALSE;
2184 }
2185 else
2186 {
2187 /* Otherwise, we know we have a private function descriptor,
2188 so reference it directly. */
2189 if (elf_hash_table (info)->dynamic_sections_created)
2190 BFD_ASSERT (entry->privfd);
cb88ce9f 2191 reloc = R_BFIN_BYTE4_DATA;
c96a8570
BS
2192 idx = elf_section_data (bfinfdpic_got_section (info)
2193 ->output_section)->dynindx;
2194 ad = bfinfdpic_got_section (info)->output_offset
2195 + bfinfdpic_got_initial_offset (info) + entry->fd_entry;
2196 }
2197
2198 /* If there is room for dynamic symbol resolution, emit the
2199 dynamic relocation. However, if we're linking an
2200 executable at a fixed location, we won't have emitted a
2201 dynamic symbol entry for the got section, so idx will be
2202 zero, which means we can and should compute the address
2203 of the private descriptor ourselves. */
3cbc1e5e 2204 if (bfd_link_pde (info)
c96a8570
BS
2205 && (entry->symndx != -1
2206 || BFINFDPIC_FUNCDESC_LOCAL (info, entry->d.h)))
2207 {
2208 ad += bfinfdpic_got_section (info)->output_section->vma;
2209 _bfinfdpic_add_rofixup (output_bfd,
2210 bfinfdpic_gotfixup_section (info),
2211 bfinfdpic_got_section (info)
2212 ->output_section->vma
2213 + bfinfdpic_got_section (info)
2214 ->output_offset
2215 + bfinfdpic_got_initial_offset (info)
2216 + entry->fdgot_entry, entry);
2217 }
2218 else
2219 _bfinfdpic_add_dyn_reloc (output_bfd,
2220 bfinfdpic_gotrel_section (info),
2221 _bfd_elf_section_offset
2222 (output_bfd, info,
2223 bfinfdpic_got_section (info),
2224 bfinfdpic_got_initial_offset (info)
2225 + entry->fdgot_entry)
2226 + bfinfdpic_got_section (info)
2227 ->output_section->vma
2228 + bfinfdpic_got_section (info)
2229 ->output_offset,
2230 reloc, idx, ad, entry);
2231 }
f4707595 2232
c96a8570
BS
2233 bfd_put_32 (output_bfd, ad,
2234 bfinfdpic_got_section (info)->contents
2235 + bfinfdpic_got_initial_offset (info)
2236 + entry->fdgot_entry);
2237 }
2238
2239 /* Generate relocation to fill in a private function descriptor in
2240 the GOT. */
2241 if (entry->fd_entry)
2242 {
2243 int idx = dynindx;
2244 bfd_vma ad = addend;
2245 bfd_vma ofst;
2246 long lowword, highword;
2247
2248 /* If the symbol is dynamic but binds locally, use
2249 section+offset. */
2250 if (sec && (entry->symndx != -1
2251 || BFINFDPIC_SYM_LOCAL (info, entry->d.h)))
2252 {
2253 if (entry->symndx == -1)
2254 ad += entry->d.h->root.u.def.value;
2255 else
2256 ad += sym->st_value;
2257 ad += sec->output_offset;
2258 if (sec->output_section && elf_section_data (sec->output_section))
2259 idx = elf_section_data (sec->output_section)->dynindx;
2260 else
2261 idx = 0;
48d502e1 2262 }
f4707595 2263
c96a8570
BS
2264 /* If we're linking an executable at a fixed address, we can
2265 omit the dynamic relocation as long as the symbol is local to
2266 this module. */
3cbc1e5e 2267 if (bfd_link_pde (info)
c96a8570 2268 && (entry->symndx != -1 || BFINFDPIC_SYM_LOCAL (info, entry->d.h)))
48d502e1 2269 {
c96a8570
BS
2270 if (sec)
2271 ad += sec->output_section->vma;
2272 ofst = 0;
2273 if (entry->symndx != -1
2274 || entry->d.h->root.type != bfd_link_hash_undefweak)
2275 {
2276 _bfinfdpic_add_rofixup (output_bfd,
2277 bfinfdpic_gotfixup_section (info),
2278 bfinfdpic_got_section (info)
2279 ->output_section->vma
2280 + bfinfdpic_got_section (info)
2281 ->output_offset
2282 + bfinfdpic_got_initial_offset (info)
2283 + entry->fd_entry, entry);
2284 _bfinfdpic_add_rofixup (output_bfd,
2285 bfinfdpic_gotfixup_section (info),
2286 bfinfdpic_got_section (info)
2287 ->output_section->vma
2288 + bfinfdpic_got_section (info)
2289 ->output_offset
2290 + bfinfdpic_got_initial_offset (info)
2291 + entry->fd_entry + 4, entry);
2292 }
2293 }
2294 else
2295 {
2296 ofst
2297 = _bfinfdpic_add_dyn_reloc (output_bfd,
2298 entry->lazyplt
2299 ? bfinfdpic_pltrel_section (info)
2300 : bfinfdpic_gotrel_section (info),
2301 _bfd_elf_section_offset
2302 (output_bfd, info,
2303 bfinfdpic_got_section (info),
2304 bfinfdpic_got_initial_offset (info)
2305 + entry->fd_entry)
2306 + bfinfdpic_got_section (info)
2307 ->output_section->vma
2308 + bfinfdpic_got_section (info)
2309 ->output_offset,
2310 R_BFIN_FUNCDESC_VALUE, idx, ad, entry);
48d502e1 2311 }
f4707595 2312
c96a8570
BS
2313 /* If we've omitted the dynamic relocation, just emit the fixed
2314 addresses of the symbol and of the local GOT base offset. */
3cbc1e5e 2315 if (bfd_link_pde (info)
0e1862bb
L
2316 && sec
2317 && sec->output_section)
48d502e1 2318 {
c96a8570
BS
2319 lowword = ad;
2320 highword = bfinfdpic_got_section (info)->output_section->vma
2321 + bfinfdpic_got_section (info)->output_offset
2322 + bfinfdpic_got_initial_offset (info);
2323 }
2324 else if (entry->lazyplt)
2325 {
2326 if (ad)
2327 return FALSE;
f4707595 2328
c96a8570 2329 fd_lazy_rel_offset = ofst;
f4707595 2330
c96a8570
BS
2331 /* A function descriptor used for lazy or local resolving is
2332 initialized such that its high word contains the output
2333 section index in which the PLT entries are located, and
2334 the low word contains the address of the lazy PLT entry
2335 entry point, that must be within the memory region
2336 assigned to that section. */
2337 lowword = entry->lzplt_entry + 4
2338 + bfinfdpic_plt_section (info)->output_offset
2339 + bfinfdpic_plt_section (info)->output_section->vma;
2340 highword = _bfinfdpic_osec_to_segment
2341 (output_bfd, bfinfdpic_plt_section (info)->output_section);
2342 }
2343 else
2344 {
2345 /* A function descriptor for a local function gets the index
2346 of the section. For a non-local function, it's
2347 disregarded. */
2348 lowword = ad;
6a9adeca
BS
2349 if (sec == NULL
2350 || (entry->symndx == -1 && entry->d.h->dynindx != -1
2351 && entry->d.h->dynindx == idx))
c96a8570
BS
2352 highword = 0;
2353 else
2354 highword = _bfinfdpic_osec_to_segment
2355 (output_bfd, sec->output_section);
48d502e1 2356 }
f4707595 2357
c96a8570
BS
2358 bfd_put_32 (output_bfd, lowword,
2359 bfinfdpic_got_section (info)->contents
2360 + bfinfdpic_got_initial_offset (info)
2361 + entry->fd_entry);
2362 bfd_put_32 (output_bfd, highword,
2363 bfinfdpic_got_section (info)->contents
2364 + bfinfdpic_got_initial_offset (info)
2365 + entry->fd_entry + 4);
2366 }
2367
2368 /* Generate code for the PLT entry. */
2369 if (entry->plt_entry != (bfd_vma) -1)
2370 {
2371 bfd_byte *plt_code = bfinfdpic_plt_section (info)->contents
2372 + entry->plt_entry;
2373
2374 BFD_ASSERT (entry->fd_entry);
2375
2376 /* Figure out what kind of PLT entry we need, depending on the
2377 location of the function descriptor within the GOT. */
2378 if (entry->fd_entry >= -(1 << (18 - 1))
2379 && entry->fd_entry + 4 < (1 << (18 - 1)))
48d502e1 2380 {
c96a8570
BS
2381 /* P1 = [P3 + fd_entry]; P3 = [P3 + fd_entry + 4] */
2382 bfd_put_32 (output_bfd,
2383 0xe519 | ((entry->fd_entry << 14) & 0xFFFF0000),
2384 plt_code);
2385 bfd_put_32 (output_bfd,
2386 0xe51b | (((entry->fd_entry + 4) << 14) & 0xFFFF0000),
2387 plt_code + 4);
2388 plt_code += 8;
2389 }
2390 else
2391 {
2392 /* P1.L = fd_entry; P1.H = fd_entry;
2393 P3 = P3 + P1;
2394 P1 = [P3];
2395 P3 = [P3 + 4]; */
2396 bfd_put_32 (output_bfd,
2397 0xe109 | (entry->fd_entry << 16),
2398 plt_code);
2399 bfd_put_32 (output_bfd,
2400 0xe149 | (entry->fd_entry & 0xFFFF0000),
2401 plt_code + 4);
2402 bfd_put_16 (output_bfd, 0x5ad9, plt_code + 8);
2403 bfd_put_16 (output_bfd, 0x9159, plt_code + 10);
2404 bfd_put_16 (output_bfd, 0xac5b, plt_code + 12);
2405 plt_code += 14;
2406 }
2407 /* JUMP (P1) */
2408 bfd_put_16 (output_bfd, 0x0051, plt_code);
2409 }
f4707595 2410
c96a8570
BS
2411 /* Generate code for the lazy PLT entry. */
2412 if (entry->lzplt_entry != (bfd_vma) -1)
2413 {
2414 bfd_byte *lzplt_code = bfinfdpic_plt_section (info)->contents
2415 + entry->lzplt_entry;
2416 bfd_vma resolverStub_addr;
0f64bb02 2417
c96a8570
BS
2418 bfd_put_32 (output_bfd, fd_lazy_rel_offset, lzplt_code);
2419 lzplt_code += 4;
0f64bb02 2420
c96a8570
BS
2421 resolverStub_addr = entry->lzplt_entry / BFINFDPIC_LZPLT_BLOCK_SIZE
2422 * BFINFDPIC_LZPLT_BLOCK_SIZE + BFINFDPIC_LZPLT_RESOLV_LOC;
2423 if (resolverStub_addr >= bfinfdpic_plt_initial_offset (info))
2424 resolverStub_addr = bfinfdpic_plt_initial_offset (info) - LZPLT_NORMAL_SIZE - LZPLT_RESOLVER_EXTRA;
0f64bb02 2425
c96a8570 2426 if (entry->lzplt_entry == resolverStub_addr)
0f64bb02 2427 {
c96a8570
BS
2428 /* This is a lazy PLT entry that includes a resolver call.
2429 P2 = [P3];
2430 R3 = [P3 + 4];
2431 JUMP (P2); */
2432 bfd_put_32 (output_bfd,
2433 0xa05b915a,
2434 lzplt_code);
2435 bfd_put_16 (output_bfd, 0x0052, lzplt_code + 4);
2436 }
2437 else
2438 {
2439 /* JUMP.S resolverStub */
2440 bfd_put_16 (output_bfd,
2441 0x2000
2442 | (((resolverStub_addr - entry->lzplt_entry)
2443 / 2) & (((bfd_vma)1 << 12) - 1)),
2444 lzplt_code);
2445 }
2446 }
0f64bb02 2447
c96a8570
BS
2448 return TRUE;
2449}
2450\f
2451/* Relocate an Blackfin ELF section.
48d502e1 2452
c96a8570
BS
2453 The RELOCATE_SECTION function is called by the new ELF backend linker
2454 to handle the relocations for a section.
48d502e1 2455
c96a8570
BS
2456 The relocs are always passed as Rela structures; if the section
2457 actually uses Rel structures, the r_addend field will always be
2458 zero.
48d502e1 2459
c96a8570
BS
2460 This function is responsible for adjusting the section contents as
2461 necessary, and (if using Rela relocs and generating a relocatable
2462 output file) adjusting the reloc addend as necessary.
48d502e1 2463
c96a8570
BS
2464 This function does not have to worry about setting the reloc
2465 address or the reloc symbol index.
48d502e1 2466
c96a8570 2467 LOCAL_SYMS is a pointer to the swapped in local symbols.
48d502e1 2468
c96a8570
BS
2469 LOCAL_SECTIONS is an array giving the section in the input file
2470 corresponding to the st_shndx field of each local symbol.
48d502e1 2471
c96a8570
BS
2472 The global hash table entry for the global symbols can be found
2473 via elf_sym_hashes (input_bfd).
