PPC error/warning messages
[deliverable/binutils-gdb.git] / bfd / elfnn-riscv.c
CommitLineData
e23eba97 1/* RISC-V-specific support for NN-bit ELF.
219d1afa 2 Copyright (C) 2011-2018 Free Software Foundation, Inc.
e23eba97
NC
3
4 Contributed by Andrew Waterman (andrew@sifive.com).
5 Based on TILE-Gx and MIPS targets.
6
7 This file is part of BFD, the Binary File Descriptor library.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
20 along with this program; see the file COPYING3. If not,
21 see <http://www.gnu.org/licenses/>. */
22
23/* This file handles RISC-V ELF targets. */
24
25#include "sysdep.h"
26#include "bfd.h"
27#include "libbfd.h"
28#include "bfdlink.h"
29#include "genlink.h"
30#include "elf-bfd.h"
31#include "elfxx-riscv.h"
32#include "elf/riscv.h"
33#include "opcode/riscv.h"
34
ff6f4d9b
PD
35/* Internal relocations used exclusively by the relaxation pass. */
36#define R_RISCV_DELETE (R_RISCV_max + 1)
37
e23eba97
NC
38#define ARCH_SIZE NN
39
40#define MINUS_ONE ((bfd_vma)0 - 1)
41
42#define RISCV_ELF_LOG_WORD_BYTES (ARCH_SIZE == 32 ? 2 : 3)
43
44#define RISCV_ELF_WORD_BYTES (1 << RISCV_ELF_LOG_WORD_BYTES)
45
46/* The name of the dynamic interpreter. This is put in the .interp
47 section. */
48
49#define ELF64_DYNAMIC_INTERPRETER "/lib/ld.so.1"
50#define ELF32_DYNAMIC_INTERPRETER "/lib32/ld.so.1"
51
52#define ELF_ARCH bfd_arch_riscv
53#define ELF_TARGET_ID RISCV_ELF_DATA
54#define ELF_MACHINE_CODE EM_RISCV
55#define ELF_MAXPAGESIZE 0x1000
56#define ELF_COMMONPAGESIZE 0x1000
57
e23eba97
NC
58/* RISC-V ELF linker hash entry. */
59
60struct riscv_elf_link_hash_entry
61{
62 struct elf_link_hash_entry elf;
63
64 /* Track dynamic relocs copied for this symbol. */
3bf083ed 65 struct elf_dyn_relocs *dyn_relocs;
e23eba97
NC
66
67#define GOT_UNKNOWN 0
68#define GOT_NORMAL 1
69#define GOT_TLS_GD 2
70#define GOT_TLS_IE 4
71#define GOT_TLS_LE 8
72 char tls_type;
73};
74
75#define riscv_elf_hash_entry(ent) \
76 ((struct riscv_elf_link_hash_entry *)(ent))
77
78struct _bfd_riscv_elf_obj_tdata
79{
80 struct elf_obj_tdata root;
81
82 /* tls_type for each local got entry. */
83 char *local_got_tls_type;
84};
85
86#define _bfd_riscv_elf_tdata(abfd) \
87 ((struct _bfd_riscv_elf_obj_tdata *) (abfd)->tdata.any)
88
89#define _bfd_riscv_elf_local_got_tls_type(abfd) \
90 (_bfd_riscv_elf_tdata (abfd)->local_got_tls_type)
91
92#define _bfd_riscv_elf_tls_type(abfd, h, symndx) \
93 (*((h) != NULL ? &riscv_elf_hash_entry (h)->tls_type \
94 : &_bfd_riscv_elf_local_got_tls_type (abfd) [symndx]))
95
96#define is_riscv_elf(bfd) \
97 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
98 && elf_tdata (bfd) != NULL \
99 && elf_object_id (bfd) == RISCV_ELF_DATA)
100
101#include "elf/common.h"
102#include "elf/internal.h"
103
104struct riscv_elf_link_hash_table
105{
106 struct elf_link_hash_table elf;
107
108 /* Short-cuts to get to dynamic linker sections. */
e23eba97
NC
109 asection *sdyntdata;
110
111 /* Small local sym to section mapping cache. */
112 struct sym_cache sym_cache;
fc3c5343
L
113
114 /* The max alignment of output sections. */
115 bfd_vma max_alignment;
e23eba97
NC
116};
117
118
119/* Get the RISC-V ELF linker hash table from a link_info structure. */
120#define riscv_elf_hash_table(p) \
121 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
122 == RISCV_ELF_DATA ? ((struct riscv_elf_link_hash_table *) ((p)->hash)) : NULL)
123
124static void
125riscv_info_to_howto_rela (bfd *abfd ATTRIBUTE_UNUSED,
126 arelent *cache_ptr,
127 Elf_Internal_Rela *dst)
128{
129 cache_ptr->howto = riscv_elf_rtype_to_howto (ELFNN_R_TYPE (dst->r_info));
130}
131
132static void
133riscv_elf_append_rela (bfd *abfd, asection *s, Elf_Internal_Rela *rel)
134{
135 const struct elf_backend_data *bed;
136 bfd_byte *loc;
137
138 bed = get_elf_backend_data (abfd);
139 loc = s->contents + (s->reloc_count++ * bed->s->sizeof_rela);
140 bed->s->swap_reloca_out (abfd, rel, loc);
141}
142
143/* PLT/GOT stuff. */
144
145#define PLT_HEADER_INSNS 8
146#define PLT_ENTRY_INSNS 4
147#define PLT_HEADER_SIZE (PLT_HEADER_INSNS * 4)
148#define PLT_ENTRY_SIZE (PLT_ENTRY_INSNS * 4)
149
150#define GOT_ENTRY_SIZE RISCV_ELF_WORD_BYTES
151
152#define GOTPLT_HEADER_SIZE (2 * GOT_ENTRY_SIZE)
153
154#define sec_addr(sec) ((sec)->output_section->vma + (sec)->output_offset)
155
156static bfd_vma
157riscv_elf_got_plt_val (bfd_vma plt_index, struct bfd_link_info *info)
158{
159 return sec_addr (riscv_elf_hash_table (info)->elf.sgotplt)
160 + GOTPLT_HEADER_SIZE + (plt_index * GOT_ENTRY_SIZE);
161}
162
163#if ARCH_SIZE == 32
164# define MATCH_LREG MATCH_LW
165#else
166# define MATCH_LREG MATCH_LD
167#endif
168
169/* Generate a PLT header. */
170
171static void
172riscv_make_plt_header (bfd_vma gotplt_addr, bfd_vma addr, uint32_t *entry)
173{
174 bfd_vma gotplt_offset_high = RISCV_PCREL_HIGH_PART (gotplt_addr, addr);
175 bfd_vma gotplt_offset_low = RISCV_PCREL_LOW_PART (gotplt_addr, addr);
176
177 /* auipc t2, %hi(.got.plt)
07d6d2b8 178 sub t1, t1, t3 # shifted .got.plt offset + hdr size + 12
e23eba97
NC
179 l[w|d] t3, %lo(.got.plt)(t2) # _dl_runtime_resolve
180 addi t1, t1, -(hdr size + 12) # shifted .got.plt offset
181 addi t0, t2, %lo(.got.plt) # &.got.plt
182 srli t1, t1, log2(16/PTRSIZE) # .got.plt offset
07d6d2b8
AM
183 l[w|d] t0, PTRSIZE(t0) # link map
184 jr t3 */
e23eba97
NC
185
186 entry[0] = RISCV_UTYPE (AUIPC, X_T2, gotplt_offset_high);
187 entry[1] = RISCV_RTYPE (SUB, X_T1, X_T1, X_T3);
188 entry[2] = RISCV_ITYPE (LREG, X_T3, X_T2, gotplt_offset_low);
189 entry[3] = RISCV_ITYPE (ADDI, X_T1, X_T1, -(PLT_HEADER_SIZE + 12));
190 entry[4] = RISCV_ITYPE (ADDI, X_T0, X_T2, gotplt_offset_low);
191 entry[5] = RISCV_ITYPE (SRLI, X_T1, X_T1, 4 - RISCV_ELF_LOG_WORD_BYTES);
192 entry[6] = RISCV_ITYPE (LREG, X_T0, X_T0, RISCV_ELF_WORD_BYTES);
193 entry[7] = RISCV_ITYPE (JALR, 0, X_T3, 0);
194}
195
196/* Generate a PLT entry. */
197
198static void
199riscv_make_plt_entry (bfd_vma got, bfd_vma addr, uint32_t *entry)
200{
201 /* auipc t3, %hi(.got.plt entry)
202 l[w|d] t3, %lo(.got.plt entry)(t3)
203 jalr t1, t3
204 nop */
205
206 entry[0] = RISCV_UTYPE (AUIPC, X_T3, RISCV_PCREL_HIGH_PART (got, addr));
1d65abb5 207 entry[1] = RISCV_ITYPE (LREG, X_T3, X_T3, RISCV_PCREL_LOW_PART (got, addr));
e23eba97
NC
208 entry[2] = RISCV_ITYPE (JALR, X_T1, X_T3, 0);
209 entry[3] = RISCV_NOP;
210}
211
212/* Create an entry in an RISC-V ELF linker hash table. */
213
214static struct bfd_hash_entry *
215link_hash_newfunc (struct bfd_hash_entry *entry,
216 struct bfd_hash_table *table, const char *string)
217{
218 /* Allocate the structure if it has not already been allocated by a
219 subclass. */
220 if (entry == NULL)
221 {
222 entry =
223 bfd_hash_allocate (table,
224 sizeof (struct riscv_elf_link_hash_entry));
225 if (entry == NULL)
226 return entry;
227 }
228
229 /* Call the allocation method of the superclass. */
230 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
231 if (entry != NULL)
232 {
233 struct riscv_elf_link_hash_entry *eh;
234
235 eh = (struct riscv_elf_link_hash_entry *) entry;
236 eh->dyn_relocs = NULL;
237 eh->tls_type = GOT_UNKNOWN;
238 }
239
240 return entry;
241}
242
243/* Create a RISC-V ELF linker hash table. */
244
245static struct bfd_link_hash_table *
246riscv_elf_link_hash_table_create (bfd *abfd)
247{
248 struct riscv_elf_link_hash_table *ret;
249 bfd_size_type amt = sizeof (struct riscv_elf_link_hash_table);
250
251 ret = (struct riscv_elf_link_hash_table *) bfd_zmalloc (amt);
252 if (ret == NULL)
253 return NULL;
254
255 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, link_hash_newfunc,
256 sizeof (struct riscv_elf_link_hash_entry),
257 RISCV_ELF_DATA))
258 {
259 free (ret);
260 return NULL;
261 }
262
fc3c5343 263 ret->max_alignment = (bfd_vma) -1;
e23eba97
NC
264 return &ret->elf.root;
265}
266
267/* Create the .got section. */
268
269static bfd_boolean
270riscv_elf_create_got_section (bfd *abfd, struct bfd_link_info *info)
271{
272 flagword flags;
273 asection *s, *s_got;
274 struct elf_link_hash_entry *h;
275 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
276 struct elf_link_hash_table *htab = elf_hash_table (info);
277
278 /* This function may be called more than once. */
ce558b89 279 if (htab->sgot != NULL)
e23eba97
NC
280 return TRUE;
281
282 flags = bed->dynamic_sec_flags;
283
284 s = bfd_make_section_anyway_with_flags (abfd,
285 (bed->rela_plts_and_copies_p
286 ? ".rela.got" : ".rel.got"),
287 (bed->dynamic_sec_flags
288 | SEC_READONLY));
289 if (s == NULL
290 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
291 return FALSE;
292 htab->srelgot = s;
293
294 s = s_got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
295 if (s == NULL
296 || !bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
297 return FALSE;
298 htab->sgot = s;
299
300 /* The first bit of the global offset table is the header. */
301 s->size += bed->got_header_size;
302
303 if (bed->want_got_plt)
304 {
305 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
306 if (s == NULL
307 || !bfd_set_section_alignment (abfd, s,
308 bed->s->log_file_align))
309 return FALSE;
310 htab->sgotplt = s;
311
312 /* Reserve room for the header. */
313 s->size += GOTPLT_HEADER_SIZE;
314 }
315
316 if (bed->want_got_sym)
317 {
318 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the .got
319 section. We don't do this in the linker script because we don't want
320 to define the symbol if we are not creating a global offset
321 table. */
322 h = _bfd_elf_define_linkage_sym (abfd, info, s_got,
323 "_GLOBAL_OFFSET_TABLE_");
324 elf_hash_table (info)->hgot = h;
325 if (h == NULL)
326 return FALSE;
327 }
328
329 return TRUE;
330}
331
332/* Create .plt, .rela.plt, .got, .got.plt, .rela.got, .dynbss, and
333 .rela.bss sections in DYNOBJ, and set up shortcuts to them in our
334 hash table. */
335
336static bfd_boolean
337riscv_elf_create_dynamic_sections (bfd *dynobj,
338 struct bfd_link_info *info)
339{
340 struct riscv_elf_link_hash_table *htab;
341
342 htab = riscv_elf_hash_table (info);
343 BFD_ASSERT (htab != NULL);
344
345 if (!riscv_elf_create_got_section (dynobj, info))
346 return FALSE;
347
348 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
349 return FALSE;
350
e23eba97
NC
351 if (!bfd_link_pic (info))
352 {
e23eba97
NC
353 htab->sdyntdata =
354 bfd_make_section_anyway_with_flags (dynobj, ".tdata.dyn",
355 SEC_ALLOC | SEC_THREAD_LOCAL);
356 }
357
9d19e4fd
AM
358 if (!htab->elf.splt || !htab->elf.srelplt || !htab->elf.sdynbss
359 || (!bfd_link_pic (info) && (!htab->elf.srelbss || !htab->sdyntdata)))
e23eba97
NC
360 abort ();
361
362 return TRUE;
363}
364
365/* Copy the extra info we tack onto an elf_link_hash_entry. */
366
367static void
368riscv_elf_copy_indirect_symbol (struct bfd_link_info *info,
369 struct elf_link_hash_entry *dir,
370 struct elf_link_hash_entry *ind)
371{
372 struct riscv_elf_link_hash_entry *edir, *eind;
373
374 edir = (struct riscv_elf_link_hash_entry *) dir;
375 eind = (struct riscv_elf_link_hash_entry *) ind;
376
377 if (eind->dyn_relocs != NULL)
378 {
379 if (edir->dyn_relocs != NULL)
380 {
3bf083ed
AM
381 struct elf_dyn_relocs **pp;
382 struct elf_dyn_relocs *p;
e23eba97
NC
383
384 /* Add reloc counts against the indirect sym to the direct sym
385 list. Merge any entries against the same section. */
386 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
387 {
3bf083ed 388 struct elf_dyn_relocs *q;
e23eba97
NC
389
390 for (q = edir->dyn_relocs; q != NULL; q = q->next)
391 if (q->sec == p->sec)
392 {
393 q->pc_count += p->pc_count;
394 q->count += p->count;
395 *pp = p->next;
396 break;
397 }
398 if (q == NULL)
399 pp = &p->next;
400 }
401 *pp = edir->dyn_relocs;
402 }
403
404 edir->dyn_relocs = eind->dyn_relocs;
405 eind->dyn_relocs = NULL;
406 }
407
408 if (ind->root.type == bfd_link_hash_indirect
409 && dir->got.refcount <= 0)
410 {
411 edir->tls_type = eind->tls_type;
412 eind->tls_type = GOT_UNKNOWN;
413 }
414 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
415}
416
417static bfd_boolean
418riscv_elf_record_tls_type (bfd *abfd, struct elf_link_hash_entry *h,
419 unsigned long symndx, char tls_type)
420{
421 char *new_tls_type = &_bfd_riscv_elf_tls_type (abfd, h, symndx);
422
423 *new_tls_type |= tls_type;
424 if ((*new_tls_type & GOT_NORMAL) && (*new_tls_type & ~GOT_NORMAL))
425 {
426 (*_bfd_error_handler)
871b3ab2 427 (_("%pB: `%s' accessed both as normal and thread local symbol"),
e23eba97
NC
428 abfd, h ? h->root.root.string : "<local>");
429 return FALSE;
430 }
431 return TRUE;
432}
433
434static bfd_boolean
435riscv_elf_record_got_reference (bfd *abfd, struct bfd_link_info *info,
436 struct elf_link_hash_entry *h, long symndx)
437{
438 struct riscv_elf_link_hash_table *htab = riscv_elf_hash_table (info);
439 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
440
441 if (htab->elf.sgot == NULL)
442 {
443 if (!riscv_elf_create_got_section (htab->elf.dynobj, info))
444 return FALSE;
445 }
446
447 if (h != NULL)
448 {
449 h->got.refcount += 1;
450 return TRUE;
451 }
452
453 /* This is a global offset table entry for a local symbol. */
454 if (elf_local_got_refcounts (abfd) == NULL)
455 {
456 bfd_size_type size = symtab_hdr->sh_info * (sizeof (bfd_vma) + 1);
457 if (!(elf_local_got_refcounts (abfd) = bfd_zalloc (abfd, size)))
458 return FALSE;
459 _bfd_riscv_elf_local_got_tls_type (abfd)
460 = (char *) (elf_local_got_refcounts (abfd) + symtab_hdr->sh_info);
461 }
462 elf_local_got_refcounts (abfd) [symndx] += 1;
463
464 return TRUE;
465}
466
467static bfd_boolean
468bad_static_reloc (bfd *abfd, unsigned r_type, struct elf_link_hash_entry *h)
469{
470 (*_bfd_error_handler)
871b3ab2 471 (_("%pB: relocation %s against `%s' can not be used when making a shared "
e23eba97
NC
472 "object; recompile with -fPIC"),
473 abfd, riscv_elf_rtype_to_howto (r_type)->name,
474 h != NULL ? h->root.root.string : "a local symbol");
475 bfd_set_error (bfd_error_bad_value);
476 return FALSE;
477}
478/* Look through the relocs for a section during the first phase, and
479 allocate space in the global offset table or procedure linkage
480 table. */
481
482static bfd_boolean
483riscv_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
484 asection *sec, const Elf_Internal_Rela *relocs)
485{
486 struct riscv_elf_link_hash_table *htab;
487 Elf_Internal_Shdr *symtab_hdr;
488 struct elf_link_hash_entry **sym_hashes;
489 const Elf_Internal_Rela *rel;
490 asection *sreloc = NULL;
491
492 if (bfd_link_relocatable (info))
493 return TRUE;
494
495 htab = riscv_elf_hash_table (info);
496 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
497 sym_hashes = elf_sym_hashes (abfd);
498
499 if (htab->elf.dynobj == NULL)
500 htab->elf.dynobj = abfd;
501
502 for (rel = relocs; rel < relocs + sec->reloc_count; rel++)
503 {
504 unsigned int r_type;
d42c267e 505 unsigned int r_symndx;
e23eba97
NC
506 struct elf_link_hash_entry *h;
507
508 r_symndx = ELFNN_R_SYM (rel->r_info);
509 r_type = ELFNN_R_TYPE (rel->r_info);
510
511 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
512 {
871b3ab2 513 (*_bfd_error_handler) (_("%pB: bad symbol index: %d"),
e23eba97
NC
514 abfd, r_symndx);
515 return FALSE;
516 }
517
518 if (r_symndx < symtab_hdr->sh_info)
519 h = NULL;
520 else
521 {
522 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
523 while (h->root.type == bfd_link_hash_indirect
524 || h->root.type == bfd_link_hash_warning)
525 h = (struct elf_link_hash_entry *) h->root.u.i.link;
e23eba97
NC
526 }
527
528 switch (r_type)
529 {
530 case R_RISCV_TLS_GD_HI20:
531 if (!riscv_elf_record_got_reference (abfd, info, h, r_symndx)
532 || !riscv_elf_record_tls_type (abfd, h, r_symndx, GOT_TLS_GD))
533 return FALSE;
534 break;
535
536 case R_RISCV_TLS_GOT_HI20:
537 if (bfd_link_pic (info))
538 info->flags |= DF_STATIC_TLS;
539 if (!riscv_elf_record_got_reference (abfd, info, h, r_symndx)
540 || !riscv_elf_record_tls_type (abfd, h, r_symndx, GOT_TLS_IE))
541 return FALSE;
542 break;
543
544 case R_RISCV_GOT_HI20:
545 if (!riscv_elf_record_got_reference (abfd, info, h, r_symndx)
546 || !riscv_elf_record_tls_type (abfd, h, r_symndx, GOT_NORMAL))
547 return FALSE;
548 break;
549
550 case R_RISCV_CALL_PLT:
551 /* This symbol requires a procedure linkage table entry. We
552 actually build the entry in adjust_dynamic_symbol,
553 because this might be a case of linking PIC code without
554 linking in any dynamic objects, in which case we don't
555 need to generate a procedure linkage table after all. */
556
557 if (h != NULL)
558 {
559 h->needs_plt = 1;
560 h->plt.refcount += 1;
561 }
562 break;
563
564 case R_RISCV_CALL:
565 case R_RISCV_JAL:
566 case R_RISCV_BRANCH:
567 case R_RISCV_RVC_BRANCH:
568 case R_RISCV_RVC_JUMP:
569 case R_RISCV_PCREL_HI20:
570 /* In shared libraries, these relocs are known to bind locally. */
571 if (bfd_link_pic (info))
572 break;
573 goto static_reloc;
574
575 case R_RISCV_TPREL_HI20:
576 if (!bfd_link_executable (info))
577 return bad_static_reloc (abfd, r_type, h);
578 if (h != NULL)
579 riscv_elf_record_tls_type (abfd, h, r_symndx, GOT_TLS_LE);
580 goto static_reloc;
581
582 case R_RISCV_HI20:
583 if (bfd_link_pic (info))
584 return bad_static_reloc (abfd, r_type, h);
585 /* Fall through. */
586
587 case R_RISCV_COPY:
588 case R_RISCV_JUMP_SLOT:
589 case R_RISCV_RELATIVE:
590 case R_RISCV_64:
591 case R_RISCV_32:
592 /* Fall through. */
593
594 static_reloc:
595 /* This reloc might not bind locally. */
596 if (h != NULL)
597 h->non_got_ref = 1;
598
599 if (h != NULL && !bfd_link_pic (info))
600 {
601 /* We may need a .plt entry if the function this reloc
602 refers to is in a shared lib. */
603 h->plt.refcount += 1;
604 }
605
606 /* If we are creating a shared library, and this is a reloc
607 against a global symbol, or a non PC relative reloc
608 against a local symbol, then we need to copy the reloc
609 into the shared library. However, if we are linking with
610 -Bsymbolic, we do not need to copy a reloc against a
611 global symbol which is defined in an object we are
612 including in the link (i.e., DEF_REGULAR is set). At
613 this point we have not seen all the input files, so it is
614 possible that DEF_REGULAR is not set now but will be set
615 later (it is never cleared). In case of a weak definition,
616 DEF_REGULAR may be cleared later by a strong definition in
617 a shared library. We account for that possibility below by
618 storing information in the relocs_copied field of the hash
619 table entry. A similar situation occurs when creating
620 shared libraries and symbol visibility changes render the
621 symbol local.
