OpenCores
URL https://opencores.org/ocsvn/openrisc/openrisc/trunk

Subversion Repositories openrisc

[/] [openrisc/] [tags/] [gnu-src/] [gdb-6.8/] [pre-binutils-2.20.1-sync/] [bfd/] [elf32-bfin.c] - Blame information for rev 513

Go to most recent revision | Details | Compare with Previous | View Log

Line No. Rev Author Line
1 24 jeremybenn
/* ADI Blackfin BFD support for 32-bit ELF.
2
   Copyright 2005, 2006, 2007 Free Software Foundation, Inc.
3
 
4
   This file is part of BFD, the Binary File Descriptor library.
5
 
6
   This program is free software; you can redistribute it and/or modify
7
   it under the terms of the GNU General Public License as published by
8
   the Free Software Foundation; either version 3 of the License, or
9
   (at your option) any later version.
10
 
11
   This program is distributed in the hope that it will be useful,
12
   but WITHOUT ANY WARRANTY; without even the implied warranty of
13
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14
   GNU General Public License for more details.
15
 
16
   You should have received a copy of the GNU General Public License
17
   along with this program; if not, write to the Free Software
18
   Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
19
   MA 02110-1301, USA.  */
20
 
21
#include "sysdep.h"
22
#include "bfd.h"
23
#include "libbfd.h"
24
#include "elf-bfd.h"
25
#include "elf/bfin.h"
26
#include "elf/dwarf2.h"
27
#include "hashtab.h"
28
 
29
/* FUNCTION : bfin_pltpc_reloc
30
   ABSTRACT : TODO : figure out how to handle pltpc relocs.  */
31
static bfd_reloc_status_type
32
bfin_pltpc_reloc (
33
     bfd *abfd ATTRIBUTE_UNUSED,
34
     arelent *reloc_entry ATTRIBUTE_UNUSED,
35
     asymbol *symbol ATTRIBUTE_UNUSED,
36
     PTR data ATTRIBUTE_UNUSED,
37
     asection *input_section ATTRIBUTE_UNUSED,
38
     bfd *output_bfd ATTRIBUTE_UNUSED,
39
     char **error_message ATTRIBUTE_UNUSED)
40
{
41
  bfd_reloc_status_type flag = bfd_reloc_ok;
42
  return flag;
43
}
44
 
45
 
46
static bfd_reloc_status_type
47
bfin_pcrel24_reloc (bfd *abfd,
48
                    arelent *reloc_entry,
49
                    asymbol *symbol,
50
                    PTR data,
51
                    asection *input_section,
52
                    bfd *output_bfd,
53
                    char **error_message ATTRIBUTE_UNUSED)
54
{
55
  bfd_vma relocation;
56
  bfd_size_type addr = reloc_entry->address;
57
  bfd_vma output_base = 0;
58
  reloc_howto_type *howto = reloc_entry->howto;
59
  asection *output_section;
60
  bfd_boolean relocatable = (output_bfd != NULL);
61
 
62
  if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
63
    return bfd_reloc_outofrange;
64
 
65
  if (bfd_is_und_section (symbol->section)
66
      && (symbol->flags & BSF_WEAK) == 0
67
      && !relocatable)
68
    return bfd_reloc_undefined;
69
 
70
  if (bfd_is_com_section (symbol->section))
71
    relocation = 0;
72
  else
73
    relocation = symbol->value;
74
 
75
  output_section = symbol->section->output_section;
76
 
77
  if (relocatable)
78
    output_base = 0;
79
  else
80
    output_base = output_section->vma;
81
 
82
  if (!relocatable || !strcmp (symbol->name, symbol->section->name))
83
    relocation += output_base + symbol->section->output_offset;
84
 
85
  if (!relocatable && !strcmp (symbol->name, symbol->section->name))
86
    relocation += reloc_entry->addend;
87
 
88
  relocation -= input_section->output_section->vma + input_section->output_offset;
89
  relocation -= reloc_entry->address;
90
 
91
  if (howto->complain_on_overflow != complain_overflow_dont)
92
    {
93
      bfd_reloc_status_type status;
94
      status = bfd_check_overflow (howto->complain_on_overflow,
95
                                   howto->bitsize,
96
                                   howto->rightshift,
97
                                   bfd_arch_bits_per_address(abfd),
98
                                   relocation);
99
      if (status != bfd_reloc_ok)
100
        return status;
101
    }
102
 
103
  /* if rightshift is 1 and the number odd, return error.  */
104
  if (howto->rightshift && (relocation & 0x01))
105
    {
106
      fprintf(stderr, "relocation should be even number\n");
107
      return bfd_reloc_overflow;
108
    }
109
 
110
  relocation >>= (bfd_vma) howto->rightshift;
111
  /* Shift everything up to where it's going to be used.  */
112
 
113
  relocation <<= (bfd_vma) howto->bitpos;
114
 
115
  if (relocatable)
116
    {
117
      reloc_entry->address += input_section->output_offset;
118
      reloc_entry->addend += symbol->section->output_offset;
119
    }
120
 
121
  {
122
    short x;
123
 
124
    /* We are getting reloc_entry->address 2 byte off from
125
       the start of instruction. Assuming absolute postion
126
       of the reloc data. But, following code had been written assuming
127
       reloc address is starting at begining of instruction.
128
       To compensate that I have increased the value of
129
       relocation by 1 (effectively 2) and used the addr -2 instead of addr.  */
130
 
131
    relocation += 1;
132
    x = bfd_get_16 (abfd, (bfd_byte *) data + addr - 2);
133
    x = (x & 0xff00) | ((relocation >> 16) & 0xff);
134
    bfd_put_16 (abfd, x, (unsigned char *) data + addr - 2);
135
 
136
    x = bfd_get_16 (abfd, (bfd_byte *) data + addr);
137
    x = relocation & 0xFFFF;
138
    bfd_put_16 (abfd, x, (unsigned char *) data + addr );
139
  }
140
  return bfd_reloc_ok;
141
}
142
 
143
static bfd_reloc_status_type
144
bfin_imm16_reloc (bfd *abfd,
145
                  arelent *reloc_entry,
146
                  asymbol *symbol,
147
                  PTR data,
148
                  asection *input_section,
149
                  bfd *output_bfd,
150
                  char **error_message ATTRIBUTE_UNUSED)
151
{
152
  bfd_vma relocation, x;
153
  bfd_size_type reloc_addr = reloc_entry->address;
154
  bfd_vma output_base = 0;
155
  reloc_howto_type *howto = reloc_entry->howto;
156
  asection *output_section;
157
  bfd_boolean relocatable = (output_bfd != NULL);
158
 
159
  /* Is the address of the relocation really within the section?  */
160
  if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
161
    return bfd_reloc_outofrange;
162
 
163
  if (bfd_is_und_section (symbol->section)
164
      && (symbol->flags & BSF_WEAK) == 0
165
      && !relocatable)
166
    return bfd_reloc_undefined;
167
 
168
  output_section = symbol->section->output_section;
169
  relocation = symbol->value;
170
 
171
  /* Convert input-section-relative symbol value to absolute.  */
172
  if (relocatable)
173
    output_base = 0;
174
  else
175
    output_base = output_section->vma;
176
 
177
  if (!relocatable || !strcmp (symbol->name, symbol->section->name))
178
    relocation += output_base + symbol->section->output_offset;
179
 
180
  /* Add in supplied addend.  */
181
  relocation += reloc_entry->addend;
182
 
183
  if (relocatable)
184
    {
185
      reloc_entry->address += input_section->output_offset;
186
      reloc_entry->addend += symbol->section->output_offset;
187
    }
188
  else
189
    {
190
      reloc_entry->addend = 0;
191
    }
192
 
193
  if (howto->complain_on_overflow != complain_overflow_dont)
194
    {
195
      bfd_reloc_status_type flag;
196
      flag = bfd_check_overflow (howto->complain_on_overflow,
197
                                 howto->bitsize,
198
                                 howto->rightshift,
199
                                 bfd_arch_bits_per_address(abfd),
200
                                 relocation);
201
      if (flag != bfd_reloc_ok)
202
        return flag;
203
    }
204
 
205
  /* Here the variable relocation holds the final address of the
206
     symbol we are relocating against, plus any addend.  */
207
 
208
  relocation >>= (bfd_vma) howto->rightshift;
209
  x = relocation;
210
  bfd_put_16 (abfd, x, (unsigned char *) data + reloc_addr);
211
  return bfd_reloc_ok;
212
}
213
 
214
 
215
static bfd_reloc_status_type
216
bfin_byte4_reloc (bfd *abfd,
217
                  arelent *reloc_entry,
218
                  asymbol *symbol,
219
                  PTR data,
220
                  asection *input_section,
221
                  bfd *output_bfd,
222
                  char **error_message ATTRIBUTE_UNUSED)
223
{
224
  bfd_vma relocation, x;
225
  bfd_size_type addr = reloc_entry->address;
226
  bfd_vma output_base = 0;
227
  asection *output_section;
228
  bfd_boolean relocatable = (output_bfd != NULL);
229
 
230
  /* Is the address of the relocation really within the section?  */
231
  if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
232
    return bfd_reloc_outofrange;
233
 
234
  if (bfd_is_und_section (symbol->section)
235
      && (symbol->flags & BSF_WEAK) == 0
236
      && !relocatable)
237
    return bfd_reloc_undefined;
238
 
239
  output_section = symbol->section->output_section;
240
  relocation = symbol->value;
241
  /* Convert input-section-relative symbol value to absolute.  */
242
  if (relocatable)
243
    output_base = 0;
244
  else
245
    output_base = output_section->vma;
246
 
247
  if ((symbol->name
248
       && symbol->section->name
249
       && !strcmp (symbol->name, symbol->section->name))
250
      || !relocatable)
251
    {
252
      relocation += output_base + symbol->section->output_offset;
253
    }
254
 
255
  relocation += reloc_entry->addend;
256
 
257
  if (relocatable)
258
    {
259
      /* This output will be relocatable ... like ld -r. */
260
      reloc_entry->address += input_section->output_offset;
261
      reloc_entry->addend += symbol->section->output_offset;
262
    }
263
  else
264
    {
265
      reloc_entry->addend = 0;
266
    }
267
 
268
  /* Here the variable relocation holds the final address of the
269
     symbol we are relocating against, plus any addend.  */
270
  x = relocation & 0xFFFF0000;
271
  x >>=16;
272
  bfd_put_16 (abfd, x, (unsigned char *) data + addr + 2);
273
 
274
  x = relocation & 0x0000FFFF;
275
  bfd_put_16 (abfd, x, (unsigned char *) data + addr);
276
  return bfd_reloc_ok;
277
}
278
 
279
/* bfin_bfd_reloc handles the blackfin arithmetic relocations.
280
   Use this instead of bfd_perform_relocation.  */
281
static bfd_reloc_status_type
282
bfin_bfd_reloc (bfd *abfd,
283
                arelent *reloc_entry,
284
                asymbol *symbol,
285
                PTR data,
286
                asection *input_section,
287
                bfd *output_bfd,
288
                char **error_message ATTRIBUTE_UNUSED)
289
{
290
  bfd_vma relocation;
291
  bfd_size_type addr = reloc_entry->address;
292
  bfd_vma output_base = 0;
293
  reloc_howto_type *howto = reloc_entry->howto;
294
  asection *output_section;
295
  bfd_boolean relocatable = (output_bfd != NULL);
296
 
297
  /* Is the address of the relocation really within the section?  */
298
  if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
299
    return bfd_reloc_outofrange;
300
 
301
  if (bfd_is_und_section (symbol->section)
302
      && (symbol->flags & BSF_WEAK) == 0
303
      && !relocatable)
304
    return bfd_reloc_undefined;
305
 
306
  /* Get symbol value.  (Common symbols are special.)  */
307
  if (bfd_is_com_section (symbol->section))
308
    relocation = 0;
309
  else
310
    relocation = symbol->value;
311
 
312
  output_section = symbol->section->output_section;
313
 
314
  /* Convert input-section-relative symbol value to absolute.  */
315
  if (relocatable)
316
    output_base = 0;
317
  else
318
    output_base = output_section->vma;
319
 
320
  if (!relocatable || !strcmp (symbol->name, symbol->section->name))
321
    relocation += output_base + symbol->section->output_offset;
322
 
323
  if (!relocatable && !strcmp (symbol->name, symbol->section->name))
324
    {
325
      /* Add in supplied addend.  */
326
      relocation += reloc_entry->addend;
327
    }
328
 
329
  /* Here the variable relocation holds the final address of the
330
     symbol we are relocating against, plus any addend.  */
331
 
332
  if (howto->pc_relative == TRUE)
333
    {
334
      relocation -= input_section->output_section->vma + input_section->output_offset;
335
 
336
      if (howto->pcrel_offset == TRUE)
337
        relocation -= reloc_entry->address;
338
    }
339
 
340
  if (relocatable)
341
    {
342
      reloc_entry->address += input_section->output_offset;
343
      reloc_entry->addend += symbol->section->output_offset;
344
    }
345
 
346
  if (howto->complain_on_overflow != complain_overflow_dont)
347
    {
348
      bfd_reloc_status_type status;
349
 
350
      status = bfd_check_overflow (howto->complain_on_overflow,
351
                                  howto->bitsize,
352
                                  howto->rightshift,
353
                                  bfd_arch_bits_per_address(abfd),
354
                                  relocation);
355
      if (status != bfd_reloc_ok)
356
        return status;
357
    }
358
 
359
  /* If rightshift is 1 and the number odd, return error.  */
360
  if (howto->rightshift && (relocation & 0x01))
361
    {
362
      fprintf(stderr, "relocation should be even number\n");
363
      return bfd_reloc_overflow;
364
    }
365
 
366
  relocation >>= (bfd_vma) howto->rightshift;
367
 
368
  /* Shift everything up to where it's going to be used.  */
369
 
370
  relocation <<= (bfd_vma) howto->bitpos;
371
 
372
#define DOIT(x)                                                         \
373
  x = ( (x & ~howto->dst_mask) | (relocation & howto->dst_mask))
374
 
375
  /* handle 8 and 16 bit relocations here. */
376
  switch (howto->size)
377
    {
378
    case 0:
379
      {
380
        char x = bfd_get_8 (abfd, (char *) data + addr);
381
        DOIT (x);
382
        bfd_put_8 (abfd, x, (unsigned char *) data + addr);
383
      }
384
      break;
385
 
386
    case 1:
387
      {
388
        unsigned short x = bfd_get_16 (abfd, (bfd_byte *) data + addr);
389
        DOIT (x);
390
        bfd_put_16 (abfd, (bfd_vma) x, (unsigned char *) data + addr);
391
      }
392
      break;
393
 
394
    default:
395
      return bfd_reloc_other;
396
    }
397
 
398
  return bfd_reloc_ok;
399
}
400
 
401
/* HOWTO Table for blackfin.
402
   Blackfin relocations are fairly complicated.
403
   Some of the salient features are
404
   a. Even numbered offsets. A number of (not all) relocations are
405
      even numbered. This means that the rightmost bit is not stored.
406
      Needs to right shift by 1 and check to see if value is not odd
407
   b. A relocation can be an expression. An expression takes on
408
      a variety of relocations arranged in a stack.
409
   As a result, we cannot use the standard generic function as special
410
   function. We will have our own, which is very similar to the standard
411
   generic function except that it understands how to get the value from
412
   the relocation stack. .  */
413
 
414
#define BFIN_RELOC_MIN 0
415
#define BFIN_RELOC_MAX 0x21
416
#define BFIN_GNUEXT_RELOC_MIN 0x40
417
#define BFIN_GNUEXT_RELOC_MAX 0x43
418
#define BFIN_ARELOC_MIN 0xE0
419
#define BFIN_ARELOC_MAX 0xF3
420
 
421
static reloc_howto_type bfin_howto_table [] =
422
{
423
  /* This reloc does nothing. .  */
424
  HOWTO (R_unused0,             /* type.  */
425
         0,                      /* rightshift.  */
426
         2,                     /* size (0 = byte, 1 = short, 2 = long).  */
427
         32,                    /* bitsize.  */
428
         FALSE,                 /* pc_relative.  */
429
         0,                      /* bitpos.  */
430
         complain_overflow_bitfield, /* complain_on_overflow.  */
431
         bfd_elf_generic_reloc, /* special_function.  */
432
         "R_unused0",           /* name.  */
433
         FALSE,                 /* partial_inplace.  */
434
         0,                      /* src_mask.  */
435
         0,                      /* dst_mask.  */
436
         FALSE),                /* pcrel_offset.  */
437
 
438
  HOWTO (R_pcrel5m2,            /* type.  */
439
         1,                     /* rightshift.  */
440
         1,                     /* size (0 = byte, 1 = short, 2 = long)..  */
441
         4,                     /* bitsize.  */
442
         TRUE,                  /* pc_relative.  */
443
         0,                      /* bitpos.  */
444
         complain_overflow_unsigned, /* complain_on_overflow.  */
445
         bfin_bfd_reloc,        /* special_function.  */
446
         "R_pcrel5m2",          /* name.  */
447
         FALSE,                 /* partial_inplace.  */
448
         0,                      /* src_mask.  */
449
         0x0000000F,            /* dst_mask.  */
450
         FALSE),                /* pcrel_offset.  */
451
 
452
  HOWTO (R_unused1,             /* type.  */
453
         0,                      /* rightshift.  */
454
         2,                     /* size (0 = byte, 1 = short, 2 = long).  */
455
         32,                    /* bitsize.  */
456
         FALSE,                 /* pc_relative.  */
457
         0,                      /* bitpos.  */
458
         complain_overflow_bitfield, /* complain_on_overflow.  */
459
         bfd_elf_generic_reloc, /* special_function.  */
460
         "R_unused1",           /* name.  */
461
         FALSE,                 /* partial_inplace.  */
462
         0,                      /* src_mask.  */
463
         0,                      /* dst_mask.  */
464
         FALSE),                /* pcrel_offset.  */
465
 
466
  HOWTO (R_pcrel10,             /* type.  */
467
         1,                     /* rightshift.  */
468
         1,                     /* size (0 = byte, 1 = short, 2 = long).  */
469
         10,                    /* bitsize.  */
470
         TRUE,                  /* pc_relative.  */
471
         0,                      /* bitpos.  */
472
         complain_overflow_signed, /* complain_on_overflow.  */
473
         bfin_bfd_reloc,        /* special_function.  */
474
         "R_pcrel10",           /* name.  */
475
         FALSE,                 /* partial_inplace.  */
476
         0,                      /* src_mask.  */
477
         0x000003FF,            /* dst_mask.  */
478
         TRUE),                 /* pcrel_offset.  */
479
 
480
  HOWTO (R_pcrel12_jump,        /* type.  */
481
         1,                     /* rightshift.  */
482
                                /* the offset is actually 13 bit
483
                                   aligned on a word boundary so
484
                                   only 12 bits have to be used.
485
                                   Right shift the rightmost bit..  */
486
         1,                     /* size (0 = byte, 1 = short, 2 = long).  */
487
         12,                    /* bitsize.  */
488
         TRUE,                  /* pc_relative.  */
489
         0,                      /* bitpos.  */
490
         complain_overflow_signed, /* complain_on_overflow.  */
491
         bfin_bfd_reloc,        /* special_function.  */
492
         "R_pcrel12_jump",      /* name.  */
493
         FALSE,                 /* partial_inplace.  */
494
         0,                      /* src_mask.  */
495
         0x0FFF,                /* dst_mask.  */
496
         TRUE),                 /* pcrel_offset.  */
497
 
498
  HOWTO (R_rimm16,              /* type.  */
499
         0,                      /* rightshift.  */
500
         1,                     /* size (0 = byte, 1 = short, 2 = long).  */
501
         16,                    /* bitsize.  */
502
         FALSE,                 /* pc_relative.  */
503
         0,                      /* bitpos.  */
504
         complain_overflow_signed, /* complain_on_overflow.  */
505
         bfin_imm16_reloc,      /* special_function.  */
506
         "R_rimm16",            /* name.  */
507
         FALSE,                 /* partial_inplace.  */
508
         0,                      /* src_mask.  */
509
         0x0000FFFF,            /* dst_mask.  */
510
         TRUE),                 /* pcrel_offset.  */
511
 
512
  HOWTO (R_luimm16,             /* type.  */
513
         0,                      /* rightshift.  */
514
         1,                     /* size (0 = byte, 1 = short, 2 = long).  */
515
         16,                    /* bitsize.  */
516
         FALSE,                 /* pc_relative.  */
517
         0,                      /* bitpos.  */
518
         complain_overflow_dont, /* complain_on_overflow.  */
519
         bfin_imm16_reloc,      /* special_function.  */
520
         "R_luimm16",           /* name.  */
521
         FALSE,                 /* partial_inplace.  */
522
         0,                      /* src_mask.  */
523
         0x0000FFFF,            /* dst_mask.  */
524
         TRUE),                 /* pcrel_offset.  */
525
 
526
  HOWTO (R_huimm16,             /* type.  */
527
         16,                    /* rightshift.  */
528
         1,                     /* size (0 = byte, 1 = short, 2 = long).  */
529
         16,                    /* bitsize.  */
530
         FALSE,                 /* pc_relative.  */
531
         0,                      /* bitpos.  */
532
         complain_overflow_unsigned, /* complain_on_overflow.  */
533
         bfin_imm16_reloc,      /* special_function.  */
534
         "R_huimm16",           /* name.  */
535
         FALSE,                 /* partial_inplace.  */
536
         0,                      /* src_mask.  */
537
         0x0000FFFF,            /* dst_mask.  */
538
         TRUE),                 /* pcrel_offset.  */
539
 
540
  HOWTO (R_pcrel12_jump_s,      /* type.  */
541
         1,                     /* rightshift.  */
542
         1,                     /* size (0 = byte, 1 = short, 2 = long).  */
543
         12,                    /* bitsize.  */
544
         TRUE,                  /* pc_relative.  */
545
         0,                      /* bitpos.  */
546
         complain_overflow_signed, /* complain_on_overflow.  */
547
         bfin_bfd_reloc,        /* special_function.  */
548
         "R_pcrel12_jump_s",    /* name.  */
549
         FALSE,                 /* partial_inplace.  */
550
         0,                      /* src_mask.  */
551
         0x00000FFF,            /* dst_mask.  */
552
         TRUE),                 /* pcrel_offset.  */
553
 
554
  HOWTO (R_pcrel24_jump_x,      /* type.  */
555
         1,                     /* rightshift.  */
556
         2,                     /* size (0 = byte, 1 = short, 2 = long).  */
557
         24,                    /* bitsize.  */
558
         TRUE,                  /* pc_relative.  */
559
         0,                      /* bitpos.  */
560
         complain_overflow_signed, /* complain_on_overflow.  */
561
         bfin_pcrel24_reloc,    /* special_function.  */
562
         "R_pcrel24_jump_x",    /* name.  */
563
         FALSE,                 /* partial_inplace.  */
564
         0,                      /* src_mask.  */
565
         0x00FFFFFF,            /* dst_mask.  */
566
         TRUE),                 /* pcrel_offset.  */
567
 
568
  HOWTO (R_pcrel24,             /* type.  */
569
         1,                     /* rightshift.  */
570
         2,                     /* size (0 = byte, 1 = short, 2 = long).  */
571
         24,                    /* bitsize.  */
572
         TRUE,                  /* pc_relative.  */
573
         0,                      /* bitpos.  */
574
         complain_overflow_signed, /* complain_on_overflow.  */
575
         bfin_pcrel24_reloc,    /* special_function.  */
576
         "R_pcrel24",           /* name.  */
577
         FALSE,                 /* partial_inplace.  */
578
         0,                      /* src_mask.  */
579
         0x00FFFFFF,            /* dst_mask.  */
580
         TRUE),                 /* pcrel_offset.  */
581
 
582
  HOWTO (R_unusedb,             /* type.  */
583
         0,                      /* rightshift.  */
584
         2,                     /* size (0 = byte, 1 = short, 2 = long).  */
585
         32,                    /* bitsize.  */
586
         FALSE,                 /* pc_relative.  */
587
         0,                      /* bitpos.  */
588
         complain_overflow_dont, /* complain_on_overflow.  */
589
         bfd_elf_generic_reloc, /* special_function.  */
590
         "R_unusedb",           /* name.  */
591
         FALSE,                 /* partial_inplace.  */
592
         0,                      /* src_mask.  */
593
         0,                      /* dst_mask.  */
594
         FALSE),                /* pcrel_offset.  */
595
 
596
  HOWTO (R_unusedc,             /* type.  */
597
         0,                      /* rightshift.  */
598
         2,                     /* size (0 = byte, 1 = short, 2 = long).  */
599
         32,                    /* bitsize.  */
600
         FALSE,                 /* pc_relative.  */
601
         0,                      /* bitpos.  */
602
         complain_overflow_dont, /* complain_on_overflow.  */
603
         bfd_elf_generic_reloc, /* special_function.  */
604
         "R_unusedc",           /* name.  */
605
         FALSE,                 /* partial_inplace.  */
606
         0,                      /* src_mask.  */
607
         0,                      /* dst_mask.  */
608
         FALSE),                /* pcrel_offset.  */
609
 
610
  HOWTO (R_pcrel24_jump_l,      /* type.  */
611
         1,                     /* rightshift.  */
612
         2,                     /* size (0 = byte, 1 = short, 2 = long).  */
613
         24,                    /* bitsize.  */
614
         TRUE,                  /* pc_relative.  */
615
         0,                      /* bitpos.  */
616
         complain_overflow_signed, /* complain_on_overflow.  */
617
         bfin_pcrel24_reloc,    /* special_function.  */
618
         "R_pcrel24_jump_l",    /* name.  */
619
         FALSE,                 /* partial_inplace.  */
620
         0,                      /* src_mask.  */
621
         0x00FFFFFF,            /* dst_mask.  */
622
         TRUE),                 /* pcrel_offset.  */
623
 
624
  HOWTO (R_pcrel24_call_x,      /* type.  */
625
         1,                     /* rightshift.  */
626
         2,                     /* size (0 = byte, 1 = short, 2 = long).  */
627
         24,                    /* bitsize.  */
628
         TRUE,                  /* pc_relative.  */
629
         0,                      /* bitpos.  */
630
         complain_overflow_signed, /* complain_on_overflow.  */
631
         bfin_pcrel24_reloc,    /* special_function.  */
632
         "R_pcrel24_call_x",    /* name.  */
633
         FALSE,                 /* partial_inplace.  */
634
         0,                      /* src_mask.  */
635
         0x00FFFFFF,            /* dst_mask.  */
636
         TRUE),                 /* pcrel_offset.  */
637
 
638
  HOWTO (R_var_eq_symb,         /* type.  */
639
         0,                      /* rightshift.  */
640
         2,                     /* size (0 = byte, 1 = short, 2 = long).  */
641
         32,                    /* bitsize.  */
642
         FALSE,                 /* pc_relative.  */
643
         0,                      /* bitpos.  */
644
         complain_overflow_bitfield, /* complain_on_overflow.  */
645
         bfin_bfd_reloc,        /* special_function.  */
646
         "R_var_eq_symb",               /* name.  */
647
         FALSE,                 /* partial_inplace.  */
648
         0,                      /* src_mask.  */
649
         0,                      /* dst_mask.  */
650
         FALSE),                /* pcrel_offset.  */
651
 
652
  HOWTO (R_byte_data,           /* type.  */
653
         0,                      /* rightshift.  */
654
         0,                      /* size (0 = byte, 1 = short, 2 = long).  */
655
         8,                     /* bitsize.  */
656
         FALSE,                 /* pc_relative.  */
657
         0,                      /* bitpos.  */
658
         complain_overflow_unsigned, /* complain_on_overflow.  */
659
         bfin_bfd_reloc,        /* special_function.  */
660
         "R_byte_data",         /* name.  */
661
         FALSE,                 /* partial_inplace.  */
662
         0,                      /* src_mask.  */
663
         0xFF,                  /* dst_mask.  */
664
         TRUE),                 /* pcrel_offset.  */
665
 
666
  HOWTO (R_byte2_data,          /* type.  */
667
         0,                      /* rightshift.  */
668
         1,                     /* size (0 = byte, 1 = short, 2 = long).  */
669
         16,                    /* bitsize.  */
670
         FALSE,                 /* pc_relative.  */
671
         0,                      /* bitpos.  */
672
         complain_overflow_signed, /* complain_on_overflow.  */
673
         bfin_bfd_reloc,        /* special_function.  */
674
         "R_byte2_data",        /* name.  */
675
         FALSE,                 /* partial_inplace.  */
676
         0,                      /* src_mask.  */
677
         0xFFFF,                /* dst_mask.  */
678
         TRUE),                 /* pcrel_offset.  */
679
 
680
  HOWTO (R_byte4_data,          /* type.  */
681
         0,                      /* rightshift.  */
682
         2,                     /* size (0 = byte, 1 = short, 2 = long).  */
683
         32,                    /* bitsize.  */
684
         FALSE,                 /* pc_relative.  */
685
         0,                      /* bitpos.  */
686
         complain_overflow_unsigned, /* complain_on_overflow.  */
687
         bfin_byte4_reloc,      /* special_function.  */
688
         "R_byte4_data",        /* name.  */
689
         FALSE,                 /* partial_inplace.  */
690
         0,                      /* src_mask.  */
691
         0xFFFFFFFF,            /* dst_mask.  */
692
         TRUE),                 /* pcrel_offset.  */
693
 
694
  HOWTO (R_pcrel11,             /* type.  */
695
         1,                     /* rightshift.  */
696
         1,                     /* size (0 = byte, 1 = short, 2 = long).  */
697
         10,                    /* bitsize.  */
698
         TRUE,                  /* pc_relative.  */
699
         0,                      /* bitpos.  */
700
         complain_overflow_unsigned, /* complain_on_overflow.  */
701
         bfin_bfd_reloc,        /* special_function.  */
702
         "R_pcrel11",           /* name.  */
703
         FALSE,                 /* partial_inplace.  */
704
         0,                      /* src_mask.  */
705
         0x000003FF,            /* dst_mask.  */
706
         FALSE),                /* pcrel_offset.  */
707
 
