* elf32-sh.c (sh_elf_create_dynamic_sections): Don't create .rela
[deliverable/binutils-gdb.git] / bfd / elf32-sh.c
CommitLineData
ef230218 1/* Renesas / SuperH SH specific support for 32-bit ELF
22d606e9 2 Copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005,
3d301fdc
AM
3 2006, 2007, 2008, 2009, 2010, 2011, 2012
4 Free Software Foundation, Inc.
252b5132
RH
5 Contributed by Ian Lance Taylor, Cygnus Support.
6
571fe01f 7 This file is part of BFD, the Binary File Descriptor library.
252b5132 8
571fe01f
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
571fe01f 12 (at your option) any later version.
252b5132 13
571fe01f
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
252b5132 18
571fe01f
NC
19 You should have received a copy of the GNU General Public License
20 along with this program; if not, write to the Free Software
cd123cb7
NC
21 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
22 MA 02110-1301, USA. */
252b5132 23
252b5132 24#include "sysdep.h"
3db64b00 25#include "bfd.h"
252b5132
RH
26#include "bfdlink.h"
27#include "libbfd.h"
28#include "elf-bfd.h"
55e6e397 29#include "elf-vxworks.h"
252b5132 30#include "elf/sh.h"
8e45593f 31#include "dwarf2.h"
f6f9408f 32#include "libiberty.h"
871ec896 33#include "../opcodes/sh-opc.h"
252b5132
RH
34
35static bfd_reloc_status_type sh_elf_reloc
09fd220b 36 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
252b5132 37static bfd_reloc_status_type sh_elf_ignore_reloc
09fd220b 38 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
b34976b6 39static bfd_boolean sh_elf_relax_delete_bytes
09fd220b 40 (bfd *, asection *, bfd_vma, int);
b34976b6 41static bfd_boolean sh_elf_align_loads
09fd220b 42 (bfd *, asection *, Elf_Internal_Rela *, bfd_byte *, bfd_boolean *);
85fbca6a 43#ifndef SH64_ELF
b34976b6 44static bfd_boolean sh_elf_swap_insns
09fd220b 45 (bfd *, asection *, void *, bfd_byte *, bfd_vma);
85fbca6a 46#endif
3376eaf5 47static int sh_elf_optimized_tls_reloc
09fd220b 48 (struct bfd_link_info *, int, int);
3376eaf5 49static bfd_vma dtpoff_base
09fd220b 50 (struct bfd_link_info *);
267fb3c1 51static bfd_vma tpoff
09fd220b 52 (struct bfd_link_info *, bfd_vma);
37c644f2
AO
53
54/* The name of the dynamic interpreter. This is put in the .interp
55 section. */
56
57#define ELF_DYNAMIC_INTERPRETER "/usr/lib/libc.so.1"
252b5132 58
8e45593f
NC
59/* FDPIC binaries have a default 128K stack. */
60#define DEFAULT_STACK_SIZE 0x20000
61
55e6e397 62#define MINUS_ONE ((bfd_vma) 0 - 1)
8e45593f
NC
63
64/* Decide whether a reference to a symbol can be resolved locally or
65 not. If the symbol is protected, we want the local address, but
66 its function descriptor must be assigned by the dynamic linker. */
67#define SYMBOL_FUNCDESC_LOCAL(INFO, H) \
68 (SYMBOL_REFERENCES_LOCAL (INFO, H) \
69 || ! elf_hash_table (INFO)->dynamic_sections_created)
55e6e397
RS
70\f
71#define SH_PARTIAL32 TRUE
72#define SH_SRC_MASK32 0xffffffff
73#define SH_ELF_RELOC sh_elf_reloc
38b1a46c
NC
74static reloc_howto_type sh_elf_howto_table[] =
75{
55e6e397
RS
76#include "elf32-sh-relocs.h"
77};
fbca6ad9 78
55e6e397
RS
79#define SH_PARTIAL32 FALSE
80#define SH_SRC_MASK32 0
81#define SH_ELF_RELOC bfd_elf_generic_reloc
82static reloc_howto_type sh_vxworks_howto_table[] =
83{
84#include "elf32-sh-relocs.h"
85};
86\f
87/* Return true if OUTPUT_BFD is a VxWorks object. */
fbca6ad9 88
55e6e397 89static bfd_boolean
527a23b8 90vxworks_object_p (bfd *abfd ATTRIBUTE_UNUSED)
55e6e397 91{
527a23b8 92#if !defined INCLUDE_SHMEDIA && !defined SH_TARGET_ALREADY_DEFINED
55e6e397
RS
93 extern const bfd_target bfd_elf32_shlvxworks_vec;
94 extern const bfd_target bfd_elf32_shvxworks_vec;
fbca6ad9 95
55e6e397
RS
96 return (abfd->xvec == &bfd_elf32_shlvxworks_vec
97 || abfd->xvec == &bfd_elf32_shvxworks_vec);
527a23b8
NC
98#else
99 return FALSE;
100#endif
55e6e397 101}
fbca6ad9 102
8e45593f
NC
103/* Return true if OUTPUT_BFD is an FDPIC object. */
104
105static bfd_boolean
106fdpic_object_p (bfd *abfd ATTRIBUTE_UNUSED)
107{
108#if !defined INCLUDE_SHMEDIA && !defined SH_TARGET_ALREADY_DEFINED
109 extern const bfd_target bfd_elf32_shfd_vec;
110 extern const bfd_target bfd_elf32_shbfd_vec;
111
112 return (abfd->xvec == &bfd_elf32_shfd_vec
113 || abfd->xvec == &bfd_elf32_shbfd_vec);
114#else
115 return FALSE;
116#endif
117}
118
55e6e397 119/* Return the howto table for ABFD. */
fbca6ad9 120
55e6e397
RS
121static reloc_howto_type *
122get_howto_table (bfd *abfd)
123{
124 if (vxworks_object_p (abfd))
125 return sh_vxworks_howto_table;
126 return sh_elf_howto_table;
127}
252b5132 128
015551fc 129static bfd_reloc_status_type
09fd220b
KK
130sh_elf_reloc_loop (int r_type ATTRIBUTE_UNUSED, bfd *input_bfd,
131 asection *input_section, bfd_byte *contents,
132 bfd_vma addr, asection *symbol_section,
133 bfd_vma start, bfd_vma end)
015551fc
JR
134{
135 static bfd_vma last_addr;
00fdaf47 136 static asection *last_symbol_section;
015551fc
JR
137 bfd_byte *start_ptr, *ptr, *last_ptr;
138 int diff, cum_diff;
139 bfd_signed_vma x;
140 int insn;
141
142 /* Sanity check the address. */
07515404 143 if (addr > bfd_get_section_limit (input_bfd, input_section))
015551fc
JR
144 return bfd_reloc_outofrange;
145
146 /* We require the start and end relocations to be processed consecutively -
147 although we allow then to be processed forwards or backwards. */
148 if (! last_addr)
149 {
150 last_addr = addr;
151 last_symbol_section = symbol_section;
152 return bfd_reloc_ok;
153 }
154 if (last_addr != addr)
155 abort ();
156 last_addr = 0;
157
158 if (! symbol_section || last_symbol_section != symbol_section || end < start)
159 return bfd_reloc_outofrange;
160
161 /* Get the symbol_section contents. */
162 if (symbol_section != input_section)
163 {
164 if (elf_section_data (symbol_section)->this_hdr.contents != NULL)
165 contents = elf_section_data (symbol_section)->this_hdr.contents;
166 else
167 {
eea6121a
AM
168 if (!bfd_malloc_and_get_section (input_bfd, symbol_section,
169 &contents))
015551fc 170 {
eea6121a
AM
171 if (contents != NULL)
172 free (contents);
015551fc
JR
173 return bfd_reloc_outofrange;
174 }
175 }
176 }
177#define IS_PPI(PTR) ((bfd_get_16 (input_bfd, (PTR)) & 0xfc00) == 0xf800)
178 start_ptr = contents + start;
179 for (cum_diff = -6, ptr = contents + end; cum_diff < 0 && ptr > start_ptr;)
180 {
181 for (last_ptr = ptr, ptr -= 4; ptr >= start_ptr && IS_PPI (ptr);)
182 ptr -= 2;
183 ptr += 2;
61ff1804 184 diff = (last_ptr - ptr) >> 1;
015551fc
JR
185 cum_diff += diff & 1;
186 cum_diff += diff;
187 }
188 /* Calculate the start / end values to load into rs / re minus four -
189 so that will cancel out the four we would otherwise have to add to
190 addr to get the value to subtract in order to get relative addressing. */
191 if (cum_diff >= 0)
192 {
193 start -= 4;
194 end = (ptr + cum_diff * 2) - contents;
195 }
196 else
197 {
198 bfd_vma start0 = start - 4;
199
a0fc8ba1 200 while (start0 && IS_PPI (contents + start0))
015551fc
JR
201 start0 -= 2;
202 start0 = start - 2 - ((start - start0) & 2);
203 start = start0 - cum_diff - 2;
204 end = start0;
205 }
206
6cdc0ccc
AM
207 if (contents != NULL
208 && elf_section_data (symbol_section)->this_hdr.contents != contents)
209 free (contents);
015551fc
JR
210
211 insn = bfd_get_16 (input_bfd, contents + addr);
212
213 x = (insn & 0x200 ? end : start) - addr;
214 if (input_section != symbol_section)
215 x += ((symbol_section->output_section->vma + symbol_section->output_offset)
216 - (input_section->output_section->vma
217 + input_section->output_offset));
218 x >>= 1;
219 if (x < -128 || x > 127)
220 return bfd_reloc_overflow;
221
61ff1804 222 x = (insn & ~0xff) | (x & 0xff);
dc810e39 223 bfd_put_16 (input_bfd, (bfd_vma) x, contents + addr);
015551fc
JR
224
225 return bfd_reloc_ok;
226}
227
228/* This function is used for normal relocs. This used to be like the COFF
252b5132
RH
229 function, and is almost certainly incorrect for other ELF targets. */
230
231static bfd_reloc_status_type
09fd220b
KK
232sh_elf_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol_in,
233 void *data, asection *input_section, bfd *output_bfd,
234 char **error_message ATTRIBUTE_UNUSED)
252b5132
RH
235{
236 unsigned long insn;
237 bfd_vma sym_value;
238 enum elf_sh_reloc_type r_type;
239 bfd_vma addr = reloc_entry->address;
240 bfd_byte *hit_data = addr + (bfd_byte *) data;
241
242 r_type = (enum elf_sh_reloc_type) reloc_entry->howto->type;
243
244 if (output_bfd != NULL)
245 {
246 /* Partial linking--do nothing. */
247 reloc_entry->address += input_section->output_offset;
248 return bfd_reloc_ok;
249 }
250
251 /* Almost all relocs have to do with relaxing. If any work must be
252 done for them, it has been done in sh_relax_section. */
015551fc 253 if (r_type == R_SH_IND12W && (symbol_in->flags & BSF_LOCAL) != 0)
252b5132
RH
254 return bfd_reloc_ok;
255
256 if (symbol_in != NULL
257 && bfd_is_und_section (symbol_in->section))
258 return bfd_reloc_undefined;
259
260 if (bfd_is_com_section (symbol_in->section))
435b1e90
KH
261 sym_value = 0;
262 else
252b5132
RH
263 sym_value = (symbol_in->value +
264 symbol_in->section->output_section->vma +
265 symbol_in->section->output_offset);
266
267 switch (r_type)
268 {
269 case R_SH_DIR32:
270 insn = bfd_get_32 (abfd, hit_data);
271 insn += sym_value + reloc_entry->addend;
dc810e39 272 bfd_put_32 (abfd, (bfd_vma) insn, hit_data);
252b5132
RH
273 break;
274 case R_SH_IND12W:
275 insn = bfd_get_16 (abfd, hit_data);
276 sym_value += reloc_entry->addend;
277 sym_value -= (input_section->output_section->vma
278 + input_section->output_offset
279 + addr
280 + 4);
281 sym_value += (insn & 0xfff) << 1;
282 if (insn & 0x800)
283 sym_value -= 0x1000;
284 insn = (insn & 0xf000) | (sym_value & 0xfff);
dc810e39 285 bfd_put_16 (abfd, (bfd_vma) insn, hit_data);
252b5132
RH
286 if (sym_value < (bfd_vma) -0x1000 || sym_value >= 0x1000)
287 return bfd_reloc_overflow;
288 break;
289 default:
290 abort ();
291 break;
292 }
293
294 return bfd_reloc_ok;
295}
296
297/* This function is used for relocs which are only used for relaxing,
298 which the linker should otherwise ignore. */
299
300static bfd_reloc_status_type
09fd220b
KK
301sh_elf_ignore_reloc (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc_entry,
302 asymbol *symbol ATTRIBUTE_UNUSED,
303 void *data ATTRIBUTE_UNUSED, asection *input_section,
304 bfd *output_bfd,
305 char **error_message ATTRIBUTE_UNUSED)
252b5132
RH
306{
307 if (output_bfd != NULL)
308 reloc_entry->address += input_section->output_offset;
309 return bfd_reloc_ok;
310}
311
312/* This structure is used to map BFD reloc codes to SH ELF relocs. */
313
38b1a46c
NC
314struct elf_reloc_map
315{
252b5132
RH
316 bfd_reloc_code_real_type bfd_reloc_val;
317 unsigned char elf_reloc_val;
318};
319
320/* An array mapping BFD reloc codes to SH ELF relocs. */
321
38b1a46c
NC
322static const struct elf_reloc_map sh_reloc_map[] =
323{
252b5132
RH
324 { BFD_RELOC_NONE, R_SH_NONE },
325 { BFD_RELOC_32, R_SH_DIR32 },
d38eb334
DD
326 { BFD_RELOC_16, R_SH_DIR16 },
327 { BFD_RELOC_8, R_SH_DIR8 },
252b5132
RH
328 { BFD_RELOC_CTOR, R_SH_DIR32 },
329 { BFD_RELOC_32_PCREL, R_SH_REL32 },
330 { BFD_RELOC_SH_PCDISP8BY2, R_SH_DIR8WPN },
331 { BFD_RELOC_SH_PCDISP12BY2, R_SH_IND12W },
332 { BFD_RELOC_SH_PCRELIMM8BY2, R_SH_DIR8WPZ },
333 { BFD_RELOC_SH_PCRELIMM8BY4, R_SH_DIR8WPL },
334 { BFD_RELOC_8_PCREL, R_SH_SWITCH8 },
335 { BFD_RELOC_SH_SWITCH16, R_SH_SWITCH16 },
336 { BFD_RELOC_SH_SWITCH32, R_SH_SWITCH32 },
337 { BFD_RELOC_SH_USES, R_SH_USES },
338 { BFD_RELOC_SH_COUNT, R_SH_COUNT },
339 { BFD_RELOC_SH_ALIGN, R_SH_ALIGN },
340 { BFD_RELOC_SH_CODE, R_SH_CODE },
341 { BFD_RELOC_SH_DATA, R_SH_DATA },
342 { BFD_RELOC_SH_LABEL, R_SH_LABEL },
343 { BFD_RELOC_VTABLE_INHERIT, R_SH_GNU_VTINHERIT },
344 { BFD_RELOC_VTABLE_ENTRY, R_SH_GNU_VTENTRY },
015551fc
JR
345 { BFD_RELOC_SH_LOOP_START, R_SH_LOOP_START },
346 { BFD_RELOC_SH_LOOP_END, R_SH_LOOP_END },
3376eaf5
KK
347 { BFD_RELOC_SH_TLS_GD_32, R_SH_TLS_GD_32 },
348 { BFD_RELOC_SH_TLS_LD_32, R_SH_TLS_LD_32 },
349 { BFD_RELOC_SH_TLS_LDO_32, R_SH_TLS_LDO_32 },
350 { BFD_RELOC_SH_TLS_IE_32, R_SH_TLS_IE_32 },
351 { BFD_RELOC_SH_TLS_LE_32, R_SH_TLS_LE_32 },
352 { BFD_RELOC_SH_TLS_DTPMOD32, R_SH_TLS_DTPMOD32 },
353 { BFD_RELOC_SH_TLS_DTPOFF32, R_SH_TLS_DTPOFF32 },
354 { BFD_RELOC_SH_TLS_TPOFF32, R_SH_TLS_TPOFF32 },
37c644f2
AO
355 { BFD_RELOC_32_GOT_PCREL, R_SH_GOT32 },
356 { BFD_RELOC_32_PLT_PCREL, R_SH_PLT32 },
357 { BFD_RELOC_SH_COPY, R_SH_COPY },
358 { BFD_RELOC_SH_GLOB_DAT, R_SH_GLOB_DAT },
359 { BFD_RELOC_SH_JMP_SLOT, R_SH_JMP_SLOT },
360 { BFD_RELOC_SH_RELATIVE, R_SH_RELATIVE },
361 { BFD_RELOC_32_GOTOFF, R_SH_GOTOFF },
362 { BFD_RELOC_SH_GOTPC, R_SH_GOTPC },
fbca6ad9 363 { BFD_RELOC_SH_GOTPLT32, R_SH_GOTPLT32 },
8e45593f
NC
364 { BFD_RELOC_SH_GOT20, R_SH_GOT20 },
365 { BFD_RELOC_SH_GOTOFF20, R_SH_GOTOFF20 },
366 { BFD_RELOC_SH_GOTFUNCDESC, R_SH_GOTFUNCDESC },
367 { BFD_RELOC_SH_GOTFUNCDESC20, R_SH_GOTFUNCDESC20 },
368 { BFD_RELOC_SH_GOTOFFFUNCDESC, R_SH_GOTOFFFUNCDESC },
369 { BFD_RELOC_SH_GOTOFFFUNCDESC20, R_SH_GOTOFFFUNCDESC20 },
370 { BFD_RELOC_SH_FUNCDESC, R_SH_FUNCDESC },
fbca6ad9
AO
371#ifdef INCLUDE_SHMEDIA
372 { BFD_RELOC_SH_GOT_LOW16, R_SH_GOT_LOW16 },
373 { BFD_RELOC_SH_GOT_MEDLOW16, R_SH_GOT_MEDLOW16 },
374 { BFD_RELOC_SH_GOT_MEDHI16, R_SH_GOT_MEDHI16 },
375 { BFD_RELOC_SH_GOT_HI16, R_SH_GOT_HI16 },
376 { BFD_RELOC_SH_GOTPLT_LOW16, R_SH_GOTPLT_LOW16 },
377 { BFD_RELOC_SH_GOTPLT_MEDLOW16, R_SH_GOTPLT_MEDLOW16 },
378 { BFD_RELOC_SH_GOTPLT_MEDHI16, R_SH_GOTPLT_MEDHI16 },
379 { BFD_RELOC_SH_GOTPLT_HI16, R_SH_GOTPLT_HI16 },
380 { BFD_RELOC_SH_PLT_LOW16, R_SH_PLT_LOW16 },
381 { BFD_RELOC_SH_PLT_MEDLOW16, R_SH_PLT_MEDLOW16 },
382 { BFD_RELOC_SH_PLT_MEDHI16, R_SH_PLT_MEDHI16 },
383 { BFD_RELOC_SH_PLT_HI16, R_SH_PLT_HI16 },
384 { BFD_RELOC_SH_GOTOFF_LOW16, R_SH_GOTOFF_LOW16 },
385 { BFD_RELOC_SH_GOTOFF_MEDLOW16, R_SH_GOTOFF_MEDLOW16 },
386 { BFD_RELOC_SH_GOTOFF_MEDHI16, R_SH_GOTOFF_MEDHI16 },
387 { BFD_RELOC_SH_GOTOFF_HI16, R_SH_GOTOFF_HI16 },
388 { BFD_RELOC_SH_GOTPC_LOW16, R_SH_GOTPC_LOW16 },
389 { BFD_RELOC_SH_GOTPC_MEDLOW16, R_SH_GOTPC_MEDLOW16 },
390 { BFD_RELOC_SH_GOTPC_MEDHI16, R_SH_GOTPC_MEDHI16 },
391 { BFD_RELOC_SH_GOTPC_HI16, R_SH_GOTPC_HI16 },
392 { BFD_RELOC_SH_COPY64, R_SH_COPY64 },
393 { BFD_RELOC_SH_GLOB_DAT64, R_SH_GLOB_DAT64 },
394 { BFD_RELOC_SH_JMP_SLOT64, R_SH_JMP_SLOT64 },
395 { BFD_RELOC_SH_RELATIVE64, R_SH_RELATIVE64 },
396 { BFD_RELOC_SH_GOT10BY4, R_SH_GOT10BY4 },
397 { BFD_RELOC_SH_GOT10BY8, R_SH_GOT10BY8 },
398 { BFD_RELOC_SH_GOTPLT10BY4, R_SH_GOTPLT10BY4 },
399 { BFD_RELOC_SH_GOTPLT10BY8, R_SH_GOTPLT10BY8 },
400 { BFD_RELOC_SH_PT_16, R_SH_PT_16 },
401 { BFD_RELOC_SH_SHMEDIA_CODE, R_SH_SHMEDIA_CODE },
402 { BFD_RELOC_SH_IMMU5, R_SH_DIR5U },
403 { BFD_RELOC_SH_IMMS6, R_SH_DIR6S },
404 { BFD_RELOC_SH_IMMU6, R_SH_DIR6U },
405 { BFD_RELOC_SH_IMMS10, R_SH_DIR10S },
406 { BFD_RELOC_SH_IMMS10BY2, R_SH_DIR10SW },
407 { BFD_RELOC_SH_IMMS10BY4, R_SH_DIR10SL },
408 { BFD_RELOC_SH_IMMS10BY8, R_SH_DIR10SQ },
409 { BFD_RELOC_SH_IMMS16, R_SH_IMMS16 },
410 { BFD_RELOC_SH_IMMU16, R_SH_IMMU16 },
411 { BFD_RELOC_SH_IMM_LOW16, R_SH_IMM_LOW16 },
412 { BFD_RELOC_SH_IMM_LOW16_PCREL, R_SH_IMM_LOW16_PCREL },
413 { BFD_RELOC_SH_IMM_MEDLOW16, R_SH_IMM_MEDLOW16 },
414 { BFD_RELOC_SH_IMM_MEDLOW16_PCREL, R_SH_IMM_MEDLOW16_PCREL },
415 { BFD_RELOC_SH_IMM_MEDHI16, R_SH_IMM_MEDHI16 },
416 { BFD_RELOC_SH_IMM_MEDHI16_PCREL, R_SH_IMM_MEDHI16_PCREL },
417 { BFD_RELOC_SH_IMM_HI16, R_SH_IMM_HI16 },
418 { BFD_RELOC_SH_IMM_HI16_PCREL, R_SH_IMM_HI16_PCREL },
419 { BFD_RELOC_64, R_SH_64 },
420 { BFD_RELOC_64_PCREL, R_SH_64_PCREL },
421#endif /* not INCLUDE_SHMEDIA */
252b5132
RH
422};
423
424/* Given a BFD reloc code, return the howto structure for the
55e6e397 425 corresponding SH ELF reloc. */
252b5132
RH
426
427static reloc_howto_type *
55e6e397 428sh_elf_reloc_type_lookup (bfd *abfd, bfd_reloc_code_real_type code)
252b5132
RH
429{
430 unsigned int i;
431
432 for (i = 0; i < sizeof (sh_reloc_map) / sizeof (struct elf_reloc_map); i++)
433 {
434 if (sh_reloc_map[i].bfd_reloc_val == code)
55e6e397 435 return get_howto_table (abfd) + (int) sh_reloc_map[i].elf_reloc_val;
252b5132
RH
436 }
437
438 return NULL;
439}
440
157090f7
AM
441static reloc_howto_type *
442sh_elf_reloc_name_lookup (bfd *abfd, const char *r_name)
443{
444 unsigned int i;
445
446 if (vxworks_object_p (abfd))
447 {
448 for (i = 0;
449 i < (sizeof (sh_vxworks_howto_table)
450 / sizeof (sh_vxworks_howto_table[0]));
451 i++)
452 if (sh_vxworks_howto_table[i].name != NULL
453 && strcasecmp (sh_vxworks_howto_table[i].name, r_name) == 0)
454 return &sh_vxworks_howto_table[i];
455 }
456 else
457 {
458 for (i = 0;
459 i < (sizeof (sh_elf_howto_table)
460 / sizeof (sh_elf_howto_table[0]));
461 i++)
462 if (sh_elf_howto_table[i].name != NULL
463 && strcasecmp (sh_elf_howto_table[i].name, r_name) == 0)
464 return &sh_elf_howto_table[i];
465 }
466
467 return NULL;
468}
469
252b5132
RH
470/* Given an ELF reloc, fill in the howto field of a relent. */
471
472static void
55e6e397 473sh_elf_info_to_howto (bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst)
252b5132
RH
474{
475 unsigned int r;
476
477 r = ELF32_R_TYPE (dst->r_info);
478
479 BFD_ASSERT (r < (unsigned int) R_SH_max);
480 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC || r > R_SH_LAST_INVALID_RELOC);
06bb75c1 481 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC_2 || r > R_SH_LAST_INVALID_RELOC_2);
fbca6ad9
AO
482 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC_3 || r > R_SH_LAST_INVALID_RELOC_3);
483 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC_4 || r > R_SH_LAST_INVALID_RELOC_4);
3376eaf5 484 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC_5 || r > R_SH_LAST_INVALID_RELOC_5);
8e45593f 485 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC_6 || r > R_SH_LAST_INVALID_RELOC_6);
252b5132 486
55e6e397 487 cache_ptr->howto = get_howto_table (abfd) + r;
252b5132
RH
488}
489\f
490/* This function handles relaxing for SH ELF. See the corresponding
491 function in coff-sh.c for a description of what this does. FIXME:
492 There is a lot of duplication here between this code and the COFF
493 specific code. The format of relocs and symbols is wound deeply
494 into this code, but it would still be better if the duplication
495 could be eliminated somehow. Note in particular that although both
496 functions use symbols like R_SH_CODE, those symbols have different
497 values; in coff-sh.c they come from include/coff/sh.h, whereas here
498 they come from enum elf_sh_reloc_type in include/elf/sh.h. */
499
b34976b6 500static bfd_boolean
09fd220b
KK
501sh_elf_relax_section (bfd *abfd, asection *sec,
502 struct bfd_link_info *link_info, bfd_boolean *again)
252b5132
RH
503{
504 Elf_Internal_Shdr *symtab_hdr;
505 Elf_Internal_Rela *internal_relocs;
b34976b6 506 bfd_boolean have_code;
252b5132
RH
507 Elf_Internal_Rela *irel, *irelend;
508 bfd_byte *contents = NULL;
6cdc0ccc 509 Elf_Internal_Sym *isymbuf = NULL;
252b5132 510
b34976b6 511 *again = FALSE;
252b5132 512
1049f94e 513 if (link_info->relocatable
252b5132
RH
514 || (sec->flags & SEC_RELOC) == 0
515 || sec->reloc_count == 0)
b34976b6 516 return TRUE;
252b5132 517
fbca6ad9
AO
518#ifdef INCLUDE_SHMEDIA
519 if (elf_section_data (sec)->this_hdr.sh_flags
520 & (SHF_SH5_ISA32 | SHF_SH5_ISA32_MIXED))
521 {
b34976b6 522 return TRUE;
fbca6ad9
AO
523 }
524#endif
525
0ffa91dd 526 symtab_hdr = &elf_symtab_hdr (abfd);
252b5132 527
45d6a902 528 internal_relocs = (_bfd_elf_link_read_relocs
09fd220b 529 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
252b5132
RH
530 link_info->keep_memory));
531 if (internal_relocs == NULL)
532 goto error_return;
252b5132 533
b34976b6 534 have_code = FALSE;
252b5132
RH
535
536 irelend = internal_relocs + sec->reloc_count;
537 for (irel = internal_relocs; irel < irelend; irel++)
538 {
539 bfd_vma laddr, paddr, symval;
540 unsigned short insn;
541 Elf_Internal_Rela *irelfn, *irelscan, *irelcount;
542 bfd_signed_vma foff;
543
544 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_CODE)
b34976b6 545 have_code = TRUE;
252b5132
RH
546
547 if (ELF32_R_TYPE (irel->r_info) != (int) R_SH_USES)
548 continue;
549
550 /* Get the section contents. */
551 if (contents == NULL)
552 {
553 if (elf_section_data (sec)->this_hdr.contents != NULL)
554 contents = elf_section_data (sec)->this_hdr.contents;
555 else
556 {
eea6121a 557 if (!bfd_malloc_and_get_section (abfd, sec, &contents))
252b5132
RH
558 goto error_return;
559 }
560 }
561
562 /* The r_addend field of the R_SH_USES reloc will point us to
067653c5
AM
563 the register load. The 4 is because the r_addend field is
564 computed as though it were a jump offset, which are based
565 from 4 bytes after the jump instruction. */
252b5132 566 laddr = irel->r_offset + 4 + irel->r_addend;
eea6121a 567 if (laddr >= sec->size)
252b5132 568 {
d003868e
AM
569 (*_bfd_error_handler) (_("%B: 0x%lx: warning: bad R_SH_USES offset"),
570 abfd,
252b5132
RH
571 (unsigned long) irel->r_offset);
572 continue;
573 }
574 insn = bfd_get_16 (abfd, contents + laddr);
575
576 /* If the instruction is not mov.l NN,rN, we don't know what to
067653c5 577 do. */
252b5132
RH
578 if ((insn & 0xf000) != 0xd000)
579 {
580 ((*_bfd_error_handler)
d003868e
AM
581 (_("%B: 0x%lx: warning: R_SH_USES points to unrecognized insn 0x%x"),
582 abfd, (unsigned long) irel->r_offset, insn));
252b5132
RH
583 continue;
584 }
585
586 /* Get the address from which the register is being loaded. The
99e4ae17
AJ
587 displacement in the mov.l instruction is quadrupled. It is a
588 displacement from four bytes after the movl instruction, but,
589 before adding in the PC address, two least significant bits
590 of the PC are cleared. We assume that the section is aligned
591 on a four byte boundary. */
252b5132
RH
592 paddr = insn & 0xff;
593 paddr *= 4;
dc810e39 594 paddr += (laddr + 4) &~ (bfd_vma) 3;
eea6121a 595 if (paddr >= sec->size)
252b5132
RH
596 {
597 ((*_bfd_error_handler)
d003868e
AM
598 (_("%B: 0x%lx: warning: bad R_SH_USES load offset"),
599 abfd, (unsigned long) irel->r_offset));
252b5132
RH
600 continue;
601 }
602
603 /* Get the reloc for the address from which the register is
067653c5
AM
604 being loaded. This reloc will tell us which function is
605 actually being called. */
252b5132
RH
606 for (irelfn = internal_relocs; irelfn < irelend; irelfn++)
607 if (irelfn->r_offset == paddr
608 && ELF32_R_TYPE (irelfn->r_info) == (int) R_SH_DIR32)
609 break;
610 if (irelfn >= irelend)
611 {
612 ((*_bfd_error_handler)
d003868e
AM
613 (_("%B: 0x%lx: warning: could not find expected reloc"),
614 abfd, (unsigned long) paddr));
252b5132
RH
615 continue;
616 }
617
618 /* Read this BFD's symbols if we haven't done so already. */
6cdc0ccc 619 if (isymbuf == NULL && symtab_hdr->sh_info != 0)
252b5132 620 {
6cdc0ccc
AM
621 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
622 if (isymbuf == NULL)
623 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
624 symtab_hdr->sh_info, 0,
625 NULL, NULL, NULL);
626 if (isymbuf == NULL)
627 goto error_return;
252b5132
RH
628 }
629
630 /* Get the value of the symbol referred to by the reloc. */
631 if (ELF32_R_SYM (irelfn->r_info) < symtab_hdr->sh_info)
632 {
9ad5cbcf 633 /* A local symbol. */
6cdc0ccc 634 Elf_Internal_Sym *isym;
252b5132 635
6cdc0ccc
AM
636 isym = isymbuf + ELF32_R_SYM (irelfn->r_info);
637 if (isym->st_shndx
d426c6b0 638 != (unsigned int) _bfd_elf_section_from_bfd_section (abfd, sec))
252b5132
RH
639 {
640 ((*_bfd_error_handler)
d003868e
AM
641 (_("%B: 0x%lx: warning: symbol in unexpected section"),
642 abfd, (unsigned long) paddr));
252b5132
RH
643 continue;
644 }
645
6cdc0ccc 646 symval = (isym->st_value
252b5132
RH
647 + sec->output_section->vma
648 + sec->output_offset);
649 }
650 else
651 {
652 unsigned long indx;
653 struct elf_link_hash_entry *h;
654
655 indx = ELF32_R_SYM (irelfn->r_info) - symtab_hdr->sh_info;
656 h = elf_sym_hashes (abfd)[indx];
657 BFD_ASSERT (h != NULL);
658 if (h->root.type != bfd_link_hash_defined
659 && h->root.type != bfd_link_hash_defweak)
660 {
661 /* This appears to be a reference to an undefined
067653c5
AM
662 symbol. Just ignore it--it will be caught by the
663 regular reloc processing. */
252b5132
RH
664 continue;
665 }
666
667 symval = (h->root.u.def.value
668 + h->root.u.def.section->output_section->vma
669 + h->root.u.def.section->output_offset);
670 }
671
55e6e397
RS
672 if (get_howto_table (abfd)[R_SH_DIR32].partial_inplace)
673 symval += bfd_get_32 (abfd, contents + paddr);
674 else
675 symval += irelfn->r_addend;
252b5132
RH
676
677 /* See if this function call can be shortened. */
678 foff = (symval
679 - (irel->r_offset
680 + sec->output_section->vma
681 + sec->output_offset
682 + 4));
f725025b
DD
683 /* A branch to an address beyond ours might be increased by an
684 .align that doesn't move when bytes behind us are deleted.
685 So, we add some slop in this calculation to allow for
686 that. */
687 if (foff < -0x1000 || foff >= 0x1000 - 8)
252b5132
RH
688 {
689 /* After all that work, we can't shorten this function call. */
690 continue;
691 }
692
693 /* Shorten the function call. */
694
695 /* For simplicity of coding, we are going to modify the section
696 contents, the section relocs, and the BFD symbol table. We
697 must tell the rest of the code not to free up this
698 information. It would be possible to instead create a table
699 of changes which have to be made, as is done in coff-mips.c;
700 that would be more work, but would require less memory when
701 the linker is run. */
702
703 elf_section_data (sec)->relocs = internal_relocs;
252b5132 704 elf_section_data (sec)->this_hdr.contents = contents;
6cdc0ccc 705 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132
RH
706
707 /* Replace the jsr with a bsr. */
708
709 /* Change the R_SH_USES reloc into an R_SH_IND12W reloc, and
067653c5 710 replace the jsr with a bsr. */
252b5132 711 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irelfn->r_info), R_SH_IND12W);
bdfaef52
JR
712 /* We used to test (ELF32_R_SYM (irelfn->r_info) < symtab_hdr->sh_info)
713 here, but that only checks if the symbol is an external symbol,
714 not if the symbol is in a different section. Besides, we need
715 a consistent meaning for the relocation, so we just assume here that
716 the value of the symbol is not available. */
0e71e495
BE
717
718 /* We can't fully resolve this yet, because the external
719 symbol value may be changed by future relaxing. We let
720 the final link phase handle it. */
721 bfd_put_16 (abfd, (bfd_vma) 0xb000, contents + irel->r_offset);
722
bdfaef52 723 irel->r_addend = -4;
252b5132 724
f725025b
DD
725 /* When we calculated the symbol "value" we had an offset in the
726 DIR32's word in memory (we read and add it above). However,
727 the jsr we create does NOT have this offset encoded, so we
728 have to add it to the addend to preserve it. */
729 irel->r_addend += bfd_get_32 (abfd, contents + paddr);
730
252b5132 731 /* See if there is another R_SH_USES reloc referring to the same
067653c5 732 register load. */
252b5132
RH
733 for (irelscan = internal_relocs; irelscan < irelend; irelscan++)
734 if (ELF32_R_TYPE (irelscan->r_info) == (int) R_SH_USES
735 && laddr == irelscan->r_offset + 4 + irelscan->r_addend)
736 break;
737 if (irelscan < irelend)
738 {
739 /* Some other function call depends upon this register load,
740 and we have not yet converted that function call.