622
623 If on the other hand, we are creating an executable, we
624 may need to keep relocations for symbols satisfied by a
625 dynamic library if we manage to avoid copy relocs for the
626 symbol. */
627 if ((bfd_link_pic (info)
628 && (sec->flags & SEC_ALLOC) != 0
629 && (! riscv_elf_rtype_to_howto (r_type)->pc_relative
630 || (h != NULL
631 && (! info->symbolic
632 || h->root.type == bfd_link_hash_defweak
633 || !h->def_regular))))
634 || (!bfd_link_pic (info)
635 && (sec->flags & SEC_ALLOC) != 0
636 && h != NULL
637 && (h->root.type == bfd_link_hash_defweak
638 || !h->def_regular)))
639 {
3bf083ed
AM
640 struct elf_dyn_relocs *p;
641 struct elf_dyn_relocs **head;
e23eba97
NC
642
643 /* When creating a shared object, we must copy these
644 relocs into the output file. We create a reloc
645 section in dynobj and make room for the reloc. */
646 if (sreloc == NULL)
647 {
648 sreloc = _bfd_elf_make_dynamic_reloc_section
649 (sec, htab->elf.dynobj, RISCV_ELF_LOG_WORD_BYTES,
650 abfd, /*rela?*/ TRUE);
651
652 if (sreloc == NULL)
653 return FALSE;
654 }
655
656 /* If this is a global symbol, we count the number of
657 relocations we need for this symbol. */
658 if (h != NULL)
659 head = &((struct riscv_elf_link_hash_entry *) h)->dyn_relocs;
660 else
661 {
662 /* Track dynamic relocs needed for local syms too.
663 We really need local syms available to do this
664 easily. Oh well. */
665
666 asection *s;
667 void *vpp;
668 Elf_Internal_Sym *isym;
669
670 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
671 abfd, r_symndx);
672 if (isym == NULL)
673 return FALSE;
674
675 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
676 if (s == NULL)
677 s = sec;
678
679 vpp = &elf_section_data (s)->local_dynrel;
3bf083ed 680 head = (struct elf_dyn_relocs **) vpp;
e23eba97
NC
681 }
682
683 p = *head;
684 if (p == NULL || p->sec != sec)
685 {
686 bfd_size_type amt = sizeof *p;
3bf083ed 687 p = ((struct elf_dyn_relocs *)
e23eba97
NC
688 bfd_alloc (htab->elf.dynobj, amt));
689 if (p == NULL)
690 return FALSE;
691 p->next = *head;
692 *head = p;
693 p->sec = sec;
694 p->count = 0;
695 p->pc_count = 0;
696 }
697
698 p->count += 1;
699 p->pc_count += riscv_elf_rtype_to_howto (r_type)->pc_relative;
700 }
701
702 break;
703
704 case R_RISCV_GNU_VTINHERIT:
705 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
706 return FALSE;
707 break;
708
709 case R_RISCV_GNU_VTENTRY:
710 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
711 return FALSE;
712 break;
713
714 default:
715 break;
716 }
717 }
718
719 return TRUE;
720}
721
722static asection *
723riscv_elf_gc_mark_hook (asection *sec,
724 struct bfd_link_info *info,
725 Elf_Internal_Rela *rel,
726 struct elf_link_hash_entry *h,
727 Elf_Internal_Sym *sym)
728{
729 if (h != NULL)
730 switch (ELFNN_R_TYPE (rel->r_info))
731 {
732 case R_RISCV_GNU_VTINHERIT:
733 case R_RISCV_GNU_VTENTRY:
734 return NULL;
735 }
736
737 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
738}
739
63c1f59d
AM
740/* Find dynamic relocs for H that apply to read-only sections. */
741
742static asection *
743readonly_dynrelocs (struct elf_link_hash_entry *h)
744{
3bf083ed 745 struct elf_dyn_relocs *p;
63c1f59d
AM
746
747 for (p = riscv_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
748 {
749 asection *s = p->sec->output_section;
750
751 if (s != NULL && (s->flags & SEC_READONLY) != 0)
752 return p->sec;
753 }
754 return NULL;
755}
756
e23eba97
NC
757/* Adjust a symbol defined by a dynamic object and referenced by a
758 regular object. The current definition is in some section of the
759 dynamic object, but we're not including those sections. We have to
760 change the definition to something the rest of the link can
761 understand. */
762
763static bfd_boolean
764riscv_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
765 struct elf_link_hash_entry *h)
766{
767 struct riscv_elf_link_hash_table *htab;
768 struct riscv_elf_link_hash_entry * eh;
e23eba97 769 bfd *dynobj;
5474d94f 770 asection *s, *srel;
e23eba97
NC
771
772 htab = riscv_elf_hash_table (info);
773 BFD_ASSERT (htab != NULL);
774
775 dynobj = htab->elf.dynobj;
776
777 /* Make sure we know what is going on here. */
778 BFD_ASSERT (dynobj != NULL
779 && (h->needs_plt
780 || h->type == STT_GNU_IFUNC
60d67dc8 781 || h->is_weakalias
e23eba97
NC
782 || (h->def_dynamic
783 && h->ref_regular
784 && !h->def_regular)));
785
786 /* If this is a function, put it in the procedure linkage table. We
787 will fill in the contents of the procedure linkage table later
788 (although we could actually do it here). */
789 if (h->type == STT_FUNC || h->type == STT_GNU_IFUNC || h->needs_plt)
790 {
791 if (h->plt.refcount <= 0
792 || SYMBOL_CALLS_LOCAL (info, h)
793 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
794 && h->root.type == bfd_link_hash_undefweak))
795 {
796 /* This case can occur if we saw a R_RISCV_CALL_PLT reloc in an
797 input file, but the symbol was never referred to by a dynamic
798 object, or if all references were garbage collected. In such
799 a case, we don't actually need to build a PLT entry. */
800 h->plt.offset = (bfd_vma) -1;
801 h->needs_plt = 0;
802 }
803
804 return TRUE;
805 }
806 else
807 h->plt.offset = (bfd_vma) -1;
808
809 /* If this is a weak symbol, and there is a real definition, the
810 processor independent code will have arranged for us to see the
811 real definition first, and we can just use the same value. */
60d67dc8 812 if (h->is_weakalias)
e23eba97 813 {
60d67dc8
AM
814 struct elf_link_hash_entry *def = weakdef (h);
815 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
816 h->root.u.def.section = def->root.u.def.section;
817 h->root.u.def.value = def->root.u.def.value;
e23eba97
NC
818 return TRUE;
819 }
820
821 /* This is a reference to a symbol defined by a dynamic object which
822 is not a function. */
823
824 /* If we are creating a shared library, we must presume that the
825 only references to the symbol are via the global offset table.
826 For such cases we need not do anything here; the relocations will
827 be handled correctly by relocate_section. */
828 if (bfd_link_pic (info))
829 return TRUE;
830
831 /* If there are no references to this symbol that do not use the
832 GOT, we don't need to generate a copy reloc. */
833 if (!h->non_got_ref)
834 return TRUE;
835
836 /* If -z nocopyreloc was given, we won't generate them either. */
837 if (info->nocopyreloc)
838 {
839 h->non_got_ref = 0;
840 return TRUE;
841 }
842
3bf083ed 843 /* If we don't find any dynamic relocs in read-only sections, then
e23eba97 844 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
3bf083ed 845 if (!readonly_dynrelocs (h))
e23eba97
NC
846 {
847 h->non_got_ref = 0;
848 return TRUE;
849 }
850
851 /* We must allocate the symbol in our .dynbss section, which will
852 become part of the .bss section of the executable. There will be
853 an entry for this symbol in the .dynsym section. The dynamic
854 object will contain position independent code, so all references
855 from the dynamic object to this symbol will go through the global
856 offset table. The dynamic linker will use the .dynsym entry to
857 determine the address it must put in the global offset table, so
858 both the dynamic object and the regular object will refer to the
859 same memory location for the variable. */
860
861 /* We must generate a R_RISCV_COPY reloc to tell the dynamic linker
862 to copy the initial value out of the dynamic object and into the
863 runtime process image. We need to remember the offset into the
864 .rel.bss section we are going to use. */
3bf083ed 865 eh = (struct riscv_elf_link_hash_entry *) h;
3df5cd13
AW
866 if (eh->tls_type & ~GOT_NORMAL)
867 {
868 s = htab->sdyntdata;
869 srel = htab->elf.srelbss;
870 }
871 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
5474d94f
AM
872 {
873 s = htab->elf.sdynrelro;
874 srel = htab->elf.sreldynrelro;
875 }
876 else
877 {
878 s = htab->elf.sdynbss;
879 srel = htab->elf.srelbss;
880 }
e23eba97
NC
881 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
882 {
5474d94f 883 srel->size += sizeof (ElfNN_External_Rela);
e23eba97
NC
884 h->needs_copy = 1;
885 }
886
5474d94f 887 return _bfd_elf_adjust_dynamic_copy (info, h, s);
e23eba97
NC
888}
889
890/* Allocate space in .plt, .got and associated reloc sections for
891 dynamic relocs. */
892
893static bfd_boolean
894allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
895{
896 struct bfd_link_info *info;
897 struct riscv_elf_link_hash_table *htab;
898 struct riscv_elf_link_hash_entry *eh;
3bf083ed 899 struct elf_dyn_relocs *p;
e23eba97
NC
900
901 if (h->root.type == bfd_link_hash_indirect)
902 return TRUE;
903
904 info = (struct bfd_link_info *) inf;
905 htab = riscv_elf_hash_table (info);
906 BFD_ASSERT (htab != NULL);
907
908 if (htab->elf.dynamic_sections_created
909 && h->plt.refcount > 0)
910 {
911 /* Make sure this symbol is output as a dynamic symbol.
912 Undefined weak syms won't yet be marked as dynamic. */
913 if (h->dynindx == -1
914 && !h->forced_local)
915 {
916 if (! bfd_elf_link_record_dynamic_symbol (info, h))
917 return FALSE;
918 }
919
920 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, bfd_link_pic (info), h))
921 {
922 asection *s = htab->elf.splt;
923
924 if (s->size == 0)
925 s->size = PLT_HEADER_SIZE;
926
927 h->plt.offset = s->size;
928
929 /* Make room for this entry. */
930 s->size += PLT_ENTRY_SIZE;
931
932 /* We also need to make an entry in the .got.plt section. */
933 htab->elf.sgotplt->size += GOT_ENTRY_SIZE;
934
935 /* We also need to make an entry in the .rela.plt section. */
936 htab->elf.srelplt->size += sizeof (ElfNN_External_Rela);
937
938 /* If this symbol is not defined in a regular file, and we are
939 not generating a shared library, then set the symbol to this
940 location in the .plt. This is required to make function
941 pointers compare as equal between the normal executable and
942 the shared library. */
943 if (! bfd_link_pic (info)
944 && !h->def_regular)
945 {
946 h->root.u.def.section = s;
947 h->root.u.def.value = h->plt.offset;
948 }
949 }
950 else
951 {
952 h->plt.offset = (bfd_vma) -1;
953 h->needs_plt = 0;
954 }
955 }
956 else
957 {
958 h->plt.offset = (bfd_vma) -1;
959 h->needs_plt = 0;
960 }
961
962 if (h->got.refcount > 0)
963 {
964 asection *s;
965 bfd_boolean dyn;
966 int tls_type = riscv_elf_hash_entry (h)->tls_type;
967
968 /* Make sure this symbol is output as a dynamic symbol.
