Remove trailing white spaces in bfd
[deliverable/binutils-gdb.git] / bfd / elf32-sh.c
CommitLineData
ef230218 1/* Renesas / SuperH SH specific support for 32-bit ELF
22d606e9 2 Copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005,
3d301fdc
AM
3 2006, 2007, 2008, 2009, 2010, 2011, 2012
4 Free Software Foundation, Inc.
252b5132
RH
5 Contributed by Ian Lance Taylor, Cygnus Support.
6
571fe01f 7 This file is part of BFD, the Binary File Descriptor library.
252b5132 8
571fe01f
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
571fe01f 12 (at your option) any later version.
252b5132 13
571fe01f
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
252b5132 18
571fe01f
NC
19 You should have received a copy of the GNU General Public License
20 along with this program; if not, write to the Free Software
cd123cb7
NC
21 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
22 MA 02110-1301, USA. */
252b5132 23
252b5132 24#include "sysdep.h"
3db64b00 25#include "bfd.h"
252b5132
RH
26#include "bfdlink.h"
27#include "libbfd.h"
28#include "elf-bfd.h"
55e6e397 29#include "elf-vxworks.h"
252b5132 30#include "elf/sh.h"
8e45593f 31#include "dwarf2.h"
f6f9408f 32#include "libiberty.h"
871ec896 33#include "../opcodes/sh-opc.h"
252b5132
RH
34
35static bfd_reloc_status_type sh_elf_reloc
09fd220b 36 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
252b5132 37static bfd_reloc_status_type sh_elf_ignore_reloc
09fd220b 38 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
b34976b6 39static bfd_boolean sh_elf_relax_delete_bytes
09fd220b 40 (bfd *, asection *, bfd_vma, int);
b34976b6 41static bfd_boolean sh_elf_align_loads
09fd220b 42 (bfd *, asection *, Elf_Internal_Rela *, bfd_byte *, bfd_boolean *);
85fbca6a 43#ifndef SH64_ELF
b34976b6 44static bfd_boolean sh_elf_swap_insns
09fd220b 45 (bfd *, asection *, void *, bfd_byte *, bfd_vma);
85fbca6a 46#endif
3376eaf5 47static int sh_elf_optimized_tls_reloc
09fd220b 48 (struct bfd_link_info *, int, int);
3376eaf5 49static bfd_vma dtpoff_base
09fd220b 50 (struct bfd_link_info *);
267fb3c1 51static bfd_vma tpoff
09fd220b 52 (struct bfd_link_info *, bfd_vma);
37c644f2
AO
53
54/* The name of the dynamic interpreter. This is put in the .interp
55 section. */
56
57#define ELF_DYNAMIC_INTERPRETER "/usr/lib/libc.so.1"
252b5132 58
8e45593f
NC
59/* FDPIC binaries have a default 128K stack. */
60#define DEFAULT_STACK_SIZE 0x20000
61
55e6e397 62#define MINUS_ONE ((bfd_vma) 0 - 1)
8e45593f
NC
63
64/* Decide whether a reference to a symbol can be resolved locally or
65 not. If the symbol is protected, we want the local address, but
66 its function descriptor must be assigned by the dynamic linker. */
67#define SYMBOL_FUNCDESC_LOCAL(INFO, H) \
68 (SYMBOL_REFERENCES_LOCAL (INFO, H) \
69 || ! elf_hash_table (INFO)->dynamic_sections_created)
55e6e397
RS
70\f
71#define SH_PARTIAL32 TRUE
72#define SH_SRC_MASK32 0xffffffff
73#define SH_ELF_RELOC sh_elf_reloc
38b1a46c
NC
74static reloc_howto_type sh_elf_howto_table[] =
75{
55e6e397
RS
76#include "elf32-sh-relocs.h"
77};
fbca6ad9 78
55e6e397
RS
79#define SH_PARTIAL32 FALSE
80#define SH_SRC_MASK32 0
81#define SH_ELF_RELOC bfd_elf_generic_reloc
82static reloc_howto_type sh_vxworks_howto_table[] =
83{
84#include "elf32-sh-relocs.h"
85};
86\f
87/* Return true if OUTPUT_BFD is a VxWorks object. */
fbca6ad9 88
55e6e397 89static bfd_boolean
527a23b8 90vxworks_object_p (bfd *abfd ATTRIBUTE_UNUSED)
55e6e397 91{
527a23b8 92#if !defined INCLUDE_SHMEDIA && !defined SH_TARGET_ALREADY_DEFINED
55e6e397
RS
93 extern const bfd_target bfd_elf32_shlvxworks_vec;
94 extern const bfd_target bfd_elf32_shvxworks_vec;
fbca6ad9 95
55e6e397
RS
96 return (abfd->xvec == &bfd_elf32_shlvxworks_vec
97 || abfd->xvec == &bfd_elf32_shvxworks_vec);
527a23b8
NC
98#else
99 return FALSE;
100#endif
55e6e397 101}
fbca6ad9 102
8e45593f
NC
103/* Return true if OUTPUT_BFD is an FDPIC object. */
104
105static bfd_boolean
106fdpic_object_p (bfd *abfd ATTRIBUTE_UNUSED)
107{
108#if !defined INCLUDE_SHMEDIA && !defined SH_TARGET_ALREADY_DEFINED
109 extern const bfd_target bfd_elf32_shfd_vec;
110 extern const bfd_target bfd_elf32_shbfd_vec;
111
112 return (abfd->xvec == &bfd_elf32_shfd_vec
113 || abfd->xvec == &bfd_elf32_shbfd_vec);
114#else
115 return FALSE;
116#endif
117}
118
55e6e397 119/* Return the howto table for ABFD. */
fbca6ad9 120
55e6e397
RS
121static reloc_howto_type *
122get_howto_table (bfd *abfd)
123{
124 if (vxworks_object_p (abfd))
125 return sh_vxworks_howto_table;
126 return sh_elf_howto_table;
127}
252b5132 128
015551fc 129static bfd_reloc_status_type
09fd220b
KK
130sh_elf_reloc_loop (int r_type ATTRIBUTE_UNUSED, bfd *input_bfd,
131 asection *input_section, bfd_byte *contents,
132 bfd_vma addr, asection *symbol_section,
133 bfd_vma start, bfd_vma end)
015551fc
JR
134{
135 static bfd_vma last_addr;
00fdaf47 136 static asection *last_symbol_section;
015551fc
JR
137 bfd_byte *start_ptr, *ptr, *last_ptr;
138 int diff, cum_diff;
139 bfd_signed_vma x;
140 int insn;
141
142 /* Sanity check the address. */
07515404 143 if (addr > bfd_get_section_limit (input_bfd, input_section))
015551fc
JR
144 return bfd_reloc_outofrange;
145
146 /* We require the start and end relocations to be processed consecutively -
147 although we allow then to be processed forwards or backwards. */
148 if (! last_addr)
149 {
150 last_addr = addr;
151 last_symbol_section = symbol_section;
152 return bfd_reloc_ok;
153 }
154 if (last_addr != addr)
155 abort ();
156 last_addr = 0;
157
158 if (! symbol_section || last_symbol_section != symbol_section || end < start)
159 return bfd_reloc_outofrange;
160
161 /* Get the symbol_section contents. */
162 if (symbol_section != input_section)
163 {
164 if (elf_section_data (symbol_section)->this_hdr.contents != NULL)
165 contents = elf_section_data (symbol_section)->this_hdr.contents;
166 else
167 {
eea6121a
AM
168 if (!bfd_malloc_and_get_section (input_bfd, symbol_section,
169 &contents))
015551fc 170 {
eea6121a
AM
171 if (contents != NULL)
172 free (contents);
015551fc
JR
173 return bfd_reloc_outofrange;
174 }
175 }
176 }
177#define IS_PPI(PTR) ((bfd_get_16 (input_bfd, (PTR)) & 0xfc00) == 0xf800)
178 start_ptr = contents + start;
179 for (cum_diff = -6, ptr = contents + end; cum_diff < 0 && ptr > start_ptr;)
180 {
181 for (last_ptr = ptr, ptr -= 4; ptr >= start_ptr && IS_PPI (ptr);)
182 ptr -= 2;
183 ptr += 2;
61ff1804 184 diff = (last_ptr - ptr) >> 1;
015551fc
JR
185 cum_diff += diff & 1;
186 cum_diff += diff;
187 }
188 /* Calculate the start / end values to load into rs / re minus four -
189 so that will cancel out the four we would otherwise have to add to
190 addr to get the value to subtract in order to get relative addressing. */
191 if (cum_diff >= 0)
192 {
193 start -= 4;
194 end = (ptr + cum_diff * 2) - contents;
195 }
196 else
197 {
198 bfd_vma start0 = start - 4;
199
a0fc8ba1 200 while (start0 && IS_PPI (contents + start0))
015551fc
JR
201 start0 -= 2;
202 start0 = start - 2 - ((start - start0) & 2);
203 start = start0 - cum_diff - 2;
204 end = start0;
205 }
206
6cdc0ccc
AM
207 if (contents != NULL
208 && elf_section_data (symbol_section)->this_hdr.contents != contents)
209 free (contents);
015551fc
JR
210
211 insn = bfd_get_16 (input_bfd, contents + addr);
212
213 x = (insn & 0x200 ? end : start) - addr;
214 if (input_section != symbol_section)
215 x += ((symbol_section->output_section->vma + symbol_section->output_offset)
216 - (input_section->output_section->vma
217 + input_section->output_offset));
218 x >>= 1;
219 if (x < -128 || x > 127)
220 return bfd_reloc_overflow;
221
61ff1804 222 x = (insn & ~0xff) | (x & 0xff);
dc810e39 223 bfd_put_16 (input_bfd, (bfd_vma) x, contents + addr);
015551fc
JR
224
225 return bfd_reloc_ok;
226}
227
228/* This function is used for normal relocs. This used to be like the COFF
252b5132
RH
229 function, and is almost certainly incorrect for other ELF targets. */
230
231static bfd_reloc_status_type
09fd220b
KK
232sh_elf_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol_in,
233 void *data, asection *input_section, bfd *output_bfd,
234 char **error_message ATTRIBUTE_UNUSED)
252b5132
RH
235{
236 unsigned long insn;
237 bfd_vma sym_value;
238 enum elf_sh_reloc_type r_type;
239 bfd_vma addr = reloc_entry->address;
240 bfd_byte *hit_data = addr + (bfd_byte *) data;
241
242 r_type = (enum elf_sh_reloc_type) reloc_entry->howto->type;
243
244 if (output_bfd != NULL)
245 {
246 /* Partial linking--do nothing. */
247 reloc_entry->address += input_section->output_offset;
248 return bfd_reloc_ok;
249 }
250
251 /* Almost all relocs have to do with relaxing. If any work must be
252 done for them, it has been done in sh_relax_section. */
015551fc 253 if (r_type == R_SH_IND12W && (symbol_in->flags & BSF_LOCAL) != 0)
252b5132
RH
254 return bfd_reloc_ok;
255
256 if (symbol_in != NULL
257 && bfd_is_und_section (symbol_in->section))
258 return bfd_reloc_undefined;
259
260 if (bfd_is_com_section (symbol_in->section))
435b1e90
KH
261 sym_value = 0;
262 else
252b5132
RH
263 sym_value = (symbol_in->value +
264 symbol_in->section->output_section->vma +
265 symbol_in->section->output_offset);
266
267 switch (r_type)
268 {
269 case R_SH_DIR32:
270 insn = bfd_get_32 (abfd, hit_data);
271 insn += sym_value + reloc_entry->addend;
dc810e39 272 bfd_put_32 (abfd, (bfd_vma) insn, hit_data);
252b5132
RH
273 break;
274 case R_SH_IND12W:
275 insn = bfd_get_16 (abfd, hit_data);
276 sym_value += reloc_entry->addend;
277 sym_value -= (input_section->output_section->vma
278 + input_section->output_offset
279 + addr
280 + 4);
281 sym_value += (insn & 0xfff) << 1;
282 if (insn & 0x800)
283 sym_value -= 0x1000;
284 insn = (insn & 0xf000) | (sym_value & 0xfff);
dc810e39 285 bfd_put_16 (abfd, (bfd_vma) insn, hit_data);
252b5132
RH
286 if (sym_value < (bfd_vma) -0x1000 || sym_value >= 0x1000)
287 return bfd_reloc_overflow;
288 break;
289 default:
290 abort ();
291 break;
292 }
293
294 return bfd_reloc_ok;
295}
296
297/* This function is used for relocs which are only used for relaxing,
298 which the linker should otherwise ignore. */
299
300static bfd_reloc_status_type
09fd220b
KK
301sh_elf_ignore_reloc (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc_entry,
302 asymbol *symbol ATTRIBUTE_UNUSED,
303 void *data ATTRIBUTE_UNUSED, asection *input_section,
304 bfd *output_bfd,
305 char **error_message ATTRIBUTE_UNUSED)
252b5132
RH
306{
307 if (output_bfd != NULL)
308 reloc_entry->address += input_section->output_offset;
309 return bfd_reloc_ok;
310}
311
312/* This structure is used to map BFD reloc codes to SH ELF relocs. */
313
38b1a46c
NC
314struct elf_reloc_map
315{
252b5132
RH
316 bfd_reloc_code_real_type bfd_reloc_val;
317 unsigned char elf_reloc_val;
318};
319
320/* An array mapping BFD reloc codes to SH ELF relocs. */
321
38b1a46c
NC
322static const struct elf_reloc_map sh_reloc_map[] =
323{
252b5132
RH
324 { BFD_RELOC_NONE, R_SH_NONE },
325 { BFD_RELOC_32, R_SH_DIR32 },
d38eb334
DD
326 { BFD_RELOC_16, R_SH_DIR16 },
327 { BFD_RELOC_8, R_SH_DIR8 },
252b5132
RH
328 { BFD_RELOC_CTOR, R_SH_DIR32 },
329 { BFD_RELOC_32_PCREL, R_SH_REL32 },
330 { BFD_RELOC_SH_PCDISP8BY2, R_SH_DIR8WPN },
331 { BFD_RELOC_SH_PCDISP12BY2, R_SH_IND12W },
332 { BFD_RELOC_SH_PCRELIMM8BY2, R_SH_DIR8WPZ },
333 { BFD_RELOC_SH_PCRELIMM8BY4, R_SH_DIR8WPL },
334 { BFD_RELOC_8_PCREL, R_SH_SWITCH8 },
335 { BFD_RELOC_SH_SWITCH16, R_SH_SWITCH16 },
336 { BFD_RELOC_SH_SWITCH32, R_SH_SWITCH32 },
337 { BFD_RELOC_SH_USES, R_SH_USES },
338 { BFD_RELOC_SH_COUNT, R_SH_COUNT },
339 { BFD_RELOC_SH_ALIGN, R_SH_ALIGN },
340 { BFD_RELOC_SH_CODE, R_SH_CODE },
341 { BFD_RELOC_SH_DATA, R_SH_DATA },
342 { BFD_RELOC_SH_LABEL, R_SH_LABEL },
343 { BFD_RELOC_VTABLE_INHERIT, R_SH_GNU_VTINHERIT },
344 { BFD_RELOC_VTABLE_ENTRY, R_SH_GNU_VTENTRY },
015551fc
JR
345 { BFD_RELOC_SH_LOOP_START, R_SH_LOOP_START },
346 { BFD_RELOC_SH_LOOP_END, R_SH_LOOP_END },
3376eaf5
KK
347 { BFD_RELOC_SH_TLS_GD_32, R_SH_TLS_GD_32 },
348 { BFD_RELOC_SH_TLS_LD_32, R_SH_TLS_LD_32 },
349 { BFD_RELOC_SH_TLS_LDO_32, R_SH_TLS_LDO_32 },
350 { BFD_RELOC_SH_TLS_IE_32, R_SH_TLS_IE_32 },
351 { BFD_RELOC_SH_TLS_LE_32, R_SH_TLS_LE_32 },
352 { BFD_RELOC_SH_TLS_DTPMOD32, R_SH_TLS_DTPMOD32 },
353 { BFD_RELOC_SH_TLS_DTPOFF32, R_SH_TLS_DTPOFF32 },
354 { BFD_RELOC_SH_TLS_TPOFF32, R_SH_TLS_TPOFF32 },
37c644f2
AO
355 { BFD_RELOC_32_GOT_PCREL, R_SH_GOT32 },
356 { BFD_RELOC_32_PLT_PCREL, R_SH_PLT32 },
357 { BFD_RELOC_SH_COPY, R_SH_COPY },
358 { BFD_RELOC_SH_GLOB_DAT, R_SH_GLOB_DAT },
359 { BFD_RELOC_SH_JMP_SLOT, R_SH_JMP_SLOT },
360 { BFD_RELOC_SH_RELATIVE, R_SH_RELATIVE },
361 { BFD_RELOC_32_GOTOFF, R_SH_GOTOFF },
362 { BFD_RELOC_SH_GOTPC, R_SH_GOTPC },
fbca6ad9 363 { BFD_RELOC_SH_GOTPLT32, R_SH_GOTPLT32 },
8e45593f
NC
364 { BFD_RELOC_SH_GOT20, R_SH_GOT20 },
365 { BFD_RELOC_SH_GOTOFF20, R_SH_GOTOFF20 },
366 { BFD_RELOC_SH_GOTFUNCDESC, R_SH_GOTFUNCDESC },
367 { BFD_RELOC_SH_GOTFUNCDESC20, R_SH_GOTFUNCDESC20 },
368 { BFD_RELOC_SH_GOTOFFFUNCDESC, R_SH_GOTOFFFUNCDESC },
369 { BFD_RELOC_SH_GOTOFFFUNCDESC20, R_SH_GOTOFFFUNCDESC20 },
370 { BFD_RELOC_SH_FUNCDESC, R_SH_FUNCDESC },
fbca6ad9
AO
371#ifdef INCLUDE_SHMEDIA
372 { BFD_RELOC_SH_GOT_LOW16, R_SH_GOT_LOW16 },
373 { BFD_RELOC_SH_GOT_MEDLOW16, R_SH_GOT_MEDLOW16 },
374 { BFD_RELOC_SH_GOT_MEDHI16, R_SH_GOT_MEDHI16 },
375 { BFD_RELOC_SH_GOT_HI16, R_SH_GOT_HI16 },
376 { BFD_RELOC_SH_GOTPLT_LOW16, R_SH_GOTPLT_LOW16 },
377 { BFD_RELOC_SH_GOTPLT_MEDLOW16, R_SH_GOTPLT_MEDLOW16 },
378 { BFD_RELOC_SH_GOTPLT_MEDHI16, R_SH_GOTPLT_MEDHI16 },
379 { BFD_RELOC_SH_GOTPLT_HI16, R_SH_GOTPLT_HI16 },
380 { BFD_RELOC_SH_PLT_LOW16, R_SH_PLT_LOW16 },
381 { BFD_RELOC_SH_PLT_MEDLOW16, R_SH_PLT_MEDLOW16 },
382 { BFD_RELOC_SH_PLT_MEDHI16, R_SH_PLT_MEDHI16 },
383 { BFD_RELOC_SH_PLT_HI16, R_SH_PLT_HI16 },
384 { BFD_RELOC_SH_GOTOFF_LOW16, R_SH_GOTOFF_LOW16 },
385 { BFD_RELOC_SH_GOTOFF_MEDLOW16, R_SH_GOTOFF_MEDLOW16 },
386 { BFD_RELOC_SH_GOTOFF_MEDHI16, R_SH_GOTOFF_MEDHI16 },
387 { BFD_RELOC_SH_GOTOFF_HI16, R_SH_GOTOFF_HI16 },
388 { BFD_RELOC_SH_GOTPC_LOW16, R_SH_GOTPC_LOW16 },
389 { BFD_RELOC_SH_GOTPC_MEDLOW16, R_SH_GOTPC_MEDLOW16 },
390 { BFD_RELOC_SH_GOTPC_MEDHI16, R_SH_GOTPC_MEDHI16 },
391 { BFD_RELOC_SH_GOTPC_HI16, R_SH_GOTPC_HI16 },
392 { BFD_RELOC_SH_COPY64, R_SH_COPY64 },
393 { BFD_RELOC_SH_GLOB_DAT64, R_SH_GLOB_DAT64 },
394 { BFD_RELOC_SH_JMP_SLOT64, R_SH_JMP_SLOT64 },
395 { BFD_RELOC_SH_RELATIVE64, R_SH_RELATIVE64 },
396 { BFD_RELOC_SH_GOT10BY4, R_SH_GOT10BY4 },
397 { BFD_RELOC_SH_GOT10BY8, R_SH_GOT10BY8 },
398 { BFD_RELOC_SH_GOTPLT10BY4, R_SH_GOTPLT10BY4 },
399 { BFD_RELOC_SH_GOTPLT10BY8, R_SH_GOTPLT10BY8 },
400 { BFD_RELOC_SH_PT_16, R_SH_PT_16 },
401 { BFD_RELOC_SH_SHMEDIA_CODE, R_SH_SHMEDIA_CODE },
402 { BFD_RELOC_SH_IMMU5, R_SH_DIR5U },
403 { BFD_RELOC_SH_IMMS6, R_SH_DIR6S },
404 { BFD_RELOC_SH_IMMU6, R_SH_DIR6U },
405 { BFD_RELOC_SH_IMMS10, R_SH_DIR10S },
406 { BFD_RELOC_SH_IMMS10BY2, R_SH_DIR10SW },
407 { BFD_RELOC_SH_IMMS10BY4, R_SH_DIR10SL },
408 { BFD_RELOC_SH_IMMS10BY8, R_SH_DIR10SQ },
409 { BFD_RELOC_SH_IMMS16, R_SH_IMMS16 },
410 { BFD_RELOC_SH_IMMU16, R_SH_IMMU16 },
411 { BFD_RELOC_SH_IMM_LOW16, R_SH_IMM_LOW16 },
412 { BFD_RELOC_SH_IMM_LOW16_PCREL, R_SH_IMM_LOW16_PCREL },
413 { BFD_RELOC_SH_IMM_MEDLOW16, R_SH_IMM_MEDLOW16 },
414 { BFD_RELOC_SH_IMM_MEDLOW16_PCREL, R_SH_IMM_MEDLOW16_PCREL },
415 { BFD_RELOC_SH_IMM_MEDHI16, R_SH_IMM_MEDHI16 },
416 { BFD_RELOC_SH_IMM_MEDHI16_PCREL, R_SH_IMM_MEDHI16_PCREL },
417 { BFD_RELOC_SH_IMM_HI16, R_SH_IMM_HI16 },
418 { BFD_RELOC_SH_IMM_HI16_PCREL, R_SH_IMM_HI16_PCREL },
419 { BFD_RELOC_64, R_SH_64 },
420 { BFD_RELOC_64_PCREL, R_SH_64_PCREL },
421#endif /* not INCLUDE_SHMEDIA */
252b5132
RH
422};
423
424/* Given a BFD reloc code, return the howto structure for the
55e6e397 425 corresponding SH ELF reloc. */
252b5132
RH
426
427static reloc_howto_type *
55e6e397 428sh_elf_reloc_type_lookup (bfd *abfd, bfd_reloc_code_real_type code)
252b5132
RH
429{
430 unsigned int i;
431
432 for (i = 0; i < sizeof (sh_reloc_map) / sizeof (struct elf_reloc_map); i++)
433 {
434 if (sh_reloc_map[i].bfd_reloc_val == code)
55e6e397 435 return get_howto_table (abfd) + (int) sh_reloc_map[i].elf_reloc_val;
252b5132
RH
436 }
437
438 return NULL;
439}
440
157090f7
AM
441static reloc_howto_type *
442sh_elf_reloc_name_lookup (bfd *abfd, const char *r_name)
443{
444 unsigned int i;
445
446 if (vxworks_object_p (abfd))
447 {
448 for (i = 0;
449 i < (sizeof (sh_vxworks_howto_table)
450 / sizeof (sh_vxworks_howto_table[0]));
451 i++)
452 if (sh_vxworks_howto_table[i].name != NULL
453 && strcasecmp (sh_vxworks_howto_table[i].name, r_name) == 0)
454 return &sh_vxworks_howto_table[i];
455 }
456 else
457 {
458 for (i = 0;
459 i < (sizeof (sh_elf_howto_table)
460 / sizeof (sh_elf_howto_table[0]));
461 i++)
462 if (sh_elf_howto_table[i].name != NULL
463 && strcasecmp (sh_elf_howto_table[i].name, r_name) == 0)
464 return &sh_elf_howto_table[i];
465 }
466
467 return NULL;
468}
469
252b5132
RH
470/* Given an ELF reloc, fill in the howto field of a relent. */
471
472static void
55e6e397 473sh_elf_info_to_howto (bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst)
252b5132
RH
474{
475 unsigned int r;
476
477 r = ELF32_R_TYPE (dst->r_info);
478
479 BFD_ASSERT (r < (unsigned int) R_SH_max);
480 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC || r > R_SH_LAST_INVALID_RELOC);
06bb75c1 481 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC_2 || r > R_SH_LAST_INVALID_RELOC_2);
fbca6ad9
AO
482 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC_3 || r > R_SH_LAST_INVALID_RELOC_3);
483 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC_4 || r > R_SH_LAST_INVALID_RELOC_4);
3376eaf5 484 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC_5 || r > R_SH_LAST_INVALID_RELOC_5);
8e45593f 485 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC_6 || r > R_SH_LAST_INVALID_RELOC_6);
252b5132 486
55e6e397 487 cache_ptr->howto = get_howto_table (abfd) + r;
252b5132
RH
488}
489\f
490/* This function handles relaxing for SH ELF. See the corresponding
491 function in coff-sh.c for a description of what this does. FIXME:
492 There is a lot of duplication here between this code and the COFF
493 specific code. The format of relocs and symbols is wound deeply
494 into this code, but it would still be better if the duplication
495 could be eliminated somehow. Note in particular that although both
496 functions use symbols like R_SH_CODE, those symbols have different
497 values; in coff-sh.c they come from include/coff/sh.h, whereas here
498 they come from enum elf_sh_reloc_type in include/elf/sh.h. */
499
b34976b6 500static bfd_boolean
09fd220b
KK
501sh_elf_relax_section (bfd *abfd, asection *sec,
502 struct bfd_link_info *link_info, bfd_boolean *again)
252b5132
RH
503{
504 Elf_Internal_Shdr *symtab_hdr;
505 Elf_Internal_Rela *internal_relocs;
b34976b6 506 bfd_boolean have_code;
252b5132
RH
507 Elf_Internal_Rela *irel, *irelend;
508 bfd_byte *contents = NULL;
6cdc0ccc 509 Elf_Internal_Sym *isymbuf = NULL;
252b5132 510
b34976b6 511 *again = FALSE;
252b5132 512
1049f94e 513 if (link_info->relocatable
252b5132
RH
514 || (sec->flags & SEC_RELOC) == 0
515 || sec->reloc_count == 0)
b34976b6 516 return TRUE;
252b5132 517
fbca6ad9
AO
518#ifdef INCLUDE_SHMEDIA
519 if (elf_section_data (sec)->this_hdr.sh_flags
520 & (SHF_SH5_ISA32 | SHF_SH5_ISA32_MIXED))
521 {
b34976b6 522 return TRUE;
fbca6ad9
AO
523 }
524#endif
525
0ffa91dd 526 symtab_hdr = &elf_symtab_hdr (abfd);
252b5132 527
45d6a902 528 internal_relocs = (_bfd_elf_link_read_relocs
09fd220b 529 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
252b5132
RH
530 link_info->keep_memory));
531 if (internal_relocs == NULL)
532 goto error_return;
252b5132 533
b34976b6 534 have_code = FALSE;
252b5132
RH
535
536 irelend = internal_relocs + sec->reloc_count;
537 for (irel = internal_relocs; irel < irelend; irel++)
538 {
539 bfd_vma laddr, paddr, symval;
540 unsigned short insn;
541 Elf_Internal_Rela *irelfn, *irelscan, *irelcount;
542 bfd_signed_vma foff;
543
544 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_CODE)
b34976b6 545 have_code = TRUE;
252b5132
RH
546
547 if (ELF32_R_TYPE (irel->r_info) != (int) R_SH_USES)
548 continue;
549
550 /* Get the section contents. */
551 if (contents == NULL)
552 {
553 if (elf_section_data (sec)->this_hdr.contents != NULL)
554 contents = elf_section_data (sec)->this_hdr.contents;
555 else
556 {
eea6121a 557 if (!bfd_malloc_and_get_section (abfd, sec, &contents))
252b5132
RH
558 goto error_return;
559 }
560 }
561
562 /* The r_addend field of the R_SH_USES reloc will point us to
067653c5
AM
563 the register load. The 4 is because the r_addend field is
564 computed as though it were a jump offset, which are based
565 from 4 bytes after the jump instruction. */
252b5132 566 laddr = irel->r_offset + 4 + irel->r_addend;
eea6121a 567 if (laddr >= sec->size)
252b5132 568 {
d003868e
AM
569 (*_bfd_error_handler) (_("%B: 0x%lx: warning: bad R_SH_USES offset"),
570 abfd,
252b5132
RH
571 (unsigned long) irel->r_offset);
572 continue;
573 }
574 insn = bfd_get_16 (abfd, contents + laddr);
575
576 /* If the instruction is not mov.l NN,rN, we don't know what to
067653c5 577 do. */
252b5132
RH
578 if ((insn & 0xf000) != 0xd000)
579 {
580 ((*_bfd_error_handler)
d003868e
AM
581 (_("%B: 0x%lx: warning: R_SH_USES points to unrecognized insn 0x%x"),
582 abfd, (unsigned long) irel->r_offset, insn));
252b5132
RH
583 continue;
584 }
585
586 /* Get the address from which the register is being loaded. The
99e4ae17
AJ
587 displacement in the mov.l instruction is quadrupled. It is a
588 displacement from four bytes after the movl instruction, but,
589 before adding in the PC address, two least significant bits
590 of the PC are cleared. We assume that the section is aligned
591 on a four byte boundary. */
252b5132
RH
592 paddr = insn & 0xff;
593 paddr *= 4;
dc810e39 594 paddr += (laddr + 4) &~ (bfd_vma) 3;
eea6121a 595 if (paddr >= sec->size)
252b5132
RH
596 {
597 ((*_bfd_error_handler)
d003868e
AM
598 (_("%B: 0x%lx: warning: bad R_SH_USES load offset"),
599 abfd, (unsigned long) irel->r_offset));
252b5132
RH
600 continue;
601 }
602
603 /* Get the reloc for the address from which the register is
067653c5
AM
604 being loaded. This reloc will tell us which function is
605 actually being called. */
252b5132
RH
606 for (irelfn = internal_relocs; irelfn < irelend; irelfn++)
607 if (irelfn->r_offset == paddr
608 && ELF32_R_TYPE (irelfn->r_info) == (int) R_SH_DIR32)
609 break;
610 if (irelfn >= irelend)
611 {
612 ((*_bfd_error_handler)
d003868e
AM
613 (_("%B: 0x%lx: warning: could not find expected reloc"),
614 abfd, (unsigned long) paddr));
252b5132
RH
615 continue;
616 }
617
618 /* Read this BFD's symbols if we haven't done so already. */
6cdc0ccc 619 if (isymbuf == NULL && symtab_hdr->sh_info != 0)
252b5132 620 {
6cdc0ccc
AM
621 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
622 if (isymbuf == NULL)
623 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
624 symtab_hdr->sh_info, 0,
625 NULL, NULL, NULL);
626 if (isymbuf == NULL)
627 goto error_return;
252b5132
RH
628 }
629
630 /* Get the value of the symbol referred to by the reloc. */
631 if (ELF32_R_SYM (irelfn->r_info) < symtab_hdr->sh_info)
632 {
9ad5cbcf 633 /* A local symbol. */
6cdc0ccc 634 Elf_Internal_Sym *isym;
252b5132 635
6cdc0ccc
AM
636 isym = isymbuf + ELF32_R_SYM (irelfn->r_info);
637 if (isym->st_shndx
d426c6b0 638 != (unsigned int) _bfd_elf_section_from_bfd_section (abfd, sec))
252b5132
RH
639 {
640 ((*_bfd_error_handler)
d003868e
AM
641 (_("%B: 0x%lx: warning: symbol in unexpected section"),
642 abfd, (unsigned long) paddr));
252b5132
RH
643 continue;
644 }
645
6cdc0ccc 646 symval = (isym->st_value
252b5132
RH
647 + sec->output_section->vma
648 + sec->output_offset);
649 }
650 else
651 {
652 unsigned long indx;
653 struct elf_link_hash_entry *h;
654
655 indx = ELF32_R_SYM (irelfn->r_info) - symtab_hdr->sh_info;
656 h = elf_sym_hashes (abfd)[indx];
657 BFD_ASSERT (h != NULL);
658 if (h->root.type != bfd_link_hash_defined
659 && h->root.type != bfd_link_hash_defweak)
660 {
661 /* This appears to be a reference to an undefined
067653c5
AM
662 symbol. Just ignore it--it will be caught by the
663 regular reloc processing. */
252b5132
RH
664 continue;
665 }
666
667 symval = (h->root.u.def.value
668 + h->root.u.def.section->output_section->vma
669 + h->root.u.def.section->output_offset);
670 }
671
55e6e397
RS
672 if (get_howto_table (abfd)[R_SH_DIR32].partial_inplace)
673 symval += bfd_get_32 (abfd, contents + paddr);
674 else
675 symval += irelfn->r_addend;
252b5132
RH
676
677 /* See if this function call can be shortened. */
678 foff = (symval
679 - (irel->r_offset
680 + sec->output_section->vma
681 + sec->output_offset
682 + 4));
f725025b
DD
683 /* A branch to an address beyond ours might be increased by an
684 .align that doesn't move when bytes behind us are deleted.
685 So, we add some slop in this calculation to allow for
686 that. */
687 if (foff < -0x1000 || foff >= 0x1000 - 8)
252b5132
RH
688 {
689 /* After all that work, we can't shorten this function call. */
690 continue;
691 }
692
693 /* Shorten the function call. */
694
695 /* For simplicity of coding, we are going to modify the section
696 contents, the section relocs, and the BFD symbol table. We
697 must tell the rest of the code not to free up this
698 information. It would be possible to instead create a table
699 of changes which have to be made, as is done in coff-mips.c;
700 that would be more work, but would require less memory when
701 the linker is run. */
702
703 elf_section_data (sec)->relocs = internal_relocs;
252b5132 704 elf_section_data (sec)->this_hdr.contents = contents;
6cdc0ccc 705 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132
RH
706
707 /* Replace the jsr with a bsr. */
708
709 /* Change the R_SH_USES reloc into an R_SH_IND12W reloc, and
067653c5 710 replace the jsr with a bsr. */
252b5132 711 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irelfn->r_info), R_SH_IND12W);
bdfaef52
JR
712 /* We used to test (ELF32_R_SYM (irelfn->r_info) < symtab_hdr->sh_info)
713 here, but that only checks if the symbol is an external symbol,
714 not if the symbol is in a different section. Besides, we need
715 a consistent meaning for the relocation, so we just assume here that
716 the value of the symbol is not available. */
0e71e495
BE
717
718 /* We can't fully resolve this yet, because the external
719 symbol value may be changed by future relaxing. We let
720 the final link phase handle it. */
721 bfd_put_16 (abfd, (bfd_vma) 0xb000, contents + irel->r_offset);
722
bdfaef52 723 irel->r_addend = -4;
252b5132 724
f725025b
DD
725 /* When we calculated the symbol "value" we had an offset in the
726 DIR32's word in memory (we read and add it above). However,
727 the jsr we create does NOT have this offset encoded, so we
728 have to add it to the addend to preserve it. */
729 irel->r_addend += bfd_get_32 (abfd, contents + paddr);
730
252b5132 731 /* See if there is another R_SH_USES reloc referring to the same
067653c5 732 register load. */
252b5132
RH
733 for (irelscan = internal_relocs; irelscan < irelend; irelscan++)
734 if (ELF32_R_TYPE (irelscan->r_info) == (int) R_SH_USES
735 && laddr == irelscan->r_offset + 4 + irelscan->r_addend)
736 break;
737 if (irelscan < irelend)
738 {
739 /* Some other function call depends upon this register load,
740 and we have not yet converted that function call.
