[ARC] Make sure global symbol is not an indirect or warning.
[deliverable/binutils-gdb.git] / bfd / elf32-arc.c
1 /* ARC-specific support for 32-bit ELF
2 Copyright (C) 1994-2018 Free Software Foundation, Inc.
3 Contributed by Cupertino Miranda (cmiranda@synopsys.com).
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "libbfd.h"
25 #include "elf-bfd.h"
26 #include "elf/arc.h"
27 #include "libiberty.h"
28 #include "opcode/arc-func.h"
29 #include "opcode/arc.h"
30 #include "arc-plt.h"
31
32 #define FEATURE_LIST_NAME bfd_feature_list
33 #define CONFLICT_LIST bfd_conflict_list
34 #include "opcode/arc-attrs.h"
35
36 /* #define ARC_ENABLE_DEBUG 1 */
37 #ifdef ARC_ENABLE_DEBUG
38 static const char *
39 name_for_global_symbol (struct elf_link_hash_entry *h)
40 {
41 static char *local_str = "(local)";
42 if (h == NULL)
43 return local_str;
44 return h->root.root.string;
45 }
46 #define ARC_DEBUG(fmt, args...) fprintf (stderr, fmt, ##args)
47 #else
48 #define ARC_DEBUG(...)
49 #endif
50
51
52 #define ADD_RELA(BFD, SECTION, OFFSET, SYM_IDX, TYPE, ADDEND) \
53 { \
54 struct elf_link_hash_table *_htab = elf_hash_table (info); \
55 Elf_Internal_Rela _rel; \
56 bfd_byte * _loc; \
57 \
58 if (_htab->dynamic_sections_created == TRUE) \
59 { \
60 BFD_ASSERT (_htab->srel##SECTION &&_htab->srel##SECTION->contents); \
61 _loc = _htab->srel##SECTION->contents \
62 + ((_htab->srel##SECTION->reloc_count) \
63 * sizeof (Elf32_External_Rela)); \
64 _htab->srel##SECTION->reloc_count++; \
65 _rel.r_addend = ADDEND; \
66 _rel.r_offset = (_htab->s##SECTION)->output_section->vma \
67 + (_htab->s##SECTION)->output_offset + OFFSET; \
68 BFD_ASSERT ((long) SYM_IDX != -1); \
69 _rel.r_info = ELF32_R_INFO (SYM_IDX, TYPE); \
70 bfd_elf32_swap_reloca_out (BFD, &_rel, _loc); \
71 } \
72 }
73
74
75 /* The default symbols representing the init and fini dyn values.
76 TODO: Check what is the relation of those strings with arclinux.em
77 and DT_INIT. */
78 #define INIT_SYM_STRING "_init"
79 #define FINI_SYM_STRING "_fini"
80
81 char * init_str = INIT_SYM_STRING;
82 char * fini_str = FINI_SYM_STRING;
83
84 #define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
85 case VALUE: \
86 return "R_" #TYPE; \
87 break;
88
89 static ATTRIBUTE_UNUSED const char *
90 reloc_type_to_name (unsigned int type)
91 {
92 switch (type)
93 {
94 #include "elf/arc-reloc.def"
95
96 default:
97 return "UNKNOWN";
98 break;
99 }
100 }
101
102 #undef ARC_RELOC_HOWTO
103
104 /* Try to minimize the amount of space occupied by relocation tables
105 on the ROM (not that the ROM won't be swamped by other ELF overhead). */
106
107 #define USE_REL 1
108
109 static ATTRIBUTE_UNUSED bfd_boolean
110 is_reloc_PC_relative (reloc_howto_type *howto)
111 {
112 return (strstr (howto->name, "PC") != NULL) ? TRUE : FALSE;
113 }
114
115 static bfd_boolean
116 is_reloc_SDA_relative (reloc_howto_type *howto)
117 {
118 return (strstr (howto->name, "SDA") != NULL) ? TRUE : FALSE;
119 }
120
121 static bfd_boolean
122 is_reloc_for_GOT (reloc_howto_type * howto)
123 {
124 if (strstr (howto->name, "TLS") != NULL)
125 return FALSE;
126 return (strstr (howto->name, "GOT") != NULL) ? TRUE : FALSE;
127 }
128
129 static bfd_boolean
130 is_reloc_for_PLT (reloc_howto_type * howto)
131 {
132 return (strstr (howto->name, "PLT") != NULL) ? TRUE : FALSE;
133 }
134
135 static bfd_boolean
136 is_reloc_for_TLS (reloc_howto_type *howto)
137 {
138 return (strstr (howto->name, "TLS") != NULL) ? TRUE : FALSE;
139 }
140
141 struct arc_relocation_data
142 {
143 bfd_signed_vma reloc_offset;
144 bfd_signed_vma reloc_addend;
145 bfd_signed_vma got_offset_value;
146
147 bfd_signed_vma sym_value;
148 asection * sym_section;
149
150 reloc_howto_type *howto;
151
152 asection * input_section;
153
154 bfd_signed_vma sdata_begin_symbol_vma;
155 bfd_boolean sdata_begin_symbol_vma_set;
156 bfd_signed_vma got_symbol_vma;
157
158 bfd_boolean should_relocate;
159
160 const char * symbol_name;
161 };
162
163 /* ARC ELF linker hash entry. */
164 struct elf_arc_link_hash_entry
165 {
166 struct elf_link_hash_entry root;
167
168 /* Track dynamic relocs copied for this symbol. */
169 struct elf_dyn_relocs *dyn_relocs;
170
171 struct got_entry *got_ents;
172 };
173
174
175 /* Should be included at this location due to static declarations
176 defined before this point. */
177 #include "arc-got.h"
178
179 #define arc_bfd_get_8(A,B,C) bfd_get_8(A,B)
180 #define arc_bfd_get_16(A,B,C) bfd_get_16(A,B)
181 #define arc_bfd_get_32(A,B,C) bfd_get_32(A,B)
182 #define arc_bfd_put_8(A,B,C,D) bfd_put_8(A,B,C)
183 #define arc_bfd_put_16(A,B,C,D) bfd_put_16(A,B,C)
184 #define arc_bfd_put_32(A,B,C,D) bfd_put_32(A,B,C)
185
186
187 static bfd_reloc_status_type
188 arc_elf_reloc (bfd *abfd ATTRIBUTE_UNUSED,
189 arelent *reloc_entry,
190 asymbol *symbol_in,
191 void *data ATTRIBUTE_UNUSED,
192 asection *input_section,
193 bfd *output_bfd,
194 char ** error_message ATTRIBUTE_UNUSED)
195 {
196 if (output_bfd != NULL)
197 {
198 reloc_entry->address += input_section->output_offset;
199
200 /* In case of relocateable link and if the reloc is against a
201 section symbol, the addend needs to be adjusted according to
202 where the section symbol winds up in the output section. */
203 if ((symbol_in->flags & BSF_SECTION_SYM) && symbol_in->section)
204 reloc_entry->addend += symbol_in->section->output_offset;
205
206 return bfd_reloc_ok;
207 }
208
209 return bfd_reloc_continue;
210 }
211
212
213 #define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
214 TYPE = VALUE,
215
216 enum howto_list
217 {
218 #include "elf/arc-reloc.def"
219 HOWTO_LIST_LAST
220 };
221
222 #undef ARC_RELOC_HOWTO
223
224 #define ARC_RELOC_HOWTO(TYPE, VALUE, RSIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
225 [TYPE] = HOWTO (R_##TYPE, 0, RSIZE, BITSIZE, FALSE, 0, \
226 complain_overflow_##OVERFLOW, arc_elf_reloc, \
227 "R_" #TYPE, FALSE, 0, 0, FALSE),
228
229 static struct reloc_howto_struct elf_arc_howto_table[] =
230 {
231 #include "elf/arc-reloc.def"
232 /* Example of what is generated by the preprocessor. Currently kept as an
233 example.
234 HOWTO (R_ARC_NONE, // Type.
235 0, // Rightshift.
236 2, // Size (0 = byte, 1 = short, 2 = long).
237 32, // Bitsize.
238 FALSE, // PC_relative.
239 0, // Bitpos.
240 complain_overflow_bitfield, // Complain_on_overflow.
241 bfd_elf_generic_reloc, // Special_function.
242 "R_ARC_NONE", // Name.
243 TRUE, // Partial_inplace.
244 0, // Src_mask.
245 0, // Dst_mask.
246 FALSE), // PCrel_offset.
247 */
248 };
249 #undef ARC_RELOC_HOWTO
250
251 static void
252 arc_elf_howto_init (void)
253 {
254 #define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
255 elf_arc_howto_table[TYPE].pc_relative = \
256 (strstr (#FORMULA, " P ") != NULL || strstr (#FORMULA, " PDATA ") != NULL); \
257 elf_arc_howto_table[TYPE].dst_mask = RELOC_FUNCTION(0, ~0); \
258 /* Only 32 bit data relocations should be marked as ME. */ \
259 if (strstr (#FORMULA, " ME ") != NULL) \
260 { \
261 BFD_ASSERT (SIZE == 2); \
262 }
263
264 #include "elf/arc-reloc.def"
265
266 }
267 #undef ARC_RELOC_HOWTO
268
269
270 #define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
271 [TYPE] = VALUE,
272
273 const int howto_table_lookup[] =
274 {
275 #include "elf/arc-reloc.def"
276 };
277
278 #undef ARC_RELOC_HOWTO
279
280 static reloc_howto_type *
281 arc_elf_howto (unsigned int r_type)
282 {
283 if (elf_arc_howto_table[R_ARC_32].dst_mask == 0)
284 arc_elf_howto_init ();
285 return &elf_arc_howto_table[r_type];
286 }
287
288 /* Map BFD reloc types to ARC ELF reloc types. */
289
290 struct arc_reloc_map
291 {
292 bfd_reloc_code_real_type bfd_reloc_val;
293 unsigned char elf_reloc_val;
294 };
295
296 /* ARC ELF linker hash table. */
297 struct elf_arc_link_hash_table
298 {
299 struct elf_link_hash_table elf;
300 };
301
302 static struct bfd_hash_entry *
303 elf_arc_link_hash_newfunc (struct bfd_hash_entry *entry,
304 struct bfd_hash_table *table,
305 const char *string)
306 {
307 struct elf_arc_link_hash_entry * ret =
308 (struct elf_arc_link_hash_entry *) entry;
309
310 /* Allocate the structure if it has not already been allocated by a
311 subclass. */
312 if (ret == NULL)
313 ret = (struct elf_arc_link_hash_entry *)
314 bfd_hash_allocate (table, sizeof (struct elf_arc_link_hash_entry));
315 if (ret == NULL)
316 return (struct bfd_hash_entry *) ret;
317
318 /* Call the allocation method of the superclass. */
319 ret = ((struct elf_arc_link_hash_entry *)
320 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
321 table, string));
322 if (ret != NULL)
323 {
324 ret->dyn_relocs = NULL;
325 ret->got_ents = NULL;
326 }
327
328 return (struct bfd_hash_entry *) ret;
329 }
330
331 /* Destroy an ARC ELF linker hash table. */
332 static void
333 elf_arc_link_hash_table_free (bfd *obfd)
334 {
335 _bfd_elf_link_hash_table_free (obfd);
336 }
337
338 /* Create an ARC ELF linker hash table. */
339
340 static struct bfd_link_hash_table *
341 arc_elf_link_hash_table_create (bfd *abfd)
342 {
343 struct elf_arc_link_hash_table *ret;
344
345 ret = (struct elf_arc_link_hash_table *) bfd_zmalloc (sizeof (*ret));
346 if (ret == NULL)
347 return NULL;
348
349 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
350 elf_arc_link_hash_newfunc,
351 sizeof (struct elf_arc_link_hash_entry),
352 ARC_ELF_DATA))
353 {
354 free (ret);
355 return NULL;
356 }
357
358 ret->elf.root.hash_table_free = elf_arc_link_hash_table_free;
359
360 return &ret->elf.root;
361 }
362
363 #define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
364 { BFD_RELOC_##TYPE, R_##TYPE },
365
366 static const struct arc_reloc_map arc_reloc_map[] =
367 {
368 #include "elf/arc-reloc.def"
369
370 {BFD_RELOC_NONE, R_ARC_NONE},
371 {BFD_RELOC_8, R_ARC_8},
372 {BFD_RELOC_16, R_ARC_16},
373 {BFD_RELOC_24, R_ARC_24},
374 {BFD_RELOC_32, R_ARC_32},
375 };
376
377 #undef ARC_RELOC_HOWTO
378
379 typedef ATTRIBUTE_UNUSED bfd_vma (*replace_func) (unsigned, int ATTRIBUTE_UNUSED);
380
381 #define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
382 case TYPE: \
383 func = (void *) RELOC_FUNCTION; \
384 break;
385
386 static replace_func
387 get_replace_function (bfd *abfd, unsigned int r_type)
388 {
389 void *func = NULL;
390
391 switch (r_type)
392 {
393 #include "elf/arc-reloc.def"
394 }
395
396 if (func == replace_bits24 && bfd_big_endian (abfd))
397 func = replace_bits24_be;
398
399 return (replace_func) func;
400 }
401 #undef ARC_RELOC_HOWTO
402
403 static reloc_howto_type *
404 arc_elf32_bfd_reloc_type_lookup (bfd * abfd ATTRIBUTE_UNUSED,
405 bfd_reloc_code_real_type code)
406 {
407 unsigned int i;
408
409 for (i = ARRAY_SIZE (arc_reloc_map); i--;)
410 {
411 if (arc_reloc_map[i].bfd_reloc_val == code)
412 return arc_elf_howto (arc_reloc_map[i].elf_reloc_val);
413 }
414
415 return NULL;
416 }
417
418 /* Function to set the ELF flag bits. */
419 static bfd_boolean
420 arc_elf_set_private_flags (bfd *abfd, flagword flags)
421 {
422 elf_elfheader (abfd)->e_flags = flags;
423 elf_flags_init (abfd) = TRUE;
424 return TRUE;
425 }
426
427 /* Print private flags. */
428 static bfd_boolean
