%L conversions
[deliverable/binutils-gdb.git] / bfd / elf32-metag.c
1 /* Meta support for 32-bit ELF
2 Copyright (C) 2013-2018 Free Software Foundation, Inc.
3 Contributed by Imagination Technologies Ltd.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "libbfd.h"
25 #include "elf-bfd.h"
26 #include "elf32-metag.h"
27 #include "elf/metag.h"
28
29 #define GOT_ENTRY_SIZE 4
30 #define ELF_DYNAMIC_INTERPRETER "/lib/ld-uClibc.so.0"
31
32 /* ABI version:
33 0 - original
34 1 - with GOT offset */
35 #define METAG_ELF_ABI_VERSION 1
36
37 static const unsigned int plt0_entry[] =
38 {
39 0x02000005, /* MOVT D0Re0, #HI(GOT+4) */
40 0x02000000, /* ADD D0Re0, D0Re0, #LO(GOT+4) */
41 0xb70001e3, /* SETL [A0StP++], D0Re0, D1Re0 */
42 0xc600012a, /* GETD PC, [D0Re0+#4] */
43 0xa0fffffe /* NOP */
44 };
45
46 static const unsigned int plt0_pic_entry[] =
47 {
48 0x82900001, /* ADDT A0.2, CPC0, #0 */
49 0x82100000, /* ADD A0.2, A0.2, #0 */
50 0xa3100c20, /* MOV D0Re0, A0.2 */
51 0xb70001e3, /* SETL [A0StP++], D0Re0, D1Re0 */
52 0xc600012a, /* GETD PC, [D0Re0+#4] */
53 };
54
55 static const unsigned int plt_entry[] =
56 {
57 0x82100005, /* MOVT A0.2, #HI(GOT+off) */
58 0x82100000, /* ADD A0.2, A0.2, #LO(GOT+off) */
59 0xc600806a, /* GETD PC, [A0.2] */
60 0x03000004, /* MOV D1Re0, #LO(offset) */
61 0xa0000000 /* B PLT0 */
62 };
63
64 static const unsigned int plt_pic_entry[] =
65 {
66 0x82900001, /* ADDT A0.2, CPC0, #HI(GOT+off) */
67 0x82100000, /* ADD A0.2, A0.2, #LO(GOT+off) */
68 0xc600806a, /* GETD PC, [A0.2] */
69 0x03000004, /* MOV D1Re0, #LO(offset) */
70 0xa0000000 /* B PLT0 */
71 };
72
73 /* Variable names follow a coding style.
74 Please follow this (Apps Hungarian) style:
75
76 Structure/Variable Prefix
77 elf_link_hash_table "etab"
78 elf_link_hash_entry "eh"
79
80 elf_metag_link_hash_table "htab"
81 elf_metag_link_hash_entry "hh"
82
83 bfd_link_hash_table "btab"
84 bfd_link_hash_entry "bh"
85
86 bfd_hash_table containing stubs "bstab"
87 elf_metag_stub_hash_entry "hsh"
88
89 Always remember to use GNU Coding Style. */
90
91 #define PLT_ENTRY_SIZE sizeof(plt_entry)
92
93 static reloc_howto_type elf_metag_howto_table[] =
94 {
95 /* High order 16 bit absolute. */
96 HOWTO (R_METAG_HIADDR16, /* type */
97 16, /* rightshift */
98 2, /* size (0 = byte, 1 = short, 2 = long) */
99 16, /* bitsize */
100 FALSE, /* pc_relative */
101 3, /* bitpos */
102 complain_overflow_dont, /* complain_on_overflow */
103 bfd_elf_generic_reloc, /* special_function */
104 "R_METAG_HIADDR16", /* name */
105 FALSE, /* partial_inplace */
106 0, /* src_mask */
107 0x0007fff8, /* dst_mask */
108 FALSE), /* pcrel_offset */
109
110 /* Low order 16 bit absolute. */
111 HOWTO (R_METAG_LOADDR16, /* type */
112 0, /* rightshift */
113 2, /* size (0 = byte, 1 = short, 2 = long) */
114 16, /* bitsize */
115 FALSE, /* pc_relative */
116 3, /* bitpos */
117 complain_overflow_dont,/* complain_on_overflow */
118 bfd_elf_generic_reloc, /* special_function */
119 "R_METAG_LOADDR16", /* name */
120 FALSE, /* partial_inplace */
121 0, /* src_mask */
122 0x0007fff8, /* dst_mask */
123 FALSE), /* pcrel_offset */
124
125 /* 32 bit absolute. */
126 HOWTO (R_METAG_ADDR32, /* type */
127 0, /* rightshift */
128 2, /* size (0 = byte, 1 = short, 2 = long) */
129 32, /* bitsize */
130 FALSE, /* pc_relative */
131 0, /* bitpos */
132 complain_overflow_bitfield, /* complain_on_overflow */
133 bfd_elf_generic_reloc, /* special_function */
134 "R_METAG_ADDR32", /* name */
135 FALSE, /* partial_inplace */
136 0x00000000, /* src_mask */
137 0xffffffff, /* dst_mask */
138 FALSE), /* pcrel_offset */
139
140 /* No relocation. */
141 HOWTO (R_METAG_NONE, /* type */
142 0, /* rightshift */
143 3, /* size (0 = byte, 1 = short, 2 = long) */
144 0, /* bitsize */
145 FALSE, /* pc_relative */
146 0, /* bitpos */
147 complain_overflow_dont, /* complain_on_overflow */
148 bfd_elf_generic_reloc, /* special_function */
149 "R_METAG_NONE", /* name */
150 FALSE, /* partial_inplace */
151 0, /* src_mask */
152 0, /* dst_mask */
153 FALSE), /* pcrel_offset */
154
155 /* 19 bit pc relative */
156 HOWTO (R_METAG_RELBRANCH, /* type */
157 2, /* rightshift */
158 2, /* size (0 = byte, 1 = short, 2 = long) */
159 19, /* bitsize */
160 TRUE, /* pc_relative */
161 5, /* bitpos */
162 complain_overflow_signed, /* complain_on_overflow */
163 bfd_elf_generic_reloc, /* special_function */
164 "R_METAG_RELBRANCH", /* name */
165 FALSE, /* partial_inplace */
166 0, /* src_mask */
167 0x00ffffe0, /* dst_mask */
168 FALSE), /* pcrel_offset */
169
170 /* GET/SET offset */
171 HOWTO (R_METAG_GETSETOFF, /* type */
172 0, /* rightshift */
173 1, /* size (0 = byte, 1 = short, 2 = long) */
174 12, /* bitsize */
175 FALSE, /* pc_relative */
176 7, /* bitpos */
177 complain_overflow_dont, /* complain_on_overflow */
178 bfd_elf_generic_reloc, /* special_function */
179 "R_METAG_GETSETOFF", /* name */
180 FALSE, /* partial_inplace */
181 0, /* src_mask */
182 0, /* dst_mask */
183 FALSE), /* pcrel_offset */
184
185 EMPTY_HOWTO (6),
186 EMPTY_HOWTO (7),
187 EMPTY_HOWTO (8),
188 EMPTY_HOWTO (9),
189 EMPTY_HOWTO (10),
190 EMPTY_HOWTO (11),
191 EMPTY_HOWTO (12),
192 EMPTY_HOWTO (13),
193 EMPTY_HOWTO (14),
194 EMPTY_HOWTO (15),
195 EMPTY_HOWTO (16),
196 EMPTY_HOWTO (17),
197 EMPTY_HOWTO (18),
198 EMPTY_HOWTO (19),
199 EMPTY_HOWTO (20),
200 EMPTY_HOWTO (21),
201 EMPTY_HOWTO (22),
202 EMPTY_HOWTO (23),
203 EMPTY_HOWTO (24),
204 EMPTY_HOWTO (25),
205 EMPTY_HOWTO (26),
206 EMPTY_HOWTO (27),
207 EMPTY_HOWTO (28),
208 EMPTY_HOWTO (29),
209
210 HOWTO (R_METAG_GNU_VTINHERIT, /* type */
211 0, /* rightshift */
212 2, /* size (0 = byte, 1 = short, 2 = long) */
213 0, /* bitsize */
214 FALSE, /* pc_relative */
215 0, /* bitpos */
216 complain_overflow_dont, /* complain_on_overflow */
217 NULL, /* special_function */
218 "R_METAG_GNU_VTINHERIT", /* name */
219 FALSE, /* partial_inplace */
220 0, /* src_mask */
221 0, /* dst_mask */
222 FALSE), /* pcrel_offset */
223
224 HOWTO (R_METAG_GNU_VTENTRY, /* type */
225 0, /* rightshift */
226 2, /* size (0 = byte, 1 = short, 2 = long) */
227 0, /* bitsize */
228 FALSE, /* pc_relative */
229 0, /* bitpos */
230 complain_overflow_dont, /* complain_on_overflow */
231 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
232 "R_METAG_GNU_VTENTRY", /* name */
233 FALSE, /* partial_inplace */
234 0, /* src_mask */
235 0, /* dst_mask */
236 FALSE), /* pcrel_offset */
237
238 /* High order 16 bit GOT offset */
239 HOWTO (R_METAG_HI16_GOTOFF, /* type */
240 16, /* rightshift */
241 2, /* size (0 = byte, 1 = short, 2 = long) */
242 16, /* bitsize */
243 FALSE, /* pc_relative */
244 3, /* bitpos */
245 complain_overflow_dont, /* complain_on_overflow */
246 bfd_elf_generic_reloc, /* special_function */
247 "R_METAG_HI16_GOTOFF", /* name */
248 FALSE, /* partial_inplace */
249 0, /* src_mask */
250 0x0007fff8, /* dst_mask */
251 FALSE), /* pcrel_offset */
252
253 /* Low order 16 bit GOT offset */
254 HOWTO (R_METAG_LO16_GOTOFF, /* type */
255 0, /* rightshift */
256 2, /* size (0 = byte, 1 = short, 2 = long) */
257 16, /* bitsize */
258 FALSE, /* pc_relative */
259 3, /* bitpos */
260 complain_overflow_dont, /* complain_on_overflow */
261 bfd_elf_generic_reloc, /* special_function */
262 "R_METAG_LO16_GOTOFF", /* name */
263 FALSE, /* partial_inplace */
264 0, /* src_mask */
265 0x0007fff8, /* dst_mask */
266 FALSE), /* pcrel_offset */
267
268 /* GET/SET GOT offset */
269 HOWTO (R_METAG_GETSET_GOTOFF, /* type */
270 0, /* rightshift */
271 1, /* size (0 = byte, 1 = short, 2 = long) */
272 12, /* bitsize */
273 FALSE, /* pc_relative */
274 7, /* bitpos */
275 complain_overflow_dont, /* complain_on_overflow */
276 bfd_elf_generic_reloc, /* special_function */
277 "R_METAG_GETSET_GOTOFF", /* name */
278 FALSE, /* partial_inplace */
279 0, /* src_mask */
280 0, /* dst_mask */
281 FALSE), /* pcrel_offset */
282
283 /* GET/SET GOT relative */
284 HOWTO (R_METAG_GETSET_GOT, /* type */
285 0, /* rightshift */
286 1, /* size (0 = byte, 1 = short, 2 = long) */
287 12, /* bitsize */
288 FALSE, /* pc_relative */
289 7, /* bitpos */
290 complain_overflow_dont, /* complain_on_overflow */
291 bfd_elf_generic_reloc, /* special_function */
292 "R_METAG_GETSET_GOT", /* name */
293 FALSE, /* partial_inplace */
294 0, /* src_mask */
295 0, /* dst_mask */
296 FALSE), /* pcrel_offset */
297
298 /* High order 16 bit GOT reference */
299 HOWTO (R_METAG_HI16_GOTPC, /* type */
300 16, /* rightshift */
301 2, /* size (0 = byte, 1 = short, 2 = long) */
302 16, /* bitsize */
303 FALSE, /* pc_relative */
304 3, /* bitpos */
305 complain_overflow_dont, /* complain_on_overflow */
306 bfd_elf_generic_reloc, /* special_function */
307 "R_METAG_HI16_GOTPC", /* name */
308 FALSE, /* partial_inplace */
309 0, /* src_mask */
310 0x0007fff8, /* dst_mask */
311 FALSE), /* pcrel_offset */
312
313 /* Low order 16 bit GOT reference */
314 HOWTO (R_METAG_LO16_GOTPC, /* type */
315 0, /* rightshift */
316 2, /* size (0 = byte, 1 = short, 2 = long) */
317 16, /* bitsize */
318 FALSE, /* pc_relative */
319 3, /* bitpos */
320 complain_overflow_dont, /* complain_on_overflow */
321 bfd_elf_generic_reloc, /* special_function */
322 "R_METAG_LO16_GOTPC", /* name */
323 FALSE, /* partial_inplace */
324 0, /* src_mask */
325 0x0007fff8, /* dst_mask */
326 FALSE), /* pcrel_offset */
327
328 /* High order 16 bit PLT */
329 HOWTO (R_METAG_HI16_PLT, /* type */
330 16, /* rightshift */
331 2, /* size (0 = byte, 1 = short, 2 = long) */
332 16, /* bitsize */
333 FALSE, /* pc_relative */
334 3, /* bitpos */
335 complain_overflow_dont, /* complain_on_overflow */
336 bfd_elf_generic_reloc, /* special_function */
337 "R_METAG_HI16_PLT", /* name */
338 FALSE, /* partial_inplace */
339 0, /* src_mask */
340 0x0007fff8, /* dst_mask */
341 FALSE), /* pcrel_offset */
342
343 /* Low order 16 bit PLT */
344 HOWTO (R_METAG_LO16_PLT, /* type */
345 0, /* rightshift */
346 2, /* size (0 = byte, 1 = short, 2 = long) */
347 16, /* bitsize */
348 FALSE, /* pc_relative */
349 3, /* bitpos */
350 complain_overflow_dont, /* complain_on_overflow */
351 bfd_elf_generic_reloc, /* special_function */
352 "R_METAG_LO16_PLT", /* name */
353 FALSE, /* partial_inplace */
354 0, /* src_mask */
355 0xffffffff, /* dst_mask */
356 FALSE), /* pcrel_offset */
357
358 HOWTO (R_METAG_RELBRANCH_PLT, /* type */
359 2, /* rightshift */
360 2, /* size (0 = byte, 1 = short, 2 = long) */
361 19, /* bitsize */
362 TRUE, /* pc_relative */
363 5, /* bitpos */
364 complain_overflow_signed, /* complain_on_overflow */
365 bfd_elf_generic_reloc, /* special_function */
366 "R_METAG_RELBRANCH_PLT", /* name */
367 FALSE, /* partial_inplace */
368 0, /* src_mask */
369 0x00ffffe0, /* dst_mask */
370 FALSE), /* pcrel_offset */
371
372 /* Dummy relocs used by the linker internally. */
373 HOWTO (R_METAG_GOTOFF, /* type */
374 0, /* rightshift */
375 2, /* size (0 = byte, 1 = short, 2 = long) */
376 32, /* bitsize */
377 FALSE, /* pc_relative */
378 0, /* bitpos */
379 complain_overflow_bitfield, /* complain_on_overflow */
380 bfd_elf_generic_reloc, /* special_function */
381 "R_METAG_GOTOFF", /* name */
382 FALSE, /* partial_inplace */
383 0xffffffff, /* src_mask */
384 0xffffffff, /* dst_mask */
385 FALSE), /* pcrel_offset */
386
387 HOWTO (R_METAG_PLT, /* type */
388 0, /* rightshift */
389 2, /* size (0 = byte, 1 = short, 2 = long) */
390 32, /* bitsize */
391 FALSE, /* pc_relative */
392 0, /* bitpos */
393 complain_overflow_bitfield, /* complain_on_overflow */
394 bfd_elf_generic_reloc, /* special_function */
395 "R_METAG_GOTOFF", /* name */
396 FALSE, /* partial_inplace */
397 0xffffffff, /* src_mask */
398 0xffffffff, /* dst_mask */
399 FALSE), /* pcrel_offset */
400
401 /* This is used only by the dynamic linker. The symbol should exist
402 both in the object being run and in some shared library. The
403 dynamic linker copies the data addressed by the symbol from the
404 shared library into the object, because the object being
405 run has to have the data at some particular address. */
406 HOWTO (R_METAG_COPY, /* type */
407 0, /* rightshift */
408 2, /* size (0 = byte, 1 = short, 2 = long) */
409 32, /* bitsize */
410 FALSE, /* pc_relative */
411 0, /* bitpos */
412 complain_overflow_bitfield, /* complain_on_overflow */
413 bfd_elf_generic_reloc, /* special_function */
414 "R_METAG_COPY", /* name */
415 FALSE, /* partial_inplace */
416 0xffffffff, /* src_mask */
417 0xffffffff, /* dst_mask */
418 FALSE), /* pcrel_offset */
419
420 /* Marks a procedure linkage table entry for a symbol. */
421 HOWTO (R_METAG_JMP_SLOT, /* type */
422 0, /* rightshift */
423 2, /* size (0 = byte, 1 = short, 2 = long) */
424 32, /* bitsize */
425 FALSE, /* pc_relative */
426 0, /* bitpos */
427 complain_overflow_bitfield, /* complain_on_overflow */
428 bfd_elf_generic_reloc, /* special_function */
429 "R_METAG_JMP_SLOT", /* name */
430 FALSE, /* partial_inplace */
431 0xffffffff, /* src_mask */
432 0xffffffff, /* dst_mask */
433 FALSE), /* pcrel_offset */
434
435 /* Used only by the dynamic linker. When the object is run, this
436 longword is set to the load address of the object, plus the
437 addend. */
438 HOWTO (R_METAG_RELATIVE, /* type */
439 0, /* rightshift */
440 2, /* size (0 = byte, 1 = short, 2 = long) */
441 32, /* bitsize */
442 FALSE, /* pc_relative */
443 0, /* bitpos */
444 complain_overflow_bitfield, /* complain_on_overflow */
445 bfd_elf_generic_reloc, /* special_function */
446 "R_METAG_RELATIVE", /* name */
447 FALSE, /* partial_inplace */
448 0xffffffff, /* src_mask */
449 0xffffffff, /* dst_mask */
450 FALSE), /* pcrel_offset */
451
452 HOWTO (R_METAG_GLOB_DAT, /* type */
453 0, /* rightshift */
454 2, /* size (0 = byte, 1 = short, 2 = long) */
455 32, /* bitsize */
456 FALSE, /* pc_relative */
457 0, /* bitpos */
458 complain_overflow_bitfield, /* complain_on_overflow */
459 bfd_elf_generic_reloc, /* special_function */
460 "R_METAG_GLOB_DAT", /* name */
461 FALSE, /* partial_inplace */
462 0xffffffff, /* src_mask */
463 0xffffffff, /* dst_mask */
464 FALSE), /* pcrel_offset */
465
466 HOWTO (R_METAG_TLS_GD, /* type */
467 0, /* rightshift */
468 2, /* size (0 = byte, 1 = short, 2 = long) */
469 16, /* bitsize */
470 FALSE, /* pc_relative */
471 3, /* bitpos */
472 complain_overflow_dont, /* complain_on_overflow */
473 bfd_elf_generic_reloc, /* special_function */
474 "R_METAG_TLS_GD", /* name */
475 FALSE, /* partial_inplace */
476 0, /* src_mask */
477 0x0007fff8, /* dst_mask */
478 FALSE), /* pcrel_offset */
479
480 HOWTO (R_METAG_TLS_LDM, /* type */
481 0, /* rightshift */
482 2, /* size (0 = byte, 1 = short, 2 = long) */
483 16, /* bitsize */
484 FALSE, /* pc_relative */
485 3, /* bitpos */
486 complain_overflow_bitfield, /* complain_on_overflow */