969 Undefined weak syms won't yet be marked as dynamic. */
970 if (h->dynindx == -1
971 && !h->forced_local)
972 {
973 if (! bfd_elf_link_record_dynamic_symbol (info, h))
974 return FALSE;
975 }
976
977 s = htab->elf.sgot;
978 h->got.offset = s->size;
979 dyn = htab->elf.dynamic_sections_created;
980 if (tls_type & (GOT_TLS_GD | GOT_TLS_IE))
981 {
982 /* TLS_GD needs two dynamic relocs and two GOT slots. */
983 if (tls_type & GOT_TLS_GD)
984 {
985 s->size += 2 * RISCV_ELF_WORD_BYTES;
986 htab->elf.srelgot->size += 2 * sizeof (ElfNN_External_Rela);
987 }
988
989 /* TLS_IE needs one dynamic reloc and one GOT slot. */
990 if (tls_type & GOT_TLS_IE)
991 {
992 s->size += RISCV_ELF_WORD_BYTES;
993 htab->elf.srelgot->size += sizeof (ElfNN_External_Rela);
994 }
995 }
996 else
997 {
998 s->size += RISCV_ELF_WORD_BYTES;
999 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, bfd_link_pic (info), h))
1000 htab->elf.srelgot->size += sizeof (ElfNN_External_Rela);
1001 }
1002 }
1003 else
1004 h->got.offset = (bfd_vma) -1;
1005
1006 eh = (struct riscv_elf_link_hash_entry *) h;
1007 if (eh->dyn_relocs == NULL)
1008 return TRUE;
1009
1010 /* In the shared -Bsymbolic case, discard space allocated for
1011 dynamic pc-relative relocs against symbols which turn out to be
1012 defined in regular objects. For the normal shared case, discard
1013 space for pc-relative relocs that have become local due to symbol
1014 visibility changes. */
1015
1016 if (bfd_link_pic (info))
1017 {
1018 if (SYMBOL_CALLS_LOCAL (info, h))
1019 {
3bf083ed 1020 struct elf_dyn_relocs **pp;
e23eba97
NC
1021
1022 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
1023 {
1024 p->count -= p->pc_count;
1025 p->pc_count = 0;
1026 if (p->count == 0)
1027 *pp = p->next;
1028 else
1029 pp = &p->next;
1030 }
1031 }
1032
1033 /* Also discard relocs on undefined weak syms with non-default
1034 visibility. */
1035 if (eh->dyn_relocs != NULL
1036 && h->root.type == bfd_link_hash_undefweak)
1037 {
1038 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
1039 eh->dyn_relocs = NULL;
1040
1041 /* Make sure undefined weak symbols are output as a dynamic
1042 symbol in PIEs. */
1043 else if (h->dynindx == -1
1044 && !h->forced_local)
1045 {
1046 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1047 return FALSE;
1048 }
1049 }
1050 }
1051 else
1052 {
1053 /* For the non-shared case, discard space for relocs against
1054 symbols which turn out to need copy relocs or are not
1055 dynamic. */
1056
1057 if (!h->non_got_ref
1058 && ((h->def_dynamic
1059 && !h->def_regular)
1060 || (htab->elf.dynamic_sections_created
1061 && (h->root.type == bfd_link_hash_undefweak
1062 || h->root.type == bfd_link_hash_undefined))))
1063 {
1064 /* Make sure this symbol is output as a dynamic symbol.
1065 Undefined weak syms won't yet be marked as dynamic. */
1066 if (h->dynindx == -1
1067 && !h->forced_local)
1068 {
1069 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1070 return FALSE;
1071 }
1072
1073 /* If that succeeded, we know we'll be keeping all the
1074 relocs. */
1075 if (h->dynindx != -1)
1076 goto keep;
1077 }
1078
1079 eh->dyn_relocs = NULL;
1080
1081 keep: ;
1082 }
1083
1084 /* Finally, allocate space. */
1085 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1086 {
1087 asection *sreloc = elf_section_data (p->sec)->sreloc;
1088 sreloc->size += p->count * sizeof (ElfNN_External_Rela);
1089 }
1090
1091 return TRUE;
1092}
1093
63c1f59d
AM
1094/* Set DF_TEXTREL if we find any dynamic relocs that apply to
1095 read-only sections. */
e23eba97
NC
1096
1097static bfd_boolean
63c1f59d 1098maybe_set_textrel (struct elf_link_hash_entry *h, void *info_p)
e23eba97 1099{
63c1f59d 1100 asection *sec;
e23eba97 1101
63c1f59d
AM
1102 if (h->root.type == bfd_link_hash_indirect)
1103 return TRUE;
1104
1105 sec = readonly_dynrelocs (h);
1106 if (sec != NULL)
e23eba97 1107 {
63c1f59d 1108 struct bfd_link_info *info = (struct bfd_link_info *) info_p;
e23eba97 1109
63c1f59d
AM
1110 info->flags |= DF_TEXTREL;
1111 info->callbacks->minfo
c1c8c1ef 1112 (_("%pB: dynamic relocation against `%pT' in read-only section `%pA'\n"),
63c1f59d
AM
1113 sec->owner, h->root.root.string, sec);
1114
1115 /* Not an error, just cut short the traversal. */
1116 return FALSE;
e23eba97
NC
1117 }
1118 return TRUE;
1119}
1120
1121static bfd_boolean
1122riscv_elf_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
1123{
1124 struct riscv_elf_link_hash_table *htab;
1125 bfd *dynobj;
1126 asection *s;
1127 bfd *ibfd;
1128
1129 htab = riscv_elf_hash_table (info);
1130 BFD_ASSERT (htab != NULL);
1131 dynobj = htab->elf.dynobj;
1132 BFD_ASSERT (dynobj != NULL);
1133
1134 if (elf_hash_table (info)->dynamic_sections_created)
1135 {
1136 /* Set the contents of the .interp section to the interpreter. */
1137 if (bfd_link_executable (info) && !info->nointerp)
1138 {
1139 s = bfd_get_linker_section (dynobj, ".interp");
1140 BFD_ASSERT (s != NULL);
1141 s->size = strlen (ELFNN_DYNAMIC_INTERPRETER) + 1;
1142 s->contents = (unsigned char *) ELFNN_DYNAMIC_INTERPRETER;
1143 }
1144 }
1145
1146 /* Set up .got offsets for local syms, and space for local dynamic
1147 relocs. */
1148 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1149 {
1150 bfd_signed_vma *local_got;
1151 bfd_signed_vma *end_local_got;
1152 char *local_tls_type;
1153 bfd_size_type locsymcount;
1154 Elf_Internal_Shdr *symtab_hdr;
1155 asection *srel;
1156
1157 if (! is_riscv_elf (ibfd))
1158 continue;
1159
1160 for (s = ibfd->sections; s != NULL; s = s->next)
1161 {
3bf083ed 1162 struct elf_dyn_relocs *p;
e23eba97
NC
1163
1164 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
1165 {
1166 if (!bfd_is_abs_section (p->sec)
1167 && bfd_is_abs_section (p->sec->output_section))
1168 {
1169 /* Input section has been discarded, either because
1170 it is a copy of a linkonce section or due to
1171 linker script /DISCARD/, so we'll be discarding
1172 the relocs too. */
1173 }
1174 else if (p->count != 0)
1175 {
1176 srel = elf_section_data (p->sec)->sreloc;
1177 srel->size += p->count * sizeof (ElfNN_External_Rela);
1178 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
1179 info->flags |= DF_TEXTREL;
1180 }
1181 }
1182 }
1183
1184 local_got = elf_local_got_refcounts (ibfd);
1185 if (!local_got)
1186 continue;
1187
1188 symtab_hdr = &elf_symtab_hdr (ibfd);
1189 locsymcount = symtab_hdr->sh_info;
1190 end_local_got = local_got + locsymcount;
1191 local_tls_type = _bfd_riscv_elf_local_got_tls_type (ibfd);
1192 s = htab->elf.sgot;
1193 srel = htab->elf.srelgot;
1194 for (; local_got < end_local_got; ++local_got, ++local_tls_type)
1195 {
1196 if (*local_got > 0)
1197 {
1198 *local_got = s->size;
1199 s->size += RISCV_ELF_WORD_BYTES;
1200 if (*local_tls_type & GOT_TLS_GD)
1201 s->size += RISCV_ELF_WORD_BYTES;
1202 if (bfd_link_pic (info)
1203 || (*local_tls_type & (GOT_TLS_GD | GOT_TLS_IE)))
1204 srel->size += sizeof (ElfNN_External_Rela);
1205 }
1206 else
1207 *local_got = (bfd_vma) -1;
1208 }
1209 }
1210
1211 /* Allocate global sym .plt and .got entries, and space for global
1212 sym dynamic relocs. */
1213 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
1214
1215 if (htab->elf.sgotplt)
1216 {
1217 struct elf_link_hash_entry *got;
1218 got = elf_link_hash_lookup (elf_hash_table (info),
1219 "_GLOBAL_OFFSET_TABLE_",
1220 FALSE, FALSE, FALSE);
1221
1222 /* Don't allocate .got.plt section if there are no GOT nor PLT
1223 entries and there is no refeence to _GLOBAL_OFFSET_TABLE_. */
1224 if ((got == NULL
1225 || !got->ref_regular_nonweak)
1226 && (htab->elf.sgotplt->size == GOTPLT_HEADER_SIZE)
1227 && (htab->elf.splt == NULL
1228 || htab->elf.splt->size == 0)
1229 && (htab->elf.sgot == NULL
1230 || (htab->elf.sgot->size
1231 == get_elf_backend_data (output_bfd)->got_header_size)))
1232 htab->elf.sgotplt->size = 0;
1233 }
1234
1235 /* The check_relocs and adjust_dynamic_symbol entry points have
1236 determined the sizes of the various dynamic sections. Allocate
1237 memory for them. */
1238 for (s = dynobj->sections; s != NULL; s = s->next)
1239 {
1240 if ((s->flags & SEC_LINKER_CREATED) == 0)
1241 continue;
1242
1243 if (s == htab->elf.splt
1244 || s == htab->elf.sgot
1245 || s == htab->elf.sgotplt
5474d94f
AM
1246 || s == htab->elf.sdynbss
1247 || s == htab->elf.sdynrelro)
e23eba97
NC
1248 {
1249 /* Strip this section if we don't need it; see the
1250 comment below. */
1251 }
1252 else if (strncmp (s->name, ".rela", 5) == 0)
1253 {
1254 if (s->size != 0)
1255 {
1256 /* We use the reloc_count field as a counter if we need
1257 to copy relocs into the output file. */
1258 s->reloc_count = 0;
1259 }
1260 }
1261 else
1262 {
1263 /* It's not one of our sections. */
1264 continue;
1265 }
1266
1267 if (s->size == 0)
1268 {
1269 /* If we don't need this section, strip it from the
1270 output file. This is mostly to handle .rela.bss and
1271 .rela.plt. We must create both sections in
1272 create_dynamic_sections, because they must be created
1273 before the linker maps input sections to output
1274 sections. The linker does that before
1275 adjust_dynamic_symbol is called, and it is that
1276 function which decides whether anything needs to go
1277 into these sections. */
1278 s->flags |= SEC_EXCLUDE;
1279 continue;
1280 }
1281
1282 if ((s->flags & SEC_HAS_CONTENTS) == 0)
1283 continue;
1284
1285 /* Allocate memory for the section contents. Zero the memory
1286 for the benefit of .rela.plt, which has 4 unused entries
1287 at the beginning, and we don't want garbage. */
1288 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
1289 if (s->contents == NULL)
1290 return FALSE;
1291 }
1292
1293 if (elf_hash_table (info)->dynamic_sections_created)
1294 {
1295 /* Add some entries to the .dynamic section. We fill in the
1296 values later, in riscv_elf_finish_dynamic_sections, but we
1297 must add the entries now so that we get the correct size for
1298 the .dynamic section. The DT_DEBUG entry is filled in by the
1299 dynamic linker and used by the debugger. */
1300#define add_dynamic_entry(TAG, VAL) \
1301 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
1302
1303 if (bfd_link_executable (info))
1304 {
1305 if (!add_dynamic_entry (DT_DEBUG, 0))
1306 return FALSE;
1307 }
1308
1309 if (htab->elf.srelplt->size != 0)
1310 {
1311 if (!add_dynamic_entry (DT_PLTGOT, 0)
1312 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1313 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1314 || !add_dynamic_entry (DT_JMPREL, 0))
1315 return FALSE;
1316 }
1317
1318 if (!add_dynamic_entry (DT_RELA, 0)
1319 || !add_dynamic_entry (DT_RELASZ, 0)
1320 || !add_dynamic_entry (DT_RELAENT, sizeof (ElfNN_External_Rela)))
1321 return FALSE;
1322
1323 /* If any dynamic relocs apply to a read-only section,
1324 then we need a DT_TEXTREL entry. */
1325 if ((info->flags & DF_TEXTREL) == 0)
63c1f59d 1326 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
e23eba97
NC
1327
1328 if (info->flags & DF_TEXTREL)
1329 {
1330 if (!add_dynamic_entry (DT_TEXTREL, 0))
1331 return FALSE;
1332 }
1333 }
1334#undef add_dynamic_entry
1335
1336 return TRUE;
1337}
1338
1339#define TP_OFFSET 0
1340#define DTP_OFFSET 0x800
1341
1342/* Return the relocation value for a TLS dtp-relative reloc. */
1343
1344static bfd_vma
1345dtpoff (struct bfd_link_info *info, bfd_vma address)
1346{
1347 /* If tls_sec is NULL, we should have signalled an error already. */
1348 if (elf_hash_table (info)->tls_sec == NULL)
1349 return 0;
1350 return address - elf_hash_table (info)->tls_sec->vma - DTP_OFFSET;
1351}
1352
1353/* Return the relocation value for a static TLS tp-relative relocation. */
1354
1355static bfd_vma
1356tpoff (struct bfd_link_info *info, bfd_vma address)
1357{
1358 /* If tls_sec is NULL, we should have signalled an error already. */
1359 if (elf_hash_table (info)->tls_sec == NULL)
1360 return 0;
1361 return address - elf_hash_table (info)->tls_sec->vma - TP_OFFSET;
1362}
1363
1364/* Return the global pointer's value, or 0 if it is not in use. */
1365
1366static bfd_vma
1367riscv_global_pointer_value (struct bfd_link_info *info)
1368{
1369 struct bfd_link_hash_entry *h;
1370
b5292032 1371 h = bfd_link_hash_lookup (info->hash, RISCV_GP_SYMBOL, FALSE, FALSE, TRUE);
e23eba97
NC
1372 if (h == NULL || h->type != bfd_link_hash_defined)
1373 return 0;
1374
1375 return h->u.def.value + sec_addr (h->u.def.section);
1376}
1377
1378/* Emplace a static relocation. */
1379
1380static bfd_reloc_status_type
1381perform_relocation (const reloc_howto_type *howto,
1382 const Elf_Internal_Rela *rel,
1383 bfd_vma value,
1384 asection *input_section,
1385 bfd *input_bfd,
1386 bfd_byte *contents)
1387{
1388 if (howto->pc_relative)
1389 value -= sec_addr (input_section) + rel->r_offset;
1390 value += rel->r_addend;
1391
1392 switch (ELFNN_R_TYPE (rel->r_info))
1393 {
1394 case R_RISCV_HI20:
1395 case R_RISCV_TPREL_HI20:
1396 case R_RISCV_PCREL_HI20:
1397 case R_RISCV_GOT_HI20:
1398 case R_RISCV_TLS_GOT_HI20:
1399 case R_RISCV_TLS_GD_HI20:
1400 if (ARCH_SIZE > 32 && !VALID_UTYPE_IMM (RISCV_CONST_HIGH_PART (value)))
1401 return bfd_reloc_overflow;
1402 value = ENCODE_UTYPE_IMM (RISCV_CONST_HIGH_PART (value));
1403 break;
1404
1405 case R_RISCV_LO12_I:
1406 case R_RISCV_GPREL_I:
1407 case R_RISCV_TPREL_LO12_I:
45f76423 1408 case R_RISCV_TPREL_I:
e23eba97
NC
1409 case R_RISCV_PCREL_LO12_I:
1410 value = ENCODE_ITYPE_IMM (value);
1411 break;
1412
1413 case R_RISCV_LO12_S:
1414 case R_RISCV_GPREL_S:
1415 case R_RISCV_TPREL_LO12_S:
45f76423 1416 case R_RISCV_TPREL_S:
e23eba97
NC
1417 case R_RISCV_PCREL_LO12_S:
1418 value = ENCODE_STYPE_IMM (value);
1419 break;
1420
1421 case R_RISCV_CALL:
1422 case R_RISCV_CALL_PLT:
1423 if (ARCH_SIZE > 32 && !VALID_UTYPE_IMM (RISCV_CONST_HIGH_PART (value)))
1424 return bfd_reloc_overflow;
1425 value = ENCODE_UTYPE_IMM (RISCV_CONST_HIGH_PART (value))
1426 | (ENCODE_ITYPE_IMM (value) << 32);
1427 break;
1428
1429 case R_RISCV_JAL:
1430 if (!VALID_UJTYPE_IMM (value))
1431 return bfd_reloc_overflow;
1432 value = ENCODE_UJTYPE_IMM (value);
1433 break;
1434
1435 case R_RISCV_BRANCH:
1436 if (!VALID_SBTYPE_IMM (value))
1437 return bfd_reloc_overflow;
1438 value = ENCODE_SBTYPE_IMM (value);
1439 break;
1440
1441 case R_RISCV_RVC_BRANCH:
1442 if (!VALID_RVC_B_IMM (value))
1443 return bfd_reloc_overflow;
1444 value = ENCODE_RVC_B_IMM (value);
1445 break;
1446
1447 case R_RISCV_RVC_JUMP:
1448 if (!VALID_RVC_J_IMM (value))
1449 return bfd_reloc_overflow;
1450 value = ENCODE_RVC_J_IMM (value);
1451 break;
1452
1453 case R_RISCV_RVC_LUI:
1454 if (!VALID_RVC_LUI_IMM (RISCV_CONST_HIGH_PART (value)))
1455 return bfd_reloc_overflow;
1456 value = ENCODE_RVC_LUI_IMM (RISCV_CONST_HIGH_PART (value));
1457 break;
1458
1459 case R_RISCV_32:
1460 case R_RISCV_64:
1461 case R_RISCV_ADD8:
1462 case R_RISCV_ADD16:
1463 case R_RISCV_ADD32:
1464 case R_RISCV_ADD64:
45f76423 1465 case R_RISCV_SUB6:
e23eba97
NC
1466 case R_RISCV_SUB8:
1467 case R_RISCV_SUB16:
1468 case R_RISCV_SUB32:
1469 case R_RISCV_SUB64:
45f76423
AW
1470 case R_RISCV_SET6:
1471 case R_RISCV_SET8:
1472 case R_RISCV_SET16:
1473 case R_RISCV_SET32:
a6cbf936 1474 case R_RISCV_32_PCREL:
e23eba97
NC
1475 case R_RISCV_TLS_DTPREL32:
1476 case R_RISCV_TLS_DTPREL64:
1477 break;
1478
ff6f4d9b
PD
1479 case R_RISCV_DELETE:
1480 return bfd_reloc_ok;
1481
e23eba97
NC
1482 default:
1483 return bfd_reloc_notsupported;
1484 }
1485
1486 bfd_vma word = bfd_get (howto->bitsize, input_bfd, contents + rel->r_offset);
1487 word = (word & ~howto->dst_mask) | (value & howto->dst_mask);
1488 bfd_put (howto->bitsize, input_bfd, word, contents + rel->r_offset);
1489
1490 return bfd_reloc_ok;
1491}
1492