708
 
709
  /* A 18-bit signed operand with the GOT offset for the address of
710
     the symbol.  */
711
  HOWTO (R_BFIN_GOT17M4,        /* type */
712
         2,                     /* rightshift */
713
         1,                     /* size (0 = byte, 1 = short, 2 = long) */
714
         16,                    /* bitsize */
715
         FALSE,                 /* pc_relative */
716
         0,                      /* bitpos */
717
         complain_overflow_signed, /* complain_on_overflow */
718
         bfd_elf_generic_reloc, /* special_function */
719
         "R_BFIN_GOT17M4",      /* name */
720
         FALSE,                 /* partial_inplace */
721
         0xffff,                /* src_mask */
722
         0xffff,                /* dst_mask */
723
         FALSE),                /* pcrel_offset */
724
 
725
  /* The upper 16 bits of the GOT offset for the address of the
726
     symbol.  */
727
  HOWTO (R_BFIN_GOTHI,          /* type */
728
         0,                      /* rightshift */
729
         1,                     /* size (0 = byte, 1 = short, 2 = long) */
730
         16,                    /* bitsize */
731
         FALSE,                 /* pc_relative */
732
         0,                      /* bitpos */
733
         complain_overflow_dont, /* complain_on_overflow */
734
         bfd_elf_generic_reloc, /* special_function */
735
         "R_BFIN_GOTHI",                /* name */
736
         FALSE,                 /* partial_inplace */
737
         0xffff,                        /* src_mask */
738
         0xffff,                /* dst_mask */
739
         FALSE),                /* pcrel_offset */
740
 
741
  /* The lower 16 bits of the GOT offset for the address of the
742
     symbol.  */
743
  HOWTO (R_BFIN_GOTLO,          /* type */
744
         0,                      /* rightshift */
745
         1,                     /* size (0 = byte, 1 = short, 2 = long) */
746
         16,                    /* bitsize */
747
         FALSE,                 /* pc_relative */
748
         0,                      /* bitpos */
749
         complain_overflow_dont, /* complain_on_overflow */
750
         bfd_elf_generic_reloc, /* special_function */
751
         "R_BFIN_GOTLO",                /* name */
752
         FALSE,                 /* partial_inplace */
753
         0xffff,                /* src_mask */
754
         0xffff,                /* dst_mask */
755
         FALSE),                /* pcrel_offset */
756
 
757
  /* The 32-bit address of the canonical descriptor of a function.  */
758
  HOWTO (R_BFIN_FUNCDESC,       /* type */
759
         0,                      /* rightshift */
760
         2,                     /* size (0 = byte, 1 = short, 2 = long) */
761
         32,                    /* bitsize */
762
         FALSE,                 /* pc_relative */
763
         0,                      /* bitpos */
764
         complain_overflow_bitfield, /* complain_on_overflow */
765
         bfd_elf_generic_reloc, /* special_function */
766
         "R_BFIN_FUNCDESC",     /* name */
767
         FALSE,                 /* partial_inplace */
768
         0xffffffff,            /* src_mask */
769
         0xffffffff,            /* dst_mask */
770
         FALSE),                /* pcrel_offset */
771
 
772
  /* A 12-bit signed operand with the GOT offset for the address of
773
     canonical descriptor of a function.  */
774
  HOWTO (R_BFIN_FUNCDESC_GOT17M4,       /* type */
775
         2,                     /* rightshift */
776
         1,                     /* size (0 = byte, 1 = short, 2 = long) */
777
         16,                    /* bitsize */
778
         FALSE,                 /* pc_relative */
779
         0,                      /* bitpos */
780
         complain_overflow_signed, /* complain_on_overflow */
781
         bfd_elf_generic_reloc, /* special_function */
782
         "R_BFIN_FUNCDESC_GOT17M4", /* name */
783
         FALSE,                 /* partial_inplace */
784
         0xffff,                /* src_mask */
785
         0xffff,                /* dst_mask */
786
         FALSE),                /* pcrel_offset */
787
 
788
  /* The upper 16 bits of the GOT offset for the address of the
789
     canonical descriptor of a function.  */
790
  HOWTO (R_BFIN_FUNCDESC_GOTHI, /* type */
791
         0,                      /* rightshift */
792
         1,                     /* size (0 = byte, 1 = short, 2 = long) */
793
         16,                    /* bitsize */
794
         FALSE,                 /* pc_relative */
795
         0,                      /* bitpos */
796
         complain_overflow_dont, /* complain_on_overflow */
797
         bfd_elf_generic_reloc, /* special_function */
798
         "R_BFIN_FUNCDESC_GOTHI", /* name */
799
         FALSE,                 /* partial_inplace */
800
         0xffff,                /* src_mask */
801
         0xffff,                /* dst_mask */
802
         FALSE),                /* pcrel_offset */
803
 
804
  /* The lower 16 bits of the GOT offset for the address of the
805
     canonical descriptor of a function.  */
806
  HOWTO (R_BFIN_FUNCDESC_GOTLO, /* type */
807
         0,                      /* rightshift */
808
         1,                     /* size (0 = byte, 1 = short, 2 = long) */
809
         16,                    /* bitsize */
810
         FALSE,                 /* pc_relative */
811
         0,                      /* bitpos */
812
         complain_overflow_dont, /* complain_on_overflow */
813
         bfd_elf_generic_reloc, /* special_function */
814
         "R_BFIN_FUNCDESC_GOTLO", /* name */
815
         FALSE,                 /* partial_inplace */
816
         0xffff,                /* src_mask */
817
         0xffff,                /* dst_mask */
818
         FALSE),                /* pcrel_offset */
819
 
820
  /* The 32-bit address of the canonical descriptor of a function.  */
821
  HOWTO (R_BFIN_FUNCDESC_VALUE, /* type */
822
         0,                      /* rightshift */
823
         2,                     /* size (0 = byte, 1 = short, 2 = long) */
824
         64,                    /* bitsize */
825
         FALSE,                 /* pc_relative */
826
         0,                      /* bitpos */
827
         complain_overflow_bitfield, /* complain_on_overflow */
828
         bfd_elf_generic_reloc, /* special_function */
829
         "R_BFIN_FUNCDESC_VALUE", /* name */
830
         FALSE,                 /* partial_inplace */
831
         0xffffffff,            /* src_mask */
832
         0xffffffff,            /* dst_mask */
833
         FALSE),                /* pcrel_offset */
834
 
835
  /* A 12-bit signed operand with the GOT offset for the address of
836
     canonical descriptor of a function.  */
837
  HOWTO (R_BFIN_FUNCDESC_GOTOFF17M4, /* type */
838
         2,                     /* rightshift */
839
         1,                     /* size (0 = byte, 1 = short, 2 = long) */
840
         16,                    /* bitsize */
841
         FALSE,                 /* pc_relative */
842
         0,                      /* bitpos */
843
         complain_overflow_signed, /* complain_on_overflow */
844
         bfd_elf_generic_reloc, /* special_function */
845
         "R_BFIN_FUNCDESC_GOTOFF17M4", /* name */
846
         FALSE,                 /* partial_inplace */
847
         0xffff,                /* src_mask */
848
         0xffff,                /* dst_mask */
849
         FALSE),                /* pcrel_offset */
850
 
851
  /* The upper 16 bits of the GOT offset for the address of the
852
     canonical descriptor of a function.  */
853
  HOWTO (R_BFIN_FUNCDESC_GOTOFFHI, /* type */
854
         0,                      /* rightshift */
855
         1,                     /* size (0 = byte, 1 = short, 2 = long) */
856
         16,                    /* bitsize */
857
         FALSE,                 /* pc_relative */
858
         0,                      /* bitpos */
859
         complain_overflow_dont, /* complain_on_overflow */
860
         bfd_elf_generic_reloc, /* special_function */
861
         "R_BFIN_FUNCDESC_GOTOFFHI", /* name */
862
         FALSE,                 /* partial_inplace */
863
         0xffff,                /* src_mask */
864
         0xffff,                /* dst_mask */
865
         FALSE),                /* pcrel_offset */
866
 
867
  /* The lower 16 bits of the GOT offset for the address of the
868
     canonical descriptor of a function.  */
869
  HOWTO (R_BFIN_FUNCDESC_GOTOFFLO, /* type */
870
         0,                      /* rightshift */
871
         1,                     /* size (0 = byte, 1 = short, 2 = long) */
872
         16,                    /* bitsize */
873
         FALSE,                 /* pc_relative */
874
         0,                      /* bitpos */
875
         complain_overflow_dont, /* complain_on_overflow */
876
         bfd_elf_generic_reloc, /* special_function */
877
         "R_BFIN_FUNCDESC_GOTOFFLO", /* name */
878
         FALSE,                 /* partial_inplace */
879
         0xffff,                /* src_mask */
880
         0xffff,                /* dst_mask */
881
         FALSE),                /* pcrel_offset */
882
 
883
  /* A 12-bit signed operand with the GOT offset for the address of
884
     the symbol.  */
885
  HOWTO (R_BFIN_GOTOFF17M4,     /* type */
886
         2,                     /* rightshift */
887
         1,                     /* size (0 = byte, 1 = short, 2 = long) */
888
         16,                    /* bitsize */
889
         FALSE,                 /* pc_relative */
890
         0,                      /* bitpos */
891
         complain_overflow_signed, /* complain_on_overflow */
892
         bfd_elf_generic_reloc, /* special_function */
893
         "R_BFIN_GOTOFF17M4",   /* name */
894
         FALSE,                 /* partial_inplace */
895
         0xffff,                /* src_mask */
896
         0xffff,                /* dst_mask */
897
         FALSE),                /* pcrel_offset */
898
 
899
  /* The upper 16 bits of the GOT offset for the address of the
900
     symbol.  */
901
  HOWTO (R_BFIN_GOTOFFHI,        /* type */
902
         0,                      /* rightshift */
903
         1,                     /* size (0 = byte, 1 = short, 2 = long) */
904
         16,                    /* bitsize */
905
         FALSE,                 /* pc_relative */
906
         0,                      /* bitpos */
907
         complain_overflow_dont, /* complain_on_overflow */
908
         bfd_elf_generic_reloc, /* special_function */
909
         "R_BFIN_GOTOFFHI",     /* name */
910
         FALSE,                 /* partial_inplace */
911
         0xffff,                /* src_mask */
912
         0xffff,                /* dst_mask */
913
         FALSE),                /* pcrel_offset */
914
 
915
  /* The lower 16 bits of the GOT offset for the address of the
916
     symbol.  */
917
  HOWTO (R_BFIN_GOTOFFLO,       /* type */
918
         0,                      /* rightshift */
919
         1,                     /* size (0 = byte, 1 = short, 2 = long) */
920
         16,                    /* bitsize */
921
         FALSE,                 /* pc_relative */
922
         0,                      /* bitpos */
923
         complain_overflow_dont, /* complain_on_overflow */
924
         bfd_elf_generic_reloc, /* special_function */
925
         "R_BFIN_GOTOFFLO",     /* name */
926
         FALSE,                 /* partial_inplace */
927
         0xffff,                /* src_mask */
928
         0xffff,                /* dst_mask */
929
         FALSE),                /* pcrel_offset */
930
};
931
 
932
static reloc_howto_type bfin_gnuext_howto_table [] =
933
{
934
  HOWTO (R_pltpc,               /* type.  */
935
         0,                      /* rightshift.  */
936
         1,                     /* size (0 = byte, 1 = short, 2 = long).  */
937
         16,                    /* bitsize.  */
938
         FALSE,                 /* pc_relative.  */
939
         0,                      /* bitpos.  */
940
         complain_overflow_bitfield, /* complain_on_overflow.  */
941
         bfin_pltpc_reloc,      /* special_function.  */
942
         "R_pltpc",             /* name.  */
943
         FALSE,                 /* partial_inplace.  */
944
         0xffff,                /* src_mask.  */
945
         0xffff,                /* dst_mask.  */
946
         FALSE),                /* pcrel_offset.  */
947
 
948
  HOWTO (R_got,                 /* type.  */
949
         0,                      /* rightshift.  */
950
         1,                     /* size (0 = byte, 1 = short, 2 = long).  */
951
         16,                    /* bitsize.  */
952
         FALSE,                 /* pc_relative.  */
953
         0,                      /* bitpos.  */
954
         complain_overflow_bitfield, /* complain_on_overflow.  */
955
         bfd_elf_generic_reloc, /* special_function.  */
956
         "R_got",               /* name.  */
957
         FALSE,                 /* partial_inplace.  */
958
         0x7fff,                /* src_mask.  */
959
         0x7fff,                /* dst_mask.  */
960
         FALSE),                /* pcrel_offset.  */
961
 
962
/* GNU extension to record C++ vtable hierarchy.  */
963
  HOWTO (R_BFIN_GNU_VTINHERIT, /* type.  */
964
         0,                     /* rightshift.  */
965
         2,                     /* size (0 = byte, 1 = short, 2 = long).  */
966
         0,                     /* bitsize.  */
967
         FALSE,                 /* pc_relative.  */
968
         0,                     /* bitpos.  */
969
         complain_overflow_dont, /* complain_on_overflow.  */
970
         NULL,                  /* special_function.  */
971
         "R_BFIN_GNU_VTINHERIT", /* name.  */
972
         FALSE,                 /* partial_inplace.  */
973
         0,                     /* src_mask.  */
974
         0,                     /* dst_mask.  */
975
         FALSE),                /* pcrel_offset.  */
976
 
977
/* GNU extension to record C++ vtable member usage.  */
978
  HOWTO (R_BFIN_GNU_VTENTRY,    /* type.  */
979
         0,                     /* rightshift.  */
980
         2,                     /* size (0 = byte, 1 = short, 2 = long).  */
981
         0,                     /* bitsize.  */
982
         FALSE,                 /* pc_relative.  */
983
         0,                      /* bitpos.  */
984
         complain_overflow_dont, /* complain_on_overflow.  */
985
         _bfd_elf_rel_vtable_reloc_fn, /* special_function.  */
986
         "R_BFIN_GNU_VTENTRY",  /* name.  */
987
         FALSE,                 /* partial_inplace.  */
988
         0,                     /* src_mask.  */
989
         0,                     /* dst_mask.  */
990
         FALSE)                 /* pcrel_offset.  */
991
};
992
 
993
struct bfin_reloc_map
994
{
995
  bfd_reloc_code_real_type      bfd_reloc_val;
996
  unsigned int                  bfin_reloc_val;
997
};
998
 
999
static const struct bfin_reloc_map bfin_reloc_map [] =
1000
{
1001
  { BFD_RELOC_NONE,                     R_unused0 },
1002
  { BFD_RELOC_BFIN_5_PCREL,             R_pcrel5m2 },
1003
  { BFD_RELOC_NONE,                     R_unused1 },
1004
  { BFD_RELOC_BFIN_10_PCREL,            R_pcrel10 },
1005
  { BFD_RELOC_BFIN_12_PCREL_JUMP,       R_pcrel12_jump },
1006
  { BFD_RELOC_BFIN_16_IMM,              R_rimm16 },
1007
  { BFD_RELOC_BFIN_16_LOW,              R_luimm16 },
1008
  { BFD_RELOC_BFIN_16_HIGH,             R_huimm16 },
1009
  { BFD_RELOC_BFIN_12_PCREL_JUMP_S,     R_pcrel12_jump_s },
1010
  { BFD_RELOC_24_PCREL,                 R_pcrel24 },
1011
  { BFD_RELOC_24_PCREL,                 R_pcrel24 },
1012
  { BFD_RELOC_BFIN_24_PCREL_JUMP_L,     R_pcrel24_jump_l },
1013
  { BFD_RELOC_NONE,                     R_unusedb },
1014
  { BFD_RELOC_NONE,                     R_unusedc },
1015
  { BFD_RELOC_BFIN_24_PCREL_CALL_X,     R_pcrel24_call_x },
1016
  { BFD_RELOC_8,                        R_byte_data },
1017
  { BFD_RELOC_16,                       R_byte2_data },
1018
  { BFD_RELOC_32,                       R_byte4_data },
1019
  { BFD_RELOC_BFIN_11_PCREL,            R_pcrel11 },
1020
  { BFD_RELOC_BFIN_GOT,                 R_got },
1021
  { BFD_RELOC_BFIN_PLTPC,               R_pltpc },
1022
 
1023
  { BFD_RELOC_BFIN_GOT17M4,      R_BFIN_GOT17M4 },
1024
  { BFD_RELOC_BFIN_GOTHI,      R_BFIN_GOTHI },
1025
  { BFD_RELOC_BFIN_GOTLO,      R_BFIN_GOTLO },
1026
  { BFD_RELOC_BFIN_FUNCDESC,   R_BFIN_FUNCDESC },
1027
  { BFD_RELOC_BFIN_FUNCDESC_GOT17M4, R_BFIN_FUNCDESC_GOT17M4 },
1028
  { BFD_RELOC_BFIN_FUNCDESC_GOTHI, R_BFIN_FUNCDESC_GOTHI },
1029
  { BFD_RELOC_BFIN_FUNCDESC_GOTLO, R_BFIN_FUNCDESC_GOTLO },
1030
  { BFD_RELOC_BFIN_FUNCDESC_VALUE, R_BFIN_FUNCDESC_VALUE },
1031
  { BFD_RELOC_BFIN_FUNCDESC_GOTOFF17M4, R_BFIN_FUNCDESC_GOTOFF17M4 },
1032
  { BFD_RELOC_BFIN_FUNCDESC_GOTOFFHI, R_BFIN_FUNCDESC_GOTOFFHI },
1033
  { BFD_RELOC_BFIN_FUNCDESC_GOTOFFLO, R_BFIN_FUNCDESC_GOTOFFLO },
1034
  { BFD_RELOC_BFIN_GOTOFF17M4,   R_BFIN_GOTOFF17M4 },
1035
  { BFD_RELOC_BFIN_GOTOFFHI,   R_BFIN_GOTOFFHI },
1036
  { BFD_RELOC_BFIN_GOTOFFLO,   R_BFIN_GOTOFFLO },
1037
 
1038
  { BFD_RELOC_VTABLE_INHERIT,           R_BFIN_GNU_VTINHERIT },
1039
  { BFD_RELOC_VTABLE_ENTRY,             R_BFIN_GNU_VTENTRY },
1040
};
1041
 
1042
 
1043
static void
1044
bfin_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
1045
                    arelent *cache_ptr,
1046
                    Elf_Internal_Rela *dst)
1047
{
1048
  unsigned int r_type;
1049
 
1050
  r_type = ELF32_R_TYPE (dst->r_info);
1051
 
1052
  if (r_type <= BFIN_RELOC_MAX)
1053
    cache_ptr->howto = &bfin_howto_table [r_type];
1054
 
1055
  else if (r_type >= BFIN_GNUEXT_RELOC_MIN && r_type <= BFIN_GNUEXT_RELOC_MAX)
1056
    cache_ptr->howto = &bfin_gnuext_howto_table [r_type - BFIN_GNUEXT_RELOC_MIN];
1057
 
1058
  else
1059
    cache_ptr->howto = (reloc_howto_type *) NULL;
1060
}
1061
 
1062
/* Given a BFD reloc type, return the howto.  */
1063
static reloc_howto_type *
1064
bfin_bfd_reloc_type_lookup (bfd * abfd ATTRIBUTE_UNUSED,
1065
                            bfd_reloc_code_real_type code)
1066
{
1067
  unsigned int i;
1068
  unsigned int r_type = BFIN_RELOC_MIN;
1069
 
1070
  for (i = sizeof (bfin_reloc_map) / sizeof (bfin_reloc_map[0]); --i;)
1071
    if (bfin_reloc_map[i].bfd_reloc_val == code)
1072
      r_type = bfin_reloc_map[i].bfin_reloc_val;
1073
 
1074
  if (r_type <= BFIN_RELOC_MAX && r_type > BFIN_RELOC_MIN)
1075
    return &bfin_howto_table [r_type];
1076
 
1077
  else if (r_type >= BFIN_GNUEXT_RELOC_MIN && r_type <= BFIN_GNUEXT_RELOC_MAX)
1078
   return &bfin_gnuext_howto_table [r_type - BFIN_GNUEXT_RELOC_MIN];
1079
 
1080
  return (reloc_howto_type *) NULL;
1081
}
1082
 
1083
static reloc_howto_type *
1084
bfin_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1085
                            const char *r_name)
1086
{
1087
  unsigned int i;
1088
 
1089
  for (i = 0;
1090
       i < (sizeof (bfin_howto_table)
1091
            / sizeof (bfin_howto_table[0]));
1092
       i++)
1093
    if (bfin_howto_table[i].name != NULL
1094
        && strcasecmp (bfin_howto_table[i].name, r_name) == 0)
1095
      return &bfin_howto_table[i];
1096
 
1097
  for (i = 0;
1098
       i < (sizeof (bfin_gnuext_howto_table)
1099
            / sizeof (bfin_gnuext_howto_table[0]));
1100
       i++)
1101
    if (bfin_gnuext_howto_table[i].name != NULL
1102
        && strcasecmp (bfin_gnuext_howto_table[i].name, r_name) == 0)
1103
      return &bfin_gnuext_howto_table[i];
1104
 
1105
  return NULL;
1106
}
1107
 
1108
/* Given a bfin relocation type, return the howto.  */
1109
static reloc_howto_type *
1110
bfin_reloc_type_lookup (bfd * abfd ATTRIBUTE_UNUSED,
1111
                            unsigned int r_type)
1112
{
1113
  if (r_type <= BFIN_RELOC_MAX)
1114
    return &bfin_howto_table [r_type];
1115
 
1116
  else if (r_type >= BFIN_GNUEXT_RELOC_MIN && r_type <= BFIN_GNUEXT_RELOC_MAX)
1117
   return &bfin_gnuext_howto_table [r_type - BFIN_GNUEXT_RELOC_MIN];
1118
 
1119
  return (reloc_howto_type *) NULL;
1120
}
1121
 
1122
/* Return TRUE if the name is a local label.
1123
   bfin local labels begin with L$.  */
1124
static bfd_boolean
1125
bfin_is_local_label_name (
1126
     bfd *abfd ATTRIBUTE_UNUSED,
1127
     const char *label)
1128
{
1129
  if (label[0] == 'L' && label[1] == '$' )
1130
    return TRUE;
1131
 
1132
  return _bfd_elf_is_local_label_name (abfd, label);
1133
}
1134
 
1135
extern const bfd_target bfd_elf32_bfinfdpic_vec;
1136
#define IS_FDPIC(bfd) ((bfd)->xvec == &bfd_elf32_bfinfdpic_vec)
1137
 
1138
/* An extension of the elf hash table data structure, containing some
1139
   additional Blackfin-specific data.  */
1140
struct bfinfdpic_elf_link_hash_table
1141
{
1142
  struct elf_link_hash_table elf;
1143
 
1144
  /* A pointer to the .got section.  */
1145
  asection *sgot;
1146
  /* A pointer to the .rel.got section.  */
1147
  asection *sgotrel;
1148
  /* A pointer to the .rofixup section.  */
1149
  asection *sgotfixup;
1150
  /* A pointer to the .plt section.  */
1151
  asection *splt;
1152
  /* A pointer to the .rel.plt section.  */
1153
  asection *spltrel;
1154
  /* GOT base offset.  */
1155
  bfd_vma got0;
1156
  /* Location of the first non-lazy PLT entry, i.e., the number of
1157
     bytes taken by lazy PLT entries.  */
1158
  bfd_vma plt0;
1159
  /* A hash table holding information about which symbols were
1160
     referenced with which PIC-related relocations.  */
1161
  struct htab *relocs_info;
1162
};
1163
 
1164
/* Get the Blackfin ELF linker hash table from a link_info structure.  */
1165
 
1166
#define bfinfdpic_hash_table(info) \
1167
  ((struct bfinfdpic_elf_link_hash_table *) ((info)->hash))
1168
 
1169
#define bfinfdpic_got_section(info) \
1170
  (bfinfdpic_hash_table (info)->sgot)
1171
#define bfinfdpic_gotrel_section(info) \
1172
  (bfinfdpic_hash_table (info)->sgotrel)
1173
#define bfinfdpic_gotfixup_section(info) \
1174
  (bfinfdpic_hash_table (info)->sgotfixup)
1175
#define bfinfdpic_plt_section(info) \
1176
  (bfinfdpic_hash_table (info)->splt)
1177
#define bfinfdpic_pltrel_section(info) \
1178
  (bfinfdpic_hash_table (info)->spltrel)
1179
#define bfinfdpic_relocs_info(info) \
1180
  (bfinfdpic_hash_table (info)->relocs_info)
1181
#define bfinfdpic_got_initial_offset(info) \
1182
  (bfinfdpic_hash_table (info)->got0)
1183
#define bfinfdpic_plt_initial_offset(info) \
1184
  (bfinfdpic_hash_table (info)->plt0)
1185
 
1186
/* Create a Blackfin ELF linker hash table.  */
1187
 
1188
static struct bfd_link_hash_table *
1189
bfinfdpic_elf_link_hash_table_create (bfd *abfd)
1190
{
1191
  struct bfinfdpic_elf_link_hash_table *ret;
1192
  bfd_size_type amt = sizeof (struct bfinfdpic_elf_link_hash_table);
1193
 
1194
  ret = bfd_zalloc (abfd, amt);
1195
  if (ret == NULL)
1196
    return NULL;
1197
 
1198
  if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
1199
                                      _bfd_elf_link_hash_newfunc,
1200
                                      sizeof (struct elf_link_hash_entry)))
1201
    {
1202
      free (ret);
1203
      return NULL;
1204
    }
1205
 
1206
  return &ret->elf.root;
1207
}
1208
 
1209
/* Decide whether a reference to a symbol can be resolved locally or
1210
   not.  If the symbol is protected, we want the local address, but
1211
   its function descriptor must be assigned by the dynamic linker.  */
1212
#define BFINFDPIC_SYM_LOCAL(INFO, H) \
1213
  (_bfd_elf_symbol_refs_local_p ((H), (INFO), 1) \
1214
   || ! elf_hash_table (INFO)->dynamic_sections_created)
1215
#define BFINFDPIC_FUNCDESC_LOCAL(INFO, H) \
1216
  ((H)->dynindx == -1 || ! elf_hash_table (INFO)->dynamic_sections_created)
1217
 
1218
/* This structure collects information on what kind of GOT, PLT or
1219
   function descriptors are required by relocations that reference a
1220
   certain symbol.  */
1221
struct bfinfdpic_relocs_info
1222
{
1223
  /* The index of the symbol, as stored in the relocation r_info, if
1224
     we have a local symbol; -1 otherwise.  */
1225
  long symndx;
1226
  union
1227
  {
1228
    /* The input bfd in which the symbol is defined, if it's a local
1229
       symbol.  */
1230
    bfd *abfd;
1231
    /* If symndx == -1, the hash table entry corresponding to a global
1232
       symbol (even if it turns out to bind locally, in which case it
1233
       should ideally be replaced with section's symndx + addend).  */
1234
    struct elf_link_hash_entry *h;
1235
  } d;
1236
  /* The addend of the relocation that references the symbol.  */
1237
  bfd_vma addend;
1238
 
1239
  /* The fields above are used to identify an entry.  The fields below
1240
     contain information on how an entry is used and, later on, which
1241
     locations it was assigned.  */
1242
  /* The following 2 fields record whether the symbol+addend above was
1243
     ever referenced with a GOT relocation.  The 17M4 suffix indicates a
1244
     GOT17M4 relocation; hilo is used for GOTLO/GOTHI pairs.  */
1245
  unsigned got17m4:1;
1246
  unsigned gothilo:1;
1247
  /* Whether a FUNCDESC relocation references symbol+addend.  */
1248
  unsigned fd:1;
1249
  /* Whether a FUNCDESC_GOT relocation references symbol+addend.  */
1250
  unsigned fdgot17m4:1;
1251
  unsigned fdgothilo:1;
1252
  /* Whether a FUNCDESC_GOTOFF relocation references symbol+addend.  */
1253
  unsigned fdgoff17m4:1;
1254
  unsigned fdgoffhilo:1;
1255
  /* Whether symbol+addend is referenced with GOTOFF17M4, GOTOFFLO or
1256
     GOTOFFHI relocations.  The addend doesn't really matter, since we
1257
     envision that this will only be used to check whether the symbol
1258
     is mapped to the same segment as the got.  */
1259
  unsigned gotoff:1;
1260
  /* Whether symbol+addend is referenced by a LABEL24 relocation.  */
1261
  unsigned call:1;
1262
  /* Whether symbol+addend is referenced by a 32 or FUNCDESC_VALUE
1263
     relocation.  */
1264
  unsigned sym:1;
1265
  /* Whether we need a PLT entry for a symbol.  Should be implied by
1266
     something like:
1267
     (call && symndx == -1 && ! BFINFDPIC_SYM_LOCAL (info, d.h))  */
1268
  unsigned plt:1;
1269
  /* Whether a function descriptor should be created in this link unit
1270
     for symbol+addend.  Should be implied by something like:
1271
     (plt || fdgotoff17m4 || fdgotofflohi
1272
      || ((fd || fdgot17m4 || fdgothilo)
1273
          && (symndx != -1 || BFINFDPIC_FUNCDESC_LOCAL (info, d.h))))  */
1274
  unsigned privfd:1;
1275
  /* Whether a lazy PLT entry is needed for this symbol+addend.
1276
     Should be implied by something like:
1277
     (privfd && symndx == -1 && ! BFINFDPIC_SYM_LOCAL (info, d.h)
1278
      && ! (info->flags & DF_BIND_NOW))  */
1279
  unsigned lazyplt:1;
1280
  /* Whether we've already emitted GOT relocations and PLT entries as
1281
     needed for this symbol.  */
1282
  unsigned done:1;
1283
 