487 bfd_elf_generic_reloc, /* special_function */
488 "R_METAG_TLS_LDM", /* name */
489 FALSE, /* partial_inplace */
490 0, /* src_mask */
491 0x0007fff8, /* dst_mask */
492 FALSE), /* pcrel_offset */
493
494 HOWTO (R_METAG_TLS_LDO_HI16, /* type */
495 16, /* rightshift */
496 2, /* size (0 = byte, 1 = short, 2 = long) */
497 16, /* bitsize */
498 FALSE, /* pc_relative */
499 3, /* bitpos */
500 complain_overflow_bitfield, /* complain_on_overflow */
501 bfd_elf_generic_reloc, /* special_function */
502 "R_METAG_TLS_LDO_HI16", /* name */
503 FALSE, /* partial_inplace */
504 0, /* src_mask */
505 0x0007fff8, /* dst_mask */
506 FALSE), /* pcrel_offset */
507
508 HOWTO (R_METAG_TLS_LDO_LO16, /* type */
509 0, /* rightshift */
510 2, /* size (0 = byte, 1 = short, 2 = long) */
511 16, /* bitsize */
512 FALSE, /* pc_relative */
513 3, /* bitpos */
514 complain_overflow_bitfield, /* complain_on_overflow */
515 bfd_elf_generic_reloc, /* special_function */
516 "R_METAG_TLS_LDO_LO16", /* name */
517 FALSE, /* partial_inplace */
518 0, /* src_mask */
519 0x0007fff8, /* dst_mask */
520 FALSE), /* pcrel_offset */
521
522 /* Dummy reloc used by the linker internally. */
523 HOWTO (R_METAG_TLS_LDO, /* type */
524 0, /* rightshift */
525 2, /* size (0 = byte, 1 = short, 2 = long) */
526 16, /* bitsize */
527 FALSE, /* pc_relative */
528 3, /* bitpos */
529 complain_overflow_bitfield, /* complain_on_overflow */
530 bfd_elf_generic_reloc, /* special_function */
531 "R_METAG_TLS_LDO", /* name */
532 FALSE, /* partial_inplace */
533 0, /* src_mask */
534 0x0007fff8, /* dst_mask */
535 FALSE), /* pcrel_offset */
536
537 HOWTO (R_METAG_TLS_IE, /* type */
538 2, /* rightshift */
539 2, /* size (0 = byte, 1 = short, 2 = long) */
540 12, /* bitsize */
541 FALSE, /* pc_relative */
542 7, /* bitpos */
543 complain_overflow_dont, /* complain_on_overflow */
544 bfd_elf_generic_reloc, /* special_function */
545 "R_METAG_TLS_IE", /* name */
546 FALSE, /* partial_inplace */
547 0, /* src_mask */
548 0x0007ff80, /* dst_mask */
549 FALSE), /* pcrel_offset */
550
551 /* Dummy reloc used by the linker internally. */
552 HOWTO (R_METAG_TLS_IENONPIC, /* type */
553 0, /* rightshift */
554 2, /* size (0 = byte, 1 = short, 2 = long) */
555 16, /* bitsize */
556 FALSE, /* pc_relative */
557 3, /* bitpos */
558 complain_overflow_dont, /* complain_on_overflow */
559 bfd_elf_generic_reloc, /* special_function */
560 "R_METAG_TLS_IENONPIC", /* name */
561 FALSE, /* partial_inplace */
562 0, /* src_mask */
563 0x0007fff8, /* dst_mask */
564 FALSE), /* pcrel_offset */
565
566 HOWTO (R_METAG_TLS_IENONPIC_HI16,/* type */
567 16, /* rightshift */
568 2, /* size (0 = byte, 1 = short, 2 = long) */
569 16, /* bitsize */
570 FALSE, /* pc_relative */
571 3, /* bitpos */
572 complain_overflow_dont, /* complain_on_overflow */
573 bfd_elf_generic_reloc, /* special_function */
574 "R_METAG_TLS_IENONPIC_HI16", /* name */
575 FALSE, /* partial_inplace */
576 0, /* src_mask */
577 0x0007fff8, /* dst_mask */
578 FALSE), /* pcrel_offset */
579
580 HOWTO (R_METAG_TLS_IENONPIC_LO16,/* type */
581 0, /* rightshift */
582 2, /* size (0 = byte, 1 = short, 2 = long) */
583 16, /* bitsize */
584 FALSE, /* pc_relative */
585 3, /* bitpos */
586 complain_overflow_dont, /* complain_on_overflow */
587 bfd_elf_generic_reloc, /* special_function */
588 "R_METAG_TLS_IENONPIC_LO16", /* name */
589 FALSE, /* partial_inplace */
590 0, /* src_mask */
591 0x0007fff8, /* dst_mask */
592 FALSE), /* pcrel_offset */
593
594 HOWTO (R_METAG_TLS_TPOFF, /* type */
595 0, /* rightshift */
596 2, /* size (0 = byte, 1 = short, 2 = long) */
597 32, /* bitsize */
598 FALSE, /* pc_relative */
599 0, /* bitpos */
600 complain_overflow_bitfield, /* complain_on_overflow */
601 bfd_elf_generic_reloc, /* special_function */
602 "R_METAG_TLS_TPOFF", /* name */
603 FALSE, /* partial_inplace */
604 0, /* src_mask */
605 0xffffffff, /* dst_mask */
606 FALSE), /* pcrel_offset */
607
608 HOWTO (R_METAG_TLS_DTPMOD, /* type */
609 0, /* rightshift */
610 2, /* size (0 = byte, 1 = short, 2 = long) */
611 32, /* bitsize */
612 FALSE, /* pc_relative */
613 0, /* bitpos */
614 complain_overflow_bitfield, /* complain_on_overflow */
615 bfd_elf_generic_reloc, /* special_function */
616 "R_METAG_TLS_DTPMOD", /* name */
617 FALSE, /* partial_inplace */
618 0, /* src_mask */
619 0xffffffff, /* dst_mask */
620 FALSE), /* pcrel_offset */
621
622 HOWTO (R_METAG_TLS_DTPOFF, /* type */
623 0, /* rightshift */
624 2, /* size (0 = byte, 1 = short, 2 = long) */
625 32, /* bitsize */
626 FALSE, /* pc_relative */
627 0, /* bitpos */
628 complain_overflow_bitfield, /* complain_on_overflow */
629 bfd_elf_generic_reloc, /* special_function */
630 "R_METAG_TLS_DTPOFF", /* name */
631 FALSE, /* partial_inplace */
632 0, /* src_mask */
633 0xffffffff, /* dst_mask */
634 FALSE), /* pcrel_offset */
635
636 /* Dummy reloc used by the linker internally. */
637 HOWTO (R_METAG_TLS_LE, /* type */
638 0, /* rightshift */
639 2, /* size (0 = byte, 1 = short, 2 = long) */
640 32, /* bitsize */
641 FALSE, /* pc_relative */
642 0, /* bitpos */
643 complain_overflow_bitfield, /* complain_on_overflow */
644 bfd_elf_generic_reloc, /* special_function */
645 "R_METAG_TLS_LE", /* name */
646 FALSE, /* partial_inplace */
647 0, /* src_mask */
648 0xffffffff, /* dst_mask */
649 FALSE), /* pcrel_offset */
650
651 HOWTO (R_METAG_TLS_LE_HI16, /* type */
652 16, /* rightshift */
653 2, /* size (0 = byte, 1 = short, 2 = long) */
654 16, /* bitsize */
655 FALSE, /* pc_relative */
656 3, /* bitpos */
657 complain_overflow_dont, /* complain_on_overflow */
658 bfd_elf_generic_reloc, /* special_function */
659 "R_METAG_TLS_LE_HI16", /* name */
660 FALSE, /* partial_inplace */
661 0, /* src_mask */
662 0x0007fff8, /* dst_mask */
663 FALSE), /* pcrel_offset */
664
665 HOWTO (R_METAG_TLS_LE_LO16, /* type */
666 0, /* rightshift */
667 2, /* size (0 = byte, 1 = short, 2 = long) */
668 16, /* bitsize */
669 FALSE, /* pc_relative */
670 3, /* bitpos */
671 complain_overflow_dont, /* complain_on_overflow */
672 bfd_elf_generic_reloc, /* special_function */
673 "R_METAG_TLS_LE_LO16", /* name */
674 FALSE, /* partial_inplace */
675 0, /* src_mask */
676 0x0007fff8, /* dst_mask */
677 FALSE), /* pcrel_offset */
678
679 };
680
681 #define BRANCH_BITS 19
682
683 /* The GOT is typically accessed using a [GS]ETD instruction. The size of the
684 immediate offset which can be used in such instructions therefore limits
685 the usable size of the GOT. If the base register for the [GS]ETD (A1LbP)
686 is pointing to the base of the GOT then the size is limited to the maximum
687 11 bits unsigned dword offset, or 2^13 = 0x2000 bytes. However the offset
688 in a [GS]ETD instruction is signed, so by setting the base address register
689 to an offset of that 0x2000 byte maximum unsigned offset from the base of
690 the GOT we can use negative offsets in addition to positive. This
691 effectively doubles the usable GOT size to 0x4000 bytes. */
692 #define GOT_REG_OFFSET 0x2000
693
694 struct metag_reloc_map
695 {
696 bfd_reloc_code_real_type bfd_reloc_val;
697 unsigned int metag_reloc_val;
698 };
699
700 static const struct metag_reloc_map metag_reloc_map [] =
701 {
702 { BFD_RELOC_NONE, R_METAG_NONE },
703 { BFD_RELOC_32, R_METAG_ADDR32 },
704 { BFD_RELOC_METAG_HIADDR16, R_METAG_HIADDR16 },
705 { BFD_RELOC_METAG_LOADDR16, R_METAG_LOADDR16 },
706 { BFD_RELOC_METAG_RELBRANCH, R_METAG_RELBRANCH },
707 { BFD_RELOC_METAG_GETSETOFF, R_METAG_GETSETOFF },
708 { BFD_RELOC_VTABLE_INHERIT, R_METAG_GNU_VTINHERIT },
709 { BFD_RELOC_VTABLE_ENTRY, R_METAG_GNU_VTENTRY },
710 { BFD_RELOC_METAG_REL8, R_METAG_REL8 },
711 { BFD_RELOC_METAG_REL16, R_METAG_REL16 },
712 { BFD_RELOC_METAG_HI16_GOTOFF, R_METAG_HI16_GOTOFF },
713 { BFD_RELOC_METAG_LO16_GOTOFF, R_METAG_LO16_GOTOFF },
714 { BFD_RELOC_METAG_GETSET_GOTOFF, R_METAG_GETSET_GOTOFF },
715 { BFD_RELOC_METAG_GETSET_GOT, R_METAG_GETSET_GOT },
716 { BFD_RELOC_METAG_HI16_GOTPC, R_METAG_HI16_GOTPC },
717 { BFD_RELOC_METAG_LO16_GOTPC, R_METAG_LO16_GOTPC },
718 { BFD_RELOC_METAG_HI16_PLT, R_METAG_HI16_PLT },
719 { BFD_RELOC_METAG_LO16_PLT, R_METAG_LO16_PLT },
720 { BFD_RELOC_METAG_RELBRANCH_PLT, R_METAG_RELBRANCH_PLT },
721 { BFD_RELOC_METAG_GOTOFF, R_METAG_GOTOFF },
722 { BFD_RELOC_METAG_PLT, R_METAG_PLT },
723 { BFD_RELOC_METAG_COPY, R_METAG_COPY },
724 { BFD_RELOC_METAG_JMP_SLOT, R_METAG_JMP_SLOT },
725 { BFD_RELOC_METAG_RELATIVE, R_METAG_RELATIVE },
726 { BFD_RELOC_METAG_GLOB_DAT, R_METAG_GLOB_DAT },
727 { BFD_RELOC_METAG_TLS_GD, R_METAG_TLS_GD },
728 { BFD_RELOC_METAG_TLS_LDM, R_METAG_TLS_LDM },
729 { BFD_RELOC_METAG_TLS_LDO_HI16, R_METAG_TLS_LDO_HI16 },
730 { BFD_RELOC_METAG_TLS_LDO_LO16, R_METAG_TLS_LDO_LO16 },
731 { BFD_RELOC_METAG_TLS_LDO, R_METAG_TLS_LDO },
732 { BFD_RELOC_METAG_TLS_IE, R_METAG_TLS_IE },
733 { BFD_RELOC_METAG_TLS_IENONPIC, R_METAG_TLS_IENONPIC },
734 { BFD_RELOC_METAG_TLS_IENONPIC_HI16, R_METAG_TLS_IENONPIC_HI16 },
735 { BFD_RELOC_METAG_TLS_IENONPIC_LO16, R_METAG_TLS_IENONPIC_LO16 },
736 { BFD_RELOC_METAG_TLS_TPOFF, R_METAG_TLS_TPOFF },
737 { BFD_RELOC_METAG_TLS_DTPMOD, R_METAG_TLS_DTPMOD },
738 { BFD_RELOC_METAG_TLS_DTPOFF, R_METAG_TLS_DTPOFF },
739 { BFD_RELOC_METAG_TLS_LE, R_METAG_TLS_LE },
740 { BFD_RELOC_METAG_TLS_LE_HI16, R_METAG_TLS_LE_HI16 },
741 { BFD_RELOC_METAG_TLS_LE_LO16, R_METAG_TLS_LE_LO16 },
742 };
743
744 enum elf_metag_stub_type
745 {
746 metag_stub_long_branch,
747 metag_stub_long_branch_shared,
748 metag_stub_none
749 };
750
751 struct elf_metag_stub_hash_entry
752 {
753 /* Base hash table entry structure. */
754 struct bfd_hash_entry bh_root;
755
756 /* The stub section. */
757 asection *stub_sec;
758
759 /* Offset within stub_sec of the beginning of this stub. */
760 bfd_vma stub_offset;
761
762 /* Given the symbol's value and its section we can determine its final
763 value when building the stubs (so the stub knows where to jump. */
764 bfd_vma target_value;
765 asection *target_section;
766
767 enum elf_metag_stub_type stub_type;
768
769 /* The symbol table entry, if any, that this was derived from. */
770 struct elf_metag_link_hash_entry *hh;
771
772 /* And the reloc addend that this was derived from. */
773 bfd_vma addend;
774
775 /* Where this stub is being called from, or, in the case of combined
776 stub sections, the first input section in the group. */
777 asection *id_sec;
778 };
779
780 struct elf_metag_link_hash_entry
781 {
782 struct elf_link_hash_entry eh;
783
784 /* A pointer to the most recently used stub hash entry against this
785 symbol. */
786 struct elf_metag_stub_hash_entry *hsh_cache;
787
788 /* Used to count relocations for delayed sizing of relocation
789 sections. */
790 struct elf_dyn_relocs *dyn_relocs;
791
792 enum
793 {
794 GOT_UNKNOWN = 0, GOT_NORMAL = 1, GOT_TLS_IE = 2, GOT_TLS_LDM = 4, GOT_TLS_GD = 8
795 } tls_type;
796 };
797
798 struct elf_metag_link_hash_table
799 {
800 /* The main hash table. */
801 struct elf_link_hash_table etab;
802
803 /* The stub hash table. */
804 struct bfd_hash_table bstab;
805
806 /* Linker stub bfd. */
807 bfd *stub_bfd;
808
809 /* Linker call-backs. */
810 asection * (*add_stub_section) (const char *, asection *);
811 void (*layout_sections_again) (void);
812
813 /* Array to keep track of which stub sections have been created, and
814 information on stub grouping. */
815 struct map_stub
816 {
817 /* This is the section to which stubs in the group will be
818 attached. */
819 asection *link_sec;
820 /* The stub section. */
821 asection *stub_sec;
822 } *stub_group;
823
824 /* Assorted information used by elf_metag_size_stubs. */
825 unsigned int bfd_count;
826 unsigned int top_index;
827 asection **input_list;
828 Elf_Internal_Sym **all_local_syms;
829
830 /* Small local sym cache. */
831 struct sym_cache sym_cache;
832
833 /* Data for LDM relocations. */
834 union
835 {
836 bfd_signed_vma refcount;
837 bfd_vma offset;
838 } tls_ldm_got;
839 };
840
841 /* Return the base vma address which should be subtracted from the
842 real address when resolving a dtpoff relocation. This is PT_TLS
843 segment p_vaddr. */
844 static bfd_vma
845 dtpoff_base (struct bfd_link_info *info)
846 {
847 /* If tls_sec is NULL, we should have signalled an error already. */
848 if (elf_hash_table (info)->tls_sec == NULL)
849 return 0;
850 return elf_hash_table (info)->tls_sec->vma;
851 }
852
853 /* Return the relocation value for R_METAG_TLS_IE */
854 static bfd_vma
855 tpoff (struct bfd_link_info *info, bfd_vma address)
856 {
857 /* If tls_sec is NULL, we should have signalled an error already. */
858 if (elf_hash_table (info)->tls_sec == NULL)
859 return 0;
860 /* METAG TLS ABI is variant I and static TLS blocks start just after
861 tcbhead structure which has 2 pointer fields. */
862 return (address - elf_hash_table (info)->tls_sec->vma
863 + align_power ((bfd_vma) 8,
864 elf_hash_table (info)->tls_sec->alignment_power));
865 }
866
867 static void
868 metag_info_to_howto_rela (bfd *abfd ATTRIBUTE_UNUSED,
869 arelent *cache_ptr,
870 Elf_Internal_Rela *dst)
871 {
872 unsigned int r_type;
873
874 r_type = ELF32_R_TYPE (dst->r_info);
875 if (r_type >= (unsigned int) R_METAG_MAX)
876 {
877 /* xgettext:c-format */
878 _bfd_error_handler (_("%pB: invalid METAG reloc number: %d"), abfd, r_type);
879 r_type = 0;
880 }
881 cache_ptr->howto = & elf_metag_howto_table [r_type];
882 }
883
884 static reloc_howto_type *
885 metag_reloc_type_lookup (bfd * abfd ATTRIBUTE_UNUSED,
886 bfd_reloc_code_real_type code)
887 {
888 unsigned int i;
889
890 for (i = 0; i < sizeof (metag_reloc_map) / sizeof (metag_reloc_map[0]); i++)
891 if (metag_reloc_map [i].bfd_reloc_val == code)
892 return & elf_metag_howto_table [metag_reloc_map[i].metag_reloc_val];
893
894 return NULL;
895 }
896
897 static reloc_howto_type *
898 metag_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
899 const char *r_name)
900 {
901 unsigned int i;
902
903 for (i = 0; i < sizeof (elf_metag_howto_table) / sizeof (elf_metag_howto_table[0]); i++)
904 if (elf_metag_howto_table[i].name != NULL
905 && strcasecmp (elf_metag_howto_table[i].name, r_name) == 0)
906 return &elf_metag_howto_table[i];
907
908 return NULL;
909 }
910
911 /* Various hash macros and functions. */
912 #define metag_link_hash_table(p) \
913 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
914 == METAG_ELF_DATA ? ((struct elf_metag_link_hash_table *) ((p)->hash)) : NULL)
915
916 #define metag_elf_hash_entry(ent) \
917 ((struct elf_metag_link_hash_entry *)(ent))
918
919 #define metag_stub_hash_entry(ent) \
920 ((struct elf_metag_stub_hash_entry *)(ent))
921
922 #define metag_stub_hash_lookup(table, string, create, copy) \
923 ((struct elf_metag_stub_hash_entry *) \
924 bfd_hash_lookup ((table), (string), (create), (copy)))
925
