]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-arm.c
* elf32-arm.c (elf32_arm_symbian_special_sections): Do not set
[thirdparty/binutils-gdb.git] / bfd / elf32-arm.c
CommitLineData
252b5132 1/* 32-bit ELF support for ARM
4e7fd91e 2 Copyright 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005
d1f161ea 3 Free Software Foundation, Inc.
252b5132
RH
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
20
7f266840
DJ
21#include "elf/arm.h"
22#include "bfd.h"
23#include "sysdep.h"
24#include "libbfd.h"
25#include "elf-bfd.h"
26
27#ifndef NUM_ELEM
28#define NUM_ELEM(a) (sizeof (a) / (sizeof (a)[0]))
29#endif
30
7f266840
DJ
31#define elf_info_to_howto 0
32#define elf_info_to_howto_rel elf32_arm_info_to_howto
33
34#define ARM_ELF_ABI_VERSION 0
35#define ARM_ELF_OS_ABI_VERSION ELFOSABI_ARM
36
37static reloc_howto_type * elf32_arm_reloc_type_lookup
38 PARAMS ((bfd * abfd, bfd_reloc_code_real_type code));
39static bfd_boolean elf32_arm_nabi_grok_prstatus
40 PARAMS ((bfd *abfd, Elf_Internal_Note *note));
41static bfd_boolean elf32_arm_nabi_grok_psinfo
42 PARAMS ((bfd *abfd, Elf_Internal_Note *note));
43
44/* Note: code such as elf32_arm_reloc_type_lookup expect to use e.g.
45 R_ARM_PC24 as an index into this, and find the R_ARM_PC24 HOWTO
46 in that slot. */
47
48static reloc_howto_type elf32_arm_howto_table[] =
49{
50 /* No relocation */
51 HOWTO (R_ARM_NONE, /* type */
52 0, /* rightshift */
53 0, /* size (0 = byte, 1 = short, 2 = long) */
54 0, /* bitsize */
55 FALSE, /* pc_relative */
56 0, /* bitpos */
57 complain_overflow_dont,/* complain_on_overflow */
58 bfd_elf_generic_reloc, /* special_function */
59 "R_ARM_NONE", /* name */
60 FALSE, /* partial_inplace */
61 0, /* src_mask */
62 0, /* dst_mask */
63 FALSE), /* pcrel_offset */
64
65 HOWTO (R_ARM_PC24, /* type */
66 2, /* rightshift */
67 2, /* size (0 = byte, 1 = short, 2 = long) */
68 24, /* bitsize */
69 TRUE, /* pc_relative */
70 0, /* bitpos */
71 complain_overflow_signed,/* complain_on_overflow */
72 bfd_elf_generic_reloc, /* special_function */
73 "R_ARM_PC24", /* name */
74 FALSE, /* partial_inplace */
75 0x00ffffff, /* src_mask */
76 0x00ffffff, /* dst_mask */
77 TRUE), /* pcrel_offset */
78
79 /* 32 bit absolute */
80 HOWTO (R_ARM_ABS32, /* type */
81 0, /* rightshift */
82 2, /* size (0 = byte, 1 = short, 2 = long) */
83 32, /* bitsize */
84 FALSE, /* pc_relative */
85 0, /* bitpos */
86 complain_overflow_bitfield,/* complain_on_overflow */
87 bfd_elf_generic_reloc, /* special_function */
88 "R_ARM_ABS32", /* name */
89 FALSE, /* partial_inplace */
90 0xffffffff, /* src_mask */
91 0xffffffff, /* dst_mask */
92 FALSE), /* pcrel_offset */
93
94 /* standard 32bit pc-relative reloc */
95 HOWTO (R_ARM_REL32, /* type */
96 0, /* rightshift */
97 2, /* size (0 = byte, 1 = short, 2 = long) */
98 32, /* bitsize */
99 TRUE, /* pc_relative */
100 0, /* bitpos */
101 complain_overflow_bitfield,/* complain_on_overflow */
102 bfd_elf_generic_reloc, /* special_function */
103 "R_ARM_REL32", /* name */
104 FALSE, /* partial_inplace */
105 0xffffffff, /* src_mask */
106 0xffffffff, /* dst_mask */
107 TRUE), /* pcrel_offset */
108
109 /* 8 bit absolute */
110 HOWTO (R_ARM_PC13, /* type */
111 0, /* rightshift */
112 0, /* size (0 = byte, 1 = short, 2 = long) */
113 8, /* bitsize */
114 FALSE, /* pc_relative */
115 0, /* bitpos */
116 complain_overflow_bitfield,/* complain_on_overflow */
117 bfd_elf_generic_reloc, /* special_function */
118 "R_ARM_PC13", /* name */
119 FALSE, /* partial_inplace */
120 0x000000ff, /* src_mask */
121 0x000000ff, /* dst_mask */
122 FALSE), /* pcrel_offset */
123
124 /* 16 bit absolute */
125 HOWTO (R_ARM_ABS16, /* type */
126 0, /* rightshift */
127 1, /* size (0 = byte, 1 = short, 2 = long) */
128 16, /* bitsize */
129 FALSE, /* pc_relative */
130 0, /* bitpos */
131 complain_overflow_bitfield,/* complain_on_overflow */
132 bfd_elf_generic_reloc, /* special_function */
133 "R_ARM_ABS16", /* name */
134 FALSE, /* partial_inplace */
135 0x0000ffff, /* src_mask */
136 0x0000ffff, /* dst_mask */
137 FALSE), /* pcrel_offset */
138
139 /* 12 bit absolute */
140 HOWTO (R_ARM_ABS12, /* type */
141 0, /* rightshift */
142 2, /* size (0 = byte, 1 = short, 2 = long) */
143 12, /* bitsize */
144 FALSE, /* pc_relative */
145 0, /* bitpos */
146 complain_overflow_bitfield,/* complain_on_overflow */
147 bfd_elf_generic_reloc, /* special_function */
148 "R_ARM_ABS12", /* name */
149 FALSE, /* partial_inplace */
150 0x000008ff, /* src_mask */
151 0x000008ff, /* dst_mask */
152 FALSE), /* pcrel_offset */
153
154 HOWTO (R_ARM_THM_ABS5, /* type */
155 6, /* rightshift */
156 1, /* size (0 = byte, 1 = short, 2 = long) */
157 5, /* bitsize */
158 FALSE, /* pc_relative */
159 0, /* bitpos */
160 complain_overflow_bitfield,/* complain_on_overflow */
161 bfd_elf_generic_reloc, /* special_function */
162 "R_ARM_THM_ABS5", /* name */
163 FALSE, /* partial_inplace */
164 0x000007e0, /* src_mask */
165 0x000007e0, /* dst_mask */
166 FALSE), /* pcrel_offset */
167
168 /* 8 bit absolute */
169 HOWTO (R_ARM_ABS8, /* type */
170 0, /* rightshift */
171 0, /* size (0 = byte, 1 = short, 2 = long) */
172 8, /* bitsize */
173 FALSE, /* pc_relative */
174 0, /* bitpos */
175 complain_overflow_bitfield,/* complain_on_overflow */
176 bfd_elf_generic_reloc, /* special_function */
177 "R_ARM_ABS8", /* name */
178 FALSE, /* partial_inplace */
179 0x000000ff, /* src_mask */
180 0x000000ff, /* dst_mask */
181 FALSE), /* pcrel_offset */
182
183 HOWTO (R_ARM_SBREL32, /* type */
184 0, /* rightshift */
185 2, /* size (0 = byte, 1 = short, 2 = long) */
186 32, /* bitsize */
187 FALSE, /* pc_relative */
188 0, /* bitpos */
189 complain_overflow_dont,/* complain_on_overflow */
190 bfd_elf_generic_reloc, /* special_function */
191 "R_ARM_SBREL32", /* name */
192 FALSE, /* partial_inplace */
193 0xffffffff, /* src_mask */
194 0xffffffff, /* dst_mask */
195 FALSE), /* pcrel_offset */
196
197 HOWTO (R_ARM_THM_PC22, /* type */
198 1, /* rightshift */
199 2, /* size (0 = byte, 1 = short, 2 = long) */
200 23, /* bitsize */
201 TRUE, /* pc_relative */
202 0, /* bitpos */
203 complain_overflow_signed,/* complain_on_overflow */
204 bfd_elf_generic_reloc, /* special_function */
205 "R_ARM_THM_PC22", /* name */
206 FALSE, /* partial_inplace */
207 0x07ff07ff, /* src_mask */
208 0x07ff07ff, /* dst_mask */
209 TRUE), /* pcrel_offset */
210
211 HOWTO (R_ARM_THM_PC8, /* type */
212 1, /* rightshift */
213 1, /* size (0 = byte, 1 = short, 2 = long) */
214 8, /* bitsize */
215 TRUE, /* pc_relative */
216 0, /* bitpos */
217 complain_overflow_signed,/* complain_on_overflow */
218 bfd_elf_generic_reloc, /* special_function */
219 "R_ARM_THM_PC8", /* name */
220 FALSE, /* partial_inplace */
221 0x000000ff, /* src_mask */
222 0x000000ff, /* dst_mask */
223 TRUE), /* pcrel_offset */
224