1493/* Remember all PC-relative high-part relocs we've encountered to help us
1494 later resolve the corresponding low-part relocs. */
1495
1496typedef struct
1497{
1498 bfd_vma address;
1499 bfd_vma value;
1500} riscv_pcrel_hi_reloc;
1501
1502typedef struct riscv_pcrel_lo_reloc
1503{
07d6d2b8
AM
1504 asection * input_section;
1505 struct bfd_link_info * info;
1506 reloc_howto_type * howto;
1507 const Elf_Internal_Rela * reloc;
1508 bfd_vma addr;
1509 const char * name;
1510 bfd_byte * contents;
1511 struct riscv_pcrel_lo_reloc * next;
e23eba97
NC
1512} riscv_pcrel_lo_reloc;
1513
1514typedef struct
1515{
1516 htab_t hi_relocs;
1517 riscv_pcrel_lo_reloc *lo_relocs;
1518} riscv_pcrel_relocs;
1519
1520static hashval_t
1521riscv_pcrel_reloc_hash (const void *entry)
1522{
1523 const riscv_pcrel_hi_reloc *e = entry;
1524 return (hashval_t)(e->address >> 2);
1525}
1526
1527static bfd_boolean
1528riscv_pcrel_reloc_eq (const void *entry1, const void *entry2)
1529{
1530 const riscv_pcrel_hi_reloc *e1 = entry1, *e2 = entry2;
1531 return e1->address == e2->address;
1532}
1533
1534static bfd_boolean
1535riscv_init_pcrel_relocs (riscv_pcrel_relocs *p)
1536{
1537
1538 p->lo_relocs = NULL;
1539 p->hi_relocs = htab_create (1024, riscv_pcrel_reloc_hash,
1540 riscv_pcrel_reloc_eq, free);
1541 return p->hi_relocs != NULL;
1542}
1543
1544static void
1545riscv_free_pcrel_relocs (riscv_pcrel_relocs *p)
1546{
1547 riscv_pcrel_lo_reloc *cur = p->lo_relocs;
1548
1549 while (cur != NULL)
1550 {
1551 riscv_pcrel_lo_reloc *next = cur->next;
1552 free (cur);
1553 cur = next;
1554 }
1555
1556 htab_delete (p->hi_relocs);
1557}
1558
1559static bfd_boolean
b1308d2c
PD
1560riscv_zero_pcrel_hi_reloc (Elf_Internal_Rela *rel,
1561 struct bfd_link_info *info,
1562 bfd_vma pc,
1563 bfd_vma addr,
1564 bfd_byte *contents,
1565 const reloc_howto_type *howto,
1566 bfd *input_bfd)
e23eba97 1567{
b1308d2c
PD
1568 /* We may need to reference low addreses in PC-relative modes even when the
1569 * PC is far away from these addresses. For example, undefweak references
1570 * need to produce the address 0 when linked. As 0 is far from the arbitrary
1571 * addresses that we can link PC-relative programs at, the linker can't
1572 * actually relocate references to those symbols. In order to allow these
1573 * programs to work we simply convert the PC-relative auipc sequences to
1574 * 0-relative lui sequences. */
1575 if (bfd_link_pic (info))
1576 return FALSE;
1577
1578 /* If it's possible to reference the symbol using auipc we do so, as that's
1579 * more in the spirit of the PC-relative relocations we're processing. */
1580 bfd_vma offset = addr - pc;
1581 if (ARCH_SIZE == 32 || VALID_UTYPE_IMM (RISCV_CONST_HIGH_PART (offset)))
1582 return FALSE;
1583
1584 /* If it's impossible to reference this with a LUI-based offset then don't
1585 * bother to convert it at all so users still see the PC-relative relocation
1586 * in the truncation message. */
1587 if (ARCH_SIZE > 32 && !VALID_UTYPE_IMM (RISCV_CONST_HIGH_PART (addr)))
1588 return FALSE;
1589
1590 rel->r_info = ELFNN_R_INFO(addr, R_RISCV_HI20);
1591
1592 bfd_vma insn = bfd_get(howto->bitsize, input_bfd, contents + rel->r_offset);
1593 insn = (insn & ~MASK_AUIPC) | MATCH_LUI;
1594 bfd_put(howto->bitsize, input_bfd, insn, contents + rel->r_offset);
1595 return TRUE;
1596}
1597
1598static bfd_boolean
1599riscv_record_pcrel_hi_reloc (riscv_pcrel_relocs *p, bfd_vma addr,
1600 bfd_vma value, bfd_boolean absolute)
1601{
1602 bfd_vma offset = absolute ? value : value - addr;
1603 riscv_pcrel_hi_reloc entry = {addr, offset};
e23eba97
NC
1604 riscv_pcrel_hi_reloc **slot =
1605 (riscv_pcrel_hi_reloc **) htab_find_slot (p->hi_relocs, &entry, INSERT);
1606
1607 BFD_ASSERT (*slot == NULL);
1608 *slot = (riscv_pcrel_hi_reloc *) bfd_malloc (sizeof (riscv_pcrel_hi_reloc));
1609 if (*slot == NULL)
1610 return FALSE;
1611 **slot = entry;
1612 return TRUE;
1613}
1614
1615static bfd_boolean
1616riscv_record_pcrel_lo_reloc (riscv_pcrel_relocs *p,
1617 asection *input_section,
1618 struct bfd_link_info *info,
1619 reloc_howto_type *howto,
1620 const Elf_Internal_Rela *reloc,
1621 bfd_vma addr,
1622 const char *name,
1623 bfd_byte *contents)
1624{
1625 riscv_pcrel_lo_reloc *entry;
1626 entry = (riscv_pcrel_lo_reloc *) bfd_malloc (sizeof (riscv_pcrel_lo_reloc));
1627 if (entry == NULL)
1628 return FALSE;
1629 *entry = (riscv_pcrel_lo_reloc) {input_section, info, howto, reloc, addr,
1630 name, contents, p->lo_relocs};
1631 p->lo_relocs = entry;
1632 return TRUE;
1633}
1634
1635static bfd_boolean
1636riscv_resolve_pcrel_lo_relocs (riscv_pcrel_relocs *p)
1637{
1638 riscv_pcrel_lo_reloc *r;
1639
1640 for (r = p->lo_relocs; r != NULL; r = r->next)
1641 {
1642 bfd *input_bfd = r->input_section->owner;
1643
1644 riscv_pcrel_hi_reloc search = {r->addr, 0};
1645 riscv_pcrel_hi_reloc *entry = htab_find (p->hi_relocs, &search);
1646 if (entry == NULL)
07d6d2b8 1647 {
e23eba97
NC
1648 ((*r->info->callbacks->reloc_overflow)
1649 (r->info, NULL, r->name, r->howto->name, (bfd_vma) 0,
1650 input_bfd, r->input_section, r->reloc->r_offset));
1651 return TRUE;
07d6d2b8 1652 }
e23eba97
NC
1653
1654 perform_relocation (r->howto, r->reloc, entry->value, r->input_section,
1655 input_bfd, r->contents);
1656 }
1657
1658 return TRUE;
1659}
1660
1661/* Relocate a RISC-V ELF section.
1662
1663 The RELOCATE_SECTION function is called by the new ELF backend linker
1664 to handle the relocations for a section.
1665
1666 The relocs are always passed as Rela structures.
1667
1668 This function is responsible for adjusting the section contents as
1669 necessary, and (if generating a relocatable output file) adjusting
1670 the reloc addend as necessary.
1671
1672 This function does not have to worry about setting the reloc
1673 address or the reloc symbol index.
1674
1675 LOCAL_SYMS is a pointer to the swapped in local symbols.
1676
1677 LOCAL_SECTIONS is an array giving the section in the input file
1678 corresponding to the st_shndx field of each local symbol.
1679
1680 The global hash table entry for the global symbols can be found
1681 via elf_sym_hashes (input_bfd).
1682
1683 When generating relocatable output, this function must handle
1684 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
1685 going to be the section symbol corresponding to the output
1686 section, which means that the addend must be adjusted
1687 accordingly. */
1688
1689static bfd_boolean
1690riscv_elf_relocate_section (bfd *output_bfd,
1691 struct bfd_link_info *info,
1692 bfd *input_bfd,
1693 asection *input_section,
1694 bfd_byte *contents,
1695 Elf_Internal_Rela *relocs,
1696 Elf_Internal_Sym *local_syms,
1697 asection **local_sections)
1698{
1699 Elf_Internal_Rela *rel;
1700 Elf_Internal_Rela *relend;
1701 riscv_pcrel_relocs pcrel_relocs;
1702 bfd_boolean ret = FALSE;
1703 asection *sreloc = elf_section_data (input_section)->sreloc;
1704 struct riscv_elf_link_hash_table *htab = riscv_elf_hash_table (info);
1705 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_bfd);
1706 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
1707 bfd_vma *local_got_offsets = elf_local_got_offsets (input_bfd);
b1308d2c 1708 bfd_boolean absolute;
e23eba97
NC
1709
1710 if (!riscv_init_pcrel_relocs (&pcrel_relocs))
1711 return FALSE;
1712
1713 relend = relocs + input_section->reloc_count;
1714 for (rel = relocs; rel < relend; rel++)
1715 {
1716 unsigned long r_symndx;
1717 struct elf_link_hash_entry *h;
1718 Elf_Internal_Sym *sym;
1719 asection *sec;
1720 bfd_vma relocation;
1721 bfd_reloc_status_type r = bfd_reloc_ok;
1722 const char *name;
1723 bfd_vma off, ie_off;
1724 bfd_boolean unresolved_reloc, is_ie = FALSE;
1725 bfd_vma pc = sec_addr (input_section) + rel->r_offset;
1726 int r_type = ELFNN_R_TYPE (rel->r_info), tls_type;
1727 reloc_howto_type *howto = riscv_elf_rtype_to_howto (r_type);
1728 const char *msg = NULL;
1729
1730 if (r_type == R_RISCV_GNU_VTINHERIT || r_type == R_RISCV_GNU_VTENTRY)
1731 continue;
1732
1733 /* This is a final link. */
1734 r_symndx = ELFNN_R_SYM (rel->r_info);
1735 h = NULL;
1736 sym = NULL;
1737 sec = NULL;
1738 unresolved_reloc = FALSE;
1739 if (r_symndx < symtab_hdr->sh_info)
1740 {
1741 sym = local_syms + r_symndx;
1742 sec = local_sections[r_symndx];
1743 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
1744 }
1745 else
1746 {
1747 bfd_boolean warned, ignored;
1748
1749 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1750 r_symndx, symtab_hdr, sym_hashes,
1751 h, sec, relocation,
1752 unresolved_reloc, warned, ignored);
1753 if (warned)
1754 {
1755 /* To avoid generating warning messages about truncated
1756 relocations, set the relocation's address to be the same as
1757 the start of this section. */
1758 if (input_section->output_section != NULL)
1759 relocation = input_section->output_section->vma;
1760 else
1761 relocation = 0;
1762 }
1763 }
1764
1765 if (sec != NULL && discarded_section (sec))
1766 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
1767 rel, 1, relend, howto, 0, contents);
1768
1769 if (bfd_link_relocatable (info))
1770 continue;
1771
1772 if (h != NULL)
1773 name = h->root.root.string;
1774 else
1775 {
1776 name = (bfd_elf_string_from_elf_section
1777 (input_bfd, symtab_hdr->sh_link, sym->st_name));
1778 if (name == NULL || *name == '\0')
1779 name = bfd_section_name (input_bfd, sec);
1780 }
1781
1782 switch (r_type)
1783 {
1784 case R_RISCV_NONE:
45f76423 1785 case R_RISCV_RELAX:
e23eba97
NC
1786 case R_RISCV_TPREL_ADD:
1787 case R_RISCV_COPY:
1788 case R_RISCV_JUMP_SLOT:
1789 case R_RISCV_RELATIVE:
1790 /* These require nothing of us at all. */
1791 continue;
1792
1793 case R_RISCV_HI20:
1794 case R_RISCV_BRANCH:
1795 case R_RISCV_RVC_BRANCH:
1796 case R_RISCV_RVC_LUI:
1797 case R_RISCV_LO12_I:
1798 case R_RISCV_LO12_S:
45f76423
AW
1799 case R_RISCV_SET6:
1800 case R_RISCV_SET8:
1801 case R_RISCV_SET16:
1802 case R_RISCV_SET32:
a6cbf936 1803 case R_RISCV_32_PCREL:
ff6f4d9b 1804 case R_RISCV_DELETE:
e23eba97
NC
1805 /* These require no special handling beyond perform_relocation. */
1806 break;
1807
1808 case R_RISCV_GOT_HI20:
1809 if (h != NULL)
1810 {
1811 bfd_boolean dyn, pic;
1812
1813 off = h->got.offset;
1814 BFD_ASSERT (off != (bfd_vma) -1);
1815 dyn = elf_hash_table (info)->dynamic_sections_created;
1816 pic = bfd_link_pic (info);
1817
1818 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, pic, h)
1819 || (pic && SYMBOL_REFERENCES_LOCAL (info, h)))
1820 {
1821 /* This is actually a static link, or it is a
1822 -Bsymbolic link and the symbol is defined
1823 locally, or the symbol was forced to be local
1824 because of a version file. We must initialize
1825 this entry in the global offset table. Since the
1826 offset must always be a multiple of the word size,
1827 we use the least significant bit to record whether
1828 we have initialized it already.
1829
1830 When doing a dynamic link, we create a .rela.got
1831 relocation entry to initialize the value. This
1832 is done in the finish_dynamic_symbol routine. */
1833 if ((off & 1) != 0)
1834 off &= ~1;
1835 else
1836 {
1837 bfd_put_NN (output_bfd, relocation,
1838 htab->elf.sgot->contents + off);
1839 h->got.offset |= 1;
1840 }
1841 }
1842 else
1843 unresolved_reloc = FALSE;
1844 }
1845 else
1846 {
1847 BFD_ASSERT (local_got_offsets != NULL
1848 && local_got_offsets[r_symndx] != (bfd_vma) -1);
1849
1850 off = local_got_offsets[r_symndx];
1851
1852 /* The offset must always be a multiple of the word size.
1853 So, we can use the least significant bit to record
1854 whether we have already processed this entry. */
1855 if ((off & 1) != 0)
1856 off &= ~1;
1857 else
1858 {
1859 if (bfd_link_pic (info))
1860 {
1861 asection *s;
1862 Elf_Internal_Rela outrel;
1863
1864 /* We need to generate a R_RISCV_RELATIVE reloc
1865 for the dynamic linker. */
1866 s = htab->elf.srelgot;
1867 BFD_ASSERT (s != NULL);
1868
1869 outrel.r_offset = sec_addr (htab->elf.sgot) + off;
1870 outrel.r_info =
1871 ELFNN_R_INFO (0, R_RISCV_RELATIVE);
1872 outrel.r_addend = relocation;
1873 relocation = 0;
1874 riscv_elf_append_rela (output_bfd, s, &outrel);
1875 }
1876
1877 bfd_put_NN (output_bfd, relocation,
1878 htab->elf.sgot->contents + off);
1879 local_got_offsets[r_symndx] |= 1;
1880 }
1881 }
1882 relocation = sec_addr (htab->elf.sgot) + off;
b1308d2c
PD
1883 absolute = riscv_zero_pcrel_hi_reloc (rel,
1884 info,
1885 pc,
1886 relocation,
1887 contents,
1888 howto,
1889 input_bfd);
1890 r_type = ELFNN_R_TYPE (rel->r_info);
1891 howto = riscv_elf_rtype_to_howto (r_type);
1892 if (!riscv_record_pcrel_hi_reloc (&pcrel_relocs, pc,
1893 relocation, absolute))
e23eba97
NC
1894 r = bfd_reloc_overflow;
1895 break;
1896
1897 case R_RISCV_ADD8:
1898 case R_RISCV_ADD16:
1899 case R_RISCV_ADD32:
1900 case R_RISCV_ADD64:
1901 {
1902 bfd_vma old_value = bfd_get (howto->bitsize, input_bfd,
1903 contents + rel->r_offset);
1904 relocation = old_value + relocation;
1905 }
1906 break;
1907
45f76423 1908 case R_RISCV_SUB6:
e23eba97
NC
1909 case R_RISCV_SUB8:
1910 case R_RISCV_SUB16:
1911 case R_RISCV_SUB32:
1912 case R_RISCV_SUB64:
1913 {
1914 bfd_vma old_value = bfd_get (howto->bitsize, input_bfd,
1915 contents + rel->r_offset);
1916 relocation = old_value - relocation;
1917 }
1918 break;
1919
1920 case R_RISCV_CALL_PLT:
1921 case R_RISCV_CALL:
1922 case R_RISCV_JAL:
1923 case R_RISCV_RVC_JUMP:
1924 if (bfd_link_pic (info) && h != NULL && h->plt.offset != MINUS_ONE)
1925 {
1926 /* Refer to the PLT entry. */
1927 relocation = sec_addr (htab->elf.splt) + h->plt.offset;
1928 unresolved_reloc = FALSE;
1929 }
1930 break;
1931
1932 case R_RISCV_TPREL_HI20:
1933 relocation = tpoff (info, relocation);
1934 break;
1935
1936 case R_RISCV_TPREL_LO12_I:
1937 case R_RISCV_TPREL_LO12_S:
45f76423
AW
1938 relocation = tpoff (info, relocation);
1939 break;
1940
1941 case R_RISCV_TPREL_I:
1942 case R_RISCV_TPREL_S:
e23eba97
NC
1943 relocation = tpoff (info, relocation);
1944 if (VALID_ITYPE_IMM (relocation + rel->r_addend))
1945 {
1946 /* We can use tp as the base register. */
1947 bfd_vma insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
1948 insn &= ~(OP_MASK_RS1 << OP_SH_RS1);
1949 insn |= X_TP << OP_SH_RS1;
1950 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
1951 }
45f76423
AW
1952 else
1953 r = bfd_reloc_overflow;
e23eba97
NC
1954 break;
1955
1956 case R_RISCV_GPREL_I:
1957 case R_RISCV_GPREL_S:
1958 {
1959 bfd_vma gp = riscv_global_pointer_value (info);
1960 bfd_boolean x0_base = VALID_ITYPE_IMM (relocation + rel->r_addend);
1961 if (x0_base || VALID_ITYPE_IMM (relocation + rel->r_addend - gp))
1962 {
1963 /* We can use x0 or gp as the base register. */
1964 bfd_vma insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
1965 insn &= ~(OP_MASK_RS1 << OP_SH_RS1);
1966 if (!x0_base)
1967 {
1968 rel->r_addend -= gp;
1969 insn |= X_GP << OP_SH_RS1;
1970 }
1971 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
1972 }
1973 else
1974 r = bfd_reloc_overflow;
1975 break;
1976 }
1977
1978 case R_RISCV_PCREL_HI20:
b1308d2c
PD
1979 absolute = riscv_zero_pcrel_hi_reloc (rel,
1980 info,
1981 pc,
1982 relocation,
1983 contents,
1984 howto,
1985 input_bfd);
1986 r_type = ELFNN_R_TYPE (rel->r_info);
1987 howto = riscv_elf_rtype_to_howto (r_type);
e23eba97 1988 if (!riscv_record_pcrel_hi_reloc (&pcrel_relocs, pc,
b1308d2c
PD
1989 relocation + rel->r_addend,
1990 absolute))
e23eba97
NC
1991 r = bfd_reloc_overflow;
1992 break;
1993
1994 case R_RISCV_PCREL_LO12_I:
1995 case R_RISCV_PCREL_LO12_S:
2a0d9853
JW
1996 /* Addends are not allowed, because then riscv_relax_delete_bytes
1997 would have to search through all relocs to update the addends.