429 arc_elf_print_private_bfd_data (bfd *abfd, void * ptr)
430 {
431 FILE *file = (FILE *) ptr;
432 flagword flags;
433
434 BFD_ASSERT (abfd != NULL && ptr != NULL);
435
436 /* Print normal ELF private data. */
437 _bfd_elf_print_private_bfd_data (abfd, ptr);
438
439 flags = elf_elfheader (abfd)->e_flags;
440 fprintf (file, _("private flags = 0x%lx:"), (unsigned long) flags);
441
442 switch (flags & EF_ARC_MACH_MSK)
443 {
444 case EF_ARC_CPU_ARCV2HS : fprintf (file, " -mcpu=ARCv2HS"); break;
445 case EF_ARC_CPU_ARCV2EM : fprintf (file, " -mcpu=ARCv2EM"); break;
446 case E_ARC_MACH_ARC600 : fprintf (file, " -mcpu=ARC600"); break;
447 case E_ARC_MACH_ARC601 : fprintf (file, " -mcpu=ARC601"); break;
448 case E_ARC_MACH_ARC700 : fprintf (file, " -mcpu=ARC700"); break;
449 default:
450 fprintf (file, "-mcpu=unknown");
451 break;
452 }
453
454 switch (flags & EF_ARC_OSABI_MSK)
455 {
456 case E_ARC_OSABI_ORIG : fprintf (file, " (ABI:legacy)"); break;
457 case E_ARC_OSABI_V2 : fprintf (file, " (ABI:v2)"); break;
458 case E_ARC_OSABI_V3 : fprintf (file, " (ABI:v3)"); break;
459 case E_ARC_OSABI_V4 : fprintf (file, " (ABI:v4)"); break;
460 default:
461 fprintf (file, " (ABI:unknown)");
462 break;
463 }
464
465 fputc ('\n', file);
466 return TRUE;
467 }
468
469 /* Copy backend specific data from one object module to another. */
470
471 static bfd_boolean
472 arc_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
473 {
474 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
475 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
476 return TRUE;
477
478 BFD_ASSERT (!elf_flags_init (obfd)
479 || elf_elfheader (obfd)->e_flags == elf_elfheader (ibfd)->e_flags);
480
481 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
482 elf_flags_init (obfd) = TRUE;
483
484 /* Copy object attributes. */
485 _bfd_elf_copy_obj_attributes (ibfd, obfd);
486
487 return _bfd_elf_copy_private_bfd_data (ibfd, obfd);
488 }
489
490 static reloc_howto_type *
491 bfd_elf32_bfd_reloc_name_lookup (bfd * abfd ATTRIBUTE_UNUSED,
492 const char *r_name)
493 {
494 unsigned int i;
495
496 for (i = 0; i < ARRAY_SIZE (elf_arc_howto_table); i++)
497 if (elf_arc_howto_table[i].name != NULL
498 && strcasecmp (elf_arc_howto_table[i].name, r_name) == 0)
499 return arc_elf_howto (i);
500
501 return NULL;
502 }
503
504 /* Set the howto pointer for an ARC ELF reloc. */
505
506 static bfd_boolean
507 arc_info_to_howto_rel (bfd * abfd,
508 arelent * cache_ptr,
509 Elf_Internal_Rela * dst)
510 {
511 unsigned int r_type;
512
513 r_type = ELF32_R_TYPE (dst->r_info);
514 if (r_type >= (unsigned int) R_ARC_max)
515 {
516 /* xgettext:c-format */
517 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
518 abfd, r_type);
519 bfd_set_error (bfd_error_bad_value);
520 return FALSE;
521 }
522
523 cache_ptr->howto = arc_elf_howto (r_type);
524 return TRUE;
525 }
526
527 /* Extract CPU features from an NTBS. */
528
529 static unsigned
530 arc_extract_features (const char *p)
531 {
532 unsigned i, r = 0;
533
534 if (!p)
535 return 0;
536
537 for (i = 0; i < ARRAY_SIZE (bfd_feature_list); i++)
538 {
539 char *t = strstr (p, bfd_feature_list[i].attr);
540 unsigned l = strlen (bfd_feature_list[i].attr);
541 if ((t != NULL)
542 && (t[l] == ','
543 || t[l] == '\0'))
544 r |= bfd_feature_list[i].feature;
545 }
546
547 return r;
548 }
549
550 /* Concatenate two strings. s1 can be NULL but not
551 s2. */
552
553 static char *
554 arc_stralloc (char * s1, const char * s2)
555 {
556 char *p;
557
558 /* Only s1 can be null. */
559 BFD_ASSERT (s2);
560
561 p = s1 ? concat (s1, ",", s2, NULL) : (char *)s2;
562
563 return p;
564 }
565
566 /* Merge ARC object attributes from IBFD into OBFD. Raise an error if
567 there are conflicting attributes. */
568
569 static bfd_boolean
570 arc_elf_merge_attributes (bfd *ibfd, struct bfd_link_info *info)
571 {
572 bfd *obfd = info->output_bfd;
573 obj_attribute *in_attr;
574 obj_attribute *out_attr;
575 int i;
576 bfd_boolean result = TRUE;
577 const char *sec_name = get_elf_backend_data (ibfd)->obj_attrs_section;
578 char *tagname = NULL;
579
580 /* Skip the linker stubs file. This preserves previous behavior
581 of accepting unknown attributes in the first input file - but
582 is that a bug? */
583 if (ibfd->flags & BFD_LINKER_CREATED)
584 return TRUE;
585
586 /* Skip any input that hasn't attribute section.
587 This enables to link object files without attribute section with
588 any others. */
589 if (bfd_get_section_by_name (ibfd, sec_name) == NULL)
590 return TRUE;
591
592 if (!elf_known_obj_attributes_proc (obfd)[0].i)
593 {
594 /* This is the first object. Copy the attributes. */
595 _bfd_elf_copy_obj_attributes (ibfd, obfd);
596
597 out_attr = elf_known_obj_attributes_proc (obfd);
598
599 /* Use the Tag_null value to indicate the attributes have been
600 initialized. */
601 out_attr[0].i = 1;
602
603 return TRUE;
604 }
605
606 in_attr = elf_known_obj_attributes_proc (ibfd);
607 out_attr = elf_known_obj_attributes_proc (obfd);
608
609 for (i = LEAST_KNOWN_OBJ_ATTRIBUTE; i < NUM_KNOWN_OBJ_ATTRIBUTES; i++)
610 {
611 /* Merge this attribute with existing attributes. */
612 switch (i)
613 {
614 case Tag_ARC_PCS_config:
615 if (out_attr[i].i == 0)
616 out_attr[i].i = in_attr[i].i;
617 else if (in_attr[i].i != 0 && out_attr[i].i != in_attr[i].i)
618 {
619 const char *tagval[] = { "Absent", "Bare-metal/mwdt",
620 "Bare-metal/newlib", "Linux/uclibc",
621 "Linux/glibc" };
622 BFD_ASSERT (in_attr[i].i < 5);
623 BFD_ASSERT (out_attr[i].i < 5);
624 /* It's sometimes ok to mix different configs, so this is only
625 a warning. */
626 _bfd_error_handler
627 (_("warning: %pB: conflicting platform configuration "
628 "%s with %s"), ibfd,
629 tagval[in_attr[i].i],
630 tagval[out_attr[i].i]);
631 }
632 break;
633
634 case Tag_ARC_CPU_base:
635 if (out_attr[i].i == 0)
636 out_attr[i].i = in_attr[i].i;
637 else if (in_attr[i].i != 0 && out_attr[i].i != in_attr[i].i
638 && ((out_attr[i].i + in_attr[i].i) < 6))
639 {
640 const char *tagval[] = { "Absent", "ARC6xx", "ARC7xx",
641 "ARCEM", "ARCHS" };
642 BFD_ASSERT (in_attr[i].i < 5);
643 BFD_ASSERT (out_attr[i].i < 5);
644 /* We cannot mix code for different CPUs. */
645 _bfd_error_handler
646 (_("error: %pB: unable to merge CPU base attributes "
647 "%s with %s"),
648 obfd,
649 tagval[in_attr[i].i],
650 tagval[out_attr[i].i]);
651 result = FALSE;
652 break;
653 }
654 else
655 {
656 /* The CPUs may be different, check if we can still mix
657 the objects against the output choosen CPU. */
658 unsigned in_feature = 0;
659 unsigned out_feature = 0;
660 char *p1 = in_attr[Tag_ARC_ISA_config].s;
661 char *p2 = out_attr[Tag_ARC_ISA_config].s;
662 unsigned j;
663 unsigned cpu_out;
664 unsigned opcode_map[] = {0, ARC_OPCODE_ARC600, ARC_OPCODE_ARC700,
665 ARC_OPCODE_ARCv2EM, ARC_OPCODE_ARCv2HS};
666
667 BFD_ASSERT (in_attr[i].i < (sizeof (opcode_map)
668 / sizeof (unsigned)));
669 BFD_ASSERT (out_attr[i].i < (sizeof (opcode_map)
670 / sizeof (unsigned)));
671 cpu_out = opcode_map[out_attr[i].i];
672
673 in_feature = arc_extract_features (p1);
674 out_feature = arc_extract_features (p2);
675
676 /* First, check if a feature is compatible with the
677 output object chosen CPU. */
678 for (j = 0; j < ARRAY_SIZE (bfd_feature_list); j++)
679 if (((in_feature | out_feature) & bfd_feature_list[j].feature)
680 && (!(cpu_out & bfd_feature_list[j].cpus)))
681 {
682 _bfd_error_handler
683 (_("error: %pB: unable to merge ISA extension attributes "
684 "%s"),
685 obfd, bfd_feature_list[j].name);
686 result = FALSE;
687 break;
688 }
689 /* Second, if we have compatible features with the
690 chosen CPU, check if they are compatible among
691 them. */
692 for (j = 0; j < ARRAY_SIZE (bfd_conflict_list); j++)
693 if (((in_feature | out_feature) & bfd_conflict_list[j])
694 == bfd_conflict_list[j])
695 {
696 unsigned k;
697 for (k = 0; k < ARRAY_SIZE (bfd_feature_list); k++)
698 {
699 if (in_feature & bfd_feature_list[k].feature
700 & bfd_conflict_list[j])
701 p1 = (char *) bfd_feature_list[k].name;
702 if (out_feature & bfd_feature_list[k].feature
703 & bfd_conflict_list[j])
704 p2 = (char *) bfd_feature_list[k].name;
705 }
706 _bfd_error_handler
707 (_("error: %pB: conflicting ISA extension attributes "
708 "%s with %s"),
709 obfd, p1, p2);
710 result = FALSE;
711 break;
712 }
713 /* Everithing is alright. */
714 out_feature |= in_feature;
715 p1 = NULL;
716 for (j = 0; j < ARRAY_SIZE (bfd_feature_list); j++)
717 if (out_feature & bfd_feature_list[j].feature)
718 p1 = arc_stralloc (p1, bfd_feature_list[j].attr);
719 if (p1)
720 out_attr[Tag_ARC_ISA_config].s =
721 _bfd_elf_attr_strdup (obfd, p1);
722 }
723 /* Fall through. */
724 case Tag_ARC_CPU_variation:
725 case Tag_ARC_ISA_mpy_option:
726 case Tag_ARC_ABI_osver:
727 /* Use the largest value specified. */
728 if (in_attr[i].i > out_attr[i].i)
729 out_attr[i].i = in_attr[i].i;
730 break;
731
732 /* The CPU name is given by the vendor, just choose an
733 existing one if missing or different. There are no fail
734 criteria if they different or both missing. */
735 case Tag_ARC_CPU_name:
736 if (!out_attr[i].s && in_attr[i].s)
737 out_attr[i].s = _bfd_elf_attr_strdup (obfd, in_attr[i].s);
738 break;
739
740 case Tag_ARC_ABI_rf16:
741 if (out_attr[i].i == 0)
742 out_attr[i].i = in_attr[i].i;
743 else if (out_attr[i].i != in_attr[i].i)
744 {
745 /* We cannot mix code with rf16 and without. */
746 _bfd_error_handler
747 (_("error: %pB: cannot mix rf16 with full register set %pB"),
748 obfd, ibfd);
749 result = FALSE;
750 }
751 break;
752
753 case Tag_ARC_ABI_pic:
754 tagname = "PIC";
755 /* fall through */
756 case Tag_ARC_ABI_sda:
757 if (!tagname)
758 tagname = "SDA";
759 /* fall through */
760 case Tag_ARC_ABI_tls:
761 {
762 const char *tagval[] = { "Absent", "MWDT", "GNU" };
763
764 if (!tagname)
765 tagname = "TLS";
766
767 BFD_ASSERT (in_attr[i].i < 3);
768 BFD_ASSERT (out_attr[i].i < 3);
769 if (out_attr[i].i == 0)
770 out_attr[i].i = in_attr[i].i;
771 else if (out_attr[i].i != 0 && in_attr[i].i != 0
772 && out_attr[i].i != in_attr[i].i)
773 {
774 _bfd_error_handler
775 (_("error: %pB: conflicting attributes %s: %s with %s"),
776 obfd, tagname,
777 tagval[in_attr[i].i],
778 tagval[out_attr[i].i]);
779 result = FALSE;
780 }
781 tagname = NULL;
782 break;
783 }
784
785 case Tag_ARC_ABI_double_size:
786 tagname = "Double size";
787 /* fall through */
788 case Tag_ARC_ABI_enumsize:
789 if (!tagname)
790 tagname = "Enum size";
791 /* fall through */
792 case Tag_ARC_ABI_exceptions:
793 if (!tagname)
794 tagname = "ABI exceptions";
795
796 if (out_attr[i].i == 0)
797 out_attr[i].i = in_attr[i].i;
798 else if (out_attr[i].i != 0 && in_attr[i].i != 0
799 && out_attr[i].i != in_attr[i].i)
800 {
801 _bfd_error_handler
802 (_("error: %pB: conflicting attributes %s"),
803 obfd, tagname);
804 result = FALSE;
805 }
806 break;
807
808 case Tag_ARC_ISA_apex:
809 break; /* Do nothing for APEX attributes. */
810
811 case Tag_ARC_ISA_config:
812 /* It is handled in Tag_ARC_CPU_base. */
813 break;
814
815 case Tag_ARC_ATR_version:
816 if (out_attr[i].i == 0)
817 out_attr[i].i = in_attr[i].i;