225 HOWTO (R_ARM_AMP_VCALL9, /* type */
226 1, /* rightshift */
227 1, /* size (0 = byte, 1 = short, 2 = long) */
228 8, /* bitsize */
229 TRUE, /* pc_relative */
230 0, /* bitpos */
231 complain_overflow_signed,/* complain_on_overflow */
232 bfd_elf_generic_reloc, /* special_function */
233 "R_ARM_AMP_VCALL9", /* name */
234 FALSE, /* partial_inplace */
235 0x000000ff, /* src_mask */
236 0x000000ff, /* dst_mask */
237 TRUE), /* pcrel_offset */
238
239 HOWTO (R_ARM_SWI24, /* type */
240 0, /* rightshift */
241 0, /* size (0 = byte, 1 = short, 2 = long) */
242 0, /* bitsize */
243 FALSE, /* pc_relative */
244 0, /* bitpos */
245 complain_overflow_signed,/* complain_on_overflow */
246 bfd_elf_generic_reloc, /* special_function */
247 "R_ARM_SWI24", /* name */
248 FALSE, /* partial_inplace */
249 0x00000000, /* src_mask */
250 0x00000000, /* dst_mask */
251 FALSE), /* pcrel_offset */
252
253 HOWTO (R_ARM_THM_SWI8, /* type */
254 0, /* rightshift */
255 0, /* size (0 = byte, 1 = short, 2 = long) */
256 0, /* bitsize */
257 FALSE, /* pc_relative */
258 0, /* bitpos */
259 complain_overflow_signed,/* complain_on_overflow */
260 bfd_elf_generic_reloc, /* special_function */
261 "R_ARM_SWI8", /* name */
262 FALSE, /* partial_inplace */
263 0x00000000, /* src_mask */
264 0x00000000, /* dst_mask */
265 FALSE), /* pcrel_offset */
266
267 /* BLX instruction for the ARM. */
268 HOWTO (R_ARM_XPC25, /* type */
269 2, /* rightshift */
270 2, /* size (0 = byte, 1 = short, 2 = long) */
271 25, /* bitsize */
272 TRUE, /* pc_relative */
273 0, /* bitpos */
274 complain_overflow_signed,/* complain_on_overflow */
275 bfd_elf_generic_reloc, /* special_function */
276 "R_ARM_XPC25", /* name */
277 FALSE, /* partial_inplace */
278 0x00ffffff, /* src_mask */
279 0x00ffffff, /* dst_mask */
280 TRUE), /* pcrel_offset */
281
282 /* BLX instruction for the Thumb. */
283 HOWTO (R_ARM_THM_XPC22, /* type */
284 2, /* rightshift */
285 2, /* size (0 = byte, 1 = short, 2 = long) */
286 22, /* bitsize */
287 TRUE, /* pc_relative */
288 0, /* bitpos */
289 complain_overflow_signed,/* complain_on_overflow */
290 bfd_elf_generic_reloc, /* special_function */
291 "R_ARM_THM_XPC22", /* name */
292 FALSE, /* partial_inplace */
293 0x07ff07ff, /* src_mask */
294 0x07ff07ff, /* dst_mask */
295 TRUE), /* pcrel_offset */
296
297 /* These next three relocs are not defined, but we need to fill the space. */
298
299 HOWTO (R_ARM_NONE, /* type */
300 0, /* rightshift */
301 0, /* size (0 = byte, 1 = short, 2 = long) */
302 0, /* bitsize */
303 FALSE, /* pc_relative */
304 0, /* bitpos */
305 complain_overflow_dont,/* complain_on_overflow */
306 bfd_elf_generic_reloc, /* special_function */
307 "R_ARM_unknown_17", /* name */
308 FALSE, /* partial_inplace */
309 0, /* src_mask */
310 0, /* dst_mask */
311 FALSE), /* pcrel_offset */
312
313 HOWTO (R_ARM_NONE, /* type */
314 0, /* rightshift */
315 0, /* size (0 = byte, 1 = short, 2 = long) */
316 0, /* bitsize */
317 FALSE, /* pc_relative */
318 0, /* bitpos */
319 complain_overflow_dont,/* complain_on_overflow */
320 bfd_elf_generic_reloc, /* special_function */
321 "R_ARM_unknown_18", /* name */
322 FALSE, /* partial_inplace */
323 0, /* src_mask */
324 0, /* dst_mask */
325 FALSE), /* pcrel_offset */
326
327 HOWTO (R_ARM_NONE, /* type */
328 0, /* rightshift */
329 0, /* size (0 = byte, 1 = short, 2 = long) */
330 0, /* bitsize */
331 FALSE, /* pc_relative */
332 0, /* bitpos */
333 complain_overflow_dont,/* complain_on_overflow */
334 bfd_elf_generic_reloc, /* special_function */
335 "R_ARM_unknown_19", /* name */
336 FALSE, /* partial_inplace */
337 0, /* src_mask */
338 0, /* dst_mask */
339 FALSE), /* pcrel_offset */
340
341 /* Relocs used in ARM Linux */
342
343 HOWTO (R_ARM_COPY, /* type */
344 0, /* rightshift */
345 2, /* size (0 = byte, 1 = short, 2 = long) */
346 32, /* bitsize */
347 FALSE, /* pc_relative */
348 0, /* bitpos */
349 complain_overflow_bitfield,/* complain_on_overflow */
350 bfd_elf_generic_reloc, /* special_function */
351 "R_ARM_COPY", /* name */
352 TRUE, /* partial_inplace */
353 0xffffffff, /* src_mask */
354 0xffffffff, /* dst_mask */
355 FALSE), /* pcrel_offset */
356
357 HOWTO (R_ARM_GLOB_DAT, /* type */
358 0, /* rightshift */
359 2, /* size (0 = byte, 1 = short, 2 = long) */
360 32, /* bitsize */
361 FALSE, /* pc_relative */
362 0, /* bitpos */
363 complain_overflow_bitfield,/* complain_on_overflow */
364 bfd_elf_generic_reloc, /* special_function */
365 "R_ARM_GLOB_DAT", /* name */
366 TRUE, /* partial_inplace */
367 0xffffffff, /* src_mask */
368 0xffffffff, /* dst_mask */
369 FALSE), /* pcrel_offset */
370
371 HOWTO (R_ARM_JUMP_SLOT, /* type */
372 0, /* rightshift */
373 2, /* size (0 = byte, 1 = short, 2 = long) */
374 32, /* bitsize */
375 FALSE, /* pc_relative */
376 0, /* bitpos */
377 complain_overflow_bitfield,/* complain_on_overflow */
378 bfd_elf_generic_reloc, /* special_function */
379 "R_ARM_JUMP_SLOT", /* name */
380 TRUE, /* partial_inplace */
381 0xffffffff, /* src_mask */
382 0xffffffff, /* dst_mask */
383 FALSE), /* pcrel_offset */
384
385 HOWTO (R_ARM_RELATIVE, /* type */
386 0, /* rightshift */
387 2, /* size (0 = byte, 1 = short, 2 = long) */
388 32, /* bitsize */
389 FALSE, /* pc_relative */
390 0, /* bitpos */
391 complain_overflow_bitfield,/* complain_on_overflow */
392 bfd_elf_generic_reloc, /* special_function */
393 "R_ARM_RELATIVE", /* name */
394 TRUE, /* partial_inplace */
395 0xffffffff, /* src_mask */
396 0xffffffff, /* dst_mask */
397 FALSE), /* pcrel_offset */
398
399 HOWTO (R_ARM_GOTOFF, /* type */
400 0, /* rightshift */
401 2, /* size (0 = byte, 1 = short, 2 = long) */
402 32, /* bitsize */
403 FALSE, /* pc_relative */
404 0, /* bitpos */
405 complain_overflow_bitfield,/* complain_on_overflow */
406 bfd_elf_generic_reloc, /* special_function */
407 "R_ARM_GOTOFF", /* name */
408 TRUE, /* partial_inplace */
409 0xffffffff, /* src_mask */
410 0xffffffff, /* dst_mask */
411 FALSE), /* pcrel_offset */
412
413 HOWTO (R_ARM_GOTPC, /* type */
414 0, /* rightshift */
415 2, /* size (0 = byte, 1 = short, 2 = long) */
416 32, /* bitsize */
417 TRUE, /* pc_relative */
418 0, /* bitpos */
419 complain_overflow_bitfield,/* complain_on_overflow */
420 bfd_elf_generic_reloc, /* special_function */
421 "R_ARM_GOTPC", /* name */
422 TRUE, /* partial_inplace */
423 0xffffffff, /* src_mask */
424 0xffffffff, /* dst_mask */
425 TRUE), /* pcrel_offset */
426
427 HOWTO (R_ARM_GOT32, /* type */
428 0, /* rightshift */
429 2, /* size (0 = byte, 1 = short, 2 = long) */
430 32, /* bitsize */
431 FALSE, /* pc_relative */
432 0, /* bitpos */
433 complain_overflow_bitfield,/* complain_on_overflow */
434 bfd_elf_generic_reloc, /* special_function */
435 "R_ARM_GOT32", /* name */
436 TRUE, /* partial_inplace */
437 0xffffffff, /* src_mask */
438 0xffffffff, /* dst_mask */
439 FALSE), /* pcrel_offset */