741 Indeed, we may never be able to convert it. There is
742 nothing else we can do at this point. */
743 continue;
744 }
745
746 /* Look for a R_SH_COUNT reloc on the location where the
067653c5
AM
747 function address is stored. Do this before deleting any
748 bytes, to avoid confusion about the address. */
252b5132
RH
749 for (irelcount = internal_relocs; irelcount < irelend; irelcount++)
750 if (irelcount->r_offset == paddr
751 && ELF32_R_TYPE (irelcount->r_info) == (int) R_SH_COUNT)
752 break;
753
754 /* Delete the register load. */
755 if (! sh_elf_relax_delete_bytes (abfd, sec, laddr, 2))
756 goto error_return;
757
758 /* That will change things, so, just in case it permits some
067653c5
AM
759 other function call to come within range, we should relax
760 again. Note that this is not required, and it may be slow. */
b34976b6 761 *again = TRUE;
252b5132
RH
762
763 /* Now check whether we got a COUNT reloc. */
764 if (irelcount >= irelend)
765 {
766 ((*_bfd_error_handler)
d003868e
AM
767 (_("%B: 0x%lx: warning: could not find expected COUNT reloc"),
768 abfd, (unsigned long) paddr));
252b5132
RH
769 continue;
770 }
771
772 /* The number of uses is stored in the r_addend field. We've
067653c5 773 just deleted one. */
252b5132
RH
774 if (irelcount->r_addend == 0)
775 {
d003868e
AM
776 ((*_bfd_error_handler) (_("%B: 0x%lx: warning: bad count"),
777 abfd,
252b5132
RH
778 (unsigned long) paddr));
779 continue;
780 }
781
782 --irelcount->r_addend;
783
784 /* If there are no more uses, we can delete the address. Reload
067653c5
AM
785 the address from irelfn, in case it was changed by the
786 previous call to sh_elf_relax_delete_bytes. */
252b5132
RH
787 if (irelcount->r_addend == 0)
788 {
789 if (! sh_elf_relax_delete_bytes (abfd, sec, irelfn->r_offset, 4))
790 goto error_return;
791 }
792
793 /* We've done all we can with that function call. */
794 }
795
796 /* Look for load and store instructions that we can align on four
797 byte boundaries. */
bdfaef52
JR
798 if ((elf_elfheader (abfd)->e_flags & EF_SH_MACH_MASK) != EF_SH4
799 && have_code)
252b5132 800 {
b34976b6 801 bfd_boolean swapped;
252b5132
RH
802
803 /* Get the section contents. */
804 if (contents == NULL)
805 {
806 if (elf_section_data (sec)->this_hdr.contents != NULL)
807 contents = elf_section_data (sec)->this_hdr.contents;
808 else
809 {
eea6121a 810 if (!bfd_malloc_and_get_section (abfd, sec, &contents))
252b5132
RH
811 goto error_return;
812 }
813 }
814
815 if (! sh_elf_align_loads (abfd, sec, internal_relocs, contents,
816 &swapped))
817 goto error_return;
818
819 if (swapped)
820 {
821 elf_section_data (sec)->relocs = internal_relocs;
252b5132 822 elf_section_data (sec)->this_hdr.contents = contents;
6cdc0ccc 823 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132
RH
824 }
825 }
826
6cdc0ccc
AM
827 if (isymbuf != NULL
828 && symtab_hdr->contents != (unsigned char *) isymbuf)
252b5132
RH
829 {
830 if (! link_info->keep_memory)
6cdc0ccc 831 free (isymbuf);
252b5132
RH
832 else
833 {
6cdc0ccc
AM
834 /* Cache the symbols for elf_link_input_bfd. */
835 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 836 }
9ad5cbcf
AM
837 }
838
6cdc0ccc
AM
839 if (contents != NULL
840 && elf_section_data (sec)->this_hdr.contents != contents)
252b5132
RH
841 {
842 if (! link_info->keep_memory)
6cdc0ccc
AM
843 free (contents);
844 else
252b5132 845 {
6cdc0ccc
AM
846 /* Cache the section contents for elf_link_input_bfd. */
847 elf_section_data (sec)->this_hdr.contents = contents;
252b5132 848 }
252b5132
RH
849 }
850
6cdc0ccc
AM
851 if (internal_relocs != NULL
852 && elf_section_data (sec)->relocs != internal_relocs)
853 free (internal_relocs);
854
b34976b6 855 return TRUE;
252b5132
RH
856
857 error_return:
6cdc0ccc
AM
858 if (isymbuf != NULL
859 && symtab_hdr->contents != (unsigned char *) isymbuf)
860 free (isymbuf);
861 if (contents != NULL
862 && elf_section_data (sec)->this_hdr.contents != contents)
863 free (contents);
864 if (internal_relocs != NULL
865 && elf_section_data (sec)->relocs != internal_relocs)
866 free (internal_relocs);
9ad5cbcf 867
b34976b6 868 return FALSE;
252b5132
RH
869}
870
871/* Delete some bytes from a section while relaxing. FIXME: There is a
872 lot of duplication between this function and sh_relax_delete_bytes
873 in coff-sh.c. */
874
b34976b6 875static bfd_boolean
09fd220b
KK
876sh_elf_relax_delete_bytes (bfd *abfd, asection *sec, bfd_vma addr,
877 int count)
252b5132
RH
878{
879 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 880 unsigned int sec_shndx;
252b5132
RH
881 bfd_byte *contents;
882 Elf_Internal_Rela *irel, *irelend;
883 Elf_Internal_Rela *irelalign;
884 bfd_vma toaddr;
6cdc0ccc 885 Elf_Internal_Sym *isymbuf, *isym, *isymend;
9ad5cbcf
AM
886 struct elf_link_hash_entry **sym_hashes;
887 struct elf_link_hash_entry **end_hashes;
888 unsigned int symcount;
252b5132
RH
889 asection *o;
890
0ffa91dd 891 symtab_hdr = &elf_symtab_hdr (abfd);
6cdc0ccc 892 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
9ad5cbcf
AM
893
894 sec_shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132
RH
895
896 contents = elf_section_data (sec)->this_hdr.contents;
897
898 /* The deletion must stop at the next ALIGN reloc for an aligment
899 power larger than the number of bytes we are deleting. */
900
901 irelalign = NULL;
eea6121a 902 toaddr = sec->size;
252b5132
RH
903
904 irel = elf_section_data (sec)->relocs;
905 irelend = irel + sec->reloc_count;
906 for (; irel < irelend; irel++)
907 {
908 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_ALIGN
909 && irel->r_offset > addr
910 && count < (1 << irel->r_addend))
911 {
912 irelalign = irel;
913 toaddr = irel->r_offset;
914 break;
915 }
916 }
917
918 /* Actually delete the bytes. */
dc810e39
AM
919 memmove (contents + addr, contents + addr + count,
920 (size_t) (toaddr - addr - count));
252b5132 921 if (irelalign == NULL)
eea6121a 922 sec->size -= count;
252b5132
RH
923 else
924 {
925 int i;
926
927#define NOP_OPCODE (0x0009)
928
929 BFD_ASSERT ((count & 1) == 0);
930 for (i = 0; i < count; i += 2)
dc810e39 931 bfd_put_16 (abfd, (bfd_vma) NOP_OPCODE, contents + toaddr - count + i);
252b5132
RH
932 }
933
934 /* Adjust all the relocs. */
935 for (irel = elf_section_data (sec)->relocs; irel < irelend; irel++)
936 {
937 bfd_vma nraddr, stop;
938 bfd_vma start = 0;
939 int insn = 0;
252b5132
RH
940 int off, adjust, oinsn;
941 bfd_signed_vma voff = 0;
b34976b6 942 bfd_boolean overflow;
252b5132
RH
943
944 /* Get the new reloc address. */
945 nraddr = irel->r_offset;
946 if ((irel->r_offset > addr
947 && irel->r_offset < toaddr)
948 || (ELF32_R_TYPE (irel->r_info) == (int) R_SH_ALIGN
949 && irel->r_offset == toaddr))
950 nraddr -= count;
951
952 /* See if this reloc was for the bytes we have deleted, in which
953 case we no longer care about it. Don't delete relocs which
954 represent addresses, though. */
955 if (irel->r_offset >= addr
956 && irel->r_offset < addr + count
957 && ELF32_R_TYPE (irel->r_info) != (int) R_SH_ALIGN
958 && ELF32_R_TYPE (irel->r_info) != (int) R_SH_CODE
959 && ELF32_R_TYPE (irel->r_info) != (int) R_SH_DATA
960 && ELF32_R_TYPE (irel->r_info) != (int) R_SH_LABEL)
961 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
962 (int) R_SH_NONE);
963
964 /* If this is a PC relative reloc, see if the range it covers
067653c5 965 includes the bytes we have deleted. */
252b5132
RH
966 switch ((enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info))
967 {
968 default:
969 break;
970
971 case R_SH_DIR8WPN:
972 case R_SH_IND12W:
973 case R_SH_DIR8WPZ:
974 case R_SH_DIR8WPL:
975 start = irel->r_offset;
976 insn = bfd_get_16 (abfd, contents + nraddr);
977 break;
978 }
979
980 switch ((enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info))
981 {
982 default:
983 start = stop = addr;
984 break;
985
986 case R_SH_DIR32:
987 /* If this reloc is against a symbol defined in this
067653c5
AM
988 section, and the symbol will not be adjusted below, we
989 must check the addend to see it will put the value in
990 range to be adjusted, and hence must be changed. */
252b5132
RH
991 if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
992 {
6cdc0ccc
AM
993 isym = isymbuf + ELF32_R_SYM (irel->r_info);
994 if (isym->st_shndx == sec_shndx
995 && (isym->st_value <= addr
996 || isym->st_value >= toaddr))
252b5132
RH
997 {
998 bfd_vma val;
999
55e6e397
RS
1000 if (get_howto_table (abfd)[R_SH_DIR32].partial_inplace)
1001 {
1002 val = bfd_get_32 (abfd, contents + nraddr);
1003 val += isym->st_value;
1004 if (val > addr && val < toaddr)
1005 bfd_put_32 (abfd, val - count, contents + nraddr);
1006 }
1007 else
1008 {
1009 val = isym->st_value + irel->r_addend;
1010 if (val > addr && val < toaddr)
1011 irel->r_addend -= count;
1012 }
252b5132
RH
1013 }
1014 }
1015 start = stop = addr;
1016 break;
1017
1018 case R_SH_DIR8WPN:
1019 off = insn & 0xff;
1020 if (off & 0x80)
1021 off -= 0x100;
1022 stop = (bfd_vma) ((bfd_signed_vma) start + 4 + off * 2);
1023 break;
1024
1025 case R_SH_IND12W:
bdfaef52
JR
1026 off = insn & 0xfff;
1027 if (! off)
1028 {
1029 /* This has been made by previous relaxation. Since the
1030 relocation will be against an external symbol, the
1031 final relocation will just do the right thing. */
1032 start = stop = addr;
1033 }
252b5132
RH
1034 else
1035 {
252b5132
RH
1036 if (off & 0x800)
1037 off -= 0x1000;
1038 stop = (bfd_vma) ((bfd_signed_vma) start + 4 + off * 2);
bdfaef52
JR
1039
1040 /* The addend will be against the section symbol, thus
1041 for adjusting the addend, the relevant start is the
1042 start of the section.
4cc11e76 1043 N.B. If we want to abandon in-place changes here and
bdfaef52
JR
1044 test directly using symbol + addend, we have to take into
1045 account that the addend has already been adjusted by -4. */
1046 if (stop > addr && stop < toaddr)
1047 irel->r_addend -= count;
252b5132
RH
1048 }
1049 break;
1050
1051 case R_SH_DIR8WPZ:
1052 off = insn & 0xff;
1053 stop = start + 4 + off * 2;
1054 break;
1055
1056 case R_SH_DIR8WPL:
1057 off = insn & 0xff;
435b1e90 1058 stop = (start & ~(bfd_vma) 3) + 4 + off * 4;
252b5132
RH
1059 break;
1060
1061 case R_SH_SWITCH8:
1062 case R_SH_SWITCH16:
1063 case R_SH_SWITCH32:
1064 /* These relocs types represent
1065 .word L2-L1
06e1ba78 1066 The r_addend field holds the difference between the reloc
252b5132
RH
1067 address and L1. That is the start of the reloc, and
1068 adding in the contents gives us the top. We must adjust
06e1ba78
JR
1069 both the r_offset field and the section contents.
1070 N.B. in gas / coff bfd, the elf bfd r_addend is called r_offset,
1071 and the elf bfd r_offset is called r_vaddr. */
252b5132 1072
06e1ba78
JR
1073 stop = irel->r_offset;
1074 start = (bfd_vma) ((bfd_signed_vma) stop - (long) irel->r_addend);
252b5132
RH
1075
1076 if (start > addr
1077 && start < toaddr
1078 && (stop <= addr || stop >= toaddr))
1079 irel->r_addend += count;
1080 else if (stop > addr
1081 && stop < toaddr
1082 && (start <= addr || start >= toaddr))
1083 irel->r_addend -= count;
1084
252b5132
RH
1085 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_SWITCH16)
1086 voff = bfd_get_signed_16 (abfd, contents + nraddr);
1087 else if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_SWITCH8)
1088 voff = bfd_get_8 (abfd, contents + nraddr);
1089 else
1090 voff = bfd_get_signed_32 (abfd, contents + nraddr);
1091 stop = (bfd_vma) ((bfd_signed_vma) start + voff);
1092
1093 break;
1094
1095 case R_SH_USES:
1096 start = irel->r_offset;
1097 stop = (bfd_vma) ((bfd_signed_vma) start
1098 + (long) irel->r_addend
1099 + 4);
1100 break;
1101 }
1102
1103 if (start > addr
1104 && start < toaddr
1105 && (stop <= addr || stop >= toaddr))
1106 adjust = count;
1107 else if (stop > addr
1108 && stop < toaddr
1109 && (start <= addr || start >= toaddr))
1110 adjust = - count;
1111 else
1112 adjust = 0;
1113
1114 if (adjust != 0)
1115 {
1116 oinsn = insn;
b34976b6 1117 overflow = FALSE;
252b5132
RH
1118 switch ((enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info))
1119 {
1120 default:
1121 abort ();
1122 break;
1123
1124 case R_SH_DIR8WPN:
1125 case R_SH_DIR8WPZ:
1126 insn += adjust / 2;
1127 if ((oinsn & 0xff00) != (insn & 0xff00))
b34976b6 1128 overflow = TRUE;
dc810e39 1129 bfd_put_16 (abfd, (bfd_vma) insn, contents + nraddr);
252b5132
RH
1130 break;
1131
1132 case R_SH_IND12W:
1133 insn += adjust / 2;
1134 if ((oinsn & 0xf000) != (insn & 0xf000))
b34976b6 1135 overflow = TRUE;
dc810e39 1136 bfd_put_16 (abfd, (bfd_vma) insn, contents + nraddr);
252b5132
RH
1137 break;
1138
1139 case R_SH_DIR8WPL:
1140 BFD_ASSERT (adjust == count || count >= 4);
1141 if (count >= 4)
1142 insn += adjust / 4;
1143 else
1144 {
1145 if ((irel->r_offset & 3) == 0)
1146 ++insn;
1147 }
1148 if ((oinsn & 0xff00) != (insn & 0xff00))
b34976b6 1149 overflow = TRUE;
dc810e39 1150 bfd_put_16 (abfd, (bfd_vma) insn, contents + nraddr);
252b5132
RH
1151 break;
1152
851cde10
JR
1153 case R_SH_SWITCH8:
1154 voff += adjust;
1155 if (voff < 0 || voff >= 0xff)
b34976b6 1156 overflow = TRUE;
851cde10
JR
1157 bfd_put_8 (abfd, voff, contents + nraddr);
1158 break;
1159
252b5132
RH
1160 case R_SH_SWITCH16:
1161 voff += adjust;
1162 if (voff < - 0x8000 || voff >= 0x8000)
b34976b6 1163 overflow = TRUE;
dc810e39 1164 bfd_put_signed_16 (abfd, (bfd_vma) voff, contents + nraddr);
252b5132
RH
1165 break;
1166
1167 case R_SH_SWITCH32:
1168 voff += adjust;
dc810e39 1169 bfd_put_signed_32 (abfd, (bfd_vma) voff, contents + nraddr);
252b5132
RH
1170 break;
1171
1172 case R_SH_USES:
1173 irel->r_addend += adjust;
1174 break;
1175 }
1176
1177 if (overflow)
1178 {
1179 ((*_bfd_error_handler)
d003868e
AM
1180 (_("%B: 0x%lx: fatal: reloc overflow while relaxing"),
1181 abfd, (unsigned long) irel->r_offset));
252b5132 1182 bfd_set_error (bfd_error_bad_value);
b34976b6 1183 return FALSE;
252b5132
RH
1184 }
1185 }
1186
1187 irel->r_offset = nraddr;
1188 }
1189
1190 /* Look through all the other sections. If there contain any IMM32
1191 relocs against internal symbols which we are not going to adjust
1192 below, we may need to adjust the addends. */
1193 for (o = abfd->sections; o != NULL; o = o->next)
1194 {
1195 Elf_Internal_Rela *internal_relocs;
1196 Elf_Internal_Rela *irelscan, *irelscanend;
1197 bfd_byte *ocontents;
1198
1199 if (o == sec
1200 || (o->flags & SEC_RELOC) == 0
1201 || o->reloc_count == 0)
1202 continue;
1203
1204 /* We always cache the relocs. Perhaps, if info->keep_memory is
b34976b6 1205 FALSE, we should free them, if we are permitted to, when we
067653c5 1206 leave sh_coff_relax_section. */
45d6a902 1207 internal_relocs = (_bfd_elf_link_read_relocs
09fd220b 1208 (abfd, o, NULL, (Elf_Internal_Rela *) NULL, TRUE));
252b5132 1209 if (internal_relocs == NULL)
b34976b6 1210 return FALSE;
252b5132
RH
1211
1212 ocontents = NULL;
1213 irelscanend = internal_relocs + o->reloc_count;
1214 for (irelscan = internal_relocs; irelscan < irelscanend; irelscan++)
1215 {
084aa3aa
JR
1216 /* Dwarf line numbers use R_SH_SWITCH32 relocs. */
1217 if (ELF32_R_TYPE (irelscan->r_info) == (int) R_SH_SWITCH32)
1218 {
1219 bfd_vma start, stop;
1220 bfd_signed_vma voff;
1221
1222 if (ocontents == NULL)
1223 {
1224 if (elf_section_data (o)->this_hdr.contents != NULL)
1225 ocontents = elf_section_data (o)->this_hdr.contents;
1226 else
1227 {
1228 /* We always cache the section contents.
b34976b6 1229 Perhaps, if info->keep_memory is FALSE, we
067653c5
AM
1230 should free them, if we are permitted to,
1231 when we leave sh_coff_relax_section. */
eea6121a
AM
1232 if (!bfd_malloc_and_get_section (abfd, o, &ocontents))
1233 {
1234 if (ocontents != NULL)
1235 free (ocontents);
1236 return FALSE;
1237 }
1238
084aa3aa
JR
1239 elf_section_data (o)->this_hdr.contents = ocontents;
1240 }
1241 }
1242
1243 stop = irelscan->r_offset;
1244 start
1245 = (bfd_vma) ((bfd_signed_vma) stop - (long) irelscan->r_addend);
1246
1247 /* STOP is in a different section, so it won't change. */
1248 if (start > addr && start < toaddr)
1249 irelscan->r_addend += count;
1250
1251 voff = bfd_get_signed_32 (abfd, ocontents + irelscan->r_offset);
1252 stop = (bfd_vma) ((bfd_signed_vma) start + voff);
1253
1254 if (start > addr
1255 && start < toaddr
1256 && (stop <= addr || stop >= toaddr))
dc810e39 1257 bfd_put_signed_32 (abfd, (bfd_vma) voff + count,
084aa3aa
JR
1258 ocontents + irelscan->r_offset);
1259 else if (stop > addr
1260 && stop < toaddr
1261 && (start <= addr || start >= toaddr))
dc810e39 1262 bfd_put_signed_32 (abfd, (bfd_vma) voff - count,
084aa3aa
JR
1263 ocontents + irelscan->r_offset);
1264 }
1265
252b5132
RH
1266 if (ELF32_R_TYPE (irelscan->r_info) != (int) R_SH_DIR32)
1267 continue;
1268
1269 if (ELF32_R_SYM (irelscan->r_info) >= symtab_hdr->sh_info)
1270 continue;
1271
252b5132 1272
6cdc0ccc
AM
1273 isym = isymbuf + ELF32_R_SYM (irelscan->r_info);
1274 if (isym->st_shndx == sec_shndx
1275 && (isym->st_value <= addr
1276 || isym->st_value >= toaddr))
252b5132
RH
1277 {
1278 bfd_vma val;
1279
1280 if (ocontents == NULL)
1281 {
1282 if (elf_section_data (o)->this_hdr.contents != NULL)
1283 ocontents = elf_section_data (o)->this_hdr.contents;
1284 else
1285 {
1286 /* We always cache the section contents.
b34976b6 1287 Perhaps, if info->keep_memory is FALSE, we
067653c5
AM
1288 should free them, if we are permitted to,
1289 when we leave sh_coff_relax_section. */
eea6121a
AM
1290 if (!bfd_malloc_and_get_section (abfd, o, &ocontents))
1291 {
1292 if (ocontents != NULL)
1293 free (ocontents);
1294 return FALSE;
1295 }
1296
252b5132
RH
1297 elf_section_data (o)->this_hdr.contents = ocontents;
1298 }
1299 }
1300
1301 val = bfd_get_32 (abfd, ocontents + irelscan->r_offset);
6cdc0ccc 1302 val += isym->st_value;
252b5132
RH
1303 if (val > addr && val < toaddr)
1304 bfd_put_32 (abfd, val - count,
1305 ocontents + irelscan->r_offset);
1306 }
1307 }
1308 }
1309
1310 /* Adjust the local symbols defined in this section. */
6cdc0ccc
AM
1311 isymend = isymbuf + symtab_hdr->sh_info;
1312 for (isym = isymbuf; isym < isymend; isym++)
252b5132 1313 {
6cdc0ccc
AM
1314 if (isym->st_shndx == sec_shndx
1315 && isym->st_value > addr
1316 && isym->st_value < toaddr)
1317 isym->st_value -= count;
252b5132
RH
1318 }
1319
1320 /* Now adjust the global symbols defined in this section. */
9ad5cbcf
AM
1321 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
1322 - symtab_hdr->sh_info);
1323 sym_hashes = elf_sym_hashes (abfd);
1324 end_hashes = sym_hashes + symcount;
1325 for (; sym_hashes < end_hashes; sym_hashes++)
252b5132 1326 {
9ad5cbcf
AM
1327 struct elf_link_hash_entry *sym_hash = *sym_hashes;
1328 if ((sym_hash->root.type == bfd_link_hash_defined
1329 || sym_hash->root.type == bfd_link_hash_defweak)
1330 && sym_hash->root.u.def.section == sec
1331 && sym_hash->root.u.def.value > addr
1332 && sym_hash->root.u.def.value < toaddr)
252b5132 1333 {
9ad5cbcf 1334 sym_hash->root.u.def.value -= count;
252b5132
RH
1335 }
1336 }
1337
1338 /* See if we can move the ALIGN reloc forward. We have adjusted
1339 r_offset for it already. */
1340 if (irelalign != NULL)
1341 {
1342 bfd_vma alignto, alignaddr;
1343
1344 alignto = BFD_ALIGN (toaddr, 1 << irelalign->r_addend);
1345 alignaddr = BFD_ALIGN (irelalign->r_offset,
1346 1 << irelalign->r_addend);
1347 if (alignto != alignaddr)
1348 {
1349 /* Tail recursion. */
1350 return sh_elf_relax_delete_bytes (abfd, sec, alignaddr,
dc810e39 1351 (int) (alignto - alignaddr));
252b5132
RH
1352 }
1353 }
1354
b34976b6 1355 return TRUE;
252b5132
RH
1356}
1357
1358/* Look for loads and stores which we can align to four byte
1359 boundaries. This is like sh_align_loads in coff-sh.c. */
1360
b34976b6 1361static bfd_boolean
09fd220b
KK
1362sh_elf_align_loads (bfd *abfd ATTRIBUTE_UNUSED, asection *sec,
1363 Elf_Internal_Rela *internal_relocs,
1364 bfd_byte *contents ATTRIBUTE_UNUSED,
1365 bfd_boolean *pswapped)
252b5132
RH
1366{
1367 Elf_Internal_Rela *irel, *irelend;
1368 bfd_vma *labels = NULL;
1369 bfd_vma *label, *label_end;
dc810e39 1370 bfd_size_type amt;
252b5132 1371
b34976b6 1372 *pswapped = FALSE;
252b5132
RH
1373
1374 irelend = internal_relocs + sec->reloc_count;
1375
1376 /* Get all the addresses with labels on them. */
dc810e39
AM
1377 amt = sec->reloc_count;
1378 amt *= sizeof (bfd_vma);
1379 labels = (bfd_vma *) bfd_malloc (amt);
252b5132
RH
1380 if (labels == NULL)
1381 goto error_return;
1382 label_end = labels;
1383 for (irel = internal_relocs; irel < irelend; irel++)
1384 {
1385 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_LABEL)
1386 {
1387 *label_end = irel->r_offset;
1388 ++label_end;
1389 }
1390 }
1391
1392 /* Note that the assembler currently always outputs relocs in
1393 address order. If that ever changes, this code will need to sort
1394 the label values and the relocs. */
1395
1396 label = labels;
1397
1398 for (irel = internal_relocs; irel < irelend; irel++)
1399 {
1400 bfd_vma start, stop;
1401
1402 if (ELF32_R_TYPE (irel->r_info) != (int) R_SH_CODE)
1403 continue;
1404
1405 start = irel->r_offset;
1406
1407 for (irel++; irel < irelend; irel++)
1408 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_DATA)
1409 break;
1410 if (irel < irelend)
1411 stop = irel->r_offset;
1412 else
eea6121a 1413 stop = sec->size;
252b5132
RH
1414
1415 if (! _bfd_sh_align_load_span (abfd, sec, contents, sh_elf_swap_insns,
09fd220b 1416 internal_relocs, &label,
252b5132
RH
1417 label_end, start, stop, pswapped))
1418 goto error_return;
1419 }
1420
1421 free (labels);
1422
b34976b6 1423 return TRUE;
252b5132
RH
1424
1425 error_return:
1426 if (labels != NULL)
1427 free (labels);
b34976b6 1428 return FALSE;
252b5132
RH
1429}
1430
85fbca6a 1431#ifndef SH64_ELF
252b5132
RH
1432/* Swap two SH instructions. This is like sh_swap_insns in coff-sh.c. */
1433
b34976b6 1434static bfd_boolean
09fd220b
KK
1435sh_elf_swap_insns (bfd *abfd, asection *sec, void *relocs,
1436 bfd_byte *contents, bfd_vma addr)
252b5132
RH
1437{
1438 Elf_Internal_Rela *internal_relocs = (Elf_Internal_Rela *) relocs;
1439 unsigned short i1, i2;
1440 Elf_Internal_Rela *irel, *irelend;
1441
1442 /* Swap the instructions themselves. */
1443 i1 = bfd_get_16 (abfd, contents + addr);
1444 i2 = bfd_get_16 (abfd, contents + addr + 2);
dc810e39
AM
1445 bfd_put_16 (abfd, (bfd_vma) i2, contents + addr);
1446 bfd_put_16 (abfd, (bfd_vma) i1, contents + addr + 2);
252b5132
RH
1447
1448 /* Adjust all reloc addresses. */
1449 irelend = internal_relocs + sec->reloc_count;
1450 for (irel = internal_relocs; irel < irelend; irel++)
1451 {
1452 enum elf_sh_reloc_type type;
1453 int add;
1454
1455 /* There are a few special types of relocs that we don't want to
067653c5
AM
1456 adjust. These relocs do not apply to the instruction itself,
1457 but are only associated with the address. */
252b5132
RH
1458 type = (enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info);
1459 if (type == R_SH_ALIGN
1460 || type == R_SH_CODE
1461 || type == R_SH_DATA
1462 || type == R_SH_LABEL)
1463 continue;
1464
1465 /* If an R_SH_USES reloc points to one of the addresses being
067653c5
AM
1466 swapped, we must adjust it. It would be incorrect to do this
1467 for a jump, though, since we want to execute both
1468 instructions after the jump. (We have avoided swapping
1469 around a label, so the jump will not wind up executing an
1470 instruction it shouldn't). */
252b5132
RH
1471 if (type == R_SH_USES)
1472 {
1473 bfd_vma off;
1474
1475 off = irel->r_offset + 4 + irel->r_addend;
1476 if (off == addr)
1477 irel->r_offset += 2;
1478 else if (off == addr + 2)
1479 irel->r_offset -= 2;
1480 }
1481
1482 if (irel->r_offset == addr)
1483 {
1484 irel->r_offset += 2;
1485 add = -2;
1486 }
1487 else if (irel->r_offset == addr + 2)
1488 {
1489 irel->r_offset -= 2;
1490 add = 2;
1491 }
1492 else
1493 add = 0;
1494
1495 if (add != 0)
1496 {
1497 bfd_byte *loc;
1498 unsigned short insn, oinsn;
b34976b6 1499 bfd_boolean overflow;
252b5132
RH
1500
1501 loc = contents + irel->r_offset;
b34976b6 1502 overflow = FALSE;
252b5132
RH
1503 switch (type)
1504 {
1505 default:
1506 break;
1507
1508 case R_SH_DIR8WPN:
1509 case R_SH_DIR8WPZ:
1510 insn = bfd_get_16 (abfd, loc);
1511 oinsn = insn;
1512 insn += add / 2;
1513 if ((oinsn & 0xff00) != (insn & 0xff00))
b34976b6 1514 overflow = TRUE;
dc810e39 1515 bfd_put_16 (abfd, (bfd_vma) insn, loc);
252b5132
RH
1516 break;
1517
1518 case R_SH_IND12W:
1519 insn = bfd_get_16 (abfd, loc);
1520 oinsn = insn;
1521 insn += add / 2;
1522 if ((oinsn & 0xf000) != (insn & 0xf000))
b34976b6 1523 overflow = TRUE;
dc810e39 1524 bfd_put_16 (abfd, (bfd_vma) insn, loc);
252b5132
RH
1525 break;
1526
1527 case R_SH_DIR8WPL:
1528 /* This reloc ignores the least significant 3 bits of
067653c5
AM
1529 the program counter before adding in the offset.
1530 This means that if ADDR is at an even address, the
1531 swap will not affect the offset. If ADDR is an at an
1532 odd address, then the instruction will be crossing a
1533 four byte boundary, and must be adjusted. */
252b5132
RH
1534 if ((addr & 3) != 0)
1535 {
1536 insn = bfd_get_16 (abfd, loc);
1537 oinsn = insn;
1538 insn += add / 2;
1539 if ((oinsn & 0xff00) != (insn & 0xff00))
b34976b6 1540 overflow = TRUE;
dc810e39 1541 bfd_put_16 (abfd, (bfd_vma) insn, loc);
252b5132
RH
1542 }
1543
1544 break;
1545 }
1546
1547 if (overflow)
1548 {
1549 ((*_bfd_error_handler)
d003868e
AM
1550 (_("%B: 0x%lx: fatal: reloc overflow while relaxing"),
1551 abfd, (unsigned long) irel->r_offset));
252b5132 1552 bfd_set_error (bfd_error_bad_value);
b34976b6 1553 return FALSE;
252b5132
RH
1554 }
1555 }
1556 }
1557
b34976b6 1558 return TRUE;
252b5132 1559}
85fbca6a 1560#endif /* defined SH64_ELF */
252b5132 1561\f
55e6e397
RS
1562/* Describes one of the various PLT styles. */
1563
1564struct elf_sh_plt_info
1565{
1566 /* The template for the first PLT entry, or NULL if there is no special
1567 first entry. */
1568 const bfd_byte *plt0_entry;
1569
1570 /* The size of PLT0_ENTRY in bytes, or 0 if PLT0_ENTRY is NULL. */
1571 bfd_vma plt0_entry_size;
1572
1573 /* Index I is the offset into PLT0_ENTRY of a pointer to
1574 _GLOBAL_OFFSET_TABLE_ + I * 4. The value is MINUS_ONE
1575 if there is no such pointer. */
1576 bfd_vma plt0_got_fields[3];
1577
1578 /* The template for a symbol's PLT entry. */
1579 const bfd_byte *symbol_entry;
1580
1581 /* The size of SYMBOL_ENTRY in bytes. */
1582 bfd_vma symbol_entry_size;
1583
1584 /* Byte offsets of fields in SYMBOL_ENTRY. Not all fields are used
1585 on all targets. The comments by each member indicate the value
1586 that the field must hold. */
1587 struct {
1588 bfd_vma got_entry; /* the address of the symbol's .got.plt entry */
1589 bfd_vma plt; /* .plt (or a branch to .plt on VxWorks) */
1590 bfd_vma reloc_offset; /* the offset of the symbol's JMP_SLOT reloc */
8e45593f
NC
1591 bfd_boolean got20; /* TRUE if got_entry points to a movi20
1592 instruction (instead of a constant pool
1593 entry). */
55e6e397
RS
1594 } symbol_fields;
1595
1596 /* The offset of the resolver stub from the start of SYMBOL_ENTRY. */
1597 bfd_vma symbol_resolve_offset;
8e45593f
NC
1598
1599 /* A different PLT layout which can be used for the first
1600 MAX_SHORT_PLT entries. It must share the same plt0. NULL in
1601 other cases. */
1602 const struct elf_sh_plt_info *short_plt;
55e6e397
RS
1603};
1604
fbca6ad9
AO
1605#ifdef INCLUDE_SHMEDIA
1606
1607/* The size in bytes of an entry in the procedure linkage table. */
1608
55e6e397 1609#define ELF_PLT_ENTRY_SIZE 64
fbca6ad9
AO
1610
1611/* First entry in an absolute procedure linkage table look like this. */
1612
55e6e397 1613static const bfd_byte elf_sh_plt0_entry_be[ELF_PLT_ENTRY_SIZE] =
fbca6ad9
AO
1614{
1615 0xcc, 0x00, 0x01, 0x10, /* movi .got.plt >> 16, r17 */
1616 0xc8, 0x00, 0x01, 0x10, /* shori .got.plt & 65535, r17 */
1617 0x89, 0x10, 0x09, 0x90, /* ld.l r17, 8, r25 */
c8614e8e 1618 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
fbca6ad9
AO
1619 0x89, 0x10, 0x05, 0x10, /* ld.l r17, 4, r17 */
1620 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
1621 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1622 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1623 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1624 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1625 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1626 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1627 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1628 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1629 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1630 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1631};
1632
55e6e397 1633static const bfd_byte elf_sh_plt0_entry_le[ELF_PLT_ENTRY_SIZE] =
fbca6ad9
AO
1634{
1635 0x10, 0x01, 0x00, 0xcc, /* movi .got.plt >> 16, r17 */
1636 0x10, 0x01, 0x00, 0xc8, /* shori .got.plt & 65535, r17 */
1637 0x90, 0x09, 0x10, 0x89, /* ld.l r17, 8, r25 */
c8614e8e 1638 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
fbca6ad9
AO
1639 0x10, 0x05, 0x10, 0x89, /* ld.l r17, 4, r17 */
1640 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
1641 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1642 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1643 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1644 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1645 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1646 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1647 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1648 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1649 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1650 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1651};
1652
1653/* Sebsequent entries in an absolute procedure linkage table look like
1654 this. */
1655
55e6e397 1656static const bfd_byte elf_sh_plt_entry_be[ELF_PLT_ENTRY_SIZE] =
fbca6ad9
AO
1657{
1658 0xcc, 0x00, 0x01, 0x90, /* movi nameN-in-GOT >> 16, r25 */
1659 0xc8, 0x00, 0x01, 0x90, /* shori nameN-in-GOT & 65535, r25 */
1660 0x89, 0x90, 0x01, 0x90, /* ld.l r25, 0, r25 */
1661 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
1662 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
1663 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1664 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1665 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1666 0xcc, 0x00, 0x01, 0x90, /* movi .PLT0 >> 16, r25 */
1667 0xc8, 0x00, 0x01, 0x90, /* shori .PLT0 & 65535, r25 */
1668 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
1669 0xcc, 0x00, 0x01, 0x50, /* movi reloc-offset >> 16, r21 */
1670 0xc8, 0x00, 0x01, 0x50, /* shori reloc-offset & 65535, r21 */
1671 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
1672 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1673 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1674};
1675
55e6e397 1676static const bfd_byte elf_sh_plt_entry_le[ELF_PLT_ENTRY_SIZE] =
fbca6ad9
AO
1677{
1678 0x90, 0x01, 0x00, 0xcc, /* movi nameN-in-GOT >> 16, r25 */
1679 0x90, 0x01, 0x00, 0xc8, /* shori nameN-in-GOT & 65535, r25 */
1680 0x90, 0x01, 0x90, 0x89, /* ld.l r25, 0, r25 */
1681 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
1682 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
1683 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1684 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1685 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1686 0x90, 0x01, 0x00, 0xcc, /* movi .PLT0 >> 16, r25 */
1687 0x90, 0x01, 0x00, 0xc8, /* shori .PLT0 & 65535, r25 */
1688 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
1689 0x50, 0x01, 0x00, 0xcc, /* movi reloc-offset >> 16, r21 */
1690 0x50, 0x01, 0x00, 0xc8, /* shori reloc-offset & 65535, r21 */
1691 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
1692 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1693 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1694};
1695
1696/* Entries in a PIC procedure linkage table look like this. */
1697
55e6e397 1698static const bfd_byte elf_sh_pic_plt_entry_be[ELF_PLT_ENTRY_SIZE] =
fbca6ad9
AO
1699{
1700 0xcc, 0x00, 0x01, 0x90, /* movi nameN@GOT >> 16, r25 */
1701 0xc8, 0x00, 0x01, 0x90, /* shori nameN@GOT & 65535, r25 */
1702 0x40, 0xc2, 0x65, 0x90, /* ldx.l r12, r25, r25 */
1703 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
1704 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
1705 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1706 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1707 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1708 0xce, 0x00, 0x01, 0x10, /* movi -GOT_BIAS, r17 */
0a4ef3f4 1709 0x00, 0xc8, 0x45, 0x10, /* add.l r12, r17, r17 */
fbca6ad9
AO
1710 0x89, 0x10, 0x09, 0x90, /* ld.l r17, 8, r25 */
1711 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
1712 0x89, 0x10, 0x05, 0x10, /* ld.l r17, 4, r17 */
1713 0xcc, 0x00, 0x01, 0x50, /* movi reloc-offset >> 16, r21 */
1714 0xc8, 0x00, 0x01, 0x50, /* shori reloc-offset & 65535, r21 */
1715 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
1716};
1717
55e6e397 1718static const bfd_byte elf_sh_pic_plt_entry_le[ELF_PLT_ENTRY_SIZE] =
fbca6ad9
AO
1719{
1720 0x90, 0x01, 0x00, 0xcc, /* movi nameN@GOT >> 16, r25 */
1721 0x90, 0x01, 0x00, 0xc8, /* shori nameN@GOT & 65535, r25 */
1722 0x90, 0x65, 0xc2, 0x40, /* ldx.l r12, r25, r25 */
1723 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
1724 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
1725 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1726 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1727 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1728 0x10, 0x01, 0x00, 0xce, /* movi -GOT_BIAS, r17 */
0a4ef3f4 1729 0x10, 0x45, 0xc8, 0x00, /* add.l r12, r17, r17 */
fbca6ad9
AO
1730 0x90, 0x09, 0x10, 0x89, /* ld.l r17, 8, r25 */
1731 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
1732 0x10, 0x05, 0x10, 0x89, /* ld.l r17, 4, r17 */
1733 0x50, 0x01, 0x00, 0xcc, /* movi reloc-offset >> 16, r21 */
1734 0x50, 0x01, 0x00, 0xc8, /* shori reloc-offset & 65535, r21 */
1735 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
1736};
1737
55e6e397
RS
1738static const struct elf_sh_plt_info elf_sh_plts[2][2] = {
1739 {
1740 {
1741 /* Big-endian non-PIC. */
1742 elf_sh_plt0_entry_be,
1743 ELF_PLT_ENTRY_SIZE,
1744 { 0, MINUS_ONE, MINUS_ONE },
1745 elf_sh_plt_entry_be,
1746 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1747 { 0, 32, 48, FALSE },
1748 33, /* includes ISA encoding */
1749 NULL
55e6e397
RS
1750 },
1751 {
1752 /* Little-endian non-PIC. */
1753 elf_sh_plt0_entry_le,
1754 ELF_PLT_ENTRY_SIZE,
1755 { 0, MINUS_ONE, MINUS_ONE },
1756 elf_sh_plt_entry_le,
1757 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1758 { 0, 32, 48, FALSE },
1759 33, /* includes ISA encoding */
1760 NULL
55e6e397
RS
1761 },
1762 },
1763 {
1764 {
1765 /* Big-endian PIC. */
1766 elf_sh_plt0_entry_be,
1767 ELF_PLT_ENTRY_SIZE,
1768 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1769 elf_sh_pic_plt_entry_be,
1770 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1771 { 0, MINUS_ONE, 52, FALSE },
1772 33, /* includes ISA encoding */
1773 NULL
55e6e397
RS
1774 },
1775 {
1776 /* Little-endian PIC. */
1777 elf_sh_plt0_entry_le,
1778 ELF_PLT_ENTRY_SIZE,
1779 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1780 elf_sh_pic_plt_entry_le,
1781 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1782 { 0, MINUS_ONE, 52, FALSE },
1783 33, /* includes ISA encoding */
1784 NULL
55e6e397
RS
1785 },
1786 }
1787};
fbca6ad9
AO
1788
1789/* Return offset of the linker in PLT0 entry. */
1790#define elf_sh_plt0_gotplt_offset(info) 0
1791
55e6e397
RS
1792/* Install a 32-bit PLT field starting at ADDR, which occurs in OUTPUT_BFD.