818 break;
819
820 default:
821 result
822 = result && _bfd_elf_merge_unknown_attribute_low (ibfd, obfd, i);
823 }
824
825 /* If out_attr was copied from in_attr then it won't have a type yet. */
826 if (in_attr[i].type && !out_attr[i].type)
827 out_attr[i].type = in_attr[i].type;
828 }
829
830 /* Merge Tag_compatibility attributes and any common GNU ones. */
831 if (!_bfd_elf_merge_object_attributes (ibfd, info))
832 return FALSE;
833
834 /* Check for any attributes not known on ARC. */
835 result &= _bfd_elf_merge_unknown_attribute_list (ibfd, obfd);
836
837 return result;
838 }
839
840 /* Merge backend specific data from an object file to the output
841 object file when linking. */
842
843 static bfd_boolean
844 arc_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
845 {
846 bfd *obfd = info->output_bfd;
847 unsigned short mach_ibfd;
848 static unsigned short mach_obfd = EM_NONE;
849 flagword out_flags;
850 flagword in_flags;
851 asection *sec;
852
853 /* Check if we have the same endianess. */
854 if (! _bfd_generic_verify_endian_match (ibfd, info))
855 return FALSE;
856
857 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
858 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
859 return TRUE;
860
861 /* Collect ELF flags. */
862 in_flags = elf_elfheader (ibfd)->e_flags & EF_ARC_MACH_MSK;
863 out_flags = elf_elfheader (obfd)->e_flags & EF_ARC_MACH_MSK;
864
865 if (!elf_flags_init (obfd)) /* First call, no flags set. */
866 {
867 elf_flags_init (obfd) = TRUE;
868 out_flags = in_flags;
869 }
870
871 if (!arc_elf_merge_attributes (ibfd, info))
872 return FALSE;
873
874 /* Check to see if the input BFD actually contains any sections. Do
875 not short-circuit dynamic objects; their section list may be
876 emptied by elf_link_add_object_symbols. */
877 if (!(ibfd->flags & DYNAMIC))
878 {
879 bfd_boolean null_input_bfd = TRUE;
880 bfd_boolean only_data_sections = TRUE;
881
882 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
883 {
884 if ((bfd_get_section_flags (ibfd, sec)
885 & (SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS))
886 == (SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS))
887 only_data_sections = FALSE;
888
889 null_input_bfd = FALSE;
890 }
891
892 if (null_input_bfd || only_data_sections)
893 return TRUE;
894 }
895
896 /* Complain about various flag/architecture mismatches. */
897 mach_ibfd = elf_elfheader (ibfd)->e_machine;
898 if (mach_obfd == EM_NONE)
899 {
900 mach_obfd = mach_ibfd;
901 }
902 else
903 {
904 if (mach_ibfd != mach_obfd)
905 {
906 /* xgettext:c-format */
907 _bfd_error_handler (_("error: attempting to link %pB "
908 "with a binary %pB of different architecture"),
909 ibfd, obfd);
910 return FALSE;
911 }
912 else if ((in_flags != out_flags)
913 /* If we have object attributes, then we already
914 checked the objects compatibility, skip it. */
915 && !bfd_elf_get_obj_attr_int (ibfd, OBJ_ATTR_PROC,
916 Tag_ARC_CPU_base))
917 {
918 if (in_flags && out_flags)
919 {
920 /* Warn if different flags. */
921 _bfd_error_handler
922 /* xgettext:c-format */
923 (_("%pB: uses different e_flags (%#x) fields than "
924 "previous modules (%#x)"),
925 ibfd, in_flags, out_flags);
926 return FALSE;
927 }
928 /* MWDT doesnt set the eflags hence make sure we choose the
929 eflags set by gcc. */
930 in_flags = in_flags > out_flags ? in_flags : out_flags;
931 }
932 else
933 {
934 /* Everything is correct; don't change the output flags. */
935 in_flags = out_flags;
936 }
937 }
938
939 /* Update the flags. */
940 elf_elfheader (obfd)->e_flags = in_flags;
941
942 if (bfd_get_mach (obfd) < bfd_get_mach (ibfd))
943 {
944 return bfd_set_arch_mach (obfd, bfd_arch_arc, bfd_get_mach (ibfd));
945 }
946
947 return TRUE;
948 }
949
950 /* Return a best guess for the machine number based on the attributes. */
951
952 static unsigned int
953 bfd_arc_get_mach_from_attributes (bfd * abfd)
954 {
955 int arch = bfd_elf_get_obj_attr_int (abfd, OBJ_ATTR_PROC, Tag_ARC_CPU_base);
956 unsigned e_machine = elf_elfheader (abfd)->e_machine;
957
958 switch (arch)
959 {
960 case TAG_CPU_ARC6xx:
961 return bfd_mach_arc_arc600;
962 case TAG_CPU_ARC7xx:
963 return bfd_mach_arc_arc700;
964 case TAG_CPU_ARCEM:
965 case TAG_CPU_ARCHS:
966 return bfd_mach_arc_arcv2;
967 default:
968 break;
969 }
970 return (e_machine == EM_ARC_COMPACT)
971 ? bfd_mach_arc_arc700 : bfd_mach_arc_arcv2;
972 }
973
974 /* Set the right machine number for an ARC ELF file. */
975 static bfd_boolean
976 arc_elf_object_p (bfd * abfd)
977 {
978 /* Make sure this is initialised, or you'll have the potential of passing
979 garbage---or misleading values---into the call to
980 bfd_default_set_arch_mach (). */
981 unsigned int mach = bfd_mach_arc_arc700;
982 unsigned long arch = elf_elfheader (abfd)->e_flags & EF_ARC_MACH_MSK;
983 unsigned e_machine = elf_elfheader (abfd)->e_machine;
984
985 if (e_machine == EM_ARC_COMPACT || e_machine == EM_ARC_COMPACT2)
986 {
987 switch (arch)
988 {
989 case E_ARC_MACH_ARC600:
990 mach = bfd_mach_arc_arc600;
991 break;
992 case E_ARC_MACH_ARC601:
993 mach = bfd_mach_arc_arc601;
994 break;
995 case E_ARC_MACH_ARC700:
996 mach = bfd_mach_arc_arc700;
997 break;
998 case EF_ARC_CPU_ARCV2HS:
999 case EF_ARC_CPU_ARCV2EM:
1000 mach = bfd_mach_arc_arcv2;
1001 break;
1002 default:
1003 mach = bfd_arc_get_mach_from_attributes (abfd);
1004 break;
1005 }
1006 }
1007 else
1008 {
1009 if (e_machine == EM_ARC)
1010 {
1011 _bfd_error_handler
1012 (_("error: the ARC4 architecture is no longer supported"));
1013 return FALSE;
1014 }
1015 else
1016 {
1017 _bfd_error_handler
1018 (_("warning: unset or old architecture flags; "
1019 "use default machine"));
1020 }
1021 }
1022
1023 return bfd_default_set_arch_mach (abfd, bfd_arch_arc, mach);
1024 }
1025
1026 /* The final processing done just before writing out an ARC ELF object file.
1027 This gets the ARC architecture right based on the machine number. */
1028
1029 static void
1030 arc_elf_final_write_processing (bfd * abfd,
1031 bfd_boolean linker ATTRIBUTE_UNUSED)
1032 {
1033 unsigned long emf;
1034 int osver = bfd_elf_get_obj_attr_int (abfd, OBJ_ATTR_PROC,
1035 Tag_ARC_ABI_osver);
1036 flagword e_flags = elf_elfheader (abfd)->e_flags & ~EF_ARC_OSABI_MSK;
1037
1038 switch (bfd_get_mach (abfd))
1039 {
1040 case bfd_mach_arc_arc600:
1041 emf = EM_ARC_COMPACT;
1042 break;
1043 case bfd_mach_arc_arc601:
1044 emf = EM_ARC_COMPACT;
1045 break;
1046 case bfd_mach_arc_arc700:
1047 emf = EM_ARC_COMPACT;
1048 break;
1049 case bfd_mach_arc_arcv2:
1050 emf = EM_ARC_COMPACT2;
1051 break;
1052 default:
1053 return;
1054 }
1055
1056 elf_elfheader (abfd)->e_machine = emf;
1057
1058 /* Record whatever is the current syscall ABI version. */
1059 if (osver)
1060 e_flags |= ((osver & 0x0f) << 8);
1061 else
1062 e_flags |= E_ARC_OSABI_V3;
1063
1064 elf_elfheader (abfd)->e_flags |= e_flags;
1065 }
1066
1067 #ifdef ARC_ENABLE_DEBUG
1068 #define DEBUG_ARC_RELOC(A) debug_arc_reloc (A)
1069
1070 static void
1071 debug_arc_reloc (struct arc_relocation_data reloc_data)
1072 {
1073 ARC_DEBUG ("Reloc type=%s, should_relocate = %s\n",
1074 reloc_data.howto->name,
1075 reloc_data.should_relocate ? "true" : "false");
1076 ARC_DEBUG (" offset = 0x%x, addend = 0x%x\n",
1077 (unsigned int) reloc_data.reloc_offset,
1078 (unsigned int) reloc_data.reloc_addend);
1079 ARC_DEBUG (" Symbol:\n");
1080 ARC_DEBUG (" value = 0x%08x\n",
1081 (unsigned int) reloc_data.sym_value);
1082 if (reloc_data.sym_section != NULL)
1083 {
1084 ARC_DEBUG (" Symbol Section:\n");
1085 ARC_DEBUG (" section name = %s, output_offset 0x%08x",
1086 reloc_data.sym_section->name,
1087 (unsigned int) reloc_data.sym_section->output_offset);
1088 if (reloc_data.sym_section->output_section != NULL)
1089 ARC_DEBUG (", output_section->vma = 0x%08x",
1090 ((unsigned int) reloc_data.sym_section->output_section->vma));
1091 ARC_DEBUG ("\n");
1092 if (reloc_data.sym_section->owner && reloc_data.sym_section->owner->filename)
1093 ARC_DEBUG (" file: %s\n", reloc_data.sym_section->owner->filename);
1094 }
1095 else
1096 {
1097 ARC_DEBUG (" symbol section is NULL\n");
1098 }
1099
1100 ARC_DEBUG (" Input_section:\n");
1101 if (reloc_data.input_section != NULL)
1102 {
1103 ARC_DEBUG (" section name = %s, output_offset 0x%08x, output_section->vma = 0x%08x\n",
1104 reloc_data.input_section->name,
1105 (unsigned int) reloc_data.input_section->output_offset,
1106 (unsigned int) reloc_data.input_section->output_section->vma);
1107 ARC_DEBUG (" changed_address = 0x%08x\n",
1108 (unsigned int) (reloc_data.input_section->output_section->vma
1109 + reloc_data.input_section->output_offset
1110 + reloc_data.reloc_offset));
1111 ARC_DEBUG (" file: %s\n", reloc_data.input_section->owner->filename);
1112 }
1113 else
1114 {
1115 ARC_DEBUG (" input section is NULL\n");
1116 }
1117 }
1118 #else
1119 #define DEBUG_ARC_RELOC(A)
1120 #endif /* ARC_ENABLE_DEBUG */
1121
1122 static bfd_vma
1123 middle_endian_convert (bfd_vma insn, bfd_boolean do_it)
1124 {
1125 if (do_it)
1126 {
1127 insn
1128 = ((insn & 0xffff0000) >> 16)
1129 | ((insn & 0xffff) << 16);
1130 }
1131 return insn;
1132 }
1133
1134 /* This function is called for relocations that are otherwise marked as NOT
1135 requiring overflow checks. In here we perform non-standard checks of
1136 the relocation value. */
1137
1138 static inline bfd_reloc_status_type
1139 arc_special_overflow_checks (const struct arc_relocation_data reloc_data,
1140 bfd_signed_vma relocation,
1141 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1142 {
1143 switch (reloc_data.howto->type)
1144 {
1145 case R_ARC_NPS_CMEM16:
1146 if (((relocation >> 16) & 0xffff) != NPS_CMEM_HIGH_VALUE)
1147 {
1148 if (reloc_data.reloc_addend == 0)
1149 _bfd_error_handler
1150 /* xgettext:c-format */
1151 (_("%pB(%pA+%#" PRIx64 "): CMEM relocation to `%s' is invalid, "
1152 "16 MSB should be %#x (value is %#" PRIx64 ")"),
1153 reloc_data.input_section->owner,
1154 reloc_data.input_section,
1155 (uint64_t) reloc_data.reloc_offset,
1156 reloc_data.symbol_name,
1157 NPS_CMEM_HIGH_VALUE,
1158 (uint64_t) relocation);
1159 else
1160 _bfd_error_handler
1161 /* xgettext:c-format */
1162 (_("%pB(%pA+%#" PRIx64 "): CMEM relocation to `%s+%#" PRIx64
1163 "' is invalid, 16 MSB should be %#x (value is %#" PRIx64 ")"),
1164 reloc_data.input_section->owner,
1165 reloc_data.input_section,
1166 (uint64_t) reloc_data.reloc_offset,
1167 reloc_data.symbol_name,
1168 (uint64_t) reloc_data.reloc_addend,
1169 NPS_CMEM_HIGH_VALUE,
1170 (uint64_t) relocation);
1171 return bfd_reloc_overflow;
1172 }
1173 break;
1174
1175 default:
1176 break;
1177 }
1178
1179 return bfd_reloc_ok;
1180 }
1181
1182 #define ME(reloc) (reloc)
1183
1184 #define IS_ME(FORMULA,BFD) ((strstr (FORMULA, "ME") != NULL) \
1185 && (!bfd_big_endian (BFD)))
1186
1187 #define S ((bfd_signed_vma) (reloc_data.sym_value \
1188 + (reloc_data.sym_section->output_section != NULL ? \
1189 (reloc_data.sym_section->output_offset \
1190 + reloc_data.sym_section->output_section->vma) : 0)))
1191 #define L ((bfd_signed_vma) (reloc_data.sym_value \