440
441 HOWTO (R_ARM_PLT32, /* type */
442 2, /* rightshift */
443 2, /* size (0 = byte, 1 = short, 2 = long) */
444 26, /* bitsize */
445 TRUE, /* pc_relative */
446 0, /* bitpos */
447 complain_overflow_bitfield,/* complain_on_overflow */
448 bfd_elf_generic_reloc, /* special_function */
449 "R_ARM_PLT32", /* name */
450 TRUE, /* partial_inplace */
451 0x00ffffff, /* src_mask */
452 0x00ffffff, /* dst_mask */
453 TRUE), /* pcrel_offset */
454
455 HOWTO (R_ARM_CALL, /* type */
456 2, /* rightshift */
457 2, /* size (0 = byte, 1 = short, 2 = long) */
458 24, /* bitsize */
459 TRUE, /* pc_relative */
460 0, /* bitpos */
461 complain_overflow_signed,/* complain_on_overflow */
462 bfd_elf_generic_reloc, /* special_function */
463 "R_ARM_CALL", /* name */
464 FALSE, /* partial_inplace */
465 0x00ffffff, /* src_mask */
466 0x00ffffff, /* dst_mask */
467 TRUE), /* pcrel_offset */
468
469 HOWTO (R_ARM_JUMP24, /* type */
470 2, /* rightshift */
471 2, /* size (0 = byte, 1 = short, 2 = long) */
472 24, /* bitsize */
473 TRUE, /* pc_relative */
474 0, /* bitpos */
475 complain_overflow_signed,/* complain_on_overflow */
476 bfd_elf_generic_reloc, /* special_function */
477 "R_ARM_JUMP24", /* name */
478 FALSE, /* partial_inplace */
479 0x00ffffff, /* src_mask */
480 0x00ffffff, /* dst_mask */
481 TRUE), /* pcrel_offset */
482
483 HOWTO (R_ARM_NONE, /* type */
484 0, /* rightshift */
485 0, /* size (0 = byte, 1 = short, 2 = long) */
486 0, /* bitsize */
487 FALSE, /* pc_relative */
488 0, /* bitpos */
489 complain_overflow_dont,/* complain_on_overflow */
490 bfd_elf_generic_reloc, /* special_function */
491 "R_ARM_unknown_30", /* name */
492 FALSE, /* partial_inplace */
493 0, /* src_mask */
494 0, /* dst_mask */
495 FALSE), /* pcrel_offset */
496
497 HOWTO (R_ARM_NONE, /* type */
498 0, /* rightshift */
499 0, /* size (0 = byte, 1 = short, 2 = long) */
500 0, /* bitsize */
501 FALSE, /* pc_relative */
502 0, /* bitpos */
503 complain_overflow_dont,/* complain_on_overflow */
504 bfd_elf_generic_reloc, /* special_function */
505 "R_ARM_unknown_31", /* name */
506 FALSE, /* partial_inplace */
507 0, /* src_mask */
508 0, /* dst_mask */
509 FALSE), /* pcrel_offset */
510
511 HOWTO (R_ARM_ALU_PCREL7_0, /* type */
512 0, /* rightshift */
513 2, /* size (0 = byte, 1 = short, 2 = long) */
514 12, /* bitsize */
515 TRUE, /* pc_relative */
516 0, /* bitpos */
517 complain_overflow_dont,/* complain_on_overflow */
518 bfd_elf_generic_reloc, /* special_function */
519 "R_ARM_ALU_PCREL_7_0", /* name */
520 FALSE, /* partial_inplace */
521 0x00000fff, /* src_mask */
522 0x00000fff, /* dst_mask */
523 TRUE), /* pcrel_offset */
524
525 HOWTO (R_ARM_ALU_PCREL15_8, /* type */
526 0, /* rightshift */
527 2, /* size (0 = byte, 1 = short, 2 = long) */
528 12, /* bitsize */
529 TRUE, /* pc_relative */
530 8, /* bitpos */
531 complain_overflow_dont,/* complain_on_overflow */
532 bfd_elf_generic_reloc, /* special_function */
533 "R_ARM_ALU_PCREL_15_8",/* name */
534 FALSE, /* partial_inplace */
535 0x00000fff, /* src_mask */
536 0x00000fff, /* dst_mask */
537 TRUE), /* pcrel_offset */
538
539 HOWTO (R_ARM_ALU_PCREL23_15, /* type */
540 0, /* rightshift */
541 2, /* size (0 = byte, 1 = short, 2 = long) */
542 12, /* bitsize */
543 TRUE, /* pc_relative */
544 16, /* bitpos */
545 complain_overflow_dont,/* complain_on_overflow */
546 bfd_elf_generic_reloc, /* special_function */
547 "R_ARM_ALU_PCREL_23_15",/* name */
548 FALSE, /* partial_inplace */
549 0x00000fff, /* src_mask */
550 0x00000fff, /* dst_mask */
551 TRUE), /* pcrel_offset */
552
553 HOWTO (R_ARM_LDR_SBREL_11_0, /* type */
554 0, /* rightshift */
555 2, /* size (0 = byte, 1 = short, 2 = long) */
556 12, /* bitsize */
557 FALSE, /* pc_relative */
558 0, /* bitpos */
559 complain_overflow_dont,/* complain_on_overflow */
560 bfd_elf_generic_reloc, /* special_function */
561 "R_ARM_LDR_SBREL_11_0",/* name */
562 FALSE, /* partial_inplace */
563 0x00000fff, /* src_mask */
564 0x00000fff, /* dst_mask */
565 FALSE), /* pcrel_offset */
566
567 HOWTO (R_ARM_ALU_SBREL_19_12, /* type */
568 0, /* rightshift */
569 2, /* size (0 = byte, 1 = short, 2 = long) */
570 8, /* bitsize */
571 FALSE, /* pc_relative */
572 12, /* bitpos */
573 complain_overflow_dont,/* complain_on_overflow */
574 bfd_elf_generic_reloc, /* special_function */
575 "R_ARM_ALU_SBREL_19_12",/* name */
576 FALSE, /* partial_inplace */
577 0x000ff000, /* src_mask */
578 0x000ff000, /* dst_mask */
579 FALSE), /* pcrel_offset */
580
581 HOWTO (R_ARM_ALU_SBREL_27_20, /* type */
582 0, /* rightshift */
583 2, /* size (0 = byte, 1 = short, 2 = long) */
584 8, /* bitsize */
585 FALSE, /* pc_relative */
586 20, /* bitpos */
587 complain_overflow_dont,/* complain_on_overflow */
588 bfd_elf_generic_reloc, /* special_function */
589 "R_ARM_ALU_SBREL_27_20",/* name */
590 FALSE, /* partial_inplace */
591 0x0ff00000, /* src_mask */
592 0x0ff00000, /* dst_mask */
593 FALSE), /* pcrel_offset */
594
595 HOWTO (R_ARM_TARGET1, /* type */
596 0, /* rightshift */
597 2, /* size (0 = byte, 1 = short, 2 = long) */
598 32, /* bitsize */
599 FALSE, /* pc_relative */
600 0, /* bitpos */
601 complain_overflow_dont,/* complain_on_overflow */
602 bfd_elf_generic_reloc, /* special_function */
603 "R_ARM_TARGET1", /* name */
604 FALSE, /* partial_inplace */
605 0xffffffff, /* src_mask */
606 0xffffffff, /* dst_mask */
607 FALSE), /* pcrel_offset */
608
609 HOWTO (R_ARM_ROSEGREL32, /* type */
610 0, /* rightshift */
611 2, /* size (0 = byte, 1 = short, 2 = long) */
612 32, /* bitsize */
613 FALSE, /* pc_relative */
614 0, /* bitpos */
615 complain_overflow_dont,/* complain_on_overflow */
616 bfd_elf_generic_reloc, /* special_function */
617 "R_ARM_ROSEGREL32", /* name */
618 FALSE, /* partial_inplace */
619 0xffffffff, /* src_mask */
620 0xffffffff, /* dst_mask */
621 FALSE), /* pcrel_offset */
622
623 HOWTO (R_ARM_V4BX, /* type */
624 0, /* rightshift */
625 2, /* size (0 = byte, 1 = short, 2 = long) */
626 32, /* bitsize */
627 FALSE, /* pc_relative */
628 0, /* bitpos */
629 complain_overflow_dont,/* complain_on_overflow */
630 bfd_elf_generic_reloc, /* special_function */
631 "R_ARM_V4BX", /* name */
632 FALSE, /* partial_inplace */
633 0xffffffff, /* src_mask */
634 0xffffffff, /* dst_mask */
635 FALSE), /* pcrel_offset */
636
637 HOWTO (R_ARM_TARGET2, /* type */
638 0, /* rightshift */
639 2, /* size (0 = byte, 1 = short, 2 = long) */
640 32, /* bitsize */
641 FALSE, /* pc_relative */
642 0, /* bitpos */
643 complain_overflow_signed,/* complain_on_overflow */
644 bfd_elf_generic_reloc, /* special_function */
645 "R_ARM_TARGET2", /* name */
646 FALSE, /* partial_inplace */
647 0xffffffff, /* src_mask */
648 0xffffffff, /* dst_mask */
649 TRUE), /* pcrel_offset */
650
651 HOWTO (R_ARM_PREL31, /* type */
652 0, /* rightshift */