1998 Also, riscv_resolve_pcrel_lo_relocs does not support addends
1999 when searching for a matching hi reloc. */
2000 if (rel->r_addend)
2001 {
2002 r = bfd_reloc_dangerous;
2003 break;
2004 }
2005
e23eba97
NC
2006 if (riscv_record_pcrel_lo_reloc (&pcrel_relocs, input_section, info,
2007 howto, rel, relocation, name,
2008 contents))
2009 continue;
2010 r = bfd_reloc_overflow;
2011 break;
2012
2013 case R_RISCV_TLS_DTPREL32:
2014 case R_RISCV_TLS_DTPREL64:
2015 relocation = dtpoff (info, relocation);
2016 break;
2017
2018 case R_RISCV_32:
2019 case R_RISCV_64:
2020 if ((input_section->flags & SEC_ALLOC) == 0)
2021 break;
2022
2023 if ((bfd_link_pic (info)
2024 && (h == NULL
2025 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2026 || h->root.type != bfd_link_hash_undefweak)
2027 && (! howto->pc_relative
2028 || !SYMBOL_CALLS_LOCAL (info, h)))
2029 || (!bfd_link_pic (info)
2030 && h != NULL
2031 && h->dynindx != -1
2032 && !h->non_got_ref
2033 && ((h->def_dynamic
2034 && !h->def_regular)
2035 || h->root.type == bfd_link_hash_undefweak
2036 || h->root.type == bfd_link_hash_undefined)))
2037 {
2038 Elf_Internal_Rela outrel;
2039 bfd_boolean skip_static_relocation, skip_dynamic_relocation;
2040
2041 /* When generating a shared object, these relocations
2042 are copied into the output file to be resolved at run
2043 time. */
2044
2045 outrel.r_offset =
2046 _bfd_elf_section_offset (output_bfd, info, input_section,
2047 rel->r_offset);
2048 skip_static_relocation = outrel.r_offset != (bfd_vma) -2;
2049 skip_dynamic_relocation = outrel.r_offset >= (bfd_vma) -2;
2050 outrel.r_offset += sec_addr (input_section);
2051
2052 if (skip_dynamic_relocation)
2053 memset (&outrel, 0, sizeof outrel);
2054 else if (h != NULL && h->dynindx != -1
2055 && !(bfd_link_pic (info)
2056 && SYMBOLIC_BIND (info, h)
2057 && h->def_regular))
2058 {
2059 outrel.r_info = ELFNN_R_INFO (h->dynindx, r_type);
2060 outrel.r_addend = rel->r_addend;
2061 }
2062 else
2063 {
2064 outrel.r_info = ELFNN_R_INFO (0, R_RISCV_RELATIVE);
2065 outrel.r_addend = relocation + rel->r_addend;
2066 }
2067
2068 riscv_elf_append_rela (output_bfd, sreloc, &outrel);
2069 if (skip_static_relocation)
2070 continue;
2071 }
2072 break;
2073
2074 case R_RISCV_TLS_GOT_HI20:
2075 is_ie = TRUE;
2076 /* Fall through. */
2077
2078 case R_RISCV_TLS_GD_HI20:
2079 if (h != NULL)
2080 {
2081 off = h->got.offset;
2082 h->got.offset |= 1;
2083 }
2084 else
2085 {
2086 off = local_got_offsets[r_symndx];
2087 local_got_offsets[r_symndx] |= 1;
2088 }
2089
2090 tls_type = _bfd_riscv_elf_tls_type (input_bfd, h, r_symndx);
2091 BFD_ASSERT (tls_type & (GOT_TLS_IE | GOT_TLS_GD));
2092 /* If this symbol is referenced by both GD and IE TLS, the IE
2093 reference's GOT slot follows the GD reference's slots. */
2094 ie_off = 0;
2095 if ((tls_type & GOT_TLS_GD) && (tls_type & GOT_TLS_IE))
2096 ie_off = 2 * GOT_ENTRY_SIZE;
2097
2098 if ((off & 1) != 0)
2099 off &= ~1;
2100 else
2101 {
2102 Elf_Internal_Rela outrel;
2103 int indx = 0;
2104 bfd_boolean need_relocs = FALSE;
2105
2106 if (htab->elf.srelgot == NULL)
2107 abort ();
2108
2109 if (h != NULL)
2110 {
2111 bfd_boolean dyn, pic;
2112 dyn = htab->elf.dynamic_sections_created;
2113 pic = bfd_link_pic (info);
2114
2115 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, pic, h)
2116 && (!pic || !SYMBOL_REFERENCES_LOCAL (info, h)))
2117 indx = h->dynindx;
2118 }
2119
2120 /* The GOT entries have not been initialized yet. Do it
07d6d2b8 2121 now, and emit any relocations. */
e23eba97
NC
2122 if ((bfd_link_pic (info) || indx != 0)
2123 && (h == NULL
2124 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2125 || h->root.type != bfd_link_hash_undefweak))
2126 need_relocs = TRUE;
2127
2128 if (tls_type & GOT_TLS_GD)
2129 {
2130 if (need_relocs)
2131 {
2132 outrel.r_offset = sec_addr (htab->elf.sgot) + off;
2133 outrel.r_addend = 0;
2134 outrel.r_info = ELFNN_R_INFO (indx, R_RISCV_TLS_DTPMODNN);
2135 bfd_put_NN (output_bfd, 0,
2136 htab->elf.sgot->contents + off);
2137 riscv_elf_append_rela (output_bfd, htab->elf.srelgot, &outrel);
2138 if (indx == 0)
2139 {
2140 BFD_ASSERT (! unresolved_reloc);
2141 bfd_put_NN (output_bfd,
2142 dtpoff (info, relocation),
2143 (htab->elf.sgot->contents + off +
2144 RISCV_ELF_WORD_BYTES));
2145 }
2146 else
2147 {
2148 bfd_put_NN (output_bfd, 0,
2149 (htab->elf.sgot->contents + off +
2150 RISCV_ELF_WORD_BYTES));
2151 outrel.r_info = ELFNN_R_INFO (indx, R_RISCV_TLS_DTPRELNN);
2152 outrel.r_offset += RISCV_ELF_WORD_BYTES;
2153 riscv_elf_append_rela (output_bfd, htab->elf.srelgot, &outrel);
2154 }
2155 }
2156 else
2157 {
2158 /* If we are not emitting relocations for a
2159 general dynamic reference, then we must be in a
2160 static link or an executable link with the
2161 symbol binding locally. Mark it as belonging
2162 to module 1, the executable. */
2163 bfd_put_NN (output_bfd, 1,
2164 htab->elf.sgot->contents + off);
2165 bfd_put_NN (output_bfd,
2166 dtpoff (info, relocation),
2167 (htab->elf.sgot->contents + off +
2168 RISCV_ELF_WORD_BYTES));
2169 }
2170 }
2171
2172 if (tls_type & GOT_TLS_IE)
2173 {
2174 if (need_relocs)
2175 {
2176 bfd_put_NN (output_bfd, 0,
2177 htab->elf.sgot->contents + off + ie_off);
2178 outrel.r_offset = sec_addr (htab->elf.sgot)
2179 + off + ie_off;
2180 outrel.r_addend = 0;
2181 if (indx == 0)
2182 outrel.r_addend = tpoff (info, relocation);
2183 outrel.r_info = ELFNN_R_INFO (indx, R_RISCV_TLS_TPRELNN);
2184 riscv_elf_append_rela (output_bfd, htab->elf.srelgot, &outrel);
2185 }
2186 else
2187 {
2188 bfd_put_NN (output_bfd, tpoff (info, relocation),
2189 htab->elf.sgot->contents + off + ie_off);
2190 }
2191 }
2192 }
2193
2194 BFD_ASSERT (off < (bfd_vma) -2);
2195 relocation = sec_addr (htab->elf.sgot) + off + (is_ie ? ie_off : 0);
b1308d2c
PD
2196 if (!riscv_record_pcrel_hi_reloc (&pcrel_relocs, pc,
2197 relocation, FALSE))
e23eba97
NC
2198 r = bfd_reloc_overflow;
2199 unresolved_reloc = FALSE;
2200 break;
2201
2202 default:
2203 r = bfd_reloc_notsupported;
2204 }
2205
2206 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
2207 because such sections are not SEC_ALLOC and thus ld.so will
2208 not process them. */
2209 if (unresolved_reloc
2210 && !((input_section->flags & SEC_DEBUGGING) != 0
2211 && h->def_dynamic)
2212 && _bfd_elf_section_offset (output_bfd, info, input_section,
2213 rel->r_offset) != (bfd_vma) -1)
2214 {
2215 (*_bfd_error_handler)
2dcf00ce
AM
2216 (_("%pB(%pA+%#" PRIx64 "): "
2217 "unresolvable %s relocation against symbol `%s'"),
e23eba97
NC
2218 input_bfd,
2219 input_section,
2dcf00ce 2220 (uint64_t) rel->r_offset,
e23eba97
NC
2221 howto->name,
2222 h->root.root.string);
2223 continue;
2224 }
2225
2226 if (r == bfd_reloc_ok)
2227 r = perform_relocation (howto, rel, relocation, input_section,
2228 input_bfd, contents);
2229
2230 switch (r)
2231 {
2232 case bfd_reloc_ok:
2233 continue;
2234
2235 case bfd_reloc_overflow:
2236 info->callbacks->reloc_overflow
2237 (info, (h ? &h->root : NULL), name, howto->name,
2238 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
2239 break;
2240
2241 case bfd_reloc_undefined:
2242 info->callbacks->undefined_symbol
2243 (info, name, input_bfd, input_section, rel->r_offset,
2244 TRUE);
2245 break;
2246
2247 case bfd_reloc_outofrange:
2a0d9853 2248 msg = _("%X%P: internal error: out of range error\n");
e23eba97
NC
2249 break;
2250
2251 case bfd_reloc_notsupported:
2a0d9853 2252 msg = _("%X%P: internal error: unsupported relocation error\n");
e23eba97
NC
2253 break;
2254
2255 case bfd_reloc_dangerous:
2a0d9853
JW
2256 info->callbacks->reloc_dangerous
2257 (info, "%pcrel_lo with addend", input_bfd, input_section,
2258 rel->r_offset);
e23eba97
NC
2259 break;
2260
2261 default:
2a0d9853 2262 msg = _("%X%P: internal error: unknown error\n");
e23eba97
NC
2263 break;
2264 }
2265
2266 if (msg)
2a0d9853
JW
2267 info->callbacks->einfo (msg);
2268
3f48fe4a
JW
2269 /* We already reported the error via a callback, so don't try to report
2270 it again by returning false. That leads to spurious errors. */
ed01220c 2271 ret = TRUE;
e23eba97
NC
2272 goto out;
2273 }
2274
2275 ret = riscv_resolve_pcrel_lo_relocs (&pcrel_relocs);
2276out:
2277 riscv_free_pcrel_relocs (&pcrel_relocs);
2278 return ret;
2279}
2280
2281/* Finish up dynamic symbol handling. We set the contents of various
2282 dynamic sections here. */
2283
2284static bfd_boolean
2285riscv_elf_finish_dynamic_symbol (bfd *output_bfd,
2286 struct bfd_link_info *info,
2287 struct elf_link_hash_entry *h,
2288 Elf_Internal_Sym *sym)
2289{
2290 struct riscv_elf_link_hash_table *htab = riscv_elf_hash_table (info);
2291 const struct elf_backend_data *bed = get_elf_backend_data (output_bfd);
2292
2293 if (h->plt.offset != (bfd_vma) -1)
2294 {
2295 /* We've decided to create a PLT entry for this symbol. */
2296 bfd_byte *loc;
2297 bfd_vma i, header_address, plt_idx, got_address;
2298 uint32_t plt_entry[PLT_ENTRY_INSNS];
2299 Elf_Internal_Rela rela;
2300
2301 BFD_ASSERT (h->dynindx != -1);
2302
2303 /* Calculate the address of the PLT header. */
2304 header_address = sec_addr (htab->elf.splt);
2305
2306 /* Calculate the index of the entry. */
2307 plt_idx = (h->plt.offset - PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
2308
2309 /* Calculate the address of the .got.plt entry. */
2310 got_address = riscv_elf_got_plt_val (plt_idx, info);
2311
2312 /* Find out where the .plt entry should go. */
2313 loc = htab->elf.splt->contents + h->plt.offset;
2314
2315 /* Fill in the PLT entry itself. */
2316 riscv_make_plt_entry (got_address, header_address + h->plt.offset,
2317 plt_entry);
2318 for (i = 0; i < PLT_ENTRY_INSNS; i++)
2319 bfd_put_32 (output_bfd, plt_entry[i], loc + 4*i);
2320
2321 /* Fill in the initial value of the .got.plt entry. */
2322 loc = htab->elf.sgotplt->contents
2323 + (got_address - sec_addr (htab->elf.sgotplt));
2324 bfd_put_NN (output_bfd, sec_addr (htab->elf.splt), loc);
2325
2326 /* Fill in the entry in the .rela.plt section. */
2327 rela.r_offset = got_address;
2328 rela.r_addend = 0;
2329 rela.r_info = ELFNN_R_INFO (h->dynindx, R_RISCV_JUMP_SLOT);
2330
2331 loc = htab->elf.srelplt->contents + plt_idx * sizeof (ElfNN_External_Rela);
2332 bed->s->swap_reloca_out (output_bfd, &rela, loc);
2333
2334 if (!h->def_regular)
2335 {
2336 /* Mark the symbol as undefined, rather than as defined in
2337 the .plt section. Leave the value alone. */
2338 sym->st_shndx = SHN_UNDEF;
2339 /* If the symbol is weak, we do need to clear the value.
2340 Otherwise, the PLT entry would provide a definition for
2341 the symbol even if the symbol wasn't defined anywhere,
2342 and so the symbol would never be NULL. */
2343 if (!h->ref_regular_nonweak)
2344 sym->st_value = 0;
2345 }
2346 }
2347
2348 if (h->got.offset != (bfd_vma) -1
1d65abb5 2349 && !(riscv_elf_hash_entry (h)->tls_type & (GOT_TLS_GD | GOT_TLS_IE)))
e23eba97
NC
2350 {
2351 asection *sgot;
2352 asection *srela;
2353 Elf_Internal_Rela rela;
2354
2355 /* This symbol has an entry in the GOT. Set it up. */
2356
2357 sgot = htab->elf.sgot;
2358 srela = htab->elf.srelgot;
2359 BFD_ASSERT (sgot != NULL && srela != NULL);
2360
2361 rela.r_offset = sec_addr (sgot) + (h->got.offset &~ (bfd_vma) 1);
2362
2363 /* If this is a -Bsymbolic link, and the symbol is defined
2364 locally, we just want to emit a RELATIVE reloc. Likewise if
2365 the symbol was forced to be local because of a version file.