1192 + (reloc_data.sym_section->output_section != NULL ? \
1193 (reloc_data.sym_section->output_offset \
1194 + reloc_data.sym_section->output_section->vma) : 0)))
1195 #define A (reloc_data.reloc_addend)
1196 #define B (0)
1197 #define G (reloc_data.got_offset_value)
1198 #define GOT (reloc_data.got_symbol_vma)
1199 #define GOT_BEGIN (htab->sgot->output_section->vma)
1200
1201 #define MES (0)
1202 /* P: relative offset to PCL The offset should be to the
1203 current location aligned to 32 bits. */
1204 #define P ((bfd_signed_vma) ( \
1205 ( \
1206 (reloc_data.input_section->output_section != NULL ? \
1207 reloc_data.input_section->output_section->vma : 0) \
1208 + reloc_data.input_section->output_offset \
1209 + (reloc_data.reloc_offset - (bitsize >= 32 ? 4 : 0))) \
1210 & ~0x3))
1211 #define PDATA ((bfd_signed_vma) ( \
1212 (reloc_data.input_section->output_section->vma \
1213 + reloc_data.input_section->output_offset \
1214 + (reloc_data.reloc_offset))))
1215 #define SECTSTART (bfd_signed_vma) (reloc_data.sym_section->output_section->vma \
1216 + reloc_data.sym_section->output_offset)
1217 #define JLI (bfd_signed_vma) (reloc_data.sym_section->output_section->vma)
1218 #define _SDA_BASE_ (bfd_signed_vma) (reloc_data.sdata_begin_symbol_vma)
1219 #define TLS_REL (bfd_signed_vma) \
1220 ((elf_hash_table (info))->tls_sec->output_section->vma)
1221 #define TLS_TBSS (8)
1222
1223 #define none (0)
1224
1225 #ifdef ARC_ENABLE_DEBUG
1226 #define PRINT_DEBUG_RELOC_INFO_BEFORE(FORMULA, TYPE) \
1227 do \
1228 { \
1229 asection *sym_section = reloc_data.sym_section; \
1230 asection *input_section = reloc_data.input_section; \
1231 ARC_DEBUG ("RELOC_TYPE = " TYPE "\n"); \
1232 ARC_DEBUG ("FORMULA = " FORMULA "\n"); \
1233 ARC_DEBUG ("S = %#lx\n", S); \
1234 ARC_DEBUG ("A = %#lx\n", A); \
1235 ARC_DEBUG ("L = %lx\n", L); \
1236 if (sym_section->output_section != NULL) \
1237 ARC_DEBUG ("symbol_section->vma = %#lx\n", \
1238 sym_section->output_section->vma \
1239 + sym_section->output_offset); \
1240 else \
1241 ARC_DEBUG ("symbol_section->vma = NULL\n"); \
1242 if (input_section->output_section != NULL) \
1243 ARC_DEBUG ("symbol_section->vma = %#lx\n", \
1244 input_section->output_section->vma \
1245 + input_section->output_offset); \
1246 else \
1247 ARC_DEBUG ("symbol_section->vma = NULL\n"); \
1248 ARC_DEBUG ("PCL = %#lx\n", P); \
1249 ARC_DEBUG ("P = %#lx\n", P); \
1250 ARC_DEBUG ("G = %#lx\n", G); \
1251 ARC_DEBUG ("SDA_OFFSET = %#lx\n", _SDA_BASE_); \
1252 ARC_DEBUG ("SDA_SET = %d\n", reloc_data.sdata_begin_symbol_vma_set); \
1253 ARC_DEBUG ("GOT_OFFSET = %#lx\n", GOT); \
1254 ARC_DEBUG ("relocation = %#08lx\n", relocation); \
1255 ARC_DEBUG ("before = %#08x\n", (unsigned) insn); \
1256 ARC_DEBUG ("data = %08x (%u) (%d)\n", (unsigned) relocation, \
1257 (unsigned) relocation, (int) relocation); \
1258 } \
1259 while (0)
1260
1261 #define PRINT_DEBUG_RELOC_INFO_AFTER \
1262 do \
1263 { \
1264 ARC_DEBUG ("after = 0x%08x\n", (unsigned int) insn); \
1265 } \
1266 while (0)
1267
1268 #else
1269
1270 #define PRINT_DEBUG_RELOC_INFO_BEFORE(...)
1271 #define PRINT_DEBUG_RELOC_INFO_AFTER
1272
1273 #endif /* ARC_ENABLE_DEBUG */
1274
1275 #define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
1276 case R_##TYPE: \
1277 { \
1278 bfd_signed_vma bitsize ATTRIBUTE_UNUSED = BITSIZE; \
1279 relocation = FORMULA ; \
1280 PRINT_DEBUG_RELOC_INFO_BEFORE (#FORMULA, #TYPE); \
1281 insn = middle_endian_convert (insn, IS_ME (#FORMULA, abfd)); \
1282 insn = (* get_replace_function (abfd, TYPE)) (insn, relocation); \
1283 insn = middle_endian_convert (insn, IS_ME (#FORMULA, abfd)); \
1284 PRINT_DEBUG_RELOC_INFO_AFTER; \
1285 } \
1286 break;
1287
1288 static bfd_reloc_status_type
1289 arc_do_relocation (bfd_byte * contents,
1290 struct arc_relocation_data reloc_data,
1291 struct bfd_link_info *info)
1292 {
1293 bfd_signed_vma relocation = 0;
1294 bfd_vma insn;
1295 bfd_vma orig_insn ATTRIBUTE_UNUSED;
1296 bfd * abfd = reloc_data.input_section->owner;
1297 struct elf_link_hash_table *htab ATTRIBUTE_UNUSED = elf_hash_table (info);
1298 bfd_reloc_status_type flag;
1299
1300 if (!reloc_data.should_relocate)
1301 return bfd_reloc_ok;
1302
1303 switch (reloc_data.howto->size)
1304 {
1305 case 2:
1306 insn = arc_bfd_get_32 (abfd,
1307 contents + reloc_data.reloc_offset,
1308 reloc_data.input_section);
1309 break;
1310 case 1:
1311 insn = arc_bfd_get_16 (abfd,
1312 contents + reloc_data.reloc_offset,
1313 reloc_data.input_section);
1314 break;
1315 case 0:
1316 insn = arc_bfd_get_8 (abfd,
1317 contents + reloc_data.reloc_offset,
1318 reloc_data.input_section);
1319 break;
1320 default:
1321 insn = 0;
1322 BFD_ASSERT (0);
1323 break;
1324 }
1325
1326 orig_insn = insn;
1327
1328 switch (reloc_data.howto->type)
1329 {
1330 #include "elf/arc-reloc.def"
1331
1332 default:
1333 BFD_ASSERT (0);
1334 break;
1335 }
1336
1337 /* Check for relocation overflow. */
1338 if (reloc_data.howto->complain_on_overflow != complain_overflow_dont)
1339 flag = bfd_check_overflow (reloc_data.howto->complain_on_overflow,
1340 reloc_data.howto->bitsize,
1341 reloc_data.howto->rightshift,
1342 bfd_arch_bits_per_address (abfd),
1343 relocation);
1344 else
1345 flag = arc_special_overflow_checks (reloc_data, relocation, info);
1346
1347 if (flag != bfd_reloc_ok)
1348 {
1349 ARC_DEBUG ("Relocation overflows !\n");
1350 DEBUG_ARC_RELOC (reloc_data);
1351 ARC_DEBUG ("Relocation value = signed -> %d, unsigned -> %u"
1352 ", hex -> (0x%08x)\n",
1353 (int) relocation, (unsigned) relocation, (int) relocation);
1354
1355 return flag;
1356 }
1357
1358 /* Write updated instruction back to memory. */
1359 switch (reloc_data.howto->size)
1360 {
1361 case 2:
1362 arc_bfd_put_32 (abfd, insn,
1363 contents + reloc_data.reloc_offset,
1364 reloc_data.input_section);
1365 break;
1366 case 1:
1367 arc_bfd_put_16 (abfd, insn,
1368 contents + reloc_data.reloc_offset,
1369 reloc_data.input_section);
1370 break;
1371 case 0:
1372 arc_bfd_put_8 (abfd, insn,
1373 contents + reloc_data.reloc_offset,
1374 reloc_data.input_section);
1375 break;
1376 default:
1377 ARC_DEBUG ("size = %d\n", reloc_data.howto->size);
1378 BFD_ASSERT (0);
1379 break;
1380 }
1381
1382 return bfd_reloc_ok;
1383 }
1384 #undef S
1385 #undef A
1386 #undef B
1387 #undef G
1388 #undef GOT
1389 #undef L
1390 #undef MES
1391 #undef P
1392 #undef SECTSTAR
1393 #undef SECTSTART
1394 #undef JLI
1395 #undef _SDA_BASE_
1396 #undef none
1397
1398 #undef ARC_RELOC_HOWTO
1399
1400
1401 /* Relocate an arc ELF section.
1402 Function : elf_arc_relocate_section
1403 Brief : Relocate an arc section, by handling all the relocations
1404 appearing in that section.
1405 Args : output_bfd : The bfd being written to.
1406 info : Link information.
1407 input_bfd : The input bfd.
1408 input_section : The section being relocated.
1409 contents : contents of the section being relocated.
1410 relocs : List of relocations in the section.
1411 local_syms : is a pointer to the swapped in local symbols.
1412 local_section : is an array giving the section in the input file
1413 corresponding to the st_shndx field of each
1414 local symbol. */
1415 static bfd_boolean
1416 elf_arc_relocate_section (bfd * output_bfd,
1417 struct bfd_link_info * info,
1418 bfd * input_bfd,
1419 asection * input_section,
1420 bfd_byte * contents,
1421 Elf_Internal_Rela * relocs,
1422 Elf_Internal_Sym * local_syms,
1423 asection ** local_sections)
1424 {
1425 Elf_Internal_Shdr * symtab_hdr;
1426 struct elf_link_hash_entry ** sym_hashes;
1427 Elf_Internal_Rela * rel;
1428 Elf_Internal_Rela * wrel;
1429 Elf_Internal_Rela * relend;
1430 struct elf_link_hash_table * htab = elf_hash_table (info);
1431
1432 symtab_hdr = &((elf_tdata (input_bfd))->symtab_hdr);
1433 sym_hashes = elf_sym_hashes (input_bfd);
1434
1435 rel = wrel = relocs;
1436 relend = relocs + input_section->reloc_count;
1437 for (; rel < relend; wrel++, rel++)
1438 {
1439 enum elf_arc_reloc_type r_type;
1440 reloc_howto_type * howto;
1441 unsigned long r_symndx;
1442 struct elf_link_hash_entry * h;
1443 Elf_Internal_Sym * sym;
1444 asection * sec;
1445 struct elf_link_hash_entry * h2;
1446 const char * msg;
1447 bfd_boolean unresolved_reloc = FALSE;
1448
1449 struct arc_relocation_data reloc_data =
1450 {
1451 .reloc_offset = 0,
1452 .reloc_addend = 0,
1453 .got_offset_value = 0,
1454 .sym_value = 0,
1455 .sym_section = NULL,
1456 .howto = NULL,
1457 .input_section = NULL,
1458 .sdata_begin_symbol_vma = 0,
1459 .sdata_begin_symbol_vma_set = FALSE,
1460 .got_symbol_vma = 0,
1461 .should_relocate = FALSE
1462 };
1463
1464 r_type = ELF32_R_TYPE (rel->r_info);
1465
1466 if (r_type >= (int) R_ARC_max)
1467 {
1468 bfd_set_error (bfd_error_bad_value);
1469 return FALSE;
1470 }
1471 howto = arc_elf_howto (r_type);
1472
1473 r_symndx = ELF32_R_SYM (rel->r_info);
1474
1475 /* If we are generating another .o file and the symbol in not
1476 local, skip this relocation. */
1477 if (bfd_link_relocatable (info))
1478 {
1479 /* This is a relocateable link. We don't have to change
1480 anything, unless the reloc is against a section symbol,
1481 in which case we have to adjust according to where the
1482 section symbol winds up in the output section. */
1483
1484 /* Checks if this is a local symbol and thus the reloc
1485 might (will??) be against a section symbol. */
1486 if (r_symndx < symtab_hdr->sh_info)
1487 {
1488 sym = local_syms + r_symndx;
1489 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
1490 {
1491 sec = local_sections[r_symndx];
1492
1493 /* For RELA relocs. Just adjust the addend
1494 value in the relocation entry. */
1495 rel->r_addend += sec->output_offset + sym->st_value;
1496
1497 ARC_DEBUG ("local symbols reloc (section=%d %s) seen in %s\n",
1498 (int) r_symndx, local_sections[r_symndx]->name,
1499 __PRETTY_FUNCTION__);
1500 }
1501 }
1502 }
1503
1504 h2 = elf_link_hash_lookup (elf_hash_table (info), "__SDATA_BEGIN__",
1505 FALSE, FALSE, TRUE);
1506
1507 if (!reloc_data.sdata_begin_symbol_vma_set
1508 && h2 != NULL && h2->root.type != bfd_link_hash_undefined
1509 && h2->root.u.def.section->output_section != NULL)
1510 /* TODO: Verify this condition. */
1511 {
1512 reloc_data.sdata_begin_symbol_vma =
1513 (h2->root.u.def.value
1514 + h2->root.u.def.section->output_section->vma);
1515 reloc_data.sdata_begin_symbol_vma_set = TRUE;
1516 }
1517
1518 reloc_data.input_section = input_section;
1519 reloc_data.howto = howto;
1520 reloc_data.reloc_offset = rel->r_offset;
1521 reloc_data.reloc_addend = rel->r_addend;
1522
1523 /* This is a final link. */
1524 h = NULL;
1525 sym = NULL;
1526 sec = NULL;
1527
1528 if (r_symndx < symtab_hdr->sh_info) /* A local symbol. */
1529 {
1530 sym = local_syms + r_symndx;
1531 sec = local_sections[r_symndx];
1532 }
1533 else
1534 {
1535 bfd_boolean warned, ignored;
1536 bfd_vma relocation ATTRIBUTE_UNUSED;
1537
1538 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1539 r_symndx, symtab_hdr, sym_hashes,
1540 h, sec, relocation,
1541 unresolved_reloc, warned, ignored);
1542
1543 /* TODO: This code is repeated from below. We should
1544 clean it and remove duplications.
