1 /* Renesas / SuperH SH specific support for 32-bit ELF
2 Copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005
3 Free Software Foundation, Inc.
4 Contributed by Ian Lance Taylor, Cygnus Support.
6 This file is part of BFD, the Binary File Descriptor library.
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
28 #include "libiberty.h"
29 #include "../opcodes/sh-opc.h"
31 static bfd_reloc_status_type sh_elf_reloc
32 (bfd
*, arelent
*, asymbol
*, void *, asection
*, bfd
*, char **);
33 static bfd_reloc_status_type sh_elf_ignore_reloc
34 (bfd
*, arelent
*, asymbol
*, void *, asection
*, bfd
*, char **);
35 static bfd_boolean sh_elf_relax_delete_bytes
36 (bfd
*, asection
*, bfd_vma
, int);
37 static bfd_boolean sh_elf_align_loads
38 (bfd
*, asection
*, Elf_Internal_Rela
*, bfd_byte
*, bfd_boolean
*);
40 static bfd_boolean sh_elf_swap_insns
41 (bfd
*, asection
*, void *, bfd_byte
*, bfd_vma
);
43 static int sh_elf_optimized_tls_reloc
44 (struct bfd_link_info
*, int, int);
45 static bfd_vma dtpoff_base
46 (struct bfd_link_info
*);
48 (struct bfd_link_info
*, bfd_vma
);
50 /* The name of the dynamic interpreter. This is put in the .interp
53 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/libc.so.1"
55 static reloc_howto_type sh_elf_howto_table
[] =
58 HOWTO (R_SH_NONE
, /* type */
60 0, /* size (0 = byte, 1 = short, 2 = long) */
62 FALSE
, /* pc_relative */
64 complain_overflow_dont
, /* complain_on_overflow */
65 sh_elf_ignore_reloc
, /* special_function */
66 "R_SH_NONE", /* name */
67 FALSE
, /* partial_inplace */
70 FALSE
), /* pcrel_offset */
72 /* 32 bit absolute relocation. Setting partial_inplace to TRUE and
73 src_mask to a non-zero value is similar to the COFF toolchain. */
74 HOWTO (R_SH_DIR32
, /* type */
76 2, /* size (0 = byte, 1 = short, 2 = long) */
78 FALSE
, /* pc_relative */
80 complain_overflow_bitfield
, /* complain_on_overflow */
81 sh_elf_reloc
, /* special_function */
82 "R_SH_DIR32", /* name */
83 TRUE
, /* partial_inplace */
84 0xffffffff, /* src_mask */
85 0xffffffff, /* dst_mask */
86 FALSE
), /* pcrel_offset */
88 /* 32 bit PC relative relocation. */
89 HOWTO (R_SH_REL32
, /* type */
91 2, /* size (0 = byte, 1 = short, 2 = long) */
93 TRUE
, /* pc_relative */
95 complain_overflow_signed
, /* complain_on_overflow */
96 sh_elf_ignore_reloc
, /* special_function */
97 "R_SH_REL32", /* name */
98 TRUE
, /* partial_inplace */
99 0xffffffff, /* src_mask */
100 0xffffffff, /* dst_mask */
101 TRUE
), /* pcrel_offset */
103 /* 8 bit PC relative branch divided by 2. */
104 HOWTO (R_SH_DIR8WPN
, /* type */
106 1, /* size (0 = byte, 1 = short, 2 = long) */
108 TRUE
, /* pc_relative */
110 complain_overflow_signed
, /* complain_on_overflow */
111 sh_elf_ignore_reloc
, /* special_function */
112 "R_SH_DIR8WPN", /* name */
113 TRUE
, /* partial_inplace */
116 TRUE
), /* pcrel_offset */
118 /* 12 bit PC relative branch divided by 2. */
119 /* This cannot be partial_inplace because relaxation can't know the
120 eventual value of a symbol. */
121 HOWTO (R_SH_IND12W
, /* type */
123 1, /* size (0 = byte, 1 = short, 2 = long) */
125 TRUE
, /* pc_relative */
127 complain_overflow_signed
, /* complain_on_overflow */
128 NULL
, /* special_function */
129 "R_SH_IND12W", /* name */
130 FALSE
, /* partial_inplace */
132 0xfff, /* dst_mask */
133 TRUE
), /* pcrel_offset */
135 /* 8 bit unsigned PC relative divided by 4. */
136 HOWTO (R_SH_DIR8WPL
, /* type */
138 1, /* size (0 = byte, 1 = short, 2 = long) */
140 TRUE
, /* pc_relative */
142 complain_overflow_unsigned
, /* complain_on_overflow */
143 sh_elf_ignore_reloc
, /* special_function */
144 "R_SH_DIR8WPL", /* name */
145 TRUE
, /* partial_inplace */
148 TRUE
), /* pcrel_offset */
150 /* 8 bit unsigned PC relative divided by 2. */
151 HOWTO (R_SH_DIR8WPZ
, /* type */
153 1, /* size (0 = byte, 1 = short, 2 = long) */
155 TRUE
, /* pc_relative */
157 complain_overflow_unsigned
, /* complain_on_overflow */
158 sh_elf_ignore_reloc
, /* special_function */
159 "R_SH_DIR8WPZ", /* name */
160 TRUE
, /* partial_inplace */
163 TRUE
), /* pcrel_offset */
165 /* 8 bit GBR relative. FIXME: This only makes sense if we have some
166 special symbol for the GBR relative area, and that is not
168 HOWTO (R_SH_DIR8BP
, /* type */
170 1, /* size (0 = byte, 1 = short, 2 = long) */
172 FALSE
, /* pc_relative */
174 complain_overflow_unsigned
, /* complain_on_overflow */
175 sh_elf_ignore_reloc
, /* special_function */
176 "R_SH_DIR8BP", /* name */
177 FALSE
, /* partial_inplace */
180 TRUE
), /* pcrel_offset */
182 /* 8 bit GBR relative divided by 2. FIXME: This only makes sense if
183 we have some special symbol for the GBR relative area, and that
184 is not implemented. */
185 HOWTO (R_SH_DIR8W
, /* type */
187 1, /* size (0 = byte, 1 = short, 2 = long) */
189 FALSE
, /* pc_relative */
191 complain_overflow_unsigned
, /* complain_on_overflow */
192 sh_elf_ignore_reloc
, /* special_function */
193 "R_SH_DIR8W", /* name */
194 FALSE
, /* partial_inplace */
197 TRUE
), /* pcrel_offset */
199 /* 8 bit GBR relative divided by 4. FIXME: This only makes sense if
200 we have some special symbol for the GBR relative area, and that
201 is not implemented. */
202 HOWTO (R_SH_DIR8L
, /* type */
204 1, /* size (0 = byte, 1 = short, 2 = long) */
206 FALSE
, /* pc_relative */
208 complain_overflow_unsigned
, /* complain_on_overflow */
209 sh_elf_ignore_reloc
, /* special_function */
210 "R_SH_DIR8L", /* name */
211 FALSE
, /* partial_inplace */
214 TRUE
), /* pcrel_offset */
216 /* 8 bit PC relative divided by 2 - but specified in a very odd way. */
217 HOWTO (R_SH_LOOP_START
, /* type */
219 1, /* size (0 = byte, 1 = short, 2 = long) */
221 FALSE
, /* pc_relative */
223 complain_overflow_signed
, /* complain_on_overflow */
224 sh_elf_ignore_reloc
, /* special_function */
225 "R_SH_LOOP_START", /* name */
226 TRUE
, /* partial_inplace */
229 TRUE
), /* pcrel_offset */
231 /* 8 bit PC relative divided by 2 - but specified in a very odd way. */
232 HOWTO (R_SH_LOOP_END
, /* type */
234 1, /* size (0 = byte, 1 = short, 2 = long) */
236 FALSE
, /* pc_relative */
238 complain_overflow_signed
, /* complain_on_overflow */
239 sh_elf_ignore_reloc
, /* special_function */
240 "R_SH_LOOP_END", /* name */
241 TRUE
, /* partial_inplace */
244 TRUE
), /* pcrel_offset */
257 /* The remaining relocs are a GNU extension used for relaxing. The
258 final pass of the linker never needs to do anything with any of
259 these relocs. Any required operations are handled by the
262 /* GNU extension to record C++ vtable hierarchy */
263 HOWTO (R_SH_GNU_VTINHERIT
, /* type */
265 2, /* size (0 = byte, 1 = short, 2 = long) */
267 FALSE
, /* pc_relative */
269 complain_overflow_dont
, /* complain_on_overflow */
270 NULL
, /* special_function */
271 "R_SH_GNU_VTINHERIT", /* name */
272 FALSE
, /* partial_inplace */
275 FALSE
), /* pcrel_offset */
277 /* GNU extension to record C++ vtable member usage */
278 HOWTO (R_SH_GNU_VTENTRY
, /* type */
280 2, /* size (0 = byte, 1 = short, 2 = long) */
282 FALSE
, /* pc_relative */
284 complain_overflow_dont
, /* complain_on_overflow */
285 _bfd_elf_rel_vtable_reloc_fn
, /* special_function */
286 "R_SH_GNU_VTENTRY", /* name */
287 FALSE
, /* partial_inplace */
290 FALSE
), /* pcrel_offset */
292 /* An 8 bit switch table entry. This is generated for an expression
293 such as ``.word L1 - L2''. The offset holds the difference
294 between the reloc address and L2. */
295 HOWTO (R_SH_SWITCH8
, /* type */
297 0, /* size (0 = byte, 1 = short, 2 = long) */
299 FALSE
, /* pc_relative */
301 complain_overflow_unsigned
, /* complain_on_overflow */
302 sh_elf_ignore_reloc
, /* special_function */
303 "R_SH_SWITCH8", /* name */
304 FALSE
, /* partial_inplace */
307 TRUE
), /* pcrel_offset */
309 /* A 16 bit switch table entry. This is generated for an expression
310 such as ``.word L1 - L2''. The offset holds the difference
311 between the reloc address and L2. */
312 HOWTO (R_SH_SWITCH16
, /* type */
314 1, /* size (0 = byte, 1 = short, 2 = long) */
316 FALSE
, /* pc_relative */
318 complain_overflow_unsigned
, /* complain_on_overflow */
319 sh_elf_ignore_reloc
, /* special_function */
320 "R_SH_SWITCH16", /* name */
321 FALSE
, /* partial_inplace */
324 TRUE
), /* pcrel_offset */
326 /* A 32 bit switch table entry. This is generated for an expression
327 such as ``.long L1 - L2''. The offset holds the difference
328 between the reloc address and L2. */
329 HOWTO (R_SH_SWITCH32
, /* type */
331 2, /* size (0 = byte, 1 = short, 2 = long) */
333 FALSE
, /* pc_relative */
335 complain_overflow_unsigned
, /* complain_on_overflow */
336 sh_elf_ignore_reloc
, /* special_function */
337 "R_SH_SWITCH32", /* name */
338 FALSE
, /* partial_inplace */
341 TRUE
), /* pcrel_offset */
343 /* Indicates a .uses pseudo-op. The compiler will generate .uses
344 pseudo-ops when it finds a function call which can be relaxed.
345 The offset field holds the PC relative offset to the instruction
346 which loads the register used in the function call. */
347 HOWTO (R_SH_USES
, /* type */
349 1, /* size (0 = byte, 1 = short, 2 = long) */
351 FALSE
, /* pc_relative */
353 complain_overflow_unsigned
, /* complain_on_overflow */
354 sh_elf_ignore_reloc
, /* special_function */
355 "R_SH_USES", /* name */
356 FALSE
, /* partial_inplace */
359 TRUE
), /* pcrel_offset */
361 /* The assembler will generate this reloc for addresses referred to
362 by the register loads associated with USES relocs. The offset
363 field holds the number of times the address is referenced in the
365 HOWTO (R_SH_COUNT
, /* type */
367 1, /* size (0 = byte, 1 = short, 2 = long) */
369 FALSE
, /* pc_relative */
371 complain_overflow_unsigned
, /* complain_on_overflow */
372 sh_elf_ignore_reloc
, /* special_function */
373 "R_SH_COUNT", /* name */
374 FALSE
, /* partial_inplace */
377 TRUE
), /* pcrel_offset */
379 /* Indicates an alignment statement. The offset field is the power
380 of 2 to which subsequent portions of the object file must be
382 HOWTO (R_SH_ALIGN
, /* type */
384 1, /* size (0 = byte, 1 = short, 2 = long) */
386 FALSE
, /* pc_relative */
388 complain_overflow_unsigned
, /* complain_on_overflow */
389 sh_elf_ignore_reloc
, /* special_function */
390 "R_SH_ALIGN", /* name */
391 FALSE
, /* partial_inplace */
394 TRUE
), /* pcrel_offset */
396 /* The assembler will generate this reloc before a block of
397 instructions. A section should be processed as assuming it
398 contains data, unless this reloc is seen. */
399 HOWTO (R_SH_CODE
, /* type */
401 1, /* size (0 = byte, 1 = short, 2 = long) */
403 FALSE
, /* pc_relative */
405 complain_overflow_unsigned
, /* complain_on_overflow */
406 sh_elf_ignore_reloc
, /* special_function */
407 "R_SH_CODE", /* name */
408 FALSE
, /* partial_inplace */
411 TRUE
), /* pcrel_offset */
413 /* The assembler will generate this reloc after a block of
414 instructions when it sees data that is not instructions. */
415 HOWTO (R_SH_DATA
, /* type */
417 1, /* size (0 = byte, 1 = short, 2 = long) */
419 FALSE
, /* pc_relative */
421 complain_overflow_unsigned
, /* complain_on_overflow */
422 sh_elf_ignore_reloc
, /* special_function */
423 "R_SH_DATA", /* name */
424 FALSE
, /* partial_inplace */
427 TRUE
), /* pcrel_offset */
429 /* The assembler generates this reloc for each label within a block
430 of instructions. This permits the linker to avoid swapping
431 instructions which are the targets of branches. */
432 HOWTO (R_SH_LABEL
, /* type */
434 1, /* size (0 = byte, 1 = short, 2 = long) */
436 FALSE
, /* pc_relative */
438 complain_overflow_unsigned
, /* complain_on_overflow */
439 sh_elf_ignore_reloc
, /* special_function */
440 "R_SH_LABEL", /* name */
441 FALSE
, /* partial_inplace */
444 TRUE
), /* pcrel_offset */
446 /* The next 12 are only supported via linking in SHC-generated objects. */
447 HOWTO (R_SH_DIR16
, /* type */
449 1, /* size (0 = byte, 1 = short, 2 = long) */
451 FALSE
, /* pc_relative */
453 complain_overflow_dont
, /* complain_on_overflow */
454 bfd_elf_generic_reloc
, /* special_function */
455 "R_SH_DIR16", /* name */
456 FALSE
, /* partial_inplace */
458 0xffff, /* dst_mask */
459 FALSE
), /* pcrel_offset */
461 HOWTO (R_SH_DIR8
, /* type */
463 0, /* size (0 = byte, 1 = short, 2 = long) */
465 FALSE
, /* pc_relative */
467 complain_overflow_dont
, /* complain_on_overflow */
468 bfd_elf_generic_reloc
, /* special_function */
469 "R_SH_DIR8", /* name */
470 FALSE
, /* partial_inplace */
473 FALSE
), /* pcrel_offset */
475 HOWTO (R_SH_DIR8UL
, /* type */
477 0, /* size (0 = byte, 1 = short, 2 = long) */
479 FALSE
, /* pc_relative */
481 complain_overflow_unsigned
, /* complain_on_overflow */
482 bfd_elf_generic_reloc
, /* special_function */
483 "R_SH_DIR8UL", /* name */
484 FALSE
, /* partial_inplace */
487 FALSE
), /* pcrel_offset */
489 HOWTO (R_SH_DIR8UW
, /* type */
491 0, /* size (0 = byte, 1 = short, 2 = long) */
493 FALSE
, /* pc_relative */
495 complain_overflow_unsigned
, /* complain_on_overflow */
496 bfd_elf_generic_reloc
, /* special_function */
497 "R_SH_DIR8UW", /* name */
498 FALSE
, /* partial_inplace */
501 FALSE
), /* pcrel_offset */
503 HOWTO (R_SH_DIR8U
, /* type */
505 0, /* size (0 = byte, 1 = short, 2 = long) */
507 FALSE
, /* pc_relative */
509 complain_overflow_unsigned
, /* complain_on_overflow */
510 bfd_elf_generic_reloc
, /* special_function */
511 "R_SH_DIR8U", /* name */
512 FALSE
, /* partial_inplace */
515 FALSE
), /* pcrel_offset */
517 HOWTO (R_SH_DIR8SW
, /* type */
519 0, /* size (0 = byte, 1 = short, 2 = long) */
521 FALSE
, /* pc_relative */
523 complain_overflow_signed
, /* complain_on_overflow */
524 bfd_elf_generic_reloc
, /* special_function */
525 "R_SH_DIR8SW", /* name */
526 FALSE
, /* partial_inplace */
529 FALSE
), /* pcrel_offset */
531 HOWTO (R_SH_DIR8S
, /* type */
533 0, /* size (0 = byte, 1 = short, 2 = long) */
535 FALSE
, /* pc_relative */
537 complain_overflow_signed
, /* complain_on_overflow */
538 bfd_elf_generic_reloc
, /* special_function */
539 "R_SH_DIR8S", /* name */
540 FALSE
, /* partial_inplace */
543 FALSE
), /* pcrel_offset */
545 HOWTO (R_SH_DIR4UL
, /* type */
547 0, /* size (0 = byte, 1 = short, 2 = long) */
549 FALSE
, /* pc_relative */
551 complain_overflow_unsigned
, /* complain_on_overflow */
552 bfd_elf_generic_reloc
, /* special_function */
553 "R_SH_DIR4UL", /* name */
554 FALSE
, /* partial_inplace */
557 FALSE
), /* pcrel_offset */
559 HOWTO (R_SH_DIR4UW
, /* type */
561 0, /* size (0 = byte, 1 = short, 2 = long) */
563 FALSE
, /* pc_relative */
565 complain_overflow_unsigned
, /* complain_on_overflow */
566 bfd_elf_generic_reloc
, /* special_function */
567 "R_SH_DIR4UW", /* name */
568 FALSE
, /* partial_inplace */
571 FALSE
), /* pcrel_offset */
573 HOWTO (R_SH_DIR4U
, /* type */
575 0, /* size (0 = byte, 1 = short, 2 = long) */
577 FALSE
, /* pc_relative */
579 complain_overflow_unsigned
, /* complain_on_overflow */
580 bfd_elf_generic_reloc
, /* special_function */
581 "R_SH_DIR4U", /* name */
582 FALSE
, /* partial_inplace */
585 FALSE
), /* pcrel_offset */
587 HOWTO (R_SH_PSHA
, /* type */
589 1, /* size (0 = byte, 1 = short, 2 = long) */
591 FALSE
, /* pc_relative */
593 complain_overflow_signed
, /* complain_on_overflow */
594 bfd_elf_generic_reloc
, /* special_function */
595 "R_SH_PSHA", /* name */
596 FALSE
, /* partial_inplace */
599 FALSE
), /* pcrel_offset */
601 HOWTO (R_SH_PSHL
, /* type */
603 1, /* size (0 = byte, 1 = short, 2 = long) */
605 FALSE
, /* pc_relative */
607 complain_overflow_signed
, /* complain_on_overflow */
608 bfd_elf_generic_reloc
, /* special_function */
609 "R_SH_PSHL", /* name */
610 FALSE
, /* partial_inplace */
613 FALSE
), /* pcrel_offset */
615 #ifdef INCLUDE_SHMEDIA
616 /* Used in SHLLI.L and SHLRI.L. */
617 HOWTO (R_SH_DIR5U
, /* type */
619 2, /* size (0 = byte, 1 = short, 2 = long) */
621 FALSE
, /* pc_relative */
623 complain_overflow_unsigned
, /* complain_on_overflow */
624 bfd_elf_generic_reloc
, /* special_function */
625 "R_SH_DIR5U", /* name */
626 FALSE
, /* partial_inplace */
628 0xfc00, /* dst_mask */
629 FALSE
), /* pcrel_offset */
631 /* Used in SHARI, SHLLI et al. */
632 HOWTO (R_SH_DIR6U
, /* type */
634 2, /* size (0 = byte, 1 = short, 2 = long) */
636 FALSE
, /* pc_relative */
638 complain_overflow_unsigned
, /* complain_on_overflow */
639 bfd_elf_generic_reloc
, /* special_function */
640 "R_SH_DIR6U", /* name */
641 FALSE
, /* partial_inplace */
643 0xfc00, /* dst_mask */
644 FALSE
), /* pcrel_offset */
646 /* Used in BxxI, LDHI.L et al. */
647 HOWTO (R_SH_DIR6S
, /* type */
649 2, /* size (0 = byte, 1 = short, 2 = long) */
651 FALSE
, /* pc_relative */
653 complain_overflow_signed
, /* complain_on_overflow */
654 bfd_elf_generic_reloc
, /* special_function */
655 "R_SH_DIR6S", /* name */
656 FALSE
, /* partial_inplace */
658 0xfc00, /* dst_mask */
659 FALSE
), /* pcrel_offset */
661 /* Used in ADDI, ANDI et al. */
662 HOWTO (R_SH_DIR10S
, /* type */
664 2, /* size (0 = byte, 1 = short, 2 = long) */
666 FALSE
, /* pc_relative */
668 complain_overflow_signed
, /* complain_on_overflow */
669 bfd_elf_generic_reloc
, /* special_function */
670 "R_SH_DIR10S", /* name */
671 FALSE
, /* partial_inplace */
673 0xffc00, /* dst_mask */
674 FALSE
), /* pcrel_offset */
676 /* Used in LD.UW, ST.W et al. */
677 HOWTO (R_SH_DIR10SW
, /* type */
679 2, /* size (0 = byte, 1 = short, 2 = long) */
681 FALSE
, /* pc_relative */
683 complain_overflow_signed
, /* complain_on_overflow */
684 bfd_elf_generic_reloc
, /* special_function */
685 "R_SH_DIR10SW", /* name */
686 FALSE
, /* partial_inplace */
688 0xffc00, /* dst_mask */
689 FALSE
), /* pcrel_offset */
691 /* Used in LD.L, FLD.S et al. */
692 HOWTO (R_SH_DIR10SL
, /* type */
694 2, /* size (0 = byte, 1 = short, 2 = long) */
696 FALSE
, /* pc_relative */
698 complain_overflow_signed
, /* complain_on_overflow */
699 bfd_elf_generic_reloc
, /* special_function */
700 "R_SH_DIR10SL", /* name */
701 FALSE
, /* partial_inplace */
703 0xffc00, /* dst_mask */
704 FALSE
), /* pcrel_offset */
706 /* Used in FLD.D, FST.P et al. */
707 HOWTO (R_SH_DIR10SQ
, /* type */
709 2, /* size (0 = byte, 1 = short, 2 = long) */
711 FALSE
, /* pc_relative */
713 complain_overflow_signed
, /* complain_on_overflow */
714 bfd_elf_generic_reloc
, /* special_function */
715 "R_SH_DIR10SQ", /* name */
716 FALSE
, /* partial_inplace */
718 0xffc00, /* dst_mask */
719 FALSE
), /* pcrel_offset */
733 HOWTO (R_SH_DIR16S
, /* type */
735 1, /* size (0 = byte, 1 = short, 2 = long) */
737 FALSE
, /* pc_relative */
739 complain_overflow_signed
, /* complain_on_overflow */
740 bfd_elf_generic_reloc
, /* special_function */
741 "R_SH_DIR16S", /* name */
742 FALSE
, /* partial_inplace */
744 0xffff, /* dst_mask */
745 FALSE
), /* pcrel_offset */
838 HOWTO (R_SH_TLS_GD_32
, /* type */
840 2, /* size (0 = byte, 1 = short, 2 = long) */
842 FALSE
, /* pc_relative */
844 complain_overflow_bitfield
, /* complain_on_overflow */
845 bfd_elf_generic_reloc
, /* */
846 "R_SH_TLS_GD_32", /* name */
847 TRUE
, /* partial_inplace */
848 0xffffffff, /* src_mask */
849 0xffffffff, /* dst_mask */
850 FALSE
), /* pcrel_offset */
852 HOWTO (R_SH_TLS_LD_32
, /* type */
854 2, /* size (0 = byte, 1 = short, 2 = long) */
856 FALSE
, /* pc_relative */
858 complain_overflow_bitfield
, /* complain_on_overflow */
859 bfd_elf_generic_reloc
, /* */
860 "R_SH_TLS_LD_32", /* name */
861 TRUE
, /* partial_inplace */
862 0xffffffff, /* src_mask */
863 0xffffffff, /* dst_mask */
864 FALSE
), /* pcrel_offset */
866 HOWTO (R_SH_TLS_LDO_32
, /* type */
868 2, /* size (0 = byte, 1 = short, 2 = long) */
870 FALSE
, /* pc_relative */
872 complain_overflow_bitfield
, /* complain_on_overflow */
873 bfd_elf_generic_reloc
, /* */
874 "R_SH_TLS_LDO_32", /* name */
875 TRUE
, /* partial_inplace */
876 0xffffffff, /* src_mask */
877 0xffffffff, /* dst_mask */
878 FALSE
), /* pcrel_offset */
880 HOWTO (R_SH_TLS_IE_32
, /* type */
882 2, /* size (0 = byte, 1 = short, 2 = long) */
884 FALSE
, /* pc_relative */
886 complain_overflow_bitfield
, /* complain_on_overflow */
887 bfd_elf_generic_reloc
, /* */
888 "R_SH_TLS_IE_32", /* name */
889 TRUE
, /* partial_inplace */
890 0xffffffff, /* src_mask */
891 0xffffffff, /* dst_mask */
892 FALSE
), /* pcrel_offset */
894 HOWTO (R_SH_TLS_LE_32
, /* type */
896 2, /* size (0 = byte, 1 = short, 2 = long) */
898 FALSE
, /* pc_relative */
900 complain_overflow_bitfield
, /* complain_on_overflow */
901 bfd_elf_generic_reloc
, /* */
902 "R_SH_TLS_LE_32", /* name */
903 TRUE
, /* partial_inplace */
904 0xffffffff, /* src_mask */
905 0xffffffff, /* dst_mask */
906 FALSE
), /* pcrel_offset */
908 HOWTO (R_SH_TLS_DTPMOD32
, /* type */
910 2, /* size (0 = byte, 1 = short, 2 = long) */
912 FALSE
, /* pc_relative */
914 complain_overflow_bitfield
, /* complain_on_overflow */
915 bfd_elf_generic_reloc
, /* */
916 "R_SH_TLS_DTPMOD32", /* name */
917 TRUE
, /* partial_inplace */
918 0xffffffff, /* src_mask */
919 0xffffffff, /* dst_mask */
920 FALSE
), /* pcrel_offset */
922 HOWTO (R_SH_TLS_DTPOFF32
, /* type */
924 2, /* size (0 = byte, 1 = short, 2 = long) */
926 FALSE
, /* pc_relative */
928 complain_overflow_bitfield
, /* complain_on_overflow */
929 bfd_elf_generic_reloc
, /* */
930 "R_SH_TLS_DTPOFF32", /* name */
931 TRUE
, /* partial_inplace */
932 0xffffffff, /* src_mask */
933 0xffffffff, /* dst_mask */
934 FALSE
), /* pcrel_offset */
936 HOWTO (R_SH_TLS_TPOFF32
, /* type */
938 2, /* size (0 = byte, 1 = short, 2 = long) */
940 FALSE
, /* pc_relative */
942 complain_overflow_bitfield
, /* complain_on_overflow */
943 bfd_elf_generic_reloc
, /* */
944 "R_SH_TLS_TPOFF32", /* name */
945 TRUE
, /* partial_inplace */
946 0xffffffff, /* src_mask */
947 0xffffffff, /* dst_mask */
948 FALSE
), /* pcrel_offset */
959 HOWTO (R_SH_GOT32
, /* type */
961 2, /* size (0 = byte, 1 = short, 2 = long) */
963 FALSE
, /* pc_relative */
965 complain_overflow_bitfield
, /* complain_on_overflow */
966 bfd_elf_generic_reloc
, /* */
967 "R_SH_GOT32", /* name */
968 TRUE
, /* partial_inplace */
969 0xffffffff, /* src_mask */
970 0xffffffff, /* dst_mask */
971 FALSE
), /* pcrel_offset */
973 HOWTO (R_SH_PLT32
, /* type */
975 2, /* size (0 = byte, 1 = short, 2 = long) */
977 TRUE
, /* pc_relative */
979 complain_overflow_bitfield
, /* complain_on_overflow */
980 bfd_elf_generic_reloc
, /* */
981 "R_SH_PLT32", /* name */
982 TRUE
, /* partial_inplace */
983 0xffffffff, /* src_mask */
984 0xffffffff, /* dst_mask */
985 TRUE
), /* pcrel_offset */
987 HOWTO (R_SH_COPY
, /* type */
989 2, /* size (0 = byte, 1 = short, 2 = long) */
991 FALSE
, /* pc_relative */
993 complain_overflow_bitfield
, /* complain_on_overflow */
994 bfd_elf_generic_reloc
, /* */
995 "R_SH_COPY", /* name */
996 TRUE
, /* partial_inplace */
997 0xffffffff, /* src_mask */
998 0xffffffff, /* dst_mask */
999 FALSE
), /* pcrel_offset */
1001 HOWTO (R_SH_GLOB_DAT
, /* type */
1003 2, /* size (0 = byte, 1 = short, 2 = long) */
1005 FALSE
, /* pc_relative */
1007 complain_overflow_bitfield
, /* complain_on_overflow */
1008 bfd_elf_generic_reloc