653 2, /* size (0 = byte, 1 = short, 2 = long) */
654 31, /* bitsize */
655 TRUE, /* pc_relative */
656 0, /* bitpos */
657 complain_overflow_signed,/* complain_on_overflow */
658 bfd_elf_generic_reloc, /* special_function */
659 "R_ARM_PREL31", /* name */
660 FALSE, /* partial_inplace */
661 0x7fffffff, /* src_mask */
662 0x7fffffff, /* dst_mask */
663 TRUE), /* pcrel_offset */
664};
665
666 /* GNU extension to record C++ vtable hierarchy */
667static reloc_howto_type elf32_arm_vtinherit_howto =
668 HOWTO (R_ARM_GNU_VTINHERIT, /* type */
669 0, /* rightshift */
670 2, /* size (0 = byte, 1 = short, 2 = long) */
671 0, /* bitsize */
672 FALSE, /* pc_relative */
673 0, /* bitpos */
674 complain_overflow_dont, /* complain_on_overflow */
675 NULL, /* special_function */
676 "R_ARM_GNU_VTINHERIT", /* name */
677 FALSE, /* partial_inplace */
678 0, /* src_mask */
679 0, /* dst_mask */
680 FALSE); /* pcrel_offset */
681
682 /* GNU extension to record C++ vtable member usage */
683static reloc_howto_type elf32_arm_vtentry_howto =
684 HOWTO (R_ARM_GNU_VTENTRY, /* type */
685 0, /* rightshift */
686 2, /* size (0 = byte, 1 = short, 2 = long) */
687 0, /* bitsize */
688 FALSE, /* pc_relative */
689 0, /* bitpos */
690 complain_overflow_dont, /* complain_on_overflow */
691 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
692 "R_ARM_GNU_VTENTRY", /* name */
693 FALSE, /* partial_inplace */
694 0, /* src_mask */
695 0, /* dst_mask */
696 FALSE); /* pcrel_offset */
697
698 /* 12 bit pc relative */
699static reloc_howto_type elf32_arm_thm_pc11_howto =
700 HOWTO (R_ARM_THM_PC11, /* type */
701 1, /* rightshift */
702 1, /* size (0 = byte, 1 = short, 2 = long) */
703 11, /* bitsize */
704 TRUE, /* pc_relative */
705 0, /* bitpos */
706 complain_overflow_signed, /* complain_on_overflow */
707 bfd_elf_generic_reloc, /* special_function */
708 "R_ARM_THM_PC11", /* name */
709 FALSE, /* partial_inplace */
710 0x000007ff, /* src_mask */
711 0x000007ff, /* dst_mask */
712 TRUE); /* pcrel_offset */
713
714 /* 12 bit pc relative */
715static reloc_howto_type elf32_arm_thm_pc9_howto =
716 HOWTO (R_ARM_THM_PC9, /* type */
717 1, /* rightshift */
718 1, /* size (0 = byte, 1 = short, 2 = long) */
719 8, /* bitsize */
720 TRUE, /* pc_relative */
721 0, /* bitpos */
722 complain_overflow_signed, /* complain_on_overflow */
723 bfd_elf_generic_reloc, /* special_function */
724 "R_ARM_THM_PC9", /* name */
725 FALSE, /* partial_inplace */
726 0x000000ff, /* src_mask */
727 0x000000ff, /* dst_mask */
728 TRUE); /* pcrel_offset */
729
730/* Place relative GOT-indirect. */
731static reloc_howto_type elf32_arm_got_prel =
732 HOWTO (R_ARM_GOT_PREL, /* type */
733 0, /* rightshift */
734 2, /* size (0 = byte, 1 = short, 2 = long) */
735 32, /* bitsize */
736 TRUE, /* pc_relative */
737 0, /* bitpos */
738 complain_overflow_dont, /* complain_on_overflow */
739 bfd_elf_generic_reloc, /* special_function */
740 "R_ARM_GOT_PREL", /* name */
741 FALSE, /* partial_inplace */
742 0xffffffff, /* src_mask */
743 0xffffffff, /* dst_mask */
744 TRUE); /* pcrel_offset */
745
746/* Currently unused relocations. */
747static reloc_howto_type elf32_arm_r_howto[4] =
748{
749 HOWTO (R_ARM_RREL32, /* type */
750 0, /* rightshift */
751 0, /* size (0 = byte, 1 = short, 2 = long) */
752 0, /* bitsize */
753 FALSE, /* pc_relative */
754 0, /* bitpos */
755 complain_overflow_dont,/* complain_on_overflow */
756 bfd_elf_generic_reloc, /* special_function */
757 "R_ARM_RREL32", /* name */
758 FALSE, /* partial_inplace */
759 0, /* src_mask */
760 0, /* dst_mask */
761 FALSE), /* pcrel_offset */
762
763 HOWTO (R_ARM_RABS32, /* type */
764 0, /* rightshift */
765 0, /* size (0 = byte, 1 = short, 2 = long) */
766 0, /* bitsize */
767 FALSE, /* pc_relative */
768 0, /* bitpos */
769 complain_overflow_dont,/* complain_on_overflow */
770 bfd_elf_generic_reloc, /* special_function */
771 "R_ARM_RABS32", /* name */
772 FALSE, /* partial_inplace */
773 0, /* src_mask */
774 0, /* dst_mask */
775 FALSE), /* pcrel_offset */
776
777 HOWTO (R_ARM_RPC24, /* type */
778 0, /* rightshift */
779 0, /* size (0 = byte, 1 = short, 2 = long) */
780 0, /* bitsize */
781 FALSE, /* pc_relative */
782 0, /* bitpos */
783 complain_overflow_dont,/* complain_on_overflow */
784 bfd_elf_generic_reloc, /* special_function */
785 "R_ARM_RPC24", /* name */
786 FALSE, /* partial_inplace */
787 0, /* src_mask */
788 0, /* dst_mask */
789 FALSE), /* pcrel_offset */
790
791 HOWTO (R_ARM_RBASE, /* type */
792 0, /* rightshift */
793 0, /* size (0 = byte, 1 = short, 2 = long) */
794 0, /* bitsize */
795 FALSE, /* pc_relative */
796 0, /* bitpos */
797 complain_overflow_dont,/* complain_on_overflow */
798 bfd_elf_generic_reloc, /* special_function */
799 "R_ARM_RBASE", /* name */
800 FALSE, /* partial_inplace */
801 0, /* src_mask */
802 0, /* dst_mask */
803 FALSE) /* pcrel_offset */
804};
805
806static reloc_howto_type *
807elf32_arm_howto_from_type (unsigned int r_type)
808{
809 if (r_type < NUM_ELEM (elf32_arm_howto_table))
810 return &elf32_arm_howto_table[r_type];
811
812 switch (r_type)
813 {
814 case R_ARM_GOT_PREL:
815 return &elf32_arm_got_prel;
816
817 case R_ARM_GNU_VTINHERIT:
818 return &elf32_arm_vtinherit_howto;
819
820 case R_ARM_GNU_VTENTRY:
821 return &elf32_arm_vtentry_howto;
822
823 case R_ARM_THM_PC11:
824 return &elf32_arm_thm_pc11_howto;
825
826 case R_ARM_THM_PC9:
827 return &elf32_arm_thm_pc9_howto;
828
829 case R_ARM_RREL32:
830 case R_ARM_RABS32:
831 case R_ARM_RPC24:
832 case R_ARM_RBASE:
833 return &elf32_arm_r_howto[r_type - R_ARM_RREL32];
834
835 default:
836 return NULL;
837 }
838}
839
840static void
841elf32_arm_info_to_howto (bfd * abfd ATTRIBUTE_UNUSED, arelent * bfd_reloc,
842 Elf_Internal_Rela * elf_reloc)
843{
844 unsigned int r_type;
845
846 r_type = ELF32_R_TYPE (elf_reloc->r_info);
847 bfd_reloc->howto = elf32_arm_howto_from_type (r_type);
848}
849
850struct elf32_arm_reloc_map
851 {
852 bfd_reloc_code_real_type bfd_reloc_val;
853 unsigned char elf_reloc_val;
854 };
855
856/* All entries in this list must also be present in elf32_arm_howto_table. */
857static const struct elf32_arm_reloc_map elf32_arm_reloc_map[] =
858 {
859 {BFD_RELOC_NONE, R_ARM_NONE},
860 {BFD_RELOC_ARM_PCREL_BRANCH, R_ARM_PC24},
861 {BFD_RELOC_ARM_PCREL_BLX, R_ARM_XPC25},
862 {BFD_RELOC_THUMB_PCREL_BLX, R_ARM_THM_XPC22},
863 {BFD_RELOC_32, R_ARM_ABS32},
864 {BFD_RELOC_32_PCREL, R_ARM_REL32},
865 {BFD_RELOC_8, R_ARM_ABS8},
866 {BFD_RELOC_16, R_ARM_ABS16},
867 {BFD_RELOC_ARM_OFFSET_IMM, R_ARM_ABS12},
868 {BFD_RELOC_ARM_THUMB_OFFSET, R_ARM_THM_ABS5},
869 {BFD_RELOC_THUMB_PCREL_BRANCH23, R_ARM_THM_PC22},
870 {BFD_RELOC_ARM_COPY, R_ARM_COPY},
871 {BFD_RELOC_ARM_GLOB_DAT, R_ARM_GLOB_DAT},
872 {BFD_RELOC_ARM_JUMP_SLOT, R_ARM_JUMP_SLOT},
873 {BFD_RELOC_ARM_RELATIVE, R_ARM_RELATIVE},
874 {BFD_RELOC_ARM_GOTOFF, R_ARM_GOTOFF},