1545 Sec is used check for discarded sections.
1546 Need to redesign code below. */
1547
1548 /* Get the symbol's entry in the symtab. */
1549 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1550
1551 while (h->root.type == bfd_link_hash_indirect
1552 || h->root.type == bfd_link_hash_warning)
1553 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1554
1555 /* If we have encountered a definition for this symbol. */
1556 if (h->root.type == bfd_link_hash_defined
1557 || h->root.type == bfd_link_hash_defweak)
1558 {
1559 reloc_data.sym_value = h->root.u.def.value;
1560 sec = h->root.u.def.section;
1561 }
1562 }
1563
1564 /* Clean relocs for symbols in discarded sections. */
1565 if (sec != NULL && discarded_section (sec))
1566 {
1567 _bfd_clear_contents (howto, input_bfd, input_section,
1568 contents + rel->r_offset);
1569 rel->r_info = 0;
1570 rel->r_addend = 0;
1571
1572 /* For ld -r, remove relocations in debug sections against
1573 sections defined in discarded sections. Not done for
1574 eh_frame editing code expects to be present. */
1575 if (bfd_link_relocatable (info)
1576 && (input_section->flags & SEC_DEBUGGING))
1577 wrel--;
1578
1579 continue;
1580 }
1581
1582 if (bfd_link_relocatable (info))
1583 {
1584 if (wrel != rel)
1585 *wrel = *rel;
1586 continue;
1587 }
1588
1589 if (r_symndx < symtab_hdr->sh_info) /* A local symbol. */
1590 {
1591 reloc_data.sym_value = sym->st_value;
1592 reloc_data.sym_section = sec;
1593 reloc_data.symbol_name =
1594 bfd_elf_string_from_elf_section (input_bfd,
1595 symtab_hdr->sh_link,
1596 sym->st_name);
1597
1598 /* Mergeable section handling. */
1599 if ((sec->flags & SEC_MERGE)
1600 && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
1601 {
1602 asection *msec;
1603 msec = sec;
1604 rel->r_addend = _bfd_elf_rel_local_sym (output_bfd, sym,
1605 &msec, rel->r_addend);
1606 rel->r_addend -= (sec->output_section->vma
1607 + sec->output_offset
1608 + sym->st_value);
1609 rel->r_addend += msec->output_section->vma + msec->output_offset;
1610
1611 reloc_data.reloc_addend = rel->r_addend;
1612 }
1613
1614 BFD_ASSERT (htab->sgot != NULL || !is_reloc_for_GOT (howto));
1615 if (htab->sgot != NULL)
1616 reloc_data.got_symbol_vma = htab->sgot->output_section->vma
1617 + htab->sgot->output_offset;
1618
1619 reloc_data.should_relocate = TRUE;
1620 }
1621 else /* Global symbol. */
1622 {
1623 /* FIXME: We should use the RELOC_FOR_GLOBAL_SYMBOL macro
1624 (defined in elf-bfd.h) here. */
1625
1626 /* Get the symbol's entry in the symtab. */
1627 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1628
1629 while (h->root.type == bfd_link_hash_indirect
1630 || h->root.type == bfd_link_hash_warning)
1631 {
1632 struct elf_arc_link_hash_entry *ah_old =
1633 (struct elf_arc_link_hash_entry *) h;
1634 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1635 struct elf_arc_link_hash_entry *ah =
1636 (struct elf_arc_link_hash_entry *) h;
1637
1638 if (ah->got_ents == 0 && ah_old->got_ents != ah->got_ents)
1639 ah->got_ents = ah_old->got_ents;
1640 }
1641
1642 /* TODO: Need to validate what was the intention. */
1643 /* BFD_ASSERT ((h->dynindx == -1) || (h->forced_local != 0)); */
1644 reloc_data.symbol_name = h->root.root.string;
1645
1646 /* If we have encountered a definition for this symbol. */
1647 if (h->root.type == bfd_link_hash_defined
1648 || h->root.type == bfd_link_hash_defweak)
1649 {
1650 reloc_data.sym_value = h->root.u.def.value;
1651 reloc_data.sym_section = h->root.u.def.section;
1652
1653 reloc_data.should_relocate = TRUE;
1654
1655 if (is_reloc_for_GOT (howto) && !bfd_link_pic (info))
1656 {
1657 struct elf_arc_link_hash_entry *ah =
1658 (struct elf_arc_link_hash_entry *) h;
1659 /* TODO: Change it to use arc_do_relocation with
1660 ARC_32 reloc. Try to use ADD_RELA macro. */
1661 bfd_vma relocation =
1662 reloc_data.sym_value + reloc_data.reloc_addend
1663 + (reloc_data.sym_section->output_section != NULL ?
1664 (reloc_data.sym_section->output_offset
1665 + reloc_data.sym_section->output_section->vma)
1666 : 0);
1667
1668 BFD_ASSERT (ah->got_ents);
1669 bfd_vma got_offset = ah->got_ents->offset;
1670 bfd_put_32 (output_bfd, relocation,
1671 htab->sgot->contents + got_offset);
1672 }
1673 if (is_reloc_for_PLT (howto) && h->plt.offset != (bfd_vma) -1)
1674 {
1675 /* TODO: This is repeated up here. */
1676 reloc_data.sym_value = h->plt.offset;
1677 reloc_data.sym_section = htab->splt;
1678 }
1679 }
1680 else if (h->root.type == bfd_link_hash_undefweak)
1681 {
1682 /* Is weak symbol and has no definition. */
1683 if (is_reloc_for_GOT (howto))
1684 {
1685 reloc_data.sym_value = h->root.u.def.value;
1686 reloc_data.sym_section = htab->sgot;
1687 reloc_data.should_relocate = TRUE;
1688 }
1689 else if (is_reloc_for_PLT (howto)
1690 && h->plt.offset != (bfd_vma) -1)
1691 {
1692 /* TODO: This is repeated up here. */
1693 reloc_data.sym_value = h->plt.offset;
1694 reloc_data.sym_section = htab->splt;
1695 reloc_data.should_relocate = TRUE;
1696 }
1697 else
1698 continue;
1699 }
1700 else
1701 {
1702 if (is_reloc_for_GOT (howto))
1703 {
1704 reloc_data.sym_value = h->root.u.def.value;
1705 reloc_data.sym_section = htab->sgot;
1706
1707 reloc_data.should_relocate = TRUE;
1708 }
1709 else if (is_reloc_for_PLT (howto))
1710 {
1711 /* Fail if it is linking for PIE and the symbol is
1712 undefined. */
1713 if (bfd_link_executable (info))
1714 (*info->callbacks->undefined_symbol)
1715 (info, h->root.root.string, input_bfd, input_section,
1716 rel->r_offset, TRUE);
1717 reloc_data.sym_value = h->plt.offset;
1718 reloc_data.sym_section = htab->splt;
1719
1720 reloc_data.should_relocate = TRUE;
1721 }
1722 else if (!bfd_link_pic (info) || bfd_link_executable (info))
1723 (*info->callbacks->undefined_symbol)
1724 (info, h->root.root.string, input_bfd, input_section,
1725 rel->r_offset, TRUE);
1726 }
1727
1728 BFD_ASSERT (htab->sgot != NULL || !is_reloc_for_GOT (howto));
1729 if (htab->sgot != NULL)
1730 reloc_data.got_symbol_vma = htab->sgot->output_section->vma
1731 + htab->sgot->output_offset;
1732 }
1733
1734 if ((is_reloc_for_GOT (howto)
1735 || is_reloc_for_TLS (howto)))
1736 {
1737 reloc_data.should_relocate = TRUE;
1738
1739 struct got_entry **list
1740 = get_got_entry_list_for_symbol (output_bfd, r_symndx, h);
1741
1742 reloc_data.got_offset_value
1743 = relocate_fix_got_relocs_for_got_info (list,
1744 tls_type_for_reloc (howto),
1745 info,
1746 output_bfd,
1747 r_symndx,
1748 local_syms,
1749 local_sections,
1750 h,
1751 &reloc_data);
1752
1753 if (h == NULL)
1754 {
1755 create_got_dynrelocs_for_single_entry (
1756 got_entry_for_type (list,
1757 arc_got_entry_type_for_reloc (howto)),
1758 output_bfd, info, NULL);
1759 }
1760 }
1761
1762
1763 #define IS_ARC_PCREL_TYPE(TYPE) \
1764 ( (TYPE == R_ARC_PC32) \
1765 || (TYPE == R_ARC_32_PCREL))
1766
1767 switch (r_type)
1768 {
1769 case R_ARC_32:
1770 case R_ARC_32_ME:
1771 case R_ARC_PC32:
1772 case R_ARC_32_PCREL:
1773 if (bfd_link_pic (info)
1774 && (!IS_ARC_PCREL_TYPE (r_type)
1775 || (h != NULL
1776 && h->dynindx != -1
1777 && !h->def_regular
1778 && (!info->symbolic || !h->def_regular))))
1779 {
1780 Elf_Internal_Rela outrel;
1781 bfd_byte *loc;
1782 bfd_boolean skip = FALSE;
1783 bfd_boolean relocate = FALSE;
1784 asection *sreloc = _bfd_elf_get_dynamic_reloc_section
1785 (input_bfd, input_section,
1786 /*RELA*/ TRUE);
1787
1788 BFD_ASSERT (sreloc != NULL);
1789
1790 outrel.r_offset = _bfd_elf_section_offset (output_bfd,
1791 info,
1792 input_section,
1793 rel->r_offset);
1794
1795 if (outrel.r_offset == (bfd_vma) -1)
1796 skip = TRUE;
1797
1798 outrel.r_addend = rel->r_addend;
1799 outrel.r_offset += (input_section->output_section->vma
1800 + input_section->output_offset);
1801
1802 if (skip)
1803 {
1804 memset (&outrel, 0, sizeof outrel);
1805 relocate = FALSE;
1806 }
1807 else if (h != NULL
1808 && h->dynindx != -1
1809 && (IS_ARC_PCREL_TYPE (r_type)
1810 || !(bfd_link_executable (info)
1811 || SYMBOLIC_BIND (info, h))
1812 || ! h->def_regular))
1813 {
1814 BFD_ASSERT (h != NULL);
1815 if ((input_section->flags & SEC_ALLOC) != 0)
1816 relocate = FALSE;
1817 else
1818 relocate = TRUE;
1819
1820 BFD_ASSERT (h->dynindx != -1);
1821 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1822 }
1823 else
1824 {
1825 /* Handle local symbols, they either do not have a
1826 global hash table entry (h == NULL), or are
1827 forced local due to a version script
1828 (h->forced_local), or the third condition is
1829 legacy, it appears to say something like, for
1830 links where we are pre-binding the symbols, or
1831 there's not an entry for this symbol in the
1832 dynamic symbol table, and it's a regular symbol
1833 not defined in a shared object, then treat the
1834 symbol as local, resolve it now. */
1835 relocate = TRUE;
1836 /* outrel.r_addend = 0; */
1837 outrel.r_info = ELF32_R_INFO (0, R_ARC_RELATIVE);
1838 }
1839
1840 BFD_ASSERT (sreloc->contents != 0);
1841
1842 loc = sreloc->contents;
1843 loc += sreloc->reloc_count * sizeof (Elf32_External_Rela);
1844 sreloc->reloc_count += 1;
1845
1846 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1847
1848 if (!relocate)
1849 continue;
1850 }
1851 break;
1852 default:
1853 break;
1854 }
1855
1856 if (is_reloc_SDA_relative (howto)
1857 && !reloc_data.sdata_begin_symbol_vma_set)
1858 {
1859 _bfd_error_handler
1860 ("error: linker symbol __SDATA_BEGIN__ not found");
1861 bfd_set_error (bfd_error_bad_value);
1862 return FALSE;
1863 }
1864
1865 DEBUG_ARC_RELOC (reloc_data);
1866
1867 /* Make sure we have with a dynamic linker. In case of GOT and PLT
1868 the sym_section should point to .got or .plt respectively. */
1869 if ((is_reloc_for_GOT (howto) || is_reloc_for_PLT (howto))
1870 && reloc_data.sym_section == NULL)
1871 {
1872 _bfd_error_handler
1873 (_("GOT and PLT relocations cannot be fixed with a non dynamic linker"));
1874 bfd_set_error (bfd_error_bad_value);
1875 return FALSE;
1876 }
1877
1878 msg = NULL;
1879 switch (arc_do_relocation (contents, reloc_data, info))
1880 {
1881 case bfd_reloc_ok:
1882 continue; /* The reloc processing loop. */
1883
1884 case bfd_reloc_overflow:
1885 (*info->callbacks->reloc_overflow)
1886 (info, (h ? &h->root : NULL), reloc_data.symbol_name, howto->name, (bfd_vma) 0,
1887 input_bfd, input_section, rel->r_offset);
1888 break;
1889
1890 case bfd_reloc_undefined:
1891 (*info->callbacks->undefined_symbol)
1892 (info, reloc_data.symbol_name, input_bfd, input_section, rel->r_offset, TRUE);
1893 break;
1894
1895 case bfd_reloc_other:
1896 /* xgettext:c-format */
1897 msg = _("%pB(%pA): warning: unaligned access to symbol '%s' in the small data area");
1898 break;
1899
1900 case bfd_reloc_outofrange:
1901 /* xgettext:c-format */
1902 msg = _("%pB(%pA): internal error: out of range error");
1903 break;
1904
1905 case bfd_reloc_notsupported:
1906 /* xgettext:c-format */
1907 msg = _("%pB(%pA): internal error: unsupported relocation error");
1908 break;
1909
1910 case bfd_reloc_dangerous:
1911 /* xgettext:c-format */
1912 msg = _("%pB(%pA): internal error: dangerous relocation");
1913 break;
1914
1915 default:
1916 /* xgettext:c-format */
1917 msg = _("%pB(%pA): internal error: unknown error");
1918 break;
1919 }
1920
1921 if (msg)
1922 _bfd_error_handler (msg, input_bfd, input_section, reloc_data.symbol_name);
1923 return FALSE;
1924 }
1925
1926 return TRUE;
1927 }
1928
1929 #define elf_arc_hash_table(p) \
1930 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
1931 == ARC_ELF_DATA ? ((struct elf_arc_link_hash_table *) ((p)->hash)) : NULL)
1932
1933 static bfd_boolean
1934 elf_arc_check_relocs (bfd * abfd,
1935 struct bfd_link_info * info,
1936 asection * sec,
1937 const Elf_Internal_Rela * relocs)
1938 {
1939 Elf_Internal_Shdr * symtab_hdr;
1940 struct elf_link_hash_entry ** sym_hashes;
1941 const Elf_Internal_Rela * rel;