741 Indeed, we may never be able to convert it. There is
742 nothing else we can do at this point. */
743 continue;
744 }
745
746 /* Look for a R_SH_COUNT reloc on the location where the
067653c5
AM
747 function address is stored. Do this before deleting any
748 bytes, to avoid confusion about the address. */
252b5132
RH
749 for (irelcount = internal_relocs; irelcount < irelend; irelcount++)
750 if (irelcount->r_offset == paddr
751 && ELF32_R_TYPE (irelcount->r_info) == (int) R_SH_COUNT)
752 break;
753
754 /* Delete the register load. */
755 if (! sh_elf_relax_delete_bytes (abfd, sec, laddr, 2))
756 goto error_return;
757
758 /* That will change things, so, just in case it permits some
067653c5
AM
759 other function call to come within range, we should relax
760 again. Note that this is not required, and it may be slow. */
b34976b6 761 *again = TRUE;
252b5132
RH
762
763 /* Now check whether we got a COUNT reloc. */
764 if (irelcount >= irelend)
765 {
766 ((*_bfd_error_handler)
d003868e
AM
767 (_("%B: 0x%lx: warning: could not find expected COUNT reloc"),
768 abfd, (unsigned long) paddr));
252b5132
RH
769 continue;
770 }
771
772 /* The number of uses is stored in the r_addend field. We've
067653c5 773 just deleted one. */
252b5132
RH
774 if (irelcount->r_addend == 0)
775 {
d003868e
AM
776 ((*_bfd_error_handler) (_("%B: 0x%lx: warning: bad count"),
777 abfd,
252b5132
RH
778 (unsigned long) paddr));
779 continue;
780 }
781
782 --irelcount->r_addend;
783
784 /* If there are no more uses, we can delete the address. Reload
067653c5
AM
785 the address from irelfn, in case it was changed by the
786 previous call to sh_elf_relax_delete_bytes. */
252b5132
RH
787 if (irelcount->r_addend == 0)
788 {
789 if (! sh_elf_relax_delete_bytes (abfd, sec, irelfn->r_offset, 4))
790 goto error_return;
791 }
792
793 /* We've done all we can with that function call. */
794 }
795
796 /* Look for load and store instructions that we can align on four
797 byte boundaries. */
bdfaef52
JR
798 if ((elf_elfheader (abfd)->e_flags & EF_SH_MACH_MASK) != EF_SH4
799 && have_code)
252b5132 800 {
b34976b6 801 bfd_boolean swapped;
252b5132
RH
802
803 /* Get the section contents. */
804 if (contents == NULL)
805 {
806 if (elf_section_data (sec)->this_hdr.contents != NULL)
807 contents = elf_section_data (sec)->this_hdr.contents;
808 else
809 {
eea6121a 810 if (!bfd_malloc_and_get_section (abfd, sec, &contents))
252b5132
RH
811 goto error_return;
812 }
813 }
814
815 if (! sh_elf_align_loads (abfd, sec, internal_relocs, contents,
816 &swapped))
817 goto error_return;
818
819 if (swapped)
820 {
821 elf_section_data (sec)->relocs = internal_relocs;
252b5132 822 elf_section_data (sec)->this_hdr.contents = contents;
6cdc0ccc 823 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132
RH
824 }
825 }
826
6cdc0ccc
AM
827 if (isymbuf != NULL
828 && symtab_hdr->contents != (unsigned char *) isymbuf)
252b5132
RH
829 {
830 if (! link_info->keep_memory)
6cdc0ccc 831 free (isymbuf);
252b5132
RH
832 else
833 {
6cdc0ccc
AM
834 /* Cache the symbols for elf_link_input_bfd. */
835 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 836 }
9ad5cbcf
AM
837 }
838
6cdc0ccc
AM
839 if (contents != NULL
840 && elf_section_data (sec)->this_hdr.contents != contents)
252b5132
RH
841 {
842 if (! link_info->keep_memory)
6cdc0ccc
AM
843 free (contents);
844 else
252b5132 845 {
6cdc0ccc
AM
846 /* Cache the section contents for elf_link_input_bfd. */
847 elf_section_data (sec)->this_hdr.contents = contents;
252b5132 848 }
252b5132
RH
849 }
850
6cdc0ccc
AM
851 if (internal_relocs != NULL
852 && elf_section_data (sec)->relocs != internal_relocs)
853 free (internal_relocs);
854
b34976b6 855 return TRUE;
252b5132
RH
856
857 error_return:
6cdc0ccc
AM
858 if (isymbuf != NULL
859 && symtab_hdr->contents != (unsigned char *) isymbuf)
860 free (isymbuf);
861 if (contents != NULL
862 && elf_section_data (sec)->this_hdr.contents != contents)
863 free (contents);
864 if (internal_relocs != NULL
865 && elf_section_data (sec)->relocs != internal_relocs)
866 free (internal_relocs);
9ad5cbcf 867
b34976b6 868 return FALSE;
252b5132
RH
869}
870
871/* Delete some bytes from a section while relaxing. FIXME: There is a
872 lot of duplication between this function and sh_relax_delete_bytes
873 in coff-sh.c. */
874
b34976b6 875static bfd_boolean
09fd220b
KK
876sh_elf_relax_delete_bytes (bfd *abfd, asection *sec, bfd_vma addr,
877 int count)
252b5132
RH
878{
879 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 880 unsigned int sec_shndx;
252b5132
RH
881 bfd_byte *contents;
882 Elf_Internal_Rela *irel, *irelend;
883 Elf_Internal_Rela *irelalign;
884 bfd_vma toaddr;
6cdc0ccc 885 Elf_Internal_Sym *isymbuf, *isym, *isymend;
9ad5cbcf
AM
886 struct elf_link_hash_entry **sym_hashes;
887 struct elf_link_hash_entry **end_hashes;
888 unsigned int symcount;
252b5132
RH
889 asection *o;
890
0ffa91dd 891 symtab_hdr = &elf_symtab_hdr (abfd);
6cdc0ccc 892 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
9ad5cbcf
AM
893
894 sec_shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132
RH
895
896 contents = elf_section_data (sec)->this_hdr.contents;
897
898 /* The deletion must stop at the next ALIGN reloc for an aligment
899 power larger than the number of bytes we are deleting. */
900
901 irelalign = NULL;
eea6121a 902 toaddr = sec->size;
252b5132
RH
903
904 irel = elf_section_data (sec)->relocs;
905 irelend = irel + sec->reloc_count;
906 for (; irel < irelend; irel++)
907 {
908 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_ALIGN
909 && irel->r_offset > addr
910 && count < (1 << irel->r_addend))
911 {
912 irelalign = irel;
913 toaddr = irel->r_offset;
914 break;
915 }
916 }
917
918 /* Actually delete the bytes. */
dc810e39
AM
919 memmove (contents + addr, contents + addr + count,
920 (size_t) (toaddr - addr - count));
252b5132 921 if (irelalign == NULL)
eea6121a 922 sec->size -= count;
252b5132
RH
923 else
924 {
925 int i;
926
927#define NOP_OPCODE (0x0009)
928
929 BFD_ASSERT ((count & 1) == 0);
930 for (i = 0; i < count; i += 2)
dc810e39 931 bfd_put_16 (abfd, (bfd_vma) NOP_OPCODE, contents + toaddr - count + i);
252b5132
RH
932 }
933
934 /* Adjust all the relocs. */
935 for (irel = elf_section_data (sec)->relocs; irel < irelend; irel++)
936 {
937 bfd_vma nraddr, stop;
938 bfd_vma start = 0;
939 int insn = 0;
252b5132
RH
940 int off, adjust, oinsn;
941 bfd_signed_vma voff = 0;
b34976b6 942 bfd_boolean overflow;
252b5132
RH
943
944 /* Get the new reloc address. */
945 nraddr = irel->r_offset;
946 if ((irel->r_offset > addr
947 && irel->r_offset < toaddr)
948 || (ELF32_R_TYPE (irel->r_info) == (int) R_SH_ALIGN
949 && irel->r_offset == toaddr))
950 nraddr -= count;
951
952 /* See if this reloc was for the bytes we have deleted, in which
953 case we no longer care about it. Don't delete relocs which
954 represent addresses, though. */
955 if (irel->r_offset >= addr
956 && irel->r_offset < addr + count
957 && ELF32_R_TYPE (irel->r_info) != (int) R_SH_ALIGN
958 && ELF32_R_TYPE (irel->r_info) != (int) R_SH_CODE
959 && ELF32_R_TYPE (irel->r_info) != (int) R_SH_DATA
960 && ELF32_R_TYPE (irel->r_info) != (int) R_SH_LABEL)
961 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
962 (int) R_SH_NONE);
963
964 /* If this is a PC relative reloc, see if the range it covers
067653c5 965 includes the bytes we have deleted. */
252b5132
RH
966 switch ((enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info))
967 {
968 default:
969 break;
970
971 case R_SH_DIR8WPN:
972 case R_SH_IND12W:
973 case R_SH_DIR8WPZ:
974 case R_SH_DIR8WPL:
975 start = irel->r_offset;
976 insn = bfd_get_16 (abfd, contents + nraddr);
977 break;
978 }
979
980 switch ((enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info))
981 {
982 default:
983 start = stop = addr;
984 break;
985
986 case R_SH_DIR32:
987 /* If this reloc is against a symbol defined in this
067653c5
AM
988 section, and the symbol will not be adjusted below, we
989 must check the addend to see it will put the value in
990 range to be adjusted, and hence must be changed. */
252b5132
RH
991 if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
992 {
6cdc0ccc
AM
993 isym = isymbuf + ELF32_R_SYM (irel->r_info);
994 if (isym->st_shndx == sec_shndx
995 && (isym->st_value <= addr
996 || isym->st_value >= toaddr))
252b5132
RH
997 {
998 bfd_vma val;
999
55e6e397
RS
1000 if (get_howto_table (abfd)[R_SH_DIR32].partial_inplace)
1001 {
1002 val = bfd_get_32 (abfd, contents + nraddr);
1003 val += isym->st_value;
1004 if (val > addr && val < toaddr)
1005 bfd_put_32 (abfd, val - count, contents + nraddr);
1006 }
1007 else
1008 {
1009 val = isym->st_value + irel->r_addend;
1010 if (val > addr && val < toaddr)
1011 irel->r_addend -= count;
1012 }
252b5132
RH
1013 }
1014 }
1015 start = stop = addr;
1016 break;
1017
1018 case R_SH_DIR8WPN:
1019 off = insn & 0xff;
1020 if (off & 0x80)
1021 off -= 0x100;
1022 stop = (bfd_vma) ((bfd_signed_vma) start + 4 + off * 2);
1023 break;
1024
1025 case R_SH_IND12W:
bdfaef52
JR
1026 off = insn & 0xfff;
1027 if (! off)
1028 {
1029 /* This has been made by previous relaxation. Since the
1030 relocation will be against an external symbol, the
1031 final relocation will just do the right thing. */
1032 start = stop = addr;
1033 }
252b5132
RH
1034 else
1035 {
252b5132
RH
1036 if (off & 0x800)
1037 off -= 0x1000;
1038 stop = (bfd_vma) ((bfd_signed_vma) start + 4 + off * 2);
bdfaef52
JR
1039
1040 /* The addend will be against the section symbol, thus
1041 for adjusting the addend, the relevant start is the
1042 start of the section.
4cc11e76 1043 N.B. If we want to abandon in-place changes here and
bdfaef52
JR
1044 test directly using symbol + addend, we have to take into
1045 account that the addend has already been adjusted by -4. */
1046 if (stop > addr && stop < toaddr)
1047 irel->r_addend -= count;
252b5132
RH
1048 }
1049 break;
1050
1051 case R_SH_DIR8WPZ:
1052 off = insn & 0xff;
1053 stop = start + 4 + off * 2;
1054 break;
1055
1056 case R_SH_DIR8WPL:
1057 off = insn & 0xff;
435b1e90 1058 stop = (start & ~(bfd_vma) 3) + 4 + off * 4;
252b5132
RH
1059 break;
1060
1061 case R_SH_SWITCH8:
1062 case R_SH_SWITCH16:
1063 case R_SH_SWITCH32:
1064 /* These relocs types represent
1065 .word L2-L1
06e1ba78 1066 The r_addend field holds the difference between the reloc
252b5132
RH
1067 address and L1. That is the start of the reloc, and
1068 adding in the contents gives us the top. We must adjust
06e1ba78
JR
1069 both the r_offset field and the section contents.
1070 N.B. in gas / coff bfd, the elf bfd r_addend is called r_offset,
1071 and the elf bfd r_offset is called r_vaddr. */
252b5132 1072
06e1ba78
JR
1073 stop = irel->r_offset;
1074 start = (bfd_vma) ((bfd_signed_vma) stop - (long) irel->r_addend);
252b5132
RH
1075
1076 if (start > addr
1077 && start < toaddr
1078 && (stop <= addr || stop >= toaddr))
1079 irel->r_addend += count;
1080 else if (stop > addr
1081 && stop < toaddr
1082 && (start <= addr || start >= toaddr))
1083 irel->r_addend -= count;
1084
252b5132
RH
1085 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_SWITCH16)
1086 voff = bfd_get_signed_16 (abfd, contents + nraddr);
1087 else if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_SWITCH8)
1088 voff = bfd_get_8 (abfd, contents + nraddr);
1089 else
1090 voff = bfd_get_signed_32 (abfd, contents + nraddr);
1091 stop = (bfd_vma) ((bfd_signed_vma) start + voff);
1092
1093 break;
1094
1095 case R_SH_USES:
1096 start = irel->r_offset;
1097 stop = (bfd_vma) ((bfd_signed_vma) start
1098 + (long) irel->r_addend
1099 + 4);
1100 break;
1101 }
1102
1103 if (start > addr
1104 && start < toaddr
1105 && (stop <= addr || stop >= toaddr))
1106 adjust = count;
1107 else if (stop > addr
1108 && stop < toaddr
1109 && (start <= addr || start >= toaddr))
1110 adjust = - count;
1111 else
1112 adjust = 0;
1113
1114 if (adjust != 0)
1115 {
1116 oinsn = insn;
b34976b6 1117 overflow = FALSE;
252b5132
RH
1118 switch ((enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info))
1119 {
1120 default:
1121 abort ();
1122 break;
1123
1124 case R_SH_DIR8WPN:
1125 case R_SH_DIR8WPZ:
1126 insn += adjust / 2;
1127 if ((oinsn & 0xff00) != (insn & 0xff00))
b34976b6 1128 overflow = TRUE;
dc810e39 1129 bfd_put_16 (abfd, (bfd_vma) insn, contents + nraddr);
252b5132
RH
1130 break;
1131
1132 case R_SH_IND12W:
1133 insn += adjust / 2;
1134 if ((oinsn & 0xf000) != (insn & 0xf000))
b34976b6 1135 overflow = TRUE;
dc810e39 1136 bfd_put_16 (abfd, (bfd_vma) insn, contents + nraddr);
252b5132
RH
1137 break;
1138
1139 case R_SH_DIR8WPL:
1140 BFD_ASSERT (adjust == count || count >= 4);
1141 if (count >= 4)
1142 insn += adjust / 4;
1143 else
1144 {
1145 if ((irel->r_offset & 3) == 0)
1146 ++insn;
1147 }
1148 if ((oinsn & 0xff00) != (insn & 0xff00))
b34976b6 1149 overflow = TRUE;
dc810e39 1150 bfd_put_16 (abfd, (bfd_vma) insn, contents + nraddr);
252b5132
RH
1151 break;
1152
851cde10
JR
1153 case R_SH_SWITCH8:
1154 voff += adjust;
1155 if (voff < 0 || voff >= 0xff)
b34976b6 1156 overflow = TRUE;
851cde10
JR
1157 bfd_put_8 (abfd, voff, contents + nraddr);
1158 break;
1159
252b5132
RH
1160 case R_SH_SWITCH16:
1161 voff += adjust;
1162 if (voff < - 0x8000 || voff >= 0x8000)
b34976b6 1163 overflow = TRUE;
dc810e39 1164 bfd_put_signed_16 (abfd, (bfd_vma) voff, contents + nraddr);
252b5132
RH
1165 break;
1166
1167 case R_SH_SWITCH32:
1168 voff += adjust;
dc810e39 1169 bfd_put_signed_32 (abfd, (bfd_vma) voff, contents + nraddr);
252b5132
RH
1170 break;
1171
1172 case R_SH_USES:
1173 irel->r_addend += adjust;
1174 break;
1175 }
1176
1177 if (overflow)
1178 {
1179 ((*_bfd_error_handler)
d003868e
AM
1180 (_("%B: 0x%lx: fatal: reloc overflow while relaxing"),
1181 abfd, (unsigned long) irel->r_offset));
252b5132 1182 bfd_set_error (bfd_error_bad_value);
b34976b6 1183 return FALSE;
252b5132
RH
1184 }
1185 }
1186
1187 irel->r_offset = nraddr;
1188 }
1189
1190 /* Look through all the other sections. If there contain any IMM32
1191 relocs against internal symbols which we are not going to adjust
1192 below, we may need to adjust the addends. */
1193 for (o = abfd->sections; o != NULL; o = o->next)
1194 {
1195 Elf_Internal_Rela *internal_relocs;
1196 Elf_Internal_Rela *irelscan, *irelscanend;
1197 bfd_byte *ocontents;
1198
1199 if (o == sec
1200 || (o->flags & SEC_RELOC) == 0
1201 || o->reloc_count == 0)
1202 continue;
1203
1204 /* We always cache the relocs. Perhaps, if info->keep_memory is
b34976b6 1205 FALSE, we should free them, if we are permitted to, when we
067653c5 1206 leave sh_coff_relax_section. */
45d6a902 1207 internal_relocs = (_bfd_elf_link_read_relocs
09fd220b 1208 (abfd, o, NULL, (Elf_Internal_Rela *) NULL, TRUE));
252b5132 1209 if (internal_relocs == NULL)
b34976b6 1210 return FALSE;
252b5132
RH
1211
1212 ocontents = NULL;
1213 irelscanend = internal_relocs + o->reloc_count;
1214 for (irelscan = internal_relocs; irelscan < irelscanend; irelscan++)
1215 {
084aa3aa
JR
1216 /* Dwarf line numbers use R_SH_SWITCH32 relocs. */
1217 if (ELF32_R_TYPE (irelscan->r_info) == (int) R_SH_SWITCH32)
1218 {
1219 bfd_vma start, stop;
1220 bfd_signed_vma voff;
1221
1222 if (ocontents == NULL)
1223 {
1224 if (elf_section_data (o)->this_hdr.contents != NULL)
1225 ocontents = elf_section_data (o)->this_hdr.contents;
1226 else
1227 {
1228 /* We always cache the section contents.
b34976b6 1229 Perhaps, if info->keep_memory is FALSE, we
067653c5
AM
1230 should free them, if we are permitted to,
1231 when we leave sh_coff_relax_section. */
eea6121a
AM
1232 if (!bfd_malloc_and_get_section (abfd, o, &ocontents))
1233 {
1234 if (ocontents != NULL)
1235 free (ocontents);
1236 return FALSE;
1237 }
1238
084aa3aa
JR
1239 elf_section_data (o)->this_hdr.contents = ocontents;
1240 }
1241 }
1242
1243 stop = irelscan->r_offset;
1244 start
1245 = (bfd_vma) ((bfd_signed_vma) stop - (long) irelscan->r_addend);
1246
1247 /* STOP is in a different section, so it won't change. */
1248 if (start > addr && start < toaddr)
1249 irelscan->r_addend += count;
1250
1251 voff = bfd_get_signed_32 (abfd, ocontents + irelscan->r_offset);
1252 stop = (bfd_vma) ((bfd_signed_vma) start + voff);
1253
1254 if (start > addr
1255 && start < toaddr
1256 && (stop <= addr || stop >= toaddr))
dc810e39 1257 bfd_put_signed_32 (abfd, (bfd_vma) voff + count,
084aa3aa
JR
1258 ocontents + irelscan->r_offset);
1259 else if (stop > addr
1260 && stop < toaddr
1261 && (start <= addr || start >= toaddr))
dc810e39 1262 bfd_put_signed_32 (abfd, (bfd_vma) voff - count,
084aa3aa
JR
1263 ocontents + irelscan->r_offset);
1264 }
1265
252b5132
RH
1266 if (ELF32_R_TYPE (irelscan->r_info) != (int) R_SH_DIR32)
1267 continue;
1268
1269 if (ELF32_R_SYM (irelscan->r_info) >= symtab_hdr->sh_info)
1270 continue;
1271
252b5132 1272
6cdc0ccc
AM
1273 isym = isymbuf + ELF32_R_SYM (irelscan->r_info);
1274 if (isym->st_shndx == sec_shndx
1275 && (isym->st_value <= addr
1276 || isym->st_value >= toaddr))
252b5132
RH
1277 {
1278 bfd_vma val;
1279
1280 if (ocontents == NULL)
1281 {
1282 if (elf_section_data (o)->this_hdr.contents != NULL)
1283 ocontents = elf_section_data (o)->this_hdr.contents;
1284 else
1285 {
1286 /* We always cache the section contents.
b34976b6 1287 Perhaps, if info->keep_memory is FALSE, we
067653c5
AM
1288 should free them, if we are permitted to,
1289 when we leave sh_coff_relax_section. */
eea6121a
AM
1290 if (!bfd_malloc_and_get_section (abfd, o, &ocontents))
1291 {
1292 if (ocontents != NULL)
1293 free (ocontents);
1294 return FALSE;
1295 }
1296
252b5132
RH
1297 elf_section_data (o)->this_hdr.contents = ocontents;
1298 }
1299 }
1300
1301 val = bfd_get_32 (abfd, ocontents + irelscan->r_offset);
6cdc0ccc 1302 val += isym->st_value;
252b5132
RH
1303 if (val > addr && val < toaddr)
1304 bfd_put_32 (abfd, val - count,
1305 ocontents + irelscan->r_offset);
1306 }
1307 }
1308 }
1309
1310 /* Adjust the local symbols defined in this section. */
6cdc0ccc
AM
1311 isymend = isymbuf + symtab_hdr->sh_info;
1312 for (isym = isymbuf; isym < isymend; isym++)
252b5132 1313 {
6cdc0ccc
AM
1314 if (isym->st_shndx == sec_shndx
1315 && isym->st_value > addr
1316 && isym->st_value < toaddr)
1317 isym->st_value -= count;
252b5132
RH
1318 }
1319
1320 /* Now adjust the global symbols defined in this section. */
9ad5cbcf
AM
1321 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
1322 - symtab_hdr->sh_info);
1323 sym_hashes = elf_sym_hashes (abfd);
1324 end_hashes = sym_hashes + symcount;
1325 for (; sym_hashes < end_hashes; sym_hashes++)
252b5132 1326 {
9ad5cbcf
AM
1327 struct elf_link_hash_entry *sym_hash = *sym_hashes;
1328 if ((sym_hash->root.type == bfd_link_hash_defined
1329 || sym_hash->root.type == bfd_link_hash_defweak)
1330 && sym_hash->root.u.def.section == sec
1331 && sym_hash->root.u.def.value > addr
1332 && sym_hash->root.u.def.value < toaddr)
252b5132 1333 {
9ad5cbcf 1334 sym_hash->root.u.def.value -= count;
252b5132
RH
1335 }
1336 }
1337
1338 /* See if we can move the ALIGN reloc forward. We have adjusted
1339 r_offset for it already. */
1340 if (irelalign != NULL)
1341 {
1342 bfd_vma alignto, alignaddr;
1343
1344 alignto = BFD_ALIGN (toaddr, 1 << irelalign->r_addend);
1345 alignaddr = BFD_ALIGN (irelalign->r_offset,
1346 1 << irelalign->r_addend);
1347 if (alignto != alignaddr)
1348 {
1349 /* Tail recursion. */
1350 return sh_elf_relax_delete_bytes (abfd, sec, alignaddr,
dc810e39 1351 (int) (alignto - alignaddr));
252b5132
RH
1352 }
1353 }
1354
b34976b6 1355 return TRUE;
252b5132
RH
1356}
1357
1358/* Look for loads and stores which we can align to four byte
1359 boundaries. This is like sh_align_loads in coff-sh.c. */
1360
b34976b6 1361static bfd_boolean
09fd220b
KK
1362sh_elf_align_loads (bfd *abfd ATTRIBUTE_UNUSED, asection *sec,
1363 Elf_Internal_Rela *internal_relocs,
1364 bfd_byte *contents ATTRIBUTE_UNUSED,
1365 bfd_boolean *pswapped)
252b5132
RH
1366{
1367 Elf_Internal_Rela *irel, *irelend;
1368 bfd_vma *labels = NULL;
1369 bfd_vma *label, *label_end;
dc810e39 1370 bfd_size_type amt;
252b5132 1371
b34976b6 1372 *pswapped = FALSE;
252b5132
RH
1373
1374 irelend = internal_relocs + sec->reloc_count;
1375
1376 /* Get all the addresses with labels on them. */
dc810e39
AM
1377 amt = sec->reloc_count;
1378 amt *= sizeof (bfd_vma);
1379 labels = (bfd_vma *) bfd_malloc (amt);
252b5132
RH
1380 if (labels == NULL)
1381 goto error_return;
1382 label_end = labels;
1383 for (irel = internal_relocs; irel < irelend; irel++)
1384 {
1385 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_LABEL)
1386 {
1387 *label_end = irel->r_offset;
1388 ++label_end;
1389 }
1390 }
1391
1392 /* Note that the assembler currently always outputs relocs in
1393 address order. If that ever changes, this code will need to sort
1394 the label values and the relocs. */
1395
1396 label = labels;
1397
1398 for (irel = internal_relocs; irel < irelend; irel++)
1399 {
1400 bfd_vma start, stop;
1401
1402 if (ELF32_R_TYPE (irel->r_info) != (int) R_SH_CODE)
1403 continue;
1404
1405 start = irel->r_offset;
1406
1407 for (irel++; irel < irelend; irel++)
1408 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_DATA)
1409 break;
1410 if (irel < irelend)
1411 stop = irel->r_offset;
1412 else
eea6121a 1413 stop = sec->size;
252b5132
RH
1414
1415 if (! _bfd_sh_align_load_span (abfd, sec, contents, sh_elf_swap_insns,
09fd220b 1416 internal_relocs, &label,
252b5132
RH
1417 label_end, start, stop, pswapped))
1418 goto error_return;
1419 }
1420
1421 free (labels);
1422
b34976b6 1423 return TRUE;
252b5132
RH
1424
1425 error_return:
1426 if (labels != NULL)
1427 free (labels);
b34976b6 1428 return FALSE;
252b5132
RH
1429}
1430
85fbca6a 1431#ifndef SH64_ELF
252b5132
RH
1432/* Swap two SH instructions. This is like sh_swap_insns in coff-sh.c. */
1433
b34976b6 1434static bfd_boolean
09fd220b
KK
1435sh_elf_swap_insns (bfd *abfd, asection *sec, void *relocs,
1436 bfd_byte *contents, bfd_vma addr)
252b5132
RH
1437{
1438 Elf_Internal_Rela *internal_relocs = (Elf_Internal_Rela *) relocs;
1439 unsigned short i1, i2;
1440 Elf_Internal_Rela *irel, *irelend;
1441
1442 /* Swap the instructions themselves. */
1443 i1 = bfd_get_16 (abfd, contents + addr);
1444 i2 = bfd_get_16 (abfd, contents + addr + 2);
dc810e39
AM
1445 bfd_put_16 (abfd, (bfd_vma) i2, contents + addr);
1446 bfd_put_16 (abfd, (bfd_vma) i1, contents + addr + 2);
252b5132
RH
1447
1448 /* Adjust all reloc addresses. */
1449 irelend = internal_relocs + sec->reloc_count;
1450 for (irel = internal_relocs; irel < irelend; irel++)
1451 {
1452 enum elf_sh_reloc_type type;
1453 int add;
1454
1455 /* There are a few special types of relocs that we don't want to
067653c5
AM
1456 adjust. These relocs do not apply to the instruction itself,
1457 but are only associated with the address. */
252b5132
RH
1458 type = (enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info);
1459 if (type == R_SH_ALIGN
1460 || type == R_SH_CODE
1461 || type == R_SH_DATA
1462 || type == R_SH_LABEL)
1463 continue;
1464
1465 /* If an R_SH_USES reloc points to one of the addresses being
067653c5
AM
1466 swapped, we must adjust it. It would be incorrect to do this
1467 for a jump, though, since we want to execute both
1468 instructions after the jump. (We have avoided swapping
1469 around a label, so the jump will not wind up executing an
1470 instruction it shouldn't). */
252b5132
RH
1471 if (type == R_SH_USES)
1472 {
1473 bfd_vma off;
1474
1475 off = irel->r_offset + 4 + irel->r_addend;
1476 if (off == addr)
1477 irel->r_offset += 2;
1478 else if (off == addr + 2)
1479 irel->r_offset -= 2;
1480 }
1481
1482 if (irel->r_offset == addr)
1483 {
1484 irel->r_offset += 2;
1485 add = -2;
1486 }
1487 else if (irel->r_offset == addr + 2)
1488 {
1489 irel->r_offset -= 2;
1490 add = 2;
1491 }
1492 else
1493 add = 0;
1494
1495 if (add != 0)
1496 {
1497 bfd_byte *loc;
1498 unsigned short insn, oinsn;
b34976b6 1499 bfd_boolean overflow;
252b5132
RH
1500
1501 loc = contents + irel->r_offset;
b34976b6 1502 overflow = FALSE;
252b5132
RH
1503 switch (type)
1504 {
1505 default:
1506 break;
1507
1508 case R_SH_DIR8WPN:
1509 case R_SH_DIR8WPZ:
1510 insn = bfd_get_16 (abfd, loc);
1511 oinsn = insn;
1512 insn += add / 2;
1513 if ((oinsn & 0xff00) != (insn & 0xff00))
b34976b6 1514 overflow = TRUE;
dc810e39 1515 bfd_put_16 (abfd, (bfd_vma) insn, loc);
252b5132
RH
1516 break;
1517
1518 case R_SH_IND12W:
1519 insn = bfd_get_16 (abfd, loc);
1520 oinsn = insn;
1521 insn += add / 2;
1522 if ((oinsn & 0xf000) != (insn & 0xf000))
b34976b6 1523 overflow = TRUE;
dc810e39 1524 bfd_put_16 (abfd, (bfd_vma) insn, loc);
252b5132
RH
1525 break;
1526
1527 case R_SH_DIR8WPL:
1528 /* This reloc ignores the least significant 3 bits of
067653c5
AM
1529 the program counter before adding in the offset.
1530 This means that if ADDR is at an even address, the
1531 swap will not affect the offset. If ADDR is an at an
1532 odd address, then the instruction will be crossing a
1533 four byte boundary, and must be adjusted. */
252b5132
RH
1534 if ((addr & 3) != 0)
1535 {
1536 insn = bfd_get_16 (abfd, loc);
1537 oinsn = insn;
1538 insn += add / 2;
1539 if ((oinsn & 0xff00) != (insn & 0xff00))
b34976b6 1540 overflow = TRUE;
dc810e39 1541 bfd_put_16 (abfd, (bfd_vma) insn, loc);
252b5132
RH
1542 }
1543
1544 break;
1545 }
1546
1547 if (overflow)
1548 {
1549 ((*_bfd_error_handler)
d003868e
AM
1550 (_("%B: 0x%lx: fatal: reloc overflow while relaxing"),
1551 abfd, (unsigned long) irel->r_offset));
252b5132 1552 bfd_set_error (bfd_error_bad_value);
b34976b6 1553 return FALSE;
252b5132
RH
1554 }
1555 }
1556 }
1557
b34976b6 1558 return TRUE;
252b5132 1559}
85fbca6a 1560#endif /* defined SH64_ELF */
252b5132 1561\f
55e6e397
RS
1562/* Describes one of the various PLT styles. */
1563
1564struct elf_sh_plt_info
1565{
1566 /* The template for the first PLT entry, or NULL if there is no special
1567 first entry. */
1568 const bfd_byte *plt0_entry;
1569
1570 /* The size of PLT0_ENTRY in bytes, or 0 if PLT0_ENTRY is NULL. */
1571 bfd_vma plt0_entry_size;
1572
1573 /* Index I is the offset into PLT0_ENTRY of a pointer to
1574 _GLOBAL_OFFSET_TABLE_ + I * 4. The value is MINUS_ONE
1575 if there is no such pointer. */
1576 bfd_vma plt0_got_fields[3];
1577
1578 /* The template for a symbol's PLT entry. */
1579 const bfd_byte *symbol_entry;
1580
1581 /* The size of SYMBOL_ENTRY in bytes. */
1582 bfd_vma symbol_entry_size;
1583
1584 /* Byte offsets of fields in SYMBOL_ENTRY. Not all fields are used
1585 on all targets. The comments by each member indicate the value
1586 that the field must hold. */
1587 struct {
1588 bfd_vma got_entry; /* the address of the symbol's .got.plt entry */
1589 bfd_vma plt; /* .plt (or a branch to .plt on VxWorks) */
1590 bfd_vma reloc_offset; /* the offset of the symbol's JMP_SLOT reloc */
8e45593f
NC
1591 bfd_boolean got20; /* TRUE if got_entry points to a movi20
1592 instruction (instead of a constant pool
1593 entry). */
55e6e397
RS
1594 } symbol_fields;
1595
1596 /* The offset of the resolver stub from the start of SYMBOL_ENTRY. */
1597 bfd_vma symbol_resolve_offset;
8e45593f
NC
1598
1599 /* A different PLT layout which can be used for the first
1600 MAX_SHORT_PLT entries. It must share the same plt0. NULL in
1601 other cases. */
1602 const struct elf_sh_plt_info *short_plt;
55e6e397
RS
1603};
1604
fbca6ad9
AO
1605#ifdef INCLUDE_SHMEDIA
1606
1607/* The size in bytes of an entry in the procedure linkage table. */
1608
55e6e397 1609#define ELF_PLT_ENTRY_SIZE 64
fbca6ad9
AO
1610
1611/* First entry in an absolute procedure linkage table look like this. */
1612
55e6e397 1613static const bfd_byte elf_sh_plt0_entry_be[ELF_PLT_ENTRY_SIZE] =
fbca6ad9
AO
1614{
1615 0xcc, 0x00, 0x01, 0x10, /* movi .got.plt >> 16, r17 */
1616 0xc8, 0x00, 0x01, 0x10, /* shori .got.plt & 65535, r17 */
1617 0x89, 0x10, 0x09, 0x90, /* ld.l r17, 8, r25 */
c8614e8e 1618 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
fbca6ad9
AO
1619 0x89, 0x10, 0x05, 0x10, /* ld.l r17, 4, r17 */
1620 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
1621 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1622 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1623 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1624 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1625 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1626 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1627 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1628 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1629 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1630 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1631};
1632
55e6e397 1633static const bfd_byte elf_sh_plt0_entry_le[ELF_PLT_ENTRY_SIZE] =
fbca6ad9
AO
1634{
1635 0x10, 0x01, 0x00, 0xcc, /* movi .got.plt >> 16, r17 */
1636 0x10, 0x01, 0x00, 0xc8, /* shori .got.plt & 65535, r17 */
1637 0x90, 0x09, 0x10, 0x89, /* ld.l r17, 8, r25 */
c8614e8e 1638 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
fbca6ad9
AO
1639 0x10, 0x05, 0x10, 0x89, /* ld.l r17, 4, r17 */
1640 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
1641 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1642 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1643 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1644 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1645 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1646 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1647 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1648 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1649 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1650 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1651};
1652
1653/* Sebsequent entries in an absolute procedure linkage table look like
1654 this. */
1655
55e6e397 1656static const bfd_byte elf_sh_plt_entry_be[ELF_PLT_ENTRY_SIZE] =
fbca6ad9
AO
1657{
1658 0xcc, 0x00, 0x01, 0x90, /* movi nameN-in-GOT >> 16, r25 */
1659 0xc8, 0x00, 0x01, 0x90, /* shori nameN-in-GOT & 65535, r25 */
1660 0x89, 0x90, 0x01, 0x90, /* ld.l r25, 0, r25 */
1661 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
1662 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
1663 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1664 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1665 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1666 0xcc, 0x00, 0x01, 0x90, /* movi .PLT0 >> 16, r25 */
1667 0xc8, 0x00, 0x01, 0x90, /* shori .PLT0 & 65535, r25 */
1668 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
1669 0xcc, 0x00, 0x01, 0x50, /* movi reloc-offset >> 16, r21 */
1670 0xc8, 0x00, 0x01, 0x50, /* shori reloc-offset & 65535, r21 */
1671 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
1672 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1673 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1674};
1675
55e6e397 1676static const bfd_byte elf_sh_plt_entry_le[ELF_PLT_ENTRY_SIZE] =
fbca6ad9
AO
1677{
1678 0x90, 0x01, 0x00, 0xcc, /* movi nameN-in-GOT >> 16, r25 */
1679 0x90, 0x01, 0x00, 0xc8, /* shori nameN-in-GOT & 65535, r25 */
1680 0x90, 0x01, 0x90, 0x89, /* ld.l r25, 0, r25 */
1681 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
1682 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
1683 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1684 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1685 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1686 0x90, 0x01, 0x00, 0xcc, /* movi .PLT0 >> 16, r25 */
1687 0x90, 0x01, 0x00, 0xc8, /* shori .PLT0 & 65535, r25 */
1688 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
1689 0x50, 0x01, 0x00, 0xcc, /* movi reloc-offset >> 16, r21 */
1690 0x50, 0x01, 0x00, 0xc8, /* shori reloc-offset & 65535, r21 */
1691 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
1692 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1693 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1694};
1695
1696/* Entries in a PIC procedure linkage table look like this. */
1697
55e6e397 1698static const bfd_byte elf_sh_pic_plt_entry_be[ELF_PLT_ENTRY_SIZE] =
fbca6ad9
AO
1699{
1700 0xcc, 0x00, 0x01, 0x90, /* movi nameN@GOT >> 16, r25 */
1701 0xc8, 0x00, 0x01, 0x90, /* shori nameN@GOT & 65535, r25 */
1702 0x40, 0xc2, 0x65, 0x90, /* ldx.l r12, r25, r25 */
1703 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
1704 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
1705 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1706 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1707 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1708 0xce, 0x00, 0x01, 0x10, /* movi -GOT_BIAS, r17 */
0a4ef3f4 1709 0x00, 0xc8, 0x45, 0x10, /* add.l r12, r17, r17 */
fbca6ad9
AO
1710 0x89, 0x10, 0x09, 0x90, /* ld.l r17, 8, r25 */
1711 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
1712 0x89, 0x10, 0x05, 0x10, /* ld.l r17, 4, r17 */
1713 0xcc, 0x00, 0x01, 0x50, /* movi reloc-offset >> 16, r21 */
1714 0xc8, 0x00, 0x01, 0x50, /* shori reloc-offset & 65535, r21 */
1715 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
1716};
1717
55e6e397 1718static const bfd_byte elf_sh_pic_plt_entry_le[ELF_PLT_ENTRY_SIZE] =
fbca6ad9
AO
1719{
1720 0x90, 0x01, 0x00, 0xcc, /* movi nameN@GOT >> 16, r25 */
1721 0x90, 0x01, 0x00, 0xc8, /* shori nameN@GOT & 65535, r25 */
1722 0x90, 0x65, 0xc2, 0x40, /* ldx.l r12, r25, r25 */
1723 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
1724 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
1725 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1726 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1727 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1728 0x10, 0x01, 0x00, 0xce, /* movi -GOT_BIAS, r17 */
0a4ef3f4 1729 0x10, 0x45, 0xc8, 0x00, /* add.l r12, r17, r17 */
fbca6ad9
AO
1730 0x90, 0x09, 0x10, 0x89, /* ld.l r17, 8, r25 */
1731 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
1732 0x10, 0x05, 0x10, 0x89, /* ld.l r17, 4, r17 */
1733 0x50, 0x01, 0x00, 0xcc, /* movi reloc-offset >> 16, r21 */
1734 0x50, 0x01, 0x00, 0xc8, /* shori reloc-offset & 65535, r21 */
1735 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
1736};
1737
55e6e397
RS
1738static const struct elf_sh_plt_info elf_sh_plts[2][2] = {
1739 {
1740 {
1741 /* Big-endian non-PIC. */
1742 elf_sh_plt0_entry_be,
1743 ELF_PLT_ENTRY_SIZE,
1744 { 0, MINUS_ONE, MINUS_ONE },
1745 elf_sh_plt_entry_be,
1746 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1747 { 0, 32, 48, FALSE },
1748 33, /* includes ISA encoding */
1749 NULL
55e6e397
RS
1750 },
1751 {
1752 /* Little-endian non-PIC. */
1753 elf_sh_plt0_entry_le,
1754 ELF_PLT_ENTRY_SIZE,
1755 { 0, MINUS_ONE, MINUS_ONE },
1756 elf_sh_plt_entry_le,
1757 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1758 { 0, 32, 48, FALSE },
1759 33, /* includes ISA encoding */
1760 NULL
55e6e397
RS
1761 },
1762 },
1763 {
1764 {
1765 /* Big-endian PIC. */
1766 elf_sh_plt0_entry_be,
1767 ELF_PLT_ENTRY_SIZE,
1768 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1769 elf_sh_pic_plt_entry_be,
1770 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1771 { 0, MINUS_ONE, 52, FALSE },
1772 33, /* includes ISA encoding */
1773 NULL
55e6e397
RS
1774 },
1775 {
1776 /* Little-endian PIC. */
1777 elf_sh_plt0_entry_le,
1778 ELF_PLT_ENTRY_SIZE,
1779 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1780 elf_sh_pic_plt_entry_le,
1781 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1782 { 0, MINUS_ONE, 52, FALSE },
1783 33, /* includes ISA encoding */
1784 NULL
55e6e397
RS
1785 },
1786 }
1787};
fbca6ad9
AO
1788
1789/* Return offset of the linker in PLT0 entry. */
1790#define elf_sh_plt0_gotplt_offset(info) 0
1791
55e6e397
RS
1792/* Install a 32-bit PLT field starting at ADDR, which occurs in OUTPUT_BFD.