2366 The entry in the global offset table will already have been
2367 initialized in the relocate_section function. */
2368 if (bfd_link_pic (info)
2369 && (info->symbolic || h->dynindx == -1)
2370 && h->def_regular)
2371 {
2372 asection *sec = h->root.u.def.section;
2373 rela.r_info = ELFNN_R_INFO (0, R_RISCV_RELATIVE);
2374 rela.r_addend = (h->root.u.def.value
2375 + sec->output_section->vma
2376 + sec->output_offset);
2377 }
2378 else
2379 {
2380 BFD_ASSERT (h->dynindx != -1);
2381 rela.r_info = ELFNN_R_INFO (h->dynindx, R_RISCV_NN);
2382 rela.r_addend = 0;
2383 }
2384
2385 bfd_put_NN (output_bfd, 0,
2386 sgot->contents + (h->got.offset & ~(bfd_vma) 1));
2387 riscv_elf_append_rela (output_bfd, srela, &rela);
2388 }
2389
2390 if (h->needs_copy)
2391 {
2392 Elf_Internal_Rela rela;
5474d94f 2393 asection *s;
e23eba97
NC
2394
2395 /* This symbols needs a copy reloc. Set it up. */
2396 BFD_ASSERT (h->dynindx != -1);
2397
2398 rela.r_offset = sec_addr (h->root.u.def.section) + h->root.u.def.value;
2399 rela.r_info = ELFNN_R_INFO (h->dynindx, R_RISCV_COPY);
2400 rela.r_addend = 0;
afbf7e8e 2401 if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f
AM
2402 s = htab->elf.sreldynrelro;
2403 else
2404 s = htab->elf.srelbss;
2405 riscv_elf_append_rela (output_bfd, s, &rela);
e23eba97
NC
2406 }
2407
2408 /* Mark some specially defined symbols as absolute. */
2409 if (h == htab->elf.hdynamic
2410 || (h == htab->elf.hgot || h == htab->elf.hplt))
2411 sym->st_shndx = SHN_ABS;
2412
2413 return TRUE;
2414}
2415
2416/* Finish up the dynamic sections. */
2417
2418static bfd_boolean
2419riscv_finish_dyn (bfd *output_bfd, struct bfd_link_info *info,
2420 bfd *dynobj, asection *sdyn)
2421{
2422 struct riscv_elf_link_hash_table *htab = riscv_elf_hash_table (info);
2423 const struct elf_backend_data *bed = get_elf_backend_data (output_bfd);
2424 size_t dynsize = bed->s->sizeof_dyn;
2425 bfd_byte *dyncon, *dynconend;
2426
2427 dynconend = sdyn->contents + sdyn->size;
2428 for (dyncon = sdyn->contents; dyncon < dynconend; dyncon += dynsize)
2429 {
2430 Elf_Internal_Dyn dyn;
2431 asection *s;
2432
2433 bed->s->swap_dyn_in (dynobj, dyncon, &dyn);
2434
2435 switch (dyn.d_tag)
2436 {
2437 case DT_PLTGOT:
2438 s = htab->elf.sgotplt;
2439 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
2440 break;
2441 case DT_JMPREL:
2442 s = htab->elf.srelplt;
2443 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
2444 break;
2445 case DT_PLTRELSZ:
2446 s = htab->elf.srelplt;
2447 dyn.d_un.d_val = s->size;
2448 break;
2449 default:
2450 continue;
2451 }
2452
2453 bed->s->swap_dyn_out (output_bfd, &dyn, dyncon);
2454 }
2455 return TRUE;
2456}
2457
2458static bfd_boolean
2459riscv_elf_finish_dynamic_sections (bfd *output_bfd,
2460 struct bfd_link_info *info)
2461{
2462 bfd *dynobj;
2463 asection *sdyn;
2464 struct riscv_elf_link_hash_table *htab;
2465
2466 htab = riscv_elf_hash_table (info);
2467 BFD_ASSERT (htab != NULL);
2468 dynobj = htab->elf.dynobj;
2469
2470 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
2471
2472 if (elf_hash_table (info)->dynamic_sections_created)
2473 {
2474 asection *splt;
2475 bfd_boolean ret;
2476
2477 splt = htab->elf.splt;
2478 BFD_ASSERT (splt != NULL && sdyn != NULL);
2479
2480 ret = riscv_finish_dyn (output_bfd, info, dynobj, sdyn);
2481
535b785f 2482 if (!ret)
e23eba97
NC
2483 return ret;
2484
2485 /* Fill in the head and tail entries in the procedure linkage table. */
2486 if (splt->size > 0)
2487 {
2488 int i;
2489 uint32_t plt_header[PLT_HEADER_INSNS];
2490 riscv_make_plt_header (sec_addr (htab->elf.sgotplt),
2491 sec_addr (splt), plt_header);
2492
2493 for (i = 0; i < PLT_HEADER_INSNS; i++)
2494 bfd_put_32 (output_bfd, plt_header[i], splt->contents + 4*i);
e23eba97 2495
cc162427
AW
2496 elf_section_data (splt->output_section)->this_hdr.sh_entsize
2497 = PLT_ENTRY_SIZE;
2498 }
e23eba97
NC
2499 }
2500
2501 if (htab->elf.sgotplt)
2502 {
2503 asection *output_section = htab->elf.sgotplt->output_section;
2504
2505 if (bfd_is_abs_section (output_section))
2506 {
2507 (*_bfd_error_handler)
871b3ab2 2508 (_("discarded output section: `%pA'"), htab->elf.sgotplt);
e23eba97
NC
2509 return FALSE;
2510 }
2511
2512 if (htab->elf.sgotplt->size > 0)
2513 {
2514 /* Write the first two entries in .got.plt, needed for the dynamic
2515 linker. */
2516 bfd_put_NN (output_bfd, (bfd_vma) -1, htab->elf.sgotplt->contents);
2517 bfd_put_NN (output_bfd, (bfd_vma) 0,
2518 htab->elf.sgotplt->contents + GOT_ENTRY_SIZE);
2519 }
2520
2521 elf_section_data (output_section)->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
2522 }
2523
2524 if (htab->elf.sgot)
2525 {
2526 asection *output_section = htab->elf.sgot->output_section;
2527
2528 if (htab->elf.sgot->size > 0)
2529 {
2530 /* Set the first entry in the global offset table to the address of
2531 the dynamic section. */
2532 bfd_vma val = sdyn ? sec_addr (sdyn) : 0;
2533 bfd_put_NN (output_bfd, val, htab->elf.sgot->contents);
2534 }
2535
2536 elf_section_data (output_section)->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
2537 }
2538
2539 return TRUE;
2540}
2541
2542/* Return address for Ith PLT stub in section PLT, for relocation REL
2543 or (bfd_vma) -1 if it should not be included. */
2544
2545static bfd_vma
2546riscv_elf_plt_sym_val (bfd_vma i, const asection *plt,
2547 const arelent *rel ATTRIBUTE_UNUSED)
2548{
2549 return plt->vma + PLT_HEADER_SIZE + i * PLT_ENTRY_SIZE;
2550}
2551
2552static enum elf_reloc_type_class
2553riscv_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
2554 const asection *rel_sec ATTRIBUTE_UNUSED,
2555 const Elf_Internal_Rela *rela)
2556{
2557 switch (ELFNN_R_TYPE (rela->r_info))
2558 {
2559 case R_RISCV_RELATIVE:
2560 return reloc_class_relative;
2561 case R_RISCV_JUMP_SLOT:
2562 return reloc_class_plt;
2563 case R_RISCV_COPY:
2564 return reloc_class_copy;
2565 default:
2566 return reloc_class_normal;
2567 }
2568}
2569
2570/* Merge backend specific data from an object file to the output
2571 object file when linking. */
2572
2573static bfd_boolean
2574_bfd_riscv_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
2575{
2576 bfd *obfd = info->output_bfd;
2577 flagword new_flags = elf_elfheader (ibfd)->e_flags;
2578 flagword old_flags = elf_elfheader (obfd)->e_flags;
2579
2580 if (!is_riscv_elf (ibfd) || !is_riscv_elf (obfd))
2581 return TRUE;
2582
2583 if (strcmp (bfd_get_target (ibfd), bfd_get_target (obfd)) != 0)
2584 {
2585 (*_bfd_error_handler)
871b3ab2 2586 (_("%pB: ABI is incompatible with that of the selected emulation:\n"
96b0927d
PD
2587 " target emulation `%s' does not match `%s'"),
2588 ibfd, bfd_get_target (ibfd), bfd_get_target (obfd));
e23eba97
NC
2589 return FALSE;
2590 }
2591
2592 if (!_bfd_elf_merge_object_attributes (ibfd, info))
2593 return FALSE;
2594
2595 if (! elf_flags_init (obfd))
2596 {
2597 elf_flags_init (obfd) = TRUE;
2598 elf_elfheader (obfd)->e_flags = new_flags;
2599 return TRUE;
2600 }
2601
2922d21d
AW
2602 /* Disallow linking different float ABIs. */
2603 if ((old_flags ^ new_flags) & EF_RISCV_FLOAT_ABI)
e23eba97
NC
2604 {
2605 (*_bfd_error_handler)
871b3ab2 2606 (_("%pB: can't link hard-float modules with soft-float modules"), ibfd);
e23eba97
NC
2607 goto fail;
2608 }
2609
2610 /* Allow linking RVC and non-RVC, and keep the RVC flag. */
2611 elf_elfheader (obfd)->e_flags |= new_flags & EF_RISCV_RVC;
2612
2613 return TRUE;
2614
2615fail:
2616 bfd_set_error (bfd_error_bad_value);
2617 return FALSE;
2618}
2619
2620/* Delete some bytes from a section while relaxing. */
2621
2622static bfd_boolean
7f02625e
JW
2623riscv_relax_delete_bytes (bfd *abfd, asection *sec, bfd_vma addr, size_t count,
2624 struct bfd_link_info *link_info)
e23eba97
NC
2625{
2626 unsigned int i, symcount;
2627 bfd_vma toaddr = sec->size;
2628 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (abfd);
2629 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2630 unsigned int sec_shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
2631 struct bfd_elf_section_data *data = elf_section_data (sec);
2632 bfd_byte *contents = data->this_hdr.contents;
2633
2634 /* Actually delete the bytes. */
2635 sec->size -= count;
2636 memmove (contents + addr, contents + addr + count, toaddr - addr - count);
2637
2638 /* Adjust the location of all of the relocs. Note that we need not
2639 adjust the addends, since all PC-relative references must be against
2640 symbols, which we will adjust below. */
2641 for (i = 0; i < sec->reloc_count; i++)
2642 if (data->relocs[i].r_offset > addr && data->relocs[i].r_offset < toaddr)
2643 data->relocs[i].r_offset -= count;
2644
2645 /* Adjust the local symbols defined in this section. */
2646 for (i = 0; i < symtab_hdr->sh_info; i++)
2647 {
2648 Elf_Internal_Sym *sym = (Elf_Internal_Sym *) symtab_hdr->contents + i;
2649 if (sym->st_shndx == sec_shndx)
2650 {
2651 /* If the symbol is in the range of memory we just moved, we
2652 have to adjust its value. */
2653 if (sym->st_value > addr && sym->st_value <= toaddr)
2654 sym->st_value -= count;
2655
2656 /* If the symbol *spans* the bytes we just deleted (i.e. its
2657 *end* is in the moved bytes but its *start* isn't), then we
2658 must adjust its size. */
2659 if (sym->st_value <= addr
2660 && sym->st_value + sym->st_size > addr
2661 && sym->st_value + sym->st_size <= toaddr)
2662 sym->st_size -= count;
2663 }
2664 }
2665
2666 /* Now adjust the global symbols defined in this section. */
2667 symcount = ((symtab_hdr->sh_size / sizeof (ElfNN_External_Sym))
2668 - symtab_hdr->sh_info);
2669
2670 for (i = 0; i < symcount; i++)
2671 {
2672 struct elf_link_hash_entry *sym_hash = sym_hashes[i];
2673
7f02625e
JW
2674 /* The '--wrap SYMBOL' option is causing a pain when the object file,
2675 containing the definition of __wrap_SYMBOL, includes a direct
2676 call to SYMBOL as well. Since both __wrap_SYMBOL and SYMBOL reference
2677 the same symbol (which is __wrap_SYMBOL), but still exist as two
2678 different symbols in 'sym_hashes', we don't want to adjust
2679 the global symbol __wrap_SYMBOL twice.
2680 This check is only relevant when symbols are being wrapped. */
2681 if (link_info->wrap_hash != NULL)
2682 {
2683 struct elf_link_hash_entry **cur_sym_hashes;
2684
2685 /* Loop only over the symbols which have already been checked. */
2686 for (cur_sym_hashes = sym_hashes; cur_sym_hashes < &sym_hashes[i];
2687 cur_sym_hashes++)
2688 {
2689 /* If the current symbol is identical to 'sym_hash', that means
2690 the symbol was already adjusted (or at least checked). */
2691 if (*cur_sym_hashes == sym_hash)
2692 break;
2693 }
2694 /* Don't adjust the symbol again. */
2695 if (cur_sym_hashes < &sym_hashes[i])
2696 continue;
2697 }
2698
e23eba97
NC
2699 if ((sym_hash->root.type == bfd_link_hash_defined
2700 || sym_hash->root.type == bfd_link_hash_defweak)
2701 && sym_hash->root.u.def.section == sec)
2702 {
2703 /* As above, adjust the value if needed. */
2704 if (sym_hash->root.u.def.value > addr
2705 && sym_hash->root.u.def.value <= toaddr)
2706 sym_hash->root.u.def.value -= count;
2707
2708 /* As above, adjust the size if needed. */
2709 if (sym_hash->root.u.def.value <= addr
2710 && sym_hash->root.u.def.value + sym_hash->size > addr
2711 && sym_hash->root.u.def.value + sym_hash->size <= toaddr)
2712 sym_hash->size -= count;
2713 }
2714 }
2715
2716 return TRUE;
2717}
2718
9d06997a
PD
2719/* A second format for recording PC-relative hi relocations. This stores the
2720 information required to relax them to GP-relative addresses. */
2721
2722typedef struct riscv_pcgp_hi_reloc riscv_pcgp_hi_reloc;
2723struct riscv_pcgp_hi_reloc
2724{
2725 bfd_vma hi_sec_off;
2726 bfd_vma hi_addend;
2727 bfd_vma hi_addr;
2728 unsigned hi_sym;
2729 asection *sym_sec;
2730 riscv_pcgp_hi_reloc *next;
2731};
2732
2733typedef struct riscv_pcgp_lo_reloc riscv_pcgp_lo_reloc;
2734struct riscv_pcgp_lo_reloc
2735{
2736 bfd_vma hi_sec_off;
2737 riscv_pcgp_lo_reloc *next;
2738};
2739
2740typedef struct
2741{
2742 riscv_pcgp_hi_reloc *hi;
2743 riscv_pcgp_lo_reloc *lo;
2744} riscv_pcgp_relocs;
2745
2746static bfd_boolean
2747riscv_init_pcgp_relocs (riscv_pcgp_relocs *p)
2748{
2749 p->hi = NULL;
2750 p->lo = NULL;
2751 return TRUE;
2752}
2753
2754static void
2755riscv_free_pcgp_relocs (riscv_pcgp_relocs *p,
2756 bfd *abfd ATTRIBUTE_UNUSED,
2757 asection *sec ATTRIBUTE_UNUSED)
2758{
2759 riscv_pcgp_hi_reloc *c;
2760 riscv_pcgp_lo_reloc *l;
2761
2762 for (c = p->hi; c != NULL;)
2763 {
2764 riscv_pcgp_hi_reloc *next = c->next;
2765 free (c);
2766 c = next;
2767 }
2768
2769 for (l = p->lo; l != NULL;)
2770 {
2771 riscv_pcgp_lo_reloc *next = l->next;
2772 free (l);
2773 l = next;
2774 }
2775}
2776
2777static bfd_boolean
2778riscv_record_pcgp_hi_reloc (riscv_pcgp_relocs *p, bfd_vma hi_sec_off,
2779 bfd_vma hi_addend, bfd_vma hi_addr,
2780 unsigned hi_sym, asection *sym_sec)
2781{
2782 riscv_pcgp_hi_reloc *new = bfd_malloc (sizeof(*new));
2783 if (!new)
2784 return FALSE;
2785 new->hi_sec_off = hi_sec_off;
2786 new->hi_addend = hi_addend;
2787 new->hi_addr = hi_addr;
2788 new->hi_sym = hi_sym;
2789 new->sym_sec = sym_sec;
2790 new->next = p->hi;
2791 p->hi = new;
2792 return TRUE;
2793}
2794
2795static riscv_pcgp_hi_reloc *
2796riscv_find_pcgp_hi_reloc(riscv_pcgp_relocs *p, bfd_vma hi_sec_off)
2797{
2798 riscv_pcgp_hi_reloc *c;
2799
2800 for (c = p->hi; c != NULL; c = c->next)
2801 if (c->hi_sec_off == hi_sec_off)
2802 return c;
2803 return NULL;
2804}
2805
2806static bfd_boolean
2807riscv_delete_pcgp_hi_reloc(riscv_pcgp_relocs *p, bfd_vma hi_sec_off)
2808{
2809 bfd_boolean out = FALSE;
2810 riscv_pcgp_hi_reloc *c;
2811
2812 for (c = p->hi; c != NULL; c = c->next)