48d502e1 2474
c96a8570
BS
2475 When generating relocatable output, this function must handle
2476 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
2477 going to be the section symbol corresponding to the output
2478 section, which means that the addend must be adjusted
2479 accordingly. */
48d502e1
BS
2480
2481static bfd_boolean
c96a8570
BS
2482bfinfdpic_relocate_section (bfd * output_bfd,
2483 struct bfd_link_info *info,
2484 bfd * input_bfd,
2485 asection * input_section,
2486 bfd_byte * contents,
2487 Elf_Internal_Rela * relocs,
2488 Elf_Internal_Sym * local_syms,
2489 asection ** local_sections)
48d502e1 2490{
48d502e1
BS
2491 Elf_Internal_Shdr *symtab_hdr;
2492 struct elf_link_hash_entry **sym_hashes;
48d502e1
BS
2493 Elf_Internal_Rela *rel;
2494 Elf_Internal_Rela *relend;
c96a8570
BS
2495 unsigned isec_segment, got_segment, plt_segment,
2496 check_segment[2];
0e1862bb 2497 int silence_segment_error = !bfd_link_pic (info);
48d502e1 2498
c96a8570 2499 symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr;
48d502e1 2500 sym_hashes = elf_sym_hashes (input_bfd);
c96a8570 2501 relend = relocs + input_section->reloc_count;
48d502e1 2502
c96a8570
BS
2503 isec_segment = _bfinfdpic_osec_to_segment (output_bfd,
2504 input_section->output_section);
2505 if (IS_FDPIC (output_bfd) && bfinfdpic_got_section (info))
2506 got_segment = _bfinfdpic_osec_to_segment (output_bfd,
2507 bfinfdpic_got_section (info)
2508 ->output_section);
2509 else
2510 got_segment = -1;
2511 if (IS_FDPIC (output_bfd) && elf_hash_table (info)->dynamic_sections_created)
2512 plt_segment = _bfinfdpic_osec_to_segment (output_bfd,
2513 bfinfdpic_plt_section (info)
2514 ->output_section);
2515 else
2516 plt_segment = -1;
48d502e1 2517
c96a8570 2518 for (rel = relocs; rel < relend; rel ++)
48d502e1 2519 {
48d502e1
BS
2520 reloc_howto_type *howto;
2521 unsigned long r_symndx;
48d502e1
BS
2522 Elf_Internal_Sym *sym;
2523 asection *sec;
c96a8570
BS
2524 struct elf_link_hash_entry *h;
2525 bfd_vma relocation;
48d502e1 2526 bfd_reloc_status_type r;
c96a8570
BS
2527 const char * name = NULL;
2528 int r_type;
2529 asection *osec;
2530 struct bfinfdpic_relocs_info *picrel;
2531 bfd_vma orig_addend = rel->r_addend;
48d502e1
BS
2532
2533 r_type = ELF32_R_TYPE (rel->r_info);
48d502e1 2534
c96a8570
BS
2535 if (r_type == R_BFIN_GNU_VTINHERIT
2536 || r_type == R_BFIN_GNU_VTENTRY)
48d502e1
BS
2537 continue;
2538
c96a8570 2539 r_symndx = ELF32_R_SYM (rel->r_info);
48d502e1
BS
2540 howto = bfin_reloc_type_lookup (input_bfd, r_type);
2541 if (howto == NULL)
2542 {
2543 bfd_set_error (bfd_error_bad_value);
2544 return FALSE;
2545 }
48d502e1 2546
c96a8570
BS
2547 h = NULL;
2548 sym = NULL;
2549 sec = NULL;
2550
2551 if (r_symndx < symtab_hdr->sh_info)
2552 {
2553 sym = local_syms + r_symndx;
2554 osec = sec = local_sections [r_symndx];
2555 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
2556
2557 name = bfd_elf_string_from_elf_section
2558 (input_bfd, symtab_hdr->sh_link, sym->st_name);
2559 name = (name == NULL) ? bfd_section_name (input_bfd, sec) : name;
2560 }
2561 else
2562 {
62d887d4 2563 bfd_boolean warned, ignored;
c96a8570
BS
2564 bfd_boolean unresolved_reloc;
2565
2566 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2567 r_symndx, symtab_hdr, sym_hashes,
2568 h, sec, relocation,
62d887d4 2569 unresolved_reloc, warned, ignored);
c96a8570
BS
2570 osec = sec;
2571 }
2572
dbaa2011 2573 if (sec != NULL && discarded_section (sec))
e4067dbb 2574 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 2575 rel, 1, relend, howto, 0, contents);
c96a8570 2576
0e1862bb 2577 if (bfd_link_relocatable (info))
c96a8570
BS
2578 continue;
2579
2580 if (h != NULL
2581 && (h->root.type == bfd_link_hash_defined
2582 || h->root.type == bfd_link_hash_defweak)
2583 && !BFINFDPIC_SYM_LOCAL (info, h))
2584 {
2585 osec = sec = NULL;
2586 relocation = 0;
2587 }
2588
2589 switch (r_type)
2590 {
cb88ce9f
BS
2591 case R_BFIN_PCREL24:
2592 case R_BFIN_PCREL24_JUMP_L:
2593 case R_BFIN_BYTE4_DATA:
c96a8570
BS
2594 if (! IS_FDPIC (output_bfd))
2595 goto non_fdpic;
1a0670f3 2596 /* Fall through. */
c96a8570
BS
2597
2598 case R_BFIN_GOT17M4:
2599 case R_BFIN_GOTHI:
2600 case R_BFIN_GOTLO:
2601 case R_BFIN_FUNCDESC_GOT17M4:
2602 case R_BFIN_FUNCDESC_GOTHI:
2603 case R_BFIN_FUNCDESC_GOTLO:
2604 case R_BFIN_GOTOFF17M4:
2605 case R_BFIN_GOTOFFHI:
2606 case R_BFIN_GOTOFFLO:
2607 case R_BFIN_FUNCDESC_GOTOFF17M4:
2608 case R_BFIN_FUNCDESC_GOTOFFHI:
2609 case R_BFIN_FUNCDESC_GOTOFFLO:
2610 case R_BFIN_FUNCDESC:
2611 case R_BFIN_FUNCDESC_VALUE:
2612 if (h != NULL)
2613 picrel = bfinfdpic_relocs_info_for_global (bfinfdpic_relocs_info
2614 (info), input_bfd, h,
2615 orig_addend, INSERT);
2616 else
2617 /* In order to find the entry we created before, we must
2618 use the original addend, not the one that may have been
2619 modified by _bfd_elf_rela_local_sym(). */
2620 picrel = bfinfdpic_relocs_info_for_local (bfinfdpic_relocs_info
2621 (info), input_bfd, r_symndx,
2622 orig_addend, INSERT);
2623 if (! picrel)
2624 return FALSE;
2625
2626 if (!_bfinfdpic_emit_got_relocs_plt_entries (picrel, output_bfd, info,
2627 osec, sym,
2628 rel->r_addend))
2629 {
4eca0228 2630 _bfd_error_handler
695344c0 2631 /* xgettext:c-format */
d42c267e 2632 (_("%B: relocation at `%A+%#Lx' references symbol `%s' with nonzero addend"),
c96a8570
BS
2633 input_bfd, input_section, rel->r_offset, name);
2634 return FALSE;
2635
2636 }
48d502e1 2637
c96a8570 2638 break;
ab96bf03 2639
c96a8570
BS
2640 default:
2641 non_fdpic:
2642 picrel = NULL;
1d5316ab
AM
2643 if (h && ! BFINFDPIC_SYM_LOCAL (info, h)
2644 && _bfd_elf_section_offset (output_bfd, info, input_section,
2645 rel->r_offset) != (bfd_vma) -1)
c96a8570
BS
2646 {
2647 info->callbacks->warning
2648 (info, _("relocation references symbol not defined in the module"),
2649 name, input_bfd, input_section, rel->r_offset);
2650 return FALSE;
2651 }
2652 break;
48d502e1
BS
2653 }
2654
c96a8570 2655 switch (r_type)
ab96bf03 2656 {
cb88ce9f
BS
2657 case R_BFIN_PCREL24:
2658 case R_BFIN_PCREL24_JUMP_L:
c96a8570
BS
2659 check_segment[0] = isec_segment;
2660 if (! IS_FDPIC (output_bfd))
2661 check_segment[1] = isec_segment;
2662 else if (picrel->plt)
2663 {
2664 relocation = bfinfdpic_plt_section (info)->output_section->vma
2665 + bfinfdpic_plt_section (info)->output_offset
2666 + picrel->plt_entry;
2667 check_segment[1] = plt_segment;
2668 }
2669 /* We don't want to warn on calls to undefined weak symbols,
2670 as calls to them must be protected by non-NULL tests
2671 anyway, and unprotected calls would invoke undefined
2672 behavior. */
2673 else if (picrel->symndx == -1
2674 && picrel->d.h->root.type == bfd_link_hash_undefweak)
2675 check_segment[1] = check_segment[0];
2676 else
2677 check_segment[1] = sec
2678 ? _bfinfdpic_osec_to_segment (output_bfd, sec->output_section)
2679 : (unsigned)-1;
2680 break;
ab96bf03 2681
c96a8570
BS
2682 case R_BFIN_GOT17M4:
2683 case R_BFIN_GOTHI:
2684 case R_BFIN_GOTLO:
2685 relocation = picrel->got_entry;
2686 check_segment[0] = check_segment[1] = got_segment;
2687 break;
ab96bf03 2688
c96a8570
BS
2689 case R_BFIN_FUNCDESC_GOT17M4:
2690 case R_BFIN_FUNCDESC_GOTHI:
2691 case R_BFIN_FUNCDESC_GOTLO:
2692 relocation = picrel->fdgot_entry;
2693 check_segment[0] = check_segment[1] = got_segment;
2694 break;
48d502e1 2695
c96a8570
BS
2696 case R_BFIN_GOTOFFHI:
2697 case R_BFIN_GOTOFF17M4:
2698 case R_BFIN_GOTOFFLO:
2699 relocation -= bfinfdpic_got_section (info)->output_section->vma
2700 + bfinfdpic_got_section (info)->output_offset
2701 + bfinfdpic_got_initial_offset (info);
2702 check_segment[0] = got_segment;
2703 check_segment[1] = sec
2704 ? _bfinfdpic_osec_to_segment (output_bfd, sec->output_section)
2705 : (unsigned)-1;
2706 break;
48d502e1 2707
c96a8570
BS
2708 case R_BFIN_FUNCDESC_GOTOFF17M4:
2709 case R_BFIN_FUNCDESC_GOTOFFHI:
2710 case R_BFIN_FUNCDESC_GOTOFFLO:
2711 relocation = picrel->fd_entry;
2712 check_segment[0] = check_segment[1] = got_segment;
2713 break;
48d502e1 2714
c96a8570 2715 case R_BFIN_FUNCDESC:
48d502e1 2716 {
c96a8570
BS
2717 int dynindx;
2718 bfd_vma addend = rel->r_addend;
48d502e1 2719
c96a8570
BS
2720 if (! (h && h->root.type == bfd_link_hash_undefweak
2721 && BFINFDPIC_SYM_LOCAL (info, h)))
2722 {
2723 /* If the symbol is dynamic and there may be dynamic
2724 symbol resolution because we are or are linked with a
2725 shared library, emit a FUNCDESC relocation such that
2726 the dynamic linker will allocate the function
2727 descriptor. If the symbol needs a non-local function
2728 descriptor but binds locally (e.g., its visibility is
2729 protected, emit a dynamic relocation decayed to
2730 section+offset. */
2731 if (h && ! BFINFDPIC_FUNCDESC_LOCAL (info, h)
2732 && BFINFDPIC_SYM_LOCAL (info, h)
3cbc1e5e 2733 && !bfd_link_pde (info))
c96a8570
BS
2734 {
2735 dynindx = elf_section_data (h->root.u.def.section
2736 ->output_section)->dynindx;
2737 addend += h->root.u.def.section->output_offset
2738 + h->root.u.def.value;
2739 }
2740 else if (h && ! BFINFDPIC_FUNCDESC_LOCAL (info, h))
2741 {
2742 if (addend)
2743 {
2744 info->callbacks->warning
2745 (info, _("R_BFIN_FUNCDESC references dynamic symbol with nonzero addend"),
2746 name, input_bfd, input_section, rel->r_offset);
2747 return FALSE;
2748 }
2749 dynindx = h->dynindx;
2750 }
2751 else
2752 {
2753 /* Otherwise, we know we have a private function
2754 descriptor, so reference it directly. */
2755 BFD_ASSERT (picrel->privfd);
cb88ce9f 2756 r_type = R_BFIN_BYTE4_DATA;
c96a8570
BS
2757 dynindx = elf_section_data (bfinfdpic_got_section (info)
2758 ->output_section)->dynindx;
2759 addend = bfinfdpic_got_section (info)->output_offset
2760 + bfinfdpic_got_initial_offset (info)
2761 + picrel->fd_entry;
2762 }
2763
2764 /* If there is room for dynamic symbol resolution, emit
2765 the dynamic relocation. However, if we're linking an
2766 executable at a fixed location, we won't have emitted a
2767 dynamic symbol entry for the got section, so idx will
2768 be zero, which means we can and should compute the
2769 address of the private descriptor ourselves. */
3cbc1e5e 2770 if (bfd_link_pde (info)
c96a8570
BS
2771 && (!h || BFINFDPIC_FUNCDESC_LOCAL (info, h)))
2772 {
6a9adeca
BS
2773 bfd_vma offset;
2774
c96a8570
BS
2775 addend += bfinfdpic_got_section (info)->output_section->vma;
2776 if ((bfd_get_section_flags (output_bfd,
2777 input_section->output_section)
2778 & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
2779 {
2780 if (_bfinfdpic_osec_readonly_p (output_bfd,
2781 input_section
2782 ->output_section))
2783 {
2784 info->callbacks->warning
2785 (info,
2786 _("cannot emit fixups in read-only section"),
2787 name, input_bfd, input_section, rel->r_offset);
2788 return FALSE;
2789 }
6a9adeca
BS
2790
2791 offset = _bfd_elf_section_offset
2792 (output_bfd, info,
2793 input_section, rel->r_offset);
2794
2795 if (offset != (bfd_vma)-1)
2796 _bfinfdpic_add_rofixup (output_bfd,
2797 bfinfdpic_gotfixup_section
2798 (info),
2799 offset + input_section
2800 ->output_section->vma
2801 + input_section->output_offset,
2802 picrel);
c96a8570
BS
2803 }
2804 }
2805 else if ((bfd_get_section_flags (output_bfd,
2806 input_section->output_section)
2807 & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
2808 {
2809 bfd_vma offset;
2810
2811 if (_bfinfdpic_osec_readonly_p (output_bfd,
2812 input_section
2813 ->output_section))
2814 {
2815 info->callbacks->warning
2816 (info,
2817 _("cannot emit dynamic relocations in read-only section"),
2818 name, input_bfd, input_section, rel->r_offset);
2819 return FALSE;
2820 }
2821 offset = _bfd_elf_section_offset (output_bfd, info,
2822 input_section, rel->r_offset);
6a9adeca
BS
2823
2824 if (offset != (bfd_vma)-1)
c96a8570
BS
2825 _bfinfdpic_add_dyn_reloc (output_bfd,
2826 bfinfdpic_gotrel_section (info),
2827 offset + input_section
2828 ->output_section->vma
2829 + input_section->output_offset,
2830 r_type,
2831 dynindx, addend, picrel);
2832 }
2833 else
2834 addend += bfinfdpic_got_section (info)->output_section->vma;
2835 }
2836
2837 /* We want the addend in-place because dynamic
2838 relocations are REL. Setting relocation to it should
2839 arrange for it to be installed. */
2840 relocation = addend - rel->r_addend;
2841 }
2842 check_segment[0] = check_segment[1] = got_segment;
2843 break;
2844
cb88ce9f 2845 case R_BFIN_BYTE4_DATA:
c96a8570 2846 if (! IS_FDPIC (output_bfd))
7a84e3da 2847 {
c96a8570
BS
2848 check_segment[0] = check_segment[1] = -1;
2849 break;
7a84e3da 2850 }
c96a8570
BS
2851 /* Fall through. */
2852 case R_BFIN_FUNCDESC_VALUE:
2853 {
2854 int dynindx;
2855 bfd_vma addend = rel->r_addend;
2856 bfd_vma offset;
2857 offset = _bfd_elf_section_offset (output_bfd, info,
2858 input_section, rel->r_offset);
7a84e3da 2859
c96a8570
BS
2860 /* If the symbol is dynamic but binds locally, use
2861 section+offset. */
2862 if (h && ! BFINFDPIC_SYM_LOCAL (info, h))
48d502e1 2863 {
c96a8570
BS
2864 if (addend && r_type == R_BFIN_FUNCDESC_VALUE)
2865 {
2866 info->callbacks->warning
2867 (info, _("R_BFIN_FUNCDESC_VALUE references dynamic symbol with nonzero addend"),
2868 name, input_bfd, input_section, rel->r_offset);
2869 return FALSE;
2870 }
2871 dynindx = h->dynindx;
48d502e1 2872 }
c96a8570 2873 else
48d502e1 2874 {
c96a8570
BS
2875 if (h)
2876 addend += h->root.u.def.value;
2877 else
2878 addend += sym->st_value;
2879 if (osec)
2880 addend += osec->output_offset;
2881 if (osec && osec->output_section
2882 && ! bfd_is_abs_section (osec->output_section)
2883 && ! bfd_is_und_section (osec->output_section))
2884 dynindx = elf_section_data (osec->output_section)->dynindx;
2885 else
2886 dynindx = 0;
2887 }
48d502e1 2888
c96a8570
BS
2889 /* If we're linking an executable at a fixed address, we
2890 can omit the dynamic relocation as long as the symbol
2891 is defined in the current link unit (which is implied
2892 by its output section not being NULL). */
3cbc1e5e 2893 if (bfd_link_pde (info)
c96a8570
BS
2894 && (!h || BFINFDPIC_SYM_LOCAL (info, h)))
2895 {
2896 if (osec)
2897 addend += osec->output_section->vma;
2898 if (IS_FDPIC (input_bfd)
2899 && (bfd_get_section_flags (output_bfd,
2900 input_section->output_section)
2901 & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
48d502e1 2902 {
c96a8570
BS
2903 if (_bfinfdpic_osec_readonly_p (output_bfd,
2904 input_section
2905 ->output_section))
48d502e1 2906 {
c96a8570
BS
2907 info->callbacks->warning
2908 (info,
2909 _("cannot emit fixups in read-only section"),
2910 name, input_bfd, input_section, rel->r_offset);
2911 return FALSE;
2912 }
2913 if (!h || h->root.type != bfd_link_hash_undefweak)
2914 {
6a9adeca 2915 if (offset != (bfd_vma)-1)
c96a8570 2916 {
6a9adeca
BS
2917 _bfinfdpic_add_rofixup (output_bfd,
2918 bfinfdpic_gotfixup_section
2919 (info),
2920 offset + input_section
2921 ->output_section->vma
2922 + input_section->output_offset,
2923 picrel);
2924
2925 if (r_type == R_BFIN_FUNCDESC_VALUE)
c96a8570
BS
2926 _bfinfdpic_add_rofixup
2927 (output_bfd,
2928 bfinfdpic_gotfixup_section (info),
2929 offset + input_section->output_section->vma
2930 + input_section->output_offset + 4, picrel);
2931 }
48d502e1
BS
2932 }
2933 }
48d502e1
BS
2934 }
2935 else
2936 {
c96a8570
BS
2937 if ((bfd_get_section_flags (output_bfd,
2938 input_section->output_section)
2939 & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
48d502e1 2940 {
c96a8570
BS
2941 if (_bfinfdpic_osec_readonly_p (output_bfd,
2942 input_section
2943 ->output_section))
48d502e1 2944 {
c96a8570
BS
2945 info->callbacks->warning
2946 (info,
2947 _("cannot emit dynamic relocations in read-only section"),
2948 name, input_bfd, input_section, rel->r_offset);
2949 return FALSE;
48d502e1 2950 }
6a9adeca
BS
2951
2952 if (offset != (bfd_vma)-1)
c96a8570
BS
2953 _bfinfdpic_add_dyn_reloc (output_bfd,
2954 bfinfdpic_gotrel_section (info),
2955 offset
6a9adeca 2956 + input_section->output_section->vma
c96a8570
BS
2957 + input_section->output_offset,
2958 r_type, dynindx, addend, picrel);
48d502e1 2959 }
c96a8570
BS
2960 else if (osec)
2961 addend += osec->output_section->vma;
2962 /* We want the addend in-place because dynamic
2963 relocations are REL. Setting relocation to it
2964 should arrange for it to be installed. */
2965 relocation = addend - rel->r_addend;
2966 }
2967
6a9adeca 2968 if (r_type == R_BFIN_FUNCDESC_VALUE)
c96a8570
BS
2969 {
2970 /* If we've omitted the dynamic relocation, just emit
2971 the fixed addresses of the symbol and of the local
2972 GOT base offset. */
3cbc1e5e 2973 if (bfd_link_pde (info)
c96a8570
BS
2974 && (!h || BFINFDPIC_SYM_LOCAL (info, h)))
2975 bfd_put_32 (output_bfd,
2976 bfinfdpic_got_section (info)->output_section->vma
2977 + bfinfdpic_got_section (info)->output_offset
2978 + bfinfdpic_got_initial_offset (info),
2979 contents + rel->r_offset + 4);
2980 else
2981 /* A function descriptor used for lazy or local
2982 resolving is initialized such that its high word
2983 contains the output section index in which the
2984 PLT entries are located, and the low word
2985 contains the offset of the lazy PLT entry entry
2986 point into that section. */
2987 bfd_put_32 (output_bfd,
2988 h && ! BFINFDPIC_SYM_LOCAL (info, h)
2989 ? 0
2990 : _bfinfdpic_osec_to_segment (output_bfd,
2991 sec
2992 ->output_section),
2993 contents + rel->r_offset + 4);
48d502e1 2994 }
c96a8570
BS
2995 }
2996 check_segment[0] = check_segment[1] = got_segment;
2997 break;
2998
2999 default:
3000 check_segment[0] = isec_segment;
3001 check_segment[1] = sec
3002 ? _bfinfdpic_osec_to_segment (output_bfd, sec->output_section)
3003 : (unsigned)-1;
3004 break;
3005 }
3006
3007 if (check_segment[0] != check_segment[1] && IS_FDPIC (output_bfd))
3008 {
3009#if 1 /* If you take this out, remove the #error from fdpic-static-6.d
3010 in the ld testsuite. */
3011 /* This helps catch problems in GCC while we can't do more
3012 than static linking. The idea is to test whether the
3013 input file basename is crt0.o only once. */
3014 if (silence_segment_error == 1)
3015 silence_segment_error =
3016 (strlen (input_bfd->filename) == 6
007d6189 3017 && filename_cmp (input_bfd->filename, "crt0.o") == 0)
c96a8570 3018 || (strlen (input_bfd->filename) > 6
007d6189
KT
3019 && filename_cmp (input_bfd->filename
3020 + strlen (input_bfd->filename) - 7,
c96a8570
BS
3021 "/crt0.o") == 0)
3022 ? -1 : 0;
3023#endif
3024 if (!silence_segment_error
3025 /* We don't want duplicate errors for undefined
3026 symbols. */
3027 && !(picrel && picrel->symndx == -1
3028 && picrel->d.h->root.type == bfd_link_hash_undefined))
3029 info->callbacks->warning
3030 (info,
0e1862bb 3031 bfd_link_pic (info)
c96a8570
BS
3032 ? _("relocations between different segments are not supported")
3033 : _("warning: relocation references a different segment"),
3034 name, input_bfd, input_section, rel->r_offset);
0e1862bb 3035 if (!silence_segment_error && bfd_link_pic (info))
c96a8570
BS
3036 return FALSE;
3037 elf_elfheader (output_bfd)->e_flags |= EF_BFIN_PIC;
3038 }
3039
3040 switch (r_type)
3041 {
3042 case R_BFIN_GOTOFFHI:
3043 /* We need the addend to be applied before we shift the
3044 value right. */
3045 relocation += rel->r_addend;
3046 /* Fall through. */
3047 case R_BFIN_GOTHI:
3048 case R_BFIN_FUNCDESC_GOTHI:
3049 case R_BFIN_FUNCDESC_GOTOFFHI:
3050 relocation >>= 16;
3051 /* Fall through. */
48d502e1 3052
c96a8570
BS
3053 case R_BFIN_GOTLO:
3054 case R_BFIN_FUNCDESC_GOTLO:
3055 case R_BFIN_GOTOFFLO:
3056 case R_BFIN_FUNCDESC_GOTOFFLO:
3057 relocation &= 0xffff;
3058 break;
48d502e1 3059
48d502e1 3060 default:
48d502e1
BS
3061 break;
3062 }
3063
c96a8570 3064 switch (r_type)
48d502e1 3065 {
cb88ce9f
BS
3066 case R_BFIN_PCREL24:
3067 case R_BFIN_PCREL24_JUMP_L:
c96a8570
BS
3068 if (! IS_FDPIC (output_bfd) || ! picrel->plt)
3069 break;
3070 /* Fall through. */
3071
3072 /* When referencing a GOT entry, a function descriptor or a
3073 PLT, we don't want the addend to apply to the reference,
3074 but rather to the referenced symbol. The actual entry
3075 will have already been created taking the addend into
3076 account, so cancel it out here. */
3077 case R_BFIN_GOT17M4:
3078 case R_BFIN_GOTHI:
3079 case R_BFIN_GOTLO:
3080 case R_BFIN_FUNCDESC_GOT17M4:
3081 case R_BFIN_FUNCDESC_GOTHI:
3082 case R_BFIN_FUNCDESC_GOTLO:
3083 case R_BFIN_FUNCDESC_GOTOFF17M4:
3084 case R_BFIN_FUNCDESC_GOTOFFHI:
3085 case R_BFIN_FUNCDESC_GOTOFFLO:
3086 /* Note that we only want GOTOFFHI, not GOTOFFLO or GOTOFF17M4
3087 here, since we do want to apply the addend to the others.