1793 VALUE is the field's value and CODE_P is true if VALUE refers to code,
1794 not data.
fbca6ad9 1795
55e6e397 1796 On SH64, each 32-bit field is loaded by a movi/shori pair. */
fbca6ad9
AO
1797
1798inline static void
55e6e397
RS
1799install_plt_field (bfd *output_bfd, bfd_boolean code_p,
1800 unsigned long value, bfd_byte *addr)
fbca6ad9 1801{
55e6e397 1802 value |= code_p;
fbca6ad9
AO
1803 bfd_put_32 (output_bfd,
1804 bfd_get_32 (output_bfd, addr)
1805 | ((value >> 6) & 0x3fffc00),
1806 addr);
1807 bfd_put_32 (output_bfd,
1808 bfd_get_32 (output_bfd, addr + 4)
1809 | ((value << 10) & 0x3fffc00),
1810 addr + 4);
1811}
1812
55e6e397
RS
1813/* Return the type of PLT associated with ABFD. PIC_P is true if
1814 the object is position-independent. */
1815
1816static const struct elf_sh_plt_info *
1817get_plt_info (bfd *abfd ATTRIBUTE_UNUSED, bfd_boolean pic_p)
1818{
1819 return &elf_sh_plts[pic_p][!bfd_big_endian (abfd)];
1820}
fbca6ad9 1821#else
37c644f2 1822/* The size in bytes of an entry in the procedure linkage table. */
252b5132 1823
55e6e397 1824#define ELF_PLT_ENTRY_SIZE 28
37c644f2
AO
1825
1826/* First entry in an absolute procedure linkage table look like this. */
1827
6c426cf3 1828/* Note - this code has been "optimised" not to use r2. r2 is used by
4cc11e76 1829 GCC to return the address of large structures, so it should not be
6c426cf3
NC
1830 corrupted here. This does mean however, that this PLT does not conform
1831 to the SH PIC ABI. That spec says that r0 contains the type of the PLT
1832 and r2 contains the GOT id. This version stores the GOT id in r0 and
1833 ignores the type. Loaders can easily detect this difference however,
1834 since the type will always be 0 or 8, and the GOT ids will always be
1835 greater than or equal to 12. */
55e6e397 1836static const bfd_byte elf_sh_plt0_entry_be[ELF_PLT_ENTRY_SIZE] =
6c426cf3
NC
1837{
1838 0xd0, 0x05, /* mov.l 2f,r0 */
1839 0x60, 0x02, /* mov.l @r0,r0 */
1840 0x2f, 0x06, /* mov.l r0,@-r15 */
1841 0xd0, 0x03, /* mov.l 1f,r0 */
1842 0x60, 0x02, /* mov.l @r0,r0 */
1843 0x40, 0x2b, /* jmp @r0 */
1844 0x60, 0xf6, /* mov.l @r15+,r0 */
1845 0x00, 0x09, /* nop */
1846 0x00, 0x09, /* nop */
1847 0x00, 0x09, /* nop */
1848 0, 0, 0, 0, /* 1: replaced with address of .got.plt + 8. */
1849 0, 0, 0, 0, /* 2: replaced with address of .got.plt + 4. */
1850};
1851
55e6e397 1852static const bfd_byte elf_sh_plt0_entry_le[ELF_PLT_ENTRY_SIZE] =
6c426cf3
NC
1853{
1854 0x05, 0xd0, /* mov.l 2f,r0 */
1855 0x02, 0x60, /* mov.l @r0,r0 */
1856 0x06, 0x2f, /* mov.l r0,@-r15 */
1857 0x03, 0xd0, /* mov.l 1f,r0 */
1858 0x02, 0x60, /* mov.l @r0,r0 */
1859 0x2b, 0x40, /* jmp @r0 */
1860 0xf6, 0x60, /* mov.l @r15+,r0 */
1861 0x09, 0x00, /* nop */
1862 0x09, 0x00, /* nop */
1863 0x09, 0x00, /* nop */
1864 0, 0, 0, 0, /* 1: replaced with address of .got.plt + 8. */
1865 0, 0, 0, 0, /* 2: replaced with address of .got.plt + 4. */
1866};
1867
1868/* Sebsequent entries in an absolute procedure linkage table look like
1869 this. */
1870
55e6e397 1871static const bfd_byte elf_sh_plt_entry_be[ELF_PLT_ENTRY_SIZE] =
6c426cf3
NC
1872{
1873 0xd0, 0x04, /* mov.l 1f,r0 */
55e6e397 1874 0x60, 0x02, /* mov.l @(r0,r12),r0 */
6c426cf3
NC
1875 0xd1, 0x02, /* mov.l 0f,r1 */
1876 0x40, 0x2b, /* jmp @r0 */
1877 0x60, 0x13, /* mov r1,r0 */
1878 0xd1, 0x03, /* mov.l 2f,r1 */
1879 0x40, 0x2b, /* jmp @r0 */
1880 0x00, 0x09, /* nop */
1881 0, 0, 0, 0, /* 0: replaced with address of .PLT0. */
1882 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
1883 0, 0, 0, 0, /* 2: replaced with offset into relocation table. */
1884};
1885
55e6e397 1886static const bfd_byte elf_sh_plt_entry_le[ELF_PLT_ENTRY_SIZE] =
6c426cf3
NC
1887{
1888 0x04, 0xd0, /* mov.l 1f,r0 */
1889 0x02, 0x60, /* mov.l @r0,r0 */
1890 0x02, 0xd1, /* mov.l 0f,r1 */
1891 0x2b, 0x40, /* jmp @r0 */
1892 0x13, 0x60, /* mov r1,r0 */
1893 0x03, 0xd1, /* mov.l 2f,r1 */
1894 0x2b, 0x40, /* jmp @r0 */
1895 0x09, 0x00, /* nop */
1896 0, 0, 0, 0, /* 0: replaced with address of .PLT0. */
1897 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
1898 0, 0, 0, 0, /* 2: replaced with offset into relocation table. */
1899};
1900
1901/* Entries in a PIC procedure linkage table look like this. */
1902
55e6e397 1903static const bfd_byte elf_sh_pic_plt_entry_be[ELF_PLT_ENTRY_SIZE] =
6c426cf3
NC
1904{
1905 0xd0, 0x04, /* mov.l 1f,r0 */
1906 0x00, 0xce, /* mov.l @(r0,r12),r0 */
1907 0x40, 0x2b, /* jmp @r0 */
1908 0x00, 0x09, /* nop */
1909 0x50, 0xc2, /* mov.l @(8,r12),r0 */
1910 0xd1, 0x03, /* mov.l 2f,r1 */
1911 0x40, 0x2b, /* jmp @r0 */
1912 0x50, 0xc1, /* mov.l @(4,r12),r0 */
1913 0x00, 0x09, /* nop */
1914 0x00, 0x09, /* nop */
1915 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
1916 0, 0, 0, 0 /* 2: replaced with offset into relocation table. */
1917};
1918
55e6e397 1919static const bfd_byte elf_sh_pic_plt_entry_le[ELF_PLT_ENTRY_SIZE] =
6c426cf3
NC
1920{
1921 0x04, 0xd0, /* mov.l 1f,r0 */
1922 0xce, 0x00, /* mov.l @(r0,r12),r0 */
1923 0x2b, 0x40, /* jmp @r0 */
1924 0x09, 0x00, /* nop */
1925 0xc2, 0x50, /* mov.l @(8,r12),r0 */
1926 0x03, 0xd1, /* mov.l 2f,r1 */
1927 0x2b, 0x40, /* jmp @r0 */
1928 0xc1, 0x50, /* mov.l @(4,r12),r0 */
1929 0x09, 0x00, /* nop */
1930 0x09, 0x00, /* nop */
1931 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
1932 0, 0, 0, 0 /* 2: replaced with offset into relocation table. */
1933};
1934
55e6e397
RS
1935static const struct elf_sh_plt_info elf_sh_plts[2][2] = {
1936 {
1937 {
1938 /* Big-endian non-PIC. */
1939 elf_sh_plt0_entry_be,
1940 ELF_PLT_ENTRY_SIZE,
1941 { MINUS_ONE, 24, 20 },
1942 elf_sh_plt_entry_be,
1943 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1944 { 20, 16, 24, FALSE },
1945 8,
1946 NULL
55e6e397
RS
1947 },
1948 {
1949 /* Little-endian non-PIC. */
1950 elf_sh_plt0_entry_le,
1951 ELF_PLT_ENTRY_SIZE,
1952 { MINUS_ONE, 24, 20 },
1953 elf_sh_plt_entry_le,
1954 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1955 { 20, 16, 24, FALSE },
1956 8,
1957 NULL
55e6e397
RS
1958 },
1959 },
1960 {
1961 {
1962 /* Big-endian PIC. */
1963 elf_sh_plt0_entry_be,
1964 ELF_PLT_ENTRY_SIZE,
1965 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1966 elf_sh_pic_plt_entry_be,
1967 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1968 { 20, MINUS_ONE, 24, FALSE },
1969 8,
1970 NULL
55e6e397
RS
1971 },
1972 {
1973 /* Little-endian PIC. */
1974 elf_sh_plt0_entry_le,
1975 ELF_PLT_ENTRY_SIZE,
1976 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1977 elf_sh_pic_plt_entry_le,
1978 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1979 { 20, MINUS_ONE, 24, FALSE },
1980 8,
1981 NULL
55e6e397
RS
1982 },
1983 }
1984};
252b5132 1985
55e6e397
RS
1986#define VXWORKS_PLT_HEADER_SIZE 12
1987#define VXWORKS_PLT_ENTRY_SIZE 24
252b5132 1988
55e6e397
RS
1989static const bfd_byte vxworks_sh_plt0_entry_be[VXWORKS_PLT_HEADER_SIZE] =
1990{
1991 0xd1, 0x01, /* mov.l @(8,pc),r1 */
1992 0x61, 0x12, /* mov.l @r1,r1 */
1993 0x41, 0x2b, /* jmp @r1 */
1994 0x00, 0x09, /* nop */
1995 0, 0, 0, 0 /* 0: replaced with _GLOBAL_OFFSET_TABLE+8. */
1996};
252b5132 1997
55e6e397
RS
1998static const bfd_byte vxworks_sh_plt0_entry_le[VXWORKS_PLT_HEADER_SIZE] =
1999{
2000 0x01, 0xd1, /* mov.l @(8,pc),r1 */
2001 0x12, 0x61, /* mov.l @r1,r1 */
2002 0x2b, 0x41, /* jmp @r1 */
2003 0x09, 0x00, /* nop */
2004 0, 0, 0, 0 /* 0: replaced with _GLOBAL_OFFSET_TABLE+8. */
2005};
2006
2007static const bfd_byte vxworks_sh_plt_entry_be[VXWORKS_PLT_ENTRY_SIZE] =
2008{
2009 0xd0, 0x01, /* mov.l @(8,pc),r0 */
2010 0x60, 0x02, /* mov.l @r0,r0 */
2011 0x40, 0x2b, /* jmp @r0 */
2012 0x00, 0x09, /* nop */
2013 0, 0, 0, 0, /* 0: replaced with address of this symbol in .got. */
2014 0xd0, 0x01, /* mov.l @(8,pc),r0 */
2015 0xa0, 0x00, /* bra PLT (We need to fix the offset.) */
2016 0x00, 0x09, /* nop */
2017 0x00, 0x09, /* nop */
2018 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2019};
2020
2021static const bfd_byte vxworks_sh_plt_entry_le[VXWORKS_PLT_ENTRY_SIZE] =
2022{
2023 0x01, 0xd0, /* mov.l @(8,pc),r0 */
2024 0x02, 0x60, /* mov.l @r0,r0 */
2025 0x2b, 0x40, /* jmp @r0 */
2026 0x09, 0x00, /* nop */
2027 0, 0, 0, 0, /* 0: replaced with address of this symbol in .got. */
2028 0x01, 0xd0, /* mov.l @(8,pc),r0 */
2029 0x00, 0xa0, /* bra PLT (We need to fix the offset.) */
2030 0x09, 0x00, /* nop */
2031 0x09, 0x00, /* nop */
2032 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2033};
2034
2035static const bfd_byte vxworks_sh_pic_plt_entry_be[VXWORKS_PLT_ENTRY_SIZE] =
2036{
2037 0xd0, 0x01, /* mov.l @(8,pc),r0 */
2038 0x00, 0xce, /* mov.l @(r0,r12),r0 */
2039 0x40, 0x2b, /* jmp @r0 */
2040 0x00, 0x09, /* nop */
2041 0, 0, 0, 0, /* 0: replaced with offset of this symbol in .got. */
2042 0xd0, 0x01, /* mov.l @(8,pc),r0 */
2043 0x51, 0xc2, /* mov.l @(8,r12),r1 */
2044 0x41, 0x2b, /* jmp @r1 */
2045 0x00, 0x09, /* nop */
2046 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2047};
2048
2049static const bfd_byte vxworks_sh_pic_plt_entry_le[VXWORKS_PLT_ENTRY_SIZE] =
2050{
2051 0x01, 0xd0, /* mov.l @(8,pc),r0 */
2052 0xce, 0x00, /* mov.l @(r0,r12),r0 */
2053 0x2b, 0x40, /* jmp @r0 */
2054 0x09, 0x00, /* nop */
2055 0, 0, 0, 0, /* 0: replaced with offset of this symbol in .got. */
2056 0x01, 0xd0, /* mov.l @(8,pc),r0 */
2057 0xc2, 0x51, /* mov.l @(8,r12),r1 */
2058 0x2b, 0x41, /* jmp @r1 */
2059 0x09, 0x00, /* nop */
2060 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2061};
2062
2063static const struct elf_sh_plt_info vxworks_sh_plts[2][2] = {
2064 {
2065 {
2066 /* Big-endian non-PIC. */
2067 vxworks_sh_plt0_entry_be,
2068 VXWORKS_PLT_HEADER_SIZE,
2069 { MINUS_ONE, MINUS_ONE, 8 },
2070 vxworks_sh_plt_entry_be,
2071 VXWORKS_PLT_ENTRY_SIZE,
8e45593f
NC
2072 { 8, 14, 20, FALSE },
2073 12,
2074 NULL
55e6e397
RS
2075 },
2076 {
2077 /* Little-endian non-PIC. */
2078 vxworks_sh_plt0_entry_le,
2079 VXWORKS_PLT_HEADER_SIZE,
2080 { MINUS_ONE, MINUS_ONE, 8 },
2081 vxworks_sh_plt_entry_le,
2082 VXWORKS_PLT_ENTRY_SIZE,
8e45593f
NC
2083 { 8, 14, 20, FALSE },
2084 12,
2085 NULL
55e6e397
RS
2086 },
2087 },
2088 {
2089 {
2090 /* Big-endian PIC. */
2091 NULL,
2092 0,
2093 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2094 vxworks_sh_pic_plt_entry_be,
2095 VXWORKS_PLT_ENTRY_SIZE,
8e45593f
NC
2096 { 8, MINUS_ONE, 20, FALSE },
2097 12,
2098 NULL
55e6e397
RS
2099 },
2100 {
2101 /* Little-endian PIC. */
2102 NULL,
2103 0,
2104 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2105 vxworks_sh_pic_plt_entry_le,
2106 VXWORKS_PLT_ENTRY_SIZE,
8e45593f
NC
2107 { 8, MINUS_ONE, 20, FALSE },
2108 12,
2109 NULL
55e6e397
RS
2110 },
2111 }
2112};
9bdafcce 2113
8e45593f
NC
2114/* FDPIC PLT entries. Two unimplemented optimizations for lazy
2115 binding are to omit the lazy binding stub when linking with -z now
2116 and to move lazy binding stubs into a separate region for better
2117 cache behavior. */
2118
2119#define FDPIC_PLT_ENTRY_SIZE 28
2120#define FDPIC_PLT_LAZY_OFFSET 20
2121
2122/* FIXME: The lazy binding stub requires a plt0 - which may need to be
2123 duplicated if it is out of range, or which can be inlined. So
2124 right now it is always inlined, which wastes a word per stub. It
2125 might be easier to handle the duplication if we put the lazy
2126 stubs separately. */
2127
2128static const bfd_byte fdpic_sh_plt_entry_be[FDPIC_PLT_ENTRY_SIZE] =
2129{
2130 0xd0, 0x02, /* mov.l @(12,pc),r0 */
2131 0x01, 0xce, /* mov.l @(r0,r12),r1 */
2132 0x70, 0x04, /* add #4, r0 */
2133 0x41, 0x2b, /* jmp @r1 */
2134 0x0c, 0xce, /* mov.l @(r0,r12),r12 */
2135 0x00, 0x09, /* nop */
2136 0, 0, 0, 0, /* 0: replaced with offset of this symbol's funcdesc */
2137 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2138 0x60, 0xc2, /* mov.l @r12,r0 */
2139 0x40, 0x2b, /* jmp @r0 */
2140 0x53, 0xc1, /* mov.l @(4,r12),r3 */
2141 0x00, 0x09, /* nop */
2142};
2143
2144static const bfd_byte fdpic_sh_plt_entry_le[FDPIC_PLT_ENTRY_SIZE] =
2145{
2146 0x02, 0xd0, /* mov.l @(12,pc),r0 */
2147 0xce, 0x01, /* mov.l @(r0,r12),r1 */
2148 0x04, 0x70, /* add #4, r0 */
2149 0x2b, 0x41, /* jmp @r1 */
2150 0xce, 0x0c, /* mov.l @(r0,r12),r12 */
2151 0x09, 0x00, /* nop */
2152 0, 0, 0, 0, /* 0: replaced with offset of this symbol's funcdesc */
2153 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2154 0xc2, 0x60, /* mov.l @r12,r0 */
2155 0x2b, 0x40, /* jmp @r0 */
2156 0xc1, 0x53, /* mov.l @(4,r12),r3 */
2157 0x09, 0x00, /* nop */
2158};
2159
2160static const struct elf_sh_plt_info fdpic_sh_plts[2] = {
2161 {
2162 /* Big-endian PIC. */
2163 NULL,
2164 0,
2165 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2166 fdpic_sh_plt_entry_be,
2167 FDPIC_PLT_ENTRY_SIZE,
2168 { 12, MINUS_ONE, 16, FALSE },
2169 FDPIC_PLT_LAZY_OFFSET,
2170 NULL
2171 },
2172 {
2173 /* Little-endian PIC. */
2174 NULL,
2175 0,
2176 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2177 fdpic_sh_plt_entry_le,
2178 FDPIC_PLT_ENTRY_SIZE,
2179 { 12, MINUS_ONE, 16, FALSE },
2180 FDPIC_PLT_LAZY_OFFSET,
2181 NULL
2182 },
2183};
2184
2185/* On SH2A, we can use the movi20 instruction to generate shorter PLT
2186 entries for the first 64K slots. We use the normal FDPIC PLT entry
2187 past that point; we could also use movi20s, which might be faster,
2188 but would not be any smaller. */
2189
2190#define FDPIC_SH2A_PLT_ENTRY_SIZE 24
2191#define FDPIC_SH2A_PLT_LAZY_OFFSET 16
2192
2193static const bfd_byte fdpic_sh2a_plt_entry_be[FDPIC_SH2A_PLT_ENTRY_SIZE] =
2194{
2195 0, 0, 0, 0, /* movi20 #gotofffuncdesc,r0 */
2196 0x01, 0xce, /* mov.l @(r0,r12),r1 */
2197 0x70, 0x04, /* add #4, r0 */
2198 0x41, 0x2b, /* jmp @r1 */
2199 0x0c, 0xce, /* mov.l @(r0,r12),r12 */
2200 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2201 0x60, 0xc2, /* mov.l @r12,r0 */
2202 0x40, 0x2b, /* jmp @r0 */
2203 0x53, 0xc1, /* mov.l @(4,r12),r3 */
2204 0x00, 0x09, /* nop */
2205};
2206
2207static const bfd_byte fdpic_sh2a_plt_entry_le[FDPIC_SH2A_PLT_ENTRY_SIZE] =
2208{
2209 0, 0, 0, 0, /* movi20 #gotofffuncdesc,r0 */
2210 0xce, 0x01, /* mov.l @(r0,r12),r1 */
2211 0x04, 0x70, /* add #4, r0 */
2212 0x2b, 0x41, /* jmp @r1 */
2213 0xce, 0x0c, /* mov.l @(r0,r12),r12 */
2214 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2215 0xc2, 0x60, /* mov.l @r12,r0 */
2216 0x2b, 0x40, /* jmp @r0 */
2217 0xc1, 0x53, /* mov.l @(4,r12),r3 */
2218 0x09, 0x00, /* nop */
2219};
2220
2221static const struct elf_sh_plt_info fdpic_sh2a_short_plt_be = {
2222 /* Big-endian FDPIC, max index 64K. */
2223 NULL,
2224 0,
2225 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2226 fdpic_sh2a_plt_entry_be,
2227 FDPIC_SH2A_PLT_ENTRY_SIZE,
2228 { 0, MINUS_ONE, 12, TRUE },
2229 FDPIC_SH2A_PLT_LAZY_OFFSET,
2230 NULL
2231};
2232
2233static const struct elf_sh_plt_info fdpic_sh2a_short_plt_le = {
2234 /* Little-endian FDPIC, max index 64K. */
2235 NULL,
2236 0,
2237 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2238 fdpic_sh2a_plt_entry_le,
2239 FDPIC_SH2A_PLT_ENTRY_SIZE,
2240 { 0, MINUS_ONE, 12, TRUE },
2241 FDPIC_SH2A_PLT_LAZY_OFFSET,
2242 NULL
2243};
2244
2245static const struct elf_sh_plt_info fdpic_sh2a_plts[2] = {
2246 {
2247 /* Big-endian PIC. */
2248 NULL,
2249 0,
2250 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2251 fdpic_sh_plt_entry_be,
2252 FDPIC_PLT_ENTRY_SIZE,
2253 { 12, MINUS_ONE, 16, FALSE },
2254 FDPIC_PLT_LAZY_OFFSET,
2255 &fdpic_sh2a_short_plt_be
2256 },
2257 {
2258 /* Little-endian PIC. */
2259 NULL,
2260 0,
2261 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2262 fdpic_sh_plt_entry_le,
2263 FDPIC_PLT_ENTRY_SIZE,
2264 { 12, MINUS_ONE, 16, FALSE },
2265 FDPIC_PLT_LAZY_OFFSET,
2266 &fdpic_sh2a_short_plt_le
2267 },
2268};
2269
55e6e397
RS
2270/* Return the type of PLT associated with ABFD. PIC_P is true if
2271 the object is position-independent. */
9bdafcce 2272
55e6e397 2273static const struct elf_sh_plt_info *
8e45593f 2274get_plt_info (bfd *abfd, bfd_boolean pic_p)
55e6e397 2275{
8e45593f
NC
2276 if (fdpic_object_p (abfd))
2277 {
2278 /* If any input file requires SH2A we can use a shorter PLT
2279 sequence. */
2280 if (sh_get_arch_from_bfd_mach (bfd_get_mach (abfd)) & arch_sh2a_base)
2281 return &fdpic_sh2a_plts[!bfd_big_endian (abfd)];
2282 else
2283 return &fdpic_sh_plts[!bfd_big_endian (abfd)];
2284 }
55e6e397
RS
2285 if (vxworks_object_p (abfd))
2286 return &vxworks_sh_plts[pic_p][!bfd_big_endian (abfd)];
2287 return &elf_sh_plts[pic_p][!bfd_big_endian (abfd)];
2288}
9bdafcce 2289
55e6e397
RS
2290/* Install a 32-bit PLT field starting at ADDR, which occurs in OUTPUT_BFD.
2291 VALUE is the field's value and CODE_P is true if VALUE refers to code,
2292 not data. */
9bdafcce 2293
55e6e397
RS
2294inline static void
2295install_plt_field (bfd *output_bfd, bfd_boolean code_p ATTRIBUTE_UNUSED,
2296 unsigned long value, bfd_byte *addr)
2297{
2298 bfd_put_32 (output_bfd, value, addr);
2299}
fbca6ad9 2300#endif
015551fc 2301
8e45593f
NC
2302/* The number of PLT entries which can use a shorter PLT, if any.
2303 Currently always 64K, since only SH-2A FDPIC uses this; a
2304 20-bit movi20 can address that many function descriptors below
2305 _GLOBAL_OFFSET_TABLE_. */
2306#define MAX_SHORT_PLT 65536
2307
55e6e397
RS
2308/* Return the index of the PLT entry at byte offset OFFSET. */
2309
2310static bfd_vma
2311get_plt_index (const struct elf_sh_plt_info *info, bfd_vma offset)
2312{
8e45593f
NC
2313 bfd_vma plt_index = 0;
2314
2315 offset -= info->plt0_entry_size;
2316 if (info->short_plt != NULL)
2317 {
2318 if (offset > MAX_SHORT_PLT * info->short_plt->symbol_entry_size)
2319 {
2320 plt_index = MAX_SHORT_PLT;
2321 offset -= MAX_SHORT_PLT * info->short_plt->symbol_entry_size;
2322 }
2323 else
2324 info = info->short_plt;
2325 }
2326 return plt_index + offset / info->symbol_entry_size;
55e6e397
RS
2327}
2328
2329/* Do the inverse operation. */
2330
2331static bfd_vma
91d6fa6a 2332get_plt_offset (const struct elf_sh_plt_info *info, bfd_vma plt_index)
55e6e397 2333{
8e45593f
NC
2334 bfd_vma offset = 0;
2335
2336 if (info->short_plt != NULL)
2337 {
2338 if (plt_index > MAX_SHORT_PLT)
2339 {
2340 offset = MAX_SHORT_PLT * info->short_plt->symbol_entry_size;
2341 plt_index -= MAX_SHORT_PLT;
2342 }
2343 else
2344 info = info->short_plt;
2345 }
2346 return (offset + info->plt0_entry_size
2347 + (plt_index * info->symbol_entry_size));
55e6e397
RS
2348}
2349
37c644f2 2350/* The sh linker needs to keep track of the number of relocs that it
067653c5
AM
2351 decides to copy as dynamic relocs in check_relocs for each symbol.
2352 This is so that it can later discard them if they are found to be
2353 unnecessary. We store the information in a field extending the
2354 regular ELF linker hash table. */
252b5132 2355
067653c5 2356struct elf_sh_dyn_relocs
38b1a46c 2357{
067653c5
AM
2358 struct elf_sh_dyn_relocs *next;
2359
2360 /* The input section of the reloc. */
2361 asection *sec;
2362
2363 /* Total number of relocs copied for the input section. */
37c644f2 2364 bfd_size_type count;
067653c5
AM
2365
2366 /* Number of pc-relative relocs copied for the input section. */
2367 bfd_size_type pc_count;
37c644f2 2368};
252b5132 2369
8e45593f
NC
2370union gotref
2371{
2372 bfd_signed_vma refcount;
2373 bfd_vma offset;
2374};
2375
37c644f2
AO
2376/* sh ELF linker hash entry. */
2377
38b1a46c
NC
2378struct elf_sh_link_hash_entry
2379{
37c644f2
AO
2380 struct elf_link_hash_entry root;
2381
fbca6ad9 2382#ifdef INCLUDE_SHMEDIA
396a6083
SC
2383 union
2384 {
2385 bfd_signed_vma refcount;
2386 bfd_vma offset;
2387 } datalabel_got;
fbca6ad9
AO
2388#endif
2389
067653c5
AM
2390 /* Track dynamic relocs copied for this symbol. */
2391 struct elf_sh_dyn_relocs *dyn_relocs;
4989d792
SC
2392
2393 bfd_signed_vma gotplt_refcount;
3376eaf5 2394
8e45593f
NC
2395 /* A local function descriptor, for FDPIC. The refcount counts
2396 R_SH_FUNCDESC, R_SH_GOTOFFFUNCDESC, and R_SH_GOTOFFFUNCDESC20
2397 relocations; the PLT and GOT entry are accounted
2398 for separately. After adjust_dynamic_symbol, the offset is
2399 MINUS_ONE if there is no local descriptor (dynamic linker
2400 managed and no PLT entry, or undefined weak non-dynamic).
2401 During check_relocs we do not yet know whether the local
2402 descriptor will be canonical. */
2403 union gotref funcdesc;
2404
2405 /* How many of the above refcounted relocations were R_SH_FUNCDESC,
2406 and thus require fixups or relocations. */
2407 bfd_signed_vma abs_funcdesc_refcount;
2408
85e02784 2409 enum got_type {
8e45593f
NC
2410 GOT_UNKNOWN = 0, GOT_NORMAL, GOT_TLS_GD, GOT_TLS_IE, GOT_FUNCDESC
2411 } got_type;
3376eaf5
KK
2412};
2413
2414#define sh_elf_hash_entry(ent) ((struct elf_sh_link_hash_entry *)(ent))
2415
2416struct sh_elf_obj_tdata
2417{
2418 struct elf_obj_tdata root;
2419
8e45593f
NC
2420 /* got_type for each local got entry. */
2421 char *local_got_type;
2422
2423 /* Function descriptor refcount and offset for each local symbol. */
2424 union gotref *local_funcdesc;
37c644f2
AO
2425};
2426
3376eaf5
KK
2427#define sh_elf_tdata(abfd) \
2428 ((struct sh_elf_obj_tdata *) (abfd)->tdata.any)
2429
8e45593f
NC
2430#define sh_elf_local_got_type(abfd) \
2431 (sh_elf_tdata (abfd)->local_got_type)
2432
2433#define sh_elf_local_funcdesc(abfd) \
2434 (sh_elf_tdata (abfd)->local_funcdesc)
3376eaf5 2435
0ffa91dd
NC
2436#define is_sh_elf(bfd) \
2437 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
2438 && elf_tdata (bfd) != NULL \
4dfe6ac6 2439 && elf_object_id (bfd) == SH_ELF_DATA)
0ffa91dd 2440
3376eaf5
KK
2441/* Override the generic function because we need to store sh_elf_obj_tdata
2442 as the specific tdata. */
2443
b34976b6 2444static bfd_boolean
09fd220b 2445sh_elf_mkobject (bfd *abfd)
3376eaf5 2446{
0ffa91dd 2447 return bfd_elf_allocate_object (abfd, sizeof (struct sh_elf_obj_tdata),
4dfe6ac6 2448 SH_ELF_DATA);
3376eaf5 2449}
b34976b6 2450
37c644f2
AO
2451/* sh ELF linker hash table. */
2452
38b1a46c
NC
2453struct elf_sh_link_hash_table
2454{
37c644f2 2455 struct elf_link_hash_table root;
37c644f2 2456
067653c5
AM
2457 /* Short-cuts to get to dynamic linker sections. */
2458 asection *sgot;
2459 asection *sgotplt;
2460 asection *srelgot;
2461 asection *splt;
2462 asection *srelplt;
2463 asection *sdynbss;
2464 asection *srelbss;
8e45593f
NC
2465 asection *sfuncdesc;
2466 asection *srelfuncdesc;
2467 asection *srofixup;
37c644f2 2468
55e6e397
RS
2469 /* The (unloaded but important) VxWorks .rela.plt.unloaded section. */
2470 asection *srelplt2;
2471
87d72d41
AM
2472 /* Small local sym cache. */
2473 struct sym_cache sym_cache;
3376eaf5
KK
2474
2475 /* A counter or offset to track a TLS got entry. */
2476 union
2477 {
2478 bfd_signed_vma refcount;
2479 bfd_vma offset;
2480 } tls_ldm_got;
55e6e397
RS
2481
2482 /* The type of PLT to use. */
2483 const struct elf_sh_plt_info *plt_info;
2484
2485 /* True if the target system is VxWorks. */
2486 bfd_boolean vxworks_p;
8e45593f
NC
2487
2488 /* True if the target system uses FDPIC. */
2489 bfd_boolean fdpic_p;
067653c5 2490};
37c644f2
AO
2491
2492/* Traverse an sh ELF linker hash table. */
2493
2494#define sh_elf_link_hash_traverse(table, func, info) \
2495 (elf_link_hash_traverse \
2496 (&(table)->root, \
09fd220b 2497 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
37c644f2
AO
2498 (info)))
2499
2500/* Get the sh ELF linker hash table from a link_info structure. */
2501
2502#define sh_elf_hash_table(p) \
4dfe6ac6
NC
2503 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
2504 == SH_ELF_DATA ? ((struct elf_sh_link_hash_table *) ((p)->hash)) : NULL)
37c644f2
AO
2505
2506/* Create an entry in an sh ELF linker hash table. */
2507
2508static struct bfd_hash_entry *
09fd220b
KK
2509sh_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
2510 struct bfd_hash_table *table,
2511 const char *string)
37c644f2
AO
2512{
2513 struct elf_sh_link_hash_entry *ret =
2514 (struct elf_sh_link_hash_entry *) entry;
2515
2516 /* Allocate the structure if it has not already been allocated by a
2517 subclass. */
2518 if (ret == (struct elf_sh_link_hash_entry *) NULL)
2519 ret = ((struct elf_sh_link_hash_entry *)
2520 bfd_hash_allocate (table,
2521 sizeof (struct elf_sh_link_hash_entry)));
2522 if (ret == (struct elf_sh_link_hash_entry *) NULL)
2523 return (struct bfd_hash_entry *) ret;
2524
2525 /* Call the allocation method of the superclass. */
2526 ret = ((struct elf_sh_link_hash_entry *)
2527 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
2528 table, string));
2529 if (ret != (struct elf_sh_link_hash_entry *) NULL)
2530 {
396a6083
SC
2531 ret->dyn_relocs = NULL;
2532 ret->gotplt_refcount = 0;
fbca6ad9 2533#ifdef INCLUDE_SHMEDIA
396a6083 2534 ret->datalabel_got.refcount = ret->root.got.refcount;
fbca6ad9 2535#endif
8e45593f
NC
2536 ret->funcdesc.refcount = 0;
2537 ret->abs_funcdesc_refcount = 0;
2538 ret->got_type = GOT_UNKNOWN;
37c644f2
AO
2539 }
2540
2541 return (struct bfd_hash_entry *) ret;
2542}
2543
2544/* Create an sh ELF linker hash table. */
2545
2546static struct bfd_link_hash_table *
09fd220b 2547sh_elf_link_hash_table_create (bfd *abfd)
37c644f2
AO
2548{
2549 struct elf_sh_link_hash_table *ret;
dc810e39 2550 bfd_size_type amt = sizeof (struct elf_sh_link_hash_table);
37c644f2 2551
e2d34d7d 2552 ret = (struct elf_sh_link_hash_table *) bfd_malloc (amt);
37c644f2
AO
2553 if (ret == (struct elf_sh_link_hash_table *) NULL)
2554 return NULL;
2555
66eb6687
AM
2556 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
2557 sh_elf_link_hash_newfunc,
4dfe6ac6
NC
2558 sizeof (struct elf_sh_link_hash_entry),
2559 SH_ELF_DATA))
37c644f2 2560 {
e2d34d7d 2561 free (ret);
37c644f2
AO
2562 return NULL;
2563 }
2564
067653c5
AM
2565 ret->sgot = NULL;
2566 ret->sgotplt = NULL;
2567 ret->srelgot = NULL;
2568 ret->splt = NULL;
2569 ret->srelplt = NULL;
2570 ret->sdynbss = NULL;
2571 ret->srelbss = NULL;
55e6e397 2572 ret->srelplt2 = NULL;
87d72d41 2573 ret->sym_cache.abfd = NULL;
3376eaf5 2574 ret->tls_ldm_got.refcount = 0;
55e6e397
RS
2575 ret->plt_info = NULL;
2576 ret->vxworks_p = vxworks_object_p (abfd);
8e45593f 2577 ret->fdpic_p = fdpic_object_p (abfd);
067653c5 2578
37c644f2
AO
2579 return &ret->root.root;
2580}
2581
8e45593f
NC
2582static bfd_boolean
2583sh_elf_omit_section_dynsym (bfd *output_bfd ATTRIBUTE_UNUSED,
2584 struct bfd_link_info *info, asection *p)
2585{
2586 struct elf_sh_link_hash_table *htab = sh_elf_hash_table (info);
2587
2588 /* Non-FDPIC binaries do not need dynamic symbols for sections. */
2589 if (!htab->fdpic_p)
2590 return TRUE;
2591
2592 /* We need dynamic symbols for every section, since segments can
2593 relocate independently. */
2594 switch (elf_section_data (p)->this_hdr.sh_type)
2595 {
2596 case SHT_PROGBITS:
2597 case SHT_NOBITS:
2598 /* If sh_type is yet undecided, assume it could be
2599 SHT_PROGBITS/SHT_NOBITS. */
2600 case SHT_NULL:
2601 return FALSE;
2602
2603 /* There shouldn't be section relative relocations
2604 against any other section. */
2605 default:
2606 return TRUE;
2607 }
2608}
2609
067653c5
AM
2610/* Create .got, .gotplt, and .rela.got sections in DYNOBJ, and set up
2611 shortcuts to them in our hash table. */
2612
b34976b6 2613static bfd_boolean
09fd220b 2614create_got_section (bfd *dynobj, struct bfd_link_info *info)
067653c5
AM
2615{
2616 struct elf_sh_link_hash_table *htab;
2617
2618 if (! _bfd_elf_create_got_section (dynobj, info))
b34976b6 2619 return FALSE;
067653c5
AM
2620
2621 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
2622 if (htab == NULL)
2623 return FALSE;
2624
3d4d4302
AM
2625 htab->sgot = bfd_get_linker_section (dynobj, ".got");
2626 htab->sgotplt = bfd_get_linker_section (dynobj, ".got.plt");
2627 htab->srelgot = bfd_get_linker_section (dynobj, ".rela.got");
64e77c6d 2628 if (! htab->sgot || ! htab->sgotplt || ! htab->srelgot)
067653c5 2629 abort ();
8e45593f 2630
3d4d4302
AM
2631 htab->sfuncdesc = bfd_make_section_anyway_with_flags (dynobj, ".got.funcdesc",
2632 (SEC_ALLOC | SEC_LOAD
2633 | SEC_HAS_CONTENTS
2634 | SEC_IN_MEMORY
2635 | SEC_LINKER_CREATED));
8e45593f
NC
2636 if (htab->sfuncdesc == NULL
2637 || ! bfd_set_section_alignment (dynobj, htab->sfuncdesc, 2))
2638 return FALSE;
2639
3d4d4302
AM
2640 htab->srelfuncdesc = bfd_make_section_anyway_with_flags (dynobj,
2641 ".rela.got.funcdesc",
2642 (SEC_ALLOC | SEC_LOAD
2643 | SEC_HAS_CONTENTS
2644 | SEC_IN_MEMORY
2645 | SEC_LINKER_CREATED
2646 | SEC_READONLY));
8e45593f
NC
2647 if (htab->srelfuncdesc == NULL
2648 || ! bfd_set_section_alignment (dynobj, htab->srelfuncdesc, 2))
2649 return FALSE;
2650
2651 /* Also create .rofixup. */
3d4d4302
AM
2652 htab->srofixup = bfd_make_section_anyway_with_flags (dynobj, ".rofixup",
2653 (SEC_ALLOC | SEC_LOAD
2654 | SEC_HAS_CONTENTS
2655 | SEC_IN_MEMORY
2656 | SEC_LINKER_CREATED
2657 | SEC_READONLY));
8e45593f
NC
2658 if (htab->srofixup == NULL
2659 || ! bfd_set_section_alignment (dynobj, htab->srofixup, 2))
2660 return FALSE;
2661
b34976b6 2662 return TRUE;
067653c5
AM
2663}
2664
37c644f2
AO
2665/* Create dynamic sections when linking against a dynamic object. */
2666
b34976b6 2667static bfd_boolean
09fd220b 2668sh_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
37c644f2 2669{
067653c5 2670 struct elf_sh_link_hash_table *htab;
37c644f2 2671 flagword flags, pltflags;
91d6fa6a 2672 asection *s;
9c5bfbb7 2673 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
37c644f2
AO
2674 int ptralign = 0;
2675
2676 switch (bed->s->arch_size)
2677 {
2678 case 32:
2679 ptralign = 2;
2680 break;
2681
2682 case 64:
2683 ptralign = 3;
2684 break;
2685
2686 default:
2687 bfd_set_error (bfd_error_bad_value);
b34976b6 2688 return FALSE;
37c644f2
AO
2689 }
2690
067653c5 2691 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
2692 if (htab == NULL)
2693 return FALSE;
2694
35cad4c4
KK
2695 if (htab->root.dynamic_sections_created)
2696 return TRUE;
067653c5 2697
37c644f2
AO
2698 /* We need to create .plt, .rel[a].plt, .got, .got.plt, .dynbss, and
2699 .rel[a].bss sections. */
2700
2701 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
2702 | SEC_LINKER_CREATED);
2703
2704 pltflags = flags;
2705 pltflags |= SEC_CODE;
2706 if (bed->plt_not_loaded)
2707 pltflags &= ~ (SEC_LOAD | SEC_HAS_CONTENTS);
2708 if (bed->plt_readonly)
2709 pltflags |= SEC_READONLY;
2710
3d4d4302 2711 s = bfd_make_section_anyway_with_flags (abfd, ".plt", pltflags);
35cad4c4
KK
2712 htab->splt = s;
2713 if (s == NULL
35cad4c4
KK
2714 || ! bfd_set_section_alignment (abfd, s, bed->plt_alignment))
2715 return FALSE;
37c644f2
AO
2716
2717 if (bed->want_plt_sym)
2718 {
2719 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
2720 .plt section. */
14a793b2
AM
2721 struct elf_link_hash_entry *h;
2722 struct bfd_link_hash_entry *bh = NULL;
2723
37c644f2
AO
2724 if (! (_bfd_generic_link_add_one_symbol
2725 (info, abfd, "_PROCEDURE_LINKAGE_TABLE_", BSF_GLOBAL, s,
b34976b6 2726 (bfd_vma) 0, (const char *) NULL, FALSE,
14a793b2 2727 get_elf_backend_data (abfd)->collect, &bh)))
b34976b6 2728 return FALSE;
14a793b2
AM
2729
2730 h = (struct elf_link_hash_entry *) bh;
f5385ebf 2731 h->def_regular = 1;
37c644f2 2732 h->type = STT_OBJECT;
7325306f 2733 htab->root.hplt = h;
37c644f2
AO
2734
2735 if (info->shared
c152c796 2736 && ! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 2737 return FALSE;
37c644f2
AO
2738 }
2739
3d4d4302
AM
2740 s = bfd_make_section_anyway_with_flags (abfd,
2741 bed->default_use_rela_p
2742 ? ".rela.plt" : ".rel.plt",
2743 flags | SEC_READONLY);
35cad4c4
KK
2744 htab->srelplt = s;
2745 if (s == NULL
35cad4c4
KK
2746 || ! bfd_set_section_alignment (abfd, s, ptralign))
2747 return FALSE;
37c644f2 2748
2293c499
AM
2749 if (htab->sgot == NULL
2750 && !create_got_section (abfd, info))
b34976b6 2751 return FALSE;
37c644f2 2752
37c644f2
AO
2753 if (bed->want_dynbss)
2754 {
2755 /* The .dynbss section is a place to put symbols which are defined
2756 by dynamic objects, are referenced by regular objects, and are
2757 not functions. We must allocate space for them in the process
2758 image and use a R_*_COPY reloc to tell the dynamic linker to
2759 initialize them at run time. The linker script puts the .dynbss
2760 section into the .bss section of the final image. */
3d4d4302
AM
2761 s = bfd_make_section_anyway_with_flags (abfd, ".dynbss",
2762 SEC_ALLOC | SEC_LINKER_CREATED);
35cad4c4 2763 htab->sdynbss = s;
3496cb2a 2764 if (s == NULL)
35cad4c4 2765 return FALSE;
37c644f2
AO
2766
2767 /* The .rel[a].bss section holds copy relocs. This section is not
2768 normally needed. We need to create it here, though, so that the
2769 linker will map it to an output section. We can't just create it
2770 only if we need it, because we will not know whether we need it
2771 until we have seen all the input files, and the first time the
2772 main linker code calls BFD after examining all the input files
2773 (size_dynamic_sections) the input sections have already been
2774 mapped to the output sections. If the section turns out not to
2775 be needed, we can discard it later. We will never need this
2776 section when generating a shared object, since they do not use
2777 copy relocs. */
35cad4c4 2778 if (! info->shared)
37c644f2 2779 {
3d4d4302
AM
2780 s = bfd_make_section_anyway_with_flags (abfd,
2781 (bed->default_use_rela_p
2782 ? ".rela.bss" : ".rel.bss"),
2783 flags | SEC_READONLY);
067653c5 2784 htab->srelbss = s;
37c644f2 2785 if (s == NULL
37c644f2 2786 || ! bfd_set_section_alignment (abfd, s, ptralign))
b34976b6 2787 return FALSE;
37c644f2
AO
2788 }
2789 }
2790
55e6e397
RS
2791 if (htab->vxworks_p)
2792 {
2793 if (!elf_vxworks_create_dynamic_sections (abfd, info, &htab->srelplt2))
2794 return FALSE;
2795 }
2796
b34976b6 2797 return TRUE;
37c644f2
AO
2798}
2799\f
37c644f2
AO
2800/* Adjust a symbol defined by a dynamic object and referenced by a
2801 regular object. The current definition is in some section of the
2802 dynamic object, but we're not including those sections. We have to
2803 change the definition to something the rest of the link can
2804 understand. */
2805
b34976b6 2806static bfd_boolean
09fd220b
KK
2807sh_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
2808 struct elf_link_hash_entry *h)
37c644f2 2809{
067653c5
AM
2810 struct elf_sh_link_hash_table *htab;
2811 struct elf_sh_link_hash_entry *eh;
2812 struct elf_sh_dyn_relocs *p;
37c644f2 2813 asection *s;
37c644f2 2814
2293c499 2815 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
2816 if (htab == NULL)
2817 return FALSE;
37c644f2
AO
2818
2819 /* Make sure we know what is going on here. */
2293c499 2820 BFD_ASSERT (htab->root.dynobj != NULL
f5385ebf 2821 && (h->needs_plt
f6e332e6 2822 || h->u.weakdef != NULL
f5385ebf
AM
2823 || (h->def_dynamic
2824 && h->ref_regular
2825 && !h->def_regular)));
37c644f2
AO
2826
2827 /* If this is a function, put it in the procedure linkage table. We
2828 will fill in the contents of the procedure linkage table later,
2829 when we know the address of the .got section. */
2830 if (h->type == STT_FUNC
f5385ebf 2831 || h->needs_plt)
37c644f2 2832 {
067653c5 2833 if (h->plt.refcount <= 0
3d85aebe
KK
2834 || SYMBOL_CALLS_LOCAL (info, h)
2835 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
2836 && h->root.type == bfd_link_hash_undefweak))
37c644f2
AO
2837 {
2838 /* This case can occur if we saw a PLT reloc in an input
2839 file, but the symbol was never referred to by a dynamic
2840 object. In such a case, we don't actually need to build
2841 a procedure linkage table, and we can just do a REL32
2842 reloc instead. */
067653c5 2843 h->plt.offset = (bfd_vma) -1;
f5385ebf 2844 h->needs_plt = 0;
37c644f2
AO
2845 }
2846
b34976b6 2847 return TRUE;
37c644f2 2848 }
067653c5
AM
2849 else
2850 h->plt.offset = (bfd_vma) -1;
37c644f2
AO
2851
2852 /* If this is a weak symbol, and there is a real definition, the
2853 processor independent code will have arranged for us to see the
2854 real definition first, and we can just use the same value. */
f6e332e6 2855 if (h->u.weakdef != NULL)
37c644f2 2856 {
f6e332e6
AM
2857 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
2858 || h->u.weakdef->root.type == bfd_link_hash_defweak);
2859 h->root.u.def.section = h->u.weakdef->root.u.def.section;
2860 h->root.u.def.value = h->u.weakdef->root.u.def.value;
04e534c3 2861 if (info->nocopyreloc)
f6e332e6 2862 h->non_got_ref = h->u.weakdef->non_got_ref;
b34976b6 2863 return TRUE;
37c644f2
AO
2864 }
2865
2866 /* This is a reference to a symbol defined by a dynamic object which
2867 is not a function. */
2868
2869 /* If we are creating a shared library, we must presume that the
2870 only references to the symbol are via the global offset table.