, /* */
1009 "R_SH_GLOB_DAT", /* name */
1010 TRUE
, /* partial_inplace */
1011 0xffffffff, /* src_mask */
1012 0xffffffff, /* dst_mask */
1013 FALSE
), /* pcrel_offset */
1015 HOWTO (R_SH_JMP_SLOT
, /* type */
1017 2, /* size (0 = byte, 1 = short, 2 = long) */
1019 FALSE
, /* pc_relative */
1021 complain_overflow_bitfield
, /* complain_on_overflow */
1022 bfd_elf_generic_reloc
, /* */
1023 "R_SH_JMP_SLOT", /* name */
1024 TRUE
, /* partial_inplace */
1025 0xffffffff, /* src_mask */
1026 0xffffffff, /* dst_mask */
1027 FALSE
), /* pcrel_offset */
1029 HOWTO (R_SH_RELATIVE
, /* type */
1031 2, /* size (0 = byte, 1 = short, 2 = long) */
1033 FALSE
, /* pc_relative */
1035 complain_overflow_bitfield
, /* complain_on_overflow */
1036 bfd_elf_generic_reloc
, /* */
1037 "R_SH_RELATIVE", /* name */
1038 TRUE
, /* partial_inplace */
1039 0xffffffff, /* src_mask */
1040 0xffffffff, /* dst_mask */
1041 FALSE
), /* pcrel_offset */
1043 HOWTO (R_SH_GOTOFF
, /* type */
1045 2, /* size (0 = byte, 1 = short, 2 = long) */
1047 FALSE
, /* pc_relative */
1049 complain_overflow_bitfield
, /* complain_on_overflow */
1050 bfd_elf_generic_reloc
, /* */
1051 "R_SH_GOTOFF", /* name */
1052 TRUE
, /* partial_inplace */
1053 0xffffffff, /* src_mask */
1054 0xffffffff, /* dst_mask */
1055 FALSE
), /* pcrel_offset */
1057 HOWTO (R_SH_GOTPC
, /* type */
1059 2, /* size (0 = byte, 1 = short, 2 = long) */
1061 TRUE
, /* pc_relative */
1063 complain_overflow_bitfield
, /* complain_on_overflow */
1064 bfd_elf_generic_reloc
, /* */
1065 "R_SH_GOTPC", /* name */
1066 TRUE
, /* partial_inplace */
1067 0xffffffff, /* src_mask */
1068 0xffffffff, /* dst_mask */
1069 TRUE
), /* pcrel_offset */
1071 HOWTO (R_SH_GOTPLT32
, /* type */
1073 2, /* size (0 = byte, 1 = short, 2 = long) */
1075 FALSE
, /* pc_relative */
1077 complain_overflow_bitfield
, /* complain_on_overflow */
1078 bfd_elf_generic_reloc
, /* */
1079 "R_SH_GOTPLT32", /* name */
1080 FALSE
, /* partial_inplace */
1081 0xffffffff, /* src_mask */
1082 0xffffffff, /* dst_mask */
1083 FALSE
), /* pcrel_offset */
1085 #ifdef INCLUDE_SHMEDIA
1086 /* Used in MOVI and SHORI (x & 65536). */
1087 HOWTO (R_SH_GOT_LOW16
, /* type */
1089 2, /* size (0 = byte, 1 = short, 2 = long) */
1091 FALSE
, /* pc_relative */
1093 complain_overflow_dont
, /* complain_on_overflow */
1094 bfd_elf_generic_reloc
, /* special_function */
1095 "R_SH_GOT_LOW16", /* name */
1096 FALSE
, /* partial_inplace */
1098 0x3fffc00, /* dst_mask */
1099 FALSE
), /* pcrel_offset */
1101 /* Used in MOVI and SHORI ((x >> 16) & 65536). */
1102 HOWTO (R_SH_GOT_MEDLOW16
, /* type */
1103 16, /* rightshift */
1104 2, /* size (0 = byte, 1 = short, 2 = long) */
1106 FALSE
, /* pc_relative */
1108 complain_overflow_dont
, /* complain_on_overflow */
1109 bfd_elf_generic_reloc
, /* special_function */
1110 "R_SH_GOT_MEDLOW16", /* name */
1111 FALSE
, /* partial_inplace */
1113 0x3fffc00, /* dst_mask */
1114 FALSE
), /* pcrel_offset */
1116 /* Used in MOVI and SHORI ((x >> 32) & 65536). */
1117 HOWTO (R_SH_GOT_MEDHI16
, /* type */
1118 32, /* rightshift */
1119 2, /* size (0 = byte, 1 = short, 2 = long) */
1121 FALSE
, /* pc_relative */
1123 complain_overflow_dont
, /* complain_on_overflow */
1124 bfd_elf_generic_reloc
, /* special_function */
1125 "R_SH_GOT_MEDHI16", /* name */
1126 FALSE
, /* partial_inplace */
1128 0x3fffc00, /* dst_mask */
1129 FALSE
), /* pcrel_offset */
1131 /* Used in MOVI and SHORI ((x >> 48) & 65536). */
1132 HOWTO (R_SH_GOT_HI16
, /* type */
1133 48, /* rightshift */
1134 2, /* size (0 = byte, 1 = short, 2 = long) */
1136 FALSE
, /* pc_relative */
1138 complain_overflow_dont
, /* complain_on_overflow */
1139 bfd_elf_generic_reloc
, /* special_function */
1140 "R_SH_GOT_HI16", /* name */
1141 FALSE
, /* partial_inplace */
1143 0x3fffc00, /* dst_mask */
1144 FALSE
), /* pcrel_offset */
1146 /* Used in MOVI and SHORI (x & 65536). */
1147 HOWTO (R_SH_GOTPLT_LOW16
, /* type */
1149 2, /* size (0 = byte, 1 = short, 2 = long) */
1151 FALSE
, /* pc_relative */
1153 complain_overflow_dont
, /* complain_on_overflow */
1154 bfd_elf_generic_reloc
, /* special_function */
1155 "R_SH_GOTPLT_LOW16", /* name */
1156 FALSE
, /* partial_inplace */
1158 0x3fffc00, /* dst_mask */
1159 FALSE
), /* pcrel_offset */
1161 /* Used in MOVI and SHORI ((x >> 16) & 65536). */
1162 HOWTO (R_SH_GOTPLT_MEDLOW16
, /* type */
1163 16, /* rightshift */
1164 2, /* size (0 = byte, 1 = short, 2 = long) */
1166 FALSE
, /* pc_relative */
1168 complain_overflow_dont
, /* complain_on_overflow */
1169 bfd_elf_generic_reloc
, /* special_function */
1170 "R_SH_GOTPLT_MEDLOW16", /* name */
1171 FALSE
, /* partial_inplace */
1173 0x3fffc00, /* dst_mask */
1174 FALSE
), /* pcrel_offset */
1176 /* Used in MOVI and SHORI ((x >> 32) & 65536). */
1177 HOWTO (R_SH_GOTPLT_MEDHI16
, /* type */
1178 32, /* rightshift */
1179 2, /* size (0 = byte, 1 = short, 2 = long) */
1181 FALSE
, /* pc_relative */
1183 complain_overflow_dont
, /* complain_on_overflow */
1184 bfd_elf_generic_reloc
, /* special_function */
1185 "R_SH_GOTPLT_MEDHI16", /* name */
1186 FALSE
, /* partial_inplace */
1188 0x3fffc00, /* dst_mask */
1189 FALSE
), /* pcrel_offset */
1191 /* Used in MOVI and SHORI ((x >> 48) & 65536). */
1192 HOWTO (R_SH_GOTPLT_HI16
, /* type */
1193 48, /* rightshift */
1194 2, /* size (0 = byte, 1 = short, 2 = long) */
1196 FALSE
, /* pc_relative */
1198 complain_overflow_dont
, /* complain_on_overflow */
1199 bfd_elf_generic_reloc
, /* special_function */
1200 "R_SH_GOTPLT_HI16", /* name */
1201 FALSE
, /* partial_inplace */
1203 0x3fffc00, /* dst_mask */
1204 FALSE
), /* pcrel_offset */
1206 /* Used in MOVI and SHORI (x & 65536). */
1207 HOWTO (R_SH_PLT_LOW16
, /* type */
1209 2, /* size (0 = byte, 1 = short, 2 = long) */
1211 TRUE
, /* pc_relative */
1213 complain_overflow_dont
, /* complain_on_overflow */
1214 bfd_elf_generic_reloc
, /* special_function */
1215 "R_SH_PLT_LOW16", /* name */
1216 FALSE
, /* partial_inplace */
1218 0x3fffc00, /* dst_mask */
1219 TRUE
), /* pcrel_offset */
1221 /* Used in MOVI and SHORI ((x >> 16) & 65536). */
1222 HOWTO (R_SH_PLT_MEDLOW16
, /* type */
1223 16, /* rightshift */
1224 2, /* size (0 = byte, 1 = short, 2 = long) */
1226 TRUE
, /* pc_relative */
1228 complain_overflow_dont
, /* complain_on_overflow */
1229 bfd_elf_generic_reloc
, /* special_function */
1230 "R_SH_PLT_MEDLOW16", /* name */
1231 FALSE
, /* partial_inplace */
1233 0x3fffc00, /* dst_mask */
1234 TRUE
), /* pcrel_offset */
1236 /* Used in MOVI and SHORI ((x >> 32) & 65536). */
1237 HOWTO (R_SH_PLT_MEDHI16
, /* type */
1238 32, /* rightshift */
1239 2, /* size (0 = byte, 1 = short, 2 = long) */
1241 TRUE
, /* pc_relative */
1243 complain_overflow_dont
, /* complain_on_overflow */
1244 bfd_elf_generic_reloc
, /* special_function */
1245 "R_SH_PLT_MEDHI16", /* name */
1246 FALSE
, /* partial_inplace */
1248 0x3fffc00, /* dst_mask */
1249 TRUE
), /* pcrel_offset */
1251 /* Used in MOVI and SHORI ((x >> 48) & 65536). */
1252 HOWTO (R_SH_PLT_HI16
, /* type */
1253 48, /* rightshift */
1254 2, /* size (0 = byte, 1 = short, 2 = long) */
1256 TRUE
, /* pc_relative */
1258 complain_overflow_dont
, /* complain_on_overflow */
1259 bfd_elf_generic_reloc
, /* special_function */
1260 "R_SH_PLT_HI16", /* name */
1261 FALSE
, /* partial_inplace */
1263 0x3fffc00, /* dst_mask */
1264 TRUE
), /* pcrel_offset */
1266 /* Used in MOVI and SHORI (x & 65536). */
1267 HOWTO (R_SH_GOTOFF_LOW16
, /* type */
1269 2, /* size (0 = byte, 1 = short, 2 = long) */
1271 FALSE
, /* pc_relative */
1273 complain_overflow_dont
, /* complain_on_overflow */
1274 bfd_elf_generic_reloc
, /* special_function */
1275 "R_SH_GOTOFF_LOW16", /* name */
1276 FALSE
, /* partial_inplace */
1278 0x3fffc00, /* dst_mask */
1279 FALSE
), /* pcrel_offset */
1281 /* Used in MOVI and SHORI ((x >> 16) & 65536). */
1282 HOWTO (R_SH_GOTOFF_MEDLOW16
, /* type */
1283 16, /* rightshift */
1284 2, /* size (0 = byte, 1 = short, 2 = long) */
1286 FALSE
, /* pc_relative */
1288 complain_overflow_dont
, /* complain_on_overflow */
1289 bfd_elf_generic_reloc
, /* special_function */
1290 "R_SH_GOTOFF_MEDLOW16", /* name */
1291 FALSE
, /* partial_inplace */
1293 0x3fffc00, /* dst_mask */
1294 FALSE
), /* pcrel_offset */
1296 /* Used in MOVI and SHORI ((x >> 32) & 65536). */
1297 HOWTO (R_SH_GOTOFF_MEDHI16
, /* type */
1298 32, /* rightshift */
1299 2, /* size (0 = byte, 1 = short, 2 = long) */
1301 FALSE
, /* pc_relative */
1303 complain_overflow_dont
, /* complain_on_overflow */
1304 bfd_elf_generic_reloc
, /* special_function */
1305 "R_SH_GOTOFF_MEDHI16", /* name */
1306 FALSE
, /* partial_inplace */
1308 0x3fffc00, /* dst_mask */
1309 FALSE
), /* pcrel_offset */
1311 /* Used in MOVI and SHORI ((x >> 48) & 65536). */
1312 HOWTO (R_SH_GOTOFF_HI16
, /* type */
1313 48, /* rightshift */
1314 2, /* size (0 = byte, 1 = short, 2 = long) */
1316 FALSE
, /* pc_relative */
1318 complain_overflow_dont
, /* complain_on_overflow */
1319 bfd_elf_generic_reloc
, /* special_function */
1320 "R_SH_GOTOFF_HI16", /* name */
1321 FALSE
, /* partial_inplace */
1323 0x3fffc00, /* dst_mask */
1324 FALSE
), /* pcrel_offset */
1326 /* Used in MOVI and SHORI (x & 65536). */
1327 HOWTO (R_SH_GOTPC_LOW16
, /* type */
1329 2, /* size (0 = byte, 1 = short, 2 = long) */
1331 TRUE
, /* pc_relative */
1333 complain_overflow_dont
, /* complain_on_overflow */
1334 bfd_elf_generic_reloc
, /* special_function */
1335 "R_SH_GOTPC_LOW16", /* name */
1336 FALSE
, /* partial_inplace */
1338 0x3fffc00, /* dst_mask */
1339 TRUE
), /* pcrel_offset */
1341 /* Used in MOVI and SHORI ((x >> 16) & 65536). */
1342 HOWTO (R_SH_GOTPC_MEDLOW16
, /* type */
1343 16, /* rightshift */
1344 2, /* size (0 = byte, 1 = short, 2 = long) */
1346 TRUE
, /* pc_relative */
1348 complain_overflow_dont
, /* complain_on_overflow */
1349 bfd_elf_generic_reloc
, /* special_function */
1350 "R_SH_GOTPC_MEDLOW16", /* name */
1351 FALSE
, /* partial_inplace */
1353 0x3fffc00, /* dst_mask */
1354 TRUE
), /* pcrel_offset */
1356 /* Used in MOVI and SHORI ((x >> 32) & 65536). */
1357 HOWTO (R_SH_GOTPC_MEDHI16
, /* type */
1358 32, /* rightshift */
1359 2, /* size (0 = byte, 1 = short, 2 = long) */
1361 TRUE
, /* pc_relative */
1363 complain_overflow_dont
, /* complain_on_overflow */
1364 bfd_elf_generic_reloc
, /* special_function */
1365 "R_SH_GOTPC_MEDHI16", /* name */
1366 FALSE
, /* partial_inplace */
1368 0x3fffc00, /* dst_mask */
1369 TRUE
), /* pcrel_offset */
1371 /* Used in MOVI and SHORI ((x >> 48) & 65536). */
1372 HOWTO (R_SH_GOTPC_HI16
, /* type */
1373 48, /* rightshift */
1374 2, /* size (0 = byte, 1 = short, 2 = long) */
1376 TRUE
, /* pc_relative */
1378 complain_overflow_dont
, /* complain_on_overflow */
1379 bfd_elf_generic_reloc
, /* special_function */
1380 "R_SH_GOTPC_HI16", /* name */
1381 FALSE
, /* partial_inplace */
1383 0x3fffc00, /* dst_mask */
1384 TRUE
), /* pcrel_offset */
1386 /* Used in LD.L, FLD.S et al. */
1387 HOWTO (R_SH_GOT10BY4
, /* type */
1389 2, /* size (0 = byte, 1 = short, 2 = long) */
1391 FALSE
, /* pc_relative */
1393 complain_overflow_signed
, /* complain_on_overflow */
1394 bfd_elf_generic_reloc
, /* special_function */
1395 "R_SH_GOT10BY4", /* name */
1396 FALSE
, /* partial_inplace */
1398 0xffc00, /* dst_mask */
1399 FALSE
), /* pcrel_offset */
1401 /* Used in LD.L, FLD.S et al. */
1402 HOWTO (R_SH_GOTPLT10BY4
, /* type */
1404 2, /* size (0 = byte, 1 = short, 2 = long) */
1406 FALSE
, /* pc_relative */
1408 complain_overflow_signed
, /* complain_on_overflow */
1409 bfd_elf_generic_reloc
, /* special_function */
1410 "R_SH_GOTPLT10BY4", /* name */
1411 FALSE
, /* partial_inplace */
1413 0xffc00, /* dst_mask */
1414 FALSE
), /* pcrel_offset */
1416 /* Used in FLD.D, FST.P et al. */
1417 HOWTO (R_SH_GOT10BY8
, /* type */
1419 2, /* size (0 = byte, 1 = short, 2 = long) */
1421 FALSE
, /* pc_relative */
1423 complain_overflow_signed
, /* complain_on_overflow */
1424 bfd_elf_generic_reloc
, /* special_function */
1425 "R_SH_GOT10BY8", /* name */
1426 FALSE
, /* partial_inplace */
1428 0xffc00, /* dst_mask */
1429 FALSE
), /* pcrel_offset */
1431 /* Used in FLD.D, FST.P et al. */
1432 HOWTO (R_SH_GOTPLT10BY8
, /* type */
1434 2, /* size (0 = byte, 1 = short, 2 = long) */
1436 FALSE
, /* pc_relative */
1438 complain_overflow_signed
, /* complain_on_overflow */
1439 bfd_elf_generic_reloc
, /* special_function */
1440 "R_SH_GOTPLT10BY8", /* name */
1441 FALSE
, /* partial_inplace */
1443 0xffc00, /* dst_mask */
1444 FALSE
), /* pcrel_offset */
1446 HOWTO (R_SH_COPY64
, /* type */
1448 4, /* size (0 = byte, 1 = short, 2 = long) */
1450 FALSE
, /* pc_relative */
1452 complain_overflow_dont
, /* complain_on_overflow */
1453 bfd_elf_generic_reloc
, /* special_function */
1454 "R_SH_COPY64", /* name */
1455 FALSE
, /* partial_inplace */
1457 ((bfd_vma
) 0) - 1, /* dst_mask */
1458 FALSE
), /* pcrel_offset */
1460 HOWTO (R_SH_GLOB_DAT64
, /* type */
1462 4, /* size (0 = byte, 1 = short, 2 = long) */
1464 FALSE
, /* pc_relative */
1466 complain_overflow_dont
, /* complain_on_overflow */
1467 bfd_elf_generic_reloc
, /* special_function */
1468 "R_SH_GLOB_DAT64", /* name */
1469 FALSE
, /* partial_inplace */
1471 ((bfd_vma
) 0) - 1, /* dst_mask */
1472 FALSE
), /* pcrel_offset */
1474 HOWTO (R_SH_JMP_SLOT64
, /* type */
1476 4, /* size (0 = byte, 1 = short, 2 = long) */
1478 FALSE
, /* pc_relative */
1480 complain_overflow_dont
, /* complain_on_overflow */
1481 bfd_elf_generic_reloc
, /* special_function */
1482 "R_SH_JMP_SLOT64", /* name */
1483 FALSE
, /* partial_inplace */
1485 ((bfd_vma
) 0) - 1, /* dst_mask */
1486 FALSE
), /* pcrel_offset */
1488 HOWTO (R_SH_RELATIVE64
, /* type */
1490 4, /* size (0 = byte, 1 = short, 2 = long) */
1492 FALSE
, /* pc_relative */
1494 complain_overflow_dont
, /* complain_on_overflow */
1495 bfd_elf_generic_reloc
, /* special_function */
1496 "R_SH_RELATIVE64", /* name */
1497 FALSE
, /* partial_inplace */
1499 ((bfd_vma
) 0) - 1, /* dst_mask */
1500 FALSE
), /* pcrel_offset */
1548 /* Relocations for SHmedia code. None of these are partial_inplace or
1549 use the field being relocated (except R_SH_PT_16). */
1551 /* The assembler will generate this reloc before a block of SHmedia
1552 instructions. A section should be processed as assuming it contains
1553 data, unless this reloc is seen. Note that a block of SHcompact
1554 instructions are instead preceded by R_SH_CODE.
1555 This is currently not implemented, but should be used for SHmedia
1556 linker relaxation. */
1557 HOWTO (R_SH_SHMEDIA_CODE
, /* type */
1559 1, /* size (0 = byte, 1 = short, 2 = long) */
1561 FALSE
, /* pc_relative */
1563 complain_overflow_unsigned
, /* complain_on_overflow */
1564 sh_elf_ignore_reloc
, /* special_function */
1565 "R_SH_SHMEDIA_CODE", /* name */
1566 FALSE
, /* partial_inplace */
1569 FALSE
), /* pcrel_offset */
1571 /* The assembler will generate this reloc at a PTA or PTB instruction,
1572 and the linker checks the right type of target, or changes a PTA to a
1573 PTB, if the original insn was PT. */
1574 HOWTO (R_SH_PT_16
, /* type */
1576 2, /* size (0 = byte, 1 = short, 2 = long) */
1578 TRUE
, /* pc_relative */
1580 complain_overflow_signed
, /* complain_on_overflow */
1581 bfd_elf_generic_reloc
, /* special_function */
1582 "R_SH_PT_16", /* name */
1583 FALSE
, /* partial_inplace */
1585 0x3fffc00, /* dst_mask */
1586 TRUE
), /* pcrel_offset */
1588 /* Used in unexpanded MOVI. */
1589 HOWTO (R_SH_IMMS16
, /* type */
1591 2, /* size (0 = byte, 1 = short, 2 = long) */
1593 FALSE
, /* pc_relative */
1595 complain_overflow_signed
, /* complain_on_overflow */
1596 bfd_elf_generic_reloc
, /* special_function */
1597 "R_SH_IMMS16", /* name */
1598 FALSE
, /* partial_inplace */
1600 0x3fffc00, /* dst_mask */
1601 FALSE
), /* pcrel_offset */
1603 /* Used in SHORI. */
1604 HOWTO (R_SH_IMMU16
, /* type */
1606 2, /* size (0 = byte, 1 = short, 2 = long) */
1608 FALSE
, /* pc_relative */
1610 complain_overflow_unsigned
, /* complain_on_overflow */
1611 bfd_elf_generic_reloc
, /* special_function */
1612 "R_SH_IMMU16", /* name */
1613 FALSE
, /* partial_inplace */
1615 0x3fffc00, /* dst_mask */
1616 FALSE
), /* pcrel_offset */
1618 /* Used in MOVI and SHORI (x & 65536). */
1619 HOWTO (R_SH_IMM_LOW16
, /* type */
1621 2, /* size (0 = byte, 1 = short, 2 = long) */
1623 FALSE
, /* pc_relative */
1625 complain_overflow_dont
, /* complain_on_overflow */
1626 bfd_elf_generic_reloc
, /* special_function */
1627 "R_SH_IMM_LOW16", /* name */
1628 FALSE
, /* partial_inplace */
1630 0x3fffc00, /* dst_mask */
1631 FALSE
), /* pcrel_offset */
1633 /* Used in MOVI and SHORI ((x - $) & 65536). */
1634 HOWTO (R_SH_IMM_LOW16_PCREL
, /* type */
1636 2, /* size (0 = byte, 1 = short, 2 = long) */
1638 TRUE
, /* pc_relative */
1640 complain_overflow_dont
, /* complain_on_overflow */
1641 bfd_elf_generic_reloc
, /* special_function */
1642 "R_SH_IMM_LOW16_PCREL", /* name */
1643 FALSE
, /* partial_inplace */
1645 0x3fffc00, /* dst_mask */
1646 TRUE
), /* pcrel_offset */
1648 /* Used in MOVI and SHORI ((x >> 16) & 65536). */
1649 HOWTO (R_SH_IMM_MEDLOW16
, /* type */
1650 16, /* rightshift */
1651 2, /* size (0 = byte, 1 = short, 2 = long) */
1653 FALSE
, /* pc_relative */
1655 complain_overflow_dont
, /* complain_on_overflow */
1656 bfd_elf_generic_reloc
, /* special_function */
1657 "R_SH_IMM_MEDLOW16", /* name */
1658 FALSE
, /* partial_inplace */
1660 0x3fffc00, /* dst_mask */
1661 FALSE
), /* pcrel_offset */
1663 /* Used in MOVI and SHORI (((x - $) >> 16) & 65536). */
1664 HOWTO (R_SH_IMM_MEDLOW16_PCREL
, /* type */
1665 16, /* rightshift */
1666 2, /* size (0 = byte, 1 = short, 2 = long) */
1668 TRUE
, /* pc_relative */
1670 complain_overflow_dont
, /* complain_on_overflow */
1671 bfd_elf_generic_reloc
, /* special_function */
1672 "R_SH_IMM_MEDLOW16_PCREL", /* name */
1673 FALSE
, /* partial_inplace */
1675 0x3fffc00, /* dst_mask */
1676 TRUE
), /* pcrel_offset */
1678 /* Used in MOVI and SHORI ((x >> 32) & 65536). */
1679 HOWTO (R_SH_IMM_MEDHI16
, /* type */
1680 32, /* rightshift */
1681 2, /* size (0 = byte, 1 = short, 2 = long) */
1683 FALSE
, /* pc_relative */
1685 complain_overflow_dont
, /* complain_on_overflow */
1686 bfd_elf_generic_reloc
, /* special_function */
1687 "R_SH_IMM_MEDHI16", /* name */
1688 FALSE
, /* partial_inplace */
1690 0x3fffc00, /* dst_mask */
1691 FALSE
), /* pcrel_offset */
1693 /* Used in MOVI and SHORI (((x - $) >> 32) & 65536). */
1694 HOWTO (R_SH_IMM_MEDHI16_PCREL
, /* type */
1695 32, /* rightshift */
1696 2, /* size (0 = byte, 1 = short, 2 = long) */
1698 TRUE
, /* pc_relative */
1700 complain_overflow_dont
, /* complain_on_overflow */
1701 bfd_elf_generic_reloc
, /* special_function */
1702 "R_SH_IMM_MEDHI16_PCREL", /* name */
1703 FALSE
, /* partial_inplace */
1705 0x3fffc00, /* dst_mask */
1706 TRUE
), /* pcrel_offset */
1708 /* Used in MOVI and SHORI ((x >> 48) & 65536). */
1709 HOWTO (R_SH_IMM_HI16
, /* type */
1710 48, /* rightshift */
1711 2, /* size (0 = byte, 1 = short, 2 = long) */
1713 FALSE
, /* pc_relative */
1715 complain_overflow_dont
, /* complain_on_overflow */
1716 bfd_elf_generic_reloc
, /* special_function */
1717 "R_SH_IMM_HI16", /* name */
1718 FALSE
, /* partial_inplace */
1720 0x3fffc00, /* dst_mask */
1721 FALSE
), /* pcrel_offset */
1723 /* Used in MOVI and SHORI (((x - $) >> 48) & 65536). */
1724 HOWTO (R_SH_IMM_HI16_PCREL
, /* type */
1725 48, /* rightshift */
1726 2, /* size (0 = byte, 1 = short, 2 = long) */
1728 TRUE
, /* pc_relative */
1730 complain_overflow_dont
, /* complain_on_overflow */
1731 bfd_elf_generic_reloc
, /* special_function */
1732 "R_SH_IMM_HI16_PCREL", /* name */
1733 FALSE
, /* partial_inplace */
1735 0x3fffc00, /* dst_mask */
1736 TRUE
), /* pcrel_offset */
1738 /* For the .uaquad pseudo. */
1739 HOWTO (R_SH_64
, /* type */
1741 4, /* size (0 = byte, 1 = short, 2 = long) */
1743 FALSE
, /* pc_relative */
1745 complain_overflow_dont
, /* complain_on_overflow */
1746 bfd_elf_generic_reloc
, /* special_function */
1747 "R_SH_64", /* name */
1748 FALSE
, /* partial_inplace */
1750 ((bfd_vma
) 0) - 1, /* dst_mask */
1751 FALSE
), /* pcrel_offset */
1753 /* For the .uaquad pseudo, (x - $). */
1754 HOWTO (R_SH_64_PCREL
, /* type */
1755 48, /* rightshift */
1756 2, /* size (0 = byte, 1 = short, 2 = long) */
1758 TRUE
, /* pc_relative */
1760 complain_overflow_dont
, /* complain_on_overflow */
1761 bfd_elf_generic_reloc
, /* special_function */
1762 "R_SH_64_PCREL", /* name */
1763 FALSE
, /* partial_inplace */
1765 ((bfd_vma
) 0) - 1, /* dst_mask */
1766 TRUE
), /* pcrel_offset */
1771 static bfd_reloc_status_type
1772 sh_elf_reloc_loop (int r_type ATTRIBUTE_UNUSED
, bfd
*input_bfd
,
1773 asection
*input_section
, bfd_byte
*contents
,
1774 bfd_vma addr
, asection
*symbol_section
,
1775 bfd_vma start
, bfd_vma end
)
1777 static bfd_vma last_addr
;
1778 static asection
*last_symbol_section
;
1779 bfd_byte
*start_ptr
, *ptr
, *last_ptr
;
1784 /* Sanity check the address. */
1785 if (addr
> bfd_get_section_limit (input_bfd
, input_section
))
1786 return bfd_reloc_outofrange
;
1788 /* We require the start and end relocations to be processed consecutively -
1789 although we allow then to be processed forwards or backwards. */
1793 last_symbol_section
= symbol_section
;
1794 return bfd_reloc_ok
;
1796 if (last_addr
!= addr
)
1800 if (! symbol_section
|| last_symbol_section
!= symbol_section
|| end
< start
)
1801 return bfd_reloc_outofrange
;
1803 /* Get the symbol_section contents. */
1804 if (symbol_section
!= input_section
)
1806 if (elf_section_data (symbol_section
)->this_hdr
.contents
!= NULL
)
1807 contents
= elf_section_data (symbol_section
)->this_hdr
.contents
;
1810 if (!bfd_malloc_and_get_section (input_bfd
, symbol_section
,
1813 if (contents
!= NULL
)
1815 return bfd_reloc_outofrange
;
1819 #define IS_PPI(PTR) ((bfd_get_16 (input_bfd, (PTR)) & 0xfc00) == 0xf800)
1820 start_ptr
= contents
+ start
;
1821 for (cum_diff
= -6, ptr
= contents
+ end
; cum_diff
< 0 && ptr
> start_ptr
;)
1823 for (last_ptr
= ptr
, ptr
-= 4; ptr
>= start_ptr
&& IS_PPI (ptr
);)
1826 diff
= (last_ptr
- ptr
) >> 1;
1827 cum_diff
+= diff
& 1;
1830 /* Calculate the start / end values to load into rs / re minus four -
1831 so that will cancel out the four we would otherwise have to add to
1832 addr to get the value to subtract in order to get relative addressing. */
1836 end
= (ptr
+ cum_diff
* 2) - contents
;
1840 bfd_vma start0
= start
- 4;
1842 while (start0
&& IS_PPI (contents
+ start0
))
1844 start0
= start
- 2 - ((start
- start0
) & 2);
1845 start
= start0
- cum_diff
- 2;
1849 if (contents
!= NULL
1850 && elf_section_data (symbol_section
)->this_hdr
.contents
!= contents
)
1853 insn
= bfd_get_16 (input_bfd
, contents
+ addr
);
1855 x
= (insn
& 0x200 ? end
: start
) - addr
;
1856 if (input_section
!= symbol_section
)
1857 x
+= ((symbol_section
->output_section
->vma
+ symbol_section
->output_offset
)
1858 - (input_section
->output_section
->vma
1859 + input_section
->output_offset
));
1861 if (x
< -128 || x
> 127)
1862 return bfd_reloc_overflow
;
1864 x
= (insn