3088 Note that we've applied the addend to GOTOFFHI before we
3089 shifted it right. */
3090 case R_BFIN_GOTOFFHI:
3091 relocation -= rel->r_addend;
3092 break;
3093
3094 default:
3095 break;
48d502e1
BS
3096 }
3097
c96a8570
BS
3098 r = bfin_final_link_relocate (rel, howto, input_bfd, input_section,
3099 contents, rel->r_offset,
3100 relocation, rel->r_addend);
3101
48d502e1
BS
3102 if (r != bfd_reloc_ok)
3103 {
c96a8570 3104 const char * msg = (const char *) NULL;
48d502e1 3105
c96a8570 3106 switch (r)
48d502e1 3107 {
c96a8570 3108 case bfd_reloc_overflow:
1a72702b 3109 (*info->callbacks->reloc_overflow)
c96a8570
BS
3110 (info, (h ? &h->root : NULL), name, howto->name,
3111 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
3112 break;
0f64bb02 3113
c96a8570 3114 case bfd_reloc_undefined:
1a72702b 3115 (*info->callbacks->undefined_symbol)
c96a8570
BS
3116 (info, name, input_bfd, input_section, rel->r_offset, TRUE);
3117 break;
3118
3119 case bfd_reloc_outofrange:
3120 msg = _("internal error: out of range error");
3121 break;
3122
3123 case bfd_reloc_notsupported:
3124 msg = _("internal error: unsupported relocation error");
3125 break;
3126
3127 case bfd_reloc_dangerous:
3128 msg = _("internal error: dangerous relocation");
3129 break;
3130
3131 default:
3132 msg = _("internal error: unknown error");
3133 break;
48d502e1 3134 }
c96a8570
BS
3135
3136 if (msg)
1a72702b
AM
3137 (*info->callbacks->warning) (info, msg, name, input_bfd,
3138 input_section, rel->r_offset);
48d502e1
BS
3139 }
3140 }
3141
3142 return TRUE;
3143}
3144
48d502e1
BS
3145/* We need dynamic symbols for every section, since segments can
3146 relocate independently. */
3147static bfd_boolean
3148_bfinfdpic_link_omit_section_dynsym (bfd *output_bfd ATTRIBUTE_UNUSED,
51408ec2
AM
3149 struct bfd_link_info *info ATTRIBUTE_UNUSED,
3150 asection *p)
48d502e1
BS
3151{
3152 switch (elf_section_data (p)->this_hdr.sh_type)
3153 {
3154 case SHT_PROGBITS:
3155 case SHT_NOBITS:
3156 /* If sh_type is yet undecided, assume it could be
3157 SHT_PROGBITS/SHT_NOBITS. */
3158 case SHT_NULL:
3159 return FALSE;
3160
3161 /* There shouldn't be section relative relocations
3162 against any other section. */
3163 default:
3164 return TRUE;
3165 }
3166}
3167
3168/* Create a .got section, as well as its additional info field. This
3169 is almost entirely copied from
3170 elflink.c:_bfd_elf_create_got_section(). */
3171
3172static bfd_boolean
3173_bfin_create_got_section (bfd *abfd, struct bfd_link_info *info)
3174{
3175 flagword flags, pltflags;
3176 asection *s;
3177 struct elf_link_hash_entry *h;
48d502e1
BS
3178 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3179 int ptralign;
48d502e1
BS
3180
3181 /* This function may be called more than once. */
ce558b89 3182 s = elf_hash_table (info)->sgot;
3d4d4302 3183 if (s != NULL)
48d502e1
BS
3184 return TRUE;
3185
3186 /* Machine specific: although pointers are 32-bits wide, we want the
3187 GOT to be aligned to a 64-bit boundary, such that function
3188 descriptors in it can be accessed with 64-bit loads and
3189 stores. */
3190 ptralign = 3;
3191
3192 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3193 | SEC_LINKER_CREATED);
3194 pltflags = flags;
3195
3d4d4302 3196 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
ce558b89 3197 elf_hash_table (info)->sgot = s;
48d502e1
BS
3198 if (s == NULL
3199 || !bfd_set_section_alignment (abfd, s, ptralign))
3200 return FALSE;
3201
48d502e1
BS
3202 if (bed->want_got_sym)
3203 {
3204 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the .got
3205 (or .got.plt) section. We don't do this in the linker script
3206 because we don't want to define the symbol if we are not creating
3207 a global offset table. */
5592d7ec 3208 h = _bfd_elf_define_linkage_sym (abfd, info, s, "__GLOBAL_OFFSET_TABLE_");
48d502e1
BS
3209 elf_hash_table (info)->hgot = h;
3210 if (h == NULL)
3211 return FALSE;
3212
3213 /* Machine-specific: we want the symbol for executables as
3214 well. */
3215 if (! bfd_elf_link_record_dynamic_symbol (info, h))
3216 return FALSE;
3217 }
3218
3219 /* The first bit of the global offset table is the header. */
3220 s->size += bed->got_header_size;
3221
3222 /* This is the machine-specific part. Create and initialize section
3223 data for the got. */
3224 if (IS_FDPIC (abfd))
3225 {
48d502e1
BS
3226 bfinfdpic_relocs_info (info) = htab_try_create (1,
3227 bfinfdpic_relocs_info_hash,
3228 bfinfdpic_relocs_info_eq,
3229 (htab_del) NULL);
3230 if (! bfinfdpic_relocs_info (info))
3231 return FALSE;
3232
3d4d4302
AM
3233 s = bfd_make_section_anyway_with_flags (abfd, ".rel.got",
3234 (flags | SEC_READONLY));
48d502e1
BS
3235 if (s == NULL
3236 || ! bfd_set_section_alignment (abfd, s, 2))
3237 return FALSE;
3238
3239 bfinfdpic_gotrel_section (info) = s;
3240
3241 /* Machine-specific. */
3d4d4302
AM
3242 s = bfd_make_section_anyway_with_flags (abfd, ".rofixup",
3243 (flags | SEC_READONLY));
48d502e1
BS
3244 if (s == NULL
3245 || ! bfd_set_section_alignment (abfd, s, 2))
3246 return FALSE;
3247
3248 bfinfdpic_gotfixup_section (info) = s;
48d502e1
BS
3249 }
3250
48d502e1
BS
3251 pltflags |= SEC_CODE;
3252 if (bed->plt_not_loaded)
3253 pltflags &= ~ (SEC_CODE | SEC_LOAD | SEC_HAS_CONTENTS);
3254 if (bed->plt_readonly)
3255 pltflags |= SEC_READONLY;
3256
3d4d4302 3257 s = bfd_make_section_anyway_with_flags (abfd, ".plt", pltflags);
48d502e1 3258 if (s == NULL
48d502e1
BS
3259 || ! bfd_set_section_alignment (abfd, s, bed->plt_alignment))
3260 return FALSE;
3261 /* Blackfin-specific: remember it. */
3262 bfinfdpic_plt_section (info) = s;
3263
3264 if (bed->want_plt_sym)
3265 {
3266 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
3267 .plt section. */
48d502e1
BS
3268 struct bfd_link_hash_entry *bh = NULL;
3269
3270 if (! (_bfd_generic_link_add_one_symbol
5592d7ec 3271 (info, abfd, "__PROCEDURE_LINKAGE_TABLE_", BSF_GLOBAL, s, 0, NULL,
48d502e1
BS
3272 FALSE, get_elf_backend_data (abfd)->collect, &bh)))
3273 return FALSE;
3274 h = (struct elf_link_hash_entry *) bh;
3275 h->def_regular = 1;
3276 h->type = STT_OBJECT;
3277
0e1862bb 3278 if (! bfd_link_executable (info)
48d502e1
BS
3279 && ! bfd_elf_link_record_dynamic_symbol (info, h))
3280 return FALSE;
3281 }
3282
3283 /* Blackfin-specific: we want rel relocations for the plt. */
3d4d4302
AM
3284 s = bfd_make_section_anyway_with_flags (abfd, ".rel.plt",
3285 flags | SEC_READONLY);
48d502e1 3286 if (s == NULL
48d502e1
BS
3287 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
3288 return FALSE;
3289 /* Blackfin-specific: remember it. */
3290 bfinfdpic_pltrel_section (info) = s;
3291
6a9adeca
BS
3292 return TRUE;
3293}
3294
3295/* Make sure the got and plt sections exist, and that our pointers in
3296 the link hash table point to them. */
3297
3298static bfd_boolean
3299elf32_bfinfdpic_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
3300{
3301 /* This is mostly copied from
3302 elflink.c:_bfd_elf_create_dynamic_sections(). */
3303 flagword flags;
3304 asection *s;
3305 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3306
3307 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3308 | SEC_LINKER_CREATED);
3309
3310 /* We need to create .plt, .rel[a].plt, .got, .got.plt, .dynbss, and
3311 .rel[a].bss sections. */
3312
48d502e1
BS
3313 /* Blackfin-specific: we want to create the GOT in the Blackfin way. */
3314 if (! _bfin_create_got_section (abfd, info))
3315 return FALSE;
3316
3317 /* Blackfin-specific: make sure we created everything we wanted. */
3318 BFD_ASSERT (bfinfdpic_got_section (info) && bfinfdpic_gotrel_section (info)
3319 /* && bfinfdpic_gotfixup_section (info) */
3320 && bfinfdpic_plt_section (info)
3321 && bfinfdpic_pltrel_section (info));
3322
3323 if (bed->want_dynbss)
3324 {
3325 /* The .dynbss section is a place to put symbols which are defined
3326 by dynamic objects, are referenced by regular objects, and are
3327 not functions. We must allocate space for them in the process
3328 image and use a R_*_COPY reloc to tell the dynamic linker to
3329 initialize them at run time. The linker script puts the .dynbss
3330 section into the .bss section of the final image. */
3d4d4302
AM
3331 s = bfd_make_section_anyway_with_flags (abfd, ".dynbss",
3332 SEC_ALLOC | SEC_LINKER_CREATED);
117ed4f8 3333 if (s == NULL)
48d502e1
BS
3334 return FALSE;
3335
3336 /* The .rel[a].bss section holds copy relocs. This section is not
3d4d4302
AM
3337 normally needed. We need to create it here, though, so that the
3338 linker will map it to an output section. We can't just create it
3339 only if we need it, because we will not know whether we need it
3340 until we have seen all the input files, and the first time the
3341 main linker code calls BFD after examining all the input files
3342 (size_dynamic_sections) the input sections have already been
3343 mapped to the output sections. If the section turns out not to
3344 be needed, we can discard it later. We will never need this
3345 section when generating a shared object, since they do not use
3346 copy relocs. */
0e1862bb 3347 if (! bfd_link_pic (info))
48d502e1 3348 {
3d4d4302
AM
3349 s = bfd_make_section_anyway_with_flags (abfd,
3350 ".rela.bss",
3351 flags | SEC_READONLY);
48d502e1 3352 if (s == NULL
48d502e1
BS
3353 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
3354 return FALSE;
3355 }
3356 }
3357
3358 return TRUE;
3359}
3360
48d502e1
BS
3361/* Compute the total GOT size required by each symbol in each range.