2871 For such cases we need not do anything here; the relocations will
2872 be handled correctly by relocate_section. */
2873 if (info->shared)
b34976b6 2874 return TRUE;
37c644f2
AO
2875
2876 /* If there are no references to this symbol that do not use the
2877 GOT, we don't need to generate a copy reloc. */
f5385ebf 2878 if (!h->non_got_ref)
b34976b6 2879 return TRUE;
37c644f2 2880
067653c5
AM
2881 /* If -z nocopyreloc was given, we won't generate them either. */
2882 if (info->nocopyreloc)
2883 {
f5385ebf 2884 h->non_got_ref = 0;
b34976b6 2885 return TRUE;
067653c5
AM
2886 }
2887
2888 eh = (struct elf_sh_link_hash_entry *) h;
2889 for (p = eh->dyn_relocs; p != NULL; p = p->next)
2890 {
2891 s = p->sec->output_section;
2892 if (s != NULL && (s->flags & (SEC_READONLY | SEC_HAS_CONTENTS)) != 0)
2893 break;
2894 }
2895
2896 /* If we didn't find any dynamic relocs in sections which needs the
2897 copy reloc, then we'll be keeping the dynamic relocs and avoiding
2898 the copy reloc. */
2899 if (p == NULL)
2900 {
f5385ebf 2901 h->non_got_ref = 0;
b34976b6 2902 return TRUE;
067653c5
AM
2903 }
2904
37c644f2
AO
2905 /* We must allocate the symbol in our .dynbss section, which will
2906 become part of the .bss section of the executable. There will be
2907 an entry for this symbol in the .dynsym section. The dynamic
2908 object will contain position independent code, so all references
2909 from the dynamic object to this symbol will go through the global
2910 offset table. The dynamic linker will use the .dynsym entry to
2911 determine the address it must put in the global offset table, so
2912 both the dynamic object and the regular object will refer to the
2913 same memory location for the variable. */
2914
067653c5 2915 s = htab->sdynbss;
37c644f2
AO
2916 BFD_ASSERT (s != NULL);
2917
2918 /* We must generate a R_SH_COPY reloc to tell the dynamic linker to
2919 copy the initial value out of the dynamic object and into the
2920 runtime process image. We need to remember the offset into the
2921 .rela.bss section we are going to use. */
1d7e9d18 2922 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
37c644f2
AO
2923 {
2924 asection *srel;
2925
067653c5 2926 srel = htab->srelbss;
37c644f2 2927 BFD_ASSERT (srel != NULL);
eea6121a 2928 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 2929 h->needs_copy = 1;
37c644f2
AO
2930 }
2931
027297b7 2932 return _bfd_elf_adjust_dynamic_copy (h, s);
37c644f2
AO
2933}
2934
067653c5
AM
2935/* Allocate space in .plt, .got and associated reloc sections for
2936 dynamic relocs. */
2937
b34976b6 2938static bfd_boolean
09fd220b 2939allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
067653c5
AM
2940{
2941 struct bfd_link_info *info;
2942 struct elf_sh_link_hash_table *htab;
2943 struct elf_sh_link_hash_entry *eh;
2944 struct elf_sh_dyn_relocs *p;
2945
2946 if (h->root.type == bfd_link_hash_indirect)
b34976b6 2947 return TRUE;
067653c5 2948
067653c5
AM
2949 info = (struct bfd_link_info *) inf;
2950 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
2951 if (htab == NULL)
2952 return FALSE;
067653c5 2953
4989d792
SC
2954 eh = (struct elf_sh_link_hash_entry *) h;
2955 if ((h->got.refcount > 0
f5385ebf 2956 || h->forced_local)
4989d792
SC
2957 && eh->gotplt_refcount > 0)
2958 {
2959 /* The symbol has been forced local, or we have some direct got refs,
26e41594 2960 so treat all the gotplt refs as got refs. */
4989d792
SC
2961 h->got.refcount += eh->gotplt_refcount;
2962 if (h->plt.refcount >= eh->gotplt_refcount)
2963 h->plt.refcount -= eh->gotplt_refcount;
2964 }
2965
067653c5 2966 if (htab->root.dynamic_sections_created
04e534c3
KK
2967 && h->plt.refcount > 0
2968 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2969 || h->root.type != bfd_link_hash_undefweak))
067653c5
AM
2970 {
2971 /* Make sure this symbol is output as a dynamic symbol.
2972 Undefined weak syms won't yet be marked as dynamic. */
2973 if (h->dynindx == -1
f5385ebf 2974 && !h->forced_local)
067653c5 2975 {
c152c796 2976 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 2977 return FALSE;
067653c5
AM
2978 }
2979
267fb3c1
KK
2980 if (info->shared
2981 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
067653c5
AM
2982 {
2983 asection *s = htab->splt;
8e45593f 2984 const struct elf_sh_plt_info *plt_info;
067653c5
AM
2985
2986 /* If this is the first .plt entry, make room for the special
2987 first entry. */
eea6121a 2988 if (s->size == 0)
55e6e397 2989 s->size += htab->plt_info->plt0_entry_size;
067653c5 2990
eea6121a 2991 h->plt.offset = s->size;
067653c5
AM
2992
2993 /* If this symbol is not defined in a regular file, and we are
2994 not generating a shared library, then set the symbol to this
2995 location in the .plt. This is required to make function
2996 pointers compare as equal between the normal executable and
8e45593f
NC
2997 the shared library. Skip this for FDPIC, since the
2998 function's address will be the address of the canonical
2999 function descriptor. */
3000 if (!htab->fdpic_p && !info->shared && !h->def_regular)
067653c5
AM
3001 {
3002 h->root.u.def.section = s;
3003 h->root.u.def.value = h->plt.offset;
3004 }
3005
3006 /* Make room for this entry. */
8e45593f
NC
3007 plt_info = htab->plt_info;
3008 if (plt_info->short_plt != NULL
3009 && (get_plt_index (plt_info->short_plt, s->size) < MAX_SHORT_PLT))
3010 plt_info = plt_info->short_plt;
3011 s->size += plt_info->symbol_entry_size;
067653c5
AM
3012
3013 /* We also need to make an entry in the .got.plt section, which
3014 will be placed in the .got section by the linker script. */
8e45593f
NC
3015 if (!htab->fdpic_p)
3016 htab->sgotplt->size += 4;
3017 else
3018 htab->sgotplt->size += 8;
067653c5
AM
3019
3020 /* We also need to make an entry in the .rel.plt section. */
eea6121a 3021 htab->srelplt->size += sizeof (Elf32_External_Rela);
55e6e397
RS
3022
3023 if (htab->vxworks_p && !info->shared)
3024 {
3025 /* VxWorks executables have a second set of relocations
3026 for each PLT entry. They go in a separate relocation
3027 section, which is processed by the kernel loader. */
3028
3029 /* There is a relocation for the initial PLT entry:
3030 an R_SH_DIR32 relocation for _GLOBAL_OFFSET_TABLE_. */
3031 if (h->plt.offset == htab->plt_info->plt0_entry_size)
3032 htab->srelplt2->size += sizeof (Elf32_External_Rela);
3033
3034 /* There are two extra relocations for each subsequent
3035 PLT entry: an R_SH_DIR32 relocation for the GOT entry,
3036 and an R_SH_DIR32 relocation for the PLT entry. */
3037 htab->srelplt2->size += sizeof (Elf32_External_Rela) * 2;
3038 }
067653c5
AM
3039 }
3040 else
3041 {
3042 h->plt.offset = (bfd_vma) -1;
f5385ebf 3043 h->needs_plt = 0;
067653c5
AM
3044 }
3045 }
3046 else
3047 {
3048 h->plt.offset = (bfd_vma) -1;
f5385ebf 3049 h->needs_plt = 0;
067653c5
AM
3050 }
3051
3052 if (h->got.refcount > 0)
3053 {
3054 asection *s;
b34976b6 3055 bfd_boolean dyn;
85e02784 3056 enum got_type got_type = sh_elf_hash_entry (h)->got_type;
067653c5
AM
3057
3058 /* Make sure this symbol is output as a dynamic symbol.
3059 Undefined weak syms won't yet be marked as dynamic. */
3060 if (h->dynindx == -1
f5385ebf 3061 && !h->forced_local)
067653c5 3062 {
c152c796 3063 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 3064 return FALSE;
067653c5
AM
3065 }
3066
3067 s = htab->sgot;
eea6121a
AM
3068 h->got.offset = s->size;
3069 s->size += 4;
3376eaf5 3070 /* R_SH_TLS_GD needs 2 consecutive GOT slots. */
8e45593f 3071 if (got_type == GOT_TLS_GD)
eea6121a 3072 s->size += 4;
067653c5 3073 dyn = htab->root.dynamic_sections_created;
8e45593f
NC
3074 if (!dyn)
3075 {
3076 /* No dynamic relocations required. */
3077 if (htab->fdpic_p && !info->shared
3078 && h->root.type != bfd_link_hash_undefweak
3079 && (got_type == GOT_NORMAL || got_type == GOT_FUNCDESC))
3080 htab->srofixup->size += 4;
3081 }
87458ed2
KK
3082 /* No dynamic relocations required when IE->LE conversion happens. */
3083 else if (got_type == GOT_TLS_IE && !h->def_dynamic && !info->shared)
3084 ;
267fb3c1 3085 /* R_SH_TLS_IE_32 needs one dynamic relocation if dynamic,
3376eaf5 3086 R_SH_TLS_GD needs one if local symbol and two if global. */
8e45593f
NC
3087 else if ((got_type == GOT_TLS_GD && h->dynindx == -1)
3088 || got_type == GOT_TLS_IE)
eea6121a 3089 htab->srelgot->size += sizeof (Elf32_External_Rela);
8e45593f 3090 else if (got_type == GOT_TLS_GD)
eea6121a 3091 htab->srelgot->size += 2 * sizeof (Elf32_External_Rela);
8e45593f
NC
3092 else if (got_type == GOT_FUNCDESC)
3093 {
3094 if (!info->shared && SYMBOL_FUNCDESC_LOCAL (info, h))
3095 htab->srofixup->size += 4;
3096 else
3097 htab->srelgot->size += sizeof (Elf32_External_Rela);
3098 }
04e534c3
KK
3099 else if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
3100 || h->root.type != bfd_link_hash_undefweak)
3101 && (info->shared
3102 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
eea6121a 3103 htab->srelgot->size += sizeof (Elf32_External_Rela);
8e45593f
NC
3104 else if (htab->fdpic_p && !info->shared && got_type == GOT_NORMAL
3105 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
3106 || h->root.type != bfd_link_hash_undefweak))
3107 htab->srofixup->size += 4;
067653c5
AM
3108 }
3109 else
3110 h->got.offset = (bfd_vma) -1;
3111
396a6083
SC
3112#ifdef INCLUDE_SHMEDIA
3113 if (eh->datalabel_got.refcount > 0)
3114 {
3115 asection *s;
b34976b6 3116 bfd_boolean dyn;
396a6083
SC
3117
3118 /* Make sure this symbol is output as a dynamic symbol.
3119 Undefined weak syms won't yet be marked as dynamic. */
3120 if (h->dynindx == -1
f5385ebf 3121 && !h->forced_local)
396a6083 3122 {
c152c796 3123 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 3124 return FALSE;
396a6083
SC
3125 }
3126
3127 s = htab->sgot;
eea6121a
AM
3128 eh->datalabel_got.offset = s->size;
3129 s->size += 4;
396a6083 3130 dyn = htab->root.dynamic_sections_created;
267fb3c1 3131 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h))
eea6121a 3132 htab->srelgot->size += sizeof (Elf32_External_Rela);
396a6083
SC
3133 }
3134 else
3135 eh->datalabel_got.offset = (bfd_vma) -1;
3136#endif
3137
8e45593f
NC
3138 /* Allocate space for any dynamic relocations to function
3139 descriptors, canonical or otherwise. We need to relocate the
3140 reference unless it resolves to zero, which only happens for
3141 undefined weak symbols (either non-default visibility, or when
3142 static linking). Any GOT slot is accounted for elsewhere. */
3143 if (eh->abs_funcdesc_refcount > 0
3144 && (h->root.type != bfd_link_hash_undefweak
3145 || (htab->root.dynamic_sections_created
3146 && ! SYMBOL_CALLS_LOCAL (info, h))))
3147 {
3148 if (!info->shared && SYMBOL_FUNCDESC_LOCAL (info, h))
3149 htab->srofixup->size += eh->abs_funcdesc_refcount * 4;
3150 else
3151 htab->srelgot->size
3152 += eh->abs_funcdesc_refcount * sizeof (Elf32_External_Rela);
3153 }
3154
3155 /* We must allocate a function descriptor if there are references to
3156 a canonical descriptor (R_SH_GOTFUNCDESC or R_SH_FUNCDESC) and
3157 the dynamic linker isn't going to allocate it. None of this
3158 applies if we already created one in .got.plt, but if the
3159 canonical function descriptor can be in this object, there
3160 won't be a PLT entry at all. */
3161 if ((eh->funcdesc.refcount > 0
3162 || (h->got.offset != MINUS_ONE && eh->got_type == GOT_FUNCDESC))
3163 && h->root.type != bfd_link_hash_undefweak
3164 && SYMBOL_FUNCDESC_LOCAL (info, h))
3165 {
3166 /* Make room for this function descriptor. */
3167 eh->funcdesc.offset = htab->sfuncdesc->size;
3168 htab->sfuncdesc->size += 8;
3169
3170 /* We will need a relocation or two fixups to initialize the
3171 function descriptor, so allocate those too. */
3172 if (!info->shared && SYMBOL_CALLS_LOCAL (info, h))
3173 htab->srofixup->size += 8;
3174 else
3175 htab->srelfuncdesc->size += sizeof (Elf32_External_Rela);
3176 }
3177
067653c5 3178 if (eh->dyn_relocs == NULL)
b34976b6 3179 return TRUE;
067653c5
AM
3180
3181 /* In the shared -Bsymbolic case, discard space allocated for
3182 dynamic pc-relative relocs against symbols which turn out to be
3183 defined in regular objects. For the normal shared case, discard
3184 space for pc-relative relocs that have become local due to symbol
3185 visibility changes. */
3186
3187 if (info->shared)
3188 {
3d85aebe 3189 if (SYMBOL_CALLS_LOCAL (info, h))
067653c5
AM
3190 {
3191 struct elf_sh_dyn_relocs **pp;
3192
3193 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
3194 {
3195 p->count -= p->pc_count;
3196 p->pc_count = 0;
3197 if (p->count == 0)
3198 *pp = p->next;
3199 else
3200 pp = &p->next;
3201 }
3202 }
04e534c3 3203
3348747a
NS
3204 if (htab->vxworks_p)
3205 {
3206 struct elf_sh_dyn_relocs **pp;
3207
3208 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
3209 {
3210 if (strcmp (p->sec->output_section->name, ".tls_vars") == 0)
3211 *pp = p->next;
3212 else
3213 pp = &p->next;
3214 }
3215 }
3216
04e534c3
KK
3217 /* Also discard relocs on undefined weak syms with non-default
3218 visibility. */
22d606e9 3219 if (eh->dyn_relocs != NULL
04e534c3 3220 && h->root.type == bfd_link_hash_undefweak)
22d606e9
AM
3221 {
3222 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
3223 eh->dyn_relocs = NULL;
3224
3225 /* Make sure undefined weak symbols are output as a dynamic
3226 symbol in PIEs. */
3227 else if (h->dynindx == -1
3228 && !h->forced_local)
3229 {
3230 if (! bfd_elf_link_record_dynamic_symbol (info, h))
3231 return FALSE;
3232 }
3233 }
067653c5
AM
3234 }
3235 else
3236 {
3237 /* For the non-shared case, discard space for relocs against
3238 symbols which turn out to need copy relocs or are not
3239 dynamic. */
3240
f5385ebf
AM
3241 if (!h->non_got_ref
3242 && ((h->def_dynamic
3243 && !h->def_regular)
067653c5
AM
3244 || (htab->root.dynamic_sections_created
3245 && (h->root.type == bfd_link_hash_undefweak
3246 || h->root.type == bfd_link_hash_undefined))))
3247 {
3248 /* Make sure this symbol is output as a dynamic symbol.
3249 Undefined weak syms won't yet be marked as dynamic. */
3250 if (h->dynindx == -1
f5385ebf 3251 && !h->forced_local)
067653c5 3252 {
c152c796 3253 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 3254 return FALSE;
067653c5
AM
3255 }
3256
3257 /* If that succeeded, we know we'll be keeping all the
3258 relocs. */
3259 if (h->dynindx != -1)
3260 goto keep;
3261 }
3262
3263 eh->dyn_relocs = NULL;
3264
3265 keep: ;
3266 }
3267
3268 /* Finally, allocate space. */
3269 for (p = eh->dyn_relocs; p != NULL; p = p->next)
3270 {
3271 asection *sreloc = elf_section_data (p->sec)->sreloc;
eea6121a 3272 sreloc->size += p->count * sizeof (Elf32_External_Rela);
8e45593f
NC
3273
3274 /* If we need relocations, we do not need fixups. */
3275 if (htab->fdpic_p && !info->shared)
3276 htab->srofixup->size -= 4 * (p->count - p->pc_count);
067653c5
AM
3277 }
3278
b34976b6 3279 return TRUE;
067653c5
AM
3280}
3281
3282/* Find any dynamic relocs that apply to read-only sections. */
3283
b34976b6 3284static bfd_boolean
09fd220b 3285readonly_dynrelocs (struct elf_link_hash_entry *h, void *inf)
067653c5
AM
3286{
3287 struct elf_sh_link_hash_entry *eh;
3288 struct elf_sh_dyn_relocs *p;
3289
067653c5
AM
3290 eh = (struct elf_sh_link_hash_entry *) h;
3291 for (p = eh->dyn_relocs; p != NULL; p = p->next)
3292 {
3293 asection *s = p->sec->output_section;
3294
3295 if (s != NULL && (s->flags & SEC_READONLY) != 0)
3296 {
3297 struct bfd_link_info *info = (struct bfd_link_info *) inf;
3298
3299 info->flags |= DF_TEXTREL;
3300
3301 /* Not an error, just cut short the traversal. */
b34976b6 3302 return FALSE;
067653c5
AM
3303 }
3304 }
b34976b6 3305 return TRUE;
067653c5
AM
3306}
3307
55e6e397
RS
3308/* This function is called after all the input files have been read,
3309 and the input sections have been assigned to output sections.
3310 It's a convenient place to determine the PLT style. */
3311
3312static bfd_boolean
3313sh_elf_always_size_sections (bfd *output_bfd, struct bfd_link_info *info)
3314{
3315 sh_elf_hash_table (info)->plt_info = get_plt_info (output_bfd, info->shared);
8e45593f 3316
04c3a755
NS
3317 if (sh_elf_hash_table (info)->fdpic_p && !info->relocatable
3318 && !bfd_elf_stack_segment_size (output_bfd, info,
3319 "__stacksize", DEFAULT_STACK_SIZE))
3320 return FALSE;
55e6e397
RS
3321 return TRUE;
3322}
3323
37c644f2
AO
3324/* Set the sizes of the dynamic sections. */
3325
b34976b6 3326static bfd_boolean
09fd220b
KK
3327sh_elf_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
3328 struct bfd_link_info *info)
37c644f2 3329{
067653c5 3330 struct elf_sh_link_hash_table *htab;
37c644f2
AO
3331 bfd *dynobj;
3332 asection *s;
b34976b6 3333 bfd_boolean relocs;
067653c5 3334 bfd *ibfd;
37c644f2 3335
067653c5 3336 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
3337 if (htab == NULL)
3338 return FALSE;
3339
067653c5 3340 dynobj = htab->root.dynobj;
37c644f2
AO
3341 BFD_ASSERT (dynobj != NULL);
3342
067653c5 3343 if (htab->root.dynamic_sections_created)
37c644f2
AO
3344 {
3345 /* Set the contents of the .interp section to the interpreter. */
2558b9a9 3346 if (info->executable)
37c644f2 3347 {
3d4d4302 3348 s = bfd_get_linker_section (dynobj, ".interp");
37c644f2 3349 BFD_ASSERT (s != NULL);
eea6121a 3350 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
37c644f2
AO
3351 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
3352 }
3353 }
37c644f2 3354
067653c5
AM
3355 /* Set up .got offsets for local syms, and space for local dynamic
3356 relocs. */
3357 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
37c644f2 3358 {
067653c5
AM
3359 bfd_signed_vma *local_got;
3360 bfd_signed_vma *end_local_got;
8e45593f
NC
3361 union gotref *local_funcdesc, *end_local_funcdesc;
3362 char *local_got_type;
067653c5
AM
3363 bfd_size_type locsymcount;
3364 Elf_Internal_Shdr *symtab_hdr;
3365 asection *srel;
37c644f2 3366
0ffa91dd 3367 if (! is_sh_elf (ibfd))
37c644f2
AO
3368 continue;
3369
067653c5 3370 for (s = ibfd->sections; s != NULL; s = s->next)
37c644f2 3371 {
067653c5
AM
3372 struct elf_sh_dyn_relocs *p;
3373
3374 for (p = ((struct elf_sh_dyn_relocs *)
3375 elf_section_data (s)->local_dynrel);
3376 p != NULL;
3377 p = p->next)
37c644f2 3378 {
067653c5
AM
3379 if (! bfd_is_abs_section (p->sec)
3380 && bfd_is_abs_section (p->sec->output_section))
3381 {
3382 /* Input section has been discarded, either because
3383 it is a copy of a linkonce section or due to
3384 linker script /DISCARD/, so we'll be discarding
3385 the relocs too. */
3386 }
3348747a
NS
3387 else if (htab->vxworks_p
3388 && strcmp (p->sec->output_section->name,
3389 ".tls_vars") == 0)
3390 {
3391 /* Relocations in vxworks .tls_vars sections are
3392 handled specially by the loader. */
3393 }
067653c5
AM
3394 else if (p->count != 0)
3395 {
3396 srel = elf_section_data (p->sec)->sreloc;
eea6121a 3397 srel->size += p->count * sizeof (Elf32_External_Rela);
067653c5
AM
3398 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
3399 info->flags |= DF_TEXTREL;
8e45593f
NC
3400
3401 /* If we need relocations, we do not need fixups. */
3402 if (htab->fdpic_p && !info->shared)
3403 htab->srofixup->size -= 4 * (p->count - p->pc_count);
067653c5 3404 }
37c644f2
AO
3405 }
3406 }
067653c5 3407
0ffa91dd 3408 symtab_hdr = &elf_symtab_hdr (ibfd);
067653c5
AM
3409 locsymcount = symtab_hdr->sh_info;
3410#ifdef INCLUDE_SHMEDIA
3411 /* Count datalabel local GOT. */
3412 locsymcount *= 2;
3413#endif
067653c5
AM
3414 s = htab->sgot;
3415 srel = htab->srelgot;
8e45593f
NC
3416
3417 local_got = elf_local_got_refcounts (ibfd);
3418 if (local_got)
37c644f2 3419 {
8e45593f
NC
3420 end_local_got = local_got + locsymcount;
3421 local_got_type = sh_elf_local_got_type (ibfd);
3422 local_funcdesc = sh_elf_local_funcdesc (ibfd);
3423 for (; local_got < end_local_got; ++local_got)
37c644f2 3424 {
8e45593f
NC
3425 if (*local_got > 0)
3426 {
3427 *local_got = s->size;
3428 s->size += 4;
3429 if (*local_got_type == GOT_TLS_GD)
3430 s->size += 4;
3431 if (info->shared)
3432 srel->size += sizeof (Elf32_External_Rela);
3433 else
3434 htab->srofixup->size += 4;
3435
3436 if (*local_got_type == GOT_FUNCDESC)
3437 {
3438 if (local_funcdesc == NULL)
3439 {
3440 bfd_size_type size;
3441
3442 size = locsymcount * sizeof (union gotref);
3443 local_funcdesc = (union gotref *) bfd_zalloc (ibfd,
3444 size);
3445 if (local_funcdesc == NULL)
3446 return FALSE;
3447 sh_elf_local_funcdesc (ibfd) = local_funcdesc;
3448 local_funcdesc += (local_got
3449 - elf_local_got_refcounts (ibfd));
3450 }
3451 local_funcdesc->refcount++;
3452 ++local_funcdesc;
3453 }
3454 }
3455 else
3456 *local_got = (bfd_vma) -1;
3457 ++local_got_type;
3458 }
3459 }
3460
3461 local_funcdesc = sh_elf_local_funcdesc (ibfd);
3462 if (local_funcdesc)
3463 {
3464 end_local_funcdesc = local_funcdesc + locsymcount;
3465
3466 for (; local_funcdesc < end_local_funcdesc; ++local_funcdesc)
3467 {
3468 if (local_funcdesc->refcount > 0)
3469 {
3470 local_funcdesc->offset = htab->sfuncdesc->size;
3471 htab->sfuncdesc->size += 8;
3472 if (!info->shared)
3473 htab->srofixup->size += 8;
3474 else
3475 htab->srelfuncdesc->size += sizeof (Elf32_External_Rela);
3476 }
3477 else
3478 local_funcdesc->offset = MINUS_ONE;
37c644f2 3479 }
37c644f2 3480 }
8e45593f 3481
067653c5
AM
3482 }
3483
3376eaf5
KK
3484 if (htab->tls_ldm_got.refcount > 0)
3485 {
3486 /* Allocate 2 got entries and 1 dynamic reloc for R_SH_TLS_LD_32
3487 relocs. */
eea6121a
AM
3488 htab->tls_ldm_got.offset = htab->sgot->size;
3489 htab->sgot->size += 8;
3490 htab->srelgot->size += sizeof (Elf32_External_Rela);
3376eaf5
KK
3491 }
3492 else
3493 htab->tls_ldm_got.offset = -1;
3494
8e45593f
NC
3495 /* Only the reserved entries should be present. For FDPIC, they go at
3496 the end of .got.plt. */
3497 if (htab->fdpic_p)
3498 {
3499 BFD_ASSERT (htab->sgotplt && htab->sgotplt->size == 12);
3500 htab->sgotplt->size = 0;
3501 }
3502
067653c5
AM
3503 /* Allocate global sym .plt and .got entries, and space for global
3504 sym dynamic relocs. */
09fd220b 3505 elf_link_hash_traverse (&htab->root, allocate_dynrelocs, info);
067653c5 3506
8e45593f
NC
3507 /* Move the reserved entries and the _GLOBAL_OFFSET_TABLE_ symbol to the
3508 end of the FDPIC .got.plt. */
3509 if (htab->fdpic_p)
3510 {
3511 htab->root.hgot->root.u.def.value = htab->sgotplt->size;
3512 htab->sgotplt->size += 12;
3513 }
3514
3515 /* At the very end of the .rofixup section is a pointer to the GOT. */
3516 if (htab->fdpic_p && htab->srofixup != NULL)
3517 htab->srofixup->size += 4;
3518
067653c5
AM
3519 /* We now have determined the sizes of the various dynamic sections.
3520 Allocate memory for them. */
b34976b6 3521 relocs = FALSE;
067653c5
AM
3522 for (s = dynobj->sections; s != NULL; s = s->next)
3523 {
3524 if ((s->flags & SEC_LINKER_CREATED) == 0)
3525 continue;
3526
3527 if (s == htab->splt
3528 || s == htab->sgot
c456f082 3529 || s == htab->sgotplt
8e45593f
NC
3530 || s == htab->sfuncdesc
3531 || s == htab->srofixup
c456f082 3532 || s == htab->sdynbss)
067653c5
AM
3533 {
3534 /* Strip this section if we don't need it; see the
3535 comment below. */
3536 }
0112cd26 3537 else if (CONST_STRNEQ (bfd_get_section_name (dynobj, s), ".rela"))
067653c5 3538 {
55e6e397 3539 if (s->size != 0 && s != htab->srelplt && s != htab->srelplt2)
b34976b6 3540 relocs = TRUE;
067653c5
AM
3541
3542 /* We use the reloc_count field as a counter if we need
3543 to copy relocs into the output file. */
3544 s->reloc_count = 0;
3545 }
3546 else
37c644f2
AO
3547 {
3548 /* It's not one of our sections, so don't allocate space. */
3549 continue;
3550 }
3551
eea6121a 3552 if (s->size == 0)
37c644f2 3553 {
067653c5
AM
3554 /* If we don't need this section, strip it from the
3555 output file. This is mostly to handle .rela.bss and
3556 .rela.plt. We must create both sections in
3557 create_dynamic_sections, because they must be created
3558 before the linker maps input sections to output
3559 sections. The linker does that before
3560 adjust_dynamic_symbol is called, and it is that
3561 function which decides whether anything needs to go
3562 into these sections. */
3563
8423293d 3564 s->flags |= SEC_EXCLUDE;
37c644f2
AO
3565 continue;
3566 }
3567
c456f082
AM
3568 if ((s->flags & SEC_HAS_CONTENTS) == 0)
3569 continue;
3570
067653c5
AM
3571 /* Allocate memory for the section contents. We use bfd_zalloc
3572 here in case unused entries are not reclaimed before the
3573 section's contents are written out. This should not happen,
3574 but this way if it does, we get a R_SH_NONE reloc instead
3575 of garbage. */
eea6121a 3576 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
067653c5 3577 if (s->contents == NULL)
b34976b6 3578 return FALSE;
37c644f2
AO
3579 }
3580
067653c5 3581 if (htab->root.dynamic_sections_created)
37c644f2
AO
3582 {
3583 /* Add some entries to the .dynamic section. We fill in the
3584 values later, in sh_elf_finish_dynamic_sections, but we
3585 must add the entries now so that we get the correct size for
3586 the .dynamic section. The DT_DEBUG entry is filled in by the
3587 dynamic linker and used by the debugger. */
dc810e39 3588#define add_dynamic_entry(TAG, VAL) \
5a580b3a 3589 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 3590
2558b9a9 3591 if (info->executable)
37c644f2 3592 {
067653c5 3593 if (! add_dynamic_entry (DT_DEBUG, 0))
b34976b6 3594 return FALSE;
37c644f2
AO
3595 }
3596
eea6121a 3597 if (htab->splt->size != 0)
37c644f2 3598 {
067653c5
AM
3599 if (! add_dynamic_entry (DT_PLTGOT, 0)
3600 || ! add_dynamic_entry (DT_PLTRELSZ, 0)
3601 || ! add_dynamic_entry (DT_PLTREL, DT_RELA)
3602 || ! add_dynamic_entry (DT_JMPREL, 0))
b34976b6 3603 return FALSE;
37c644f2 3604 }
8e45593f
NC
3605 else if ((elf_elfheader (output_bfd)->e_flags & EF_SH_FDPIC)
3606 && htab->sgot->size != 0)
3607 {
3608 if (! add_dynamic_entry (DT_PLTGOT, 0))
3609 return FALSE;
3610 }
37c644f2
AO
3611
3612 if (relocs)
3613 {
067653c5
AM
3614 if (! add_dynamic_entry (DT_RELA, 0)
3615 || ! add_dynamic_entry (DT_RELASZ, 0)
3616 || ! add_dynamic_entry (DT_RELAENT,
3617 sizeof (Elf32_External_Rela)))
b34976b6 3618 return FALSE;
37c644f2 3619
067653c5
AM
3620 /* If any dynamic relocs apply to a read-only section,
3621 then we need a DT_TEXTREL entry. */
3622 if ((info->flags & DF_TEXTREL) == 0)
09fd220b 3623 elf_link_hash_traverse (&htab->root, readonly_dynrelocs, info);
067653c5
AM
3624
3625 if ((info->flags & DF_TEXTREL) != 0)
3626 {
3627 if (! add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 3628 return FALSE;
067653c5 3629 }
37c644f2 3630 }
7a2b07ff
NS
3631 if (htab->vxworks_p
3632 && !elf_vxworks_add_dynamic_entries (output_bfd, info))
3633 return FALSE;
37c644f2 3634 }
dc810e39 3635#undef add_dynamic_entry
37c644f2 3636
b34976b6 3637 return TRUE;
37c644f2 3638}
37c644f2 3639\f
8e45593f 3640/* Add a dynamic relocation to the SRELOC section. */
37c644f2 3641
8e45593f
NC
3642inline static bfd_vma
3643sh_elf_add_dyn_reloc (bfd *output_bfd, asection *sreloc, bfd_vma offset,
3644 int reloc_type, long dynindx, bfd_vma addend)
37c644f2 3645{
8e45593f
NC
3646 Elf_Internal_Rela outrel;
3647 bfd_vma reloc_offset;
37c644f2 3648
8e45593f
NC
3649 outrel.r_offset = offset;
3650 outrel.r_info = ELF32_R_INFO (dynindx, reloc_type);
3651 outrel.r_addend = addend;
0ffa91dd 3652
8e45593f
NC
3653 reloc_offset = sreloc->reloc_count * sizeof (Elf32_External_Rela);
3654 BFD_ASSERT (reloc_offset < sreloc->size);
3655 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
3656 sreloc->contents + reloc_offset);
3657 sreloc->reloc_count++;
37c644f2 3658
8e45593f
NC
3659 return reloc_offset;
3660}
37c644f2 3661
8e45593f 3662/* Add an FDPIC read-only fixup. */
37c644f2 3663
8e45593f
NC
3664inline static void
3665sh_elf_add_rofixup (bfd *output_bfd, asection *srofixup, bfd_vma offset)
3666{
3667 bfd_vma fixup_offset;
3668
3669 fixup_offset = srofixup->reloc_count++ * 4;
3670 BFD_ASSERT (fixup_offset < srofixup->size);
3671 bfd_put_32 (output_bfd, offset, srofixup->contents + fixup_offset);
3672}
3673
3674/* Return the offset of the generated .got section from the
3675 _GLOBAL_OFFSET_TABLE_ symbol. */
3676
3677static bfd_signed_vma
3678sh_elf_got_offset (struct elf_sh_link_hash_table *htab)
3679{
3680 return (htab->sgot->output_offset - htab->sgotplt->output_offset
3681 - htab->root.hgot->root.u.def.value);
3682}
3683
3684/* Find the segment number in which OSEC, and output section, is
3685 located. */
3686
3687static unsigned
3688sh_elf_osec_to_segment (bfd *output_bfd, asection *osec)
3689{
3d301fdc
AM
3690 Elf_Internal_Phdr *p = NULL;
3691
3692 if (output_bfd->xvec->flavour == bfd_target_elf_flavour)
3693 p = _bfd_elf_find_segment_containing_section (output_bfd, osec);
8e45593f
NC
3694
3695 /* FIXME: Nothing ever says what this index is relative to. The kernel
3696 supplies data in terms of the number of load segments but this is
3697 a phdr index and the first phdr may not be a load segment. */
3698 return (p != NULL) ? p - elf_tdata (output_bfd)->phdr : -1;
3699}
3700
3701static bfd_boolean
3702sh_elf_osec_readonly_p (bfd *output_bfd, asection *osec)
3703{
3704 unsigned seg = sh_elf_osec_to_segment (output_bfd, osec);
3705
3d301fdc
AM
3706 return (seg != (unsigned) -1
3707 && ! (elf_tdata (output_bfd)->phdr[seg].p_flags & PF_W));
8e45593f
NC
3708}
3709
3710/* Generate the initial contents of a local function descriptor, along
3711 with any relocations or fixups required. */
3712static bfd_boolean
3713sh_elf_initialize_funcdesc (bfd *output_bfd,
3714 struct bfd_link_info *info,
3715 struct elf_link_hash_entry *h,
3716 bfd_vma offset,
3717 asection *section,
3718 bfd_vma value)
3719{
3720 struct elf_sh_link_hash_table *htab;
3721 int dynindx;
3722 bfd_vma addr, seg;
3723
3724 htab = sh_elf_hash_table (info);
3725
3726 /* FIXME: The ABI says that the offset to the function goes in the
3727 descriptor, along with the segment index. We're RELA, so it could
3728 go in the reloc instead... */
3729
3730 if (h != NULL && SYMBOL_CALLS_LOCAL (info, h))
3731 {
3732 section = h->root.u.def.section;
3733 value = h->root.u.def.value;
3734 }
3735
3736 if (h == NULL || SYMBOL_CALLS_LOCAL (info, h))
3737 {
3738 dynindx = elf_section_data (section->output_section)->dynindx;
3739 addr = value + section->output_offset;
3740 seg = sh_elf_osec_to_segment (output_bfd, section->output_section);
3741 }
3742 else
3743 {
3744 BFD_ASSERT (h->dynindx != -1);
3745 dynindx = h->dynindx;
3746 addr = seg = 0;
3747 }
3748
3749 if (!info->shared && SYMBOL_CALLS_LOCAL (info, h))
3750 {
3751 if (h == NULL || h->root.type != bfd_link_hash_undefweak)
3752 {
3753 sh_elf_add_rofixup (output_bfd, htab->srofixup,
3754 offset
3755 + htab->sfuncdesc->output_section->vma
3756 + htab->sfuncdesc->output_offset);
3757 sh_elf_add_rofixup (output_bfd, htab->srofixup,
3758 offset + 4
3759 + htab->sfuncdesc->output_section->vma
3760 + htab->sfuncdesc->output_offset);
3761 }
3762
3763 /* There are no dynamic relocations so fill in the final
3764 address and gp value (barring fixups). */
3765 addr += section->output_section->vma;
3766 seg = htab->root.hgot->root.u.def.value
3767 + htab->root.hgot->root.u.def.section->output_section->vma
3768 + htab->root.hgot->root.u.def.section->output_offset;
3769 }
3770 else
3771 sh_elf_add_dyn_reloc (output_bfd, htab->srelfuncdesc,
3772 offset
3773 + htab->sfuncdesc->output_section->vma
3774 + htab->sfuncdesc->output_offset,
3775 R_SH_FUNCDESC_VALUE, dynindx, 0);
3776
3777 bfd_put_32 (output_bfd, addr, htab->sfuncdesc->contents + offset);
3778 bfd_put_32 (output_bfd, seg, htab->sfuncdesc->contents + offset + 4);
3779
3780 return TRUE;
3781}
3782
3783/* Install a 20-bit movi20 field starting at ADDR, which occurs in OUTPUT_BFD.