& ~0xff) | (x
& 0xff);
1865 bfd_put_16 (input_bfd
, (bfd_vma
) x
, contents
+ addr
);
1867 return bfd_reloc_ok
;
1870 /* This function is used for normal relocs. This used to be like the COFF
1871 function, and is almost certainly incorrect for other ELF targets. */
1873 static bfd_reloc_status_type
1874 sh_elf_reloc (bfd
*abfd
, arelent
*reloc_entry
, asymbol
*symbol_in
,
1875 void *data
, asection
*input_section
, bfd
*output_bfd
,
1876 char **error_message ATTRIBUTE_UNUSED
)
1880 enum elf_sh_reloc_type r_type
;
1881 bfd_vma addr
= reloc_entry
->address
;
1882 bfd_byte
*hit_data
= addr
+ (bfd_byte
*) data
;
1884 r_type
= (enum elf_sh_reloc_type
) reloc_entry
->howto
->type
;
1886 if (output_bfd
!= NULL
)
1888 /* Partial linking--do nothing. */
1889 reloc_entry
->address
+= input_section
->output_offset
;
1890 return bfd_reloc_ok
;
1893 /* Almost all relocs have to do with relaxing. If any work must be
1894 done for them, it has been done in sh_relax_section. */
1895 if (r_type
== R_SH_IND12W
&& (symbol_in
->flags
& BSF_LOCAL
) != 0)
1896 return bfd_reloc_ok
;
1898 if (symbol_in
!= NULL
1899 && bfd_is_und_section (symbol_in
->section
))
1900 return bfd_reloc_undefined
;
1902 if (bfd_is_com_section (symbol_in
->section
))
1905 sym_value
= (symbol_in
->value
+
1906 symbol_in
->section
->output_section
->vma
+
1907 symbol_in
->section
->output_offset
);
1912 insn
= bfd_get_32 (abfd
, hit_data
);
1913 insn
+= sym_value
+ reloc_entry
->addend
;
1914 bfd_put_32 (abfd
, (bfd_vma
) insn
, hit_data
);
1917 insn
= bfd_get_16 (abfd
, hit_data
);
1918 sym_value
+= reloc_entry
->addend
;
1919 sym_value
-= (input_section
->output_section
->vma
1920 + input_section
->output_offset
1923 sym_value
+= (insn
& 0xfff) << 1;
1925 sym_value
-= 0x1000;
1926 insn
= (insn
& 0xf000) | (sym_value
& 0xfff);
1927 bfd_put_16 (abfd
, (bfd_vma
) insn
, hit_data
);
1928 if (sym_value
< (bfd_vma
) -0x1000 || sym_value
>= 0x1000)
1929 return bfd_reloc_overflow
;
1936 return bfd_reloc_ok
;
1939 /* This function is used for relocs which are only used for relaxing,
1940 which the linker should otherwise ignore. */
1942 static bfd_reloc_status_type
1943 sh_elf_ignore_reloc (bfd
*abfd ATTRIBUTE_UNUSED
, arelent
*reloc_entry
,
1944 asymbol
*symbol ATTRIBUTE_UNUSED
,
1945 void *data ATTRIBUTE_UNUSED
, asection
*input_section
,
1947 char **error_message ATTRIBUTE_UNUSED
)
1949 if (output_bfd
!= NULL
)
1950 reloc_entry
->address
+= input_section
->output_offset
;
1951 return bfd_reloc_ok
;
1954 /* This structure is used to map BFD reloc codes to SH ELF relocs. */
1956 struct elf_reloc_map
1958 bfd_reloc_code_real_type bfd_reloc_val
;
1959 unsigned char elf_reloc_val
;
1962 /* An array mapping BFD reloc codes to SH ELF relocs. */
1964 static const struct elf_reloc_map sh_reloc_map
[] =
1966 { BFD_RELOC_NONE
, R_SH_NONE
},
1967 { BFD_RELOC_32
, R_SH_DIR32
},
1968 { BFD_RELOC_16
, R_SH_DIR16
},
1969 { BFD_RELOC_8
, R_SH_DIR8
},
1970 { BFD_RELOC_CTOR
, R_SH_DIR32
},
1971 { BFD_RELOC_32_PCREL
, R_SH_REL32
},
1972 { BFD_RELOC_SH_PCDISP8BY2
, R_SH_DIR8WPN
},
1973 { BFD_RELOC_SH_PCDISP12BY2
, R_SH_IND12W
},
1974 { BFD_RELOC_SH_PCRELIMM8BY2
, R_SH_DIR8WPZ
},
1975 { BFD_RELOC_SH_PCRELIMM8BY4
, R_SH_DIR8WPL
},
1976 { BFD_RELOC_8_PCREL
, R_SH_SWITCH8
},
1977 { BFD_RELOC_SH_SWITCH16
, R_SH_SWITCH16
},
1978 { BFD_RELOC_SH_SWITCH32
, R_SH_SWITCH32
},
1979 { BFD_RELOC_SH_USES
, R_SH_USES
},
1980 { BFD_RELOC_SH_COUNT
, R_SH_COUNT
},
1981 { BFD_RELOC_SH_ALIGN
, R_SH_ALIGN
},
1982 { BFD_RELOC_SH_CODE
, R_SH_CODE
},
1983 { BFD_RELOC_SH_DATA
, R_SH_DATA
},
1984 { BFD_RELOC_SH_LABEL
, R_SH_LABEL
},
1985 { BFD_RELOC_VTABLE_INHERIT
, R_SH_GNU_VTINHERIT
},
1986 { BFD_RELOC_VTABLE_ENTRY
, R_SH_GNU_VTENTRY
},
1987 { BFD_RELOC_SH_LOOP_START
, R_SH_LOOP_START
},
1988 { BFD_RELOC_SH_LOOP_END
, R_SH_LOOP_END
},
1989 { BFD_RELOC_SH_TLS_GD_32
, R_SH_TLS_GD_32
},
1990 { BFD_RELOC_SH_TLS_LD_32
, R_SH_TLS_LD_32
},
1991 { BFD_RELOC_SH_TLS_LDO_32
, R_SH_TLS_LDO_32
},
1992 { BFD_RELOC_SH_TLS_IE_32
, R_SH_TLS_IE_32
},
1993 { BFD_RELOC_SH_TLS_LE_32
, R_SH_TLS_LE_32
},
1994 { BFD_RELOC_SH_TLS_DTPMOD32
, R_SH_TLS_DTPMOD32
},
1995 { BFD_RELOC_SH_TLS_DTPOFF32
, R_SH_TLS_DTPOFF32
},
1996 { BFD_RELOC_SH_TLS_TPOFF32
, R_SH_TLS_TPOFF32
},
1997 { BFD_RELOC_32_GOT_PCREL
, R_SH_GOT32
},
1998 { BFD_RELOC_32_PLT_PCREL
, R_SH_PLT32
},
1999 { BFD_RELOC_SH_COPY
, R_SH_COPY
},
2000 { BFD_RELOC_SH_GLOB_DAT
, R_SH_GLOB_DAT
},
2001 { BFD_RELOC_SH_JMP_SLOT
, R_SH_JMP_SLOT
},
2002 { BFD_RELOC_SH_RELATIVE
, R_SH_RELATIVE
},
2003 { BFD_RELOC_32_GOTOFF
, R_SH_GOTOFF
},
2004 { BFD_RELOC_SH_GOTPC
, R_SH_GOTPC
},
2005 { BFD_RELOC_SH_GOTPLT32
, R_SH_GOTPLT32
},
2006 #ifdef INCLUDE_SHMEDIA
2007 { BFD_RELOC_SH_GOT_LOW16
, R_SH_GOT_LOW16
},
2008 { BFD_RELOC_SH_GOT_MEDLOW16
, R_SH_GOT_MEDLOW16
},
2009 { BFD_RELOC_SH_GOT_MEDHI16
, R_SH_GOT_MEDHI16
},
2010 { BFD_RELOC_SH_GOT_HI16
, R_SH_GOT_HI16
},
2011 { BFD_RELOC_SH_GOTPLT_LOW16
, R_SH_GOTPLT_LOW16
},
2012 { BFD_RELOC_SH_GOTPLT_MEDLOW16
, R_SH_GOTPLT_MEDLOW16
},
2013 { BFD_RELOC_SH_GOTPLT_MEDHI16
, R_SH_GOTPLT_MEDHI16
},
2014 { BFD_RELOC_SH_GOTPLT_HI16
, R_SH_GOTPLT_HI16
},
2015 { BFD_RELOC_SH_PLT_LOW16
, R_SH_PLT_LOW16
},
2016 { BFD_RELOC_SH_PLT_MEDLOW16
, R_SH_PLT_MEDLOW16
},
2017 { BFD_RELOC_SH_PLT_MEDHI16
, R_SH_PLT_MEDHI16
},
2018 { BFD_RELOC_SH_PLT_HI16
, R_SH_PLT_HI16
},
2019 { BFD_RELOC_SH_GOTOFF_LOW16
, R_SH_GOTOFF_LOW16
},
2020 { BFD_RELOC_SH_GOTOFF_MEDLOW16
, R_SH_GOTOFF_MEDLOW16
},
2021 { BFD_RELOC_SH_GOTOFF_MEDHI16
, R_SH_GOTOFF_MEDHI16
},
2022 { BFD_RELOC_SH_GOTOFF_HI16
, R_SH_GOTOFF_HI16
},
2023 { BFD_RELOC_SH_GOTPC_LOW16
, R_SH_GOTPC_LOW16
},
2024 { BFD_RELOC_SH_GOTPC_MEDLOW16
, R_SH_GOTPC_MEDLOW16
},
2025 { BFD_RELOC_SH_GOTPC_MEDHI16
, R_SH_GOTPC_MEDHI16
},
2026 { BFD_RELOC_SH_GOTPC_HI16
, R_SH_GOTPC_HI16
},
2027 { BFD_RELOC_SH_COPY64
, R_SH_COPY64
},
2028 { BFD_RELOC_SH_GLOB_DAT64
, R_SH_GLOB_DAT64
},
2029 { BFD_RELOC_SH_JMP_SLOT64
, R_SH_JMP_SLOT64
},
2030 { BFD_RELOC_SH_RELATIVE64
, R_SH_RELATIVE64
},
2031 { BFD_RELOC_SH_GOT10BY4
, R_SH_GOT10BY4
},
2032 { BFD_RELOC_SH_GOT10BY8
, R_SH_GOT10BY8
},
2033 { BFD_RELOC_SH_GOTPLT10BY4
, R_SH_GOTPLT10BY4
},
2034 { BFD_RELOC_SH_GOTPLT10BY8
, R_SH_GOTPLT10BY8
},
2035 { BFD_RELOC_SH_PT_16
, R_SH_PT_16
},
2036 { BFD_RELOC_SH_SHMEDIA_CODE
, R_SH_SHMEDIA_CODE
},
2037 { BFD_RELOC_SH_IMMU5
, R_SH_DIR5U
},
2038 { BFD_RELOC_SH_IMMS6
, R_SH_DIR6S
},
2039 { BFD_RELOC_SH_IMMU6
, R_SH_DIR6U
},
2040 { BFD_RELOC_SH_IMMS10
, R_SH_DIR10S
},
2041 { BFD_RELOC_SH_IMMS10BY2
, R_SH_DIR10SW
},
2042 { BFD_RELOC_SH_IMMS10BY4
, R_SH_DIR10SL
},
2043 { BFD_RELOC_SH_IMMS10BY8
, R_SH_DIR10SQ
},
2044 { BFD_RELOC_SH_IMMS16
, R_SH_IMMS16
},
2045 { BFD_RELOC_SH_IMMU16
, R_SH_IMMU16
},
2046 { BFD_RELOC_SH_IMM_LOW16
, R_SH_IMM_LOW16
},
2047 { BFD_RELOC_SH_IMM_LOW16_PCREL
, R_SH_IMM_LOW16_PCREL
},
2048 { BFD_RELOC_SH_IMM_MEDLOW16
, R_SH_IMM_MEDLOW16
},
2049 { BFD_RELOC_SH_IMM_MEDLOW16_PCREL
, R_SH_IMM_MEDLOW16_PCREL
},
2050 { BFD_RELOC_SH_IMM_MEDHI16
, R_SH_IMM_MEDHI16
},
2051 { BFD_RELOC_SH_IMM_MEDHI16_PCREL
, R_SH_IMM_MEDHI16_PCREL
},
2052 { BFD_RELOC_SH_IMM_HI16
, R_SH_IMM_HI16
},
2053 { BFD_RELOC_SH_IMM_HI16_PCREL
, R_SH_IMM_HI16_PCREL
},
2054 { BFD_RELOC_64
, R_SH_64
},
2055 { BFD_RELOC_64_PCREL
, R_SH_64_PCREL
},
2056 #endif /* not INCLUDE_SHMEDIA */
2059 /* Given a BFD reloc code, return the howto structure for the
2060 corresponding SH ELf reloc. */
2062 static reloc_howto_type
*
2063 sh_elf_reloc_type_lookup (bfd
*abfd ATTRIBUTE_UNUSED
,
2064 bfd_reloc_code_real_type code
)
2068 for (i
= 0; i
< sizeof (sh_reloc_map
) / sizeof (struct elf_reloc_map
); i
++)
2070 if (sh_reloc_map
[i
].bfd_reloc_val
== code
)
2071 return &sh_elf_howto_table
[(int) sh_reloc_map
[i
].elf_reloc_val
];
2077 /* Given an ELF reloc, fill in the howto field of a relent. */
2080 sh_elf_info_to_howto (bfd
*abfd ATTRIBUTE_UNUSED
, arelent
*cache_ptr
,
2081 Elf_Internal_Rela
*dst
)
2085 r
= ELF32_R_TYPE (dst
->r_info
);
2087 BFD_ASSERT (r
< (unsigned int) R_SH_max
);
2088 BFD_ASSERT (r
< R_SH_FIRST_INVALID_RELOC
|| r
> R_SH_LAST_INVALID_RELOC
);
2089 BFD_ASSERT (r
< R_SH_FIRST_INVALID_RELOC_2
|| r
> R_SH_LAST_INVALID_RELOC_2
);
2090 BFD_ASSERT (r
< R_SH_FIRST_INVALID_RELOC_3
|| r
> R_SH_LAST_INVALID_RELOC_3
);
2091 BFD_ASSERT (r
< R_SH_FIRST_INVALID_RELOC_4
|| r
> R_SH_LAST_INVALID_RELOC_4
);
2092 BFD_ASSERT (r
< R_SH_FIRST_INVALID_RELOC_5
|| r
> R_SH_LAST_INVALID_RELOC_5
);
2094 cache_ptr
->howto
= &sh_elf_howto_table
[r
];
2097 /* This function handles relaxing for SH ELF. See the corresponding
2098 function in coff-sh.c for a description of what this does. FIXME:
2099 There is a lot of duplication here between this code and the COFF
2100 specific code. The format of relocs and symbols is wound deeply
2101 into this code, but it would still be better if the duplication
2102 could be eliminated somehow. Note in particular that although both
2103 functions use symbols like R_SH_CODE, those symbols have different
2104 values; in coff-sh.c they come from include/coff/sh.h, whereas here
2105 they come from enum elf_sh_reloc_type in include/elf/sh.h. */
2108 sh_elf_relax_section (bfd
*abfd
, asection
*sec
,
2109 struct bfd_link_info
*link_info
, bfd_boolean
*again
)
2111 Elf_Internal_Shdr
*symtab_hdr
;
2112 Elf_Internal_Rela
*internal_relocs
;
2113 bfd_boolean have_code
;
2114 Elf_Internal_Rela
*irel
, *irelend
;
2115 bfd_byte
*contents
= NULL
;
2116 Elf_Internal_Sym
*isymbuf
= NULL
;
2120 if (link_info
->relocatable
2121 || (sec
->flags
& SEC_RELOC
) == 0
2122 || sec
->reloc_count
== 0)
2125 #ifdef INCLUDE_SHMEDIA
2126 if (elf_section_data (sec
)->this_hdr
.sh_flags
2127 & (SHF_SH5_ISA32
| SHF_SH5_ISA32_MIXED
))
2133 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
2135 internal_relocs
= (_bfd_elf_link_read_relocs
2136 (abfd
, sec
, NULL
, (Elf_Internal_Rela
*) NULL
,
2137 link_info
->keep_memory
));
2138 if (internal_relocs
== NULL
)
2143 irelend
= internal_relocs
+ sec
->reloc_count
;
2144 for (irel
= internal_relocs
; irel
< irelend
; irel
++)
2146 bfd_vma laddr
, paddr
, symval
;
2147 unsigned short insn
;
2148 Elf_Internal_Rela
*irelfn
, *irelscan
, *irelcount
;
2149 bfd_signed_vma foff
;
2151 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_SH_CODE
)
2154 if (ELF32_R_TYPE (irel
->r_info
) != (int) R_SH_USES
)
2157 /* Get the section contents. */
2158 if (contents
== NULL
)
2160 if (elf_section_data (sec
)->this_hdr
.contents
!= NULL
)
2161 contents
= elf_section_data (sec
)->this_hdr
.contents
;
2164 if (!bfd_malloc_and_get_section (abfd
, sec
, &contents
))
2169 /* The r_addend field of the R_SH_USES reloc will point us to
2170 the register load. The 4 is because the r_addend field is
2171 computed as though it were a jump offset, which are based
2172 from 4 bytes after the jump instruction. */
2173 laddr
= irel
->r_offset
+ 4 + irel
->r_addend
;
2174 if (laddr
>= sec
->size
)
2176 (*_bfd_error_handler
) (_("%B: 0x%lx: warning: bad R_SH_USES offset"),
2178 (unsigned long) irel
->r_offset
);
2181 insn
= bfd_get_16 (abfd
, contents
+ laddr
);
2183 /* If the instruction is not mov.l NN,rN, we don't know what to
2185 if ((insn
& 0xf000) != 0xd000)
2187 ((*_bfd_error_handler
)
2188 (_("%B: 0x%lx: warning: R_SH_USES points to unrecognized insn 0x%x"),
2189 abfd
, (unsigned long) irel
->r_offset
, insn
));
2193 /* Get the address from which the register is being loaded. The
2194 displacement in the mov.l instruction is quadrupled. It is a
2195 displacement from four bytes after the movl instruction, but,
2196 before adding in the PC address, two least significant bits
2197 of the PC are cleared. We assume that the section is aligned
2198 on a four byte boundary. */
2199 paddr
= insn
& 0xff;
2201 paddr
+= (laddr
+ 4) &~ (bfd_vma
) 3;
2202 if (paddr
>= sec
->size
)
2204 ((*_bfd_error_handler
)
2205 (_("%B: 0x%lx: warning: bad R_SH_USES load offset"),
2206 abfd
, (unsigned long) irel
->r_offset
));
2210 /* Get the reloc for the address from which the register is
2211 being loaded. This reloc will tell us which function is
2212 actually being called. */
2213 for (irelfn
= internal_relocs
; irelfn
< irelend
; irelfn
++)
2214 if (irelfn
->r_offset
== paddr
2215 && ELF32_R_TYPE (irelfn
->r_info
) == (int) R_SH_DIR32
)
2217 if (irelfn
>= irelend
)
2219 ((*_bfd_error_handler
)
2220 (_("%B: 0x%lx: warning: could not find expected reloc"),
2221 abfd
, (unsigned long) paddr
));
2225 /* Read this BFD's symbols if we haven't done so already. */
2226 if (isymbuf
== NULL
&& symtab_hdr
->sh_info
!= 0)
2228 isymbuf
= (Elf_Internal_Sym
*) symtab_hdr
->contents
;
2229 if (isymbuf
== NULL
)
2230 isymbuf
= bfd_elf_get_elf_syms (abfd
, symtab_hdr
,
2231 symtab_hdr
->sh_info
, 0,
2233 if (isymbuf
== NULL
)
2237 /* Get the value of the symbol referred to by the reloc. */
2238 if (ELF32_R_SYM (irelfn
->r_info
) < symtab_hdr
->sh_info
)
2240 /* A local symbol. */
2241 Elf_Internal_Sym
*isym
;
2243 isym
= isymbuf
+ ELF32_R_SYM (irelfn
->r_info
);
2245 != (unsigned int) _bfd_elf_section_from_bfd_section (abfd
, sec
))
2247 ((*_bfd_error_handler
)
2248 (_("%B: 0x%lx: warning: symbol in unexpected section"),
2249 abfd
, (unsigned long) paddr
));
2253 symval
= (isym
->st_value
2254 + sec
->output_section
->vma
2255 + sec
->output_offset
);
2260 struct elf_link_hash_entry
*h
;
2262 indx
= ELF32_R_SYM (irelfn
->r_info
) - symtab_hdr
->sh_info
;
2263 h
= elf_sym_hashes (abfd
)[indx
];
2264 BFD_ASSERT (h
!= NULL
);
2265 if (h
->root
.type
!= bfd_link_hash_defined
2266 && h
->root
.type
!= bfd_link_hash_defweak
)
2268 /* This appears to be a reference to an undefined
2269 symbol. Just ignore it--it will be caught by the
2270 regular reloc processing. */
2274 symval
= (h
->root
.u
.def
.value
2275 + h
->root
.u
.def
.section
->output_section
->vma
2276 + h
->root
.u
.def
.section
->output_offset
);
2279 symval
+= bfd_get_32 (abfd
, contents
+ paddr
);
2281 /* See if this function call can be shortened. */
2284 + sec
->output_section
->vma
2285 + sec
->output_offset
2287 if (foff
< -0x1000 || foff
>= 0x1000)
2289 /* After all that work, we can't shorten this function call. */
2293 /* Shorten the function call. */
2295 /* For simplicity of coding, we are going to modify the section
2296 contents, the section relocs, and the BFD symbol table. We
2297 must tell the rest of the code not to free up this
2298 information. It would be possible to instead create a table
2299 of changes which have to be made, as is done in coff-mips.c;
2300 that would be more work, but would require less memory when
2301 the linker is run. */
2303 elf_section_data (sec
)->relocs
= internal_relocs
;
2304 elf_section_data (sec
)->this_hdr
.contents
= contents
;
2305 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
2307 /* Replace the jsr with a bsr. */
2309 /* Change the R_SH_USES reloc into an R_SH_IND12W reloc, and
2310 replace the jsr with a bsr. */
2311 irel
->r_info
= ELF32_R_INFO (ELF32_R_SYM (irelfn
->r_info
), R_SH_IND12W
);
2312 /* We used to test (ELF32_R_SYM (irelfn->r_info) < symtab_hdr->sh_info)
2313 here, but that only checks if the symbol is an external symbol,
2314 not if the symbol is in a different section. Besides, we need
2315 a consistent meaning for the relocation, so we just assume here that
2316 the value of the symbol is not available. */
2318 /* We can't fully resolve this yet, because the external
2319 symbol value may be changed by future relaxing. We let
2320 the final link phase handle it. */
2321 bfd_put_16 (abfd
, (bfd_vma
) 0xb000, contents
+ irel
->r_offset
);
2323 irel
->r_addend
= -4;
2325 /* See if there is another R_SH_USES reloc referring to the same
2327 for (irelscan
= internal_relocs
; irelscan
< irelend
; irelscan
++)
2328 if (ELF32_R_TYPE (irelscan
->r_info
) == (int) R_SH_USES
2329 && laddr
== irelscan
->r_offset
+ 4 + irelscan
->r_addend
)
2331 if (irelscan
< irelend
)
2333 /* Some other function call depends upon this register load,
2334 and we have not yet converted that function call.
2335 Indeed, we may never be able to convert it. There is
2336 nothing else we can do at this point. */
2340 /* Look for a R_SH_COUNT reloc on the location where the
2341 function address is stored. Do this before deleting any
2342 bytes, to avoid confusion about the address. */
2343 for (irelcount
= internal_relocs
; irelcount
< irelend
; irelcount
++)
2344 if (irelcount
->r_offset
== paddr
2345 && ELF32_R_TYPE (irelcount
->r_info
) == (int) R_SH_COUNT
)
2348 /* Delete the register load. */
2349 if (! sh_elf_relax_delete_bytes (abfd
, sec
, laddr
, 2))
2352 /* That will change things, so, just in case it permits some
2353 other function call to come within range, we should relax
2354 again. Note that this is not required, and it may be slow. */
2357 /* Now check whether we got a COUNT reloc. */
2358 if (irelcount
>= irelend
)
2360 ((*_bfd_error_handler
)
2361 (_("%B: 0x%lx: warning: could not find expected COUNT reloc"),
2362 abfd
, (unsigned long) paddr
));
2366 /* The number of uses is stored in the r_addend field. We've
2367 just deleted one. */
2368 if (irelcount
->r_addend
== 0)
2370 ((*_bfd_error_handler
) (_("%B: 0x%lx: warning: bad count"),
2372 (unsigned long) paddr
));
2376 --irelcount
->r_addend
;
2378 /* If there are no more uses, we can delete the address. Reload
2379 the address from irelfn, in case it was changed by the
2380 previous call to sh_elf_relax_delete_bytes. */
2381 if (irelcount
->r_addend
== 0)
2383 if (! sh_elf_relax_delete_bytes (abfd
, sec
, irelfn
->r_offset
, 4))
2387 /* We've done all we can with that function call. */
2390 /* Look for load and store instructions that we can align on four
2392 if ((elf_elfheader (abfd
)->e_flags
& EF_SH_MACH_MASK
) != EF_SH4
2395 bfd_boolean swapped
;
2397 /* Get the section contents. */
2398 if (contents
== NULL
)
2400 if (elf_section_data (sec
)->this_hdr
.contents
!= NULL
)
2401 contents
= elf_section_data (sec
)->this_hdr
.contents
;
2404 if (!bfd_malloc_and_get_section (abfd
, sec
, &contents
))
2409 if (! sh_elf_align_loads (abfd
, sec
, internal_relocs
, contents
,
2415 elf_section_data (sec
)->relocs
= internal_relocs
;
2416 elf_section_data (sec
)->this_hdr
.contents
= contents
;
2417 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
2422 && symtab_hdr
->contents
!= (unsigned char *) isymbuf
)
2424 if (! link_info
->keep_memory
)
2428 /* Cache the symbols for elf_link_input_bfd. */
2429 symtab_hdr
->contents
= (unsigned char *) isymbuf
;
2433 if (contents
!= NULL
2434 && elf_section_data (sec
)->this_hdr
.contents
!= contents
)
2436 if (! link_info
->keep_memory
)
2440 /* Cache the section contents for elf_link_input_bfd. */
2441 elf_section_data (sec
)->this_hdr
.contents
= contents
;
2445 if (internal_relocs
!= NULL
2446 && elf_section_data (sec
)->relocs
!= internal_relocs
)
2447 free (internal_relocs
);
2453 && symtab_hdr
->contents
!= (unsigned char *) isymbuf
)
2455 if (contents
!= NULL
2456 && elf_section_data (sec
)->this_hdr
.contents
!= contents
)
2458 if (internal_relocs
!= NULL
2459 && elf_section_data (sec
)->relocs
!= internal_relocs
)
2460 free (internal_relocs
);
2465 /* Delete some bytes from a section while relaxing. FIXME: There is a
2466 lot of duplication between this function and sh_relax_delete_bytes
2470 sh_elf_relax_delete_bytes (bfd
*abfd
, asection
*sec
, bfd_vma addr
,
2473 Elf_Internal_Shdr
*symtab_hdr
;
2474 unsigned int sec_shndx
;
2476 Elf_Internal_Rela
*irel
, *irelend
;
2477 Elf_Internal_Rela
*irelalign
;
2479 Elf_Internal_Sym
*isymbuf
, *isym
, *isymend
;
2480 struct elf_link_hash_entry
**sym_hashes
;
2481 struct elf_link_hash_entry
**end_hashes
;
2482 unsigned int symcount
;
2485 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
2486 isymbuf
= (Elf_Internal_Sym
*) symtab_hdr
->contents
;
2488 sec_shndx
= _bfd_elf_section_from_bfd_section (abfd
, sec
);
2490 contents
= elf_section_data (sec
)->this_hdr
.contents
;
2492 /* The deletion must stop at the next ALIGN reloc for an aligment
2493 power larger than the number of bytes we are deleting. */
2498 irel
= elf_section_data (sec
)->relocs
;
2499 irelend
= irel
+ sec
->reloc_count
;
2500 for (; irel
< irelend
; irel
++)
2502 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_SH_ALIGN
2503 && irel
->r_offset
> addr
2504 && count
< (1 << irel
->r_addend
))
2507 toaddr
= irel
->r_offset
;
2512 /* Actually delete the bytes. */
2513 memmove (contents
+ addr
, contents
+ addr
+ count
,
2514 (size_t) (toaddr
- addr
- count
));
2515 if (irelalign
== NULL
)
2521 #define NOP_OPCODE (0x0009)
2523 BFD_ASSERT ((count
& 1) == 0);
2524 for (i
= 0; i
< count
; i
+= 2)
2525 bfd_put_16 (abfd
, (bfd_vma
) NOP_OPCODE
, contents
+ toaddr
- count
+ i
);
2528 /* Adjust all the relocs. */
2529 for (irel
= elf_section_data (sec
)->relocs
; irel
< irelend
; irel
++)
2531 bfd_vma nraddr
, stop
;
2534 int off
, adjust
, oinsn
;
2535 bfd_signed_vma voff
= 0;
2536 bfd_boolean overflow
;
2538 /* Get the new reloc address. */
2539 nraddr
= irel
->r_offset
;
2540 if ((irel
->r_offset
> addr
2541 && irel
->r_offset
< toaddr
)
2542 || (ELF32_R_TYPE (irel
->r_info
) == (int) R_SH_ALIGN
2543 && irel
->r_offset
== toaddr
))
2546 /* See if this reloc was for the bytes we have deleted, in which
2547 case we no longer care about it. Don't delete relocs which
2548 represent addresses, though. */
2549 if (irel
->r_offset
>= addr
2550 && irel
->r_offset
< addr
+ count
2551 && ELF32_R_TYPE (irel
->r_info
) != (int) R_SH_ALIGN
2552 && ELF32_R_TYPE (irel
->r_info
) != (int) R_SH_CODE
2553 && ELF32_R_TYPE (irel
->r_info
) != (int) R_SH_DATA
2554 && ELF32_R_TYPE (irel
->r_info
) != (int) R_SH_LABEL
)
2555 irel
->r_info
= ELF32_R_INFO (ELF32_R_SYM (irel
->r_info
),
2558 /* If this is a PC relative reloc, see if the range it covers
2559 includes the bytes we have deleted. */
2560 switch ((enum elf_sh_reloc_type
) ELF32_R_TYPE (irel
->r_info
))
2569 start
= irel
->r_offset
;
2570 insn
= bfd_get_16 (abfd
, contents
+ nraddr
);
2574 switch ((enum elf_sh_reloc_type
) ELF32_R_TYPE (irel
->r_info
))
2577 start
= stop
= addr
;
2581 /* If this reloc is against a symbol defined in this
2582 section, and the symbol will not be adjusted below, we
2583 must check the addend to see it will put the value in
2584 range to be adjusted, and hence must be changed. */
2585 if (ELF32_R_SYM (irel
->r_info
) < symtab_hdr
->sh_info
)
2587 isym
= isymbuf
+ ELF32_R_SYM (irel
->r_info
);
2588 if (isym
->st_shndx
== sec_shndx
2589 && (isym
->st_value
<= addr
2590 || isym
->st_value
>= toaddr
))
2594 val
= bfd_get_32 (abfd
, contents
+ nraddr
);
2595 val
+= isym
->st_value
;
2596 if (val
> addr
&& val
< toaddr
)
2597 bfd_put_32 (abfd
, val
- count
, contents
+ nraddr
);
2600 start
= stop
= addr
;
2607 stop
= (bfd_vma
) ((bfd_signed_vma
) start
+ 4 + off
* 2);
2614 /* This has been made by previous relaxation. Since the
2615 relocation will be against an external symbol, the
2616 final relocation will just do the right thing. */
2617 start
= stop
= addr
;
2623 stop
= (bfd_vma
) ((bfd_signed_vma
) start
+ 4 + off
* 2);
2625 /* The addend will be against the section symbol, thus
2626 for adjusting the addend, the relevant start is the
2627 start of the section.