3362 Symbols may require up to 4 words in the GOT: an entry pointing to
3363 the symbol, an entry pointing to its function descriptor, and a
3364 private function descriptors taking two words. */
3365
6a9adeca
BS
3366static void
3367_bfinfdpic_count_nontls_entries (struct bfinfdpic_relocs_info *entry,
3368 struct _bfinfdpic_dynamic_got_info *dinfo)
48d502e1 3369{
48d502e1
BS
3370 /* Allocate space for a GOT entry pointing to the symbol. */
3371 if (entry->got17m4)
3372 dinfo->got17m4 += 4;
3373 else if (entry->gothilo)
3374 dinfo->gothilo += 4;
3375 else
3376 entry->relocs32--;
3377 entry->relocs32++;
3378
3379 /* Allocate space for a GOT entry pointing to the function
3380 descriptor. */
3381 if (entry->fdgot17m4)
3382 dinfo->got17m4 += 4;
3383 else if (entry->fdgothilo)
3384 dinfo->gothilo += 4;
3385 else
3386 entry->relocsfd--;
3387 entry->relocsfd++;
3388
3389 /* Decide whether we need a PLT entry, a function descriptor in the
3390 GOT, and a lazy PLT entry for this symbol. */
3391 entry->plt = entry->call
3392 && entry->symndx == -1 && ! BFINFDPIC_SYM_LOCAL (dinfo->info, entry->d.h)
3393 && elf_hash_table (dinfo->info)->dynamic_sections_created;
3394 entry->privfd = entry->plt
3395 || entry->fdgoff17m4 || entry->fdgoffhilo
3396 || ((entry->fd || entry->fdgot17m4 || entry->fdgothilo)
3397 && (entry->symndx != -1
3398 || BFINFDPIC_FUNCDESC_LOCAL (dinfo->info, entry->d.h)));
3399 entry->lazyplt = entry->privfd
3400 && entry->symndx == -1 && ! BFINFDPIC_SYM_LOCAL (dinfo->info, entry->d.h)
3401 && ! (dinfo->info->flags & DF_BIND_NOW)
3402 && elf_hash_table (dinfo->info)->dynamic_sections_created;
3403
3404 /* Allocate space for a function descriptor. */
3405 if (entry->fdgoff17m4)
3406 dinfo->fd17m4 += 8;
3407 else if (entry->privfd && entry->plt)
3408 dinfo->fdplt += 8;
3409 else if (entry->privfd)
3410 dinfo->fdhilo += 8;
3411 else
3412 entry->relocsfdv--;
3413 entry->relocsfdv++;
3414
3415 if (entry->lazyplt)
3416 dinfo->lzplt += LZPLT_NORMAL_SIZE;
6a9adeca
BS
3417}
3418
3419/* Compute the number of dynamic relocations and fixups that a symbol
3420 requires, and add (or subtract) from the grand and per-symbol
3421 totals. */
3422
3423static void
3424_bfinfdpic_count_relocs_fixups (struct bfinfdpic_relocs_info *entry,
3425 struct _bfinfdpic_dynamic_got_info *dinfo,
3426 bfd_boolean subtract)
3427{
3428 bfd_vma relocs = 0, fixups = 0;
48d502e1 3429
3cbc1e5e 3430 if (!bfd_link_pde (dinfo->info))
48d502e1
BS
3431 relocs = entry->relocs32 + entry->relocsfd + entry->relocsfdv;
3432 else
3433 {
3434 if (entry->symndx != -1 || BFINFDPIC_SYM_LOCAL (dinfo->info, entry->d.h))
3435 {
3436 if (entry->symndx != -1
3437 || entry->d.h->root.type != bfd_link_hash_undefweak)
3438 fixups += entry->relocs32 + 2 * entry->relocsfdv;
3439 }
3440 else
3441 relocs += entry->relocs32 + entry->relocsfdv;
3442
3443 if (entry->symndx != -1
3444 || BFINFDPIC_FUNCDESC_LOCAL (dinfo->info, entry->d.h))
3445 {
3446 if (entry->symndx != -1
3447 || entry->d.h->root.type != bfd_link_hash_undefweak)
3448 fixups += entry->relocsfd;
3449 }
3450 else
3451 relocs += entry->relocsfd;
3452 }
3453
6a9adeca
BS
3454 if (subtract)
3455 {
3456 relocs = - relocs;
3457 fixups = - fixups;
3458 }
3459
48d502e1
BS
3460 entry->dynrelocs += relocs;
3461 entry->fixups += fixups;
3462 dinfo->relocs += relocs;
3463 dinfo->fixups += fixups;
6a9adeca
BS
3464}
3465
3466/* Compute the total GOT and PLT size required by each symbol in each range. *
3467 Symbols may require up to 4 words in the GOT: an entry pointing to
3468 the symbol, an entry pointing to its function descriptor, and a
3469 private function descriptors taking two words. */
3470
3471static int
3472_bfinfdpic_count_got_plt_entries (void **entryp, void *dinfo_)
3473{
3474 struct bfinfdpic_relocs_info *entry = *entryp;
3475 struct _bfinfdpic_dynamic_got_info *dinfo = dinfo_;
3476
3477 _bfinfdpic_count_nontls_entries (entry, dinfo);
3478
3479 _bfinfdpic_count_relocs_fixups (entry, dinfo, FALSE);
48d502e1
BS
3480
3481 return 1;
3482}
3483
3484/* This structure is used to assign offsets to got entries, function
3485 descriptors, plt entries and lazy plt entries. */
3486
3487struct _bfinfdpic_dynamic_got_plt_info
3488{
3489 /* Summary information collected with _bfinfdpic_count_got_plt_entries. */
3490 struct _bfinfdpic_dynamic_got_info g;
3491
3492 /* For each addressable range, we record a MAX (positive) and MIN
3493 (negative) value. CUR is used to assign got entries, and it's
3494 incremented from an initial positive value to MAX, then from MIN
3495 to FDCUR (unless FDCUR wraps around first). FDCUR is used to
3496 assign function descriptors, and it's decreased from an initial
3497 non-positive value to MIN, then from MAX down to CUR (unless CUR
3498 wraps around first). All of MIN, MAX, CUR and FDCUR always point
3499 to even words. ODD, if non-zero, indicates an odd word to be
3500 used for the next got entry, otherwise CUR is used and
3501 incremented by a pair of words, wrapping around when it reaches
3502 MAX. FDCUR is decremented (and wrapped) before the next function
3503 descriptor is chosen. FDPLT indicates the number of remaining
3504 slots that can be used for function descriptors used only by PLT
3505 entries. */
3506 struct _bfinfdpic_dynamic_got_alloc_data
3507 {
3508 bfd_signed_vma max, cur, odd, fdcur, min;
3509 bfd_vma fdplt;
3510 } got17m4, gothilo;
3511};
3512
3513/* Determine the positive and negative ranges to be used by each
3514 offset range in the GOT. FDCUR and CUR, that must be aligned to a
3515 double-word boundary, are the minimum (negative) and maximum
3516 (positive) GOT offsets already used by previous ranges, except for
3517 an ODD entry that may have been left behind. GOT and FD indicate
3518 the size of GOT entries and function descriptors that must be
3519 placed within the range from -WRAP to WRAP. If there's room left,
3520 up to FDPLT bytes should be reserved for additional function
3521 descriptors. */
3522
3523inline static bfd_signed_vma
3524_bfinfdpic_compute_got_alloc_data (struct _bfinfdpic_dynamic_got_alloc_data *gad,
3525 bfd_signed_vma fdcur,
3526 bfd_signed_vma odd,
3527 bfd_signed_vma cur,
3528 bfd_vma got,
3529 bfd_vma fd,
3530 bfd_vma fdplt,
3531 bfd_vma wrap)
3532{
3533 bfd_signed_vma wrapmin = -wrap;
3534
3535 /* Start at the given initial points. */
3536 gad->fdcur = fdcur;
3537 gad->cur = cur;
3538
3539 /* If we had an incoming odd word and we have any got entries that
3540 are going to use it, consume it, otherwise leave gad->odd at
3541 zero. We might force gad->odd to zero and return the incoming
3542 odd such that it is used by the next range, but then GOT entries
3543 might appear to be out of order and we wouldn't be able to
3544 shorten the GOT by one word if it turns out to end with an
3545 unpaired GOT entry. */
3546 if (odd && got)
3547 {
3548 gad->odd = odd;
3549 got -= 4;
3550 odd = 0;
3551 }
3552 else
3553 gad->odd = 0;
3554
3555 /* If we're left with an unpaired GOT entry, compute its location
3556 such that we can return it. Otherwise, if got doesn't require an
3557 odd number of words here, either odd was already zero in the
3558 block above, or it was set to zero because got was non-zero, or
3559 got was already zero. In the latter case, we want the value of
3560 odd to carry over to the return statement, so we don't want to
3561 reset odd unless the condition below is true. */
3562 if (got & 4)
3563 {
3564 odd = cur + got;
3565 got += 4;
3566 }
3567
3568 /* Compute the tentative boundaries of this range. */
3569 gad->max = cur + got;
3570 gad->min = fdcur - fd;
3571 gad->fdplt = 0;
3572
3573 /* If function descriptors took too much space, wrap some of them
3574 around. */
3575 if (gad->min < wrapmin)
3576 {
3577 gad->max += wrapmin - gad->min;
3578 gad->min = wrapmin;
3579 }
3580 /* If there is space left and we have function descriptors
3581 referenced in PLT entries that could take advantage of shorter
3582 offsets, place them here. */
3583 else if (fdplt && gad->min > wrapmin)
3584 {
3585 bfd_vma fds;
3586 if ((bfd_vma) (gad->min - wrapmin) < fdplt)
3587 fds = gad->min - wrapmin;
3588 else
3589 fds = fdplt;
3590
3591 fdplt -= fds;
3592 gad->min -= fds;
3593 gad->fdplt += fds;
3594 }
3595
3596 /* If GOT entries took too much space, wrap some of them around.
3597 This may well cause gad->min to become lower than wrapmin. This
3598 will cause a relocation overflow later on, so we don't have to
3599 report it here . */
3600 if ((bfd_vma) gad->max > wrap)
3601 {
3602 gad->min -= gad->max - wrap;
3603 gad->max = wrap;
3604 }
3605 /* If there is more space left, try to place some more function
3606 descriptors for PLT entries. */
3607 else if (fdplt && (bfd_vma) gad->max < wrap)
3608 {
3609 bfd_vma fds;
3610 if ((bfd_vma) (wrap - gad->max) < fdplt)
3611 fds = wrap - gad->max;
3612 else
3613 fds = fdplt;
3614
3615 fdplt -= fds;
3616 gad->max += fds;
3617 gad->fdplt += fds;
3618 }
3619
3620 /* If odd was initially computed as an offset past the wrap point,
3621 wrap it around. */
3622 if (odd > gad->max)
3623 odd = gad->min + odd - gad->max;
3624
3625 /* _bfinfdpic_get_got_entry() below will always wrap gad->cur if needed
3626 before returning, so do it here too. This guarantees that,
3627 should cur and fdcur meet at the wrap point, they'll both be
3628 equal to min. */
3629 if (gad->cur == gad->max)
3630 gad->cur = gad->min;
3631
3632 return odd;
3633}
3634
3635/* Compute the location of the next GOT entry, given the allocation
3636 data for a range. */
3637
3638inline static bfd_signed_vma
3639_bfinfdpic_get_got_entry (struct _bfinfdpic_dynamic_got_alloc_data *gad)
3640{
3641 bfd_signed_vma ret;
3642
3643 if (gad->odd)
3644 {
3645 /* If there was an odd word left behind, use it. */
3646 ret = gad->odd;
3647 gad->odd = 0;
3648 }
3649 else
3650 {
3651 /* Otherwise, use the word pointed to by cur, reserve the next
3652 as an odd word, and skip to the next pair of words, possibly
3653 wrapping around. */
3654 ret = gad->cur;
3655 gad->odd = gad->cur + 4;
3656 gad->cur += 8;
3657 if (gad->cur == gad->max)
3658 gad->cur = gad->min;
3659 }
3660
3661 return ret;
3662}
3663
3664/* Compute the location of the next function descriptor entry in the
3665 GOT, given the allocation data for a range. */
3666
3667inline static bfd_signed_vma
3668_bfinfdpic_get_fd_entry (struct _bfinfdpic_dynamic_got_alloc_data *gad)
3669{
3670 /* If we're at the bottom, wrap around, and only then allocate the
3671 next pair of words. */
3672 if (gad->fdcur == gad->min)
3673 gad->fdcur = gad->max;
3674 return gad->fdcur -= 8;
3675}
3676
3677/* Assign GOT offsets for every GOT entry and function descriptor.
3678 Doing everything in a single pass is tricky. */
3679
3680static int
3681_bfinfdpic_assign_got_entries (void **entryp, void *info_)
3682{
3683 struct bfinfdpic_relocs_info *entry = *entryp;
3684 struct _bfinfdpic_dynamic_got_plt_info *dinfo = info_;
3685
3686 if (entry->got17m4)
3687 entry->got_entry = _bfinfdpic_get_got_entry (&dinfo->got17m4);
3688 else if (entry->gothilo)
3689 entry->got_entry = _bfinfdpic_get_got_entry (&dinfo->gothilo);
3690
3691 if (entry->fdgot17m4)
3692 entry->fdgot_entry = _bfinfdpic_get_got_entry (&dinfo->got17m4);
3693 else if (entry->fdgothilo)
3694 entry->fdgot_entry = _bfinfdpic_get_got_entry (&dinfo->gothilo);
3695
3696 if (entry->fdgoff17m4)
3697 entry->fd_entry = _bfinfdpic_get_fd_entry (&dinfo->got17m4);
3698 else if (entry->plt && dinfo->got17m4.fdplt)
3699 {
3700 dinfo->got17m4.fdplt -= 8;
3701 entry->fd_entry = _bfinfdpic_get_fd_entry (&dinfo->got17m4);
3702 }
3703 else if (entry->plt)
3704 {
3705 dinfo->gothilo.fdplt -= 8;
3706 entry->fd_entry = _bfinfdpic_get_fd_entry (&dinfo->gothilo);
3707 }
3708 else if (entry->privfd)
3709 entry->fd_entry = _bfinfdpic_get_fd_entry (&dinfo->gothilo);
3710
3711 return 1;
3712}
3713
3714/* Assign GOT offsets to private function descriptors used by PLT
3715 entries (or referenced by 32-bit offsets), as well as PLT entries
3716 and lazy PLT entries. */
3717
3718static int
3719_bfinfdpic_assign_plt_entries (void **entryp, void *info_)
3720{
3721 struct bfinfdpic_relocs_info *entry = *entryp;
3722 struct _bfinfdpic_dynamic_got_plt_info *dinfo = info_;
3723
3724 /* If this symbol requires a local function descriptor, allocate
3725 one. */
3726 if (entry->privfd && entry->fd_entry == 0)
3727 {
3728 if (dinfo->got17m4.fdplt)
3729 {
3730 entry->fd_entry = _bfinfdpic_get_fd_entry (&dinfo->got17m4);
3731 dinfo->got17m4.fdplt -= 8;
3732 }
3733 else
3734 {
3735 BFD_ASSERT (dinfo->gothilo.fdplt);
3736 entry->fd_entry = _bfinfdpic_get_fd_entry (&dinfo->gothilo);
3737 dinfo->gothilo.fdplt -= 8;
3738 }
3739 }
3740
3741 if (entry->plt)
3742 {
3743 int size;
3744
3745 /* We use the section's raw size to mark the location of the
3746 next PLT entry. */
3747 entry->plt_entry = bfinfdpic_plt_section (dinfo->g.info)->size;
3748
3749 /* Figure out the length of this PLT entry based on the
3750 addressing mode we need to reach the function descriptor. */
3751 BFD_ASSERT (entry->fd_entry);
3752 if (entry->fd_entry >= -(1 << (18 - 1))
3753 && entry->fd_entry + 4 < (1 << (18 - 1)))
3754 size = 10;
3755 else
3756 size = 16;
3757
3758 bfinfdpic_plt_section (dinfo->g.info)->size += size;
3759 }
3760
3761 if (entry->lazyplt)
3762 {
3763 entry->lzplt_entry = dinfo->g.lzplt;
3764 dinfo->g.lzplt += LZPLT_NORMAL_SIZE;
3765 /* If this entry is the one that gets the resolver stub, account
3766 for the additional instruction. */
3767 if (entry->lzplt_entry % BFINFDPIC_LZPLT_BLOCK_SIZE
3768 == BFINFDPIC_LZPLT_RESOLV_LOC)
3769 dinfo->g.lzplt += LZPLT_RESOLVER_EXTRA;
3770 }
3771
3772 return 1;
3773}
3774
6a9adeca
BS
3775/* Cancel out any effects of calling _bfinfdpic_assign_got_entries and
3776 _bfinfdpic_assign_plt_entries. */
3777
3778static int
3779_bfinfdpic_reset_got_plt_entries (void **entryp, void *ignore ATTRIBUTE_UNUSED)
3780{
3781 struct bfinfdpic_relocs_info *entry = *entryp;
3782
3783 entry->got_entry = 0;
3784 entry->fdgot_entry = 0;
3785 entry->fd_entry = 0;
3786 entry->plt_entry = (bfd_vma)-1;
3787 entry->lzplt_entry = (bfd_vma)-1;
3788
3789 return 1;
3790}
3791
48d502e1
BS
3792/* Follow indirect and warning hash entries so that each got entry
3793 points to the final symbol definition. P must point to a pointer
3794 to the hash table we're traversing. Since this traversal may
3795 modify the hash table, we set this pointer to NULL to indicate
3796 we've made a potentially-destructive change to the hash table, so
3797 the traversal must be restarted. */
3798static int
3799_bfinfdpic_resolve_final_relocs_info (void **entryp, void *p)
3800{
3801 struct bfinfdpic_relocs_info *entry = *entryp;
3802 htab_t *htab = p;
3803
3804 if (entry->symndx == -1)
3805 {
3806 struct elf_link_hash_entry *h = entry->d.h;
3807 struct bfinfdpic_relocs_info *oentry;
3808
3809 while (h->root.type == bfd_link_hash_indirect
3810 || h->root.type == bfd_link_hash_warning)
3811 h = (struct elf_link_hash_entry *)h->root.u.i.link;