875 {BFD_RELOC_ARM_GOTPC, R_ARM_GOTPC},
876 {BFD_RELOC_ARM_GOT32, R_ARM_GOT32},
877 {BFD_RELOC_ARM_PLT32, R_ARM_PLT32},
878 {BFD_RELOC_ARM_TARGET1, R_ARM_TARGET1},
879 {BFD_RELOC_ARM_ROSEGREL32, R_ARM_ROSEGREL32},
880 {BFD_RELOC_ARM_SBREL32, R_ARM_SBREL32},
881 {BFD_RELOC_ARM_PREL31, R_ARM_PREL31},
882 {BFD_RELOC_ARM_TARGET2, R_ARM_TARGET2}
883 };
884
885static reloc_howto_type *
886elf32_arm_reloc_type_lookup (abfd, code)
887 bfd *abfd ATTRIBUTE_UNUSED;
888 bfd_reloc_code_real_type code;
889{
890 unsigned int i;
891
892 switch (code)
893 {
894 case BFD_RELOC_VTABLE_INHERIT:
895 return & elf32_arm_vtinherit_howto;
896
897 case BFD_RELOC_VTABLE_ENTRY:
898 return & elf32_arm_vtentry_howto;
899
900 case BFD_RELOC_THUMB_PCREL_BRANCH12:
901 return & elf32_arm_thm_pc11_howto;
902
903 case BFD_RELOC_THUMB_PCREL_BRANCH9:
904 return & elf32_arm_thm_pc9_howto;
905
906 default:
907 for (i = 0; i < NUM_ELEM (elf32_arm_reloc_map); i ++)
908 if (elf32_arm_reloc_map[i].bfd_reloc_val == code)
909 return & elf32_arm_howto_table[elf32_arm_reloc_map[i].elf_reloc_val];
910
911 return NULL;
912 }
913}
914
915/* Support for core dump NOTE sections */
916static bfd_boolean
917elf32_arm_nabi_grok_prstatus (abfd, note)
918 bfd *abfd;
919 Elf_Internal_Note *note;
920{
921 int offset;
922 size_t size;
923
924 switch (note->descsz)
925 {
926 default:
927 return FALSE;
928
929 case 148: /* Linux/ARM 32-bit*/
930 /* pr_cursig */
931 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
932
933 /* pr_pid */
934 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 24);
935
936 /* pr_reg */
937 offset = 72;
938 size = 72;
939
940 break;
941 }
942
943 /* Make a ".reg/999" section. */
944 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
945 size, note->descpos + offset);
946}
947
948static bfd_boolean
949elf32_arm_nabi_grok_psinfo (abfd, note)
950 bfd *abfd;
951 Elf_Internal_Note *note;
952{
953 switch (note->descsz)
954 {
955 default:
956 return FALSE;
957
958 case 124: /* Linux/ARM elf_prpsinfo */
959 elf_tdata (abfd)->core_program
960 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
961 elf_tdata (abfd)->core_command
962 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
963 }
964
965 /* Note that for some reason, a spurious space is tacked
966 onto the end of the args in some (at least one anyway)
967 implementations, so strip it off if it exists. */
968
969 {
970 char *command = elf_tdata (abfd)->core_command;
971 int n = strlen (command);
972
973 if (0 < n && command[n - 1] == ' ')
974 command[n - 1] = '\0';
975 }
976
977 return TRUE;
978}
979
980#define TARGET_LITTLE_SYM bfd_elf32_littlearm_vec
981#define TARGET_LITTLE_NAME "elf32-littlearm"
982#define TARGET_BIG_SYM bfd_elf32_bigarm_vec
983#define TARGET_BIG_NAME "elf32-bigarm"
984
985#define elf_backend_grok_prstatus elf32_arm_nabi_grok_prstatus
986#define elf_backend_grok_psinfo elf32_arm_nabi_grok_psinfo
987
252b5132
RH
988typedef unsigned long int insn32;
989typedef unsigned short int insn16;
990
8cb51566 991/* In lieu of proper flags, assume all EABIv4 objects are interworkable. */
57e8b36a 992#define INTERWORK_FLAG(abfd) \
8cb51566 993 (EF_ARM_EABI_VERSION (elf_elfheader (abfd)->e_flags) == EF_ARM_EABI_VER4 \
85a84e7a 994 || (elf_elfheader (abfd)->e_flags & EF_ARM_INTERWORK))
9b485d32 995
252b5132
RH
996/* The linker script knows the section names for placement.
997 The entry_names are used to do simple name mangling on the stubs.
998 Given a function name, and its type, the stub can be found. The
9b485d32 999 name can be changed. The only requirement is the %s be present. */
252b5132
RH
1000#define THUMB2ARM_GLUE_SECTION_NAME ".glue_7t"
1001#define THUMB2ARM_GLUE_ENTRY_NAME "__%s_from_thumb"
1002
1003#define ARM2THUMB_GLUE_SECTION_NAME ".glue_7"
1004#define ARM2THUMB_GLUE_ENTRY_NAME "__%s_from_arm"
1005
1006/* The name of the dynamic interpreter. This is put in the .interp
1007 section. */
1008#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
1009
5e681ec4
PB
1010#ifdef FOUR_WORD_PLT
1011
252b5132
RH
1012/* The first entry in a procedure linkage table looks like
1013 this. It is set up so that any shared library function that is
59f2c4e7 1014 called before the relocation has been set up calls the dynamic
9b485d32 1015 linker first. */
e5a52504 1016static const bfd_vma elf32_arm_plt0_entry [] =
5e681ec4
PB
1017 {
1018 0xe52de004, /* str lr, [sp, #-4]! */
1019 0xe59fe010, /* ldr lr, [pc, #16] */
1020 0xe08fe00e, /* add lr, pc, lr */
1021 0xe5bef008, /* ldr pc, [lr, #8]! */
1022 };
1023
1024/* Subsequent entries in a procedure linkage table look like
1025 this. */
e5a52504 1026static const bfd_vma elf32_arm_plt_entry [] =
5e681ec4
PB
1027 {
1028 0xe28fc600, /* add ip, pc, #NN */
1029 0xe28cca00, /* add ip, ip, #NN */
1030 0xe5bcf000, /* ldr pc, [ip, #NN]! */
1031 0x00000000, /* unused */
1032 };
1033
1034#else
1035
5e681ec4
PB
1036/* The first entry in a procedure linkage table looks like
1037 this. It is set up so that any shared library function that is
1038 called before the relocation has been set up calls the dynamic
1039 linker first. */
e5a52504 1040static const bfd_vma elf32_arm_plt0_entry [] =
917583ad 1041 {
5e681ec4
PB
1042 0xe52de004, /* str lr, [sp, #-4]! */
1043 0xe59fe004, /* ldr lr, [pc, #4] */
1044 0xe08fe00e, /* add lr, pc, lr */
1045 0xe5bef008, /* ldr pc, [lr, #8]! */
1046 0x00000000, /* &GOT[0] - . */
917583ad 1047 };
252b5132
RH
1048
1049/* Subsequent entries in a procedure linkage table look like
1050 this. */
e5a52504 1051static const bfd_vma elf32_arm_plt_entry [] =
5e681ec4
PB
1052 {
1053 0xe28fc600, /* add ip, pc, #0xNN00000 */
1054 0xe28cca00, /* add ip, ip, #0xNN000 */
1055 0xe5bcf000, /* ldr pc, [ip, #0xNNN]! */
1056 };
1057
1058#endif
252b5132 1059
b7693d02
DJ
1060/* An initial stub used if the PLT entry is referenced from Thumb code. */
1061#define PLT_THUMB_STUB_SIZE 4
1062static const bfd_vma elf32_arm_plt_thumb_stub [] =
1063 {
1064 0x4778, /* bx pc */
1065 0x46c0 /* nop */
1066 };
1067
e5a52504
MM
1068/* The entries in a PLT when using a DLL-based target with multiple
1069 address spaces. */
1070static const bfd_vma elf32_arm_symbian_plt_entry [] =
1071 {
83a358aa 1072 0xe51ff004, /* ldr pc, [pc, #-4] */
e5a52504
MM
1073 0x00000000, /* dcd R_ARM_GLOB_DAT(X) */
1074 };
1075
e489d0ae
PB
1076/* Used to build a map of a section. This is required for mixed-endian
1077 code/data. */
1078
1079typedef struct elf32_elf_section_map
1080{
1081 bfd_vma vma;
1082 char type;
1083}
1084elf32_arm_section_map;
1085
1086struct _arm_elf_section_data
1087{
1088 struct bfd_elf_section_data elf;
1089 int mapcount;
1090 elf32_arm_section_map *map;
1091};
1092
1093#define elf32_arm_section_data(sec) \
1094 ((struct _arm_elf_section_data *) elf_section_data (sec))
1095
252b5132
RH
1096/* The ARM linker needs to keep track of the number of relocs that it