926 #define metag_elf_local_got_tls_type(abfd) \
927 ((char *)(elf_local_got_offsets (abfd) + (elf_tdata (abfd)->symtab_hdr.sh_info)))
928
929 /* Assorted hash table functions. */
930
931 /* Initialize an entry in the stub hash table. */
932
933 static struct bfd_hash_entry *
934 stub_hash_newfunc (struct bfd_hash_entry *entry,
935 struct bfd_hash_table *table,
936 const char *string)
937 {
938 /* Allocate the structure if it has not already been allocated by a
939 subclass. */
940 if (entry == NULL)
941 {
942 entry = bfd_hash_allocate (table,
943 sizeof (struct elf_metag_stub_hash_entry));
944 if (entry == NULL)
945 return entry;
946 }
947
948 /* Call the allocation method of the superclass. */
949 entry = bfd_hash_newfunc (entry, table, string);
950 if (entry != NULL)
951 {
952 struct elf_metag_stub_hash_entry *hsh;
953
954 /* Initialize the local fields. */
955 hsh = (struct elf_metag_stub_hash_entry *) entry;
956 hsh->stub_sec = NULL;
957 hsh->stub_offset = 0;
958 hsh->target_value = 0;
959 hsh->target_section = NULL;
960 hsh->stub_type = metag_stub_long_branch;
961 hsh->hh = NULL;
962 hsh->id_sec = NULL;
963 }
964
965 return entry;
966 }
967
968 /* Initialize an entry in the link hash table. */
969
970 static struct bfd_hash_entry *
971 metag_link_hash_newfunc (struct bfd_hash_entry *entry,
972 struct bfd_hash_table *table,
973 const char *string)
974 {
975 /* Allocate the structure if it has not already been allocated by a
976 subclass. */
977 if (entry == NULL)
978 {
979 entry = bfd_hash_allocate (table,
980 sizeof (struct elf_metag_link_hash_entry));
981 if (entry == NULL)
982 return entry;
983 }
984
985 /* Call the allocation method of the superclass. */
986 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
987 if (entry != NULL)
988 {
989 struct elf_metag_link_hash_entry *hh;
990
991 /* Initialize the local fields. */
992 hh = (struct elf_metag_link_hash_entry *) entry;
993 hh->hsh_cache = NULL;
994 hh->dyn_relocs = NULL;
995 hh->tls_type = GOT_UNKNOWN;
996 }
997
998 return entry;
999 }
1000
1001 /* Free the derived linker hash table. */
1002
1003 static void
1004 elf_metag_link_hash_table_free (bfd *obfd)
1005 {
1006 struct elf_metag_link_hash_table *htab
1007 = (struct elf_metag_link_hash_table *) obfd->link.hash;
1008
1009 bfd_hash_table_free (&htab->bstab);
1010 _bfd_elf_link_hash_table_free (obfd);
1011 }
1012
1013 /* Create the derived linker hash table. The Meta ELF port uses the derived
1014 hash table to keep information specific to the Meta ELF linker (without
1015 using static variables). */
1016
1017 static struct bfd_link_hash_table *
1018 elf_metag_link_hash_table_create (bfd *abfd)
1019 {
1020 struct elf_metag_link_hash_table *htab;
1021 bfd_size_type amt = sizeof (*htab);
1022
1023 htab = bfd_zmalloc (amt);
1024 if (htab == NULL)
1025 return NULL;
1026
1027 if (!_bfd_elf_link_hash_table_init (&htab->etab, abfd,
1028 metag_link_hash_newfunc,
1029 sizeof (struct elf_metag_link_hash_entry),
1030 METAG_ELF_DATA))
1031 {
1032 free (htab);
1033 return NULL;
1034 }
1035
1036 /* Init the stub hash table too. */
1037 if (!bfd_hash_table_init (&htab->bstab, stub_hash_newfunc,
1038 sizeof (struct elf_metag_stub_hash_entry)))
1039 {
1040 _bfd_elf_link_hash_table_free (abfd);
1041 return NULL;
1042 }
1043 htab->etab.root.hash_table_free = elf_metag_link_hash_table_free;
1044
1045 return &htab->etab.root;
1046 }
1047
1048 /* Section name for stubs is the associated section name plus this
1049 string. */
1050 #define STUB_SUFFIX ".stub"
1051
1052 /* Build a name for an entry in the stub hash table. */
1053
1054 static char *
1055 metag_stub_name (const asection *input_section,
1056 const asection *sym_sec,
1057 const struct elf_metag_link_hash_entry *hh,
1058 const Elf_Internal_Rela *rel)
1059 {
1060 char *stub_name;
1061 bfd_size_type len;
1062
1063 if (hh)
1064 {
1065 len = 8 + 1 + strlen (hh->eh.root.root.string) + 1 + 8 + 1;
1066 stub_name = bfd_malloc (len);
1067 if (stub_name != NULL)
1068 {
1069 sprintf (stub_name, "%08x_%s+%x",
1070 input_section->id & 0xffffffff,
1071 hh->eh.root.root.string,
1072 (int) rel->r_addend & 0xffffffff);
1073 }
1074 }
1075 else
1076 {
1077 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
1078 stub_name = bfd_malloc (len);
1079 if (stub_name != NULL)
1080 {
1081 sprintf (stub_name, "%08x_%x:%x+%x",
1082 input_section->id & 0xffffffff,
1083 sym_sec->id & 0xffffffff,
1084 (int) ELF32_R_SYM (rel->r_info) & 0xffffffff,
1085 (int) rel->r_addend & 0xffffffff);
1086 }
1087 }
1088 return stub_name;
1089 }
1090
1091 /* Look up an entry in the stub hash. Stub entries are cached because
1092 creating the stub name takes a bit of time. */
1093
1094 static struct elf_metag_stub_hash_entry *
1095 metag_get_stub_entry (const asection *input_section,
1096 const asection *sym_sec,
1097 struct elf_metag_link_hash_entry *hh,
1098 const Elf_Internal_Rela *rel,
1099 struct elf_metag_link_hash_table *htab)
1100 {
1101 struct elf_metag_stub_hash_entry *hsh;
1102 const asection *id_sec;
1103
1104 /* If this input section is part of a group of sections sharing one
1105 stub section, then use the id of the first section in the group.
1106 Stub names need to include a section id, as there may well be
1107 more than one stub used to reach say, printf, and we need to
1108 distinguish between them. */
1109 id_sec = htab->stub_group[input_section->id].link_sec;
1110
1111 if (hh != NULL && hh->hsh_cache != NULL
1112 && hh->hsh_cache->hh == hh
1113 && hh->hsh_cache->id_sec == id_sec)
1114 {
1115 hsh = hh->hsh_cache;
1116 }
1117 else
1118 {
1119 char *stub_name;
1120
1121 stub_name = metag_stub_name (id_sec, sym_sec, hh, rel);
1122 if (stub_name == NULL)
1123 return NULL;
1124
1125 hsh = metag_stub_hash_lookup (&htab->bstab,
1126 stub_name, FALSE, FALSE);
1127
1128 if (hh != NULL)
1129 hh->hsh_cache = hsh;
1130
1131 free (stub_name);
1132 }
1133
1134 return hsh;
1135 }
1136
1137 /* Add a new stub entry to the stub hash. Not all fields of the new
1138 stub entry are initialised. */
1139
1140 static struct elf_metag_stub_hash_entry *
1141 metag_add_stub (const char *stub_name,
1142 asection *section,
1143 struct elf_metag_link_hash_table *htab)
1144 {
1145 asection *link_sec;
1146 asection *stub_sec;
1147 struct elf_metag_stub_hash_entry *hsh;
1148
1149 link_sec = htab->stub_group[section->id].link_sec;
1150 stub_sec = htab->stub_group[section->id].stub_sec;
1151 if (stub_sec == NULL)
1152 {
1153 stub_sec = htab->stub_group[link_sec->id].stub_sec;
1154 if (stub_sec == NULL)
1155 {
1156 size_t namelen;
1157 bfd_size_type len;
1158 char *s_name;
1159
1160 namelen = strlen (link_sec->name);
1161 len = namelen + sizeof (STUB_SUFFIX);
1162 s_name = bfd_alloc (htab->stub_bfd, len);
1163 if (s_name == NULL)
1164 return NULL;
1165
1166 memcpy (s_name, link_sec->name, namelen);
1167 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
1168
1169 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
1170 if (stub_sec == NULL)
1171 return NULL;
1172 htab->stub_group[link_sec->id].stub_sec = stub_sec;
1173 }
1174 htab->stub_group[section->id].stub_sec = stub_sec;
1175 }
1176
1177 /* Enter this entry into the linker stub hash table. */
1178 hsh = metag_stub_hash_lookup (&htab->bstab, stub_name,
1179 TRUE, FALSE);
1180 if (hsh == NULL)
1181 {
1182 /* xgettext:c-format */
1183 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
1184 section->owner, stub_name);
1185 return NULL;
1186 }
1187
1188 hsh->stub_sec = stub_sec;
1189 hsh->stub_offset = 0;
1190 hsh->id_sec = link_sec;
1191 return hsh;
1192 }
1193
1194 /* Check a signed integer value can be represented in the given number
1195 of bits. */
1196
1197 static bfd_boolean
1198 within_signed_range (int value, unsigned int bits)
1199 {
1200 int min_val = -(1 << (bits - 1));
1201 int max_val = (1 << (bits - 1)) - 1;
1202 return (value <= max_val) && (value >= min_val);
1203 }
1204
1205 /* Perform a relocation as part of a final link. */
1206
1207 static bfd_reloc_status_type
1208 metag_final_link_relocate (reloc_howto_type *howto,
1209 bfd *input_bfd,
1210 asection *input_section,
1211 bfd_byte *contents,
1212 Elf_Internal_Rela *rel,
1213 bfd_vma relocation,
1214 struct elf_metag_link_hash_entry *hh,
1215 struct elf_metag_link_hash_table *htab,
1216 asection *sym_sec)
1217 {
1218 bfd_reloc_status_type r = bfd_reloc_ok;
1219 bfd_byte *hit_data = contents + rel->r_offset;
1220 int opcode, op_shift, op_extended, l1, l2;
1221 bfd_signed_vma srel, addend = rel->r_addend;
1222 struct elf_metag_stub_hash_entry *hsh = NULL;
1223 bfd_vma location;
1224
1225 /* Find out where we are and where we're going. */
1226 location = (rel->r_offset +
1227 input_section->output_offset +
1228 input_section->output_section->vma);
1229
1230 switch (howto->type)
1231 {
1232 case R_METAG_RELBRANCH:
1233 case R_METAG_RELBRANCH_PLT:
1234 /* Make it a pc relative offset. */
1235 relocation -= location;
1236 break;
1237 case R_METAG_TLS_GD:
1238 case R_METAG_TLS_IE:
1239 relocation -= elf_gp (input_section->output_section->owner);
1240 break;
1241 default:
1242 break;
1243 }
1244
1245 switch (howto->type)
1246 {
1247 case R_METAG_RELBRANCH_PLT:
1248 case R_METAG_RELBRANCH:
1249 opcode = bfd_get_32 (input_bfd, hit_data);
1250
1251 srel = (bfd_signed_vma) relocation;
1252 srel += addend;
1253
1254 /* If the branch is out of reach, then redirect the
1255 call to the local stub for this function. */
1256 if (srel > ((1 << (BRANCH_BITS + 1)) - 1) ||
1257 (srel < - (1 << (BRANCH_BITS + 1))))
1258 {
1259 if (sym_sec == NULL)
1260 break;
1261
1262 hsh = metag_get_stub_entry (input_section, sym_sec,
1263 hh, rel, htab);
1264 if (hsh == NULL)
1265 return bfd_reloc_undefined;
1266
1267 /* Munge up the value and addend so that we call the stub
1268 rather than the procedure directly. */
1269 srel = (hsh->stub_offset
1270 + hsh->stub_sec->output_offset
1271 + hsh->stub_sec->output_section->vma);
1272 srel -= location;
1273 }
1274
1275 srel = srel >> 2;
1276
1277 if (!within_signed_range (srel, BRANCH_BITS))
1278 {
1279 if (hh && hh->eh.root.type == bfd_link_hash_undefweak)
1280 srel = 0;
1281 else
1282 return bfd_reloc_overflow;
1283 }
1284
1285 opcode &= ~(0x7ffff << 5);
1286 opcode |= ((srel & 0x7ffff) << 5);
1287
1288 bfd_put_32 (input_bfd, opcode, hit_data);
1289 break;
1290 case R_METAG_GETSETOFF:
1291 case R_METAG_GETSET_GOT:
1292 case R_METAG_GETSET_GOTOFF:
1293 opcode = bfd_get_32 (input_bfd, hit_data);
1294
1295 srel = (bfd_signed_vma) relocation;
1296 srel += addend;
1297
1298 /* Is this a standard or extended GET/SET? */
1299 if ((opcode & 0xf0000000) == 0xa0000000)
1300 {
1301 /* Extended GET/SET. */
1302 l1 = opcode & 0x2;
1303 l2 = opcode & 0x4;
1304 op_extended = 1;
1305 }
1306 else
1307 {
1308 /* Standard GET/SET. */
1309 l1 = opcode & 0x01000000;
1310 l2 = opcode & 0x04000000;
1311 op_extended = 0;
1312 }
1313
1314 /* Calculate the width of the GET/SET and how much we need to
1315 shift the result by. */
1316 if (l2)
1317 if (l1)
1318 op_shift = 3;
1319 else
1320 op_shift = 2;
1321 else
1322 if (l1)
1323 op_shift = 1;
1324 else
1325 op_shift = 0;
1326
1327 /* GET/SET offsets are scaled by the width of the transfer. */
1328 srel = srel >> op_shift;
1329
1330 /* Extended GET/SET has signed 12 bits of offset, standard has
1331 signed 6 bits. */
1332 if (op_extended)
1333 {
1334 if (!within_signed_range (srel, 12))
1335 {
1336 if (hh && hh->eh.root.type == bfd_link_hash_undefweak)
1337 srel = 0;
1338 else
1339 return bfd_reloc_overflow;
1340 }
1341 opcode &= ~(0xfff << 7);
1342 opcode |= ((srel & 0xfff) << 7);
1343 }
1344 else
1345 {
1346 if (!within_signed_range (srel, 5))
1347 {
1348 if (hh && hh->eh.root.type == bfd_link_hash_undefweak)
1349 srel = 0;
1350 else
1351 return bfd_reloc_overflow;
1352 }
1353 opcode &= ~(0x3f << 8);
1354 opcode |= ((srel & 0x3f) << 8);
1355 }
1356
1357 bfd_put_32 (input_bfd, opcode, hit_data);
1358 break;
1359 case R_METAG_TLS_GD:
1360 case R_METAG_TLS_LDM:
1361 opcode = bfd_get_32 (input_bfd, hit_data);
1362
1363 if ((bfd_signed_vma)relocation < 0)
1364 {
1365 /* sign extend immediate */
1366 if ((opcode & 0xf2000001) == 0x02000000)
1367 {
1368 /* ADD De.e,Dx.r,#I16 */
1369 /* set SE bit */
1370 opcode |= (1 << 1);
1371 } else
1372 return bfd_reloc_overflow;
1373 }
1374
1375 bfd_put_32 (input_bfd, opcode, hit_data);
1376
1377 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1378 contents, rel->r_offset,
1379 relocation, rel->r_addend);
1380 break;
1381 default:
1382 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1383 contents, rel->r_offset,
1384 relocation, rel->r_addend);
1385 }
1386
1387 return r;
1388 }
1389
1390 /* This is defined because R_METAG_NONE != 0...
1391 See RELOC_AGAINST_DISCARDED_SECTION for details. */
1392 #define METAG_RELOC_AGAINST_DISCARDED_SECTION(info, input_bfd, input_section, \
1393 rel, relend, howto, contents) \
1394 { \
1395 _bfd_clear_contents (howto, input_bfd, input_section, \
1396 contents + rel->r_offset); \
1397 \
1398 if (bfd_link_relocatable (info) \
1399 && (input_section->flags & SEC_DEBUGGING)) \
1400 { \
1401 /* Only remove relocations in debug sections since other \
1402 sections may require relocations. */ \
1403 Elf_Internal_Shdr *rel_hdr; \
1404 \
1405 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section); \
1406 \
1407 /* Avoid empty output section. */ \
1408 if (rel_hdr->sh_size > rel_hdr->sh_entsize) \
1409 { \
1410 rel_hdr->sh_size -= rel_hdr->sh_entsize; \
1411 rel_hdr = _bfd_elf_single_rel_hdr (input_section); \
1412 rel_hdr->sh_size -= rel_hdr->sh_entsize; \
1413 \
1414 memmove (rel, rel + 1, (relend - rel) * sizeof (*rel)); \
1415 \
1416 input_section->reloc_count--; \
1417 relend--; \
1418 rel--; \
1419 continue; \
1420 } \
1421 } \
1422 \
1423 rel->r_info = R_METAG_NONE; \
1424 rel->r_addend = 0; \
1425 continue; \
1426 }
1427
1428 /* Relocate a META ELF section.
1429
1430 The RELOCATE_SECTION function is called by the new ELF backend linker
1431 to handle the relocations for a section.
1432
1433 The relocs are always passed as Rela structures; if the section
1434 actually uses Rel structures, the r_addend field will always be
1435 zero.
1436
1437 This function is responsible for adjusting the section contents as
1438 necessary, and (if using Rela relocs and generating a relocatable
1439 output file) adjusting the reloc addend as necessary.
1440
1441 This function does not have to worry about setting the reloc
1442 address or the reloc symbol index.
1443
1444 LOCAL_SYMS is a pointer to the swapped in local symbols.
1445
1446 LOCAL_SECTIONS is an array giving the section in the input file
1447 corresponding to the st_shndx field of each local symbol.
1448
1449 The global hash table entry for the global symbols can be found
1450 via elf_sym_hashes (input_bfd).