1284
  /* The number of R_byte4_data, R_BFIN_FUNCDESC and R_BFIN_FUNCDESC_VALUE
1285
     relocations referencing the symbol.  */
1286
  unsigned relocs32, relocsfd, relocsfdv;
1287
 
1288
  /* The number of .rofixups entries and dynamic relocations allocated
1289
     for this symbol, minus any that might have already been used.  */
1290
  unsigned fixups, dynrelocs;
1291
 
1292
  /* The offsets of the GOT entries assigned to symbol+addend, to the
1293
     function descriptor's address, and to a function descriptor,
1294
     respectively.  Should be zero if unassigned.  The offsets are
1295
     counted from the value that will be assigned to the PIC register,
1296
     not from the beginning of the .got section.  */
1297
  bfd_signed_vma got_entry, fdgot_entry, fd_entry;
1298
  /* The offsets of the PLT entries assigned to symbol+addend,
1299
     non-lazy and lazy, respectively.  If unassigned, should be
1300
     (bfd_vma)-1.  */
1301
  bfd_vma plt_entry, lzplt_entry;
1302
};
1303
 
1304
/* Compute a hash with the key fields of an bfinfdpic_relocs_info entry.  */
1305
static hashval_t
1306
bfinfdpic_relocs_info_hash (const void *entry_)
1307
{
1308
  const struct bfinfdpic_relocs_info *entry = entry_;
1309
 
1310
  return (entry->symndx == -1
1311
          ? (long) entry->d.h->root.root.hash
1312
          : entry->symndx + (long) entry->d.abfd->id * 257) + entry->addend;
1313
}
1314
 
1315
/* Test whether the key fields of two bfinfdpic_relocs_info entries are
1316
   identical.  */
1317
static int
1318
bfinfdpic_relocs_info_eq (const void *entry1, const void *entry2)
1319
{
1320
  const struct bfinfdpic_relocs_info *e1 = entry1;
1321
  const struct bfinfdpic_relocs_info *e2 = entry2;
1322
 
1323
  return e1->symndx == e2->symndx && e1->addend == e2->addend
1324
    && (e1->symndx == -1 ? e1->d.h == e2->d.h : e1->d.abfd == e2->d.abfd);
1325
}
1326
 
1327
/* Find or create an entry in a hash table HT that matches the key
1328
   fields of the given ENTRY.  If it's not found, memory for a new
1329
   entry is allocated in ABFD's obstack.  */
1330
static struct bfinfdpic_relocs_info *
1331
bfinfdpic_relocs_info_find (struct htab *ht,
1332
                           bfd *abfd,
1333
                           const struct bfinfdpic_relocs_info *entry,
1334
                           enum insert_option insert)
1335
{
1336
  struct bfinfdpic_relocs_info **loc =
1337
    (struct bfinfdpic_relocs_info **) htab_find_slot (ht, entry, insert);
1338
 
1339
  if (! loc)
1340
    return NULL;
1341
 
1342
  if (*loc)
1343
    return *loc;
1344
 
1345
  *loc = bfd_zalloc (abfd, sizeof (**loc));
1346
 
1347
  if (! *loc)
1348
    return *loc;
1349
 
1350
  (*loc)->symndx = entry->symndx;
1351
  (*loc)->d = entry->d;
1352
  (*loc)->addend = entry->addend;
1353
  (*loc)->plt_entry = (bfd_vma)-1;
1354
  (*loc)->lzplt_entry = (bfd_vma)-1;
1355
 
1356
  return *loc;
1357
}
1358
 
1359
/* Obtain the address of the entry in HT associated with H's symbol +
1360
   addend, creating a new entry if none existed.  ABFD is only used
1361
   for memory allocation purposes.  */
1362
inline static struct bfinfdpic_relocs_info *
1363
bfinfdpic_relocs_info_for_global (struct htab *ht,
1364
                                 bfd *abfd,
1365
                                 struct elf_link_hash_entry *h,
1366
                                 bfd_vma addend,
1367
                                 enum insert_option insert)
1368
{
1369
  struct bfinfdpic_relocs_info entry;
1370
 
1371
  entry.symndx = -1;
1372
  entry.d.h = h;
1373
  entry.addend = addend;
1374
 
1375
  return bfinfdpic_relocs_info_find (ht, abfd, &entry, insert);
1376
}
1377
 
1378
/* Obtain the address of the entry in HT associated with the SYMNDXth
1379
   local symbol of the input bfd ABFD, plus the addend, creating a new
1380
   entry if none existed.  */
1381
inline static struct bfinfdpic_relocs_info *
1382
bfinfdpic_relocs_info_for_local (struct htab *ht,
1383
                                bfd *abfd,
1384
                                long symndx,
1385
                                bfd_vma addend,
1386
                                enum insert_option insert)
1387
{
1388
  struct bfinfdpic_relocs_info entry;
1389
 
1390
  entry.symndx = symndx;
1391
  entry.d.abfd = abfd;
1392
  entry.addend = addend;
1393
 
1394
  return bfinfdpic_relocs_info_find (ht, abfd, &entry, insert);
1395
}
1396
 
1397
/* Merge fields set by check_relocs() of two entries that end up being
1398
   mapped to the same (presumably global) symbol.  */
1399
 
1400
inline static void
1401
bfinfdpic_pic_merge_early_relocs_info (struct bfinfdpic_relocs_info *e2,
1402
                                      struct bfinfdpic_relocs_info const *e1)
1403
{
1404
  e2->got17m4 |= e1->got17m4;
1405
  e2->gothilo |= e1->gothilo;
1406
  e2->fd |= e1->fd;
1407
  e2->fdgot17m4 |= e1->fdgot17m4;
1408
  e2->fdgothilo |= e1->fdgothilo;
1409
  e2->fdgoff17m4 |= e1->fdgoff17m4;
1410
  e2->fdgoffhilo |= e1->fdgoffhilo;
1411
  e2->gotoff |= e1->gotoff;
1412
  e2->call |= e1->call;
1413
  e2->sym |= e1->sym;
1414
}
1415
 
1416
/* Every block of 65535 lazy PLT entries shares a single call to the
1417
   resolver, inserted in the 32768th lazy PLT entry (i.e., entry #
1418
   32767, counting from 0).  All other lazy PLT entries branch to it
1419
   in a single instruction.  */
1420
 
1421
#define LZPLT_RESOLVER_EXTRA 10
1422
#define LZPLT_NORMAL_SIZE 6
1423
#define LZPLT_ENTRIES 1362
1424
 
1425
#define BFINFDPIC_LZPLT_BLOCK_SIZE ((bfd_vma) LZPLT_NORMAL_SIZE * LZPLT_ENTRIES + LZPLT_RESOLVER_EXTRA)
1426
#define BFINFDPIC_LZPLT_RESOLV_LOC (LZPLT_NORMAL_SIZE * LZPLT_ENTRIES / 2)
1427
 
1428
/* Add a dynamic relocation to the SRELOC section.  */
1429
 
1430
inline static bfd_vma
1431
_bfinfdpic_add_dyn_reloc (bfd *output_bfd, asection *sreloc, bfd_vma offset,
1432
                         int reloc_type, long dynindx, bfd_vma addend,
1433
                         struct bfinfdpic_relocs_info *entry)
1434
{
1435
  Elf_Internal_Rela outrel;
1436
  bfd_vma reloc_offset;
1437
 
1438
  outrel.r_offset = offset;
1439
  outrel.r_info = ELF32_R_INFO (dynindx, reloc_type);
1440
  outrel.r_addend = addend;
1441
 
1442
  reloc_offset = sreloc->reloc_count * sizeof (Elf32_External_Rel);
1443
  BFD_ASSERT (reloc_offset < sreloc->size);
1444
  bfd_elf32_swap_reloc_out (output_bfd, &outrel,
1445
                            sreloc->contents + reloc_offset);
1446
  sreloc->reloc_count++;
1447
 
1448
  /* If the entry's index is zero, this relocation was probably to a
1449
     linkonce section that got discarded.  We reserved a dynamic
1450
     relocation, but it was for another entry than the one we got at
1451
     the time of emitting the relocation.  Unfortunately there's no
1452
     simple way for us to catch this situation, since the relocation
1453
     is cleared right before calling relocate_section, at which point
1454
     we no longer know what the relocation used to point to.  */
1455
  if (entry->symndx)
1456
    {
1457
      BFD_ASSERT (entry->dynrelocs > 0);
1458
      entry->dynrelocs--;
1459
    }
1460
 
1461
  return reloc_offset;
1462
}
1463
 
1464
/* Add a fixup to the ROFIXUP section.  */
1465
 
1466
static bfd_vma
1467
_bfinfdpic_add_rofixup (bfd *output_bfd, asection *rofixup, bfd_vma offset,
1468
                       struct bfinfdpic_relocs_info *entry)
1469
{
1470
  bfd_vma fixup_offset;
1471
 
1472
  if (rofixup->flags & SEC_EXCLUDE)
1473
    return -1;
1474
 
1475
  fixup_offset = rofixup->reloc_count * 4;
1476
  if (rofixup->contents)
1477
    {
1478
      BFD_ASSERT (fixup_offset < rofixup->size);
1479
      bfd_put_32 (output_bfd, offset, rofixup->contents + fixup_offset);
1480
    }
1481
  rofixup->reloc_count++;
1482
 
1483
  if (entry && entry->symndx)
1484
    {
1485
      /* See discussion about symndx == 0 in _bfinfdpic_add_dyn_reloc
1486
         above.  */
1487
      BFD_ASSERT (entry->fixups > 0);
1488
      entry->fixups--;
1489
    }
1490
 
1491
  return fixup_offset;
1492
}
1493
 
1494
/* Find the segment number in which OSEC, and output section, is
1495
   located.  */
1496
 
1497
static unsigned
1498
_bfinfdpic_osec_to_segment (bfd *output_bfd, asection *osec)
1499
{
1500
  Elf_Internal_Phdr *p = _bfd_elf_find_segment_containing_section (output_bfd, osec);
1501
 
1502
  return (p != NULL) ? p - elf_tdata (output_bfd)->phdr : -1;
1503
}
1504
 
1505
inline static bfd_boolean
1506
_bfinfdpic_osec_readonly_p (bfd *output_bfd, asection *osec)
1507
{
1508
  unsigned seg = _bfinfdpic_osec_to_segment (output_bfd, osec);
1509
 
1510
  return ! (elf_tdata (output_bfd)->phdr[seg].p_flags & PF_W);
1511
}
1512
 
1513
/* Generate relocations for GOT entries, function descriptors, and
1514
   code for PLT and lazy PLT entries.  */
1515
 
1516
inline static bfd_boolean
1517
_bfinfdpic_emit_got_relocs_plt_entries (struct bfinfdpic_relocs_info *entry,
1518
                                        bfd *output_bfd,
1519
                                        struct bfd_link_info *info,
1520
                                        asection *sec,
1521
                                        Elf_Internal_Sym *sym,
1522
                                        bfd_vma addend)
1523
 
1524
{
1525
  bfd_vma fd_lazy_rel_offset = (bfd_vma)-1;
1526
  int dynindx = -1;
1527
 
1528
  if (entry->done)
1529
    return TRUE;
1530
  entry->done = 1;
1531
 
1532
  if (entry->got_entry || entry->fdgot_entry || entry->fd_entry)
1533
    {
1534
      /* If the symbol is dynamic, consider it for dynamic
1535
         relocations, otherwise decay to section + offset.  */
1536
      if (entry->symndx == -1 && entry->d.h->dynindx != -1)
1537
        dynindx = entry->d.h->dynindx;
1538
      else
1539
        {
1540
          if (sec->output_section
1541
              && ! bfd_is_abs_section (sec->output_section)
1542
              && ! bfd_is_und_section (sec->output_section))
1543
            dynindx = elf_section_data (sec->output_section)->dynindx;
1544
          else
1545
            dynindx = 0;
1546
        }
1547
    }
1548
 
1549
  /* Generate relocation for GOT entry pointing to the symbol.  */
1550
  if (entry->got_entry)
1551
    {
1552
      int idx = dynindx;
1553
      bfd_vma ad = addend;
1554
 
1555
      /* If the symbol is dynamic but binds locally, use
1556
         section+offset.  */
1557
      if (sec && (entry->symndx != -1
1558
                  || BFINFDPIC_SYM_LOCAL (info, entry->d.h)))
1559
        {
1560
          if (entry->symndx == -1)
1561
            ad += entry->d.h->root.u.def.value;
1562
          else
1563
            ad += sym->st_value;
1564
          ad += sec->output_offset;
1565
          if (sec->output_section && elf_section_data (sec->output_section))
1566
            idx = elf_section_data (sec->output_section)->dynindx;
1567
          else
1568
            idx = 0;
1569
        }
1570
 
1571
      /* If we're linking an executable at a fixed address, we can
1572
         omit the dynamic relocation as long as the symbol is local to
1573
         this module.  */
1574
      if (info->executable && !info->pie
1575
          && (entry->symndx != -1
1576
              || BFINFDPIC_SYM_LOCAL (info, entry->d.h)))
1577
        {
1578
          if (sec)
1579
            ad += sec->output_section->vma;
1580
          if (entry->symndx != -1
1581
              || entry->d.h->root.type != bfd_link_hash_undefweak)
1582
            _bfinfdpic_add_rofixup (output_bfd,
1583
                                   bfinfdpic_gotfixup_section (info),
1584
                                   bfinfdpic_got_section (info)->output_section
1585
                                   ->vma
1586
                                   + bfinfdpic_got_section (info)->output_offset
1587
                                   + bfinfdpic_got_initial_offset (info)
1588
                                   + entry->got_entry, entry);
1589
        }
1590
      else
1591
        _bfinfdpic_add_dyn_reloc (output_bfd, bfinfdpic_gotrel_section (info),
1592
                                 _bfd_elf_section_offset
1593
                                 (output_bfd, info,
1594
                                  bfinfdpic_got_section (info),
1595
                                  bfinfdpic_got_initial_offset (info)
1596
                                  + entry->got_entry)
1597
                                 + bfinfdpic_got_section (info)
1598
                                 ->output_section->vma
1599
                                 + bfinfdpic_got_section (info)->output_offset,
1600
                                 R_byte4_data, idx, ad, entry);
1601
 
1602
      bfd_put_32 (output_bfd, ad,
1603
                  bfinfdpic_got_section (info)->contents
1604
                  + bfinfdpic_got_initial_offset (info)
1605
                  + entry->got_entry);
1606
    }
1607
 
1608
  /* Generate relocation for GOT entry pointing to a canonical
1609
     function descriptor.  */
1610
  if (entry->fdgot_entry)
1611
    {
1612
      int reloc, idx;
1613
      bfd_vma ad = 0;
1614
 
1615
      if (! (entry->symndx == -1
1616
             && entry->d.h->root.type == bfd_link_hash_undefweak
1617
             && BFINFDPIC_SYM_LOCAL (info, entry->d.h)))
1618
        {
1619
          /* If the symbol is dynamic and there may be dynamic symbol
1620
             resolution because we are, or are linked with, a shared
1621
             library, emit a FUNCDESC relocation such that the dynamic
1622
             linker will allocate the function descriptor.  If the
1623
             symbol needs a non-local function descriptor but binds
1624
             locally (e.g., its visibility is protected, emit a
1625
             dynamic relocation decayed to section+offset.  */
1626
          if (entry->symndx == -1
1627
              && ! BFINFDPIC_FUNCDESC_LOCAL (info, entry->d.h)
1628
              && BFINFDPIC_SYM_LOCAL (info, entry->d.h)
1629
              && !(info->executable && !info->pie))
1630
            {
1631
              reloc = R_BFIN_FUNCDESC;
1632
              idx = elf_section_data (entry->d.h->root.u.def.section
1633
                                      ->output_section)->dynindx;
1634
              ad = entry->d.h->root.u.def.section->output_offset
1635
                + entry->d.h->root.u.def.value;
1636
            }
1637
          else if (entry->symndx == -1
1638
                   && ! BFINFDPIC_FUNCDESC_LOCAL (info, entry->d.h))
1639
            {
1640
              reloc = R_BFIN_FUNCDESC;
1641
              idx = dynindx;
1642
              ad = addend;
1643
              if (ad)
1644
                return FALSE;
1645
            }
1646
          else
1647
            {
1648
              /* Otherwise, we know we have a private function descriptor,
1649
                 so reference it directly.  */
1650
              if (elf_hash_table (info)->dynamic_sections_created)
1651
                BFD_ASSERT (entry->privfd);
1652
              reloc = R_byte4_data;
1653
              idx = elf_section_data (bfinfdpic_got_section (info)
1654
                                      ->output_section)->dynindx;
1655
              ad = bfinfdpic_got_section (info)->output_offset
1656
                + bfinfdpic_got_initial_offset (info) + entry->fd_entry;
1657
            }
1658
 
1659
          /* If there is room for dynamic symbol resolution, emit the
1660
             dynamic relocation.  However, if we're linking an
1661
             executable at a fixed location, we won't have emitted a
1662
             dynamic symbol entry for the got section, so idx will be
1663
             zero, which means we can and should compute the address
1664
             of the private descriptor ourselves.  */
1665
          if (info->executable && !info->pie
1666
              && (entry->symndx != -1
1667
                  || BFINFDPIC_FUNCDESC_LOCAL (info, entry->d.h)))
1668
            {
1669
              ad += bfinfdpic_got_section (info)->output_section->vma;
1670
              _bfinfdpic_add_rofixup (output_bfd,
1671
                                     bfinfdpic_gotfixup_section (info),
1672
                                     bfinfdpic_got_section (info)
1673
                                     ->output_section->vma
1674
                                     + bfinfdpic_got_section (info)
1675
                                     ->output_offset
1676
                                     + bfinfdpic_got_initial_offset (info)
1677
                                     + entry->fdgot_entry, entry);
1678
            }
1679
          else
1680
            _bfinfdpic_add_dyn_reloc (output_bfd,
1681
                                     bfinfdpic_gotrel_section (info),
1682
                                     _bfd_elf_section_offset
1683
                                     (output_bfd, info,
1684
                                      bfinfdpic_got_section (info),
1685
                                      bfinfdpic_got_initial_offset (info)
1686
                                      + entry->fdgot_entry)
1687
                                     + bfinfdpic_got_section (info)
1688
                                     ->output_section->vma
1689
                                     + bfinfdpic_got_section (info)
1690
                                     ->output_offset,
1691
                                     reloc, idx, ad, entry);
1692
        }
1693
 
1694
      bfd_put_32 (output_bfd, ad,
1695
                  bfinfdpic_got_section (info)->contents
1696
                  + bfinfdpic_got_initial_offset (info)
1697
                  + entry->fdgot_entry);
1698
    }
1699
 
1700
  /* Generate relocation to fill in a private function descriptor in
1701
     the GOT.  */
1702
  if (entry->fd_entry)
1703
    {
1704
      int idx = dynindx;
1705
      bfd_vma ad = addend;
1706
      bfd_vma ofst;
1707
      long lowword, highword;
1708
 
1709
      /* If the symbol is dynamic but binds locally, use
1710
         section+offset.  */
1711
      if (sec && (entry->symndx != -1
1712
                  || BFINFDPIC_SYM_LOCAL (info, entry->d.h)))
1713
        {
1714
          if (entry->symndx == -1)
1715
            ad += entry->d.h->root.u.def.value;
1716
          else
1717
            ad += sym->st_value;
1718
          ad += sec->output_offset;
1719
          if (sec->output_section && elf_section_data (sec->output_section))
1720
            idx = elf_section_data (sec->output_section)->dynindx;
1721
          else
1722
            idx = 0;
1723
        }
1724
 
1725
      /* If we're linking an executable at a fixed address, we can
1726
         omit the dynamic relocation as long as the symbol is local to
1727
         this module.  */
1728
      if (info->executable && !info->pie
1729
          && (entry->symndx != -1 || BFINFDPIC_SYM_LOCAL (info, entry->d.h)))
1730
        {
1731
          if (sec)
1732
            ad += sec->output_section->vma;
1733
          ofst = 0;
1734
          if (entry->symndx != -1
1735
              || entry->d.h->root.type != bfd_link_hash_undefweak)
1736
            {
1737
              _bfinfdpic_add_rofixup (output_bfd,
1738
                                     bfinfdpic_gotfixup_section (info),
1739
                                     bfinfdpic_got_section (info)
1740
                                     ->output_section->vma
1741
                                     + bfinfdpic_got_section (info)
1742
                                     ->output_offset
1743
                                     + bfinfdpic_got_initial_offset (info)
1744
                                     + entry->fd_entry, entry);
1745
              _bfinfdpic_add_rofixup (output_bfd,
1746
                                     bfinfdpic_gotfixup_section (info),
1747
                                     bfinfdpic_got_section (info)
1748
                                     ->output_section->vma
1749
                                     + bfinfdpic_got_section (info)
1750
                                     ->output_offset
1751
                                     + bfinfdpic_got_initial_offset (info)
1752
                                     + entry->fd_entry + 4, entry);
1753
            }
1754
        }
1755
      else
1756
        {
1757
          ofst
1758
            = _bfinfdpic_add_dyn_reloc (output_bfd,
1759
                                        entry->lazyplt
1760
                                        ? bfinfdpic_pltrel_section (info)
1761
                                        : bfinfdpic_gotrel_section (info),
1762
                                        _bfd_elf_section_offset
1763
                                        (output_bfd, info,
1764
                                         bfinfdpic_got_section (info),
1765
                                         bfinfdpic_got_initial_offset (info)
1766
                                         + entry->fd_entry)
1767
                                        + bfinfdpic_got_section (info)
1768
                                        ->output_section->vma
1769
                                        + bfinfdpic_got_section (info)
1770
                                        ->output_offset,
1771
                                        R_BFIN_FUNCDESC_VALUE, idx, ad, entry);
1772
        }
1773
 
1774
      /* If we've omitted the dynamic relocation, just emit the fixed
1775
         addresses of the symbol and of the local GOT base offset.  */
1776
      if (info->executable && !info->pie && sec && sec->output_section)
1777
        {
1778
          lowword = ad;
1779
          highword = bfinfdpic_got_section (info)->output_section->vma
1780
            + bfinfdpic_got_section (info)->output_offset
1781
            + bfinfdpic_got_initial_offset (info);
1782
        }
1783
      else if (entry->lazyplt)
1784
        {
1785
          if (ad)
1786
            return FALSE;
1787
 
1788
          fd_lazy_rel_offset = ofst;
1789
 
1790
          /* A function descriptor used for lazy or local resolving is
1791
             initialized such that its high word contains the output
1792
             section index in which the PLT entries are located, and
1793
             the low word contains the address of the lazy PLT entry
1794
             entry point, that must be within the memory region
1795
             assigned to that section.  */
1796
          lowword = entry->lzplt_entry + 4
1797
            + bfinfdpic_plt_section (info)->output_offset
1798
            + bfinfdpic_plt_section (info)->output_section->vma;
1799
          highword = _bfinfdpic_osec_to_segment
1800
            (output_bfd, bfinfdpic_plt_section (info)->output_section);
1801
        }
1802
      else
1803
        {
1804
          /* A function descriptor for a local function gets the index
1805
             of the section.  For a non-local function, it's
1806
             disregarded.  */
1807
          lowword = ad;
1808
          if (entry->symndx == -1 && entry->d.h->dynindx != -1
1809
              && entry->d.h->dynindx == idx)
1810
            highword = 0;
1811
          else
1812
            highword = _bfinfdpic_osec_to_segment
1813
              (output_bfd, sec->output_section);
1814
        }
1815
 
1816
      bfd_put_32 (output_bfd, lowword,
1817
                  bfinfdpic_got_section (info)->contents
1818
                  + bfinfdpic_got_initial_offset (info)
1819
                  + entry->fd_entry);
1820
      bfd_put_32 (output_bfd, highword,
1821
                  bfinfdpic_got_section (info)->contents
1822
                  + bfinfdpic_got_initial_offset (info)
1823
                  + entry->fd_entry + 4);
1824
    }
1825
 
1826
  /* Generate code for the PLT entry.  */
1827
  if (entry->plt_entry != (bfd_vma) -1)
1828
    {
1829
      bfd_byte *plt_code = bfinfdpic_plt_section (info)->contents
1830
        + entry->plt_entry;
1831
 
1832
      BFD_ASSERT (entry->fd_entry);
1833
 
1834
      /* Figure out what kind of PLT entry we need, depending on the
1835
         location of the function descriptor within the GOT.  */
1836
      if (entry->fd_entry >= -(1 << (18 - 1))
1837
          && entry->fd_entry + 4 < (1 << (18 - 1)))
1838
        {
1839
          /* P1 = [P3 + fd_entry]; P3 = [P3 + fd_entry + 4] */
1840
          bfd_put_32 (output_bfd,
1841
                      0xe519 | ((entry->fd_entry << 14) & 0xFFFF0000),
1842
                      plt_code);
1843
          bfd_put_32 (output_bfd,
1844
                      0xe51b | (((entry->fd_entry + 4) << 14) & 0xFFFF0000),
1845
                      plt_code + 4);
1846
          plt_code += 8;
1847
        }
1848
      else
1849
        {
1850
          /* P1.L = fd_entry; P1.H = fd_entry;
1851
             P3 = P3 + P1;
1852
             P1 = [P3];
1853
             P3 = [P3 + 4];  */
1854
          bfd_put_32 (output_bfd,
1855
                      0xe109 | (entry->fd_entry << 16),
1856
                      plt_code);
1857
          bfd_put_32 (output_bfd,
1858
                      0xe149 | (entry->fd_entry & 0xFFFF0000),
1859
                      plt_code + 4);
1860
          bfd_put_16 (output_bfd, 0x5ad9, plt_code + 8);
1861
          bfd_put_16 (output_bfd, 0x9159, plt_code + 10);
1862
          bfd_put_16 (output_bfd, 0xac5b, plt_code + 12);
1863
          plt_code += 14;
1864
        }
1865
      /* JUMP (P1) */
1866
      bfd_put_16 (output_bfd, 0x0051, plt_code);
1867
    }
1868
 
1869
  /* Generate code for the lazy PLT entry.  */
1870
  if (entry->lzplt_entry != (bfd_vma) -1)
1871
    {
1872
      bfd_byte *lzplt_code = bfinfdpic_plt_section (info)->contents
1873
        + entry->lzplt_entry;
1874
      bfd_vma resolverStub_addr;
1875
 
1876
      bfd_put_32 (output_bfd, fd_lazy_rel_offset, lzplt_code);
1877
      lzplt_code += 4;
1878
 
1879
      resolverStub_addr = entry->lzplt_entry / BFINFDPIC_LZPLT_BLOCK_SIZE
1880
        * BFINFDPIC_LZPLT_BLOCK_SIZE + BFINFDPIC_LZPLT_RESOLV_LOC;
1881
      if (resolverStub_addr >= bfinfdpic_plt_initial_offset (info))
1882
        resolverStub_addr = bfinfdpic_plt_initial_offset (info) - LZPLT_NORMAL_SIZE - LZPLT_RESOLVER_EXTRA;
1883
 
1884
      if (entry->lzplt_entry == resolverStub_addr)
1885
        {
1886
          /* This is a lazy PLT entry that includes a resolver call.
1887
             P2 = [P3];
1888
             R3 = [P3 + 4];
1889
             JUMP (P2);  */
1890
          bfd_put_32 (output_bfd,
1891
                      0xa05b915a,
1892
                      lzplt_code);
1893
          bfd_put_16 (output_bfd, 0x0052, lzplt_code + 4);
1894
        }
1895
      else
1896
        {
1897
          /* JUMP.S  resolverStub */
1898
          bfd_put_16 (output_bfd,
1899
                      0x2000
1900
                      | (((resolverStub_addr - entry->lzplt_entry)
1901
                          / 2) & (((bfd_vma)1 << 12) - 1)),
1902
                      lzplt_code);
1903
        }
1904
    }
1905
 
1906
  return TRUE;
1907
}
1908
 
1909
 
1910
/* Look through the relocs for a section during the first phase, and
1911
   allocate space in the global offset table or procedure linkage
1912
   table.  */
1913
 
1914
static bfd_boolean
1915
bfin_check_relocs (bfd * abfd,
1916
                   struct bfd_link_info *info,
1917
                   asection *sec,
1918
                   const Elf_Internal_Rela *relocs)
1919
{
1920
  bfd *dynobj;
1921
  Elf_Internal_Shdr *symtab_hdr;
1922
  struct elf_link_hash_entry **sym_hashes;
1923
  bfd_signed_vma *local_got_refcounts;
1924
  const Elf_Internal_Rela *rel;
1925
  const Elf_Internal_Rela *rel_end;
1926
  asection *sgot;
1927
  asection *srelgot;
1928
  asection *sreloc;
1929
  if (info->relocatable)
1930
    return TRUE;
1931
 
1932
  dynobj = elf_hash_table (info)->dynobj;
1933
  symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1934
  sym_hashes = elf_sym_hashes (abfd);
1935
  local_got_refcounts = elf_local_got_refcounts (abfd);
1936
 
1937
  sgot = NULL;
1938
  srelgot = NULL;
1939
  sreloc = NULL;
1940
 
1941
  rel_end = relocs + sec->reloc_count;
1942
  for (rel = relocs; rel < rel_end; rel++)
1943
    {
1944
      unsigned long r_symndx;
1945
      struct elf_link_hash_entry *h;
1946
 
1947
      r_symndx = ELF32_R_SYM (rel->r_info);
1948
      if (r_symndx < symtab_hdr->sh_info)
1949
        h = NULL;
1950
      else
1951
        h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1952
 
1953
      switch (ELF32_R_TYPE (rel->r_info))
1954
        {
1955
       /* This relocation describes the C++ object vtable hierarchy.
1956
           Reconstruct it for later use during GC.  */
1957
        case R_BFIN_GNU_VTINHERIT:
1958
          if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
1959
            return FALSE;
1960
          break;
1961
 