1793 VALUE is the field's value and CODE_P is true if VALUE refers to code,
1794 not data.
fbca6ad9 1795
55e6e397 1796 On SH64, each 32-bit field is loaded by a movi/shori pair. */
fbca6ad9
AO
1797
1798inline static void
55e6e397
RS
1799install_plt_field (bfd *output_bfd, bfd_boolean code_p,
1800 unsigned long value, bfd_byte *addr)
fbca6ad9 1801{
55e6e397 1802 value |= code_p;
fbca6ad9
AO
1803 bfd_put_32 (output_bfd,
1804 bfd_get_32 (output_bfd, addr)
1805 | ((value >> 6) & 0x3fffc00),
1806 addr);
1807 bfd_put_32 (output_bfd,
1808 bfd_get_32 (output_bfd, addr + 4)
1809 | ((value << 10) & 0x3fffc00),
1810 addr + 4);
1811}
1812
55e6e397
RS
1813/* Return the type of PLT associated with ABFD. PIC_P is true if
1814 the object is position-independent. */
1815
1816static const struct elf_sh_plt_info *
1817get_plt_info (bfd *abfd ATTRIBUTE_UNUSED, bfd_boolean pic_p)
1818{
1819 return &elf_sh_plts[pic_p][!bfd_big_endian (abfd)];
1820}
fbca6ad9 1821#else
37c644f2 1822/* The size in bytes of an entry in the procedure linkage table. */
252b5132 1823
55e6e397 1824#define ELF_PLT_ENTRY_SIZE 28
37c644f2
AO
1825
1826/* First entry in an absolute procedure linkage table look like this. */
1827
6c426cf3 1828/* Note - this code has been "optimised" not to use r2. r2 is used by
4cc11e76 1829 GCC to return the address of large structures, so it should not be
6c426cf3
NC
1830 corrupted here. This does mean however, that this PLT does not conform
1831 to the SH PIC ABI. That spec says that r0 contains the type of the PLT
1832 and r2 contains the GOT id. This version stores the GOT id in r0 and
1833 ignores the type. Loaders can easily detect this difference however,
1834 since the type will always be 0 or 8, and the GOT ids will always be
1835 greater than or equal to 12. */
55e6e397 1836static const bfd_byte elf_sh_plt0_entry_be[ELF_PLT_ENTRY_SIZE] =
6c426cf3
NC
1837{
1838 0xd0, 0x05, /* mov.l 2f,r0 */
1839 0x60, 0x02, /* mov.l @r0,r0 */
1840 0x2f, 0x06, /* mov.l r0,@-r15 */
1841 0xd0, 0x03, /* mov.l 1f,r0 */
1842 0x60, 0x02, /* mov.l @r0,r0 */
1843 0x40, 0x2b, /* jmp @r0 */
1844 0x60, 0xf6, /* mov.l @r15+,r0 */
1845 0x00, 0x09, /* nop */
1846 0x00, 0x09, /* nop */
1847 0x00, 0x09, /* nop */
1848 0, 0, 0, 0, /* 1: replaced with address of .got.plt + 8. */
1849 0, 0, 0, 0, /* 2: replaced with address of .got.plt + 4. */
1850};
1851
55e6e397 1852static const bfd_byte elf_sh_plt0_entry_le[ELF_PLT_ENTRY_SIZE] =
6c426cf3
NC
1853{
1854 0x05, 0xd0, /* mov.l 2f,r0 */
1855 0x02, 0x60, /* mov.l @r0,r0 */
1856 0x06, 0x2f, /* mov.l r0,@-r15 */
1857 0x03, 0xd0, /* mov.l 1f,r0 */
1858 0x02, 0x60, /* mov.l @r0,r0 */
1859 0x2b, 0x40, /* jmp @r0 */
1860 0xf6, 0x60, /* mov.l @r15+,r0 */
1861 0x09, 0x00, /* nop */
1862 0x09, 0x00, /* nop */
1863 0x09, 0x00, /* nop */
1864 0, 0, 0, 0, /* 1: replaced with address of .got.plt + 8. */
1865 0, 0, 0, 0, /* 2: replaced with address of .got.plt + 4. */
1866};
1867
1868/* Sebsequent entries in an absolute procedure linkage table look like
1869 this. */
1870
55e6e397 1871static const bfd_byte elf_sh_plt_entry_be[ELF_PLT_ENTRY_SIZE] =
6c426cf3
NC
1872{
1873 0xd0, 0x04, /* mov.l 1f,r0 */
55e6e397 1874 0x60, 0x02, /* mov.l @(r0,r12),r0 */
6c426cf3
NC
1875 0xd1, 0x02, /* mov.l 0f,r1 */
1876 0x40, 0x2b, /* jmp @r0 */
1877 0x60, 0x13, /* mov r1,r0 */
1878 0xd1, 0x03, /* mov.l 2f,r1 */
1879 0x40, 0x2b, /* jmp @r0 */
1880 0x00, 0x09, /* nop */
1881 0, 0, 0, 0, /* 0: replaced with address of .PLT0. */
1882 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
1883 0, 0, 0, 0, /* 2: replaced with offset into relocation table. */
1884};
1885
55e6e397 1886static const bfd_byte elf_sh_plt_entry_le[ELF_PLT_ENTRY_SIZE] =
6c426cf3
NC
1887{
1888 0x04, 0xd0, /* mov.l 1f,r0 */
1889 0x02, 0x60, /* mov.l @r0,r0 */
1890 0x02, 0xd1, /* mov.l 0f,r1 */
1891 0x2b, 0x40, /* jmp @r0 */
1892 0x13, 0x60, /* mov r1,r0 */
1893 0x03, 0xd1, /* mov.l 2f,r1 */
1894 0x2b, 0x40, /* jmp @r0 */
1895 0x09, 0x00, /* nop */
1896 0, 0, 0, 0, /* 0: replaced with address of .PLT0. */
1897 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
1898 0, 0, 0, 0, /* 2: replaced with offset into relocation table. */
1899};
1900
1901/* Entries in a PIC procedure linkage table look like this. */
1902
55e6e397 1903static const bfd_byte elf_sh_pic_plt_entry_be[ELF_PLT_ENTRY_SIZE] =
6c426cf3
NC
1904{
1905 0xd0, 0x04, /* mov.l 1f,r0 */
1906 0x00, 0xce, /* mov.l @(r0,r12),r0 */
1907 0x40, 0x2b, /* jmp @r0 */
1908 0x00, 0x09, /* nop */
1909 0x50, 0xc2, /* mov.l @(8,r12),r0 */
1910 0xd1, 0x03, /* mov.l 2f,r1 */
1911 0x40, 0x2b, /* jmp @r0 */
1912 0x50, 0xc1, /* mov.l @(4,r12),r0 */
1913 0x00, 0x09, /* nop */
1914 0x00, 0x09, /* nop */
1915 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
1916 0, 0, 0, 0 /* 2: replaced with offset into relocation table. */
1917};
1918
55e6e397 1919static const bfd_byte elf_sh_pic_plt_entry_le[ELF_PLT_ENTRY_SIZE] =
6c426cf3
NC
1920{
1921 0x04, 0xd0, /* mov.l 1f,r0 */
1922 0xce, 0x00, /* mov.l @(r0,r12),r0 */
1923 0x2b, 0x40, /* jmp @r0 */
1924 0x09, 0x00, /* nop */
1925 0xc2, 0x50, /* mov.l @(8,r12),r0 */
1926 0x03, 0xd1, /* mov.l 2f,r1 */
1927 0x2b, 0x40, /* jmp @r0 */
1928 0xc1, 0x50, /* mov.l @(4,r12),r0 */
1929 0x09, 0x00, /* nop */
1930 0x09, 0x00, /* nop */
1931 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
1932 0, 0, 0, 0 /* 2: replaced with offset into relocation table. */
1933};
1934
55e6e397
RS
1935static const struct elf_sh_plt_info elf_sh_plts[2][2] = {
1936 {
1937 {
1938 /* Big-endian non-PIC. */
1939 elf_sh_plt0_entry_be,
1940 ELF_PLT_ENTRY_SIZE,
1941 { MINUS_ONE, 24, 20 },
1942 elf_sh_plt_entry_be,
1943 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1944 { 20, 16, 24, FALSE },
1945 8,
1946 NULL
55e6e397
RS
1947 },
1948 {
1949 /* Little-endian non-PIC. */
1950 elf_sh_plt0_entry_le,
1951 ELF_PLT_ENTRY_SIZE,
1952 { MINUS_ONE, 24, 20 },
1953 elf_sh_plt_entry_le,
1954 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1955 { 20, 16, 24, FALSE },
1956 8,
1957 NULL
55e6e397
RS
1958 },
1959 },
1960 {
1961 {
1962 /* Big-endian PIC. */
1963 elf_sh_plt0_entry_be,
1964 ELF_PLT_ENTRY_SIZE,
1965 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1966 elf_sh_pic_plt_entry_be,
1967 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1968 { 20, MINUS_ONE, 24, FALSE },
1969 8,
1970 NULL
55e6e397
RS
1971 },
1972 {
1973 /* Little-endian PIC. */
1974 elf_sh_plt0_entry_le,
1975 ELF_PLT_ENTRY_SIZE,
1976 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1977 elf_sh_pic_plt_entry_le,
1978 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1979 { 20, MINUS_ONE, 24, FALSE },
1980 8,
1981 NULL
55e6e397
RS
1982 },
1983 }
1984};
252b5132 1985
55e6e397
RS
1986#define VXWORKS_PLT_HEADER_SIZE 12
1987#define VXWORKS_PLT_ENTRY_SIZE 24
252b5132 1988
55e6e397
RS
1989static const bfd_byte vxworks_sh_plt0_entry_be[VXWORKS_PLT_HEADER_SIZE] =
1990{
1991 0xd1, 0x01, /* mov.l @(8,pc),r1 */
1992 0x61, 0x12, /* mov.l @r1,r1 */
1993 0x41, 0x2b, /* jmp @r1 */
1994 0x00, 0x09, /* nop */
1995 0, 0, 0, 0 /* 0: replaced with _GLOBAL_OFFSET_TABLE+8. */
1996};
252b5132 1997
55e6e397
RS
1998static const bfd_byte vxworks_sh_plt0_entry_le[VXWORKS_PLT_HEADER_SIZE] =
1999{
2000 0x01, 0xd1, /* mov.l @(8,pc),r1 */
2001 0x12, 0x61, /* mov.l @r1,r1 */
2002 0x2b, 0x41, /* jmp @r1 */
2003 0x09, 0x00, /* nop */
2004 0, 0, 0, 0 /* 0: replaced with _GLOBAL_OFFSET_TABLE+8. */
2005};
2006
2007static const bfd_byte vxworks_sh_plt_entry_be[VXWORKS_PLT_ENTRY_SIZE] =
2008{
2009 0xd0, 0x01, /* mov.l @(8,pc),r0 */
2010 0x60, 0x02, /* mov.l @r0,r0 */
2011 0x40, 0x2b, /* jmp @r0 */
2012 0x00, 0x09, /* nop */
2013 0, 0, 0, 0, /* 0: replaced with address of this symbol in .got. */
2014 0xd0, 0x01, /* mov.l @(8,pc),r0 */
2015 0xa0, 0x00, /* bra PLT (We need to fix the offset.) */
2016 0x00, 0x09, /* nop */
2017 0x00, 0x09, /* nop */
2018 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2019};
2020
2021static const bfd_byte vxworks_sh_plt_entry_le[VXWORKS_PLT_ENTRY_SIZE] =
2022{
2023 0x01, 0xd0, /* mov.l @(8,pc),r0 */
2024 0x02, 0x60, /* mov.l @r0,r0 */
2025 0x2b, 0x40, /* jmp @r0 */
2026 0x09, 0x00, /* nop */
2027 0, 0, 0, 0, /* 0: replaced with address of this symbol in .got. */
2028 0x01, 0xd0, /* mov.l @(8,pc),r0 */
2029 0x00, 0xa0, /* bra PLT (We need to fix the offset.) */
2030 0x09, 0x00, /* nop */
2031 0x09, 0x00, /* nop */
2032 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2033};
2034
2035static const bfd_byte vxworks_sh_pic_plt_entry_be[VXWORKS_PLT_ENTRY_SIZE] =
2036{
2037 0xd0, 0x01, /* mov.l @(8,pc),r0 */
2038 0x00, 0xce, /* mov.l @(r0,r12),r0 */
2039 0x40, 0x2b, /* jmp @r0 */
2040 0x00, 0x09, /* nop */
2041 0, 0, 0, 0, /* 0: replaced with offset of this symbol in .got. */
2042 0xd0, 0x01, /* mov.l @(8,pc),r0 */
2043 0x51, 0xc2, /* mov.l @(8,r12),r1 */
2044 0x41, 0x2b, /* jmp @r1 */
2045 0x00, 0x09, /* nop */
2046 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2047};
2048
2049static const bfd_byte vxworks_sh_pic_plt_entry_le[VXWORKS_PLT_ENTRY_SIZE] =
2050{
2051 0x01, 0xd0, /* mov.l @(8,pc),r0 */
2052 0xce, 0x00, /* mov.l @(r0,r12),r0 */
2053 0x2b, 0x40, /* jmp @r0 */
2054 0x09, 0x00, /* nop */
2055 0, 0, 0, 0, /* 0: replaced with offset of this symbol in .got. */
2056 0x01, 0xd0, /* mov.l @(8,pc),r0 */
2057 0xc2, 0x51, /* mov.l @(8,r12),r1 */
2058 0x2b, 0x41, /* jmp @r1 */
2059 0x09, 0x00, /* nop */
2060 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2061};
2062
2063static const struct elf_sh_plt_info vxworks_sh_plts[2][2] = {
2064 {
2065 {
2066 /* Big-endian non-PIC. */
2067 vxworks_sh_plt0_entry_be,
2068 VXWORKS_PLT_HEADER_SIZE,
2069 { MINUS_ONE, MINUS_ONE, 8 },
2070 vxworks_sh_plt_entry_be,
2071 VXWORKS_PLT_ENTRY_SIZE,
8e45593f
NC
2072 { 8, 14, 20, FALSE },
2073 12,
2074 NULL
55e6e397
RS
2075 },
2076 {
2077 /* Little-endian non-PIC. */
2078 vxworks_sh_plt0_entry_le,
2079 VXWORKS_PLT_HEADER_SIZE,
2080 { MINUS_ONE, MINUS_ONE, 8 },
2081 vxworks_sh_plt_entry_le,
2082 VXWORKS_PLT_ENTRY_SIZE,
8e45593f
NC
2083 { 8, 14, 20, FALSE },
2084 12,
2085 NULL
55e6e397
RS
2086 },
2087 },
2088 {
2089 {
2090 /* Big-endian PIC. */
2091 NULL,
2092 0,
2093 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2094 vxworks_sh_pic_plt_entry_be,
2095 VXWORKS_PLT_ENTRY_SIZE,
8e45593f
NC
2096 { 8, MINUS_ONE, 20, FALSE },
2097 12,
2098 NULL
55e6e397
RS
2099 },
2100 {
2101 /* Little-endian PIC. */
2102 NULL,
2103 0,
2104 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2105 vxworks_sh_pic_plt_entry_le,
2106 VXWORKS_PLT_ENTRY_SIZE,
8e45593f
NC
2107 { 8, MINUS_ONE, 20, FALSE },
2108 12,
2109 NULL
55e6e397
RS
2110 },
2111 }
2112};
9bdafcce 2113
8e45593f
NC
2114/* FDPIC PLT entries. Two unimplemented optimizations for lazy
2115 binding are to omit the lazy binding stub when linking with -z now
2116 and to move lazy binding stubs into a separate region for better
2117 cache behavior. */
2118
2119#define FDPIC_PLT_ENTRY_SIZE 28
2120#define FDPIC_PLT_LAZY_OFFSET 20
2121
2122/* FIXME: The lazy binding stub requires a plt0 - which may need to be
2123 duplicated if it is out of range, or which can be inlined. So
2124 right now it is always inlined, which wastes a word per stub. It
2125 might be easier to handle the duplication if we put the lazy
2126 stubs separately. */
2127
2128static const bfd_byte fdpic_sh_plt_entry_be[FDPIC_PLT_ENTRY_SIZE] =
2129{
2130 0xd0, 0x02, /* mov.l @(12,pc),r0 */
2131 0x01, 0xce, /* mov.l @(r0,r12),r1 */
2132 0x70, 0x04, /* add #4, r0 */
2133 0x41, 0x2b, /* jmp @r1 */
2134 0x0c, 0xce, /* mov.l @(r0,r12),r12 */
2135 0x00, 0x09, /* nop */
2136 0, 0, 0, 0, /* 0: replaced with offset of this symbol's funcdesc */
2137 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2138 0x60, 0xc2, /* mov.l @r12,r0 */
2139 0x40, 0x2b, /* jmp @r0 */
2140 0x53, 0xc1, /* mov.l @(4,r12),r3 */
2141 0x00, 0x09, /* nop */
2142};
2143
2144static const bfd_byte fdpic_sh_plt_entry_le[FDPIC_PLT_ENTRY_SIZE] =
2145{
2146 0x02, 0xd0, /* mov.l @(12,pc),r0 */
2147 0xce, 0x01, /* mov.l @(r0,r12),r1 */
2148 0x04, 0x70, /* add #4, r0 */
2149 0x2b, 0x41, /* jmp @r1 */
2150 0xce, 0x0c, /* mov.l @(r0,r12),r12 */
2151 0x09, 0x00, /* nop */
2152 0, 0, 0, 0, /* 0: replaced with offset of this symbol's funcdesc */
2153 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2154 0xc2, 0x60, /* mov.l @r12,r0 */
2155 0x2b, 0x40, /* jmp @r0 */
2156 0xc1, 0x53, /* mov.l @(4,r12),r3 */
2157 0x09, 0x00, /* nop */
2158};
2159
2160static const struct elf_sh_plt_info fdpic_sh_plts[2] = {
2161 {
2162 /* Big-endian PIC. */
2163 NULL,
2164 0,
2165 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2166 fdpic_sh_plt_entry_be,
2167 FDPIC_PLT_ENTRY_SIZE,
2168 { 12, MINUS_ONE, 16, FALSE },
2169 FDPIC_PLT_LAZY_OFFSET,
2170 NULL
2171 },
2172 {
2173 /* Little-endian PIC. */
2174 NULL,
2175 0,
2176 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2177 fdpic_sh_plt_entry_le,
2178 FDPIC_PLT_ENTRY_SIZE,
2179 { 12, MINUS_ONE, 16, FALSE },
2180 FDPIC_PLT_LAZY_OFFSET,
2181 NULL
2182 },
2183};
2184
2185/* On SH2A, we can use the movi20 instruction to generate shorter PLT
2186 entries for the first 64K slots. We use the normal FDPIC PLT entry
2187 past that point; we could also use movi20s, which might be faster,
2188 but would not be any smaller. */
2189
2190#define FDPIC_SH2A_PLT_ENTRY_SIZE 24
2191#define FDPIC_SH2A_PLT_LAZY_OFFSET 16
2192
2193static const bfd_byte fdpic_sh2a_plt_entry_be[FDPIC_SH2A_PLT_ENTRY_SIZE] =
2194{
2195 0, 0, 0, 0, /* movi20 #gotofffuncdesc,r0 */
2196 0x01, 0xce, /* mov.l @(r0,r12),r1 */
2197 0x70, 0x04, /* add #4, r0 */
2198 0x41, 0x2b, /* jmp @r1 */
2199 0x0c, 0xce, /* mov.l @(r0,r12),r12 */
2200 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2201 0x60, 0xc2, /* mov.l @r12,r0 */
2202 0x40, 0x2b, /* jmp @r0 */
2203 0x53, 0xc1, /* mov.l @(4,r12),r3 */
2204 0x00, 0x09, /* nop */
2205};
2206
2207static const bfd_byte fdpic_sh2a_plt_entry_le[FDPIC_SH2A_PLT_ENTRY_SIZE] =
2208{
2209 0, 0, 0, 0, /* movi20 #gotofffuncdesc,r0 */
2210 0xce, 0x01, /* mov.l @(r0,r12),r1 */
2211 0x04, 0x70, /* add #4, r0 */
2212 0x2b, 0x41, /* jmp @r1 */
2213 0xce, 0x0c, /* mov.l @(r0,r12),r12 */
2214 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2215 0xc2, 0x60, /* mov.l @r12,r0 */
2216 0x2b, 0x40, /* jmp @r0 */
2217 0xc1, 0x53, /* mov.l @(4,r12),r3 */
2218 0x09, 0x00, /* nop */
2219};
2220
2221static const struct elf_sh_plt_info fdpic_sh2a_short_plt_be = {
2222 /* Big-endian FDPIC, max index 64K. */
2223 NULL,
2224 0,
2225 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2226 fdpic_sh2a_plt_entry_be,
2227 FDPIC_SH2A_PLT_ENTRY_SIZE,
2228 { 0, MINUS_ONE, 12, TRUE },
2229 FDPIC_SH2A_PLT_LAZY_OFFSET,
2230 NULL
2231};
2232
2233static const struct elf_sh_plt_info fdpic_sh2a_short_plt_le = {
2234 /* Little-endian FDPIC, max index 64K. */
2235 NULL,
2236 0,
2237 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2238 fdpic_sh2a_plt_entry_le,
2239 FDPIC_SH2A_PLT_ENTRY_SIZE,
2240 { 0, MINUS_ONE, 12, TRUE },
2241 FDPIC_SH2A_PLT_LAZY_OFFSET,
2242 NULL
2243};
2244
2245static const struct elf_sh_plt_info fdpic_sh2a_plts[2] = {
2246 {
2247 /* Big-endian PIC. */
2248 NULL,
2249 0,
2250 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2251 fdpic_sh_plt_entry_be,
2252 FDPIC_PLT_ENTRY_SIZE,
2253 { 12, MINUS_ONE, 16, FALSE },
2254 FDPIC_PLT_LAZY_OFFSET,
2255 &fdpic_sh2a_short_plt_be
2256 },
2257 {
2258 /* Little-endian PIC. */
2259 NULL,
2260 0,
2261 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2262 fdpic_sh_plt_entry_le,
2263 FDPIC_PLT_ENTRY_SIZE,
2264 { 12, MINUS_ONE, 16, FALSE },
2265 FDPIC_PLT_LAZY_OFFSET,
2266 &fdpic_sh2a_short_plt_le
2267 },
2268};
2269
55e6e397
RS
2270/* Return the type of PLT associated with ABFD. PIC_P is true if
2271 the object is position-independent. */
9bdafcce 2272
55e6e397 2273static const struct elf_sh_plt_info *
8e45593f 2274get_plt_info (bfd *abfd, bfd_boolean pic_p)
55e6e397 2275{
8e45593f
NC
2276 if (fdpic_object_p (abfd))
2277 {
2278 /* If any input file requires SH2A we can use a shorter PLT
2279 sequence. */
2280 if (sh_get_arch_from_bfd_mach (bfd_get_mach (abfd)) & arch_sh2a_base)
2281 return &fdpic_sh2a_plts[!bfd_big_endian (abfd)];
2282 else
2283 return &fdpic_sh_plts[!bfd_big_endian (abfd)];
2284 }
55e6e397
RS
2285 if (vxworks_object_p (abfd))
2286 return &vxworks_sh_plts[pic_p][!bfd_big_endian (abfd)];
2287 return &elf_sh_plts[pic_p][!bfd_big_endian (abfd)];
2288}
9bdafcce 2289
55e6e397
RS
2290/* Install a 32-bit PLT field starting at ADDR, which occurs in OUTPUT_BFD.
2291 VALUE is the field's value and CODE_P is true if VALUE refers to code,
2292 not data. */
9bdafcce 2293
55e6e397
RS
2294inline static void
2295install_plt_field (bfd *output_bfd, bfd_boolean code_p ATTRIBUTE_UNUSED,
2296 unsigned long value, bfd_byte *addr)
2297{
2298 bfd_put_32 (output_bfd, value, addr);
2299}
fbca6ad9 2300#endif
015551fc 2301
8e45593f
NC
2302/* The number of PLT entries which can use a shorter PLT, if any.
2303 Currently always 64K, since only SH-2A FDPIC uses this; a
2304 20-bit movi20 can address that many function descriptors below
2305 _GLOBAL_OFFSET_TABLE_. */
2306#define MAX_SHORT_PLT 65536
2307
55e6e397
RS
2308/* Return the index of the PLT entry at byte offset OFFSET. */
2309
2310static bfd_vma
2311get_plt_index (const struct elf_sh_plt_info *info, bfd_vma offset)
2312{
8e45593f
NC
2313 bfd_vma plt_index = 0;
2314
2315 offset -= info->plt0_entry_size;
2316 if (info->short_plt != NULL)
2317 {
2318 if (offset > MAX_SHORT_PLT * info->short_plt->symbol_entry_size)
2319 {
2320 plt_index = MAX_SHORT_PLT;
2321 offset -= MAX_SHORT_PLT * info->short_plt->symbol_entry_size;
2322 }
2323 else
2324 info = info->short_plt;
2325 }
2326 return plt_index + offset / info->symbol_entry_size;
55e6e397
RS
2327}
2328
2329/* Do the inverse operation. */
2330
2331static bfd_vma
91d6fa6a 2332get_plt_offset (const struct elf_sh_plt_info *info, bfd_vma plt_index)
55e6e397 2333{
8e45593f
NC
2334 bfd_vma offset = 0;
2335
2336 if (info->short_plt != NULL)
2337 {
2338 if (plt_index > MAX_SHORT_PLT)
2339 {
2340 offset = MAX_SHORT_PLT * info->short_plt->symbol_entry_size;
2341 plt_index -= MAX_SHORT_PLT;
2342 }
2343 else
2344 info = info->short_plt;
2345 }
2346 return (offset + info->plt0_entry_size
2347 + (plt_index * info->symbol_entry_size));
55e6e397
RS
2348}
2349
37c644f2 2350/* The sh linker needs to keep track of the number of relocs that it
067653c5
AM
2351 decides to copy as dynamic relocs in check_relocs for each symbol.
2352 This is so that it can later discard them if they are found to be
2353 unnecessary. We store the information in a field extending the
2354 regular ELF linker hash table. */
252b5132 2355
067653c5 2356struct elf_sh_dyn_relocs
38b1a46c 2357{
067653c5
AM
2358 struct elf_sh_dyn_relocs *next;
2359
2360 /* The input section of the reloc. */
2361 asection *sec;
2362
2363 /* Total number of relocs copied for the input section. */
37c644f2 2364 bfd_size_type count;
067653c5
AM
2365
2366 /* Number of pc-relative relocs copied for the input section. */
2367 bfd_size_type pc_count;
37c644f2 2368};
252b5132 2369
8e45593f
NC
2370union gotref
2371{
2372 bfd_signed_vma refcount;
2373 bfd_vma offset;
2374};
2375
37c644f2
AO
2376/* sh ELF linker hash entry. */
2377
38b1a46c
NC
2378struct elf_sh_link_hash_entry
2379{
37c644f2
AO
2380 struct elf_link_hash_entry root;
2381
fbca6ad9 2382#ifdef INCLUDE_SHMEDIA
396a6083
SC
2383 union
2384 {
2385 bfd_signed_vma refcount;
2386 bfd_vma offset;
2387 } datalabel_got;
fbca6ad9
AO
2388#endif
2389
067653c5
AM
2390 /* Track dynamic relocs copied for this symbol. */
2391 struct elf_sh_dyn_relocs *dyn_relocs;
4989d792
SC
2392
2393 bfd_signed_vma gotplt_refcount;
3376eaf5 2394
8e45593f
NC
2395 /* A local function descriptor, for FDPIC. The refcount counts
2396 R_SH_FUNCDESC, R_SH_GOTOFFFUNCDESC, and R_SH_GOTOFFFUNCDESC20
2397 relocations; the PLT and GOT entry are accounted
2398 for separately. After adjust_dynamic_symbol, the offset is
2399 MINUS_ONE if there is no local descriptor (dynamic linker
2400 managed and no PLT entry, or undefined weak non-dynamic).
2401 During check_relocs we do not yet know whether the local
2402 descriptor will be canonical. */
2403 union gotref funcdesc;
2404
2405 /* How many of the above refcounted relocations were R_SH_FUNCDESC,
2406 and thus require fixups or relocations. */
2407 bfd_signed_vma abs_funcdesc_refcount;
2408
85e02784 2409 enum got_type {
8e45593f
NC
2410 GOT_UNKNOWN = 0, GOT_NORMAL, GOT_TLS_GD, GOT_TLS_IE, GOT_FUNCDESC
2411 } got_type;
3376eaf5
KK
2412};
2413
2414#define sh_elf_hash_entry(ent) ((struct elf_sh_link_hash_entry *)(ent))
2415
2416struct sh_elf_obj_tdata
2417{
2418 struct elf_obj_tdata root;
2419
8e45593f
NC
2420 /* got_type for each local got entry. */
2421 char *local_got_type;
2422
2423 /* Function descriptor refcount and offset for each local symbol. */
2424 union gotref *local_funcdesc;
37c644f2
AO
2425};
2426
3376eaf5
KK
2427#define sh_elf_tdata(abfd) \
2428 ((struct sh_elf_obj_tdata *) (abfd)->tdata.any)
2429
8e45593f
NC
2430#define sh_elf_local_got_type(abfd) \
2431 (sh_elf_tdata (abfd)->local_got_type)
2432
2433#define sh_elf_local_funcdesc(abfd) \
2434 (sh_elf_tdata (abfd)->local_funcdesc)
3376eaf5 2435
0ffa91dd
NC
2436#define is_sh_elf(bfd) \
2437 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
2438 && elf_tdata (bfd) != NULL \
4dfe6ac6 2439 && elf_object_id (bfd) == SH_ELF_DATA)
0ffa91dd 2440
3376eaf5
KK
2441/* Override the generic function because we need to store sh_elf_obj_tdata
2442 as the specific tdata. */
2443
b34976b6 2444static bfd_boolean
09fd220b 2445sh_elf_mkobject (bfd *abfd)
3376eaf5 2446{
0ffa91dd 2447 return bfd_elf_allocate_object (abfd, sizeof (struct sh_elf_obj_tdata),
4dfe6ac6 2448 SH_ELF_DATA);
3376eaf5 2449}
b34976b6 2450
37c644f2
AO
2451/* sh ELF linker hash table. */
2452
38b1a46c
NC
2453struct elf_sh_link_hash_table
2454{
37c644f2 2455 struct elf_link_hash_table root;
37c644f2 2456
067653c5
AM
2457 /* Short-cuts to get to dynamic linker sections. */
2458 asection *sgot;
2459 asection *sgotplt;
2460 asection *srelgot;
2461 asection *splt;
2462 asection *srelplt;
2463 asection *sdynbss;
2464 asection *srelbss;
8e45593f
NC
2465 asection *sfuncdesc;
2466 asection *srelfuncdesc;
2467 asection *srofixup;
37c644f2 2468
55e6e397
RS
2469 /* The (unloaded but important) VxWorks .rela.plt.unloaded section. */
2470 asection *srelplt2;
2471
87d72d41
AM
2472 /* Small local sym cache. */
2473 struct sym_cache sym_cache;
3376eaf5
KK
2474
2475 /* A counter or offset to track a TLS got entry. */
2476 union
2477 {
2478 bfd_signed_vma refcount;
2479 bfd_vma offset;
2480 } tls_ldm_got;
55e6e397
RS
2481
2482 /* The type of PLT to use. */
2483 const struct elf_sh_plt_info *plt_info;
2484
2485 /* True if the target system is VxWorks. */
2486 bfd_boolean vxworks_p;
8e45593f
NC
2487
2488 /* True if the target system uses FDPIC. */
2489 bfd_boolean fdpic_p;
067653c5 2490};
37c644f2
AO
2491
2492/* Traverse an sh ELF linker hash table. */
2493
2494#define sh_elf_link_hash_traverse(table, func, info) \
2495 (elf_link_hash_traverse \
2496 (&(table)->root, \
09fd220b 2497 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
37c644f2
AO
2498 (info)))
2499
2500/* Get the sh ELF linker hash table from a link_info structure. */
2501
2502#define sh_elf_hash_table(p) \
4dfe6ac6
NC
2503 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
2504 == SH_ELF_DATA ? ((struct elf_sh_link_hash_table *) ((p)->hash)) : NULL)
37c644f2
AO
2505
2506/* Create an entry in an sh ELF linker hash table. */
2507
2508static struct bfd_hash_entry *
09fd220b
KK
2509sh_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
2510 struct bfd_hash_table *table,
2511 const char *string)
37c644f2
AO
2512{
2513 struct elf_sh_link_hash_entry *ret =
2514 (struct elf_sh_link_hash_entry *) entry;
2515
2516 /* Allocate the structure if it has not already been allocated by a
2517 subclass. */
2518 if (ret == (struct elf_sh_link_hash_entry *) NULL)
2519 ret = ((struct elf_sh_link_hash_entry *)
2520 bfd_hash_allocate (table,
2521 sizeof (struct elf_sh_link_hash_entry)));
2522 if (ret == (struct elf_sh_link_hash_entry *) NULL)
2523 return (struct bfd_hash_entry *) ret;
2524
2525 /* Call the allocation method of the superclass. */
2526 ret = ((struct elf_sh_link_hash_entry *)
2527 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
2528 table, string));
2529 if (ret != (struct elf_sh_link_hash_entry *) NULL)
2530 {
396a6083
SC
2531 ret->dyn_relocs = NULL;
2532 ret->gotplt_refcount = 0;
fbca6ad9 2533#ifdef INCLUDE_SHMEDIA
396a6083 2534 ret->datalabel_got.refcount = ret->root.got.refcount;
fbca6ad9 2535#endif
8e45593f
NC
2536 ret->funcdesc.refcount = 0;
2537 ret->abs_funcdesc_refcount = 0;
2538 ret->got_type = GOT_UNKNOWN;
37c644f2
AO
2539 }
2540
2541 return (struct bfd_hash_entry *) ret;
2542}
2543
2544/* Create an sh ELF linker hash table. */
2545
2546static struct bfd_link_hash_table *
09fd220b 2547sh_elf_link_hash_table_create (bfd *abfd)
37c644f2
AO
2548{
2549 struct elf_sh_link_hash_table *ret;
dc810e39 2550 bfd_size_type amt = sizeof (struct elf_sh_link_hash_table);
37c644f2 2551
e2d34d7d 2552 ret = (struct elf_sh_link_hash_table *) bfd_malloc (amt);
37c644f2
AO
2553 if (ret == (struct elf_sh_link_hash_table *) NULL)
2554 return NULL;
2555
66eb6687
AM
2556 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
2557 sh_elf_link_hash_newfunc,
4dfe6ac6
NC
2558 sizeof (struct elf_sh_link_hash_entry),
2559 SH_ELF_DATA))
37c644f2 2560 {
e2d34d7d 2561 free (ret);
37c644f2
AO
2562 return NULL;
2563 }
2564
067653c5
AM
2565 ret->sgot = NULL;
2566 ret->sgotplt = NULL;
2567 ret->srelgot = NULL;
2568 ret->splt = NULL;
2569 ret->srelplt = NULL;
2570 ret->sdynbss = NULL;
2571 ret->srelbss = NULL;
55e6e397 2572 ret->srelplt2 = NULL;
87d72d41 2573 ret->sym_cache.abfd = NULL;
3376eaf5 2574 ret->tls_ldm_got.refcount = 0;
55e6e397
RS
2575 ret->plt_info = NULL;
2576 ret->vxworks_p = vxworks_object_p (abfd);
8e45593f 2577 ret->fdpic_p = fdpic_object_p (abfd);
067653c5 2578
37c644f2
AO
2579 return &ret->root.root;
2580}
2581
8e45593f
NC
2582static bfd_boolean
2583sh_elf_omit_section_dynsym (bfd *output_bfd ATTRIBUTE_UNUSED,
2584 struct bfd_link_info *info, asection *p)
2585{
2586 struct elf_sh_link_hash_table *htab = sh_elf_hash_table (info);
2587
2588 /* Non-FDPIC binaries do not need dynamic symbols for sections. */
2589 if (!htab->fdpic_p)
2590 return TRUE;
2591
2592 /* We need dynamic symbols for every section, since segments can
2593 relocate independently. */
2594 switch (elf_section_data (p)->this_hdr.sh_type)
2595 {
2596 case SHT_PROGBITS:
2597 case SHT_NOBITS:
2598 /* If sh_type is yet undecided, assume it could be
2599 SHT_PROGBITS/SHT_NOBITS. */
2600 case SHT_NULL:
2601 return FALSE;
2602
2603 /* There shouldn't be section relative relocations
2604 against any other section. */
2605 default:
2606 return TRUE;
2607 }
2608}
2609
067653c5
AM
2610/* Create .got, .gotplt, and .rela.got sections in DYNOBJ, and set up
2611 shortcuts to them in our hash table. */
2612
b34976b6 2613static bfd_boolean
09fd220b 2614create_got_section (bfd *dynobj, struct bfd_link_info *info)
067653c5
AM
2615{
2616 struct elf_sh_link_hash_table *htab;
2617
2618 if (! _bfd_elf_create_got_section (dynobj, info))
b34976b6 2619 return FALSE;
067653c5
AM
2620
2621 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
2622 if (htab == NULL)
2623 return FALSE;
2624
067653c5
AM
2625 htab->sgot = bfd_get_section_by_name (dynobj, ".got");
2626 htab->sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
64e77c6d
L
2627 htab->srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
2628 if (! htab->sgot || ! htab->sgotplt || ! htab->srelgot)
067653c5 2629 abort ();
8e45593f
NC
2630
2631 htab->sfuncdesc = bfd_make_section_with_flags (dynobj, ".got.funcdesc",
2632 (SEC_ALLOC | SEC_LOAD
2633 | SEC_HAS_CONTENTS
2634 | SEC_IN_MEMORY
2635 | SEC_LINKER_CREATED));
2636 if (htab->sfuncdesc == NULL
2637 || ! bfd_set_section_alignment (dynobj, htab->sfuncdesc, 2))
2638 return FALSE;
2639
2640 htab->srelfuncdesc = bfd_make_section_with_flags (dynobj,
2641 ".rela.got.funcdesc",
2642 (SEC_ALLOC | SEC_LOAD
2643 | SEC_HAS_CONTENTS
2644 | SEC_IN_MEMORY
2645 | SEC_LINKER_CREATED
2646 | SEC_READONLY));
2647 if (htab->srelfuncdesc == NULL
2648 || ! bfd_set_section_alignment (dynobj, htab->srelfuncdesc, 2))
2649 return FALSE;
2650
2651 /* Also create .rofixup. */
2652 htab->srofixup = bfd_make_section_with_flags (dynobj, ".rofixup",
2653 (SEC_ALLOC | SEC_LOAD
2654 | SEC_HAS_CONTENTS
2655 | SEC_IN_MEMORY
2656 | SEC_LINKER_CREATED
2657 | SEC_READONLY));
2658 if (htab->srofixup == NULL
2659 || ! bfd_set_section_alignment (dynobj, htab->srofixup, 2))
2660 return FALSE;
2661
b34976b6 2662 return TRUE;
067653c5
AM
2663}
2664
37c644f2
AO
2665/* Create dynamic sections when linking against a dynamic object. */
2666
b34976b6 2667static bfd_boolean
09fd220b 2668sh_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
37c644f2 2669{
067653c5 2670 struct elf_sh_link_hash_table *htab;
37c644f2 2671 flagword flags, pltflags;
91d6fa6a 2672 asection *s;
9c5bfbb7 2673 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
37c644f2
AO
2674 int ptralign = 0;
2675
2676 switch (bed->s->arch_size)
2677 {
2678 case 32:
2679 ptralign = 2;
2680 break;
2681
2682 case 64:
2683 ptralign = 3;
2684 break;
2685
2686 default:
2687 bfd_set_error (bfd_error_bad_value);
b34976b6 2688 return FALSE;
37c644f2
AO
2689 }
2690
067653c5 2691 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
2692 if (htab == NULL)
2693 return FALSE;
2694
35cad4c4
KK
2695 if (htab->root.dynamic_sections_created)
2696 return TRUE;
067653c5 2697
37c644f2
AO
2698 /* We need to create .plt, .rel[a].plt, .got, .got.plt, .dynbss, and
2699 .rel[a].bss sections. */
2700
2701 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
2702 | SEC_LINKER_CREATED);
2703
2704 pltflags = flags;
2705 pltflags |= SEC_CODE;
2706 if (bed->plt_not_loaded)
2707 pltflags &= ~ (SEC_LOAD | SEC_HAS_CONTENTS);
2708 if (bed->plt_readonly)
2709 pltflags |= SEC_READONLY;
2710
3496cb2a 2711 s = bfd_make_section_with_flags (abfd, ".plt", pltflags);
35cad4c4
KK
2712 htab->splt = s;
2713 if (s == NULL
35cad4c4
KK
2714 || ! bfd_set_section_alignment (abfd, s, bed->plt_alignment))
2715 return FALSE;
37c644f2
AO
2716
2717 if (bed->want_plt_sym)
2718 {
2719 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
2720 .plt section. */
14a793b2
AM
2721 struct elf_link_hash_entry *h;
2722 struct bfd_link_hash_entry *bh = NULL;
2723
37c644f2
AO
2724 if (! (_bfd_generic_link_add_one_symbol
2725 (info, abfd, "_PROCEDURE_LINKAGE_TABLE_", BSF_GLOBAL, s,
b34976b6 2726 (bfd_vma) 0, (const char *) NULL, FALSE,
14a793b2 2727 get_elf_backend_data (abfd)->collect, &bh)))
b34976b6 2728 return FALSE;
14a793b2
AM
2729
2730 h = (struct elf_link_hash_entry *) bh;
f5385ebf 2731 h->def_regular = 1;
37c644f2 2732 h->type = STT_OBJECT;
7325306f 2733 htab->root.hplt = h;
37c644f2
AO
2734
2735 if (info->shared
c152c796 2736 && ! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 2737 return FALSE;
37c644f2
AO
2738 }
2739
3496cb2a
L
2740 s = bfd_make_section_with_flags (abfd,
2741 bed->default_use_rela_p ? ".rela.plt" : ".rel.plt",
2742 flags | SEC_READONLY);
35cad4c4
KK
2743 htab->srelplt = s;
2744 if (s == NULL
35cad4c4
KK
2745 || ! bfd_set_section_alignment (abfd, s, ptralign))
2746 return FALSE;
37c644f2 2747
2293c499
AM
2748 if (htab->sgot == NULL
2749 && !create_got_section (abfd, info))
b34976b6 2750 return FALSE;
37c644f2 2751
37c644f2
AO
2752 if (bed->want_dynbss)
2753 {
2754 /* The .dynbss section is a place to put symbols which are defined
2755 by dynamic objects, are referenced by regular objects, and are
2756 not functions. We must allocate space for them in the process
2757 image and use a R_*_COPY reloc to tell the dynamic linker to
2758 initialize them at run time. The linker script puts the .dynbss
2759 section into the .bss section of the final image. */
3496cb2a
L
2760 s = bfd_make_section_with_flags (abfd, ".dynbss",
2761 SEC_ALLOC | SEC_LINKER_CREATED);
35cad4c4 2762 htab->sdynbss = s;
3496cb2a 2763 if (s == NULL)
35cad4c4 2764 return FALSE;
37c644f2
AO
2765
2766 /* The .rel[a].bss section holds copy relocs. This section is not
2767 normally needed. We need to create it here, though, so that the
2768 linker will map it to an output section. We can't just create it
2769 only if we need it, because we will not know whether we need it
2770 until we have seen all the input files, and the first time the
2771 main linker code calls BFD after examining all the input files
2772 (size_dynamic_sections) the input sections have already been
2773 mapped to the output sections. If the section turns out not to
2774 be needed, we can discard it later. We will never need this
2775 section when generating a shared object, since they do not use
2776 copy relocs. */
35cad4c4 2777 if (! info->shared)
37c644f2 2778 {
3496cb2a
L
2779 s = bfd_make_section_with_flags (abfd,
2780 (bed->default_use_rela_p
2781 ? ".rela.bss" : ".rel.bss"),
2782 flags | SEC_READONLY);
067653c5 2783 htab->srelbss = s;
37c644f2 2784 if (s == NULL
37c644f2 2785 || ! bfd_set_section_alignment (abfd, s, ptralign))
b34976b6 2786 return FALSE;
37c644f2
AO
2787 }
2788 }
2789
55e6e397
RS
2790 if (htab->vxworks_p)
2791 {
2792 if (!elf_vxworks_create_dynamic_sections (abfd, info, &htab->srelplt2))
2793 return FALSE;
2794 }
2795
b34976b6 2796 return TRUE;
37c644f2
AO
2797}
2798\f
37c644f2
AO
2799/* Adjust a symbol defined by a dynamic object and referenced by a
2800 regular object. The current definition is in some section of the
2801 dynamic object, but we're not including those sections. We have to
2802 change the definition to something the rest of the link can
2803 understand. */
2804
b34976b6 2805static bfd_boolean
09fd220b
KK
2806sh_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
2807 struct elf_link_hash_entry *h)
37c644f2 2808{
067653c5
AM
2809 struct elf_sh_link_hash_table *htab;
2810 struct elf_sh_link_hash_entry *eh;
2811 struct elf_sh_dyn_relocs *p;
37c644f2 2812 asection *s;
37c644f2 2813
2293c499 2814 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
2815 if (htab == NULL)
2816 return FALSE;
37c644f2
AO
2817
2818 /* Make sure we know what is going on here. */
2293c499 2819 BFD_ASSERT (htab->root.dynobj != NULL
f5385ebf 2820 && (h->needs_plt
f6e332e6 2821 || h->u.weakdef != NULL
f5385ebf
AM
2822 || (h->def_dynamic
2823 && h->ref_regular
2824 && !h->def_regular)));
37c644f2
AO
2825
2826 /* If this is a function, put it in the procedure linkage table. We
2827 will fill in the contents of the procedure linkage table later,
2828 when we know the address of the .got section. */
2829 if (h->type == STT_FUNC
f5385ebf 2830 || h->needs_plt)
37c644f2 2831 {
067653c5 2832 if (h->plt.refcount <= 0
3d85aebe
KK
2833 || SYMBOL_CALLS_LOCAL (info, h)
2834 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
2835 && h->root.type == bfd_link_hash_undefweak))
37c644f2
AO
2836 {
2837 /* This case can occur if we saw a PLT reloc in an input
2838 file, but the symbol was never referred to by a dynamic
2839 object. In such a case, we don't actually need to build
2840 a procedure linkage table, and we can just do a REL32
2841 reloc instead. */
067653c5 2842 h->plt.offset = (bfd_vma) -1;
f5385ebf 2843 h->needs_plt = 0;
37c644f2
AO
2844 }
2845
b34976b6 2846 return TRUE;
37c644f2 2847 }
067653c5
AM
2848 else
2849 h->plt.offset = (bfd_vma) -1;
37c644f2
AO
2850
2851 /* If this is a weak symbol, and there is a real definition, the
2852 processor independent code will have arranged for us to see the
2853 real definition first, and we can just use the same value. */
f6e332e6 2854 if (h->u.weakdef != NULL)
37c644f2 2855 {
f6e332e6
AM
2856 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
2857 || h->u.weakdef->root.type == bfd_link_hash_defweak);
2858 h->root.u.def.section = h->u.weakdef->root.u.def.section;
2859 h->root.u.def.value = h->u.weakdef->root.u.def.value;
04e534c3 2860 if (info->nocopyreloc)
f6e332e6 2861 h->non_got_ref = h->u.weakdef->non_got_ref;
b34976b6 2862 return TRUE;
37c644f2
AO
2863 }
2864
2865 /* This is a reference to a symbol defined by a dynamic object which
2866 is not a function. */
2867
2868 /* If we are creating a shared library, we must presume that the
2869 only references to the symbol are via the global offset table.