2813 if (c->hi_sec_off == hi_sec_off)
2814 out = TRUE;
2815
2816 return out;
2817}
2818
2819static bfd_boolean
2820riscv_use_pcgp_hi_reloc(riscv_pcgp_relocs *p, bfd_vma hi_sec_off)
2821{
2822 bfd_boolean out = FALSE;
2823 riscv_pcgp_hi_reloc *c;
2824
2825 for (c = p->hi; c != NULL; c = c->next)
2826 if (c->hi_sec_off == hi_sec_off)
2827 out = TRUE;
2828
2829 return out;
2830}
2831
2832static bfd_boolean
2833riscv_record_pcgp_lo_reloc (riscv_pcgp_relocs *p, bfd_vma hi_sec_off)
2834{
2835 riscv_pcgp_lo_reloc *new = bfd_malloc (sizeof(*new));
2836 if (!new)
2837 return FALSE;
2838 new->hi_sec_off = hi_sec_off;
2839 new->next = p->lo;
2840 p->lo = new;
2841 return TRUE;
2842}
2843
2844static bfd_boolean
2845riscv_find_pcgp_lo_reloc (riscv_pcgp_relocs *p, bfd_vma hi_sec_off)
2846{
2847 riscv_pcgp_lo_reloc *c;
2848
2849 for (c = p->lo; c != NULL; c = c->next)
2850 if (c->hi_sec_off == hi_sec_off)
2851 return TRUE;
2852 return FALSE;
2853}
2854
2855static bfd_boolean
2856riscv_delete_pcgp_lo_reloc (riscv_pcgp_relocs *p ATTRIBUTE_UNUSED,
2857 bfd_vma lo_sec_off ATTRIBUTE_UNUSED,
2858 size_t bytes ATTRIBUTE_UNUSED)
2859{
2860 return TRUE;
2861}
2862
45f76423
AW
2863typedef bfd_boolean (*relax_func_t) (bfd *, asection *, asection *,
2864 struct bfd_link_info *,
2865 Elf_Internal_Rela *,
9d06997a
PD
2866 bfd_vma, bfd_vma, bfd_vma, bfd_boolean *,
2867 riscv_pcgp_relocs *);
45f76423 2868
e23eba97
NC
2869/* Relax AUIPC + JALR into JAL. */
2870
2871static bfd_boolean
2872_bfd_riscv_relax_call (bfd *abfd, asection *sec, asection *sym_sec,
2873 struct bfd_link_info *link_info,
2874 Elf_Internal_Rela *rel,
2875 bfd_vma symval,
45f76423
AW
2876 bfd_vma max_alignment,
2877 bfd_vma reserve_size ATTRIBUTE_UNUSED,
9d06997a
PD
2878 bfd_boolean *again,
2879 riscv_pcgp_relocs *pcgp_relocs ATTRIBUTE_UNUSED)
e23eba97
NC
2880{
2881 bfd_byte *contents = elf_section_data (sec)->this_hdr.contents;
2882 bfd_signed_vma foff = symval - (sec_addr (sec) + rel->r_offset);
2883 bfd_boolean near_zero = (symval + RISCV_IMM_REACH/2) < RISCV_IMM_REACH;
2884 bfd_vma auipc, jalr;
2885 int rd, r_type, len = 4, rvc = elf_elfheader (abfd)->e_flags & EF_RISCV_RVC;
2886
2887 /* If the call crosses section boundaries, an alignment directive could
2888 cause the PC-relative offset to later increase. */
2889 if (VALID_UJTYPE_IMM (foff) && sym_sec->output_section != sec->output_section)
2890 foff += (foff < 0 ? -max_alignment : max_alignment);
2891
2892 /* See if this function call can be shortened. */
2893 if (!VALID_UJTYPE_IMM (foff) && !(!bfd_link_pic (link_info) && near_zero))
2894 return TRUE;
2895
2896 /* Shorten the function call. */
2897 BFD_ASSERT (rel->r_offset + 8 <= sec->size);
2898
2899 auipc = bfd_get_32 (abfd, contents + rel->r_offset);
2900 jalr = bfd_get_32 (abfd, contents + rel->r_offset + 4);
2901 rd = (jalr >> OP_SH_RD) & OP_MASK_RD;
2902 rvc = rvc && VALID_RVC_J_IMM (foff) && ARCH_SIZE == 32;
2903
2904 if (rvc && (rd == 0 || rd == X_RA))
2905 {
2906 /* Relax to C.J[AL] rd, addr. */
2907 r_type = R_RISCV_RVC_JUMP;
2908 auipc = rd == 0 ? MATCH_C_J : MATCH_C_JAL;
2909 len = 2;
2910 }
2911 else if (VALID_UJTYPE_IMM (foff))
2912 {
2913 /* Relax to JAL rd, addr. */
2914 r_type = R_RISCV_JAL;
2915 auipc = MATCH_JAL | (rd << OP_SH_RD);
2916 }
2917 else /* near_zero */
2918 {
2919 /* Relax to JALR rd, x0, addr. */
2920 r_type = R_RISCV_LO12_I;
2921 auipc = MATCH_JALR | (rd << OP_SH_RD);
2922 }
2923
2924 /* Replace the R_RISCV_CALL reloc. */
2925 rel->r_info = ELFNN_R_INFO (ELFNN_R_SYM (rel->r_info), r_type);
2926 /* Replace the AUIPC. */
2927 bfd_put (8 * len, abfd, auipc, contents + rel->r_offset);
2928
2929 /* Delete unnecessary JALR. */
2930 *again = TRUE;
7f02625e
JW
2931 return riscv_relax_delete_bytes (abfd, sec, rel->r_offset + len, 8 - len,
2932 link_info);
e23eba97
NC
2933}
2934
2935/* Traverse all output sections and return the max alignment. */
2936
1d61f794 2937static bfd_vma
e23eba97
NC
2938_bfd_riscv_get_max_alignment (asection *sec)
2939{
2940 unsigned int max_alignment_power = 0;
2941 asection *o;
2942
2943 for (o = sec->output_section->owner->sections; o != NULL; o = o->next)
2944 {
2945 if (o->alignment_power > max_alignment_power)
2946 max_alignment_power = o->alignment_power;
2947 }
2948
1d61f794 2949 return (bfd_vma) 1 << max_alignment_power;
e23eba97
NC
2950}
2951
2952/* Relax non-PIC global variable references. */
2953
2954static bfd_boolean
2955_bfd_riscv_relax_lui (bfd *abfd,
2956 asection *sec,
2957 asection *sym_sec,
2958 struct bfd_link_info *link_info,
2959 Elf_Internal_Rela *rel,
2960 bfd_vma symval,
45f76423
AW
2961 bfd_vma max_alignment,
2962 bfd_vma reserve_size,
9d06997a
PD
2963 bfd_boolean *again,
2964 riscv_pcgp_relocs *pcgp_relocs ATTRIBUTE_UNUSED)
e23eba97
NC
2965{
2966 bfd_byte *contents = elf_section_data (sec)->this_hdr.contents;
2967 bfd_vma gp = riscv_global_pointer_value (link_info);
2968 int use_rvc = elf_elfheader (abfd)->e_flags & EF_RISCV_RVC;
2969
2970 /* Mergeable symbols and code might later move out of range. */
2971 if (sym_sec->flags & (SEC_MERGE | SEC_CODE))
2972 return TRUE;
2973
2974 BFD_ASSERT (rel->r_offset + 4 <= sec->size);
2975
d0f744f9
AW
2976 if (gp)
2977 {
2978 /* If gp and the symbol are in the same output section, then
2979 consider only that section's alignment. */
2980 struct bfd_link_hash_entry *h =
b5292032
PD
2981 bfd_link_hash_lookup (link_info->hash, RISCV_GP_SYMBOL, FALSE, FALSE,
2982 TRUE);
d0f744f9
AW
2983 if (h->u.def.section->output_section == sym_sec->output_section)
2984 max_alignment = (bfd_vma) 1 << sym_sec->output_section->alignment_power;
2985 }
2986
e23eba97
NC
2987 /* Is the reference in range of x0 or gp?
2988 Valid gp range conservatively because of alignment issue. */
2989 if (VALID_ITYPE_IMM (symval)
45f76423
AW
2990 || (symval >= gp
2991 && VALID_ITYPE_IMM (symval - gp + max_alignment + reserve_size))
2992 || (symval < gp
2993 && VALID_ITYPE_IMM (symval - gp - max_alignment - reserve_size)))
e23eba97
NC
2994 {
2995 unsigned sym = ELFNN_R_SYM (rel->r_info);
2996 switch (ELFNN_R_TYPE (rel->r_info))
2997 {
2998 case R_RISCV_LO12_I:
2999 rel->r_info = ELFNN_R_INFO (sym, R_RISCV_GPREL_I);
3000 return TRUE;
3001
3002 case R_RISCV_LO12_S:
3003 rel->r_info = ELFNN_R_INFO (sym, R_RISCV_GPREL_S);
3004 return TRUE;
3005
3006 case R_RISCV_HI20:
3007 /* We can delete the unnecessary LUI and reloc. */
3008 rel->r_info = ELFNN_R_INFO (0, R_RISCV_NONE);
3009 *again = TRUE;
7f02625e
JW
3010 return riscv_relax_delete_bytes (abfd, sec, rel->r_offset, 4,
3011 link_info);
e23eba97
NC
3012
3013 default:
3014 abort ();
3015 }
3016 }
3017
3018 /* Can we relax LUI to C.LUI? Alignment might move the section forward;
3019 account for this assuming page alignment at worst. */
3020 if (use_rvc
3021 && ELFNN_R_TYPE (rel->r_info) == R_RISCV_HI20
3022 && VALID_RVC_LUI_IMM (RISCV_CONST_HIGH_PART (symval))
3023 && VALID_RVC_LUI_IMM (RISCV_CONST_HIGH_PART (symval + ELF_MAXPAGESIZE)))
3024 {
3342be5d 3025 /* Replace LUI with C.LUI if legal (i.e., rd != x0 and rd != x2/sp). */
e23eba97 3026 bfd_vma lui = bfd_get_32 (abfd, contents + rel->r_offset);
3342be5d
AW
3027 unsigned rd = ((unsigned)lui >> OP_SH_RD) & OP_MASK_RD;
3028 if (rd == 0 || rd == X_SP)
e23eba97
NC
3029 return TRUE;
3030
3031 lui = (lui & (OP_MASK_RD << OP_SH_RD)) | MATCH_C_LUI;
3032 bfd_put_32 (abfd, lui, contents + rel->r_offset);
3033
3034 /* Replace the R_RISCV_HI20 reloc. */
3035 rel->r_info = ELFNN_R_INFO (ELFNN_R_SYM (rel->r_info), R_RISCV_RVC_LUI);
3036
3037 *again = TRUE;
7f02625e
JW
3038 return riscv_relax_delete_bytes (abfd, sec, rel->r_offset + 2, 2,
3039 link_info);
e23eba97
NC
3040 }
3041
3042 return TRUE;
3043}
3044
3045/* Relax non-PIC TLS references. */
3046
3047static bfd_boolean
3048_bfd_riscv_relax_tls_le (bfd *abfd,
3049 asection *sec,
3050 asection *sym_sec ATTRIBUTE_UNUSED,
3051 struct bfd_link_info *link_info,
3052 Elf_Internal_Rela *rel,
3053 bfd_vma symval,
45f76423
AW
3054 bfd_vma max_alignment ATTRIBUTE_UNUSED,
3055 bfd_vma reserve_size ATTRIBUTE_UNUSED,
9d06997a
PD
3056 bfd_boolean *again,
3057 riscv_pcgp_relocs *prcel_relocs ATTRIBUTE_UNUSED)
e23eba97
NC
3058{
3059 /* See if this symbol is in range of tp. */
3060 if (RISCV_CONST_HIGH_PART (tpoff (link_info, symval)) != 0)
3061 return TRUE;
3062
e23eba97 3063 BFD_ASSERT (rel->r_offset + 4 <= sec->size);
45f76423
AW
3064 switch (ELFNN_R_TYPE (rel->r_info))
3065 {
3066 case R_RISCV_TPREL_LO12_I:
3067 rel->r_info = ELFNN_R_INFO (ELFNN_R_SYM (rel->r_info), R_RISCV_TPREL_I);
3068 return TRUE;
e23eba97 3069
45f76423
AW
3070 case R_RISCV_TPREL_LO12_S:
3071 rel->r_info = ELFNN_R_INFO (ELFNN_R_SYM (rel->r_info), R_RISCV_TPREL_S);
3072 return TRUE;
3073
3074 case R_RISCV_TPREL_HI20:
3075 case R_RISCV_TPREL_ADD:
3076 /* We can delete the unnecessary instruction and reloc. */
3077 rel->r_info = ELFNN_R_INFO (0, R_RISCV_NONE);
3078 *again = TRUE;
7f02625e 3079 return riscv_relax_delete_bytes (abfd, sec, rel->r_offset, 4, link_info);
45f76423
AW
3080
3081 default:
3082 abort ();
3083 }
e23eba97
NC
3084}
3085
3086/* Implement R_RISCV_ALIGN by deleting excess alignment NOPs. */
3087
3088static bfd_boolean
3089_bfd_riscv_relax_align (bfd *abfd, asection *sec,
9eb7b0ac 3090 asection *sym_sec,
7f02625e 3091 struct bfd_link_info *link_info,
e23eba97
NC
3092 Elf_Internal_Rela *rel,
3093 bfd_vma symval,
45f76423
AW
3094 bfd_vma max_alignment ATTRIBUTE_UNUSED,
3095 bfd_vma reserve_size ATTRIBUTE_UNUSED,
9d06997a
PD
3096 bfd_boolean *again ATTRIBUTE_UNUSED,
3097 riscv_pcgp_relocs *pcrel_relocs ATTRIBUTE_UNUSED)
e23eba97
NC
3098{
3099 bfd_byte *contents = elf_section_data (sec)->this_hdr.contents;
3100 bfd_vma alignment = 1, pos;
3101 while (alignment <= rel->r_addend)
3102 alignment *= 2;
3103
3104 symval -= rel->r_addend;
3105 bfd_vma aligned_addr = ((symval - 1) & ~(alignment - 1)) + alignment;
3106 bfd_vma nop_bytes = aligned_addr - symval;
3107
3108 /* Once we've handled an R_RISCV_ALIGN, we can't relax anything else. */
3109 sec->sec_flg0 = TRUE;
3110
3111 /* Make sure there are enough NOPs to actually achieve the alignment. */
3112 if (rel->r_addend < nop_bytes)
9eb7b0ac 3113 {
f2b740ac
AM
3114 _bfd_error_handler
3115 (_("%pB(%pA+%#" PRIx64 "): %" PRId64 " bytes required for alignment "
3116 "to %" PRId64 "-byte boundary, but only %" PRId64 " present"),
3117 abfd, sym_sec, (uint64_t) rel->r_offset,
3118 (int64_t) nop_bytes, (int64_t) alignment, (int64_t) rel->r_addend);
9eb7b0ac
PD
3119 bfd_set_error (bfd_error_bad_value);
3120 return FALSE;
3121 }
e23eba97
NC
3122
3123 /* Delete the reloc. */
3124 rel->r_info = ELFNN_R_INFO (0, R_RISCV_NONE);
3125
3126 /* If the number of NOPs is already correct, there's nothing to do. */
3127 if (nop_bytes == rel->r_addend)
3128 return TRUE;
3129
3130 /* Write as many RISC-V NOPs as we need. */
3131 for (pos = 0; pos < (nop_bytes & -4); pos += 4)
3132 bfd_put_32 (abfd, RISCV_NOP, contents + rel->r_offset + pos);
3133
3134 /* Write a final RVC NOP if need be. */
3135 if (nop_bytes % 4 != 0)
3136 bfd_put_16 (abfd, RVC_NOP, contents + rel->r_offset + pos);
3137
3138 /* Delete the excess bytes. */
3139 return riscv_relax_delete_bytes (abfd, sec, rel->r_offset + nop_bytes,
7f02625e 3140 rel->r_addend - nop_bytes, link_info);
e23eba97
NC
3141}
3142
ff6f4d9b
PD
3143/* Relax PC-relative references to GP-relative references. */
3144
9d06997a
PD
3145static bfd_boolean
3146_bfd_riscv_relax_pc (bfd *abfd,
3147 asection *sec,
3148 asection *sym_sec,
3149 struct bfd_link_info *link_info,
3150 Elf_Internal_Rela *rel,
3151 bfd_vma symval,
3152 bfd_vma max_alignment,
3153 bfd_vma reserve_size,
3154 bfd_boolean *again ATTRIBUTE_UNUSED,
3155 riscv_pcgp_relocs *pcgp_relocs)
3156{
3157 bfd_vma gp = riscv_global_pointer_value (link_info);
3158
3159 BFD_ASSERT (rel->r_offset + 4 <= sec->size);
3160
3161 /* Chain the _LO relocs to their cooresponding _HI reloc to compute the
3162 * actual target address. */
e65b1a78
MR
3163 riscv_pcgp_hi_reloc hi_reloc;
3164 memset (&hi_reloc, 0, sizeof (hi_reloc));
9d06997a
PD
3165 switch (ELFNN_R_TYPE (rel->r_info))
3166 {
3167 case R_RISCV_PCREL_LO12_I:
3168 case R_RISCV_PCREL_LO12_S:
3169 {
3170 riscv_pcgp_hi_reloc *hi = riscv_find_pcgp_hi_reloc (pcgp_relocs,
3171 symval - sec_addr(sym_sec));
3172 if (hi == NULL)
3173 {
3174 riscv_record_pcgp_lo_reloc (pcgp_relocs, symval - sec_addr(sym_sec));
3175 return TRUE;
3176 }
3177
3178 hi_reloc = *hi;
3179 symval = hi_reloc.hi_addr;
3180 sym_sec = hi_reloc.sym_sec;
3181 if (!riscv_use_pcgp_hi_reloc(pcgp_relocs, hi->hi_sec_off))
f2b740ac
AM
3182 _bfd_error_handler
3183 (_("%pB(%pA+%#" PRIx64 "): Unable to clear RISCV_PCREL_HI20 reloc "
3184 "for corresponding RISCV_PCREL_LO12 reloc"),
3185 abfd, sec, (uint64_t) rel->r_offset);
9d06997a
PD
3186 }
3187 break;
3188
3189 case R_RISCV_PCREL_HI20:
3190 /* Mergeable symbols and code might later move out of range. */
3191 if (sym_sec->flags & (SEC_MERGE | SEC_CODE))
3192 return TRUE;
3193
3194 /* If the cooresponding lo relocation has already been seen then it's not
3195 * safe to relax this relocation. */
3196 if (riscv_find_pcgp_lo_reloc (pcgp_relocs, rel->r_offset))
07d6d2b8 3197 return TRUE;
9d06997a
PD
3198
3199 break;
3200
3201 default:
3202 abort ();
3203 }
3204
3205 if (gp)
3206 {
3207 /* If gp and the symbol are in the same output section, then
3208 consider only that section's alignment. */
3209 struct bfd_link_hash_entry *h =
3210 bfd_link_hash_lookup (link_info->hash, RISCV_GP_SYMBOL, FALSE, FALSE, TRUE);
3211 if (h->u.def.section->output_section == sym_sec->output_section)
3212 max_alignment = (bfd_vma) 1 << sym_sec->output_section->alignment_power;
3213 }
3214
3215 /* Is the reference in range of x0 or gp?