1962
        /* This relocation describes which C++ vtable entries
1963
           are actually used.  Record for later use during GC.  */
1964
        case R_BFIN_GNU_VTENTRY:
1965
          BFD_ASSERT (h != NULL);
1966
          if (h != NULL
1967
              && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
1968
            return FALSE;
1969
          break;
1970
 
1971
        case R_got:
1972
          if (h != NULL
1973
              && strcmp (h->root.root.string, "__GLOBAL_OFFSET_TABLE_") == 0)
1974
            break;
1975
          /* Fall through.  */
1976
 
1977
          if (dynobj == NULL)
1978
            {
1979
              /* Create the .got section.  */
1980
              elf_hash_table (info)->dynobj = dynobj = abfd;
1981
              if (!_bfd_elf_create_got_section (dynobj, info))
1982
                return FALSE;
1983
            }
1984
 
1985
          if (sgot == NULL)
1986
            {
1987
              sgot = bfd_get_section_by_name (dynobj, ".got");
1988
              BFD_ASSERT (sgot != NULL);
1989
            }
1990
 
1991
          if (srelgot == NULL && (h != NULL || info->shared))
1992
            {
1993
              srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1994
              if (srelgot == NULL)
1995
                {
1996
                  flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
1997
                                    | SEC_IN_MEMORY | SEC_LINKER_CREATED
1998
                                    | SEC_READONLY);
1999
                  srelgot = bfd_make_section_with_flags (dynobj, ".rela.got",
2000
                                                         flags);
2001
                  if (srelgot == NULL
2002
                      || !bfd_set_section_alignment (dynobj, srelgot, 2))
2003
                    return FALSE;
2004
                }
2005
            }
2006
 
2007
          if (h != NULL)
2008
            {
2009
              if (h->got.refcount == 0)
2010
                {
2011
                  /* Make sure this symbol is output as a dynamic symbol.  */
2012
                  if (h->dynindx == -1 && !h->forced_local)
2013
                    {
2014
                      if (!bfd_elf_link_record_dynamic_symbol (info, h))
2015
                        return FALSE;
2016
                    }
2017
 
2018
                  /* Allocate space in the .got section.  */
2019
                  sgot->size += 4;
2020
                  /* Allocate relocation space.  */
2021
                  srelgot->size += sizeof (Elf32_External_Rela);
2022
                }
2023
              h->got.refcount++;
2024
            }
2025
          else
2026
            {
2027
              /* This is a global offset table entry for a local symbol.  */
2028
              if (local_got_refcounts == NULL)
2029
                {
2030
                  bfd_size_type size;
2031
 
2032
                  size = symtab_hdr->sh_info;
2033
                  size *= sizeof (bfd_signed_vma);
2034
                  local_got_refcounts = ((bfd_signed_vma *)
2035
                                         bfd_zalloc (abfd, size));
2036
                  if (local_got_refcounts == NULL)
2037
                    return FALSE;
2038
                  elf_local_got_refcounts (abfd) = local_got_refcounts;
2039
                }
2040
              if (local_got_refcounts[r_symndx] == 0)
2041
                {
2042
                  sgot->size += 4;
2043
                  if (info->shared)
2044
                    {
2045
                      /* If we are generating a shared object, we need to
2046
                         output a R_68K_RELATIVE reloc so that the dynamic
2047
                         linker can adjust this GOT entry.  */
2048
                      srelgot->size += sizeof (Elf32_External_Rela);
2049
                    }
2050
                }
2051
              local_got_refcounts[r_symndx]++;
2052
            }
2053
          break;
2054
 
2055
        default:
2056
          break;
2057
        }
2058
    }
2059
 
2060
  return TRUE;
2061
}
2062
 
2063
static enum elf_reloc_type_class
2064
elf32_bfin_reloc_type_class (const Elf_Internal_Rela * rela)
2065
{
2066
  switch ((int) ELF32_R_TYPE (rela->r_info))
2067
    {
2068
    default:
2069
      return reloc_class_normal;
2070
    }
2071
}
2072
 
2073
/* Relocate an Blackfin ELF section.
2074
 
2075
   The RELOCATE_SECTION function is called by the new ELF backend linker
2076
   to handle the relocations for a section.
2077
 
2078
   The relocs are always passed as Rela structures; if the section
2079
   actually uses Rel structures, the r_addend field will always be
2080
   zero.
2081
 
2082
   This function is responsible for adjusting the section contents as
2083
   necessary, and (if using Rela relocs and generating a relocatable
2084
   output file) adjusting the reloc addend as necessary.
2085
 
2086
   This function does not have to worry about setting the reloc
2087
   address or the reloc symbol index.
2088
 
2089
   LOCAL_SYMS is a pointer to the swapped in local symbols.
2090
 
2091
   LOCAL_SECTIONS is an array giving the section in the input file
2092
   corresponding to the st_shndx field of each local symbol.
2093
 
2094
   The global hash table entry for the global symbols can be found
2095
   via elf_sym_hashes (input_bfd).
2096
 
2097
   When generating relocatable output, this function must handle
2098
   STB_LOCAL/STT_SECTION symbols specially.  The output symbol is
2099
   going to be the section symbol corresponding to the output
2100
   section, which means that the addend must be adjusted
2101
   accordingly.  */
2102
 
2103
static bfd_boolean
2104
bfinfdpic_relocate_section (bfd * output_bfd,
2105
                            struct bfd_link_info *info,
2106
                            bfd * input_bfd,
2107
                            asection * input_section,
2108
                            bfd_byte * contents,
2109
                            Elf_Internal_Rela * relocs,
2110
                            Elf_Internal_Sym * local_syms,
2111
                            asection ** local_sections)
2112
{
2113
  Elf_Internal_Shdr *symtab_hdr;
2114
  struct elf_link_hash_entry **sym_hashes;
2115
  Elf_Internal_Rela *rel;
2116
  Elf_Internal_Rela *relend;
2117
  unsigned isec_segment, got_segment, plt_segment,
2118
    check_segment[2];
2119
  int silence_segment_error = !(info->shared || info->pie);
2120
 
2121
  symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr;
2122
  sym_hashes = elf_sym_hashes (input_bfd);
2123
  relend     = relocs + input_section->reloc_count;
2124
 
2125
  isec_segment = _bfinfdpic_osec_to_segment (output_bfd,
2126
                                             input_section->output_section);
2127
  if (IS_FDPIC (output_bfd) && bfinfdpic_got_section (info))
2128
    got_segment = _bfinfdpic_osec_to_segment (output_bfd,
2129
                                              bfinfdpic_got_section (info)
2130
                                              ->output_section);
2131
  else
2132
    got_segment = -1;
2133
  if (IS_FDPIC (output_bfd) && elf_hash_table (info)->dynamic_sections_created)
2134
    plt_segment = _bfinfdpic_osec_to_segment (output_bfd,
2135
                                              bfinfdpic_plt_section (info)
2136
                                              ->output_section);
2137
  else
2138
    plt_segment = -1;
2139
 
2140
  for (rel = relocs; rel < relend; rel ++)
2141
    {
2142
      reloc_howto_type *howto;
2143
      unsigned long r_symndx;
2144
      Elf_Internal_Sym *sym;
2145
      asection *sec;
2146
      struct elf_link_hash_entry *h;
2147
      bfd_vma relocation;
2148
      bfd_reloc_status_type r;
2149
      const char * name = NULL;
2150
      int r_type;
2151
      asection *osec;
2152
      struct bfinfdpic_relocs_info *picrel;
2153
      bfd_vma orig_addend = rel->r_addend;
2154
 
2155
      r_type = ELF32_R_TYPE (rel->r_info);
2156
 
2157
      if (r_type == R_BFIN_GNU_VTINHERIT
2158
          || r_type == R_BFIN_GNU_VTENTRY)
2159
        continue;
2160
 
2161
      r_symndx = ELF32_R_SYM (rel->r_info);
2162
      howto = bfin_reloc_type_lookup (input_bfd, r_type);
2163
      if (howto == NULL)
2164
        {
2165
          bfd_set_error (bfd_error_bad_value);
2166
          return FALSE;
2167
        }
2168
 
2169
      h      = NULL;
2170
      sym    = NULL;
2171
      sec    = NULL;
2172
 
2173
      if (r_symndx < symtab_hdr->sh_info)
2174
        {
2175
          sym = local_syms + r_symndx;
2176
          osec = sec = local_sections [r_symndx];
2177
          relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
2178
 
2179
          name = bfd_elf_string_from_elf_section
2180
            (input_bfd, symtab_hdr->sh_link, sym->st_name);
2181
          name = (name == NULL) ? bfd_section_name (input_bfd, sec) : name;
2182
        }
2183
      else
2184
        {
2185
          bfd_boolean warned;
2186
          bfd_boolean unresolved_reloc;
2187
 
2188
          RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2189
                                   r_symndx, symtab_hdr, sym_hashes,
2190
                                   h, sec, relocation,
2191
                                   unresolved_reloc, warned);
2192
          osec = sec;
2193
        }
2194
 
2195
      if (sec != NULL && elf_discarded_section (sec))
2196
        {
2197
          /* For relocs against symbols from removed linkonce sections,
2198
             or sections discarded by a linker script, we just want the
2199
             section contents zeroed.  Avoid any special processing.  */
2200
          _bfd_clear_contents (howto, input_bfd, contents + rel->r_offset);
2201
          rel->r_info = 0;
2202
          rel->r_addend = 0;
2203
          continue;
2204
        }
2205
 
2206
      if (info->relocatable)
2207
        continue;
2208
 
2209
      if (h != NULL
2210
          && (h->root.type == bfd_link_hash_defined
2211
              || h->root.type == bfd_link_hash_defweak)
2212
          && !BFINFDPIC_SYM_LOCAL (info, h))
2213
        {
2214
          osec = sec = NULL;
2215
          relocation = 0;
2216
        }
2217
 
2218
      switch (r_type)
2219
        {
2220
        case R_pcrel24:
2221
        case R_pcrel24_jump_l:
2222
        case R_byte4_data:
2223
          if (! IS_FDPIC (output_bfd))
2224
            goto non_fdpic;
2225
 
2226
        case R_BFIN_GOT17M4:
2227
        case R_BFIN_GOTHI:
2228
        case R_BFIN_GOTLO:
2229
        case R_BFIN_FUNCDESC_GOT17M4:
2230
        case R_BFIN_FUNCDESC_GOTHI:
2231
        case R_BFIN_FUNCDESC_GOTLO:
2232
        case R_BFIN_GOTOFF17M4:
2233
        case R_BFIN_GOTOFFHI:
2234
        case R_BFIN_GOTOFFLO:
2235
        case R_BFIN_FUNCDESC_GOTOFF17M4:
2236
        case R_BFIN_FUNCDESC_GOTOFFHI:
2237
        case R_BFIN_FUNCDESC_GOTOFFLO:
2238
        case R_BFIN_FUNCDESC:
2239
        case R_BFIN_FUNCDESC_VALUE:
2240
          if (h != NULL)
2241
            picrel = bfinfdpic_relocs_info_for_global (bfinfdpic_relocs_info
2242
                                                       (info), input_bfd, h,
2243
                                                       orig_addend, INSERT);
2244
          else
2245
            /* In order to find the entry we created before, we must
2246
               use the original addend, not the one that may have been
2247
               modified by _bfd_elf_rela_local_sym().  */
2248
            picrel = bfinfdpic_relocs_info_for_local (bfinfdpic_relocs_info
2249
                                                      (info), input_bfd, r_symndx,
2250
                                                      orig_addend, INSERT);
2251
          if (! picrel)
2252
            return FALSE;
2253
 
2254
          if (!_bfinfdpic_emit_got_relocs_plt_entries (picrel, output_bfd, info,
2255
                                                       osec, sym,
2256
                                                       rel->r_addend))
2257
            {
2258
              (*_bfd_error_handler)
2259
                (_("%B: relocation at `%A+0x%x' references symbol `%s' with nonzero addend"),
2260
                 input_bfd, input_section, rel->r_offset, name);
2261
              return FALSE;
2262
 
2263
            }
2264
 
2265
          break;
2266
 
2267
        default:
2268
        non_fdpic:
2269
          picrel = NULL;
2270
          if (h && ! BFINFDPIC_SYM_LOCAL (info, h))
2271
            {
2272
              info->callbacks->warning
2273
                (info, _("relocation references symbol not defined in the module"),
2274
                 name, input_bfd, input_section, rel->r_offset);
2275
              return FALSE;
2276
            }
2277
          break;
2278
        }
2279
 
2280
      switch (r_type)
2281
        {
2282
        case R_pcrel24:
2283
        case R_pcrel24_jump_l:
2284
          check_segment[0] = isec_segment;
2285
          if (! IS_FDPIC (output_bfd))
2286
            check_segment[1] = isec_segment;
2287
          else if (picrel->plt)
2288
            {
2289
              relocation = bfinfdpic_plt_section (info)->output_section->vma
2290
                + bfinfdpic_plt_section (info)->output_offset
2291
                + picrel->plt_entry;
2292
              check_segment[1] = plt_segment;
2293
            }
2294
          /* We don't want to warn on calls to undefined weak symbols,
2295
             as calls to them must be protected by non-NULL tests
2296
             anyway, and unprotected calls would invoke undefined
2297
             behavior.  */
2298
          else if (picrel->symndx == -1
2299
                   && picrel->d.h->root.type == bfd_link_hash_undefweak)
2300
            check_segment[1] = check_segment[0];
2301
          else
2302
            check_segment[1] = sec
2303
              ? _bfinfdpic_osec_to_segment (output_bfd, sec->output_section)
2304
              : (unsigned)-1;
2305
          break;
2306
 
2307
        case R_BFIN_GOT17M4:
2308
        case R_BFIN_GOTHI:
2309
        case R_BFIN_GOTLO:
2310
          relocation = picrel->got_entry;
2311
          check_segment[0] = check_segment[1] = got_segment;
2312
          break;
2313
 
2314
        case R_BFIN_FUNCDESC_GOT17M4:
2315
        case R_BFIN_FUNCDESC_GOTHI:
2316
        case R_BFIN_FUNCDESC_GOTLO:
2317
          relocation = picrel->fdgot_entry;
2318
          check_segment[0] = check_segment[1] = got_segment;
2319
          break;
2320
 
2321
        case R_BFIN_GOTOFFHI:
2322
        case R_BFIN_GOTOFF17M4:
2323
        case R_BFIN_GOTOFFLO:
2324
          relocation -= bfinfdpic_got_section (info)->output_section->vma
2325
            + bfinfdpic_got_section (info)->output_offset
2326
            + bfinfdpic_got_initial_offset (info);
2327
          check_segment[0] = got_segment;
2328
          check_segment[1] = sec
2329
            ? _bfinfdpic_osec_to_segment (output_bfd, sec->output_section)
2330
            : (unsigned)-1;
2331
          break;
2332
 
2333
        case R_BFIN_FUNCDESC_GOTOFF17M4:
2334
        case R_BFIN_FUNCDESC_GOTOFFHI:
2335
        case R_BFIN_FUNCDESC_GOTOFFLO:
2336
          relocation = picrel->fd_entry;
2337
          check_segment[0] = check_segment[1] = got_segment;
2338
          break;
2339
 
2340
        case R_BFIN_FUNCDESC:
2341
          {
2342
            int dynindx;
2343
            bfd_vma addend = rel->r_addend;
2344
 
2345
            if (! (h && h->root.type == bfd_link_hash_undefweak
2346
                   && BFINFDPIC_SYM_LOCAL (info, h)))
2347
              {
2348
                /* If the symbol is dynamic and there may be dynamic
2349
                   symbol resolution because we are or are linked with a
2350
                   shared library, emit a FUNCDESC relocation such that
2351
                   the dynamic linker will allocate the function
2352
                   descriptor.  If the symbol needs a non-local function
2353
                   descriptor but binds locally (e.g., its visibility is
2354
                   protected, emit a dynamic relocation decayed to
2355
                   section+offset.  */
2356
                if (h && ! BFINFDPIC_FUNCDESC_LOCAL (info, h)
2357
                    && BFINFDPIC_SYM_LOCAL (info, h)
2358
                    && !(info->executable && !info->pie))
2359
                  {
2360
                    dynindx = elf_section_data (h->root.u.def.section
2361
                                                ->output_section)->dynindx;
2362
                    addend += h->root.u.def.section->output_offset
2363
                      + h->root.u.def.value;
2364
                  }
2365
                else if (h && ! BFINFDPIC_FUNCDESC_LOCAL (info, h))
2366
                  {
2367
                    if (addend)
2368
                      {
2369
                        info->callbacks->warning
2370
                          (info, _("R_BFIN_FUNCDESC references dynamic symbol with nonzero addend"),
2371
                           name, input_bfd, input_section, rel->r_offset);
2372
                        return FALSE;
2373
                      }
2374
                    dynindx = h->dynindx;
2375
                  }
2376
                else
2377
                  {
2378
                    /* Otherwise, we know we have a private function
2379
                       descriptor, so reference it directly.  */
2380
                    BFD_ASSERT (picrel->privfd);
2381
                    r_type = R_byte4_data;
2382
                    dynindx = elf_section_data (bfinfdpic_got_section (info)
2383
                                                ->output_section)->dynindx;
2384
                    addend = bfinfdpic_got_section (info)->output_offset
2385
                      + bfinfdpic_got_initial_offset (info)
2386
                      + picrel->fd_entry;
2387
                  }
2388
 
2389
                /* If there is room for dynamic symbol resolution, emit
2390
                   the dynamic relocation.  However, if we're linking an
2391
                   executable at a fixed location, we won't have emitted a
2392
                   dynamic symbol entry for the got section, so idx will
2393
                   be zero, which means we can and should compute the
2394
                   address of the private descriptor ourselves.  */
2395
                if (info->executable && !info->pie
2396
                    && (!h || BFINFDPIC_FUNCDESC_LOCAL (info, h)))
2397
                  {
2398
                    addend += bfinfdpic_got_section (info)->output_section->vma;
2399
                    if ((bfd_get_section_flags (output_bfd,
2400
                                                input_section->output_section)
2401
                         & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
2402
                      {
2403
                        if (_bfinfdpic_osec_readonly_p (output_bfd,
2404
                                                       input_section
2405
                                                       ->output_section))
2406
                          {
2407
                            info->callbacks->warning
2408
                              (info,
2409
                               _("cannot emit fixups in read-only section"),
2410
                               name, input_bfd, input_section, rel->r_offset);
2411
                            return FALSE;
2412
                          }
2413
                        _bfinfdpic_add_rofixup (output_bfd,
2414
                                               bfinfdpic_gotfixup_section
2415
                                               (info),
2416
                                               _bfd_elf_section_offset
2417
                                               (output_bfd, info,
2418
                                                input_section, rel->r_offset)
2419
                                               + input_section
2420
                                               ->output_section->vma
2421
                                               + input_section->output_offset,
2422
                                               picrel);
2423
                      }
2424
                  }
2425
                else if ((bfd_get_section_flags (output_bfd,
2426
                                                 input_section->output_section)
2427
                          & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
2428
                  {
2429
                    bfd_vma offset;
2430
 
2431
                    if (_bfinfdpic_osec_readonly_p (output_bfd,
2432
                                                   input_section
2433
                                                   ->output_section))
2434
                      {
2435
                        info->callbacks->warning
2436
                          (info,
2437
                           _("cannot emit dynamic relocations in read-only section"),
2438
                           name, input_bfd, input_section, rel->r_offset);
2439
                        return FALSE;
2440
                      }
2441
                    offset = _bfd_elf_section_offset (output_bfd, info,
2442
                                                      input_section, rel->r_offset);
2443
                    /* Only output a reloc for a not deleted entry.  */
2444
                    if (offset >= (bfd_vma) -2)
2445
                      _bfinfdpic_add_dyn_reloc (output_bfd,
2446
                                                bfinfdpic_gotrel_section (info),
2447
                                                0,
2448
                                                R_unused0,
2449
                                                dynindx, addend, picrel);
2450
                    else
2451
                      _bfinfdpic_add_dyn_reloc (output_bfd,
2452
                                                bfinfdpic_gotrel_section (info),
2453
                                                offset + input_section
2454
                                                ->output_section->vma
2455
                                                + input_section->output_offset,
2456
                                                r_type,
2457
                                                dynindx, addend, picrel);
2458
                  }
2459
                else
2460
                  addend += bfinfdpic_got_section (info)->output_section->vma;
2461
              }
2462
 
2463
            /* We want the addend in-place because dynamic
2464
               relocations are REL.  Setting relocation to it should
2465
               arrange for it to be installed.  */
2466
            relocation = addend - rel->r_addend;
2467
          }
2468
          check_segment[0] = check_segment[1] = got_segment;
2469
          break;
2470
 
2471
        case R_byte4_data:
2472
          if (! IS_FDPIC (output_bfd))
2473
            {
2474
              check_segment[0] = check_segment[1] = -1;
2475
              break;
2476
            }
2477
          /* Fall through.  */
2478
        case R_BFIN_FUNCDESC_VALUE:
2479
          {
2480
            int dynindx;
2481
            bfd_vma addend = rel->r_addend;
2482
            bfd_vma offset;
2483
            offset = _bfd_elf_section_offset (output_bfd, info,
2484
                                              input_section, rel->r_offset);
2485
 
2486
            /* If the symbol is dynamic but binds locally, use
2487
               section+offset.  */
2488
            if (h && ! BFINFDPIC_SYM_LOCAL (info, h))
2489
              {
2490
                if (addend && r_type == R_BFIN_FUNCDESC_VALUE)
2491
                  {
2492
                    info->callbacks->warning
2493
                      (info, _("R_BFIN_FUNCDESC_VALUE references dynamic symbol with nonzero addend"),
2494
                       name, input_bfd, input_section, rel->r_offset);
2495
                    return FALSE;
2496
                  }
2497
                dynindx = h->dynindx;
2498
              }
2499
            else
2500
              {
2501
                if (h)
2502
                  addend += h->root.u.def.value;
2503
                else
2504
                  addend += sym->st_value;
2505
                if (osec)
2506
                  addend += osec->output_offset;
2507
                if (osec && osec->output_section
2508
                    && ! bfd_is_abs_section (osec->output_section)
2509
                    && ! bfd_is_und_section (osec->output_section))
2510
                  dynindx = elf_section_data (osec->output_section)->dynindx;
2511
                else
2512
                  dynindx = 0;
2513
              }
2514
 
2515
            /* If we're linking an executable at a fixed address, we
2516
               can omit the dynamic relocation as long as the symbol
2517
               is defined in the current link unit (which is implied
2518
               by its output section not being NULL).  */
2519
            if (info->executable && !info->pie
2520
                && (!h || BFINFDPIC_SYM_LOCAL (info, h)))
2521
              {
2522
                if (osec)
2523
                  addend += osec->output_section->vma;
2524
                if (IS_FDPIC (input_bfd)
2525
                    && (bfd_get_section_flags (output_bfd,
2526
                                               input_section->output_section)
2527
                        & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
2528
                  {
2529
                    if (_bfinfdpic_osec_readonly_p (output_bfd,
2530
                                                   input_section
2531
                                                   ->output_section))
2532
                      {
2533
                        info->callbacks->warning
2534
                          (info,
2535
                           _("cannot emit fixups in read-only section"),
2536
                           name, input_bfd, input_section, rel->r_offset);
2537
                        return FALSE;
2538
                      }
2539
                    if (!h || h->root.type != bfd_link_hash_undefweak)
2540
                      {
2541
                        /* Only output a reloc for a not deleted entry.  */
2542
                        if (offset >= (bfd_vma)-2)
2543
                          _bfinfdpic_add_rofixup (output_bfd,
2544
                                                  bfinfdpic_gotfixup_section
2545
                                                  (info), -1, picrel);
2546
                        else
2547
                          _bfinfdpic_add_rofixup (output_bfd,
2548
                                                  bfinfdpic_gotfixup_section
2549
                                                  (info),
2550
                                                  offset + input_section
2551
                                                  ->output_section->vma
2552
                                                  + input_section->output_offset,
2553
                                                  picrel);
2554
 
2555
                        if (r_type == R_BFIN_FUNCDESC_VALUE)
2556
                          {
2557
                            if (offset >= (bfd_vma)-2)
2558
                              _bfinfdpic_add_rofixup
2559
                                (output_bfd,
2560
                                 bfinfdpic_gotfixup_section (info),
2561
                                 -1, picrel);
2562
                            else
2563
                              _bfinfdpic_add_rofixup
2564
                                (output_bfd,
2565
                                 bfinfdpic_gotfixup_section (info),
2566
                                 offset + input_section->output_section->vma
2567
                                 + input_section->output_offset + 4, picrel);
2568
                          }
2569
                      }
2570
                  }
2571
              }
2572
            else
2573
              {
2574
                if ((bfd_get_section_flags (output_bfd,
2575
                                            input_section->output_section)
2576
                     & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
2577
                  {
2578
                    if (_bfinfdpic_osec_readonly_p (output_bfd,
2579
                                                   input_section
2580
                                                   ->output_section))
2581
                      {
2582
                        info->callbacks->warning
2583
                          (info,
2584
                           _("cannot emit dynamic relocations in read-only section"),
2585
                           name, input_bfd, input_section, rel->r_offset);
2586
                        return FALSE;
2587
                      }
2588
                    /* Only output a reloc for a not deleted entry.  */
2589
                    if (offset >= (bfd_vma)-2)
2590
                      _bfinfdpic_add_dyn_reloc (output_bfd,
2591
                                                bfinfdpic_gotrel_section (info),
2592
                                                0, R_unused0, dynindx, addend, picrel);
2593
                    else
2594
                      _bfinfdpic_add_dyn_reloc (output_bfd,
2595
                                                bfinfdpic_gotrel_section (info),
2596
                                                offset
2597
                                                + input_section
2598
                                                ->output_section->vma
2599
                                                + input_section->output_offset,
2600
                                                r_type, dynindx, addend, picrel);
2601
                  }
2602
                else if (osec)
2603
                  addend += osec->output_section->vma;
2604
                /* We want the addend in-place because dynamic
2605
                   relocations are REL.  Setting relocation to it
2606
                   should arrange for it to be installed.  */
2607
                relocation = addend - rel->r_addend;
2608
              }
2609
 
2610
            if (r_type == R_BFIN_FUNCDESC_VALUE && offset < (bfd_vma)-2)
2611
              {
2612
                /* If we've omitted the dynamic relocation, just emit
2613
                   the fixed addresses of the symbol and of the local
2614
                   GOT base offset.  */
2615
                if (info->executable && !info->pie
2616
                    && (!h || BFINFDPIC_SYM_LOCAL (info, h)))
2617
                  bfd_put_32 (output_bfd,
2618
                              bfinfdpic_got_section (info)->output_section->vma
2619
                              + bfinfdpic_got_section (info)->output_offset
2620
                              + bfinfdpic_got_initial_offset (info),
2621
                              contents + rel->r_offset + 4);
2622
                else
2623
                  /* A function descriptor used for lazy or local
2624
                     resolving is initialized such that its high word
2625
                     contains the output section index in which the
2626
                     PLT entries are located, and the low word
2627
                     contains the offset of the lazy PLT entry entry
2628
                     point into that section.  */
2629
                  bfd_put_32 (output_bfd,
2630
                              h && ! BFINFDPIC_SYM_LOCAL (info, h)
2631
                              ? 0
2632
                              : _bfinfdpic_osec_to_segment (output_bfd,
2633
                                                            sec
2634
                                                            ->output_section),
2635
                              contents + rel->r_offset + 4);
2636
              }
2637
          }
2638
          check_segment[0] = check_segment[1] = got_segment;
2639
          break;
2640
 
2641
        default:
2642
          check_segment[0] = isec_segment;
2643
          check_segment[1] = sec
2644
            ? _bfinfdpic_osec_to_segment (output_bfd, sec->output_section)
2645
            : (unsigned)-1;
2646
          break;
2647
        }
2648
 
2649
      if (check_segment[0] != check_segment[1] && IS_FDPIC (output_bfd))
2650
        {
2651
#if 1 /* If you take this out, remove the #error from fdpic-static-6.d
2652
         in the ld testsuite.  */
2653
          /* This helps catch problems in GCC while we can't do more
2654
             than static linking.  The idea is to test whether the
2655
             input file basename is crt0.o only once.  */
2656
          if (silence_segment_error == 1)
2657
            silence_segment_error =
2658
              (strlen (input_bfd->filename) == 6
2659
               && strcmp (input_bfd->filename, "crt0.o") == 0)
2660
              || (strlen (input_bfd->filename) > 6
2661
                  && strcmp (input_bfd->filename
2662
                             + strlen (input_bfd->filename) - 7,
2663
                             "/crt0.o") == 0)
2664
              ? -1 : 0;
2665
#endif
2666
          if (!silence_segment_error
2667
              /* We don't want duplicate errors for undefined
2668
                 symbols.  */
2669
              && !(picrel && picrel->symndx == -1
2670
                   && picrel->d.h->root.type == bfd_link_hash_undefined))
2671
            info->callbacks->warning
2672
              (info,
2673
               (info->shared || info->pie)
2674
               ? _("relocations between different segments are not supported")
2675
               : _("warning: relocation references a different segment"),
2676
               name, input_bfd, input_section, rel->r_offset);
2677
          if (!silence_segment_error && (info->shared || info->pie))
2678
            return FALSE;
2679
          elf_elfheader (output_bfd)->e_flags |= EF_BFIN_PIC;
2680
        }
2681
 
2682
      switch (r_type)
2683
        {
2684
        case R_BFIN_GOTOFFHI:
2685
          /* We need the addend to be applied before we shift the
2686
             value right.  */
2687
          relocation += rel->r_addend;
2688
          /* Fall through.  */
2689
        case R_BFIN_GOTHI:
2690
        case R_BFIN_FUNCDESC_GOTHI:
2691
        case R_BFIN_FUNCDESC_GOTOFFHI:
2692
          relocation >>= 16;
2693
          /* Fall through.  */
2694
 