1451
1452 When generating relocatable output, this function must handle
1453 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
1454 going to be the section symbol corresponding to the output
1455 section, which means that the addend must be adjusted
1456 accordingly. */
1457
1458 static bfd_boolean
1459 elf_metag_relocate_section (bfd *output_bfd,
1460 struct bfd_link_info *info,
1461 bfd *input_bfd,
1462 asection *input_section,
1463 bfd_byte *contents,
1464 Elf_Internal_Rela *relocs,
1465 Elf_Internal_Sym *local_syms,
1466 asection **local_sections)
1467 {
1468 bfd_vma *local_got_offsets;
1469 Elf_Internal_Shdr *symtab_hdr;
1470 struct elf_link_hash_entry **eh_syms;
1471 struct elf_metag_link_hash_table *htab;
1472 Elf_Internal_Rela *rel;
1473 Elf_Internal_Rela *relend;
1474 asection *sreloc;
1475
1476 symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr;
1477 eh_syms = elf_sym_hashes (input_bfd);
1478 relend = relocs + input_section->reloc_count;
1479
1480 htab = metag_link_hash_table (info);
1481 local_got_offsets = elf_local_got_offsets (input_bfd);
1482
1483 sreloc = NULL;
1484
1485 for (rel = relocs; rel < relend; rel ++)
1486 {
1487 reloc_howto_type *howto;
1488 unsigned long r_symndx;
1489 Elf_Internal_Sym *sym;
1490 asection *sec;
1491 struct elf_metag_link_hash_entry *hh;
1492 bfd_vma relocation;
1493 bfd_reloc_status_type r;
1494 const char *name;
1495 int r_type;
1496
1497 r_type = ELF32_R_TYPE (rel->r_info);
1498
1499 if (r_type == R_METAG_GNU_VTINHERIT
1500 || r_type == R_METAG_GNU_VTENTRY
1501 || r_type == R_METAG_NONE)
1502 continue;
1503
1504 r_symndx = ELF32_R_SYM (rel->r_info);
1505
1506 howto = elf_metag_howto_table + ELF32_R_TYPE (rel->r_info);
1507 hh = NULL;
1508 sym = NULL;
1509 sec = NULL;
1510
1511 if (r_symndx < symtab_hdr->sh_info)
1512 {
1513 sym = local_syms + r_symndx;
1514 sec = local_sections [r_symndx];
1515 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
1516
1517 name = bfd_elf_string_from_elf_section
1518 (input_bfd, symtab_hdr->sh_link, sym->st_name);
1519 name = (name == NULL) ? bfd_section_name (input_bfd, sec) : name;
1520 }
1521 else
1522 {
1523 struct elf_link_hash_entry *eh;
1524 bfd_boolean unresolved_reloc, warned, ignored;
1525
1526 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1527 r_symndx, symtab_hdr, eh_syms,
1528 eh, sec, relocation,
1529 unresolved_reloc, warned, ignored);
1530
1531 name = eh->root.root.string;
1532 hh = (struct elf_metag_link_hash_entry *) eh;
1533 }
1534
1535 if (sec != NULL && discarded_section (sec))
1536 METAG_RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
1537 rel, relend, howto, contents);
1538
1539 if (bfd_link_relocatable (info))
1540 continue;
1541
1542 switch (r_type)
1543 {
1544 case R_METAG_ADDR32:
1545 case R_METAG_RELBRANCH:
1546 if ((input_section->flags & SEC_ALLOC) == 0)
1547 break;
1548
1549 if ((bfd_link_pic (info)
1550 && r_symndx != STN_UNDEF
1551 && (input_section->flags & SEC_ALLOC) != 0
1552 && (r_type != R_METAG_RELBRANCH
1553 || !SYMBOL_CALLS_LOCAL (info, &hh->eh)))
1554 || (!bfd_link_pic (info)
1555 && hh != NULL
1556 && hh->eh.dynindx != -1
1557 && !hh->eh.non_got_ref
1558 && ((hh->eh.def_dynamic
1559 && !hh->eh.def_regular)
1560 || hh->eh.root.type == bfd_link_hash_undefweak
1561 || hh->eh.root.type == bfd_link_hash_undefined)))
1562 {
1563 Elf_Internal_Rela outrel;
1564 bfd_boolean skip, relocate;
1565 bfd_byte *loc;
1566
1567 /* When generating a shared object, these relocations
1568 are copied into the output file to be resolved at run
1569 time. */
1570
1571 sreloc = elf_section_data (input_section)->sreloc;
1572 BFD_ASSERT (sreloc != NULL);
1573
1574 skip = FALSE;
1575 relocate = FALSE;
1576
1577 outrel.r_offset = _bfd_elf_section_offset (output_bfd,
1578 info,
1579 input_section,
1580 rel->r_offset);
1581 if (outrel.r_offset == (bfd_vma) -1)
1582 skip = TRUE;
1583 else if (outrel.r_offset == (bfd_vma) -2)
1584 skip = TRUE, relocate = TRUE;
1585 outrel.r_offset += (input_section->output_section->vma
1586 + input_section->output_offset);
1587
1588 if (skip)
1589 {
1590 memset (&outrel, 0, sizeof outrel);
1591 outrel.r_info = ELF32_R_INFO (0, R_METAG_NONE);
1592 }
1593 else if (r_type == R_METAG_RELBRANCH)
1594 {
1595 BFD_ASSERT (hh != NULL && hh->eh.dynindx != -1);
1596 outrel.r_info = ELF32_R_INFO (hh->eh.dynindx, r_type);
1597 outrel.r_addend = rel->r_addend;
1598 }
1599 else
1600 {
1601 /* h->dynindx may be -1 if this symbol was marked to
1602 become local. */
1603 if (hh == NULL
1604 || ((info->symbolic || hh->eh.dynindx == -1)
1605 && hh->eh.def_regular))
1606 {
1607 relocate = TRUE;
1608 outrel.r_info = ELF32_R_INFO (0, R_METAG_RELATIVE);
1609 outrel.r_addend = relocation + rel->r_addend;
1610 }
1611 else
1612 {
1613 BFD_ASSERT (hh->eh.dynindx != -1);
1614 outrel.r_info = ELF32_R_INFO (hh->eh.dynindx, r_type);
1615 outrel.r_addend = rel->r_addend;
1616 }
1617 }
1618
1619 loc = sreloc->contents;
1620 loc += sreloc->reloc_count * sizeof(Elf32_External_Rela);
1621 bfd_elf32_swap_reloca_out (output_bfd, &outrel,loc);
1622 ++sreloc->reloc_count;
1623
1624 /* If this reloc is against an external symbol, we do
1625 not want to fiddle with the addend. Otherwise, we
1626 need to include the symbol value so that it becomes
1627 an addend for the dynamic reloc. */
1628 if (! relocate)
1629 continue;
1630 }
1631 break;
1632
1633 case R_METAG_RELBRANCH_PLT:
1634 /* Relocation is to the entry for this symbol in the
1635 procedure linkage table. */
1636
1637 if (hh == NULL)
1638 break;
1639
1640 if (hh->eh.forced_local)
1641 break;
1642
1643 if (hh->eh.plt.offset == (bfd_vma) -1 || htab->etab.splt == NULL)
1644 {
1645 /* We didn't make a PLT entry for this symbol. This
1646 happens when statically linking PIC code, or when
1647 using -Bsymbolic. */
1648 break;
1649 }
1650
1651 relocation = (htab->etab.splt->output_section->vma
1652 + htab->etab.splt->output_offset
1653 + hh->eh.plt.offset);
1654 break;
1655 case R_METAG_HI16_GOTPC:
1656 case R_METAG_LO16_GOTPC:
1657 BFD_ASSERT (htab->etab.sgot != NULL);
1658
1659 relocation = (htab->etab.sgot->output_section->vma +
1660 htab->etab.sgot->output_offset);
1661 relocation += GOT_REG_OFFSET;
1662 relocation -= (input_section->output_section->vma
1663 + input_section->output_offset
1664 + rel->r_offset);
1665 break;
1666 case R_METAG_HI16_GOTOFF:
1667 case R_METAG_LO16_GOTOFF:
1668 case R_METAG_GETSET_GOTOFF:
1669 BFD_ASSERT (htab->etab.sgot != NULL);
1670
1671 relocation -= (htab->etab.sgot->output_section->vma +
1672 htab->etab.sgot->output_offset);
1673 relocation -= GOT_REG_OFFSET;
1674 break;
1675 case R_METAG_GETSET_GOT:
1676 {
1677 bfd_vma off;
1678 bfd_boolean do_got = 0;
1679
1680 /* Relocation is to the entry for this symbol in the
1681 global offset table. */
1682 if (hh != NULL)
1683 {
1684 bfd_boolean dyn;
1685
1686 off = hh->eh.got.offset;
1687 dyn = htab->etab.dynamic_sections_created;
1688 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
1689 bfd_link_pic (info),
1690 &hh->eh))
1691 {
1692 /* If we aren't going to call finish_dynamic_symbol,
1693 then we need to handle initialisation of the .got
1694 entry and create needed relocs here. Since the
1695 offset must always be a multiple of 4, we use the
1696 least significant bit to record whether we have
1697 initialised it already. */
1698 if ((off & 1) != 0)
1699 off &= ~1;
1700 else
1701 {
1702 hh->eh.got.offset |= 1;
1703 do_got = 1;
1704 }
1705 }
1706 }
1707 else
1708 {
1709 /* Local symbol case. */
1710 if (local_got_offsets == NULL)
1711 abort ();
1712
1713 off = local_got_offsets[r_symndx];
1714
1715 /* The offset must always be a multiple of 4. We use
1716 the least significant bit to record whether we have
1717 already generated the necessary reloc. */
1718 if ((off & 1) != 0)
1719 off &= ~1;
1720 else
1721 {
1722 local_got_offsets[r_symndx] |= 1;
1723 do_got = 1;
1724 }
1725 }
1726
1727 if (do_got)
1728 {
1729 if (bfd_link_pic (info))
1730 {
1731 /* Output a dynamic relocation for this GOT entry.
1732 In this case it is relative to the base of the
1733 object because the symbol index is zero. */
1734 Elf_Internal_Rela outrel;
1735 bfd_byte *loc;
1736 asection *s = htab->etab.srelgot;
1737
1738 outrel.r_offset = (off
1739 + htab->etab.sgot->output_offset
1740 + htab->etab.sgot->output_section->vma);
1741 outrel.r_info = ELF32_R_INFO (0, R_METAG_RELATIVE);
1742 outrel.r_addend = relocation;
1743 loc = s->contents;
1744 loc += s->reloc_count++ * sizeof (Elf32_External_Rela);
1745 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1746 }
1747 else
1748 bfd_put_32 (output_bfd, relocation,
1749 htab->etab.sgot->contents + off);
1750 }
1751
1752 if (off >= (bfd_vma) -2)
1753 abort ();
1754
1755 relocation = off - GOT_REG_OFFSET;
1756 }
1757 break;
1758 case R_METAG_TLS_GD:
1759 case R_METAG_TLS_IE:
1760 {
1761 /* XXXMJF There is room here for optimisations. For example
1762 converting from GD->IE, etc. */
1763 bfd_vma off;
1764 int indx;
1765 char tls_type;
1766
1767 if (htab->etab.sgot == NULL)
1768 abort();
1769
1770 indx = 0;
1771 if (hh != NULL)
1772 {
1773 bfd_boolean dyn;
1774 dyn = htab->etab.dynamic_sections_created;
1775
1776 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
1777 bfd_link_pic (info),
1778 &hh->eh)
1779 && (!bfd_link_pic (info)
1780 || !SYMBOL_REFERENCES_LOCAL (info, &hh->eh)))
1781 {
1782 indx = hh->eh.dynindx;
1783 }
1784 off = hh->eh.got.offset;
1785 tls_type = hh->tls_type;
1786 }
1787 else
1788 {
1789 /* Local symbol case. */
1790 if (local_got_offsets == NULL)
1791 abort ();
1792
1793 off = local_got_offsets[r_symndx];
1794 tls_type = metag_elf_local_got_tls_type (input_bfd) [r_symndx];
1795 }
1796
1797 if (tls_type == GOT_UNKNOWN)
1798 abort ();
1799
1800 if ((off & 1) != 0)
1801 off &= ~1;
1802 else
1803 {
1804 bfd_boolean need_relocs = FALSE;
1805 Elf_Internal_Rela outrel;
1806 bfd_byte *loc = NULL;
1807 int cur_off = off;
1808
1809 /* The GOT entries have not been initialized yet. Do it
1810 now, and emit any relocations. If both an IE GOT and a
1811 GD GOT are necessary, we emit the GD first. */
1812
1813 if ((bfd_link_pic (info) || indx != 0)
1814 && (hh == NULL
1815 || ELF_ST_VISIBILITY (hh->eh.other) == STV_DEFAULT
1816 || hh->eh.root.type != bfd_link_hash_undefweak))
1817 {
1818 need_relocs = TRUE;
1819 loc = htab->etab.srelgot->contents;
1820 /* FIXME (CAO): Should this be reloc_count++ ? */
1821 loc += htab->etab.srelgot->reloc_count * sizeof (Elf32_External_Rela);
1822 }
1823
1824 if (tls_type & GOT_TLS_GD)
1825 {
1826 if (need_relocs)
1827 {
1828 outrel.r_offset = (cur_off
1829 + htab->etab.sgot->output_section->vma
1830 + htab->etab.sgot->output_offset);
1831 outrel.r_info = ELF32_R_INFO (indx, R_METAG_TLS_DTPMOD);
1832 outrel.r_addend = 0;
1833 bfd_put_32 (output_bfd, 0, htab->etab.sgot->contents + cur_off);
1834
1835 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1836 htab->etab.srelgot->reloc_count++;
1837 loc += sizeof (Elf32_External_Rela);
1838
1839 if (indx == 0)
1840 bfd_put_32 (output_bfd, 0,
1841 htab->etab.sgot->contents + cur_off + 4);
1842 else
1843 {
1844 bfd_put_32 (output_bfd, 0,
1845 htab->etab.sgot->contents + cur_off + 4);
1846 outrel.r_info = ELF32_R_INFO (indx,
1847 R_METAG_TLS_DTPOFF);
1848 outrel.r_offset += 4;
1849 bfd_elf32_swap_reloca_out (output_bfd,
1850 &outrel, loc);
1851 htab->etab.srelgot->reloc_count++;
1852 loc += sizeof (Elf32_External_Rela);
1853 }
1854 }
1855 else
1856 {
1857 /* We don't support changing the TLS model. */
1858 /* PR 20675 */
1859 if (bfd_link_pic (info))
1860 _bfd_error_handler (_("%pB(%pA): multiple TLS models are not supported"),
1861 input_bfd, input_section);
1862 else
1863 _bfd_error_handler (_("%pB(%pA): shared library symbol %s encountered whilst performing a static link"),
1864 input_bfd, input_section, name);
1865 return FALSE;
1866 }
1867
1868 cur_off += 8;
1869 }
1870
1871 if (tls_type & GOT_TLS_IE)
1872 {
1873 if (need_relocs)
1874 {
1875 outrel.r_offset = (cur_off
1876 + htab->etab.sgot->output_section->vma
1877 + htab->etab.sgot->output_offset);
1878 outrel.r_info = ELF32_R_INFO (indx, R_METAG_TLS_TPOFF);
1879
1880 if (indx == 0)
1881 outrel.r_addend = relocation - dtpoff_base (info);
1882 else
1883 outrel.r_addend = 0;
1884
1885 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1886 htab->etab.srelgot->reloc_count++;
1887 loc += sizeof (Elf32_External_Rela);
1888 }
1889 else
1890 bfd_put_32 (output_bfd, tpoff (info, relocation),
1891 htab->etab.sgot->contents + cur_off);
1892
1893 cur_off += 4;
1894 }
1895
1896 if (hh != NULL)
1897 hh->eh.got.offset |= 1;
1898 else
1899 local_got_offsets[r_symndx] |= 1;
1900 }
1901
1902 /* Add the base of the GOT to the relocation value. */
1903 relocation = off - GOT_REG_OFFSET;
1904
1905 break;
1906 }
1907
1908 case R_METAG_TLS_IENONPIC_HI16:
1909 case R_METAG_TLS_IENONPIC_LO16:
1910 case R_METAG_TLS_LE_HI16:
1911 case R_METAG_TLS_LE_LO16:
1912 if (bfd_link_pic (info))
1913 {
1914 _bfd_error_handler
1915 /* xgettext:c-format */
1916 (_("%pB(%pA+%#" PRIx64 "): "
1917 "%s relocation not permitted in shared object"),
1918 input_bfd, input_section, (uint64_t) rel->r_offset,
1919 howto->name);
1920 return FALSE;
1921 }
1922 else
1923 relocation = tpoff (info, relocation);
1924 break;
1925 case R_METAG_TLS_LDO_HI16:
1926 case R_METAG_TLS_LDO_LO16:
1927 if (! bfd_link_pic (info))
1928 relocation = tpoff (info, relocation);
1929 else
1930 relocation -= dtpoff_base (info);
1931 break;
1932 case R_METAG_TLS_LDM:
1933 {
1934 bfd_vma off;
1935
1936 if (htab->etab.sgot == NULL)
1937 abort();
1938 off = htab->tls_ldm_got.offset;
1939 if (off & 1)
1940 off &= ~1;
1941 else
1942 {
1943 Elf_Internal_Rela outrel;
1944 bfd_byte *loc;
1945
1946 outrel.r_offset = (off
1947 + htab->etab.sgot->output_section->vma
1948 + htab->etab.sgot->output_offset);
1949
1950 outrel.r_addend = 0;
1951 outrel.r_info = ELF32_R_INFO (0, R_METAG_TLS_DTPMOD);
1952 loc = htab->etab.srelgot->contents;
1953 loc += htab->etab.srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
1954 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1955 htab->tls_ldm_got.offset |= 1;
1956 }
1957
1958 relocation = off - GOT_REG_OFFSET;
1959 break;
1960 }
1961 default:
1962 break;
1963 }
1964
1965 r = metag_final_link_relocate (howto, input_bfd, input_section,
1966 contents, rel, relocation, hh, htab,
1967 sec);
1968
1969 if (r != bfd_reloc_ok)
1970 {
1971 const char * msg = (const char *) NULL;
1972
1973 switch (r)
1974 {
1975 case bfd_reloc_overflow:
1976 (*info->callbacks->reloc_overflow)
1977 (info, (hh ? &hh->eh.root : NULL), name, howto->name,
1978 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
1979 break;
1980
1981 case bfd_reloc_undefined:
1982 (*info->callbacks->undefined_symbol)
1983 (info, name, input_bfd, input_section, rel->r_offset, TRUE);
1984 break;
1985
1986 case bfd_reloc_outofrange:
1987 msg = _("internal error: out of range error");
1988 break;
1989
1990 case bfd_reloc_notsupported:
1991 msg = _("internal error: unsupported relocation error");
1992 break;
1993
1994 case bfd_reloc_dangerous:
1995 msg = _("internal error: dangerous relocation");
1996 break;
1997
1998 default:
1999 msg = _("internal error: unknown error");
2000 break;
2001 }
2002
2003 if (msg)
2004 (*info->callbacks->warning) (info, msg, name, input_bfd,
2005 input_section, rel->r_offset);
2006 }
2007 }
2008
2009 return TRUE;
2010 }
2011
2012 /* Create the .plt and .got sections, and set up our hash table
2013 short-cuts to various dynamic sections. */
2014
2015 static bfd_boolean
2016 elf_metag_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
2017 {
2018 struct elf_metag_link_hash_table *htab;
2019 struct elf_link_hash_entry *eh;
2020 struct bfd_link_hash_entry *bh;
2021 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
2022
2023 /* Don't try to create the .plt and .got twice. */
2024 htab = metag_link_hash_table (info);
2025 if (htab->etab.splt != NULL)
2026 return TRUE;
2027
2028 /* Call the generic code to do most of the work. */
2029 if (! _bfd_elf_create_dynamic_sections (abfd, info))
2030 return FALSE;
2031
2032 /* The header goes at the start of the dynamic .got section, which
2033 is placed after the dynamic .got.plt section. ie. The header is
2034 not necessarily at the start of the output .got section. */
2035 htab->etab.sgot->size += 12;
2036
2037 /* Define the symbol __GLOBAL_OFFSET_TABLE__ on the header. */
2038 bh = NULL;
2039 if (!(_bfd_generic_link_add_one_symbol
2040 (info, abfd, "__GLOBAL_OFFSET_TABLE__", BSF_GLOBAL, htab->etab.sgot,
2041 (bfd_vma) 0, NULL, FALSE, bed->collect, &bh)))
2042 return FALSE;
2043 eh = (struct elf_link_hash_entry *) bh;
2044 eh->def_regular = 1;
2045 eh->type = STT_OBJECT;