1942 const Elf_Internal_Rela * rel_end;
1943 bfd * dynobj;
1944 asection * sreloc = NULL;
1945 struct elf_link_hash_table * htab = elf_hash_table (info);
1946
1947 if (bfd_link_relocatable (info))
1948 return TRUE;
1949
1950 if (htab->dynobj == NULL)
1951 htab->dynobj = abfd;
1952
1953 dynobj = (elf_hash_table (info))->dynobj;
1954 symtab_hdr = &((elf_tdata (abfd))->symtab_hdr);
1955 sym_hashes = elf_sym_hashes (abfd);
1956
1957 rel_end = relocs + sec->reloc_count;
1958 for (rel = relocs; rel < rel_end; rel++)
1959 {
1960 enum elf_arc_reloc_type r_type;
1961 reloc_howto_type *howto;
1962 unsigned long r_symndx;
1963 struct elf_link_hash_entry *h;
1964
1965 r_type = ELF32_R_TYPE (rel->r_info);
1966
1967 if (r_type >= (int) R_ARC_max)
1968 {
1969 bfd_set_error (bfd_error_bad_value);
1970 return FALSE;
1971 }
1972 howto = arc_elf_howto (r_type);
1973
1974 /* Load symbol information. */
1975 r_symndx = ELF32_R_SYM (rel->r_info);
1976 if (r_symndx < symtab_hdr->sh_info) /* Is a local symbol. */
1977 h = NULL;
1978 else /* Global one. */
1979 {
1980 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1981 while (h->root.type == bfd_link_hash_indirect
1982 || h->root.type == bfd_link_hash_warning)
1983 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1984 }
1985
1986
1987 switch (r_type)
1988 {
1989 case R_ARC_32:
1990 case R_ARC_32_ME:
1991 /* During shared library creation, these relocs should not
1992 appear in a shared library (as memory will be read only
1993 and the dynamic linker can not resolve these. However
1994 the error should not occur for e.g. debugging or
1995 non-readonly sections. */
1996 if (h != NULL
1997 && (bfd_link_dll (info) && !bfd_link_pie (info))
1998 && (sec->flags & SEC_ALLOC) != 0
1999 && (sec->flags & SEC_READONLY) != 0
2000 && ((sec->flags & SEC_CODE) != 0
2001 || (sec->flags & SEC_DEBUGGING) != 0))
2002 {
2003 const char *name;
2004 if (h)
2005 name = h->root.root.string;
2006 else
2007 /* bfd_elf_sym_name (abfd, symtab_hdr, isym, NULL); */
2008 name = "UNKNOWN";
2009 _bfd_error_handler
2010 /* xgettext:c-format */
2011 (_("%pB: relocation %s against `%s' can not be used"
2012 " when making a shared object; recompile with -fPIC"),
2013 abfd,
2014 arc_elf_howto (r_type)->name,
2015 name);
2016 bfd_set_error (bfd_error_bad_value);
2017 return FALSE;
2018 }
2019
2020 /* In some cases we are not setting the 'non_got_ref'
2021 flag, even though the relocations don't require a GOT
2022 access. We should extend the testing in this area to
2023 ensure that no significant cases are being missed. */
2024 if (h)
2025 h->non_got_ref = 1;
2026 /* FALLTHROUGH */
2027 case R_ARC_PC32:
2028 case R_ARC_32_PCREL:
2029 if ((bfd_link_pic (info))
2030 && ((r_type != R_ARC_PC32 && r_type != R_ARC_32_PCREL)
2031 || (h != NULL
2032 && (!info->symbolic || !h->def_regular))))
2033 {
2034 if (sreloc == NULL)
2035 {
2036 if (info->dynamic
2037 && ! htab->dynamic_sections_created
2038 && ! _bfd_elf_link_create_dynamic_sections (abfd, info))
2039 return FALSE;
2040 sreloc = _bfd_elf_make_dynamic_reloc_section (sec, dynobj,
2041 2, abfd,
2042 /*rela*/
2043 TRUE);
2044
2045 if (sreloc == NULL)
2046 return FALSE;
2047 }
2048 sreloc->size += sizeof (Elf32_External_Rela);
2049
2050 }
2051 default:
2052 break;
2053 }
2054
2055 if (is_reloc_for_PLT (howto))
2056 {
2057 if (h == NULL)
2058 continue;
2059 else
2060 h->needs_plt = 1;
2061 }
2062
2063 /* Add info to the symbol got_entry_list. */
2064 if (is_reloc_for_GOT (howto)
2065 || is_reloc_for_TLS (howto))
2066 {
2067 if (! _bfd_elf_create_got_section (dynobj, info))
2068 return FALSE;
2069
2070 arc_fill_got_info_for_reloc (
2071 arc_got_entry_type_for_reloc (howto),
2072 get_got_entry_list_for_symbol (abfd, r_symndx, h),
2073 info,
2074 h);
2075 }
2076 }
2077
2078 return TRUE;
2079 }
2080
2081 #define ELF_DYNAMIC_INTERPRETER "/sbin/ld-uClibc.so"
2082
2083 static struct plt_version_t *
2084 arc_get_plt_version (struct bfd_link_info *info)
2085 {
2086 int i;
2087
2088 for (i = 0; i < 1; i++)
2089 {
2090 ARC_DEBUG ("%d: size1 = %d, size2 = %d\n", i,
2091 (int) plt_versions[i].entry_size,
2092 (int) plt_versions[i].elem_size);
2093 }
2094
2095 if (bfd_get_mach (info->output_bfd) == bfd_mach_arc_arcv2)
2096 {
2097 if (bfd_link_pic (info))
2098 return &(plt_versions[ELF_ARCV2_PIC]);
2099 else
2100 return &(plt_versions[ELF_ARCV2_ABS]);
2101 }
2102 else
2103 {
2104 if (bfd_link_pic (info))
2105 return &(plt_versions[ELF_ARC_PIC]);
2106 else
2107 return &(plt_versions[ELF_ARC_ABS]);
2108 }
2109 }
2110
2111 static bfd_vma
2112 add_symbol_to_plt (struct bfd_link_info *info)
2113 {
2114 struct elf_link_hash_table *htab = elf_hash_table (info);
2115 bfd_vma ret;
2116
2117 struct plt_version_t *plt_data = arc_get_plt_version (info);
2118
2119 /* If this is the first .plt entry, make room for the special first
2120 entry. */
2121 if (htab->splt->size == 0)
2122 htab->splt->size += plt_data->entry_size;
2123
2124 ret = htab->splt->size;
2125
2126 htab->splt->size += plt_data->elem_size;
2127 ARC_DEBUG ("PLT_SIZE = %d\n", (int) htab->splt->size);
2128
2129 htab->sgotplt->size += 4;
2130 htab->srelplt->size += sizeof (Elf32_External_Rela);
2131
2132 return ret;
2133 }
2134
2135 #define PLT_DO_RELOCS_FOR_ENTRY(ABFD, DS, RELOCS) \
2136 plt_do_relocs_for_symbol (ABFD, DS, RELOCS, 0, 0)
2137
2138 static void
2139 plt_do_relocs_for_symbol (bfd *abfd,
2140 struct elf_link_hash_table *htab,
2141 const struct plt_reloc *reloc,
2142 bfd_vma plt_offset,
2143 bfd_vma symbol_got_offset)
2144 {
2145 while (SYM_ONLY (reloc->symbol) != LAST_RELOC)
2146 {
2147 bfd_vma relocation = 0;
2148
2149 switch (SYM_ONLY (reloc->symbol))
2150 {
2151 case SGOT:
2152 relocation
2153 = htab->sgotplt->output_section->vma
2154 + htab->sgotplt->output_offset + symbol_got_offset;
2155 break;
2156 }
2157 relocation += reloc->addend;
2158
2159 if (IS_RELATIVE (reloc->symbol))
2160 {
2161 bfd_vma reloc_offset = reloc->offset;
2162 reloc_offset -= (IS_INSN_32 (reloc->symbol)) ? 4 : 0;
2163 reloc_offset -= (IS_INSN_24 (reloc->symbol)) ? 2 : 0;
2164
2165 relocation -= htab->splt->output_section->vma
2166 + htab->splt->output_offset
2167 + plt_offset + reloc_offset;
2168 }
2169
2170 /* TODO: being ME is not a property of the relocation but of the
2171 section of which is applying the relocation. */
2172 if (IS_MIDDLE_ENDIAN (reloc->symbol) && !bfd_big_endian (abfd))
2173 {
2174 relocation
2175 = ((relocation & 0xffff0000) >> 16)
2176 | ((relocation & 0xffff) << 16);
2177 }
2178
2179 switch (reloc->size)
2180 {
2181 case 32:
2182 bfd_put_32 (htab->splt->output_section->owner,
2183 relocation,
2184 htab->splt->contents + plt_offset + reloc->offset);
2185 break;
2186 }
2187
2188 reloc = &(reloc[1]); /* Jump to next relocation. */
2189 }
2190 }
2191
2192 static void
2193 relocate_plt_for_symbol (bfd *output_bfd,
2194 struct bfd_link_info *info,
2195 struct elf_link_hash_entry *h)
2196 {
2197 struct plt_version_t *plt_data = arc_get_plt_version (info);
2198 struct elf_link_hash_table *htab = elf_hash_table (info);
2199
2200 bfd_vma plt_index = (h->plt.offset - plt_data->entry_size)
2201 / plt_data->elem_size;
2202 bfd_vma got_offset = (plt_index + 3) * 4;
2203
2204 ARC_DEBUG ("arc_info: PLT_OFFSET = %#lx, PLT_ENTRY_VMA = %#lx, \
2205 GOT_ENTRY_OFFSET = %#lx, GOT_ENTRY_VMA = %#lx, for symbol %s\n",
2206 (long) h->plt.offset,
2207 (long) (htab->splt->output_section->vma
2208 + htab->splt->output_offset
2209 + h->plt.offset),
2210 (long) got_offset,
2211 (long) (htab->sgotplt->output_section->vma
2212 + htab->sgotplt->output_offset
2213 + got_offset),
2214 h->root.root.string);
2215
2216 {
2217 bfd_vma i = 0;
2218 uint16_t *ptr = (uint16_t *) plt_data->elem;
2219
2220 for (i = 0; i < plt_data->elem_size/2; i++)
2221 {
2222 uint16_t data = ptr[i];
2223 bfd_put_16 (output_bfd,
2224 (bfd_vma) data,
2225 htab->splt->contents + h->plt.offset + (i*2));
2226 }
2227 }
2228
2229 plt_do_relocs_for_symbol (output_bfd, htab,
2230 plt_data->elem_relocs,
2231 h->plt.offset,
2232 got_offset);
2233
2234 /* Fill in the entry in the global offset table. */
2235 bfd_put_32 (output_bfd,
2236 (bfd_vma) (htab->splt->output_section->vma
2237 + htab->splt->output_offset),
2238 htab->sgotplt->contents + got_offset);
2239
2240 /* TODO: Fill in the entry in the .rela.plt section. */
2241 {
2242 Elf_Internal_Rela rel;
2243 bfd_byte *loc;
2244
2245 rel.r_offset = (htab->sgotplt->output_section->vma
2246 + htab->sgotplt->output_offset
2247 + got_offset);
2248 rel.r_addend = 0;
2249
2250 BFD_ASSERT (h->dynindx != -1);
2251 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARC_JMP_SLOT);
2252
2253 loc = htab->srelplt->contents;
2254 loc += plt_index * sizeof (Elf32_External_Rela); /* relA */
2255 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
2256 }
2257 }
2258
2259 static void
2260 relocate_plt_for_entry (bfd *abfd,
2261 struct bfd_link_info *info)
2262 {
2263 struct plt_version_t *plt_data = arc_get_plt_version (info);
2264 struct elf_link_hash_table *htab = elf_hash_table (info);
2265
2266 {
2267 bfd_vma i = 0;
2268 uint16_t *ptr = (uint16_t *) plt_data->entry;
2269 for (i = 0; i < plt_data->entry_size/2; i++)
2270 {
2271 uint16_t data = ptr[i];
2272 bfd_put_16 (abfd,
2273 (bfd_vma) data,
2274 htab->splt->contents + (i*2));
2275 }
2276 }
2277 PLT_DO_RELOCS_FOR_ENTRY (abfd, htab, plt_data->entry_relocs);
2278 }
2279
2280 /* Desc : Adjust a symbol defined by a dynamic object and referenced
2281 by a regular object. The current definition is in some section of
2282 the dynamic object, but we're not including those sections. We
2283 have to change the definition to something the rest of the link can
2284 understand. */
2285
2286 static bfd_boolean
2287 elf_arc_adjust_dynamic_symbol (struct bfd_link_info *info,
2288 struct elf_link_hash_entry *h)
2289 {
2290 asection *s;
2291 bfd *dynobj = (elf_hash_table (info))->dynobj;
2292 struct elf_link_hash_table *htab = elf_hash_table (info);
2293
2294 if (h->type == STT_FUNC
2295 || h->type == STT_GNU_IFUNC
2296 || h->needs_plt == 1)
2297 {
2298 if (!bfd_link_pic (info) && !h->def_dynamic && !h->ref_dynamic)
2299 {
2300 /* This case can occur if we saw a PLT32 reloc in an input
2301 file, but the symbol was never referred to by a dynamic
2302 object. In such a case, we don't actually need to build
2303 a procedure linkage table, and we can just do a PC32
2304 reloc instead. */
2305 BFD_ASSERT (h->needs_plt);
2306 return TRUE;
2307 }
2308
2309 /* Make sure this symbol is output as a dynamic symbol. */
2310 if (h->dynindx == -1 && !h->forced_local
2311 && !bfd_elf_link_record_dynamic_symbol (info, h))
2312 return FALSE;
2313
2314 if (bfd_link_pic (info)
2315 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
2316 {
2317 bfd_vma loc = add_symbol_to_plt (info);
2318
2319 if (bfd_link_executable (info) && !h->def_regular)
2320 {
2321 h->root.u.def.section = htab->splt;
2322 h->root.u.def.value = loc;
2323 }
2324 h->plt.offset = loc;
2325 }
2326 else
2327 {
2328 h->plt.offset = (bfd_vma) -1;
2329 h->needs_plt = 0;
2330 }
2331 return TRUE;
2332 }
2333
2334 /* If this is a weak symbol, and there is a real definition, the
2335 processor independent code will have arranged for us to see the
2336 real definition first, and we can just use the same value. */
2337 if (h->is_weakalias)
2338 {
2339 struct elf_link_hash_entry *def = weakdef (h);
2340 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
2341 h->root.u.def.section = def->root.u.def.section;
2342 h->root.u.def.value = def->root.u.def.value;
2343 return TRUE;
2344 }
2345
2346 /* This is a reference to a symbol defined by a dynamic object which
2347 is not a function. */
2348
2349 /* If we are creating a shared library, we must presume that the
2350 only references to the symbol are via the global offset table.