2628 N.B. If we want to abandon in-place changes here and
2629 test directly using symbol + addend, we have to take into
2630 account that the addend has already been adjusted by -4. */
2631 if (stop
> addr
&& stop
< toaddr
)
2632 irel
->r_addend
-= count
;
2638 stop
= start
+ 4 + off
* 2;
2643 stop
= (start
& ~(bfd_vma
) 3) + 4 + off
* 4;
2649 /* These relocs types represent
2651 The r_addend field holds the difference between the reloc
2652 address and L1. That is the start of the reloc, and
2653 adding in the contents gives us the top. We must adjust
2654 both the r_offset field and the section contents.
2655 N.B. in gas / coff bfd, the elf bfd r_addend is called r_offset,
2656 and the elf bfd r_offset is called r_vaddr. */
2658 stop
= irel
->r_offset
;
2659 start
= (bfd_vma
) ((bfd_signed_vma
) stop
- (long) irel
->r_addend
);
2663 && (stop
<= addr
|| stop
>= toaddr
))
2664 irel
->r_addend
+= count
;
2665 else if (stop
> addr
2667 && (start
<= addr
|| start
>= toaddr
))
2668 irel
->r_addend
-= count
;
2670 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_SH_SWITCH16
)
2671 voff
= bfd_get_signed_16 (abfd
, contents
+ nraddr
);
2672 else if (ELF32_R_TYPE (irel
->r_info
) == (int) R_SH_SWITCH8
)
2673 voff
= bfd_get_8 (abfd
, contents
+ nraddr
);
2675 voff
= bfd_get_signed_32 (abfd
, contents
+ nraddr
);
2676 stop
= (bfd_vma
) ((bfd_signed_vma
) start
+ voff
);
2681 start
= irel
->r_offset
;
2682 stop
= (bfd_vma
) ((bfd_signed_vma
) start
2683 + (long) irel
->r_addend
2690 && (stop
<= addr
|| stop
>= toaddr
))
2692 else if (stop
> addr
2694 && (start
<= addr
|| start
>= toaddr
))
2703 switch ((enum elf_sh_reloc_type
) ELF32_R_TYPE (irel
->r_info
))
2712 if ((oinsn
& 0xff00) != (insn
& 0xff00))
2714 bfd_put_16 (abfd
, (bfd_vma
) insn
, contents
+ nraddr
);
2719 if ((oinsn
& 0xf000) != (insn
& 0xf000))
2721 bfd_put_16 (abfd
, (bfd_vma
) insn
, contents
+ nraddr
);
2725 BFD_ASSERT (adjust
== count
|| count
>= 4);
2730 if ((irel
->r_offset
& 3) == 0)
2733 if ((oinsn
& 0xff00) != (insn
& 0xff00))
2735 bfd_put_16 (abfd
, (bfd_vma
) insn
, contents
+ nraddr
);
2740 if (voff
< 0 || voff
>= 0xff)
2742 bfd_put_8 (abfd
, voff
, contents
+ nraddr
);
2747 if (voff
< - 0x8000 || voff
>= 0x8000)
2749 bfd_put_signed_16 (abfd
, (bfd_vma
) voff
, contents
+ nraddr
);
2754 bfd_put_signed_32 (abfd
, (bfd_vma
) voff
, contents
+ nraddr
);
2758 irel
->r_addend
+= adjust
;
2764 ((*_bfd_error_handler
)
2765 (_("%B: 0x%lx: fatal: reloc overflow while relaxing"),
2766 abfd
, (unsigned long) irel
->r_offset
));
2767 bfd_set_error (bfd_error_bad_value
);
2772 irel
->r_offset
= nraddr
;
2775 /* Look through all the other sections. If there contain any IMM32
2776 relocs against internal symbols which we are not going to adjust
2777 below, we may need to adjust the addends. */
2778 for (o
= abfd
->sections
; o
!= NULL
; o
= o
->next
)
2780 Elf_Internal_Rela
*internal_relocs
;
2781 Elf_Internal_Rela
*irelscan
, *irelscanend
;
2782 bfd_byte
*ocontents
;
2785 || (o
->flags
& SEC_RELOC
) == 0
2786 || o
->reloc_count
== 0)
2789 /* We always cache the relocs. Perhaps, if info->keep_memory is
2790 FALSE, we should free them, if we are permitted to, when we
2791 leave sh_coff_relax_section. */
2792 internal_relocs
= (_bfd_elf_link_read_relocs
2793 (abfd
, o
, NULL
, (Elf_Internal_Rela
*) NULL
, TRUE
));
2794 if (internal_relocs
== NULL
)
2798 irelscanend
= internal_relocs
+ o
->reloc_count
;
2799 for (irelscan
= internal_relocs
; irelscan
< irelscanend
; irelscan
++)
2801 /* Dwarf line numbers use R_SH_SWITCH32 relocs. */
2802 if (ELF32_R_TYPE (irelscan
->r_info
) == (int) R_SH_SWITCH32
)
2804 bfd_vma start
, stop
;
2805 bfd_signed_vma voff
;
2807 if (ocontents
== NULL
)
2809 if (elf_section_data (o
)->this_hdr
.contents
!= NULL
)
2810 ocontents
= elf_section_data (o
)->this_hdr
.contents
;
2813 /* We always cache the section contents.
2814 Perhaps, if info->keep_memory is FALSE, we
2815 should free them, if we are permitted to,
2816 when we leave sh_coff_relax_section. */
2817 if (!bfd_malloc_and_get_section (abfd
, o
, &ocontents
))
2819 if (ocontents
!= NULL
)
2824 elf_section_data (o
)->this_hdr
.contents
= ocontents
;
2828 stop
= irelscan
->r_offset
;
2830 = (bfd_vma
) ((bfd_signed_vma
) stop
- (long) irelscan
->r_addend
);
2832 /* STOP is in a different section, so it won't change. */
2833 if (start
> addr
&& start
< toaddr
)
2834 irelscan
->r_addend
+= count
;
2836 voff
= bfd_get_signed_32 (abfd
, ocontents
+ irelscan
->r_offset
);
2837 stop
= (bfd_vma
) ((bfd_signed_vma
) start
+ voff
);
2841 && (stop
<= addr
|| stop
>= toaddr
))
2842 bfd_put_signed_32 (abfd
, (bfd_vma
) voff
+ count
,
2843 ocontents
+ irelscan
->r_offset
);
2844 else if (stop
> addr
2846 && (start
<= addr
|| start
>= toaddr
))
2847 bfd_put_signed_32 (abfd
, (bfd_vma
) voff
- count
,
2848 ocontents
+ irelscan
->r_offset
);
2851 if (ELF32_R_TYPE (irelscan
->r_info
) != (int) R_SH_DIR32
)
2854 if (ELF32_R_SYM (irelscan
->r_info
) >= symtab_hdr
->sh_info
)
2858 isym
= isymbuf
+ ELF32_R_SYM (irelscan
->r_info
);
2859 if (isym
->st_shndx
== sec_shndx
2860 && (isym
->st_value
<= addr
2861 || isym
->st_value
>= toaddr
))
2865 if (ocontents
== NULL
)
2867 if (elf_section_data (o
)->this_hdr
.contents
!= NULL
)
2868 ocontents
= elf_section_data (o
)->this_hdr
.contents
;
2871 /* We always cache the section contents.
2872 Perhaps, if info->keep_memory is FALSE, we
2873 should free them, if we are permitted to,
2874 when we leave sh_coff_relax_section. */
2875 if (!bfd_malloc_and_get_section (abfd
, o
, &ocontents
))
2877 if (ocontents
!= NULL
)
2882 elf_section_data (o
)->this_hdr
.contents
= ocontents
;
2886 val
= bfd_get_32 (abfd
, ocontents
+ irelscan
->r_offset
);
2887 val
+= isym
->st_value
;
2888 if (val
> addr
&& val
< toaddr
)
2889 bfd_put_32 (abfd
, val
- count
,
2890 ocontents
+ irelscan
->r_offset
);
2895 /* Adjust the local symbols defined in this section. */
2896 isymend
= isymbuf
+ symtab_hdr
->sh_info
;
2897 for (isym
= isymbuf
; isym
< isymend
; isym
++)
2899 if (isym
->st_shndx
== sec_shndx
2900 && isym
->st_value
> addr
2901 && isym
->st_value
< toaddr
)
2902 isym
->st_value
-= count
;
2905 /* Now adjust the global symbols defined in this section. */
2906 symcount
= (symtab_hdr
->sh_size
/ sizeof (Elf32_External_Sym
)
2907 - symtab_hdr
->sh_info
);
2908 sym_hashes
= elf_sym_hashes (abfd
);
2909 end_hashes
= sym_hashes
+ symcount
;
2910 for (; sym_hashes
< end_hashes
; sym_hashes
++)
2912 struct elf_link_hash_entry
*sym_hash
= *sym_hashes
;
2913 if ((sym_hash
->root
.type
== bfd_link_hash_defined
2914 || sym_hash
->root
.type
== bfd_link_hash_defweak
)
2915 && sym_hash
->root
.u
.def
.section
== sec
2916 && sym_hash
->root
.u
.def
.value
> addr
2917 && sym_hash
->root
.u
.def
.value
< toaddr
)
2919 sym_hash
->root
.u
.def
.value
-= count
;
2923 /* See if we can move the ALIGN reloc forward. We have adjusted
2924 r_offset for it already. */
2925 if (irelalign
!= NULL
)
2927 bfd_vma alignto
, alignaddr
;
2929 alignto
= BFD_ALIGN (toaddr
, 1 << irelalign
->r_addend
);
2930 alignaddr
= BFD_ALIGN (irelalign
->r_offset
,
2931 1 << irelalign
->r_addend
);
2932 if (alignto
!= alignaddr
)
2934 /* Tail recursion. */
2935 return sh_elf_relax_delete_bytes (abfd
, sec
, alignaddr
,
2936 (int) (alignto
- alignaddr
));
2943 /* Look for loads and stores which we can align to four byte
2944 boundaries. This is like sh_align_loads in coff-sh.c. */
2947 sh_elf_align_loads (bfd
*abfd ATTRIBUTE_UNUSED
, asection
*sec
,
2948 Elf_Internal_Rela
*internal_relocs
,
2949 bfd_byte
*contents ATTRIBUTE_UNUSED
,
2950 bfd_boolean
*pswapped
)
2952 Elf_Internal_Rela
*irel
, *irelend
;
2953 bfd_vma
*labels
= NULL
;
2954 bfd_vma
*label
, *label_end
;
2959 irelend
= internal_relocs
+ sec
->reloc_count
;
2961 /* Get all the addresses with labels on them. */
2962 amt
= sec
->reloc_count
;
2963 amt
*= sizeof (bfd_vma
);
2964 labels
= (bfd_vma
*) bfd_malloc (amt
);
2968 for (irel
= internal_relocs
; irel
< irelend
; irel
++)
2970 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_SH_LABEL
)
2972 *label_end
= irel
->r_offset
;
2977 /* Note that the assembler currently always outputs relocs in
2978 address order. If that ever changes, this code will need to sort
2979 the label values and the relocs. */
2983 for (irel
= internal_relocs
; irel
< irelend
; irel
++)
2985 bfd_vma start
, stop
;
2987 if (ELF32_R_TYPE (irel
->r_info
) != (int) R_SH_CODE
)
2990 start
= irel
->r_offset
;
2992 for (irel
++; irel
< irelend
; irel
++)
2993 if (ELF32_R_TYPE (irel
->r_info
) == (int) R_SH_DATA
)
2996 stop
= irel
->r_offset
;
3000 if (! _bfd_sh_align_load_span (abfd
, sec
, contents
, sh_elf_swap_insns
,
3001 internal_relocs
, &label
,
3002 label_end
, start
, stop
, pswapped
))
3017 /* Swap two SH instructions. This is like sh_swap_insns in coff-sh.c. */
3020 sh_elf_swap_insns (bfd
*abfd
, asection
*sec
, void *relocs
,
3021 bfd_byte
*contents
, bfd_vma addr
)
3023 Elf_Internal_Rela
*internal_relocs
= (Elf_Internal_Rela
*) relocs
;
3024 unsigned short i1
, i2
;
3025 Elf_Internal_Rela
*irel
, *irelend
;
3027 /* Swap the instructions themselves. */
3028 i1
= bfd_get_16 (abfd
, contents
+ addr
);
3029 i2
= bfd_get_16 (abfd
, contents
+ addr
+ 2);
3030 bfd_put_16 (abfd
, (bfd_vma
) i2
, contents
+ addr
);
3031 bfd_put_16 (abfd
, (bfd_vma
) i1
, contents
+ addr
+ 2);
3033 /* Adjust all reloc addresses. */
3034 irelend
= internal_relocs
+ sec
->reloc_count
;
3035 for (irel
= internal_relocs
; irel
< irelend
; irel
++)
3037 enum elf_sh_reloc_type type
;
3040 /* There are a few special types of relocs that we don't want to
3041 adjust. These relocs do not apply to the instruction itself,
3042 but are only associated with the address. */
3043 type
= (enum elf_sh_reloc_type
) ELF32_R_TYPE (irel
->r_info
);
3044 if (type
== R_SH_ALIGN
3045 || type
== R_SH_CODE
3046 || type
== R_SH_DATA
3047 || type
== R_SH_LABEL
)
3050 /* If an R_SH_USES reloc points to one of the addresses being
3051 swapped, we must adjust it. It would be incorrect to do this
3052 for a jump, though, since we want to execute both
3053 instructions after the jump. (We have avoided swapping
3054 around a label, so the jump will not wind up executing an
3055 instruction it shouldn't). */
3056 if (type
== R_SH_USES
)
3060 off
= irel
->r_offset
+ 4 + irel
->r_addend
;
3062 irel
->r_offset
+= 2;
3063 else if (off
== addr
+ 2)
3064 irel
->r_offset
-= 2;
3067 if (irel
->r_offset
== addr
)
3069 irel
->r_offset
+= 2;
3072 else if (irel
->r_offset
== addr
+ 2)
3074 irel
->r_offset
-= 2;
3083 unsigned short insn
, oinsn
;
3084 bfd_boolean overflow
;
3086 loc
= contents
+ irel
->r_offset
;
3095 insn
= bfd_get_16 (abfd
, loc
);
3098 if ((oinsn
& 0xff00) != (insn
& 0xff00))
3100 bfd_put_16 (abfd
, (bfd_vma
) insn
, loc
);
3104 insn
= bfd_get_16 (abfd
, loc
);
3107 if ((oinsn
& 0xf000) != (insn
& 0xf000))
3109 bfd_put_16 (abfd
, (bfd_vma
) insn
, loc
);
3113 /* This reloc ignores the least significant 3 bits of
3114 the program counter before adding in the offset.
3115 This means that if ADDR is at an even address, the
3116 swap will not affect the offset. If ADDR is an at an
3117 odd address, then the instruction will be crossing a
3118 four byte boundary, and must be adjusted. */
3119 if ((addr
& 3) != 0)
3121 insn
= bfd_get_16 (abfd
, loc
);
3124 if ((oinsn
& 0xff00) != (insn
& 0xff00))
3126 bfd_put_16 (abfd
, (bfd_vma
) insn
, loc
);
3134 ((*_bfd_error_handler
)
3135 (_("%B: 0x%lx: fatal: reloc overflow while relaxing"),
3136 abfd
, (unsigned long) irel
->r_offset
));
3137 bfd_set_error (bfd_error_bad_value
);
3145 #endif /* defined SH64_ELF */
3147 #ifdef INCLUDE_SHMEDIA
3149 /* The size in bytes of an entry in the procedure linkage table. */
3151 #define PLT_ENTRY_SIZE 64
3153 /* First entry in an absolute procedure linkage table look like this. */
3155 static const bfd_byte elf_sh_plt0_entry_be
[PLT_ENTRY_SIZE
] =
3157 0xcc, 0x00, 0x01, 0x10, /* movi .got.plt >> 16, r17 */
3158 0xc8, 0x00, 0x01, 0x10, /* shori .got.plt & 65535, r17 */
3159 0x89, 0x10, 0x09, 0x90, /* ld.l r17, 8, r25 */
3160 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
3161 0x89, 0x10, 0x05, 0x10, /* ld.l r17, 4, r17 */
3162 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
3163 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3164 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3165 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3166 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3167 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3168 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3169 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3170 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3171 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3172 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3175 static const bfd_byte elf_sh_plt0_entry_le
[PLT_ENTRY_SIZE
] =
3177 0x10, 0x01, 0x00, 0xcc, /* movi .got.plt >> 16, r17 */
3178 0x10, 0x01, 0x00, 0xc8, /* shori .got.plt & 65535, r17 */
3179 0x90, 0x09, 0x10, 0x89, /* ld.l r17, 8, r25 */
3180 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
3181 0x10, 0x05, 0x10, 0x89, /* ld.l r17, 4, r17 */
3182 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
3183 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3184 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3185 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3186 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3187 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3188 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3189 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3190 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3191 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3192 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3195 /* Sebsequent entries in an absolute procedure linkage table look like
3198 static const bfd_byte elf_sh_plt_entry_be
[PLT_ENTRY_SIZE
] =
3200 0xcc, 0x00, 0x01, 0x90, /* movi nameN-in-GOT >> 16, r25 */
3201 0xc8, 0x00, 0x01, 0x90, /* shori nameN-in-GOT & 65535, r25 */
3202 0x89, 0x90, 0x01, 0x90, /* ld.l r25, 0, r25 */
3203 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
3204 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
3205 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3206 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3207 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3208 0xcc, 0x00, 0x01, 0x90, /* movi .PLT0 >> 16, r25 */
3209 0xc8, 0x00, 0x01, 0x90, /* shori .PLT0 & 65535, r25 */
3210 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
3211 0xcc, 0x00, 0x01, 0x50, /* movi reloc-offset >> 16, r21 */
3212 0xc8, 0x00, 0x01, 0x50, /* shori reloc-offset & 65535, r21 */
3213 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
3214 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3215 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3218 static const bfd_byte elf_sh_plt_entry_le
[PLT_ENTRY_SIZE
] =
3220 0x90, 0x01, 0x00, 0xcc, /* movi nameN-in-GOT >> 16, r25 */
3221 0x90, 0x01, 0x00, 0xc8, /* shori nameN-in-GOT & 65535, r25 */
3222 0x90, 0x01, 0x90, 0x89, /* ld.l r25, 0, r25 */
3223 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
3224 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
3225 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3226 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3227 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3228 0x90, 0x01, 0x00, 0xcc, /* movi .PLT0 >> 16, r25 */
3229 0x90, 0x01, 0x00, 0xc8, /* shori .PLT0 & 65535, r25 */
3230 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
3231 0x50, 0x01, 0x00, 0xcc, /* movi reloc-offset >> 16, r21 */
3232 0x50, 0x01, 0x00, 0xc8, /* shori reloc-offset & 65535, r21 */
3233 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
3234 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3235 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3238 /* Entries in a PIC procedure linkage table look like this. */
3240 static const bfd_byte elf_sh_pic_plt_entry_be
[PLT_ENTRY_SIZE
] =
3242 0xcc, 0x00, 0x01, 0x90, /* movi nameN@GOT >> 16, r25 */
3243 0xc8, 0x00, 0x01, 0x90, /* shori nameN@GOT & 65535, r25 */
3244 0x40, 0xc2, 0x65, 0x90, /* ldx.l r12, r25, r25 */
3245 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
3246 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
3247 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3248 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3249 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3250 0xce, 0x00, 0x01, 0x10, /* movi -GOT_BIAS, r17 */
3251 0x00, 0xc8, 0x45, 0x10, /* add.l r12, r17, r17 */
3252 0x89, 0x10, 0x09, 0x90, /* ld.l r17, 8, r25 */
3253 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
3254 0x89, 0x10, 0x05, 0x10, /* ld.l r17, 4, r17 */
3255 0xcc, 0x00, 0x01, 0x50, /* movi reloc-offset >> 16, r21 */
3256 0xc8, 0x00, 0x01, 0x50, /* shori reloc-offset & 65535, r21 */
3257 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
3260 static const bfd_byte elf_sh_pic_plt_entry_le
[PLT_ENTRY_SIZE
] =
3262 0x90, 0x01, 0x00, 0xcc, /* movi nameN@GOT >> 16, r25 */
3263 0x90, 0x01, 0x00, 0xc8, /* shori nameN@GOT & 65535, r25 */
3264 0x90, 0x65, 0xc2, 0x40, /* ldx.l r12, r25, r25 */
3265 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
3266 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
3267 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3268 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3269 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3270 0x10, 0x01, 0x00, 0xce, /* movi -GOT_BIAS, r17 */
3271 0x10, 0x45, 0xc8, 0x00, /* add.l r12, r17, r17 */
3272 0x90, 0x09, 0x10, 0x89, /* ld.l r17, 8, r25 */
3273 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
3274 0x10, 0x05, 0x10, 0x89, /* ld.l r17, 4, r17 */
3275 0x50, 0x01, 0x00, 0xcc, /* movi reloc-offset >> 16, r21 */
3276 0x50, 0x01, 0x00, 0xc8, /* shori reloc-offset & 65535, r21 */
3277 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
3280 static const bfd_byte
*elf_sh_plt0_entry
;
3281 static const bfd_byte
*elf_sh_plt_entry
;
3282 static const bfd_byte
*elf_sh_pic_plt_entry
;
3284 /* Return size of a PLT entry. */
3285 #define elf_sh_sizeof_plt(info) PLT_ENTRY_SIZE
3287 /* Return offset of the PLT0 address in an absolute PLT entry. */
3288 #define elf_sh_plt_plt0_offset(info) 32
3290 /* Return offset of the linker in PLT0 entry. */
3291 #define elf_sh_plt0_gotplt_offset(info) 0
3293 /* Return offset of the trampoline in PLT entry */
3294 #define elf_sh_plt_temp_offset(info) 33 /* Add one because it's SHmedia. */
3296 /* Return offset of the symbol in PLT entry. */
3297 #define elf_sh_plt_symbol_offset(info) 0
3299 /* Return offset of the relocation in PLT entry. */
3300 #define elf_sh_plt_reloc_offset(info) (info->shared ? 52 : 44)
3303 movi_shori_putval (bfd
*output_bfd
, unsigned long value
, bfd_byte
*addr
)
3305 bfd_put_32 (output_bfd
,
3306 bfd_get_32 (output_bfd
, addr
)
3307 | ((value
>> 6) & 0x3fffc00),
3309 bfd_put_32 (output_bfd
,
3310 bfd_get_32 (output_bfd
, addr
+ 4)
3311 | ((value
<< 10) & 0x3fffc00),
3316 /* The size in bytes of an entry in the procedure linkage table. */
3318 #define PLT_ENTRY_SIZE 28
3320 /* First entry in an absolute procedure linkage table look like this. */
3322 /* Note - this code has been "optimised" not to use r2. r2 is used by
3323 GCC to return the address of large structures, so it should not be
3324 corrupted here. This does mean however, that this PLT does not conform
3325 to the SH PIC ABI. That spec says that r0 contains the type of the PLT
3326 and r2 contains the GOT id. This version stores the GOT id in r0 and
3327 ignores the type. Loaders can easily detect this difference however,
3328 since the type will always be 0 or 8, and the GOT ids will always be
3329 greater than or equal to 12. */
3330 static const bfd_byte elf_sh_plt0_entry_be
[PLT_ENTRY_SIZE
] =
3332 0xd0, 0x05, /* mov.l 2f,r0 */
3333 0x60, 0x02, /* mov.l @r0,r0 */
3334 0x2f, 0x06, /* mov.l r0,@-r15 */
3335 0xd0, 0x03, /* mov.l 1f,r0 */
3336 0x60, 0x02, /* mov.l @r0,r0 */
3337 0x40, 0x2b, /* jmp @r0 */
3338 0x60, 0xf6, /* mov.l @r15+,r0 */
3339 0x00, 0x09, /* nop */
3340 0x00, 0x09, /* nop */
3341 0x00, 0x09, /* nop */
3342 0, 0, 0, 0, /* 1: replaced with address of .got.plt + 8. */
3343 0, 0, 0, 0, /* 2: replaced with address of .got.plt + 4. */
3346 static const bfd_byte elf_sh_plt0_entry_le
[PLT_ENTRY_SIZE
] =
3348 0x05, 0xd0, /* mov.l 2f,r0 */
3349 0x02, 0x60, /* mov.l @r0,r0 */
3350 0x06, 0x2f, /* mov.l r0,@-r15 */
3351 0x03, 0xd0, /* mov.l 1f,r0 */
3352 0x02, 0x60, /* mov.l @r0,r0 */
3353 0x2b, 0x40, /* jmp @r0 */
3354 0xf6, 0x60, /* mov.l @r15+,r0 */
3355 0x09, 0x00, /* nop */
3356 0x09, 0x00, /* nop */
3357 0x09, 0x00, /* nop */
3358 0, 0, 0, 0, /* 1: replaced with address of .got.plt + 8. */
3359 0, 0, 0, 0, /* 2: replaced with address of .got.plt + 4. */
3362 /* Sebsequent entries in an absolute procedure linkage table look like
3365 static const bfd_byte elf_sh_plt_entry_be
[PLT_ENTRY_SIZE
] =
3367 0xd0, 0x04, /* mov.l 1f,r0 */
3368 0x60, 0x02, /* mov.l @r0,r0 */
3369 0xd1, 0x02, /* mov.l 0f,r1 */
3370 0x40, 0x2b, /* jmp @r0 */
3371 0x60, 0x13, /* mov r1,r0 */
3372 0xd1, 0x03, /* mov.l 2f,r1 */
3373 0x40, 0x2b, /* jmp @r0 */
3374 0x00, 0x09, /* nop */
3375 0, 0, 0, 0, /* 0: replaced with address of .PLT0. */
3376 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
3377 0, 0, 0, 0, /* 2: replaced with offset into relocation table. */
3380 static const bfd_byte elf_sh_plt_entry_le
[PLT_ENTRY_SIZE
] =
3382 0x04, 0xd0, /* mov.l 1f,r0 */
3383 0x02, 0x60, /* mov.l @r0,r0 */
3384 0x02, 0xd1, /* mov.l 0f,r1 */
3385 0x2b, 0x40, /* jmp @r0 */
3386 0x13, 0x60, /* mov r1,r0 */
3387 0x03, 0xd1, /* mov.l 2f,r1 */
3388 0x2b, 0x40, /* jmp @r0 */
3389 0x09, 0x00, /* nop */
3390 0, 0, 0, 0, /* 0: replaced with address of .PLT0. */
3391 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
3392 0, 0, 0, 0, /* 2: replaced with offset into relocation table. */
3395 /* Entries in a PIC procedure linkage table look like this. */
3397 static const bfd_byte elf_sh_pic_plt_entry_be
[PLT_ENTRY_SIZE
] =
3399 0xd0, 0x04, /* mov.l 1f,r0 */
3400 0x00, 0xce, /* mov.l @(r0,r12),r0 */
3401 0x40, 0x2b, /* jmp @r0 */
3402 0x00, 0x09, /* nop */
3403 0x50, 0xc2, /* mov.l @(8,r12),r0 */
3404 0xd1, 0x03, /* mov.l 2f,r1 */
3405 0x40, 0x2b, /* jmp @r0 */
3406 0x50, 0xc1, /* mov.l @(4,r12),r0 */
3407 0x00, 0x09, /* nop */
3408 0x00, 0x09, /* nop */
3409 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
3410 0, 0, 0, 0 /* 2: replaced with offset into relocation table. */
3413 static const bfd_byte elf_sh_pic_plt_entry_le
[PLT_ENTRY_SIZE
] =
3415 0x04, 0xd0, /* mov.l 1f,r0 */
3416 0xce, 0x00, /* mov.l @(r0,r12),r0 */
3417 0x2b, 0x40, /* jmp @r0 */
3418 0x09, 0x00, /* nop */
3419 0xc2, 0x50, /* mov.l @(8,r12),r0 */
3420 0x03, 0xd1, /* mov.l 2f,r1 */
3421 0x2b, 0x40, /* jmp @r0 */
3422 0xc1, 0x50, /* mov.l @(4,r12),r0 */
3423 0x09, 0x00, /* nop */
3424 0x09, 0x00, /* nop */
3425 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
3426 0, 0, 0, 0 /* 2: replaced with offset into relocation table. */
3429 static const bfd_byte
*elf_sh_plt0_entry
;
3430 static const bfd_byte
*elf_sh_plt_entry
;
3431 static const bfd_byte
*elf_sh_pic_plt_entry
;
3433 /* Return size of a PLT entry. */
3434 #define elf_sh_sizeof_plt(info) PLT_ENTRY_SIZE
3436 /* Return offset of the PLT0 address in an absolute PLT entry. */
3437 #define elf_sh_plt_plt0_offset(info) 16
3439 /* Return offset of the linker in PLT0 entry. */
3440 #define elf_sh_plt0_linker_offset(info) 20
3442 /* Return offset of the GOT id in PLT0 entry. */
3443 #define elf_sh_plt0_gotid_offset(info) 24
3445 /* Return offset of the temporary in PLT entry */
3446 #define elf_sh_plt_temp_offset(info) 8
3448 /* Return offset of the symbol in PLT entry. */
3449 #define elf_sh_plt_symbol_offset(info) 20
3451 /* Return offset of the relocation in PLT entry. */
3452 #define elf_sh_plt_reloc_offset(info) 24
3455 /* The sh linker needs to keep track of the number of relocs that it
3456 decides to copy as dynamic relocs in check_relocs for each symbol.