2046 eh->other = STV_HIDDEN;
2047
2048 if (! bfd_link_executable (info)
2049 && ! bfd_elf_link_record_dynamic_symbol (info, eh))
2050 return FALSE;
2051
2052 htab->etab.hgot = eh;
2053
2054 return TRUE;
2055 }
2056
2057 /* Look through the relocs for a section during the first phase, and
2058 calculate needed space in the global offset table, procedure linkage
2059 table, and dynamic reloc sections. At this point we haven't
2060 necessarily read all the input files. */
2061
2062 static bfd_boolean
2063 elf_metag_check_relocs (bfd *abfd,
2064 struct bfd_link_info *info,
2065 asection *sec,
2066 const Elf_Internal_Rela *relocs)
2067 {
2068 Elf_Internal_Shdr *symtab_hdr;
2069 struct elf_link_hash_entry **eh_syms;
2070 const Elf_Internal_Rela *rel;
2071 const Elf_Internal_Rela *rel_end;
2072 struct elf_metag_link_hash_table *htab;
2073 asection *sreloc;
2074 bfd *dynobj;
2075 int tls_type = GOT_UNKNOWN, old_tls_type = GOT_UNKNOWN;
2076
2077 if (bfd_link_relocatable (info))
2078 return TRUE;
2079
2080 htab = metag_link_hash_table (info);
2081 dynobj = htab->etab.dynobj;
2082 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2083 eh_syms = elf_sym_hashes (abfd);
2084 sreloc = NULL;
2085
2086 if (htab == NULL)
2087 return FALSE;
2088
2089 rel_end = relocs + sec->reloc_count;
2090 for (rel = relocs; rel < rel_end; rel++)
2091 {
2092 int r_type;
2093 struct elf_metag_link_hash_entry *hh;
2094 Elf_Internal_Sym *isym;
2095 unsigned long r_symndx;
2096
2097 r_symndx = ELF32_R_SYM (rel->r_info);
2098 r_type = ELF32_R_TYPE (rel->r_info);
2099 if (r_symndx < symtab_hdr->sh_info)
2100 {
2101 /* A local symbol. */
2102 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
2103 abfd, r_symndx);
2104 if (isym == NULL)
2105 return FALSE;
2106
2107 hh = NULL;
2108 }
2109 else
2110 {
2111 isym = NULL;
2112
2113 hh = (struct elf_metag_link_hash_entry *)
2114 eh_syms[r_symndx - symtab_hdr->sh_info];
2115 while (hh->eh.root.type == bfd_link_hash_indirect
2116 || hh->eh.root.type == bfd_link_hash_warning)
2117 hh = (struct elf_metag_link_hash_entry *) hh->eh.root.u.i.link;
2118 }
2119
2120 /* Some relocs require a global offset table. */
2121 if (htab->etab.sgot == NULL)
2122 {
2123 switch (r_type)
2124 {
2125 case R_METAG_TLS_GD:
2126 case R_METAG_TLS_LDM:
2127 case R_METAG_TLS_IE:
2128 if (bfd_link_pic (info))
2129 info->flags |= DF_STATIC_TLS;
2130 /* Fall through. */
2131
2132 case R_METAG_HI16_GOTOFF:
2133 case R_METAG_LO16_GOTOFF:
2134 case R_METAG_GETSET_GOTOFF:
2135 case R_METAG_GETSET_GOT:
2136 case R_METAG_HI16_GOTPC:
2137 case R_METAG_LO16_GOTPC:
2138 if (dynobj == NULL)
2139 htab->etab.dynobj = dynobj = abfd;
2140 if (!elf_metag_create_dynamic_sections (dynobj, info))
2141 return FALSE;
2142 break;
2143
2144 default:
2145 break;
2146 }
2147 }
2148
2149 switch (r_type)
2150 {
2151 case R_METAG_TLS_IE:
2152 case R_METAG_TLS_GD:
2153 case R_METAG_GETSET_GOT:
2154 switch (r_type)
2155 {
2156 default:
2157 tls_type = GOT_NORMAL;
2158 break;
2159 case R_METAG_TLS_IE:
2160 tls_type = GOT_TLS_IE;
2161 break;
2162 case R_METAG_TLS_GD:
2163 tls_type = GOT_TLS_GD;
2164 break;
2165 }
2166
2167 if (hh != NULL)
2168 {
2169 hh->eh.got.refcount += 1;
2170 old_tls_type = hh->tls_type;
2171 }
2172 else
2173 {
2174 bfd_signed_vma *local_got_refcounts;
2175
2176 /* This is a global offset table entry for a local
2177 symbol. */
2178 local_got_refcounts = elf_local_got_refcounts (abfd);
2179 if (local_got_refcounts == NULL)
2180 {
2181 bfd_size_type size;
2182
2183 size = symtab_hdr->sh_info;
2184 size *= sizeof (bfd_signed_vma);
2185 /* Add in space to store the local GOT TLS types. */
2186 size += symtab_hdr->sh_info;
2187 local_got_refcounts = ((bfd_signed_vma *)
2188 bfd_zalloc (abfd, size));
2189 if (local_got_refcounts == NULL)
2190 return FALSE;
2191 elf_local_got_refcounts (abfd) = local_got_refcounts;
2192 memset (metag_elf_local_got_tls_type (abfd),
2193 GOT_UNKNOWN, symtab_hdr->sh_info);
2194 }
2195 local_got_refcounts[r_symndx] += 1;
2196 old_tls_type = metag_elf_local_got_tls_type (abfd) [r_symndx];
2197 }
2198
2199 if (old_tls_type != tls_type)
2200 {
2201 if (hh != NULL)
2202 {
2203 hh->tls_type = tls_type;
2204 }
2205 else
2206 {
2207 metag_elf_local_got_tls_type (abfd) [r_symndx] = tls_type;
2208 }
2209 }
2210
2211 break;
2212
2213 case R_METAG_TLS_LDM:
2214 metag_link_hash_table (info)->tls_ldm_got.refcount += 1;
2215 break;
2216
2217 case R_METAG_RELBRANCH_PLT:
2218 /* This symbol requires a procedure linkage table entry. We
2219 actually build the entry in adjust_dynamic_symbol,
2220 because this might be a case of linking PIC code without
2221 linking in any dynamic objects, in which case we don't
2222 need to generate a procedure linkage table after all. */
2223
2224 /* If this is a local symbol, we resolve it directly without
2225 creating a procedure linkage table entry. */
2226 if (hh == NULL)
2227 continue;
2228
2229 if (hh->eh.forced_local)
2230 break;
2231
2232 hh->eh.needs_plt = 1;
2233 hh->eh.plt.refcount += 1;
2234 break;
2235
2236 case R_METAG_HIADDR16:
2237 case R_METAG_LOADDR16:
2238 /* Let's help debug shared library creation. These relocs
2239 cannot be used in shared libs. Don't error out for
2240 sections we don't care about, such as debug sections or
2241 non-constant sections. */
2242 if (bfd_link_pic (info)
2243 && (sec->flags & SEC_ALLOC) != 0
2244 && (sec->flags & SEC_READONLY) != 0)
2245 {
2246 const char *name;
2247
2248 if (hh)
2249 name = hh->eh.root.root.string;
2250 else
2251 name = bfd_elf_sym_name (abfd, symtab_hdr, isym, NULL);
2252 _bfd_error_handler
2253 /* xgettext:c-format */
2254 (_("%pB: relocation %s against `%s' can not be used when making a shared object; recompile with -fPIC"),
2255 abfd, elf_metag_howto_table[r_type].name, name);
2256 bfd_set_error (bfd_error_bad_value);
2257 return FALSE;
2258 }
2259
2260 /* Fall through. */
2261 case R_METAG_ADDR32:
2262 case R_METAG_RELBRANCH:
2263 case R_METAG_GETSETOFF:
2264 if (hh != NULL && !bfd_link_pic (info))
2265 {
2266 hh->eh.non_got_ref = 1;
2267 hh->eh.plt.refcount += 1;
2268 }
2269
2270 /* If we are creating a shared library, and this is a reloc
2271 against a global symbol, or a non PC relative reloc
2272 against a local symbol, then we need to copy the reloc
2273 into the shared library. However, if we are linking with
2274 -Bsymbolic, we do not need to copy a reloc against a
2275 global symbol which is defined in an object we are
2276 including in the link (i.e., DEF_REGULAR is set). At
2277 this point we have not seen all the input files, so it is
2278 possible that DEF_REGULAR is not set now but will be set
2279 later (it is never cleared). We account for that
2280 possibility below by storing information in the
2281 dyn_relocs field of the hash table entry. A similar
2282 situation occurs when creating shared libraries and symbol
2283 visibility changes render the symbol local.
2284
2285 If on the other hand, we are creating an executable, we
2286 may need to keep relocations for symbols satisfied by a
2287 dynamic library if we manage to avoid copy relocs for the
2288 symbol. */
2289 if ((bfd_link_pic (info)
2290 && (sec->flags & SEC_ALLOC) != 0
2291 && (r_type != R_METAG_RELBRANCH
2292 || (hh != NULL
2293 && (! info->symbolic
2294 || hh->eh.root.type == bfd_link_hash_defweak
2295 || !hh->eh.def_regular))))
2296 || (!bfd_link_pic (info)
2297 && (sec->flags & SEC_ALLOC) != 0
2298 && hh != NULL
2299 && (hh->eh.root.type == bfd_link_hash_defweak
2300 || !hh->eh.def_regular)))
2301 {
2302 struct elf_dyn_relocs *hdh_p;
2303 struct elf_dyn_relocs **hdh_head;
2304
2305 if (dynobj == NULL)
2306 htab->etab.dynobj = dynobj = abfd;
2307
2308 /* When creating a shared object, we must copy these
2309 relocs into the output file. We create a reloc
2310 section in dynobj and make room for the reloc. */
2311 if (sreloc == NULL)
2312 {
2313 sreloc = _bfd_elf_make_dynamic_reloc_section
2314 (sec, htab->etab.dynobj, 2, abfd, /*rela?*/ TRUE);
2315
2316 if (sreloc == NULL)
2317 {
2318 bfd_set_error (bfd_error_bad_value);
2319 return FALSE;
2320 }
2321
2322 elf_section_data (sec)->sreloc = sreloc;
2323 }
2324
2325 /* If this is a global symbol, we count the number of
2326 relocations we need for this symbol. */
2327 if (hh != NULL)
2328 hdh_head = &((struct elf_metag_link_hash_entry *) hh)->dyn_relocs;
2329 else
2330 {
2331 /* Track dynamic relocs needed for local syms too. */
2332 asection *sr;
2333 void *vpp;
2334
2335 sr = bfd_section_from_elf_index (abfd, isym->st_shndx);
2336 if (sr == NULL)
2337 sr = sec;
2338
2339 vpp = &elf_section_data (sr)->local_dynrel;
2340 hdh_head = (struct elf_dyn_relocs **) vpp;
2341 }
2342
2343 hdh_p = *hdh_head;
2344 if (hdh_p == NULL || hdh_p->sec != sec)
2345 {
2346 hdh_p = ((struct elf_dyn_relocs *)
2347 bfd_alloc (dynobj, sizeof *hdh_p));
2348 if (hdh_p == NULL)
2349 return FALSE;
2350 hdh_p->next = *hdh_head;
2351 *hdh_head = hdh_p;
2352 hdh_p->sec = sec;
2353 hdh_p->count = 0;
2354 hdh_p->pc_count = 0;
2355 }
2356
2357 hdh_p->count += 1;
2358 if (ELF32_R_TYPE (rel->r_info) == R_METAG_RELBRANCH)
2359 hdh_p->pc_count += 1;
2360 }
2361 break;
2362
2363 /* This relocation describes the C++ object vtable hierarchy.
2364 Reconstruct it for later use during GC. */
2365 case R_METAG_GNU_VTINHERIT:
2366 if (!bfd_elf_gc_record_vtinherit (abfd, sec, &hh->eh,
2367 rel->r_offset))
2368 return FALSE;
2369 break;
2370
2371 /* This relocation describes which C++ vtable entries are actually
2372 used. Record for later use during GC. */
2373 case R_METAG_GNU_VTENTRY:
2374 BFD_ASSERT (hh != NULL);
2375 if (hh != NULL
2376 && !bfd_elf_gc_record_vtentry (abfd, sec, &hh->eh, rel->r_addend))
2377 return FALSE;
2378 break;
2379 }
2380 }
2381
2382 return TRUE;
2383 }
2384
2385 /* Copy the extra info we tack onto an elf_link_hash_entry. */
2386
2387 static void
2388 elf_metag_copy_indirect_symbol (struct bfd_link_info *info,
2389 struct elf_link_hash_entry *eh_dir,
2390 struct elf_link_hash_entry *eh_ind)
2391 {
2392 struct elf_metag_link_hash_entry *hh_dir, *hh_ind;
2393
2394 hh_dir = metag_elf_hash_entry (eh_dir);
2395 hh_ind = metag_elf_hash_entry (eh_ind);
2396
2397 if (hh_ind->dyn_relocs != NULL)
2398 {
2399 if (hh_dir->dyn_relocs != NULL)
2400 {
2401 struct elf_dyn_relocs **hdh_pp;
2402 struct elf_dyn_relocs *hdh_p;
2403
2404 if (eh_ind->root.type == bfd_link_hash_indirect)
2405 abort ();
2406
2407 /* Add reloc counts against the weak sym to the strong sym
2408 list. Merge any entries against the same section. */
2409 for (hdh_pp = &hh_ind->dyn_relocs; (hdh_p = *hdh_pp) != NULL; )
2410 {
2411 struct elf_dyn_relocs *hdh_q;
2412
2413 for (hdh_q = hh_dir->dyn_relocs; hdh_q != NULL;
2414 hdh_q = hdh_q->next)
2415 if (hdh_q->sec == hdh_p->sec)
2416 {
2417 hdh_q->pc_count += hdh_p->pc_count;
2418 hdh_q->count += hdh_p->count;
2419 *hdh_pp = hdh_p->next;
2420 break;
2421 }
2422 if (hdh_q == NULL)
2423 hdh_pp = &hdh_p->next;
2424 }
2425 *hdh_pp = hh_dir->dyn_relocs;
2426 }
2427
2428 hh_dir->dyn_relocs = hh_ind->dyn_relocs;
2429 hh_ind->dyn_relocs = NULL;
2430 }
2431
2432 if (eh_ind->root.type == bfd_link_hash_indirect
2433 && eh_dir->got.refcount <= 0)
2434 {
2435 hh_dir->tls_type = hh_ind->tls_type;
2436 hh_ind->tls_type = GOT_UNKNOWN;
2437 }
2438
2439 _bfd_elf_link_hash_copy_indirect (info, eh_dir, eh_ind);
2440 }
2441
2442 /* Find dynamic relocs for H that apply to read-only sections. */
2443
2444 static asection *
2445 readonly_dynrelocs (struct elf_link_hash_entry *h)
2446 {
2447 struct elf_dyn_relocs *p;
2448
2449 for (p = metag_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
2450 {
2451 asection *s = p->sec->output_section;
2452
2453 if (s != NULL && (s->flags & SEC_READONLY) != 0)
2454 return p->sec;
2455 }
2456 return NULL;
2457 }
2458
2459 /* Adjust a symbol defined by a dynamic object and referenced by a
2460 regular object. The current definition is in some section of the
2461 dynamic object, but we're not including those sections. We have to
2462 change the definition to something the rest of the link can
2463 understand. */
2464
2465 static bfd_boolean
2466 elf_metag_adjust_dynamic_symbol (struct bfd_link_info *info,
2467 struct elf_link_hash_entry *eh)
2468 {
2469 struct elf_metag_link_hash_table *htab;
2470 asection *s, *srel;
2471
2472 /* If this is a function, put it in the procedure linkage table. We
2473 will fill in the contents of the procedure linkage table later,
2474 when we know the address of the .got section. */
2475 if (eh->type == STT_FUNC
2476 || eh->needs_plt)
2477 {
2478 if (eh->plt.refcount <= 0
2479 || SYMBOL_CALLS_LOCAL (info, eh)
2480 || (ELF_ST_VISIBILITY (eh->other) != STV_DEFAULT
2481 && eh->root.type == bfd_link_hash_undefweak))
2482 {
2483 /* This case can occur if we saw a PLT reloc in an input
2484 file, but the symbol was never referred to by a dynamic
2485 object. In such a case, we don't actually need to build
2486 a procedure linkage table, and we can just do a PCREL
2487 reloc instead. */
2488 eh->plt.offset = (bfd_vma) -1;
2489 eh->needs_plt = 0;
2490 }
2491
2492 return TRUE;
2493 }
2494 else
2495 eh->plt.offset = (bfd_vma) -1;
2496
2497 /* If this is a weak symbol, and there is a real definition, the
2498 processor independent code will have arranged for us to see the
2499 real definition first, and we can just use the same value. */
2500 if (eh->is_weakalias)
2501 {
2502 struct elf_link_hash_entry *def = weakdef (eh);
2503 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
2504 eh->root.u.def.section = def->root.u.def.section;
2505 eh->root.u.def.value = def->root.u.def.value;
2506 eh->non_got_ref = def->non_got_ref;
2507 return TRUE;
2508 }
2509
2510 /* This is a reference to a symbol defined by a dynamic object which
2511 is not a function. */
2512
2513 /* If we are creating a shared library, we must presume that the
2514 only references to the symbol are via the global offset table.
2515 For such cases we need not do anything here; the relocations will
2516 be handled correctly by relocate_section. */
2517 if (bfd_link_pic (info))
2518 return TRUE;
2519
2520 /* If there are no references to this symbol that do not use the
2521 GOT, we don't need to generate a copy reloc. */
2522 if (!eh->non_got_ref)
2523 return TRUE;
2524
2525 /* If -z nocopyreloc was given, we won't generate them either. */
2526 if (info->nocopyreloc)
2527 {
2528 eh->non_got_ref = 0;
2529 return TRUE;
2530 }
2531
2532 /* If we don't find any dynamic relocs in read-only sections, then
2533 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
2534 if (!readonly_dynrelocs (eh))
2535 {
2536 eh->non_got_ref = 0;
2537 return TRUE;
2538 }
2539
2540 /* We must allocate the symbol in our .dynbss section, which will
2541 become part of the .bss section of the executable. There will be
2542 an entry for this symbol in the .dynsym section. The dynamic
2543 object will contain position independent code, so all references
2544 from the dynamic object to this symbol will go through the global
2545 offset table. The dynamic linker will use the .dynsym entry to
2546 determine the address it must put in the global offset table, so
2547 both the dynamic object and the regular object will refer to the
2548 same memory location for the variable. */
2549
2550 htab = metag_link_hash_table (info);
2551
2552 /* We must generate a COPY reloc to tell the dynamic linker to
2553 copy the initial value out of the dynamic object and into the
2554 runtime process image. */
2555 if ((eh->root.u.def.section->flags & SEC_READONLY) != 0)
2556 {
2557 s = htab->etab.sdynrelro;
2558 srel = htab->etab.sreldynrelro;
2559 }
2560 else
2561 {
2562 s = htab->etab.sdynbss;
2563 srel = htab->etab.srelbss;
2564 }
2565 if ((eh->root.u.def.section->flags & SEC_ALLOC) != 0 && eh->size != 0)
2566 {
2567 srel->size += sizeof (Elf32_External_Rela);
2568 eh->needs_copy = 1;
2569 }
2570
2571 return _bfd_elf_adjust_dynamic_copy (info, eh, s);
2572 }
2573
2574 /* Allocate space in .plt, .got and associated reloc sections for
2575 global syms. */
2576
2577 static bfd_boolean
2578 allocate_dynrelocs (struct elf_link_hash_entry *eh, void *inf)
2579 {
2580 struct bfd_link_info *info;
2581 struct elf_metag_link_hash_table *htab;
2582 struct elf_metag_link_hash_entry *hh;
2583 struct elf_dyn_relocs *hdh_p;
2584
2585 if (eh->root.type == bfd_link_hash_indirect)
2586 return TRUE;
2587
2588 if (eh->root.type == bfd_link_hash_warning)
2589 eh = (struct elf_link_hash_entry *) eh->root.u.i.link;
2590
2591 info = inf;
2592 htab = metag_link_hash_table (info);
2593
2594 if (htab->etab.dynamic_sections_created
2595 && eh->plt.refcount > 0)
2596 {
2597 /* Make sure this symbol is output as a dynamic symbol.