2870 For such cases we need not do anything here; the relocations will
2871 be handled correctly by relocate_section. */
2872 if (info->shared)
b34976b6 2873 return TRUE;
37c644f2
AO
2874
2875 /* If there are no references to this symbol that do not use the
2876 GOT, we don't need to generate a copy reloc. */
f5385ebf 2877 if (!h->non_got_ref)
b34976b6 2878 return TRUE;
37c644f2 2879
067653c5
AM
2880 /* If -z nocopyreloc was given, we won't generate them either. */
2881 if (info->nocopyreloc)
2882 {
f5385ebf 2883 h->non_got_ref = 0;
b34976b6 2884 return TRUE;
067653c5
AM
2885 }
2886
2887 eh = (struct elf_sh_link_hash_entry *) h;
2888 for (p = eh->dyn_relocs; p != NULL; p = p->next)
2889 {
2890 s = p->sec->output_section;
2891 if (s != NULL && (s->flags & (SEC_READONLY | SEC_HAS_CONTENTS)) != 0)
2892 break;
2893 }
2894
2895 /* If we didn't find any dynamic relocs in sections which needs the
2896 copy reloc, then we'll be keeping the dynamic relocs and avoiding
2897 the copy reloc. */
2898 if (p == NULL)
2899 {
f5385ebf 2900 h->non_got_ref = 0;
b34976b6 2901 return TRUE;
067653c5
AM
2902 }
2903
37c644f2
AO
2904 /* We must allocate the symbol in our .dynbss section, which will
2905 become part of the .bss section of the executable. There will be
2906 an entry for this symbol in the .dynsym section. The dynamic
2907 object will contain position independent code, so all references
2908 from the dynamic object to this symbol will go through the global
2909 offset table. The dynamic linker will use the .dynsym entry to
2910 determine the address it must put in the global offset table, so
2911 both the dynamic object and the regular object will refer to the
2912 same memory location for the variable. */
2913
067653c5 2914 s = htab->sdynbss;
37c644f2
AO
2915 BFD_ASSERT (s != NULL);
2916
2917 /* We must generate a R_SH_COPY reloc to tell the dynamic linker to
2918 copy the initial value out of the dynamic object and into the
2919 runtime process image. We need to remember the offset into the
2920 .rela.bss section we are going to use. */
1d7e9d18 2921 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
37c644f2
AO
2922 {
2923 asection *srel;
2924
067653c5 2925 srel = htab->srelbss;
37c644f2 2926 BFD_ASSERT (srel != NULL);
eea6121a 2927 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 2928 h->needs_copy = 1;
37c644f2
AO
2929 }
2930
027297b7 2931 return _bfd_elf_adjust_dynamic_copy (h, s);
37c644f2
AO
2932}
2933
067653c5
AM
2934/* Allocate space in .plt, .got and associated reloc sections for
2935 dynamic relocs. */
2936
b34976b6 2937static bfd_boolean
09fd220b 2938allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
067653c5
AM
2939{
2940 struct bfd_link_info *info;
2941 struct elf_sh_link_hash_table *htab;
2942 struct elf_sh_link_hash_entry *eh;
2943 struct elf_sh_dyn_relocs *p;
2944
2945 if (h->root.type == bfd_link_hash_indirect)
b34976b6 2946 return TRUE;
067653c5 2947
067653c5
AM
2948 info = (struct bfd_link_info *) inf;
2949 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
2950 if (htab == NULL)
2951 return FALSE;
067653c5 2952
4989d792
SC
2953 eh = (struct elf_sh_link_hash_entry *) h;
2954 if ((h->got.refcount > 0
f5385ebf 2955 || h->forced_local)
4989d792
SC
2956 && eh->gotplt_refcount > 0)
2957 {
2958 /* The symbol has been forced local, or we have some direct got refs,
26e41594 2959 so treat all the gotplt refs as got refs. */
4989d792
SC
2960 h->got.refcount += eh->gotplt_refcount;
2961 if (h->plt.refcount >= eh->gotplt_refcount)
2962 h->plt.refcount -= eh->gotplt_refcount;
2963 }
2964
067653c5 2965 if (htab->root.dynamic_sections_created
04e534c3
KK
2966 && h->plt.refcount > 0
2967 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2968 || h->root.type != bfd_link_hash_undefweak))
067653c5
AM
2969 {
2970 /* Make sure this symbol is output as a dynamic symbol.
2971 Undefined weak syms won't yet be marked as dynamic. */
2972 if (h->dynindx == -1
f5385ebf 2973 && !h->forced_local)
067653c5 2974 {
c152c796 2975 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 2976 return FALSE;
067653c5
AM
2977 }
2978
267fb3c1
KK
2979 if (info->shared
2980 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
067653c5
AM
2981 {
2982 asection *s = htab->splt;
8e45593f 2983 const struct elf_sh_plt_info *plt_info;
067653c5
AM
2984
2985 /* If this is the first .plt entry, make room for the special
2986 first entry. */
eea6121a 2987 if (s->size == 0)
55e6e397 2988 s->size += htab->plt_info->plt0_entry_size;
067653c5 2989
eea6121a 2990 h->plt.offset = s->size;
067653c5
AM
2991
2992 /* If this symbol is not defined in a regular file, and we are
2993 not generating a shared library, then set the symbol to this
2994 location in the .plt. This is required to make function
2995 pointers compare as equal between the normal executable and
8e45593f
NC
2996 the shared library. Skip this for FDPIC, since the
2997 function's address will be the address of the canonical
2998 function descriptor. */
2999 if (!htab->fdpic_p && !info->shared && !h->def_regular)
067653c5
AM
3000 {
3001 h->root.u.def.section = s;
3002 h->root.u.def.value = h->plt.offset;
3003 }
3004
3005 /* Make room for this entry. */
8e45593f
NC
3006 plt_info = htab->plt_info;
3007 if (plt_info->short_plt != NULL
3008 && (get_plt_index (plt_info->short_plt, s->size) < MAX_SHORT_PLT))
3009 plt_info = plt_info->short_plt;
3010 s->size += plt_info->symbol_entry_size;
067653c5
AM
3011
3012 /* We also need to make an entry in the .got.plt section, which
3013 will be placed in the .got section by the linker script. */
8e45593f
NC
3014 if (!htab->fdpic_p)
3015 htab->sgotplt->size += 4;
3016 else
3017 htab->sgotplt->size += 8;
067653c5
AM
3018
3019 /* We also need to make an entry in the .rel.plt section. */
eea6121a 3020 htab->srelplt->size += sizeof (Elf32_External_Rela);
55e6e397
RS
3021
3022 if (htab->vxworks_p && !info->shared)
3023 {
3024 /* VxWorks executables have a second set of relocations
3025 for each PLT entry. They go in a separate relocation
3026 section, which is processed by the kernel loader. */
3027
3028 /* There is a relocation for the initial PLT entry:
3029 an R_SH_DIR32 relocation for _GLOBAL_OFFSET_TABLE_. */
3030 if (h->plt.offset == htab->plt_info->plt0_entry_size)
3031 htab->srelplt2->size += sizeof (Elf32_External_Rela);
3032
3033 /* There are two extra relocations for each subsequent
3034 PLT entry: an R_SH_DIR32 relocation for the GOT entry,
3035 and an R_SH_DIR32 relocation for the PLT entry. */
3036 htab->srelplt2->size += sizeof (Elf32_External_Rela) * 2;
3037 }
067653c5
AM
3038 }
3039 else
3040 {
3041 h->plt.offset = (bfd_vma) -1;
f5385ebf 3042 h->needs_plt = 0;
067653c5
AM
3043 }
3044 }
3045 else
3046 {
3047 h->plt.offset = (bfd_vma) -1;
f5385ebf 3048 h->needs_plt = 0;
067653c5
AM
3049 }
3050
3051 if (h->got.refcount > 0)
3052 {
3053 asection *s;
b34976b6 3054 bfd_boolean dyn;
85e02784 3055 enum got_type got_type = sh_elf_hash_entry (h)->got_type;
067653c5
AM
3056
3057 /* Make sure this symbol is output as a dynamic symbol.
3058 Undefined weak syms won't yet be marked as dynamic. */
3059 if (h->dynindx == -1
f5385ebf 3060 && !h->forced_local)
067653c5 3061 {
c152c796 3062 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 3063 return FALSE;
067653c5
AM
3064 }
3065
3066 s = htab->sgot;
eea6121a
AM
3067 h->got.offset = s->size;
3068 s->size += 4;
3376eaf5 3069 /* R_SH_TLS_GD needs 2 consecutive GOT slots. */
8e45593f 3070 if (got_type == GOT_TLS_GD)
eea6121a 3071 s->size += 4;
067653c5 3072 dyn = htab->root.dynamic_sections_created;
8e45593f
NC
3073 if (!dyn)
3074 {
3075 /* No dynamic relocations required. */
3076 if (htab->fdpic_p && !info->shared
3077 && h->root.type != bfd_link_hash_undefweak
3078 && (got_type == GOT_NORMAL || got_type == GOT_FUNCDESC))
3079 htab->srofixup->size += 4;
3080 }
87458ed2
KK
3081 /* No dynamic relocations required when IE->LE conversion happens. */
3082 else if (got_type == GOT_TLS_IE && !h->def_dynamic && !info->shared)
3083 ;
267fb3c1 3084 /* R_SH_TLS_IE_32 needs one dynamic relocation if dynamic,
3376eaf5 3085 R_SH_TLS_GD needs one if local symbol and two if global. */
8e45593f
NC
3086 else if ((got_type == GOT_TLS_GD && h->dynindx == -1)
3087 || got_type == GOT_TLS_IE)
eea6121a 3088 htab->srelgot->size += sizeof (Elf32_External_Rela);
8e45593f 3089 else if (got_type == GOT_TLS_GD)
eea6121a 3090 htab->srelgot->size += 2 * sizeof (Elf32_External_Rela);
8e45593f
NC
3091 else if (got_type == GOT_FUNCDESC)
3092 {
3093 if (!info->shared && SYMBOL_FUNCDESC_LOCAL (info, h))
3094 htab->srofixup->size += 4;
3095 else
3096 htab->srelgot->size += sizeof (Elf32_External_Rela);
3097 }
04e534c3
KK
3098 else if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
3099 || h->root.type != bfd_link_hash_undefweak)
3100 && (info->shared
3101 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
eea6121a 3102 htab->srelgot->size += sizeof (Elf32_External_Rela);
8e45593f
NC
3103 else if (htab->fdpic_p && !info->shared && got_type == GOT_NORMAL
3104 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
3105 || h->root.type != bfd_link_hash_undefweak))
3106 htab->srofixup->size += 4;
067653c5
AM
3107 }
3108 else
3109 h->got.offset = (bfd_vma) -1;
3110
396a6083
SC
3111#ifdef INCLUDE_SHMEDIA
3112 if (eh->datalabel_got.refcount > 0)
3113 {
3114 asection *s;
b34976b6 3115 bfd_boolean dyn;
396a6083
SC
3116
3117 /* Make sure this symbol is output as a dynamic symbol.
3118 Undefined weak syms won't yet be marked as dynamic. */
3119 if (h->dynindx == -1
f5385ebf 3120 && !h->forced_local)
396a6083 3121 {
c152c796 3122 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 3123 return FALSE;
396a6083
SC
3124 }
3125
3126 s = htab->sgot;
eea6121a
AM
3127 eh->datalabel_got.offset = s->size;
3128 s->size += 4;
396a6083 3129 dyn = htab->root.dynamic_sections_created;
267fb3c1 3130 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h))
eea6121a 3131 htab->srelgot->size += sizeof (Elf32_External_Rela);
396a6083
SC
3132 }
3133 else
3134 eh->datalabel_got.offset = (bfd_vma) -1;
3135#endif
3136
8e45593f
NC
3137 /* Allocate space for any dynamic relocations to function
3138 descriptors, canonical or otherwise. We need to relocate the
3139 reference unless it resolves to zero, which only happens for
3140 undefined weak symbols (either non-default visibility, or when
3141 static linking). Any GOT slot is accounted for elsewhere. */
3142 if (eh->abs_funcdesc_refcount > 0
3143 && (h->root.type != bfd_link_hash_undefweak
3144 || (htab->root.dynamic_sections_created
3145 && ! SYMBOL_CALLS_LOCAL (info, h))))
3146 {
3147 if (!info->shared && SYMBOL_FUNCDESC_LOCAL (info, h))
3148 htab->srofixup->size += eh->abs_funcdesc_refcount * 4;
3149 else
3150 htab->srelgot->size
3151 += eh->abs_funcdesc_refcount * sizeof (Elf32_External_Rela);
3152 }
3153
3154 /* We must allocate a function descriptor if there are references to
3155 a canonical descriptor (R_SH_GOTFUNCDESC or R_SH_FUNCDESC) and
3156 the dynamic linker isn't going to allocate it. None of this
3157 applies if we already created one in .got.plt, but if the
3158 canonical function descriptor can be in this object, there
3159 won't be a PLT entry at all. */
3160 if ((eh->funcdesc.refcount > 0
3161 || (h->got.offset != MINUS_ONE && eh->got_type == GOT_FUNCDESC))
3162 && h->root.type != bfd_link_hash_undefweak
3163 && SYMBOL_FUNCDESC_LOCAL (info, h))
3164 {
3165 /* Make room for this function descriptor. */
3166 eh->funcdesc.offset = htab->sfuncdesc->size;
3167 htab->sfuncdesc->size += 8;
3168
3169 /* We will need a relocation or two fixups to initialize the
3170 function descriptor, so allocate those too. */
3171 if (!info->shared && SYMBOL_CALLS_LOCAL (info, h))
3172 htab->srofixup->size += 8;
3173 else
3174 htab->srelfuncdesc->size += sizeof (Elf32_External_Rela);
3175 }
3176
067653c5 3177 if (eh->dyn_relocs == NULL)
b34976b6 3178 return TRUE;
067653c5
AM
3179
3180 /* In the shared -Bsymbolic case, discard space allocated for
3181 dynamic pc-relative relocs against symbols which turn out to be
3182 defined in regular objects. For the normal shared case, discard
3183 space for pc-relative relocs that have become local due to symbol
3184 visibility changes. */
3185
3186 if (info->shared)
3187 {
3d85aebe 3188 if (SYMBOL_CALLS_LOCAL (info, h))
067653c5
AM
3189 {
3190 struct elf_sh_dyn_relocs **pp;
3191
3192 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
3193 {
3194 p->count -= p->pc_count;
3195 p->pc_count = 0;
3196 if (p->count == 0)
3197 *pp = p->next;
3198 else
3199 pp = &p->next;
3200 }
3201 }
04e534c3 3202
3348747a
NS
3203 if (htab->vxworks_p)
3204 {
3205 struct elf_sh_dyn_relocs **pp;
3206
3207 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
3208 {
3209 if (strcmp (p->sec->output_section->name, ".tls_vars") == 0)
3210 *pp = p->next;
3211 else
3212 pp = &p->next;
3213 }
3214 }
3215
04e534c3
KK
3216 /* Also discard relocs on undefined weak syms with non-default
3217 visibility. */
22d606e9 3218 if (eh->dyn_relocs != NULL
04e534c3 3219 && h->root.type == bfd_link_hash_undefweak)
22d606e9
AM
3220 {
3221 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
3222 eh->dyn_relocs = NULL;
3223
3224 /* Make sure undefined weak symbols are output as a dynamic
3225 symbol in PIEs. */
3226 else if (h->dynindx == -1
3227 && !h->forced_local)
3228 {
3229 if (! bfd_elf_link_record_dynamic_symbol (info, h))
3230 return FALSE;
3231 }
3232 }
067653c5
AM
3233 }
3234 else
3235 {
3236 /* For the non-shared case, discard space for relocs against
3237 symbols which turn out to need copy relocs or are not
3238 dynamic. */
3239
f5385ebf
AM
3240 if (!h->non_got_ref
3241 && ((h->def_dynamic
3242 && !h->def_regular)
067653c5
AM
3243 || (htab->root.dynamic_sections_created
3244 && (h->root.type == bfd_link_hash_undefweak
3245 || h->root.type == bfd_link_hash_undefined))))
3246 {
3247 /* Make sure this symbol is output as a dynamic symbol.
3248 Undefined weak syms won't yet be marked as dynamic. */
3249 if (h->dynindx == -1
f5385ebf 3250 && !h->forced_local)
067653c5 3251 {
c152c796 3252 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 3253 return FALSE;
067653c5
AM
3254 }
3255
3256 /* If that succeeded, we know we'll be keeping all the
3257 relocs. */
3258 if (h->dynindx != -1)
3259 goto keep;
3260 }
3261
3262 eh->dyn_relocs = NULL;
3263
3264 keep: ;
3265 }
3266
3267 /* Finally, allocate space. */
3268 for (p = eh->dyn_relocs; p != NULL; p = p->next)
3269 {
3270 asection *sreloc = elf_section_data (p->sec)->sreloc;
eea6121a 3271 sreloc->size += p->count * sizeof (Elf32_External_Rela);
8e45593f
NC
3272
3273 /* If we need relocations, we do not need fixups. */
3274 if (htab->fdpic_p && !info->shared)
3275 htab->srofixup->size -= 4 * (p->count - p->pc_count);
067653c5
AM
3276 }
3277
b34976b6 3278 return TRUE;
067653c5
AM
3279}
3280
3281/* Find any dynamic relocs that apply to read-only sections. */
3282
b34976b6 3283static bfd_boolean
09fd220b 3284readonly_dynrelocs (struct elf_link_hash_entry *h, void *inf)
067653c5
AM
3285{
3286 struct elf_sh_link_hash_entry *eh;
3287 struct elf_sh_dyn_relocs *p;
3288
067653c5
AM
3289 eh = (struct elf_sh_link_hash_entry *) h;
3290 for (p = eh->dyn_relocs; p != NULL; p = p->next)
3291 {
3292 asection *s = p->sec->output_section;
3293
3294 if (s != NULL && (s->flags & SEC_READONLY) != 0)
3295 {
3296 struct bfd_link_info *info = (struct bfd_link_info *) inf;
3297
3298 info->flags |= DF_TEXTREL;
3299
3300 /* Not an error, just cut short the traversal. */
b34976b6 3301 return FALSE;
067653c5
AM
3302 }
3303 }
b34976b6 3304 return TRUE;
067653c5
AM
3305}
3306
55e6e397
RS
3307/* This function is called after all the input files have been read,
3308 and the input sections have been assigned to output sections.
3309 It's a convenient place to determine the PLT style. */
3310
3311static bfd_boolean
3312sh_elf_always_size_sections (bfd *output_bfd, struct bfd_link_info *info)
3313{
3314 sh_elf_hash_table (info)->plt_info = get_plt_info (output_bfd, info->shared);
8e45593f
NC
3315
3316 if (sh_elf_hash_table (info)->fdpic_p && !info->relocatable)
3317 {
3318 struct elf_link_hash_entry *h;
3319
3320 /* Force a PT_GNU_STACK segment to be created. */
3321 if (! elf_tdata (output_bfd)->stack_flags)
3322 elf_tdata (output_bfd)->stack_flags = PF_R | PF_W | PF_X;
3323
3324 /* Define __stacksize if it's not defined yet. */
3325 h = elf_link_hash_lookup (elf_hash_table (info), "__stacksize",
3326 FALSE, FALSE, FALSE);
3327 if (! h || h->root.type != bfd_link_hash_defined
3328 || h->type != STT_OBJECT
3329 || !h->def_regular)
3330 {
3331 struct bfd_link_hash_entry *bh = NULL;
3332
3333 if (!(_bfd_generic_link_add_one_symbol
3334 (info, output_bfd, "__stacksize",
3335 BSF_GLOBAL, bfd_abs_section_ptr, DEFAULT_STACK_SIZE,
3336 (const char *) NULL, FALSE,
3337 get_elf_backend_data (output_bfd)->collect, &bh)))
3338 return FALSE;
3339
3340 h = (struct elf_link_hash_entry *) bh;
3341 h->def_regular = 1;
3342 h->type = STT_OBJECT;
3343 }
3344 }
3345 return TRUE;
3346}
3347
3348#if !defined INCLUDE_SHMEDIA && !defined SH_TARGET_ALREADY_DEFINED
3349
3350static bfd_boolean
3351sh_elf_modify_program_headers (bfd *output_bfd, struct bfd_link_info *info)
3352{
3353 struct elf_obj_tdata *tdata = elf_tdata (output_bfd);
3354 struct elf_segment_map *m;
3355 Elf_Internal_Phdr *p;
3356
3357 /* objcopy and strip preserve what's already there using
3358 sh_elf_copy_private_bfd_data (). */
3359 if (! info)
3360 return TRUE;
3361
3362 for (p = tdata->phdr, m = tdata->segment_map; m != NULL; m = m->next, p++)
3363 if (m->p_type == PT_GNU_STACK)
3364 break;
3365
3366 if (m)
3367 {
3368 struct elf_link_hash_entry *h;
3369
3370 /* Obtain the pointer to the __stacksize symbol. */
3371 h = elf_link_hash_lookup (elf_hash_table (info), "__stacksize",
3372 FALSE, FALSE, FALSE);
3373 if (h)
3374 {
3375 while (h->root.type == bfd_link_hash_indirect
3376 || h->root.type == bfd_link_hash_warning)
3377 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3378 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
3379 }
3380
3381 /* Set the header p_memsz from the symbol value. We
3382 intentionally ignore the symbol section. */
3383 if (h && h->root.type == bfd_link_hash_defined)
3384 p->p_memsz = h->root.u.def.value;
3385 else
3386 p->p_memsz = DEFAULT_STACK_SIZE;
3387
3388 p->p_align = 8;
3389 }
3390
55e6e397
RS
3391 return TRUE;
3392}
3393
8e45593f
NC
3394#endif
3395
37c644f2
AO
3396/* Set the sizes of the dynamic sections. */
3397
b34976b6 3398static bfd_boolean
09fd220b
KK
3399sh_elf_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
3400 struct bfd_link_info *info)
37c644f2 3401{
067653c5 3402 struct elf_sh_link_hash_table *htab;
37c644f2
AO
3403 bfd *dynobj;
3404 asection *s;
b34976b6 3405 bfd_boolean relocs;
067653c5 3406 bfd *ibfd;
37c644f2 3407
067653c5 3408 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
3409 if (htab == NULL)
3410 return FALSE;
3411
067653c5 3412 dynobj = htab->root.dynobj;
37c644f2
AO
3413 BFD_ASSERT (dynobj != NULL);
3414
067653c5 3415 if (htab->root.dynamic_sections_created)
37c644f2
AO
3416 {
3417 /* Set the contents of the .interp section to the interpreter. */
2558b9a9 3418 if (info->executable)
37c644f2
AO
3419 {
3420 s = bfd_get_section_by_name (dynobj, ".interp");
3421 BFD_ASSERT (s != NULL);
eea6121a 3422 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
37c644f2
AO
3423 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
3424 }
3425 }
37c644f2 3426
067653c5
AM
3427 /* Set up .got offsets for local syms, and space for local dynamic
3428 relocs. */
3429 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
37c644f2 3430 {
067653c5
AM
3431 bfd_signed_vma *local_got;
3432 bfd_signed_vma *end_local_got;
8e45593f
NC
3433 union gotref *local_funcdesc, *end_local_funcdesc;
3434 char *local_got_type;
067653c5
AM
3435 bfd_size_type locsymcount;
3436 Elf_Internal_Shdr *symtab_hdr;
3437 asection *srel;
37c644f2 3438
0ffa91dd 3439 if (! is_sh_elf (ibfd))
37c644f2
AO
3440 continue;
3441
067653c5 3442 for (s = ibfd->sections; s != NULL; s = s->next)
37c644f2 3443 {
067653c5
AM
3444 struct elf_sh_dyn_relocs *p;
3445
3446 for (p = ((struct elf_sh_dyn_relocs *)
3447 elf_section_data (s)->local_dynrel);
3448 p != NULL;
3449 p = p->next)
37c644f2 3450 {
067653c5
AM
3451 if (! bfd_is_abs_section (p->sec)
3452 && bfd_is_abs_section (p->sec->output_section))
3453 {
3454 /* Input section has been discarded, either because
3455 it is a copy of a linkonce section or due to
3456 linker script /DISCARD/, so we'll be discarding
3457 the relocs too. */
3458 }
3348747a
NS
3459 else if (htab->vxworks_p
3460 && strcmp (p->sec->output_section->name,
3461 ".tls_vars") == 0)
3462 {
3463 /* Relocations in vxworks .tls_vars sections are
3464 handled specially by the loader. */
3465 }
067653c5
AM
3466 else if (p->count != 0)
3467 {
3468 srel = elf_section_data (p->sec)->sreloc;
eea6121a 3469 srel->size += p->count * sizeof (Elf32_External_Rela);
067653c5
AM
3470 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
3471 info->flags |= DF_TEXTREL;
8e45593f
NC
3472
3473 /* If we need relocations, we do not need fixups. */
3474 if (htab->fdpic_p && !info->shared)
3475 htab->srofixup->size -= 4 * (p->count - p->pc_count);
067653c5 3476 }
37c644f2
AO
3477 }
3478 }
067653c5 3479
0ffa91dd 3480 symtab_hdr = &elf_symtab_hdr (ibfd);
067653c5
AM
3481 locsymcount = symtab_hdr->sh_info;
3482#ifdef INCLUDE_SHMEDIA
3483 /* Count datalabel local GOT. */
3484 locsymcount *= 2;
3485#endif
067653c5
AM
3486 s = htab->sgot;
3487 srel = htab->srelgot;
8e45593f
NC
3488
3489 local_got = elf_local_got_refcounts (ibfd);
3490 if (local_got)
37c644f2 3491 {
8e45593f
NC
3492 end_local_got = local_got + locsymcount;
3493 local_got_type = sh_elf_local_got_type (ibfd);
3494 local_funcdesc = sh_elf_local_funcdesc (ibfd);
3495 for (; local_got < end_local_got; ++local_got)
37c644f2 3496 {
8e45593f
NC
3497 if (*local_got > 0)
3498 {
3499 *local_got = s->size;
3500 s->size += 4;
3501 if (*local_got_type == GOT_TLS_GD)
3502 s->size += 4;
3503 if (info->shared)
3504 srel->size += sizeof (Elf32_External_Rela);
3505 else
3506 htab->srofixup->size += 4;
3507
3508 if (*local_got_type == GOT_FUNCDESC)
3509 {
3510 if (local_funcdesc == NULL)
3511 {
3512 bfd_size_type size;
3513
3514 size = locsymcount * sizeof (union gotref);
3515 local_funcdesc = (union gotref *) bfd_zalloc (ibfd,
3516 size);
3517 if (local_funcdesc == NULL)
3518 return FALSE;
3519 sh_elf_local_funcdesc (ibfd) = local_funcdesc;
3520 local_funcdesc += (local_got
3521 - elf_local_got_refcounts (ibfd));
3522 }
3523 local_funcdesc->refcount++;
3524 ++local_funcdesc;
3525 }
3526 }
3527 else
3528 *local_got = (bfd_vma) -1;
3529 ++local_got_type;
3530 }
3531 }
3532
3533 local_funcdesc = sh_elf_local_funcdesc (ibfd);
3534 if (local_funcdesc)
3535 {
3536 end_local_funcdesc = local_funcdesc + locsymcount;
3537
3538 for (; local_funcdesc < end_local_funcdesc; ++local_funcdesc)
3539 {
3540 if (local_funcdesc->refcount > 0)
3541 {
3542 local_funcdesc->offset = htab->sfuncdesc->size;
3543 htab->sfuncdesc->size += 8;
3544 if (!info->shared)
3545 htab->srofixup->size += 8;
3546 else
3547 htab->srelfuncdesc->size += sizeof (Elf32_External_Rela);
3548 }
3549 else
3550 local_funcdesc->offset = MINUS_ONE;
37c644f2 3551 }
37c644f2 3552 }
8e45593f 3553
067653c5
AM
3554 }
3555
3376eaf5
KK
3556 if (htab->tls_ldm_got.refcount > 0)
3557 {
3558 /* Allocate 2 got entries and 1 dynamic reloc for R_SH_TLS_LD_32
3559 relocs. */
eea6121a
AM
3560 htab->tls_ldm_got.offset = htab->sgot->size;
3561 htab->sgot->size += 8;
3562 htab->srelgot->size += sizeof (Elf32_External_Rela);
3376eaf5
KK
3563 }
3564 else
3565 htab->tls_ldm_got.offset = -1;
3566
8e45593f
NC
3567 /* Only the reserved entries should be present. For FDPIC, they go at
3568 the end of .got.plt. */
3569 if (htab->fdpic_p)
3570 {
3571 BFD_ASSERT (htab->sgotplt && htab->sgotplt->size == 12);
3572 htab->sgotplt->size = 0;
3573 }
3574
067653c5
AM
3575 /* Allocate global sym .plt and .got entries, and space for global
3576 sym dynamic relocs. */
09fd220b 3577 elf_link_hash_traverse (&htab->root, allocate_dynrelocs, info);
067653c5 3578
8e45593f
NC
3579 /* Move the reserved entries and the _GLOBAL_OFFSET_TABLE_ symbol to the
3580 end of the FDPIC .got.plt. */
3581 if (htab->fdpic_p)
3582 {
3583 htab->root.hgot->root.u.def.value = htab->sgotplt->size;
3584 htab->sgotplt->size += 12;
3585 }
3586
3587 /* At the very end of the .rofixup section is a pointer to the GOT. */
3588 if (htab->fdpic_p && htab->srofixup != NULL)
3589 htab->srofixup->size += 4;
3590
067653c5
AM
3591 /* We now have determined the sizes of the various dynamic sections.
3592 Allocate memory for them. */
b34976b6 3593 relocs = FALSE;
067653c5
AM
3594 for (s = dynobj->sections; s != NULL; s = s->next)
3595 {
3596 if ((s->flags & SEC_LINKER_CREATED) == 0)
3597 continue;
3598
3599 if (s == htab->splt
3600 || s == htab->sgot
c456f082 3601 || s == htab->sgotplt
8e45593f
NC
3602 || s == htab->sfuncdesc
3603 || s == htab->srofixup
c456f082 3604 || s == htab->sdynbss)
067653c5
AM
3605 {
3606 /* Strip this section if we don't need it; see the
3607 comment below. */
3608 }
0112cd26 3609 else if (CONST_STRNEQ (bfd_get_section_name (dynobj, s), ".rela"))
067653c5 3610 {
55e6e397 3611 if (s->size != 0 && s != htab->srelplt && s != htab->srelplt2)
b34976b6 3612 relocs = TRUE;
067653c5
AM
3613
3614 /* We use the reloc_count field as a counter if we need
3615 to copy relocs into the output file. */
3616 s->reloc_count = 0;
3617 }
3618 else
37c644f2
AO
3619 {
3620 /* It's not one of our sections, so don't allocate space. */
3621 continue;
3622 }
3623
eea6121a 3624 if (s->size == 0)
37c644f2 3625 {
067653c5
AM
3626 /* If we don't need this section, strip it from the
3627 output file. This is mostly to handle .rela.bss and
3628 .rela.plt. We must create both sections in
3629 create_dynamic_sections, because they must be created
3630 before the linker maps input sections to output
3631 sections. The linker does that before
3632 adjust_dynamic_symbol is called, and it is that
3633 function which decides whether anything needs to go
3634 into these sections. */
3635
8423293d 3636 s->flags |= SEC_EXCLUDE;
37c644f2
AO
3637 continue;
3638 }
3639
c456f082
AM
3640 if ((s->flags & SEC_HAS_CONTENTS) == 0)
3641 continue;
3642
067653c5
AM
3643 /* Allocate memory for the section contents. We use bfd_zalloc
3644 here in case unused entries are not reclaimed before the
3645 section's contents are written out. This should not happen,
3646 but this way if it does, we get a R_SH_NONE reloc instead
3647 of garbage. */
eea6121a 3648 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
067653c5 3649 if (s->contents == NULL)
b34976b6 3650 return FALSE;
37c644f2
AO
3651 }
3652
067653c5 3653 if (htab->root.dynamic_sections_created)
37c644f2
AO
3654 {
3655 /* Add some entries to the .dynamic section. We fill in the
3656 values later, in sh_elf_finish_dynamic_sections, but we
3657 must add the entries now so that we get the correct size for
3658 the .dynamic section. The DT_DEBUG entry is filled in by the
3659 dynamic linker and used by the debugger. */
dc810e39 3660#define add_dynamic_entry(TAG, VAL) \
5a580b3a 3661 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 3662
2558b9a9 3663 if (info->executable)
37c644f2 3664 {
067653c5 3665 if (! add_dynamic_entry (DT_DEBUG, 0))
b34976b6 3666 return FALSE;
37c644f2
AO
3667 }
3668
eea6121a 3669 if (htab->splt->size != 0)
37c644f2 3670 {
067653c5
AM
3671 if (! add_dynamic_entry (DT_PLTGOT, 0)
3672 || ! add_dynamic_entry (DT_PLTRELSZ, 0)
3673 || ! add_dynamic_entry (DT_PLTREL, DT_RELA)
3674 || ! add_dynamic_entry (DT_JMPREL, 0))
b34976b6 3675 return FALSE;
37c644f2 3676 }
8e45593f
NC
3677 else if ((elf_elfheader (output_bfd)->e_flags & EF_SH_FDPIC)
3678 && htab->sgot->size != 0)
3679 {
3680 if (! add_dynamic_entry (DT_PLTGOT, 0))
3681 return FALSE;
3682 }
37c644f2
AO
3683
3684 if (relocs)
3685 {
067653c5
AM
3686 if (! add_dynamic_entry (DT_RELA, 0)
3687 || ! add_dynamic_entry (DT_RELASZ, 0)
3688 || ! add_dynamic_entry (DT_RELAENT,
3689 sizeof (Elf32_External_Rela)))
b34976b6 3690 return FALSE;
37c644f2 3691
067653c5
AM
3692 /* If any dynamic relocs apply to a read-only section,
3693 then we need a DT_TEXTREL entry. */
3694 if ((info->flags & DF_TEXTREL) == 0)
09fd220b 3695 elf_link_hash_traverse (&htab->root, readonly_dynrelocs, info);
067653c5
AM
3696
3697 if ((info->flags & DF_TEXTREL) != 0)
3698 {
3699 if (! add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 3700 return FALSE;
067653c5 3701 }
37c644f2 3702 }
7a2b07ff
NS
3703 if (htab->vxworks_p
3704 && !elf_vxworks_add_dynamic_entries (output_bfd, info))
3705 return FALSE;
37c644f2 3706 }
dc810e39 3707#undef add_dynamic_entry
37c644f2 3708
b34976b6 3709 return TRUE;
37c644f2 3710}
37c644f2 3711\f
8e45593f 3712/* Add a dynamic relocation to the SRELOC section. */
37c644f2 3713
8e45593f
NC
3714inline static bfd_vma
3715sh_elf_add_dyn_reloc (bfd *output_bfd, asection *sreloc, bfd_vma offset,
3716 int reloc_type, long dynindx, bfd_vma addend)
37c644f2 3717{
8e45593f
NC
3718 Elf_Internal_Rela outrel;
3719 bfd_vma reloc_offset;
37c644f2 3720
8e45593f
NC
3721 outrel.r_offset = offset;
3722 outrel.r_info = ELF32_R_INFO (dynindx, reloc_type);
3723 outrel.r_addend = addend;
0ffa91dd 3724
8e45593f
NC
3725 reloc_offset = sreloc->reloc_count * sizeof (Elf32_External_Rela);
3726 BFD_ASSERT (reloc_offset < sreloc->size);
3727 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
3728 sreloc->contents + reloc_offset);
3729 sreloc->reloc_count++;
37c644f2 3730
8e45593f
NC
3731 return reloc_offset;
3732}
37c644f2 3733
8e45593f 3734/* Add an FDPIC read-only fixup. */
37c644f2 3735
8e45593f
NC
3736inline static void
3737sh_elf_add_rofixup (bfd *output_bfd, asection *srofixup, bfd_vma offset)
3738{
3739 bfd_vma fixup_offset;
3740
3741 fixup_offset = srofixup->reloc_count++ * 4;
3742 BFD_ASSERT (fixup_offset < srofixup->size);
3743 bfd_put_32 (output_bfd, offset, srofixup->contents + fixup_offset);
3744}
3745
3746/* Return the offset of the generated .got section from the
3747 _GLOBAL_OFFSET_TABLE_ symbol. */
3748
3749static bfd_signed_vma
3750sh_elf_got_offset (struct elf_sh_link_hash_table *htab)
3751{
3752 return (htab->sgot->output_offset - htab->sgotplt->output_offset
3753 - htab->root.hgot->root.u.def.value);
3754}
3755
3756/* Find the segment number in which OSEC, and output section, is
3757 located. */
3758
3759static unsigned
3760sh_elf_osec_to_segment (bfd *output_bfd, asection *osec)
3761{
3d301fdc
AM
3762 Elf_Internal_Phdr *p = NULL;
3763
3764 if (output_bfd->xvec->flavour == bfd_target_elf_flavour)
3765 p = _bfd_elf_find_segment_containing_section (output_bfd, osec);
8e45593f
NC
3766
3767 /* FIXME: Nothing ever says what this index is relative to. The kernel
3768 supplies data in terms of the number of load segments but this is
3769 a phdr index and the first phdr may not be a load segment. */
3770 return (p != NULL) ? p - elf_tdata (output_bfd)->phdr : -1;
3771}
3772
3773static bfd_boolean
3774sh_elf_osec_readonly_p (bfd *output_bfd, asection *osec)
3775{
3776 unsigned seg = sh_elf_osec_to_segment (output_bfd, osec);
3777
3d301fdc
AM
3778 return (seg != (unsigned) -1
3779 && ! (elf_tdata (output_bfd)->phdr[seg].p_flags & PF_W));
8e45593f
NC
3780}
3781
3782/* Generate the initial contents of a local function descriptor, along
3783 with any relocations or fixups required. */
3784static bfd_boolean
3785sh_elf_initialize_funcdesc (bfd *output_bfd,
3786 struct bfd_link_info *info,
3787 struct elf_link_hash_entry *h,
3788 bfd_vma offset,
3789 asection *section,
3790 bfd_vma value)
3791{
3792 struct elf_sh_link_hash_table *htab;
3793 int dynindx;
3794 bfd_vma addr, seg;
3795
3796 htab = sh_elf_hash_table (info);
3797
3798 /* FIXME: The ABI says that the offset to the function goes in the
3799 descriptor, along with the segment index. We're RELA, so it could
3800 go in the reloc instead... */
3801
3802 if (h != NULL && SYMBOL_CALLS_LOCAL (info, h))
3803 {
3804 section = h->root.u.def.section;
3805 value = h->root.u.def.value;
3806 }
3807
3808 if (h == NULL || SYMBOL_CALLS_LOCAL (info, h))
3809 {
3810 dynindx = elf_section_data (section->output_section)->dynindx;
3811 addr = value + section->output_offset;
3812 seg = sh_elf_osec_to_segment (output_bfd, section->output_section);
3813 }
3814 else
3815 {
3816 BFD_ASSERT (h->dynindx != -1);
3817 dynindx = h->dynindx;
3818 addr = seg = 0;
3819 }
3820
3821 if (!info->shared && SYMBOL_CALLS_LOCAL (info, h))
3822 {
3823 if (h == NULL || h->root.type != bfd_link_hash_undefweak)
3824 {
3825 sh_elf_add_rofixup (output_bfd, htab->srofixup,
3826 offset
3827 + htab->sfuncdesc->output_section->vma
3828 + htab->sfuncdesc->output_offset);
3829 sh_elf_add_rofixup (output_bfd, htab->srofixup,
3830 offset + 4
3831 + htab->sfuncdesc->output_section->vma
3832 + htab->sfuncdesc->output_offset);
3833 }
3834
3835 /* There are no dynamic relocations so fill in the final
3836 address and gp value (barring fixups). */
3837 addr += section->output_section->vma;
3838 seg = htab->root.hgot->root.u.def.value
3839 + htab->root.hgot->root.u.def.section->output_section->vma
3840 + htab->root.hgot->root.u.def.section->output_offset;
3841 }
3842 else
3843 sh_elf_add_dyn_reloc (output_bfd, htab->srelfuncdesc,
3844 offset
3845 + htab->sfuncdesc->output_section->vma
3846 + htab->sfuncdesc->output_offset,
3847 R_SH_FUNCDESC_VALUE, dynindx, 0);
3848
3849 bfd_put_32 (output_bfd, addr, htab->sfuncdesc->contents + offset);
3850 bfd_put_32 (output_bfd, seg, htab->sfuncdesc->contents + offset + 4);
3851
3852 return TRUE;
3853}
3854
3855/* Install a 20-bit movi20 field starting at ADDR, which occurs in OUTPUT_BFD.