1097 decides to copy in check_relocs for each symbol. This is so that
1098 it can discard PC relative relocs if it doesn't need them when
1099 linking with -Bsymbolic. We store the information in a field
1100 extending the regular ELF linker hash table. */
1101
1102/* This structure keeps track of the number of PC relative relocs we
1103 have copied for a given symbol. */
5e681ec4 1104struct elf32_arm_relocs_copied
917583ad
NC
1105 {
1106 /* Next section. */
5e681ec4 1107 struct elf32_arm_relocs_copied * next;
917583ad
NC
1108 /* A section in dynobj. */
1109 asection * section;
1110 /* Number of relocs copied in this section. */
1111 bfd_size_type count;
1112 };
252b5132 1113
ba96a88f 1114/* Arm ELF linker hash entry. */
252b5132 1115struct elf32_arm_link_hash_entry
917583ad
NC
1116 {
1117 struct elf_link_hash_entry root;
252b5132 1118
917583ad 1119 /* Number of PC relative relocs copied for this symbol. */
5e681ec4 1120 struct elf32_arm_relocs_copied * relocs_copied;
b7693d02
DJ
1121
1122 /* We reference count Thumb references to a PLT entry separately,
1123 so that we can emit the Thumb trampoline only if needed. */
1124 bfd_signed_vma plt_thumb_refcount;
1125
1126 /* Since PLT entries have variable size if the Thumb prologue is
1127 used, we need to record the index into .got.plt instead of
1128 recomputing it from the PLT offset. */
1129 bfd_signed_vma plt_got_offset;
917583ad 1130 };
252b5132 1131
252b5132 1132/* Traverse an arm ELF linker hash table. */
252b5132
RH
1133#define elf32_arm_link_hash_traverse(table, func, info) \
1134 (elf_link_hash_traverse \
1135 (&(table)->root, \
b7693d02 1136 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
252b5132
RH
1137 (info)))
1138
1139/* Get the ARM elf linker hash table from a link_info structure. */
1140#define elf32_arm_hash_table(info) \
1141 ((struct elf32_arm_link_hash_table *) ((info)->hash))
1142
9b485d32 1143/* ARM ELF linker hash table. */
252b5132 1144struct elf32_arm_link_hash_table
917583ad
NC
1145 {
1146 /* The main hash table. */
1147 struct elf_link_hash_table root;
252b5132 1148
4cc11e76 1149 /* The size in bytes of the section containing the Thumb-to-ARM glue. */
dc810e39 1150 bfd_size_type thumb_glue_size;
252b5132 1151
4cc11e76 1152 /* The size in bytes of the section containing the ARM-to-Thumb glue. */
dc810e39 1153 bfd_size_type arm_glue_size;
252b5132 1154
4cc11e76 1155 /* An arbitrary input BFD chosen to hold the glue sections. */
917583ad 1156 bfd * bfd_of_glue_owner;
ba96a88f 1157
e489d0ae
PB
1158 /* Nonzero to output a BE8 image. */
1159 int byteswap_code;
1160
9c504268
PB
1161 /* Zero if R_ARM_TARGET1 means R_ARM_ABS32.
1162 Nonzero if R_ARM_TARGET1 means R_ARM_ABS32. */
1163 int target1_is_rel;
1164
eb043451
PB
1165 /* The relocation to use for R_ARM_TARGET2 relocations. */
1166 int target2_reloc;
1167
319850b4
JB
1168 /* Nonzero to fix BX instructions for ARMv4 targets. */
1169 int fix_v4bx;
1170
e5a52504
MM
1171 /* The number of bytes in the initial entry in the PLT. */
1172 bfd_size_type plt_header_size;
1173
1174 /* The number of bytes in the subsequent PLT etries. */
1175 bfd_size_type plt_entry_size;
1176
1177 /* True if the target system is Symbian OS. */
1178 int symbian_p;
1179
4e7fd91e
PB
1180 /* True if the target uses REL relocations. */
1181 int use_rel;
1182
5e681ec4
PB
1183 /* Short-cuts to get to dynamic linker sections. */
1184 asection *sgot;
1185 asection *sgotplt;
1186 asection *srelgot;
1187 asection *splt;
1188 asection *srelplt;
1189 asection *sdynbss;
1190 asection *srelbss;
1191
1192 /* Small local sym to section mapping cache. */
1193 struct sym_sec_cache sym_sec;
b7693d02
DJ
1194
1195 /* For convenience in allocate_dynrelocs. */
1196 bfd * obfd;
917583ad 1197 };
252b5132 1198
780a67af
NC
1199/* Create an entry in an ARM ELF linker hash table. */
1200
1201static struct bfd_hash_entry *
57e8b36a
NC
1202elf32_arm_link_hash_newfunc (struct bfd_hash_entry * entry,
1203 struct bfd_hash_table * table,
1204 const char * string)
780a67af
NC
1205{
1206 struct elf32_arm_link_hash_entry * ret =
1207 (struct elf32_arm_link_hash_entry *) entry;
1208
1209 /* Allocate the structure if it has not already been allocated by a
1210 subclass. */
1211 if (ret == (struct elf32_arm_link_hash_entry *) NULL)
57e8b36a
NC
1212 ret = bfd_hash_allocate (table, sizeof (struct elf32_arm_link_hash_entry));
1213 if (ret == NULL)
780a67af
NC
1214 return (struct bfd_hash_entry *) ret;
1215
1216 /* Call the allocation method of the superclass. */
1217 ret = ((struct elf32_arm_link_hash_entry *)
1218 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
1219 table, string));
57e8b36a 1220 if (ret != NULL)
b7693d02
DJ
1221 {
1222 ret->relocs_copied = NULL;
1223 ret->plt_thumb_refcount = 0;
1224 ret->plt_got_offset = -1;
1225 }
780a67af
NC
1226
1227 return (struct bfd_hash_entry *) ret;
1228}
1229
5e681ec4
PB
1230/* Create .got, .gotplt, and .rel.got sections in DYNOBJ, and set up
1231 shortcuts to them in our hash table. */
1232
1233static bfd_boolean
57e8b36a 1234create_got_section (bfd *dynobj, struct bfd_link_info *info)
5e681ec4
PB
1235{
1236 struct elf32_arm_link_hash_table *htab;
1237
e5a52504
MM
1238 htab = elf32_arm_hash_table (info);
1239 /* BPABI objects never have a GOT, or associated sections. */
1240 if (htab->symbian_p)
1241 return TRUE;
1242
5e681ec4
PB
1243 if (! _bfd_elf_create_got_section (dynobj, info))
1244 return FALSE;
1245
5e681ec4
PB
1246 htab->sgot = bfd_get_section_by_name (dynobj, ".got");
1247 htab->sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
1248 if (!htab->sgot || !htab->sgotplt)
1249 abort ();
1250
1251 htab->srelgot = bfd_make_section (dynobj, ".rel.got");
1252 if (htab->srelgot == NULL
1253 || ! bfd_set_section_flags (dynobj, htab->srelgot,
1254 (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
1255 | SEC_IN_MEMORY | SEC_LINKER_CREATED
1256 | SEC_READONLY))
1257 || ! bfd_set_section_alignment (dynobj, htab->srelgot, 2))
1258 return FALSE;
1259 return TRUE;
1260}
1261
1262/* Create .plt, .rel.plt, .got, .got.plt, .rel.got, .dynbss, and
1263 .rel.bss sections in DYNOBJ, and set up shortcuts to them in our
1264 hash table. */
1265
1266static bfd_boolean
57e8b36a 1267elf32_arm_create_dynamic_sections (bfd *dynobj, struct bfd_link_info *info)
5e681ec4
PB
1268{
1269 struct elf32_arm_link_hash_table *htab;
1270
1271 htab = elf32_arm_hash_table (info);
1272 if (!htab->sgot && !create_got_section (dynobj, info))
1273 return FALSE;
1274
1275 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
1276 return FALSE;
1277
1278 htab->splt = bfd_get_section_by_name (dynobj, ".plt");
1279 htab->srelplt = bfd_get_section_by_name (dynobj, ".rel.plt");
1280 htab->sdynbss = bfd_get_section_by_name (dynobj, ".dynbss");
1281 if (!info->shared)
1282 htab->srelbss = bfd_get_section_by_name (dynobj, ".rel.bss");
1283
e5a52504
MM