3784 VALUE is the field's value. Return bfd_reloc_ok if successful or an error
3785 otherwise. */
3786
3787static bfd_reloc_status_type
3788install_movi20_field (bfd *output_bfd, unsigned long relocation,
3789 bfd *input_bfd, asection *input_section,
3790 bfd_byte *contents, bfd_vma offset)
3791{
3792 unsigned long cur_val;
3793 bfd_byte *addr;
3794 bfd_reloc_status_type r;
3795
3796 if (offset > bfd_get_section_limit (input_bfd, input_section))
3797 return bfd_reloc_outofrange;
3798
3799 r = bfd_check_overflow (complain_overflow_signed, 20, 0,
3800 bfd_arch_bits_per_address (input_bfd), relocation);
3801 if (r != bfd_reloc_ok)
3802 return r;
3803
3804 addr = contents + offset;
3805 cur_val = bfd_get_16 (output_bfd, addr);
3806 bfd_put_16 (output_bfd, cur_val | ((relocation & 0xf0000) >> 12), addr);
3807 bfd_put_16 (output_bfd, relocation & 0xffff, addr + 2);
3808
3809 return bfd_reloc_ok;
3810}
3811
3812/* Relocate an SH ELF section. */
3813
3814static bfd_boolean
3815sh_elf_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
3816 bfd *input_bfd, asection *input_section,
3817 bfd_byte *contents, Elf_Internal_Rela *relocs,
3818 Elf_Internal_Sym *local_syms,
3819 asection **local_sections)
3820{
3821 struct elf_sh_link_hash_table *htab;
3822 Elf_Internal_Shdr *symtab_hdr;
3823 struct elf_link_hash_entry **sym_hashes;
3824 Elf_Internal_Rela *rel, *relend;
e0af1f53 3825 bfd *dynobj = NULL;
8e45593f 3826 bfd_vma *local_got_offsets;
e0af1f53
MR
3827 asection *sgot = NULL;
3828 asection *sgotplt = NULL;
3829 asection *splt = NULL;
3830 asection *sreloc = NULL;
3831 asection *srelgot = NULL;
8e45593f
NC
3832 bfd_boolean is_vxworks_tls;
3833 unsigned isec_segment, got_segment, plt_segment, check_segment[2];
e0af1f53 3834 bfd_boolean fdpic_p = FALSE;
8e45593f
NC
3835
3836 BFD_ASSERT (is_sh_elf (input_bfd));
3837
3838 htab = sh_elf_hash_table (info);
e0af1f53
MR
3839 if (htab != NULL)
3840 {
3841 dynobj = htab->root.dynobj;
3842 sgot = htab->sgot;
3843 sgotplt = htab->sgotplt;
3844 splt = htab->splt;
3845 fdpic_p = htab->fdpic_p;
3846 }
8e45593f
NC
3847 symtab_hdr = &elf_symtab_hdr (input_bfd);
3848 sym_hashes = elf_sym_hashes (input_bfd);
8e45593f
NC
3849 local_got_offsets = elf_local_got_offsets (input_bfd);
3850
3851 isec_segment = sh_elf_osec_to_segment (output_bfd,
3852 input_section->output_section);
e0af1f53 3853 if (fdpic_p && sgot)
8e45593f 3854 got_segment = sh_elf_osec_to_segment (output_bfd,
e0af1f53 3855 sgot->output_section);
8e45593f
NC
3856 else
3857 got_segment = -1;
e0af1f53 3858 if (fdpic_p && splt)
8e45593f 3859 plt_segment = sh_elf_osec_to_segment (output_bfd,
e0af1f53 3860 splt->output_section);
8e45593f
NC
3861 else
3862 plt_segment = -1;
3863
8e45593f
NC
3864 /* We have to handle relocations in vxworks .tls_vars sections
3865 specially, because the dynamic loader is 'weird'. */
e0af1f53 3866 is_vxworks_tls = (htab && htab->vxworks_p && info->shared
8e45593f
NC
3867 && !strcmp (input_section->output_section->name,
3868 ".tls_vars"));
3869
3870 rel = relocs;
3871 relend = relocs + input_section->reloc_count;
3872 for (; rel < relend; rel++)
3873 {
3874 int r_type;
3875 reloc_howto_type *howto;
3876 unsigned long r_symndx;
3877 Elf_Internal_Sym *sym;
3878 asection *sec;
3879 struct elf_link_hash_entry *h;
3880 bfd_vma relocation;
3881 bfd_vma addend = (bfd_vma) 0;
3882 bfd_reloc_status_type r;
3883 int seen_stt_datalabel = 0;
3884 bfd_vma off;
85e02784 3885 enum got_type got_type;
8e45593f
NC
3886 const char *symname = NULL;
3887
3888 r_symndx = ELF32_R_SYM (rel->r_info);
37c644f2 3889
37c644f2
AO
3890 r_type = ELF32_R_TYPE (rel->r_info);
3891
3892 /* Many of the relocs are only used for relaxing, and are
067653c5 3893 handled entirely by the relaxation code. */
d38eb334
DD
3894 if (r_type >= (int) R_SH_GNU_VTINHERIT
3895 && r_type <= (int) R_SH_LABEL)
37c644f2 3896 continue;
c5aeb40f
AO
3897 if (r_type == (int) R_SH_NONE)
3898 continue;
37c644f2
AO
3899
3900 if (r_type < 0
3901 || r_type >= R_SH_max
3902 || (r_type >= (int) R_SH_FIRST_INVALID_RELOC
06bb75c1 3903 && r_type <= (int) R_SH_LAST_INVALID_RELOC)
8e45593f
NC
3904 || (r_type >= (int) R_SH_FIRST_INVALID_RELOC_2
3905 && r_type <= (int) R_SH_LAST_INVALID_RELOC_2)
fbca6ad9
AO
3906 || ( r_type >= (int) R_SH_FIRST_INVALID_RELOC_3
3907 && r_type <= (int) R_SH_LAST_INVALID_RELOC_3)
3908 || ( r_type >= (int) R_SH_FIRST_INVALID_RELOC_4
3909 && r_type <= (int) R_SH_LAST_INVALID_RELOC_4)
3376eaf5
KK
3910 || ( r_type >= (int) R_SH_FIRST_INVALID_RELOC_5
3911 && r_type <= (int) R_SH_LAST_INVALID_RELOC_5)
8e45593f
NC
3912 || ( r_type >= (int) R_SH_FIRST_INVALID_RELOC_6
3913 && r_type <= (int) R_SH_LAST_INVALID_RELOC_6))
37c644f2
AO
3914 {
3915 bfd_set_error (bfd_error_bad_value);
b34976b6 3916 return FALSE;
37c644f2
AO
3917 }
3918
55e6e397 3919 howto = get_howto_table (output_bfd) + r_type;
37c644f2 3920
146be91a 3921 /* For relocs that aren't partial_inplace, we get the addend from
067653c5 3922 the relocation. */
146be91a
HPN
3923 if (! howto->partial_inplace)
3924 addend = rel->r_addend;
3925
37c644f2
AO
3926 h = NULL;
3927 sym = NULL;
3928 sec = NULL;
8e45593f
NC
3929 check_segment[0] = -1;
3930 check_segment[1] = -1;
37c644f2
AO
3931 if (r_symndx < symtab_hdr->sh_info)
3932 {
3933 sym = local_syms + r_symndx;
3934 sec = local_sections[r_symndx];
8e45593f
NC
3935
3936 symname = bfd_elf_string_from_elf_section
3937 (input_bfd, symtab_hdr->sh_link, sym->st_name);
3938 if (symname == NULL || *symname == '\0')
3939 symname = bfd_section_name (input_bfd, sec);
3940
37c644f2
AO
3941 relocation = (sec->output_section->vma
3942 + sec->output_offset
3943 + sym->st_value);
fbca6ad9
AO
3944 /* A local symbol never has STO_SH5_ISA32, so we don't need
3945 datalabel processing here. Make sure this does not change
3946 without notice. */
3947 if ((sym->st_other & STO_SH5_ISA32) != 0)
3948 ((*info->callbacks->reloc_dangerous)
3949 (info,
3950 _("Unexpected STO_SH5_ISA32 on local symbol is not handled"),
3951 input_bfd, input_section, rel->r_offset));
ab96bf03 3952
dbaa2011 3953 if (sec != NULL && discarded_section (sec))
ab96bf03
AM
3954 /* Handled below. */
3955 ;
3956 else if (info->relocatable)
8a3975e6 3957 {
1049f94e 3958 /* This is a relocatable link. We don't have to change
8a3975e6
AO
3959 anything, unless the reloc is against a section symbol,
3960 in which case we have to adjust according to where the
3961 section symbol winds up in the output section. */
8a3975e6 3962 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
146be91a
HPN
3963 {
3964 if (! howto->partial_inplace)
3965 {
3966 /* For relocations with the addend in the
3967 relocation, we need just to update the addend.
3968 All real relocs are of type partial_inplace; this
3969 code is mostly for completeness. */
ab96bf03 3970 rel->r_addend += sec->output_offset;
146be91a
HPN
3971
3972 continue;
3973 }
3974
3975 /* Relocs of type partial_inplace need to pick up the
3976 contents in the contents and add the offset resulting
3977 from the changed location of the section symbol.
3978 Using _bfd_final_link_relocate (e.g. goto
3979 final_link_relocate) here would be wrong, because
3980 relocations marked pc_relative would get the current
3981 location subtracted, and we must only do that at the
3982 final link. */
3983 r = _bfd_relocate_contents (howto, input_bfd,
3984 sec->output_offset
3985 + sym->st_value,
3986 contents + rel->r_offset);
3987 goto relocation_done;
3988 }
8a3975e6
AO
3989
3990 continue;
3991 }
f8df10f4
JJ
3992 else if (! howto->partial_inplace)
3993 {
8517fae7 3994 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
f8df10f4
JJ
3995 addend = rel->r_addend;
3996 }
3997 else if ((sec->flags & SEC_MERGE)
3998 && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
3999 {
4000 asection *msec;
4001
4002 if (howto->rightshift || howto->src_mask != 0xffffffff)
4003 {
4004 (*_bfd_error_handler)
d003868e
AM
4005 (_("%B(%A+0x%lx): %s relocation against SEC_MERGE section"),
4006 input_bfd, input_section,
f8df10f4 4007 (long) rel->r_offset, howto->name);
b34976b6 4008 return FALSE;
f8df10f4
JJ
4009 }
4010
067653c5
AM
4011 addend = bfd_get_32 (input_bfd, contents + rel->r_offset);
4012 msec = sec;
4013 addend =
c629eae0 4014 _bfd_elf_rel_local_sym (output_bfd, sym, &msec, addend)
f8df10f4
JJ
4015 - relocation;
4016 addend += msec->output_section->vma + msec->output_offset;
4017 bfd_put_32 (input_bfd, addend, contents + rel->r_offset);
4018 addend = 0;
4019 }
37c644f2
AO
4020 }
4021 else
4022 {
560e09e9
NC
4023 /* FIXME: Ought to make use of the RELOC_FOR_GLOBAL_SYMBOL macro. */
4024
ab96bf03 4025 relocation = 0;
37c644f2 4026 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
8e45593f 4027 symname = h->root.root.string;
37c644f2
AO
4028 while (h->root.type == bfd_link_hash_indirect
4029 || h->root.type == bfd_link_hash_warning)
fbca6ad9
AO
4030 {
4031#ifdef INCLUDE_SHMEDIA
4032 /* If the reference passes a symbol marked with
4033 STT_DATALABEL, then any STO_SH5_ISA32 on the final value
4034 doesn't count. */
4035 seen_stt_datalabel |= h->type == STT_DATALABEL;
4036#endif
4037 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4038 }
37c644f2
AO
4039 if (h->root.type == bfd_link_hash_defined
4040 || h->root.type == bfd_link_hash_defweak)
4041 {
b34976b6 4042 bfd_boolean dyn;
067653c5 4043
e0af1f53 4044 dyn = htab ? htab->root.dynamic_sections_created : FALSE;
37c644f2
AO
4045 sec = h->root.u.def.section;
4046 /* In these cases, we don't need the relocation value.
4047 We check specially because in some obscure cases
435b1e90 4048 sec->output_section will be NULL. */
37c644f2 4049 if (r_type == R_SH_GOTPC
fbca6ad9
AO
4050 || r_type == R_SH_GOTPC_LOW16
4051 || r_type == R_SH_GOTPC_MEDLOW16
4052 || r_type == R_SH_GOTPC_MEDHI16
4053 || r_type == R_SH_GOTPC_HI16
4054 || ((r_type == R_SH_PLT32
4055 || r_type == R_SH_PLT_LOW16
4056 || r_type == R_SH_PLT_MEDLOW16
4057 || r_type == R_SH_PLT_MEDHI16
4058 || r_type == R_SH_PLT_HI16)
37c644f2 4059 && h->plt.offset != (bfd_vma) -1)
fbca6ad9 4060 || ((r_type == R_SH_GOT32
8e45593f
NC
4061 || r_type == R_SH_GOT20
4062 || r_type == R_SH_GOTFUNCDESC
4063 || r_type == R_SH_GOTFUNCDESC20
4064 || r_type == R_SH_GOTOFFFUNCDESC
4065 || r_type == R_SH_GOTOFFFUNCDESC20
4066 || r_type == R_SH_FUNCDESC
fbca6ad9
AO
4067 || r_type == R_SH_GOT_LOW16
4068 || r_type == R_SH_GOT_MEDLOW16
4069 || r_type == R_SH_GOT_MEDHI16
4070 || r_type == R_SH_GOT_HI16)
267fb3c1 4071 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
37c644f2
AO
4072 && (! info->shared
4073 || (! info->symbolic && h->dynindx != -1)
f5385ebf 4074 || !h->def_regular))
37c644f2
AO
4075 /* The cases above are those in which relocation is
4076 overwritten in the switch block below. The cases
4077 below are those in which we must defer relocation
4078 to run-time, because we can't resolve absolute
4079 addresses when creating a shared library. */
4080 || (info->shared
4081 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 4082 || !h->def_regular)
37c644f2 4083 && ((r_type == R_SH_DIR32
f5385ebf 4084 && !h->forced_local)
f50ad433
KK
4085 || (r_type == R_SH_REL32
4086 && !SYMBOL_CALLS_LOCAL (info, h)))
37c644f2
AO
4087 && ((input_section->flags & SEC_ALLOC) != 0
4088 /* DWARF will emit R_SH_DIR32 relocations in its
4089 sections against symbols defined externally
4090 in shared libraries. We can't do anything
4091 with them here. */
067653c5 4092 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 4093 && h->def_dynamic)))
1448fa32
KK
4094 /* Dynamic relocs are not propagated for SEC_DEBUGGING
4095 sections because such sections are not SEC_ALLOC and
4096 thus ld.so will not process them. */
4097 || (sec->output_section == NULL
4098 && ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 4099 && h->def_dynamic))
3376eaf5 4100 || (sec->output_section == NULL
8e45593f
NC
4101 && (sh_elf_hash_entry (h)->got_type == GOT_TLS_IE
4102 || sh_elf_hash_entry (h)->got_type == GOT_TLS_GD)))
ab96bf03
AM
4103 ;
4104 else if (sec->output_section != NULL)
4105 relocation = ((h->root.u.def.value
4106 + sec->output_section->vma
4107 + sec->output_offset)
4108 /* A STO_SH5_ISA32 causes a "bitor 1" to the
4109 symbol value, unless we've seen
4110 STT_DATALABEL on the way to it. */
4111 | ((h->other & STO_SH5_ISA32) != 0
4112 && ! seen_stt_datalabel));
1d5316ab
AM
4113 else if (!info->relocatable
4114 && (_bfd_elf_section_offset (output_bfd, info,
4115 input_section,
4116 rel->r_offset)
4117 != (bfd_vma) -1))
37c644f2
AO
4118 {
4119 (*_bfd_error_handler)
843fe662
L
4120 (_("%B(%A+0x%lx): unresolvable %s relocation against symbol `%s'"),
4121 input_bfd,
4122 input_section,
4123 (long) rel->r_offset,
4124 howto->name,
4125 h->root.root.string);
b34976b6 4126 return FALSE;
37c644f2 4127 }
37c644f2
AO
4128 }
4129 else if (h->root.type == bfd_link_hash_undefweak)
ab96bf03 4130 ;
59c2e50f 4131 else if (info->unresolved_syms_in_objects == RM_IGNORE
067653c5 4132 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
ab96bf03
AM
4133 ;
4134 else if (!info->relocatable)
37c644f2 4135 {
560e09e9
NC
4136 if (! info->callbacks->undefined_symbol
4137 (info, h->root.root.string, input_bfd,
4138 input_section, rel->r_offset,
59c2e50f 4139 (info->unresolved_syms_in_objects == RM_GENERATE_ERROR
560e09e9 4140 || ELF_ST_VISIBILITY (h->other))))
b34976b6 4141 return FALSE;
37c644f2
AO
4142 }
4143 }
4144
dbaa2011 4145 if (sec != NULL && discarded_section (sec))
e4067dbb 4146 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 4147 rel, 1, relend, howto, 0, contents);
ab96bf03
AM
4148
4149 if (info->relocatable)
4150 continue;
4151
8e45593f
NC
4152 /* Check for inter-segment relocations in FDPIC files. Most
4153 relocations connect the relocation site to the location of
4154 the target symbol, but there are some exceptions below. */
4155 check_segment[0] = isec_segment;
4156 if (sec != NULL)
4157 check_segment[1] = sh_elf_osec_to_segment (output_bfd,
4158 sec->output_section);
4159 else
4160 check_segment[1] = -1;
4161
435b1e90 4162 switch ((int) r_type)
37c644f2
AO
4163 {
4164 final_link_relocate:
4165 /* COFF relocs don't use the addend. The addend is used for
435b1e90 4166 R_SH_DIR32 to be compatible with other compilers. */
37c644f2
AO
4167 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
4168 contents, rel->r_offset,
4169 relocation, addend);
4170 break;
4171
4172 case R_SH_IND12W:
cd6ec716
DD
4173 goto final_link_relocate;
4174
37c644f2
AO
4175 case R_SH_DIR8WPN:
4176 case R_SH_DIR8WPZ:
4177 case R_SH_DIR8WPL:
cd6ec716
DD
4178 /* If the reloc is against the start of this section, then
4179 the assembler has already taken care of it and the reloc
4180 is here only to assist in relaxing. If the reloc is not
4181 against the start of this section, then it's against an
4182 external symbol and we must deal with it ourselves. */
4183 if (input_section->output_section->vma + input_section->output_offset
4184 != relocation)
4185 {
4186 int disp = (relocation
4187 - input_section->output_section->vma
4188 - input_section->output_offset
4189 - rel->r_offset);
4190 int mask = 0;
4191 switch (r_type)
4192 {
4193 case R_SH_DIR8WPN:
4194 case R_SH_DIR8WPZ: mask = 1; break;
4195 case R_SH_DIR8WPL: mask = 3; break;
4196 default: mask = 0; break;
4197 }
4198 if (disp & mask)
4199 {
4200 ((*_bfd_error_handler)
d003868e
AM
4201 (_("%B: 0x%lx: fatal: unaligned branch target for relax-support relocation"),
4202 input_section->owner,
cd6ec716
DD
4203 (unsigned long) rel->r_offset));
4204 bfd_set_error (bfd_error_bad_value);
b34976b6 4205 return FALSE;
cd6ec716
DD
4206 }
4207 relocation -= 4;
4208 goto final_link_relocate;
4209 }
4210 r = bfd_reloc_ok;
4211 break;
37c644f2
AO
4212
4213 default:
fbca6ad9
AO
4214#ifdef INCLUDE_SHMEDIA
4215 if (shmedia_prepare_reloc (info, input_bfd, input_section,
4216 contents, rel, &relocation))
4217 goto final_link_relocate;
4218#endif
37c644f2 4219 bfd_set_error (bfd_error_bad_value);
b34976b6 4220 return FALSE;
37c644f2 4221
d38eb334
DD
4222 case R_SH_DIR16:
4223 case R_SH_DIR8:
4224 case R_SH_DIR8U:
4225 case R_SH_DIR8S:
4226 case R_SH_DIR4U:
4227 goto final_link_relocate;
4228
4229 case R_SH_DIR8UL:
4230 case R_SH_DIR4UL:
4231 if (relocation & 3)
4232 {
4233 ((*_bfd_error_handler)
d003868e
AM
4234 (_("%B: 0x%lx: fatal: unaligned %s relocation 0x%lx"),
4235 input_section->owner,
68ffbac6 4236 (unsigned long) rel->r_offset, howto->name,
d003868e 4237 (unsigned long) relocation));
d38eb334
DD
4238 bfd_set_error (bfd_error_bad_value);
4239 return FALSE;
4240 }
4241 goto final_link_relocate;
4242
4243 case R_SH_DIR8UW:
4244 case R_SH_DIR8SW:
4245 case R_SH_DIR4UW:
4246 if (relocation & 1)
4247 {
4248 ((*_bfd_error_handler)
d003868e
AM
4249 (_("%B: 0x%lx: fatal: unaligned %s relocation 0x%lx"),
4250 input_section->owner,
68ffbac6 4251 (unsigned long) rel->r_offset, howto->name,
d003868e 4252 (unsigned long) relocation));
d38eb334
DD
4253 bfd_set_error (bfd_error_bad_value);
4254 return FALSE;
4255 }
4256 goto final_link_relocate;
4257
4258 case R_SH_PSHA:
4259 if ((signed int)relocation < -32
4260 || (signed int)relocation > 32)
4261 {
4262 ((*_bfd_error_handler)
d003868e
AM
4263 (_("%B: 0x%lx: fatal: R_SH_PSHA relocation %d not in range -32..32"),
4264 input_section->owner,
d38eb334 4265 (unsigned long) rel->r_offset,
d003868e 4266 (unsigned long) relocation));
d38eb334
DD
4267 bfd_set_error (bfd_error_bad_value);
4268 return FALSE;
4269 }
4270 goto final_link_relocate;
4271
4272 case R_SH_PSHL:
4273 if ((signed int)relocation < -16
4274 || (signed int)relocation > 16)
4275 {
4276 ((*_bfd_error_handler)
d003868e
AM
4277 (_("%B: 0x%lx: fatal: R_SH_PSHL relocation %d not in range -32..32"),
4278 input_section->owner,
d38eb334 4279 (unsigned long) rel->r_offset,
d003868e 4280 (unsigned long) relocation));
d38eb334
DD
4281 bfd_set_error (bfd_error_bad_value);
4282 return FALSE;
4283 }
4284 goto final_link_relocate;
4285
37c644f2
AO
4286 case R_SH_DIR32:
4287 case R_SH_REL32:
46e993b9
KK
4288#ifdef INCLUDE_SHMEDIA
4289 case R_SH_IMM_LOW16_PCREL:
4290 case R_SH_IMM_MEDLOW16_PCREL:
4291 case R_SH_IMM_MEDHI16_PCREL:
4292 case R_SH_IMM_HI16_PCREL:
4293#endif
37c644f2 4294 if (info->shared
04e534c3
KK
4295 && (h == NULL
4296 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
4297 || h->root.type != bfd_link_hash_undefweak)
cf35638d 4298 && r_symndx != STN_UNDEF
37c644f2 4299 && (input_section->flags & SEC_ALLOC) != 0
3348747a 4300 && !is_vxworks_tls
46e993b9 4301 && (r_type == R_SH_DIR32
3d85aebe 4302 || !SYMBOL_CALLS_LOCAL (info, h)))
37c644f2
AO
4303 {
4304 Elf_Internal_Rela outrel;
947216bf 4305 bfd_byte *loc;
b34976b6 4306 bfd_boolean skip, relocate;
37c644f2
AO
4307
4308 /* When generating a shared object, these relocations
4309 are copied into the output file to be resolved at run
4310 time. */
4311
4312 if (sreloc == NULL)
4313 {
83bac4b0
NC
4314 sreloc = _bfd_elf_get_dynamic_reloc_section
4315 (input_bfd, input_section, /*rela?*/ TRUE);
4316 if (sreloc == NULL)
b34976b6 4317 return FALSE;
37c644f2
AO
4318 }
4319
b34976b6
AM
4320 skip = FALSE;
4321 relocate = FALSE;
37c644f2 4322
c629eae0
JJ
4323 outrel.r_offset =
4324 _bfd_elf_section_offset (output_bfd, info, input_section,
4325 rel->r_offset);
4326 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 4327 skip = TRUE;
0bb2d96a 4328 else if (outrel.r_offset == (bfd_vma) -2)
b34976b6 4329 skip = TRUE, relocate = TRUE;
37c644f2
AO
4330 outrel.r_offset += (input_section->output_section->vma
4331 + input_section->output_offset);
4332
4333 if (skip)
0bb2d96a 4334 memset (&outrel, 0, sizeof outrel);
37c644f2
AO
4335 else if (r_type == R_SH_REL32)
4336 {
4337 BFD_ASSERT (h != NULL && h->dynindx != -1);
37c644f2 4338 outrel.r_info = ELF32_R_INFO (h->dynindx, R_SH_REL32);
146be91a 4339 outrel.r_addend
55e6e397
RS
4340 = (howto->partial_inplace
4341 ? bfd_get_32 (input_bfd, contents + rel->r_offset)
4342 : addend);
37c644f2 4343 }
46e993b9
KK
4344#ifdef INCLUDE_SHMEDIA
4345 else if (r_type == R_SH_IMM_LOW16_PCREL
4346 || r_type == R_SH_IMM_MEDLOW16_PCREL
4347 || r_type == R_SH_IMM_MEDHI16_PCREL
4348 || r_type == R_SH_IMM_HI16_PCREL)
4349 {
4350 BFD_ASSERT (h != NULL && h->dynindx != -1);
4351 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
4352 outrel.r_addend = addend;
4353 }
4354#endif
e0af1f53 4355 else if (fdpic_p
8e45593f
NC
4356 && (h == NULL
4357 || ((info->symbolic || h->dynindx == -1)
4358 && h->def_regular)))
4359 {
4360 int dynindx;
4361
4362 BFD_ASSERT (sec != NULL);
4363 BFD_ASSERT (sec->output_section != NULL);
4364 dynindx = elf_section_data (sec->output_section)->dynindx;
4365 outrel.r_info = ELF32_R_INFO (dynindx, R_SH_DIR32);
4366 outrel.r_addend = relocation;
4367 outrel.r_addend
4368 += (howto->partial_inplace
4369 ? bfd_get_32 (input_bfd, contents + rel->r_offset)
4370 : addend);
4371 outrel.r_addend -= sec->output_section->vma;
4372 }
37c644f2
AO
4373 else
4374 {
4375 /* h->dynindx may be -1 if this symbol was marked to
4376 become local. */
4377 if (h == NULL
4378 || ((info->symbolic || h->dynindx == -1)
f5385ebf 4379 && h->def_regular))
37c644f2 4380 {
55e6e397 4381 relocate = howto->partial_inplace;
37c644f2 4382 outrel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
37c644f2
AO
4383 }
4384 else
4385 {
4386 BFD_ASSERT (h->dynindx != -1);
37c644f2 4387 outrel.r_info = ELF32_R_INFO (h->dynindx, R_SH_DIR32);
37c644f2 4388 }
55e6e397
RS
4389 outrel.r_addend = relocation;
4390 outrel.r_addend
4391 += (howto->partial_inplace
4392 ? bfd_get_32 (input_bfd, contents + rel->r_offset)
4393 : addend);
37c644f2
AO
4394 }
4395
947216bf
AM
4396 loc = sreloc->contents;
4397 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
4398 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
37c644f2 4399
8e45593f
NC
4400 check_segment[0] = check_segment[1] = -1;
4401
37c644f2
AO
4402 /* If this reloc is against an external symbol, we do
4403 not want to fiddle with the addend. Otherwise, we
4404 need to include the symbol value so that it becomes
4405 an addend for the dynamic reloc. */
4406 if (! relocate)
4407 continue;
4408 }
e0af1f53 4409 else if (fdpic_p && !info->shared
8e45593f
NC
4410 && r_type == R_SH_DIR32
4411 && (input_section->flags & SEC_ALLOC) != 0)
4412 {
4413 bfd_vma offset;
4414
e0af1f53
MR
4415 BFD_ASSERT (htab);
4416
8e45593f
NC
4417 if (sh_elf_osec_readonly_p (output_bfd,
4418 input_section->output_section))
4419 {
4420 (*_bfd_error_handler)
4421 (_("%B(%A+0x%lx): cannot emit fixup to `%s' in read-only section"),
4422 input_bfd,
4423 input_section,
4424 (long) rel->r_offset,
4425 symname);
4426 return FALSE;
4427 }
4428
4429 offset = _bfd_elf_section_offset (output_bfd, info,
4430 input_section, rel->r_offset);
4431 if (offset != (bfd_vma)-1)
4432 sh_elf_add_rofixup (output_bfd, htab->srofixup,
4433 input_section->output_section->vma
4434 + input_section->output_offset
4435 + rel->r_offset);
4436
4437 check_segment[0] = check_segment[1] = -1;
4438 }
37c644f2
AO
4439 goto final_link_relocate;
4440
fbca6ad9
AO
4441 case R_SH_GOTPLT32:
4442#ifdef INCLUDE_SHMEDIA
4443 case R_SH_GOTPLT_LOW16:
4444 case R_SH_GOTPLT_MEDLOW16:
4445 case R_SH_GOTPLT_MEDHI16:
4446 case R_SH_GOTPLT_HI16:
4447 case R_SH_GOTPLT10BY4:
4448 case R_SH_GOTPLT10BY8:
4449#endif
4450 /* Relocation is to the entry for this symbol in the
4451 procedure linkage table. */
4452
4453 if (h == NULL
f5385ebf 4454 || h->forced_local
fbca6ad9
AO
4455 || ! info->shared
4456 || info->symbolic
4457 || h->dynindx == -1
4458 || h->plt.offset == (bfd_vma) -1
4459 || h->got.offset != (bfd_vma) -1)
4460 goto force_got;
4461
4462 /* Relocation is to the entry for this symbol in the global
4463 offset table extension for the procedure linkage table. */
fbca6ad9 4464
e0af1f53 4465 BFD_ASSERT (htab);
067653c5 4466 BFD_ASSERT (sgotplt != NULL);
fbca6ad9 4467 relocation = (sgotplt->output_offset
55e6e397
RS
4468 + (get_plt_index (htab->plt_info, h->plt.offset)
4469 + 3) * 4);
fbca6ad9
AO
4470
4471#ifdef GOT_BIAS
4472 relocation -= GOT_BIAS;
4473#endif
4474
4475 goto final_link_relocate;
4476
4477 force_got:
37c644f2 4478 case R_SH_GOT32:
8e45593f 4479 case R_SH_GOT20:
fbca6ad9
AO
4480#ifdef INCLUDE_SHMEDIA
4481 case R_SH_GOT_LOW16:
4482 case R_SH_GOT_MEDLOW16:
4483 case R_SH_GOT_MEDHI16:
4484 case R_SH_GOT_HI16:
4485 case R_SH_GOT10BY4:
4486 case R_SH_GOT10BY8:
4487#endif
37c644f2
AO
4488 /* Relocation is to the entry for this symbol in the global
4489 offset table. */
067653c5 4490
e0af1f53 4491 BFD_ASSERT (htab);
067653c5 4492 BFD_ASSERT (sgot != NULL);
8e45593f 4493 check_segment[0] = check_segment[1] = -1;
37c644f2
AO
4494
4495 if (h != NULL)
4496 {
b34976b6 4497 bfd_boolean dyn;
37c644f2
AO
4498
4499 off = h->got.offset;
fbca6ad9
AO
4500#ifdef INCLUDE_SHMEDIA
4501 if (seen_stt_datalabel)
4502 {
4503 struct elf_sh_link_hash_entry *hsh;
4504
4505 hsh = (struct elf_sh_link_hash_entry *)h;
396a6083 4506 off = hsh->datalabel_got.offset;
fbca6ad9
AO
4507 }
4508#endif
37c644f2
AO
4509 BFD_ASSERT (off != (bfd_vma) -1);
4510
067653c5 4511 dyn = htab->root.dynamic_sections_created;
267fb3c1 4512 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
37c644f2 4513 || (info->shared
3d85aebe 4514 && SYMBOL_REFERENCES_LOCAL (info, h))
04e534c3
KK
4515 || (ELF_ST_VISIBILITY (h->other)
4516 && h->root.type == bfd_link_hash_undefweak))
37c644f2
AO
4517 {
4518 /* This is actually a static link, or it is a
4519 -Bsymbolic link and the symbol is defined
4520 locally, or the symbol was forced to be local
4521 because of a version file. We must initialize
4522 this entry in the global offset table. Since the
4523 offset must always be a multiple of 4, we use the
4524 least significant bit to record whether we have
4525 initialized it already.