2695
        case R_BFIN_GOTLO:
2696
        case R_BFIN_FUNCDESC_GOTLO:
2697
        case R_BFIN_GOTOFFLO:
2698
        case R_BFIN_FUNCDESC_GOTOFFLO:
2699
          relocation &= 0xffff;
2700
          break;
2701
 
2702
        default:
2703
          break;
2704
        }
2705
 
2706
      switch (r_type)
2707
        {
2708
        case R_pcrel24:
2709
        case R_pcrel24_jump_l:
2710
          if (! IS_FDPIC (output_bfd) || ! picrel->plt)
2711
            break;
2712
          /* Fall through.  */
2713
 
2714
          /* When referencing a GOT entry, a function descriptor or a
2715
             PLT, we don't want the addend to apply to the reference,
2716
             but rather to the referenced symbol.  The actual entry
2717
             will have already been created taking the addend into
2718
             account, so cancel it out here.  */
2719
        case R_BFIN_GOT17M4:
2720
        case R_BFIN_GOTHI:
2721
        case R_BFIN_GOTLO:
2722
        case R_BFIN_FUNCDESC_GOT17M4:
2723
        case R_BFIN_FUNCDESC_GOTHI:
2724
        case R_BFIN_FUNCDESC_GOTLO:
2725
        case R_BFIN_FUNCDESC_GOTOFF17M4:
2726
        case R_BFIN_FUNCDESC_GOTOFFHI:
2727
        case R_BFIN_FUNCDESC_GOTOFFLO:
2728
          /* Note that we only want GOTOFFHI, not GOTOFFLO or GOTOFF17M4
2729
             here, since we do want to apply the addend to the others.
2730
             Note that we've applied the addend to GOTOFFHI before we
2731
             shifted it right.  */
2732
        case R_BFIN_GOTOFFHI:
2733
          relocation -= rel->r_addend;
2734
          break;
2735
 
2736
        default:
2737
          break;
2738
        }
2739
 
2740
      if (r_type == R_pcrel24
2741
          || r_type == R_pcrel24_jump_l)
2742
        {
2743
          bfd_vma x;
2744
          bfd_vma address = rel->r_offset;
2745
 
2746
          relocation += rel->r_addend;
2747
 
2748
          /* Perform usual pc-relative correction.  */
2749
          relocation -= input_section->output_section->vma + input_section->output_offset;
2750
          relocation -= address;
2751
 
2752
          /* We are getting reloc_entry->address 2 byte off from
2753
             the start of instruction. Assuming absolute postion
2754
             of the reloc data. But, following code had been written assuming
2755
             reloc address is starting at begining of instruction.
2756
             To compensate that I have increased the value of
2757
             relocation by 1 (effectively 2) and used the addr -2 instead of addr.  */
2758
 
2759
          relocation += 2;
2760
          address -= 2;
2761
 
2762
          relocation >>= 1;
2763
 
2764
          x = bfd_get_16 (input_bfd, contents + address);
2765
          x = (x & 0xff00) | ((relocation >> 16) & 0xff);
2766
          bfd_put_16 (input_bfd, x, contents + address);
2767
 
2768
          x = bfd_get_16 (input_bfd, contents + address + 2);
2769
          x = relocation & 0xFFFF;
2770
          bfd_put_16 (input_bfd, x, contents + address + 2);
2771
          r = bfd_reloc_ok;
2772
        }
2773
      else
2774
        r = _bfd_final_link_relocate (howto, input_bfd, input_section,
2775
                                      contents, rel->r_offset,
2776
                                      relocation, rel->r_addend);
2777
 
2778
      if (r != bfd_reloc_ok)
2779
        {
2780
          const char * msg = (const char *) NULL;
2781
 
2782
          switch (r)
2783
            {
2784
            case bfd_reloc_overflow:
2785
              r = info->callbacks->reloc_overflow
2786
                (info, (h ? &h->root : NULL), name, howto->name,
2787
                 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
2788
              break;
2789
 
2790
            case bfd_reloc_undefined:
2791
              r = info->callbacks->undefined_symbol
2792
                (info, name, input_bfd, input_section, rel->r_offset, TRUE);
2793
              break;
2794
 
2795
            case bfd_reloc_outofrange:
2796
              msg = _("internal error: out of range error");
2797
              break;
2798
 
2799
            case bfd_reloc_notsupported:
2800
              msg = _("internal error: unsupported relocation error");
2801
              break;
2802
 
2803
            case bfd_reloc_dangerous:
2804
              msg = _("internal error: dangerous relocation");
2805
              break;
2806
 
2807
            default:
2808
              msg = _("internal error: unknown error");
2809
              break;
2810
            }
2811
 
2812
          if (msg)
2813
            r = info->callbacks->warning
2814
              (info, msg, name, input_bfd, input_section, rel->r_offset);
2815
 
2816
          if (! r)
2817
            return FALSE;
2818
        }
2819
    }
2820
 
2821
  return TRUE;
2822
}
2823
 
2824
static bfd_boolean
2825
bfin_relocate_section (bfd * output_bfd,
2826
                       struct bfd_link_info *info,
2827
                       bfd * input_bfd,
2828
                       asection * input_section,
2829
                       bfd_byte * contents,
2830
                       Elf_Internal_Rela * relocs,
2831
                       Elf_Internal_Sym * local_syms,
2832
                       asection ** local_sections)
2833
{
2834
  bfd *dynobj;
2835
  Elf_Internal_Shdr *symtab_hdr;
2836
  struct elf_link_hash_entry **sym_hashes;
2837
  bfd_vma *local_got_offsets;
2838
  asection *sgot;
2839
  asection *sreloc;
2840
  Elf_Internal_Rela *rel;
2841
  Elf_Internal_Rela *relend;
2842
  int i = 0;
2843
 
2844
  dynobj = elf_hash_table (info)->dynobj;
2845
  symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2846
  sym_hashes = elf_sym_hashes (input_bfd);
2847
  local_got_offsets = elf_local_got_offsets (input_bfd);
2848
 
2849
  sgot = NULL;
2850
  sreloc = NULL;
2851
 
2852
  rel = relocs;
2853
  relend = relocs + input_section->reloc_count;
2854
  for (; rel < relend; rel++, i++)
2855
    {
2856
      int r_type;
2857
      reloc_howto_type *howto;
2858
      unsigned long r_symndx;
2859
      struct elf_link_hash_entry *h;
2860
      Elf_Internal_Sym *sym;
2861
      asection *sec;
2862
      bfd_vma relocation = 0;
2863
      bfd_boolean unresolved_reloc;
2864
      bfd_reloc_status_type r;
2865
      bfd_vma address;
2866
 
2867
      r_type = ELF32_R_TYPE (rel->r_info);
2868
      if (r_type < 0 || r_type >= 243)
2869
        {
2870
          bfd_set_error (bfd_error_bad_value);
2871
          return FALSE;
2872
        }
2873
 
2874
      if (r_type == R_BFIN_GNU_VTENTRY
2875
          || r_type == R_BFIN_GNU_VTINHERIT)
2876
        continue;
2877
 
2878
      howto = bfin_reloc_type_lookup (input_bfd, r_type);
2879
      if (howto == NULL)
2880
        {
2881
          bfd_set_error (bfd_error_bad_value);
2882
          return FALSE;
2883
        }
2884
      r_symndx = ELF32_R_SYM (rel->r_info);
2885
 
2886
      h = NULL;
2887
      sym = NULL;
2888
      sec = NULL;
2889
      unresolved_reloc = FALSE;
2890
 
2891
      if (r_symndx < symtab_hdr->sh_info)
2892
        {
2893
          sym = local_syms + r_symndx;
2894
          sec = local_sections[r_symndx];
2895
          relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
2896
        }
2897
      else
2898
        {
2899
          bfd_boolean warned;
2900
 
2901
          RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2902
                                   r_symndx, symtab_hdr, sym_hashes,
2903
                                   h, sec, relocation,
2904
                                   unresolved_reloc, warned);
2905
        }
2906
 
2907
      if (sec != NULL && elf_discarded_section (sec))
2908
        {
2909
          /* For relocs against symbols from removed linkonce sections,
2910
             or sections discarded by a linker script, we just want the
2911
             section contents zeroed.  Avoid any special processing.  */
2912
          _bfd_clear_contents (howto, input_bfd, contents + rel->r_offset);
2913
          rel->r_info = 0;
2914
          rel->r_addend = 0;
2915
          continue;
2916
        }
2917
 
2918
      if (info->relocatable)
2919
        continue;
2920
 
2921
      address = rel->r_offset;
2922
 
2923
      /* Then, process normally.  */
2924
      switch (r_type)
2925
        {
2926
        case R_BFIN_GNU_VTINHERIT:
2927
        case R_BFIN_GNU_VTENTRY:
2928
          return bfd_reloc_ok;
2929
 
2930
        case R_got:
2931
          /* Relocation is to the address of the entry for this symbol
2932
             in the global offset table.  */
2933
          if (h != NULL
2934
              && strcmp (h->root.root.string, "__GLOBAL_OFFSET_TABLE_") == 0)
2935
            goto do_default;
2936
          /* Fall through.  */
2937
          /* Relocation is the offset of the entry for this symbol in
2938
             the global offset table.  */
2939
 
2940
          {
2941
            bfd_vma off;
2942
 
2943
          if (dynobj == NULL)
2944
            {
2945
              /* Create the .got section.  */
2946
              elf_hash_table (info)->dynobj = dynobj = output_bfd;
2947
              if (!_bfd_elf_create_got_section (dynobj, info))
2948
                return FALSE;
2949
            }
2950
 
2951
            if (sgot == NULL)
2952
              {
2953
                sgot = bfd_get_section_by_name (dynobj, ".got");
2954
                BFD_ASSERT (sgot != NULL);
2955
              }
2956
 
2957
            if (h != NULL)
2958
              {
2959
                bfd_boolean dyn;
2960
 
2961
                off = h->got.offset;
2962
                BFD_ASSERT (off != (bfd_vma) - 1);
2963
                dyn = elf_hash_table (info)->dynamic_sections_created;
2964
 
2965
                if (!WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
2966
                    || (info->shared
2967
                        && (info->symbolic
2968
                            || h->dynindx == -1
2969
                            || h->forced_local)
2970
                        && h->def_regular))
2971
                  {
2972
                    /* This is actually a static link, or it is a
2973
                       -Bsymbolic link and the symbol is defined
2974
                       locally, or the symbol was forced to be local
2975
                       because of a version file..  We must initialize
2976
                       this entry in the global offset table.  Since
2977
                       the offset must always be a multiple of 4, we
2978
                       use the least significant bit to record whether
2979
                       we have initialized it already.
2980
 
2981
                       When doing a dynamic link, we create a .rela.got
2982
                       relocation entry to initialize the value.  This
2983
                       is done in the finish_dynamic_symbol routine.  */
2984
                    if ((off & 1) != 0)
2985
                      off &= ~1;
2986
                    else
2987
                      {
2988
                        bfd_put_32 (output_bfd, relocation,
2989
                                    sgot->contents + off);
2990
                        h->got.offset |= 1;
2991
                      }
2992
                  }
2993
                else
2994
                  unresolved_reloc = FALSE;
2995
              }
2996
            else
2997
              {
2998
                BFD_ASSERT (local_got_offsets != NULL);
2999
                off = local_got_offsets[r_symndx];
3000
                BFD_ASSERT (off != (bfd_vma) - 1);
3001
 
3002
                /* The offset must always be a multiple of 4.  We use
3003
                   the least significant bit to record whether we have
3004
                   already generated the necessary reloc.  */
3005
                if ((off & 1) != 0)
3006
                  off &= ~1;
3007
                else
3008
                  {
3009
                    bfd_put_32 (output_bfd, relocation, sgot->contents + off);
3010
 
3011
                    if (info->shared)
3012
                      {
3013
                        asection *s;
3014
                        Elf_Internal_Rela outrel;
3015
                        bfd_byte *loc;
3016
 
3017
                        s = bfd_get_section_by_name (dynobj, ".rela.got");
3018
                        BFD_ASSERT (s != NULL);
3019
 
3020
                        outrel.r_offset = (sgot->output_section->vma
3021
                                           + sgot->output_offset + off);
3022
                        outrel.r_info =
3023
                          ELF32_R_INFO (0, R_pcrel24);
3024
                        outrel.r_addend = relocation;
3025
                        loc = s->contents;
3026
                        loc +=
3027
                          s->reloc_count++ * sizeof (Elf32_External_Rela);
3028
                        bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3029
                      }
3030
 
3031
                    local_got_offsets[r_symndx] |= 1;
3032
                  }
3033
              }
3034
 
3035
            relocation = sgot->output_offset + off;
3036
            rel->r_addend = 0;
3037
            /* bfin : preg = [preg + 17bitdiv4offset] relocation is div by 4.  */
3038
            relocation /= 4;
3039
          }
3040
          goto do_default;
3041
 
3042
        case R_pcrel24:
3043
        case R_pcrel24_jump_l:
3044
          {
3045
            bfd_vma x;
3046
 
3047
            relocation += rel->r_addend;
3048
 
3049
            /* Perform usual pc-relative correction.  */
3050
            relocation -= input_section->output_section->vma + input_section->output_offset;
3051
            relocation -= address;
3052
 
3053
            /* We are getting reloc_entry->address 2 byte off from
3054
               the start of instruction. Assuming absolute postion
3055
               of the reloc data. But, following code had been written assuming
3056
               reloc address is starting at begining of instruction.
3057
               To compensate that I have increased the value of
3058
               relocation by 1 (effectively 2) and used the addr -2 instead of addr.  */
3059
 
3060
            relocation += 2;
3061
            address -= 2;
3062
 
3063
            relocation >>= 1;
3064
 
3065
            x = bfd_get_16 (input_bfd, contents + address);
3066
            x = (x & 0xff00) | ((relocation >> 16) & 0xff);
3067
            bfd_put_16 (input_bfd, x, contents + address);
3068
 
3069
            x = bfd_get_16 (input_bfd, contents + address + 2);
3070
            x = relocation & 0xFFFF;
3071
            bfd_put_16 (input_bfd, x, contents + address + 2);
3072
            r = bfd_reloc_ok;
3073
          }
3074
          break;
3075
 
3076
        default:
3077
        do_default:
3078
          r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3079
                                        contents, address,
3080
                                        relocation, rel->r_addend);
3081
 
3082
          break;
3083
        }
3084
 
3085
      /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
3086
         because such sections are not SEC_ALLOC and thus ld.so will
3087
         not process them.  */
3088
      if (unresolved_reloc
3089
          && !((input_section->flags & SEC_DEBUGGING) != 0 && h->def_dynamic))
3090
        {
3091
          (*_bfd_error_handler)
3092
            (_("%B(%A+0x%lx): unresolvable relocation against symbol `%s'"),
3093
             input_bfd,
3094
             input_section, (long) rel->r_offset, h->root.root.string);
3095
          return FALSE;
3096
        }
3097
 
3098
      if (r != bfd_reloc_ok)
3099
        {
3100
          const char *name;
3101
 
3102
          if (h != NULL)
3103
            name = h->root.root.string;
3104
          else
3105
            {
3106
              name = bfd_elf_string_from_elf_section (input_bfd,
3107
                                                      symtab_hdr->sh_link,
3108
                                                      sym->st_name);
3109
              if (name == NULL)
3110
                return FALSE;
3111
              if (*name == '\0')
3112
                name = bfd_section_name (input_bfd, sec);
3113
            }
3114
 
3115
          if (r == bfd_reloc_overflow)
3116
            {
3117
              if (!(info->callbacks->reloc_overflow
3118
                    (info, (h ? &h->root : NULL), name, howto->name,
3119
                     (bfd_vma) 0, input_bfd, input_section, rel->r_offset)))
3120
                return FALSE;
3121
            }
3122
          else
3123
            {
3124
              (*_bfd_error_handler)
3125
                (_("%B(%A+0x%lx): reloc against `%s': error %d"),
3126
                 input_bfd, input_section,
3127
                 (long) rel->r_offset, name, (int) r);
3128
              return FALSE;
3129
            }
3130
        }
3131
    }
3132
 
3133
  return TRUE;
3134
}
3135
 
3136
static asection *
3137
bfin_gc_mark_hook (asection * sec,
3138
                   struct bfd_link_info *info,
3139
                   Elf_Internal_Rela * rel,
3140
                   struct elf_link_hash_entry *h,
3141
                   Elf_Internal_Sym * sym)
3142
{
3143
  if (h != NULL)
3144
    switch (ELF32_R_TYPE (rel->r_info))
3145
      {
3146
      case R_BFIN_GNU_VTINHERIT:
3147
      case R_BFIN_GNU_VTENTRY:
3148
        return NULL;
3149
      }
3150
 
3151
  return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
3152
}
3153
 
3154
/* Update the got entry reference counts for the section being removed.  */
3155
 
3156
static bfd_boolean
3157
bfin_gc_sweep_hook (bfd * abfd,
3158
                    struct bfd_link_info *info,
3159
                    asection * sec,
3160
                    const Elf_Internal_Rela * relocs)
3161
{
3162
  Elf_Internal_Shdr *symtab_hdr;
3163
  struct elf_link_hash_entry **sym_hashes;
3164
  bfd_signed_vma *local_got_refcounts;
3165
  const Elf_Internal_Rela *rel, *relend;
3166
  bfd *dynobj;
3167
  asection *sgot;
3168
  asection *srelgot;
3169
 
3170
  dynobj = elf_hash_table (info)->dynobj;
3171
  if (dynobj == NULL)
3172
    return TRUE;
3173
 
3174
  symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3175
  sym_hashes = elf_sym_hashes (abfd);
3176
  local_got_refcounts = elf_local_got_refcounts (abfd);
3177
 
3178
  sgot = bfd_get_section_by_name (dynobj, ".got");
3179
  srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
3180
 
3181
  relend = relocs + sec->reloc_count;
3182
  for (rel = relocs; rel < relend; rel++)
3183
    {
3184
      unsigned long r_symndx;
3185
      struct elf_link_hash_entry *h;
3186
 
3187
      switch (ELF32_R_TYPE (rel->r_info))
3188
        {
3189
        case R_got:
3190
          r_symndx = ELF32_R_SYM (rel->r_info);
3191
          if (r_symndx >= symtab_hdr->sh_info)
3192
            {
3193
              h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3194
              if (h->got.refcount > 0)
3195
                {
3196
                  --h->got.refcount;
3197
                  if (h->got.refcount == 0)
3198
                    {
3199
                      /* We don't need the .got entry any more.  */
3200
                      sgot->size -= 4;
3201
                      srelgot->size -= sizeof (Elf32_External_Rela);
3202
                    }
3203
                }
3204
            }
3205
          else if (local_got_refcounts != NULL)
3206
            {
3207
              if (local_got_refcounts[r_symndx] > 0)
3208
                {
3209
                  --local_got_refcounts[r_symndx];
3210
                  if (local_got_refcounts[r_symndx] == 0)
3211
                    {
3212
                      /* We don't need the .got entry any more.  */
3213
                      sgot->size -= 4;
3214
                      if (info->shared)
3215
                        srelgot->size -= sizeof (Elf32_External_Rela);
3216
                    }
3217
                }
3218
            }
3219
          break;
3220
        default:
3221
          break;
3222
        }
3223
    }
3224
  return TRUE;
3225
}
3226
 
3227
/* We need dynamic symbols for every section, since segments can
3228
   relocate independently.  */
3229
static bfd_boolean
3230
_bfinfdpic_link_omit_section_dynsym (bfd *output_bfd ATTRIBUTE_UNUSED,
3231
                                    struct bfd_link_info *info
3232
                                    ATTRIBUTE_UNUSED,
3233
                                    asection *p ATTRIBUTE_UNUSED)
3234
{
3235
  switch (elf_section_data (p)->this_hdr.sh_type)
3236
    {
3237
    case SHT_PROGBITS:
3238
    case SHT_NOBITS:
3239
      /* If sh_type is yet undecided, assume it could be
3240
         SHT_PROGBITS/SHT_NOBITS.  */
3241
    case SHT_NULL:
3242
      return FALSE;
3243
 
3244
      /* There shouldn't be section relative relocations
3245
         against any other section.  */
3246
    default:
3247
      return TRUE;
3248
    }
3249
}
3250
 
3251
/* Create  a .got section, as well as its additional info field.  This
3252
   is almost entirely copied from
3253
   elflink.c:_bfd_elf_create_got_section().  */
3254
 
3255
static bfd_boolean
3256
_bfin_create_got_section (bfd *abfd, struct bfd_link_info *info)
3257
{
3258
  flagword flags, pltflags;
3259
  asection *s;
3260
  struct elf_link_hash_entry *h;
3261
  const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3262
  int ptralign;
3263
  int offset;
3264
 
3265
  /* This function may be called more than once.  */
3266
  s = bfd_get_section_by_name (abfd, ".got");
3267
  if (s != NULL && (s->flags & SEC_LINKER_CREATED) != 0)
3268
    return TRUE;
3269
 
3270
  /* Machine specific: although pointers are 32-bits wide, we want the
3271
     GOT to be aligned to a 64-bit boundary, such that function
3272
     descriptors in it can be accessed with 64-bit loads and
3273
     stores.  */
3274
  ptralign = 3;
3275
 
3276
  flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3277
           | SEC_LINKER_CREATED);
3278
  pltflags = flags;
3279
 
3280
  s = bfd_make_section_with_flags (abfd, ".got", flags);
3281
  if (s == NULL
3282
      || !bfd_set_section_alignment (abfd, s, ptralign))
3283
    return FALSE;
3284
 
3285
  if (bed->want_got_plt)
3286
    {
3287
      s = bfd_make_section_with_flags (abfd, ".got.plt", flags);
3288
      if (s == NULL
3289
          || !bfd_set_section_alignment (abfd, s, ptralign))
3290
        return FALSE;
3291
    }
3292
 
3293
  if (bed->want_got_sym)
3294
    {
3295
      /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the .got
3296
         (or .got.plt) section.  We don't do this in the linker script
3297
         because we don't want to define the symbol if we are not creating
3298
         a global offset table.  */
3299
      h = _bfd_elf_define_linkage_sym (abfd, info, s, "__GLOBAL_OFFSET_TABLE_");
3300
      elf_hash_table (info)->hgot = h;
3301
      if (h == NULL)
3302
        return FALSE;
3303
 
3304
      /* Machine-specific: we want the symbol for executables as
3305
         well.  */
3306
      if (! bfd_elf_link_record_dynamic_symbol (info, h))
3307
        return FALSE;
3308
    }
3309
 
3310
  /* The first bit of the global offset table is the header.  */
3311
  s->size += bed->got_header_size;
3312
 
3313
  /* This is the machine-specific part.  Create and initialize section
3314
     data for the got.  */
3315
  if (IS_FDPIC (abfd))
3316
    {
3317
      bfinfdpic_got_section (info) = s;
3318
      bfinfdpic_relocs_info (info) = htab_try_create (1,
3319
                                                      bfinfdpic_relocs_info_hash,
3320
                                                      bfinfdpic_relocs_info_eq,
3321
                                                      (htab_del) NULL);
3322
      if (! bfinfdpic_relocs_info (info))
3323
        return FALSE;
3324
 
3325
      s = bfd_make_section_with_flags (abfd, ".rel.got",
3326
                                       (flags | SEC_READONLY));
3327
      if (s == NULL
3328
          || ! bfd_set_section_alignment (abfd, s, 2))
3329
        return FALSE;
3330
 
3331
      bfinfdpic_gotrel_section (info) = s;
3332
 
3333
      /* Machine-specific.  */
3334
      s = bfd_make_section_with_flags (abfd, ".rofixup",
3335
                                       (flags | SEC_READONLY));
3336
      if (s == NULL
3337
          || ! bfd_set_section_alignment (abfd, s, 2))
3338
        return FALSE;
3339
 
3340
      bfinfdpic_gotfixup_section (info) = s;
3341
      offset = -2048;
3342
      flags = BSF_GLOBAL;
3343
    }
3344
  else
3345
    {
3346
      offset = 2048;
3347
      flags = BSF_GLOBAL | BSF_WEAK;
3348
    }
3349
 
3350
  return TRUE;
3351
}
3352
 
3353
/* Make sure the got and plt sections exist, and that our pointers in
3354
   the link hash table point to them.  */
3355
 
3356
static bfd_boolean
3357
elf32_bfinfdpic_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
3358
{
3359
  /* This is mostly copied from
3360
     elflink.c:_bfd_elf_create_dynamic_sections().  */
3361
  flagword flags, pltflags;
3362
  asection *s;
3363
  const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3364
 
3365
  /* We need to create .plt, .rel[a].plt, .got, .got.plt, .dynbss, and
3366
     .rel[a].bss sections.  */
3367
 
3368
  flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3369
           | SEC_LINKER_CREATED);
3370
 
3371
  pltflags = flags;
3372
  pltflags |= SEC_CODE;
3373
  if (bed->plt_not_loaded)
3374
    pltflags &= ~ (SEC_CODE | SEC_LOAD | SEC_HAS_CONTENTS);
3375
  if (bed->plt_readonly)
3376
    pltflags |= SEC_READONLY;
3377
 
3378
  s = bfd_make_section_with_flags (abfd, ".plt", pltflags);
3379
  if (s == NULL
3380
      || ! bfd_set_section_alignment (abfd, s, bed->plt_alignment))
3381
    return FALSE;
3382
  /* Blackfin-specific: remember it.  */
3383
  bfinfdpic_plt_section (info) = s;
3384
 
3385
  if (bed->want_plt_sym)
3386
    {
3387
      /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
3388
         .plt section.  */
3389
      struct elf_link_hash_entry *h;
3390
      struct bfd_link_hash_entry *bh = NULL;
3391
 
3392
      if (! (_bfd_generic_link_add_one_symbol
3393
             (info, abfd, "__PROCEDURE_LINKAGE_TABLE_", BSF_GLOBAL, s, 0, NULL,
3394
              FALSE, get_elf_backend_data (abfd)->collect, &bh)))
3395
        return FALSE;
3396
      h = (struct elf_link_hash_entry *) bh;
3397
      h->def_regular = 1;
3398
      h->type = STT_OBJECT;
3399
 
3400
      if (! info->executable
3401
          && ! bfd_elf_link_record_dynamic_symbol (info, h))
3402
        return FALSE;
3403
    }
3404
 
3405
  /* Blackfin-specific: we want rel relocations for the plt.  */
3406
  s = bfd_make_section_with_flags (abfd, ".rel.plt", flags | SEC_READONLY);
3407
  if (s == NULL
3408
      || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
3409
    return FALSE;
3410
  /* Blackfin-specific: remember it.  */
3411
  bfinfdpic_pltrel_section (info) = s;
3412
 
3413
  /* Blackfin-specific: we want to create the GOT in the Blackfin way.  */
3414
  if (! _bfin_create_got_section (abfd, info))
3415
    return FALSE;
3416
 
3417
  /* Blackfin-specific: make sure we created everything we wanted.  */
3418
  BFD_ASSERT (bfinfdpic_got_section (info) && bfinfdpic_gotrel_section (info)
3419
              /* && bfinfdpic_gotfixup_section (info) */
3420
              && bfinfdpic_plt_section (info)
3421
              && bfinfdpic_pltrel_section (info));
3422
 
3423
  if (bed->want_dynbss)
3424
    {
3425
      /* The .dynbss section is a place to put symbols which are defined
3426
         by dynamic objects, are referenced by regular objects, and are
3427
         not functions.  We must allocate space for them in the process
3428
         image and use a R_*_COPY reloc to tell the dynamic linker to
3429
         initialize them at run time.  The linker script puts the .dynbss
3430
         section into the .bss section of the final image.  */
3431
      s = bfd_make_section_with_flags (abfd, ".dynbss",
3432
                                       SEC_ALLOC | SEC_LINKER_CREATED);
3433
      if (s == NULL)
3434
        return FALSE;
3435
 
3436
      /* The .rel[a].bss section holds copy relocs.  This section is not
3437
     normally needed.  We need to create it here, though, so that the
3438
     linker will map it to an output section.  We can't just create it
3439
     only if we need it, because we will not know whether we need it
3440
     until we have seen all the input files, and the first time the
3441
     main linker code calls BFD after examining all the input files
3442
     (size_dynamic_sections) the input sections have already been
3443
     mapped to the output sections.  If the section turns out not to
3444
     be needed, we can discard it later.  We will never need this
3445
     section when generating a shared object, since they do not use
3446
     copy relocs.  */
3447
      if (! info->shared)
3448
        {
3449
          s = bfd_make_section_with_flags (abfd,
3450
                                           (bed->default_use_rela_p
3451
                                            ? ".rela.bss" : ".rel.bss"),
3452
                                           flags | SEC_READONLY);
3453
          if (s == NULL
3454
              || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
3455
            return FALSE;
3456
        }
3457
    }
3458
 
3459
  return TRUE;
3460
}
3461
 
3462
/* The name of the dynamic interpreter.  This is put in the .interp
3463
   section.  */
3464
 
3465
#define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
3466
 
3467
#define DEFAULT_STACK_SIZE 0x20000
3468
 
3469
/* This structure is used to collect the number of entries present in
3470
   each addressable range of the got.  */
3471
struct _bfinfdpic_dynamic_got_info
3472
{
3473
  /* Several bits of information about the current link.  */
3474
  struct bfd_link_info *info;
3475
  /* Total size needed for GOT entries within the 18- or 32-bit
3476
     ranges.  */
3477
  bfd_vma got17m4, gothilo;
3478
  /* Total size needed for function descriptor entries within the 18-
3479
     or 32-bit ranges.  */
3480
  bfd_vma fd17m4, fdhilo;
3481
  /* Total size needed function descriptor entries referenced in PLT
3482
     entries, that would be profitable to place in offsets close to
3483
     the PIC register.  */
3484
  bfd_vma fdplt;
3485
  /* Total size needed by lazy PLT entries.  */
3486
  bfd_vma lzplt;
3487
  /* Number of relocations carried over from input object files.  */
3488
  unsigned long relocs;
3489
  /* Number of fixups introduced by relocations in input object files.  */
3490
  unsigned long fixups;
3491
};
3492
 