1284 if (!htab->splt
1285 || !htab->srelplt
1286 || !htab->sdynbss
5e681ec4
PB
1287 || (!info->shared && !htab->srelbss))
1288 abort ();
1289
1290 return TRUE;
1291}
1292
1293/* Copy the extra info we tack onto an elf_link_hash_entry. */
1294
1295static void
1296elf32_arm_copy_indirect_symbol (const struct elf_backend_data *bed,
1297 struct elf_link_hash_entry *dir,
1298 struct elf_link_hash_entry *ind)
1299{
1300 struct elf32_arm_link_hash_entry *edir, *eind;
1301
1302 edir = (struct elf32_arm_link_hash_entry *) dir;
1303 eind = (struct elf32_arm_link_hash_entry *) ind;
1304
1305 if (eind->relocs_copied != NULL)
1306 {
1307 if (edir->relocs_copied != NULL)
1308 {
1309 struct elf32_arm_relocs_copied **pp;
1310 struct elf32_arm_relocs_copied *p;
1311
1312 if (ind->root.type == bfd_link_hash_indirect)
1313 abort ();
1314
1315 /* Add reloc counts against the weak sym to the strong sym
1316 list. Merge any entries against the same section. */
1317 for (pp = &eind->relocs_copied; (p = *pp) != NULL; )
1318 {
1319 struct elf32_arm_relocs_copied *q;
1320
1321 for (q = edir->relocs_copied; q != NULL; q = q->next)
1322 if (q->section == p->section)
1323 {
5e681ec4
PB
1324 q->count += p->count;
1325 *pp = p->next;
1326 break;
1327 }
1328 if (q == NULL)
1329 pp = &p->next;
1330 }
1331 *pp = edir->relocs_copied;
1332 }
1333
1334 edir->relocs_copied = eind->relocs_copied;
1335 eind->relocs_copied = NULL;
1336 }
1337
b7693d02
DJ
1338 /* If the direct symbol already has an associated PLT entry, the
1339 indirect symbol should not. If it doesn't, swap refcount information
1340 from the indirect symbol. */
1341 if (edir->plt_thumb_refcount == 0)
1342 {
1343 edir->plt_thumb_refcount = eind->plt_thumb_refcount;
1344 eind->plt_thumb_refcount = 0;
1345 }
1346 else
1347 BFD_ASSERT (eind->plt_thumb_refcount == 0);
1348
5e681ec4
PB
1349 _bfd_elf_link_hash_copy_indirect (bed, dir, ind);
1350}
1351
9b485d32 1352/* Create an ARM elf linker hash table. */
252b5132
RH
1353
1354static struct bfd_link_hash_table *
57e8b36a 1355elf32_arm_link_hash_table_create (bfd *abfd)
252b5132
RH
1356{
1357 struct elf32_arm_link_hash_table *ret;
dc810e39 1358 bfd_size_type amt = sizeof (struct elf32_arm_link_hash_table);
252b5132 1359
57e8b36a
NC
1360 ret = bfd_malloc (amt);
1361 if (ret == NULL)
252b5132
RH
1362 return NULL;
1363
57e8b36a 1364 if (!_bfd_elf_link_hash_table_init (& ret->root, abfd,
780a67af 1365 elf32_arm_link_hash_newfunc))
252b5132 1366 {
e2d34d7d 1367 free (ret);
252b5132
RH
1368 return NULL;
1369 }
1370
5e681ec4
PB
1371 ret->sgot = NULL;
1372 ret->sgotplt = NULL;
1373 ret->srelgot = NULL;
1374 ret->splt = NULL;
1375 ret->srelplt = NULL;
1376 ret->sdynbss = NULL;
1377 ret->srelbss = NULL;
252b5132
RH
1378 ret->thumb_glue_size = 0;
1379 ret->arm_glue_size = 0;
1380 ret->bfd_of_glue_owner = NULL;
e489d0ae 1381 ret->byteswap_code = 0;
9c504268 1382 ret->target1_is_rel = 0;
eb043451 1383 ret->target2_reloc = R_ARM_NONE;
e5a52504
MM
1384#ifdef FOUR_WORD_PLT
1385 ret->plt_header_size = 16;
1386 ret->plt_entry_size = 16;
1387#else
1388 ret->plt_header_size = 20;
1389 ret->plt_entry_size = 12;
1390#endif
1391 ret->symbian_p = 0;
4e7fd91e 1392 ret->use_rel = 1;
5e681ec4 1393 ret->sym_sec.abfd = NULL;
b7693d02 1394 ret->obfd = abfd;
252b5132
RH
1395
1396 return &ret->root.root;
1397}
1398
9b485d32
NC
1399/* Locate the Thumb encoded calling stub for NAME. */
1400
252b5132 1401static struct elf_link_hash_entry *
57e8b36a
NC
1402find_thumb_glue (struct bfd_link_info *link_info,
1403 const char *name,
1404 bfd *input_bfd)
252b5132
RH
1405{
1406 char *tmp_name;
1407 struct elf_link_hash_entry *hash;
1408 struct elf32_arm_link_hash_table *hash_table;
1409
1410 /* We need a pointer to the armelf specific hash table. */
1411 hash_table = elf32_arm_hash_table (link_info);
1412
57e8b36a
NC
1413 tmp_name = bfd_malloc ((bfd_size_type) strlen (name)
1414 + strlen (THUMB2ARM_GLUE_ENTRY_NAME) + 1);
252b5132
RH
1415
1416 BFD_ASSERT (tmp_name);
1417
1418 sprintf (tmp_name, THUMB2ARM_GLUE_ENTRY_NAME, name);
1419
1420 hash = elf_link_hash_lookup
b34976b6 1421 (&(hash_table)->root, tmp_name, FALSE, FALSE, TRUE);
252b5132
RH
1422
1423 if (hash == NULL)
1424 /* xgettext:c-format */
d003868e
AM
1425 (*_bfd_error_handler) (_("%B: unable to find THUMB glue '%s' for `%s'"),
1426 input_bfd, tmp_name, name);
252b5132
RH
1427
1428 free (tmp_name);
1429
1430 return hash;
1431}
1432
9b485d32
NC
1433/* Locate the ARM encoded calling stub for NAME. */
1434
252b5132 1435static struct elf_link_hash_entry *
57e8b36a
NC
1436find_arm_glue (struct bfd_link_info *link_info,
1437 const char *name,
1438 bfd *input_bfd)
252b5132
RH
1439{
1440 char *tmp_name;
1441 struct elf_link_hash_entry *myh;
1442 struct elf32_arm_link_hash_table *hash_table;
1443
1444 /* We need a pointer to the elfarm specific hash table. */
1445 hash_table = elf32_arm_hash_table (link_info);
1446
57e8b36a
NC
1447 tmp_name = bfd_malloc ((bfd_size_type) strlen (name)
1448 + strlen (ARM2THUMB_GLUE_ENTRY_NAME) + 1);
252b5132
RH
1449
1450 BFD_ASSERT (tmp_name);
1451
1452 sprintf (tmp_name, ARM2THUMB_GLUE_ENTRY_NAME, name);
1453
1454 myh = elf_link_hash_lookup
b34976b6 1455 (&(hash_table)->root, tmp_name, FALSE, FALSE, TRUE);
252b5132
RH
1456
1457 if (myh == NULL)
1458 /* xgettext:c-format */
d003868e
AM
1459 (*_bfd_error_handler) (_("%B: unable to find ARM glue '%s' for `%s'"),
1460 input_bfd, tmp_name, name);
252b5132
RH
1461
1462 free (tmp_name);
1463
1464 return myh;
1465}
1466
9b485d32 1467/* ARM->Thumb glue:
252b5132
RH
1468
1469 .arm
1470 __func_from_arm:
1471 ldr r12, __func_addr
1472 bx r12
1473 __func_addr:
9b485d32 1474 .word func @ behave as if you saw a ARM_32 reloc. */
252b5132
RH
1475
1476#define ARM2THUMB_GLUE_SIZE 12
1477static const insn32 a2t1_ldr_insn = 0xe59fc000;
1478static const insn32 a2t2_bx_r12_insn = 0xe12fff1c;
1479static const insn32 a2t3_func_addr_insn = 0x00000001;
1480
9b485d32 1481/* Thumb->ARM: Thumb->(non-interworking aware) ARM
252b5132
RH
1482
1483 .thumb .thumb
1484 .align 2 .align 2
1485 __func_from_thumb: __func_from_thumb:
1486 bx pc push {r6, lr}
1487 nop ldr r6, __func_addr
1488 .arm mov lr, pc
1489 __func_change_to_arm: bx r6
1490 b func .arm
1491 __func_back_to_thumb:
1492 ldmia r13! {r6, lr}
1493 bx lr
1494 __func_addr:
9b485d32 1495 .word func */
252b5132
RH
1496
1497#define THUMB2ARM_GLUE_SIZE 8
1498static const insn16 t2a1_bx_pc_insn = 0x4778;
1499static const insn16 t2a2_noop_insn = 0x46c0;
1500static const insn32 t2a3_b_insn = 0xea000000;
1501
7e392df6 1502#ifndef ELFARM_NABI_C_INCLUDED
b34976b6 1503bfd_boolean
57e8b36a 1504bfd_elf32_arm_allocate_interworking_sections (struct bfd_link_info * info)
252b5132
RH
1505{
1506 asection * s;
1507 bfd_byte * foo;
1508 struct elf32_arm_link_hash_table * globals;
1509
1510 globals = elf32_arm_hash_table (info);
1511
1512 BFD_ASSERT (globals != NULL);