3812
3813 if (entry->d.h == h)
3814 return 1;
3815
3816 oentry = bfinfdpic_relocs_info_for_global (*htab, 0, h, entry->addend,
3817 NO_INSERT);
3818
3819 if (oentry)
3820 {
3821 /* Merge the two entries. */
3822 bfinfdpic_pic_merge_early_relocs_info (oentry, entry);
3823 htab_clear_slot (*htab, entryp);
3824 return 1;
3825 }
3826
3827 entry->d.h = h;
3828
3829 /* If we can't find this entry with the new bfd hash, re-insert
3830 it, and get the traversal restarted. */
3831 if (! htab_find (*htab, entry))
3832 {
3833 htab_clear_slot (*htab, entryp);
3834 entryp = htab_find_slot (*htab, entry, INSERT);
3835 if (! *entryp)
3836 *entryp = entry;
3837 /* Abort the traversal, since the whole table may have
3838 moved, and leave it up to the parent to restart the
3839 process. */
3840 *(htab_t *)p = NULL;
3841 return 0;
3842 }
3843 }
3844
3845 return 1;
3846}
3847
6a9adeca
BS
3848/* Compute the total size of the GOT, the PLT, the dynamic relocations
3849 section and the rofixup section. Assign locations for GOT and PLT
3850 entries. */
48d502e1
BS
3851
3852static bfd_boolean
6a9adeca
BS
3853_bfinfdpic_size_got_plt (bfd *output_bfd,
3854 struct _bfinfdpic_dynamic_got_plt_info *gpinfop)
48d502e1 3855{
48d502e1
BS
3856 bfd_signed_vma odd;
3857 bfd_vma limit;
6a9adeca
BS
3858 struct bfd_link_info *info = gpinfop->g.info;
3859 bfd *dynobj = elf_hash_table (info)->dynobj;
48d502e1 3860
6a9adeca
BS
3861 memcpy (bfinfdpic_dynamic_got_plt_info (info), &gpinfop->g,
3862 sizeof (gpinfop->g));
48d502e1
BS
3863
3864 odd = 12;
3865 /* Compute the total size taken by entries in the 18-bit range,
3866 to tell how many PLT function descriptors we can bring into it
3867 without causing it to overflow. */
6a9adeca 3868 limit = odd + gpinfop->g.got17m4 + gpinfop->g.fd17m4;
48d502e1
BS
3869 if (limit < (bfd_vma)1 << 18)
3870 limit = ((bfd_vma)1 << 18) - limit;
3871 else
3872 limit = 0;
6a9adeca
BS
3873 if (gpinfop->g.fdplt < limit)
3874 limit = gpinfop->g.fdplt;
48d502e1
BS
3875
3876 /* Determine the ranges of GOT offsets that we can use for each
3877 range of addressing modes. */
6a9adeca 3878 odd = _bfinfdpic_compute_got_alloc_data (&gpinfop->got17m4,
48d502e1
BS
3879 0,
3880 odd,
3881 16,
6a9adeca
BS
3882 gpinfop->g.got17m4,
3883 gpinfop->g.fd17m4,
48d502e1
BS
3884 limit,
3885 (bfd_vma)1 << (18-1));
6a9adeca
BS
3886 odd = _bfinfdpic_compute_got_alloc_data (&gpinfop->gothilo,
3887 gpinfop->got17m4.min,
48d502e1 3888 odd,
6a9adeca
BS
3889 gpinfop->got17m4.max,
3890 gpinfop->g.gothilo,
3891 gpinfop->g.fdhilo,
3892 gpinfop->g.fdplt - gpinfop->got17m4.fdplt,
48d502e1
BS
3893 (bfd_vma)1 << (32-1));
3894
3895 /* Now assign (most) GOT offsets. */
3896 htab_traverse (bfinfdpic_relocs_info (info), _bfinfdpic_assign_got_entries,
6a9adeca 3897 gpinfop);
48d502e1 3898
6a9adeca
BS
3899 bfinfdpic_got_section (info)->size = gpinfop->gothilo.max
3900 - gpinfop->gothilo.min
48d502e1
BS
3901 /* If an odd word is the last word of the GOT, we don't need this
3902 word to be part of the GOT. */
6a9adeca 3903 - (odd + 4 == gpinfop->gothilo.max ? 4 : 0);
48d502e1
BS
3904 if (bfinfdpic_got_section (info)->size == 0)
3905 bfinfdpic_got_section (info)->flags |= SEC_EXCLUDE;
3906 else if (bfinfdpic_got_section (info)->size == 12
3907 && ! elf_hash_table (info)->dynamic_sections_created)
3908 {
3909 bfinfdpic_got_section (info)->flags |= SEC_EXCLUDE;
3910 bfinfdpic_got_section (info)->size = 0;
3911 }
3912 else
3913 {
3914 bfinfdpic_got_section (info)->contents =
3915 (bfd_byte *) bfd_zalloc (dynobj,
3916 bfinfdpic_got_section (info)->size);
3917 if (bfinfdpic_got_section (info)->contents == NULL)
3918 return FALSE;
3919 }
3920
3921 if (elf_hash_table (info)->dynamic_sections_created)
3922 /* Subtract the number of lzplt entries, since those will generate
3923 relocations in the pltrel section. */
3924 bfinfdpic_gotrel_section (info)->size =
6a9adeca 3925 (gpinfop->g.relocs - gpinfop->g.lzplt / LZPLT_NORMAL_SIZE)
48d502e1
BS
3926 * get_elf_backend_data (output_bfd)->s->sizeof_rel;
3927 else
6a9adeca 3928 BFD_ASSERT (gpinfop->g.relocs == 0);
48d502e1
BS
3929 if (bfinfdpic_gotrel_section (info)->size == 0)
3930 bfinfdpic_gotrel_section (info)->flags |= SEC_EXCLUDE;
3931 else
3932 {
3933 bfinfdpic_gotrel_section (info)->contents =
3934 (bfd_byte *) bfd_zalloc (dynobj,
3935 bfinfdpic_gotrel_section (info)->size);
3936 if (bfinfdpic_gotrel_section (info)->contents == NULL)
3937 return FALSE;
3938 }
3939
6a9adeca 3940 bfinfdpic_gotfixup_section (info)->size = (gpinfop->g.fixups + 1) * 4;
48d502e1
BS
3941 if (bfinfdpic_gotfixup_section (info)->size == 0)
3942 bfinfdpic_gotfixup_section (info)->flags |= SEC_EXCLUDE;
3943 else
3944 {
3945 bfinfdpic_gotfixup_section (info)->contents =
3946 (bfd_byte *) bfd_zalloc (dynobj,
3947 bfinfdpic_gotfixup_section (info)->size);
3948 if (bfinfdpic_gotfixup_section (info)->contents == NULL)
3949 return FALSE;
3950 }
3951
3952 if (elf_hash_table (info)->dynamic_sections_created)
d3e32c2e
JZ
3953 bfinfdpic_pltrel_section (info)->size =
3954 gpinfop->g.lzplt / LZPLT_NORMAL_SIZE * get_elf_backend_data (output_bfd)->s->sizeof_rel;
3955 if (bfinfdpic_pltrel_section (info)->size == 0)
3956 bfinfdpic_pltrel_section (info)->flags |= SEC_EXCLUDE;
3957 else
48d502e1 3958 {
d3e32c2e
JZ
3959 bfinfdpic_pltrel_section (info)->contents =
3960 (bfd_byte *) bfd_zalloc (dynobj,
3961 bfinfdpic_pltrel_section (info)->size);
3962 if (bfinfdpic_pltrel_section (info)->contents == NULL)
3963 return FALSE;
48d502e1
BS
3964 }
3965
3966 /* Add 4 bytes for every block of at most 65535 lazy PLT entries,
3967 such that there's room for the additional instruction needed to
3968 call the resolver. Since _bfinfdpic_assign_got_entries didn't
3969 account for them, our block size is 4 bytes smaller than the real
3970 block size. */
3971 if (elf_hash_table (info)->dynamic_sections_created)
3972 {
6a9adeca
BS
3973 bfinfdpic_plt_section (info)->size = gpinfop->g.lzplt
3974 + ((gpinfop->g.lzplt + (BFINFDPIC_LZPLT_BLOCK_SIZE - 4) - LZPLT_NORMAL_SIZE)
48d502e1
BS
3975 / (BFINFDPIC_LZPLT_BLOCK_SIZE - 4) * LZPLT_RESOLVER_EXTRA);
3976 }
3977
3978 /* Reset it, such that _bfinfdpic_assign_plt_entries() can use it to
3979 actually assign lazy PLT entries addresses. */
6a9adeca 3980 gpinfop->g.lzplt = 0;
48d502e1
BS
3981
3982 /* Save information that we're going to need to generate GOT and PLT
3983 entries. */
6a9adeca 3984 bfinfdpic_got_initial_offset (info) = -gpinfop->gothilo.min;
48d502e1
BS
3985
3986 if (get_elf_backend_data (output_bfd)->want_got_sym)
3987 elf_hash_table (info)->hgot->root.u.def.value
6a9adeca 3988 = bfinfdpic_got_initial_offset (info);
48d502e1
BS
3989
3990 if (elf_hash_table (info)->dynamic_sections_created)
3991 bfinfdpic_plt_initial_offset (info) =
3992 bfinfdpic_plt_section (info)->size;
3993
3994 htab_traverse (bfinfdpic_relocs_info (info), _bfinfdpic_assign_plt_entries,
6a9adeca 3995 gpinfop);
48d502e1
BS
3996
3997 /* Allocate the PLT section contents only after
3998 _bfinfdpic_assign_plt_entries has a chance to add the size of the
3999 non-lazy PLT entries. */
d3e32c2e
JZ
4000 if (bfinfdpic_plt_section (info)->size == 0)
4001 bfinfdpic_plt_section (info)->flags |= SEC_EXCLUDE;
4002 else
48d502e1 4003 {
d3e32c2e
JZ
4004 bfinfdpic_plt_section (info)->contents =
4005 (bfd_byte *) bfd_zalloc (dynobj,
4006 bfinfdpic_plt_section (info)->size);
4007 if (bfinfdpic_plt_section (info)->contents == NULL)
4008 return FALSE;
48d502e1
BS
4009 }
4010
6a9adeca
BS
4011 return TRUE;
4012}
4013
4014/* Set the sizes of the dynamic sections. */
4015
4016static bfd_boolean
4017elf32_bfinfdpic_size_dynamic_sections (bfd *output_bfd,
4018 struct bfd_link_info *info)
4019{
4020 struct elf_link_hash_table *htab;
4021 bfd *dynobj;
4022 asection *s;
4023 struct _bfinfdpic_dynamic_got_plt_info gpinfo;
4024
4025 htab = elf_hash_table (info);
4026 dynobj = htab->dynobj;
4027 BFD_ASSERT (dynobj != NULL);
4028
4029 if (htab->dynamic_sections_created)
4030 {
4031 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 4032 if (bfd_link_executable (info) && !info->nointerp)
6a9adeca 4033 {
3d4d4302 4034 s = bfd_get_linker_section (dynobj, ".interp");
6a9adeca
BS
4035 BFD_ASSERT (s != NULL);
4036 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
4037 s->contents = (bfd_byte *) ELF_DYNAMIC_INTERPRETER;
4038 }
4039 }
4040
4041 memset (&gpinfo, 0, sizeof (gpinfo));
4042 gpinfo.g.info = info;
4043
4044 for (;;)
4045 {
4046 htab_t relocs = bfinfdpic_relocs_info (info);
4047
4048 htab_traverse (relocs, _bfinfdpic_resolve_final_relocs_info, &relocs);
4049
4050 if (relocs == bfinfdpic_relocs_info (info))
4051 break;
4052 }
4053
4054 htab_traverse (bfinfdpic_relocs_info (info), _bfinfdpic_count_got_plt_entries,
4055 &gpinfo.g);
4056
4057 /* Allocate space to save the summary information, we're going to
4058 use it if we're doing relaxations. */
4059 bfinfdpic_dynamic_got_plt_info (info) = bfd_alloc (dynobj, sizeof (gpinfo.g));
4060
4061 if (!_bfinfdpic_size_got_plt (output_bfd, &gpinfo))
4062 return FALSE;
4063
48d502e1
BS
4064 if (elf_hash_table (info)->dynamic_sections_created)
4065 {
4066 if (bfinfdpic_got_section (info)->size)
4067 if (!_bfd_elf_add_dynamic_entry (info, DT_PLTGOT, 0))
4068 return FALSE;
4069
4070 if (bfinfdpic_pltrel_section (info)->size)
4071 if (!_bfd_elf_add_dynamic_entry (info, DT_PLTRELSZ, 0)
4072 || !_bfd_elf_add_dynamic_entry (info, DT_PLTREL, DT_REL)
4073 || !_bfd_elf_add_dynamic_entry (info, DT_JMPREL, 0))
4074 return FALSE;
4075
4076 if (bfinfdpic_gotrel_section (info)->size)
4077 if (!_bfd_elf_add_dynamic_entry (info, DT_REL, 0)
4078 || !_bfd_elf_add_dynamic_entry (info, DT_RELSZ, 0)
4079 || !_bfd_elf_add_dynamic_entry (info, DT_RELENT,
4080 sizeof (Elf32_External_Rel)))
4081 return FALSE;
4082 }
4083
3d4d4302 4084 s = bfd_get_linker_section (dynobj, ".dynbss");
153d38f6
JZ
4085 if (s && s->size == 0)
4086 s->flags |= SEC_EXCLUDE;
4087
3d4d4302 4088 s = bfd_get_linker_section (dynobj, ".rela.bss");
153d38f6
JZ
4089 if (s && s->size == 0)
4090 s->flags |= SEC_EXCLUDE;
4091
48d502e1
BS
4092 return TRUE;
4093}
4094
4095static bfd_boolean
4096elf32_bfinfdpic_always_size_sections (bfd *output_bfd,
4097 struct bfd_link_info *info)
4098{
0e1862bb 4099 if (!bfd_link_relocatable (info)
04c3a755
NS
4100 && !bfd_elf_stack_segment_size (output_bfd, info,
4101 "__stacksize", DEFAULT_STACK_SIZE))
4102 return FALSE;
48d502e1
BS
4103
4104 return TRUE;
4105}
4106
6a9adeca
BS
4107/* Check whether any of the relocations was optimized away, and
4108 subtract it from the relocation or fixup count. */
4109static bfd_boolean
4110_bfinfdpic_check_discarded_relocs (bfd *abfd, asection *sec,
2c3fc389
NC
4111 struct bfd_link_info *info,
4112 bfd_boolean *changed)
6a9adeca
BS
4113{
4114 Elf_Internal_Shdr *symtab_hdr;
4115 struct elf_link_hash_entry **sym_hashes, **sym_hashes_end;
4116 Elf_Internal_Rela *rel, *erel;
4117
4118 if ((sec->flags & SEC_RELOC) == 0
4119 || sec->reloc_count == 0)
4120 return TRUE;
4121
4122 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
4123 sym_hashes = elf_sym_hashes (abfd);
4124 sym_hashes_end = sym_hashes + symtab_hdr->sh_size/sizeof(Elf32_External_Sym);
4125 if (!elf_bad_symtab (abfd))
4126 sym_hashes_end -= symtab_hdr->sh_info;
4127
4128 rel = elf_section_data (sec)->relocs;
4129
4130 /* Now examine each relocation. */
4131 for (erel = rel + sec->reloc_count; rel < erel; rel++)
4132 {
4133 struct elf_link_hash_entry *h;
4134 unsigned long r_symndx;
4135 struct bfinfdpic_relocs_info *picrel;
4136 struct _bfinfdpic_dynamic_got_info *dinfo;
4137
4138 if (ELF32_R_TYPE (rel->r_info) != R_BFIN_BYTE4_DATA
4139 && ELF32_R_TYPE (rel->r_info) != R_BFIN_FUNCDESC)
4140 continue;
4141
4142 if (_bfd_elf_section_offset (sec->output_section->owner,
4143 info, sec, rel->r_offset)
4144 != (bfd_vma)-1)
4145 continue;
4146
4147 r_symndx = ELF32_R_SYM (rel->r_info);
4148 if (r_symndx < symtab_hdr->sh_info)
4149 h = NULL;
4150 else
4151 {
4152 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4153 while (h->root.type == bfd_link_hash_indirect
4154 || h->root.type == bfd_link_hash_warning)
4155 h = (struct elf_link_hash_entry *)h->root.u.i.link;
4156 }
4157
4158 if (h != NULL)
4159 picrel = bfinfdpic_relocs_info_for_global (bfinfdpic_relocs_info (info),
4160 abfd, h,
4161 rel->r_addend, NO_INSERT);
4162 else
4163 picrel = bfinfdpic_relocs_info_for_local (bfinfdpic_relocs_info (info),
4164 abfd, r_symndx,
4165 rel->r_addend, NO_INSERT);
4166
4167 if (! picrel)
4168 return FALSE;
4169
4170 *changed = TRUE;
4171 dinfo = bfinfdpic_dynamic_got_plt_info (info);
4172
4173 _bfinfdpic_count_relocs_fixups (picrel, dinfo, TRUE);
4174 if (ELF32_R_TYPE (rel->r_info) == R_BFIN_BYTE4_DATA)
4175 picrel->relocs32--;
4176 else /* we know (ELF32_R_TYPE (rel->r_info) == R_BFIN_FUNCDESC) */
4177 picrel->relocsfd--;
4178 _bfinfdpic_count_relocs_fixups (picrel, dinfo, FALSE);
4179 }
4180
4181 return TRUE;
4182}
4183
4184static bfd_boolean
4185bfinfdpic_elf_discard_info (bfd *ibfd,
4186 struct elf_reloc_cookie *cookie ATTRIBUTE_UNUSED,
4187 struct bfd_link_info *info)
4188{
4189 bfd_boolean changed = FALSE;
4190 asection *s;
4191 bfd *obfd = NULL;
4192
4193 /* Account for relaxation of .eh_frame section. */
4194 for (s = ibfd->sections; s; s = s->next)
dbaa2011 4195 if (s->sec_info_type == SEC_INFO_TYPE_EH_FRAME)
6a9adeca
BS
4196 {
4197 if (!_bfinfdpic_check_discarded_relocs (ibfd, s, info, &changed))
4198 return FALSE;
4199 obfd = s->output_section->owner;
4200 }
4201
4202 if (changed)
4203 {
4204 struct _bfinfdpic_dynamic_got_plt_info gpinfo;
4205
4206 memset (&gpinfo, 0, sizeof (gpinfo));
4207 memcpy (&gpinfo.g, bfinfdpic_dynamic_got_plt_info (info),
4208 sizeof (gpinfo.g));
4209
4210 /* Clear GOT and PLT assignments. */
4211 htab_traverse (bfinfdpic_relocs_info (info),
4212 _bfinfdpic_reset_got_plt_entries,
4213 NULL);
4214
4215 if (!_bfinfdpic_size_got_plt (obfd, &gpinfo))
4216 return FALSE;
4217 }
4218
4219 return TRUE;
4220}
4221
48d502e1
BS
4222static bfd_boolean
4223elf32_bfinfdpic_finish_dynamic_sections (bfd *output_bfd,
4224 struct bfd_link_info *info)
4225{
4226 bfd *dynobj;
4227 asection *sdyn;
4228
4229 dynobj = elf_hash_table (info)->dynobj;
4230
4231 if (bfinfdpic_got_section (info))
4232 {
4233 BFD_ASSERT (bfinfdpic_gotrel_section (info)->size
ed3056eb
NC
4234 /* PR 17334: It appears that the GOT section can end up
4235 being bigger than the number of relocs. Presumably
4236 because some relocs have been deleted. A test case has
4237 yet to be generated for verify this, but in the meantime
4238 the test below has been changed from == to >= so that
4239 applications can continue to be built. */
4240 >= (bfinfdpic_gotrel_section (info)->reloc_count
48d502e1
BS
4241 * sizeof (Elf32_External_Rel)));
4242
4243 if (bfinfdpic_gotfixup_section (info))
4244 {
4245 struct elf_link_hash_entry *hgot = elf_hash_table (info)->hgot;
4246 bfd_vma got_value = hgot->root.u.def.value
4247 + hgot->root.u.def.section->output_section->vma