3856 VALUE is the field's value. Return bfd_reloc_ok if successful or an error
3857 otherwise. */
3858
3859static bfd_reloc_status_type
3860install_movi20_field (bfd *output_bfd, unsigned long relocation,
3861 bfd *input_bfd, asection *input_section,
3862 bfd_byte *contents, bfd_vma offset)
3863{
3864 unsigned long cur_val;
3865 bfd_byte *addr;
3866 bfd_reloc_status_type r;
3867
3868 if (offset > bfd_get_section_limit (input_bfd, input_section))
3869 return bfd_reloc_outofrange;
3870
3871 r = bfd_check_overflow (complain_overflow_signed, 20, 0,
3872 bfd_arch_bits_per_address (input_bfd), relocation);
3873 if (r != bfd_reloc_ok)
3874 return r;
3875
3876 addr = contents + offset;
3877 cur_val = bfd_get_16 (output_bfd, addr);
3878 bfd_put_16 (output_bfd, cur_val | ((relocation & 0xf0000) >> 12), addr);
3879 bfd_put_16 (output_bfd, relocation & 0xffff, addr + 2);
3880
3881 return bfd_reloc_ok;
3882}
3883
3884/* Relocate an SH ELF section. */
3885
3886static bfd_boolean
3887sh_elf_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
3888 bfd *input_bfd, asection *input_section,
3889 bfd_byte *contents, Elf_Internal_Rela *relocs,
3890 Elf_Internal_Sym *local_syms,
3891 asection **local_sections)
3892{
3893 struct elf_sh_link_hash_table *htab;
3894 Elf_Internal_Shdr *symtab_hdr;
3895 struct elf_link_hash_entry **sym_hashes;
3896 Elf_Internal_Rela *rel, *relend;
e0af1f53 3897 bfd *dynobj = NULL;
8e45593f 3898 bfd_vma *local_got_offsets;
e0af1f53
MR
3899 asection *sgot = NULL;
3900 asection *sgotplt = NULL;
3901 asection *splt = NULL;
3902 asection *sreloc = NULL;
3903 asection *srelgot = NULL;
8e45593f
NC
3904 bfd_boolean is_vxworks_tls;
3905 unsigned isec_segment, got_segment, plt_segment, check_segment[2];
e0af1f53 3906 bfd_boolean fdpic_p = FALSE;
8e45593f
NC
3907
3908 BFD_ASSERT (is_sh_elf (input_bfd));
3909
3910 htab = sh_elf_hash_table (info);
e0af1f53
MR
3911 if (htab != NULL)
3912 {
3913 dynobj = htab->root.dynobj;
3914 sgot = htab->sgot;
3915 sgotplt = htab->sgotplt;
3916 splt = htab->splt;
3917 fdpic_p = htab->fdpic_p;
3918 }
8e45593f
NC
3919 symtab_hdr = &elf_symtab_hdr (input_bfd);
3920 sym_hashes = elf_sym_hashes (input_bfd);
8e45593f
NC
3921 local_got_offsets = elf_local_got_offsets (input_bfd);
3922
3923 isec_segment = sh_elf_osec_to_segment (output_bfd,
3924 input_section->output_section);
e0af1f53 3925 if (fdpic_p && sgot)
8e45593f 3926 got_segment = sh_elf_osec_to_segment (output_bfd,
e0af1f53 3927 sgot->output_section);
8e45593f
NC
3928 else
3929 got_segment = -1;
e0af1f53 3930 if (fdpic_p && splt)
8e45593f 3931 plt_segment = sh_elf_osec_to_segment (output_bfd,
e0af1f53 3932 splt->output_section);
8e45593f
NC
3933 else
3934 plt_segment = -1;
3935
8e45593f
NC
3936 /* We have to handle relocations in vxworks .tls_vars sections
3937 specially, because the dynamic loader is 'weird'. */
e0af1f53 3938 is_vxworks_tls = (htab && htab->vxworks_p && info->shared
8e45593f
NC
3939 && !strcmp (input_section->output_section->name,
3940 ".tls_vars"));
3941
3942 rel = relocs;
3943 relend = relocs + input_section->reloc_count;
3944 for (; rel < relend; rel++)
3945 {
3946 int r_type;
3947 reloc_howto_type *howto;
3948 unsigned long r_symndx;
3949 Elf_Internal_Sym *sym;
3950 asection *sec;
3951 struct elf_link_hash_entry *h;
3952 bfd_vma relocation;
3953 bfd_vma addend = (bfd_vma) 0;
3954 bfd_reloc_status_type r;
3955 int seen_stt_datalabel = 0;
3956 bfd_vma off;
85e02784 3957 enum got_type got_type;
8e45593f
NC
3958 const char *symname = NULL;
3959
3960 r_symndx = ELF32_R_SYM (rel->r_info);
37c644f2 3961
37c644f2
AO
3962 r_type = ELF32_R_TYPE (rel->r_info);
3963
3964 /* Many of the relocs are only used for relaxing, and are
067653c5 3965 handled entirely by the relaxation code. */
d38eb334
DD
3966 if (r_type >= (int) R_SH_GNU_VTINHERIT
3967 && r_type <= (int) R_SH_LABEL)
37c644f2 3968 continue;
c5aeb40f
AO
3969 if (r_type == (int) R_SH_NONE)
3970 continue;
37c644f2
AO
3971
3972 if (r_type < 0
3973 || r_type >= R_SH_max
3974 || (r_type >= (int) R_SH_FIRST_INVALID_RELOC
06bb75c1 3975 && r_type <= (int) R_SH_LAST_INVALID_RELOC)
8e45593f
NC
3976 || (r_type >= (int) R_SH_FIRST_INVALID_RELOC_2
3977 && r_type <= (int) R_SH_LAST_INVALID_RELOC_2)
fbca6ad9
AO
3978 || ( r_type >= (int) R_SH_FIRST_INVALID_RELOC_3
3979 && r_type <= (int) R_SH_LAST_INVALID_RELOC_3)
3980 || ( r_type >= (int) R_SH_FIRST_INVALID_RELOC_4
3981 && r_type <= (int) R_SH_LAST_INVALID_RELOC_4)
3376eaf5
KK
3982 || ( r_type >= (int) R_SH_FIRST_INVALID_RELOC_5
3983 && r_type <= (int) R_SH_LAST_INVALID_RELOC_5)
8e45593f
NC
3984 || ( r_type >= (int) R_SH_FIRST_INVALID_RELOC_6
3985 && r_type <= (int) R_SH_LAST_INVALID_RELOC_6))
37c644f2
AO
3986 {
3987 bfd_set_error (bfd_error_bad_value);
b34976b6 3988 return FALSE;
37c644f2
AO
3989 }
3990
55e6e397 3991 howto = get_howto_table (output_bfd) + r_type;
37c644f2 3992
146be91a 3993 /* For relocs that aren't partial_inplace, we get the addend from
067653c5 3994 the relocation. */
146be91a
HPN
3995 if (! howto->partial_inplace)
3996 addend = rel->r_addend;
3997
37c644f2
AO
3998 h = NULL;
3999 sym = NULL;
4000 sec = NULL;
8e45593f
NC
4001 check_segment[0] = -1;
4002 check_segment[1] = -1;
37c644f2
AO
4003 if (r_symndx < symtab_hdr->sh_info)
4004 {
4005 sym = local_syms + r_symndx;
4006 sec = local_sections[r_symndx];
8e45593f
NC
4007
4008 symname = bfd_elf_string_from_elf_section
4009 (input_bfd, symtab_hdr->sh_link, sym->st_name);
4010 if (symname == NULL || *symname == '\0')
4011 symname = bfd_section_name (input_bfd, sec);
4012
37c644f2
AO
4013 relocation = (sec->output_section->vma
4014 + sec->output_offset
4015 + sym->st_value);
fbca6ad9
AO
4016 /* A local symbol never has STO_SH5_ISA32, so we don't need
4017 datalabel processing here. Make sure this does not change
4018 without notice. */
4019 if ((sym->st_other & STO_SH5_ISA32) != 0)
4020 ((*info->callbacks->reloc_dangerous)
4021 (info,
4022 _("Unexpected STO_SH5_ISA32 on local symbol is not handled"),
4023 input_bfd, input_section, rel->r_offset));
ab96bf03 4024
dbaa2011 4025 if (sec != NULL && discarded_section (sec))
ab96bf03
AM
4026 /* Handled below. */
4027 ;
4028 else if (info->relocatable)
8a3975e6 4029 {
1049f94e 4030 /* This is a relocatable link. We don't have to change
8a3975e6
AO
4031 anything, unless the reloc is against a section symbol,
4032 in which case we have to adjust according to where the
4033 section symbol winds up in the output section. */
8a3975e6 4034 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
146be91a
HPN
4035 {
4036 if (! howto->partial_inplace)
4037 {
4038 /* For relocations with the addend in the
4039 relocation, we need just to update the addend.
4040 All real relocs are of type partial_inplace; this
4041 code is mostly for completeness. */
ab96bf03 4042 rel->r_addend += sec->output_offset;
146be91a
HPN
4043
4044 continue;
4045 }
4046
4047 /* Relocs of type partial_inplace need to pick up the
4048 contents in the contents and add the offset resulting
4049 from the changed location of the section symbol.
4050 Using _bfd_final_link_relocate (e.g. goto
4051 final_link_relocate) here would be wrong, because
4052 relocations marked pc_relative would get the current
4053 location subtracted, and we must only do that at the
4054 final link. */
4055 r = _bfd_relocate_contents (howto, input_bfd,
4056 sec->output_offset
4057 + sym->st_value,
4058 contents + rel->r_offset);
4059 goto relocation_done;
4060 }
8a3975e6
AO
4061
4062 continue;
4063 }
f8df10f4
JJ
4064 else if (! howto->partial_inplace)
4065 {
8517fae7 4066 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
f8df10f4
JJ
4067 addend = rel->r_addend;
4068 }
4069 else if ((sec->flags & SEC_MERGE)
4070 && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4071 {
4072 asection *msec;
4073
4074 if (howto->rightshift || howto->src_mask != 0xffffffff)
4075 {
4076 (*_bfd_error_handler)
d003868e
AM
4077 (_("%B(%A+0x%lx): %s relocation against SEC_MERGE section"),
4078 input_bfd, input_section,
f8df10f4 4079 (long) rel->r_offset, howto->name);
b34976b6 4080 return FALSE;
f8df10f4
JJ
4081 }
4082
067653c5
AM
4083 addend = bfd_get_32 (input_bfd, contents + rel->r_offset);
4084 msec = sec;
4085 addend =
c629eae0 4086 _bfd_elf_rel_local_sym (output_bfd, sym, &msec, addend)
f8df10f4
JJ
4087 - relocation;
4088 addend += msec->output_section->vma + msec->output_offset;
4089 bfd_put_32 (input_bfd, addend, contents + rel->r_offset);
4090 addend = 0;
4091 }
37c644f2
AO
4092 }
4093 else
4094 {
560e09e9
NC
4095 /* FIXME: Ought to make use of the RELOC_FOR_GLOBAL_SYMBOL macro. */
4096
ab96bf03 4097 relocation = 0;
37c644f2 4098 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
8e45593f 4099 symname = h->root.root.string;
37c644f2
AO
4100 while (h->root.type == bfd_link_hash_indirect
4101 || h->root.type == bfd_link_hash_warning)
fbca6ad9
AO
4102 {
4103#ifdef INCLUDE_SHMEDIA
4104 /* If the reference passes a symbol marked with
4105 STT_DATALABEL, then any STO_SH5_ISA32 on the final value
4106 doesn't count. */
4107 seen_stt_datalabel |= h->type == STT_DATALABEL;
4108#endif
4109 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4110 }
37c644f2
AO
4111 if (h->root.type == bfd_link_hash_defined
4112 || h->root.type == bfd_link_hash_defweak)
4113 {
b34976b6 4114 bfd_boolean dyn;
067653c5 4115
e0af1f53 4116 dyn = htab ? htab->root.dynamic_sections_created : FALSE;
37c644f2
AO
4117 sec = h->root.u.def.section;
4118 /* In these cases, we don't need the relocation value.
4119 We check specially because in some obscure cases
435b1e90 4120 sec->output_section will be NULL. */
37c644f2 4121 if (r_type == R_SH_GOTPC
fbca6ad9
AO
4122 || r_type == R_SH_GOTPC_LOW16
4123 || r_type == R_SH_GOTPC_MEDLOW16
4124 || r_type == R_SH_GOTPC_MEDHI16
4125 || r_type == R_SH_GOTPC_HI16
4126 || ((r_type == R_SH_PLT32
4127 || r_type == R_SH_PLT_LOW16
4128 || r_type == R_SH_PLT_MEDLOW16
4129 || r_type == R_SH_PLT_MEDHI16
4130 || r_type == R_SH_PLT_HI16)
37c644f2 4131 && h->plt.offset != (bfd_vma) -1)
fbca6ad9 4132 || ((r_type == R_SH_GOT32
8e45593f
NC
4133 || r_type == R_SH_GOT20
4134 || r_type == R_SH_GOTFUNCDESC
4135 || r_type == R_SH_GOTFUNCDESC20
4136 || r_type == R_SH_GOTOFFFUNCDESC
4137 || r_type == R_SH_GOTOFFFUNCDESC20
4138 || r_type == R_SH_FUNCDESC
fbca6ad9
AO
4139 || r_type == R_SH_GOT_LOW16
4140 || r_type == R_SH_GOT_MEDLOW16
4141 || r_type == R_SH_GOT_MEDHI16
4142 || r_type == R_SH_GOT_HI16)
267fb3c1 4143 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
37c644f2
AO
4144 && (! info->shared
4145 || (! info->symbolic && h->dynindx != -1)
f5385ebf 4146 || !h->def_regular))
37c644f2
AO
4147 /* The cases above are those in which relocation is
4148 overwritten in the switch block below. The cases
4149 below are those in which we must defer relocation
4150 to run-time, because we can't resolve absolute
4151 addresses when creating a shared library. */
4152 || (info->shared
4153 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 4154 || !h->def_regular)
37c644f2 4155 && ((r_type == R_SH_DIR32
f5385ebf 4156 && !h->forced_local)
f50ad433
KK
4157 || (r_type == R_SH_REL32
4158 && !SYMBOL_CALLS_LOCAL (info, h)))
37c644f2
AO
4159 && ((input_section->flags & SEC_ALLOC) != 0
4160 /* DWARF will emit R_SH_DIR32 relocations in its
4161 sections against symbols defined externally
4162 in shared libraries. We can't do anything
4163 with them here. */
067653c5 4164 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 4165 && h->def_dynamic)))
1448fa32
KK
4166 /* Dynamic relocs are not propagated for SEC_DEBUGGING
4167 sections because such sections are not SEC_ALLOC and
4168 thus ld.so will not process them. */
4169 || (sec->output_section == NULL
4170 && ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 4171 && h->def_dynamic))
3376eaf5 4172 || (sec->output_section == NULL
8e45593f
NC
4173 && (sh_elf_hash_entry (h)->got_type == GOT_TLS_IE
4174 || sh_elf_hash_entry (h)->got_type == GOT_TLS_GD)))
ab96bf03
AM
4175 ;
4176 else if (sec->output_section != NULL)
4177 relocation = ((h->root.u.def.value
4178 + sec->output_section->vma
4179 + sec->output_offset)
4180 /* A STO_SH5_ISA32 causes a "bitor 1" to the
4181 symbol value, unless we've seen
4182 STT_DATALABEL on the way to it. */
4183 | ((h->other & STO_SH5_ISA32) != 0
4184 && ! seen_stt_datalabel));
1d5316ab
AM
4185 else if (!info->relocatable
4186 && (_bfd_elf_section_offset (output_bfd, info,
4187 input_section,
4188 rel->r_offset)
4189 != (bfd_vma) -1))
37c644f2
AO
4190 {
4191 (*_bfd_error_handler)
843fe662
L
4192 (_("%B(%A+0x%lx): unresolvable %s relocation against symbol `%s'"),
4193 input_bfd,
4194 input_section,
4195 (long) rel->r_offset,
4196 howto->name,
4197 h->root.root.string);
b34976b6 4198 return FALSE;
37c644f2 4199 }
37c644f2
AO
4200 }
4201 else if (h->root.type == bfd_link_hash_undefweak)
ab96bf03 4202 ;
59c2e50f 4203 else if (info->unresolved_syms_in_objects == RM_IGNORE
067653c5 4204 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
ab96bf03
AM
4205 ;
4206 else if (!info->relocatable)
37c644f2 4207 {
560e09e9
NC
4208 if (! info->callbacks->undefined_symbol
4209 (info, h->root.root.string, input_bfd,
4210 input_section, rel->r_offset,
59c2e50f 4211 (info->unresolved_syms_in_objects == RM_GENERATE_ERROR
560e09e9 4212 || ELF_ST_VISIBILITY (h->other))))
b34976b6 4213 return FALSE;
37c644f2
AO
4214 }
4215 }
4216
dbaa2011 4217 if (sec != NULL && discarded_section (sec))
e4067dbb 4218 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 4219 rel, 1, relend, howto, 0, contents);
ab96bf03
AM
4220
4221 if (info->relocatable)
4222 continue;
4223
8e45593f
NC
4224 /* Check for inter-segment relocations in FDPIC files. Most
4225 relocations connect the relocation site to the location of
4226 the target symbol, but there are some exceptions below. */
4227 check_segment[0] = isec_segment;
4228 if (sec != NULL)
4229 check_segment[1] = sh_elf_osec_to_segment (output_bfd,
4230 sec->output_section);
4231 else
4232 check_segment[1] = -1;
4233
435b1e90 4234 switch ((int) r_type)
37c644f2
AO
4235 {
4236 final_link_relocate:
4237 /* COFF relocs don't use the addend. The addend is used for
435b1e90 4238 R_SH_DIR32 to be compatible with other compilers. */
37c644f2
AO
4239 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
4240 contents, rel->r_offset,
4241 relocation, addend);
4242 break;
4243
4244 case R_SH_IND12W:
cd6ec716
DD
4245 goto final_link_relocate;
4246
37c644f2
AO
4247 case R_SH_DIR8WPN:
4248 case R_SH_DIR8WPZ:
4249 case R_SH_DIR8WPL:
cd6ec716
DD
4250 /* If the reloc is against the start of this section, then
4251 the assembler has already taken care of it and the reloc
4252 is here only to assist in relaxing. If the reloc is not
4253 against the start of this section, then it's against an
4254 external symbol and we must deal with it ourselves. */
4255 if (input_section->output_section->vma + input_section->output_offset
4256 != relocation)
4257 {
4258 int disp = (relocation
4259 - input_section->output_section->vma
4260 - input_section->output_offset
4261 - rel->r_offset);
4262 int mask = 0;
4263 switch (r_type)
4264 {
4265 case R_SH_DIR8WPN:
4266 case R_SH_DIR8WPZ: mask = 1; break;
4267 case R_SH_DIR8WPL: mask = 3; break;
4268 default: mask = 0; break;
4269 }
4270 if (disp & mask)
4271 {
4272 ((*_bfd_error_handler)
d003868e
AM
4273 (_("%B: 0x%lx: fatal: unaligned branch target for relax-support relocation"),
4274 input_section->owner,
cd6ec716
DD
4275 (unsigned long) rel->r_offset));
4276 bfd_set_error (bfd_error_bad_value);
b34976b6 4277 return FALSE;
cd6ec716
DD
4278 }
4279 relocation -= 4;
4280 goto final_link_relocate;
4281 }
4282 r = bfd_reloc_ok;
4283 break;
37c644f2
AO
4284
4285 default:
fbca6ad9
AO
4286#ifdef INCLUDE_SHMEDIA
4287 if (shmedia_prepare_reloc (info, input_bfd, input_section,
4288 contents, rel, &relocation))
4289 goto final_link_relocate;
4290#endif
37c644f2 4291 bfd_set_error (bfd_error_bad_value);
b34976b6 4292 return FALSE;
37c644f2 4293
d38eb334
DD
4294 case R_SH_DIR16:
4295 case R_SH_DIR8:
4296 case R_SH_DIR8U:
4297 case R_SH_DIR8S:
4298 case R_SH_DIR4U:
4299 goto final_link_relocate;
4300
4301 case R_SH_DIR8UL:
4302 case R_SH_DIR4UL:
4303 if (relocation & 3)
4304 {
4305 ((*_bfd_error_handler)
d003868e
AM
4306 (_("%B: 0x%lx: fatal: unaligned %s relocation 0x%lx"),
4307 input_section->owner,
d38eb334 4308 (unsigned long) rel->r_offset, howto->name,
d003868e 4309 (unsigned long) relocation));
d38eb334
DD
4310 bfd_set_error (bfd_error_bad_value);
4311 return FALSE;
4312 }
4313 goto final_link_relocate;
4314
4315 case R_SH_DIR8UW:
4316 case R_SH_DIR8SW:
4317 case R_SH_DIR4UW:
4318 if (relocation & 1)
4319 {
4320 ((*_bfd_error_handler)
d003868e
AM
4321 (_("%B: 0x%lx: fatal: unaligned %s relocation 0x%lx"),
4322 input_section->owner,
d38eb334 4323 (unsigned long) rel->r_offset, howto->name,
d003868e 4324 (unsigned long) relocation));
d38eb334
DD
4325 bfd_set_error (bfd_error_bad_value);
4326 return FALSE;
4327 }
4328 goto final_link_relocate;
4329
4330 case R_SH_PSHA:
4331 if ((signed int)relocation < -32
4332 || (signed int)relocation > 32)
4333 {
4334 ((*_bfd_error_handler)
d003868e
AM
4335 (_("%B: 0x%lx: fatal: R_SH_PSHA relocation %d not in range -32..32"),
4336 input_section->owner,
d38eb334 4337 (unsigned long) rel->r_offset,
d003868e 4338 (unsigned long) relocation));
d38eb334
DD
4339 bfd_set_error (bfd_error_bad_value);
4340 return FALSE;
4341 }
4342 goto final_link_relocate;
4343
4344 case R_SH_PSHL:
4345 if ((signed int)relocation < -16
4346 || (signed int)relocation > 16)
4347 {
4348 ((*_bfd_error_handler)
d003868e
AM
4349 (_("%B: 0x%lx: fatal: R_SH_PSHL relocation %d not in range -32..32"),
4350 input_section->owner,
d38eb334 4351 (unsigned long) rel->r_offset,
d003868e 4352 (unsigned long) relocation));
d38eb334
DD
4353 bfd_set_error (bfd_error_bad_value);
4354 return FALSE;
4355 }
4356 goto final_link_relocate;
4357
37c644f2
AO
4358 case R_SH_DIR32:
4359 case R_SH_REL32:
46e993b9
KK
4360#ifdef INCLUDE_SHMEDIA
4361 case R_SH_IMM_LOW16_PCREL:
4362 case R_SH_IMM_MEDLOW16_PCREL:
4363 case R_SH_IMM_MEDHI16_PCREL:
4364 case R_SH_IMM_HI16_PCREL:
4365#endif
37c644f2 4366 if (info->shared
04e534c3
KK
4367 && (h == NULL
4368 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
4369 || h->root.type != bfd_link_hash_undefweak)
cf35638d 4370 && r_symndx != STN_UNDEF
37c644f2 4371 && (input_section->flags & SEC_ALLOC) != 0
3348747a 4372 && !is_vxworks_tls
46e993b9 4373 && (r_type == R_SH_DIR32
3d85aebe 4374 || !SYMBOL_CALLS_LOCAL (info, h)))
37c644f2
AO
4375 {
4376 Elf_Internal_Rela outrel;
947216bf 4377 bfd_byte *loc;
b34976b6 4378 bfd_boolean skip, relocate;
37c644f2
AO
4379
4380 /* When generating a shared object, these relocations
4381 are copied into the output file to be resolved at run
4382 time. */
4383
4384 if (sreloc == NULL)
4385 {
83bac4b0
NC
4386 sreloc = _bfd_elf_get_dynamic_reloc_section
4387 (input_bfd, input_section, /*rela?*/ TRUE);
4388 if (sreloc == NULL)
b34976b6 4389 return FALSE;
37c644f2
AO
4390 }
4391
b34976b6
AM
4392 skip = FALSE;
4393 relocate = FALSE;
37c644f2 4394
c629eae0
JJ
4395 outrel.r_offset =
4396 _bfd_elf_section_offset (output_bfd, info, input_section,
4397 rel->r_offset);
4398 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 4399 skip = TRUE;
0bb2d96a 4400 else if (outrel.r_offset == (bfd_vma) -2)
b34976b6 4401 skip = TRUE, relocate = TRUE;
37c644f2
AO
4402 outrel.r_offset += (input_section->output_section->vma
4403 + input_section->output_offset);
4404
4405 if (skip)
0bb2d96a 4406 memset (&outrel, 0, sizeof outrel);
37c644f2
AO
4407 else if (r_type == R_SH_REL32)
4408 {
4409 BFD_ASSERT (h != NULL && h->dynindx != -1);
37c644f2 4410 outrel.r_info = ELF32_R_INFO (h->dynindx, R_SH_REL32);
146be91a 4411 outrel.r_addend
55e6e397
RS
4412 = (howto->partial_inplace
4413 ? bfd_get_32 (input_bfd, contents + rel->r_offset)
4414 : addend);
37c644f2 4415 }
46e993b9
KK
4416#ifdef INCLUDE_SHMEDIA
4417 else if (r_type == R_SH_IMM_LOW16_PCREL
4418 || r_type == R_SH_IMM_MEDLOW16_PCREL
4419 || r_type == R_SH_IMM_MEDHI16_PCREL
4420 || r_type == R_SH_IMM_HI16_PCREL)
4421 {
4422 BFD_ASSERT (h != NULL && h->dynindx != -1);
4423 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
4424 outrel.r_addend = addend;
4425 }
4426#endif
e0af1f53 4427 else if (fdpic_p
8e45593f
NC
4428 && (h == NULL
4429 || ((info->symbolic || h->dynindx == -1)
4430 && h->def_regular)))
4431 {
4432 int dynindx;
4433
4434 BFD_ASSERT (sec != NULL);
4435 BFD_ASSERT (sec->output_section != NULL);
4436 dynindx = elf_section_data (sec->output_section)->dynindx;
4437 outrel.r_info = ELF32_R_INFO (dynindx, R_SH_DIR32);
4438 outrel.r_addend = relocation;
4439 outrel.r_addend
4440 += (howto->partial_inplace
4441 ? bfd_get_32 (input_bfd, contents + rel->r_offset)
4442 : addend);
4443 outrel.r_addend -= sec->output_section->vma;
4444 }
37c644f2
AO
4445 else
4446 {
4447 /* h->dynindx may be -1 if this symbol was marked to
4448 become local. */
4449 if (h == NULL
4450 || ((info->symbolic || h->dynindx == -1)
f5385ebf 4451 && h->def_regular))
37c644f2 4452 {
55e6e397 4453 relocate = howto->partial_inplace;
37c644f2 4454 outrel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
37c644f2
AO
4455 }
4456 else
4457 {
4458 BFD_ASSERT (h->dynindx != -1);
37c644f2 4459 outrel.r_info = ELF32_R_INFO (h->dynindx, R_SH_DIR32);
37c644f2 4460 }
55e6e397
RS
4461 outrel.r_addend = relocation;
4462 outrel.r_addend
4463 += (howto->partial_inplace
4464 ? bfd_get_32 (input_bfd, contents + rel->r_offset)
4465 : addend);
37c644f2
AO
4466 }
4467
947216bf
AM
4468 loc = sreloc->contents;
4469 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
4470 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
37c644f2 4471
8e45593f
NC
4472 check_segment[0] = check_segment[1] = -1;
4473
37c644f2
AO
4474 /* If this reloc is against an external symbol, we do
4475 not want to fiddle with the addend. Otherwise, we
4476 need to include the symbol value so that it becomes
4477 an addend for the dynamic reloc. */
4478 if (! relocate)
4479 continue;
4480 }
e0af1f53 4481 else if (fdpic_p && !info->shared
8e45593f
NC
4482 && r_type == R_SH_DIR32
4483 && (input_section->flags & SEC_ALLOC) != 0)
4484 {
4485 bfd_vma offset;
4486
e0af1f53
MR
4487 BFD_ASSERT (htab);
4488
8e45593f
NC
4489 if (sh_elf_osec_readonly_p (output_bfd,
4490 input_section->output_section))
4491 {
4492 (*_bfd_error_handler)
4493 (_("%B(%A+0x%lx): cannot emit fixup to `%s' in read-only section"),
4494 input_bfd,
4495 input_section,
4496 (long) rel->r_offset,
4497 symname);
4498 return FALSE;
4499 }
4500
4501 offset = _bfd_elf_section_offset (output_bfd, info,
4502 input_section, rel->r_offset);
4503 if (offset != (bfd_vma)-1)
4504 sh_elf_add_rofixup (output_bfd, htab->srofixup,
4505 input_section->output_section->vma
4506 + input_section->output_offset
4507 + rel->r_offset);
4508
4509 check_segment[0] = check_segment[1] = -1;
4510 }
37c644f2
AO
4511 goto final_link_relocate;
4512
fbca6ad9
AO
4513 case R_SH_GOTPLT32:
4514#ifdef INCLUDE_SHMEDIA
4515 case R_SH_GOTPLT_LOW16:
4516 case R_SH_GOTPLT_MEDLOW16:
4517 case R_SH_GOTPLT_MEDHI16:
4518 case R_SH_GOTPLT_HI16:
4519 case R_SH_GOTPLT10BY4:
4520 case R_SH_GOTPLT10BY8:
4521#endif
4522 /* Relocation is to the entry for this symbol in the
4523 procedure linkage table. */
4524
4525 if (h == NULL
f5385ebf 4526 || h->forced_local
fbca6ad9
AO
4527 || ! info->shared
4528 || info->symbolic
4529 || h->dynindx == -1
4530 || h->plt.offset == (bfd_vma) -1
4531 || h->got.offset != (bfd_vma) -1)
4532 goto force_got;
4533
4534 /* Relocation is to the entry for this symbol in the global
4535 offset table extension for the procedure linkage table. */
fbca6ad9 4536
e0af1f53 4537 BFD_ASSERT (htab);
067653c5 4538 BFD_ASSERT (sgotplt != NULL);
fbca6ad9 4539 relocation = (sgotplt->output_offset
55e6e397
RS
4540 + (get_plt_index (htab->plt_info, h->plt.offset)
4541 + 3) * 4);
fbca6ad9
AO
4542
4543#ifdef GOT_BIAS
4544 relocation -= GOT_BIAS;
4545#endif
4546
4547 goto final_link_relocate;
4548
4549 force_got:
37c644f2 4550 case R_SH_GOT32:
8e45593f 4551 case R_SH_GOT20:
fbca6ad9
AO
4552#ifdef INCLUDE_SHMEDIA
4553 case R_SH_GOT_LOW16:
4554 case R_SH_GOT_MEDLOW16:
4555 case R_SH_GOT_MEDHI16:
4556 case R_SH_GOT_HI16:
4557 case R_SH_GOT10BY4:
4558 case R_SH_GOT10BY8:
4559#endif
37c644f2
AO
4560 /* Relocation is to the entry for this symbol in the global
4561 offset table. */
067653c5 4562
e0af1f53 4563 BFD_ASSERT (htab);
067653c5 4564 BFD_ASSERT (sgot != NULL);
8e45593f 4565 check_segment[0] = check_segment[1] = -1;
37c644f2
AO
4566
4567 if (h != NULL)
4568 {
b34976b6 4569 bfd_boolean dyn;
37c644f2
AO
4570
4571 off = h->got.offset;
fbca6ad9
AO
4572#ifdef INCLUDE_SHMEDIA
4573 if (seen_stt_datalabel)
4574 {
4575 struct elf_sh_link_hash_entry *hsh;
4576
4577 hsh = (struct elf_sh_link_hash_entry *)h;
396a6083 4578 off = hsh->datalabel_got.offset;
fbca6ad9
AO
4579 }
4580#endif
37c644f2
AO
4581 BFD_ASSERT (off != (bfd_vma) -1);
4582
067653c5 4583 dyn = htab->root.dynamic_sections_created;
267fb3c1 4584 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
37c644f2 4585 || (info->shared
3d85aebe 4586 && SYMBOL_REFERENCES_LOCAL (info, h))
04e534c3
KK
4587 || (ELF_ST_VISIBILITY (h->other)
4588 && h->root.type == bfd_link_hash_undefweak))
37c644f2
AO
4589 {
4590 /* This is actually a static link, or it is a
4591 -Bsymbolic link and the symbol is defined
4592 locally, or the symbol was forced to be local
4593 because of a version file. We must initialize
4594 this entry in the global offset table. Since the
4595 offset must always be a multiple of 4, we use the
4596 least significant bit to record whether we have
4597 initialized it already.