2598 Undefined weak syms won't yet be marked as dynamic. */
2599 if (eh->dynindx == -1
2600 && !eh->forced_local)
2601 {
2602 if (! bfd_elf_link_record_dynamic_symbol (info, eh))
2603 return FALSE;
2604 }
2605
2606 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, bfd_link_pic (info), eh))
2607 {
2608 asection *s = htab->etab.splt;
2609
2610 /* If this is the first .plt entry, make room for the special
2611 first entry. */
2612 if (s->size == 0)
2613 s->size += PLT_ENTRY_SIZE;
2614
2615 eh->plt.offset = s->size;
2616
2617 /* If this symbol is not defined in a regular file, and we are
2618 not generating a shared library, then set the symbol to this
2619 location in the .plt. This is required to make function
2620 pointers compare as equal between the normal executable and
2621 the shared library. */
2622 if (! bfd_link_pic (info)
2623 && !eh->def_regular)
2624 {
2625 eh->root.u.def.section = s;
2626 eh->root.u.def.value = eh->plt.offset;
2627 }
2628
2629 /* Make room for this entry. */
2630 s->size += PLT_ENTRY_SIZE;
2631
2632 /* We also need to make an entry in the .got.plt section, which
2633 will be placed in the .got section by the linker script. */
2634 htab->etab.sgotplt->size += 4;
2635
2636 /* We also need to make an entry in the .rel.plt section. */
2637 htab->etab.srelplt->size += sizeof (Elf32_External_Rela);
2638 }
2639 else
2640 {
2641 eh->plt.offset = (bfd_vma) -1;
2642 eh->needs_plt = 0;
2643 }
2644 }
2645 else
2646 {
2647 eh->plt.offset = (bfd_vma) -1;
2648 eh->needs_plt = 0;
2649 }
2650
2651 if (eh->got.refcount > 0)
2652 {
2653 asection *s;
2654 bfd_boolean dyn;
2655 int tls_type = metag_elf_hash_entry (eh)->tls_type;
2656
2657 /* Make sure this symbol is output as a dynamic symbol.
2658 Undefined weak syms won't yet be marked as dynamic. */
2659 if (eh->dynindx == -1
2660 && !eh->forced_local)
2661 {
2662 if (! bfd_elf_link_record_dynamic_symbol (info, eh))
2663 return FALSE;
2664 }
2665
2666 s = htab->etab.sgot;
2667
2668 eh->got.offset = s->size;
2669 s->size += 4;
2670 /* R_METAG_TLS_GD needs 2 consecutive GOT slots. */
2671 if (tls_type == GOT_TLS_GD)
2672 s->size += 4;
2673 dyn = htab->etab.dynamic_sections_created;
2674 /* R_METAG_TLS_IE needs one dynamic relocation if dynamic,
2675 R_METAG_TLS_GD needs one if local symbol and two if global. */
2676 if ((tls_type == GOT_TLS_GD && eh->dynindx == -1)
2677 || (tls_type == GOT_TLS_IE && dyn))
2678 htab->etab.srelgot->size += sizeof (Elf32_External_Rela);
2679 else if (tls_type == GOT_TLS_GD)
2680 htab->etab.srelgot->size += 2 * sizeof (Elf32_External_Rela);
2681 else if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
2682 bfd_link_pic (info),
2683 eh))
2684 htab->etab.srelgot->size += sizeof (Elf32_External_Rela);
2685 }
2686 else
2687 eh->got.offset = (bfd_vma) -1;
2688
2689 hh = (struct elf_metag_link_hash_entry *) eh;
2690 if (hh->dyn_relocs == NULL)
2691 return TRUE;
2692
2693 /* If this is a -Bsymbolic shared link, then we need to discard all
2694 space allocated for dynamic pc-relative relocs against symbols
2695 defined in a regular object. For the normal shared case, discard
2696 space for relocs that have become local due to symbol visibility
2697 changes. */
2698 if (bfd_link_pic (info))
2699 {
2700 if (SYMBOL_CALLS_LOCAL (info, eh))
2701 {
2702 struct elf_dyn_relocs **hdh_pp;
2703
2704 for (hdh_pp = &hh->dyn_relocs; (hdh_p = *hdh_pp) != NULL; )
2705 {
2706 hdh_p->count -= hdh_p->pc_count;
2707 hdh_p->pc_count = 0;
2708 if (hdh_p->count == 0)
2709 *hdh_pp = hdh_p->next;
2710 else
2711 hdh_pp = &hdh_p->next;
2712 }
2713 }
2714
2715 /* Also discard relocs on undefined weak syms with non-default
2716 visibility. */
2717 if (hh->dyn_relocs != NULL
2718 && eh->root.type == bfd_link_hash_undefweak)
2719 {
2720 if (ELF_ST_VISIBILITY (eh->other) != STV_DEFAULT)
2721 hh->dyn_relocs = NULL;
2722
2723 /* Make sure undefined weak symbols are output as a dynamic
2724 symbol in PIEs. */
2725 else if (eh->dynindx == -1
2726 && !eh->forced_local)
2727 {
2728 if (! bfd_elf_link_record_dynamic_symbol (info, eh))
2729 return FALSE;
2730 }
2731 }
2732 }
2733 else
2734 {
2735 /* For the non-shared case, discard space for relocs against
2736 symbols which turn out to need copy relocs or are not
2737 dynamic. */
2738 if (!eh->non_got_ref
2739 && ((eh->def_dynamic
2740 && !eh->def_regular)
2741 || (htab->etab.dynamic_sections_created
2742 && (eh->root.type == bfd_link_hash_undefweak
2743 || eh->root.type == bfd_link_hash_undefined))))
2744 {
2745 /* Make sure this symbol is output as a dynamic symbol.
2746 Undefined weak syms won't yet be marked as dynamic. */
2747 if (eh->dynindx == -1
2748 && !eh->forced_local)
2749 {
2750 if (! bfd_elf_link_record_dynamic_symbol (info, eh))
2751 return FALSE;
2752 }
2753
2754 /* If that succeeded, we know we'll be keeping all the
2755 relocs. */
2756 if (eh->dynindx != -1)
2757 goto keep;
2758 }
2759
2760 hh->dyn_relocs = NULL;
2761 return TRUE;
2762
2763 keep: ;
2764 }
2765
2766 /* Finally, allocate space. */
2767 for (hdh_p = hh->dyn_relocs; hdh_p != NULL; hdh_p = hdh_p->next)
2768 {
2769 asection *sreloc = elf_section_data (hdh_p->sec)->sreloc;
2770 sreloc->size += hdh_p->count * sizeof (Elf32_External_Rela);
2771 }
2772
2773 return TRUE;
2774 }
2775
2776 /* Set DF_TEXTREL if we find any dynamic relocs that apply to
2777 read-only sections. */
2778
2779 static bfd_boolean
2780 maybe_set_textrel (struct elf_link_hash_entry *h, void *info_p)
2781 {
2782 asection *sec;
2783
2784 if (h->root.type == bfd_link_hash_indirect)
2785 return TRUE;
2786
2787 sec = readonly_dynrelocs (h);
2788 if (sec != NULL)
2789 {
2790 struct bfd_link_info *info = (struct bfd_link_info *) info_p;
2791
2792 info->flags |= DF_TEXTREL;
2793 info->callbacks->minfo
2794 (_("%pB: dynamic relocation against `%pT' in read-only section `%pA'\n"),
2795 sec->owner, h->root.root.string, sec);
2796
2797 /* Not an error, just cut short the traversal. */
2798 return FALSE;
2799 }
2800 return TRUE;
2801 }
2802
2803 /* Set the sizes of the dynamic sections. */
2804
2805 static bfd_boolean
2806 elf_metag_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2807 struct bfd_link_info *info)
2808 {
2809 struct elf_metag_link_hash_table *htab;
2810 bfd *dynobj;
2811 bfd *ibfd;
2812 asection *s;
2813 bfd_boolean relocs;
2814
2815 htab = metag_link_hash_table (info);
2816 dynobj = htab->etab.dynobj;
2817 if (dynobj == NULL)
2818 abort ();
2819
2820 if (htab->etab.dynamic_sections_created)
2821 {
2822 /* Set the contents of the .interp section to the interpreter. */
2823 if (bfd_link_executable (info) && !info->nointerp)
2824 {
2825 s = bfd_get_linker_section (dynobj, ".interp");
2826 if (s == NULL)
2827 abort ();
2828 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2829 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2830 }
2831 }
2832
2833 /* Set up .got offsets for local syms, and space for local dynamic
2834 relocs. */
2835 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
2836 {
2837 bfd_signed_vma *local_got;
2838 bfd_signed_vma *end_local_got;
2839 bfd_size_type locsymcount;
2840 Elf_Internal_Shdr *symtab_hdr;
2841 asection *srel;
2842 char *local_tls_type;
2843
2844 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
2845 continue;
2846
2847 for (s = ibfd->sections; s != NULL; s = s->next)
2848 {
2849 struct elf_dyn_relocs *hdh_p;
2850
2851 for (hdh_p = ((struct elf_dyn_relocs *)
2852 elf_section_data (s)->local_dynrel);
2853 hdh_p != NULL;
2854 hdh_p = hdh_p->next)
2855 {
2856 if (!bfd_is_abs_section (hdh_p->sec)
2857 && bfd_is_abs_section (hdh_p->sec->output_section))
2858 {
2859 /* Input section has been discarded, either because
2860 it is a copy of a linkonce section or due to
2861 linker script /DISCARD/, so we'll be discarding
2862 the relocs too. */
2863 }
2864 else if (hdh_p->count != 0)
2865 {
2866 srel = elf_section_data (hdh_p->sec)->sreloc;
2867 srel->size += hdh_p->count * sizeof (Elf32_External_Rela);
2868 if ((hdh_p->sec->output_section->flags & SEC_READONLY) != 0)
2869 info->flags |= DF_TEXTREL;
2870 }
2871 }
2872 }
2873
2874 local_got = elf_local_got_refcounts (ibfd);
2875 if (!local_got)
2876 continue;
2877
2878 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
2879 locsymcount = symtab_hdr->sh_info;
2880 end_local_got = local_got + locsymcount;
2881 local_tls_type = metag_elf_local_got_tls_type (ibfd);
2882 s = htab->etab.sgot;
2883 srel = htab->etab.srelgot;
2884 for (; local_got < end_local_got; ++local_got)
2885 {
2886 if (*local_got > 0)
2887 {
2888 *local_got = s->size;
2889 s->size += GOT_ENTRY_SIZE;
2890 /* R_METAG_TLS_GD relocs need 2 consecutive GOT entries. */
2891 if (*local_tls_type == GOT_TLS_GD)
2892 s->size += 4;
2893 if (bfd_link_pic (info))
2894 srel->size += sizeof (Elf32_External_Rela);
2895 }
2896 else
2897 *local_got = (bfd_vma) -1;
2898 ++local_tls_type;
2899 }
2900 }
2901
2902 if (htab->tls_ldm_got.refcount > 0)
2903 {
2904 /* Allocate 2 got entries and 1 dynamic reloc for R_METAG_TLS_LDM
2905 reloc. */
2906 htab->tls_ldm_got.offset = htab->etab.sgot->size;
2907 htab->etab.sgot->size += 8;
2908 htab->etab.srelgot->size += sizeof (Elf32_External_Rela);
2909 }
2910 else
2911 htab->tls_ldm_got.offset = -1;
2912
2913 /* Allocate global sym .plt and .got entries, and space for global
2914 sym dynamic relocs. */
2915 elf_link_hash_traverse (&htab->etab, allocate_dynrelocs, info);
2916
2917 /* We now have determined the sizes of the various dynamic sections.
2918 Allocate memory for them. */
2919 relocs = FALSE;
2920 for (s = dynobj->sections; s != NULL; s = s->next)
2921 {
2922 bfd_boolean reloc_section = FALSE;
2923
2924 if ((s->flags & SEC_LINKER_CREATED) == 0)
2925 continue;
2926
2927 if (s == htab->etab.splt
2928 || s == htab->etab.sgot
2929 || s == htab->etab.sgotplt
2930 || s == htab->etab.sdynbss
2931 || s == htab->etab.sdynrelro)
2932 {
2933 /* Strip this section if we don't need it; see the
2934 comment below. */
2935 }
2936 else if (CONST_STRNEQ (bfd_get_section_name (dynobj, s), ".rela"))
2937 {
2938 if (s->size != 0 && s != htab->etab.srelplt)
2939 relocs = TRUE;
2940
2941 /* We use the reloc_count field as a counter if we need
2942 to copy relocs into the output file. */
2943 s->reloc_count = 0;
2944 reloc_section = TRUE;
2945 }
2946 else
2947 {
2948 /* It's not one of our sections, so don't allocate space. */
2949 continue;
2950 }
2951
2952 if (s->size == 0)
2953 {
2954 /* If we don't need this section, strip it from the
2955 output file. This is mostly to handle .rela.bss and
2956 .rela.plt. We must create both sections in
2957 create_dynamic_sections, because they must be created
2958 before the linker maps input sections to output
2959 sections. The linker does that before
2960 adjust_dynamic_symbol is called, and it is that
2961 function which decides whether anything needs to go
2962 into these sections. */
2963 s->flags |= SEC_EXCLUDE;
2964 continue;
2965 }
2966
2967 if ((s->flags & SEC_HAS_CONTENTS) == 0)
2968 continue;
2969
2970 /* Allocate memory for the section contents. */
2971 s->contents = bfd_zalloc (dynobj, s->size);
2972 if (s->contents == NULL)
2973 return FALSE;
2974 else if (reloc_section)
2975 {
2976 unsigned char *contents = s->contents;
2977 Elf32_External_Rela reloc;
2978
2979 /* Fill the reloc section with a R_METAG_NONE type reloc. */
2980 memset(&reloc, 0, sizeof(Elf32_External_Rela));
2981 reloc.r_info[0] = R_METAG_NONE;
2982 for (; contents < (s->contents + s->size);
2983 contents += sizeof(Elf32_External_Rela))
2984 {
2985 memcpy(contents, &reloc, sizeof(Elf32_External_Rela));
2986 }
2987 }
2988 }
2989
2990 if (htab->etab.dynamic_sections_created)
2991 {
2992 /* Add some entries to the .dynamic section. We fill in the
2993 values later, in elf_metag_finish_dynamic_sections, but we
2994 must add the entries now so that we get the correct size for
2995 the .dynamic section. The DT_DEBUG entry is filled in by the
2996 dynamic linker and used by the debugger. */
2997 #define add_dynamic_entry(TAG, VAL) \
2998 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
2999
3000 if (!add_dynamic_entry (DT_PLTGOT, 0))
3001 return FALSE;
3002
3003 if (bfd_link_executable (info))
3004 {
3005 if (!add_dynamic_entry (DT_DEBUG, 0))
3006 return FALSE;
3007 }
3008
3009 if (htab->etab.srelplt->size != 0)
3010 {
3011 if (!add_dynamic_entry (DT_PLTRELSZ, 0)
3012 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
3013 || !add_dynamic_entry (DT_JMPREL, 0))
3014 return FALSE;
3015 }
3016
3017 if (relocs)
3018 {
3019 if (!add_dynamic_entry (DT_RELA, 0)
3020 || !add_dynamic_entry (DT_RELASZ, 0)
3021 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
3022 return FALSE;
3023
3024 /* If any dynamic relocs apply to a read-only section,
3025 then we need a DT_TEXTREL entry. */
3026 if ((info->flags & DF_TEXTREL) == 0)
3027 elf_link_hash_traverse (&htab->etab, maybe_set_textrel, info);
3028
3029 if ((info->flags & DF_TEXTREL) != 0)
3030 {
3031 if (!add_dynamic_entry (DT_TEXTREL, 0))
3032 return FALSE;
3033 }
3034 }
3035 }
3036 #undef add_dynamic_entry
3037
3038 return TRUE;
3039 }
3040
3041 /* Finish up dynamic symbol handling. We set the contents of various
3042 dynamic sections here. */
3043
3044 static bfd_boolean
3045 elf_metag_finish_dynamic_symbol (bfd *output_bfd,
3046 struct bfd_link_info *info,
3047 struct elf_link_hash_entry *eh,
3048 Elf_Internal_Sym *sym)
3049 {
3050 struct elf_metag_link_hash_table *htab;
3051 Elf_Internal_Rela rel;
3052 bfd_byte *loc;
3053
3054 htab = metag_link_hash_table (info);
3055
3056 if (eh->plt.offset != (bfd_vma) -1)
3057 {
3058 asection *splt;
3059 asection *sgot;
3060 asection *srela;
3061
3062 bfd_vma plt_index;
3063 bfd_vma got_offset;
3064 bfd_vma got_entry;
3065
3066 if (eh->plt.offset & 1)
3067 abort ();
3068
3069 BFD_ASSERT (eh->dynindx != -1);
3070
3071 splt = htab->etab.splt;
3072 sgot = htab->etab.sgotplt;
3073 srela = htab->etab.srelplt;
3074 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
3075
3076 /* Get the index in the procedure linkage table which
3077 corresponds to this symbol. This is the index of this symbol
3078 in all the symbols for which we are making plt entries. The
3079 first entry in the procedure linkage table is reserved. */
3080 plt_index = eh->plt.offset / PLT_ENTRY_SIZE - 1;
3081
3082 /* Get the offset into the .got.plt table of the entry that
3083 corresponds to this function. */
3084 got_offset = plt_index * GOT_ENTRY_SIZE;
3085
3086 BFD_ASSERT (got_offset < (1 << 16));
3087
3088 got_entry = sgot->output_section->vma
3089 + sgot->output_offset
3090 + got_offset;
3091
3092 BFD_ASSERT (plt_index < (1 << 16));
3093
3094 /* Fill in the entry in the procedure linkage table. */
3095 if (! bfd_link_pic (info))
3096 {
3097 bfd_put_32 (output_bfd,
3098 (plt_entry[0]
3099 | (((got_entry >> 16) & 0xffff) << 3)),
3100 splt->contents + eh->plt.offset);
3101 bfd_put_32 (output_bfd,
3102 (plt_entry[1]
3103 | ((got_entry & 0xffff) << 3)),
3104 splt->contents + eh->plt.offset + 4);
3105 bfd_put_32 (output_bfd, plt_entry[2],
3106 splt->contents + eh->plt.offset + 8);
3107 bfd_put_32 (output_bfd,
3108 (plt_entry[3] | (plt_index << 3)),
3109 splt->contents + eh->plt.offset + 12);
3110 bfd_put_32 (output_bfd,
3111 (plt_entry[4]
3112 | ((((unsigned int) ((- (eh->plt.offset + 16)) >> 2)) & 0x7ffff) << 5)),
3113 splt->contents + eh->plt.offset + 16);
3114 }
3115 else
3116 {
3117 bfd_vma addr = got_entry - (splt->output_section->vma +
3118 splt->output_offset + eh->plt.offset);
3119
3120 bfd_put_32 (output_bfd,
3121 plt_pic_entry[0] | (((addr >> 16) & 0xffff) << 3),
3122 splt->contents + eh->plt.offset);