2351 For such cases we need not do anything here; the relocations will
2352 be handled correctly by relocate_section. */
2353 if (!bfd_link_executable (info))
2354 return TRUE;
2355
2356 /* If there are no non-GOT references, we do not need a copy
2357 relocation. */
2358 if (!h->non_got_ref)
2359 return TRUE;
2360
2361 /* If -z nocopyreloc was given, we won't generate them either. */
2362 if (info->nocopyreloc)
2363 {
2364 h->non_got_ref = 0;
2365 return TRUE;
2366 }
2367
2368 /* We must allocate the symbol in our .dynbss section, which will
2369 become part of the .bss section of the executable. There will be
2370 an entry for this symbol in the .dynsym section. The dynamic
2371 object will contain position independent code, so all references
2372 from the dynamic object to this symbol will go through the global
2373 offset table. The dynamic linker will use the .dynsym entry to
2374 determine the address it must put in the global offset table, so
2375 both the dynamic object and the regular object will refer to the
2376 same memory location for the variable. */
2377
2378 if (htab == NULL)
2379 return FALSE;
2380
2381 /* We must generate a R_ARC_COPY reloc to tell the dynamic linker to
2382 copy the initial value out of the dynamic object and into the
2383 runtime process image. We need to remember the offset into the
2384 .rela.bss section we are going to use. */
2385 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
2386 {
2387 struct elf_arc_link_hash_table *arc_htab = elf_arc_hash_table (info);
2388
2389 BFD_ASSERT (arc_htab->elf.srelbss != NULL);
2390 arc_htab->elf.srelbss->size += sizeof (Elf32_External_Rela);
2391 h->needs_copy = 1;
2392 }
2393
2394 /* TODO: Move this also to arc_hash_table. */
2395 s = bfd_get_section_by_name (dynobj, ".dynbss");
2396 BFD_ASSERT (s != NULL);
2397
2398 return _bfd_elf_adjust_dynamic_copy (info, h, s);
2399 }
2400
2401 /* Function : elf_arc_finish_dynamic_symbol
2402 Brief : Finish up dynamic symbol handling. We set the
2403 contents of various dynamic sections here.
2404 Args : output_bfd :
2405 info :
2406 h :
2407 sym :
2408 Returns : True/False as the return status. */
2409
2410 static bfd_boolean
2411 elf_arc_finish_dynamic_symbol (bfd * output_bfd,
2412 struct bfd_link_info *info,
2413 struct elf_link_hash_entry *h,
2414 Elf_Internal_Sym * sym)
2415 {
2416 if (h->plt.offset != (bfd_vma) -1)
2417 {
2418 relocate_plt_for_symbol (output_bfd, info, h);
2419
2420 if (!h->def_regular)
2421 {
2422 /* Mark the symbol as undefined, rather than as defined in
2423 the .plt section. Leave the value alone. */
2424 sym->st_shndx = SHN_UNDEF;
2425 }
2426 }
2427
2428
2429 /* This function traverses list of GOT entries and
2430 create respective dynamic relocs. */
2431 /* TODO: Make function to get list and not access the list directly. */
2432 /* TODO: Move function to relocate_section create this relocs eagerly. */
2433 struct elf_arc_link_hash_entry *ah =
2434 (struct elf_arc_link_hash_entry *) h;
2435 create_got_dynrelocs_for_got_info (&ah->got_ents,
2436 output_bfd,
2437 info,
2438 h);
2439
2440 if (h->needs_copy)
2441 {
2442 struct elf_arc_link_hash_table *arc_htab = elf_arc_hash_table (info);
2443
2444 if (arc_htab == NULL)
2445 return FALSE;
2446
2447 if (h->dynindx == -1
2448 || (h->root.type != bfd_link_hash_defined
2449 && h->root.type != bfd_link_hash_defweak)
2450 || arc_htab->elf.srelbss == NULL)
2451 abort ();
2452
2453 bfd_vma rel_offset = (h->root.u.def.value
2454 + h->root.u.def.section->output_section->vma
2455 + h->root.u.def.section->output_offset);
2456
2457 bfd_byte * loc = arc_htab->elf.srelbss->contents
2458 + (arc_htab->elf.srelbss->reloc_count * sizeof (Elf32_External_Rela));
2459 arc_htab->elf.srelbss->reloc_count++;
2460
2461 Elf_Internal_Rela rel;
2462 rel.r_addend = 0;
2463 rel.r_offset = rel_offset;
2464
2465 BFD_ASSERT (h->dynindx != -1);
2466 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARC_COPY);
2467
2468 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
2469 }
2470
2471 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
2472 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
2473 || strcmp (h->root.root.string, "__DYNAMIC") == 0
2474 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
2475 sym->st_shndx = SHN_ABS;
2476
2477 return TRUE;
2478 }
2479
2480 #define GET_SYMBOL_OR_SECTION(TAG, SYMBOL, SECTION) \
2481 case TAG: \
2482 if (SYMBOL != NULL) \
2483 h = elf_link_hash_lookup (elf_hash_table (info), \
2484 SYMBOL, FALSE, FALSE, TRUE); \
2485 else if (SECTION != NULL) \
2486 s = bfd_get_linker_section (dynobj, SECTION); \
2487 break;
2488
2489 /* Function : elf_arc_finish_dynamic_sections
2490 Brief : Finish up the dynamic sections handling.
2491 Args : output_bfd :
2492 info :
2493 h :
2494 sym :
2495 Returns : True/False as the return status. */
2496
2497 static bfd_boolean
2498 elf_arc_finish_dynamic_sections (bfd * output_bfd,
2499 struct bfd_link_info *info)
2500 {
2501 struct elf_link_hash_table *htab = elf_hash_table (info);
2502 bfd *dynobj = (elf_hash_table (info))->dynobj;
2503 asection *sdyn = bfd_get_linker_section (dynobj, ".dynamic");
2504
2505 if (sdyn)
2506 {
2507 Elf32_External_Dyn *dyncon, *dynconend;
2508
2509 dyncon = (Elf32_External_Dyn *) sdyn->contents;
2510 dynconend
2511 = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
2512 for (; dyncon < dynconend; dyncon++)
2513 {
2514 Elf_Internal_Dyn internal_dyn;
2515 bfd_boolean do_it = FALSE;
2516
2517 struct elf_link_hash_entry *h = NULL;
2518 asection *s = NULL;
2519
2520 bfd_elf32_swap_dyn_in (dynobj, dyncon, &internal_dyn);
2521
2522 switch (internal_dyn.d_tag)
2523 {
2524 GET_SYMBOL_OR_SECTION (DT_INIT, info->init_function, NULL)
2525 GET_SYMBOL_OR_SECTION (DT_FINI, info->fini_function, NULL)
2526 GET_SYMBOL_OR_SECTION (DT_PLTGOT, NULL, ".plt")
2527 GET_SYMBOL_OR_SECTION (DT_JMPREL, NULL, ".rela.plt")
2528 GET_SYMBOL_OR_SECTION (DT_PLTRELSZ, NULL, ".rela.plt")
2529 GET_SYMBOL_OR_SECTION (DT_VERSYM, NULL, ".gnu.version")
2530 GET_SYMBOL_OR_SECTION (DT_VERDEF, NULL, ".gnu.version_d")
2531 GET_SYMBOL_OR_SECTION (DT_VERNEED, NULL, ".gnu.version_r")
2532 default:
2533 break;
2534 }
2535
2536 /* In case the dynamic symbols should be updated with a symbol. */
2537 if (h != NULL
2538 && (h->root.type == bfd_link_hash_defined
2539 || h->root.type == bfd_link_hash_defweak))
2540 {
2541 asection *asec_ptr;
2542
2543 internal_dyn.d_un.d_val = h->root.u.def.value;
2544 asec_ptr = h->root.u.def.section;
2545 if (asec_ptr->output_section != NULL)
2546 {
2547 internal_dyn.d_un.d_val +=
2548 (asec_ptr->output_section->vma
2549 + asec_ptr->output_offset);
2550 }
2551 else
2552 {
2553 /* The symbol is imported from another shared
2554 library and does not apply to this one. */
2555 internal_dyn.d_un.d_val = 0;
2556 }
2557 do_it = TRUE;
2558 }
2559 else if (s != NULL) /* With a section information. */
2560 {
2561 switch (internal_dyn.d_tag)
2562 {
2563 case DT_PLTGOT:
2564 case DT_JMPREL:
2565 case DT_VERSYM:
2566 case DT_VERDEF:
2567 case DT_VERNEED:
2568 internal_dyn.d_un.d_ptr = (s->output_section->vma
2569 + s->output_offset);
2570 do_it = TRUE;
2571 break;
2572
2573 case DT_PLTRELSZ:
2574 internal_dyn.d_un.d_val = s->size;
2575 do_it = TRUE;
2576 break;
2577
2578 default:
2579 break;
2580 }
2581 }
2582
2583 if (do_it)
2584 bfd_elf32_swap_dyn_out (output_bfd, &internal_dyn, dyncon);
2585 }
2586
2587 if (htab->splt->size > 0)
2588 {
2589 relocate_plt_for_entry (output_bfd, info);
2590 }
2591
2592 /* TODO: Validate this. */
2593 if (htab->srelplt->output_section != bfd_abs_section_ptr)
2594 elf_section_data (htab->srelplt->output_section)
2595 ->this_hdr.sh_entsize = 12;
2596 }
2597
2598 /* Fill in the first three entries in the global offset table. */
2599 if (htab->sgot)
2600 {
2601 struct elf_link_hash_entry *h;
2602 h = elf_link_hash_lookup (elf_hash_table (info), "_GLOBAL_OFFSET_TABLE_",
2603 FALSE, FALSE, TRUE);
2604
2605 if (h != NULL && h->root.type != bfd_link_hash_undefined
2606 && h->root.u.def.section != NULL)
2607 {
2608 asection *sec = h->root.u.def.section;
2609
2610 if (sdyn == NULL)
2611 bfd_put_32 (output_bfd, (bfd_vma) 0,
2612 sec->contents);
2613 else
2614 bfd_put_32 (output_bfd,
2615 sdyn->output_section->vma + sdyn->output_offset,
2616 sec->contents);
2617 bfd_put_32 (output_bfd, (bfd_vma) 0, sec->contents + 4);
2618 bfd_put_32 (output_bfd, (bfd_vma) 0, sec->contents + 8);
2619 }
2620 }
2621
2622 return TRUE;
2623 }
2624
2625 #define ADD_DYNAMIC_SYMBOL(NAME, TAG) \
2626 h = elf_link_hash_lookup (elf_hash_table (info), \
2627 NAME, FALSE, FALSE, FALSE); \
2628 if ((h != NULL && (h->ref_regular || h->def_regular))) \
2629 if (! _bfd_elf_add_dynamic_entry (info, TAG, 0)) \
2630 return FALSE;
2631
2632 /* Set the sizes of the dynamic sections. */
2633 static bfd_boolean
2634 elf_arc_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2635 struct bfd_link_info *info)
2636 {
2637 bfd *dynobj;
2638 asection *s;
2639 bfd_boolean relocs_exist = FALSE;
2640 bfd_boolean reltext_exist = FALSE;
2641 struct elf_link_hash_table *htab = elf_hash_table (info);
2642
2643 dynobj = htab->dynobj;
2644 BFD_ASSERT (dynobj != NULL);
2645
2646 if (htab->dynamic_sections_created)
2647 {
2648 struct elf_link_hash_entry *h;
2649
2650 /* Set the contents of the .interp section to the
2651 interpreter. */
2652 if (bfd_link_executable (info) && !info->nointerp)
2653 {
2654 s = bfd_get_section_by_name (dynobj, ".interp");
2655 BFD_ASSERT (s != NULL);
2656 s->size = sizeof (ELF_DYNAMIC_INTERPRETER);
2657 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2658 }
2659
2660 /* Add some entries to the .dynamic section. We fill in some of
2661 the values later, in elf_bfd_final_link, but we must add the
2662 entries now so that we know the final size of the .dynamic
2663 section. Checking if the .init section is present. We also
2664 create DT_INIT and DT_FINI entries if the init_str has been
2665 changed by the user. */
2666 ADD_DYNAMIC_SYMBOL (info->init_function, DT_INIT);
2667 ADD_DYNAMIC_SYMBOL (info->fini_function, DT_FINI);
2668 }
2669 else
2670 {
2671 /* We may have created entries in the .rela.got section.