4598
4599 When doing a dynamic link, we create a .rela.got
4600 relocation entry to initialize the value. This
4601 is done in the finish_dynamic_symbol routine. */
4602 if ((off & 1) != 0)
4603 off &= ~1;
4604 else
4605 {
4606 bfd_put_32 (output_bfd, relocation,
4607 sgot->contents + off);
fbca6ad9
AO
4608#ifdef INCLUDE_SHMEDIA
4609 if (seen_stt_datalabel)
4610 {
4611 struct elf_sh_link_hash_entry *hsh;
4612
4613 hsh = (struct elf_sh_link_hash_entry *)h;
396a6083 4614 hsh->datalabel_got.offset |= 1;
fbca6ad9
AO
4615 }
4616 else
4617#endif
4618 h->got.offset |= 1;
8e45593f
NC
4619
4620 /* If we initialize the GOT entry here with a valid
4621 symbol address, also add a fixup. */
e0af1f53 4622 if (fdpic_p && !info->shared
8e45593f
NC
4623 && sh_elf_hash_entry (h)->got_type == GOT_NORMAL
4624 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
4625 || h->root.type != bfd_link_hash_undefweak))
4626 sh_elf_add_rofixup (output_bfd, htab->srofixup,
4627 sgot->output_section->vma
4628 + sgot->output_offset
4629 + off);
37c644f2
AO
4630 }
4631 }
4632
8e45593f 4633 relocation = sh_elf_got_offset (htab) + off;
37c644f2
AO
4634 }
4635 else
4636 {
fbca6ad9
AO
4637#ifdef INCLUDE_SHMEDIA
4638 if (rel->r_addend)
4639 {
4640 BFD_ASSERT (local_got_offsets != NULL
4641 && (local_got_offsets[symtab_hdr->sh_info
4642 + r_symndx]
4643 != (bfd_vma) -1));
4644
4645 off = local_got_offsets[symtab_hdr->sh_info
4646 + r_symndx];
4647 }
4648 else
4649 {
4650#endif
37c644f2
AO
4651 BFD_ASSERT (local_got_offsets != NULL
4652 && local_got_offsets[r_symndx] != (bfd_vma) -1);
4653
4654 off = local_got_offsets[r_symndx];
fbca6ad9
AO
4655#ifdef INCLUDE_SHMEDIA
4656 }
4657#endif
37c644f2
AO
4658
4659 /* The offset must always be a multiple of 4. We use
4660 the least significant bit to record whether we have
4661 already generated the necessary reloc. */
4662 if ((off & 1) != 0)
4663 off &= ~1;
4664 else
4665 {
4666 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
4667
4668 if (info->shared)
4669 {
37c644f2 4670 Elf_Internal_Rela outrel;
947216bf 4671 bfd_byte *loc;
37c644f2 4672
3376eaf5
KK
4673 if (srelgot == NULL)
4674 {
4675 srelgot = bfd_get_section_by_name (dynobj,
4676 ".rela.got");
4677 BFD_ASSERT (srelgot != NULL);
4678 }
37c644f2
AO
4679
4680 outrel.r_offset = (sgot->output_section->vma
4681 + sgot->output_offset
4682 + off);
e0af1f53 4683 if (fdpic_p)
8e45593f
NC
4684 {
4685 int dynindx
4686 = elf_section_data (sec->output_section)->dynindx;
4687 outrel.r_info = ELF32_R_INFO (dynindx, R_SH_DIR32);
4688 outrel.r_addend = relocation;
4689 outrel.r_addend -= sec->output_section->vma;
4690 }
4691 else
4692 {
4693 outrel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
4694 outrel.r_addend = relocation;
4695 }
947216bf
AM
4696 loc = srelgot->contents;
4697 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
4698 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
37c644f2 4699 }
e0af1f53 4700 else if (fdpic_p
8e45593f
NC
4701 && (sh_elf_local_got_type (input_bfd) [r_symndx]
4702 == GOT_NORMAL))
4703 sh_elf_add_rofixup (output_bfd, htab->srofixup,
4704 sgot->output_section->vma
4705 + sgot->output_offset
4706 + off);
37c644f2 4707
fbca6ad9
AO
4708#ifdef INCLUDE_SHMEDIA
4709 if (rel->r_addend)
4710 local_got_offsets[symtab_hdr->sh_info + r_symndx] |= 1;
4711 else
4712#endif
4713 local_got_offsets[r_symndx] |= 1;
37c644f2
AO
4714 }
4715
8e45593f 4716 relocation = sh_elf_got_offset (htab) + off;
37c644f2
AO
4717 }
4718
fbca6ad9 4719#ifdef GOT_BIAS
067653c5 4720 relocation -= GOT_BIAS;
fbca6ad9
AO
4721#endif
4722
8e45593f
NC
4723 if (r_type == R_SH_GOT20)
4724 {
4725 r = install_movi20_field (output_bfd, relocation + addend,
4726 input_bfd, input_section, contents,
4727 rel->r_offset);
4728 break;
4729 }
4730 else
4731 goto final_link_relocate;
37c644f2
AO
4732
4733 case R_SH_GOTOFF:
8e45593f 4734 case R_SH_GOTOFF20:
fbca6ad9
AO
4735#ifdef INCLUDE_SHMEDIA
4736 case R_SH_GOTOFF_LOW16:
4737 case R_SH_GOTOFF_MEDLOW16:
4738 case R_SH_GOTOFF_MEDHI16:
4739 case R_SH_GOTOFF_HI16:
4740#endif
8e45593f
NC
4741 /* GOTOFF relocations are relative to _GLOBAL_OFFSET_TABLE_, which
4742 we place at the start of the .got.plt section. This is the same
4743 as the start of the output .got section, unless there are function
4744 descriptors in front of it. */
e0af1f53 4745 BFD_ASSERT (htab);
8e45593f
NC
4746 BFD_ASSERT (sgotplt != NULL);
4747 check_segment[0] = got_segment;
4748 relocation -= sgotplt->output_section->vma + sgotplt->output_offset
4749 + htab->root.hgot->root.u.def.value;
37c644f2 4750
fbca6ad9
AO
4751#ifdef GOT_BIAS
4752 relocation -= GOT_BIAS;
4753#endif
4754
4755 addend = rel->r_addend;
4756
8e45593f
NC
4757 if (r_type == R_SH_GOTOFF20)
4758 {
4759 r = install_movi20_field (output_bfd, relocation + addend,
4760 input_bfd, input_section, contents,
4761 rel->r_offset);
4762 break;
4763 }
4764 else
4765 goto final_link_relocate;
37c644f2
AO
4766
4767 case R_SH_GOTPC:
fbca6ad9
AO
4768#ifdef INCLUDE_SHMEDIA
4769 case R_SH_GOTPC_LOW16:
4770 case R_SH_GOTPC_MEDLOW16:
4771 case R_SH_GOTPC_MEDHI16:
4772 case R_SH_GOTPC_HI16:
4773#endif
37c644f2
AO
4774 /* Use global offset table as symbol value. */
4775
8e45593f
NC
4776 BFD_ASSERT (sgotplt != NULL);
4777 relocation = sgotplt->output_section->vma + sgotplt->output_offset;
37c644f2 4778
fbca6ad9
AO
4779#ifdef GOT_BIAS
4780 relocation += GOT_BIAS;
4781#endif
4782
4783 addend = rel->r_addend;
4784
37c644f2
AO
4785 goto final_link_relocate;
4786
4787 case R_SH_PLT32:
fbca6ad9
AO
4788#ifdef INCLUDE_SHMEDIA
4789 case R_SH_PLT_LOW16:
4790 case R_SH_PLT_MEDLOW16:
4791 case R_SH_PLT_MEDHI16:
4792 case R_SH_PLT_HI16:
4793#endif
37c644f2
AO
4794 /* Relocation is to the entry for this symbol in the
4795 procedure linkage table. */
4796
4797 /* Resolve a PLT reloc against a local symbol directly,
4798 without using the procedure linkage table. */
4799 if (h == NULL)
4800 goto final_link_relocate;
4801
8e45593f
NC
4802 /* We don't want to warn on calls to undefined weak symbols,
4803 as calls to them must be protected by non-NULL tests
4804 anyway, and unprotected calls would invoke undefined
4805 behavior. */
4806 if (h->root.type == bfd_link_hash_undefweak)
4807 check_segment[0] = check_segment[1] = -1;
4808
f5385ebf 4809 if (h->forced_local)
37c644f2
AO
4810 goto final_link_relocate;
4811
4812 if (h->plt.offset == (bfd_vma) -1)
4813 {
4814 /* We didn't make a PLT entry for this symbol. This
4815 happens when statically linking PIC code, or when
4816 using -Bsymbolic. */
4817 goto final_link_relocate;
4818 }
4819
067653c5 4820 BFD_ASSERT (splt != NULL);
8e45593f 4821 check_segment[1] = plt_segment;
37c644f2
AO
4822 relocation = (splt->output_section->vma
4823 + splt->output_offset
4824 + h->plt.offset);
4825
fbca6ad9
AO
4826#ifdef INCLUDE_SHMEDIA
4827 relocation++;
4828#endif
4829
4830 addend = rel->r_addend;
4831
37c644f2
AO
4832 goto final_link_relocate;
4833
8e45593f
NC
4834 /* Relocation is to the canonical function descriptor for this
4835 symbol, possibly via the GOT. Initialize the GOT
4836 entry and function descriptor if necessary. */
4837 case R_SH_GOTFUNCDESC:
4838 case R_SH_GOTFUNCDESC20:
4839 case R_SH_FUNCDESC:
4840 {
4841 int dynindx = -1;
4842 asection *reloc_section;
4843 bfd_vma reloc_offset;
4844 int reloc_type = R_SH_FUNCDESC;
4845
e0af1f53
MR
4846 BFD_ASSERT (htab);
4847
8e45593f
NC
4848 check_segment[0] = check_segment[1] = -1;
4849
4850 /* FIXME: See what FRV does for global symbols in the
4851 executable, with --export-dynamic. Do they need ld.so
4852 to allocate official descriptors? See what this code
4853 does. */
4854
4855 relocation = 0;
4856 addend = 0;
4857
4858 if (r_type == R_SH_FUNCDESC)
4859 {
4860 reloc_section = input_section;
4861 reloc_offset = rel->r_offset;
4862 }
4863 else
4864 {
e0af1f53 4865 reloc_section = sgot;
8e45593f
NC
4866
4867 if (h != NULL)
4868 reloc_offset = h->got.offset;
4869 else
4870 {
4871 BFD_ASSERT (local_got_offsets != NULL);
4872 reloc_offset = local_got_offsets[r_symndx];
4873 }
4874 BFD_ASSERT (reloc_offset != MINUS_ONE);
4875
4876 if (reloc_offset & 1)
4877 {
4878 reloc_offset &= ~1;
4879 goto funcdesc_done_got;
4880 }
4881 }
4882
4883 if (h && h->root.type == bfd_link_hash_undefweak
4884 && (SYMBOL_CALLS_LOCAL (info, h)
4885 || !htab->root.dynamic_sections_created))
4886 /* Undefined weak symbol which will not be dynamically
4887 resolved later; leave it at zero. */
4888 goto funcdesc_leave_zero;
4889 else if (SYMBOL_CALLS_LOCAL (info, h)
4890 && ! SYMBOL_FUNCDESC_LOCAL (info, h))
4891 {
4892 /* If the symbol needs a non-local function descriptor
4893 but binds locally (i.e., its visibility is
4894 protected), emit a dynamic relocation decayed to
4895 section+offset. This is an optimization; the dynamic
4896 linker would resolve our function descriptor request
4897 to our copy of the function anyway. */
4898 dynindx = elf_section_data (h->root.u.def.section
4899 ->output_section)->dynindx;
4900 relocation += h->root.u.def.section->output_offset
4901 + h->root.u.def.value;
4902 }
4903 else if (! SYMBOL_FUNCDESC_LOCAL (info, h))
4904 {
4905 /* If the symbol is dynamic and there will be dynamic
4906 symbol resolution because we are or are linked with a
4907 shared library, emit a FUNCDESC relocation such that
4908 the dynamic linker will allocate the function
4909 descriptor. */
4910 BFD_ASSERT (h->dynindx != -1);
4911 dynindx = h->dynindx;
4912 }
4913 else
4914 {
4915 bfd_vma offset;
4916
4917 /* Otherwise, we know we have a private function
4918 descriptor, so reference it directly. */
4919 reloc_type = R_SH_DIR32;
4920 dynindx = elf_section_data (htab->sfuncdesc
4921 ->output_section)->dynindx;
4922
4923 if (h)
4924 {
4925 offset = sh_elf_hash_entry (h)->funcdesc.offset;
4926 BFD_ASSERT (offset != MINUS_ONE);
4927 if ((offset & 1) == 0)
4928 {
4929 if (!sh_elf_initialize_funcdesc (output_bfd, info, h,
4930 offset, NULL, 0))
4931 return FALSE;
4932 sh_elf_hash_entry (h)->funcdesc.offset |= 1;
4933 }
4934 }
4935 else
4936 {
4937 union gotref *local_funcdesc;
4938
4939 local_funcdesc = sh_elf_local_funcdesc (input_bfd);
4940 offset = local_funcdesc[r_symndx].offset;
4941 BFD_ASSERT (offset != MINUS_ONE);
4942 if ((offset & 1) == 0)
4943 {
4944 if (!sh_elf_initialize_funcdesc (output_bfd, info, NULL,
4945 offset, sec,
4946 sym->st_value))
4947 return FALSE;
4948 local_funcdesc[r_symndx].offset |= 1;
4949 }
4950 }
4951
4952 relocation = htab->sfuncdesc->output_offset + (offset & ~1);
4953 }
4954
4955 if (!info->shared && SYMBOL_FUNCDESC_LOCAL (info, h))
4956 {
4957 bfd_vma offset;
4958
4959 if (sh_elf_osec_readonly_p (output_bfd,
4960 reloc_section->output_section))
4961 {
4962 (*_bfd_error_handler)
4963 (_("%B(%A+0x%lx): cannot emit fixup to `%s' in read-only section"),
4964 input_bfd,
4965 input_section,
4966 (long) rel->r_offset,
4967 symname);
4968 return FALSE;
4969 }
4970
4971 offset = _bfd_elf_section_offset (output_bfd, info,
4972 reloc_section, reloc_offset);
4973
4974 if (offset != (bfd_vma)-1)
4975 sh_elf_add_rofixup (output_bfd, htab->srofixup,
4976 offset
4977 + reloc_section->output_section->vma
4978 + reloc_section->output_offset);
4979 }
4980 else if ((reloc_section->output_section->flags
4981 & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
4982 {
4983 bfd_vma offset;
4984
4985 if (sh_elf_osec_readonly_p (output_bfd,
4986 reloc_section->output_section))
4987 {
4988 info->callbacks->warning
4989 (info,
4990 _("cannot emit dynamic relocations in read-only section"),
4991 symname, input_bfd, reloc_section, reloc_offset);
4992 return FALSE;
4993 }
4994
4995 if (srelgot == NULL)
4996 {
4997 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
4998 BFD_ASSERT (srelgot != NULL);
4999 }
5000
5001 offset = _bfd_elf_section_offset (output_bfd, info,
5002 reloc_section, reloc_offset);
5003
5004 if (offset != (bfd_vma)-1)
5005 sh_elf_add_dyn_reloc (output_bfd, srelgot,
5006 offset
5007 + reloc_section->output_section->vma
5008 + reloc_section->output_offset,
5009 reloc_type, dynindx, relocation);
5010
5011 if (r_type == R_SH_FUNCDESC)
5012 {
5013 r = bfd_reloc_ok;
5014 break;
5015 }
5016 else
5017 {
5018 relocation = 0;
5019 goto funcdesc_leave_zero;
5020 }
5021 }
5022
5023 if (SYMBOL_FUNCDESC_LOCAL (info, h))
5024 relocation += htab->sfuncdesc->output_section->vma;
5025 funcdesc_leave_zero:
5026 if (r_type != R_SH_FUNCDESC)
5027 {
5028 bfd_put_32 (output_bfd, relocation,
5029 reloc_section->contents + reloc_offset);
5030 if (h != NULL)
5031 h->got.offset |= 1;
5032 else
5033 local_got_offsets[r_symndx] |= 1;
5034
5035 funcdesc_done_got:
5036
5037 relocation = sh_elf_got_offset (htab) + reloc_offset;
5038#ifdef GOT_BIAS
5039 relocation -= GOT_BIAS;
5040#endif
5041 }
5042 if (r_type == R_SH_GOTFUNCDESC20)
5043 {
5044 r = install_movi20_field (output_bfd, relocation + addend,
5045 input_bfd, input_section, contents,
5046 rel->r_offset);
5047 break;
5048 }
5049 else
5050 goto final_link_relocate;
5051 }
5052 break;
5053
5054 case R_SH_GOTOFFFUNCDESC:
5055 case R_SH_GOTOFFFUNCDESC20:
5056 /* FIXME: See R_SH_FUNCDESC comment about global symbols in the
5057 executable and --export-dynamic. If such symbols get
5058 ld.so-allocated descriptors we can not use R_SH_GOTOFFFUNCDESC
5059 for them. */
e0af1f53 5060 BFD_ASSERT (htab);
8e45593f
NC
5061
5062 check_segment[0] = check_segment[1] = -1;
5063 relocation = 0;
5064 addend = rel->r_addend;
5065
5066 if (h && (h->root.type == bfd_link_hash_undefweak
5067 || !SYMBOL_FUNCDESC_LOCAL (info, h)))
5068 {
5069 _bfd_error_handler
5070 (_("%B(%A+0x%lx): %s relocation against external symbol \"%s\""),
5071 input_bfd, input_section, (long) rel->r_offset, howto->name,
5072 h->root.root.string);
5073 return FALSE;
5074 }
5075 else
5076 {
5077 bfd_vma offset;
5078
5079 /* Otherwise, we know we have a private function
5080 descriptor, so reference it directly. */
5081 if (h)
5082 {
5083 offset = sh_elf_hash_entry (h)->funcdesc.offset;
5084 BFD_ASSERT (offset != MINUS_ONE);
5085 if ((offset & 1) == 0)
5086 {
5087 if (!sh_elf_initialize_funcdesc (output_bfd, info, h,
5088 offset, NULL, 0))
5089 return FALSE;
5090 sh_elf_hash_entry (h)->funcdesc.offset |= 1;
5091 }
5092 }
5093 else
5094 {
5095 union gotref *local_funcdesc;
5096
5097 local_funcdesc = sh_elf_local_funcdesc (input_bfd);
5098 offset = local_funcdesc[r_symndx].offset;
5099 BFD_ASSERT (offset != MINUS_ONE);
5100 if ((offset & 1) == 0)
5101 {
5102 if (!sh_elf_initialize_funcdesc (output_bfd, info, NULL,
5103 offset, sec,
5104 sym->st_value))
5105 return FALSE;
5106 local_funcdesc[r_symndx].offset |= 1;
5107 }
5108 }
5109
5110 relocation = htab->sfuncdesc->output_offset + (offset & ~1);
5111 }
5112
e0af1f53
MR
5113 relocation -= (htab->root.hgot->root.u.def.value
5114 + sgotplt->output_offset);
8e45593f
NC
5115#ifdef GOT_BIAS
5116 relocation -= GOT_BIAS;
5117#endif
5118
5119 if (r_type == R_SH_GOTOFFFUNCDESC20)
5120 {
5121 r = install_movi20_field (output_bfd, relocation + addend,
5122 input_bfd, input_section, contents,
5123 rel->r_offset);
5124 break;
5125 }
5126 else
5127 goto final_link_relocate;
5128
37c644f2
AO
5129 case R_SH_LOOP_START:
5130 {
5131 static bfd_vma start, end;
5132
5133 start = (relocation + rel->r_addend
5134 - (sec->output_section->vma + sec->output_offset));
5135 r = sh_elf_reloc_loop (r_type, input_bfd, input_section, contents,
5136 rel->r_offset, sec, start, end);
5137 break;
5138
5139 case R_SH_LOOP_END:
5140 end = (relocation + rel->r_addend
5141 - (sec->output_section->vma + sec->output_offset));
5142 r = sh_elf_reloc_loop (r_type, input_bfd, input_section, contents,
5143 rel->r_offset, sec, start, end);
5144 break;
5145 }
3376eaf5
KK
5146
5147 case R_SH_TLS_GD_32:
5148 case R_SH_TLS_IE_32:
e0af1f53 5149 BFD_ASSERT (htab);
8e45593f 5150 check_segment[0] = check_segment[1] = -1;
3376eaf5 5151 r_type = sh_elf_optimized_tls_reloc (info, r_type, h == NULL);
8e45593f 5152 got_type = GOT_UNKNOWN;
3376eaf5 5153 if (h == NULL && local_got_offsets)
8e45593f 5154 got_type = sh_elf_local_got_type (input_bfd) [r_symndx];
3376eaf5
KK
5155 else if (h != NULL)
5156 {
8e45593f 5157 got_type = sh_elf_hash_entry (h)->got_type;
3376eaf5
KK
5158 if (! info->shared
5159 && (h->dynindx == -1
f5385ebf 5160 || h->def_regular))
267fb3c1 5161 r_type = R_SH_TLS_LE_32;
3376eaf5
KK
5162 }
5163
8e45593f 5164 if (r_type == R_SH_TLS_GD_32 && got_type == GOT_TLS_IE)
3376eaf5
KK
5165 r_type = R_SH_TLS_IE_32;
5166
5167 if (r_type == R_SH_TLS_LE_32)
5168 {
5169 bfd_vma offset;
5170 unsigned short insn;
3376eaf5
KK
5171
5172 if (ELF32_R_TYPE (rel->r_info) == R_SH_TLS_GD_32)
5173 {
5174 /* GD->LE transition:
5175 mov.l 1f,r4; mova 2f,r0; mov.l 2f,r1; add r0,r1;
b34976b6 5176 jsr @r1; add r12,r4; bra 3f; nop; .align 2;
3376eaf5
KK
5177 1: .long x$TLSGD; 2: .long __tls_get_addr@PLT; 3:
5178 We change it into:
5179 mov.l 1f,r4; stc gbr,r0; add r4,r0; nop;
5180 nop; nop; ...
5181 1: .long x@TPOFF; 2: .long __tls_get_addr@PLT; 3:. */
5182
5183 offset = rel->r_offset;
5184 BFD_ASSERT (offset >= 16);
5185 /* Size of GD instructions is 16 or 18. */
5186 offset -= 16;
5187 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5188 if ((insn & 0xff00) == 0xc700)
5189 {
5190 BFD_ASSERT (offset >= 2);
5191 offset -= 2;
5192 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5193 }
5194
5195 BFD_ASSERT ((insn & 0xff00) == 0xd400);
5196 insn = bfd_get_16 (input_bfd, contents + offset + 2);
5197 BFD_ASSERT ((insn & 0xff00) == 0xc700);
5198 insn = bfd_get_16 (input_bfd, contents + offset + 4);
5199 BFD_ASSERT ((insn & 0xff00) == 0xd100);
5200 insn = bfd_get_16 (input_bfd, contents + offset + 6);
5201 BFD_ASSERT (insn == 0x310c);
5202 insn = bfd_get_16 (input_bfd, contents + offset + 8);
5203 BFD_ASSERT (insn == 0x410b);
5204 insn = bfd_get_16 (input_bfd, contents + offset + 10);
5205 BFD_ASSERT (insn == 0x34cc);
5206
5207 bfd_put_16 (output_bfd, 0x0012, contents + offset + 2);
5208 bfd_put_16 (output_bfd, 0x304c, contents + offset + 4);
5209 bfd_put_16 (output_bfd, 0x0009, contents + offset + 6);
5210 bfd_put_16 (output_bfd, 0x0009, contents + offset + 8);
5211 bfd_put_16 (output_bfd, 0x0009, contents + offset + 10);
5212 }
5213 else
5214 {
91d6fa6a 5215 int target;
3376eaf5
KK
5216
5217 /* IE->LE transition:
5218 mov.l 1f,r0; stc gbr,rN; mov.l @(r0,r12),rM;
5219 bra 2f; add ...; .align 2; 1: x@GOTTPOFF; 2:
5220 We change it into:
5221 mov.l .Ln,rM; stc gbr,rN; nop; ...;
5222 1: x@TPOFF; 2:. */
5223
5224 offset = rel->r_offset;
5225 BFD_ASSERT (offset >= 16);
5226 /* Size of IE instructions is 10 or 12. */
5227 offset -= 10;
5228 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5229 if ((insn & 0xf0ff) == 0x0012)
5230 {
5231 BFD_ASSERT (offset >= 2);
5232 offset -= 2;
5233 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5234 }
5235
5236 BFD_ASSERT ((insn & 0xff00) == 0xd000);
91d6fa6a 5237 target = insn & 0x00ff;
3376eaf5
KK
5238 insn = bfd_get_16 (input_bfd, contents + offset + 2);
5239 BFD_ASSERT ((insn & 0xf0ff) == 0x0012);
5240 insn = bfd_get_16 (input_bfd, contents + offset + 4);
5241 BFD_ASSERT ((insn & 0xf0ff) == 0x00ce);
91d6fa6a 5242 insn = 0xd000 | (insn & 0x0f00) | target;
3376eaf5
KK
5243 bfd_put_16 (output_bfd, insn, contents + offset + 0);
5244 bfd_put_16 (output_bfd, 0x0009, contents + offset + 4);
5245 }
5246
267fb3c1
KK
5247 bfd_put_32 (output_bfd, tpoff (info, relocation),
5248 contents + rel->r_offset);
3376eaf5
KK
5249 continue;
5250 }
5251
8e45593f 5252 if (sgot == NULL || sgotplt == NULL)
3376eaf5
KK
5253 abort ();
5254
5255 if (h != NULL)
5256 off = h->got.offset;
5257 else
5258 {
5259 if (local_got_offsets == NULL)
5260 abort ();
5261
5262 off = local_got_offsets[r_symndx];
5263 }
5264
267fb3c1
KK
5265 /* Relocate R_SH_TLS_IE_32 directly when statically linking. */
5266 if (r_type == R_SH_TLS_IE_32
5267 && ! htab->root.dynamic_sections_created)
5268 {
5269 off &= ~1;
5270 bfd_put_32 (output_bfd, tpoff (info, relocation),
5271 sgot->contents + off);
8e45593f 5272 bfd_put_32 (output_bfd, sh_elf_got_offset (htab) + off,
267fb3c1
KK
5273 contents + rel->r_offset);
5274 continue;
5275 }
5276
3376eaf5
KK
5277 if ((off & 1) != 0)
5278 off &= ~1;
26e41594 5279 else
3376eaf5
KK
5280 {
5281 Elf_Internal_Rela outrel;
947216bf 5282 bfd_byte *loc;
3376eaf5
KK
5283 int dr_type, indx;
5284
5285 if (srelgot == NULL)
5286 {
5287 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
5288 BFD_ASSERT (srelgot != NULL);
5289 }
5290
5291 outrel.r_offset = (sgot->output_section->vma
5292 + sgot->output_offset + off);
5293
267fb3c1 5294 if (h == NULL || h->dynindx == -1)
c95b8a7a
KK
5295 indx = 0;
5296 else
5297 indx = h->dynindx;
267fb3c1 5298
3376eaf5
KK
5299 dr_type = (r_type == R_SH_TLS_GD_32 ? R_SH_TLS_DTPMOD32 :
5300 R_SH_TLS_TPOFF32);
5301 if (dr_type == R_SH_TLS_TPOFF32 && indx == 0)
5302 outrel.r_addend = relocation - dtpoff_base (info);
5303 else
5304 outrel.r_addend = 0;
5305 outrel.r_info = ELF32_R_INFO (indx, dr_type);
947216bf
AM
5306 loc = srelgot->contents;
5307 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
3376eaf5
KK
5308 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
5309
5310 if (r_type == R_SH_TLS_GD_32)
5311 {
5312 if (indx == 0)
5313 {
5314 bfd_put_32 (output_bfd,
5315 relocation - dtpoff_base (info),
5316 sgot->contents + off + 4);
5317 }
5318 else
5319 {
5320 outrel.r_info = ELF32_R_INFO (indx,
5321 R_SH_TLS_DTPOFF32);
5322 outrel.r_offset += 4;
5323 outrel.r_addend = 0;
5324 srelgot->reloc_count++;
947216bf
AM
5325 loc += sizeof (Elf32_External_Rela);
5326 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3376eaf5
KK
5327 }
5328 }
5329
5330 if (h != NULL)
5331 h->got.offset |= 1;
5332 else
5333 local_got_offsets[r_symndx] |= 1;
5334 }
5335
5336 if (off >= (bfd_vma) -2)
5337 abort ();
5338
5339 if (r_type == (int) ELF32_R_TYPE (rel->r_info))
8e45593f 5340 relocation = sh_elf_got_offset (htab) + off;
3376eaf5
KK
5341 else
5342 {
5343 bfd_vma offset;
5344 unsigned short insn;
5345
5346 /* GD->IE transition:
5347 mov.l 1f,r4; mova 2f,r0; mov.l 2f,r1; add r0,r1;
5348 jsr @r1; add r12,r4; bra 3f; nop; .align 2;
5349 1: .long x$TLSGD; 2: .long __tls_get_addr@PLT; 3:
5350 We change it into:
5351 mov.l 1f,r0; stc gbr,r4; mov.l @(r0,r12),r0; add r4,r0;
5352 nop; nop; bra 3f; nop; .align 2;
5353 1: .long x@TPOFF; 2:...; 3:. */
5354
5355 offset = rel->r_offset;
5356 BFD_ASSERT (offset >= 16);
5357 /* Size of GD instructions is 16 or 18. */
5358 offset -= 16;
5359 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5360 if ((insn & 0xff00) == 0xc700)
5361 {
5362 BFD_ASSERT (offset >= 2);
5363 offset -= 2;
5364 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5365 }
5366
5367 BFD_ASSERT ((insn & 0xff00) == 0xd400);
5368
5369 /* Replace mov.l 1f,R4 with mov.l 1f,r0. */
5370 bfd_put_16 (output_bfd, insn & 0xf0ff, contents + offset);
5371
5372 insn = bfd_get_16 (input_bfd, contents + offset + 2);
5373 BFD_ASSERT ((insn & 0xff00) == 0xc700);
5374 insn = bfd_get_16 (input_bfd, contents + offset + 4);
5375 BFD_ASSERT ((insn & 0xff00) == 0xd100);
5376 insn = bfd_get_16 (input_bfd, contents + offset + 6);
5377 BFD_ASSERT (insn == 0x310c);
5378 insn = bfd_get_16 (input_bfd, contents + offset + 8);
5379 BFD_ASSERT (insn == 0x410b);
5380 insn = bfd_get_16 (input_bfd, contents + offset + 10);
5381 BFD_ASSERT (insn == 0x34cc);
5382
5383 bfd_put_16 (output_bfd, 0x0412, contents + offset + 2);
5384 bfd_put_16 (output_bfd, 0x00ce, contents + offset + 4);
5385 bfd_put_16 (output_bfd, 0x304c, contents + offset + 6);
5386 bfd_put_16 (output_bfd, 0x0009, contents + offset + 8);
5387 bfd_put_16 (output_bfd, 0x0009, contents + offset + 10);
5388
8e45593f 5389 bfd_put_32 (output_bfd, sh_elf_got_offset (htab) + off,
3376eaf5
KK
5390 contents + rel->r_offset);
5391
5392 continue;
5393 }
5394
5395 addend = rel->r_addend;
5396
5397 goto final_link_relocate;
5398
5399 case R_SH_TLS_LD_32:
e0af1f53 5400 BFD_ASSERT (htab);
8e45593f 5401 check_segment[0] = check_segment[1] = -1;
3376eaf5
KK
5402 if (! info->shared)
5403 {
5404 bfd_vma offset;
5405 unsigned short insn;
5406
5407 /* LD->LE transition:
5408 mov.l 1f,r4; mova 2f,r0; mov.l 2f,r1; add r0,r1;
5409 jsr @r1; add r12,r4; bra 3f; nop; .align 2;
5410 1: .long x$TLSLD; 2: .long __tls_get_addr@PLT; 3:
5411 We change it into:
5412 stc gbr,r0; nop; nop; nop;
5413 nop; nop; bra 3f; ...; 3:. */
5414
5415 offset = rel->r_offset;
5416 BFD_ASSERT (offset >= 16);
5417 /* Size of LD instructions is 16 or 18. */
5418 offset -= 16;
5419 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5420 if ((insn & 0xff00) == 0xc700)
5421 {
5422 BFD_ASSERT (offset >= 2);
5423 offset -= 2;
5424 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5425 }
5426
5427 BFD_ASSERT ((insn & 0xff00) == 0xd400);
5428 insn = bfd_get_16 (input_bfd, contents + offset + 2);
5429 BFD_ASSERT ((insn & 0xff00) == 0xc700);
5430 insn = bfd_get_16 (input_bfd, contents + offset + 4);
5431 BFD_ASSERT ((insn & 0xff00) == 0xd100);
5432 insn = bfd_get_16 (input_bfd, contents + offset + 6);
5433 BFD_ASSERT (insn == 0x310c);
5434 insn = bfd_get_16 (input_bfd, contents + offset + 8);
5435 BFD_ASSERT (insn == 0x410b);
5436 insn = bfd_get_16 (input_bfd, contents + offset + 10);
5437 BFD_ASSERT (insn == 0x34cc);
5438
5439 bfd_put_16 (output_bfd, 0x0012, contents + offset + 0);
5440 bfd_put_16 (output_bfd, 0x0009, contents + offset + 2);
5441 bfd_put_16 (output_bfd, 0x0009, contents + offset + 4);
5442 bfd_put_16 (output_bfd, 0x0009, contents + offset + 6);
5443 bfd_put_16 (output_bfd, 0x0009, contents + offset + 8);
5444 bfd_put_16 (output_bfd, 0x0009, contents + offset + 10);
5445
5446 continue;
5447 }
5448
8e45593f 5449 if (sgot == NULL || sgotplt == NULL)
3376eaf5
KK
5450 abort ();
5451
5452 off = htab->tls_ldm_got.offset;
5453 if (off & 1)
5454 off &= ~1;
5455 else
5456 {
5457 Elf_Internal_Rela outrel;
947216bf 5458 bfd_byte *loc;
3376eaf5
KK
5459
5460 srelgot = htab->srelgot;
5461 if (srelgot == NULL)
5462 abort ();
5463
5464 outrel.r_offset = (sgot->output_section->vma
5465 + sgot->output_offset + off);
5466 outrel.r_addend = 0;
5467 outrel.r_info = ELF32_R_INFO (0, R_SH_TLS_DTPMOD32);
947216bf
AM
5468 loc = srelgot->contents;
5469 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
3376eaf5
KK
5470 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
5471 htab->tls_ldm_got.offset |= 1;
5472 }
5473
8e45593f 5474 relocation = sh_elf_got_offset (htab) + off;
3376eaf5
KK
5475 addend = rel->r_addend;
5476
5477 goto final_link_relocate;
5478
5479 case R_SH_TLS_LDO_32:
8e45593f 5480 check_segment[0] = check_segment[1] = -1;
3376eaf5 5481 if (! info->shared)
267fb3c1 5482 relocation = tpoff (info, relocation);
3376eaf5
KK
5483 else
5484 relocation -= dtpoff_base (info);
5485
5486 addend = rel->r_addend;
5487 goto final_link_relocate;
5488
5489 case R_SH_TLS_LE_32:
5490 {
5491 int indx;
5492 Elf_Internal_Rela outrel;
947216bf 5493 bfd_byte *loc;
3376eaf5 5494
8e45593f
NC
5495 check_segment[0] = check_segment[1] = -1;
5496
b68593b9 5497 if (! info->shared || info->pie)
267fb3c1
KK
5498 {
5499 relocation = tpoff (info, relocation);
5500 addend = rel->r_addend;
5501 goto final_link_relocate;
5502 }
5503
3376eaf5
KK
5504 if (sreloc == NULL)
5505 {
83bac4b0
NC
5506 sreloc = _bfd_elf_get_dynamic_reloc_section
5507 (input_bfd, input_section, /*rela?*/ TRUE);
5508 if (sreloc == NULL)
b34976b6 5509 return FALSE;
3376eaf5
KK
5510 }
5511
267fb3c1
KK
5512 if (h == NULL || h->dynindx == -1)
5513 indx = 0;
5514 else
5515 indx = h->dynindx;
5516
3376eaf5
KK
5517 outrel.r_offset = (input_section->output_section->vma
5518 + input_section->output_offset
5519 + rel->r_offset);
5520 outrel.r_info = ELF32_R_INFO (indx, R_SH_TLS_TPOFF32);
5521 if (indx == 0)
5522 outrel.r_addend = relocation - dtpoff_base (info);
5523 else
5524 outrel.r_addend = 0;
3376eaf5 5525
947216bf
AM
5526 loc = sreloc->contents;
5527 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
5528 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3376eaf5
KK
5529 continue;
5530 }
37c644f2
AO
5531 }
5532
146be91a 5533 relocation_done:
e0af1f53 5534 if (fdpic_p && check_segment[0] != (unsigned) -1
8e45593f
NC
5535 && check_segment[0] != check_segment[1])
5536 {
5537 /* We don't want duplicate errors for undefined symbols. */
5538 if (!h || h->root.type != bfd_link_hash_undefined)
5539 {
5540 if (info->shared)
5541 {
5542 info->callbacks->einfo
5543 (_("%X%C: relocation to \"%s\" references a different segment\n"),
5544 input_bfd, input_section, rel->r_offset, symname);
5545 return FALSE;
5546 }
5547 else
5548 info->callbacks->einfo
5549 (_("%C: warning: relocation to \"%s\" references a different segment\n"),
5550 input_bfd, input_section, rel->r_offset, symname);
5551 }
5552
5553 elf_elfheader (output_bfd)->e_flags &= ~EF_SH_PIC;
5554 }
5555
37c644f2
AO
5556 if (r != bfd_reloc_ok)
5557 {
5558 switch (r)
5559 {
5560 default:
5561 case bfd_reloc_outofrange:
5562 abort ();
5563 case bfd_reloc_overflow:
5564 {
5565 const char *name;
5566
5567 if (h != NULL)
dfeffb9f 5568 name = NULL;
37c644f2
AO
5569 else
5570 {
252b5132
RH
5571 name = (bfd_elf_string_from_elf_section
5572 (input_bfd, symtab_hdr->sh_link, sym->st_name));
5573 if (name == NULL)
b34976b6 5574 return FALSE;
252b5132
RH
5575 if (*name == '\0')
5576 name = bfd_section_name (input_bfd, sec);
5577 }
5578 if (! ((*info->callbacks->reloc_overflow)
dfeffb9f
L
5579 (info, (h ? &h->root : NULL), name, howto->name,
5580 (bfd_vma) 0, input_bfd, input_section,
5581 rel->r_offset)))
b34976b6 5582 return FALSE;
252b5132
RH
5583 }
5584 break;
5585 }
5586 }
5587 }
5588
b34976b6 5589 return TRUE;
252b5132
RH
5590}
5591
5592/* This is a version of bfd_generic_get_relocated_section_contents
5593 which uses sh_elf_relocate_section. */
5594
5595static bfd_byte *
09fd220b
KK
5596sh_elf_get_relocated_section_contents (bfd *output_bfd,
5597 struct bfd_link_info *link_info,
5598 struct bfd_link_order *link_order,
5599 bfd_byte *data,
5600 bfd_boolean relocatable,
5601 asymbol **symbols)
252b5132
RH
5602{
5603 Elf_Internal_Shdr *symtab_hdr;
5604 asection *input_section = link_order->u.indirect.section;
5605 bfd *input_bfd = input_section->owner;
5606 asection **sections = NULL;
5607 Elf_Internal_Rela *internal_relocs = NULL;
6cdc0ccc 5608 Elf_Internal_Sym *isymbuf = NULL;
252b5132
RH
5609
5610 /* We only need to handle the case of relaxing, or of having a
5611 particular set of section contents, specially. */
1049f94e 5612 if (relocatable
252b5132
RH
5613 || elf_section_data (input_section)->this_hdr.contents == NULL)
5614 return bfd_generic_get_relocated_section_contents (output_bfd, link_info,
5615 link_order, data,
1049f94e 5616 relocatable,
252b5132
RH
5617 symbols);
5618
0ffa91dd 5619 symtab_hdr = &elf_symtab_hdr (input_bfd);
252b5132
RH
5620
5621 memcpy (data, elf_section_data (input_section)->this_hdr.contents,
eea6121a 5622 (size_t) input_section->size);
252b5132
RH
5623
5624 if ((input_section->flags & SEC_RELOC) != 0
5625 && input_section->reloc_count > 0)
5626 {
252b5132 5627 asection **secpp;
6cdc0ccc 5628 Elf_Internal_Sym *isym, *isymend;
9ad5cbcf 5629 bfd_size_type amt;
252b5132 5630
45d6a902 5631 internal_relocs = (_bfd_elf_link_read_relocs
09fd220b 5632 (input_bfd, input_section, NULL,
b34976b6 5633 (Elf_Internal_Rela *) NULL, FALSE));
252b5132
RH
5634 if (internal_relocs == NULL)
5635 goto error_return;
5636
6cdc0ccc
AM
5637 if (symtab_hdr->sh_info != 0)
5638 {
5639 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
5640 if (isymbuf == NULL)
5641 isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
5642 symtab_hdr->sh_info, 0,
5643 NULL, NULL, NULL);
5644 if (isymbuf == NULL)
5645 goto error_return;
5646 }
252b5132 5647
9ad5cbcf
AM
5648 amt = symtab_hdr->sh_info;
5649 amt *= sizeof (asection *);
5650 sections = (asection **) bfd_malloc (amt);
5651 if (sections == NULL && amt != 0)
252b5132
RH
5652 goto error_return;
5653
6cdc0ccc
AM
5654 isymend = isymbuf + symtab_hdr->sh_info;
5655 for (isym = isymbuf, secpp = sections; isym < isymend; ++isym, ++secpp)
252b5132
RH
5656 {
5657 asection *isec;
5658
6cdc0ccc 5659 if (isym->st_shndx == SHN_UNDEF)
252b5132 5660 isec = bfd_und_section_ptr;
6cdc0ccc 5661 else if (isym->st_shndx == SHN_ABS)
252b5132 5662 isec = bfd_abs_section_ptr;
6cdc0ccc 5663 else if (isym->st_shndx == SHN_COMMON)
252b5132
RH
5664 isec = bfd_com_section_ptr;
5665 else
6cdc0ccc 5666 isec = bfd_section_from_elf_index (input_bfd, isym->st_shndx);
252b5132
RH
5667
5668 *secpp = isec;
5669 }
5670
5671 if (! sh_elf_relocate_section (output_bfd, link_info, input_bfd,
5672 input_section, data, internal_relocs,
6cdc0ccc 5673 isymbuf, sections))
252b5132
RH
5674 goto error_return;
5675
5676 if (sections != NULL)
5677 free (sections);
6cdc0ccc
AM
5678 if (isymbuf != NULL
5679 && symtab_hdr->contents != (unsigned char *) isymbuf)
5680 free (isymbuf);
5681 if (elf_section_data (input_section)->relocs != internal_relocs)
252b5132 5682 free (internal_relocs);
252b5132
RH
5683 }
5684
5685 return data;
5686
5687 error_return:
252b5132
RH
5688 if (sections != NULL)
5689 free (sections);
6cdc0ccc
AM
5690 if (isymbuf != NULL
5691 && symtab_hdr->contents != (unsigned char *) isymbuf)
5692 free (isymbuf);
5693 if (internal_relocs != NULL
5694 && elf_section_data (input_section)->relocs != internal_relocs)
5695 free (internal_relocs);
252b5132
RH
5696 return NULL;
5697}
917583ad 5698
3376eaf5
KK
5699/* Return the base VMA address which should be subtracted from real addresses
5700 when resolving @dtpoff relocation.