3123 bfd_put_32 (output_bfd,
3124 plt_pic_entry[1] | ((addr & 0xffff) << 3),
3125 splt->contents + eh->plt.offset + 4);
3126 bfd_put_32 (output_bfd, plt_pic_entry[2],
3127 splt->contents + eh->plt.offset + 8);
3128 bfd_put_32 (output_bfd,
3129 (plt_pic_entry[3] | (plt_index << 3)),
3130 splt->contents + eh->plt.offset + 12);
3131 bfd_put_32 (output_bfd,
3132 (plt_pic_entry[4]
3133 + ((((unsigned int) ((- (eh->plt.offset + 16)) >> 2)) & 0x7ffff) << 5)),
3134 splt->contents + eh->plt.offset + 16);
3135 }
3136
3137 /* Fill in the entry in the global offset table. */
3138 bfd_put_32 (output_bfd,
3139 (splt->output_section->vma
3140 + splt->output_offset
3141 + eh->plt.offset
3142 + 12), /* offset within PLT entry */
3143 sgot->contents + got_offset);
3144
3145 /* Fill in the entry in the .rela.plt section. */
3146 rel.r_offset = (sgot->output_section->vma
3147 + sgot->output_offset
3148 + got_offset);
3149 rel.r_info = ELF32_R_INFO (eh->dynindx, R_METAG_JMP_SLOT);
3150 rel.r_addend = 0;
3151 loc = htab->etab.srelplt->contents;
3152 loc += plt_index * sizeof(Elf32_External_Rela);
3153 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
3154
3155 if (!eh->def_regular)
3156 {
3157 /* Mark the symbol as undefined, rather than as defined in
3158 the .plt section. Leave the value alone. */
3159 sym->st_shndx = SHN_UNDEF;
3160 }
3161 }
3162
3163 if (eh->got.offset != (bfd_vma) -1
3164 && (metag_elf_hash_entry (eh)->tls_type & GOT_TLS_GD) == 0
3165 && (metag_elf_hash_entry (eh)->tls_type & GOT_TLS_IE) == 0)
3166 {
3167 /* This symbol has an entry in the global offset table. Set it
3168 up. */
3169
3170 rel.r_offset = ((eh->got.offset &~ (bfd_vma) 1)
3171 + htab->etab.sgot->output_offset
3172 + htab->etab.sgot->output_section->vma);
3173
3174 /* If this is a -Bsymbolic link and the symbol is defined
3175 locally or was forced to be local because of a version file,
3176 we just want to emit a RELATIVE reloc. The entry in the
3177 global offset table will already have been initialized in the
3178 relocate_section function. */
3179 if (bfd_link_pic (info)
3180 && (info->symbolic || eh->dynindx == -1)
3181 && eh->def_regular)
3182 {
3183 rel.r_info = ELF32_R_INFO (0, R_METAG_RELATIVE);
3184 rel.r_addend = (eh->root.u.def.value
3185 + eh->root.u.def.section->output_offset
3186 + eh->root.u.def.section->output_section->vma);
3187 }
3188 else
3189 {
3190 if ((eh->got.offset & 1) != 0)
3191 abort ();
3192 bfd_put_32 (output_bfd, 0, htab->etab.sgot->contents + eh->got.offset);
3193 rel.r_info = ELF32_R_INFO (eh->dynindx, R_METAG_GLOB_DAT);
3194 rel.r_addend = 0;
3195 }
3196
3197 loc = htab->etab.srelgot->contents;
3198 loc += htab->etab.srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
3199 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
3200 }
3201
3202 if (eh->needs_copy)
3203 {
3204 asection *s;
3205
3206 /* This symbol needs a copy reloc. Set it up. */
3207
3208 if (! (eh->dynindx != -1
3209 && (eh->root.type == bfd_link_hash_defined
3210 || eh->root.type == bfd_link_hash_defweak)))
3211 abort ();
3212
3213 rel.r_offset = (eh->root.u.def.value
3214 + eh->root.u.def.section->output_offset
3215 + eh->root.u.def.section->output_section->vma);
3216 rel.r_addend = 0;
3217 rel.r_info = ELF32_R_INFO (eh->dynindx, R_METAG_COPY);
3218 if (eh->root.u.def.section == htab->etab.sdynrelro)
3219 s = htab->etab.sreldynrelro;
3220 else
3221 s = htab->etab.srelbss;
3222 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
3223 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
3224 }
3225
3226 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
3227 if (eh->root.root.string[0] == '_'
3228 && (strcmp (eh->root.root.string, "_DYNAMIC") == 0
3229 || eh == htab->etab.hgot))
3230 {
3231 sym->st_shndx = SHN_ABS;
3232 }
3233
3234 return TRUE;
3235 }
3236
3237 /* Set the Meta ELF ABI version. */
3238
3239 static void
3240 elf_metag_post_process_headers (bfd * abfd, struct bfd_link_info * link_info)
3241 {
3242 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
3243
3244 _bfd_elf_post_process_headers (abfd, link_info);
3245 i_ehdrp = elf_elfheader (abfd);
3246 i_ehdrp->e_ident[EI_ABIVERSION] = METAG_ELF_ABI_VERSION;
3247 }
3248
3249 /* Used to decide how to sort relocs in an optimal manner for the
3250 dynamic linker, before writing them out. */
3251
3252 static enum elf_reloc_type_class
3253 elf_metag_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
3254 const asection *rel_sec ATTRIBUTE_UNUSED,
3255 const Elf_Internal_Rela *rela)
3256 {
3257 switch ((int) ELF32_R_TYPE (rela->r_info))
3258 {
3259 case R_METAG_RELATIVE:
3260 return reloc_class_relative;
3261 case R_METAG_JMP_SLOT:
3262 return reloc_class_plt;
3263 case R_METAG_COPY:
3264 return reloc_class_copy;
3265 default:
3266 return reloc_class_normal;
3267 }
3268 }
3269
3270 /* Finish up the dynamic sections. */
3271
3272 static bfd_boolean
3273 elf_metag_finish_dynamic_sections (bfd *output_bfd,
3274 struct bfd_link_info *info)
3275 {
3276 bfd *dynobj;
3277 struct elf_metag_link_hash_table *htab;
3278 asection *sdyn;
3279
3280 htab = metag_link_hash_table (info);
3281 dynobj = htab->etab.dynobj;
3282
3283 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
3284
3285 if (htab->etab.dynamic_sections_created)
3286 {
3287 asection *splt;
3288 Elf32_External_Dyn *dyncon, *dynconend;
3289
3290 if (sdyn == NULL)
3291 abort ();
3292
3293 dyncon = (Elf32_External_Dyn *) sdyn->contents;
3294 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
3295 for (; dyncon < dynconend; dyncon++)
3296 {
3297 Elf_Internal_Dyn dyn;
3298 asection *s;
3299
3300 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
3301
3302 switch (dyn.d_tag)
3303 {
3304 default:
3305 continue;
3306
3307 case DT_PLTGOT:
3308 s = htab->etab.sgot;
3309 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3310 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
3311 break;
3312
3313 case DT_JMPREL:
3314 s = htab->etab.srelplt;
3315 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3316 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
3317 break;
3318
3319 case DT_PLTRELSZ:
3320 s = htab->etab.srelplt;
3321 dyn.d_un.d_val = s->size;
3322 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
3323 break;
3324 }
3325
3326 }
3327
3328 /* Fill in the first entry in the procedure linkage table. */
3329 splt = htab->etab.splt;
3330 if (splt && splt->size > 0)
3331 {
3332 unsigned long addr;
3333 /* addr = .got + 4 */
3334 addr = (htab->etab.sgot->output_section->vma
3335 + htab->etab.sgot->output_offset + 4);
3336 if (bfd_link_pic (info))
3337 {
3338 addr -= splt->output_section->vma + splt->output_offset;
3339 bfd_put_32 (output_bfd,
3340 plt0_pic_entry[0] | (((addr >> 16) & 0xffff) << 3),
3341 splt->contents);
3342 bfd_put_32 (output_bfd,
3343 plt0_pic_entry[1] | ((addr & 0xffff) << 3),
3344 splt->contents + 4);
3345 bfd_put_32 (output_bfd, plt0_pic_entry[2], splt->contents + 8);
3346 bfd_put_32 (output_bfd, plt0_pic_entry[3], splt->contents + 12);
3347 bfd_put_32 (output_bfd, plt0_pic_entry[4], splt->contents + 16);
3348 }
3349 else
3350 {
3351 bfd_put_32 (output_bfd,
3352 plt0_entry[0] | (((addr >> 16) & 0xffff) << 3),
3353 splt->contents);
3354 bfd_put_32 (output_bfd,
3355 plt0_entry[1] | ((addr & 0xffff) << 3),
3356 splt->contents + 4);
3357 bfd_put_32 (output_bfd, plt0_entry[2], splt->contents + 8);
3358 bfd_put_32 (output_bfd, plt0_entry[3], splt->contents + 12);
3359 bfd_put_32 (output_bfd, plt0_entry[4], splt->contents + 16);
3360 }
3361
3362 elf_section_data (splt->output_section)->this_hdr.sh_entsize =
3363 PLT_ENTRY_SIZE;
3364 }
3365 }
3366
3367 if (htab->etab.sgot != NULL && htab->etab.sgot->size != 0)
3368 {
3369 /* Fill in the first entry in the global offset table.
3370 We use it to point to our dynamic section, if we have one. */
3371 bfd_put_32 (output_bfd,
3372 sdyn ? sdyn->output_section->vma + sdyn->output_offset : 0,
3373 htab->etab.sgot->contents);
3374
3375 /* The second entry is reserved for use by the dynamic linker. */
3376 memset (htab->etab.sgot->contents + GOT_ENTRY_SIZE, 0, GOT_ENTRY_SIZE);
3377
3378 /* Set .got entry size. */
3379 elf_section_data (htab->etab.sgot->output_section)
3380 ->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
3381 }
3382
3383 return TRUE;
3384 }
3385
3386 /* Return the section that should be marked against GC for a given
3387 relocation. */
3388
3389 static asection *
3390 elf_metag_gc_mark_hook (asection *sec,
3391 struct bfd_link_info *info,
3392 Elf_Internal_Rela *rela,
3393 struct elf_link_hash_entry *hh,
3394 Elf_Internal_Sym *sym)
3395 {
3396 if (hh != NULL)
3397 switch ((unsigned int) ELF32_R_TYPE (rela->r_info))
3398 {
3399 case R_METAG_GNU_VTINHERIT:
3400 case R_METAG_GNU_VTENTRY:
3401 return NULL;
3402 }
3403
3404 return _bfd_elf_gc_mark_hook (sec, info, rela, hh, sym);
3405 }
3406
3407 /* Determine the type of stub needed, if any, for a call. */
3408
3409 static enum elf_metag_stub_type
3410 metag_type_of_stub (asection *input_sec,
3411 const Elf_Internal_Rela *rel,
3412 struct elf_metag_link_hash_entry *hh,
3413 bfd_vma destination,
3414 struct bfd_link_info *info ATTRIBUTE_UNUSED)
3415 {
3416 bfd_vma location;
3417 bfd_vma branch_offset;
3418 bfd_vma max_branch_offset;
3419
3420 if (hh != NULL &&
3421 !(hh->eh.root.type == bfd_link_hash_defined
3422 || hh->eh.root.type == bfd_link_hash_defweak))
3423 return metag_stub_none;
3424
3425 /* Determine where the call point is. */
3426 location = (input_sec->output_offset
3427 + input_sec->output_section->vma
3428 + rel->r_offset);
3429
3430 branch_offset = destination - location;
3431
3432 /* Determine if a long branch stub is needed. Meta branch offsets
3433 are signed 19 bits 4 byte aligned. */
3434 max_branch_offset = (1 << (BRANCH_BITS-1)) << 2;
3435
3436 if (branch_offset + max_branch_offset >= 2*max_branch_offset)
3437 {
3438 if (bfd_link_pic (info))
3439 return metag_stub_long_branch_shared;
3440 else
3441 return metag_stub_long_branch;
3442 }
3443
3444 return metag_stub_none;
3445 }
3446
3447 #define MOVT_A0_3 0x82180005
3448 #define JUMP_A0_3 0xac180003
3449
3450 #define MOVT_A1LBP 0x83080005
3451 #define ADD_A1LBP 0x83080000
3452
3453 #define ADDT_A0_3_CPC 0x82980001
3454 #define ADD_A0_3_A0_3 0x82180000
3455 #define MOV_PC_A0_3 0xa3180ca0
3456
3457 static bfd_boolean
3458 metag_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg ATTRIBUTE_UNUSED)
3459 {
3460 struct elf_metag_stub_hash_entry *hsh;
3461 asection *stub_sec;
3462 bfd *stub_bfd;
3463 bfd_byte *loc;
3464 bfd_vma sym_value;
3465 int size;
3466
3467 /* Massage our args to the form they really have. */
3468 hsh = (struct elf_metag_stub_hash_entry *) gen_entry;
3469
3470 stub_sec = hsh->stub_sec;
3471
3472 /* Make a note of the offset within the stubs for this entry. */
3473 hsh->stub_offset = stub_sec->size;
3474 loc = stub_sec->contents + hsh->stub_offset;
3475
3476 stub_bfd = stub_sec->owner;
3477
3478 switch (hsh->stub_type)
3479 {
3480 case metag_stub_long_branch_shared:
3481 /* A PIC long branch stub is an ADDT and an ADD instruction used to
3482 calculate the jump target using A0.3 as a temporary. Then a MOV
3483 to PC carries out the jump. */
3484 sym_value = (hsh->target_value
3485 + hsh->target_section->output_offset
3486 + hsh->target_section->output_section->vma
3487 + hsh->addend);
3488
3489 sym_value -= (hsh->stub_offset
3490 + stub_sec->output_offset
3491 + stub_sec->output_section->vma);
3492
3493 bfd_put_32 (stub_bfd, ADDT_A0_3_CPC | (((sym_value >> 16) & 0xffff) << 3),
3494 loc);
3495
3496 bfd_put_32 (stub_bfd, ADD_A0_3_A0_3 | ((sym_value & 0xffff) << 3),
3497 loc + 4);
3498
3499 bfd_put_32 (stub_bfd, MOV_PC_A0_3, loc + 8);
3500
3501 size = 12;
3502 break;
3503 case metag_stub_long_branch:
3504 /* A standard long branch stub is a MOVT instruction followed by a
3505 JUMP instruction using the A0.3 register as a temporary. This is
3506 the same method used by the LDLK linker (patch.c). */
3507 sym_value = (hsh->target_value
3508 + hsh->target_section->output_offset
3509 + hsh->target_section->output_section->vma
3510 + hsh->addend);
3511
3512 bfd_put_32 (stub_bfd, MOVT_A0_3 | (((sym_value >> 16) & 0xffff) << 3),
3513 loc);
3514
3515 bfd_put_32 (stub_bfd, JUMP_A0_3 | ((sym_value & 0xffff) << 3), loc + 4);
3516
3517 size = 8;
3518 break;
3519 default:
3520 BFD_FAIL ();
3521 return FALSE;
3522 }
3523
3524 stub_sec->size += size;
3525 return TRUE;
3526 }
3527
3528 /* As above, but don't actually build the stub. Just bump offset so
3529 we know stub section sizes. */
3530
3531 static bfd_boolean
3532 metag_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg ATTRIBUTE_UNUSED)
3533 {
3534 struct elf_metag_stub_hash_entry *hsh;
3535 int size = 0;
3536
3537 /* Massage our args to the form they really have. */
3538 hsh = (struct elf_metag_stub_hash_entry *) gen_entry;
3539
3540 if (hsh->stub_type == metag_stub_long_branch)
3541 size = 8;
3542 else if (hsh->stub_type == metag_stub_long_branch_shared)
3543 size = 12;
3544
3545 hsh->stub_sec->size += size;
3546 return TRUE;
3547 }
3548
3549 /* Set up various things so that we can make a list of input sections
3550 for each output section included in the link. Returns -1 on error,
3551 0 when no stubs will be needed, and 1 on success. */
3552
3553 int
3554 elf_metag_setup_section_lists (bfd *output_bfd, struct bfd_link_info *info)
3555 {
3556 bfd *input_bfd;
3557 unsigned int bfd_count;
3558 unsigned int top_id, top_index;
3559 asection *section;
3560 asection **input_list, **list;
3561 bfd_size_type amt;
3562 struct elf_metag_link_hash_table *htab = metag_link_hash_table (info);
3563
3564 /* Count the number of input BFDs and find the top input section id. */
3565 for (input_bfd = info->input_bfds, bfd_count = 0, top_id = 0;
3566 input_bfd != NULL;
3567 input_bfd = input_bfd->link.next)
3568 {
3569 bfd_count += 1;
3570 for (section = input_bfd->sections;
3571 section != NULL;
3572 section = section->next)
3573 {
3574 if (top_id < section->id)
3575 top_id = section->id;
3576 }
3577 }
3578
3579 htab->bfd_count = bfd_count;
3580
3581 amt = sizeof (struct map_stub) * (top_id + 1);
3582 htab->stub_group = bfd_zmalloc (amt);
3583 if (htab->stub_group == NULL)
3584 return -1;
3585
3586 /* We can't use output_bfd->section_count here to find the top output
3587 section index as some sections may have been removed, and
3588 strip_excluded_output_sections doesn't renumber the indices. */
3589 for (section = output_bfd->sections, top_index = 0;
3590 section != NULL;
3591 section = section->next)
3592 {
3593 if (top_index < section->index)
3594 top_index = section->index;
3595 }
3596
3597 htab->top_index = top_index;
3598 amt = sizeof (asection *) * (top_index + 1);
3599 input_list = bfd_malloc (amt);
3600 htab->input_list = input_list;
3601 if (input_list == NULL)
3602 return -1;
3603
3604 /* For sections we aren't interested in, mark their entries with a
3605 value we can check later. */
3606 list = input_list + top_index;
3607 do
3608 *list = bfd_abs_section_ptr;
3609 while (list-- != input_list);
3610
3611 for (section = output_bfd->sections;
3612 section != NULL;
3613 section = section->next)
3614 {
3615 /* FIXME: This is a bit of hack. Currently our .ctors and .dtors
3616 * have PC relative relocs in them but no code flag set. */
3617 if (((section->flags & SEC_CODE) != 0) ||
3618 strcmp(".ctors", section->name) ||
3619 strcmp(".dtors", section->name))
3620 input_list[section->index] = NULL;
3621 }
3622
3623 return 1;
3624 }
3625
3626 /* The linker repeatedly calls this function for each input section,
3627 in the order that input sections are linked into output sections.