3493
/* Compute the total GOT size required by each symbol in each range.
3494
   Symbols may require up to 4 words in the GOT: an entry pointing to
3495
   the symbol, an entry pointing to its function descriptor, and a
3496
   private function descriptors taking two words.  */
3497
 
3498
static int
3499
_bfinfdpic_count_got_plt_entries (void **entryp, void *dinfo_)
3500
{
3501
  struct bfinfdpic_relocs_info *entry = *entryp;
3502
  struct _bfinfdpic_dynamic_got_info *dinfo = dinfo_;
3503
  unsigned relocs = 0, fixups = 0;
3504
 
3505
  /* Allocate space for a GOT entry pointing to the symbol.  */
3506
  if (entry->got17m4)
3507
    dinfo->got17m4 += 4;
3508
  else if (entry->gothilo)
3509
    dinfo->gothilo += 4;
3510
  else
3511
    entry->relocs32--;
3512
  entry->relocs32++;
3513
 
3514
  /* Allocate space for a GOT entry pointing to the function
3515
     descriptor.  */
3516
  if (entry->fdgot17m4)
3517
    dinfo->got17m4 += 4;
3518
  else if (entry->fdgothilo)
3519
    dinfo->gothilo += 4;
3520
  else
3521
    entry->relocsfd--;
3522
  entry->relocsfd++;
3523
 
3524
  /* Decide whether we need a PLT entry, a function descriptor in the
3525
     GOT, and a lazy PLT entry for this symbol.  */
3526
  entry->plt = entry->call
3527
    && entry->symndx == -1 && ! BFINFDPIC_SYM_LOCAL (dinfo->info, entry->d.h)
3528
    && elf_hash_table (dinfo->info)->dynamic_sections_created;
3529
  entry->privfd = entry->plt
3530
    || entry->fdgoff17m4 || entry->fdgoffhilo
3531
    || ((entry->fd || entry->fdgot17m4 || entry->fdgothilo)
3532
        && (entry->symndx != -1
3533
            || BFINFDPIC_FUNCDESC_LOCAL (dinfo->info, entry->d.h)));
3534
  entry->lazyplt = entry->privfd
3535
    && entry->symndx == -1 && ! BFINFDPIC_SYM_LOCAL (dinfo->info, entry->d.h)
3536
    && ! (dinfo->info->flags & DF_BIND_NOW)
3537
    && elf_hash_table (dinfo->info)->dynamic_sections_created;
3538
 
3539
  /* Allocate space for a function descriptor.  */
3540
  if (entry->fdgoff17m4)
3541
    dinfo->fd17m4 += 8;
3542
  else if (entry->privfd && entry->plt)
3543
    dinfo->fdplt += 8;
3544
  else if (entry->privfd)
3545
    dinfo->fdhilo += 8;
3546
  else
3547
    entry->relocsfdv--;
3548
  entry->relocsfdv++;
3549
 
3550
  if (entry->lazyplt)
3551
    dinfo->lzplt += LZPLT_NORMAL_SIZE;
3552
 
3553
  if (!dinfo->info->executable || dinfo->info->pie)
3554
    relocs = entry->relocs32 + entry->relocsfd + entry->relocsfdv;
3555
  else
3556
    {
3557
      if (entry->symndx != -1 || BFINFDPIC_SYM_LOCAL (dinfo->info, entry->d.h))
3558
        {
3559
          if (entry->symndx != -1
3560
              || entry->d.h->root.type != bfd_link_hash_undefweak)
3561
            fixups += entry->relocs32 + 2 * entry->relocsfdv;
3562
        }
3563
      else
3564
        relocs += entry->relocs32 + entry->relocsfdv;
3565
 
3566
      if (entry->symndx != -1
3567
          || BFINFDPIC_FUNCDESC_LOCAL (dinfo->info, entry->d.h))
3568
        {
3569
          if (entry->symndx != -1
3570
              || entry->d.h->root.type != bfd_link_hash_undefweak)
3571
            fixups += entry->relocsfd;
3572
        }
3573
      else
3574
        relocs += entry->relocsfd;
3575
    }
3576
 
3577
  entry->dynrelocs += relocs;
3578
  entry->fixups += fixups;
3579
  dinfo->relocs += relocs;
3580
  dinfo->fixups += fixups;
3581
 
3582
  return 1;
3583
}
3584
 
3585
/* This structure is used to assign offsets to got entries, function
3586
   descriptors, plt entries and lazy plt entries.  */
3587
 
3588
struct _bfinfdpic_dynamic_got_plt_info
3589
{
3590
  /* Summary information collected with _bfinfdpic_count_got_plt_entries.  */
3591
  struct _bfinfdpic_dynamic_got_info g;
3592
 
3593
  /* For each addressable range, we record a MAX (positive) and MIN
3594
     (negative) value.  CUR is used to assign got entries, and it's
3595
     incremented from an initial positive value to MAX, then from MIN
3596
     to FDCUR (unless FDCUR wraps around first).  FDCUR is used to
3597
     assign function descriptors, and it's decreased from an initial
3598
     non-positive value to MIN, then from MAX down to CUR (unless CUR
3599
     wraps around first).  All of MIN, MAX, CUR and FDCUR always point
3600
     to even words.  ODD, if non-zero, indicates an odd word to be
3601
     used for the next got entry, otherwise CUR is used and
3602
     incremented by a pair of words, wrapping around when it reaches
3603
     MAX.  FDCUR is decremented (and wrapped) before the next function
3604
     descriptor is chosen.  FDPLT indicates the number of remaining
3605
     slots that can be used for function descriptors used only by PLT
3606
     entries.  */
3607
  struct _bfinfdpic_dynamic_got_alloc_data
3608
  {
3609
    bfd_signed_vma max, cur, odd, fdcur, min;
3610
    bfd_vma fdplt;
3611
  } got17m4, gothilo;
3612
};
3613
 
3614
/* Determine the positive and negative ranges to be used by each
3615
   offset range in the GOT.  FDCUR and CUR, that must be aligned to a
3616
   double-word boundary, are the minimum (negative) and maximum
3617
   (positive) GOT offsets already used by previous ranges, except for
3618
   an ODD entry that may have been left behind.  GOT and FD indicate
3619
   the size of GOT entries and function descriptors that must be
3620
   placed within the range from -WRAP to WRAP.  If there's room left,
3621
   up to FDPLT bytes should be reserved for additional function
3622
   descriptors.  */
3623
 
3624
inline static bfd_signed_vma
3625
_bfinfdpic_compute_got_alloc_data (struct _bfinfdpic_dynamic_got_alloc_data *gad,
3626
                                   bfd_signed_vma fdcur,
3627
                                   bfd_signed_vma odd,
3628
                                   bfd_signed_vma cur,
3629
                                   bfd_vma got,
3630
                                   bfd_vma fd,
3631
                                   bfd_vma fdplt,
3632
                                   bfd_vma wrap)
3633
{
3634
  bfd_signed_vma wrapmin = -wrap;
3635
 
3636
  /* Start at the given initial points.  */
3637
  gad->fdcur = fdcur;
3638
  gad->cur = cur;
3639
 
3640
  /* If we had an incoming odd word and we have any got entries that
3641
     are going to use it, consume it, otherwise leave gad->odd at
3642
     zero.  We might force gad->odd to zero and return the incoming
3643
     odd such that it is used by the next range, but then GOT entries
3644
     might appear to be out of order and we wouldn't be able to
3645
     shorten the GOT by one word if it turns out to end with an
3646
     unpaired GOT entry.  */
3647
  if (odd && got)
3648
    {
3649
      gad->odd = odd;
3650
      got -= 4;
3651
      odd = 0;
3652
    }
3653
  else
3654
    gad->odd = 0;
3655
 
3656
  /* If we're left with an unpaired GOT entry, compute its location
3657
     such that we can return it.  Otherwise, if got doesn't require an
3658
     odd number of words here, either odd was already zero in the
3659
     block above, or it was set to zero because got was non-zero, or
3660
     got was already zero.  In the latter case, we want the value of
3661
     odd to carry over to the return statement, so we don't want to
3662
     reset odd unless the condition below is true.  */
3663
  if (got & 4)
3664
    {
3665
      odd = cur + got;
3666
      got += 4;
3667
    }
3668
 
3669
  /* Compute the tentative boundaries of this range.  */
3670
  gad->max = cur + got;
3671
  gad->min = fdcur - fd;
3672
  gad->fdplt = 0;
3673
 
3674
  /* If function descriptors took too much space, wrap some of them
3675
     around.  */
3676
  if (gad->min < wrapmin)
3677
    {
3678
      gad->max += wrapmin - gad->min;
3679
      gad->min = wrapmin;
3680
    }
3681
  /* If there is space left and we have function descriptors
3682
     referenced in PLT entries that could take advantage of shorter
3683
     offsets, place them here.  */
3684
  else if (fdplt && gad->min > wrapmin)
3685
    {
3686
      bfd_vma fds;
3687
      if ((bfd_vma) (gad->min - wrapmin) < fdplt)
3688
        fds = gad->min - wrapmin;
3689
      else
3690
        fds = fdplt;
3691
 
3692
      fdplt -= fds;
3693
      gad->min -= fds;
3694
      gad->fdplt += fds;
3695
    }
3696
 
3697
  /* If GOT entries took too much space, wrap some of them around.
3698
     This may well cause gad->min to become lower than wrapmin.  This
3699
     will cause a relocation overflow later on, so we don't have to
3700
     report it here . */
3701
  if ((bfd_vma) gad->max > wrap)
3702
    {
3703
      gad->min -= gad->max - wrap;
3704
      gad->max = wrap;
3705
    }
3706
  /* If there is more space left, try to place some more function
3707
     descriptors for PLT entries.  */
3708
  else if (fdplt && (bfd_vma) gad->max < wrap)
3709
    {
3710
      bfd_vma fds;
3711
      if ((bfd_vma) (wrap - gad->max) < fdplt)
3712
        fds = wrap - gad->max;
3713
      else
3714
        fds = fdplt;
3715
 
3716
      fdplt -= fds;
3717
      gad->max += fds;
3718
      gad->fdplt += fds;
3719
    }
3720
 
3721
  /* If odd was initially computed as an offset past the wrap point,
3722
     wrap it around.  */
3723
  if (odd > gad->max)
3724
    odd = gad->min + odd - gad->max;
3725
 
3726
  /* _bfinfdpic_get_got_entry() below will always wrap gad->cur if needed
3727
     before returning, so do it here too.  This guarantees that,
3728
     should cur and fdcur meet at the wrap point, they'll both be
3729
     equal to min.  */
3730
  if (gad->cur == gad->max)
3731
    gad->cur = gad->min;
3732
 
3733
  return odd;
3734
}
3735
 
3736
/* Compute the location of the next GOT entry, given the allocation
3737
   data for a range.  */
3738
 
3739
inline static bfd_signed_vma
3740
_bfinfdpic_get_got_entry (struct _bfinfdpic_dynamic_got_alloc_data *gad)
3741
{
3742
  bfd_signed_vma ret;
3743
 
3744
  if (gad->odd)
3745
    {
3746
      /* If there was an odd word left behind, use it.  */
3747
      ret = gad->odd;
3748
      gad->odd = 0;
3749
    }
3750
  else
3751
    {
3752
      /* Otherwise, use the word pointed to by cur, reserve the next
3753
         as an odd word, and skip to the next pair of words, possibly
3754
         wrapping around.  */
3755
      ret = gad->cur;
3756
      gad->odd = gad->cur + 4;
3757
      gad->cur += 8;
3758
      if (gad->cur == gad->max)
3759
        gad->cur = gad->min;
3760
    }
3761
 
3762
  return ret;
3763
}
3764
 
3765
/* Compute the location of the next function descriptor entry in the
3766
   GOT, given the allocation data for a range.  */
3767
 
3768
inline static bfd_signed_vma
3769
_bfinfdpic_get_fd_entry (struct _bfinfdpic_dynamic_got_alloc_data *gad)
3770
{
3771
  /* If we're at the bottom, wrap around, and only then allocate the
3772
     next pair of words.  */
3773
  if (gad->fdcur == gad->min)
3774
    gad->fdcur = gad->max;
3775
  return gad->fdcur -= 8;
3776
}
3777
 
3778
/* Assign GOT offsets for every GOT entry and function descriptor.
3779
   Doing everything in a single pass is tricky.  */
3780
 
3781
static int
3782
_bfinfdpic_assign_got_entries (void **entryp, void *info_)
3783
{
3784
  struct bfinfdpic_relocs_info *entry = *entryp;
3785
  struct _bfinfdpic_dynamic_got_plt_info *dinfo = info_;
3786
 
3787
  if (entry->got17m4)
3788
    entry->got_entry = _bfinfdpic_get_got_entry (&dinfo->got17m4);
3789
  else if (entry->gothilo)
3790
    entry->got_entry = _bfinfdpic_get_got_entry (&dinfo->gothilo);
3791
 
3792
  if (entry->fdgot17m4)
3793
    entry->fdgot_entry = _bfinfdpic_get_got_entry (&dinfo->got17m4);
3794
  else if (entry->fdgothilo)
3795
    entry->fdgot_entry = _bfinfdpic_get_got_entry (&dinfo->gothilo);
3796
 
3797
  if (entry->fdgoff17m4)
3798
    entry->fd_entry = _bfinfdpic_get_fd_entry (&dinfo->got17m4);
3799
  else if (entry->plt && dinfo->got17m4.fdplt)
3800
    {
3801
      dinfo->got17m4.fdplt -= 8;
3802
      entry->fd_entry = _bfinfdpic_get_fd_entry (&dinfo->got17m4);
3803
    }
3804
  else if (entry->plt)
3805
    {
3806
      dinfo->gothilo.fdplt -= 8;
3807
      entry->fd_entry = _bfinfdpic_get_fd_entry (&dinfo->gothilo);
3808
    }
3809
  else if (entry->privfd)
3810
    entry->fd_entry = _bfinfdpic_get_fd_entry (&dinfo->gothilo);
3811
 
3812
  return 1;
3813
}
3814
 
3815
/* Assign GOT offsets to private function descriptors used by PLT
3816
   entries (or referenced by 32-bit offsets), as well as PLT entries
3817
   and lazy PLT entries.  */
3818
 
3819
static int
3820
_bfinfdpic_assign_plt_entries (void **entryp, void *info_)
3821
{
3822
  struct bfinfdpic_relocs_info *entry = *entryp;
3823
  struct _bfinfdpic_dynamic_got_plt_info *dinfo = info_;
3824
 
3825
  /* If this symbol requires a local function descriptor, allocate
3826
     one.  */
3827
  if (entry->privfd && entry->fd_entry == 0)
3828
    {
3829
      if (dinfo->got17m4.fdplt)
3830
        {
3831
          entry->fd_entry = _bfinfdpic_get_fd_entry (&dinfo->got17m4);
3832
          dinfo->got17m4.fdplt -= 8;
3833
        }
3834
      else
3835
        {
3836
          BFD_ASSERT (dinfo->gothilo.fdplt);
3837
          entry->fd_entry = _bfinfdpic_get_fd_entry (&dinfo->gothilo);
3838
          dinfo->gothilo.fdplt -= 8;
3839
        }
3840
    }
3841
 
3842
  if (entry->plt)
3843
    {
3844
      int size;
3845
 
3846
      /* We use the section's raw size to mark the location of the
3847
         next PLT entry.  */
3848
      entry->plt_entry = bfinfdpic_plt_section (dinfo->g.info)->size;
3849
 
3850
      /* Figure out the length of this PLT entry based on the
3851
         addressing mode we need to reach the function descriptor.  */
3852
      BFD_ASSERT (entry->fd_entry);
3853
      if (entry->fd_entry >= -(1 << (18 - 1))
3854
          && entry->fd_entry + 4 < (1 << (18 - 1)))
3855
        size = 10;
3856
      else
3857
        size = 16;
3858
 
3859
      bfinfdpic_plt_section (dinfo->g.info)->size += size;
3860
    }
3861
 
3862
  if (entry->lazyplt)
3863
    {
3864
      entry->lzplt_entry = dinfo->g.lzplt;
3865
      dinfo->g.lzplt += LZPLT_NORMAL_SIZE;
3866
      /* If this entry is the one that gets the resolver stub, account
3867
         for the additional instruction.  */
3868
      if (entry->lzplt_entry % BFINFDPIC_LZPLT_BLOCK_SIZE
3869
          == BFINFDPIC_LZPLT_RESOLV_LOC)
3870
        dinfo->g.lzplt += LZPLT_RESOLVER_EXTRA;
3871
    }
3872
 
3873
  return 1;
3874
}
3875
 
3876
/* Follow indirect and warning hash entries so that each got entry
3877
   points to the final symbol definition.  P must point to a pointer
3878
   to the hash table we're traversing.  Since this traversal may
3879
   modify the hash table, we set this pointer to NULL to indicate
3880
   we've made a potentially-destructive change to the hash table, so
3881
   the traversal must be restarted.  */
3882
static int
3883
_bfinfdpic_resolve_final_relocs_info (void **entryp, void *p)
3884
{
3885
  struct bfinfdpic_relocs_info *entry = *entryp;
3886
  htab_t *htab = p;
3887
 
3888
  if (entry->symndx == -1)
3889
    {
3890
      struct elf_link_hash_entry *h = entry->d.h;
3891
      struct bfinfdpic_relocs_info *oentry;
3892
 
3893
      while (h->root.type == bfd_link_hash_indirect
3894
             || h->root.type == bfd_link_hash_warning)
3895
        h = (struct elf_link_hash_entry *)h->root.u.i.link;
3896
 
3897
      if (entry->d.h == h)
3898
        return 1;
3899
 
3900
      oentry = bfinfdpic_relocs_info_for_global (*htab, 0, h, entry->addend,
3901
                                                NO_INSERT);
3902
 
3903
      if (oentry)
3904
        {
3905
          /* Merge the two entries.  */
3906
          bfinfdpic_pic_merge_early_relocs_info (oentry, entry);
3907
          htab_clear_slot (*htab, entryp);
3908
          return 1;
3909
        }
3910
 
3911
      entry->d.h = h;
3912
 
3913
      /* If we can't find this entry with the new bfd hash, re-insert
3914
         it, and get the traversal restarted.  */
3915
      if (! htab_find (*htab, entry))
3916
        {
3917
          htab_clear_slot (*htab, entryp);
3918
          entryp = htab_find_slot (*htab, entry, INSERT);
3919
          if (! *entryp)
3920
            *entryp = entry;
3921
          /* Abort the traversal, since the whole table may have
3922
             moved, and leave it up to the parent to restart the
3923
             process.  */
3924
          *(htab_t *)p = NULL;
3925
          return 0;
3926
        }
3927
    }
3928
 
3929
  return 1;
3930
}
3931
 
3932
/* Set the sizes of the dynamic sections.  */
3933
 
3934
static bfd_boolean
3935
elf32_bfinfdpic_size_dynamic_sections (bfd *output_bfd,
3936
                                      struct bfd_link_info *info)
3937
{
3938
  bfd *dynobj;
3939
  asection *s;
3940
  struct _bfinfdpic_dynamic_got_plt_info gpinfo;
3941
  bfd_signed_vma odd;
3942
  bfd_vma limit;
3943
 
3944
  dynobj = elf_hash_table (info)->dynobj;
3945
  BFD_ASSERT (dynobj != NULL);
3946
 
3947
  if (elf_hash_table (info)->dynamic_sections_created)
3948
    {
3949
      /* Set the contents of the .interp section to the interpreter.  */
3950
      if (info->executable)
3951
        {
3952
          s = bfd_get_section_by_name (dynobj, ".interp");
3953
          BFD_ASSERT (s != NULL);
3954
          s->size = sizeof ELF_DYNAMIC_INTERPRETER;
3955
          s->contents = (bfd_byte *) ELF_DYNAMIC_INTERPRETER;
3956
        }
3957
    }
3958
 
3959
  memset (&gpinfo, 0, sizeof (gpinfo));
3960
  gpinfo.g.info = info;
3961
 
3962
  for (;;)
3963
    {
3964
      htab_t relocs = bfinfdpic_relocs_info (info);
3965
 
3966
      htab_traverse (relocs, _bfinfdpic_resolve_final_relocs_info, &relocs);
3967
 
3968
      if (relocs == bfinfdpic_relocs_info (info))
3969
        break;
3970
    }
3971
 
3972
  htab_traverse (bfinfdpic_relocs_info (info), _bfinfdpic_count_got_plt_entries,
3973
                 &gpinfo.g);
3974
 
3975
  odd = 12;
3976
  /* Compute the total size taken by entries in the 18-bit range,
3977
     to tell how many PLT function descriptors we can bring into it
3978
     without causing it to overflow.  */
3979
  limit = odd + gpinfo.g.got17m4 + gpinfo.g.fd17m4;
3980
  if (limit < (bfd_vma)1 << 18)
3981
    limit = ((bfd_vma)1 << 18) - limit;
3982
  else
3983
    limit = 0;
3984
  if (gpinfo.g.fdplt < limit)
3985
    limit = gpinfo.g.fdplt;
3986
 
3987
  /* Determine the ranges of GOT offsets that we can use for each
3988
     range of addressing modes.  */
3989
  odd = _bfinfdpic_compute_got_alloc_data (&gpinfo.got17m4,
3990
                                          0,
3991
                                          odd,
3992
                                          16,
3993
                                          gpinfo.g.got17m4,
3994
                                          gpinfo.g.fd17m4,
3995
                                          limit,
3996
                                          (bfd_vma)1 << (18-1));
3997
  odd = _bfinfdpic_compute_got_alloc_data (&gpinfo.gothilo,
3998
                                          gpinfo.got17m4.min,
3999
                                          odd,
4000
                                          gpinfo.got17m4.max,
4001
                                          gpinfo.g.gothilo,
4002
                                          gpinfo.g.fdhilo,
4003
                                          gpinfo.g.fdplt - gpinfo.got17m4.fdplt,
4004
                                          (bfd_vma)1 << (32-1));
4005
 
4006
  /* Now assign (most) GOT offsets.  */
4007
  htab_traverse (bfinfdpic_relocs_info (info), _bfinfdpic_assign_got_entries,
4008
                 &gpinfo);
4009
 
4010
  bfinfdpic_got_section (info)->size = gpinfo.gothilo.max
4011
    - gpinfo.gothilo.min
4012
    /* If an odd word is the last word of the GOT, we don't need this
4013
       word to be part of the GOT.  */
4014
    - (odd + 4 == gpinfo.gothilo.max ? 4 : 0);
4015
  if (bfinfdpic_got_section (info)->size == 0)
4016
    bfinfdpic_got_section (info)->flags |= SEC_EXCLUDE;
4017
  else if (bfinfdpic_got_section (info)->size == 12
4018
           && ! elf_hash_table (info)->dynamic_sections_created)
4019
    {
4020
      bfinfdpic_got_section (info)->flags |= SEC_EXCLUDE;
4021
      bfinfdpic_got_section (info)->size = 0;
4022
    }
4023
  else
4024
    {
4025
      bfinfdpic_got_section (info)->contents =
4026
        (bfd_byte *) bfd_zalloc (dynobj,
4027
                                 bfinfdpic_got_section (info)->size);
4028
      if (bfinfdpic_got_section (info)->contents == NULL)
4029
        return FALSE;
4030
    }
4031
 
4032
  if (elf_hash_table (info)->dynamic_sections_created)
4033
    /* Subtract the number of lzplt entries, since those will generate
4034
       relocations in the pltrel section.  */
4035
    bfinfdpic_gotrel_section (info)->size =
4036
      (gpinfo.g.relocs - gpinfo.g.lzplt / LZPLT_NORMAL_SIZE)
4037
      * get_elf_backend_data (output_bfd)->s->sizeof_rel;
4038
  else
4039
    BFD_ASSERT (gpinfo.g.relocs == 0);
4040
  if (bfinfdpic_gotrel_section (info)->size == 0)
4041
    bfinfdpic_gotrel_section (info)->flags |= SEC_EXCLUDE;
4042
  else
4043
    {
4044
      bfinfdpic_gotrel_section (info)->contents =
4045
        (bfd_byte *) bfd_zalloc (dynobj,
4046
                                 bfinfdpic_gotrel_section (info)->size);
4047
      if (bfinfdpic_gotrel_section (info)->contents == NULL)
4048
        return FALSE;
4049
    }
4050
 
4051
  bfinfdpic_gotfixup_section (info)->size = (gpinfo.g.fixups + 1) * 4;
4052
  if (bfinfdpic_gotfixup_section (info)->size == 0)
4053
    bfinfdpic_gotfixup_section (info)->flags |= SEC_EXCLUDE;
4054
  else
4055
    {
4056
      bfinfdpic_gotfixup_section (info)->contents =
4057
        (bfd_byte *) bfd_zalloc (dynobj,
4058
                                 bfinfdpic_gotfixup_section (info)->size);
4059
      if (bfinfdpic_gotfixup_section (info)->contents == NULL)
4060
        return FALSE;
4061
    }
4062
 
4063
  if (elf_hash_table (info)->dynamic_sections_created)
4064
    {
4065
      bfinfdpic_pltrel_section (info)->size =
4066
        gpinfo.g.lzplt / LZPLT_NORMAL_SIZE * get_elf_backend_data (output_bfd)->s->sizeof_rel;
4067
      if (bfinfdpic_pltrel_section (info)->size == 0)
4068
        bfinfdpic_pltrel_section (info)->flags |= SEC_EXCLUDE;
4069
      else
4070
        {
4071
          bfinfdpic_pltrel_section (info)->contents =
4072
            (bfd_byte *) bfd_zalloc (dynobj,
4073
                                     bfinfdpic_pltrel_section (info)->size);
4074
          if (bfinfdpic_pltrel_section (info)->contents == NULL)
4075
            return FALSE;
4076
        }
4077
    }
4078
 
4079
  /* Add 4 bytes for every block of at most 65535 lazy PLT entries,
4080
     such that there's room for the additional instruction needed to
4081
     call the resolver.  Since _bfinfdpic_assign_got_entries didn't
4082
     account for them, our block size is 4 bytes smaller than the real
4083
     block size.  */
4084
  if (elf_hash_table (info)->dynamic_sections_created)
4085
    {
4086
      bfinfdpic_plt_section (info)->size = gpinfo.g.lzplt
4087
        + ((gpinfo.g.lzplt + (BFINFDPIC_LZPLT_BLOCK_SIZE - 4) - LZPLT_NORMAL_SIZE)
4088
           / (BFINFDPIC_LZPLT_BLOCK_SIZE - 4) * LZPLT_RESOLVER_EXTRA);
4089
    }
4090
 
4091
  /* Reset it, such that _bfinfdpic_assign_plt_entries() can use it to
4092
     actually assign lazy PLT entries addresses.  */
4093
  gpinfo.g.lzplt = 0;
4094
 
4095
  /* Save information that we're going to need to generate GOT and PLT
4096
     entries.  */
4097
  bfinfdpic_got_initial_offset (info) = -gpinfo.gothilo.min;
4098
 
4099
  if (get_elf_backend_data (output_bfd)->want_got_sym)
4100
    elf_hash_table (info)->hgot->root.u.def.value
4101
      += bfinfdpic_got_initial_offset (info);
4102
 
4103
  if (elf_hash_table (info)->dynamic_sections_created)
4104
    bfinfdpic_plt_initial_offset (info) =
4105
      bfinfdpic_plt_section (info)->size;
4106
 
4107
  htab_traverse (bfinfdpic_relocs_info (info), _bfinfdpic_assign_plt_entries,
4108
                 &gpinfo);
4109
 
4110
  /* Allocate the PLT section contents only after
4111
     _bfinfdpic_assign_plt_entries has a chance to add the size of the
4112
     non-lazy PLT entries.  */
4113
  if (elf_hash_table (info)->dynamic_sections_created)
4114
    {
4115
      if (bfinfdpic_plt_section (info)->size == 0)
4116
        bfinfdpic_plt_section (info)->flags |= SEC_EXCLUDE;
4117
      else
4118
        {
4119
          bfinfdpic_plt_section (info)->contents =
4120
            (bfd_byte *) bfd_zalloc (dynobj,
4121
                                     bfinfdpic_plt_section (info)->size);
4122
          if (bfinfdpic_plt_section (info)->contents == NULL)
4123
            return FALSE;
4124
        }
4125
    }
4126
 
4127
  if (elf_hash_table (info)->dynamic_sections_created)
4128
    {
4129
      if (bfinfdpic_got_section (info)->size)
4130
        if (!_bfd_elf_add_dynamic_entry (info, DT_PLTGOT, 0))
4131
          return FALSE;
4132
 
4133
      if (bfinfdpic_pltrel_section (info)->size)
4134
        if (!_bfd_elf_add_dynamic_entry (info, DT_PLTRELSZ, 0)
4135
            || !_bfd_elf_add_dynamic_entry (info, DT_PLTREL, DT_REL)
4136
            || !_bfd_elf_add_dynamic_entry (info, DT_JMPREL, 0))
4137
          return FALSE;
4138
 
4139
      if (bfinfdpic_gotrel_section (info)->size)
4140
        if (!_bfd_elf_add_dynamic_entry (info, DT_REL, 0)
4141
            || !_bfd_elf_add_dynamic_entry (info, DT_RELSZ, 0)
4142
            || !_bfd_elf_add_dynamic_entry (info, DT_RELENT,
4143
                                            sizeof (Elf32_External_Rel)))
4144
          return FALSE;
4145
    }
4146
 