5701 This is PT_TLS segment p_vaddr. */
5702
5703static bfd_vma
09fd220b 5704dtpoff_base (struct bfd_link_info *info)
3376eaf5 5705{
e1918d23
AM
5706 /* If tls_sec is NULL, we should have signalled an error already. */
5707 if (elf_hash_table (info)->tls_sec == NULL)
267fb3c1 5708 return 0;
e1918d23 5709 return elf_hash_table (info)->tls_sec->vma;
3376eaf5
KK
5710}
5711
267fb3c1
KK
5712/* Return the relocation value for R_SH_TLS_TPOFF32.. */
5713
5714static bfd_vma
09fd220b 5715tpoff (struct bfd_link_info *info, bfd_vma address)
267fb3c1 5716{
e1918d23
AM
5717 /* If tls_sec is NULL, we should have signalled an error already. */
5718 if (elf_hash_table (info)->tls_sec == NULL)
267fb3c1
KK
5719 return 0;
5720 /* SH TLS ABI is variant I and static TLS block start just after tcbhead
5721 structure which has 2 pointer fields. */
044ad7e3
KK
5722 return (address - elf_hash_table (info)->tls_sec->vma
5723 + align_power ((bfd_vma) 8,
5724 elf_hash_table (info)->tls_sec->alignment_power));
267fb3c1
KK
5725}
5726
252b5132 5727static asection *
09fd220b 5728sh_elf_gc_mark_hook (asection *sec,
07adf181
AM
5729 struct bfd_link_info *info,
5730 Elf_Internal_Rela *rel,
5731 struct elf_link_hash_entry *h,
09fd220b 5732 Elf_Internal_Sym *sym)
252b5132
RH
5733{
5734 if (h != NULL)
07adf181
AM
5735 switch (ELF32_R_TYPE (rel->r_info))
5736 {
5737 case R_SH_GNU_VTINHERIT:
5738 case R_SH_GNU_VTENTRY:
5739 return NULL;
5740 }
9ad5cbcf 5741
07adf181 5742 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
252b5132
RH
5743}
5744
37c644f2
AO
5745/* Update the got entry reference counts for the section being removed. */
5746
b34976b6 5747static bfd_boolean
09fd220b
KK
5748sh_elf_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info,
5749 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 5750{
067653c5
AM
5751 Elf_Internal_Shdr *symtab_hdr;
5752 struct elf_link_hash_entry **sym_hashes;
5753 bfd_signed_vma *local_got_refcounts;
8e45593f 5754 union gotref *local_funcdesc;
067653c5 5755 const Elf_Internal_Rela *rel, *relend;
067653c5 5756
7dda2462
TG
5757 if (info->relocatable)
5758 return TRUE;
5759
067653c5
AM
5760 elf_section_data (sec)->local_dynrel = NULL;
5761
0ffa91dd 5762 symtab_hdr = &elf_symtab_hdr (abfd);
067653c5
AM
5763 sym_hashes = elf_sym_hashes (abfd);
5764 local_got_refcounts = elf_local_got_refcounts (abfd);
8e45593f 5765 local_funcdesc = sh_elf_local_funcdesc (abfd);
067653c5
AM
5766
5767 relend = relocs + sec->reloc_count;
5768 for (rel = relocs; rel < relend; rel++)
396a6083 5769 {
26e41594
AM
5770 unsigned long r_symndx;
5771 unsigned int r_type;
5772 struct elf_link_hash_entry *h = NULL;
396a6083
SC
5773#ifdef INCLUDE_SHMEDIA
5774 int seen_stt_datalabel = 0;
5775#endif
3376eaf5 5776
396a6083 5777 r_symndx = ELF32_R_SYM (rel->r_info);
26e41594 5778 if (r_symndx >= symtab_hdr->sh_info)
396a6083 5779 {
26e41594
AM
5780 struct elf_sh_link_hash_entry *eh;
5781 struct elf_sh_dyn_relocs **pp;
5782 struct elf_sh_dyn_relocs *p;
5783
396a6083 5784 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
396a6083
SC
5785 while (h->root.type == bfd_link_hash_indirect
5786 || h->root.type == bfd_link_hash_warning)
5787 {
3eb128b2 5788#ifdef INCLUDE_SHMEDIA
396a6083 5789 seen_stt_datalabel |= h->type == STT_DATALABEL;
3eb128b2 5790#endif
396a6083
SC
5791 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5792 }
26e41594
AM
5793 eh = (struct elf_sh_link_hash_entry *) h;
5794 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
5795 if (p->sec == sec)
5796 {
5797 /* Everything must go for SEC. */
5798 *pp = p->next;
5799 break;
5800 }
396a6083 5801 }
067653c5 5802
26e41594
AM
5803 r_type = ELF32_R_TYPE (rel->r_info);
5804 switch (sh_elf_optimized_tls_reloc (info, r_type, h != NULL))
396a6083
SC
5805 {
5806 case R_SH_TLS_LD_32:
5807 if (sh_elf_hash_table (info)->tls_ldm_got.refcount > 0)
5808 sh_elf_hash_table (info)->tls_ldm_got.refcount -= 1;
5809 break;
5810
5811 case R_SH_GOT32:
8e45593f 5812 case R_SH_GOT20:
396a6083 5813 case R_SH_GOTOFF:
8e45593f 5814 case R_SH_GOTOFF20:
396a6083
SC
5815 case R_SH_GOTPC:
5816#ifdef INCLUDE_SHMEDIA
5817 case R_SH_GOT_LOW16:
5818 case R_SH_GOT_MEDLOW16:
5819 case R_SH_GOT_MEDHI16:
5820 case R_SH_GOT_HI16:
5821 case R_SH_GOT10BY4:
5822 case R_SH_GOT10BY8:
5823 case R_SH_GOTOFF_LOW16:
5824 case R_SH_GOTOFF_MEDLOW16:
5825 case R_SH_GOTOFF_MEDHI16:
5826 case R_SH_GOTOFF_HI16:
5827 case R_SH_GOTPC_LOW16:
5828 case R_SH_GOTPC_MEDLOW16:
5829 case R_SH_GOTPC_MEDHI16:
5830 case R_SH_GOTPC_HI16:
5831#endif
5832 case R_SH_TLS_GD_32:
5833 case R_SH_TLS_IE_32:
8e45593f
NC
5834 case R_SH_GOTFUNCDESC:
5835 case R_SH_GOTFUNCDESC20:
396a6083
SC
5836 if (h != NULL)
5837 {
5838#ifdef INCLUDE_SHMEDIA
5839 if (seen_stt_datalabel)
5840 {
26e41594
AM
5841 struct elf_sh_link_hash_entry *eh;
5842 eh = (struct elf_sh_link_hash_entry *) h;
396a6083
SC
5843 if (eh->datalabel_got.refcount > 0)
5844 eh->datalabel_got.refcount -= 1;
5845 }
5846 else
5847#endif
5848 if (h->got.refcount > 0)
5849 h->got.refcount -= 1;
5850 }
5851 else if (local_got_refcounts != NULL)
5852 {
5853#ifdef INCLUDE_SHMEDIA
5854 if (rel->r_addend & 1)
5855 {
5856 if (local_got_refcounts[symtab_hdr->sh_info + r_symndx] > 0)
5857 local_got_refcounts[symtab_hdr->sh_info + r_symndx] -= 1;
5858 }
5859 else
5860#endif
5861 if (local_got_refcounts[r_symndx] > 0)
5862 local_got_refcounts[r_symndx] -= 1;
5863 }
5864 break;
5865
8e45593f
NC
5866 case R_SH_FUNCDESC:
5867 if (h != NULL)
5868 sh_elf_hash_entry (h)->abs_funcdesc_refcount -= 1;
5869 else if (sh_elf_hash_table (info)->fdpic_p && !info->shared)
5870 sh_elf_hash_table (info)->srofixup->size -= 4;
5871
5872 /* Fall through. */
5873
5874 case R_SH_GOTOFFFUNCDESC:
5875 case R_SH_GOTOFFFUNCDESC20:
5876 if (h != NULL)
5877 sh_elf_hash_entry (h)->funcdesc.refcount -= 1;
5878 else
5879 local_funcdesc[r_symndx].refcount -= 1;
5880 break;
5881
396a6083 5882 case R_SH_DIR32:
8e45593f
NC
5883 if (sh_elf_hash_table (info)->fdpic_p && !info->shared
5884 && (sec->flags & SEC_ALLOC) != 0)
5885 sh_elf_hash_table (info)->srofixup->size -= 4;
5886 /* Fall thru */
5887
396a6083 5888 case R_SH_REL32:
26e41594
AM
5889 if (info->shared)
5890 break;
5891 /* Fall thru */
396a6083
SC
5892
5893 case R_SH_PLT32:
5894#ifdef INCLUDE_SHMEDIA
5895 case R_SH_PLT_LOW16:
5896 case R_SH_PLT_MEDLOW16:
5897 case R_SH_PLT_MEDHI16:
5898 case R_SH_PLT_HI16:
5899#endif
5900 if (h != NULL)
5901 {
5902 if (h->plt.refcount > 0)
5903 h->plt.refcount -= 1;
5904 }
5905 break;
067653c5 5906
396a6083
SC
5907 case R_SH_GOTPLT32:
5908#ifdef INCLUDE_SHMEDIA
5909 case R_SH_GOTPLT_LOW16:
5910 case R_SH_GOTPLT_MEDLOW16:
5911 case R_SH_GOTPLT_MEDHI16:
5912 case R_SH_GOTPLT_HI16:
5913 case R_SH_GOTPLT10BY4:
5914 case R_SH_GOTPLT10BY8:
5915#endif
5916 if (h != NULL)
5917 {
26e41594
AM
5918 struct elf_sh_link_hash_entry *eh;
5919 eh = (struct elf_sh_link_hash_entry *) h;
396a6083 5920 if (eh->gotplt_refcount > 0)
067653c5 5921 {
396a6083
SC
5922 eh->gotplt_refcount -= 1;
5923 if (h->plt.refcount > 0)
5924 h->plt.refcount -= 1;
067653c5 5925 }
067653c5 5926#ifdef INCLUDE_SHMEDIA
396a6083
SC
5927 else if (seen_stt_datalabel)
5928 {
5929 if (eh->datalabel_got.refcount > 0)
5930 eh->datalabel_got.refcount -= 1;
5931 }
067653c5 5932#endif
396a6083
SC
5933 else if (h->got.refcount > 0)
5934 h->got.refcount -= 1;
5935 }
5936 else if (local_got_refcounts != NULL)
5937 {
067653c5 5938#ifdef INCLUDE_SHMEDIA
396a6083
SC
5939 if (rel->r_addend & 1)
5940 {
5941 if (local_got_refcounts[symtab_hdr->sh_info + r_symndx] > 0)
5942 local_got_refcounts[symtab_hdr->sh_info + r_symndx] -= 1;
5943 }
5944 else
067653c5 5945#endif
396a6083
SC
5946 if (local_got_refcounts[r_symndx] > 0)
5947 local_got_refcounts[r_symndx] -= 1;
5948 }
5949 break;
067653c5 5950
396a6083
SC
5951 default:
5952 break;
5953 }
5954 }
067653c5 5955
b34976b6 5956 return TRUE;
252b5132
RH
5957}
5958
067653c5
AM
5959/* Copy the extra info we tack onto an elf_link_hash_entry. */
5960
5961static void
fcfa13d2 5962sh_elf_copy_indirect_symbol (struct bfd_link_info *info,
09fd220b
KK
5963 struct elf_link_hash_entry *dir,
5964 struct elf_link_hash_entry *ind)
067653c5
AM
5965{
5966 struct elf_sh_link_hash_entry *edir, *eind;
5967
5968 edir = (struct elf_sh_link_hash_entry *) dir;
5969 eind = (struct elf_sh_link_hash_entry *) ind;
5970
5971 if (eind->dyn_relocs != NULL)
5972 {
5973 if (edir->dyn_relocs != NULL)
5974 {
5975 struct elf_sh_dyn_relocs **pp;
5976 struct elf_sh_dyn_relocs *p;
5977
fcfa13d2 5978 /* Add reloc counts against the indirect sym to the direct sym
067653c5
AM
5979 list. Merge any entries against the same section. */
5980 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
5981 {
5982 struct elf_sh_dyn_relocs *q;
5983
5984 for (q = edir->dyn_relocs; q != NULL; q = q->next)
5985 if (q->sec == p->sec)
5986 {
5987 q->pc_count += p->pc_count;
5988 q->count += p->count;
5989 *pp = p->next;
5990 break;
5991 }
5992 if (q == NULL)
5993 pp = &p->next;
5994 }
5995 *pp = edir->dyn_relocs;
5996 }
5997
5998 edir->dyn_relocs = eind->dyn_relocs;
5999 eind->dyn_relocs = NULL;
6000 }
4989d792
SC
6001 edir->gotplt_refcount = eind->gotplt_refcount;
6002 eind->gotplt_refcount = 0;
396a6083 6003#ifdef INCLUDE_SHMEDIA
fcfa13d2
AM
6004 edir->datalabel_got.refcount += eind->datalabel_got.refcount;
6005 eind->datalabel_got.refcount = 0;
396a6083 6006#endif
8e45593f
NC
6007 edir->funcdesc.refcount += eind->funcdesc.refcount;
6008 eind->funcdesc.refcount = 0;
6009 edir->abs_funcdesc_refcount += eind->abs_funcdesc_refcount;
6010 eind->abs_funcdesc_refcount = 0;
067653c5 6011
3376eaf5
KK
6012 if (ind->root.type == bfd_link_hash_indirect
6013 && dir->got.refcount <= 0)
6014 {
8e45593f
NC
6015 edir->got_type = eind->got_type;
6016 eind->got_type = GOT_UNKNOWN;
3376eaf5
KK
6017 }
6018
04e534c3 6019 if (ind->root.type != bfd_link_hash_indirect
f5385ebf
AM
6020 && dir->dynamic_adjusted)
6021 {
6022 /* If called to transfer flags for a weakdef during processing
6023 of elf_adjust_dynamic_symbol, don't copy non_got_ref.
6024 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
6025 dir->ref_dynamic |= ind->ref_dynamic;
6026 dir->ref_regular |= ind->ref_regular;
6027 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
6028 dir->needs_plt |= ind->needs_plt;
6029 }
04e534c3 6030 else
fcfa13d2 6031 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
067653c5
AM
6032}
6033
3376eaf5 6034static int
09fd220b
KK
6035sh_elf_optimized_tls_reloc (struct bfd_link_info *info, int r_type,
6036 int is_local)
3376eaf5
KK
6037{
6038 if (info->shared)
6039 return r_type;
6040
6041 switch (r_type)
6042 {
6043 case R_SH_TLS_GD_32:
6044 case R_SH_TLS_IE_32:
6045 if (is_local)
6046 return R_SH_TLS_LE_32;
6047 return R_SH_TLS_IE_32;
6048 case R_SH_TLS_LD_32:
6049 return R_SH_TLS_LE_32;
6050 }
6051
6052 return r_type;
6053}
6054
252b5132
RH
6055/* Look through the relocs for a section during the first phase.
6056 Since we don't do .gots or .plts, we just need to consider the
6057 virtual table relocs for gc. */
435b1e90 6058
b34976b6 6059static bfd_boolean
09fd220b
KK
6060sh_elf_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
6061 const Elf_Internal_Rela *relocs)
252b5132
RH
6062{
6063 Elf_Internal_Shdr *symtab_hdr;
5582a088 6064 struct elf_link_hash_entry **sym_hashes;
067653c5 6065 struct elf_sh_link_hash_table *htab;
252b5132
RH
6066 const Elf_Internal_Rela *rel;
6067 const Elf_Internal_Rela *rel_end;
37c644f2 6068 asection *sreloc;
3376eaf5 6069 unsigned int r_type;
85e02784 6070 enum got_type got_type, old_got_type;
435b1e90 6071
37c644f2
AO
6072 sreloc = NULL;
6073
1049f94e 6074 if (info->relocatable)
b34976b6 6075 return TRUE;
435b1e90 6076
0ffa91dd
NC
6077 BFD_ASSERT (is_sh_elf (abfd));
6078
6079 symtab_hdr = &elf_symtab_hdr (abfd);
252b5132 6080 sym_hashes = elf_sym_hashes (abfd);
435b1e90 6081
067653c5 6082 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
6083 if (htab == NULL)
6084 return FALSE;
6085
252b5132
RH
6086 rel_end = relocs + sec->reloc_count;
6087 for (rel = relocs; rel < rel_end; rel++)
6088 {
6089 struct elf_link_hash_entry *h;
6090 unsigned long r_symndx;
396a6083
SC
6091#ifdef INCLUDE_SHMEDIA
6092 int seen_stt_datalabel = 0;
6093#endif
435b1e90 6094
252b5132 6095 r_symndx = ELF32_R_SYM (rel->r_info);
3376eaf5
KK
6096 r_type = ELF32_R_TYPE (rel->r_info);
6097
252b5132 6098 if (r_symndx < symtab_hdr->sh_info)
435b1e90 6099 h = NULL;
252b5132 6100 else
396a6083
SC
6101 {
6102 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
396a6083
SC
6103 while (h->root.type == bfd_link_hash_indirect
6104 || h->root.type == bfd_link_hash_warning)
6105 {
973a3492 6106#ifdef INCLUDE_SHMEDIA
396a6083 6107 seen_stt_datalabel |= h->type == STT_DATALABEL;
973a3492 6108#endif
396a6083
SC
6109 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6110 }
396a6083 6111 }
435b1e90 6112
3376eaf5
KK
6113 r_type = sh_elf_optimized_tls_reloc (info, r_type, h == NULL);
6114 if (! info->shared
6115 && r_type == R_SH_TLS_IE_32
6116 && h != NULL
6117 && h->root.type != bfd_link_hash_undefined
6118 && h->root.type != bfd_link_hash_undefweak
6119 && (h->dynindx == -1
f5385ebf 6120 || h->def_regular))
3376eaf5
KK
6121 r_type = R_SH_TLS_LE_32;
6122
8e45593f
NC
6123 if (htab->fdpic_p)
6124 switch (r_type)
6125 {
6126 case R_SH_GOTOFFFUNCDESC:
6127 case R_SH_GOTOFFFUNCDESC20:
6128 case R_SH_FUNCDESC:
6129 case R_SH_GOTFUNCDESC:
6130 case R_SH_GOTFUNCDESC20:
6131 if (h != NULL)
6132 {
6133 if (h->dynindx == -1)
6134 switch (ELF_ST_VISIBILITY (h->other))
6135 {
6136 case STV_INTERNAL:
6137 case STV_HIDDEN:
6138 break;
6139 default:
6140 bfd_elf_link_record_dynamic_symbol (info, h);
6141 break;
6142 }
6143 }
6144 break;
6145 }
6146
37c644f2 6147 /* Some relocs require a global offset table. */
067653c5 6148 if (htab->sgot == NULL)
37c644f2 6149 {
3376eaf5 6150 switch (r_type)
37c644f2 6151 {
8e45593f
NC
6152 case R_SH_DIR32:
6153 /* This may require an rofixup. */
6154 if (!htab->fdpic_p)
6155 break;
fbca6ad9 6156 case R_SH_GOTPLT32:
37c644f2 6157 case R_SH_GOT32:
8e45593f 6158 case R_SH_GOT20:
37c644f2 6159 case R_SH_GOTOFF:
8e45593f
NC
6160 case R_SH_GOTOFF20:
6161 case R_SH_FUNCDESC:
6162 case R_SH_GOTFUNCDESC:
6163 case R_SH_GOTFUNCDESC20:
6164 case R_SH_GOTOFFFUNCDESC:
6165 case R_SH_GOTOFFFUNCDESC20:
37c644f2 6166 case R_SH_GOTPC:
fbca6ad9
AO
6167#ifdef INCLUDE_SHMEDIA
6168 case R_SH_GOTPLT_LOW16:
6169 case R_SH_GOTPLT_MEDLOW16:
6170 case R_SH_GOTPLT_MEDHI16:
6171 case R_SH_GOTPLT_HI16:
6172 case R_SH_GOTPLT10BY4:
6173 case R_SH_GOTPLT10BY8:
6174 case R_SH_GOT_LOW16:
6175 case R_SH_GOT_MEDLOW16:
6176 case R_SH_GOT_MEDHI16:
6177 case R_SH_GOT_HI16:
6178 case R_SH_GOT10BY4:
6179 case R_SH_GOT10BY8:
6180 case R_SH_GOTOFF_LOW16:
6181 case R_SH_GOTOFF_MEDLOW16:
6182 case R_SH_GOTOFF_MEDHI16:
6183 case R_SH_GOTOFF_HI16:
6184 case R_SH_GOTPC_LOW16:
6185 case R_SH_GOTPC_MEDLOW16:
6186 case R_SH_GOTPC_MEDHI16:
6187 case R_SH_GOTPC_HI16:
6188#endif
3376eaf5
KK
6189 case R_SH_TLS_GD_32:
6190 case R_SH_TLS_LD_32:
6191 case R_SH_TLS_IE_32:
8e45593f
NC
6192 if (htab->root.dynobj == NULL)
6193 htab->root.dynobj = abfd;
6194 if (!create_got_section (htab->root.dynobj, info))
6195 return FALSE;
37c644f2
AO
6196 break;
6197
6198 default:
6199 break;
6200 }
6201 }
6202
3376eaf5 6203 switch (r_type)
067653c5
AM
6204 {
6205 /* This relocation describes the C++ object vtable hierarchy.
6206 Reconstruct it for later use during GC. */
435b1e90 6207 case R_SH_GNU_VTINHERIT:
c152c796 6208 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 6209 return FALSE;
435b1e90
KH
6210 break;
6211
067653c5
AM
6212 /* This relocation describes which C++ vtable entries are actually
6213 used. Record for later use during GC. */
435b1e90 6214 case R_SH_GNU_VTENTRY:
d17e0c6e
JB
6215 BFD_ASSERT (h != NULL);
6216 if (h != NULL
6217 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 6218 return FALSE;
435b1e90 6219 break;
37c644f2 6220
3376eaf5
KK
6221 case R_SH_TLS_IE_32:
6222 if (info->shared)
6223 info->flags |= DF_STATIC_TLS;
6224
6225 /* FALLTHROUGH */
267fb3c1 6226 force_got:
3376eaf5 6227 case R_SH_TLS_GD_32:
37c644f2 6228 case R_SH_GOT32:
8e45593f 6229 case R_SH_GOT20:
fbca6ad9
AO
6230#ifdef INCLUDE_SHMEDIA
6231 case R_SH_GOT_LOW16:
6232 case R_SH_GOT_MEDLOW16:
6233 case R_SH_GOT_MEDHI16:
6234 case R_SH_GOT_HI16:
6235 case R_SH_GOT10BY4:
6236 case R_SH_GOT10BY8:
6237#endif
8e45593f
NC
6238 case R_SH_GOTFUNCDESC:
6239 case R_SH_GOTFUNCDESC20:
3376eaf5
KK
6240 switch (r_type)
6241 {
6242 default:
8e45593f 6243 got_type = GOT_NORMAL;
3376eaf5
KK
6244 break;
6245 case R_SH_TLS_GD_32:
8e45593f 6246 got_type = GOT_TLS_GD;
3376eaf5
KK
6247 break;
6248 case R_SH_TLS_IE_32:
8e45593f
NC
6249 got_type = GOT_TLS_IE;
6250 break;
6251 case R_SH_GOTFUNCDESC:
6252 case R_SH_GOTFUNCDESC20:
6253 got_type = GOT_FUNCDESC;
3376eaf5
KK
6254 break;
6255 }
6256
37c644f2 6257 if (h != NULL)
3376eaf5 6258 {
396a6083
SC
6259#ifdef INCLUDE_SHMEDIA
6260 if (seen_stt_datalabel)
6261 {
b34976b6
AM
6262 struct elf_sh_link_hash_entry *eh
6263 = (struct elf_sh_link_hash_entry *) h;
396a6083
SC
6264
6265 eh->datalabel_got.refcount += 1;
6266 }
6267 else
6268#endif
6269 h->got.refcount += 1;
8e45593f 6270 old_got_type = sh_elf_hash_entry (h)->got_type;
3376eaf5 6271 }
37c644f2
AO
6272 else
6273 {
067653c5
AM
6274 bfd_signed_vma *local_got_refcounts;
6275
435b1e90 6276 /* This is a global offset table entry for a local
067653c5
AM
6277 symbol. */
6278 local_got_refcounts = elf_local_got_refcounts (abfd);
6279 if (local_got_refcounts == NULL)
37c644f2 6280 {
dc810e39 6281 bfd_size_type size;
37c644f2 6282
dc810e39 6283 size = symtab_hdr->sh_info;
067653c5 6284 size *= sizeof (bfd_signed_vma);
fbca6ad9
AO
6285#ifdef INCLUDE_SHMEDIA
6286 /* Reserve space for both the datalabel and
6287 codelabel local GOT offsets. */
6288 size *= 2;
6289#endif
3376eaf5 6290 size += symtab_hdr->sh_info;
067653c5
AM
6291 local_got_refcounts = ((bfd_signed_vma *)
6292 bfd_zalloc (abfd, size));
6293 if (local_got_refcounts == NULL)
b34976b6 6294 return FALSE;
067653c5 6295 elf_local_got_refcounts (abfd) = local_got_refcounts;
3376eaf5
KK
6296#ifdef INCLUDE_SHMEDIA
6297 /* Take care of both the datalabel and codelabel local
6298 GOT offsets. */
8e45593f 6299 sh_elf_local_got_type (abfd)
3376eaf5
KK
6300 = (char *) (local_got_refcounts + 2 * symtab_hdr->sh_info);
6301#else
8e45593f 6302 sh_elf_local_got_type (abfd)
3376eaf5
KK
6303 = (char *) (local_got_refcounts + symtab_hdr->sh_info);
6304#endif
37c644f2 6305 }
396a6083
SC
6306#ifdef INCLUDE_SHMEDIA
6307 if (rel->r_addend & 1)
6308 local_got_refcounts[symtab_hdr->sh_info + r_symndx] += 1;
6309 else
6310#endif
6311 local_got_refcounts[r_symndx] += 1;
8e45593f 6312 old_got_type = sh_elf_local_got_type (abfd) [r_symndx];
3376eaf5
KK
6313 }
6314
6315 /* If a TLS symbol is accessed using IE at least once,
6316 there is no point to use dynamic model for it. */
8e45593f
NC
6317 if (old_got_type != got_type && old_got_type != GOT_UNKNOWN
6318 && (old_got_type != GOT_TLS_GD || got_type != GOT_TLS_IE))
3376eaf5 6319 {
8e45593f
NC
6320 if (old_got_type == GOT_TLS_IE && got_type == GOT_TLS_GD)
6321 got_type = GOT_TLS_IE;
3376eaf5
KK
6322 else
6323 {
8e45593f
NC
6324 if ((old_got_type == GOT_FUNCDESC || got_type == GOT_FUNCDESC)
6325 && (old_got_type == GOT_NORMAL || got_type == GOT_NORMAL))
6326 (*_bfd_error_handler)
6327 (_("%B: `%s' accessed both as normal and FDPIC symbol"),
6328 abfd, h->root.root.string);
6329 else if (old_got_type == GOT_FUNCDESC
6330 || got_type == GOT_FUNCDESC)
6331 (*_bfd_error_handler)
6332 (_("%B: `%s' accessed both as FDPIC and thread local symbol"),
6333 abfd, h->root.root.string);
6334 else
6335 (*_bfd_error_handler)
d003868e
AM
6336 (_("%B: `%s' accessed both as normal and thread local symbol"),
6337 abfd, h->root.root.string);
b34976b6 6338 return FALSE;
3376eaf5
KK
6339 }
6340 }
6341
8e45593f 6342 if (old_got_type != got_type)
3376eaf5
KK
6343 {
6344 if (h != NULL)
8e45593f 6345 sh_elf_hash_entry (h)->got_type = got_type;
3376eaf5 6346 else
8e45593f 6347 sh_elf_local_got_type (abfd) [r_symndx] = got_type;
37c644f2 6348 }
3376eaf5
KK
6349
6350 break;
6351
6352 case R_SH_TLS_LD_32:
6353 sh_elf_hash_table(info)->tls_ldm_got.refcount += 1;
37c644f2
AO
6354 break;
6355
8e45593f
NC
6356 case R_SH_FUNCDESC:
6357 case R_SH_GOTOFFFUNCDESC:
6358 case R_SH_GOTOFFFUNCDESC20:
6359 if (rel->r_addend)
6360 {
6361 (*_bfd_error_handler)
6362 (_("%B: Function descriptor relocation with non-zero addend"),
6363 abfd);
6364 return FALSE;
6365 }
6366
6367 if (h == NULL)
6368 {
6369 union gotref *local_funcdesc;
6370
6371 /* We need a function descriptor for a local symbol. */
6372 local_funcdesc = sh_elf_local_funcdesc (abfd);
6373 if (local_funcdesc == NULL)
6374 {
6375 bfd_size_type size;
6376
6377 size = symtab_hdr->sh_info * sizeof (union gotref);
6378#ifdef INCLUDE_SHMEDIA
6379 /* Count datalabel local GOT. */
6380 size *= 2;
6381#endif
6382 local_funcdesc = (union gotref *) bfd_zalloc (abfd, size);
6383 if (local_funcdesc == NULL)
6384 return FALSE;
6385 sh_elf_local_funcdesc (abfd) = local_funcdesc;
6386 }
6387 local_funcdesc[r_symndx].refcount += 1;
6388
6389 if (r_type == R_SH_FUNCDESC)
6390 {
6391 if (!info->shared)
6392 htab->srofixup->size += 4;
6393 else
6394 htab->srelgot->size += sizeof (Elf32_External_Rela);
6395 }
6396 }
6397 else
6398 {
6399 sh_elf_hash_entry (h)->funcdesc.refcount++;
6400 if (r_type == R_SH_FUNCDESC)
6401 sh_elf_hash_entry (h)->abs_funcdesc_refcount++;
6402
6403 /* If there is a function descriptor reference, then
6404 there should not be any non-FDPIC references. */
6405 old_got_type = sh_elf_hash_entry (h)->got_type;
6406 if (old_got_type != GOT_FUNCDESC && old_got_type != GOT_UNKNOWN)
6407 {
6408 if (old_got_type == GOT_NORMAL)
6409 (*_bfd_error_handler)
6410 (_("%B: `%s' accessed both as normal and FDPIC symbol"),
6411 abfd, h->root.root.string);
6412 else
6413 (*_bfd_error_handler)
6414 (_("%B: `%s' accessed both as FDPIC and thread local symbol"),
6415 abfd, h->root.root.string);
6416 }
6417 }
6418 break;
6419
fbca6ad9
AO
6420 case R_SH_GOTPLT32:
6421#ifdef INCLUDE_SHMEDIA
6422 case R_SH_GOTPLT_LOW16:
6423 case R_SH_GOTPLT_MEDLOW16:
6424 case R_SH_GOTPLT_MEDHI16:
6425 case R_SH_GOTPLT_HI16:
6426 case R_SH_GOTPLT10BY4:
6427 case R_SH_GOTPLT10BY8:
6428#endif
6429 /* If this is a local symbol, we resolve it directly without
6430 creating a procedure linkage table entry. */
6431
6432 if (h == NULL
f5385ebf 6433 || h->forced_local
fbca6ad9
AO
6434 || ! info->shared
6435 || info->symbolic
067653c5 6436 || h->dynindx == -1)
fbca6ad9
AO
6437 goto force_got;
6438
f5385ebf 6439 h->needs_plt = 1;
067653c5 6440 h->plt.refcount += 1;
4989d792 6441 ((struct elf_sh_link_hash_entry *) h)->gotplt_refcount += 1;
fbca6ad9
AO
6442
6443 break;
6444
37c644f2 6445 case R_SH_PLT32:
fbca6ad9
AO
6446#ifdef INCLUDE_SHMEDIA
6447 case R_SH_PLT_LOW16:
6448 case R_SH_PLT_MEDLOW16:
6449 case R_SH_PLT_MEDHI16:
6450 case R_SH_PLT_HI16:
6451#endif
37c644f2
AO
6452 /* This symbol requires a procedure linkage table entry. We
6453 actually build the entry in adjust_dynamic_symbol,
6454 because this might be a case of linking PIC code which is
6455 never referenced by a dynamic object, in which case we
6456 don't need to generate a procedure linkage table entry
6457 after all. */
6458
6459 /* If this is a local symbol, we resolve it directly without
6460 creating a procedure linkage table entry. */
6461 if (h == NULL)
6462 continue;
6463
f5385ebf 6464 if (h->forced_local)
37c644f2
AO
6465 break;
6466
f5385ebf 6467 h->needs_plt = 1;
067653c5 6468 h->plt.refcount += 1;
37c644f2
AO
6469 break;
6470
6471 case R_SH_DIR32:
6472 case R_SH_REL32:
46e993b9
KK
6473#ifdef INCLUDE_SHMEDIA
6474 case R_SH_IMM_LOW16_PCREL:
6475 case R_SH_IMM_MEDLOW16_PCREL:
6476 case R_SH_IMM_MEDHI16_PCREL:
6477 case R_SH_IMM_HI16_PCREL:
6478#endif
067653c5
AM
6479 if (h != NULL && ! info->shared)
6480 {
f5385ebf 6481 h->non_got_ref = 1;
067653c5
AM
6482 h->plt.refcount += 1;
6483 }
37c644f2
AO
6484
6485 /* If we are creating a shared library, and this is a reloc
6486 against a global symbol, or a non PC relative reloc
6487 against a local symbol, then we need to copy the reloc
6488 into the shared library. However, if we are linking with
6489 -Bsymbolic, we do not need to copy a reloc against a
6490 global symbol which is defined in an object we are
6491 including in the link (i.e., DEF_REGULAR is set). At
6492 this point we have not seen all the input files, so it is
6493 possible that DEF_REGULAR is not set now but will be set
6494 later (it is never cleared). We account for that
6495 possibility below by storing information in the
067653c5
AM
6496 dyn_relocs field of the hash table entry. A similar
6497 situation occurs when creating shared libraries and symbol
6498 visibility changes render the symbol local.
6499
6500 If on the other hand, we are creating an executable, we
6501 may need to keep relocations for symbols satisfied by a
6502 dynamic library if we manage to avoid copy relocs for the
6503 symbol. */
6504 if ((info->shared
6505 && (sec->flags & SEC_ALLOC) != 0
3376eaf5 6506 && (r_type != R_SH_REL32
067653c5
AM
6507 || (h != NULL
6508 && (! info->symbolic
6509 || h->root.type == bfd_link_hash_defweak
f5385ebf 6510 || !h->def_regular))))
067653c5
AM
6511 || (! info->shared
6512 && (sec->flags & SEC_ALLOC) != 0
6513 && h != NULL
6514 && (h->root.type == bfd_link_hash_defweak
f5385ebf 6515 || !h->def_regular)))
37c644f2 6516 {
067653c5
AM
6517 struct elf_sh_dyn_relocs *p;
6518 struct elf_sh_dyn_relocs **head;
6519
2293c499
AM
6520 if (htab->root.dynobj == NULL)
6521 htab->root.dynobj = abfd;
067653c5 6522
37c644f2
AO
6523 /* When creating a shared object, we must copy these
6524 reloc types into the output file. We create a reloc
6525 section in dynobj and make room for this reloc. */
6526 if (sreloc == NULL)
6527 {
83bac4b0
NC
6528 sreloc = _bfd_elf_make_dynamic_reloc_section
6529 (sec, htab->root.dynobj, 2, abfd, /*rela?*/ TRUE);
37c644f2 6530
37c644f2 6531 if (sreloc == NULL)
83bac4b0 6532 return FALSE;
37c644f2
AO
6533 }
6534
067653c5
AM
6535 /* If this is a global symbol, we count the number of
6536 relocations we need for this symbol. */
6537 if (h != NULL)
6538 head = &((struct elf_sh_link_hash_entry *) h)->dyn_relocs;
6539 else
37c644f2 6540 {
87d72d41 6541 /* Track dynamic relocs needed for local syms too. */
067653c5 6542 asection *s;
6edfbbad 6543 void *vpp;
87d72d41 6544 Elf_Internal_Sym *isym;
37c644f2 6545
87d72d41
AM
6546 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
6547 abfd, r_symndx);
6548 if (isym == NULL)
b34976b6 6549 return FALSE;
37c644f2 6550
87d72d41
AM
6551 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
6552 if (s == NULL)
6553 s = sec;
6554
6edfbbad
DJ
6555 vpp = &elf_section_data (s)->local_dynrel;
6556 head = (struct elf_sh_dyn_relocs **) vpp;
067653c5 6557 }
37c644f2 6558
067653c5
AM
6559 p = *head;
6560 if (p == NULL || p->sec != sec)
6561 {
6562 bfd_size_type amt = sizeof (*p);
2293c499 6563 p = bfd_alloc (htab->root.dynobj, amt);
37c644f2 6564 if (p == NULL)
b34976b6 6565 return FALSE;
067653c5
AM
6566 p->next = *head;
6567 *head = p;
6568 p->sec = sec;
6569 p->count = 0;
6570 p->pc_count = 0;
37c644f2 6571 }
067653c5
AM
6572
6573 p->count += 1;
46e993b9
KK
6574 if (r_type == R_SH_REL32
6575#ifdef INCLUDE_SHMEDIA
6576 || r_type == R_SH_IMM_LOW16_PCREL
6577 || r_type == R_SH_IMM_MEDLOW16_PCREL
6578 || r_type == R_SH_IMM_MEDHI16_PCREL
6579 || r_type == R_SH_IMM_HI16_PCREL
6580#endif
6581 )
067653c5 6582 p->pc_count += 1;
37c644f2
AO
6583 }
6584
8e45593f
NC
6585 /* Allocate the fixup regardless of whether we need a relocation.
6586 If we end up generating the relocation, we'll unallocate the
6587 fixup. */
6588 if (htab->fdpic_p && !info->shared
6589 && r_type == R_SH_DIR32
6590 && (sec->flags & SEC_ALLOC) != 0)
6591 htab->srofixup->size += 4;
37c644f2 6592 break;
3376eaf5
KK
6593
6594 case R_SH_TLS_LE_32:
b68593b9 6595 if (info->shared && !info->pie)
3376eaf5 6596 {
d003868e
AM
6597 (*_bfd_error_handler)
6598 (_("%B: TLS local exec code cannot be linked into shared objects"),
6599 abfd);
b34976b6 6600 return FALSE;
3376eaf5
KK
6601 }
6602
267fb3c1 6603 break;
3376eaf5 6604
3376eaf5 6605 case R_SH_TLS_LDO_32:
267fb3c1 6606 /* Nothing to do. */
3376eaf5
KK
6607 break;
6608
6609 default:
6610 break;
435b1e90 6611 }
252b5132 6612 }
435b1e90 6613
b34976b6 6614 return TRUE;
252b5132
RH
6615}
6616
fbca6ad9 6617#ifndef sh_elf_set_mach_from_flags
f6f9408f
JR
6618static unsigned int sh_ef_bfd_table[] = { EF_SH_BFD_TABLE };
6619
b34976b6 6620static bfd_boolean
09fd220b 6621sh_elf_set_mach_from_flags (bfd *abfd)
d4845d57 6622{
f6f9408f
JR
6623 flagword flags = elf_elfheader (abfd)->e_flags & EF_SH_MACH_MASK;
6624
6625 if (flags >= sizeof(sh_ef_bfd_table))
6626 return FALSE;
6627
6628 if (sh_ef_bfd_table[flags] == 0)
6629 return FALSE;
6630
6631 bfd_default_set_arch_mach (abfd, bfd_arch_sh, sh_ef_bfd_table[flags]);
d4845d57 6632
b34976b6 6633 return TRUE;
d4845d57 6634}
f6f9408f
JR
6635
6636
6637/* Reverse table lookup for sh_ef_bfd_table[].
6638 Given a bfd MACH value from archures.c
6639 return the equivalent ELF flags from the table.