4526
4527 When doing a dynamic link, we create a .rela.got
4528 relocation entry to initialize the value. This
4529 is done in the finish_dynamic_symbol routine. */
4530 if ((off & 1) != 0)
4531 off &= ~1;
4532 else
4533 {
4534 bfd_put_32 (output_bfd, relocation,
4535 sgot->contents + off);
fbca6ad9
AO
4536#ifdef INCLUDE_SHMEDIA
4537 if (seen_stt_datalabel)
4538 {
4539 struct elf_sh_link_hash_entry *hsh;
4540
4541 hsh = (struct elf_sh_link_hash_entry *)h;
396a6083 4542 hsh->datalabel_got.offset |= 1;
fbca6ad9
AO
4543 }
4544 else
4545#endif
4546 h->got.offset |= 1;
8e45593f
NC
4547
4548 /* If we initialize the GOT entry here with a valid
4549 symbol address, also add a fixup. */
e0af1f53 4550 if (fdpic_p && !info->shared
8e45593f
NC
4551 && sh_elf_hash_entry (h)->got_type == GOT_NORMAL
4552 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
4553 || h->root.type != bfd_link_hash_undefweak))
4554 sh_elf_add_rofixup (output_bfd, htab->srofixup,
4555 sgot->output_section->vma
4556 + sgot->output_offset
4557 + off);
37c644f2
AO
4558 }
4559 }
4560
8e45593f 4561 relocation = sh_elf_got_offset (htab) + off;
37c644f2
AO
4562 }
4563 else
4564 {
fbca6ad9
AO
4565#ifdef INCLUDE_SHMEDIA
4566 if (rel->r_addend)
4567 {
4568 BFD_ASSERT (local_got_offsets != NULL
4569 && (local_got_offsets[symtab_hdr->sh_info
4570 + r_symndx]
4571 != (bfd_vma) -1));
4572
4573 off = local_got_offsets[symtab_hdr->sh_info
4574 + r_symndx];
4575 }
4576 else
4577 {
4578#endif
37c644f2
AO
4579 BFD_ASSERT (local_got_offsets != NULL
4580 && local_got_offsets[r_symndx] != (bfd_vma) -1);
4581
4582 off = local_got_offsets[r_symndx];
fbca6ad9
AO
4583#ifdef INCLUDE_SHMEDIA
4584 }
4585#endif
37c644f2
AO
4586
4587 /* The offset must always be a multiple of 4. We use
4588 the least significant bit to record whether we have
4589 already generated the necessary reloc. */
4590 if ((off & 1) != 0)
4591 off &= ~1;
4592 else
4593 {
4594 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
4595
4596 if (info->shared)
4597 {
37c644f2 4598 Elf_Internal_Rela outrel;
947216bf 4599 bfd_byte *loc;
37c644f2 4600
3376eaf5
KK
4601 if (srelgot == NULL)
4602 {
3d4d4302
AM
4603 srelgot = bfd_get_linker_section (dynobj,
4604 ".rela.got");
3376eaf5
KK
4605 BFD_ASSERT (srelgot != NULL);
4606 }
37c644f2
AO
4607
4608 outrel.r_offset = (sgot->output_section->vma
4609 + sgot->output_offset
4610 + off);
e0af1f53 4611 if (fdpic_p)
8e45593f
NC
4612 {
4613 int dynindx
4614 = elf_section_data (sec->output_section)->dynindx;
4615 outrel.r_info = ELF32_R_INFO (dynindx, R_SH_DIR32);
4616 outrel.r_addend = relocation;
4617 outrel.r_addend -= sec->output_section->vma;
4618 }
4619 else
4620 {
4621 outrel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
4622 outrel.r_addend = relocation;
4623 }
947216bf
AM
4624 loc = srelgot->contents;
4625 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
4626 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
37c644f2 4627 }
e0af1f53 4628 else if (fdpic_p
8e45593f
NC
4629 && (sh_elf_local_got_type (input_bfd) [r_symndx]
4630 == GOT_NORMAL))
4631 sh_elf_add_rofixup (output_bfd, htab->srofixup,
4632 sgot->output_section->vma
4633 + sgot->output_offset
4634 + off);
37c644f2 4635
fbca6ad9
AO
4636#ifdef INCLUDE_SHMEDIA
4637 if (rel->r_addend)
4638 local_got_offsets[symtab_hdr->sh_info + r_symndx] |= 1;
4639 else
4640#endif
4641 local_got_offsets[r_symndx] |= 1;
37c644f2
AO
4642 }
4643
8e45593f 4644 relocation = sh_elf_got_offset (htab) + off;
37c644f2
AO
4645 }
4646
fbca6ad9 4647#ifdef GOT_BIAS
067653c5 4648 relocation -= GOT_BIAS;
fbca6ad9
AO
4649#endif
4650
8e45593f
NC
4651 if (r_type == R_SH_GOT20)
4652 {
4653 r = install_movi20_field (output_bfd, relocation + addend,
4654 input_bfd, input_section, contents,
4655 rel->r_offset);
4656 break;
4657 }
4658 else
4659 goto final_link_relocate;
37c644f2
AO
4660
4661 case R_SH_GOTOFF:
8e45593f 4662 case R_SH_GOTOFF20:
fbca6ad9
AO
4663#ifdef INCLUDE_SHMEDIA
4664 case R_SH_GOTOFF_LOW16:
4665 case R_SH_GOTOFF_MEDLOW16:
4666 case R_SH_GOTOFF_MEDHI16:
4667 case R_SH_GOTOFF_HI16:
4668#endif
8e45593f
NC
4669 /* GOTOFF relocations are relative to _GLOBAL_OFFSET_TABLE_, which
4670 we place at the start of the .got.plt section. This is the same
4671 as the start of the output .got section, unless there are function
4672 descriptors in front of it. */
e0af1f53 4673 BFD_ASSERT (htab);
8e45593f
NC
4674 BFD_ASSERT (sgotplt != NULL);
4675 check_segment[0] = got_segment;
4676 relocation -= sgotplt->output_section->vma + sgotplt->output_offset
4677 + htab->root.hgot->root.u.def.value;
37c644f2 4678
fbca6ad9
AO
4679#ifdef GOT_BIAS
4680 relocation -= GOT_BIAS;
4681#endif
4682
4683 addend = rel->r_addend;
4684
8e45593f
NC
4685 if (r_type == R_SH_GOTOFF20)
4686 {
4687 r = install_movi20_field (output_bfd, relocation + addend,
4688 input_bfd, input_section, contents,
4689 rel->r_offset);
4690 break;
4691 }
4692 else
4693 goto final_link_relocate;
37c644f2
AO
4694
4695 case R_SH_GOTPC:
fbca6ad9
AO
4696#ifdef INCLUDE_SHMEDIA
4697 case R_SH_GOTPC_LOW16:
4698 case R_SH_GOTPC_MEDLOW16:
4699 case R_SH_GOTPC_MEDHI16:
4700 case R_SH_GOTPC_HI16:
4701#endif
37c644f2
AO
4702 /* Use global offset table as symbol value. */
4703
8e45593f
NC
4704 BFD_ASSERT (sgotplt != NULL);
4705 relocation = sgotplt->output_section->vma + sgotplt->output_offset;
37c644f2 4706
fbca6ad9
AO
4707#ifdef GOT_BIAS
4708 relocation += GOT_BIAS;
4709#endif
4710
4711 addend = rel->r_addend;
4712
37c644f2
AO
4713 goto final_link_relocate;
4714
4715 case R_SH_PLT32:
fbca6ad9
AO
4716#ifdef INCLUDE_SHMEDIA
4717 case R_SH_PLT_LOW16:
4718 case R_SH_PLT_MEDLOW16:
4719 case R_SH_PLT_MEDHI16:
4720 case R_SH_PLT_HI16:
4721#endif
37c644f2
AO
4722 /* Relocation is to the entry for this symbol in the
4723 procedure linkage table. */
4724
4725 /* Resolve a PLT reloc against a local symbol directly,
4726 without using the procedure linkage table. */
4727 if (h == NULL)
4728 goto final_link_relocate;
4729
8e45593f
NC
4730 /* We don't want to warn on calls to undefined weak symbols,
4731 as calls to them must be protected by non-NULL tests
4732 anyway, and unprotected calls would invoke undefined
4733 behavior. */
4734 if (h->root.type == bfd_link_hash_undefweak)
4735 check_segment[0] = check_segment[1] = -1;
4736
f5385ebf 4737 if (h->forced_local)
37c644f2
AO
4738 goto final_link_relocate;
4739
4740 if (h->plt.offset == (bfd_vma) -1)
4741 {
4742 /* We didn't make a PLT entry for this symbol. This
4743 happens when statically linking PIC code, or when
4744 using -Bsymbolic. */
4745 goto final_link_relocate;
4746 }
4747
067653c5 4748 BFD_ASSERT (splt != NULL);
8e45593f 4749 check_segment[1] = plt_segment;
37c644f2
AO
4750 relocation = (splt->output_section->vma
4751 + splt->output_offset
4752 + h->plt.offset);
4753
fbca6ad9
AO
4754#ifdef INCLUDE_SHMEDIA
4755 relocation++;
4756#endif
4757
4758 addend = rel->r_addend;
4759
37c644f2
AO
4760 goto final_link_relocate;
4761
8e45593f
NC
4762 /* Relocation is to the canonical function descriptor for this
4763 symbol, possibly via the GOT. Initialize the GOT
4764 entry and function descriptor if necessary. */
4765 case R_SH_GOTFUNCDESC:
4766 case R_SH_GOTFUNCDESC20:
4767 case R_SH_FUNCDESC:
4768 {
4769 int dynindx = -1;
4770 asection *reloc_section;
4771 bfd_vma reloc_offset;
4772 int reloc_type = R_SH_FUNCDESC;
4773
e0af1f53
MR
4774 BFD_ASSERT (htab);
4775
8e45593f
NC
4776 check_segment[0] = check_segment[1] = -1;
4777
4778 /* FIXME: See what FRV does for global symbols in the
4779 executable, with --export-dynamic. Do they need ld.so
4780 to allocate official descriptors? See what this code
4781 does. */
4782
4783 relocation = 0;
4784 addend = 0;
4785
4786 if (r_type == R_SH_FUNCDESC)
4787 {
4788 reloc_section = input_section;
4789 reloc_offset = rel->r_offset;
4790 }
4791 else
4792 {
e0af1f53 4793 reloc_section = sgot;
8e45593f
NC
4794
4795 if (h != NULL)
4796 reloc_offset = h->got.offset;
4797 else
4798 {
4799 BFD_ASSERT (local_got_offsets != NULL);
4800 reloc_offset = local_got_offsets[r_symndx];
4801 }
4802 BFD_ASSERT (reloc_offset != MINUS_ONE);
4803
4804 if (reloc_offset & 1)
4805 {
4806 reloc_offset &= ~1;
4807 goto funcdesc_done_got;
4808 }
4809 }
4810
4811 if (h && h->root.type == bfd_link_hash_undefweak
4812 && (SYMBOL_CALLS_LOCAL (info, h)
4813 || !htab->root.dynamic_sections_created))
4814 /* Undefined weak symbol which will not be dynamically
4815 resolved later; leave it at zero. */
4816 goto funcdesc_leave_zero;
4817 else if (SYMBOL_CALLS_LOCAL (info, h)
4818 && ! SYMBOL_FUNCDESC_LOCAL (info, h))
4819 {
4820 /* If the symbol needs a non-local function descriptor
4821 but binds locally (i.e., its visibility is
4822 protected), emit a dynamic relocation decayed to
4823 section+offset. This is an optimization; the dynamic
4824 linker would resolve our function descriptor request
4825 to our copy of the function anyway. */
4826 dynindx = elf_section_data (h->root.u.def.section
4827 ->output_section)->dynindx;
4828 relocation += h->root.u.def.section->output_offset
4829 + h->root.u.def.value;
4830 }
4831 else if (! SYMBOL_FUNCDESC_LOCAL (info, h))
4832 {
4833 /* If the symbol is dynamic and there will be dynamic
4834 symbol resolution because we are or are linked with a
4835 shared library, emit a FUNCDESC relocation such that
4836 the dynamic linker will allocate the function
4837 descriptor. */
4838 BFD_ASSERT (h->dynindx != -1);
4839 dynindx = h->dynindx;
4840 }
4841 else
4842 {
4843 bfd_vma offset;
4844
4845 /* Otherwise, we know we have a private function
4846 descriptor, so reference it directly. */
4847 reloc_type = R_SH_DIR32;
4848 dynindx = elf_section_data (htab->sfuncdesc
4849 ->output_section)->dynindx;
4850
4851 if (h)
4852 {
4853 offset = sh_elf_hash_entry (h)->funcdesc.offset;
4854 BFD_ASSERT (offset != MINUS_ONE);
4855 if ((offset & 1) == 0)
4856 {
4857 if (!sh_elf_initialize_funcdesc (output_bfd, info, h,
4858 offset, NULL, 0))
4859 return FALSE;
4860 sh_elf_hash_entry (h)->funcdesc.offset |= 1;
4861 }
4862 }
4863 else
4864 {
4865 union gotref *local_funcdesc;
4866
4867 local_funcdesc = sh_elf_local_funcdesc (input_bfd);
4868 offset = local_funcdesc[r_symndx].offset;
4869 BFD_ASSERT (offset != MINUS_ONE);
4870 if ((offset & 1) == 0)
4871 {
4872 if (!sh_elf_initialize_funcdesc (output_bfd, info, NULL,
4873 offset, sec,
4874 sym->st_value))
4875 return FALSE;
4876 local_funcdesc[r_symndx].offset |= 1;
4877 }
4878 }
4879
4880 relocation = htab->sfuncdesc->output_offset + (offset & ~1);
4881 }
4882
4883 if (!info->shared && SYMBOL_FUNCDESC_LOCAL (info, h))
4884 {
4885 bfd_vma offset;
4886
4887 if (sh_elf_osec_readonly_p (output_bfd,
4888 reloc_section->output_section))
4889 {
4890 (*_bfd_error_handler)
4891 (_("%B(%A+0x%lx): cannot emit fixup to `%s' in read-only section"),
4892 input_bfd,
4893 input_section,
4894 (long) rel->r_offset,
4895 symname);
4896 return FALSE;
4897 }
4898
4899 offset = _bfd_elf_section_offset (output_bfd, info,
4900 reloc_section, reloc_offset);
4901
4902 if (offset != (bfd_vma)-1)
4903 sh_elf_add_rofixup (output_bfd, htab->srofixup,
4904 offset
4905 + reloc_section->output_section->vma
4906 + reloc_section->output_offset);
4907 }
4908 else if ((reloc_section->output_section->flags
4909 & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
4910 {
4911 bfd_vma offset;
4912
4913 if (sh_elf_osec_readonly_p (output_bfd,
4914 reloc_section->output_section))
4915 {
4916 info->callbacks->warning
4917 (info,
4918 _("cannot emit dynamic relocations in read-only section"),
4919 symname, input_bfd, reloc_section, reloc_offset);
4920 return FALSE;
4921 }
4922
4923 if (srelgot == NULL)
4924 {
3d4d4302 4925 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
8e45593f
NC
4926 BFD_ASSERT (srelgot != NULL);
4927 }
4928
4929 offset = _bfd_elf_section_offset (output_bfd, info,
4930 reloc_section, reloc_offset);
4931
4932 if (offset != (bfd_vma)-1)
4933 sh_elf_add_dyn_reloc (output_bfd, srelgot,
4934 offset
4935 + reloc_section->output_section->vma
4936 + reloc_section->output_offset,
4937 reloc_type, dynindx, relocation);
4938
4939 if (r_type == R_SH_FUNCDESC)
4940 {
4941 r = bfd_reloc_ok;
4942 break;
4943 }
4944 else
4945 {
4946 relocation = 0;
4947 goto funcdesc_leave_zero;
4948 }
4949 }
4950
4951 if (SYMBOL_FUNCDESC_LOCAL (info, h))
4952 relocation += htab->sfuncdesc->output_section->vma;
4953 funcdesc_leave_zero:
4954 if (r_type != R_SH_FUNCDESC)
4955 {
4956 bfd_put_32 (output_bfd, relocation,
4957 reloc_section->contents + reloc_offset);
4958 if (h != NULL)
4959 h->got.offset |= 1;
4960 else
4961 local_got_offsets[r_symndx] |= 1;
4962
4963 funcdesc_done_got:
4964
4965 relocation = sh_elf_got_offset (htab) + reloc_offset;
4966#ifdef GOT_BIAS
4967 relocation -= GOT_BIAS;
4968#endif
4969 }
4970 if (r_type == R_SH_GOTFUNCDESC20)
4971 {
4972 r = install_movi20_field (output_bfd, relocation + addend,
4973 input_bfd, input_section, contents,
4974 rel->r_offset);
4975 break;
4976 }
4977 else
4978 goto final_link_relocate;
4979 }
4980 break;
4981
4982 case R_SH_GOTOFFFUNCDESC:
4983 case R_SH_GOTOFFFUNCDESC20:
4984 /* FIXME: See R_SH_FUNCDESC comment about global symbols in the
4985 executable and --export-dynamic. If such symbols get
4986 ld.so-allocated descriptors we can not use R_SH_GOTOFFFUNCDESC
4987 for them. */
e0af1f53 4988 BFD_ASSERT (htab);
8e45593f
NC
4989
4990 check_segment[0] = check_segment[1] = -1;
4991 relocation = 0;
4992 addend = rel->r_addend;
4993
4994 if (h && (h->root.type == bfd_link_hash_undefweak
4995 || !SYMBOL_FUNCDESC_LOCAL (info, h)))
4996 {
4997 _bfd_error_handler
4998 (_("%B(%A+0x%lx): %s relocation against external symbol \"%s\""),
4999 input_bfd, input_section, (long) rel->r_offset, howto->name,
5000 h->root.root.string);
5001 return FALSE;
5002 }
5003 else
5004 {
5005 bfd_vma offset;
5006
5007 /* Otherwise, we know we have a private function
5008 descriptor, so reference it directly. */
5009 if (h)
5010 {
5011 offset = sh_elf_hash_entry (h)->funcdesc.offset;
5012 BFD_ASSERT (offset != MINUS_ONE);
5013 if ((offset & 1) == 0)
5014 {
5015 if (!sh_elf_initialize_funcdesc (output_bfd, info, h,
5016 offset, NULL, 0))
5017 return FALSE;
5018 sh_elf_hash_entry (h)->funcdesc.offset |= 1;
5019 }
5020 }
5021 else
5022 {
5023 union gotref *local_funcdesc;
5024
5025 local_funcdesc = sh_elf_local_funcdesc (input_bfd);
5026 offset = local_funcdesc[r_symndx].offset;
5027 BFD_ASSERT (offset != MINUS_ONE);
5028 if ((offset & 1) == 0)
5029 {
5030 if (!sh_elf_initialize_funcdesc (output_bfd, info, NULL,
5031 offset, sec,
5032 sym->st_value))
5033 return FALSE;
5034 local_funcdesc[r_symndx].offset |= 1;
5035 }
5036 }
5037
5038 relocation = htab->sfuncdesc->output_offset + (offset & ~1);
5039 }
5040
e0af1f53
MR
5041 relocation -= (htab->root.hgot->root.u.def.value
5042 + sgotplt->output_offset);
8e45593f
NC
5043#ifdef GOT_BIAS
5044 relocation -= GOT_BIAS;
5045#endif
5046
5047 if (r_type == R_SH_GOTOFFFUNCDESC20)
5048 {
5049 r = install_movi20_field (output_bfd, relocation + addend,
5050 input_bfd, input_section, contents,
5051 rel->r_offset);
5052 break;
5053 }
5054 else
5055 goto final_link_relocate;
5056
37c644f2
AO
5057 case R_SH_LOOP_START:
5058 {
5059 static bfd_vma start, end;
5060
5061 start = (relocation + rel->r_addend
5062 - (sec->output_section->vma + sec->output_offset));
5063 r = sh_elf_reloc_loop (r_type, input_bfd, input_section, contents,
5064 rel->r_offset, sec, start, end);
5065 break;
5066
5067 case R_SH_LOOP_END:
5068 end = (relocation + rel->r_addend
5069 - (sec->output_section->vma + sec->output_offset));
5070 r = sh_elf_reloc_loop (r_type, input_bfd, input_section, contents,
5071 rel->r_offset, sec, start, end);
5072 break;
5073 }
3376eaf5
KK
5074
5075 case R_SH_TLS_GD_32:
5076 case R_SH_TLS_IE_32:
e0af1f53 5077 BFD_ASSERT (htab);
8e45593f 5078 check_segment[0] = check_segment[1] = -1;
3376eaf5 5079 r_type = sh_elf_optimized_tls_reloc (info, r_type, h == NULL);
8e45593f 5080 got_type = GOT_UNKNOWN;
3376eaf5 5081 if (h == NULL && local_got_offsets)
8e45593f 5082 got_type = sh_elf_local_got_type (input_bfd) [r_symndx];
3376eaf5
KK
5083 else if (h != NULL)
5084 {
8e45593f 5085 got_type = sh_elf_hash_entry (h)->got_type;
3376eaf5
KK
5086 if (! info->shared
5087 && (h->dynindx == -1
f5385ebf 5088 || h->def_regular))
267fb3c1 5089 r_type = R_SH_TLS_LE_32;
3376eaf5
KK
5090 }
5091
8e45593f 5092 if (r_type == R_SH_TLS_GD_32 && got_type == GOT_TLS_IE)
3376eaf5
KK
5093 r_type = R_SH_TLS_IE_32;
5094
5095 if (r_type == R_SH_TLS_LE_32)
5096 {
5097 bfd_vma offset;
5098 unsigned short insn;
3376eaf5
KK
5099
5100 if (ELF32_R_TYPE (rel->r_info) == R_SH_TLS_GD_32)
5101 {
5102 /* GD->LE transition:
5103 mov.l 1f,r4; mova 2f,r0; mov.l 2f,r1; add r0,r1;
b34976b6 5104 jsr @r1; add r12,r4; bra 3f; nop; .align 2;
3376eaf5
KK
5105 1: .long x$TLSGD; 2: .long __tls_get_addr@PLT; 3:
5106 We change it into:
5107 mov.l 1f,r4; stc gbr,r0; add r4,r0; nop;
5108 nop; nop; ...
5109 1: .long x@TPOFF; 2: .long __tls_get_addr@PLT; 3:. */
5110
5111 offset = rel->r_offset;
5112 BFD_ASSERT (offset >= 16);
5113 /* Size of GD instructions is 16 or 18. */
5114 offset -= 16;
5115 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5116 if ((insn & 0xff00) == 0xc700)
5117 {
5118 BFD_ASSERT (offset >= 2);
5119 offset -= 2;
5120 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5121 }
5122
5123 BFD_ASSERT ((insn & 0xff00) == 0xd400);
5124 insn = bfd_get_16 (input_bfd, contents + offset + 2);
5125 BFD_ASSERT ((insn & 0xff00) == 0xc700);
5126 insn = bfd_get_16 (input_bfd, contents + offset + 4);
5127 BFD_ASSERT ((insn & 0xff00) == 0xd100);
5128 insn = bfd_get_16 (input_bfd, contents + offset + 6);
5129 BFD_ASSERT (insn == 0x310c);
5130 insn = bfd_get_16 (input_bfd, contents + offset + 8);
5131 BFD_ASSERT (insn == 0x410b);
5132 insn = bfd_get_16 (input_bfd, contents + offset + 10);
5133 BFD_ASSERT (insn == 0x34cc);
5134
5135 bfd_put_16 (output_bfd, 0x0012, contents + offset + 2);
5136 bfd_put_16 (output_bfd, 0x304c, contents + offset + 4);
5137 bfd_put_16 (output_bfd, 0x0009, contents + offset + 6);
5138 bfd_put_16 (output_bfd, 0x0009, contents + offset + 8);
5139 bfd_put_16 (output_bfd, 0x0009, contents + offset + 10);
5140 }
5141 else
5142 {
91d6fa6a 5143 int target;
3376eaf5
KK
5144
5145 /* IE->LE transition:
5146 mov.l 1f,r0; stc gbr,rN; mov.l @(r0,r12),rM;
5147 bra 2f; add ...; .align 2; 1: x@GOTTPOFF; 2:
5148 We change it into:
5149 mov.l .Ln,rM; stc gbr,rN; nop; ...;
5150 1: x@TPOFF; 2:. */
5151
5152 offset = rel->r_offset;
5153 BFD_ASSERT (offset >= 16);
5154 /* Size of IE instructions is 10 or 12. */
5155 offset -= 10;
5156 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5157 if ((insn & 0xf0ff) == 0x0012)
5158 {
5159 BFD_ASSERT (offset >= 2);
5160 offset -= 2;
5161 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5162 }
5163
5164 BFD_ASSERT ((insn & 0xff00) == 0xd000);
91d6fa6a 5165 target = insn & 0x00ff;
3376eaf5
KK
5166 insn = bfd_get_16 (input_bfd, contents + offset + 2);
5167 BFD_ASSERT ((insn & 0xf0ff) == 0x0012);
5168 insn = bfd_get_16 (input_bfd, contents + offset + 4);
5169 BFD_ASSERT ((insn & 0xf0ff) == 0x00ce);
91d6fa6a 5170 insn = 0xd000 | (insn & 0x0f00) | target;
3376eaf5
KK
5171 bfd_put_16 (output_bfd, insn, contents + offset + 0);
5172 bfd_put_16 (output_bfd, 0x0009, contents + offset + 4);
5173 }
5174
267fb3c1
KK
5175 bfd_put_32 (output_bfd, tpoff (info, relocation),
5176 contents + rel->r_offset);
3376eaf5
KK
5177 continue;
5178 }
5179
8e45593f 5180 if (sgot == NULL || sgotplt == NULL)
3376eaf5
KK
5181 abort ();
5182
5183 if (h != NULL)
5184 off = h->got.offset;
5185 else
5186 {
5187 if (local_got_offsets == NULL)
5188 abort ();
5189
5190 off = local_got_offsets[r_symndx];
5191 }
5192
267fb3c1
KK
5193 /* Relocate R_SH_TLS_IE_32 directly when statically linking. */
5194 if (r_type == R_SH_TLS_IE_32
5195 && ! htab->root.dynamic_sections_created)
5196 {
5197 off &= ~1;
5198 bfd_put_32 (output_bfd, tpoff (info, relocation),
5199 sgot->contents + off);
8e45593f 5200 bfd_put_32 (output_bfd, sh_elf_got_offset (htab) + off,
267fb3c1
KK
5201 contents + rel->r_offset);
5202 continue;
5203 }
5204
3376eaf5
KK
5205 if ((off & 1) != 0)
5206 off &= ~1;
26e41594 5207 else
3376eaf5
KK
5208 {
5209 Elf_Internal_Rela outrel;
947216bf 5210 bfd_byte *loc;
3376eaf5
KK
5211 int dr_type, indx;
5212
5213 if (srelgot == NULL)
5214 {
3d4d4302 5215 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
3376eaf5
KK
5216 BFD_ASSERT (srelgot != NULL);
5217 }
5218
5219 outrel.r_offset = (sgot->output_section->vma
5220 + sgot->output_offset + off);
5221
267fb3c1 5222 if (h == NULL || h->dynindx == -1)
c95b8a7a
KK
5223 indx = 0;
5224 else
5225 indx = h->dynindx;
267fb3c1 5226
3376eaf5
KK
5227 dr_type = (r_type == R_SH_TLS_GD_32 ? R_SH_TLS_DTPMOD32 :
5228 R_SH_TLS_TPOFF32);
5229 if (dr_type == R_SH_TLS_TPOFF32 && indx == 0)
5230 outrel.r_addend = relocation - dtpoff_base (info);
5231 else
5232 outrel.r_addend = 0;
5233 outrel.r_info = ELF32_R_INFO (indx, dr_type);
947216bf
AM
5234 loc = srelgot->contents;
5235 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
3376eaf5
KK
5236 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
5237
5238 if (r_type == R_SH_TLS_GD_32)
5239 {
5240 if (indx == 0)
5241 {
5242 bfd_put_32 (output_bfd,
5243 relocation - dtpoff_base (info),
5244 sgot->contents + off + 4);
5245 }
5246 else
5247 {
5248 outrel.r_info = ELF32_R_INFO (indx,
5249 R_SH_TLS_DTPOFF32);
5250 outrel.r_offset += 4;
5251 outrel.r_addend = 0;
5252 srelgot->reloc_count++;
947216bf
AM
5253 loc += sizeof (Elf32_External_Rela);
5254 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3376eaf5
KK
5255 }
5256 }
5257
5258 if (h != NULL)
5259 h->got.offset |= 1;
5260 else
5261 local_got_offsets[r_symndx] |= 1;
5262 }
5263
5264 if (off >= (bfd_vma) -2)
5265 abort ();
5266
5267 if (r_type == (int) ELF32_R_TYPE (rel->r_info))
8e45593f 5268 relocation = sh_elf_got_offset (htab) + off;
3376eaf5
KK
5269 else
5270 {
5271 bfd_vma offset;
5272 unsigned short insn;
5273
5274 /* GD->IE transition:
5275 mov.l 1f,r4; mova 2f,r0; mov.l 2f,r1; add r0,r1;
5276 jsr @r1; add r12,r4; bra 3f; nop; .align 2;
5277 1: .long x$TLSGD; 2: .long __tls_get_addr@PLT; 3:
5278 We change it into:
5279 mov.l 1f,r0; stc gbr,r4; mov.l @(r0,r12),r0; add r4,r0;
5280 nop; nop; bra 3f; nop; .align 2;
5281 1: .long x@TPOFF; 2:...; 3:. */
5282
5283 offset = rel->r_offset;
5284 BFD_ASSERT (offset >= 16);
5285 /* Size of GD instructions is 16 or 18. */
5286 offset -= 16;
5287 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5288 if ((insn & 0xff00) == 0xc700)
5289 {
5290 BFD_ASSERT (offset >= 2);
5291 offset -= 2;
5292 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5293 }
5294
5295 BFD_ASSERT ((insn & 0xff00) == 0xd400);
5296
5297 /* Replace mov.l 1f,R4 with mov.l 1f,r0. */
5298 bfd_put_16 (output_bfd, insn & 0xf0ff, contents + offset);
5299
5300 insn = bfd_get_16 (input_bfd, contents + offset + 2);
5301 BFD_ASSERT ((insn & 0xff00) == 0xc700);
5302 insn = bfd_get_16 (input_bfd, contents + offset + 4);
5303 BFD_ASSERT ((insn & 0xff00) == 0xd100);
5304 insn = bfd_get_16 (input_bfd, contents + offset + 6);
5305 BFD_ASSERT (insn == 0x310c);
5306 insn = bfd_get_16 (input_bfd, contents + offset + 8);
5307 BFD_ASSERT (insn == 0x410b);
5308 insn = bfd_get_16 (input_bfd, contents + offset + 10);
5309 BFD_ASSERT (insn == 0x34cc);
5310
5311 bfd_put_16 (output_bfd, 0x0412, contents + offset + 2);
5312 bfd_put_16 (output_bfd, 0x00ce, contents + offset + 4);
5313 bfd_put_16 (output_bfd, 0x304c, contents + offset + 6);
5314 bfd_put_16 (output_bfd, 0x0009, contents + offset + 8);
5315 bfd_put_16 (output_bfd, 0x0009, contents + offset + 10);
5316
8e45593f 5317 bfd_put_32 (output_bfd, sh_elf_got_offset (htab) + off,
3376eaf5
KK
5318 contents + rel->r_offset);
5319
5320 continue;
5321 }
5322
5323 addend = rel->r_addend;
5324
5325 goto final_link_relocate;
5326
5327 case R_SH_TLS_LD_32:
e0af1f53 5328 BFD_ASSERT (htab);
8e45593f 5329 check_segment[0] = check_segment[1] = -1;
3376eaf5
KK
5330 if (! info->shared)
5331 {
5332 bfd_vma offset;
5333 unsigned short insn;
5334
5335 /* LD->LE transition:
5336 mov.l 1f,r4; mova 2f,r0; mov.l 2f,r1; add r0,r1;
5337 jsr @r1; add r12,r4; bra 3f; nop; .align 2;
5338 1: .long x$TLSLD; 2: .long __tls_get_addr@PLT; 3:
5339 We change it into:
5340 stc gbr,r0; nop; nop; nop;
5341 nop; nop; bra 3f; ...; 3:. */
5342
5343 offset = rel->r_offset;
5344 BFD_ASSERT (offset >= 16);
5345 /* Size of LD instructions is 16 or 18. */
5346 offset -= 16;
5347 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5348 if ((insn & 0xff00) == 0xc700)
5349 {
5350 BFD_ASSERT (offset >= 2);
5351 offset -= 2;
5352 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5353 }
5354
5355 BFD_ASSERT ((insn & 0xff00) == 0xd400);
5356 insn = bfd_get_16 (input_bfd, contents + offset + 2);
5357 BFD_ASSERT ((insn & 0xff00) == 0xc700);
5358 insn = bfd_get_16 (input_bfd, contents + offset + 4);
5359 BFD_ASSERT ((insn & 0xff00) == 0xd100);
5360 insn = bfd_get_16 (input_bfd, contents + offset + 6);
5361 BFD_ASSERT (insn == 0x310c);
5362 insn = bfd_get_16 (input_bfd, contents + offset + 8);
5363 BFD_ASSERT (insn == 0x410b);
5364 insn = bfd_get_16 (input_bfd, contents + offset + 10);
5365 BFD_ASSERT (insn == 0x34cc);
5366
5367 bfd_put_16 (output_bfd, 0x0012, contents + offset + 0);
5368 bfd_put_16 (output_bfd, 0x0009, contents + offset + 2);
5369 bfd_put_16 (output_bfd, 0x0009, contents + offset + 4);
5370 bfd_put_16 (output_bfd, 0x0009, contents + offset + 6);
5371 bfd_put_16 (output_bfd, 0x0009, contents + offset + 8);
5372 bfd_put_16 (output_bfd, 0x0009, contents + offset + 10);
5373
5374 continue;
5375 }
5376
8e45593f 5377 if (sgot == NULL || sgotplt == NULL)
3376eaf5
KK
5378 abort ();
5379
5380 off = htab->tls_ldm_got.offset;
5381 if (off & 1)
5382 off &= ~1;
5383 else
5384 {
5385 Elf_Internal_Rela outrel;
947216bf 5386 bfd_byte *loc;
3376eaf5
KK
5387
5388 srelgot = htab->srelgot;
5389 if (srelgot == NULL)
5390 abort ();
5391
5392 outrel.r_offset = (sgot->output_section->vma
5393 + sgot->output_offset + off);
5394 outrel.r_addend = 0;
5395 outrel.r_info = ELF32_R_INFO (0, R_SH_TLS_DTPMOD32);
947216bf
AM
5396 loc = srelgot->contents;
5397 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
3376eaf5
KK
5398 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
5399 htab->tls_ldm_got.offset |= 1;
5400 }
5401
8e45593f 5402 relocation = sh_elf_got_offset (htab) + off;
3376eaf5
KK
5403 addend = rel->r_addend;
5404
5405 goto final_link_relocate;
5406
5407 case R_SH_TLS_LDO_32:
8e45593f 5408 check_segment[0] = check_segment[1] = -1;
3376eaf5 5409 if (! info->shared)
267fb3c1 5410 relocation = tpoff (info, relocation);
3376eaf5
KK
5411 else
5412 relocation -= dtpoff_base (info);
5413
5414 addend = rel->r_addend;
5415 goto final_link_relocate;
5416
5417 case R_SH_TLS_LE_32:
5418 {
5419 int indx;
5420 Elf_Internal_Rela outrel;
947216bf 5421 bfd_byte *loc;
3376eaf5 5422
8e45593f
NC
5423 check_segment[0] = check_segment[1] = -1;
5424
b68593b9 5425 if (! info->shared || info->pie)
267fb3c1
KK
5426 {
5427 relocation = tpoff (info, relocation);
5428 addend = rel->r_addend;
5429 goto final_link_relocate;
5430 }
5431
3376eaf5
KK
5432 if (sreloc == NULL)
5433 {
83bac4b0
NC
5434 sreloc = _bfd_elf_get_dynamic_reloc_section
5435 (input_bfd, input_section, /*rela?*/ TRUE);
5436 if (sreloc == NULL)
b34976b6 5437 return FALSE;
3376eaf5
KK
5438 }
5439
267fb3c1
KK
5440 if (h == NULL || h->dynindx == -1)
5441 indx = 0;
5442 else
5443 indx = h->dynindx;
5444
3376eaf5
KK
5445 outrel.r_offset = (input_section->output_section->vma
5446 + input_section->output_offset
5447 + rel->r_offset);
5448 outrel.r_info = ELF32_R_INFO (indx, R_SH_TLS_TPOFF32);
5449 if (indx == 0)
5450 outrel.r_addend = relocation - dtpoff_base (info);
5451 else
5452 outrel.r_addend = 0;
3376eaf5 5453
947216bf
AM
5454 loc = sreloc->contents;
5455 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
5456 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3376eaf5
KK
5457 continue;
5458 }
37c644f2
AO
5459 }
5460
146be91a 5461 relocation_done:
e0af1f53 5462 if (fdpic_p && check_segment[0] != (unsigned) -1
8e45593f
NC
5463 && check_segment[0] != check_segment[1])
5464 {
5465 /* We don't want duplicate errors for undefined symbols. */
5466 if (!h || h->root.type != bfd_link_hash_undefined)
5467 {
5468 if (info->shared)
5469 {
5470 info->callbacks->einfo
5471 (_("%X%C: relocation to \"%s\" references a different segment\n"),
5472 input_bfd, input_section, rel->r_offset, symname);
5473 return FALSE;
5474 }
5475 else
5476 info->callbacks->einfo
5477 (_("%C: warning: relocation to \"%s\" references a different segment\n"),
5478 input_bfd, input_section, rel->r_offset, symname);
5479 }
5480
5481 elf_elfheader (output_bfd)->e_flags &= ~EF_SH_PIC;
5482 }
5483
37c644f2
AO
5484 if (r != bfd_reloc_ok)
5485 {
5486 switch (r)
5487 {
5488 default:
5489 case bfd_reloc_outofrange:
5490 abort ();
5491 case bfd_reloc_overflow:
5492 {
5493 const char *name;
5494
5495 if (h != NULL)
dfeffb9f 5496 name = NULL;
37c644f2
AO
5497 else
5498 {
252b5132
RH
5499 name = (bfd_elf_string_from_elf_section
5500 (input_bfd, symtab_hdr->sh_link, sym->st_name));
5501 if (name == NULL)
b34976b6 5502 return FALSE;
252b5132
RH
5503 if (*name == '\0')
5504 name = bfd_section_name (input_bfd, sec);
5505 }
5506 if (! ((*info->callbacks->reloc_overflow)
dfeffb9f
L
5507 (info, (h ? &h->root : NULL), name, howto->name,
5508 (bfd_vma) 0, input_bfd, input_section,
5509 rel->r_offset)))
b34976b6 5510 return FALSE;
252b5132
RH
5511 }
5512 break;
5513 }
5514 }
5515 }
5516
b34976b6 5517 return TRUE;
252b5132
RH
5518}
5519
5520/* This is a version of bfd_generic_get_relocated_section_contents
5521 which uses sh_elf_relocate_section. */
5522
5523static bfd_byte *
09fd220b
KK
5524sh_elf_get_relocated_section_contents (bfd *output_bfd,
5525 struct bfd_link_info *link_info,
5526 struct bfd_link_order *link_order,
5527 bfd_byte *data,
5528 bfd_boolean relocatable,
5529 asymbol **symbols)
252b5132
RH
5530{
5531 Elf_Internal_Shdr *symtab_hdr;
5532 asection *input_section = link_order->u.indirect.section;
5533 bfd *input_bfd = input_section->owner;
5534 asection **sections = NULL;
5535 Elf_Internal_Rela *internal_relocs = NULL;
6cdc0ccc 5536 Elf_Internal_Sym *isymbuf = NULL;
252b5132
RH
5537
5538 /* We only need to handle the case of relaxing, or of having a
5539 particular set of section contents, specially. */
1049f94e 5540 if (relocatable
252b5132
RH
5541 || elf_section_data (input_section)->this_hdr.contents == NULL)
5542 return bfd_generic_get_relocated_section_contents (output_bfd, link_info,
5543 link_order, data,
1049f94e 5544 relocatable,
252b5132
RH
5545 symbols);
5546
0ffa91dd 5547 symtab_hdr = &elf_symtab_hdr (input_bfd);
252b5132
RH
5548
5549 memcpy (data, elf_section_data (input_section)->this_hdr.contents,
eea6121a 5550 (size_t) input_section->size);
252b5132
RH
5551
5552 if ((input_section->flags & SEC_RELOC) != 0
5553 && input_section->reloc_count > 0)
5554 {
252b5132 5555 asection **secpp;
6cdc0ccc 5556 Elf_Internal_Sym *isym, *isymend;
9ad5cbcf 5557 bfd_size_type amt;
252b5132 5558
45d6a902 5559 internal_relocs = (_bfd_elf_link_read_relocs
09fd220b 5560 (input_bfd, input_section, NULL,
b34976b6 5561 (Elf_Internal_Rela *) NULL, FALSE));
252b5132
RH
5562 if (internal_relocs == NULL)
5563 goto error_return;
5564
6cdc0ccc
AM
5565 if (symtab_hdr->sh_info != 0)
5566 {
5567 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
5568 if (isymbuf == NULL)
5569 isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
5570 symtab_hdr->sh_info, 0,
5571 NULL, NULL, NULL);
5572 if (isymbuf == NULL)
5573 goto error_return;
5574 }
252b5132 5575
9ad5cbcf
AM
5576 amt = symtab_hdr->sh_info;
5577 amt *= sizeof (asection *);
5578 sections = (asection **) bfd_malloc (amt);
5579 if (sections == NULL && amt != 0)
252b5132
RH
5580 goto error_return;
5581
6cdc0ccc
AM
5582 isymend = isymbuf + symtab_hdr->sh_info;
5583 for (isym = isymbuf, secpp = sections; isym < isymend; ++isym, ++secpp)
252b5132
RH
5584 {
5585 asection *isec;
5586
6cdc0ccc 5587 if (isym->st_shndx == SHN_UNDEF)
252b5132 5588 isec = bfd_und_section_ptr;
6cdc0ccc 5589 else if (isym->st_shndx == SHN_ABS)
252b5132 5590 isec = bfd_abs_section_ptr;
6cdc0ccc 5591 else if (isym->st_shndx == SHN_COMMON)
252b5132
RH
5592 isec = bfd_com_section_ptr;
5593 else
6cdc0ccc 5594 isec = bfd_section_from_elf_index (input_bfd, isym->st_shndx);
252b5132
RH
5595
5596 *secpp = isec;
5597 }
5598
5599 if (! sh_elf_relocate_section (output_bfd, link_info, input_bfd,
5600 input_section, data, internal_relocs,
6cdc0ccc 5601 isymbuf, sections))
252b5132
RH
5602 goto error_return;
5603
5604 if (sections != NULL)
5605 free (sections);
6cdc0ccc
AM
5606 if (isymbuf != NULL
5607 && symtab_hdr->contents != (unsigned char *) isymbuf)
5608 free (isymbuf);
5609 if (elf_section_data (input_section)->relocs != internal_relocs)
252b5132 5610 free (internal_relocs);
252b5132
RH
5611 }
5612
5613 return data;
5614
5615 error_return:
252b5132
RH
5616 if (sections != NULL)
5617 free (sections);
6cdc0ccc
AM
5618 if (isymbuf != NULL
5619 && symtab_hdr->contents != (unsigned char *) isymbuf)
5620 free (isymbuf);
5621 if (internal_relocs != NULL
5622 && elf_section_data (input_section)->relocs != internal_relocs)
5623 free (internal_relocs);
252b5132
RH
5624 return NULL;
5625}
917583ad 5626
3376eaf5
KK
5627/* Return the base VMA address which should be subtracted from real addresses
5628 when resolving @dtpoff relocation.