4147
  return TRUE;
4148
}
4149
 
4150
static bfd_boolean
4151
elf32_bfinfdpic_always_size_sections (bfd *output_bfd,
4152
                                     struct bfd_link_info *info)
4153
{
4154
  if (!info->relocatable)
4155
    {
4156
      struct elf_link_hash_entry *h;
4157
 
4158
      /* Force a PT_GNU_STACK segment to be created.  */
4159
      if (! elf_tdata (output_bfd)->stack_flags)
4160
        elf_tdata (output_bfd)->stack_flags = PF_R | PF_W | PF_X;
4161
 
4162
      /* Define __stacksize if it's not defined yet.  */
4163
      h = elf_link_hash_lookup (elf_hash_table (info), "__stacksize",
4164
                                FALSE, FALSE, FALSE);
4165
      if (! h || h->root.type != bfd_link_hash_defined
4166
          || h->type != STT_OBJECT
4167
          || !h->def_regular)
4168
        {
4169
          struct bfd_link_hash_entry *bh = NULL;
4170
 
4171
          if (!(_bfd_generic_link_add_one_symbol
4172
                (info, output_bfd, "__stacksize",
4173
                 BSF_GLOBAL, bfd_abs_section_ptr, DEFAULT_STACK_SIZE,
4174
                 (const char *) NULL, FALSE,
4175
                 get_elf_backend_data (output_bfd)->collect, &bh)))
4176
            return FALSE;
4177
 
4178
          h = (struct elf_link_hash_entry *) bh;
4179
          h->def_regular = 1;
4180
          h->type = STT_OBJECT;
4181
        }
4182
    }
4183
 
4184
  return TRUE;
4185
}
4186
 
4187
static bfd_boolean
4188
elf32_bfinfdpic_modify_program_headers (bfd *output_bfd,
4189
                                        struct bfd_link_info *info)
4190
{
4191
  struct elf_obj_tdata *tdata = elf_tdata (output_bfd);
4192
  struct elf_segment_map *m;
4193
  Elf_Internal_Phdr *p;
4194
 
4195
  /* objcopy and strip preserve what's already there using
4196
     elf32_bfinfdpic_copy_private_bfd_data ().  */
4197
  if (! info)
4198
    return TRUE;
4199
 
4200
  for (p = tdata->phdr, m = tdata->segment_map; m != NULL; m = m->next, p++)
4201
    if (m->p_type == PT_GNU_STACK)
4202
      break;
4203
 
4204
  if (m)
4205
    {
4206
      struct elf_link_hash_entry *h;
4207
 
4208
      /* Obtain the pointer to the __stacksize symbol.  */
4209
      h = elf_link_hash_lookup (elf_hash_table (info), "__stacksize",
4210
                                FALSE, FALSE, FALSE);
4211
      if (h)
4212
        {
4213
          while (h->root.type == bfd_link_hash_indirect
4214
                 || h->root.type == bfd_link_hash_warning)
4215
            h = (struct elf_link_hash_entry *) h->root.u.i.link;
4216
          BFD_ASSERT (h->root.type == bfd_link_hash_defined);
4217
        }
4218
 
4219
      /* Set the header p_memsz from the symbol value.  We
4220
         intentionally ignore the symbol section.  */
4221
      if (h && h->root.type == bfd_link_hash_defined)
4222
        p->p_memsz = h->root.u.def.value;
4223
      else
4224
        p->p_memsz = DEFAULT_STACK_SIZE;
4225
 
4226
      p->p_align = 8;
4227
    }
4228
 
4229
  return TRUE;
4230
}
4231
 
4232
static bfd_boolean
4233
elf32_bfinfdpic_finish_dynamic_sections (bfd *output_bfd,
4234
                                        struct bfd_link_info *info)
4235
{
4236
  bfd *dynobj;
4237
  asection *sdyn;
4238
 
4239
  dynobj = elf_hash_table (info)->dynobj;
4240
 
4241
  if (bfinfdpic_got_section (info))
4242
    {
4243
      BFD_ASSERT (bfinfdpic_gotrel_section (info)->size
4244
                  == (bfinfdpic_gotrel_section (info)->reloc_count
4245
                      * sizeof (Elf32_External_Rel)));
4246
 
4247
      if (bfinfdpic_gotfixup_section (info))
4248
        {
4249
          struct elf_link_hash_entry *hgot = elf_hash_table (info)->hgot;
4250
          bfd_vma got_value = hgot->root.u.def.value
4251
            + hgot->root.u.def.section->output_section->vma
4252
            + hgot->root.u.def.section->output_offset;
4253
 
4254
          _bfinfdpic_add_rofixup (output_bfd, bfinfdpic_gotfixup_section (info),
4255
                                 got_value, 0);
4256
 
4257
          if (bfinfdpic_gotfixup_section (info)->size
4258
              != (bfinfdpic_gotfixup_section (info)->reloc_count * 4))
4259
            {
4260
              (*_bfd_error_handler)
4261
                ("LINKER BUG: .rofixup section size mismatch");
4262
              return FALSE;
4263
            }
4264
        }
4265
    }
4266
  if (elf_hash_table (info)->dynamic_sections_created)
4267
    {
4268
      BFD_ASSERT (bfinfdpic_pltrel_section (info)->size
4269
                  == (bfinfdpic_pltrel_section (info)->reloc_count
4270
                      * sizeof (Elf32_External_Rel)));
4271
    }
4272
 
4273
  sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
4274
 
4275
  if (elf_hash_table (info)->dynamic_sections_created)
4276
    {
4277
      Elf32_External_Dyn * dyncon;
4278
      Elf32_External_Dyn * dynconend;
4279
 
4280
      BFD_ASSERT (sdyn != NULL);
4281
 
4282
      dyncon = (Elf32_External_Dyn *) sdyn->contents;
4283
      dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
4284
 
4285
      for (; dyncon < dynconend; dyncon++)
4286
        {
4287
          Elf_Internal_Dyn dyn;
4288
 
4289
          bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
4290
 
4291
          switch (dyn.d_tag)
4292
            {
4293
            default:
4294
              break;
4295
 
4296
            case DT_PLTGOT:
4297
              dyn.d_un.d_ptr = bfinfdpic_got_section (info)->output_section->vma
4298
                + bfinfdpic_got_section (info)->output_offset
4299
                + bfinfdpic_got_initial_offset (info);
4300
              bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
4301
              break;
4302
 
4303
            case DT_JMPREL:
4304
              dyn.d_un.d_ptr = bfinfdpic_pltrel_section (info)
4305
                ->output_section->vma
4306
                + bfinfdpic_pltrel_section (info)->output_offset;
4307
              bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
4308
              break;
4309
 
4310
            case DT_PLTRELSZ:
4311
              dyn.d_un.d_val = bfinfdpic_pltrel_section (info)->size;
4312
              bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
4313
              break;
4314
            }
4315
        }
4316
    }
4317
 
4318
  return TRUE;
4319
}
4320
 
4321
/* Adjust a symbol defined by a dynamic object and referenced by a
4322
   regular object.  */
4323
 
4324
static bfd_boolean
4325
elf32_bfinfdpic_adjust_dynamic_symbol
4326
(struct bfd_link_info *info ATTRIBUTE_UNUSED,
4327
 struct elf_link_hash_entry *h ATTRIBUTE_UNUSED)
4328
{
4329
  bfd * dynobj;
4330
 
4331
  dynobj = elf_hash_table (info)->dynobj;
4332
 
4333
  /* Make sure we know what is going on here.  */
4334
  BFD_ASSERT (dynobj != NULL
4335
              && (h->u.weakdef != NULL
4336
                  || (h->def_dynamic
4337
                      && h->ref_regular
4338
                      && !h->def_regular)));
4339
 
4340
  /* If this is a weak symbol, and there is a real definition, the
4341
     processor independent code will have arranged for us to see the
4342
     real definition first, and we can just use the same value.  */
4343
  if (h->u.weakdef != NULL)
4344
    {
4345
      BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
4346
                  || h->u.weakdef->root.type == bfd_link_hash_defweak);
4347
      h->root.u.def.section = h->u.weakdef->root.u.def.section;
4348
      h->root.u.def.value = h->u.weakdef->root.u.def.value;
4349
    }
4350
 
4351
  return TRUE;
4352
}
4353
 
4354
/* Perform any actions needed for dynamic symbols.  */
4355
 
4356
static bfd_boolean
4357
elf32_bfinfdpic_finish_dynamic_symbol
4358
(bfd *output_bfd ATTRIBUTE_UNUSED,
4359
 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4360
 struct elf_link_hash_entry *h ATTRIBUTE_UNUSED,
4361
 Elf_Internal_Sym *sym ATTRIBUTE_UNUSED)
4362
{
4363
  return TRUE;
4364
}
4365
 
4366
/* Decide whether to attempt to turn absptr or lsda encodings in
4367
   shared libraries into pcrel within the given input section.  */
4368
 
4369
static bfd_boolean
4370
bfinfdpic_elf_use_relative_eh_frame
4371
(bfd *input_bfd ATTRIBUTE_UNUSED,
4372
 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4373
 asection *eh_frame_section ATTRIBUTE_UNUSED)
4374
{
4375
  /* We can't use PC-relative encodings in FDPIC binaries, in general.  */
4376
  return FALSE;
4377
}
4378
 
4379
/* Adjust the contents of an eh_frame_hdr section before they're output.  */
4380
 
4381
static bfd_byte
4382
bfinfdpic_elf_encode_eh_address (bfd *abfd,
4383
                                struct bfd_link_info *info,
4384
                                asection *osec, bfd_vma offset,
4385
                                asection *loc_sec, bfd_vma loc_offset,
4386
                                bfd_vma *encoded)
4387
{
4388
  struct elf_link_hash_entry *h;
4389
 
4390
  h = elf_hash_table (info)->hgot;
4391
  BFD_ASSERT (h && h->root.type == bfd_link_hash_defined);
4392
 
4393
  if (! h || (_bfinfdpic_osec_to_segment (abfd, osec)
4394
              == _bfinfdpic_osec_to_segment (abfd, loc_sec->output_section)))
4395
    return _bfd_elf_encode_eh_address (abfd, info, osec, offset,
4396
                                       loc_sec, loc_offset, encoded);
4397
 
4398
  BFD_ASSERT (_bfinfdpic_osec_to_segment (abfd, osec)
4399
              == (_bfinfdpic_osec_to_segment
4400
                  (abfd, h->root.u.def.section->output_section)));
4401
 
4402
  *encoded = osec->vma + offset
4403
    - (h->root.u.def.value
4404
       + h->root.u.def.section->output_section->vma
4405
       + h->root.u.def.section->output_offset);
4406
 
4407
  return DW_EH_PE_datarel | DW_EH_PE_sdata4;
4408
}
4409
 
4410
 
4411
 
4412
/* Look through the relocs for a section during the first phase.
4413
 
4414
   Besides handling virtual table relocs for gc, we have to deal with
4415
   all sorts of PIC-related relocations.  We describe below the
4416
   general plan on how to handle such relocations, even though we only
4417
   collect information at this point, storing them in hash tables for
4418
   perusal of later passes.
4419
 
4420
   32 relocations are propagated to the linker output when creating
4421
   position-independent output.  LO16 and HI16 relocations are not
4422
   supposed to be encountered in this case.
4423
 
4424
   LABEL16 should always be resolvable by the linker, since it's only
4425
   used by branches.
4426
 
4427
   LABEL24, on the other hand, is used by calls.  If it turns out that
4428
   the target of a call is a dynamic symbol, a PLT entry must be
4429
   created for it, which triggers the creation of a private function
4430
   descriptor and, unless lazy binding is disabled, a lazy PLT entry.
4431
 
4432
   GPREL relocations require the referenced symbol to be in the same
4433
   segment as _gp, but this can only be checked later.
4434
 
4435
   All GOT, GOTOFF and FUNCDESC relocations require a .got section to
4436
   exist.  LABEL24 might as well, since it may require a PLT entry,
4437
   that will require a got.
4438
 
4439
   Non-FUNCDESC GOT relocations require a GOT entry to be created
4440
   regardless of whether the symbol is dynamic.  However, since a
4441
   global symbol that turns out to not be exported may have the same
4442
   address of a non-dynamic symbol, we don't assign GOT entries at
4443
   this point, such that we can share them in this case.  A relocation
4444
   for the GOT entry always has to be created, be it to offset a
4445
   private symbol by the section load address, be it to get the symbol
4446
   resolved dynamically.
4447
 
4448
   FUNCDESC GOT relocations require a GOT entry to be created, and
4449
   handled as if a FUNCDESC relocation was applied to the GOT entry in
4450
   an object file.
4451
 
4452
   FUNCDESC relocations referencing a symbol that turns out to NOT be
4453
   dynamic cause a private function descriptor to be created.  The
4454
   FUNCDESC relocation then decays to a 32 relocation that points at
4455
   the private descriptor.  If the symbol is dynamic, the FUNCDESC
4456
   relocation is propagated to the linker output, such that the
4457
   dynamic linker creates the canonical descriptor, pointing to the
4458
   dynamically-resolved definition of the function.
4459
 
4460
   Non-FUNCDESC GOTOFF relocations must always refer to non-dynamic
4461
   symbols that are assigned to the same segment as the GOT, but we
4462
   can only check this later, after we know the complete set of
4463
   symbols defined and/or exported.
4464
 
4465
   FUNCDESC GOTOFF relocations require a function descriptor to be
4466
   created and, unless lazy binding is disabled or the symbol is not
4467
   dynamic, a lazy PLT entry.  Since we can't tell at this point
4468
   whether a symbol is going to be dynamic, we have to decide later
4469
   whether to create a lazy PLT entry or bind the descriptor directly
4470
   to the private function.
4471
 
4472
   FUNCDESC_VALUE relocations are not supposed to be present in object
4473
   files, but they may very well be simply propagated to the linker
4474
   output, since they have no side effect.
4475
 
4476
 
4477
   A function descriptor always requires a FUNCDESC_VALUE relocation.
4478
   Whether it's in .plt.rel or not depends on whether lazy binding is
4479
   enabled and on whether the referenced symbol is dynamic.
4480
 
4481
   The existence of a lazy PLT requires the resolverStub lazy PLT
4482
   entry to be present.
4483
 
4484
 
4485
   As for assignment of GOT, PLT and lazy PLT entries, and private
4486
   descriptors, we might do them all sequentially, but we can do
4487
   better than that.  For example, we can place GOT entries and
4488
   private function descriptors referenced using 12-bit operands
4489
   closer to the PIC register value, such that these relocations don't
4490
   overflow.  Those that are only referenced with LO16 relocations
4491
   could come next, but we may as well place PLT-required function
4492
   descriptors in the 12-bit range to make them shorter.  Symbols
4493
   referenced with LO16/HI16 may come next, but we may place
4494
   additional function descriptors in the 16-bit range if we can
4495
   reliably tell that we've already placed entries that are ever
4496
   referenced with only LO16.  PLT entries are therefore generated as
4497
   small as possible, while not introducing relocation overflows in
4498
   GOT or FUNCDESC_GOTOFF relocations.  Lazy PLT entries could be
4499
   generated before or after PLT entries, but not intermingled with
4500
   them, such that we can have more lazy PLT entries in range for a
4501
   branch to the resolverStub.  The resolverStub should be emitted at
4502
   the most distant location from the first lazy PLT entry such that
4503
   it's still in range for a branch, or closer, if there isn't a need
4504
   for so many lazy PLT entries.  Additional lazy PLT entries may be
4505
   emitted after the resolverStub, as long as branches are still in
4506
   range.  If the branch goes out of range, longer lazy PLT entries
4507
   are emitted.
4508
 
4509
   We could further optimize PLT and lazy PLT entries by giving them
4510
   priority in assignment to closer-to-gr17 locations depending on the
4511
   number of occurrences of references to them (assuming a function
4512
   that's called more often is more important for performance, so its
4513
   PLT entry should be faster), or taking hints from the compiler.
4514
   Given infinite time and money... :-)  */
4515
 
4516
static bfd_boolean
4517
bfinfdpic_check_relocs (bfd *abfd, struct bfd_link_info *info,
4518
                        asection *sec, const Elf_Internal_Rela *relocs)
4519
{
4520
  Elf_Internal_Shdr *symtab_hdr;
4521
  struct elf_link_hash_entry **sym_hashes;
4522
  const Elf_Internal_Rela *rel;
4523
  const Elf_Internal_Rela *rel_end;
4524
  bfd *dynobj;
4525
  struct bfinfdpic_relocs_info *picrel;
4526
 
4527
  if (info->relocatable)
4528
    return TRUE;
4529
 
4530
  symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
4531
  sym_hashes = elf_sym_hashes (abfd);
4532
 
4533
  dynobj = elf_hash_table (info)->dynobj;
4534
  rel_end = relocs + sec->reloc_count;
4535
  for (rel = relocs; rel < rel_end; rel++)
4536
    {
4537
      struct elf_link_hash_entry *h;
4538
      unsigned long r_symndx;
4539
 
4540
      r_symndx = ELF32_R_SYM (rel->r_info);
4541
      if (r_symndx < symtab_hdr->sh_info)
4542
        h = NULL;
4543
      else
4544
        h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4545
 
4546
      switch (ELF32_R_TYPE (rel->r_info))
4547
        {
4548
        case R_BFIN_GOT17M4:
4549
        case R_BFIN_GOTHI:
4550
        case R_BFIN_GOTLO:
4551
        case R_BFIN_FUNCDESC_GOT17M4:
4552
        case R_BFIN_FUNCDESC_GOTHI:
4553
        case R_BFIN_FUNCDESC_GOTLO:
4554
        case R_BFIN_GOTOFF17M4:
4555
        case R_BFIN_GOTOFFHI:
4556
        case R_BFIN_GOTOFFLO:
4557
        case R_BFIN_FUNCDESC_GOTOFF17M4:
4558
        case R_BFIN_FUNCDESC_GOTOFFHI:
4559
        case R_BFIN_FUNCDESC_GOTOFFLO:
4560
        case R_BFIN_FUNCDESC:
4561
        case R_BFIN_FUNCDESC_VALUE:
4562
          if (! IS_FDPIC (abfd))
4563
            goto bad_reloc;
4564
          /* Fall through.  */
4565
        case R_pcrel24:
4566
        case R_pcrel24_jump_l:
4567
        case R_byte4_data:
4568
          if (IS_FDPIC (abfd) && ! dynobj)
4569
            {
4570
              elf_hash_table (info)->dynobj = dynobj = abfd;
4571
              if (! _bfin_create_got_section (abfd, info))
4572
                return FALSE;
4573
            }
4574
          if (! IS_FDPIC (abfd))
4575
            {
4576
              picrel = NULL;
4577
              break;
4578
            }
4579
          if (h != NULL)
4580
            {
4581
              if (h->dynindx == -1)
4582
                switch (ELF_ST_VISIBILITY (h->other))
4583
                  {
4584
                  case STV_INTERNAL:
4585
                  case STV_HIDDEN:
4586
                    break;
4587
                  default:
4588
                    bfd_elf_link_record_dynamic_symbol (info, h);
4589
                    break;
4590
                  }
4591
              picrel
4592
                = bfinfdpic_relocs_info_for_global (bfinfdpic_relocs_info (info),
4593
                                                   abfd, h,
4594
                                                   rel->r_addend, INSERT);
4595
            }
4596
          else
4597
            picrel = bfinfdpic_relocs_info_for_local (bfinfdpic_relocs_info
4598
                                                     (info), abfd, r_symndx,
4599
                                                     rel->r_addend, INSERT);
4600
          if (! picrel)
4601
            return FALSE;
4602
          break;
4603
 
4604
        default:
4605
          picrel = NULL;
4606
          break;
4607
        }
4608
 
4609
      switch (ELF32_R_TYPE (rel->r_info))
4610
        {
4611
        case R_pcrel24:
4612
        case R_pcrel24_jump_l:
4613
          if (IS_FDPIC (abfd))
4614
            picrel->call = 1;
4615
          break;
4616
 
4617
        case R_BFIN_FUNCDESC_VALUE:
4618
          picrel->relocsfdv++;
4619
          if (bfd_get_section_flags (abfd, sec) & SEC_ALLOC)
4620
            picrel->relocs32--;
4621
          /* Fall through.  */
4622
 
4623
        case R_byte4_data:
4624
          if (! IS_FDPIC (abfd))
4625
            break;
4626
 
4627
          picrel->sym = 1;
4628
          if (bfd_get_section_flags (abfd, sec) & SEC_ALLOC)
4629
            picrel->relocs32++;
4630
          break;
4631
 
4632
        case R_BFIN_GOT17M4:
4633
          picrel->got17m4 = 1;
4634
          break;
4635
 
4636
        case R_BFIN_GOTHI:
4637
        case R_BFIN_GOTLO:
4638
          picrel->gothilo = 1;
4639
          break;
4640
 
4641
        case R_BFIN_FUNCDESC_GOT17M4:
4642
          picrel->fdgot17m4 = 1;
4643
          break;
4644
 
4645
        case R_BFIN_FUNCDESC_GOTHI:
4646
        case R_BFIN_FUNCDESC_GOTLO:
4647
          picrel->fdgothilo = 1;
4648
          break;
4649
 
4650
        case R_BFIN_GOTOFF17M4:
4651
        case R_BFIN_GOTOFFHI:
4652
        case R_BFIN_GOTOFFLO:
4653
          picrel->gotoff = 1;
4654
          break;
4655
 
4656
        case R_BFIN_FUNCDESC_GOTOFF17M4:
4657
          picrel->fdgoff17m4 = 1;
4658
          break;
4659
 
4660
        case R_BFIN_FUNCDESC_GOTOFFHI:
4661
        case R_BFIN_FUNCDESC_GOTOFFLO:
4662
          picrel->fdgoffhilo = 1;
4663
          break;
4664
 
4665
        case R_BFIN_FUNCDESC:
4666
          picrel->fd = 1;
4667
          picrel->relocsfd++;
4668
          break;
4669
 
4670
        /* This relocation describes the C++ object vtable hierarchy.
4671
           Reconstruct it for later use during GC.  */
4672
        case R_BFIN_GNU_VTINHERIT:
4673
          if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
4674
            return FALSE;
4675
          break;
4676
 
4677
        /* This relocation describes which C++ vtable entries are actually
4678
           used.  Record for later use during GC.  */
4679
        case R_BFIN_GNU_VTENTRY:
4680
          BFD_ASSERT (h != NULL);
4681
          if (h != NULL
4682
              && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
4683
            return FALSE;
4684
          break;
4685
 
4686
        case R_huimm16:
4687
        case R_luimm16:
4688
        case R_pcrel12_jump_s:
4689
        case R_pcrel10:
4690
          break;
4691
 
4692
        default:
4693
        bad_reloc:
4694
          (*_bfd_error_handler)
4695
            (_("%B: unsupported relocation type %i"),
4696
             abfd, ELF32_R_TYPE (rel->r_info));
4697
          return FALSE;
4698
        }
4699
    }
4700
 
4701
  return TRUE;
4702
}
4703
 
4704
/* Set the right machine number for a Blackfin ELF file.  */
4705
 
4706
static bfd_boolean
4707
elf32_bfin_object_p (bfd *abfd)
4708
{
4709
  bfd_default_set_arch_mach (abfd, bfd_arch_bfin, 0);
4710
  return (((elf_elfheader (abfd)->e_flags & EF_BFIN_FDPIC) != 0)
4711
          == (IS_FDPIC (abfd)));
4712
}
4713
 
4714
static bfd_boolean
4715
elf32_bfin_set_private_flags (bfd * abfd, flagword flags)
4716
{
4717
  elf_elfheader (abfd)->e_flags = flags;
4718
  elf_flags_init (abfd) = TRUE;
4719
  return TRUE;
4720
}
4721
 
4722
/* Copy backend specific data from one object module to another.  */
4723
 
4724
static bfd_boolean
4725
bfin_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
4726
{
4727
  if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
4728
      || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
4729
    return TRUE;
4730
 
4731
  BFD_ASSERT (!elf_flags_init (obfd)
4732
              || elf_elfheader (obfd)->e_flags == elf_elfheader (ibfd)->e_flags);
4733
 
4734
  elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
4735
  elf_flags_init (obfd) = TRUE;
4736
 
4737
  /* Copy object attributes.  */
4738
  _bfd_elf_copy_obj_attributes (ibfd, obfd);
4739
 
4740
  return TRUE;
4741
}
4742
 
4743
static bfd_boolean
4744
elf32_bfinfdpic_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
4745
{
4746
  unsigned i;
4747
 
4748
  if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
4749
      || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
4750
    return TRUE;
4751
 
4752
  if (! bfin_elf_copy_private_bfd_data (ibfd, obfd))
4753
    return FALSE;
4754
 
4755
  if (! elf_tdata (ibfd) || ! elf_tdata (ibfd)->phdr
4756
      || ! elf_tdata (obfd) || ! elf_tdata (obfd)->phdr)
4757
    return TRUE;
4758
 
4759
  /* Copy the stack size.  */
4760
  for (i = 0; i < elf_elfheader (ibfd)->e_phnum; i++)
4761
    if (elf_tdata (ibfd)->phdr[i].p_type == PT_GNU_STACK)
4762
      {
4763
        Elf_Internal_Phdr *iphdr = &elf_tdata (ibfd)->phdr[i];
4764
 
4765
        for (i = 0; i < elf_elfheader (obfd)->e_phnum; i++)
4766
          if (elf_tdata (obfd)->phdr[i].p_type == PT_GNU_STACK)
4767
            {
4768
              memcpy (&elf_tdata (obfd)->phdr[i], iphdr, sizeof (*iphdr));
4769
 
4770
              /* Rewrite the phdrs, since we're only called after they
4771
                 were first written.  */
4772
              if (bfd_seek (obfd, (bfd_signed_vma) get_elf_backend_data (obfd)
4773
                            ->s->sizeof_ehdr, SEEK_SET) != 0
4774
                  || get_elf_backend_data (obfd)->s
4775
                  ->write_out_phdrs (obfd, elf_tdata (obfd)->phdr,
4776
                                     elf_elfheader (obfd)->e_phnum) != 0)
4777
                return FALSE;
4778
              break;
4779
            }
4780
 
4781
        break;
4782
      }
4783
 
4784
  return TRUE;
4785
}
4786
 
4787
 
4788
/* Display the flags field.  */
4789
static bfd_boolean
4790
elf32_bfin_print_private_bfd_data (bfd * abfd, PTR ptr)
4791
{
4792
  FILE *file = (FILE *) ptr;
4793
  flagword flags;
4794
 
4795
  BFD_ASSERT (abfd != NULL && ptr != NULL);
4796
 
4797
  /* Print normal ELF private data.  */
4798
  _bfd_elf_print_private_bfd_data (abfd, ptr);
4799
 
4800
  flags = elf_elfheader (abfd)->e_flags;
4801
 
4802
  /* xgettext:c-format */
4803
  fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
4804
 
4805
  if (flags & EF_BFIN_PIC)
4806
    fprintf (file, " -fpic");
4807
 
4808
  if (flags & EF_BFIN_FDPIC)
4809
    fprintf (file, " -mfdpic");
4810
 
4811
  fputc ('\n', file);
4812
 
4813
  return TRUE;
4814
}
4815
 
4816
/* Merge backend specific data from an object file to the output
4817
   object file when linking.  */
4818
 
4819
static bfd_boolean
4820
elf32_bfin_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
4821
{
4822
  flagword old_flags, new_flags;
4823
  bfd_boolean error = FALSE;
4824
 
4825
  new_flags = elf_elfheader (ibfd)->e_flags;
4826
  old_flags = elf_elfheader (obfd)->e_flags;
4827
 
4828
  if (new_flags & EF_BFIN_FDPIC)
4829
    new_flags &= ~EF_BFIN_PIC;
4830
 
4831
#ifdef DEBUG
4832
  (*_bfd_error_handler) ("old_flags = 0x%.8lx, new_flags = 0x%.8lx, init = %s, filename = %s",
4833
                         old_flags, new_flags, elf_flags_init (obfd) ? "yes" : "no",
4834
                         bfd_get_filename (ibfd));
4835
#endif
4836
 
4837
  if (!elf_flags_init (obfd))                   /* First call, no flags set.  */
4838
    {
4839
      elf_flags_init (obfd) = TRUE;
4840
      elf_elfheader (obfd)->e_flags = new_flags;
4841
    }
4842
 
4843
  if (((new_flags & EF_BFIN_FDPIC) == 0) != (! IS_FDPIC (obfd)))
4844
    {
4845
      error = TRUE;
4846
      if (IS_FDPIC (obfd))
4847
        (*_bfd_error_handler)
4848
          (_("%s: cannot link non-fdpic object file into fdpic executable"),
4849
           bfd_get_filename (ibfd));
4850
      else
4851
        (*_bfd_error_handler)
4852
          (_("%s: cannot link fdpic object file into non-fdpic executable"),
4853
           bfd_get_filename (ibfd));
4854
    }
4855
 
4856
  if (error)
4857
    bfd_set_error (bfd_error_bad_value);
4858
 
4859
  return !error;
4860
}
4861
 
4862
/* bfin ELF linker hash entry.  */
4863
 
4864
struct bfin_link_hash_entry
4865
{
4866
  struct elf_link_hash_entry root;
4867
 
4868
  /* Number of PC relative relocs copied for this symbol.  */
4869
  struct bfin_pcrel_relocs_copied *pcrel_relocs_copied;
4870
};
4871
 
4872
/* bfin ELF linker hash table.  */
4873
 
4874
struct bfin_link_hash_table
4875
{
4876
  struct elf_link_hash_table root;
4877
 
4878
  /* Small local sym to section mapping cache.  */
4879
  struct sym_sec_cache sym_sec;
4880
};
4881
 