4248 + hgot->root.u.def.section->output_offset;
4249
4250 _bfinfdpic_add_rofixup (output_bfd, bfinfdpic_gotfixup_section (info),
4251 got_value, 0);
4252
4253 if (bfinfdpic_gotfixup_section (info)->size
4254 != (bfinfdpic_gotfixup_section (info)->reloc_count * 4))
0f64bb02 4255 {
4eca0228 4256 _bfd_error_handler
48d502e1 4257 ("LINKER BUG: .rofixup section size mismatch");
0f64bb02
CM
4258 return FALSE;
4259 }
4260 }
4261 }
48d502e1
BS
4262 if (elf_hash_table (info)->dynamic_sections_created)
4263 {
4264 BFD_ASSERT (bfinfdpic_pltrel_section (info)->size
4265 == (bfinfdpic_pltrel_section (info)->reloc_count
4266 * sizeof (Elf32_External_Rel)));
4267 }
4268
3d4d4302 4269 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
48d502e1
BS
4270
4271 if (elf_hash_table (info)->dynamic_sections_created)
4272 {
4273 Elf32_External_Dyn * dyncon;
4274 Elf32_External_Dyn * dynconend;
4275
4276 BFD_ASSERT (sdyn != NULL);
4277
4278 dyncon = (Elf32_External_Dyn *) sdyn->contents;
4279 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
4280
4281 for (; dyncon < dynconend; dyncon++)
4282 {
4283 Elf_Internal_Dyn dyn;
4284
4285 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
4286
4287 switch (dyn.d_tag)
4288 {
4289 default:
4290 break;
4291
4292 case DT_PLTGOT:
4293 dyn.d_un.d_ptr = bfinfdpic_got_section (info)->output_section->vma
4294 + bfinfdpic_got_section (info)->output_offset
4295 + bfinfdpic_got_initial_offset (info);
4296 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
4297 break;
4298
4299 case DT_JMPREL:
4300 dyn.d_un.d_ptr = bfinfdpic_pltrel_section (info)
4301 ->output_section->vma
4302 + bfinfdpic_pltrel_section (info)->output_offset;
4303 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
4304 break;
4305
4306 case DT_PLTRELSZ:
4307 dyn.d_un.d_val = bfinfdpic_pltrel_section (info)->size;
4308 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
4309 break;
4310 }
4311 }
4312 }
4313
4314 return TRUE;
4315}
4316
4317/* Adjust a symbol defined by a dynamic object and referenced by a
4318 regular object. */
4319
4320static bfd_boolean
2c3fc389
NC
4321elf32_bfinfdpic_adjust_dynamic_symbol (struct bfd_link_info *info,
4322 struct elf_link_hash_entry *h)
48d502e1
BS
4323{
4324 bfd * dynobj;
4325
4326 dynobj = elf_hash_table (info)->dynobj;
4327
4328 /* Make sure we know what is going on here. */
4329 BFD_ASSERT (dynobj != NULL
4330 && (h->u.weakdef != NULL
4331 || (h->def_dynamic
4332 && h->ref_regular
4333 && !h->def_regular)));
4334
4335 /* If this is a weak symbol, and there is a real definition, the
4336 processor independent code will have arranged for us to see the
4337 real definition first, and we can just use the same value. */
4338 if (h->u.weakdef != NULL)
4339 {
4340 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
4341 || h->u.weakdef->root.type == bfd_link_hash_defweak);
4342 h->root.u.def.section = h->u.weakdef->root.u.def.section;
4343 h->root.u.def.value = h->u.weakdef->root.u.def.value;
4344 }
0f64bb02
CM
4345
4346 return TRUE;
4347}
4348
48d502e1
BS
4349/* Perform any actions needed for dynamic symbols. */
4350
4351static bfd_boolean
4352elf32_bfinfdpic_finish_dynamic_symbol
4353(bfd *output_bfd ATTRIBUTE_UNUSED,
4354 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4355 struct elf_link_hash_entry *h ATTRIBUTE_UNUSED,
4356 Elf_Internal_Sym *sym ATTRIBUTE_UNUSED)
0f64bb02 4357{
48d502e1
BS
4358 return TRUE;
4359}
0f64bb02 4360
48d502e1
BS
4361/* Decide whether to attempt to turn absptr or lsda encodings in
4362 shared libraries into pcrel within the given input section. */
0f64bb02 4363
48d502e1
BS
4364static bfd_boolean
4365bfinfdpic_elf_use_relative_eh_frame
4366(bfd *input_bfd ATTRIBUTE_UNUSED,
4367 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4368 asection *eh_frame_section ATTRIBUTE_UNUSED)
4369{
4370 /* We can't use PC-relative encodings in FDPIC binaries, in general. */
4371 return FALSE;
4372}
0f64bb02 4373
48d502e1 4374/* Adjust the contents of an eh_frame_hdr section before they're output. */
0f64bb02 4375
48d502e1
BS
4376static bfd_byte
4377bfinfdpic_elf_encode_eh_address (bfd *abfd,
4378 struct bfd_link_info *info,
4379 asection *osec, bfd_vma offset,
4380 asection *loc_sec, bfd_vma loc_offset,
4381 bfd_vma *encoded)
4382{
4383 struct elf_link_hash_entry *h;
0f64bb02 4384
48d502e1
BS
4385 h = elf_hash_table (info)->hgot;
4386 BFD_ASSERT (h && h->root.type == bfd_link_hash_defined);
4387
4388 if (! h || (_bfinfdpic_osec_to_segment (abfd, osec)
4389 == _bfinfdpic_osec_to_segment (abfd, loc_sec->output_section)))
4390 return _bfd_elf_encode_eh_address (abfd, info, osec, offset,
4391 loc_sec, loc_offset, encoded);
4392
4393 BFD_ASSERT (_bfinfdpic_osec_to_segment (abfd, osec)
4394 == (_bfinfdpic_osec_to_segment
4395 (abfd, h->root.u.def.section->output_section)));
4396
4397 *encoded = osec->vma + offset
4398 - (h->root.u.def.value
4399 + h->root.u.def.section->output_section->vma
4400 + h->root.u.def.section->output_offset);
4401
4402 return DW_EH_PE_datarel | DW_EH_PE_sdata4;
0f64bb02
CM
4403}
4404
4405
48d502e1
BS
4406
4407/* Look through the relocs for a section during the first phase.
4408
4409 Besides handling virtual table relocs for gc, we have to deal with
4410 all sorts of PIC-related relocations. We describe below the
4411 general plan on how to handle such relocations, even though we only
4412 collect information at this point, storing them in hash tables for
4413 perusal of later passes.
4414
4415 32 relocations are propagated to the linker output when creating
4416 position-independent output. LO16 and HI16 relocations are not
4417 supposed to be encountered in this case.
4418
4419 LABEL16 should always be resolvable by the linker, since it's only
4420 used by branches.
4421
4422 LABEL24, on the other hand, is used by calls. If it turns out that
4423 the target of a call is a dynamic symbol, a PLT entry must be
4424 created for it, which triggers the creation of a private function
4425 descriptor and, unless lazy binding is disabled, a lazy PLT entry.
4426
4427 GPREL relocations require the referenced symbol to be in the same
4428 segment as _gp, but this can only be checked later.
4429
4430 All GOT, GOTOFF and FUNCDESC relocations require a .got section to
4431 exist. LABEL24 might as well, since it may require a PLT entry,
4432 that will require a got.
4433
4434 Non-FUNCDESC GOT relocations require a GOT entry to be created
4435 regardless of whether the symbol is dynamic. However, since a
4436 global symbol that turns out to not be exported may have the same
4437 address of a non-dynamic symbol, we don't assign GOT entries at
4438 this point, such that we can share them in this case. A relocation
4439 for the GOT entry always has to be created, be it to offset a
4440 private symbol by the section load address, be it to get the symbol
4441 resolved dynamically.
4442
4443 FUNCDESC GOT relocations require a GOT entry to be created, and
4444 handled as if a FUNCDESC relocation was applied to the GOT entry in
4445 an object file.
4446
4447 FUNCDESC relocations referencing a symbol that turns out to NOT be
4448 dynamic cause a private function descriptor to be created. The
4449 FUNCDESC relocation then decays to a 32 relocation that points at
4450 the private descriptor. If the symbol is dynamic, the FUNCDESC
4451 relocation is propagated to the linker output, such that the
4452 dynamic linker creates the canonical descriptor, pointing to the
4453 dynamically-resolved definition of the function.
4454
4455 Non-FUNCDESC GOTOFF relocations must always refer to non-dynamic
4456 symbols that are assigned to the same segment as the GOT, but we
4457 can only check this later, after we know the complete set of
4458 symbols defined and/or exported.
4459
4460 FUNCDESC GOTOFF relocations require a function descriptor to be
4461 created and, unless lazy binding is disabled or the symbol is not
4462 dynamic, a lazy PLT entry. Since we can't tell at this point
4463 whether a symbol is going to be dynamic, we have to decide later
4464 whether to create a lazy PLT entry or bind the descriptor directly
4465 to the private function.
4466
4467 FUNCDESC_VALUE relocations are not supposed to be present in object
4468 files, but they may very well be simply propagated to the linker
4469 output, since they have no side effect.
4470
4471
4472 A function descriptor always requires a FUNCDESC_VALUE relocation.
4473 Whether it's in .plt.rel or not depends on whether lazy binding is
4474 enabled and on whether the referenced symbol is dynamic.
4475
4476 The existence of a lazy PLT requires the resolverStub lazy PLT
4477 entry to be present.
4478
4479
4480 As for assignment of GOT, PLT and lazy PLT entries, and private
4481 descriptors, we might do them all sequentially, but we can do
4482 better than that. For example, we can place GOT entries and
4483 private function descriptors referenced using 12-bit operands
4484 closer to the PIC register value, such that these relocations don't
4485 overflow. Those that are only referenced with LO16 relocations
4486 could come next, but we may as well place PLT-required function
4487 descriptors in the 12-bit range to make them shorter. Symbols
4488 referenced with LO16/HI16 may come next, but we may place
4489 additional function descriptors in the 16-bit range if we can
4490 reliably tell that we've already placed entries that are ever
4491 referenced with only LO16. PLT entries are therefore generated as
4492 small as possible, while not introducing relocation overflows in
4493 GOT or FUNCDESC_GOTOFF relocations. Lazy PLT entries could be
4494 generated before or after PLT entries, but not intermingled with
4495 them, such that we can have more lazy PLT entries in range for a
4496 branch to the resolverStub. The resolverStub should be emitted at
4497 the most distant location from the first lazy PLT entry such that
4498 it's still in range for a branch, or closer, if there isn't a need
4499 for so many lazy PLT entries. Additional lazy PLT entries may be
4500 emitted after the resolverStub, as long as branches are still in
4501 range. If the branch goes out of range, longer lazy PLT entries
4502 are emitted.
4503
4504 We could further optimize PLT and lazy PLT entries by giving them
4505 priority in assignment to closer-to-gr17 locations depending on the
4506 number of occurrences of references to them (assuming a function
4507 that's called more often is more important for performance, so its
4508 PLT entry should be faster), or taking hints from the compiler.
4509 Given infinite time and money... :-) */
0f64bb02
CM
4510
4511static bfd_boolean
48d502e1
BS
4512bfinfdpic_check_relocs (bfd *abfd, struct bfd_link_info *info,
4513 asection *sec, const Elf_Internal_Rela *relocs)
0f64bb02
CM
4514{
4515 Elf_Internal_Shdr *symtab_hdr;
5582a088 4516 struct elf_link_hash_entry **sym_hashes;
48d502e1
BS
4517 const Elf_Internal_Rela *rel;
4518 const Elf_Internal_Rela *rel_end;
0f64bb02 4519 bfd *dynobj;
48d502e1 4520 struct bfinfdpic_relocs_info *picrel;
0f64bb02 4521
0e1862bb 4522 if (bfd_link_relocatable (info))
0f64bb02
CM
4523 return TRUE;
4524
4525 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
4526 sym_hashes = elf_sym_hashes (abfd);
0f64bb02 4527
48d502e1
BS
4528 dynobj = elf_hash_table (info)->dynobj;
4529 rel_end = relocs + sec->reloc_count;
4530 for (rel = relocs; rel < rel_end; rel++)
0f64bb02 4531 {
0f64bb02 4532 struct elf_link_hash_entry *h;
48d502e1
BS
4533 unsigned long r_symndx;
4534
4535 r_symndx = ELF32_R_SYM (rel->r_info);
4536 if (r_symndx < symtab_hdr->sh_info)
4537 h = NULL;
4538 else
4539 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
0f64bb02
CM
4540
4541 switch (ELF32_R_TYPE (rel->r_info))
4542 {
48d502e1
BS
4543 case R_BFIN_GOT17M4:
4544 case R_BFIN_GOTHI:
4545 case R_BFIN_GOTLO:
4546 case R_BFIN_FUNCDESC_GOT17M4:
4547 case R_BFIN_FUNCDESC_GOTHI:
4548 case R_BFIN_FUNCDESC_GOTLO:
4549 case R_BFIN_GOTOFF17M4:
4550 case R_BFIN_GOTOFFHI:
4551 case R_BFIN_GOTOFFLO:
4552 case R_BFIN_FUNCDESC_GOTOFF17M4:
4553 case R_BFIN_FUNCDESC_GOTOFFHI:
4554 case R_BFIN_FUNCDESC_GOTOFFLO:
4555 case R_BFIN_FUNCDESC:
4556 case R_BFIN_FUNCDESC_VALUE:
4557 if (! IS_FDPIC (abfd))
4558 goto bad_reloc;
4559 /* Fall through. */
cb88ce9f
BS
4560 case R_BFIN_PCREL24:
4561 case R_BFIN_PCREL24_JUMP_L:
4562 case R_BFIN_BYTE4_DATA:
48d502e1 4563 if (IS_FDPIC (abfd) && ! dynobj)
0f64bb02 4564 {
48d502e1
BS
4565 elf_hash_table (info)->dynobj = dynobj = abfd;
4566 if (! _bfin_create_got_section (abfd, info))
4567 return FALSE;
0f64bb02 4568 }
48d502e1 4569 if (! IS_FDPIC (abfd))
0f64bb02 4570 {
48d502e1
BS
4571 picrel = NULL;
4572 break;
4573 }
4574 if (h != NULL)
4575 {
4576 if (h->dynindx == -1)
4577 switch (ELF_ST_VISIBILITY (h->other))
4578 {
4579 case STV_INTERNAL:
4580 case STV_HIDDEN:
4581 break;
4582 default:
4583 bfd_elf_link_record_dynamic_symbol (info, h);
4584 break;
4585 }
4586 picrel
4587 = bfinfdpic_relocs_info_for_global (bfinfdpic_relocs_info (info),
4588 abfd, h,
4589 rel->r_addend, INSERT);
0f64bb02 4590 }
48d502e1
BS
4591 else
4592 picrel = bfinfdpic_relocs_info_for_local (bfinfdpic_relocs_info
4593 (info), abfd, r_symndx,
4594 rel->r_addend, INSERT);
4595 if (! picrel)
4596 return FALSE;
0f64bb02 4597 break;
48d502e1 4598
0f64bb02 4599 default:
48d502e1 4600 picrel = NULL;
0f64bb02
CM
4601 break;
4602 }
48d502e1
BS
4603
4604 switch (ELF32_R_TYPE (rel->r_info))
4605 {
cb88ce9f
BS
4606 case R_BFIN_PCREL24:
4607 case R_BFIN_PCREL24_JUMP_L:
48d502e1 4608 if (IS_FDPIC (abfd))
2774f1a6 4609 picrel->call++;
48d502e1
BS
4610 break;
4611
4612 case R_BFIN_FUNCDESC_VALUE:
4613 picrel->relocsfdv++;
4614 if (bfd_get_section_flags (abfd, sec) & SEC_ALLOC)
4615 picrel->relocs32--;
4616 /* Fall through. */
4617
cb88ce9f 4618 case R_BFIN_BYTE4_DATA:
48d502e1
BS
4619 if (! IS_FDPIC (abfd))
4620 break;
4621
2774f1a6 4622 picrel->sym++;
48d502e1
BS
4623 if (bfd_get_section_flags (abfd, sec) & SEC_ALLOC)
4624 picrel->relocs32++;
4625 break;
4626
4627 case R_BFIN_GOT17M4:
2774f1a6 4628 picrel->got17m4++;
48d502e1
BS
4629 break;
4630
4631 case R_BFIN_GOTHI:
4632 case R_BFIN_GOTLO:
2774f1a6 4633 picrel->gothilo++;
48d502e1
BS
4634 break;
4635
4636 case R_BFIN_FUNCDESC_GOT17M4:
2774f1a6 4637 picrel->fdgot17m4++;
48d502e1
BS
4638 break;
4639
4640 case R_BFIN_FUNCDESC_GOTHI:
4641 case R_BFIN_FUNCDESC_GOTLO:
2774f1a6 4642 picrel->fdgothilo++;
48d502e1
BS
4643 break;
4644
4645 case R_BFIN_GOTOFF17M4:
4646 case R_BFIN_GOTOFFHI:
4647 case R_BFIN_GOTOFFLO:
2774f1a6 4648 picrel->gotoff++;
48d502e1
BS
4649 break;
4650
4651 case R_BFIN_FUNCDESC_GOTOFF17M4:
2774f1a6 4652 picrel->fdgoff17m4++;
48d502e1
BS
4653 break;
4654
4655 case R_BFIN_FUNCDESC_GOTOFFHI:
4656 case R_BFIN_FUNCDESC_GOTOFFLO:
2774f1a6 4657 picrel->fdgoffhilo++;
48d502e1
BS
4658 break;
4659
4660 case R_BFIN_FUNCDESC:
2774f1a6 4661 picrel->fd++;
48d502e1
BS
4662 picrel->relocsfd++;
4663 break;
4664
4665 /* This relocation describes the C++ object vtable hierarchy.