3457 This is so that it can later discard them if they are found to be
3458 unnecessary. We store the information in a field extending the
3459 regular ELF linker hash table. */
3461 struct elf_sh_dyn_relocs
3463 struct elf_sh_dyn_relocs
*next
;
3465 /* The input section of the reloc. */
3468 /* Total number of relocs copied for the input section. */
3469 bfd_size_type count
;
3471 /* Number of pc-relative relocs copied for the input section. */
3472 bfd_size_type pc_count
;
3475 /* sh ELF linker hash entry. */
3477 struct elf_sh_link_hash_entry
3479 struct elf_link_hash_entry root
;
3481 #ifdef INCLUDE_SHMEDIA
3484 bfd_signed_vma refcount
;
3489 /* Track dynamic relocs copied for this symbol. */
3490 struct elf_sh_dyn_relocs
*dyn_relocs
;
3492 bfd_signed_vma gotplt_refcount
;
3495 GOT_UNKNOWN
= 0, GOT_NORMAL
, GOT_TLS_GD
, GOT_TLS_IE
3499 #define sh_elf_hash_entry(ent) ((struct elf_sh_link_hash_entry *)(ent))
3501 struct sh_elf_obj_tdata
3503 struct elf_obj_tdata root
;
3505 /* tls_type for each local got entry. */
3506 char *local_got_tls_type
;
3509 #define sh_elf_tdata(abfd) \
3510 ((struct sh_elf_obj_tdata *) (abfd)->tdata.any)
3512 #define sh_elf_local_got_tls_type(abfd) \
3513 (sh_elf_tdata (abfd)->local_got_tls_type)
3515 /* Override the generic function because we need to store sh_elf_obj_tdata
3516 as the specific tdata. */
3519 sh_elf_mkobject (bfd
*abfd
)
3521 bfd_size_type amt
= sizeof (struct sh_elf_obj_tdata
);
3522 abfd
->tdata
.any
= bfd_zalloc (abfd
, amt
);
3523 if (abfd
->tdata
.any
== NULL
)
3528 /* sh ELF linker hash table. */
3530 struct elf_sh_link_hash_table
3532 struct elf_link_hash_table root
;
3534 /* Short-cuts to get to dynamic linker sections. */
3543 /* Small local sym to section mapping cache. */
3544 struct sym_sec_cache sym_sec
;
3546 /* A counter or offset to track a TLS got entry. */
3549 bfd_signed_vma refcount
;
3554 /* Traverse an sh ELF linker hash table. */
3556 #define sh_elf_link_hash_traverse(table, func, info) \
3557 (elf_link_hash_traverse \
3559 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
3562 /* Get the sh ELF linker hash table from a link_info structure. */
3564 #define sh_elf_hash_table(p) \
3565 ((struct elf_sh_link_hash_table *) ((p)->hash))
3567 /* Create an entry in an sh ELF linker hash table. */
3569 static struct bfd_hash_entry
*
3570 sh_elf_link_hash_newfunc (struct bfd_hash_entry
*entry
,
3571 struct bfd_hash_table
*table
,
3574 struct elf_sh_link_hash_entry
*ret
=
3575 (struct elf_sh_link_hash_entry
*) entry
;
3577 /* Allocate the structure if it has not already been allocated by a
3579 if (ret
== (struct elf_sh_link_hash_entry
*) NULL
)
3580 ret
= ((struct elf_sh_link_hash_entry
*)
3581 bfd_hash_allocate (table
,
3582 sizeof (struct elf_sh_link_hash_entry
)));
3583 if (ret
== (struct elf_sh_link_hash_entry
*) NULL
)
3584 return (struct bfd_hash_entry
*) ret
;
3586 /* Call the allocation method of the superclass. */
3587 ret
= ((struct elf_sh_link_hash_entry
*)
3588 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry
*) ret
,
3590 if (ret
!= (struct elf_sh_link_hash_entry
*) NULL
)
3592 ret
->dyn_relocs
= NULL
;
3593 ret
->gotplt_refcount
= 0;
3594 #ifdef INCLUDE_SHMEDIA
3595 ret
->datalabel_got
.refcount
= ret
->root
.got
.refcount
;
3597 ret
->tls_type
= GOT_UNKNOWN
;
3600 return (struct bfd_hash_entry
*) ret
;
3603 /* Create an sh ELF linker hash table. */
3605 static struct bfd_link_hash_table
*
3606 sh_elf_link_hash_table_create (bfd
*abfd
)
3608 struct elf_sh_link_hash_table
*ret
;
3609 bfd_size_type amt
= sizeof (struct elf_sh_link_hash_table
);
3611 ret
= (struct elf_sh_link_hash_table
*) bfd_malloc (amt
);
3612 if (ret
== (struct elf_sh_link_hash_table
*) NULL
)
3615 if (! _bfd_elf_link_hash_table_init (&ret
->root
, abfd
,
3616 sh_elf_link_hash_newfunc
))
3623 ret
->sgotplt
= NULL
;
3624 ret
->srelgot
= NULL
;
3626 ret
->srelplt
= NULL
;
3627 ret
->sdynbss
= NULL
;
3628 ret
->srelbss
= NULL
;
3629 ret
->sym_sec
.abfd
= NULL
;
3630 ret
->tls_ldm_got
.refcount
= 0;
3632 return &ret
->root
.root
;
3635 /* Create .got, .gotplt, and .rela.got sections in DYNOBJ, and set up
3636 shortcuts to them in our hash table. */
3639 create_got_section (bfd
*dynobj
, struct bfd_link_info
*info
)
3641 struct elf_sh_link_hash_table
*htab
;
3643 if (! _bfd_elf_create_got_section (dynobj
, info
))
3646 htab
= sh_elf_hash_table (info
);
3647 htab
->sgot
= bfd_get_section_by_name (dynobj
, ".got");
3648 htab
->sgotplt
= bfd_get_section_by_name (dynobj
, ".got.plt");
3649 if (! htab
->sgot
|| ! htab
->sgotplt
)
3652 htab
->srelgot
= bfd_make_section_with_flags (dynobj
, ".rela.got",
3653 (SEC_ALLOC
| SEC_LOAD
3656 | SEC_LINKER_CREATED
3658 if (htab
->srelgot
== NULL
3659 || ! bfd_set_section_alignment (dynobj
, htab
->srelgot
, 2))
3664 /* Create dynamic sections when linking against a dynamic object. */
3667 sh_elf_create_dynamic_sections (bfd
*abfd
, struct bfd_link_info
*info
)
3669 struct elf_sh_link_hash_table
*htab
;
3670 flagword flags
, pltflags
;
3671 register asection
*s
;
3672 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
3675 switch (bed
->s
->arch_size
)
3686 bfd_set_error (bfd_error_bad_value
);
3690 htab
= sh_elf_hash_table (info
);
3691 if (htab
->root
.dynamic_sections_created
)
3694 /* We need to create .plt, .rel[a].plt, .got, .got.plt, .dynbss, and
3695 .rel[a].bss sections. */
3697 flags
= (SEC_ALLOC
| SEC_LOAD
| SEC_HAS_CONTENTS
| SEC_IN_MEMORY
3698 | SEC_LINKER_CREATED
);
3701 pltflags
|= SEC_CODE
;
3702 if (bed
->plt_not_loaded
)
3703 pltflags
&= ~ (SEC_LOAD
| SEC_HAS_CONTENTS
);
3704 if (bed
->plt_readonly
)
3705 pltflags
|= SEC_READONLY
;
3707 s
= bfd_make_section_with_flags (abfd
, ".plt", pltflags
);
3710 || ! bfd_set_section_alignment (abfd
, s
, bed
->plt_alignment
))
3713 if (bed
->want_plt_sym
)
3715 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
3717 struct elf_link_hash_entry
*h
;
3718 struct bfd_link_hash_entry
*bh
= NULL
;
3720 if (! (_bfd_generic_link_add_one_symbol
3721 (info
, abfd
, "_PROCEDURE_LINKAGE_TABLE_", BSF_GLOBAL
, s
,
3722 (bfd_vma
) 0, (const char *) NULL
, FALSE
,
3723 get_elf_backend_data (abfd
)->collect
, &bh
)))
3726 h
= (struct elf_link_hash_entry
*) bh
;
3728 h
->type
= STT_OBJECT
;
3731 && ! bfd_elf_link_record_dynamic_symbol (info
, h
))
3735 s
= bfd_make_section_with_flags (abfd
,
3736 bed
->default_use_rela_p
? ".rela.plt" : ".rel.plt",
3737 flags
| SEC_READONLY
);
3740 || ! bfd_set_section_alignment (abfd
, s
, ptralign
))
3743 if (htab
->sgot
== NULL
3744 && !create_got_section (abfd
, info
))
3748 const char *secname
;
3753 for (sec
= abfd
->sections
; sec
; sec
= sec
->next
)
3755 secflags
= bfd_get_section_flags (abfd
, sec
);
3756 if ((secflags
& (SEC_DATA
| SEC_LINKER_CREATED
))
3757 || ((secflags
& SEC_HAS_CONTENTS
) != SEC_HAS_CONTENTS
))
3759 secname
= bfd_get_section_name (abfd
, sec
);
3760 relname
= (char *) bfd_malloc ((bfd_size_type
) strlen (secname
) + 6);
3761 strcpy (relname
, ".rela");
3762 strcat (relname
, secname
);
3763 if (bfd_get_section_by_name (abfd
, secname
))
3765 s
= bfd_make_section_with_flags (abfd
, relname
,
3766 flags
| SEC_READONLY
);
3768 || ! bfd_set_section_alignment (abfd
, s
, ptralign
))
3773 if (bed
->want_dynbss
)
3775 /* The .dynbss section is a place to put symbols which are defined
3776 by dynamic objects, are referenced by regular objects, and are
3777 not functions. We must allocate space for them in the process
3778 image and use a R_*_COPY reloc to tell the dynamic linker to
3779 initialize them at run time. The linker script puts the .dynbss
3780 section into the .bss section of the final image. */
3781 s
= bfd_make_section_with_flags (abfd
, ".dynbss",
3782 SEC_ALLOC
| SEC_LINKER_CREATED
);
3787 /* The .rel[a].bss section holds copy relocs. This section is not
3788 normally needed. We need to create it here, though, so that the
3789 linker will map it to an output section. We can't just create it
3790 only if we need it, because we will not know whether we need it
3791 until we have seen all the input files, and the first time the
3792 main linker code calls BFD after examining all the input files
3793 (size_dynamic_sections) the input sections have already been
3794 mapped to the output sections. If the section turns out not to
3795 be needed, we can discard it later. We will never need this
3796 section when generating a shared object, since they do not use
3800 s
= bfd_make_section_with_flags (abfd
,
3801 (bed
->default_use_rela_p
3802 ? ".rela.bss" : ".rel.bss"),
3803 flags
| SEC_READONLY
);
3806 || ! bfd_set_section_alignment (abfd
, s
, ptralign
))
3814 /* Adjust a symbol defined by a dynamic object and referenced by a
3815 regular object. The current definition is in some section of the
3816 dynamic object, but we're not including those sections. We have to
3817 change the definition to something the rest of the link can
3821 sh_elf_adjust_dynamic_symbol (struct bfd_link_info
*info
,
3822 struct elf_link_hash_entry
*h
)
3824 struct elf_sh_link_hash_table
*htab
;
3825 struct elf_sh_link_hash_entry
*eh
;
3826 struct elf_sh_dyn_relocs
*p
;
3828 unsigned int power_of_two
;
3830 htab
= sh_elf_hash_table (info
);
3832 /* Make sure we know what is going on here. */
3833 BFD_ASSERT (htab
->root
.dynobj
!= NULL
3835 || h
->u
.weakdef
!= NULL
3838 && !h
->def_regular
)));
3840 /* If this is a function, put it in the procedure linkage table. We
3841 will fill in the contents of the procedure linkage table later,
3842 when we know the address of the .got section. */
3843 if (h
->type
== STT_FUNC
3846 if (h
->plt
.refcount
<= 0
3847 || SYMBOL_CALLS_LOCAL (info
, h
)
3848 || (ELF_ST_VISIBILITY (h
->other
) != STV_DEFAULT
3849 && h
->root
.type
== bfd_link_hash_undefweak
))
3851 /* This case can occur if we saw a PLT reloc in an input
3852 file, but the symbol was never referred to by a dynamic
3853 object. In such a case, we don't actually need to build
3854 a procedure linkage table, and we can just do a REL32
3856 h
->plt
.offset
= (bfd_vma
) -1;
3863 h
->plt
.offset
= (bfd_vma
) -1;
3865 /* If this is a weak symbol, and there is a real definition, the
3866 processor independent code will have arranged for us to see the
3867 real definition first, and we can just use the same value. */
3868 if (h
->u
.weakdef
!= NULL
)
3870 BFD_ASSERT (h
->u
.weakdef
->root
.type
== bfd_link_hash_defined
3871 || h
->u
.weakdef
->root
.type
== bfd_link_hash_defweak
);
3872 h
->root
.u
.def
.section
= h
->u
.weakdef
->root
.u
.def
.section
;
3873 h
->root
.u
.def
.value
= h
->u
.weakdef
->root
.u
.def
.value
;
3874 if (info
->nocopyreloc
)
3875 h
->non_got_ref
= h
->u
.weakdef
->non_got_ref
;
3879 /* This is a reference to a symbol defined by a dynamic object which
3880 is not a function. */
3882 /* If we are creating a shared library, we must presume that the
3883 only references to the symbol are via the global offset table.
3884 For such cases we need not do anything here; the relocations will
3885 be handled correctly by relocate_section. */
3889 /* If there are no references to this symbol that do not use the
3890 GOT, we don't need to generate a copy reloc. */
3891 if (!h
->non_got_ref
)
3894 /* If -z nocopyreloc was given, we won't generate them either. */
3895 if (info
->nocopyreloc
)
3901 eh
= (struct elf_sh_link_hash_entry
*) h
;
3902 for (p
= eh
->dyn_relocs
; p
!= NULL
; p
= p
->next
)
3904 s
= p
->sec
->output_section
;
3905 if (s
!= NULL
&& (s
->flags
& (SEC_READONLY
| SEC_HAS_CONTENTS
)) != 0)
3909 /* If we didn't find any dynamic relocs in sections which needs the
3910 copy reloc, then we'll be keeping the dynamic relocs and avoiding
3918 /* We must allocate the symbol in our .dynbss section, which will
3919 become part of the .bss section of the executable. There will be
3920 an entry for this symbol in the .dynsym section. The dynamic
3921 object will contain position independent code, so all references
3922 from the dynamic object to this symbol will go through the global
3923 offset table. The dynamic linker will use the .dynsym entry to
3924 determine the address it must put in the global offset table, so
3925 both the dynamic object and the regular object will refer to the
3926 same memory location for the variable. */
3929 BFD_ASSERT (s
!= NULL
);
3931 /* We must generate a R_SH_COPY reloc to tell the dynamic linker to
3932 copy the initial value out of the dynamic object and into the
3933 runtime process image. We need to remember the offset into the
3934 .rela.bss section we are going to use. */
3935 if ((h
->root
.u
.def
.section
->flags
& SEC_ALLOC
) != 0)
3939 srel
= htab
->srelbss
;
3940 BFD_ASSERT (srel
!= NULL
);
3941 srel
->size
+= sizeof (Elf32_External_Rela
);
3945 /* We need to figure out the alignment required for this symbol. I
3946 have no idea how ELF linkers handle this. */
3947 power_of_two
= bfd_log2 (h
->size
);
3948 if (power_of_two
> 3)
3951 /* Apply the required alignment. */
3952 s
->size
= BFD_ALIGN (s
->size
, (bfd_size_type
) (1 << power_of_two
));
3953 if (power_of_two
> bfd_get_section_alignment (htab
->root
.dynobj
, s
))
3955 if (! bfd_set_section_alignment (htab
->root
.dynobj
, s
, power_of_two
))
3959 /* Define the symbol as being at this point in the section. */
3960 h
->root
.u
.def
.section
= s
;
3961 h
->root
.u
.def
.value
= s
->size
;
3963 /* Increment the section size to make room for the symbol. */
3969 /* Allocate space in .plt, .got and associated reloc sections for
3973 allocate_dynrelocs (struct elf_link_hash_entry
*h
, void *inf
)
3975 struct bfd_link_info
*info
;
3976 struct elf_sh_link_hash_table
*htab
;
3977 struct elf_sh_link_hash_entry
*eh
;
3978 struct elf_sh_dyn_relocs
*p
;
3980 if (h
->root
.type
== bfd_link_hash_indirect
)
3983 if (h
->root
.type
== bfd_link_hash_warning
)
3984 /* When warning symbols are created, they **replace** the "real"
3985 entry in the hash table, thus we never get to see the real
3986 symbol in a hash traversal. So look at it now. */
3987 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
3989 info
= (struct bfd_link_info
*) inf
;
3990 htab
= sh_elf_hash_table (info
);
3992 eh
= (struct elf_sh_link_hash_entry
*) h
;
3993 if ((h
->got
.refcount
> 0
3995 && eh
->gotplt_refcount
> 0)
3997 /* The symbol has been forced local, or we have some direct got refs,
3998 so treat all the gotplt refs as got refs. */
3999 h
->got
.refcount
+= eh
->gotplt_refcount
;
4000 if (h
->plt
.refcount
>= eh
->gotplt_refcount
)
4001 h
->plt
.refcount
-= eh
->gotplt_refcount
;
4004 if (htab
->root
.dynamic_sections_created
4005 && h
->plt
.refcount
> 0
4006 && (ELF_ST_VISIBILITY (h
->other
) == STV_DEFAULT
4007 || h
->root
.type
!= bfd_link_hash_undefweak
))
4009 /* Make sure this symbol is output as a dynamic symbol.
4010 Undefined weak syms won't yet be marked as dynamic. */
4011 if (h
->dynindx
== -1
4012 && !h
->forced_local
)
4014 if (! bfd_elf_link_record_dynamic_symbol (info
, h
))
4019 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h
))
4021 asection
*s
= htab
->splt
;
4023 /* If this is the first .plt entry, make room for the special
4026 s
->size
+= PLT_ENTRY_SIZE
;
4028 h
->plt
.offset
= s
->size
;
4030 /* If this symbol is not defined in a regular file, and we are
4031 not generating a shared library, then set the symbol to this
4032 location in the .plt. This is required to make function
4033 pointers compare as equal between the normal executable and
4034 the shared library. */
4038 h
->root
.u
.def
.section
= s
;
4039 h
->root
.u
.def
.value
= h
->plt
.offset
;
4042 /* Make room for this entry. */
4043 s
->size
+= PLT_ENTRY_SIZE
;
4045 /* We also need to make an entry in the .got.plt section, which
4046 will be placed in the .got section by the linker script. */
4047 htab
->sgotplt
->size
+= 4;
4049 /* We also need to make an entry in the .rel.plt section. */
4050 htab
->srelplt
->size
+= sizeof (Elf32_External_Rela
);
4054 h
->plt
.offset
= (bfd_vma
) -1;
4060 h
->plt
.offset
= (bfd_vma
) -1;
4064 if (h
->got
.refcount
> 0)
4068 int tls_type
= sh_elf_hash_entry (h
)->tls_type
;
4070 /* Make sure this symbol is output as a dynamic symbol.
4071 Undefined weak syms won't yet be marked as dynamic. */
4072 if (h
->dynindx
== -1
4073 && !h
->forced_local
)
4075 if (! bfd_elf_link_record_dynamic_symbol (info
, h
))
4080 h
->got
.offset
= s
->size
;
4082 /* R_SH_TLS_GD needs 2 consecutive GOT slots. */
4083 if (tls_type
== GOT_TLS_GD
)
4085 dyn
= htab
->root
.dynamic_sections_created
;
4086 /* R_SH_TLS_IE_32 needs one dynamic relocation if dynamic,
4087 R_SH_TLS_GD needs one if local symbol and two if global. */
4088 if ((tls_type
== GOT_TLS_GD
&& h
->dynindx
== -1)
4089 || (tls_type
== GOT_TLS_IE
&& dyn
))
4090 htab
->srelgot
->size
+= sizeof (Elf32_External_Rela
);
4091 else if (tls_type
== GOT_TLS_GD
)
4092 htab
->srelgot
->size
+= 2 * sizeof (Elf32_External_Rela
);
4093 else if ((ELF_ST_VISIBILITY (h
->other
) == STV_DEFAULT
4094 || h
->root
.type
!= bfd_link_hash_undefweak
)
4096 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn
, 0, h
)))
4097 htab
->srelgot
->size
+= sizeof (Elf32_External_Rela
);
4100 h
->got
.offset
= (bfd_vma
) -1;
4102 #ifdef INCLUDE_SHMEDIA
4103 if (eh
->datalabel_got
.refcount
> 0)
4108 /* Make sure this symbol is output as a dynamic symbol.
4109 Undefined weak syms won't yet be marked as dynamic. */
4110 if (h
->dynindx
== -1
4111 && !h
->forced_local
)
4113 if (! bfd_elf_link_record_dynamic_symbol (info
, h
))
4118 eh
->datalabel_got
.offset
= s
->size
;
4120 dyn
= htab
->root
.dynamic_sections_created
;
4121 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn
, info
->shared
, h
))
4122 htab
->srelgot
->size
+= sizeof (Elf32_External_Rela
);
4125 eh
->datalabel_got
.offset
= (bfd_vma
) -1;
4128 if (eh
->dyn_relocs
== NULL
)
4131 /* In the shared -Bsymbolic case, discard space allocated for
4132 dynamic pc-relative relocs against symbols which turn out to be
4133 defined in regular objects. For the normal shared case, discard
4134 space for pc-relative relocs that have become local due to symbol
4135 visibility changes. */
4139 if (SYMBOL_CALLS_LOCAL (info
, h
))
4141 struct elf_sh_dyn_relocs
**pp
;
4143 for (pp
= &eh
->dyn_relocs
; (p
= *pp
) != NULL
; )
4145 p
->count
-= p
->pc_count
;
4154 /* Also discard relocs on undefined weak syms with non-default
4156 if (ELF_ST_VISIBILITY (h
->other
) != STV_DEFAULT
4157 && h
->root
.type
== bfd_link_hash_undefweak
)
4158 eh
->dyn_relocs
= NULL
;
4162 /* For the non-shared case, discard space for relocs against
4163 symbols which turn out to need copy relocs or are not
4169 || (htab
->root
.dynamic_sections_created
4170 && (h
->root
.type
== bfd_link_hash_undefweak
4171 || h
->root
.type
== bfd_link_hash_undefined
))))
4173 /* Make sure this symbol is output as a dynamic symbol.
4174 Undefined weak syms won't yet be marked as dynamic. */
4175 if (h
->dynindx
== -1
4176 && !h
->forced_local
)
4178 if (! bfd_elf_link_record_dynamic_symbol (info
, h
))
4182 /* If that succeeded, we know we'll be keeping all the
4184 if (h
->dynindx
!= -1)
4188 eh
->dyn_relocs
= NULL
;
4193 /* Finally, allocate space. */
4194 for (p
= eh
->dyn_relocs
; p
!= NULL
; p
= p
->next
)
4196 asection
*sreloc
= elf_section_data (p
->sec
)->sreloc
;
4197 sreloc
->size
+= p
->count
* sizeof (Elf32_External_Rela
);
4203 /* Find any dynamic relocs that apply to read-only sections. */
4206 readonly_dynrelocs (struct elf_link_hash_entry
*h
, void *inf
)
4208 struct elf_sh_link_hash_entry
*eh
;
4209 struct elf_sh_dyn_relocs
*p
;
4211 if (h
->root
.type
== bfd_link_hash_warning
)
4212 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
4214 eh
= (struct elf_sh_link_hash_entry
*) h
;
4215 for (p
= eh
->dyn_relocs
; p
!= NULL
; p
= p
->next
)
4217 asection
*s
= p
->sec
->output_section
;
4219 if (s
!= NULL
&& (s
->flags
& SEC_READONLY
) != 0)
4221 struct bfd_link_info
*info
= (struct bfd_link_info
*) inf
;
4223 info
->flags
|= DF_TEXTREL
;
4225 /* Not an error, just cut short the traversal. */
4232 /* Set the sizes of the dynamic sections. */
4235 sh_elf_size_dynamic_sections (bfd
*output_bfd ATTRIBUTE_UNUSED
,
4236 struct bfd_link_info
*info
)
4238 struct elf_sh_link_hash_table
*htab
;
4244 htab
= sh_elf_hash_table (info
);
4245 dynobj
= htab
->root
.dynobj
;
4246 BFD_ASSERT (dynobj
!= NULL
);
4248 if (htab
->root
.dynamic_sections_created
)
4250 /* Set the contents of the .interp section to the interpreter. */
4251 if (info
->executable
)
4253 s
= bfd_get_section_by_name (dynobj
, ".interp");
4254 BFD_ASSERT (s
!= NULL
);
4255 s
->size
= sizeof ELF_DYNAMIC_INTERPRETER
;
4256 s
->contents
= (unsigned char *) ELF_DYNAMIC_INTERPRETER
;
4260 /* Set up .got offsets for local syms, and space for local dynamic
4262 for (ibfd
= info
->input_bfds
; ibfd
!= NULL
; ibfd
= ibfd
->link_next
)
4264 bfd_signed_vma
*local_got
;
4265 bfd_signed_vma
*end_local_got
;
4266 char *local_tls_type
;
4267 bfd_size_type locsymcount
;
4268 Elf_Internal_Shdr
*symtab_hdr
;
4271 if (bfd_get_flavour (ibfd
) != bfd_target_elf_flavour
)
4274 for (s
= ibfd
->sections
; s
!= NULL
; s
= s
->next
)
4276 struct elf_sh_dyn_relocs
*p
;
4278 for (p
= ((struct elf_sh_dyn_relocs
*)
4279 elf_section_data (s
)->local_dynrel
);
4283 if (! bfd_is_abs_section (p
->sec
)
4284 && bfd_is_abs_section (p
->sec
->output_section
))
4286 /* Input section has been discarded, either because
4287 it is a copy of a linkonce section or due to
4288 linker script /DISCARD/, so we'll be discarding
4291 else if (p
->count
!= 0)
4293 srel
= elf_section_data (p
->sec
)->sreloc
;
4294 srel
->size
+= p
->count
* sizeof (Elf32_External_Rela
);
4295 if ((p
->sec
->output_section
->flags
& SEC_READONLY
) != 0)
4296 info
->flags
|= DF_TEXTREL
;
4301 local_got
= elf_local_got_refcounts (ibfd
);
4305 symtab_hdr
= &elf_tdata (ibfd
)->symtab_hdr
;
4306 locsymcount
= symtab_hdr
->sh_info
;
4307 #ifdef INCLUDE_SHMEDIA
4308 /* Count datalabel local GOT. */
4311 end_local_got
= local_got
+ locsymcount
;
4312 local_tls_type
= sh_elf_local_got_tls_type (ibfd
);
4314 srel
= htab
->srelgot
;
4315 for (; local_got
< end_local_got
; ++local_got
)
4319 *local_got
= s
->size
;
4321 if (*local_tls_type
== GOT_TLS_GD
)
4324 srel
->size
+= sizeof (Elf32_External_Rela
);
4327 *local_got
= (bfd_vma
) -1;
4332 if (htab
->tls_ldm_got
.refcount
> 0)
4334 /* Allocate 2 got entries and 1 dynamic reloc for R_SH_TLS_LD_32
4336 htab
->tls_ldm_got
.offset
= htab
->sgot
->size
;
4337 htab
->sgot
->size
+= 8;
4338 htab
->srelgot
->size
+= sizeof (Elf32_External_Rela
);
4341 htab
->tls_ldm_got
.offset
= -1;
4343 /* Allocate global sym .plt and .got entries, and space for global
4344 sym dynamic relocs. */
4345 elf_link_hash_traverse (&htab
->root
, allocate_dynrelocs
, info
);
4347 /* We now have determined the sizes of the various dynamic sections.
4348 Allocate memory for them. */
4350 for (s
= dynobj
->sections
; s
!= NULL
; s
= s
->next
)
4352 if ((s
->flags
& SEC_LINKER_CREATED
) == 0)
4357 || s
== htab
->sgotplt
4358 || s
== htab
->sdynbss
)
4360 /* Strip this section if we don't need it; see the
4363 else if (strncmp (bfd_get_section_name (dynobj
, s
), ".rela", 5) == 0)
4365 if (s
->size
!= 0 && s
!= htab
->srelplt
)
4368 /* We use the reloc_count field as a counter if we need
4369 to copy relocs into the output file. */
4374 /* It's not one of our sections, so don't allocate space. */
4380 /* If we don't need this section, strip it from the
4381 output file. This is mostly to handle .rela.bss and
4382 .rela.plt. We must create both sections in
4383 create_dynamic_sections, because they must be created
4384 before the linker maps input sections to output
4385 sections. The linker does that before
4386 adjust_dynamic_symbol is called, and it is that
4387 function which decides whether anything needs to go
4388 into these sections. */
4390 s
->flags
|= SEC_EXCLUDE
;
4394 if ((s
->flags
& SEC_HAS_CONTENTS
) == 0)
4397 /* Allocate memory for the section contents. We use bfd_zalloc
4398 here in case unused entries are not reclaimed before the
4399 section's contents are written out. This should not happen,
4400 but this way if it does, we get a R_SH_NONE reloc instead
4402 s
->contents
= (bfd_byte
*) bfd_zalloc (dynobj
, s
->size
);
4403 if (s
->contents
== NULL
)
4407 if (htab
->root
.dynamic_sections_created
)
4409 /* Add some entries to the .dynamic section. We fill in the
4410 values later, in sh_elf_finish_dynamic_sections, but we
4411 must add the entries now so that we get the correct size for
4412 the .dynamic section. The DT_DEBUG entry is filled in by the
4413 dynamic linker and used by the debugger. */
4414 #define add_dynamic_entry(TAG, VAL) \
4415 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
4417 if (info
->executable
)
4419 if (! add_dynamic_entry (DT_DEBUG
, 0))
4423 if (htab
->splt
->size
!= 0)
4425 if (! add_dynamic_entry (DT_PLTGOT
, 0)
4426 || ! add_dynamic_entry (DT_PLTRELSZ
, 0)
4427 || ! add_dynamic_entry (DT_PLTREL
, DT_RELA
)
4428 || ! add_dynamic_entry (DT_JMPREL
, 0))
4434 if (! add_dynamic_entry (DT_RELA
, 0)
4435 || ! add_dynamic_entry (DT_RELASZ
, 0)
4436 || ! add_dynamic_entry (DT_RELAENT
,
4437 sizeof (Elf32_External_Rela
)))
4440 /* If any dynamic relocs apply to a read-only section,
4441 then we need a DT_TEXTREL entry. */
4442 if ((info
->flags
& DF_TEXTREL
) == 0)
4443 elf_link_hash_traverse (&htab
->root
, readonly_dynrelocs
, info
);
4445 if ((info
->flags
& DF_TEXTREL
) != 0)
4447 if (! add_dynamic_entry (DT_TEXTREL
, 0))
4452 #undef add_dynamic_entry
4457 /* Relocate an SH ELF section. */
4460 sh_elf_relocate_section (bfd
*output_bfd
, struct bfd_link_info
*info
,
4461 bfd
*input_bfd
, asection
*input_section
,
4462 bfd_byte
*contents
, Elf_Internal_Rela
*relocs
,
4463 Elf_Internal_Sym
*local_syms
,
4464 asection
**local_sections
)
4466 struct elf_sh_link_hash_table
*htab
;
4467 Elf_Internal_Shdr
*symtab_hdr
;
4468 struct elf_link_hash_entry
**sym_hashes
;
4469 Elf_Internal_Rela
*rel
, *relend
;
4471 bfd_vma
*local_got_offsets
;
4478 htab
= sh_elf_hash_table (info
);
4479 symtab_hdr
= &elf_tdata (input_bfd
)->symtab_hdr
;
4480 sym_hashes
= elf_sym_hashes (input_bfd
);
4481 dynobj
= htab
->root
.dynobj
;
4482 local_got_offsets
= elf_local_got_offsets (input_bfd
);
4485 sgotplt
= htab
->sgotplt
;
4491 relend
= relocs
+ input_section
->reloc_count
;
4492 for (; rel
< relend
; rel
++)
4495 reloc_howto_type
*howto
;
4496 unsigned long r_symndx
;
4497 Elf_Internal_Sym
*sym
;
4499 struct elf_link_hash_entry
*h
;
4501 bfd_vma addend
= (bfd_vma
) 0;
4502 bfd_reloc_status_type r
;
4503 int seen_stt_datalabel
= 0;
4507 r_symndx
= ELF32_R_SYM (rel
->r_info
);
4509 r_type
= ELF32_R_TYPE (rel
->r_info
);
4511 /* Many of the relocs are only used for relaxing, and are
4512 handled entirely by the relaxation code. */
4513 if (r_type
>= (int) R_SH_GNU_VTINHERIT
4514 && r_type
<= (int) R_SH_LABEL
)
4516 if (r_type
== (int) R_SH_NONE
)
4520 || r_type
>= R_SH_max
4521 || (r_type
>= (int) R_SH_FIRST_INVALID_RELOC
4522 && r_type
<= (int) R_SH_LAST_INVALID_RELOC
)
4523 || ( r_type
>= (int) R_SH_FIRST_INVALID_RELOC_3
4524 && r_type
<= (int) R_SH_LAST_INVALID_RELOC_3
)
4525 || ( r_type
>= (int) R_SH_FIRST_INVALID_RELOC_4
4526 && r_type
<= (int) R_SH_LAST_INVALID_RELOC_4
)
4527 || ( r_type
>= (int) R_SH_FIRST_INVALID_RELOC_5
4528 && r_type
<= (int) R_SH_LAST_INVALID_RELOC_5
)
4529 || (r_type
>= (int) R_SH_FIRST_INVALID_RELOC_2
4530 && r_type
<= (int) R_SH_LAST_INVALID_RELOC_2
))
4532 bfd_set_error (bfd_error_bad_value
);
4536 howto
= sh_elf_howto_table
+ r_type
;
4538 /* For relocs that aren't partial_inplace, we get the addend from
4540 if (! howto
->partial_inplace
)
4541 addend
= rel
->r_addend
;
4546 if (r_symndx
< symtab_hdr
->sh_info
)
4548 sym
= local_syms
+ r_symndx
;
4549 sec
= local_sections
[r_symndx
];
4550 relocation
= (sec
->output_section
->vma
4551 + sec
->output_offset
4553 /* A local symbol never has STO_SH5_ISA32, so we don't need
4554 datalabel processing here. Make sure this does not change
4556 if ((sym
->st_other
& STO_SH5_ISA32
) != 0)
4557 ((*info
->callbacks
->reloc_dangerous
)
4559 _("Unexpected STO_SH5_ISA32 on local symbol is not handled"),
4560 input_bfd
, input_section
, rel
->r_offset
));
4561 if (info
->relocatable
)
4563 /* This is a relocatable link. We don't have to change
4564 anything, unless the reloc is against a section symbol,
4565 in which case we have to adjust according to where the
4566 section symbol winds up in the output section. */
4567 sym
= local_syms
+ r_symndx
;
4568 if (ELF_ST_TYPE (sym
->st_info
) == STT_SECTION
)
4570 if (! howto
->partial_inplace
)
4572 /* For relocations with the addend in the
4573 relocation, we need just to update the addend.