6640 Return -1 if no match is found. */
6641
6642int
6643sh_elf_get_flags_from_mach (unsigned long mach)
6644{
4195f552 6645 int i = ARRAY_SIZE (sh_ef_bfd_table) - 1;
f6f9408f
JR
6646
6647 for (; i>0; i--)
6648 if (sh_ef_bfd_table[i] == mach)
6649 return i;
6650
6651 /* shouldn't get here */
6652 BFD_FAIL();
6653
6654 return -1;
6655}
fbca6ad9 6656#endif /* not sh_elf_set_mach_from_flags */
d4845d57 6657
fbca6ad9 6658#ifndef sh_elf_set_private_flags
435b1e90
KH
6659/* Function to keep SH specific file flags. */
6660
b34976b6 6661static bfd_boolean
09fd220b 6662sh_elf_set_private_flags (bfd *abfd, flagword flags)
d4845d57
JR
6663{
6664 BFD_ASSERT (! elf_flags_init (abfd)
6665 || elf_elfheader (abfd)->e_flags == flags);
6666
6667 elf_elfheader (abfd)->e_flags = flags;
b34976b6 6668 elf_flags_init (abfd) = TRUE;
d4845d57
JR
6669 return sh_elf_set_mach_from_flags (abfd);
6670}
fbca6ad9 6671#endif /* not sh_elf_set_private_flags */
d4845d57 6672
fbca6ad9 6673#ifndef sh_elf_copy_private_data
d4845d57 6674/* Copy backend specific data from one object module to another */
435b1e90 6675
b34976b6 6676static bfd_boolean
09fd220b 6677sh_elf_copy_private_data (bfd * ibfd, bfd * obfd)
d4845d57 6678{
104d59d1
JM
6679 /* Copy object attributes. */
6680 _bfd_elf_copy_obj_attributes (ibfd, obfd);
6681
0ffa91dd
NC
6682 if (! is_sh_elf (ibfd) || ! is_sh_elf (obfd))
6683 return TRUE;
6684
8e45593f
NC
6685 /* Copy the stack size. */
6686 if (elf_tdata (ibfd)->phdr && elf_tdata (obfd)->phdr
6687 && fdpic_object_p (ibfd) && fdpic_object_p (obfd))
6688 {
6689 unsigned i;
6690
6691 for (i = 0; i < elf_elfheader (ibfd)->e_phnum; i++)
6692 if (elf_tdata (ibfd)->phdr[i].p_type == PT_GNU_STACK)
6693 {
6694 Elf_Internal_Phdr *iphdr = &elf_tdata (ibfd)->phdr[i];
6695
6696 for (i = 0; i < elf_elfheader (obfd)->e_phnum; i++)
6697 if (elf_tdata (obfd)->phdr[i].p_type == PT_GNU_STACK)
6698 {
6699 memcpy (&elf_tdata (obfd)->phdr[i], iphdr, sizeof (*iphdr));
6700
6701 /* Rewrite the phdrs, since we're only called after they
6702 were first written. */
6703 if (bfd_seek (obfd,
6704 (bfd_signed_vma) get_elf_backend_data (obfd)
6705 ->s->sizeof_ehdr, SEEK_SET) != 0
6706 || get_elf_backend_data (obfd)->s
6707 ->write_out_phdrs (obfd, elf_tdata (obfd)->phdr,
6708 elf_elfheader (obfd)->e_phnum) != 0)
6709 return FALSE;
6710 break;
6711 }
6712
6713 break;
6714 }
6715 }
6716
d4845d57
JR
6717 return sh_elf_set_private_flags (obfd, elf_elfheader (ibfd)->e_flags);
6718}
fbca6ad9 6719#endif /* not sh_elf_copy_private_data */
d4845d57 6720
fbca6ad9 6721#ifndef sh_elf_merge_private_data
d4845d57 6722
f6f9408f
JR
6723/* This function returns the ELF architecture number that
6724 corresponds to the given arch_sh* flags. */
85fbca6a 6725
f6f9408f
JR
6726int
6727sh_find_elf_flags (unsigned int arch_set)
d4845d57 6728{
85fbca6a 6729 extern unsigned long sh_get_bfd_mach_from_arch_set (unsigned int);
f6f9408f 6730 unsigned long bfd_mach = sh_get_bfd_mach_from_arch_set (arch_set);
d4845d57 6731
f6f9408f
JR
6732 return sh_elf_get_flags_from_mach (bfd_mach);
6733}
f6f9408f
JR
6734
6735/* This routine initialises the elf flags when required and
6736 calls sh_merge_bfd_arch() to check dsp/fpu compatibility. */
d4845d57 6737
f6f9408f
JR
6738static bfd_boolean
6739sh_elf_merge_private_data (bfd *ibfd, bfd *obfd)
6740{
85fbca6a
NC
6741 extern bfd_boolean sh_merge_bfd_arch (bfd *, bfd *);
6742
0ffa91dd 6743 if (! is_sh_elf (ibfd) || ! is_sh_elf (obfd))
b34976b6 6744 return TRUE;
d4845d57
JR
6745
6746 if (! elf_flags_init (obfd))
6747 {
a39b79b9 6748 /* This happens when ld starts out with a 'blank' output file. */
b34976b6 6749 elf_flags_init (obfd) = TRUE;
8e45593f 6750 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
f6f9408f 6751 sh_elf_set_mach_from_flags (obfd);
8e45593f
NC
6752 if (elf_elfheader (obfd)->e_flags & EF_SH_FDPIC)
6753 elf_elfheader (obfd)->e_flags |= EF_SH_PIC;
d4845d57 6754 }
d4845d57 6755
85fbca6a 6756 if (! sh_merge_bfd_arch (ibfd, obfd))
1d70c7fb 6757 {
d003868e 6758 _bfd_error_handler ("%B: uses instructions which are incompatible "
1d70c7fb 6759 "with instructions used in previous modules",
d003868e 6760 ibfd);
1d70c7fb
AO
6761 bfd_set_error (bfd_error_bad_value);
6762 return FALSE;
6763 }
f6f9408f 6764
8e45593f
NC
6765 elf_elfheader (obfd)->e_flags &= ~EF_SH_MACH_MASK;
6766 elf_elfheader (obfd)->e_flags |=
f6f9408f 6767 sh_elf_get_flags_from_mach (bfd_get_mach (obfd));
8e45593f
NC
6768
6769 if (fdpic_object_p (ibfd) != fdpic_object_p (obfd))
6770 {
6771 _bfd_error_handler ("%B: attempt to mix FDPIC and non-FDPIC objects",
6772 ibfd);
6773 bfd_set_error (bfd_error_bad_value);
6774 return FALSE;
6775 }
6776
f6f9408f 6777 return TRUE;
d4845d57 6778}
fbca6ad9 6779#endif /* not sh_elf_merge_private_data */
d4845d57 6780
3376eaf5
KK
6781/* Override the generic function because we need to store sh_elf_obj_tdata
6782 as the specific tdata. We set also the machine architecture from flags
6783 here. */
6784
b34976b6 6785static bfd_boolean
09fd220b 6786sh_elf_object_p (bfd *abfd)
3376eaf5 6787{
8e45593f
NC
6788 if (! sh_elf_set_mach_from_flags (abfd))
6789 return FALSE;
6790
6791 return (((elf_elfheader (abfd)->e_flags & EF_SH_FDPIC) != 0)
6792 == fdpic_object_p (abfd));
3376eaf5
KK
6793}
6794
37c644f2
AO
6795/* Finish up dynamic symbol handling. We set the contents of various
6796 dynamic sections here. */
6797
b34976b6 6798static bfd_boolean
09fd220b
KK
6799sh_elf_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
6800 struct elf_link_hash_entry *h,
6801 Elf_Internal_Sym *sym)
37c644f2 6802{
067653c5 6803 struct elf_sh_link_hash_table *htab;
37c644f2 6804
067653c5 6805 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
6806 if (htab == NULL)
6807 return FALSE;
37c644f2
AO
6808
6809 if (h->plt.offset != (bfd_vma) -1)
6810 {
6811 asection *splt;
8e45593f
NC
6812 asection *sgotplt;
6813 asection *srelplt;
37c644f2
AO
6814
6815 bfd_vma plt_index;
6816 bfd_vma got_offset;
6817 Elf_Internal_Rela rel;
947216bf 6818 bfd_byte *loc;
8e45593f 6819 const struct elf_sh_plt_info *plt_info;
37c644f2
AO
6820
6821 /* This symbol has an entry in the procedure linkage table. Set
6822 it up. */
6823
6824 BFD_ASSERT (h->dynindx != -1);
6825
067653c5 6826 splt = htab->splt;
8e45593f
NC
6827 sgotplt = htab->sgotplt;
6828 srelplt = htab->srelplt;
6829 BFD_ASSERT (splt != NULL && sgotplt != NULL && srelplt != NULL);
37c644f2
AO
6830
6831 /* Get the index in the procedure linkage table which
6832 corresponds to this symbol. This is the index of this symbol
6833 in all the symbols for which we are making plt entries. The
6834 first entry in the procedure linkage table is reserved. */
55e6e397 6835 plt_index = get_plt_index (htab->plt_info, h->plt.offset);
37c644f2 6836
8e45593f
NC
6837 plt_info = htab->plt_info;
6838 if (plt_info->short_plt != NULL && plt_index <= MAX_SHORT_PLT)
6839 plt_info = plt_info->short_plt;
6840
37c644f2 6841 /* Get the offset into the .got table of the entry that
8e45593f
NC
6842 corresponds to this function. */
6843 if (htab->fdpic_p)
6844 /* The offset must be relative to the GOT symbol, twelve bytes
6845 before the end of .got.plt. Each descriptor is eight
6846 bytes. */
6847 got_offset = plt_index * 8 + 12 - sgotplt->size;
6848 else
6849 /* Each .got entry is 4 bytes. The first three are
6850 reserved. */
6851 got_offset = (plt_index + 3) * 4;
37c644f2 6852
fbca6ad9 6853#ifdef GOT_BIAS
c8614e8e
AM
6854 if (info->shared)
6855 got_offset -= GOT_BIAS;
fbca6ad9
AO
6856#endif
6857
37c644f2 6858 /* Fill in the entry in the procedure linkage table. */
55e6e397 6859 memcpy (splt->contents + h->plt.offset,
8e45593f
NC
6860 plt_info->symbol_entry,
6861 plt_info->symbol_entry_size);
55e6e397 6862
8e45593f
NC
6863 if (info->shared || htab->fdpic_p)
6864 {
6865 if (plt_info->symbol_fields.got20)
6866 {
6867 bfd_reloc_status_type r;
6868 r = install_movi20_field (output_bfd, got_offset,
6869 splt->owner, splt, splt->contents,
6870 h->plt.offset
6871 + plt_info->symbol_fields.got_entry);
6872 BFD_ASSERT (r == bfd_reloc_ok);
6873 }
6874 else
6875 install_plt_field (output_bfd, FALSE, got_offset,
6876 (splt->contents
6877 + h->plt.offset
6878 + plt_info->symbol_fields.got_entry));
6879 }
55e6e397 6880 else
37c644f2 6881 {
8e45593f
NC
6882 BFD_ASSERT (!plt_info->symbol_fields.got20);
6883
55e6e397 6884 install_plt_field (output_bfd, FALSE,
8e45593f
NC
6885 (sgotplt->output_section->vma
6886 + sgotplt->output_offset
fbca6ad9 6887 + got_offset),
55e6e397
RS
6888 (splt->contents
6889 + h->plt.offset
8e45593f 6890 + plt_info->symbol_fields.got_entry));
55e6e397 6891 if (htab->vxworks_p)
37c644f2 6892 {
55e6e397
RS
6893 unsigned int reachable_plts, plts_per_4k;
6894 int distance;
6895
6896 /* Divide the PLT into groups. The first group contains
6897 REACHABLE_PLTS entries and the other groups contain
6898 PLTS_PER_4K entries. Entries in the first group can
6899 branch directly to .plt; those in later groups branch
6900 to the last element of the previous group. */
6901 /* ??? It would be better to create multiple copies of
6902 the common resolver stub. */
6903 reachable_plts = ((4096
8e45593f
NC
6904 - plt_info->plt0_entry_size
6905 - (plt_info->symbol_fields.plt + 4))
6906 / plt_info->symbol_entry_size) + 1;
6907 plts_per_4k = (4096 / plt_info->symbol_entry_size);
55e6e397
RS
6908 if (plt_index < reachable_plts)
6909 distance = -(h->plt.offset
8e45593f 6910 + plt_info->symbol_fields.plt);
55e6e397
RS
6911 else
6912 distance = -(((plt_index - reachable_plts) % plts_per_4k + 1)
8e45593f 6913 * plt_info->symbol_entry_size);
55e6e397
RS
6914
6915 /* Install the 'bra' with this offset. */
6916 bfd_put_16 (output_bfd,
6917 0xa000 | (0x0fff & ((distance - 4) / 2)),
6918 (splt->contents
6919 + h->plt.offset
8e45593f 6920 + plt_info->symbol_fields.plt));
37c644f2 6921 }
55e6e397
RS
6922 else
6923 install_plt_field (output_bfd, TRUE,
6924 splt->output_section->vma + splt->output_offset,
6925 (splt->contents
6926 + h->plt.offset
8e45593f 6927 + plt_info->symbol_fields.plt));
37c644f2
AO
6928 }
6929
8e45593f 6930 /* Make got_offset relative to the start of .got.plt. */
fbca6ad9 6931#ifdef GOT_BIAS
c8614e8e
AM
6932 if (info->shared)
6933 got_offset += GOT_BIAS;
fbca6ad9 6934#endif
8e45593f
NC
6935 if (htab->fdpic_p)
6936 got_offset = plt_index * 8;
fbca6ad9 6937
8e45593f
NC
6938 if (plt_info->symbol_fields.reloc_offset != MINUS_ONE)
6939 install_plt_field (output_bfd, FALSE,
6940 plt_index * sizeof (Elf32_External_Rela),
6941 (splt->contents
6942 + h->plt.offset
6943 + plt_info->symbol_fields.reloc_offset));
37c644f2
AO
6944
6945 /* Fill in the entry in the global offset table. */
6946 bfd_put_32 (output_bfd,
6947 (splt->output_section->vma
6948 + splt->output_offset
6949 + h->plt.offset
8e45593f
NC
6950 + plt_info->symbol_resolve_offset),
6951 sgotplt->contents + got_offset);
6952 if (htab->fdpic_p)
6953 bfd_put_32 (output_bfd,
6954 sh_elf_osec_to_segment (output_bfd,
6955 htab->splt->output_section),
6956 sgotplt->contents + got_offset + 4);
37c644f2
AO
6957
6958 /* Fill in the entry in the .rela.plt section. */
8e45593f
NC
6959 rel.r_offset = (sgotplt->output_section->vma
6960 + sgotplt->output_offset
37c644f2 6961 + got_offset);
8e45593f
NC
6962 if (htab->fdpic_p)
6963 rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_FUNCDESC_VALUE);
6964 else
6965 rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_JMP_SLOT);
37c644f2 6966 rel.r_addend = 0;
fbca6ad9
AO
6967#ifdef GOT_BIAS
6968 rel.r_addend = GOT_BIAS;
6969#endif
8e45593f 6970 loc = srelplt->contents + plt_index * sizeof (Elf32_External_Rela);
947216bf 6971 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
37c644f2 6972
55e6e397
RS
6973 if (htab->vxworks_p && !info->shared)
6974 {
6975 /* Create the .rela.plt.unloaded relocations for this PLT entry.
6976 Begin by pointing LOC to the first such relocation. */
6977 loc = (htab->srelplt2->contents
6978 + (plt_index * 2 + 1) * sizeof (Elf32_External_Rela));
6979
6980 /* Create a .rela.plt.unloaded R_SH_DIR32 relocation
6981 for the PLT entry's pointer to the .got.plt entry. */
6982 rel.r_offset = (htab->splt->output_section->vma
6983 + htab->splt->output_offset
6984 + h->plt.offset
8e45593f 6985 + plt_info->symbol_fields.got_entry);
55e6e397
RS
6986 rel.r_info = ELF32_R_INFO (htab->root.hgot->indx, R_SH_DIR32);
6987 rel.r_addend = got_offset;
6988 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
6989 loc += sizeof (Elf32_External_Rela);
6990
6991 /* Create a .rela.plt.unloaded R_SH_DIR32 relocation for
6992 the .got.plt entry, which initially points to .plt. */
8e45593f
NC
6993 rel.r_offset = (sgotplt->output_section->vma
6994 + sgotplt->output_offset
55e6e397
RS
6995 + got_offset);
6996 rel.r_info = ELF32_R_INFO (htab->root.hplt->indx, R_SH_DIR32);
6997 rel.r_addend = 0;
6998 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
6999 }
7000
f5385ebf 7001 if (!h->def_regular)
37c644f2
AO
7002 {
7003 /* Mark the symbol as undefined, rather than as defined in
7004 the .plt section. Leave the value alone. */
7005 sym->st_shndx = SHN_UNDEF;
7006 }
7007 }
7008
3376eaf5 7009 if (h->got.offset != (bfd_vma) -1
8e45593f
NC
7010 && sh_elf_hash_entry (h)->got_type != GOT_TLS_GD
7011 && sh_elf_hash_entry (h)->got_type != GOT_TLS_IE
7012 && sh_elf_hash_entry (h)->got_type != GOT_FUNCDESC)
37c644f2
AO
7013 {
7014 asection *sgot;
8e45593f 7015 asection *srelgot;
37c644f2 7016 Elf_Internal_Rela rel;
947216bf 7017 bfd_byte *loc;
37c644f2
AO
7018
7019 /* This symbol has an entry in the global offset table. Set it
7020 up. */
7021
067653c5 7022 sgot = htab->sgot;
8e45593f
NC
7023 srelgot = htab->srelgot;
7024 BFD_ASSERT (sgot != NULL && srelgot != NULL);
37c644f2
AO
7025
7026 rel.r_offset = (sgot->output_section->vma
7027 + sgot->output_offset
dc810e39 7028 + (h->got.offset &~ (bfd_vma) 1));
37c644f2 7029
067653c5
AM
7030 /* If this is a static link, or it is a -Bsymbolic link and the
7031 symbol is defined locally or was forced to be local because
7032 of a version file, we just want to emit a RELATIVE reloc.
37c644f2
AO
7033 The entry in the global offset table will already have been
7034 initialized in the relocate_section function. */
7035 if (info->shared
3d85aebe 7036 && SYMBOL_REFERENCES_LOCAL (info, h))
37c644f2 7037 {
8e45593f
NC
7038 if (htab->fdpic_p)
7039 {
7040 asection *sec = h->root.u.def.section;
7041 int dynindx
7042 = elf_section_data (sec->output_section)->dynindx;
7043
7044 rel.r_info = ELF32_R_INFO (dynindx, R_SH_DIR32);
7045 rel.r_addend = (h->root.u.def.value
7046 + h->root.u.def.section->output_offset);
7047 }
7048 else
7049 {
7050 rel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
7051 rel.r_addend = (h->root.u.def.value
7052 + h->root.u.def.section->output_section->vma
7053 + h->root.u.def.section->output_offset);
7054 }
37c644f2
AO
7055 }
7056 else
7057 {
7058 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset);
7059 rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_GLOB_DAT);
7060 rel.r_addend = 0;
7061 }
7062
8e45593f
NC
7063 loc = srelgot->contents;
7064 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
947216bf 7065 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
37c644f2
AO
7066 }
7067
396a6083
SC
7068#ifdef INCLUDE_SHMEDIA
7069 {
7070 struct elf_sh_link_hash_entry *eh;
7071
7072 eh = (struct elf_sh_link_hash_entry *) h;
7073 if (eh->datalabel_got.offset != (bfd_vma) -1)
7074 {
7075 asection *sgot;
8e45593f 7076 asection *srelgot;
396a6083 7077 Elf_Internal_Rela rel;
947216bf 7078 bfd_byte *loc;
396a6083
SC
7079
7080 /* This symbol has a datalabel entry in the global offset table.
7081 Set it up. */
7082
7083 sgot = htab->sgot;
8e45593f
NC
7084 srelgot = htab->srelgot;
7085 BFD_ASSERT (sgot != NULL && srelgot != NULL);
396a6083
SC
7086
7087 rel.r_offset = (sgot->output_section->vma
7088 + sgot->output_offset
7089 + (eh->datalabel_got.offset &~ (bfd_vma) 1));
7090
7091 /* If this is a static link, or it is a -Bsymbolic link and the
7092 symbol is defined locally or was forced to be local because
7093 of a version file, we just want to emit a RELATIVE reloc.
7094 The entry in the global offset table will already have been
7095 initialized in the relocate_section function. */
7096 if (info->shared
3d85aebe 7097 && SYMBOL_REFERENCES_LOCAL (info, h))
396a6083 7098 {
8e45593f
NC
7099 if (htab->fdpic_p)
7100 {
7101 asection *sec = h->root.u.def.section;
7102 int dynindx
7103 = elf_section_data (sec->output_section)->dynindx;
7104
7105 rel.r_info = ELF32_R_INFO (dynindx, R_SH_DIR32);
7106 rel.r_addend = (h->root.u.def.value
7107 + h->root.u.def.section->output_offset);
7108 }
7109 else
7110 {
7111 rel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
7112 rel.r_addend = (h->root.u.def.value
7113 + h->root.u.def.section->output_section->vma
7114 + h->root.u.def.section->output_offset);
7115 }
396a6083
SC
7116 }
7117 else
7118 {
7119 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents
7120 + eh->datalabel_got.offset);
7121 rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_GLOB_DAT);
7122 rel.r_addend = 0;
7123 }
7124
8e45593f
NC
7125 loc = srelgot->contents;
7126 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
947216bf 7127 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
396a6083
SC
7128 }
7129 }
7130#endif
7131
f5385ebf 7132 if (h->needs_copy)
37c644f2
AO
7133 {
7134 asection *s;
7135 Elf_Internal_Rela rel;
947216bf 7136 bfd_byte *loc;
37c644f2
AO
7137
7138 /* This symbol needs a copy reloc. Set it up. */
7139
7140 BFD_ASSERT (h->dynindx != -1
7141 && (h->root.type == bfd_link_hash_defined
7142 || h->root.type == bfd_link_hash_defweak));
7143
7144 s = bfd_get_section_by_name (h->root.u.def.section->owner,
7145 ".rela.bss");
7146 BFD_ASSERT (s != NULL);
7147
7148 rel.r_offset = (h->root.u.def.value
7149 + h->root.u.def.section->output_section->vma
7150 + h->root.u.def.section->output_offset);
7151 rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_COPY);
7152 rel.r_addend = 0;
947216bf
AM
7153 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
7154 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
37c644f2
AO
7155 }
7156
55e6e397
RS
7157 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. On VxWorks,
7158 _GLOBAL_OFFSET_TABLE_ is not absolute: it is relative to the
7159 ".got" section. */
37c644f2 7160 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
55e6e397 7161 || (!htab->vxworks_p && h == htab->root.hgot))
37c644f2
AO
7162 sym->st_shndx = SHN_ABS;
7163
b34976b6 7164 return TRUE;
37c644f2
AO
7165}
7166
7167/* Finish up the dynamic sections. */
7168
b34976b6 7169static bfd_boolean
09fd220b 7170sh_elf_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
37c644f2 7171{
067653c5 7172 struct elf_sh_link_hash_table *htab;
8e45593f 7173 asection *sgotplt;
37c644f2
AO
7174 asection *sdyn;
7175
067653c5 7176 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
7177 if (htab == NULL)
7178 return FALSE;
7179
8e45593f 7180 sgotplt = htab->sgotplt;
2293c499 7181 sdyn = bfd_get_section_by_name (htab->root.dynobj, ".dynamic");
37c644f2 7182
067653c5 7183 if (htab->root.dynamic_sections_created)
37c644f2
AO
7184 {
7185 asection *splt;
7186 Elf32_External_Dyn *dyncon, *dynconend;
7187
8e45593f 7188 BFD_ASSERT (sgotplt != NULL && sdyn != NULL);
37c644f2
AO
7189
7190 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 7191 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
37c644f2
AO
7192 for (; dyncon < dynconend; dyncon++)
7193 {
7194 Elf_Internal_Dyn dyn;
37c644f2 7195 asection *s;
067653c5
AM
7196#ifdef INCLUDE_SHMEDIA
7197 const char *name;
7198#endif
37c644f2 7199
2293c499 7200 bfd_elf32_swap_dyn_in (htab->root.dynobj, dyncon, &dyn);
37c644f2
AO
7201
7202 switch (dyn.d_tag)
7203 {
7204 default:
7a2b07ff
NS
7205 if (htab->vxworks_p
7206 && elf_vxworks_finish_dynamic_entry (output_bfd, &dyn))
7207 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
37c644f2
AO
7208 break;
7209
3b587c71
AM
7210#ifdef INCLUDE_SHMEDIA
7211 case DT_INIT:
7212 name = info->init_function;
7213 goto get_sym;
7214
7215 case DT_FINI:
7216 name = info->fini_function;
7217 get_sym:
7218 if (dyn.d_un.d_val != 0)
7219 {
067653c5
AM
7220 struct elf_link_hash_entry *h;
7221
7222 h = elf_link_hash_lookup (&htab->root, name,
b34976b6 7223 FALSE, FALSE, TRUE);
3b587c71
AM
7224 if (h != NULL && (h->other & STO_SH5_ISA32))
7225 {
7226 dyn.d_un.d_val |= 1;
7227 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7228 }
7229 }
7230 break;
7231#endif
7232
37c644f2 7233 case DT_PLTGOT:
8e45593f
NC
7234 BFD_ASSERT (htab->root.hgot != NULL);
7235 s = htab->root.hgot->root.u.def.section;
7236 dyn.d_un.d_ptr = htab->root.hgot->root.u.def.value
7237 + s->output_section->vma + s->output_offset;
7238 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7239 break;
37c644f2
AO
7240
7241 case DT_JMPREL:
067653c5 7242 s = htab->srelplt->output_section;
37c644f2
AO
7243 BFD_ASSERT (s != NULL);
7244 dyn.d_un.d_ptr = s->vma;
7245 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7246 break;
7247
7248 case DT_PLTRELSZ:
067653c5 7249 s = htab->srelplt->output_section;
37c644f2 7250 BFD_ASSERT (s != NULL);
eea6121a 7251 dyn.d_un.d_val = s->size;
37c644f2
AO
7252 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7253 break;
7254
7255 case DT_RELASZ:
7256 /* My reading of the SVR4 ABI indicates that the
7257 procedure linkage table relocs (DT_JMPREL) should be
7258 included in the overall relocs (DT_RELA). This is
7259 what Solaris does. However, UnixWare can not handle
7260 that case. Therefore, we override the DT_RELASZ entry
7261 here to make it not include the JMPREL relocs. Since
7262 the linker script arranges for .rela.plt to follow all
7263 other relocation sections, we don't have to worry
7264 about changing the DT_RELA entry. */
067653c5 7265 if (htab->srelplt != NULL)
37c644f2 7266 {
067653c5 7267 s = htab->srelplt->output_section;
eea6121a 7268 dyn.d_un.d_val -= s->size;
37c644f2
AO
7269 }
7270 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7271 break;
7272 }
7273 }
7274
7275 /* Fill in the first entry in the procedure linkage table. */
067653c5 7276 splt = htab->splt;
55e6e397 7277 if (splt && splt->size > 0 && htab->plt_info->plt0_entry)
37c644f2 7278 {
55e6e397
RS
7279 unsigned int i;
7280
7281 memcpy (splt->contents,
7282 htab->plt_info->plt0_entry,
7283 htab->plt_info->plt0_entry_size);
7284 for (i = 0; i < ARRAY_SIZE (htab->plt_info->plt0_got_fields); i++)
7285 if (htab->plt_info->plt0_got_fields[i] != MINUS_ONE)
7286 install_plt_field (output_bfd, FALSE,
8e45593f
NC
7287 (sgotplt->output_section->vma
7288 + sgotplt->output_offset
55e6e397
RS
7289 + (i * 4)),
7290 (splt->contents
7291 + htab->plt_info->plt0_got_fields[i]));
7292
7293 if (htab->vxworks_p)
37c644f2 7294 {
55e6e397
RS
7295 /* Finalize the .rela.plt.unloaded contents. */
7296 Elf_Internal_Rela rel;
7297 bfd_byte *loc;
7298
7299 /* Create a .rela.plt.unloaded R_SH_DIR32 relocation for the
7300 first PLT entry's pointer to _GLOBAL_OFFSET_TABLE_ + 8. */
7301 loc = htab->srelplt2->contents;
7302 rel.r_offset = (splt->output_section->vma
7303 + splt->output_offset
7304 + htab->plt_info->plt0_got_fields[2]);
7305 rel.r_info = ELF32_R_INFO (htab->root.hgot->indx, R_SH_DIR32);
7306 rel.r_addend = 8;
7307 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
7308 loc += sizeof (Elf32_External_Rela);
7309
7310 /* Fix up the remaining .rela.plt.unloaded relocations.
7311 They may have the wrong symbol index for _G_O_T_ or
7312 _P_L_T_ depending on the order in which symbols were
7313 output. */
7314 while (loc < htab->srelplt2->contents + htab->srelplt2->size)
37c644f2 7315 {
55e6e397
RS
7316 /* The PLT entry's pointer to the .got.plt slot. */
7317 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7318 rel.r_info = ELF32_R_INFO (htab->root.hgot->indx,
7319 R_SH_DIR32);
7320 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
7321 loc += sizeof (Elf32_External_Rela);
7322
7323 /* The .got.plt slot's pointer to .plt. */
7324 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7325 rel.r_info = ELF32_R_INFO (htab->root.hplt->indx,
7326 R_SH_DIR32);
7327 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
7328 loc += sizeof (Elf32_External_Rela);
37c644f2 7329 }
37c644f2
AO
7330 }
7331
7332 /* UnixWare sets the entsize of .plt to 4, although that doesn't
7333 really seem like the right value. */
7334 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 4;
7335 }
7336 }
7337
7338 /* Fill in the first three entries in the global offset table. */
8e45593f 7339 if (sgotplt && sgotplt->size > 0 && !htab->fdpic_p)
37c644f2
AO
7340 {
7341 if (sdyn == NULL)
8e45593f 7342 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents);
37c644f2
AO
7343 else
7344 bfd_put_32 (output_bfd,
7345 sdyn->output_section->vma + sdyn->output_offset,
8e45593f
NC
7346 sgotplt->contents);
7347 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 4);
7348 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 8);
7349 }
37c644f2 7350
8e45593f
NC
7351 if (sgotplt && sgotplt->size > 0)
7352 elf_section_data (sgotplt->output_section)->this_hdr.sh_entsize = 4;
7353
7354 /* At the very end of the .rofixup section is a pointer to the GOT. */
7355 if (htab->fdpic_p && htab->srofixup != NULL)
7356 {
7357 struct elf_link_hash_entry *hgot = htab->root.hgot;
7358 bfd_vma got_value = hgot->root.u.def.value
7359 + hgot->root.u.def.section->output_section->vma
7360 + hgot->root.u.def.section->output_offset;
7361
7362 sh_elf_add_rofixup (output_bfd, htab->srofixup, got_value);
7363
7364 /* Make sure we allocated and generated the same number of fixups. */
7365 BFD_ASSERT (htab->srofixup->reloc_count * 4 == htab->srofixup->size);
067653c5 7366 }
37c644f2 7367
8e45593f
NC
7368 if (htab->srelfuncdesc)
7369 BFD_ASSERT (htab->srelfuncdesc->reloc_count * sizeof (Elf32_External_Rela)
7370 == htab->srelfuncdesc->size);
7371
7372 if (htab->srelgot)
7373 BFD_ASSERT (htab->srelgot->reloc_count * sizeof (Elf32_External_Rela)
7374 == htab->srelgot->size);
7375
b34976b6 7376 return TRUE;
37c644f2
AO
7377}
7378
99e4ae17 7379static enum elf_reloc_type_class
09fd220b 7380sh_elf_reloc_type_class (const Elf_Internal_Rela *rela)
99e4ae17 7381{
f51e552e 7382 switch ((int) ELF32_R_TYPE (rela->r_info))
99e4ae17
AJ
7383 {
7384 case R_SH_RELATIVE:
7385 return reloc_class_relative;
7386 case R_SH_JMP_SLOT:
7387 return reloc_class_plt;
7388 case R_SH_COPY:
7389 return reloc_class_copy;
7390 default:
7391 return reloc_class_normal;
7392 }
7393}
7394
85fbca6a 7395#if !defined SH_TARGET_ALREADY_DEFINED
571fe01f 7396/* Support for Linux core dump NOTE sections. */
85fbca6a 7397
b34976b6 7398static bfd_boolean
09fd220b 7399elf32_shlin_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
2bc3c89a
AM
7400{
7401 int offset;
eea6121a 7402 unsigned int size;
2bc3c89a
AM
7403
7404 switch (note->descsz)
7405 {
7406 default:
b34976b6 7407 return FALSE;
2bc3c89a
AM
7408
7409 case 168: /* Linux/SH */
7410 /* pr_cursig */
7411 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
7412
7413 /* pr_pid */
261b8d08 7414 elf_tdata (abfd)->core_lwpid = bfd_get_32 (abfd, note->descdata + 24);
2bc3c89a
AM
7415
7416 /* pr_reg */
7417 offset = 72;
eea6121a 7418 size = 92;
2bc3c89a
AM
7419
7420 break;
7421 }
7422
7423 /* Make a ".reg/999" section. */
7424 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 7425 size, note->descpos + offset);
2bc3c89a
AM
7426}
7427
b34976b6 7428static bfd_boolean
09fd220b 7429elf32_shlin_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2bc3c89a
AM
7430{
7431 switch (note->descsz)
7432 {
7433 default:
b34976b6 7434 return FALSE;
2bc3c89a
AM
7435
7436 case 124: /* Linux/SH elf_prpsinfo */
7437 elf_tdata (abfd)->core_program
7438 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
7439 elf_tdata (abfd)->core_command
7440 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
7441 }
7442
7443 /* Note that for some reason, a spurious space is tacked
7444 onto the end of the args in some (at least one anyway)
7445 implementations, so strip it off if it exists. */
7446
7447 {
7448 char *command = elf_tdata (abfd)->core_command;
7449 int n = strlen (command);
7450
7451 if (0 < n && command[n - 1] == ' ')
7452 command[n - 1] = '\0';
7453 }
7454
b34976b6 7455 return TRUE;
2bc3c89a 7456}
85fbca6a 7457#endif /* not SH_TARGET_ALREADY_DEFINED */
2bc3c89a 7458
1f1799d5
KK
7459
7460/* Return address for Ith PLT stub in section PLT, for relocation REL
7461 or (bfd_vma) -1 if it should not be included. */
7462
7463static bfd_vma
7464sh_elf_plt_sym_val (bfd_vma i, const asection *plt,
7465 const arelent *rel ATTRIBUTE_UNUSED)
7466{
55e6e397
RS
7467 const struct elf_sh_plt_info *plt_info;
7468
7469 plt_info = get_plt_info (plt->owner, (plt->owner->flags & DYNAMIC) != 0);
7470 return plt->vma + get_plt_offset (plt_info, i);
1f1799d5
KK
7471}
7472
8e45593f
NC
7473/* Decide whether to attempt to turn absptr or lsda encodings in
7474 shared libraries into pcrel within the given input section. */
7475
7476static bfd_boolean
7477sh_elf_use_relative_eh_frame (bfd *input_bfd ATTRIBUTE_UNUSED,
7478 struct bfd_link_info *info,
7479 asection *eh_frame_section ATTRIBUTE_UNUSED)
7480{
7481 struct elf_sh_link_hash_table *htab = sh_elf_hash_table (info);
7482
7483 /* We can't use PC-relative encodings in FDPIC binaries, in general. */
7484 if (htab->fdpic_p)
7485 return FALSE;
7486
7487 return TRUE;
7488}
7489
7490/* Adjust the contents of an eh_frame_hdr section before they're output. */
7491
7492static bfd_byte
7493sh_elf_encode_eh_address (bfd *abfd,
7494 struct bfd_link_info *info,
7495 asection *osec, bfd_vma offset,
7496 asection *loc_sec, bfd_vma loc_offset,
7497 bfd_vma *encoded)
7498{
7499 struct elf_sh_link_hash_table *htab = sh_elf_hash_table (info);
7500 struct elf_link_hash_entry *h;
7501
7502 if (!htab->fdpic_p)
7503 return _bfd_elf_encode_eh_address (abfd, info, osec, offset, loc_sec,
7504 loc_offset, encoded);
7505
7506 h = htab->root.hgot;
7507 BFD_ASSERT (h && h->root.type == bfd_link_hash_defined);
7508
7509 if (! h || (sh_elf_osec_to_segment (abfd, osec)
7510 == sh_elf_osec_to_segment (abfd, loc_sec->output_section)))
7511 return _bfd_elf_encode_eh_address (abfd, info, osec, offset,
7512 loc_sec, loc_offset, encoded);
7513
7514 BFD_ASSERT (sh_elf_osec_to_segment (abfd, osec)
7515 == (sh_elf_osec_to_segment
7516 (abfd, h->root.u.def.section->output_section)));
7517
7518 *encoded = osec->vma + offset
7519 - (h->root.u.def.value
7520 + h->root.u.def.section->output_section->vma
7521 + h->root.u.def.section->output_offset);
7522
7523 return DW_EH_PE_datarel | DW_EH_PE_sdata4;
7524}
7525
85fbca6a 7526#if !defined SH_TARGET_ALREADY_DEFINED
252b5132
RH
7527#define TARGET_BIG_SYM bfd_elf32_sh_vec
7528#define TARGET_BIG_NAME "elf32-sh"
7529#define TARGET_LITTLE_SYM bfd_elf32_shl_vec
7530#define TARGET_LITTLE_NAME "elf32-shl"
85fbca6a
NC
7531#endif
7532
252b5132 7533#define ELF_ARCH bfd_arch_sh
ae95ffa6 7534#define ELF_TARGET_ID SH_ELF_DATA
252b5132 7535#define ELF_MACHINE_CODE EM_SH
d0facd1b
NC
7536#ifdef __QNXTARGET__
7537#define ELF_MAXPAGESIZE 0x1000
7538#else
7539#define ELF_MAXPAGESIZE 0x80
7540#endif
252b5132
RH
7541
7542#define elf_symbol_leading_char '_'
7543
7544#define bfd_elf32_bfd_reloc_type_lookup sh_elf_reloc_type_lookup
157090f7
AM
7545#define bfd_elf32_bfd_reloc_name_lookup \
7546 sh_elf_reloc_name_lookup
252b5132
RH
7547#define elf_info_to_howto sh_elf_info_to_howto
7548#define bfd_elf32_bfd_relax_section sh_elf_relax_section
7549#define elf_backend_relocate_section sh_elf_relocate_section
7550#define bfd_elf32_bfd_get_relocated_section_contents \
7551 sh_elf_get_relocated_section_contents
3376eaf5
KK
7552#define bfd_elf32_mkobject sh_elf_mkobject
7553#define elf_backend_object_p sh_elf_object_p
d4845d57
JR
7554#define bfd_elf32_bfd_set_private_bfd_flags \
7555 sh_elf_set_private_flags
7556#define bfd_elf32_bfd_copy_private_bfd_data \
7557 sh_elf_copy_private_data
875f7f69 7558#define bfd_elf32_bfd_merge_private_bfd_data \
d4845d57 7559 sh_elf_merge_private_data
252b5132 7560
067653c5
AM
7561#define elf_backend_gc_mark_hook sh_elf_gc_mark_hook
7562#define elf_backend_gc_sweep_hook sh_elf_gc_sweep_hook
7563#define elf_backend_check_relocs sh_elf_check_relocs
7564#define elf_backend_copy_indirect_symbol \
7565 sh_elf_copy_indirect_symbol
37c644f2
AO
7566#define elf_backend_create_dynamic_sections \
7567 sh_elf_create_dynamic_sections
7568#define bfd_elf32_bfd_link_hash_table_create \
7569 sh_elf_link_hash_table_create
7570#define elf_backend_adjust_dynamic_symbol \
7571 sh_elf_adjust_dynamic_symbol
55e6e397
RS
7572#define elf_backend_always_size_sections \
7573 sh_elf_always_size_sections
37c644f2
AO
7574#define elf_backend_size_dynamic_sections \
7575 sh_elf_size_dynamic_sections
8e45593f 7576#define elf_backend_omit_section_dynsym sh_elf_omit_section_dynsym
37c644f2
AO
7577#define elf_backend_finish_dynamic_symbol \
7578 sh_elf_finish_dynamic_symbol
7579#define elf_backend_finish_dynamic_sections \
7580 sh_elf_finish_dynamic_sections
99e4ae17 7581#define elf_backend_reloc_type_class sh_elf_reloc_type_class
1f1799d5 7582#define elf_backend_plt_sym_val sh_elf_plt_sym_val
8e45593f
NC
7583#define elf_backend_can_make_relative_eh_frame \
7584 sh_elf_use_relative_eh_frame
7585#define elf_backend_can_make_lsda_relative_eh_frame \
7586 sh_elf_use_relative_eh_frame
7587#define elf_backend_encode_eh_address \
7588 sh_elf_encode_eh_address
37c644f2 7589
067653c5
AM
7590#define elf_backend_can_gc_sections 1
7591#define elf_backend_can_refcount 1
37c644f2
AO
7592#define elf_backend_want_got_plt 1
7593#define elf_backend_plt_readonly 1
7594#define elf_backend_want_plt_sym 0
7595#define elf_backend_got_header_size 12
ed71e111 7596
85fbca6a 7597#if !defined INCLUDE_SHMEDIA && !defined SH_TARGET_ALREADY_DEFINED
2bc3c89a 7598
252b5132 7599#include "elf32-target.h"
ed71e111 7600
2bc3c89a
AM
7601/* NetBSD support. */
7602#undef TARGET_BIG_SYM
7603#define TARGET_BIG_SYM bfd_elf32_shnbsd_vec
7604#undef TARGET_BIG_NAME
7605#define TARGET_BIG_NAME "elf32-sh-nbsd"
7606#undef TARGET_LITTLE_SYM
7607#define TARGET_LITTLE_SYM bfd_elf32_shlnbsd_vec
7608#undef TARGET_LITTLE_NAME
7609#define TARGET_LITTLE_NAME "elf32-shl-nbsd"
7610#undef ELF_MAXPAGESIZE
7611#define ELF_MAXPAGESIZE 0x10000
24718e3b 7612#undef ELF_COMMONPAGESIZE
2bc3c89a
AM
7613#undef elf_symbol_leading_char
7614#define elf_symbol_leading_char 0
571fe01f 7615#undef elf32_bed
2bc3c89a
AM
7616#define elf32_bed elf32_sh_nbsd_bed
7617
7618#include "elf32-target.h"
7619
2bc3c89a
AM
7620
7621/* Linux support. */
7622#undef TARGET_BIG_SYM
7623#define TARGET_BIG_SYM bfd_elf32_shblin_vec
7624#undef TARGET_BIG_NAME
7625#define TARGET_BIG_NAME "elf32-shbig-linux"
7626#undef TARGET_LITTLE_SYM
7627#define TARGET_LITTLE_SYM bfd_elf32_shlin_vec
7628#undef TARGET_LITTLE_NAME
7629#define TARGET_LITTLE_NAME "elf32-sh-linux"
24718e3b
L
7630#undef ELF_COMMONPAGESIZE
7631#define ELF_COMMONPAGESIZE 0x1000
2bc3c89a
AM
7632
7633#undef elf_backend_grok_prstatus
7634#define elf_backend_grok_prstatus elf32_shlin_grok_prstatus
7635#undef elf_backend_grok_psinfo
7636#define elf_backend_grok_psinfo elf32_shlin_grok_psinfo
571fe01f 7637#undef elf32_bed
2bc3c89a
AM
7638#define elf32_bed elf32_sh_lin_bed
7639
7640#include "elf32-target.h"
7641
8e45593f
NC
7642
7643/* FDPIC support. */
7644#undef TARGET_BIG_SYM
7645#define TARGET_BIG_SYM bfd_elf32_shbfd_vec
7646#undef TARGET_BIG_NAME
7647#define TARGET_BIG_NAME "elf32-shbig-fdpic"
7648#undef TARGET_LITTLE_SYM
7649#define TARGET_LITTLE_SYM bfd_elf32_shfd_vec
7650#undef TARGET_LITTLE_NAME
7651#define TARGET_LITTLE_NAME "elf32-sh-fdpic"
7652#undef elf_backend_modify_program_headers
7653#define elf_backend_modify_program_headers \
7654 sh_elf_modify_program_headers
7655
7656#undef elf32_bed
7657#define elf32_bed elf32_sh_fd_bed
7658
7659#include "elf32-target.h"
7660
7661#undef elf_backend_modify_program_headers
7662
7663/* VxWorks support. */
55e6e397
RS
7664#undef TARGET_BIG_SYM
7665#define TARGET_BIG_SYM bfd_elf32_shvxworks_vec
7666#undef TARGET_BIG_NAME
7667#define TARGET_BIG_NAME "elf32-sh-vxworks"
7668#undef TARGET_LITTLE_SYM
7669#define TARGET_LITTLE_SYM bfd_elf32_shlvxworks_vec
7670#undef TARGET_LITTLE_NAME
7671#define TARGET_LITTLE_NAME "elf32-shl-vxworks"
7672#undef elf32_bed
7673#define elf32_bed elf32_sh_vxworks_bed
7674
7675#undef elf_backend_want_plt_sym
7676#define elf_backend_want_plt_sym 1
7677#undef elf_symbol_leading_char
7678#define elf_symbol_leading_char '_'
7679#define elf_backend_want_got_underscore 1
7680#undef elf_backend_grok_prstatus
7681#undef elf_backend_grok_psinfo
7682#undef elf_backend_add_symbol_hook
7683#define elf_backend_add_symbol_hook elf_vxworks_add_symbol_hook
7684#undef elf_backend_link_output_symbol_hook
7685#define elf_backend_link_output_symbol_hook \
7686 elf_vxworks_link_output_symbol_hook
7687#undef elf_backend_emit_relocs
7688#define elf_backend_emit_relocs elf_vxworks_emit_relocs
7689#undef elf_backend_final_write_processing
7690#define elf_backend_final_write_processing \
7691 elf_vxworks_final_write_processing
7692#undef ELF_MAXPAGESIZE
7693#define ELF_MAXPAGESIZE 0x1000
7694#undef ELF_COMMONPAGESIZE
7695
7696#include "elf32-target.h"
7697
85fbca6a 7698#endif /* neither INCLUDE_SHMEDIA nor SH_TARGET_ALREADY_DEFINED */
This page took 1.433347 seconds and 4 git commands to generate.