3628 Build lists of input sections to determine groupings between which
3629 we may insert linker stubs. */
3630
3631 void
3632 elf_metag_next_input_section (struct bfd_link_info *info, asection *isec)
3633 {
3634 struct elf_metag_link_hash_table *htab = metag_link_hash_table (info);
3635
3636 if (isec->output_section->index <= htab->top_index)
3637 {
3638 asection **list = htab->input_list + isec->output_section->index;
3639 if (*list != bfd_abs_section_ptr)
3640 {
3641 /* Steal the link_sec pointer for our list. */
3642 #define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
3643 /* This happens to make the list in reverse order,
3644 which is what we want. */
3645 PREV_SEC (isec) = *list;
3646 *list = isec;
3647 }
3648 }
3649 }
3650
3651 /* See whether we can group stub sections together. Grouping stub
3652 sections may result in fewer stubs. More importantly, we need to
3653 put all .init* and .fini* stubs at the beginning of the .init or
3654 .fini output sections respectively, because glibc splits the
3655 _init and _fini functions into multiple parts. Putting a stub in
3656 the middle of a function is not a good idea. */
3657
3658 static void
3659 group_sections (struct elf_metag_link_hash_table *htab,
3660 bfd_size_type stub_group_size,
3661 bfd_boolean stubs_always_before_branch)
3662 {
3663 asection **list = htab->input_list + htab->top_index;
3664 do
3665 {
3666 asection *tail = *list;
3667 if (tail == bfd_abs_section_ptr)
3668 continue;
3669 while (tail != NULL)
3670 {
3671 asection *curr;
3672 asection *prev;
3673 bfd_size_type total;
3674 bfd_boolean big_sec;
3675
3676 curr = tail;
3677 total = tail->size;
3678 big_sec = total >= stub_group_size;
3679
3680 while ((prev = PREV_SEC (curr)) != NULL
3681 && ((total += curr->output_offset - prev->output_offset)
3682 < stub_group_size))
3683 curr = prev;
3684
3685 /* OK, the size from the start of CURR to the end is less
3686 than stub_group_size bytes and thus can be handled by one stub
3687 section. (or the tail section is itself larger than
3688 stub_group_size bytes, in which case we may be toast.)
3689 We should really be keeping track of the total size of
3690 stubs added here, as stubs contribute to the final output
3691 section size. */
3692 do
3693 {
3694 prev = PREV_SEC (tail);
3695 /* Set up this stub group. */
3696 htab->stub_group[tail->id].link_sec = curr;
3697 }
3698 while (tail != curr && (tail = prev) != NULL);
3699
3700 /* But wait, there's more! Input sections up to stub_group_size
3701 bytes before the stub section can be handled by it too.
3702 Don't do this if we have a really large section after the
3703 stubs, as adding more stubs increases the chance that
3704 branches may not reach into the stub section. */
3705 if (!stubs_always_before_branch && !big_sec)
3706 {
3707 total = 0;
3708 while (prev != NULL
3709 && ((total += tail->output_offset - prev->output_offset)
3710 < stub_group_size))
3711 {
3712 tail = prev;
3713 prev = PREV_SEC (tail);
3714 htab->stub_group[tail->id].link_sec = curr;
3715 }
3716 }
3717 tail = prev;
3718 }
3719 }
3720 while (list-- != htab->input_list);
3721 free (htab->input_list);
3722 #undef PREV_SEC
3723 }
3724
3725 /* Read in all local syms for all input bfds.
3726 Returns -1 on error, 0 otherwise. */
3727
3728 static int
3729 get_local_syms (bfd *output_bfd ATTRIBUTE_UNUSED, bfd *input_bfd,
3730 struct bfd_link_info *info)
3731 {
3732 unsigned int bfd_indx;
3733 Elf_Internal_Sym *local_syms, **all_local_syms;
3734 int stub_changed = 0;
3735 struct elf_metag_link_hash_table *htab = metag_link_hash_table (info);
3736
3737 /* We want to read in symbol extension records only once. To do this
3738 we need to read in the local symbols in parallel and save them for
3739 later use; so hold pointers to the local symbols in an array. */
3740 bfd_size_type amt = sizeof (Elf_Internal_Sym *) * htab->bfd_count;
3741 all_local_syms = bfd_zmalloc (amt);
3742 htab->all_local_syms = all_local_syms;
3743 if (all_local_syms == NULL)
3744 return -1;
3745
3746 /* Walk over all the input BFDs, swapping in local symbols. */
3747 for (bfd_indx = 0;
3748 input_bfd != NULL;
3749 input_bfd = input_bfd->link.next, bfd_indx++)
3750 {
3751 Elf_Internal_Shdr *symtab_hdr;
3752
3753 /* We'll need the symbol table in a second. */
3754 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3755 if (symtab_hdr->sh_info == 0)
3756 continue;
3757
3758 /* We need an array of the local symbols attached to the input bfd. */
3759 local_syms = (Elf_Internal_Sym *) symtab_hdr->contents;
3760 if (local_syms == NULL)
3761 {
3762 local_syms = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
3763 symtab_hdr->sh_info, 0,
3764 NULL, NULL, NULL);
3765 /* Cache them for elf_link_input_bfd. */
3766 symtab_hdr->contents = (unsigned char *) local_syms;
3767 }
3768 if (local_syms == NULL)
3769 return -1;
3770
3771 all_local_syms[bfd_indx] = local_syms;
3772 }
3773
3774 return stub_changed;
3775 }
3776
3777 /* Determine and set the size of the stub section for a final link.
3778
3779 The basic idea here is to examine all the relocations looking for
3780 PC-relative calls to a target that is unreachable with a "CALLR"
3781 instruction. */
3782
3783 /* See elf32-hppa.c and elf64-ppc.c. */
3784
3785 bfd_boolean
3786 elf_metag_size_stubs(bfd *output_bfd, bfd *stub_bfd,
3787 struct bfd_link_info *info,
3788 bfd_signed_vma group_size,
3789 asection * (*add_stub_section) (const char *, asection *),
3790 void (*layout_sections_again) (void))
3791 {
3792 bfd_size_type stub_group_size;
3793 bfd_boolean stubs_always_before_branch;
3794 bfd_boolean stub_changed;
3795 struct elf_metag_link_hash_table *htab = metag_link_hash_table (info);
3796
3797 /* Stash our params away. */
3798 htab->stub_bfd = stub_bfd;
3799 htab->add_stub_section = add_stub_section;
3800 htab->layout_sections_again = layout_sections_again;
3801 stubs_always_before_branch = group_size < 0;
3802 if (group_size < 0)
3803 stub_group_size = -group_size;
3804 else
3805 stub_group_size = group_size;
3806 if (stub_group_size == 1)
3807 {
3808 /* Default values. */
3809 /* FIXME: not sure what these values should be */
3810 if (stubs_always_before_branch)
3811 {
3812 stub_group_size = (1 << BRANCH_BITS);
3813 }
3814 else
3815 {
3816 stub_group_size = (1 << BRANCH_BITS);
3817 }
3818 }
3819
3820 group_sections (htab, stub_group_size, stubs_always_before_branch);
3821
3822 switch (get_local_syms (output_bfd, info->input_bfds, info))
3823 {
3824 default:
3825 if (htab->all_local_syms)
3826 goto error_ret_free_local;
3827 return FALSE;
3828
3829 case 0:
3830 stub_changed = FALSE;
3831 break;
3832
3833 case 1:
3834 stub_changed = TRUE;
3835 break;
3836 }
3837
3838 while (1)
3839 {
3840 bfd *input_bfd;
3841 unsigned int bfd_indx;
3842 asection *stub_sec;
3843
3844 for (input_bfd = info->input_bfds, bfd_indx = 0;
3845 input_bfd != NULL;
3846 input_bfd = input_bfd->link.next, bfd_indx++)
3847 {
3848 Elf_Internal_Shdr *symtab_hdr;
3849 asection *section;
3850 Elf_Internal_Sym *local_syms;
3851
3852 /* We'll need the symbol table in a second. */
3853 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3854 if (symtab_hdr->sh_info == 0)
3855 continue;
3856
3857 local_syms = htab->all_local_syms[bfd_indx];
3858
3859 /* Walk over each section attached to the input bfd. */
3860 for (section = input_bfd->sections;
3861 section != NULL;
3862 section = section->next)
3863 {
3864 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
3865
3866 /* If there aren't any relocs, then there's nothing more
3867 to do. */
3868 if ((section->flags & SEC_RELOC) == 0
3869 || section->reloc_count == 0)
3870 continue;
3871
3872 /* If this section is a link-once section that will be
3873 discarded, then don't create any stubs. */
3874 if (section->output_section == NULL
3875 || section->output_section->owner != output_bfd)
3876 continue;
3877
3878 /* Get the relocs. */
3879 internal_relocs
3880 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
3881 info->keep_memory);
3882 if (internal_relocs == NULL)
3883 goto error_ret_free_local;
3884
3885 /* Now examine each relocation. */
3886 irela = internal_relocs;
3887 irelaend = irela + section->reloc_count;
3888 for (; irela < irelaend; irela++)
3889 {
3890 unsigned int r_type, r_indx;
3891 enum elf_metag_stub_type stub_type;
3892 struct elf_metag_stub_hash_entry *hsh;
3893 asection *sym_sec;
3894 bfd_vma sym_value;
3895 bfd_vma destination;
3896 struct elf_metag_link_hash_entry *hh;
3897 char *stub_name;
3898 const asection *id_sec;
3899
3900 r_type = ELF32_R_TYPE (irela->r_info);
3901 r_indx = ELF32_R_SYM (irela->r_info);
3902
3903 if (r_type >= (unsigned int) R_METAG_MAX)
3904 {
3905 bfd_set_error (bfd_error_bad_value);
3906 error_ret_free_internal:
3907 if (elf_section_data (section)->relocs == NULL)
3908 free (internal_relocs);
3909 goto error_ret_free_local;
3910 }
3911
3912 /* Only look for stubs on CALLR and B instructions. */
3913 if (!(r_type == (unsigned int) R_METAG_RELBRANCH ||
3914 r_type == (unsigned int) R_METAG_RELBRANCH_PLT))
3915 continue;
3916
3917 /* Now determine the call target, its name, value,
3918 section. */
3919 sym_sec = NULL;
3920 sym_value = 0;
3921 destination = 0;
3922 hh = NULL;
3923 if (r_indx < symtab_hdr->sh_info)
3924 {
3925 /* It's a local symbol. */
3926 Elf_Internal_Sym *sym;
3927 Elf_Internal_Shdr *hdr;
3928 unsigned int shndx;
3929
3930 sym = local_syms + r_indx;
3931 if (ELF_ST_TYPE (sym->st_info) != STT_SECTION)
3932 sym_value = sym->st_value;
3933 shndx = sym->st_shndx;
3934 if (shndx < elf_numsections (input_bfd))
3935 {
3936 hdr = elf_elfsections (input_bfd)[shndx];
3937 sym_sec = hdr->bfd_section;
3938 destination = (sym_value + irela->r_addend
3939 + sym_sec->output_offset
3940 + sym_sec->output_section->vma);
3941 }
3942 }
3943 else
3944 {
3945 /* It's an external symbol. */
3946 int e_indx;
3947
3948 e_indx = r_indx - symtab_hdr->sh_info;
3949 hh = ((struct elf_metag_link_hash_entry *)
3950 elf_sym_hashes (input_bfd)[e_indx]);
3951
3952 while (hh->eh.root.type == bfd_link_hash_indirect
3953 || hh->eh.root.type == bfd_link_hash_warning)
3954 hh = ((struct elf_metag_link_hash_entry *)
3955 hh->eh.root.u.i.link);
3956
3957 if (hh->eh.root.type == bfd_link_hash_defined
3958 || hh->eh.root.type == bfd_link_hash_defweak)
3959 {
3960 sym_sec = hh->eh.root.u.def.section;
3961 sym_value = hh->eh.root.u.def.value;
3962 if (hh->eh.plt.offset != (bfd_vma) -1
3963 && hh->eh.dynindx != -1
3964 && r_type == (unsigned int) R_METAG_RELBRANCH_PLT)
3965 {
3966 sym_sec = htab->etab.splt;
3967 sym_value = hh->eh.plt.offset;
3968 }
3969
3970 if (sym_sec->output_section != NULL)
3971 destination = (sym_value + irela->r_addend
3972 + sym_sec->output_offset
3973 + sym_sec->output_section->vma);
3974 else
3975 continue;
3976 }
3977 else if (hh->eh.root.type == bfd_link_hash_undefweak)
3978 {
3979 if (! bfd_link_pic (info))
3980 continue;
3981 }
3982 else if (hh->eh.root.type == bfd_link_hash_undefined)
3983 {
3984 if (! (info->unresolved_syms_in_objects == RM_IGNORE
3985 && (ELF_ST_VISIBILITY (hh->eh.other)
3986 == STV_DEFAULT)))
3987 continue;
3988 }
3989 else
3990 {
3991 bfd_set_error (bfd_error_bad_value);
3992 goto error_ret_free_internal;
3993 }
3994 }
3995
3996 /* Determine what (if any) linker stub is needed. */
3997 stub_type = metag_type_of_stub (section, irela, hh,
3998 destination, info);
3999 if (stub_type == metag_stub_none)
4000 continue;
4001
4002 /* Support for grouping stub sections. */
4003 id_sec = htab->stub_group[section->id].link_sec;
4004
4005 /* Get the name of this stub. */
4006 stub_name = metag_stub_name (id_sec, sym_sec, hh, irela);
4007 if (!stub_name)
4008 goto error_ret_free_internal;
4009
4010 hsh = metag_stub_hash_lookup (&htab->bstab,
4011 stub_name,
4012 FALSE, FALSE);
4013 if (hsh != NULL)
4014 {
4015 /* The proper stub has already been created. */
4016 free (stub_name);
4017 continue;
4018 }
4019
4020 hsh = metag_add_stub (stub_name, section, htab);
4021 if (hsh == NULL)
4022 {
4023 free (stub_name);
4024 goto error_ret_free_internal;
4025 }
4026 hsh->target_value = sym_value;
4027 hsh->target_section = sym_sec;
4028 hsh->stub_type = stub_type;
4029 hsh->hh = hh;
4030 hsh->addend = irela->r_addend;
4031 stub_changed = TRUE;
4032 }
4033
4034 /* We're done with the internal relocs, free them. */
4035 if (elf_section_data (section)->relocs == NULL)
4036 free (internal_relocs);
4037 }
4038 }
4039
4040 if (!stub_changed)
4041 break;
4042
4043 /* OK, we've added some stubs. Find out the new size of the
4044 stub sections. */
4045 for (stub_sec = htab->stub_bfd->sections;
4046 stub_sec != NULL;
4047 stub_sec = stub_sec->next)
4048 stub_sec->size = 0;
4049
4050 bfd_hash_traverse (&htab->bstab, metag_size_one_stub, htab);
4051
4052 /* Ask the linker to do its stuff. */
4053 (*htab->layout_sections_again) ();
4054 stub_changed = FALSE;
4055 }
4056
4057 free (htab->all_local_syms);
4058 return TRUE;
4059
4060 error_ret_free_local:
4061 free (htab->all_local_syms);
4062 return FALSE;
4063 }
4064
4065 /* Build all the stubs associated with the current output file. The
4066 stubs are kept in a hash table attached to the main linker hash
4067 table. This function is called via metagelf_finish in the linker. */
4068
4069 bfd_boolean
4070 elf_metag_build_stubs (struct bfd_link_info *info)
4071 {
4072 asection *stub_sec;
4073 struct bfd_hash_table *table;
4074 struct elf_metag_link_hash_table *htab;
4075
4076 htab = metag_link_hash_table (info);
4077
4078 for (stub_sec = htab->stub_bfd->sections;
4079 stub_sec != NULL;
4080 stub_sec = stub_sec->next)
4081 {
4082 bfd_size_type size;
4083
4084 /* Allocate memory to hold the linker stubs. */
4085 size = stub_sec->size;
4086 stub_sec->contents = bfd_zalloc (htab->stub_bfd, size);
4087 if (stub_sec->contents == NULL && size != 0)
4088 return FALSE;
4089 stub_sec->size = 0;
4090 }
4091
4092 /* Build the stubs as directed by the stub hash table. */
4093 table = &htab->bstab;
4094 bfd_hash_traverse (table, metag_build_one_stub, info);
4095
4096 return TRUE;
4097 }
4098
4099 /* Return TRUE if SYM represents a local label symbol. */
4100
4101 static bfd_boolean
4102 elf_metag_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
4103 {
4104 if (name[0] == '$' && name[1] == 'L')
4105 return 1;
4106 return _bfd_elf_is_local_label_name (abfd, name);
4107 }
4108
4109 /* Return address for Ith PLT stub in section PLT, for relocation REL
4110 or (bfd_vma) -1 if it should not be included. */
4111
4112 static bfd_vma
4113 elf_metag_plt_sym_val (bfd_vma i, const asection *plt,
4114 const arelent *rel ATTRIBUTE_UNUSED)
4115 {
4116 return plt->vma + (i + 1) * PLT_ENTRY_SIZE;
4117 }
4118
4119 #define ELF_ARCH bfd_arch_metag
4120 #define ELF_TARGET_ID METAG_ELF_DATA
4121 #define ELF_MACHINE_CODE EM_METAG
4122 #define ELF_MINPAGESIZE 0x1000
4123 #define ELF_MAXPAGESIZE 0x4000
4124 #define ELF_COMMONPAGESIZE 0x1000
4125
4126 #define TARGET_LITTLE_SYM metag_elf32_vec
4127 #define TARGET_LITTLE_NAME "elf32-metag"
4128
4129 #define elf_symbol_leading_char '_'
4130
4131 #define elf_info_to_howto_rel NULL
4132 #define elf_info_to_howto metag_info_to_howto_rela
4133
4134 #define bfd_elf32_bfd_is_local_label_name elf_metag_is_local_label_name
4135 #define bfd_elf32_bfd_link_hash_table_create \
4136 elf_metag_link_hash_table_create
4137 #define elf_backend_relocate_section elf_metag_relocate_section
4138 #define elf_backend_gc_mark_hook elf_metag_gc_mark_hook
4139 #define elf_backend_check_relocs elf_metag_check_relocs
4140 #define elf_backend_create_dynamic_sections elf_metag_create_dynamic_sections
4141 #define elf_backend_adjust_dynamic_symbol elf_metag_adjust_dynamic_symbol
4142 #define elf_backend_finish_dynamic_symbol elf_metag_finish_dynamic_symbol
4143 #define elf_backend_finish_dynamic_sections elf_metag_finish_dynamic_sections
4144 #define elf_backend_size_dynamic_sections elf_metag_size_dynamic_sections
4145 #define elf_backend_omit_section_dynsym \
4146 _bfd_elf_omit_section_dynsym_all
4147 #define elf_backend_post_process_headers elf_metag_post_process_headers
4148 #define elf_backend_reloc_type_class elf_metag_reloc_type_class
4149 #define elf_backend_copy_indirect_symbol elf_metag_copy_indirect_symbol
4150 #define elf_backend_plt_sym_val elf_metag_plt_sym_val
4151
4152 #define elf_backend_can_gc_sections 1
4153 #define elf_backend_can_refcount 1
4154 #define elf_backend_rela_normal 1
4155 #define elf_backend_want_got_plt 1
4156 #define elf_backend_want_got_sym 0
4157 #define elf_backend_want_plt_sym 0
4158 #define elf_backend_plt_readonly 1
4159 #define elf_backend_dtrel_excludes_plt 1
4160 #define elf_backend_want_dynrelro 1
4161
4162 #define bfd_elf32_bfd_reloc_type_lookup metag_reloc_type_lookup
4163 #define bfd_elf32_bfd_reloc_name_lookup metag_reloc_name_lookup
4164
4165 #include "elf32-target.h"
This page took 0.146609 seconds and 4 git commands to generate.