4574 All real relocs are of type partial_inplace; this
4575 code is mostly for completeness. */
4576 rel
->r_addend
+= sec
->output_offset
+ sym
->st_value
;
4581 /* Relocs of type partial_inplace need to pick up the
4582 contents in the contents and add the offset resulting
4583 from the changed location of the section symbol.
4584 Using _bfd_final_link_relocate (e.g. goto
4585 final_link_relocate) here would be wrong, because
4586 relocations marked pc_relative would get the current
4587 location subtracted, and we must only do that at the
4589 r
= _bfd_relocate_contents (howto
, input_bfd
,
4592 contents
+ rel
->r_offset
);
4593 goto relocation_done
;
4598 else if (! howto
->partial_inplace
)
4600 relocation
= _bfd_elf_rela_local_sym (output_bfd
, sym
, &sec
, rel
);
4601 addend
= rel
->r_addend
;
4603 else if ((sec
->flags
& SEC_MERGE
)
4604 && ELF_ST_TYPE (sym
->st_info
) == STT_SECTION
)
4608 if (howto
->rightshift
|| howto
->src_mask
!= 0xffffffff)
4610 (*_bfd_error_handler
)
4611 (_("%B(%A+0x%lx): %s relocation against SEC_MERGE section"),
4612 input_bfd
, input_section
,
4613 (long) rel
->r_offset
, howto
->name
);
4617 addend
= bfd_get_32 (input_bfd
, contents
+ rel
->r_offset
);
4620 _bfd_elf_rel_local_sym (output_bfd
, sym
, &msec
, addend
)
4622 addend
+= msec
->output_section
->vma
+ msec
->output_offset
;
4623 bfd_put_32 (input_bfd
, addend
, contents
+ rel
->r_offset
);
4629 /* FIXME: Ought to make use of the RELOC_FOR_GLOBAL_SYMBOL macro. */
4631 /* Section symbol are never (?) placed in the hash table, so
4632 we can just ignore hash relocations when creating a
4633 relocatable object file. */
4634 if (info
->relocatable
)
4637 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
4638 while (h
->root
.type
== bfd_link_hash_indirect
4639 || h
->root
.type
== bfd_link_hash_warning
)
4641 #ifdef INCLUDE_SHMEDIA
4642 /* If the reference passes a symbol marked with
4643 STT_DATALABEL, then any STO_SH5_ISA32 on the final value
4645 seen_stt_datalabel
|= h
->type
== STT_DATALABEL
;
4647 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
4649 if (h
->root
.type
== bfd_link_hash_defined
4650 || h
->root
.type
== bfd_link_hash_defweak
)
4654 dyn
= htab
->root
.dynamic_sections_created
;
4655 sec
= h
->root
.u
.def
.section
;
4656 /* In these cases, we don't need the relocation value.
4657 We check specially because in some obscure cases
4658 sec->output_section will be NULL. */
4659 if (r_type
== R_SH_GOTPC
4660 || r_type
== R_SH_GOTPC_LOW16
4661 || r_type
== R_SH_GOTPC_MEDLOW16
4662 || r_type
== R_SH_GOTPC_MEDHI16
4663 || r_type
== R_SH_GOTPC_HI16
4664 || ((r_type
== R_SH_PLT32
4665 || r_type
== R_SH_PLT_LOW16
4666 || r_type
== R_SH_PLT_MEDLOW16
4667 || r_type
== R_SH_PLT_MEDHI16
4668 || r_type
== R_SH_PLT_HI16
)
4669 && h
->plt
.offset
!= (bfd_vma
) -1)
4670 || ((r_type
== R_SH_GOT32
4671 || r_type
== R_SH_GOT_LOW16
4672 || r_type
== R_SH_GOT_MEDLOW16
4673 || r_type
== R_SH_GOT_MEDHI16
4674 || r_type
== R_SH_GOT_HI16
)
4675 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn
, info
->shared
, h
)
4677 || (! info
->symbolic
&& h
->dynindx
!= -1)
4678 || !h
->def_regular
))
4679 /* The cases above are those in which relocation is
4680 overwritten in the switch block below. The cases
4681 below are those in which we must defer relocation
4682 to run-time, because we can't resolve absolute
4683 addresses when creating a shared library. */
4685 && ((! info
->symbolic
&& h
->dynindx
!= -1)
4687 && ((r_type
== R_SH_DIR32
4688 && !h
->forced_local
)
4689 || r_type
== R_SH_REL32
)
4690 && ((input_section
->flags
& SEC_ALLOC
) != 0
4691 /* DWARF will emit R_SH_DIR32 relocations in its
4692 sections against symbols defined externally
4693 in shared libraries. We can't do anything
4695 || ((input_section
->flags
& SEC_DEBUGGING
) != 0
4696 && h
->def_dynamic
)))
4697 /* Dynamic relocs are not propagated for SEC_DEBUGGING
4698 sections because such sections are not SEC_ALLOC and
4699 thus ld.so will not process them. */
4700 || (sec
->output_section
== NULL
4701 && ((input_section
->flags
& SEC_DEBUGGING
) != 0
4703 || (sec
->output_section
== NULL
4704 && (sh_elf_hash_entry (h
)->tls_type
== GOT_TLS_IE
4705 || sh_elf_hash_entry (h
)->tls_type
== GOT_TLS_GD
)))
4707 else if (sec
->output_section
== NULL
)
4709 (*_bfd_error_handler
)
4710 (_("%B(%A): unresolvable relocation against symbol `%s'"),
4711 input_bfd
, input_section
, h
->root
.root
.string
);
4715 relocation
= ((h
->root
.u
.def
.value
4716 + sec
->output_section
->vma
4717 + sec
->output_offset
)
4718 /* A STO_SH5_ISA32 causes a "bitor 1" to the
4719 symbol value, unless we've seen
4720 STT_DATALABEL on the way to it. */
4721 | ((h
->other
& STO_SH5_ISA32
) != 0
4722 && ! seen_stt_datalabel
));
4724 else if (h
->root
.type
== bfd_link_hash_undefweak
)
4726 else if (info
->unresolved_syms_in_objects
== RM_IGNORE
4727 && ELF_ST_VISIBILITY (h
->other
) == STV_DEFAULT
)
4731 if (! info
->callbacks
->undefined_symbol
4732 (info
, h
->root
.root
.string
, input_bfd
,
4733 input_section
, rel
->r_offset
,
4734 (info
->unresolved_syms_in_objects
== RM_GENERATE_ERROR
4735 || ELF_ST_VISIBILITY (h
->other
))))
4741 switch ((int) r_type
)
4743 final_link_relocate
:
4744 /* COFF relocs don't use the addend. The addend is used for
4745 R_SH_DIR32 to be compatible with other compilers. */
4746 r
= _bfd_final_link_relocate (howto
, input_bfd
, input_section
,
4747 contents
, rel
->r_offset
,
4748 relocation
, addend
);
4752 goto final_link_relocate
;
4757 /* If the reloc is against the start of this section, then
4758 the assembler has already taken care of it and the reloc
4759 is here only to assist in relaxing. If the reloc is not
4760 against the start of this section, then it's against an
4761 external symbol and we must deal with it ourselves. */
4762 if (input_section
->output_section
->vma
+ input_section
->output_offset
4765 int disp
= (relocation
4766 - input_section
->output_section
->vma
4767 - input_section
->output_offset
4773 case R_SH_DIR8WPZ
: mask
= 1; break;
4774 case R_SH_DIR8WPL
: mask
= 3; break;
4775 default: mask
= 0; break;
4779 ((*_bfd_error_handler
)
4780 (_("%B: 0x%lx: fatal: unaligned branch target for relax-support relocation"),
4781 input_section
->owner
,
4782 (unsigned long) rel
->r_offset
));
4783 bfd_set_error (bfd_error_bad_value
);
4787 goto final_link_relocate
;
4793 #ifdef INCLUDE_SHMEDIA
4794 if (shmedia_prepare_reloc (info
, input_bfd
, input_section
,
4795 contents
, rel
, &relocation
))
4796 goto final_link_relocate
;
4798 bfd_set_error (bfd_error_bad_value
);
4806 goto final_link_relocate
;
4812 ((*_bfd_error_handler
)
4813 (_("%B: 0x%lx: fatal: unaligned %s relocation 0x%lx"),
4814 input_section
->owner
,
4815 (unsigned long) rel
->r_offset
, howto
->name
,
4816 (unsigned long) relocation
));
4817 bfd_set_error (bfd_error_bad_value
);
4820 goto final_link_relocate
;
4827 ((*_bfd_error_handler
)
4828 (_("%B: 0x%lx: fatal: unaligned %s relocation 0x%lx"),
4829 input_section
->owner
,
4830 (unsigned long) rel
->r_offset
, howto
->name
,
4831 (unsigned long) relocation
));
4832 bfd_set_error (bfd_error_bad_value
);
4835 goto final_link_relocate
;
4838 if ((signed int)relocation
< -32
4839 || (signed int)relocation
> 32)
4841 ((*_bfd_error_handler
)
4842 (_("%B: 0x%lx: fatal: R_SH_PSHA relocation %d not in range -32..32"),
4843 input_section
->owner
,
4844 (unsigned long) rel
->r_offset
,
4845 (unsigned long) relocation
));
4846 bfd_set_error (bfd_error_bad_value
);
4849 goto final_link_relocate
;
4852 if ((signed int)relocation
< -16
4853 || (signed int)relocation
> 16)
4855 ((*_bfd_error_handler
)
4856 (_("%B: 0x%lx: fatal: R_SH_PSHL relocation %d not in range -32..32"),
4857 input_section
->owner
,
4858 (unsigned long) rel
->r_offset
,
4859 (unsigned long) relocation
));
4860 bfd_set_error (bfd_error_bad_value
);
4863 goto final_link_relocate
;
4867 #ifdef INCLUDE_SHMEDIA
4868 case R_SH_IMM_LOW16_PCREL
:
4869 case R_SH_IMM_MEDLOW16_PCREL
:
4870 case R_SH_IMM_MEDHI16_PCREL
:
4871 case R_SH_IMM_HI16_PCREL
:
4875 || ELF_ST_VISIBILITY (h
->other
) == STV_DEFAULT
4876 || h
->root
.type
!= bfd_link_hash_undefweak
)
4878 && (input_section
->flags
& SEC_ALLOC
) != 0
4879 && (r_type
== R_SH_DIR32
4880 || !SYMBOL_CALLS_LOCAL (info
, h
)))
4882 Elf_Internal_Rela outrel
;
4884 bfd_boolean skip
, relocate
;
4886 /* When generating a shared object, these relocations
4887 are copied into the output file to be resolved at run
4894 name
= (bfd_elf_string_from_elf_section
4896 elf_elfheader (input_bfd
)->e_shstrndx
,
4897 elf_section_data (input_section
)->rel_hdr
.sh_name
));
4901 BFD_ASSERT (strncmp (name
, ".rela", 5) == 0
4902 && strcmp (bfd_get_section_name (input_bfd
,
4906 sreloc
= bfd_get_section_by_name (dynobj
, name
);
4907 BFD_ASSERT (sreloc
!= NULL
);
4914 _bfd_elf_section_offset (output_bfd
, info
, input_section
,
4916 if (outrel
.r_offset
== (bfd_vma
) -1)
4918 else if (outrel
.r_offset
== (bfd_vma
) -2)
4919 skip
= TRUE
, relocate
= TRUE
;
4920 outrel
.r_offset
+= (input_section
->output_section
->vma
4921 + input_section
->output_offset
);
4924 memset (&outrel
, 0, sizeof outrel
);
4925 else if (r_type
== R_SH_REL32
)
4927 BFD_ASSERT (h
!= NULL
&& h
->dynindx
!= -1);
4928 outrel
.r_info
= ELF32_R_INFO (h
->dynindx
, R_SH_REL32
);
4930 = bfd_get_32 (input_bfd
, contents
+ rel
->r_offset
);
4932 #ifdef INCLUDE_SHMEDIA
4933 else if (r_type
== R_SH_IMM_LOW16_PCREL
4934 || r_type
== R_SH_IMM_MEDLOW16_PCREL
4935 || r_type
== R_SH_IMM_MEDHI16_PCREL
4936 || r_type
== R_SH_IMM_HI16_PCREL
)
4938 BFD_ASSERT (h
!= NULL
&& h
->dynindx
!= -1);
4939 outrel
.r_info
= ELF32_R_INFO (h
->dynindx
, r_type
);
4940 outrel
.r_addend
= addend
;
4945 /* h->dynindx may be -1 if this symbol was marked to
4948 || ((info
->symbolic
|| h
->dynindx
== -1)
4952 outrel
.r_info
= ELF32_R_INFO (0, R_SH_RELATIVE
);
4954 = relocation
+ bfd_get_32 (input_bfd
,
4955 contents
+ rel
->r_offset
);
4959 BFD_ASSERT (h
->dynindx
!= -1);
4960 outrel
.r_info
= ELF32_R_INFO (h
->dynindx
, R_SH_DIR32
);
4962 = relocation
+ bfd_get_32 (input_bfd
,
4963 contents
+ rel
->r_offset
);
4967 loc
= sreloc
->contents
;
4968 loc
+= sreloc
->reloc_count
++ * sizeof (Elf32_External_Rela
);
4969 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
4971 /* If this reloc is against an external symbol, we do
4972 not want to fiddle with the addend. Otherwise, we
4973 need to include the symbol value so that it becomes
4974 an addend for the dynamic reloc. */
4978 goto final_link_relocate
;
4981 #ifdef INCLUDE_SHMEDIA
4982 case R_SH_GOTPLT_LOW16
:
4983 case R_SH_GOTPLT_MEDLOW16
:
4984 case R_SH_GOTPLT_MEDHI16
:
4985 case R_SH_GOTPLT_HI16
:
4986 case R_SH_GOTPLT10BY4
:
4987 case R_SH_GOTPLT10BY8
:
4989 /* Relocation is to the entry for this symbol in the
4990 procedure linkage table. */
4997 || h
->plt
.offset
== (bfd_vma
) -1
4998 || h
->got
.offset
!= (bfd_vma
) -1)
5001 /* Relocation is to the entry for this symbol in the global
5002 offset table extension for the procedure linkage table. */
5004 BFD_ASSERT (sgotplt
!= NULL
);
5005 relocation
= (sgotplt
->output_offset
5006 + ((h
->plt
.offset
/ elf_sh_sizeof_plt (info
)
5010 relocation
-= GOT_BIAS
;
5013 goto final_link_relocate
;
5017 #ifdef INCLUDE_SHMEDIA
5018 case R_SH_GOT_LOW16
:
5019 case R_SH_GOT_MEDLOW16
:
5020 case R_SH_GOT_MEDHI16
:
5025 /* Relocation is to the entry for this symbol in the global
5028 BFD_ASSERT (sgot
!= NULL
);
5034 off
= h
->got
.offset
;
5035 #ifdef INCLUDE_SHMEDIA
5036 if (seen_stt_datalabel
)
5038 struct elf_sh_link_hash_entry
*hsh
;
5040 hsh
= (struct elf_sh_link_hash_entry
*)h
;
5041 off
= hsh
->datalabel_got
.offset
;
5044 BFD_ASSERT (off
!= (bfd_vma
) -1);
5046 dyn
= htab
->root
.dynamic_sections_created
;
5047 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn
, info
->shared
, h
)
5049 && SYMBOL_REFERENCES_LOCAL (info
, h
))
5050 || (ELF_ST_VISIBILITY (h
->other
)
5051 && h
->root
.type
== bfd_link_hash_undefweak
))
5053 /* This is actually a static link, or it is a
5054 -Bsymbolic link and the symbol is defined
5055 locally, or the symbol was forced to be local
5056 because of a version file. We must initialize
5057 this entry in the global offset table. Since the
5058 offset must always be a multiple of 4, we use the
5059 least significant bit to record whether we have
5060 initialized it already.
5062 When doing a dynamic link, we create a .rela.got
5063 relocation entry to initialize the value. This
5064 is done in the finish_dynamic_symbol routine. */
5069 bfd_put_32 (output_bfd
, relocation
,
5070 sgot
->contents
+ off
);
5071 #ifdef INCLUDE_SHMEDIA
5072 if (seen_stt_datalabel
)
5074 struct elf_sh_link_hash_entry
*hsh
;
5076 hsh
= (struct elf_sh_link_hash_entry
*)h
;
5077 hsh
->datalabel_got
.offset
|= 1;
5085 relocation
= sgot
->output_offset
+ off
;
5089 #ifdef INCLUDE_SHMEDIA
5092 BFD_ASSERT (local_got_offsets
!= NULL
5093 && (local_got_offsets
[symtab_hdr
->sh_info
5097 off
= local_got_offsets
[symtab_hdr
->sh_info
5103 BFD_ASSERT (local_got_offsets
!= NULL
5104 && local_got_offsets
[r_symndx
] != (bfd_vma
) -1);
5106 off
= local_got_offsets
[r_symndx
];
5107 #ifdef INCLUDE_SHMEDIA
5111 /* The offset must always be a multiple of 4. We use
5112 the least significant bit to record whether we have
5113 already generated the necessary reloc. */
5118 bfd_put_32 (output_bfd
, relocation
, sgot
->contents
+ off
);
5122 Elf_Internal_Rela outrel
;
5125 if (srelgot
== NULL
)
5127 srelgot
= bfd_get_section_by_name (dynobj
,
5129 BFD_ASSERT (srelgot
!= NULL
);
5132 outrel
.r_offset
= (sgot
->output_section
->vma
5133 + sgot
->output_offset
5135 outrel
.r_info
= ELF32_R_INFO (0, R_SH_RELATIVE
);
5136 outrel
.r_addend
= relocation
;
5137 loc
= srelgot
->contents
;
5138 loc
+= srelgot
->reloc_count
++ * sizeof (Elf32_External_Rela
);
5139 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
5142 #ifdef INCLUDE_SHMEDIA
5144 local_got_offsets
[symtab_hdr
->sh_info
+ r_symndx
] |= 1;
5147 local_got_offsets
[r_symndx
] |= 1;
5150 relocation
= sgot
->output_offset
+ off
;
5154 relocation
-= GOT_BIAS
;
5157 goto final_link_relocate
;
5160 #ifdef INCLUDE_SHMEDIA
5161 case R_SH_GOTOFF_LOW16
:
5162 case R_SH_GOTOFF_MEDLOW16
:
5163 case R_SH_GOTOFF_MEDHI16
:
5164 case R_SH_GOTOFF_HI16
:
5166 /* Relocation is relative to the start of the global offset
5169 BFD_ASSERT (sgot
!= NULL
);
5171 /* Note that sgot->output_offset is not involved in this
5172 calculation. We always want the start of .got. If we
5173 defined _GLOBAL_OFFSET_TABLE in a different way, as is
5174 permitted by the ABI, we might have to change this
5176 relocation
-= sgot
->output_section
->vma
;
5179 relocation
-= GOT_BIAS
;
5182 addend
= rel
->r_addend
;
5184 goto final_link_relocate
;
5187 #ifdef INCLUDE_SHMEDIA
5188 case R_SH_GOTPC_LOW16
:
5189 case R_SH_GOTPC_MEDLOW16
:
5190 case R_SH_GOTPC_MEDHI16
:
5191 case R_SH_GOTPC_HI16
:
5193 /* Use global offset table as symbol value. */
5195 BFD_ASSERT (sgot
!= NULL
);
5196 relocation
= sgot
->output_section
->vma
;
5199 relocation
+= GOT_BIAS
;
5202 addend
= rel
->r_addend
;
5204 goto final_link_relocate
;
5207 #ifdef INCLUDE_SHMEDIA
5208 case R_SH_PLT_LOW16
:
5209 case R_SH_PLT_MEDLOW16
:
5210 case R_SH_PLT_MEDHI16
:
5213 /* Relocation is to the entry for this symbol in the
5214 procedure linkage table. */
5216 /* Resolve a PLT reloc against a local symbol directly,
5217 without using the procedure linkage table. */
5219 goto final_link_relocate
;
5221 if (h
->forced_local
)
5222 goto final_link_relocate
;
5224 if (h
->plt
.offset
== (bfd_vma
) -1)
5226 /* We didn't make a PLT entry for this symbol. This
5227 happens when statically linking PIC code, or when
5228 using -Bsymbolic. */
5229 goto final_link_relocate
;
5232 BFD_ASSERT (splt
!= NULL
);
5233 relocation
= (splt
->output_section
->vma
5234 + splt
->output_offset
5237 #ifdef INCLUDE_SHMEDIA
5241 addend
= rel
->r_addend
;
5243 goto final_link_relocate
;
5245 case R_SH_LOOP_START
:
5247 static bfd_vma start
, end
;
5249 start
= (relocation
+ rel
->r_addend
5250 - (sec
->output_section
->vma
+ sec
->output_offset
));
5251 r
= sh_elf_reloc_loop (r_type
, input_bfd
, input_section
, contents
,
5252 rel
->r_offset
, sec
, start
, end
);
5256 end
= (relocation
+ rel
->r_addend
5257 - (sec
->output_section
->vma
+ sec
->output_offset
));
5258 r
= sh_elf_reloc_loop (r_type
, input_bfd
, input_section
, contents
,
5259 rel
->r_offset
, sec
, start
, end
);
5263 case R_SH_TLS_GD_32
:
5264 case R_SH_TLS_IE_32
:
5265 r_type
= sh_elf_optimized_tls_reloc (info
, r_type
, h
== NULL
);
5266 tls_type
= GOT_UNKNOWN
;
5267 if (h
== NULL
&& local_got_offsets
)
5268 tls_type
= sh_elf_local_got_tls_type (input_bfd
) [r_symndx
];
5271 tls_type
= sh_elf_hash_entry (h
)->tls_type
;
5273 && (h
->dynindx
== -1
5275 r_type
= R_SH_TLS_LE_32
;
5278 if (r_type
== R_SH_TLS_GD_32
&& tls_type
== GOT_TLS_IE
)
5279 r_type
= R_SH_TLS_IE_32
;
5281 if (r_type
== R_SH_TLS_LE_32
)
5284 unsigned short insn
;
5286 if (ELF32_R_TYPE (rel
->r_info
) == R_SH_TLS_GD_32
)
5288 /* GD->LE transition:
5289 mov.l 1f,r4; mova 2f,r0; mov.l 2f,r1; add r0,r1;
5290 jsr @r1; add r12,r4; bra 3f; nop; .align 2;
5291 1: .long x$TLSGD; 2: .long __tls_get_addr@PLT; 3:
5293 mov.l 1f,r4; stc gbr,r0; add r4,r0; nop;
5295 1: .long x@TPOFF; 2: .long __tls_get_addr@PLT; 3:. */
5297 offset
= rel
->r_offset
;
5298 BFD_ASSERT (offset
>= 16);
5299 /* Size of GD instructions is 16 or 18. */
5301 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 0);
5302 if ((insn
& 0xff00) == 0xc700)
5304 BFD_ASSERT (offset
>= 2);
5306 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 0);
5309 BFD_ASSERT ((insn
& 0xff00) == 0xd400);
5310 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 2);
5311 BFD_ASSERT ((insn
& 0xff00) == 0xc700);
5312 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 4);
5313 BFD_ASSERT ((insn
& 0xff00) == 0xd100);
5314 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 6);
5315 BFD_ASSERT (insn
== 0x310c);
5316 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 8);
5317 BFD_ASSERT (insn
== 0x410b);
5318 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 10);
5319 BFD_ASSERT (insn
== 0x34cc);
5321 bfd_put_16 (output_bfd
, 0x0012, contents
+ offset
+ 2);
5322 bfd_put_16 (output_bfd
, 0x304c, contents
+ offset
+ 4);
5323 bfd_put_16 (output_bfd
, 0x0009, contents
+ offset
+ 6);
5324 bfd_put_16 (output_bfd
, 0x0009, contents
+ offset
+ 8);
5325 bfd_put_16 (output_bfd
, 0x0009, contents
+ offset
+ 10);
5331 /* IE->LE transition:
5332 mov.l 1f,r0; stc gbr,rN; mov.l @(r0,r12),rM;
5333 bra 2f; add ...; .align 2; 1: x@GOTTPOFF; 2:
5335 mov.l .Ln,rM; stc gbr,rN; nop; ...;
5338 offset
= rel
->r_offset
;
5339 BFD_ASSERT (offset
>= 16);
5340 /* Size of IE instructions is 10 or 12. */
5342 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 0);
5343 if ((insn
& 0xf0ff) == 0x0012)
5345 BFD_ASSERT (offset
>= 2);
5347 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 0);
5350 BFD_ASSERT ((insn
& 0xff00) == 0xd000);
5351 index
= insn
& 0x00ff;
5352 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 2);
5353 BFD_ASSERT ((insn
& 0xf0ff) == 0x0012);
5354 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 4);
5355 BFD_ASSERT ((insn
& 0xf0ff) == 0x00ce);
5356 insn
= 0xd000 | (insn
& 0x0f00) | index
;
5357 bfd_put_16 (output_bfd
, insn
, contents
+ offset
+ 0);
5358 bfd_put_16 (output_bfd
, 0x0009, contents
+ offset
+ 4);
5361 bfd_put_32 (output_bfd
, tpoff (info
, relocation
),
5362 contents
+ rel
->r_offset
);
5371 off
= h
->got
.offset
;
5374 if (local_got_offsets
== NULL
)
5377 off
= local_got_offsets
[r_symndx
];
5380 /* Relocate R_SH_TLS_IE_32 directly when statically linking. */
5381 if (r_type
== R_SH_TLS_IE_32
5382 && ! htab
->root
.dynamic_sections_created
)
5385 bfd_put_32 (output_bfd
, tpoff (info
, relocation
),
5386 sgot
->contents
+ off
);
5387 bfd_put_32 (output_bfd
, sgot
->output_offset
+ off
,
5388 contents
+ rel
->r_offset
);
5396 Elf_Internal_Rela outrel
;
5400 if (srelgot
== NULL
)
5402 srelgot
= bfd_get_section_by_name (dynobj
, ".rela.got");
5403 BFD_ASSERT (srelgot
!= NULL
);
5406 outrel
.r_offset
= (sgot
->output_section
->vma
5407 + sgot
->output_offset
+ off
);
5409 if (h
== NULL
|| h
->dynindx
== -1)
5414 dr_type
= (r_type
== R_SH_TLS_GD_32
? R_SH_TLS_DTPMOD32
:
5416 if (dr_type
== R_SH_TLS_TPOFF32
&& indx
== 0)
5417 outrel
.r_addend
= relocation
- dtpoff_base (info
);
5419 outrel
.r_addend
= 0;
5420 outrel
.r_info
= ELF32_R_INFO (indx
, dr_type
);
5421 loc
= srelgot
->contents
;
5422 loc
+= srelgot
->reloc_count
++ * sizeof (Elf32_External_Rela
);
5423 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
5425 if (r_type
== R_SH_TLS_GD_32
)
5429 bfd_put_32 (output_bfd
,
5430 relocation
- dtpoff_base (info
),
5431 sgot
->contents
+ off
+ 4);
5435 outrel
.r_info
= ELF32_R_INFO (indx
,
5437 outrel
.r_offset
+= 4;
5438 outrel
.r_addend
= 0;
5439 srelgot
->reloc_count
++;
5440 loc
+= sizeof (Elf32_External_Rela
);
5441 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
5448 local_got_offsets
[r_symndx
] |= 1;
5451 if (off
>= (bfd_vma
) -2)
5454 if (r_type
== (int) ELF32_R_TYPE (rel
->r_info
))
5455 relocation
= sgot
->output_offset
+ off
;
5459 unsigned short insn
;
5461 /* GD->IE transition:
5462 mov.l 1f,r4; mova 2f,r0; mov.l 2f,r1; add r0,r1;
5463 jsr @r1; add r12,r4; bra 3f; nop; .align 2;
5464 1: .long x$TLSGD; 2: .long __tls_get_addr@PLT; 3:
5466 mov.l 1f,r0; stc gbr,r4; mov.l @(r0,r12),r0; add r4,r0;
5467 nop; nop; bra 3f; nop; .align 2;
5468 1: .long x@TPOFF; 2:...; 3:. */
5470 offset
= rel
->r_offset
;
5471 BFD_ASSERT (offset
>= 16);
5472 /* Size of GD instructions is 16 or 18. */
5474 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 0);
5475 if ((insn
& 0xff00) == 0xc700)
5477 BFD_ASSERT (offset
>= 2);
5479 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 0);
5482 BFD_ASSERT ((insn
& 0xff00) == 0xd400);
5484 /* Replace mov.l 1f,R4 with mov.l 1f,r0. */
5485 bfd_put_16 (output_bfd
, insn
& 0xf0ff, contents
+ offset
);
5487 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 2);
5488 BFD_ASSERT ((insn
& 0xff00) == 0xc700);
5489 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 4);
5490 BFD_ASSERT ((insn
& 0xff00) == 0xd100);
5491 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 6);
5492 BFD_ASSERT (insn
== 0x310c);
5493 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 8);
5494 BFD_ASSERT (insn
== 0x410b);
5495 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 10);
5496 BFD_ASSERT (insn
== 0x34cc);
5498 bfd_put_16 (output_bfd