2672 However, if we are not creating the dynamic sections, we will
2673 not actually use these entries. Reset the size of .rela.got,
2674 which will cause it to get stripped from the output file
2675 below. */
2676 if (htab->srelgot != NULL)
2677 htab->srelgot->size = 0;
2678 }
2679
2680 for (s = dynobj->sections; s != NULL; s = s->next)
2681 {
2682 if ((s->flags & SEC_LINKER_CREATED) == 0)
2683 continue;
2684
2685 if (s == htab->splt
2686 || s == htab->sgot
2687 || s == htab->sgotplt
2688 || s == htab->sdynbss)
2689 {
2690 /* Strip this section if we don't need it. */
2691 }
2692 else if (strncmp (s->name, ".rela", 5) == 0)
2693 {
2694 if (s->size != 0 && s != htab->srelplt)
2695 {
2696 if (!reltext_exist)
2697 {
2698 const char *name = s->name + 5;
2699 bfd *ibfd;
2700 for (ibfd = info->input_bfds; ibfd; ibfd = ibfd->link.next)
2701 if (bfd_get_flavour (ibfd) == bfd_target_elf_flavour
2702 && ibfd->flags & DYNAMIC)
2703 {
2704 asection *target = bfd_get_section_by_name (ibfd, name);
2705 if (target != NULL
2706 && elf_section_data (target)->sreloc == s
2707 && ((target->output_section->flags
2708 & (SEC_READONLY | SEC_ALLOC))
2709 == (SEC_READONLY | SEC_ALLOC)))
2710 {
2711 reltext_exist = TRUE;
2712 break;
2713 }
2714 }
2715 }
2716 relocs_exist = TRUE;
2717 }
2718
2719 /* We use the reloc_count field as a counter if we need to
2720 copy relocs into the output file. */
2721 s->reloc_count = 0;
2722 }
2723 else
2724 {
2725 /* It's not one of our sections, so don't allocate space. */
2726 continue;
2727 }
2728
2729 if (s->size == 0)
2730 {
2731 s->flags |= SEC_EXCLUDE;
2732 continue;
2733 }
2734
2735 if ((s->flags & SEC_HAS_CONTENTS) == 0)
2736 continue;
2737
2738 /* Allocate memory for the section contents. */
2739 s->contents = bfd_zalloc (dynobj, s->size);
2740 if (s->contents == NULL)
2741 return FALSE;
2742 }
2743
2744 if (htab->dynamic_sections_created)
2745 {
2746 /* TODO: Check if this is needed. */
2747 if (!bfd_link_pic (info))
2748 if (!_bfd_elf_add_dynamic_entry (info, DT_DEBUG, 0))
2749 return FALSE;
2750
2751 if (htab->splt && (htab->splt->flags & SEC_EXCLUDE) == 0)
2752 if (!_bfd_elf_add_dynamic_entry (info, DT_PLTGOT, 0)
2753 || !_bfd_elf_add_dynamic_entry (info, DT_PLTRELSZ, 0)
2754 || !_bfd_elf_add_dynamic_entry (info, DT_PLTREL, DT_RELA)
2755 || !_bfd_elf_add_dynamic_entry (info, DT_JMPREL, 0))
2756 return FALSE;
2757
2758 if (relocs_exist)
2759 if (!_bfd_elf_add_dynamic_entry (info, DT_RELA, 0)
2760 || !_bfd_elf_add_dynamic_entry (info, DT_RELASZ, 0)
2761 || !_bfd_elf_add_dynamic_entry (info, DT_RELAENT,
2762 sizeof (Elf32_External_Rela)))
2763 return FALSE;
2764
2765 if (reltext_exist)
2766 if (!_bfd_elf_add_dynamic_entry (info, DT_TEXTREL, 0))
2767 return FALSE;
2768 }
2769
2770 return TRUE;
2771 }
2772
2773
2774 /* Classify dynamic relocs such that -z combreloc can reorder and combine
2775 them. */
2776 static enum elf_reloc_type_class
2777 elf32_arc_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
2778 const asection *rel_sec ATTRIBUTE_UNUSED,
2779 const Elf_Internal_Rela *rela)
2780 {
2781 switch ((int) ELF32_R_TYPE (rela->r_info))
2782 {
2783 case R_ARC_RELATIVE:
2784 return reloc_class_relative;
2785 case R_ARC_JMP_SLOT:
2786 return reloc_class_plt;
2787 case R_ARC_COPY:
2788 return reloc_class_copy;
2789 /* TODO: Needed in future to support ifunc. */
2790 /*
2791 case R_ARC_IRELATIVE:
2792 return reloc_class_ifunc;
2793 */
2794 default:
2795 return reloc_class_normal;
2796 }
2797 }
2798
2799 const struct elf_size_info arc_elf32_size_info =
2800 {
2801 sizeof (Elf32_External_Ehdr),
2802 sizeof (Elf32_External_Phdr),
2803 sizeof (Elf32_External_Shdr),
2804 sizeof (Elf32_External_Rel),
2805 sizeof (Elf32_External_Rela),
2806 sizeof (Elf32_External_Sym),
2807 sizeof (Elf32_External_Dyn),
2808 sizeof (Elf_External_Note),
2809 4,
2810 1,
2811 32, 2,
2812 ELFCLASS32, EV_CURRENT,
2813 bfd_elf32_write_out_phdrs,
2814 bfd_elf32_write_shdrs_and_ehdr,
2815 bfd_elf32_checksum_contents,
2816 bfd_elf32_write_relocs,
2817 bfd_elf32_swap_symbol_in,
2818 bfd_elf32_swap_symbol_out,
2819 bfd_elf32_slurp_reloc_table,
2820 bfd_elf32_slurp_symbol_table,
2821 bfd_elf32_swap_dyn_in,
2822 bfd_elf32_swap_dyn_out,
2823 bfd_elf32_swap_reloc_in,
2824 bfd_elf32_swap_reloc_out,
2825 bfd_elf32_swap_reloca_in,
2826 bfd_elf32_swap_reloca_out
2827 };
2828
2829 #define elf_backend_size_info arc_elf32_size_info
2830
2831 /* GDB expects general purpose registers to be in section .reg. However Linux
2832 kernel doesn't create this section and instead writes registers to NOTE
2833 section. It is up to the binutils to create a pseudo-section .reg from the
2834 contents of NOTE. Also BFD will read pid and signal number from NOTE. This
2835 function relies on offsets inside elf_prstatus structure in Linux to be
2836 stable. */
2837
2838 static bfd_boolean
2839 elf32_arc_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
2840 {
2841 int offset;
2842 size_t size;
2843
2844 switch (note->descsz)
2845 {
2846 default:
2847 return FALSE;
2848
2849 case 236: /* sizeof (struct elf_prstatus) on Linux/arc. */
2850 /* pr_cursig */
2851 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
2852 /* pr_pid */
2853 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
2854 /* pr_regs */
2855 offset = 72;
2856 size = (40 * 4); /* There are 40 registers in user_regs_struct. */
2857 break;
2858 }
2859 /* Make a ".reg/999" section. */
2860 return _bfd_elfcore_make_pseudosection (abfd, ".reg", size,
2861 note->descpos + offset);
2862 }
2863
2864 /* Determine whether an object attribute tag takes an integer, a
2865 string or both. */
2866
2867 static int
2868 elf32_arc_obj_attrs_arg_type (int tag)
2869 {
2870 if (tag == Tag_ARC_CPU_name
2871 || tag == Tag_ARC_ISA_config
2872 || tag == Tag_ARC_ISA_apex)
2873 return ATTR_TYPE_FLAG_STR_VAL;
2874 else if (tag < (Tag_ARC_ISA_mpy_option + 1))
2875 return ATTR_TYPE_FLAG_INT_VAL;
2876 else
2877 return (tag & 1) != 0 ? ATTR_TYPE_FLAG_STR_VAL : ATTR_TYPE_FLAG_INT_VAL;
2878 }
2879
2880 /* Attribute numbers >=14 can be safely ignored. */
2881
2882 static bfd_boolean
2883 elf32_arc_obj_attrs_handle_unknown (bfd *abfd, int tag)
2884 {
2885 if ((tag & 127) < (Tag_ARC_ISA_mpy_option + 1))
2886 {
2887 _bfd_error_handler
2888 (_("%pB: unknown mandatory ARC object attribute %d"),
2889 abfd, tag);
2890 bfd_set_error (bfd_error_bad_value);
2891 return FALSE;
2892 }
2893 else
2894 {
2895 _bfd_error_handler
2896 (_("warning: %pB: unknown ARC object attribute %d"),
2897 abfd, tag);
2898 return TRUE;
2899 }
2900 }
2901
2902 /* Handle an ARC specific section when reading an object file. This is
2903 called when bfd_section_from_shdr finds a section with an unknown
2904 type. */
2905
2906 static bfd_boolean
2907 elf32_arc_section_from_shdr (bfd *abfd,
2908 Elf_Internal_Shdr * hdr,
2909 const char *name,
2910 int shindex)
2911 {
2912 switch (hdr->sh_type)
2913 {
2914 case 0x0c: /* MWDT specific section, don't complain about it. */
2915 case SHT_ARC_ATTRIBUTES:
2916 break;
2917
2918 default:
2919 return FALSE;
2920 }
2921
2922 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2923 return FALSE;
2924
2925 return TRUE;
2926 }
2927
2928 #define TARGET_LITTLE_SYM arc_elf32_le_vec
2929 #define TARGET_LITTLE_NAME "elf32-littlearc"
2930 #define TARGET_BIG_SYM arc_elf32_be_vec
2931 #define TARGET_BIG_NAME "elf32-bigarc"
2932 #define ELF_ARCH bfd_arch_arc
2933 #define ELF_TARGET_ID ARC_ELF_DATA
2934 #define ELF_MACHINE_CODE EM_ARC_COMPACT
2935 #define ELF_MACHINE_ALT1 EM_ARC_COMPACT2
2936 #define ELF_MAXPAGESIZE 0x2000
2937
2938 #define bfd_elf32_bfd_link_hash_table_create arc_elf_link_hash_table_create
2939
2940 #define bfd_elf32_bfd_merge_private_bfd_data arc_elf_merge_private_bfd_data
2941 #define bfd_elf32_bfd_reloc_type_lookup arc_elf32_bfd_reloc_type_lookup
2942 #define bfd_elf32_bfd_set_private_flags arc_elf_set_private_flags
2943 #define bfd_elf32_bfd_print_private_bfd_data arc_elf_print_private_bfd_data
2944 #define bfd_elf32_bfd_copy_private_bfd_data arc_elf_copy_private_bfd_data
2945
2946 #define elf_info_to_howto_rel arc_info_to_howto_rel
2947 #define elf_backend_object_p arc_elf_object_p
2948 #define elf_backend_final_write_processing arc_elf_final_write_processing
2949
2950 #define elf_backend_relocate_section elf_arc_relocate_section
2951 #define elf_backend_check_relocs elf_arc_check_relocs
2952 #define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
2953
2954 #define elf_backend_reloc_type_class elf32_arc_reloc_type_class
2955
2956 #define elf_backend_adjust_dynamic_symbol elf_arc_adjust_dynamic_symbol
2957 #define elf_backend_finish_dynamic_symbol elf_arc_finish_dynamic_symbol
2958
2959 #define elf_backend_finish_dynamic_sections elf_arc_finish_dynamic_sections
2960 #define elf_backend_size_dynamic_sections elf_arc_size_dynamic_sections
2961
2962 #define elf_backend_can_gc_sections 1
2963 #define elf_backend_want_got_plt 1
2964 #define elf_backend_plt_readonly 1
2965 #define elf_backend_rela_plts_and_copies_p 1
2966 #define elf_backend_want_plt_sym 0
2967 #define elf_backend_got_header_size 12
2968 #define elf_backend_dtrel_excludes_plt 1
2969
2970 #define elf_backend_may_use_rel_p 0
2971 #define elf_backend_may_use_rela_p 1
2972 #define elf_backend_default_use_rela_p 1
2973
2974 #define elf_backend_grok_prstatus elf32_arc_grok_prstatus
2975
2976 #define elf_backend_default_execstack 0
2977
2978 #undef elf_backend_obj_attrs_vendor
2979 #define elf_backend_obj_attrs_vendor "ARC"
2980 #undef elf_backend_obj_attrs_section
2981 #define elf_backend_obj_attrs_section ".ARC.attributes"
2982 #undef elf_backend_obj_attrs_arg_type
2983 #define elf_backend_obj_attrs_arg_type elf32_arc_obj_attrs_arg_type
2984 #undef elf_backend_obj_attrs_section_type
2985 #define elf_backend_obj_attrs_section_type SHT_ARC_ATTRIBUTES
2986 #define elf_backend_obj_attrs_handle_unknown elf32_arc_obj_attrs_handle_unknown
2987
2988 #define elf_backend_section_from_shdr elf32_arc_section_from_shdr
2989
2990 #include "elf32-target.h"
This page took 0.087266 seconds and 5 git commands to generate.