4666 Reconstruct it for later use during GC. */
4667 case R_BFIN_GNU_VTINHERIT:
4668 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
4669 return FALSE;
4670 break;
4671
4672 /* This relocation describes which C++ vtable entries are actually
4673 used. Record for later use during GC. */
4674 case R_BFIN_GNU_VTENTRY:
d17e0c6e
JB
4675 BFD_ASSERT (h != NULL);
4676 if (h != NULL
4677 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
48d502e1
BS
4678 return FALSE;
4679 break;
4680
cb88ce9f
BS
4681 case R_BFIN_HUIMM16:
4682 case R_BFIN_LUIMM16:
4683 case R_BFIN_PCREL12_JUMP_S:
4684 case R_BFIN_PCREL10:
48d502e1
BS
4685 break;
4686
4687 default:
4688 bad_reloc:
4eca0228 4689 _bfd_error_handler
695344c0 4690 /* xgettext:c-format */
d42c267e
AM
4691 (_("%B: unsupported relocation type %d"),
4692 abfd, (int) ELF32_R_TYPE (rel->r_info));
48d502e1
BS
4693 return FALSE;
4694 }
0f64bb02
CM
4695 }
4696
4697 return TRUE;
4698}
4699
48d502e1
BS
4700/* Set the right machine number for a Blackfin ELF file. */
4701
4702static bfd_boolean
4703elf32_bfin_object_p (bfd *abfd)
4704{
4705 bfd_default_set_arch_mach (abfd, bfd_arch_bfin, 0);
4706 return (((elf_elfheader (abfd)->e_flags & EF_BFIN_FDPIC) != 0)
4707 == (IS_FDPIC (abfd)));
4708}
0f64bb02 4709
0f64bb02 4710static bfd_boolean
48d502e1 4711elf32_bfin_set_private_flags (bfd * abfd, flagword flags)
0f64bb02 4712{
48d502e1
BS
4713 elf_elfheader (abfd)->e_flags = flags;
4714 elf_flags_init (abfd) = TRUE;
4715 return TRUE;
4716}
0f64bb02 4717
0f64bb02
CM
4718/* Display the flags field. */
4719static bfd_boolean
2c3fc389 4720elf32_bfin_print_private_bfd_data (bfd * abfd, void * ptr)
0f64bb02
CM
4721{
4722 FILE *file = (FILE *) ptr;
48d502e1 4723 flagword flags;
0f64bb02
CM
4724
4725 BFD_ASSERT (abfd != NULL && ptr != NULL);
4726
4727 /* Print normal ELF private data. */
4728 _bfd_elf_print_private_bfd_data (abfd, ptr);
4729
48d502e1 4730 flags = elf_elfheader (abfd)->e_flags;
0f64bb02
CM
4731
4732 /* xgettext:c-format */
4733 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
4734
48d502e1
BS
4735 if (flags & EF_BFIN_PIC)
4736 fprintf (file, " -fpic");
4737
4738 if (flags & EF_BFIN_FDPIC)
4739 fprintf (file, " -mfdpic");
4740
0f64bb02
CM
4741 fputc ('\n', file);
4742
4743 return TRUE;
4744}
4745
48d502e1
BS
4746/* Merge backend specific data from an object file to the output
4747 object file when linking. */
4748
4749static bfd_boolean
50e03d47 4750elf32_bfin_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
48d502e1 4751{
50e03d47 4752 bfd *obfd = info->output_bfd;
7a84e3da 4753 flagword old_flags, new_flags;
48d502e1
BS
4754 bfd_boolean error = FALSE;
4755
4756 new_flags = elf_elfheader (ibfd)->e_flags;
4757 old_flags = elf_elfheader (obfd)->e_flags;
4758
4759 if (new_flags & EF_BFIN_FDPIC)
4760 new_flags &= ~EF_BFIN_PIC;
4761
c7e2358a
AM
4762#ifndef DEBUG
4763 if (0)
4764#endif
4eca0228 4765 _bfd_error_handler
d42c267e 4766 ("old_flags = 0x%.8x, new_flags = 0x%.8x, init = %s, filename = %B",
dae82561 4767 old_flags, new_flags, elf_flags_init (obfd) ? "yes" : "no", ibfd);
48d502e1
BS
4768
4769 if (!elf_flags_init (obfd)) /* First call, no flags set. */
4770 {
4771 elf_flags_init (obfd) = TRUE;
7a84e3da 4772 elf_elfheader (obfd)->e_flags = new_flags;
48d502e1
BS
4773 }
4774
7a84e3da 4775 if (((new_flags & EF_BFIN_FDPIC) == 0) != (! IS_FDPIC (obfd)))
48d502e1
BS
4776 {
4777 error = TRUE;
4778 if (IS_FDPIC (obfd))
4eca0228 4779 _bfd_error_handler
dae82561
AM
4780 (_("%B: cannot link non-fdpic object file into fdpic executable"),
4781 ibfd);
48d502e1 4782 else
4eca0228 4783 _bfd_error_handler
dae82561
AM
4784 (_("%B: cannot link fdpic object file into non-fdpic executable"),
4785 ibfd);
48d502e1
BS
4786 }
4787
4788 if (error)
4789 bfd_set_error (bfd_error_bad_value);
4790
4791 return !error;
4792}
4793\f
0f64bb02
CM
4794/* bfin ELF linker hash entry. */
4795
4796struct bfin_link_hash_entry
4797{
4798 struct elf_link_hash_entry root;
4799
4800 /* Number of PC relative relocs copied for this symbol. */
4801 struct bfin_pcrel_relocs_copied *pcrel_relocs_copied;
4802};
4803
4804/* bfin ELF linker hash table. */
4805
4806struct bfin_link_hash_table
4807{
4808 struct elf_link_hash_table root;
4809
87d72d41
AM
4810 /* Small local sym cache. */
4811 struct sym_cache sym_cache;
0f64bb02
CM
4812};
4813
4814#define bfin_hash_entry(ent) ((struct bfin_link_hash_entry *) (ent))
4815
4816static struct bfd_hash_entry *
4817bfin_link_hash_newfunc (struct bfd_hash_entry *entry,
48d502e1 4818 struct bfd_hash_table *table, const char *string)
0f64bb02
CM
4819{
4820 struct bfd_hash_entry *ret = entry;
4821
4822 /* Allocate the structure if it has not already been allocated by a
4823 subclass. */
4824 if (ret == NULL)
4825 ret = bfd_hash_allocate (table, sizeof (struct bfin_link_hash_entry));
4826 if (ret == NULL)
4827 return ret;
4828
4829 /* Call the allocation method of the superclass. */
4830 ret = _bfd_elf_link_hash_newfunc (ret, table, string);
4831 if (ret != NULL)
4832 bfin_hash_entry (ret)->pcrel_relocs_copied = NULL;
4833
4834 return ret;
4835}
4836
4837/* Create an bfin ELF linker hash table. */
4838
4839static struct bfd_link_hash_table *
4840bfin_link_hash_table_create (bfd * abfd)
4841{
4842 struct bfin_link_hash_table *ret;
4843 bfd_size_type amt = sizeof (struct bfin_link_hash_table);
4844
22cdc249 4845 ret = bfd_zmalloc (amt);
48d502e1 4846 if (ret == NULL)
0f64bb02
CM
4847 return NULL;
4848
4849 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
66eb6687 4850 bfin_link_hash_newfunc,
4dfe6ac6
NC
4851 sizeof (struct elf_link_hash_entry),
4852 BFIN_ELF_DATA))
0f64bb02
CM
4853 {
4854 free (ret);
4855 return NULL;
4856 }
4857
87d72d41 4858 ret->sym_cache.abfd = NULL;
0f64bb02
CM
4859
4860 return &ret->root.root;
4861}
4862
4863/* The size in bytes of an entry in the procedure linkage table. */
4864
4865/* Finish up the dynamic sections. */
4866
4867static bfd_boolean
4868bfin_finish_dynamic_sections (bfd * output_bfd ATTRIBUTE_UNUSED,
2c3fc389 4869 struct bfd_link_info *info)
0f64bb02
CM
4870{
4871 bfd *dynobj;
4872 asection *sdyn;
4873
4874 dynobj = elf_hash_table (info)->dynobj;
4875
3d4d4302 4876 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
0f64bb02
CM
4877
4878 if (elf_hash_table (info)->dynamic_sections_created)
4879 {
4880 Elf32_External_Dyn *dyncon, *dynconend;
4881
4882 BFD_ASSERT (sdyn != NULL);
4883
4884 dyncon = (Elf32_External_Dyn *) sdyn->contents;
4885 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
4886 for (; dyncon < dynconend; dyncon++)
4887 {
4888 Elf_Internal_Dyn dyn;
4889
4890 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
4891
4892 }
4893
4894 }
4895 return TRUE;
4896}
4897
4898/* Finish up dynamic symbol handling. We set the contents of various
4899 dynamic sections here. */
4900
4901static bfd_boolean
4902bfin_finish_dynamic_symbol (bfd * output_bfd,
2c3fc389
NC
4903 struct bfd_link_info *info,
4904 struct elf_link_hash_entry *h,
4905 Elf_Internal_Sym * sym)
0f64bb02 4906{
0f64bb02
CM
4907 if (h->got.offset != (bfd_vma) - 1)
4908 {
4909 asection *sgot;
4910 asection *srela;
4911 Elf_Internal_Rela rela;
4912 bfd_byte *loc;
4913
4914 /* This symbol has an entry in the global offset table.
4915 Set it up. */
4916
ce558b89
AM
4917 sgot = elf_hash_table (info)->sgot;
4918 srela = elf_hash_table (info)->srelgot;
0f64bb02
CM
4919 BFD_ASSERT (sgot != NULL && srela != NULL);
4920
4921 rela.r_offset = (sgot->output_section->vma
4922 + sgot->output_offset
4923 + (h->got.offset & ~(bfd_vma) 1));
4924
4925 /* If this is a -Bsymbolic link, and the symbol is defined
4926 locally, we just want to emit a RELATIVE reloc. Likewise if
4927 the symbol was forced to be local because of a version file.
4928 The entry in the global offset table will already have been
4929 initialized in the relocate_section function. */
0e1862bb 4930 if (bfd_link_pic (info)
0f64bb02
CM
4931 && (info->symbolic
4932 || h->dynindx == -1 || h->forced_local) && h->def_regular)
4933 {
4eca0228
AM
4934 _bfd_error_handler (_("*** check this relocation %s"),
4935 __FUNCTION__);
cb88ce9f 4936 rela.r_info = ELF32_R_INFO (0, R_BFIN_PCREL24);
0f64bb02
CM
4937 rela.r_addend = bfd_get_signed_32 (output_bfd,
4938 (sgot->contents
4939 +
4940 (h->got.
4941 offset & ~(bfd_vma) 1)));
4942 }
4943 else
4944 {
4945 bfd_put_32 (output_bfd, (bfd_vma) 0,
4946 sgot->contents + (h->got.offset & ~(bfd_vma) 1));
cb88ce9f 4947 rela.r_info = ELF32_R_INFO (h->dynindx, R_BFIN_GOT);
0f64bb02
CM
4948 rela.r_addend = 0;
4949 }
4950
4951 loc = srela->contents;
4952 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
4953 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
4954 }
4955
4956 if (h->needs_copy)
4957 {
4958 BFD_ASSERT (0);
4959 }
4960 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
5592d7ec 4961 if (strcmp (h->root.root.string, "__DYNAMIC") == 0
22edb2f1 4962 || h == elf_hash_table (info)->hgot)
0f64bb02
CM
4963 sym->st_shndx = SHN_ABS;
4964
4965 return TRUE;
4966}
4967
4968/* Adjust a symbol defined by a dynamic object and referenced by a
4969 regular object. The current definition is in some section of the
4970 dynamic object, but we're not including those sections. We have to
4971 change the definition to something the rest of the link can
4972 understand. */
4973
4974static bfd_boolean
4975bfin_adjust_dynamic_symbol (struct bfd_link_info *info,
2c3fc389 4976 struct elf_link_hash_entry *h)
0f64bb02
CM
4977{
4978 bfd *dynobj;
4979 asection *s;
4980 unsigned int power_of_two;
4981
4982 dynobj = elf_hash_table (info)->dynobj;
4983
4984 /* Make sure we know what is going on here. */
4985 BFD_ASSERT (dynobj != NULL
4986 && (h->needs_plt
4987 || h->u.weakdef != NULL
4988 || (h->def_dynamic && h->ref_regular && !h->def_regular)));
4989
4990 /* If this is a function, put it in the procedure linkage table. We
4991 will fill in the contents of the procedure linkage table later,
4992 when we know the address of the .got section. */
4993 if (h->type == STT_FUNC || h->needs_plt)
4994 {
4995 BFD_ASSERT(0);
4996 }
4997
4998 /* If this is a weak symbol, and there is a real definition, the
4999 processor independent code will have arranged for us to see the
5000 real definition first, and we can just use the same value. */
5001 if (h->u.weakdef != NULL)
5002 {
5003 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
5004 || h->u.weakdef->root.type == bfd_link_hash_defweak);
5005 h->root.u.def.section = h->u.weakdef->root.u.def.section;
5006 h->root.u.def.value = h->u.weakdef->root.u.def.value;
5007 return TRUE;
5008 }
5009
5010 /* This is a reference to a symbol defined by a dynamic object which
5011 is not a function. */
5012
5013 /* If we are creating a shared library, we must presume that the
5014 only references to the symbol are via the global offset table.
5015 For such cases we need not do anything here; the relocations will
5016 be handled correctly by relocate_section. */
0e1862bb 5017 if (bfd_link_pic (info))
0f64bb02
CM
5018 return TRUE;
5019
5020 /* We must allocate the symbol in our .dynbss section, which will
5021 become part of the .bss section of the executable. There will be
5022 an entry for this symbol in the .dynsym section. The dynamic
5023 object will contain position independent code, so all references
5024 from the dynamic object to this symbol will go through the global
5025 offset table. The dynamic linker will use the .dynsym entry to
5026 determine the address it must put in the global offset table, so
5027 both the dynamic object and the regular object will refer to the
5028 same memory location for the variable. */
5029
3d4d4302 5030 s = bfd_get_linker_section (dynobj, ".dynbss");
0f64bb02
CM
5031 BFD_ASSERT (s != NULL);
5032
1b857aee
NC
5033#if 0 /* Bfin does not currently have a COPY reloc. */
5034 /* We must generate a R_BFIN_COPY reloc to tell the dynamic linker to
0f64bb02
CM
5035 copy the initial value out of the dynamic object and into the
5036 runtime process image. We need to remember the offset into the
5037 .rela.bss section we are going to use. */
5038 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
5039 {
5040 asection *srel;
5041
3d4d4302 5042 srel = bfd_get_linker_section (dynobj, ".rela.bss");
0f64bb02
CM
5043 BFD_ASSERT (srel != NULL);
5044 srel->size += sizeof (Elf32_External_Rela);
5045 h->needs_copy = 1;
5046 }
1b857aee
NC
5047#else
5048 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
5049 {
4eca0228 5050 _bfd_error_handler (_("the bfin target does not currently support the generation of copy relocations"));
1b857aee
NC
5051 return FALSE;
5052 }
5053#endif
0f64bb02
CM
5054 /* We need to figure out the alignment required for this symbol. I
5055 have no idea how ELF linkers handle this. */
5056 power_of_two = bfd_log2 (h->size);
5057 if (power_of_two > 3)
5058 power_of_two = 3;
5059
5060 /* Apply the required alignment. */
5061 s->size = BFD_ALIGN (s->size, (bfd_size_type) (1 << power_of_two));
5062 if (power_of_two > bfd_get_section_alignment (dynobj, s))
5063 {
5064 if (!bfd_set_section_alignment (dynobj, s, power_of_two))
5065 return FALSE;
5066 }
5067
5068 /* Define the symbol as being at this point in the section. */
5069 h->root.u.def.section = s;
5070 h->root.u.def.value = s->size;
5071
5072 /* Increment the section size to make room for the symbol. */
5073 s->size += h->size;
5074
5075 return TRUE;
5076}
5077
5078/* The bfin linker needs to keep track of the number of relocs that it
5079 decides to copy in check_relocs for each symbol. This is so that it
5080 can discard PC relative relocs if it doesn't need them when linking
5081 with -Bsymbolic. We store the information in a field extending the
5082 regular ELF linker hash table. */
5083
5084/* This structure keeps track of the number of PC relative relocs we have
5085 copied for a given symbol. */
5086
5087struct bfin_pcrel_relocs_copied
5088{
5089 /* Next section. */
5090 struct bfin_pcrel_relocs_copied *next;
5091 /* A section in dynobj. */
5092 asection *section;
5093 /* Number of relocs copied in this section. */
5094 bfd_size_type count;
5095};
5096
5097/* This function is called via elf_link_hash_traverse if we are
5098 creating a shared object. In the -Bsymbolic case it discards the
5099 space allocated to copy PC relative relocs against symbols which
5100 are defined in regular objects. For the normal shared case, it
5101 discards space for pc-relative relocs that have become local due to
5102 symbol visibility changes. We allocated space for them in the
5103 check_relocs routine, but we won't fill them in in the
5104 relocate_section routine.