, 0x0412, contents
+ offset
+ 2);
5499 bfd_put_16 (output_bfd
, 0x00ce, contents
+ offset
+ 4);
5500 bfd_put_16 (output_bfd
, 0x304c, contents
+ offset
+ 6);
5501 bfd_put_16 (output_bfd
, 0x0009, contents
+ offset
+ 8);
5502 bfd_put_16 (output_bfd
, 0x0009, contents
+ offset
+ 10);
5504 bfd_put_32 (output_bfd
, sgot
->output_offset
+ off
,
5505 contents
+ rel
->r_offset
);
5510 addend
= rel
->r_addend
;
5512 goto final_link_relocate
;
5514 case R_SH_TLS_LD_32
:
5518 unsigned short insn
;
5520 /* LD->LE transition:
5521 mov.l 1f,r4; mova 2f,r0; mov.l 2f,r1; add r0,r1;
5522 jsr @r1; add r12,r4; bra 3f; nop; .align 2;
5523 1: .long x$TLSLD; 2: .long __tls_get_addr@PLT; 3:
5525 stc gbr,r0; nop; nop; nop;
5526 nop; nop; bra 3f; ...; 3:. */
5528 offset
= rel
->r_offset
;
5529 BFD_ASSERT (offset
>= 16);
5530 /* Size of LD instructions is 16 or 18. */
5532 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 0);
5533 if ((insn
& 0xff00) == 0xc700)
5535 BFD_ASSERT (offset
>= 2);
5537 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 0);
5540 BFD_ASSERT ((insn
& 0xff00) == 0xd400);
5541 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 2);
5542 BFD_ASSERT ((insn
& 0xff00) == 0xc700);
5543 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 4);
5544 BFD_ASSERT ((insn
& 0xff00) == 0xd100);
5545 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 6);
5546 BFD_ASSERT (insn
== 0x310c);
5547 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 8);
5548 BFD_ASSERT (insn
== 0x410b);
5549 insn
= bfd_get_16 (input_bfd
, contents
+ offset
+ 10);
5550 BFD_ASSERT (insn
== 0x34cc);
5552 bfd_put_16 (output_bfd
, 0x0012, contents
+ offset
+ 0);
5553 bfd_put_16 (output_bfd
, 0x0009, contents
+ offset
+ 2);
5554 bfd_put_16 (output_bfd
, 0x0009, contents
+ offset
+ 4);
5555 bfd_put_16 (output_bfd
, 0x0009, contents
+ offset
+ 6);
5556 bfd_put_16 (output_bfd
, 0x0009, contents
+ offset
+ 8);
5557 bfd_put_16 (output_bfd
, 0x0009, contents
+ offset
+ 10);
5566 off
= htab
->tls_ldm_got
.offset
;
5571 Elf_Internal_Rela outrel
;
5574 srelgot
= htab
->srelgot
;
5575 if (srelgot
== NULL
)
5578 outrel
.r_offset
= (sgot
->output_section
->vma
5579 + sgot
->output_offset
+ off
);
5580 outrel
.r_addend
= 0;
5581 outrel
.r_info
= ELF32_R_INFO (0, R_SH_TLS_DTPMOD32
);
5582 loc
= srelgot
->contents
;
5583 loc
+= srelgot
->reloc_count
++ * sizeof (Elf32_External_Rela
);
5584 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
5585 htab
->tls_ldm_got
.offset
|= 1;
5588 relocation
= sgot
->output_offset
+ off
;
5589 addend
= rel
->r_addend
;
5591 goto final_link_relocate
;
5593 case R_SH_TLS_LDO_32
:
5595 relocation
= tpoff (info
, relocation
);
5597 relocation
-= dtpoff_base (info
);
5599 addend
= rel
->r_addend
;
5600 goto final_link_relocate
;
5602 case R_SH_TLS_LE_32
:
5605 Elf_Internal_Rela outrel
;
5610 relocation
= tpoff (info
, relocation
);
5611 addend
= rel
->r_addend
;
5612 goto final_link_relocate
;
5619 name
= (bfd_elf_string_from_elf_section
5621 elf_elfheader (input_bfd
)->e_shstrndx
,
5622 elf_section_data (input_section
)->rel_hdr
.sh_name
));
5626 BFD_ASSERT (strncmp (name
, ".rela", 5) == 0
5627 && strcmp (bfd_get_section_name (input_bfd
,
5631 sreloc
= bfd_get_section_by_name (dynobj
, name
);
5632 BFD_ASSERT (sreloc
!= NULL
);
5635 if (h
== NULL
|| h
->dynindx
== -1)
5640 outrel
.r_offset
= (input_section
->output_section
->vma
5641 + input_section
->output_offset
5643 outrel
.r_info
= ELF32_R_INFO (indx
, R_SH_TLS_TPOFF32
);
5645 outrel
.r_addend
= relocation
- dtpoff_base (info
);
5647 outrel
.r_addend
= 0;
5649 loc
= sreloc
->contents
;
5650 loc
+= sreloc
->reloc_count
++ * sizeof (Elf32_External_Rela
);
5651 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
5657 if (r
!= bfd_reloc_ok
)
5662 case bfd_reloc_outofrange
:
5664 case bfd_reloc_overflow
:
5672 name
= (bfd_elf_string_from_elf_section
5673 (input_bfd
, symtab_hdr
->sh_link
, sym
->st_name
));
5677 name
= bfd_section_name (input_bfd
, sec
);
5679 if (! ((*info
->callbacks
->reloc_overflow
)
5680 (info
, (h
? &h
->root
: NULL
), name
, howto
->name
,
5681 (bfd_vma
) 0, input_bfd
, input_section
,
5693 /* This is a version of bfd_generic_get_relocated_section_contents
5694 which uses sh_elf_relocate_section. */
5697 sh_elf_get_relocated_section_contents (bfd
*output_bfd
,
5698 struct bfd_link_info
*link_info
,
5699 struct bfd_link_order
*link_order
,
5701 bfd_boolean relocatable
,
5704 Elf_Internal_Shdr
*symtab_hdr
;
5705 asection
*input_section
= link_order
->u
.indirect
.section
;
5706 bfd
*input_bfd
= input_section
->owner
;
5707 asection
**sections
= NULL
;
5708 Elf_Internal_Rela
*internal_relocs
= NULL
;
5709 Elf_Internal_Sym
*isymbuf
= NULL
;
5711 /* We only need to handle the case of relaxing, or of having a
5712 particular set of section contents, specially. */
5714 || elf_section_data (input_section
)->this_hdr
.contents
== NULL
)
5715 return bfd_generic_get_relocated_section_contents (output_bfd
, link_info
,
5720 symtab_hdr
= &elf_tdata (input_bfd
)->symtab_hdr
;
5722 memcpy (data
, elf_section_data (input_section
)->this_hdr
.contents
,
5723 (size_t) input_section
->size
);
5725 if ((input_section
->flags
& SEC_RELOC
) != 0
5726 && input_section
->reloc_count
> 0)
5729 Elf_Internal_Sym
*isym
, *isymend
;
5732 internal_relocs
= (_bfd_elf_link_read_relocs
5733 (input_bfd
, input_section
, NULL
,
5734 (Elf_Internal_Rela
*) NULL
, FALSE
));
5735 if (internal_relocs
== NULL
)
5738 if (symtab_hdr
->sh_info
!= 0)
5740 isymbuf
= (Elf_Internal_Sym
*) symtab_hdr
->contents
;
5741 if (isymbuf
== NULL
)
5742 isymbuf
= bfd_elf_get_elf_syms (input_bfd
, symtab_hdr
,
5743 symtab_hdr
->sh_info
, 0,
5745 if (isymbuf
== NULL
)
5749 amt
= symtab_hdr
->sh_info
;
5750 amt
*= sizeof (asection
*);
5751 sections
= (asection
**) bfd_malloc (amt
);
5752 if (sections
== NULL
&& amt
!= 0)
5755 isymend
= isymbuf
+ symtab_hdr
->sh_info
;
5756 for (isym
= isymbuf
, secpp
= sections
; isym
< isymend
; ++isym
, ++secpp
)
5760 if (isym
->st_shndx
== SHN_UNDEF
)
5761 isec
= bfd_und_section_ptr
;
5762 else if (isym
->st_shndx
== SHN_ABS
)
5763 isec
= bfd_abs_section_ptr
;
5764 else if (isym
->st_shndx
== SHN_COMMON
)
5765 isec
= bfd_com_section_ptr
;
5767 isec
= bfd_section_from_elf_index (input_bfd
, isym
->st_shndx
);
5772 if (! sh_elf_relocate_section (output_bfd
, link_info
, input_bfd
,
5773 input_section
, data
, internal_relocs
,
5777 if (sections
!= NULL
)
5780 && symtab_hdr
->contents
!= (unsigned char *) isymbuf
)
5782 if (elf_section_data (input_section
)->relocs
!= internal_relocs
)
5783 free (internal_relocs
);
5789 if (sections
!= NULL
)
5792 && symtab_hdr
->contents
!= (unsigned char *) isymbuf
)
5794 if (internal_relocs
!= NULL
5795 && elf_section_data (input_section
)->relocs
!= internal_relocs
)
5796 free (internal_relocs
);
5800 /* Return the base VMA address which should be subtracted from real addresses
5801 when resolving @dtpoff relocation.
5802 This is PT_TLS segment p_vaddr. */
5805 dtpoff_base (struct bfd_link_info
*info
)
5807 /* If tls_sec is NULL, we should have signalled an error already. */
5808 if (elf_hash_table (info
)->tls_sec
== NULL
)
5810 return elf_hash_table (info
)->tls_sec
->vma
;
5813 /* Return the relocation value for R_SH_TLS_TPOFF32.. */
5816 tpoff (struct bfd_link_info
*info
, bfd_vma address
)
5818 /* If tls_sec is NULL, we should have signalled an error already. */
5819 if (elf_hash_table (info
)->tls_sec
== NULL
)
5821 /* SH TLS ABI is variant I and static TLS block start just after tcbhead
5822 structure which has 2 pointer fields. */
5823 return (address
- elf_hash_table (info
)->tls_sec
->vma
5824 + align_power ((bfd_vma
) 8,
5825 elf_hash_table (info
)->tls_sec
->alignment_power
));
5829 sh_elf_gc_mark_hook (asection
*sec
,
5830 struct bfd_link_info
*info ATTRIBUTE_UNUSED
,
5831 Elf_Internal_Rela
*rel
, struct elf_link_hash_entry
*h
,
5832 Elf_Internal_Sym
*sym
)
5836 switch (ELF32_R_TYPE (rel
->r_info
))
5838 case R_SH_GNU_VTINHERIT
:
5839 case R_SH_GNU_VTENTRY
:
5843 #ifdef INCLUDE_SHMEDIA
5844 while (h
->root
.type
== bfd_link_hash_indirect
5845 && h
->root
.u
.i
.link
)
5846 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
5848 switch (h
->root
.type
)
5850 case bfd_link_hash_defined
:
5851 case bfd_link_hash_defweak
:
5852 return h
->root
.u
.def
.section
;
5854 case bfd_link_hash_common
:
5855 return h
->root
.u
.c
.p
->section
;
5863 return bfd_section_from_elf_index (sec
->owner
, sym
->st_shndx
);
5868 /* Update the got entry reference counts for the section being removed. */
5871 sh_elf_gc_sweep_hook (bfd
*abfd
, struct bfd_link_info
*info
,
5872 asection
*sec
, const Elf_Internal_Rela
*relocs
)
5874 Elf_Internal_Shdr
*symtab_hdr
;
5875 struct elf_link_hash_entry
**sym_hashes
;
5876 bfd_signed_vma
*local_got_refcounts
;
5877 const Elf_Internal_Rela
*rel
, *relend
;
5879 elf_section_data (sec
)->local_dynrel
= NULL
;
5881 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
5882 sym_hashes
= elf_sym_hashes (abfd
);
5883 local_got_refcounts
= elf_local_got_refcounts (abfd
);
5885 relend
= relocs
+ sec
->reloc_count
;
5886 for (rel
= relocs
; rel
< relend
; rel
++)
5888 unsigned long r_symndx
;
5889 unsigned int r_type
;
5890 struct elf_link_hash_entry
*h
= NULL
;
5891 #ifdef INCLUDE_SHMEDIA
5892 int seen_stt_datalabel
= 0;
5895 r_symndx
= ELF32_R_SYM (rel
->r_info
);
5896 if (r_symndx
>= symtab_hdr
->sh_info
)
5898 struct elf_sh_link_hash_entry
*eh
;
5899 struct elf_sh_dyn_relocs
**pp
;
5900 struct elf_sh_dyn_relocs
*p
;
5902 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
5903 while (h
->root
.type
== bfd_link_hash_indirect
5904 || h
->root
.type
== bfd_link_hash_warning
)
5906 #ifdef INCLUDE_SHMEDIA
5907 seen_stt_datalabel
|= h
->type
== STT_DATALABEL
;
5909 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
5911 eh
= (struct elf_sh_link_hash_entry
*) h
;
5912 for (pp
= &eh
->dyn_relocs
; (p
= *pp
) != NULL
; pp
= &p
->next
)
5915 /* Everything must go for SEC. */
5921 r_type
= ELF32_R_TYPE (rel
->r_info
);
5922 switch (sh_elf_optimized_tls_reloc (info
, r_type
, h
!= NULL
))
5924 case R_SH_TLS_LD_32
:
5925 if (sh_elf_hash_table (info
)->tls_ldm_got
.refcount
> 0)
5926 sh_elf_hash_table (info
)->tls_ldm_got
.refcount
-= 1;
5932 #ifdef INCLUDE_SHMEDIA
5933 case R_SH_GOT_LOW16
:
5934 case R_SH_GOT_MEDLOW16
:
5935 case R_SH_GOT_MEDHI16
:
5939 case R_SH_GOTOFF_LOW16
:
5940 case R_SH_GOTOFF_MEDLOW16
:
5941 case R_SH_GOTOFF_MEDHI16
:
5942 case R_SH_GOTOFF_HI16
:
5943 case R_SH_GOTPC_LOW16
:
5944 case R_SH_GOTPC_MEDLOW16
:
5945 case R_SH_GOTPC_MEDHI16
:
5946 case R_SH_GOTPC_HI16
:
5948 case R_SH_TLS_GD_32
:
5949 case R_SH_TLS_IE_32
:
5952 #ifdef INCLUDE_SHMEDIA
5953 if (seen_stt_datalabel
)
5955 struct elf_sh_link_hash_entry
*eh
;
5956 eh
= (struct elf_sh_link_hash_entry
*) h
;
5957 if (eh
->datalabel_got
.refcount
> 0)
5958 eh
->datalabel_got
.refcount
-= 1;
5962 if (h
->got
.refcount
> 0)
5963 h
->got
.refcount
-= 1;
5965 else if (local_got_refcounts
!= NULL
)
5967 #ifdef INCLUDE_SHMEDIA
5968 if (rel
->r_addend
& 1)
5970 if (local_got_refcounts
[symtab_hdr
->sh_info
+ r_symndx
] > 0)
5971 local_got_refcounts
[symtab_hdr
->sh_info
+ r_symndx
] -= 1;
5975 if (local_got_refcounts
[r_symndx
] > 0)
5976 local_got_refcounts
[r_symndx
] -= 1;
5987 #ifdef INCLUDE_SHMEDIA
5988 case R_SH_PLT_LOW16
:
5989 case R_SH_PLT_MEDLOW16
:
5990 case R_SH_PLT_MEDHI16
:
5995 if (h
->plt
.refcount
> 0)
5996 h
->plt
.refcount
-= 1;
6001 #ifdef INCLUDE_SHMEDIA
6002 case R_SH_GOTPLT_LOW16
:
6003 case R_SH_GOTPLT_MEDLOW16
:
6004 case R_SH_GOTPLT_MEDHI16
:
6005 case R_SH_GOTPLT_HI16
:
6006 case R_SH_GOTPLT10BY4
:
6007 case R_SH_GOTPLT10BY8
:
6011 struct elf_sh_link_hash_entry
*eh
;
6012 eh
= (struct elf_sh_link_hash_entry
*) h
;
6013 if (eh
->gotplt_refcount
> 0)
6015 eh
->gotplt_refcount
-= 1;
6016 if (h
->plt
.refcount
> 0)
6017 h
->plt
.refcount
-= 1;
6019 #ifdef INCLUDE_SHMEDIA
6020 else if (seen_stt_datalabel
)
6022 if (eh
->datalabel_got
.refcount
> 0)
6023 eh
->datalabel_got
.refcount
-= 1;
6026 else if (h
->got
.refcount
> 0)
6027 h
->got
.refcount
-= 1;
6029 else if (local_got_refcounts
!= NULL
)
6031 #ifdef INCLUDE_SHMEDIA
6032 if (rel
->r_addend
& 1)
6034 if (local_got_refcounts
[symtab_hdr
->sh_info
+ r_symndx
] > 0)
6035 local_got_refcounts
[symtab_hdr
->sh_info
+ r_symndx
] -= 1;
6039 if (local_got_refcounts
[r_symndx
] > 0)
6040 local_got_refcounts
[r_symndx
] -= 1;
6052 /* Copy the extra info we tack onto an elf_link_hash_entry. */
6055 sh_elf_copy_indirect_symbol (const struct elf_backend_data
*bed
,
6056 struct elf_link_hash_entry
*dir
,
6057 struct elf_link_hash_entry
*ind
)
6059 struct elf_sh_link_hash_entry
*edir
, *eind
;
6060 #ifdef INCLUDE_SHMEDIA
6064 edir
= (struct elf_sh_link_hash_entry
*) dir
;
6065 eind
= (struct elf_sh_link_hash_entry
*) ind
;
6067 if (eind
->dyn_relocs
!= NULL
)
6069 if (edir
->dyn_relocs
!= NULL
)
6071 struct elf_sh_dyn_relocs
**pp
;
6072 struct elf_sh_dyn_relocs
*p
;
6074 BFD_ASSERT (ind
->root
.type
!= bfd_link_hash_indirect
);
6076 /* Add reloc counts against the weak sym to the strong sym
6077 list. Merge any entries against the same section. */
6078 for (pp
= &eind
->dyn_relocs
; (p
= *pp
) != NULL
; )
6080 struct elf_sh_dyn_relocs
*q
;
6082 for (q
= edir
->dyn_relocs
; q
!= NULL
; q
= q
->next
)
6083 if (q
->sec
== p
->sec
)
6085 q
->pc_count
+= p
->pc_count
;
6086 q
->count
+= p
->count
;
6093 *pp
= edir
->dyn_relocs
;
6096 edir
->dyn_relocs
= eind
->dyn_relocs
;
6097 eind
->dyn_relocs
= NULL
;
6099 edir
->gotplt_refcount
= eind
->gotplt_refcount
;
6100 eind
->gotplt_refcount
= 0;
6101 #ifdef INCLUDE_SHMEDIA
6102 tmp
= edir
->datalabel_got
.refcount
;
6105 edir
->datalabel_got
.refcount
= eind
->datalabel_got
.refcount
;
6106 eind
->datalabel_got
.refcount
= tmp
;
6109 BFD_ASSERT (eind
->datalabel_got
.refcount
< 1);
6112 if (ind
->root
.type
== bfd_link_hash_indirect
6113 && dir
->got
.refcount
<= 0)
6115 edir
->tls_type
= eind
->tls_type
;
6116 eind
->tls_type
= GOT_UNKNOWN
;
6119 if (ind
->root
.type
!= bfd_link_hash_indirect
6120 && dir
->dynamic_adjusted
)
6122 /* If called to transfer flags for a weakdef during processing
6123 of elf_adjust_dynamic_symbol, don't copy non_got_ref.
6124 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
6125 dir
->ref_dynamic
|= ind
->ref_dynamic
;
6126 dir
->ref_regular
|= ind
->ref_regular
;
6127 dir
->ref_regular_nonweak
|= ind
->ref_regular_nonweak
;
6128 dir
->needs_plt
|= ind
->needs_plt
;
6131 _bfd_elf_link_hash_copy_indirect (bed
, dir
, ind
);
6135 sh_elf_optimized_tls_reloc (struct bfd_link_info
*info
, int r_type
,
6143 case R_SH_TLS_GD_32
:
6144 case R_SH_TLS_IE_32
:
6146 return R_SH_TLS_LE_32
;
6147 return R_SH_TLS_IE_32
;
6148 case R_SH_TLS_LD_32
:
6149 return R_SH_TLS_LE_32
;
6155 /* Look through the relocs for a section during the first phase.
6156 Since we don't do .gots or .plts, we just need to consider the
6157 virtual table relocs for gc. */
6160 sh_elf_check_relocs (bfd
*abfd
, struct bfd_link_info
*info
, asection
*sec
,
6161 const Elf_Internal_Rela
*relocs
)
6163 Elf_Internal_Shdr
*symtab_hdr
;
6164 struct elf_link_hash_entry
**sym_hashes
, **sym_hashes_end
;
6165 struct elf_sh_link_hash_table
*htab
;
6166 const Elf_Internal_Rela
*rel
;
6167 const Elf_Internal_Rela
*rel_end
;
6168 bfd_vma
*local_got_offsets
;
6172 unsigned int r_type
;
6173 int tls_type
, old_tls_type
;
6179 if (info
->relocatable
)
6182 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
6183 sym_hashes
= elf_sym_hashes (abfd
);
6184 sym_hashes_end
= sym_hashes
+ symtab_hdr
->sh_size
/sizeof (Elf32_External_Sym
);
6185 if (!elf_bad_symtab (abfd
))
6186 sym_hashes_end
-= symtab_hdr
->sh_info
;
6188 htab
= sh_elf_hash_table (info
);
6189 local_got_offsets
= elf_local_got_offsets (abfd
);
6191 rel_end
= relocs
+ sec
->reloc_count
;
6192 for (rel
= relocs
; rel
< rel_end
; rel
++)
6194 struct elf_link_hash_entry
*h
;
6195 unsigned long r_symndx
;
6196 #ifdef INCLUDE_SHMEDIA
6197 int seen_stt_datalabel
= 0;
6200 r_symndx
= ELF32_R_SYM (rel
->r_info
);
6201 r_type
= ELF32_R_TYPE (rel
->r_info
);
6203 if (r_symndx
< symtab_hdr
->sh_info
)
6207 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
6208 while (h
->root
.type
== bfd_link_hash_indirect
6209 || h
->root
.type
== bfd_link_hash_warning
)
6211 #ifdef INCLUDE_SHMEDIA
6212 seen_stt_datalabel
|= h
->type
== STT_DATALABEL
;
6214 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
6218 r_type
= sh_elf_optimized_tls_reloc (info
, r_type
, h
== NULL
);
6220 && r_type
== R_SH_TLS_IE_32
6222 && h
->root
.type
!= bfd_link_hash_undefined
6223 && h
->root
.type
!= bfd_link_hash_undefweak
6224 && (h
->dynindx
== -1
6226 r_type
= R_SH_TLS_LE_32
;
6228 /* Some relocs require a global offset table. */
6229 if (htab
->sgot
== NULL
)
6237 #ifdef INCLUDE_SHMEDIA
6238 case R_SH_GOTPLT_LOW16
:
6239 case R_SH_GOTPLT_MEDLOW16
:
6240 case R_SH_GOTPLT_MEDHI16
:
6241 case R_SH_GOTPLT_HI16
:
6242 case R_SH_GOTPLT10BY4
:
6243 case R_SH_GOTPLT10BY8
:
6244 case R_SH_GOT_LOW16
:
6245 case R_SH_GOT_MEDLOW16
:
6246 case R_SH_GOT_MEDHI16
:
6250 case R_SH_GOTOFF_LOW16
:
6251 case R_SH_GOTOFF_MEDLOW16
:
6252 case R_SH_GOTOFF_MEDHI16
:
6253 case R_SH_GOTOFF_HI16
:
6254 case R_SH_GOTPC_LOW16
:
6255 case R_SH_GOTPC_MEDLOW16
:
6256 case R_SH_GOTPC_MEDHI16
:
6257 case R_SH_GOTPC_HI16
:
6259 case R_SH_TLS_GD_32
:
6260 case R_SH_TLS_LD_32
:
6261 case R_SH_TLS_IE_32
:
6262 if (htab
->sgot
== NULL
)
6264 if (htab
->root
.dynobj
== NULL
)
6265 htab
->root
.dynobj
= abfd
;
6266 if (!create_got_section (htab
->root
.dynobj
, info
))
6278 /* This relocation describes the C++ object vtable hierarchy.
6279 Reconstruct it for later use during GC. */
6280 case R_SH_GNU_VTINHERIT
:
6281 if (!bfd_elf_gc_record_vtinherit (abfd
, sec
, h
, rel
->r_offset
))
6285 /* This relocation describes which C++ vtable entries are actually
6286 used. Record for later use during GC. */
6287 case R_SH_GNU_VTENTRY
:
6288 if (!bfd_elf_gc_record_vtentry (abfd
, sec
, h
, rel
->r_addend
))
6292 case R_SH_TLS_IE_32
:
6294 info
->flags
|= DF_STATIC_TLS
;
6298 case R_SH_TLS_GD_32
:
6300 #ifdef INCLUDE_SHMEDIA
6301 case R_SH_GOT_LOW16
:
6302 case R_SH_GOT_MEDLOW16
:
6303 case R_SH_GOT_MEDHI16
:
6311 tls_type
= GOT_NORMAL
;
6313 case R_SH_TLS_GD_32
:
6314 tls_type
= GOT_TLS_GD
;
6316 case R_SH_TLS_IE_32
:
6317 tls_type
= GOT_TLS_IE
;
6323 #ifdef INCLUDE_SHMEDIA
6324 if (seen_stt_datalabel
)
6326 struct elf_sh_link_hash_entry
*eh
6327 = (struct elf_sh_link_hash_entry
*) h
;
6329 eh
->datalabel_got
.refcount
+= 1;
6333 h
->got
.refcount
+= 1;
6334 old_tls_type
= sh_elf_hash_entry (h
)->tls_type
;
6338 bfd_signed_vma
*local_got_refcounts
;
6340 /* This is a global offset table entry for a local
6342 local_got_refcounts
= elf_local_got_refcounts (abfd
);
6343 if (local_got_refcounts
== NULL
)
6347 size
= symtab_hdr
->sh_info
;
6348 size
*= sizeof (bfd_signed_vma
);
6349 #ifdef INCLUDE_SHMEDIA
6350 /* Reserve space for both the datalabel and
6351 codelabel local GOT offsets. */
6354 size
+= symtab_hdr
->sh_info
;
6355 local_got_refcounts
= ((bfd_signed_vma
*)
6356 bfd_zalloc (abfd
, size
));
6357 if (local_got_refcounts
== NULL
)
6359 elf_local_got_refcounts (abfd
) = local_got_refcounts
;
6360 #ifdef INCLUDE_SHMEDIA
6361 /* Take care of both the datalabel and codelabel local
6363 sh_elf_local_got_tls_type (abfd
)
6364 = (char *) (local_got_refcounts
+ 2 * symtab_hdr
->sh_info
);
6366 sh_elf_local_got_tls_type (abfd
)
6367 = (char *) (local_got_refcounts
+ symtab_hdr
->sh_info
);
6370 #ifdef INCLUDE_SHMEDIA
6371 if (rel
->r_addend
& 1)
6372 local_got_refcounts
[symtab_hdr
->sh_info
+ r_symndx
] += 1;
6375 local_got_refcounts
[r_symndx
] += 1;
6376 old_tls_type
= sh_elf_local_got_tls_type (abfd
) [r_symndx
];
6379 /* If a TLS symbol is accessed using IE at least once,
6380 there is no point to use dynamic model for it. */
6381 if (old_tls_type
!= tls_type
&& old_tls_type
!= GOT_UNKNOWN
6382 && (old_tls_type
!= GOT_TLS_GD
|| tls_type
!= GOT_TLS_IE
))
6384 if (old_tls_type
== GOT_TLS_IE
&& tls_type
== GOT_TLS_GD
)
6385 tls_type
= GOT_TLS_IE
;
6388 (*_bfd_error_handler
)
6389 (_("%B: `%s' accessed both as normal and thread local symbol"),
6390 abfd
, h
->root
.root
.string
);
6395 if (old_tls_type
!= tls_type
)
6398 sh_elf_hash_entry (h
)->tls_type
= tls_type
;
6400 sh_elf_local_got_tls_type (abfd
) [r_symndx
] = tls_type
;
6405 case R_SH_TLS_LD_32
:
6406 sh_elf_hash_table(info
)->tls_ldm_got
.refcount
+= 1;
6410 #ifdef INCLUDE_SHMEDIA
6411 case R_SH_GOTPLT_LOW16
:
6412 case R_SH_GOTPLT_MEDLOW16
:
6413 case R_SH_GOTPLT_MEDHI16
:
6414 case R_SH_GOTPLT_HI16
:
6415 case R_SH_GOTPLT10BY4
:
6416 case R_SH_GOTPLT10BY8
:
6418 /* If this is a local symbol, we resolve it directly without
6419 creating a procedure linkage table entry. */
6425 || h
->dynindx
== -1)
6429 h
->plt
.refcount
+= 1;
6430 ((struct elf_sh_link_hash_entry
*) h
)->gotplt_refcount
+= 1;
6435 #ifdef INCLUDE_SHMEDIA
6436 case R_SH_PLT_LOW16
:
6437 case R_SH_PLT_MEDLOW16
:
6438 case R_SH_PLT_MEDHI16
:
6441 /* This symbol requires a procedure linkage table entry. We
6442 actually build the entry in adjust_dynamic_symbol,
6443 because this might be a case of linking PIC code which is
6444 never referenced by a dynamic object, in which case we
6445 don't need to generate a procedure linkage table entry
6448 /* If this is a local symbol, we resolve it directly without
6449 creating a procedure linkage table entry. */
6453 if (h
->forced_local
)
6457 h
->plt
.refcount
+= 1;
6462 #ifdef INCLUDE_SHMEDIA
6463 case R_SH_IMM_LOW16_PCREL
:
6464 case R_SH_IMM_MEDLOW16_PCREL
:
6465 case R_SH_IMM_MEDHI16_PCREL
:
6466 case R_SH_IMM_HI16_PCREL
:
6468 if (h
!= NULL
&& ! info
->shared
)
6471 h
->plt
.refcount
+= 1;
6474 /* If we are creating a shared library, and this is a reloc
6475 against a global symbol, or a non PC relative reloc
6476 against a local symbol, then we need to copy the reloc
6477 into the shared library. However, if we are linking with
6478 -Bsymbolic, we do not need to copy a reloc against a
6479 global symbol which is defined in an object we are
6480 including in the link (i.e., DEF_REGULAR is set). At
6481 this point we have not seen all the input files, so it is
6482 possible that DEF_REGULAR is not set now but will be set
6483 later (it is never cleared). We account for that
6484 possibility below by storing information in the
6485 dyn_relocs field of the hash table entry. A similar
6486 situation occurs when creating shared libraries and symbol
6487 visibility changes render the symbol local.