5629 This is PT_TLS segment p_vaddr. */
5630
5631static bfd_vma
09fd220b 5632dtpoff_base (struct bfd_link_info *info)
3376eaf5 5633{
e1918d23
AM
5634 /* If tls_sec is NULL, we should have signalled an error already. */
5635 if (elf_hash_table (info)->tls_sec == NULL)
267fb3c1 5636 return 0;
e1918d23 5637 return elf_hash_table (info)->tls_sec->vma;
3376eaf5
KK
5638}
5639
267fb3c1
KK
5640/* Return the relocation value for R_SH_TLS_TPOFF32.. */
5641
5642static bfd_vma
09fd220b 5643tpoff (struct bfd_link_info *info, bfd_vma address)
267fb3c1 5644{
e1918d23
AM
5645 /* If tls_sec is NULL, we should have signalled an error already. */
5646 if (elf_hash_table (info)->tls_sec == NULL)
267fb3c1
KK
5647 return 0;
5648 /* SH TLS ABI is variant I and static TLS block start just after tcbhead
5649 structure which has 2 pointer fields. */
044ad7e3
KK
5650 return (address - elf_hash_table (info)->tls_sec->vma
5651 + align_power ((bfd_vma) 8,
5652 elf_hash_table (info)->tls_sec->alignment_power));
267fb3c1
KK
5653}
5654
252b5132 5655static asection *
09fd220b 5656sh_elf_gc_mark_hook (asection *sec,
07adf181
AM
5657 struct bfd_link_info *info,
5658 Elf_Internal_Rela *rel,
5659 struct elf_link_hash_entry *h,
09fd220b 5660 Elf_Internal_Sym *sym)
252b5132
RH
5661{
5662 if (h != NULL)
07adf181
AM
5663 switch (ELF32_R_TYPE (rel->r_info))
5664 {
5665 case R_SH_GNU_VTINHERIT:
5666 case R_SH_GNU_VTENTRY:
5667 return NULL;
5668 }
9ad5cbcf 5669
07adf181 5670 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
252b5132
RH
5671}
5672
37c644f2
AO
5673/* Update the got entry reference counts for the section being removed. */
5674
b34976b6 5675static bfd_boolean
09fd220b
KK
5676sh_elf_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info,
5677 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 5678{
067653c5
AM
5679 Elf_Internal_Shdr *symtab_hdr;
5680 struct elf_link_hash_entry **sym_hashes;
5681 bfd_signed_vma *local_got_refcounts;
8e45593f 5682 union gotref *local_funcdesc;
067653c5 5683 const Elf_Internal_Rela *rel, *relend;
067653c5 5684
7dda2462
TG
5685 if (info->relocatable)
5686 return TRUE;
5687
067653c5
AM
5688 elf_section_data (sec)->local_dynrel = NULL;
5689
0ffa91dd 5690 symtab_hdr = &elf_symtab_hdr (abfd);
067653c5
AM
5691 sym_hashes = elf_sym_hashes (abfd);
5692 local_got_refcounts = elf_local_got_refcounts (abfd);
8e45593f 5693 local_funcdesc = sh_elf_local_funcdesc (abfd);
067653c5
AM
5694
5695 relend = relocs + sec->reloc_count;
5696 for (rel = relocs; rel < relend; rel++)
396a6083 5697 {
26e41594
AM
5698 unsigned long r_symndx;
5699 unsigned int r_type;
5700 struct elf_link_hash_entry *h = NULL;
396a6083
SC
5701#ifdef INCLUDE_SHMEDIA
5702 int seen_stt_datalabel = 0;
5703#endif
3376eaf5 5704
396a6083 5705 r_symndx = ELF32_R_SYM (rel->r_info);
26e41594 5706 if (r_symndx >= symtab_hdr->sh_info)
396a6083 5707 {
26e41594
AM
5708 struct elf_sh_link_hash_entry *eh;
5709 struct elf_sh_dyn_relocs **pp;
5710 struct elf_sh_dyn_relocs *p;
5711
396a6083 5712 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
396a6083
SC
5713 while (h->root.type == bfd_link_hash_indirect
5714 || h->root.type == bfd_link_hash_warning)
5715 {
3eb128b2 5716#ifdef INCLUDE_SHMEDIA
396a6083 5717 seen_stt_datalabel |= h->type == STT_DATALABEL;
3eb128b2 5718#endif
396a6083
SC
5719 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5720 }
26e41594
AM
5721 eh = (struct elf_sh_link_hash_entry *) h;
5722 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
5723 if (p->sec == sec)
5724 {
5725 /* Everything must go for SEC. */
5726 *pp = p->next;
5727 break;
5728 }
396a6083 5729 }
067653c5 5730
26e41594
AM
5731 r_type = ELF32_R_TYPE (rel->r_info);
5732 switch (sh_elf_optimized_tls_reloc (info, r_type, h != NULL))
396a6083
SC
5733 {
5734 case R_SH_TLS_LD_32:
5735 if (sh_elf_hash_table (info)->tls_ldm_got.refcount > 0)
5736 sh_elf_hash_table (info)->tls_ldm_got.refcount -= 1;
5737 break;
5738
5739 case R_SH_GOT32:
8e45593f 5740 case R_SH_GOT20:
396a6083 5741 case R_SH_GOTOFF:
8e45593f 5742 case R_SH_GOTOFF20:
396a6083
SC
5743 case R_SH_GOTPC:
5744#ifdef INCLUDE_SHMEDIA
5745 case R_SH_GOT_LOW16:
5746 case R_SH_GOT_MEDLOW16:
5747 case R_SH_GOT_MEDHI16:
5748 case R_SH_GOT_HI16:
5749 case R_SH_GOT10BY4:
5750 case R_SH_GOT10BY8:
5751 case R_SH_GOTOFF_LOW16:
5752 case R_SH_GOTOFF_MEDLOW16:
5753 case R_SH_GOTOFF_MEDHI16:
5754 case R_SH_GOTOFF_HI16:
5755 case R_SH_GOTPC_LOW16:
5756 case R_SH_GOTPC_MEDLOW16:
5757 case R_SH_GOTPC_MEDHI16:
5758 case R_SH_GOTPC_HI16:
5759#endif
5760 case R_SH_TLS_GD_32:
5761 case R_SH_TLS_IE_32:
8e45593f
NC
5762 case R_SH_GOTFUNCDESC:
5763 case R_SH_GOTFUNCDESC20:
396a6083
SC
5764 if (h != NULL)
5765 {
5766#ifdef INCLUDE_SHMEDIA
5767 if (seen_stt_datalabel)
5768 {
26e41594
AM
5769 struct elf_sh_link_hash_entry *eh;
5770 eh = (struct elf_sh_link_hash_entry *) h;
396a6083
SC
5771 if (eh->datalabel_got.refcount > 0)
5772 eh->datalabel_got.refcount -= 1;
5773 }
5774 else
5775#endif
5776 if (h->got.refcount > 0)
5777 h->got.refcount -= 1;
5778 }
5779 else if (local_got_refcounts != NULL)
5780 {
5781#ifdef INCLUDE_SHMEDIA
5782 if (rel->r_addend & 1)
5783 {
5784 if (local_got_refcounts[symtab_hdr->sh_info + r_symndx] > 0)
5785 local_got_refcounts[symtab_hdr->sh_info + r_symndx] -= 1;
5786 }
5787 else
5788#endif
5789 if (local_got_refcounts[r_symndx] > 0)
5790 local_got_refcounts[r_symndx] -= 1;
5791 }
5792 break;
5793
8e45593f
NC
5794 case R_SH_FUNCDESC:
5795 if (h != NULL)
5796 sh_elf_hash_entry (h)->abs_funcdesc_refcount -= 1;
5797 else if (sh_elf_hash_table (info)->fdpic_p && !info->shared)
5798 sh_elf_hash_table (info)->srofixup->size -= 4;
5799
5800 /* Fall through. */
5801
5802 case R_SH_GOTOFFFUNCDESC:
5803 case R_SH_GOTOFFFUNCDESC20:
5804 if (h != NULL)
5805 sh_elf_hash_entry (h)->funcdesc.refcount -= 1;
5806 else
5807 local_funcdesc[r_symndx].refcount -= 1;
5808 break;
5809
396a6083 5810 case R_SH_DIR32:
8e45593f
NC
5811 if (sh_elf_hash_table (info)->fdpic_p && !info->shared
5812 && (sec->flags & SEC_ALLOC) != 0)
5813 sh_elf_hash_table (info)->srofixup->size -= 4;
5814 /* Fall thru */
5815
396a6083 5816 case R_SH_REL32:
26e41594
AM
5817 if (info->shared)
5818 break;
5819 /* Fall thru */
396a6083
SC
5820
5821 case R_SH_PLT32:
5822#ifdef INCLUDE_SHMEDIA
5823 case R_SH_PLT_LOW16:
5824 case R_SH_PLT_MEDLOW16:
5825 case R_SH_PLT_MEDHI16:
5826 case R_SH_PLT_HI16:
5827#endif
5828 if (h != NULL)
5829 {
5830 if (h->plt.refcount > 0)
5831 h->plt.refcount -= 1;
5832 }
5833 break;
067653c5 5834
396a6083
SC
5835 case R_SH_GOTPLT32:
5836#ifdef INCLUDE_SHMEDIA
5837 case R_SH_GOTPLT_LOW16:
5838 case R_SH_GOTPLT_MEDLOW16:
5839 case R_SH_GOTPLT_MEDHI16:
5840 case R_SH_GOTPLT_HI16:
5841 case R_SH_GOTPLT10BY4:
5842 case R_SH_GOTPLT10BY8:
5843#endif
5844 if (h != NULL)
5845 {
26e41594
AM
5846 struct elf_sh_link_hash_entry *eh;
5847 eh = (struct elf_sh_link_hash_entry *) h;
396a6083 5848 if (eh->gotplt_refcount > 0)
067653c5 5849 {
396a6083
SC
5850 eh->gotplt_refcount -= 1;
5851 if (h->plt.refcount > 0)
5852 h->plt.refcount -= 1;
067653c5 5853 }
067653c5 5854#ifdef INCLUDE_SHMEDIA
396a6083
SC
5855 else if (seen_stt_datalabel)
5856 {
5857 if (eh->datalabel_got.refcount > 0)
5858 eh->datalabel_got.refcount -= 1;
5859 }
067653c5 5860#endif
396a6083
SC
5861 else if (h->got.refcount > 0)
5862 h->got.refcount -= 1;
5863 }
5864 else if (local_got_refcounts != NULL)
5865 {
067653c5 5866#ifdef INCLUDE_SHMEDIA
396a6083
SC
5867 if (rel->r_addend & 1)
5868 {
5869 if (local_got_refcounts[symtab_hdr->sh_info + r_symndx] > 0)
5870 local_got_refcounts[symtab_hdr->sh_info + r_symndx] -= 1;
5871 }
5872 else
067653c5 5873#endif
396a6083
SC
5874 if (local_got_refcounts[r_symndx] > 0)
5875 local_got_refcounts[r_symndx] -= 1;
5876 }
5877 break;
067653c5 5878
396a6083
SC
5879 default:
5880 break;
5881 }
5882 }
067653c5 5883
b34976b6 5884 return TRUE;
252b5132
RH
5885}
5886
067653c5
AM
5887/* Copy the extra info we tack onto an elf_link_hash_entry. */
5888
5889static void
fcfa13d2 5890sh_elf_copy_indirect_symbol (struct bfd_link_info *info,
09fd220b
KK
5891 struct elf_link_hash_entry *dir,
5892 struct elf_link_hash_entry *ind)
067653c5
AM
5893{
5894 struct elf_sh_link_hash_entry *edir, *eind;
5895
5896 edir = (struct elf_sh_link_hash_entry *) dir;
5897 eind = (struct elf_sh_link_hash_entry *) ind;
5898
5899 if (eind->dyn_relocs != NULL)
5900 {
5901 if (edir->dyn_relocs != NULL)
5902 {
5903 struct elf_sh_dyn_relocs **pp;
5904 struct elf_sh_dyn_relocs *p;
5905
fcfa13d2 5906 /* Add reloc counts against the indirect sym to the direct sym
067653c5
AM
5907 list. Merge any entries against the same section. */
5908 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
5909 {
5910 struct elf_sh_dyn_relocs *q;
5911
5912 for (q = edir->dyn_relocs; q != NULL; q = q->next)
5913 if (q->sec == p->sec)
5914 {
5915 q->pc_count += p->pc_count;
5916 q->count += p->count;
5917 *pp = p->next;
5918 break;
5919 }
5920 if (q == NULL)
5921 pp = &p->next;
5922 }
5923 *pp = edir->dyn_relocs;
5924 }
5925
5926 edir->dyn_relocs = eind->dyn_relocs;
5927 eind->dyn_relocs = NULL;
5928 }
4989d792
SC
5929 edir->gotplt_refcount = eind->gotplt_refcount;
5930 eind->gotplt_refcount = 0;
396a6083 5931#ifdef INCLUDE_SHMEDIA
fcfa13d2
AM
5932 edir->datalabel_got.refcount += eind->datalabel_got.refcount;
5933 eind->datalabel_got.refcount = 0;
396a6083 5934#endif
8e45593f 5935 edir->funcdesc.refcount += eind->funcdesc.refcount;
68ffbac6 5936 eind->funcdesc.refcount = 0;
8e45593f 5937 edir->abs_funcdesc_refcount += eind->abs_funcdesc_refcount;
68ffbac6 5938 eind->abs_funcdesc_refcount = 0;
067653c5 5939
3376eaf5
KK
5940 if (ind->root.type == bfd_link_hash_indirect
5941 && dir->got.refcount <= 0)
5942 {
8e45593f
NC
5943 edir->got_type = eind->got_type;
5944 eind->got_type = GOT_UNKNOWN;
3376eaf5
KK
5945 }
5946
04e534c3 5947 if (ind->root.type != bfd_link_hash_indirect
f5385ebf
AM
5948 && dir->dynamic_adjusted)
5949 {
5950 /* If called to transfer flags for a weakdef during processing
5951 of elf_adjust_dynamic_symbol, don't copy non_got_ref.
5952 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
5953 dir->ref_dynamic |= ind->ref_dynamic;
5954 dir->ref_regular |= ind->ref_regular;
5955 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
5956 dir->needs_plt |= ind->needs_plt;
5957 }
04e534c3 5958 else
fcfa13d2 5959 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
067653c5
AM
5960}
5961
3376eaf5 5962static int
09fd220b
KK
5963sh_elf_optimized_tls_reloc (struct bfd_link_info *info, int r_type,
5964 int is_local)
3376eaf5
KK
5965{
5966 if (info->shared)
5967 return r_type;
5968
5969 switch (r_type)
5970 {
5971 case R_SH_TLS_GD_32:
5972 case R_SH_TLS_IE_32:
5973 if (is_local)
5974 return R_SH_TLS_LE_32;
5975 return R_SH_TLS_IE_32;
5976 case R_SH_TLS_LD_32:
5977 return R_SH_TLS_LE_32;
5978 }
5979
5980 return r_type;
5981}
5982
252b5132
RH
5983/* Look through the relocs for a section during the first phase.
5984 Since we don't do .gots or .plts, we just need to consider the
5985 virtual table relocs for gc. */
435b1e90 5986
b34976b6 5987static bfd_boolean
09fd220b
KK
5988sh_elf_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
5989 const Elf_Internal_Rela *relocs)
252b5132
RH
5990{
5991 Elf_Internal_Shdr *symtab_hdr;
5582a088 5992 struct elf_link_hash_entry **sym_hashes;
067653c5 5993 struct elf_sh_link_hash_table *htab;
252b5132
RH
5994 const Elf_Internal_Rela *rel;
5995 const Elf_Internal_Rela *rel_end;
37c644f2 5996 asection *sreloc;
3376eaf5 5997 unsigned int r_type;
85e02784 5998 enum got_type got_type, old_got_type;
435b1e90 5999
37c644f2
AO
6000 sreloc = NULL;
6001
1049f94e 6002 if (info->relocatable)
b34976b6 6003 return TRUE;
435b1e90 6004
0ffa91dd
NC
6005 BFD_ASSERT (is_sh_elf (abfd));
6006
6007 symtab_hdr = &elf_symtab_hdr (abfd);
252b5132 6008 sym_hashes = elf_sym_hashes (abfd);
435b1e90 6009
067653c5 6010 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
6011 if (htab == NULL)
6012 return FALSE;
6013
252b5132
RH
6014 rel_end = relocs + sec->reloc_count;
6015 for (rel = relocs; rel < rel_end; rel++)
6016 {
6017 struct elf_link_hash_entry *h;
6018 unsigned long r_symndx;
396a6083
SC
6019#ifdef INCLUDE_SHMEDIA
6020 int seen_stt_datalabel = 0;
6021#endif
435b1e90 6022
252b5132 6023 r_symndx = ELF32_R_SYM (rel->r_info);
3376eaf5
KK
6024 r_type = ELF32_R_TYPE (rel->r_info);
6025
252b5132 6026 if (r_symndx < symtab_hdr->sh_info)
435b1e90 6027 h = NULL;
252b5132 6028 else
396a6083
SC
6029 {
6030 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
396a6083
SC
6031 while (h->root.type == bfd_link_hash_indirect
6032 || h->root.type == bfd_link_hash_warning)
6033 {
973a3492 6034#ifdef INCLUDE_SHMEDIA
396a6083 6035 seen_stt_datalabel |= h->type == STT_DATALABEL;
973a3492 6036#endif
396a6083
SC
6037 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6038 }
396a6083 6039 }
435b1e90 6040
3376eaf5
KK
6041 r_type = sh_elf_optimized_tls_reloc (info, r_type, h == NULL);
6042 if (! info->shared
6043 && r_type == R_SH_TLS_IE_32
6044 && h != NULL
6045 && h->root.type != bfd_link_hash_undefined
6046 && h->root.type != bfd_link_hash_undefweak
6047 && (h->dynindx == -1
f5385ebf 6048 || h->def_regular))
3376eaf5
KK
6049 r_type = R_SH_TLS_LE_32;
6050
8e45593f
NC
6051 if (htab->fdpic_p)
6052 switch (r_type)
6053 {
6054 case R_SH_GOTOFFFUNCDESC:
6055 case R_SH_GOTOFFFUNCDESC20:
6056 case R_SH_FUNCDESC:
6057 case R_SH_GOTFUNCDESC:
6058 case R_SH_GOTFUNCDESC20:
6059 if (h != NULL)
6060 {
6061 if (h->dynindx == -1)
6062 switch (ELF_ST_VISIBILITY (h->other))
6063 {
6064 case STV_INTERNAL:
6065 case STV_HIDDEN:
6066 break;
6067 default:
6068 bfd_elf_link_record_dynamic_symbol (info, h);
6069 break;
6070 }
6071 }
6072 break;
6073 }
6074
37c644f2 6075 /* Some relocs require a global offset table. */
067653c5 6076 if (htab->sgot == NULL)
37c644f2 6077 {
3376eaf5 6078 switch (r_type)
37c644f2 6079 {
8e45593f
NC
6080 case R_SH_DIR32:
6081 /* This may require an rofixup. */
6082 if (!htab->fdpic_p)
6083 break;
fbca6ad9 6084 case R_SH_GOTPLT32:
37c644f2 6085 case R_SH_GOT32:
8e45593f 6086 case R_SH_GOT20:
37c644f2 6087 case R_SH_GOTOFF:
8e45593f
NC
6088 case R_SH_GOTOFF20:
6089 case R_SH_FUNCDESC:
6090 case R_SH_GOTFUNCDESC:
6091 case R_SH_GOTFUNCDESC20:
6092 case R_SH_GOTOFFFUNCDESC:
6093 case R_SH_GOTOFFFUNCDESC20:
37c644f2 6094 case R_SH_GOTPC:
fbca6ad9
AO
6095#ifdef INCLUDE_SHMEDIA
6096 case R_SH_GOTPLT_LOW16:
6097 case R_SH_GOTPLT_MEDLOW16:
6098 case R_SH_GOTPLT_MEDHI16:
6099 case R_SH_GOTPLT_HI16:
6100 case R_SH_GOTPLT10BY4:
6101 case R_SH_GOTPLT10BY8:
6102 case R_SH_GOT_LOW16:
6103 case R_SH_GOT_MEDLOW16:
6104 case R_SH_GOT_MEDHI16:
6105 case R_SH_GOT_HI16:
6106 case R_SH_GOT10BY4:
6107 case R_SH_GOT10BY8:
6108 case R_SH_GOTOFF_LOW16:
6109 case R_SH_GOTOFF_MEDLOW16:
6110 case R_SH_GOTOFF_MEDHI16:
6111 case R_SH_GOTOFF_HI16:
6112 case R_SH_GOTPC_LOW16:
6113 case R_SH_GOTPC_MEDLOW16:
6114 case R_SH_GOTPC_MEDHI16:
6115 case R_SH_GOTPC_HI16:
6116#endif
3376eaf5
KK
6117 case R_SH_TLS_GD_32:
6118 case R_SH_TLS_LD_32:
6119 case R_SH_TLS_IE_32:
8e45593f
NC
6120 if (htab->root.dynobj == NULL)
6121 htab->root.dynobj = abfd;
6122 if (!create_got_section (htab->root.dynobj, info))
6123 return FALSE;
37c644f2
AO
6124 break;
6125
6126 default:
6127 break;
6128 }
6129 }
6130
3376eaf5 6131 switch (r_type)
067653c5
AM
6132 {
6133 /* This relocation describes the C++ object vtable hierarchy.
6134 Reconstruct it for later use during GC. */
435b1e90 6135 case R_SH_GNU_VTINHERIT:
c152c796 6136 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 6137 return FALSE;
435b1e90
KH
6138 break;
6139
067653c5
AM
6140 /* This relocation describes which C++ vtable entries are actually
6141 used. Record for later use during GC. */
435b1e90 6142 case R_SH_GNU_VTENTRY:
d17e0c6e
JB
6143 BFD_ASSERT (h != NULL);
6144 if (h != NULL
6145 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 6146 return FALSE;
435b1e90 6147 break;
37c644f2 6148
3376eaf5
KK
6149 case R_SH_TLS_IE_32:
6150 if (info->shared)
6151 info->flags |= DF_STATIC_TLS;
6152
6153 /* FALLTHROUGH */
267fb3c1 6154 force_got:
3376eaf5 6155 case R_SH_TLS_GD_32:
37c644f2 6156 case R_SH_GOT32:
8e45593f 6157 case R_SH_GOT20:
fbca6ad9
AO
6158#ifdef INCLUDE_SHMEDIA
6159 case R_SH_GOT_LOW16:
6160 case R_SH_GOT_MEDLOW16:
6161 case R_SH_GOT_MEDHI16:
6162 case R_SH_GOT_HI16:
6163 case R_SH_GOT10BY4:
6164 case R_SH_GOT10BY8:
6165#endif
8e45593f
NC
6166 case R_SH_GOTFUNCDESC:
6167 case R_SH_GOTFUNCDESC20:
3376eaf5
KK
6168 switch (r_type)
6169 {
6170 default:
8e45593f 6171 got_type = GOT_NORMAL;
3376eaf5
KK
6172 break;
6173 case R_SH_TLS_GD_32:
8e45593f 6174 got_type = GOT_TLS_GD;
3376eaf5
KK
6175 break;
6176 case R_SH_TLS_IE_32:
8e45593f
NC
6177 got_type = GOT_TLS_IE;
6178 break;
6179 case R_SH_GOTFUNCDESC:
6180 case R_SH_GOTFUNCDESC20:
6181 got_type = GOT_FUNCDESC;
3376eaf5
KK
6182 break;
6183 }
6184
37c644f2 6185 if (h != NULL)
3376eaf5 6186 {
396a6083
SC
6187#ifdef INCLUDE_SHMEDIA
6188 if (seen_stt_datalabel)
6189 {
b34976b6
AM
6190 struct elf_sh_link_hash_entry *eh
6191 = (struct elf_sh_link_hash_entry *) h;
396a6083
SC
6192
6193 eh->datalabel_got.refcount += 1;
6194 }
6195 else
6196#endif
6197 h->got.refcount += 1;
8e45593f 6198 old_got_type = sh_elf_hash_entry (h)->got_type;
3376eaf5 6199 }
37c644f2
AO
6200 else
6201 {
067653c5
AM
6202 bfd_signed_vma *local_got_refcounts;
6203
435b1e90 6204 /* This is a global offset table entry for a local
067653c5
AM
6205 symbol. */
6206 local_got_refcounts = elf_local_got_refcounts (abfd);
6207 if (local_got_refcounts == NULL)
37c644f2 6208 {
dc810e39 6209 bfd_size_type size;
37c644f2 6210
dc810e39 6211 size = symtab_hdr->sh_info;
067653c5 6212 size *= sizeof (bfd_signed_vma);
fbca6ad9
AO
6213#ifdef INCLUDE_SHMEDIA
6214 /* Reserve space for both the datalabel and
6215 codelabel local GOT offsets. */
6216 size *= 2;
6217#endif
3376eaf5 6218 size += symtab_hdr->sh_info;
067653c5
AM
6219 local_got_refcounts = ((bfd_signed_vma *)
6220 bfd_zalloc (abfd, size));
6221 if (local_got_refcounts == NULL)
b34976b6 6222 return FALSE;
067653c5 6223 elf_local_got_refcounts (abfd) = local_got_refcounts;
3376eaf5
KK
6224#ifdef INCLUDE_SHMEDIA
6225 /* Take care of both the datalabel and codelabel local
6226 GOT offsets. */
8e45593f 6227 sh_elf_local_got_type (abfd)
3376eaf5
KK
6228 = (char *) (local_got_refcounts + 2 * symtab_hdr->sh_info);
6229#else
8e45593f 6230 sh_elf_local_got_type (abfd)
3376eaf5
KK
6231 = (char *) (local_got_refcounts + symtab_hdr->sh_info);
6232#endif
37c644f2 6233 }
396a6083
SC
6234#ifdef INCLUDE_SHMEDIA
6235 if (rel->r_addend & 1)
6236 local_got_refcounts[symtab_hdr->sh_info + r_symndx] += 1;
6237 else
6238#endif
6239 local_got_refcounts[r_symndx] += 1;
8e45593f 6240 old_got_type = sh_elf_local_got_type (abfd) [r_symndx];
3376eaf5
KK
6241 }
6242
6243 /* If a TLS symbol is accessed using IE at least once,
6244 there is no point to use dynamic model for it. */
8e45593f
NC
6245 if (old_got_type != got_type && old_got_type != GOT_UNKNOWN
6246 && (old_got_type != GOT_TLS_GD || got_type != GOT_TLS_IE))
3376eaf5 6247 {
8e45593f
NC
6248 if (old_got_type == GOT_TLS_IE && got_type == GOT_TLS_GD)
6249 got_type = GOT_TLS_IE;
3376eaf5
KK
6250 else
6251 {
8e45593f
NC
6252 if ((old_got_type == GOT_FUNCDESC || got_type == GOT_FUNCDESC)
6253 && (old_got_type == GOT_NORMAL || got_type == GOT_NORMAL))
6254 (*_bfd_error_handler)
6255 (_("%B: `%s' accessed both as normal and FDPIC symbol"),
6256 abfd, h->root.root.string);
6257 else if (old_got_type == GOT_FUNCDESC
6258 || got_type == GOT_FUNCDESC)
6259 (*_bfd_error_handler)
6260 (_("%B: `%s' accessed both as FDPIC and thread local symbol"),
6261 abfd, h->root.root.string);
6262 else
6263 (*_bfd_error_handler)
d003868e
AM
6264 (_("%B: `%s' accessed both as normal and thread local symbol"),
6265 abfd, h->root.root.string);
b34976b6 6266 return FALSE;
3376eaf5
KK
6267 }
6268 }
6269
8e45593f 6270 if (old_got_type != got_type)
3376eaf5
KK
6271 {
6272 if (h != NULL)
8e45593f 6273 sh_elf_hash_entry (h)->got_type = got_type;
3376eaf5 6274 else
8e45593f 6275 sh_elf_local_got_type (abfd) [r_symndx] = got_type;
37c644f2 6276 }
3376eaf5
KK
6277
6278 break;
6279
6280 case R_SH_TLS_LD_32:
6281 sh_elf_hash_table(info)->tls_ldm_got.refcount += 1;
37c644f2
AO
6282 break;
6283
8e45593f
NC
6284 case R_SH_FUNCDESC:
6285 case R_SH_GOTOFFFUNCDESC:
6286 case R_SH_GOTOFFFUNCDESC20:
6287 if (rel->r_addend)
6288 {
6289 (*_bfd_error_handler)
6290 (_("%B: Function descriptor relocation with non-zero addend"),
6291 abfd);
6292 return FALSE;
6293 }
6294
6295 if (h == NULL)
6296 {
6297 union gotref *local_funcdesc;
6298
6299 /* We need a function descriptor for a local symbol. */
6300 local_funcdesc = sh_elf_local_funcdesc (abfd);
6301 if (local_funcdesc == NULL)
6302 {
6303 bfd_size_type size;
6304
6305 size = symtab_hdr->sh_info * sizeof (union gotref);
6306#ifdef INCLUDE_SHMEDIA
6307 /* Count datalabel local GOT. */
6308 size *= 2;
6309#endif
6310 local_funcdesc = (union gotref *) bfd_zalloc (abfd, size);
6311 if (local_funcdesc == NULL)
6312 return FALSE;
6313 sh_elf_local_funcdesc (abfd) = local_funcdesc;
6314 }
6315 local_funcdesc[r_symndx].refcount += 1;
6316
6317 if (r_type == R_SH_FUNCDESC)
6318 {
6319 if (!info->shared)
6320 htab->srofixup->size += 4;
6321 else
6322 htab->srelgot->size += sizeof (Elf32_External_Rela);
6323 }
6324 }
6325 else
6326 {
6327 sh_elf_hash_entry (h)->funcdesc.refcount++;
6328 if (r_type == R_SH_FUNCDESC)
6329 sh_elf_hash_entry (h)->abs_funcdesc_refcount++;
6330
6331 /* If there is a function descriptor reference, then
6332 there should not be any non-FDPIC references. */
6333 old_got_type = sh_elf_hash_entry (h)->got_type;
6334 if (old_got_type != GOT_FUNCDESC && old_got_type != GOT_UNKNOWN)
6335 {
6336 if (old_got_type == GOT_NORMAL)
6337 (*_bfd_error_handler)
6338 (_("%B: `%s' accessed both as normal and FDPIC symbol"),
6339 abfd, h->root.root.string);
6340 else
6341 (*_bfd_error_handler)
6342 (_("%B: `%s' accessed both as FDPIC and thread local symbol"),
6343 abfd, h->root.root.string);
6344 }
6345 }
6346 break;
6347
fbca6ad9
AO
6348 case R_SH_GOTPLT32:
6349#ifdef INCLUDE_SHMEDIA
6350 case R_SH_GOTPLT_LOW16:
6351 case R_SH_GOTPLT_MEDLOW16:
6352 case R_SH_GOTPLT_MEDHI16:
6353 case R_SH_GOTPLT_HI16:
6354 case R_SH_GOTPLT10BY4:
6355 case R_SH_GOTPLT10BY8:
6356#endif
6357 /* If this is a local symbol, we resolve it directly without
6358 creating a procedure linkage table entry. */
6359
6360 if (h == NULL
f5385ebf 6361 || h->forced_local
fbca6ad9
AO
6362 || ! info->shared
6363 || info->symbolic
067653c5 6364 || h->dynindx == -1)
fbca6ad9
AO
6365 goto force_got;
6366
f5385ebf 6367 h->needs_plt = 1;
067653c5 6368 h->plt.refcount += 1;
4989d792 6369 ((struct elf_sh_link_hash_entry *) h)->gotplt_refcount += 1;
fbca6ad9
AO
6370
6371 break;
6372
37c644f2 6373 case R_SH_PLT32:
fbca6ad9
AO
6374#ifdef INCLUDE_SHMEDIA
6375 case R_SH_PLT_LOW16:
6376 case R_SH_PLT_MEDLOW16:
6377 case R_SH_PLT_MEDHI16:
6378 case R_SH_PLT_HI16:
6379#endif
37c644f2
AO
6380 /* This symbol requires a procedure linkage table entry. We
6381 actually build the entry in adjust_dynamic_symbol,
6382 because this might be a case of linking PIC code which is
6383 never referenced by a dynamic object, in which case we
6384 don't need to generate a procedure linkage table entry
6385 after all. */
6386
6387 /* If this is a local symbol, we resolve it directly without
6388 creating a procedure linkage table entry. */
6389 if (h == NULL)
6390 continue;
6391
f5385ebf 6392 if (h->forced_local)
37c644f2
AO
6393 break;
6394
f5385ebf 6395 h->needs_plt = 1;
067653c5 6396 h->plt.refcount += 1;
37c644f2
AO
6397 break;
6398
6399 case R_SH_DIR32:
6400 case R_SH_REL32:
46e993b9
KK
6401#ifdef INCLUDE_SHMEDIA
6402 case R_SH_IMM_LOW16_PCREL:
6403 case R_SH_IMM_MEDLOW16_PCREL:
6404 case R_SH_IMM_MEDHI16_PCREL:
6405 case R_SH_IMM_HI16_PCREL:
6406#endif
067653c5
AM
6407 if (h != NULL && ! info->shared)
6408 {
f5385ebf 6409 h->non_got_ref = 1;
067653c5
AM
6410 h->plt.refcount += 1;
6411 }
37c644f2
AO
6412
6413 /* If we are creating a shared library, and this is a reloc
6414 against a global symbol, or a non PC relative reloc
6415 against a local symbol, then we need to copy the reloc
6416 into the shared library. However, if we are linking with
6417 -Bsymbolic, we do not need to copy a reloc against a
6418 global symbol which is defined in an object we are
6419 including in the link (i.e., DEF_REGULAR is set). At
6420 this point we have not seen all the input files, so it is
6421 possible that DEF_REGULAR is not set now but will be set
6422 later (it is never cleared). We account for that
6423 possibility below by storing information in the
067653c5
AM
6424 dyn_relocs field of the hash table entry. A similar
6425 situation occurs when creating shared libraries and symbol
6426 visibility changes render the symbol local.
6427
6428 If on the other hand, we are creating an executable, we
6429 may need to keep relocations for symbols satisfied by a
6430 dynamic library if we manage to avoid copy relocs for the
6431 symbol. */
6432 if ((info->shared
6433 && (sec->flags & SEC_ALLOC) != 0
3376eaf5 6434 && (r_type != R_SH_REL32
067653c5
AM
6435 || (h != NULL
6436 && (! info->symbolic
6437 || h->root.type == bfd_link_hash_defweak
f5385ebf 6438 || !h->def_regular))))
067653c5
AM
6439 || (! info->shared
6440 && (sec->flags & SEC_ALLOC) != 0
6441 && h != NULL
6442 && (h->root.type == bfd_link_hash_defweak
f5385ebf 6443 || !h->def_regular)))
37c644f2 6444 {
067653c5
AM
6445 struct elf_sh_dyn_relocs *p;
6446 struct elf_sh_dyn_relocs **head;
6447
2293c499
AM
6448 if (htab->root.dynobj == NULL)
6449 htab->root.dynobj = abfd;
067653c5 6450
37c644f2
AO
6451 /* When creating a shared object, we must copy these
6452 reloc types into the output file. We create a reloc
6453 section in dynobj and make room for this reloc. */
6454 if (sreloc == NULL)
6455 {
83bac4b0
NC
6456 sreloc = _bfd_elf_make_dynamic_reloc_section
6457 (sec, htab->root.dynobj, 2, abfd, /*rela?*/ TRUE);
37c644f2 6458
37c644f2 6459 if (sreloc == NULL)
83bac4b0 6460 return FALSE;
37c644f2
AO
6461 }
6462
067653c5
AM
6463 /* If this is a global symbol, we count the number of
6464 relocations we need for this symbol. */
6465 if (h != NULL)
6466 head = &((struct elf_sh_link_hash_entry *) h)->dyn_relocs;
6467 else
37c644f2 6468 {
87d72d41 6469 /* Track dynamic relocs needed for local syms too. */
067653c5 6470 asection *s;
6edfbbad 6471 void *vpp;
87d72d41 6472 Elf_Internal_Sym *isym;
37c644f2 6473
87d72d41
AM
6474 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
6475 abfd, r_symndx);
6476 if (isym == NULL)
b34976b6 6477 return FALSE;
37c644f2 6478
87d72d41
AM
6479 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
6480 if (s == NULL)
6481 s = sec;
6482
6edfbbad
DJ
6483 vpp = &elf_section_data (s)->local_dynrel;
6484 head = (struct elf_sh_dyn_relocs **) vpp;
067653c5 6485 }
37c644f2 6486
067653c5
AM
6487 p = *head;
6488 if (p == NULL || p->sec != sec)
6489 {
6490 bfd_size_type amt = sizeof (*p);
2293c499 6491 p = bfd_alloc (htab->root.dynobj, amt);
37c644f2 6492 if (p == NULL)
b34976b6 6493 return FALSE;
067653c5
AM
6494 p->next = *head;
6495 *head = p;
6496 p->sec = sec;
6497 p->count = 0;
6498 p->pc_count = 0;
37c644f2 6499 }
067653c5
AM
6500
6501 p->count += 1;
46e993b9
KK
6502 if (r_type == R_SH_REL32
6503#ifdef INCLUDE_SHMEDIA
6504 || r_type == R_SH_IMM_LOW16_PCREL
6505 || r_type == R_SH_IMM_MEDLOW16_PCREL
6506 || r_type == R_SH_IMM_MEDHI16_PCREL
6507 || r_type == R_SH_IMM_HI16_PCREL
6508#endif
6509 )
067653c5 6510 p->pc_count += 1;
37c644f2
AO
6511 }
6512
8e45593f
NC
6513 /* Allocate the fixup regardless of whether we need a relocation.
6514 If we end up generating the relocation, we'll unallocate the
6515 fixup. */
6516 if (htab->fdpic_p && !info->shared
6517 && r_type == R_SH_DIR32
6518 && (sec->flags & SEC_ALLOC) != 0)
6519 htab->srofixup->size += 4;
37c644f2 6520 break;
3376eaf5
KK
6521
6522 case R_SH_TLS_LE_32:
b68593b9 6523 if (info->shared && !info->pie)
3376eaf5 6524 {
d003868e
AM
6525 (*_bfd_error_handler)
6526 (_("%B: TLS local exec code cannot be linked into shared objects"),
6527 abfd);
b34976b6 6528 return FALSE;
3376eaf5
KK
6529 }
6530
267fb3c1 6531 break;
3376eaf5 6532
3376eaf5 6533 case R_SH_TLS_LDO_32:
267fb3c1 6534 /* Nothing to do. */
3376eaf5
KK
6535 break;
6536
6537 default:
6538 break;
435b1e90 6539 }
252b5132 6540 }
435b1e90 6541
b34976b6 6542 return TRUE;
252b5132
RH
6543}
6544
fbca6ad9 6545#ifndef sh_elf_set_mach_from_flags
f6f9408f
JR
6546static unsigned int sh_ef_bfd_table[] = { EF_SH_BFD_TABLE };
6547
b34976b6 6548static bfd_boolean
09fd220b 6549sh_elf_set_mach_from_flags (bfd *abfd)
d4845d57 6550{
f6f9408f
JR
6551 flagword flags = elf_elfheader (abfd)->e_flags & EF_SH_MACH_MASK;
6552
6553 if (flags >= sizeof(sh_ef_bfd_table))
6554 return FALSE;
6555
6556 if (sh_ef_bfd_table[flags] == 0)
6557 return FALSE;
68ffbac6 6558
f6f9408f 6559 bfd_default_set_arch_mach (abfd, bfd_arch_sh, sh_ef_bfd_table[flags]);
d4845d57 6560
b34976b6 6561 return TRUE;
d4845d57 6562}
f6f9408f
JR
6563
6564
6565/* Reverse table lookup for sh_ef_bfd_table[].
6566 Given a bfd MACH value from archures.c
6567 return the equivalent ELF flags from the table.