4882
#define bfin_hash_entry(ent) ((struct bfin_link_hash_entry *) (ent))
4883
 
4884
static struct bfd_hash_entry *
4885
bfin_link_hash_newfunc (struct bfd_hash_entry *entry,
4886
                        struct bfd_hash_table *table, const char *string)
4887
{
4888
  struct bfd_hash_entry *ret = entry;
4889
 
4890
  /* Allocate the structure if it has not already been allocated by a
4891
     subclass.  */
4892
  if (ret == NULL)
4893
    ret = bfd_hash_allocate (table, sizeof (struct bfin_link_hash_entry));
4894
  if (ret == NULL)
4895
    return ret;
4896
 
4897
  /* Call the allocation method of the superclass.  */
4898
  ret = _bfd_elf_link_hash_newfunc (ret, table, string);
4899
  if (ret != NULL)
4900
    bfin_hash_entry (ret)->pcrel_relocs_copied = NULL;
4901
 
4902
  return ret;
4903
}
4904
 
4905
/* Create an bfin ELF linker hash table.  */
4906
 
4907
static struct bfd_link_hash_table *
4908
bfin_link_hash_table_create (bfd * abfd)
4909
{
4910
  struct bfin_link_hash_table *ret;
4911
  bfd_size_type amt = sizeof (struct bfin_link_hash_table);
4912
 
4913
  ret = bfd_zalloc (abfd, amt);
4914
  if (ret == NULL)
4915
    return NULL;
4916
 
4917
  if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
4918
                                      bfin_link_hash_newfunc,
4919
                                      sizeof (struct elf_link_hash_entry)))
4920
    {
4921
      free (ret);
4922
      return NULL;
4923
    }
4924
 
4925
  ret->sym_sec.abfd = NULL;
4926
 
4927
  return &ret->root.root;
4928
}
4929
 
4930
/* The size in bytes of an entry in the procedure linkage table.  */
4931
 
4932
/* Finish up the dynamic sections.  */
4933
 
4934
static bfd_boolean
4935
bfin_finish_dynamic_sections (bfd * output_bfd ATTRIBUTE_UNUSED,
4936
                                  struct bfd_link_info *info)
4937
{
4938
  bfd *dynobj;
4939
  asection *sdyn;
4940
 
4941
  dynobj = elf_hash_table (info)->dynobj;
4942
 
4943
  sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
4944
 
4945
  if (elf_hash_table (info)->dynamic_sections_created)
4946
    {
4947
      Elf32_External_Dyn *dyncon, *dynconend;
4948
 
4949
      BFD_ASSERT (sdyn != NULL);
4950
 
4951
      dyncon = (Elf32_External_Dyn *) sdyn->contents;
4952
      dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
4953
      for (; dyncon < dynconend; dyncon++)
4954
        {
4955
          Elf_Internal_Dyn dyn;
4956
 
4957
          bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
4958
 
4959
        }
4960
 
4961
    }
4962
  return TRUE;
4963
}
4964
 
4965
/* Finish up dynamic symbol handling.  We set the contents of various
4966
   dynamic sections here.  */
4967
 
4968
static bfd_boolean
4969
bfin_finish_dynamic_symbol (bfd * output_bfd,
4970
                                struct bfd_link_info *info,
4971
                                struct elf_link_hash_entry *h,
4972
                                Elf_Internal_Sym * sym)
4973
{
4974
  bfd *dynobj;
4975
 
4976
  dynobj = elf_hash_table (info)->dynobj;
4977
 
4978
  if (h->got.offset != (bfd_vma) - 1)
4979
    {
4980
      asection *sgot;
4981
      asection *srela;
4982
      Elf_Internal_Rela rela;
4983
      bfd_byte *loc;
4984
 
4985
      /* This symbol has an entry in the global offset table.
4986
         Set it up.  */
4987
 
4988
      sgot = bfd_get_section_by_name (dynobj, ".got");
4989
      srela = bfd_get_section_by_name (dynobj, ".rela.got");
4990
      BFD_ASSERT (sgot != NULL && srela != NULL);
4991
 
4992
      rela.r_offset = (sgot->output_section->vma
4993
                       + sgot->output_offset
4994
                       + (h->got.offset & ~(bfd_vma) 1));
4995
 
4996
      /* If this is a -Bsymbolic link, and the symbol is defined
4997
         locally, we just want to emit a RELATIVE reloc.  Likewise if
4998
         the symbol was forced to be local because of a version file.
4999
         The entry in the global offset table will already have been
5000
         initialized in the relocate_section function.  */
5001
      if (info->shared
5002
          && (info->symbolic
5003
              || h->dynindx == -1 || h->forced_local) && h->def_regular)
5004
        {
5005
          fprintf(stderr, "*** check this relocation %s\n", __FUNCTION__);
5006
          rela.r_info = ELF32_R_INFO (0, R_pcrel24);
5007
          rela.r_addend = bfd_get_signed_32 (output_bfd,
5008
                                             (sgot->contents
5009
                                              +
5010
                                              (h->got.
5011
                                               offset & ~(bfd_vma) 1)));
5012
        }
5013
      else
5014
        {
5015
          bfd_put_32 (output_bfd, (bfd_vma) 0,
5016
                      sgot->contents + (h->got.offset & ~(bfd_vma) 1));
5017
          rela.r_info = ELF32_R_INFO (h->dynindx, R_got);
5018
          rela.r_addend = 0;
5019
        }
5020
 
5021
      loc = srela->contents;
5022
      loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
5023
      bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
5024
    }
5025
 
5026
  if (h->needs_copy)
5027
    {
5028
      BFD_ASSERT (0);
5029
    }
5030
  /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute.  */
5031
  if (strcmp (h->root.root.string, "__DYNAMIC") == 0
5032
      || h == elf_hash_table (info)->hgot)
5033
    sym->st_shndx = SHN_ABS;
5034
 
5035
  return TRUE;
5036
}
5037
 
5038
/* Adjust a symbol defined by a dynamic object and referenced by a
5039
   regular object.  The current definition is in some section of the
5040
   dynamic object, but we're not including those sections.  We have to
5041
   change the definition to something the rest of the link can
5042
   understand.  */
5043
 
5044
static bfd_boolean
5045
bfin_adjust_dynamic_symbol (struct bfd_link_info *info,
5046
                                struct elf_link_hash_entry *h)
5047
{
5048
  bfd *dynobj;
5049
  asection *s;
5050
  unsigned int power_of_two;
5051
 
5052
  dynobj = elf_hash_table (info)->dynobj;
5053
 
5054
  /* Make sure we know what is going on here.  */
5055
  BFD_ASSERT (dynobj != NULL
5056
              && (h->needs_plt
5057
                  || h->u.weakdef != NULL
5058
                  || (h->def_dynamic && h->ref_regular && !h->def_regular)));
5059
 
5060
  /* If this is a function, put it in the procedure linkage table.  We
5061
     will fill in the contents of the procedure linkage table later,
5062
     when we know the address of the .got section.  */
5063
  if (h->type == STT_FUNC || h->needs_plt)
5064
    {
5065
      BFD_ASSERT(0);
5066
    }
5067
 
5068
  /* If this is a weak symbol, and there is a real definition, the
5069
     processor independent code will have arranged for us to see the
5070
     real definition first, and we can just use the same value.  */
5071
  if (h->u.weakdef != NULL)
5072
    {
5073
      BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
5074
                  || h->u.weakdef->root.type == bfd_link_hash_defweak);
5075
      h->root.u.def.section = h->u.weakdef->root.u.def.section;
5076
      h->root.u.def.value = h->u.weakdef->root.u.def.value;
5077
      return TRUE;
5078
    }
5079
 
5080
  /* This is a reference to a symbol defined by a dynamic object which
5081
     is not a function.  */
5082
 
5083
  /* If we are creating a shared library, we must presume that the
5084
     only references to the symbol are via the global offset table.
5085
     For such cases we need not do anything here; the relocations will
5086
     be handled correctly by relocate_section.  */
5087
  if (info->shared)
5088
    return TRUE;
5089
 
5090
  /* We must allocate the symbol in our .dynbss section, which will
5091
     become part of the .bss section of the executable.  There will be
5092
     an entry for this symbol in the .dynsym section.  The dynamic
5093
     object will contain position independent code, so all references
5094
     from the dynamic object to this symbol will go through the global
5095
     offset table.  The dynamic linker will use the .dynsym entry to
5096
     determine the address it must put in the global offset table, so
5097
     both the dynamic object and the regular object will refer to the
5098
     same memory location for the variable.  */
5099
 
5100
  s = bfd_get_section_by_name (dynobj, ".dynbss");
5101
  BFD_ASSERT (s != NULL);
5102
 
5103
  /* We must generate a R_68K_COPY reloc to tell the dynamic linker to
5104
     copy the initial value out of the dynamic object and into the
5105
     runtime process image.  We need to remember the offset into the
5106
     .rela.bss section we are going to use.  */
5107
  if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
5108
    {
5109
      asection *srel;
5110
 
5111
      srel = bfd_get_section_by_name (dynobj, ".rela.bss");
5112
      BFD_ASSERT (srel != NULL);
5113
      srel->size += sizeof (Elf32_External_Rela);
5114
      h->needs_copy = 1;
5115
    }
5116
 
5117
  /* We need to figure out the alignment required for this symbol.  I
5118
     have no idea how ELF linkers handle this.  */
5119
  power_of_two = bfd_log2 (h->size);
5120
  if (power_of_two > 3)
5121
    power_of_two = 3;
5122
 
5123
  /* Apply the required alignment.  */
5124
  s->size = BFD_ALIGN (s->size, (bfd_size_type) (1 << power_of_two));
5125
  if (power_of_two > bfd_get_section_alignment (dynobj, s))
5126
    {
5127
      if (!bfd_set_section_alignment (dynobj, s, power_of_two))
5128
        return FALSE;
5129
    }
5130
 
5131
  /* Define the symbol as being at this point in the section.  */
5132
  h->root.u.def.section = s;
5133
  h->root.u.def.value = s->size;
5134
 
5135
  /* Increment the section size to make room for the symbol.  */
5136
  s->size += h->size;
5137
 
5138
  return TRUE;
5139
}
5140
 
5141
/* The bfin linker needs to keep track of the number of relocs that it
5142
   decides to copy in check_relocs for each symbol.  This is so that it
5143
   can discard PC relative relocs if it doesn't need them when linking
5144
   with -Bsymbolic.  We store the information in a field extending the
5145
   regular ELF linker hash table.  */
5146
 
5147
/* This structure keeps track of the number of PC relative relocs we have
5148
   copied for a given symbol.  */
5149
 
5150
struct bfin_pcrel_relocs_copied
5151
{
5152
  /* Next section.  */
5153
  struct bfin_pcrel_relocs_copied *next;
5154
  /* A section in dynobj.  */
5155
  asection *section;
5156
  /* Number of relocs copied in this section.  */
5157
  bfd_size_type count;
5158
};
5159
 
5160
/* This function is called via elf_link_hash_traverse if we are
5161
   creating a shared object.  In the -Bsymbolic case it discards the
5162
   space allocated to copy PC relative relocs against symbols which
5163
   are defined in regular objects.  For the normal shared case, it
5164
   discards space for pc-relative relocs that have become local due to
5165
   symbol visibility changes.  We allocated space for them in the
5166
   check_relocs routine, but we won't fill them in in the
5167
   relocate_section routine.
5168
 
5169
   We also check whether any of the remaining relocations apply
5170
   against a readonly section, and set the DF_TEXTREL flag in this
5171
   case.  */
5172
 
5173
static bfd_boolean
5174
bfin_discard_copies (struct elf_link_hash_entry *h, PTR inf)
5175
{
5176
  struct bfd_link_info *info = (struct bfd_link_info *) inf;
5177
  struct bfin_pcrel_relocs_copied *s;
5178
 
5179
  if (h->root.type == bfd_link_hash_warning)
5180
    h = (struct elf_link_hash_entry *) h->root.u.i.link;
5181
 
5182
  if (!h->def_regular || (!info->symbolic && !h->forced_local))
5183
    {
5184
      if ((info->flags & DF_TEXTREL) == 0)
5185
        {
5186
          /* Look for relocations against read-only sections.  */
5187
          for (s = bfin_hash_entry (h)->pcrel_relocs_copied;
5188
               s != NULL; s = s->next)
5189
            if ((s->section->flags & SEC_READONLY) != 0)
5190
              {
5191
                info->flags |= DF_TEXTREL;
5192
                break;
5193
              }
5194
        }
5195
 
5196
      return TRUE;
5197
    }
5198
 
5199
  for (s = bfin_hash_entry (h)->pcrel_relocs_copied;
5200
       s != NULL; s = s->next)
5201
    s->section->size -= s->count * sizeof (Elf32_External_Rela);
5202
 
5203
  return TRUE;
5204
}
5205
 
5206
static bfd_boolean
5207
bfin_size_dynamic_sections (bfd * output_bfd ATTRIBUTE_UNUSED,
5208
                                struct bfd_link_info *info)
5209
{
5210
  bfd *dynobj;
5211
  asection *s;
5212
  bfd_boolean relocs;
5213
 
5214
  dynobj = elf_hash_table (info)->dynobj;
5215
  BFD_ASSERT (dynobj != NULL);
5216
 
5217
  if (elf_hash_table (info)->dynamic_sections_created)
5218
    {
5219
      /* Set the contents of the .interp section to the interpreter.  */
5220
      if (info->executable)
5221
        {
5222
          s = bfd_get_section_by_name (dynobj, ".interp");
5223
          BFD_ASSERT (s != NULL);
5224
          s->size = sizeof ELF_DYNAMIC_INTERPRETER;
5225
          s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
5226
        }
5227
    }
5228
  else
5229
    {
5230
      /* We may have created entries in the .rela.got section.
5231
         However, if we are not creating the dynamic sections, we will
5232
         not actually use these entries.  Reset the size of .rela.got,
5233
         which will cause it to get stripped from the output file
5234
         below.  */
5235
      s = bfd_get_section_by_name (dynobj, ".rela.got");
5236
      if (s != NULL)
5237
        s->size = 0;
5238
    }
5239
 
5240
  /* If this is a -Bsymbolic shared link, then we need to discard all
5241
     PC relative relocs against symbols defined in a regular object.
5242
     For the normal shared case we discard the PC relative relocs
5243
     against symbols that have become local due to visibility changes.
5244
     We allocated space for them in the check_relocs routine, but we
5245
     will not fill them in in the relocate_section routine.  */
5246
  if (info->shared)
5247
    elf_link_hash_traverse (elf_hash_table (info),
5248
                            bfin_discard_copies, (PTR) info);
5249
 
5250
  /* The check_relocs and adjust_dynamic_symbol entry points have
5251
     determined the sizes of the various dynamic sections.  Allocate
5252
     memory for them.  */
5253
  relocs = FALSE;
5254
  for (s = dynobj->sections; s != NULL; s = s->next)
5255
    {
5256
      const char *name;
5257
      bfd_boolean strip;
5258
 
5259
      if ((s->flags & SEC_LINKER_CREATED) == 0)
5260
        continue;
5261
 
5262
      /* It's OK to base decisions on the section name, because none
5263
         of the dynobj section names depend upon the input files.  */
5264
      name = bfd_get_section_name (dynobj, s);
5265
 
5266
      strip = FALSE;
5267
 
5268
       if (CONST_STRNEQ (name, ".rela"))
5269
        {
5270
          if (s->size == 0)
5271
            {
5272
              /* If we don't need this section, strip it from the
5273
                 output file.  This is mostly to handle .rela.bss and
5274
                 .rela.plt.  We must create both sections in
5275
                 create_dynamic_sections, because they must be created
5276
                 before the linker maps input sections to output
5277
                 sections.  The linker does that before
5278
                 adjust_dynamic_symbol is called, and it is that
5279
                 function which decides whether anything needs to go
5280
                 into these sections.  */
5281
              strip = TRUE;
5282
            }
5283
          else
5284
            {
5285
              relocs = TRUE;
5286
 
5287
              /* We use the reloc_count field as a counter if we need
5288
                 to copy relocs into the output file.  */
5289
              s->reloc_count = 0;
5290
            }
5291
        }
5292
      else if (! CONST_STRNEQ (name, ".got"))
5293
        {
5294
          /* It's not one of our sections, so don't allocate space.  */
5295
          continue;
5296
        }
5297
 
5298
      if (strip)
5299
        {
5300
          s->flags |= SEC_EXCLUDE;
5301
          continue;
5302
        }
5303
 
5304
      /* Allocate memory for the section contents.  */
5305
      /* FIXME: This should be a call to bfd_alloc not bfd_zalloc.
5306
         Unused entries should be reclaimed before the section's contents
5307
         are written out, but at the moment this does not happen.  Thus in
5308
         order to prevent writing out garbage, we initialise the section's
5309
         contents to zero.  */
5310
      s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
5311
      if (s->contents == NULL && s->size != 0)
5312
        return FALSE;
5313
    }
5314
 
5315
  if (elf_hash_table (info)->dynamic_sections_created)
5316
    {
5317
      /* Add some entries to the .dynamic section.  We fill in the
5318
         values later, in bfin_finish_dynamic_sections, but we
5319
         must add the entries now so that we get the correct size for
5320
         the .dynamic section.  The DT_DEBUG entry is filled in by the
5321
         dynamic linker and used by the debugger.  */
5322
#define add_dynamic_entry(TAG, VAL) \
5323
  _bfd_elf_add_dynamic_entry (info, TAG, VAL)
5324
 
5325
      if (!info->shared)
5326
        {
5327
          if (!add_dynamic_entry (DT_DEBUG, 0))
5328
            return FALSE;
5329
        }
5330
 
5331
 
5332
      if (relocs)
5333
        {
5334
          if (!add_dynamic_entry (DT_RELA, 0)
5335
              || !add_dynamic_entry (DT_RELASZ, 0)
5336
              || !add_dynamic_entry (DT_RELAENT,
5337
                                     sizeof (Elf32_External_Rela)))
5338
            return FALSE;
5339
        }
5340
 
5341
      if ((info->flags & DF_TEXTREL) != 0)
5342
        {
5343
          if (!add_dynamic_entry (DT_TEXTREL, 0))
5344
            return FALSE;
5345
        }
5346
    }
5347
#undef add_dynamic_entry
5348
 
5349
  return TRUE;
5350
}
5351
 
5352
/* Given a .data section and a .emreloc in-memory section, store
5353
   relocation information into the .emreloc section which can be
5354
   used at runtime to relocate the section.  This is called by the
5355
   linker when the --embedded-relocs switch is used.  This is called
5356
   after the add_symbols entry point has been called for all the
5357
   objects, and before the final_link entry point is called.  */
5358
 
5359
bfd_boolean bfd_bfin_elf32_create_embedded_relocs
5360
  PARAMS ((bfd *, struct bfd_link_info *, asection *, asection *, char **));
5361
 
5362
bfd_boolean
5363
bfd_bfin_elf32_create_embedded_relocs (
5364
     bfd *abfd,
5365
     struct bfd_link_info *info,
5366
     asection *datasec,
5367
     asection *relsec,
5368
     char **errmsg)
5369
{
5370
  Elf_Internal_Shdr *symtab_hdr;
5371
  Elf_Internal_Sym *isymbuf = NULL;
5372
  Elf_Internal_Rela *internal_relocs = NULL;
5373
  Elf_Internal_Rela *irel, *irelend;
5374
  bfd_byte *p;
5375
  bfd_size_type amt;
5376
 
5377
  BFD_ASSERT (! info->relocatable);
5378
 
5379
  *errmsg = NULL;
5380
 
5381
  if (datasec->reloc_count == 0)
5382
    return TRUE;
5383
 
5384
  symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
5385
 
5386
  /* Get a copy of the native relocations.  */
5387
  internal_relocs = (_bfd_elf_link_read_relocs
5388
                     (abfd, datasec, (PTR) NULL, (Elf_Internal_Rela *) NULL,
5389
                      info->keep_memory));
5390
  if (internal_relocs == NULL)
5391
    goto error_return;
5392
 
5393
  amt = (bfd_size_type) datasec->reloc_count * 12;
5394
  relsec->contents = (bfd_byte *) bfd_alloc (abfd, amt);
5395
  if (relsec->contents == NULL)
5396
    goto error_return;
5397
 
5398
  p = relsec->contents;
5399
 
5400
  irelend = internal_relocs + datasec->reloc_count;
5401
  for (irel = internal_relocs; irel < irelend; irel++, p += 12)
5402
    {
5403
      asection *targetsec;
5404
 
5405
      /* We are going to write a four byte longword into the runtime
5406
       reloc section.  The longword will be the address in the data
5407
       section which must be relocated.  It is followed by the name
5408
       of the target section NUL-padded or truncated to 8
5409
       characters.  */
5410
 
5411
      /* We can only relocate absolute longword relocs at run time.  */
5412
      if (ELF32_R_TYPE (irel->r_info) != (int) R_byte4_data)
5413
        {
5414
          *errmsg = _("unsupported reloc type");
5415
          bfd_set_error (bfd_error_bad_value);
5416
          goto error_return;
5417
        }
5418
 
5419
      /* Get the target section referred to by the reloc.  */
5420
      if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
5421
        {
5422
          /* A local symbol.  */
5423
          Elf_Internal_Sym *isym;
5424
 
5425
          /* Read this BFD's local symbols if we haven't done so already.  */
5426
          if (isymbuf == NULL)
5427
            {
5428
              isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
5429
              if (isymbuf == NULL)
5430
                isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
5431
                                                symtab_hdr->sh_info, 0,
5432
                                                NULL, NULL, NULL);
5433
              if (isymbuf == NULL)
5434
                goto error_return;
5435
            }
5436
 
5437
          isym = isymbuf + ELF32_R_SYM (irel->r_info);
5438
          targetsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
5439
        }
5440
      else
5441
        {
5442
          unsigned long indx;
5443
          struct elf_link_hash_entry *h;
5444
 
5445
          /* An external symbol.  */
5446
          indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
5447
          h = elf_sym_hashes (abfd)[indx];
5448
          BFD_ASSERT (h != NULL);
5449
          if (h->root.type == bfd_link_hash_defined
5450
              || h->root.type == bfd_link_hash_defweak)
5451
            targetsec = h->root.u.def.section;
5452
          else
5453
            targetsec = NULL;
5454
        }
5455
 
5456
      bfd_put_32 (abfd, irel->r_offset + datasec->output_offset, p);
5457
      memset (p + 4, 0, 8);
5458
      if (targetsec != NULL)
5459
        strncpy ((char *) p + 4, targetsec->output_section->name, 8);
5460
    }
5461
 
5462
  if (isymbuf != NULL && symtab_hdr->contents != (unsigned char *) isymbuf)
5463
    free (isymbuf);
5464
  if (internal_relocs != NULL
5465
      && elf_section_data (datasec)->relocs != internal_relocs)
5466
    free (internal_relocs);
5467
  return TRUE;
5468
 
5469
error_return:
5470
  if (isymbuf != NULL && symtab_hdr->contents != (unsigned char *) isymbuf)
5471
    free (isymbuf);
5472
  if (internal_relocs != NULL
5473
      && elf_section_data (datasec)->relocs != internal_relocs)
5474
    free (internal_relocs);
5475
  return FALSE;
5476
}
5477
 
5478
#define TARGET_LITTLE_SYM               bfd_elf32_bfin_vec
5479
#define TARGET_LITTLE_NAME              "elf32-bfin"
5480
#define ELF_ARCH                        bfd_arch_bfin
5481
#define ELF_MACHINE_CODE                EM_BLACKFIN
5482
#define ELF_MAXPAGESIZE                 0x1000
5483
#define elf_symbol_leading_char         '_'
5484
 
5485
#define bfd_elf32_bfd_reloc_type_lookup bfin_bfd_reloc_type_lookup
5486
#define bfd_elf32_bfd_reloc_name_lookup \
5487
                                        bfin_bfd_reloc_name_lookup
5488
#define elf_info_to_howto               bfin_info_to_howto
5489
#define elf_info_to_howto_rel           0
5490
#define elf_backend_object_p            elf32_bfin_object_p
5491
 
5492
#define bfd_elf32_bfd_is_local_label_name \
5493
                                        bfin_is_local_label_name
5494
#define bfin_hash_table(p) \
5495
  ((struct bfin_link_hash_table *) (p)->hash)
5496
 
5497
 
5498
 
5499
#define elf_backend_create_dynamic_sections \
5500
                                        _bfd_elf_create_dynamic_sections
5501
#define bfd_elf32_bfd_link_hash_table_create \
5502
                                        bfin_link_hash_table_create
5503
#define bfd_elf32_bfd_final_link        bfd_elf_gc_common_final_link
5504
 
5505
#define elf_backend_check_relocs        bfin_check_relocs
5506
#define elf_backend_adjust_dynamic_symbol \
5507
                                        bfin_adjust_dynamic_symbol
5508
#define elf_backend_size_dynamic_sections \
5509
                                        bfin_size_dynamic_sections
5510
#define elf_backend_relocate_section    bfin_relocate_section
5511
#define elf_backend_finish_dynamic_symbol \
5512
                                        bfin_finish_dynamic_symbol
5513
#define elf_backend_finish_dynamic_sections \
5514
                                        bfin_finish_dynamic_sections
5515
#define elf_backend_gc_mark_hook        bfin_gc_mark_hook
5516
#define elf_backend_gc_sweep_hook       bfin_gc_sweep_hook
5517
#define bfd_elf32_bfd_merge_private_bfd_data \
5518
                                        elf32_bfin_merge_private_bfd_data
5519
#define bfd_elf32_bfd_set_private_flags \
5520
                                        elf32_bfin_set_private_flags
5521
#define bfd_elf32_bfd_print_private_bfd_data \
5522
                                        elf32_bfin_print_private_bfd_data
5523
#define elf_backend_reloc_type_class    elf32_bfin_reloc_type_class
5524
#define elf_backend_can_gc_sections 1
5525
#define elf_backend_can_refcount 1
5526
#define elf_backend_want_got_plt 0
5527
#define elf_backend_plt_readonly 1
5528
#define elf_backend_want_plt_sym 0
5529
#define elf_backend_got_header_size     12
5530
#define elf_backend_rela_normal         1
5531
 
5532
#include "elf32-target.h"
5533
 
5534
#undef TARGET_LITTLE_SYM
5535
#define TARGET_LITTLE_SYM          bfd_elf32_bfinfdpic_vec
5536
#undef TARGET_LITTLE_NAME
5537
#define TARGET_LITTLE_NAME              "elf32-bfinfdpic"
5538
#undef  elf32_bed
5539
#define elf32_bed               elf32_bfinfdpic_bed
5540
 
5541
#undef elf_backend_gc_sweep_hook
5542
 
5543
#undef elf_backend_got_header_size
5544
#define elf_backend_got_header_size     0
5545
 
5546
#undef elf_backend_relocate_section
5547
#define elf_backend_relocate_section    bfinfdpic_relocate_section
5548
#undef elf_backend_check_relocs
5549
#define elf_backend_check_relocs        bfinfdpic_check_relocs
5550
 
5551
#undef bfd_elf32_bfd_link_hash_table_create
5552
#define bfd_elf32_bfd_link_hash_table_create \
5553
                bfinfdpic_elf_link_hash_table_create
5554
#undef elf_backend_always_size_sections
5555
#define elf_backend_always_size_sections \
5556
                elf32_bfinfdpic_always_size_sections
5557
#undef elf_backend_modify_program_headers
5558
#define elf_backend_modify_program_headers \
5559
                elf32_bfinfdpic_modify_program_headers
5560
#undef bfd_elf32_bfd_copy_private_bfd_data
5561
#define bfd_elf32_bfd_copy_private_bfd_data \
5562
                elf32_bfinfdpic_copy_private_bfd_data
5563
 
5564
#undef elf_backend_create_dynamic_sections
5565
#define elf_backend_create_dynamic_sections \
5566
                elf32_bfinfdpic_create_dynamic_sections
5567
#undef elf_backend_adjust_dynamic_symbol
5568
#define elf_backend_adjust_dynamic_symbol \
5569
                elf32_bfinfdpic_adjust_dynamic_symbol
5570
#undef elf_backend_size_dynamic_sections
5571
#define elf_backend_size_dynamic_sections \
5572
                elf32_bfinfdpic_size_dynamic_sections
5573
#undef elf_backend_finish_dynamic_symbol
5574
#define elf_backend_finish_dynamic_symbol \
5575
                elf32_bfinfdpic_finish_dynamic_symbol
5576
#undef elf_backend_finish_dynamic_sections
5577
#define elf_backend_finish_dynamic_sections \
5578
                elf32_bfinfdpic_finish_dynamic_sections
5579
 
5580
#undef elf_backend_can_make_relative_eh_frame
5581
#define elf_backend_can_make_relative_eh_frame \
5582
                bfinfdpic_elf_use_relative_eh_frame
5583
#undef elf_backend_can_make_lsda_relative_eh_frame
5584
#define elf_backend_can_make_lsda_relative_eh_frame \
5585
                bfinfdpic_elf_use_relative_eh_frame
5586
#undef elf_backend_encode_eh_address
5587
#define elf_backend_encode_eh_address \
5588
                bfinfdpic_elf_encode_eh_address
5589
 
5590
#undef elf_backend_may_use_rel_p
5591
#define elf_backend_may_use_rel_p       1
5592
#undef elf_backend_may_use_rela_p
5593
#define elf_backend_may_use_rela_p      1
5594
/* We use REL for dynamic relocations only.  */
5595
#undef elf_backend_default_use_rela_p
5596
#define elf_backend_default_use_rela_p  1
5597
 
5598
#undef elf_backend_omit_section_dynsym
5599
#define elf_backend_omit_section_dynsym _bfinfdpic_link_omit_section_dynsym
5600
 
5601
#include "elf32-target.h"

powered by: WebSVN 2.1.0

© copyright 1999-2024 OpenCores.org, equivalent to Oliscience, all rights reserved. OpenCores®, registered trademark.