6489 If on the other hand, we are creating an executable, we
6490 may need to keep relocations for symbols satisfied by a
6491 dynamic library if we manage to avoid copy relocs for the
6494 && (sec
->flags
& SEC_ALLOC
) != 0
6495 && (r_type
!= R_SH_REL32
6497 && (! info
->symbolic
6498 || h
->root
.type
== bfd_link_hash_defweak
6499 || !h
->def_regular
))))
6501 && (sec
->flags
& SEC_ALLOC
) != 0
6503 && (h
->root
.type
== bfd_link_hash_defweak
6504 || !h
->def_regular
)))
6506 struct elf_sh_dyn_relocs
*p
;
6507 struct elf_sh_dyn_relocs
**head
;
6509 if (htab
->root
.dynobj
== NULL
)
6510 htab
->root
.dynobj
= abfd
;
6512 /* When creating a shared object, we must copy these
6513 reloc types into the output file. We create a reloc
6514 section in dynobj and make room for this reloc. */
6519 name
= (bfd_elf_string_from_elf_section
6521 elf_elfheader (abfd
)->e_shstrndx
,
6522 elf_section_data (sec
)->rel_hdr
.sh_name
));
6526 BFD_ASSERT (strncmp (name
, ".rela", 5) == 0
6527 && strcmp (bfd_get_section_name (abfd
, sec
),
6530 sreloc
= bfd_get_section_by_name (htab
->root
.dynobj
, name
);
6535 flags
= (SEC_HAS_CONTENTS
| SEC_READONLY
6536 | SEC_IN_MEMORY
| SEC_LINKER_CREATED
);
6537 if ((sec
->flags
& SEC_ALLOC
) != 0)
6538 flags
|= SEC_ALLOC
| SEC_LOAD
;
6539 sreloc
= bfd_make_section_with_flags (htab
->root
.dynobj
,
6543 || ! bfd_set_section_alignment (htab
->root
.dynobj
,
6547 elf_section_data (sec
)->sreloc
= sreloc
;
6550 /* If this is a global symbol, we count the number of
6551 relocations we need for this symbol. */
6553 head
= &((struct elf_sh_link_hash_entry
*) h
)->dyn_relocs
;
6558 /* Track dynamic relocs needed for local syms too. */
6559 s
= bfd_section_from_r_symndx (abfd
, &htab
->sym_sec
,
6564 head
= ((struct elf_sh_dyn_relocs
**)
6565 &elf_section_data (s
)->local_dynrel
);
6569 if (p
== NULL
|| p
->sec
!= sec
)
6571 bfd_size_type amt
= sizeof (*p
);
6572 p
= bfd_alloc (htab
->root
.dynobj
, amt
);
6583 if (r_type
== R_SH_REL32
6584 #ifdef INCLUDE_SHMEDIA
6585 || r_type
== R_SH_IMM_LOW16_PCREL
6586 || r_type
== R_SH_IMM_MEDLOW16_PCREL
6587 || r_type
== R_SH_IMM_MEDHI16_PCREL
6588 || r_type
== R_SH_IMM_HI16_PCREL
6596 case R_SH_TLS_LE_32
:
6599 (*_bfd_error_handler
)
6600 (_("%B: TLS local exec code cannot be linked into shared objects"),
6607 case R_SH_TLS_LDO_32
:
6608 /* Nothing to do. */
6619 #ifndef sh_elf_set_mach_from_flags
6620 static unsigned int sh_ef_bfd_table
[] = { EF_SH_BFD_TABLE
};
6623 sh_elf_set_mach_from_flags (bfd
*abfd
)
6625 flagword flags
= elf_elfheader (abfd
)->e_flags
& EF_SH_MACH_MASK
;
6627 if (flags
>= sizeof(sh_ef_bfd_table
))
6630 if (sh_ef_bfd_table
[flags
] == 0)
6633 bfd_default_set_arch_mach (abfd
, bfd_arch_sh
, sh_ef_bfd_table
[flags
]);
6639 /* Reverse table lookup for sh_ef_bfd_table[].
6640 Given a bfd MACH value from archures.c
6641 return the equivalent ELF flags from the table.
6642 Return -1 if no match is found. */
6645 sh_elf_get_flags_from_mach (unsigned long mach
)
6647 int i
= ARRAY_SIZE (sh_ef_bfd_table
);
6650 if (sh_ef_bfd_table
[i
] == mach
)
6653 /* shouldn't get here */
6658 #endif /* not sh_elf_set_mach_from_flags */
6660 #ifndef sh_elf_set_private_flags
6661 /* Function to keep SH specific file flags. */
6664 sh_elf_set_private_flags (bfd
*abfd
, flagword flags
)
6666 BFD_ASSERT (! elf_flags_init (abfd
)
6667 || elf_elfheader (abfd
)->e_flags
== flags
);
6669 elf_elfheader (abfd
)->e_flags
= flags
;
6670 elf_flags_init (abfd
) = TRUE
;
6671 return sh_elf_set_mach_from_flags (abfd
);
6673 #endif /* not sh_elf_set_private_flags */
6675 #ifndef sh_elf_copy_private_data
6676 /* Copy backend specific data from one object module to another */
6679 sh_elf_copy_private_data (bfd
* ibfd
, bfd
* obfd
)
6681 if ( bfd_get_flavour (ibfd
) != bfd_target_elf_flavour
6682 || bfd_get_flavour (obfd
) != bfd_target_elf_flavour
)
6685 return sh_elf_set_private_flags (obfd
, elf_elfheader (ibfd
)->e_flags
);
6687 #endif /* not sh_elf_copy_private_data */
6689 #ifndef sh_elf_merge_private_data
6691 /* This function returns the ELF architecture number that
6692 corresponds to the given arch_sh* flags. */
6695 sh_find_elf_flags (unsigned int arch_set
)
6697 extern unsigned long sh_get_bfd_mach_from_arch_set (unsigned int);
6698 unsigned long bfd_mach
= sh_get_bfd_mach_from_arch_set (arch_set
);
6700 return sh_elf_get_flags_from_mach (bfd_mach
);
6703 /* This routine initialises the elf flags when required and
6704 calls sh_merge_bfd_arch() to check dsp/fpu compatibility. */
6707 sh_elf_merge_private_data (bfd
*ibfd
, bfd
*obfd
)
6709 extern bfd_boolean
sh_merge_bfd_arch (bfd
*, bfd
*);
6711 if ( bfd_get_flavour (ibfd
) != bfd_target_elf_flavour
6712 || bfd_get_flavour (obfd
) != bfd_target_elf_flavour
)
6715 if (! elf_flags_init (obfd
))
6717 /* This happens when ld starts out with a 'blank' output file. */
6718 elf_flags_init (obfd
) = TRUE
;
6719 elf_elfheader (obfd
)->e_flags
= EF_SH1
;
6720 sh_elf_set_mach_from_flags (obfd
);
6723 if (! sh_merge_bfd_arch (ibfd
, obfd
))
6725 _bfd_error_handler ("%B: uses instructions which are incompatible "
6726 "with instructions used in previous modules",
6728 bfd_set_error (bfd_error_bad_value
);
6732 elf_elfheader (obfd
)->e_flags
=
6733 sh_elf_get_flags_from_mach (bfd_get_mach (obfd
));
6737 #endif /* not sh_elf_merge_private_data */
6739 /* Override the generic function because we need to store sh_elf_obj_tdata
6740 as the specific tdata. We set also the machine architecture from flags
6744 sh_elf_object_p (bfd
*abfd
)
6746 return sh_elf_set_mach_from_flags (abfd
);
6749 /* Finish up dynamic symbol handling. We set the contents of various
6750 dynamic sections here. */
6753 sh_elf_finish_dynamic_symbol (bfd
*output_bfd
, struct bfd_link_info
*info
,
6754 struct elf_link_hash_entry
*h
,
6755 Elf_Internal_Sym
*sym
)
6757 struct elf_sh_link_hash_table
*htab
;
6759 htab
= sh_elf_hash_table (info
);
6761 if (h
->plt
.offset
!= (bfd_vma
) -1)
6769 Elf_Internal_Rela rel
;
6772 /* This symbol has an entry in the procedure linkage table. Set
6775 BFD_ASSERT (h
->dynindx
!= -1);
6778 sgot
= htab
->sgotplt
;
6779 srel
= htab
->srelplt
;
6780 BFD_ASSERT (splt
!= NULL
&& sgot
!= NULL
&& srel
!= NULL
);
6782 /* Get the index in the procedure linkage table which
6783 corresponds to this symbol. This is the index of this symbol
6784 in all the symbols for which we are making plt entries. The
6785 first entry in the procedure linkage table is reserved. */
6786 plt_index
= h
->plt
.offset
/ elf_sh_sizeof_plt (info
) - 1;
6788 /* Get the offset into the .got table of the entry that
6789 corresponds to this function. Each .got entry is 4 bytes.
6790 The first three are reserved. */
6791 got_offset
= (plt_index
+ 3) * 4;
6795 got_offset
-= GOT_BIAS
;
6798 /* Fill in the entry in the procedure linkage table. */
6801 if (elf_sh_plt_entry
== NULL
)
6803 elf_sh_plt_entry
= (bfd_big_endian (output_bfd
) ?
6804 elf_sh_plt_entry_be
: elf_sh_plt_entry_le
);
6806 memcpy (splt
->contents
+ h
->plt
.offset
, elf_sh_plt_entry
,
6807 elf_sh_sizeof_plt (info
));
6808 #ifdef INCLUDE_SHMEDIA
6809 movi_shori_putval (output_bfd
,
6810 (sgot
->output_section
->vma
6811 + sgot
->output_offset
6813 (splt
->contents
+ h
->plt
.offset
6814 + elf_sh_plt_symbol_offset (info
)));
6816 /* Set bottom bit because its for a branch to SHmedia */
6817 movi_shori_putval (output_bfd
,
6818 (splt
->output_section
->vma
+ splt
->output_offset
)
6820 (splt
->contents
+ h
->plt
.offset
6821 + elf_sh_plt_plt0_offset (info
)));
6823 bfd_put_32 (output_bfd
,
6824 (sgot
->output_section
->vma
6825 + sgot
->output_offset
6827 (splt
->contents
+ h
->plt
.offset
6828 + elf_sh_plt_symbol_offset (info
)));
6830 bfd_put_32 (output_bfd
,
6831 (splt
->output_section
->vma
+ splt
->output_offset
),
6832 (splt
->contents
+ h
->plt
.offset
6833 + elf_sh_plt_plt0_offset (info
)));
6838 if (elf_sh_pic_plt_entry
== NULL
)
6840 elf_sh_pic_plt_entry
= (bfd_big_endian (output_bfd
) ?
6841 elf_sh_pic_plt_entry_be
:
6842 elf_sh_pic_plt_entry_le
);
6844 memcpy (splt
->contents
+ h
->plt
.offset
, elf_sh_pic_plt_entry
,
6845 elf_sh_sizeof_plt (info
));
6846 #ifdef INCLUDE_SHMEDIA
6847 movi_shori_putval (output_bfd
, got_offset
,
6848 (splt
->contents
+ h
->plt
.offset
6849 + elf_sh_plt_symbol_offset (info
)));
6851 bfd_put_32 (output_bfd
, got_offset
,
6852 (splt
->contents
+ h
->plt
.offset
6853 + elf_sh_plt_symbol_offset (info
)));
6859 got_offset
+= GOT_BIAS
;
6862 #ifdef INCLUDE_SHMEDIA
6863 movi_shori_putval (output_bfd
,
6864 plt_index
* sizeof (Elf32_External_Rela
),
6865 (splt
->contents
+ h
->plt
.offset
6866 + elf_sh_plt_reloc_offset (info
)));
6868 bfd_put_32 (output_bfd
, plt_index
* sizeof (Elf32_External_Rela
),
6869 (splt
->contents
+ h
->plt
.offset
6870 + elf_sh_plt_reloc_offset (info
)));
6873 /* Fill in the entry in the global offset table. */
6874 bfd_put_32 (output_bfd
,
6875 (splt
->output_section
->vma
6876 + splt
->output_offset
6878 + elf_sh_plt_temp_offset (info
)),
6879 sgot
->contents
+ got_offset
);
6881 /* Fill in the entry in the .rela.plt section. */
6882 rel
.r_offset
= (sgot
->output_section
->vma
6883 + sgot
->output_offset
6885 rel
.r_info
= ELF32_R_INFO (h
->dynindx
, R_SH_JMP_SLOT
);
6888 rel
.r_addend
= GOT_BIAS
;
6890 loc
= srel
->contents
+ plt_index
* sizeof (Elf32_External_Rela
);
6891 bfd_elf32_swap_reloca_out (output_bfd
, &rel
, loc
);
6893 if (!h
->def_regular
)
6895 /* Mark the symbol as undefined, rather than as defined in
6896 the .plt section. Leave the value alone. */
6897 sym
->st_shndx
= SHN_UNDEF
;
6901 if (h
->got
.offset
!= (bfd_vma
) -1
6902 && sh_elf_hash_entry (h
)->tls_type
!= GOT_TLS_GD
6903 && sh_elf_hash_entry (h
)->tls_type
!= GOT_TLS_IE
)
6907 Elf_Internal_Rela rel
;
6910 /* This symbol has an entry in the global offset table. Set it
6914 srel
= htab
->srelgot
;
6915 BFD_ASSERT (sgot
!= NULL
&& srel
!= NULL
);
6917 rel
.r_offset
= (sgot
->output_section
->vma
6918 + sgot
->output_offset
6919 + (h
->got
.offset
&~ (bfd_vma
) 1));
6921 /* If this is a static link, or it is a -Bsymbolic link and the
6922 symbol is defined locally or was forced to be local because
6923 of a version file, we just want to emit a RELATIVE reloc.
6924 The entry in the global offset table will already have been
6925 initialized in the relocate_section function. */
6927 && SYMBOL_REFERENCES_LOCAL (info
, h
))
6929 rel
.r_info
= ELF32_R_INFO (0, R_SH_RELATIVE
);
6930 rel
.r_addend
= (h
->root
.u
.def
.value
6931 + h
->root
.u
.def
.section
->output_section
->vma
6932 + h
->root
.u
.def
.section
->output_offset
);
6936 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ h
->got
.offset
);
6937 rel
.r_info
= ELF32_R_INFO (h
->dynindx
, R_SH_GLOB_DAT
);
6941 loc
= srel
->contents
;
6942 loc
+= srel
->reloc_count
++ * sizeof (Elf32_External_Rela
);
6943 bfd_elf32_swap_reloca_out (output_bfd
, &rel
, loc
);
6946 #ifdef INCLUDE_SHMEDIA
6948 struct elf_sh_link_hash_entry
*eh
;
6950 eh
= (struct elf_sh_link_hash_entry
*) h
;
6951 if (eh
->datalabel_got
.offset
!= (bfd_vma
) -1)
6955 Elf_Internal_Rela rel
;
6958 /* This symbol has a datalabel entry in the global offset table.
6962 srel
= htab
->srelgot
;
6963 BFD_ASSERT (sgot
!= NULL
&& srel
!= NULL
);
6965 rel
.r_offset
= (sgot
->output_section
->vma
6966 + sgot
->output_offset
6967 + (eh
->datalabel_got
.offset
&~ (bfd_vma
) 1));
6969 /* If this is a static link, or it is a -Bsymbolic link and the
6970 symbol is defined locally or was forced to be local because
6971 of a version file, we just want to emit a RELATIVE reloc.
6972 The entry in the global offset table will already have been
6973 initialized in the relocate_section function. */
6975 && SYMBOL_REFERENCES_LOCAL (info
, h
))
6977 rel
.r_info
= ELF32_R_INFO (0, R_SH_RELATIVE
);
6978 rel
.r_addend
= (h
->root
.u
.def
.value
6979 + h
->root
.u
.def
.section
->output_section
->vma
6980 + h
->root
.u
.def
.section
->output_offset
);
6984 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
6985 + eh
->datalabel_got
.offset
);
6986 rel
.r_info
= ELF32_R_INFO (h
->dynindx
, R_SH_GLOB_DAT
);
6990 loc
= srel
->contents
;
6991 loc
+= srel
->reloc_count
++ * sizeof (Elf32_External_Rela
);
6992 bfd_elf32_swap_reloca_out (output_bfd
, &rel
, loc
);
7000 Elf_Internal_Rela rel
;
7003 /* This symbol needs a copy reloc. Set it up. */
7005 BFD_ASSERT (h
->dynindx
!= -1
7006 && (h
->root
.type
== bfd_link_hash_defined
7007 || h
->root
.type
== bfd_link_hash_defweak
));
7009 s
= bfd_get_section_by_name (h
->root
.u
.def
.section
->owner
,
7011 BFD_ASSERT (s
!= NULL
);
7013 rel
.r_offset
= (h
->root
.u
.def
.value
7014 + h
->root
.u
.def
.section
->output_section
->vma
7015 + h
->root
.u
.def
.section
->output_offset
);
7016 rel
.r_info
= ELF32_R_INFO (h
->dynindx
, R_SH_COPY
);
7018 loc
= s
->contents
+ s
->reloc_count
++ * sizeof (Elf32_External_Rela
);
7019 bfd_elf32_swap_reloca_out (output_bfd
, &rel
, loc
);
7022 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
7023 if (strcmp (h
->root
.root
.string
, "_DYNAMIC") == 0
7024 || strcmp (h
->root
.root
.string
, "_GLOBAL_OFFSET_TABLE_") == 0)
7025 sym
->st_shndx
= SHN_ABS
;
7030 /* Finish up the dynamic sections. */
7033 sh_elf_finish_dynamic_sections (bfd
*output_bfd
, struct bfd_link_info
*info
)
7035 struct elf_sh_link_hash_table
*htab
;
7039 htab
= sh_elf_hash_table (info
);
7040 sgot
= htab
->sgotplt
;
7041 sdyn
= bfd_get_section_by_name (htab
->root
.dynobj
, ".dynamic");
7043 if (htab
->root
.dynamic_sections_created
)
7046 Elf32_External_Dyn
*dyncon
, *dynconend
;
7048 BFD_ASSERT (sgot
!= NULL
&& sdyn
!= NULL
);
7050 dyncon
= (Elf32_External_Dyn
*) sdyn
->contents
;
7051 dynconend
= (Elf32_External_Dyn
*) (sdyn
->contents
+ sdyn
->size
);
7052 for (; dyncon
< dynconend
; dyncon
++)
7054 Elf_Internal_Dyn dyn
;
7056 #ifdef INCLUDE_SHMEDIA
7060 bfd_elf32_swap_dyn_in (htab
->root
.dynobj
, dyncon
, &dyn
);
7067 #ifdef INCLUDE_SHMEDIA
7069 name
= info
->init_function
;
7073 name
= info
->fini_function
;
7075 if (dyn
.d_un
.d_val
!= 0)
7077 struct elf_link_hash_entry
*h
;
7079 h
= elf_link_hash_lookup (&htab
->root
, name
,
7080 FALSE
, FALSE
, TRUE
);
7081 if (h
!= NULL
&& (h
->other
& STO_SH5_ISA32
))
7083 dyn
.d_un
.d_val
|= 1;
7084 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
7091 s
= htab
->sgot
->output_section
;
7095 s
= htab
->srelplt
->output_section
;
7097 BFD_ASSERT (s
!= NULL
);
7098 dyn
.d_un
.d_ptr
= s
->vma
;
7099 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
7103 s
= htab
->srelplt
->output_section
;
7104 BFD_ASSERT (s
!= NULL
);
7105 dyn
.d_un
.d_val
= s
->size
;
7106 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
7110 /* My reading of the SVR4 ABI indicates that the
7111 procedure linkage table relocs (DT_JMPREL) should be
7112 included in the overall relocs (DT_RELA). This is
7113 what Solaris does. However, UnixWare can not handle
7114 that case. Therefore, we override the DT_RELASZ entry
7115 here to make it not include the JMPREL relocs. Since
7116 the linker script arranges for .rela.plt to follow all
7117 other relocation sections, we don't have to worry
7118 about changing the DT_RELA entry. */
7119 if (htab
->srelplt
!= NULL
)
7121 s
= htab
->srelplt
->output_section
;
7122 dyn
.d_un
.d_val
-= s
->size
;
7124 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
7129 /* Fill in the first entry in the procedure linkage table. */
7131 if (splt
&& splt
->size
> 0)
7135 if (elf_sh_pic_plt_entry
== NULL
)
7137 elf_sh_pic_plt_entry
= (bfd_big_endian (output_bfd
) ?
7138 elf_sh_pic_plt_entry_be
:
7139 elf_sh_pic_plt_entry_le
);
7141 memcpy (splt
->contents
, elf_sh_pic_plt_entry
,
7142 elf_sh_sizeof_plt (info
));
7146 if (elf_sh_plt0_entry
== NULL
)
7148 elf_sh_plt0_entry
= (bfd_big_endian (output_bfd
) ?
7149 elf_sh_plt0_entry_be
:
7150 elf_sh_plt0_entry_le
);
7152 memcpy (splt
->contents
, elf_sh_plt0_entry
, PLT_ENTRY_SIZE
);
7153 #ifdef INCLUDE_SHMEDIA
7154 movi_shori_putval (output_bfd
,
7155 sgot
->output_section
->vma
7156 + sgot
->output_offset
,
7158 + elf_sh_plt0_gotplt_offset (info
));
7160 bfd_put_32 (output_bfd
,
7161 sgot
->output_section
->vma
+ sgot
->output_offset
+ 4,
7162 splt
->contents
+ elf_sh_plt0_gotid_offset (info
));
7163 bfd_put_32 (output_bfd
,
7164 sgot
->output_section
->vma
+ sgot
->output_offset
+ 8,
7165 splt
->contents
+ elf_sh_plt0_linker_offset (info
));
7169 /* UnixWare sets the entsize of .plt to 4, although that doesn't
7170 really seem like the right value. */
7171 elf_section_data (splt
->output_section
)->this_hdr
.sh_entsize
= 4;
7175 /* Fill in the first three entries in the global offset table. */
7176 if (sgot
&& sgot
->size
> 0)
7179 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
);
7181 bfd_put_32 (output_bfd
,
7182 sdyn
->output_section
->vma
+ sdyn
->output_offset
,
7184 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ 4);
7185 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ 8);
7187 elf_section_data (sgot
->output_section
)->this_hdr
.sh_entsize
= 4;
7193 static enum elf_reloc_type_class
7194 sh_elf_reloc_type_class (const Elf_Internal_Rela
*rela
)
7196 switch ((int) ELF32_R_TYPE (rela
->r_info
))
7199 return reloc_class_relative
;
7201 return reloc_class_plt
;
7203 return reloc_class_copy
;
7205 return reloc_class_normal
;
7209 #if !defined SH_TARGET_ALREADY_DEFINED
7210 /* Support for Linux core dump NOTE sections. */
7213 elf32_shlin_grok_prstatus (bfd
*abfd
, Elf_Internal_Note
*note
)
7218 switch (note
->descsz
)
7223 case 168: /* Linux/SH */
7225 elf_tdata (abfd
)->core_signal
= bfd_get_16 (abfd
, note
->descdata
+ 12);
7228 elf_tdata (abfd
)->core_pid
= bfd_get_32 (abfd
, note
->descdata
+ 24);
7237 /* Make a ".reg/999" section. */
7238 return _bfd_elfcore_make_pseudosection (abfd
, ".reg",
7239 size
, note
->descpos
+ offset
);
7243 elf32_shlin_grok_psinfo (bfd
*abfd
, Elf_Internal_Note
*note
)
7245 switch (note
->descsz
)
7250 case 124: /* Linux/SH elf_prpsinfo */
7251 elf_tdata (abfd
)->core_program
7252 = _bfd_elfcore_strndup (abfd
, note
->descdata
+ 28, 16);
7253 elf_tdata (abfd
)->core_command
7254 = _bfd_elfcore_strndup (abfd
, note
->descdata
+ 44, 80);
7257 /* Note that for some reason, a spurious space is tacked
7258 onto the end of the args in some (at least one anyway)
7259 implementations, so strip it off if it exists. */
7262 char *command
= elf_tdata (abfd
)->core_command
;
7263 int n
= strlen (command
);
7265 if (0 < n
&& command
[n
- 1] == ' ')
7266 command
[n
- 1] = '\0';
7271 #endif /* not SH_TARGET_ALREADY_DEFINED */
7274 /* Return address for Ith PLT stub in section PLT, for relocation REL
7275 or (bfd_vma) -1 if it should not be included. */
7278 sh_elf_plt_sym_val (bfd_vma i
, const asection
*plt
,
7279 const arelent
*rel ATTRIBUTE_UNUSED
)
7281 return plt
->vma
+ (i
+ 1) * PLT_ENTRY_SIZE
;
7284 #if !defined SH_TARGET_ALREADY_DEFINED
7285 #define TARGET_BIG_SYM bfd_elf32_sh_vec
7286 #define TARGET_BIG_NAME "elf32-sh"
7287 #define TARGET_LITTLE_SYM bfd_elf32_shl_vec
7288 #define TARGET_LITTLE_NAME "elf32-shl"
7291 #define ELF_ARCH bfd_arch_sh
7292 #define ELF_MACHINE_CODE EM_SH
7293 #ifdef __QNXTARGET__
7294 #define ELF_MAXPAGESIZE 0x1000
7296 #define ELF_MAXPAGESIZE 0x80
7299 #define elf_symbol_leading_char '_'
7301 #define bfd_elf32_bfd_reloc_type_lookup sh_elf_reloc_type_lookup
7302 #define elf_info_to_howto sh_elf_info_to_howto
7303 #define bfd_elf32_bfd_relax_section sh_elf_relax_section
7304 #define elf_backend_relocate_section sh_elf_relocate_section
7305 #define bfd_elf32_bfd_get_relocated_section_contents \
7306 sh_elf_get_relocated_section_contents
7307 #define bfd_elf32_mkobject sh_elf_mkobject
7308 #define elf_backend_object_p sh_elf_object_p
7309 #define bfd_elf32_bfd_set_private_bfd_flags \
7310 sh_elf_set_private_flags
7311 #define bfd_elf32_bfd_copy_private_bfd_data \
7312 sh_elf_copy_private_data
7313 #define bfd_elf32_bfd_merge_private_bfd_data \
7314 sh_elf_merge_private_data
7316 #define elf_backend_gc_mark_hook sh_elf_gc_mark_hook
7317 #define elf_backend_gc_sweep_hook sh_elf_gc_sweep_hook
7318 #define elf_backend_check_relocs sh_elf_check_relocs
7319 #define elf_backend_copy_indirect_symbol \
7320 sh_elf_copy_indirect_symbol
7321 #define elf_backend_create_dynamic_sections \
7322 sh_elf_create_dynamic_sections
7323 #define bfd_elf32_bfd_link_hash_table_create \
7324 sh_elf_link_hash_table_create
7325 #define elf_backend_adjust_dynamic_symbol \
7326 sh_elf_adjust_dynamic_symbol
7327 #define elf_backend_size_dynamic_sections \
7328 sh_elf_size_dynamic_sections
7329 #define elf_backend_finish_dynamic_symbol \
7330 sh_elf_finish_dynamic_symbol
7331 #define elf_backend_finish_dynamic_sections \
7332 sh_elf_finish_dynamic_sections
7333 #define elf_backend_reloc_type_class sh_elf_reloc_type_class
7334 #define elf_backend_plt_sym_val sh_elf_plt_sym_val
7336 #define elf_backend_can_gc_sections 1
7337 #define elf_backend_can_refcount 1
7338 #define elf_backend_want_got_plt 1
7339 #define elf_backend_plt_readonly 1
7340 #define elf_backend_want_plt_sym 0
7341 #define elf_backend_got_header_size 12
7343 #if !defined INCLUDE_SHMEDIA && !defined SH_TARGET_ALREADY_DEFINED
7345 #include "elf32-target.h"
7347 /* NetBSD support. */
7348 #undef TARGET_BIG_SYM
7349 #define TARGET_BIG_SYM bfd_elf32_shnbsd_vec
7350 #undef TARGET_BIG_NAME
7351 #define TARGET_BIG_NAME "elf32-sh-nbsd"
7352 #undef TARGET_LITTLE_SYM
7353 #define TARGET_LITTLE_SYM bfd_elf32_shlnbsd_vec
7354 #undef TARGET_LITTLE_NAME
7355 #define TARGET_LITTLE_NAME "elf32-shl-nbsd"
7356 #undef ELF_MAXPAGESIZE
7357 #define ELF_MAXPAGESIZE 0x10000
7358 #undef elf_symbol_leading_char
7359 #define elf_symbol_leading_char 0
7361 #define elf32_bed elf32_sh_nbsd_bed
7363 #include "elf32-target.h"
7366 /* Linux support. */
7367 #undef TARGET_BIG_SYM
7368 #define TARGET_BIG_SYM bfd_elf32_shblin_vec
7369 #undef TARGET_BIG_NAME
7370 #define TARGET_BIG_NAME "elf32-shbig-linux"
7371 #undef TARGET_LITTLE_SYM
7372 #define TARGET_LITTLE_SYM bfd_elf32_shlin_vec
7373 #undef TARGET_LITTLE_NAME
7374 #define TARGET_LITTLE_NAME "elf32-sh-linux"
7376 #undef elf_backend_grok_prstatus
7377 #define elf_backend_grok_prstatus elf32_shlin_grok_prstatus
7378 #undef elf_backend_grok_psinfo
7379 #define elf_backend_grok_psinfo elf32_shlin_grok_psinfo
7381 #define elf32_bed elf32_sh_lin_bed
7383 #include "elf32-target.h"
7385 #endif /* neither INCLUDE_SHMEDIA nor SH_TARGET_ALREADY_DEFINED */