3216 Valid gp range conservatively because of alignment issue. */
3217 if (VALID_ITYPE_IMM (symval)
3218 || (symval >= gp
3219 && VALID_ITYPE_IMM (symval - gp + max_alignment + reserve_size))
3220 || (symval < gp
3221 && VALID_ITYPE_IMM (symval - gp - max_alignment - reserve_size)))
3222 {
3223 unsigned sym = hi_reloc.hi_sym;
3224 switch (ELFNN_R_TYPE (rel->r_info))
3225 {
3226 case R_RISCV_PCREL_LO12_I:
3227 rel->r_info = ELFNN_R_INFO (sym, R_RISCV_GPREL_I);
3228 rel->r_addend += hi_reloc.hi_addend;
3229 return riscv_delete_pcgp_lo_reloc (pcgp_relocs, rel->r_offset, 4);
3230
3231 case R_RISCV_PCREL_LO12_S:
3232 rel->r_info = ELFNN_R_INFO (sym, R_RISCV_GPREL_S);
3233 rel->r_addend += hi_reloc.hi_addend;
3234 return riscv_delete_pcgp_lo_reloc (pcgp_relocs, rel->r_offset, 4);
3235
3236 case R_RISCV_PCREL_HI20:
07d6d2b8 3237 riscv_record_pcgp_hi_reloc (pcgp_relocs,
9d06997a
PD
3238 rel->r_offset,
3239 rel->r_addend,
3240 symval,
3241 ELFNN_R_SYM(rel->r_info),
3242 sym_sec);
3243 /* We can delete the unnecessary AUIPC and reloc. */
3244 rel->r_info = ELFNN_R_INFO (0, R_RISCV_DELETE);
3245 rel->r_addend = 4;
3246 return riscv_delete_pcgp_hi_reloc (pcgp_relocs, rel->r_offset);
3247
3248 default:
3249 abort ();
3250 }
3251 }
3252
3253 return TRUE;
3254}
3255
3256/* Relax PC-relative references to GP-relative references. */
3257
ff6f4d9b
PD
3258static bfd_boolean
3259_bfd_riscv_relax_delete (bfd *abfd,
3260 asection *sec,
3261 asection *sym_sec ATTRIBUTE_UNUSED,
7f02625e 3262 struct bfd_link_info *link_info,
ff6f4d9b
PD
3263 Elf_Internal_Rela *rel,
3264 bfd_vma symval ATTRIBUTE_UNUSED,
3265 bfd_vma max_alignment ATTRIBUTE_UNUSED,
3266 bfd_vma reserve_size ATTRIBUTE_UNUSED,
9d06997a
PD
3267 bfd_boolean *again ATTRIBUTE_UNUSED,
3268 riscv_pcgp_relocs *pcgp_relocs ATTRIBUTE_UNUSED)
ff6f4d9b 3269{
7f02625e
JW
3270 if (!riscv_relax_delete_bytes(abfd, sec, rel->r_offset, rel->r_addend,
3271 link_info))
ff6f4d9b
PD
3272 return FALSE;
3273 rel->r_info = ELFNN_R_INFO(0, R_RISCV_NONE);
3274 return TRUE;
3275}
3276
3277/* Relax a section. Pass 0 shortens code sequences unless disabled. Pass 1
3278 deletes the bytes that pass 0 made obselete. Pass 2, which cannot be
3279 disabled, handles code alignment directives. */
e23eba97
NC
3280
3281static bfd_boolean
3282_bfd_riscv_relax_section (bfd *abfd, asection *sec,
3283 struct bfd_link_info *info,
3284 bfd_boolean *again)
3285{
3286 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (abfd);
3287 struct riscv_elf_link_hash_table *htab = riscv_elf_hash_table (info);
3288 struct bfd_elf_section_data *data = elf_section_data (sec);
3289 Elf_Internal_Rela *relocs;
3290 bfd_boolean ret = FALSE;
3291 unsigned int i;
45f76423 3292 bfd_vma max_alignment, reserve_size = 0;
9d06997a 3293 riscv_pcgp_relocs pcgp_relocs;
e23eba97
NC
3294
3295 *again = FALSE;
3296
3297 if (bfd_link_relocatable (info)
3298 || sec->sec_flg0
3299 || (sec->flags & SEC_RELOC) == 0
3300 || sec->reloc_count == 0
3301 || (info->disable_target_specific_optimizations
3302 && info->relax_pass == 0))
3303 return TRUE;
3304
9d06997a
PD
3305 riscv_init_pcgp_relocs (&pcgp_relocs);
3306
e23eba97
NC
3307 /* Read this BFD's relocs if we haven't done so already. */
3308 if (data->relocs)
3309 relocs = data->relocs;
3310 else if (!(relocs = _bfd_elf_link_read_relocs (abfd, sec, NULL, NULL,
3311 info->keep_memory)))
3312 goto fail;
3313
fc3c5343
L
3314 if (htab)
3315 {
3316 max_alignment = htab->max_alignment;
3317 if (max_alignment == (bfd_vma) -1)
3318 {
3319 max_alignment = _bfd_riscv_get_max_alignment (sec);
3320 htab->max_alignment = max_alignment;
3321 }
3322 }
3323 else
3324 max_alignment = _bfd_riscv_get_max_alignment (sec);
e23eba97
NC
3325
3326 /* Examine and consider relaxing each reloc. */
3327 for (i = 0; i < sec->reloc_count; i++)
3328 {
3329 asection *sym_sec;
3330 Elf_Internal_Rela *rel = relocs + i;
45f76423 3331 relax_func_t relax_func;
e23eba97
NC
3332 int type = ELFNN_R_TYPE (rel->r_info);
3333 bfd_vma symval;
3334
ff6f4d9b 3335 relax_func = NULL;
e23eba97
NC
3336 if (info->relax_pass == 0)
3337 {
3338 if (type == R_RISCV_CALL || type == R_RISCV_CALL_PLT)
3339 relax_func = _bfd_riscv_relax_call;
3340 else if (type == R_RISCV_HI20
3341 || type == R_RISCV_LO12_I
3342 || type == R_RISCV_LO12_S)
3343 relax_func = _bfd_riscv_relax_lui;
9d06997a
PD
3344 else if (!bfd_link_pic(info)
3345 && (type == R_RISCV_PCREL_HI20
3346 || type == R_RISCV_PCREL_LO12_I
3347 || type == R_RISCV_PCREL_LO12_S))
3348 relax_func = _bfd_riscv_relax_pc;
45f76423
AW
3349 else if (type == R_RISCV_TPREL_HI20
3350 || type == R_RISCV_TPREL_ADD
3351 || type == R_RISCV_TPREL_LO12_I
3352 || type == R_RISCV_TPREL_LO12_S)
e23eba97 3353 relax_func = _bfd_riscv_relax_tls_le;
45f76423
AW
3354 else
3355 continue;
3356
3357 /* Only relax this reloc if it is paired with R_RISCV_RELAX. */
3358 if (i == sec->reloc_count - 1
3359 || ELFNN_R_TYPE ((rel + 1)->r_info) != R_RISCV_RELAX
3360 || rel->r_offset != (rel + 1)->r_offset)
3361 continue;
3362
3363 /* Skip over the R_RISCV_RELAX. */
3364 i++;
e23eba97 3365 }
ff6f4d9b 3366 else if (info->relax_pass == 1 && type == R_RISCV_DELETE)
07d6d2b8 3367 relax_func = _bfd_riscv_relax_delete;
ff6f4d9b 3368 else if (info->relax_pass == 2 && type == R_RISCV_ALIGN)
e23eba97 3369 relax_func = _bfd_riscv_relax_align;
45f76423 3370 else
e23eba97
NC
3371 continue;
3372
3373 data->relocs = relocs;
3374
3375 /* Read this BFD's contents if we haven't done so already. */
3376 if (!data->this_hdr.contents
3377 && !bfd_malloc_and_get_section (abfd, sec, &data->this_hdr.contents))
3378 goto fail;
3379
3380 /* Read this BFD's symbols if we haven't done so already. */
3381 if (symtab_hdr->sh_info != 0
3382 && !symtab_hdr->contents
3383 && !(symtab_hdr->contents =
3384 (unsigned char *) bfd_elf_get_elf_syms (abfd, symtab_hdr,
3385 symtab_hdr->sh_info,
3386 0, NULL, NULL, NULL)))
3387 goto fail;
3388
3389 /* Get the value of the symbol referred to by the reloc. */
3390 if (ELFNN_R_SYM (rel->r_info) < symtab_hdr->sh_info)
3391 {
3392 /* A local symbol. */
3393 Elf_Internal_Sym *isym = ((Elf_Internal_Sym *) symtab_hdr->contents
3394 + ELFNN_R_SYM (rel->r_info));
45f76423
AW
3395 reserve_size = (isym->st_size - rel->r_addend) > isym->st_size
3396 ? 0 : isym->st_size - rel->r_addend;
e23eba97
NC
3397
3398 if (isym->st_shndx == SHN_UNDEF)
3399 sym_sec = sec, symval = sec_addr (sec) + rel->r_offset;
3400 else
3401 {
3402 BFD_ASSERT (isym->st_shndx < elf_numsections (abfd));
3403 sym_sec = elf_elfsections (abfd)[isym->st_shndx]->bfd_section;
09ca4b9d
JW
3404#if 0
3405 /* The purpose of this code is unknown. It breaks linker scripts
3406 for embedded development that place sections at address zero.
3407 This code is believed to be unnecessary. Disabling it but not
3408 yet removing it, in case something breaks. */
e23eba97
NC
3409 if (sec_addr (sym_sec) == 0)
3410 continue;
09ca4b9d 3411#endif
e23eba97
NC
3412 symval = sec_addr (sym_sec) + isym->st_value;
3413 }
3414 }
3415 else
3416 {
3417 unsigned long indx;
3418 struct elf_link_hash_entry *h;
3419
3420 indx = ELFNN_R_SYM (rel->r_info) - symtab_hdr->sh_info;
3421 h = elf_sym_hashes (abfd)[indx];
3422
3423 while (h->root.type == bfd_link_hash_indirect
3424 || h->root.type == bfd_link_hash_warning)
3425 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3426
3427 if (h->plt.offset != MINUS_ONE)
3428 symval = sec_addr (htab->elf.splt) + h->plt.offset;
3429 else if (h->root.u.def.section->output_section == NULL
3430 || (h->root.type != bfd_link_hash_defined
3431 && h->root.type != bfd_link_hash_defweak))
3432 continue;
3433 else
3434 symval = sec_addr (h->root.u.def.section) + h->root.u.def.value;
3435
45f76423
AW
3436 if (h->type != STT_FUNC)
3437 reserve_size =
3438 (h->size - rel->r_addend) > h->size ? 0 : h->size - rel->r_addend;
e23eba97
NC
3439 sym_sec = h->root.u.def.section;
3440 }
3441
3442 symval += rel->r_addend;
3443
3444 if (!relax_func (abfd, sec, sym_sec, info, rel, symval,
9d06997a
PD
3445 max_alignment, reserve_size, again,
3446 &pcgp_relocs))
e23eba97
NC
3447 goto fail;
3448 }
3449
3450 ret = TRUE;
3451
3452fail:
3453 if (relocs != data->relocs)
3454 free (relocs);
9d06997a 3455 riscv_free_pcgp_relocs(&pcgp_relocs, abfd, sec);
e23eba97
NC
3456
3457 return ret;
3458}
3459
3460#if ARCH_SIZE == 32
3461# define PRSTATUS_SIZE 0 /* FIXME */
3462# define PRSTATUS_OFFSET_PR_CURSIG 12
3463# define PRSTATUS_OFFSET_PR_PID 24
3464# define PRSTATUS_OFFSET_PR_REG 72
3465# define ELF_GREGSET_T_SIZE 128
3466# define PRPSINFO_SIZE 128
3467# define PRPSINFO_OFFSET_PR_PID 16
3468# define PRPSINFO_OFFSET_PR_FNAME 32
3469# define PRPSINFO_OFFSET_PR_PSARGS 48
3470#else
3471# define PRSTATUS_SIZE 376
3472# define PRSTATUS_OFFSET_PR_CURSIG 12
3473# define PRSTATUS_OFFSET_PR_PID 32
3474# define PRSTATUS_OFFSET_PR_REG 112
3475# define ELF_GREGSET_T_SIZE 256
3476# define PRPSINFO_SIZE 136
3477# define PRPSINFO_OFFSET_PR_PID 24
3478# define PRPSINFO_OFFSET_PR_FNAME 40
3479# define PRPSINFO_OFFSET_PR_PSARGS 56
3480#endif
3481
3482/* Support for core dump NOTE sections. */
3483
3484static bfd_boolean
3485riscv_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
3486{
3487 switch (note->descsz)
3488 {
3489 default:
3490 return FALSE;
3491
3492 case PRSTATUS_SIZE: /* sizeof(struct elf_prstatus) on Linux/RISC-V. */
3493 /* pr_cursig */
3494 elf_tdata (abfd)->core->signal
3495 = bfd_get_16 (abfd, note->descdata + PRSTATUS_OFFSET_PR_CURSIG);
3496
3497 /* pr_pid */
3498 elf_tdata (abfd)->core->lwpid
3499 = bfd_get_32 (abfd, note->descdata + PRSTATUS_OFFSET_PR_PID);
3500 break;
3501 }
3502
3503 /* Make a ".reg/999" section. */
3504 return _bfd_elfcore_make_pseudosection (abfd, ".reg", ELF_GREGSET_T_SIZE,
3505 note->descpos + PRSTATUS_OFFSET_PR_REG);
3506}
3507
3508static bfd_boolean
3509riscv_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
3510{
3511 switch (note->descsz)
3512 {
3513 default:
3514 return FALSE;
3515
3516 case PRPSINFO_SIZE: /* sizeof(struct elf_prpsinfo) on Linux/RISC-V. */
3517 /* pr_pid */
3518 elf_tdata (abfd)->core->pid
3519 = bfd_get_32 (abfd, note->descdata + PRPSINFO_OFFSET_PR_PID);
3520
3521 /* pr_fname */
3522 elf_tdata (abfd)->core->program = _bfd_elfcore_strndup
3523 (abfd, note->descdata + PRPSINFO_OFFSET_PR_FNAME, 16);
3524
3525 /* pr_psargs */
3526 elf_tdata (abfd)->core->command = _bfd_elfcore_strndup
3527 (abfd, note->descdata + PRPSINFO_OFFSET_PR_PSARGS, 80);
3528 break;
3529 }
3530
3531 /* Note that for some reason, a spurious space is tacked
3532 onto the end of the args in some (at least one anyway)
3533 implementations, so strip it off if it exists. */
3534
3535 {
3536 char *command = elf_tdata (abfd)->core->command;
3537 int n = strlen (command);
3538
3539 if (0 < n && command[n - 1] == ' ')
3540 command[n - 1] = '\0';
3541 }
3542
3543 return TRUE;
3544}
3545
640d6bfd
KLC
3546/* Set the right mach type. */
3547static bfd_boolean
3548riscv_elf_object_p (bfd *abfd)
3549{
3550 /* There are only two mach types in RISCV currently. */
3551 if (strcmp (abfd->xvec->name, "elf32-littleriscv") == 0)
3552 bfd_default_set_arch_mach (abfd, bfd_arch_riscv, bfd_mach_riscv32);
3553 else
3554 bfd_default_set_arch_mach (abfd, bfd_arch_riscv, bfd_mach_riscv64);
3555
3556 return TRUE;
3557}
3558
e23eba97
NC
3559
3560#define TARGET_LITTLE_SYM riscv_elfNN_vec
3561#define TARGET_LITTLE_NAME "elfNN-littleriscv"
3562
3563#define elf_backend_reloc_type_class riscv_reloc_type_class
3564
3565#define bfd_elfNN_bfd_reloc_name_lookup riscv_reloc_name_lookup
3566#define bfd_elfNN_bfd_link_hash_table_create riscv_elf_link_hash_table_create
3567#define bfd_elfNN_bfd_reloc_type_lookup riscv_reloc_type_lookup
3568#define bfd_elfNN_bfd_merge_private_bfd_data \
3569 _bfd_riscv_elf_merge_private_bfd_data
3570
3571#define elf_backend_copy_indirect_symbol riscv_elf_copy_indirect_symbol
3572#define elf_backend_create_dynamic_sections riscv_elf_create_dynamic_sections
3573#define elf_backend_check_relocs riscv_elf_check_relocs
3574#define elf_backend_adjust_dynamic_symbol riscv_elf_adjust_dynamic_symbol
3575#define elf_backend_size_dynamic_sections riscv_elf_size_dynamic_sections
3576#define elf_backend_relocate_section riscv_elf_relocate_section
3577#define elf_backend_finish_dynamic_symbol riscv_elf_finish_dynamic_symbol
3578#define elf_backend_finish_dynamic_sections riscv_elf_finish_dynamic_sections
3579#define elf_backend_gc_mark_hook riscv_elf_gc_mark_hook
e23eba97 3580#define elf_backend_plt_sym_val riscv_elf_plt_sym_val
07d6d2b8
AM
3581#define elf_backend_grok_prstatus riscv_elf_grok_prstatus
3582#define elf_backend_grok_psinfo riscv_elf_grok_psinfo
3583#define elf_backend_object_p riscv_elf_object_p
e23eba97
NC
3584#define elf_info_to_howto_rel NULL
3585#define elf_info_to_howto riscv_info_to_howto_rela
3586#define bfd_elfNN_bfd_relax_section _bfd_riscv_relax_section
3587
3588#define elf_backend_init_index_section _bfd_elf_init_1_index_section
3589
3590#define elf_backend_can_gc_sections 1
3591#define elf_backend_can_refcount 1
3592#define elf_backend_want_got_plt 1
3593#define elf_backend_plt_readonly 1
3594#define elf_backend_plt_alignment 4
3595#define elf_backend_want_plt_sym 1
3596#define elf_backend_got_header_size (ARCH_SIZE / 8)
5474d94f 3597#define elf_backend_want_dynrelro 1
e23eba97
NC
3598#define elf_backend_rela_normal 1
3599#define elf_backend_default_execstack 0
3600
3601#include "elfNN-target.h"
This page took 0.285314 seconds and 4 git commands to generate.