5105
5106 We also check whether any of the remaining relocations apply
5107 against a readonly section, and set the DF_TEXTREL flag in this
5108 case. */
5109
5110static bfd_boolean
2c3fc389 5111bfin_discard_copies (struct elf_link_hash_entry *h, void * inf)
0f64bb02
CM
5112{
5113 struct bfd_link_info *info = (struct bfd_link_info *) inf;
5114 struct bfin_pcrel_relocs_copied *s;
5115
0f64bb02
CM
5116 if (!h->def_regular || (!info->symbolic && !h->forced_local))
5117 {
5118 if ((info->flags & DF_TEXTREL) == 0)
5119 {
5120 /* Look for relocations against read-only sections. */
5121 for (s = bfin_hash_entry (h)->pcrel_relocs_copied;
5122 s != NULL; s = s->next)
5123 if ((s->section->flags & SEC_READONLY) != 0)
5124 {
5125 info->flags |= DF_TEXTREL;
5126 break;
5127 }
5128 }
5129
5130 return TRUE;
5131 }
5132
5133 for (s = bfin_hash_entry (h)->pcrel_relocs_copied;
5134 s != NULL; s = s->next)
5135 s->section->size -= s->count * sizeof (Elf32_External_Rela);
5136
5137 return TRUE;
5138}
5139
0f64bb02
CM
5140static bfd_boolean
5141bfin_size_dynamic_sections (bfd * output_bfd ATTRIBUTE_UNUSED,
2c3fc389 5142 struct bfd_link_info *info)
0f64bb02
CM
5143{
5144 bfd *dynobj;
5145 asection *s;
5146 bfd_boolean relocs;
5147
5148 dynobj = elf_hash_table (info)->dynobj;
5149 BFD_ASSERT (dynobj != NULL);
5150
5151 if (elf_hash_table (info)->dynamic_sections_created)
5152 {
5153 /* Set the contents of the .interp section to the interpreter. */
9d45a7de 5154 if (bfd_link_executable (info) && !info->nointerp)
0f64bb02 5155 {
3d4d4302 5156 s = bfd_get_linker_section (dynobj, ".interp");
0f64bb02
CM
5157 BFD_ASSERT (s != NULL);
5158 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
5159 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
5160 }
5161 }
5162 else
5163 {
5164 /* We may have created entries in the .rela.got section.
5165 However, if we are not creating the dynamic sections, we will
5166 not actually use these entries. Reset the size of .rela.got,
5167 which will cause it to get stripped from the output file
5168 below. */
ce558b89 5169 s = elf_hash_table (info)->srelgot;
0f64bb02
CM
5170 if (s != NULL)
5171 s->size = 0;
5172 }
5173
5174 /* If this is a -Bsymbolic shared link, then we need to discard all
5175 PC relative relocs against symbols defined in a regular object.
5176 For the normal shared case we discard the PC relative relocs
5177 against symbols that have become local due to visibility changes.
5178 We allocated space for them in the check_relocs routine, but we
5179 will not fill them in in the relocate_section routine. */
0e1862bb 5180 if (bfd_link_pic (info))
0f64bb02 5181 elf_link_hash_traverse (elf_hash_table (info),
2c3fc389 5182 bfin_discard_copies, info);
0f64bb02
CM
5183
5184 /* The check_relocs and adjust_dynamic_symbol entry points have
5185 determined the sizes of the various dynamic sections. Allocate
5186 memory for them. */
5187 relocs = FALSE;
5188 for (s = dynobj->sections; s != NULL; s = s->next)
5189 {
5190 const char *name;
5191 bfd_boolean strip;
5192
5193 if ((s->flags & SEC_LINKER_CREATED) == 0)
5194 continue;
5195
5196 /* It's OK to base decisions on the section name, because none
5197 of the dynobj section names depend upon the input files. */
5198 name = bfd_get_section_name (dynobj, s);
5199
5200 strip = FALSE;
5201
0112cd26 5202 if (CONST_STRNEQ (name, ".rela"))
0f64bb02
CM
5203 {
5204 if (s->size == 0)
5205 {
5206 /* If we don't need this section, strip it from the
5207 output file. This is mostly to handle .rela.bss and
5208 .rela.plt. We must create both sections in
5209 create_dynamic_sections, because they must be created
5210 before the linker maps input sections to output
5211 sections. The linker does that before
5212 adjust_dynamic_symbol is called, and it is that
5213 function which decides whether anything needs to go
5214 into these sections. */
5215 strip = TRUE;
5216 }
5217 else
5218 {
5219 relocs = TRUE;
5220
5221 /* We use the reloc_count field as a counter if we need
5222 to copy relocs into the output file. */
5223 s->reloc_count = 0;
5224 }
5225 }
0112cd26 5226 else if (! CONST_STRNEQ (name, ".got"))
0f64bb02
CM
5227 {
5228 /* It's not one of our sections, so don't allocate space. */
5229 continue;
5230 }
5231
5232 if (strip)
5233 {
5234 s->flags |= SEC_EXCLUDE;
5235 continue;
5236 }
5237
5238 /* Allocate memory for the section contents. */
5239 /* FIXME: This should be a call to bfd_alloc not bfd_zalloc.
5240 Unused entries should be reclaimed before the section's contents
5241 are written out, but at the moment this does not happen. Thus in
5242 order to prevent writing out garbage, we initialise the section's
5243 contents to zero. */
5244 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
5245 if (s->contents == NULL && s->size != 0)
5246 return FALSE;
5247 }
5248
5249 if (elf_hash_table (info)->dynamic_sections_created)
5250 {
5251 /* Add some entries to the .dynamic section. We fill in the
5252 values later, in bfin_finish_dynamic_sections, but we
5253 must add the entries now so that we get the correct size for
5254 the .dynamic section. The DT_DEBUG entry is filled in by the
5255 dynamic linker and used by the debugger. */
5256#define add_dynamic_entry(TAG, VAL) \
5257 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
5258
0e1862bb 5259 if (!bfd_link_pic (info))
0f64bb02
CM
5260 {
5261 if (!add_dynamic_entry (DT_DEBUG, 0))
5262 return FALSE;
5263 }
5264
5265
5266 if (relocs)
5267 {
5268 if (!add_dynamic_entry (DT_RELA, 0)
5269 || !add_dynamic_entry (DT_RELASZ, 0)
5270 || !add_dynamic_entry (DT_RELAENT,
5271 sizeof (Elf32_External_Rela)))
5272 return FALSE;
5273 }
5274
5275 if ((info->flags & DF_TEXTREL) != 0)
5276 {
5277 if (!add_dynamic_entry (DT_TEXTREL, 0))
5278 return FALSE;
5279 }
5280 }
5281#undef add_dynamic_entry
5282
5283 return TRUE;
5284}
48d502e1 5285\f
0f64bb02
CM
5286/* Given a .data section and a .emreloc in-memory section, store
5287 relocation information into the .emreloc section which can be
5288 used at runtime to relocate the section. This is called by the
5289 linker when the --embedded-relocs switch is used. This is called
5290 after the add_symbols entry point has been called for all the
5291 objects, and before the final_link entry point is called. */
5292
5293bfd_boolean
2c3fc389
NC
5294bfd_bfin_elf32_create_embedded_relocs (bfd *abfd,
5295 struct bfd_link_info *info,
5296 asection *datasec,
5297 asection *relsec,
5298 char **errmsg)
0f64bb02
CM
5299{
5300 Elf_Internal_Shdr *symtab_hdr;
5301 Elf_Internal_Sym *isymbuf = NULL;
5302 Elf_Internal_Rela *internal_relocs = NULL;
5303 Elf_Internal_Rela *irel, *irelend;
5304 bfd_byte *p;
5305 bfd_size_type amt;
5306
0e1862bb 5307 BFD_ASSERT (! bfd_link_relocatable (info));
0f64bb02
CM
5308
5309 *errmsg = NULL;
5310
5311 if (datasec->reloc_count == 0)
5312 return TRUE;
5313
5314 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
5315
5316 /* Get a copy of the native relocations. */
5317 internal_relocs = (_bfd_elf_link_read_relocs
2c3fc389 5318 (abfd, datasec, NULL, (Elf_Internal_Rela *) NULL,
0f64bb02
CM
5319 info->keep_memory));
5320 if (internal_relocs == NULL)
5321 goto error_return;
5322
5323 amt = (bfd_size_type) datasec->reloc_count * 12;
5324 relsec->contents = (bfd_byte *) bfd_alloc (abfd, amt);
5325 if (relsec->contents == NULL)
5326 goto error_return;
5327
5328 p = relsec->contents;
5329
5330 irelend = internal_relocs + datasec->reloc_count;
5331 for (irel = internal_relocs; irel < irelend; irel++, p += 12)
5332 {
5333 asection *targetsec;
5334
5335 /* We are going to write a four byte longword into the runtime
5336 reloc section. The longword will be the address in the data
5337 section which must be relocated. It is followed by the name
5338 of the target section NUL-padded or truncated to 8
5339 characters. */
5340
5341 /* We can only relocate absolute longword relocs at run time. */
cb88ce9f 5342 if (ELF32_R_TYPE (irel->r_info) != (int) R_BFIN_BYTE4_DATA)
0f64bb02
CM
5343 {
5344 *errmsg = _("unsupported reloc type");
5345 bfd_set_error (bfd_error_bad_value);
5346 goto error_return;
5347 }
5348
5349 /* Get the target section referred to by the reloc. */
5350 if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
5351 {
5352 /* A local symbol. */
5353 Elf_Internal_Sym *isym;
5354
5355 /* Read this BFD's local symbols if we haven't done so already. */
5356 if (isymbuf == NULL)
5357 {
5358 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
5359 if (isymbuf == NULL)
5360 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
5361 symtab_hdr->sh_info, 0,
5362 NULL, NULL, NULL);
5363 if (isymbuf == NULL)
5364 goto error_return;
5365 }
5366
5367 isym = isymbuf + ELF32_R_SYM (irel->r_info);
5368 targetsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
5369 }
5370 else
5371 {
5372 unsigned long indx;
5373 struct elf_link_hash_entry *h;
5374
5375 /* An external symbol. */
5376 indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
5377 h = elf_sym_hashes (abfd)[indx];
5378 BFD_ASSERT (h != NULL);
5379 if (h->root.type == bfd_link_hash_defined
5380 || h->root.type == bfd_link_hash_defweak)
5381 targetsec = h->root.u.def.section;
5382 else
5383 targetsec = NULL;
5384 }
5385
5386 bfd_put_32 (abfd, irel->r_offset + datasec->output_offset, p);
5387 memset (p + 4, 0, 8);
5388 if (targetsec != NULL)
9ba4c445 5389 strncpy ((char *) p + 4, targetsec->output_section->name, 8);
0f64bb02
CM
5390 }
5391
5392 if (isymbuf != NULL && symtab_hdr->contents != (unsigned char *) isymbuf)
5393 free (isymbuf);
5394 if (internal_relocs != NULL
5395 && elf_section_data (datasec)->relocs != internal_relocs)
5396 free (internal_relocs);
5397 return TRUE;
5398
5399error_return:
5400 if (isymbuf != NULL && symtab_hdr->contents != (unsigned char *) isymbuf)
5401 free (isymbuf);
5402 if (internal_relocs != NULL
5403 && elf_section_data (datasec)->relocs != internal_relocs)
5404 free (internal_relocs);
5405 return FALSE;
5406}
b0a0b978
JZ
5407
5408struct bfd_elf_special_section const elf32_bfin_special_sections[] =
5409{
5410 { ".l1.text", 8, -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
5411 { ".l1.data", 8, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
5412 { NULL, 0, 0, 0, 0 }
5413};
5414
48d502e1 5415\f
6d00b590 5416#define TARGET_LITTLE_SYM bfin_elf32_vec
0f64bb02
CM
5417#define TARGET_LITTLE_NAME "elf32-bfin"
5418#define ELF_ARCH bfd_arch_bfin
ae95ffa6 5419#define ELF_TARGET_ID BFIN_ELF_DATA
3b55e94a 5420#define ELF_MACHINE_CODE EM_BLACKFIN
0f64bb02
CM
5421#define ELF_MAXPAGESIZE 0x1000
5422#define elf_symbol_leading_char '_'
5423
5424#define bfd_elf32_bfd_reloc_type_lookup bfin_bfd_reloc_type_lookup
157090f7
AM
5425#define bfd_elf32_bfd_reloc_name_lookup \
5426 bfin_bfd_reloc_name_lookup
0f64bb02
CM
5427#define elf_info_to_howto bfin_info_to_howto
5428#define elf_info_to_howto_rel 0
48d502e1 5429#define elf_backend_object_p elf32_bfin_object_p
0f64bb02
CM
5430
5431#define bfd_elf32_bfd_is_local_label_name \
5432 bfin_is_local_label_name
5433#define bfin_hash_table(p) \
5434 ((struct bfin_link_hash_table *) (p)->hash)
5435
5436
5437
5438#define elf_backend_create_dynamic_sections \
5439 _bfd_elf_create_dynamic_sections
5440#define bfd_elf32_bfd_link_hash_table_create \
5441 bfin_link_hash_table_create
5442#define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
5443
48d502e1 5444#define elf_backend_check_relocs bfin_check_relocs
0f64bb02
CM
5445#define elf_backend_adjust_dynamic_symbol \
5446 bfin_adjust_dynamic_symbol
5447#define elf_backend_size_dynamic_sections \
5448 bfin_size_dynamic_sections
5449#define elf_backend_relocate_section bfin_relocate_section
5450#define elf_backend_finish_dynamic_symbol \
5451 bfin_finish_dynamic_symbol
5452#define elf_backend_finish_dynamic_sections \
5453 bfin_finish_dynamic_sections
5454#define elf_backend_gc_mark_hook bfin_gc_mark_hook
0f64bb02
CM
5455#define bfd_elf32_bfd_merge_private_bfd_data \
5456 elf32_bfin_merge_private_bfd_data
5457#define bfd_elf32_bfd_set_private_flags \
5458 elf32_bfin_set_private_flags
5459#define bfd_elf32_bfd_print_private_bfd_data \
5460 elf32_bfin_print_private_bfd_data
781303ce
MF
5461#define elf_backend_final_write_processing \
5462 elf32_bfin_final_write_processing
0f64bb02 5463#define elf_backend_reloc_type_class elf32_bfin_reloc_type_class
04c3a755 5464#define elf_backend_stack_align 8
0f64bb02 5465#define elf_backend_can_gc_sections 1
b0a0b978 5466#define elf_backend_special_sections elf32_bfin_special_sections
0f64bb02
CM
5467#define elf_backend_can_refcount 1
5468#define elf_backend_want_got_plt 0
5469#define elf_backend_plt_readonly 1
5470#define elf_backend_want_plt_sym 0
5471#define elf_backend_got_header_size 12
5472#define elf_backend_rela_normal 1
5473
48d502e1
BS
5474#include "elf32-target.h"
5475
5476#undef TARGET_LITTLE_SYM
6d00b590 5477#define TARGET_LITTLE_SYM bfin_elf32_fdpic_vec
48d502e1
BS
5478#undef TARGET_LITTLE_NAME
5479#define TARGET_LITTLE_NAME "elf32-bfinfdpic"
5480#undef elf32_bed
5481#define elf32_bed elf32_bfinfdpic_bed
5482
48d502e1
BS
5483#undef elf_backend_got_header_size
5484#define elf_backend_got_header_size 0
5485
5486#undef elf_backend_relocate_section
5487#define elf_backend_relocate_section bfinfdpic_relocate_section
5488#undef elf_backend_check_relocs
5489#define elf_backend_check_relocs bfinfdpic_check_relocs
5490
5491#undef bfd_elf32_bfd_link_hash_table_create
5492#define bfd_elf32_bfd_link_hash_table_create \
5493 bfinfdpic_elf_link_hash_table_create
5494#undef elf_backend_always_size_sections
5495#define elf_backend_always_size_sections \
5496 elf32_bfinfdpic_always_size_sections
48d502e1
BS
5497
5498#undef elf_backend_create_dynamic_sections
5499#define elf_backend_create_dynamic_sections \
5500 elf32_bfinfdpic_create_dynamic_sections
5501#undef elf_backend_adjust_dynamic_symbol
5502#define elf_backend_adjust_dynamic_symbol \
5503 elf32_bfinfdpic_adjust_dynamic_symbol
5504#undef elf_backend_size_dynamic_sections
5505#define elf_backend_size_dynamic_sections \
5506 elf32_bfinfdpic_size_dynamic_sections
5507#undef elf_backend_finish_dynamic_symbol
5508#define elf_backend_finish_dynamic_symbol \
5509 elf32_bfinfdpic_finish_dynamic_symbol
5510#undef elf_backend_finish_dynamic_sections
5511#define elf_backend_finish_dynamic_sections \
5512 elf32_bfinfdpic_finish_dynamic_sections
5513
6a9adeca
BS
5514#undef elf_backend_discard_info
5515#define elf_backend_discard_info \
5516 bfinfdpic_elf_discard_info
48d502e1
BS
5517#undef elf_backend_can_make_relative_eh_frame
5518#define elf_backend_can_make_relative_eh_frame \
5519 bfinfdpic_elf_use_relative_eh_frame
5520#undef elf_backend_can_make_lsda_relative_eh_frame
5521#define elf_backend_can_make_lsda_relative_eh_frame \
5522 bfinfdpic_elf_use_relative_eh_frame
5523#undef elf_backend_encode_eh_address
5524#define elf_backend_encode_eh_address \
5525 bfinfdpic_elf_encode_eh_address
5526
5527#undef elf_backend_may_use_rel_p
5528#define elf_backend_may_use_rel_p 1
5529#undef elf_backend_may_use_rela_p
5530#define elf_backend_may_use_rela_p 1
5531/* We use REL for dynamic relocations only. */
5532#undef elf_backend_default_use_rela_p
5533#define elf_backend_default_use_rela_p 1
5534
5535#undef elf_backend_omit_section_dynsym
5536#define elf_backend_omit_section_dynsym _bfinfdpic_link_omit_section_dynsym
0f64bb02
CM
5537
5538#include "elf32-target.h"
This page took 0.867169 seconds and 4 git commands to generate.