6568 Return -1 if no match is found. */
6569
6570int
6571sh_elf_get_flags_from_mach (unsigned long mach)
6572{
4195f552 6573 int i = ARRAY_SIZE (sh_ef_bfd_table) - 1;
68ffbac6 6574
f6f9408f
JR
6575 for (; i>0; i--)
6576 if (sh_ef_bfd_table[i] == mach)
6577 return i;
68ffbac6 6578
f6f9408f
JR
6579 /* shouldn't get here */
6580 BFD_FAIL();
6581
6582 return -1;
6583}
fbca6ad9 6584#endif /* not sh_elf_set_mach_from_flags */
d4845d57 6585
fbca6ad9 6586#ifndef sh_elf_set_private_flags
435b1e90
KH
6587/* Function to keep SH specific file flags. */
6588
b34976b6 6589static bfd_boolean
09fd220b 6590sh_elf_set_private_flags (bfd *abfd, flagword flags)
d4845d57
JR
6591{
6592 BFD_ASSERT (! elf_flags_init (abfd)
6593 || elf_elfheader (abfd)->e_flags == flags);
6594
6595 elf_elfheader (abfd)->e_flags = flags;
b34976b6 6596 elf_flags_init (abfd) = TRUE;
d4845d57
JR
6597 return sh_elf_set_mach_from_flags (abfd);
6598}
fbca6ad9 6599#endif /* not sh_elf_set_private_flags */
d4845d57 6600
fbca6ad9 6601#ifndef sh_elf_copy_private_data
d4845d57 6602/* Copy backend specific data from one object module to another */
435b1e90 6603
b34976b6 6604static bfd_boolean
09fd220b 6605sh_elf_copy_private_data (bfd * ibfd, bfd * obfd)
d4845d57 6606{
104d59d1
JM
6607 /* Copy object attributes. */
6608 _bfd_elf_copy_obj_attributes (ibfd, obfd);
6609
0ffa91dd
NC
6610 if (! is_sh_elf (ibfd) || ! is_sh_elf (obfd))
6611 return TRUE;
6612
d4845d57
JR
6613 return sh_elf_set_private_flags (obfd, elf_elfheader (ibfd)->e_flags);
6614}
fbca6ad9 6615#endif /* not sh_elf_copy_private_data */
d4845d57 6616
fbca6ad9 6617#ifndef sh_elf_merge_private_data
d4845d57 6618
f6f9408f
JR
6619/* This function returns the ELF architecture number that
6620 corresponds to the given arch_sh* flags. */
85fbca6a 6621
f6f9408f
JR
6622int
6623sh_find_elf_flags (unsigned int arch_set)
d4845d57 6624{
85fbca6a 6625 extern unsigned long sh_get_bfd_mach_from_arch_set (unsigned int);
f6f9408f 6626 unsigned long bfd_mach = sh_get_bfd_mach_from_arch_set (arch_set);
d4845d57 6627
f6f9408f
JR
6628 return sh_elf_get_flags_from_mach (bfd_mach);
6629}
f6f9408f
JR
6630
6631/* This routine initialises the elf flags when required and
6632 calls sh_merge_bfd_arch() to check dsp/fpu compatibility. */
d4845d57 6633
f6f9408f
JR
6634static bfd_boolean
6635sh_elf_merge_private_data (bfd *ibfd, bfd *obfd)
6636{
85fbca6a
NC
6637 extern bfd_boolean sh_merge_bfd_arch (bfd *, bfd *);
6638
0ffa91dd 6639 if (! is_sh_elf (ibfd) || ! is_sh_elf (obfd))
b34976b6 6640 return TRUE;
d4845d57
JR
6641
6642 if (! elf_flags_init (obfd))
6643 {
a39b79b9 6644 /* This happens when ld starts out with a 'blank' output file. */
b34976b6 6645 elf_flags_init (obfd) = TRUE;
8e45593f 6646 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
f6f9408f 6647 sh_elf_set_mach_from_flags (obfd);
8e45593f
NC
6648 if (elf_elfheader (obfd)->e_flags & EF_SH_FDPIC)
6649 elf_elfheader (obfd)->e_flags |= EF_SH_PIC;
d4845d57 6650 }
d4845d57 6651
85fbca6a 6652 if (! sh_merge_bfd_arch (ibfd, obfd))
1d70c7fb 6653 {
d003868e 6654 _bfd_error_handler ("%B: uses instructions which are incompatible "
1d70c7fb 6655 "with instructions used in previous modules",
d003868e 6656 ibfd);
1d70c7fb
AO
6657 bfd_set_error (bfd_error_bad_value);
6658 return FALSE;
6659 }
f6f9408f 6660
8e45593f
NC
6661 elf_elfheader (obfd)->e_flags &= ~EF_SH_MACH_MASK;
6662 elf_elfheader (obfd)->e_flags |=
f6f9408f 6663 sh_elf_get_flags_from_mach (bfd_get_mach (obfd));
8e45593f
NC
6664
6665 if (fdpic_object_p (ibfd) != fdpic_object_p (obfd))
6666 {
6667 _bfd_error_handler ("%B: attempt to mix FDPIC and non-FDPIC objects",
6668 ibfd);
6669 bfd_set_error (bfd_error_bad_value);
6670 return FALSE;
6671 }
6672
f6f9408f 6673 return TRUE;
d4845d57 6674}
fbca6ad9 6675#endif /* not sh_elf_merge_private_data */
d4845d57 6676
3376eaf5
KK
6677/* Override the generic function because we need to store sh_elf_obj_tdata
6678 as the specific tdata. We set also the machine architecture from flags
6679 here. */
6680
b34976b6 6681static bfd_boolean
09fd220b 6682sh_elf_object_p (bfd *abfd)
3376eaf5 6683{
8e45593f
NC
6684 if (! sh_elf_set_mach_from_flags (abfd))
6685 return FALSE;
6686
6687 return (((elf_elfheader (abfd)->e_flags & EF_SH_FDPIC) != 0)
6688 == fdpic_object_p (abfd));
3376eaf5
KK
6689}
6690
37c644f2
AO
6691/* Finish up dynamic symbol handling. We set the contents of various
6692 dynamic sections here. */
6693
b34976b6 6694static bfd_boolean
09fd220b
KK
6695sh_elf_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
6696 struct elf_link_hash_entry *h,
6697 Elf_Internal_Sym *sym)
37c644f2 6698{
067653c5 6699 struct elf_sh_link_hash_table *htab;
37c644f2 6700
067653c5 6701 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
6702 if (htab == NULL)
6703 return FALSE;
37c644f2
AO
6704
6705 if (h->plt.offset != (bfd_vma) -1)
6706 {
6707 asection *splt;
8e45593f
NC
6708 asection *sgotplt;
6709 asection *srelplt;
37c644f2
AO
6710
6711 bfd_vma plt_index;
6712 bfd_vma got_offset;
6713 Elf_Internal_Rela rel;
947216bf 6714 bfd_byte *loc;
8e45593f 6715 const struct elf_sh_plt_info *plt_info;
37c644f2
AO
6716
6717 /* This symbol has an entry in the procedure linkage table. Set
6718 it up. */
6719
6720 BFD_ASSERT (h->dynindx != -1);
6721
067653c5 6722 splt = htab->splt;
8e45593f
NC
6723 sgotplt = htab->sgotplt;
6724 srelplt = htab->srelplt;
6725 BFD_ASSERT (splt != NULL && sgotplt != NULL && srelplt != NULL);
37c644f2
AO
6726
6727 /* Get the index in the procedure linkage table which
6728 corresponds to this symbol. This is the index of this symbol
6729 in all the symbols for which we are making plt entries. The
6730 first entry in the procedure linkage table is reserved. */
55e6e397 6731 plt_index = get_plt_index (htab->plt_info, h->plt.offset);
37c644f2 6732
8e45593f
NC
6733 plt_info = htab->plt_info;
6734 if (plt_info->short_plt != NULL && plt_index <= MAX_SHORT_PLT)
6735 plt_info = plt_info->short_plt;
6736
37c644f2 6737 /* Get the offset into the .got table of the entry that
8e45593f
NC
6738 corresponds to this function. */
6739 if (htab->fdpic_p)
6740 /* The offset must be relative to the GOT symbol, twelve bytes
6741 before the end of .got.plt. Each descriptor is eight
6742 bytes. */
6743 got_offset = plt_index * 8 + 12 - sgotplt->size;
6744 else
6745 /* Each .got entry is 4 bytes. The first three are
6746 reserved. */
6747 got_offset = (plt_index + 3) * 4;
37c644f2 6748
fbca6ad9 6749#ifdef GOT_BIAS
c8614e8e
AM
6750 if (info->shared)
6751 got_offset -= GOT_BIAS;
fbca6ad9
AO
6752#endif
6753
37c644f2 6754 /* Fill in the entry in the procedure linkage table. */
55e6e397 6755 memcpy (splt->contents + h->plt.offset,
8e45593f
NC
6756 plt_info->symbol_entry,
6757 plt_info->symbol_entry_size);
55e6e397 6758
8e45593f
NC
6759 if (info->shared || htab->fdpic_p)
6760 {
6761 if (plt_info->symbol_fields.got20)
6762 {
6763 bfd_reloc_status_type r;
6764 r = install_movi20_field (output_bfd, got_offset,
6765 splt->owner, splt, splt->contents,
6766 h->plt.offset
6767 + plt_info->symbol_fields.got_entry);
6768 BFD_ASSERT (r == bfd_reloc_ok);
6769 }
6770 else
6771 install_plt_field (output_bfd, FALSE, got_offset,
6772 (splt->contents
6773 + h->plt.offset
6774 + plt_info->symbol_fields.got_entry));
6775 }
55e6e397 6776 else
37c644f2 6777 {
8e45593f
NC
6778 BFD_ASSERT (!plt_info->symbol_fields.got20);
6779
55e6e397 6780 install_plt_field (output_bfd, FALSE,
8e45593f
NC
6781 (sgotplt->output_section->vma
6782 + sgotplt->output_offset
fbca6ad9 6783 + got_offset),
55e6e397
RS
6784 (splt->contents
6785 + h->plt.offset
8e45593f 6786 + plt_info->symbol_fields.got_entry));
55e6e397 6787 if (htab->vxworks_p)
37c644f2 6788 {
55e6e397
RS
6789 unsigned int reachable_plts, plts_per_4k;
6790 int distance;
6791
6792 /* Divide the PLT into groups. The first group contains
6793 REACHABLE_PLTS entries and the other groups contain
6794 PLTS_PER_4K entries. Entries in the first group can
6795 branch directly to .plt; those in later groups branch
6796 to the last element of the previous group. */
6797 /* ??? It would be better to create multiple copies of
6798 the common resolver stub. */
6799 reachable_plts = ((4096
8e45593f
NC
6800 - plt_info->plt0_entry_size
6801 - (plt_info->symbol_fields.plt + 4))
6802 / plt_info->symbol_entry_size) + 1;
6803 plts_per_4k = (4096 / plt_info->symbol_entry_size);
55e6e397
RS
6804 if (plt_index < reachable_plts)
6805 distance = -(h->plt.offset
8e45593f 6806 + plt_info->symbol_fields.plt);
55e6e397
RS
6807 else
6808 distance = -(((plt_index - reachable_plts) % plts_per_4k + 1)
8e45593f 6809 * plt_info->symbol_entry_size);
55e6e397
RS
6810
6811 /* Install the 'bra' with this offset. */
6812 bfd_put_16 (output_bfd,
6813 0xa000 | (0x0fff & ((distance - 4) / 2)),
6814 (splt->contents
6815 + h->plt.offset
8e45593f 6816 + plt_info->symbol_fields.plt));
37c644f2 6817 }
55e6e397
RS
6818 else
6819 install_plt_field (output_bfd, TRUE,
6820 splt->output_section->vma + splt->output_offset,
6821 (splt->contents
6822 + h->plt.offset
8e45593f 6823 + plt_info->symbol_fields.plt));
37c644f2
AO
6824 }
6825
8e45593f 6826 /* Make got_offset relative to the start of .got.plt. */
fbca6ad9 6827#ifdef GOT_BIAS
c8614e8e
AM
6828 if (info->shared)
6829 got_offset += GOT_BIAS;
fbca6ad9 6830#endif
8e45593f
NC
6831 if (htab->fdpic_p)
6832 got_offset = plt_index * 8;
fbca6ad9 6833
8e45593f
NC
6834 if (plt_info->symbol_fields.reloc_offset != MINUS_ONE)
6835 install_plt_field (output_bfd, FALSE,
6836 plt_index * sizeof (Elf32_External_Rela),
6837 (splt->contents
6838 + h->plt.offset
6839 + plt_info->symbol_fields.reloc_offset));
37c644f2
AO
6840
6841 /* Fill in the entry in the global offset table. */
6842 bfd_put_32 (output_bfd,
6843 (splt->output_section->vma
6844 + splt->output_offset
6845 + h->plt.offset
8e45593f
NC
6846 + plt_info->symbol_resolve_offset),
6847 sgotplt->contents + got_offset);
6848 if (htab->fdpic_p)
6849 bfd_put_32 (output_bfd,
6850 sh_elf_osec_to_segment (output_bfd,
6851 htab->splt->output_section),
6852 sgotplt->contents + got_offset + 4);
37c644f2
AO
6853
6854 /* Fill in the entry in the .rela.plt section. */
8e45593f
NC
6855 rel.r_offset = (sgotplt->output_section->vma
6856 + sgotplt->output_offset
37c644f2 6857 + got_offset);
8e45593f
NC
6858 if (htab->fdpic_p)
6859 rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_FUNCDESC_VALUE);
6860 else
6861 rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_JMP_SLOT);
37c644f2 6862 rel.r_addend = 0;
fbca6ad9
AO
6863#ifdef GOT_BIAS
6864 rel.r_addend = GOT_BIAS;
6865#endif
8e45593f 6866 loc = srelplt->contents + plt_index * sizeof (Elf32_External_Rela);
947216bf 6867 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
37c644f2 6868
55e6e397
RS
6869 if (htab->vxworks_p && !info->shared)
6870 {
6871 /* Create the .rela.plt.unloaded relocations for this PLT entry.
6872 Begin by pointing LOC to the first such relocation. */
6873 loc = (htab->srelplt2->contents
6874 + (plt_index * 2 + 1) * sizeof (Elf32_External_Rela));
6875
6876 /* Create a .rela.plt.unloaded R_SH_DIR32 relocation
6877 for the PLT entry's pointer to the .got.plt entry. */
6878 rel.r_offset = (htab->splt->output_section->vma
6879 + htab->splt->output_offset
6880 + h->plt.offset
8e45593f 6881 + plt_info->symbol_fields.got_entry);
55e6e397
RS
6882 rel.r_info = ELF32_R_INFO (htab->root.hgot->indx, R_SH_DIR32);
6883 rel.r_addend = got_offset;
6884 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
6885 loc += sizeof (Elf32_External_Rela);
6886
6887 /* Create a .rela.plt.unloaded R_SH_DIR32 relocation for
6888 the .got.plt entry, which initially points to .plt. */
8e45593f
NC
6889 rel.r_offset = (sgotplt->output_section->vma
6890 + sgotplt->output_offset
55e6e397
RS
6891 + got_offset);
6892 rel.r_info = ELF32_R_INFO (htab->root.hplt->indx, R_SH_DIR32);
6893 rel.r_addend = 0;
6894 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
6895 }
6896
f5385ebf 6897 if (!h->def_regular)
37c644f2
AO
6898 {
6899 /* Mark the symbol as undefined, rather than as defined in
6900 the .plt section. Leave the value alone. */
6901 sym->st_shndx = SHN_UNDEF;
6902 }
6903 }
6904
3376eaf5 6905 if (h->got.offset != (bfd_vma) -1
8e45593f
NC
6906 && sh_elf_hash_entry (h)->got_type != GOT_TLS_GD
6907 && sh_elf_hash_entry (h)->got_type != GOT_TLS_IE
6908 && sh_elf_hash_entry (h)->got_type != GOT_FUNCDESC)
37c644f2
AO
6909 {
6910 asection *sgot;
8e45593f 6911 asection *srelgot;
37c644f2 6912 Elf_Internal_Rela rel;
947216bf 6913 bfd_byte *loc;
37c644f2
AO
6914
6915 /* This symbol has an entry in the global offset table. Set it
6916 up. */
6917
067653c5 6918 sgot = htab->sgot;
8e45593f
NC
6919 srelgot = htab->srelgot;
6920 BFD_ASSERT (sgot != NULL && srelgot != NULL);
37c644f2
AO
6921
6922 rel.r_offset = (sgot->output_section->vma
6923 + sgot->output_offset
dc810e39 6924 + (h->got.offset &~ (bfd_vma) 1));
37c644f2 6925
067653c5
AM
6926 /* If this is a static link, or it is a -Bsymbolic link and the
6927 symbol is defined locally or was forced to be local because
6928 of a version file, we just want to emit a RELATIVE reloc.
37c644f2
AO
6929 The entry in the global offset table will already have been
6930 initialized in the relocate_section function. */
6931 if (info->shared
3d85aebe 6932 && SYMBOL_REFERENCES_LOCAL (info, h))
37c644f2 6933 {
8e45593f
NC
6934 if (htab->fdpic_p)
6935 {
6936 asection *sec = h->root.u.def.section;
6937 int dynindx
6938 = elf_section_data (sec->output_section)->dynindx;
6939
6940 rel.r_info = ELF32_R_INFO (dynindx, R_SH_DIR32);
6941 rel.r_addend = (h->root.u.def.value
6942 + h->root.u.def.section->output_offset);
6943 }
6944 else
6945 {
6946 rel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
6947 rel.r_addend = (h->root.u.def.value
6948 + h->root.u.def.section->output_section->vma
6949 + h->root.u.def.section->output_offset);
6950 }
37c644f2
AO
6951 }
6952 else
6953 {
6954 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset);
6955 rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_GLOB_DAT);
6956 rel.r_addend = 0;
6957 }
6958
8e45593f
NC
6959 loc = srelgot->contents;
6960 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
947216bf 6961 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
37c644f2
AO
6962 }
6963
396a6083
SC
6964#ifdef INCLUDE_SHMEDIA
6965 {
6966 struct elf_sh_link_hash_entry *eh;
6967
6968 eh = (struct elf_sh_link_hash_entry *) h;
6969 if (eh->datalabel_got.offset != (bfd_vma) -1)
6970 {
6971 asection *sgot;
8e45593f 6972 asection *srelgot;
396a6083 6973 Elf_Internal_Rela rel;
947216bf 6974 bfd_byte *loc;
396a6083
SC
6975
6976 /* This symbol has a datalabel entry in the global offset table.
6977 Set it up. */
6978
6979 sgot = htab->sgot;
8e45593f
NC
6980 srelgot = htab->srelgot;
6981 BFD_ASSERT (sgot != NULL && srelgot != NULL);
396a6083
SC
6982
6983 rel.r_offset = (sgot->output_section->vma
6984 + sgot->output_offset
6985 + (eh->datalabel_got.offset &~ (bfd_vma) 1));
6986
6987 /* If this is a static link, or it is a -Bsymbolic link and the
6988 symbol is defined locally or was forced to be local because
6989 of a version file, we just want to emit a RELATIVE reloc.
6990 The entry in the global offset table will already have been
6991 initialized in the relocate_section function. */
6992 if (info->shared
3d85aebe 6993 && SYMBOL_REFERENCES_LOCAL (info, h))
396a6083 6994 {
8e45593f
NC
6995 if (htab->fdpic_p)
6996 {
6997 asection *sec = h->root.u.def.section;
6998 int dynindx
6999 = elf_section_data (sec->output_section)->dynindx;
7000
7001 rel.r_info = ELF32_R_INFO (dynindx, R_SH_DIR32);
7002 rel.r_addend = (h->root.u.def.value
7003 + h->root.u.def.section->output_offset);
7004 }
7005 else
7006 {
7007 rel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
7008 rel.r_addend = (h->root.u.def.value
7009 + h->root.u.def.section->output_section->vma
7010 + h->root.u.def.section->output_offset);
7011 }
396a6083
SC
7012 }
7013 else
7014 {
7015 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents
7016 + eh->datalabel_got.offset);
7017 rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_GLOB_DAT);
7018 rel.r_addend = 0;
7019 }
7020
8e45593f
NC
7021 loc = srelgot->contents;
7022 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
947216bf 7023 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
396a6083
SC
7024 }
7025 }
7026#endif
7027
f5385ebf 7028 if (h->needs_copy)
37c644f2
AO
7029 {
7030 asection *s;
7031 Elf_Internal_Rela rel;
947216bf 7032 bfd_byte *loc;
37c644f2
AO
7033
7034 /* This symbol needs a copy reloc. Set it up. */
7035
7036 BFD_ASSERT (h->dynindx != -1
7037 && (h->root.type == bfd_link_hash_defined
7038 || h->root.type == bfd_link_hash_defweak));
7039
3d4d4302 7040 s = bfd_get_linker_section (htab->root.dynobj, ".rela.bss");
37c644f2
AO
7041 BFD_ASSERT (s != NULL);
7042
7043 rel.r_offset = (h->root.u.def.value
7044 + h->root.u.def.section->output_section->vma
7045 + h->root.u.def.section->output_offset);
7046 rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_COPY);
7047 rel.r_addend = 0;
947216bf
AM
7048 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
7049 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
37c644f2
AO
7050 }
7051
55e6e397
RS
7052 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. On VxWorks,
7053 _GLOBAL_OFFSET_TABLE_ is not absolute: it is relative to the
7054 ".got" section. */
9637f6ef 7055 if (h == htab->root.hdynamic
55e6e397 7056 || (!htab->vxworks_p && h == htab->root.hgot))
37c644f2
AO
7057 sym->st_shndx = SHN_ABS;
7058
b34976b6 7059 return TRUE;
37c644f2
AO
7060}
7061
7062/* Finish up the dynamic sections. */
7063
b34976b6 7064static bfd_boolean
09fd220b 7065sh_elf_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
37c644f2 7066{
067653c5 7067 struct elf_sh_link_hash_table *htab;
8e45593f 7068 asection *sgotplt;
37c644f2
AO
7069 asection *sdyn;
7070
067653c5 7071 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
7072 if (htab == NULL)
7073 return FALSE;
7074
8e45593f 7075 sgotplt = htab->sgotplt;
3d4d4302 7076 sdyn = bfd_get_linker_section (htab->root.dynobj, ".dynamic");
37c644f2 7077
067653c5 7078 if (htab->root.dynamic_sections_created)
37c644f2
AO
7079 {
7080 asection *splt;
7081 Elf32_External_Dyn *dyncon, *dynconend;
7082
8e45593f 7083 BFD_ASSERT (sgotplt != NULL && sdyn != NULL);
37c644f2
AO
7084
7085 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 7086 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
37c644f2
AO
7087 for (; dyncon < dynconend; dyncon++)
7088 {
7089 Elf_Internal_Dyn dyn;
37c644f2 7090 asection *s;
067653c5
AM
7091#ifdef INCLUDE_SHMEDIA
7092 const char *name;
7093#endif
37c644f2 7094
2293c499 7095 bfd_elf32_swap_dyn_in (htab->root.dynobj, dyncon, &dyn);
37c644f2
AO
7096
7097 switch (dyn.d_tag)
7098 {
7099 default:
7a2b07ff
NS
7100 if (htab->vxworks_p
7101 && elf_vxworks_finish_dynamic_entry (output_bfd, &dyn))
7102 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
37c644f2
AO
7103 break;
7104
3b587c71
AM
7105#ifdef INCLUDE_SHMEDIA
7106 case DT_INIT:
7107 name = info->init_function;
7108 goto get_sym;
7109
7110 case DT_FINI:
7111 name = info->fini_function;
7112 get_sym:
7113 if (dyn.d_un.d_val != 0)
7114 {
067653c5
AM
7115 struct elf_link_hash_entry *h;
7116
7117 h = elf_link_hash_lookup (&htab->root, name,
b34976b6 7118 FALSE, FALSE, TRUE);
3b587c71
AM
7119 if (h != NULL && (h->other & STO_SH5_ISA32))
7120 {
7121 dyn.d_un.d_val |= 1;
7122 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7123 }
7124 }
7125 break;
7126#endif
7127
37c644f2 7128 case DT_PLTGOT:
8e45593f
NC
7129 BFD_ASSERT (htab->root.hgot != NULL);
7130 s = htab->root.hgot->root.u.def.section;
7131 dyn.d_un.d_ptr = htab->root.hgot->root.u.def.value
7132 + s->output_section->vma + s->output_offset;
7133 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7134 break;
37c644f2
AO
7135
7136 case DT_JMPREL:
067653c5 7137 s = htab->srelplt->output_section;
37c644f2
AO
7138 BFD_ASSERT (s != NULL);
7139 dyn.d_un.d_ptr = s->vma;
7140 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7141 break;
7142
7143 case DT_PLTRELSZ:
067653c5 7144 s = htab->srelplt->output_section;
37c644f2 7145 BFD_ASSERT (s != NULL);
eea6121a 7146 dyn.d_un.d_val = s->size;
37c644f2
AO
7147 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7148 break;
7149
7150 case DT_RELASZ:
7151 /* My reading of the SVR4 ABI indicates that the
7152 procedure linkage table relocs (DT_JMPREL) should be
7153 included in the overall relocs (DT_RELA). This is
7154 what Solaris does. However, UnixWare can not handle
7155 that case. Therefore, we override the DT_RELASZ entry
7156 here to make it not include the JMPREL relocs. Since
7157 the linker script arranges for .rela.plt to follow all
7158 other relocation sections, we don't have to worry
7159 about changing the DT_RELA entry. */
067653c5 7160 if (htab->srelplt != NULL)
37c644f2 7161 {
067653c5 7162 s = htab->srelplt->output_section;
eea6121a 7163 dyn.d_un.d_val -= s->size;
37c644f2
AO
7164 }
7165 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7166 break;
7167 }
7168 }
7169
7170 /* Fill in the first entry in the procedure linkage table. */
067653c5 7171 splt = htab->splt;
55e6e397 7172 if (splt && splt->size > 0 && htab->plt_info->plt0_entry)
37c644f2 7173 {
55e6e397
RS
7174 unsigned int i;
7175
7176 memcpy (splt->contents,
7177 htab->plt_info->plt0_entry,
7178 htab->plt_info->plt0_entry_size);
7179 for (i = 0; i < ARRAY_SIZE (htab->plt_info->plt0_got_fields); i++)
7180 if (htab->plt_info->plt0_got_fields[i] != MINUS_ONE)
7181 install_plt_field (output_bfd, FALSE,
8e45593f
NC
7182 (sgotplt->output_section->vma
7183 + sgotplt->output_offset
55e6e397
RS
7184 + (i * 4)),
7185 (splt->contents
7186 + htab->plt_info->plt0_got_fields[i]));
7187
7188 if (htab->vxworks_p)
37c644f2 7189 {
55e6e397
RS
7190 /* Finalize the .rela.plt.unloaded contents. */
7191 Elf_Internal_Rela rel;
7192 bfd_byte *loc;
7193
7194 /* Create a .rela.plt.unloaded R_SH_DIR32 relocation for the
7195 first PLT entry's pointer to _GLOBAL_OFFSET_TABLE_ + 8. */
7196 loc = htab->srelplt2->contents;
7197 rel.r_offset = (splt->output_section->vma
7198 + splt->output_offset
7199 + htab->plt_info->plt0_got_fields[2]);
7200 rel.r_info = ELF32_R_INFO (htab->root.hgot->indx, R_SH_DIR32);
7201 rel.r_addend = 8;
7202 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
7203 loc += sizeof (Elf32_External_Rela);
7204
7205 /* Fix up the remaining .rela.plt.unloaded relocations.
7206 They may have the wrong symbol index for _G_O_T_ or
7207 _P_L_T_ depending on the order in which symbols were
7208 output. */
7209 while (loc < htab->srelplt2->contents + htab->srelplt2->size)
37c644f2 7210 {
55e6e397
RS
7211 /* The PLT entry's pointer to the .got.plt slot. */
7212 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7213 rel.r_info = ELF32_R_INFO (htab->root.hgot->indx,
7214 R_SH_DIR32);
7215 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
7216 loc += sizeof (Elf32_External_Rela);
7217
7218 /* The .got.plt slot's pointer to .plt. */
7219 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7220 rel.r_info = ELF32_R_INFO (htab->root.hplt->indx,
7221 R_SH_DIR32);
7222 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
7223 loc += sizeof (Elf32_External_Rela);
37c644f2 7224 }
37c644f2
AO
7225 }
7226
7227 /* UnixWare sets the entsize of .plt to 4, although that doesn't
7228 really seem like the right value. */
7229 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 4;
7230 }
7231 }
7232
7233 /* Fill in the first three entries in the global offset table. */
8e45593f 7234 if (sgotplt && sgotplt->size > 0 && !htab->fdpic_p)
37c644f2
AO
7235 {
7236 if (sdyn == NULL)
8e45593f 7237 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents);
37c644f2
AO
7238 else
7239 bfd_put_32 (output_bfd,
7240 sdyn->output_section->vma + sdyn->output_offset,
8e45593f
NC
7241 sgotplt->contents);
7242 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 4);
7243 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 8);
7244 }
37c644f2 7245
8e45593f
NC
7246 if (sgotplt && sgotplt->size > 0)
7247 elf_section_data (sgotplt->output_section)->this_hdr.sh_entsize = 4;
68ffbac6 7248
8e45593f
NC
7249 /* At the very end of the .rofixup section is a pointer to the GOT. */
7250 if (htab->fdpic_p && htab->srofixup != NULL)
7251 {
7252 struct elf_link_hash_entry *hgot = htab->root.hgot;
7253 bfd_vma got_value = hgot->root.u.def.value
7254 + hgot->root.u.def.section->output_section->vma
7255 + hgot->root.u.def.section->output_offset;
7256
7257 sh_elf_add_rofixup (output_bfd, htab->srofixup, got_value);
7258
7259 /* Make sure we allocated and generated the same number of fixups. */
7260 BFD_ASSERT (htab->srofixup->reloc_count * 4 == htab->srofixup->size);
067653c5 7261 }
37c644f2 7262
8e45593f
NC
7263 if (htab->srelfuncdesc)
7264 BFD_ASSERT (htab->srelfuncdesc->reloc_count * sizeof (Elf32_External_Rela)
7265 == htab->srelfuncdesc->size);
7266
7267 if (htab->srelgot)
7268 BFD_ASSERT (htab->srelgot->reloc_count * sizeof (Elf32_External_Rela)
7269 == htab->srelgot->size);
7270
b34976b6 7271 return TRUE;
37c644f2
AO
7272}
7273
99e4ae17 7274static enum elf_reloc_type_class
09fd220b 7275sh_elf_reloc_type_class (const Elf_Internal_Rela *rela)
99e4ae17 7276{
f51e552e 7277 switch ((int) ELF32_R_TYPE (rela->r_info))
99e4ae17
AJ
7278 {
7279 case R_SH_RELATIVE:
7280 return reloc_class_relative;
7281 case R_SH_JMP_SLOT:
7282 return reloc_class_plt;
7283 case R_SH_COPY:
7284 return reloc_class_copy;
7285 default:
7286 return reloc_class_normal;
7287 }
7288}
7289
85fbca6a 7290#if !defined SH_TARGET_ALREADY_DEFINED
571fe01f 7291/* Support for Linux core dump NOTE sections. */
85fbca6a 7292
b34976b6 7293static bfd_boolean
09fd220b 7294elf32_shlin_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
2bc3c89a
AM
7295{
7296 int offset;
eea6121a 7297 unsigned int size;
2bc3c89a
AM
7298
7299 switch (note->descsz)
7300 {
7301 default:
b34976b6 7302 return FALSE;
2bc3c89a
AM
7303
7304 case 168: /* Linux/SH */
7305 /* pr_cursig */
7306 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
7307
7308 /* pr_pid */
261b8d08 7309 elf_tdata (abfd)->core_lwpid = bfd_get_32 (abfd, note->descdata + 24);
2bc3c89a
AM
7310
7311 /* pr_reg */
7312 offset = 72;
eea6121a 7313 size = 92;
2bc3c89a
AM
7314
7315 break;
7316 }
7317
7318 /* Make a ".reg/999" section. */
7319 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 7320 size, note->descpos + offset);
2bc3c89a
AM
7321}
7322
b34976b6 7323static bfd_boolean
09fd220b 7324elf32_shlin_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2bc3c89a
AM
7325{
7326 switch (note->descsz)
7327 {
7328 default:
b34976b6 7329 return FALSE;
2bc3c89a
AM
7330
7331 case 124: /* Linux/SH elf_prpsinfo */
7332 elf_tdata (abfd)->core_program
7333 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
7334 elf_tdata (abfd)->core_command
7335 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
7336 }
7337
7338 /* Note that for some reason, a spurious space is tacked
7339 onto the end of the args in some (at least one anyway)
7340 implementations, so strip it off if it exists. */
7341
7342 {
7343 char *command = elf_tdata (abfd)->core_command;
7344 int n = strlen (command);
7345
7346 if (0 < n && command[n - 1] == ' ')
7347 command[n - 1] = '\0';
7348 }
7349
b34976b6 7350 return TRUE;
2bc3c89a 7351}
85fbca6a 7352#endif /* not SH_TARGET_ALREADY_DEFINED */
2bc3c89a 7353
68ffbac6 7354
1f1799d5
KK
7355/* Return address for Ith PLT stub in section PLT, for relocation REL
7356 or (bfd_vma) -1 if it should not be included. */
7357
7358static bfd_vma
7359sh_elf_plt_sym_val (bfd_vma i, const asection *plt,
7360 const arelent *rel ATTRIBUTE_UNUSED)
7361{
55e6e397
RS
7362 const struct elf_sh_plt_info *plt_info;
7363
7364 plt_info = get_plt_info (plt->owner, (plt->owner->flags & DYNAMIC) != 0);
7365 return plt->vma + get_plt_offset (plt_info, i);
1f1799d5
KK
7366}
7367
8e45593f
NC
7368/* Decide whether to attempt to turn absptr or lsda encodings in
7369 shared libraries into pcrel within the given input section. */
7370
7371static bfd_boolean
7372sh_elf_use_relative_eh_frame (bfd *input_bfd ATTRIBUTE_UNUSED,
7373 struct bfd_link_info *info,
7374 asection *eh_frame_section ATTRIBUTE_UNUSED)
7375{
7376 struct elf_sh_link_hash_table *htab = sh_elf_hash_table (info);
7377
7378 /* We can't use PC-relative encodings in FDPIC binaries, in general. */
7379 if (htab->fdpic_p)
7380 return FALSE;
7381
7382 return TRUE;
7383}
7384
7385/* Adjust the contents of an eh_frame_hdr section before they're output. */
7386
7387static bfd_byte
7388sh_elf_encode_eh_address (bfd *abfd,
7389 struct bfd_link_info *info,
7390 asection *osec, bfd_vma offset,
7391 asection *loc_sec, bfd_vma loc_offset,
7392 bfd_vma *encoded)
7393{
7394 struct elf_sh_link_hash_table *htab = sh_elf_hash_table (info);
7395 struct elf_link_hash_entry *h;
7396
7397 if (!htab->fdpic_p)
7398 return _bfd_elf_encode_eh_address (abfd, info, osec, offset, loc_sec,
7399 loc_offset, encoded);
7400
7401 h = htab->root.hgot;
7402 BFD_ASSERT (h && h->root.type == bfd_link_hash_defined);
7403
7404 if (! h || (sh_elf_osec_to_segment (abfd, osec)
7405 == sh_elf_osec_to_segment (abfd, loc_sec->output_section)))
7406 return _bfd_elf_encode_eh_address (abfd, info, osec, offset,
7407 loc_sec, loc_offset, encoded);
7408
7409 BFD_ASSERT (sh_elf_osec_to_segment (abfd, osec)
7410 == (sh_elf_osec_to_segment
7411 (abfd, h->root.u.def.section->output_section)));
7412
7413 *encoded = osec->vma + offset
7414 - (h->root.u.def.value
7415 + h->root.u.def.section->output_section->vma
7416 + h->root.u.def.section->output_offset);
7417
7418 return DW_EH_PE_datarel | DW_EH_PE_sdata4;
7419}
7420
85fbca6a 7421#if !defined SH_TARGET_ALREADY_DEFINED
252b5132
RH
7422#define TARGET_BIG_SYM bfd_elf32_sh_vec
7423#define TARGET_BIG_NAME "elf32-sh"
7424#define TARGET_LITTLE_SYM bfd_elf32_shl_vec
7425#define TARGET_LITTLE_NAME "elf32-shl"
85fbca6a
NC
7426#endif
7427
252b5132 7428#define ELF_ARCH bfd_arch_sh
ae95ffa6 7429#define ELF_TARGET_ID SH_ELF_DATA
252b5132 7430#define ELF_MACHINE_CODE EM_SH
d0facd1b
NC
7431#ifdef __QNXTARGET__
7432#define ELF_MAXPAGESIZE 0x1000
7433#else
7434#define ELF_MAXPAGESIZE 0x80
7435#endif
252b5132
RH
7436
7437#define elf_symbol_leading_char '_'
7438
7439#define bfd_elf32_bfd_reloc_type_lookup sh_elf_reloc_type_lookup
157090f7
AM
7440#define bfd_elf32_bfd_reloc_name_lookup \
7441 sh_elf_reloc_name_lookup
252b5132
RH
7442#define elf_info_to_howto sh_elf_info_to_howto
7443#define bfd_elf32_bfd_relax_section sh_elf_relax_section
7444#define elf_backend_relocate_section sh_elf_relocate_section
7445#define bfd_elf32_bfd_get_relocated_section_contents \
7446 sh_elf_get_relocated_section_contents
3376eaf5
KK
7447#define bfd_elf32_mkobject sh_elf_mkobject
7448#define elf_backend_object_p sh_elf_object_p
d4845d57
JR
7449#define bfd_elf32_bfd_set_private_bfd_flags \
7450 sh_elf_set_private_flags
7451#define bfd_elf32_bfd_copy_private_bfd_data \
7452 sh_elf_copy_private_data
875f7f69 7453#define bfd_elf32_bfd_merge_private_bfd_data \
d4845d57 7454 sh_elf_merge_private_data
252b5132 7455
067653c5
AM
7456#define elf_backend_gc_mark_hook sh_elf_gc_mark_hook
7457#define elf_backend_gc_sweep_hook sh_elf_gc_sweep_hook
7458#define elf_backend_check_relocs sh_elf_check_relocs
7459#define elf_backend_copy_indirect_symbol \
7460 sh_elf_copy_indirect_symbol
37c644f2
AO
7461#define elf_backend_create_dynamic_sections \
7462 sh_elf_create_dynamic_sections
7463#define bfd_elf32_bfd_link_hash_table_create \
7464 sh_elf_link_hash_table_create
7465#define elf_backend_adjust_dynamic_symbol \
7466 sh_elf_adjust_dynamic_symbol
55e6e397
RS
7467#define elf_backend_always_size_sections \
7468 sh_elf_always_size_sections
37c644f2
AO
7469#define elf_backend_size_dynamic_sections \
7470 sh_elf_size_dynamic_sections
8e45593f 7471#define elf_backend_omit_section_dynsym sh_elf_omit_section_dynsym
37c644f2
AO
7472#define elf_backend_finish_dynamic_symbol \
7473 sh_elf_finish_dynamic_symbol
7474#define elf_backend_finish_dynamic_sections \
7475 sh_elf_finish_dynamic_sections
99e4ae17 7476#define elf_backend_reloc_type_class sh_elf_reloc_type_class
1f1799d5 7477#define elf_backend_plt_sym_val sh_elf_plt_sym_val
8e45593f
NC
7478#define elf_backend_can_make_relative_eh_frame \
7479 sh_elf_use_relative_eh_frame
7480#define elf_backend_can_make_lsda_relative_eh_frame \
7481 sh_elf_use_relative_eh_frame
7482#define elf_backend_encode_eh_address \
7483 sh_elf_encode_eh_address
37c644f2 7484
04c3a755 7485#define elf_backend_stack_align 8
067653c5
AM
7486#define elf_backend_can_gc_sections 1
7487#define elf_backend_can_refcount 1
37c644f2
AO
7488#define elf_backend_want_got_plt 1
7489#define elf_backend_plt_readonly 1
7490#define elf_backend_want_plt_sym 0
7491#define elf_backend_got_header_size 12
ed71e111 7492
85fbca6a 7493#if !defined INCLUDE_SHMEDIA && !defined SH_TARGET_ALREADY_DEFINED
2bc3c89a 7494
252b5132 7495#include "elf32-target.h"
ed71e111 7496
2bc3c89a
AM
7497/* NetBSD support. */
7498#undef TARGET_BIG_SYM
7499#define TARGET_BIG_SYM bfd_elf32_shnbsd_vec
7500#undef TARGET_BIG_NAME
7501#define TARGET_BIG_NAME "elf32-sh-nbsd"
7502#undef TARGET_LITTLE_SYM
7503#define TARGET_LITTLE_SYM bfd_elf32_shlnbsd_vec
7504#undef TARGET_LITTLE_NAME
7505#define TARGET_LITTLE_NAME "elf32-shl-nbsd"
7506#undef ELF_MAXPAGESIZE
7507#define ELF_MAXPAGESIZE 0x10000
24718e3b 7508#undef ELF_COMMONPAGESIZE
2bc3c89a
AM
7509#undef elf_symbol_leading_char
7510#define elf_symbol_leading_char 0
571fe01f 7511#undef elf32_bed
2bc3c89a
AM
7512#define elf32_bed elf32_sh_nbsd_bed
7513
7514#include "elf32-target.h"
7515
2bc3c89a
AM
7516
7517/* Linux support. */
7518#undef TARGET_BIG_SYM
7519#define TARGET_BIG_SYM bfd_elf32_shblin_vec
7520#undef TARGET_BIG_NAME
7521#define TARGET_BIG_NAME "elf32-shbig-linux"
7522#undef TARGET_LITTLE_SYM
7523#define TARGET_LITTLE_SYM bfd_elf32_shlin_vec
7524#undef TARGET_LITTLE_NAME
7525#define TARGET_LITTLE_NAME "elf32-sh-linux"
24718e3b
L
7526#undef ELF_COMMONPAGESIZE
7527#define ELF_COMMONPAGESIZE 0x1000
2bc3c89a
AM
7528
7529#undef elf_backend_grok_prstatus
7530#define elf_backend_grok_prstatus elf32_shlin_grok_prstatus
7531#undef elf_backend_grok_psinfo
7532#define elf_backend_grok_psinfo elf32_shlin_grok_psinfo
571fe01f 7533#undef elf32_bed
2bc3c89a
AM
7534#define elf32_bed elf32_sh_lin_bed
7535
7536#include "elf32-target.h"
7537
8e45593f
NC
7538
7539/* FDPIC support. */
7540#undef TARGET_BIG_SYM
7541#define TARGET_BIG_SYM bfd_elf32_shbfd_vec
7542#undef TARGET_BIG_NAME
7543#define TARGET_BIG_NAME "elf32-shbig-fdpic"
7544#undef TARGET_LITTLE_SYM
7545#define TARGET_LITTLE_SYM bfd_elf32_shfd_vec
7546#undef TARGET_LITTLE_NAME
7547#define TARGET_LITTLE_NAME "elf32-sh-fdpic"
8e45593f
NC
7548
7549#undef elf32_bed
7550#define elf32_bed elf32_sh_fd_bed
7551
7552#include "elf32-target.h"
7553
7554#undef elf_backend_modify_program_headers
7555
7556/* VxWorks support. */
55e6e397
RS
7557#undef TARGET_BIG_SYM
7558#define TARGET_BIG_SYM bfd_elf32_shvxworks_vec
7559#undef TARGET_BIG_NAME
7560#define TARGET_BIG_NAME "elf32-sh-vxworks"
7561#undef TARGET_LITTLE_SYM
7562#define TARGET_LITTLE_SYM bfd_elf32_shlvxworks_vec
7563#undef TARGET_LITTLE_NAME
7564#define TARGET_LITTLE_NAME "elf32-shl-vxworks"
7565#undef elf32_bed
7566#define elf32_bed elf32_sh_vxworks_bed
7567
7568#undef elf_backend_want_plt_sym
7569#define elf_backend_want_plt_sym 1
7570#undef elf_symbol_leading_char
7571#define elf_symbol_leading_char '_'
7572#define elf_backend_want_got_underscore 1
7573#undef elf_backend_grok_prstatus
7574#undef elf_backend_grok_psinfo
7575#undef elf_backend_add_symbol_hook
7576#define elf_backend_add_symbol_hook elf_vxworks_add_symbol_hook
7577#undef elf_backend_link_output_symbol_hook
7578#define elf_backend_link_output_symbol_hook \
7579 elf_vxworks_link_output_symbol_hook
7580#undef elf_backend_emit_relocs
7581#define elf_backend_emit_relocs elf_vxworks_emit_relocs
7582#undef elf_backend_final_write_processing
7583#define elf_backend_final_write_processing \
7584 elf_vxworks_final_write_processing
7585#undef ELF_MAXPAGESIZE
7586#define ELF_MAXPAGESIZE 0x1000
7587#undef ELF_COMMONPAGESIZE
7588
7589#include "elf32-target.h"
7590
85fbca6a 7591#endif /* neither INCLUDE_SHMEDIA nor SH_TARGET_ALREADY_DEFINED */
This page took 1.455019 seconds and 4 git commands to generate.