1513
1514 if (globals->arm_glue_size != 0)
1515 {
1516 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
1517
dc810e39
AM
1518 s = bfd_get_section_by_name (globals->bfd_of_glue_owner,
1519 ARM2THUMB_GLUE_SECTION_NAME);
252b5132
RH
1520
1521 BFD_ASSERT (s != NULL);
1522
57e8b36a 1523 foo = bfd_alloc (globals->bfd_of_glue_owner, globals->arm_glue_size);
252b5132 1524
eea6121a 1525 s->size = globals->arm_glue_size;
252b5132
RH
1526 s->contents = foo;
1527 }
1528
1529 if (globals->thumb_glue_size != 0)
1530 {
1531 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
1532
1533 s = bfd_get_section_by_name
1534 (globals->bfd_of_glue_owner, THUMB2ARM_GLUE_SECTION_NAME);
1535
1536 BFD_ASSERT (s != NULL);
1537
57e8b36a 1538 foo = bfd_alloc (globals->bfd_of_glue_owner, globals->thumb_glue_size);
252b5132 1539
eea6121a 1540 s->size = globals->thumb_glue_size;
252b5132
RH
1541 s->contents = foo;
1542 }
1543
b34976b6 1544 return TRUE;
252b5132
RH
1545}
1546
1547static void
57e8b36a
NC
1548record_arm_to_thumb_glue (struct bfd_link_info * link_info,
1549 struct elf_link_hash_entry * h)
252b5132
RH
1550{
1551 const char * name = h->root.root.string;
63b0f745 1552 asection * s;
252b5132
RH
1553 char * tmp_name;
1554 struct elf_link_hash_entry * myh;
14a793b2 1555 struct bfd_link_hash_entry * bh;
252b5132 1556 struct elf32_arm_link_hash_table * globals;
dc810e39 1557 bfd_vma val;
252b5132
RH
1558
1559 globals = elf32_arm_hash_table (link_info);
1560
1561 BFD_ASSERT (globals != NULL);
1562 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
1563
1564 s = bfd_get_section_by_name
1565 (globals->bfd_of_glue_owner, ARM2THUMB_GLUE_SECTION_NAME);
1566
252b5132
RH
1567 BFD_ASSERT (s != NULL);
1568
57e8b36a 1569 tmp_name = bfd_malloc ((bfd_size_type) strlen (name) + strlen (ARM2THUMB_GLUE_ENTRY_NAME) + 1);
252b5132
RH
1570
1571 BFD_ASSERT (tmp_name);
1572
1573 sprintf (tmp_name, ARM2THUMB_GLUE_ENTRY_NAME, name);
1574
1575 myh = elf_link_hash_lookup
b34976b6 1576 (&(globals)->root, tmp_name, FALSE, FALSE, TRUE);
252b5132
RH
1577
1578 if (myh != NULL)
1579 {
9b485d32 1580 /* We've already seen this guy. */
252b5132 1581 free (tmp_name);
9b485d32 1582 return;
252b5132
RH
1583 }
1584
57e8b36a
NC
1585 /* The only trick here is using hash_table->arm_glue_size as the value.
1586 Even though the section isn't allocated yet, this is where we will be
1587 putting it. */
14a793b2 1588 bh = NULL;
dc810e39
AM
1589 val = globals->arm_glue_size + 1;
1590 _bfd_generic_link_add_one_symbol (link_info, globals->bfd_of_glue_owner,
1591 tmp_name, BSF_GLOBAL, s, val,
b34976b6 1592 NULL, TRUE, FALSE, &bh);
252b5132 1593
b7693d02
DJ
1594 myh = (struct elf_link_hash_entry *) bh;
1595 myh->type = ELF_ST_INFO (STB_LOCAL, STT_FUNC);
1596 myh->forced_local = 1;
1597
252b5132
RH
1598 free (tmp_name);
1599
1600 globals->arm_glue_size += ARM2THUMB_GLUE_SIZE;
1601
1602 return;
1603}
1604
1605static void
57e8b36a
NC
1606record_thumb_to_arm_glue (struct bfd_link_info *link_info,
1607 struct elf_link_hash_entry *h)
252b5132
RH
1608{
1609 const char *name = h->root.root.string;
63b0f745 1610 asection *s;
252b5132
RH
1611 char *tmp_name;
1612 struct elf_link_hash_entry *myh;
14a793b2 1613 struct bfd_link_hash_entry *bh;
252b5132 1614 struct elf32_arm_link_hash_table *hash_table;
dc810e39 1615 bfd_vma val;
252b5132
RH
1616
1617 hash_table = elf32_arm_hash_table (link_info);
1618
1619 BFD_ASSERT (hash_table != NULL);
1620 BFD_ASSERT (hash_table->bfd_of_glue_owner != NULL);
1621
1622 s = bfd_get_section_by_name
1623 (hash_table->bfd_of_glue_owner, THUMB2ARM_GLUE_SECTION_NAME);
1624
1625 BFD_ASSERT (s != NULL);
1626
57e8b36a
NC
1627 tmp_name = bfd_malloc ((bfd_size_type) strlen (name)
1628 + strlen (THUMB2ARM_GLUE_ENTRY_NAME) + 1);
252b5132
RH
1629
1630 BFD_ASSERT (tmp_name);
1631
1632 sprintf (tmp_name, THUMB2ARM_GLUE_ENTRY_NAME, name);
1633
1634 myh = elf_link_hash_lookup
b34976b6 1635 (&(hash_table)->root, tmp_name, FALSE, FALSE, TRUE);
252b5132
RH
1636
1637 if (myh != NULL)
1638 {
9b485d32 1639 /* We've already seen this guy. */
252b5132 1640 free (tmp_name);
9b485d32 1641 return;
252b5132
RH
1642 }
1643
14a793b2 1644 bh = NULL;
dc810e39
AM
1645 val = hash_table->thumb_glue_size + 1;
1646 _bfd_generic_link_add_one_symbol (link_info, hash_table->bfd_of_glue_owner,
1647 tmp_name, BSF_GLOBAL, s, val,
b34976b6 1648 NULL, TRUE, FALSE, &bh);
252b5132 1649
9b485d32 1650 /* If we mark it 'Thumb', the disassembler will do a better job. */
14a793b2 1651 myh = (struct elf_link_hash_entry *) bh;
b7693d02
DJ
1652 myh->type = ELF_ST_INFO (STB_LOCAL, STT_ARM_TFUNC);
1653 myh->forced_local = 1;
252b5132
RH
1654
1655 free (tmp_name);
1656
252b5132
RH
1657#define CHANGE_TO_ARM "__%s_change_to_arm"
1658#define BACK_FROM_ARM "__%s_back_from_arm"
1659
9b485d32 1660 /* Allocate another symbol to mark where we switch to Arm mode. */
57e8b36a
NC
1661 tmp_name = bfd_malloc ((bfd_size_type) strlen (name)
1662 + strlen (CHANGE_TO_ARM) + 1);
252b5132
RH
1663
1664 BFD_ASSERT (tmp_name);
1665
1666 sprintf (tmp_name, CHANGE_TO_ARM, name);
1667
14a793b2 1668 bh = NULL;
dc810e39
AM
1669 val = hash_table->thumb_glue_size + 4,
1670 _bfd_generic_link_add_one_symbol (link_info, hash_table->bfd_of_glue_owner,
1671 tmp_name, BSF_LOCAL, s, val,
b34976b6 1672 NULL, TRUE, FALSE, &bh);
252b5132
RH
1673
1674 free (tmp_name);
1675
1676 hash_table->thumb_glue_size += THUMB2ARM_GLUE_SIZE;
1677
1678 return;
1679}
1680
8afb0e02
NC
1681/* Add the glue sections to ABFD. This function is called from the
1682 linker scripts in ld/emultempl/{armelf}.em. */
9b485d32 1683
b34976b6 1684bfd_boolean
57e8b36a
NC
1685bfd_elf32_arm_add_glue_sections_to_bfd (bfd *abfd,
1686 struct bfd_link_info *info)
252b5132 1687{
252b5132
RH
1688 flagword flags;
1689 asection *sec;
1690
8afb0e02
NC
1691 /* If we are only performing a partial
1692 link do not bother adding the glue. */
1049f94e 1693 if (info->relocatable)
b34976b6 1694 return TRUE;
252b5132 1695
252b5132
RH
1696 sec = bfd_get_section_by_name (abfd, ARM2THUMB_GLUE_SECTION_NAME);
1697
1698 if (sec == NULL)
1699 {
57db232e
NC
1700 /* Note: we do not include the flag SEC_LINKER_CREATED, as this
1701 will prevent elf_link_input_bfd() from processing the contents
1702 of this section. */
811b4bf6 1703 flags = SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_CODE | SEC_READONLY;
252b5132
RH
1704
1705 sec = bfd_make_section (abfd, ARM2THUMB_GLUE_SECTION_NAME);
1706
1707 if (sec == NULL
1708 || !bfd_set_section_flags (abfd, sec, flags)
1709 || !bfd_set_section_alignment (abfd, sec, 2))
b34976b6 1710 return FALSE;
9a5aca8c 1711
57db232e
NC
1712 /* Set the gc mark to prevent the section from being removed by garbage
1713 collection, despite the fact that no relocs refer to this section. */
1714 sec->gc_mark = 1;
252b5132
RH
1715 }
1716
1717 sec = bfd_get_section_by_name (abfd, THUMB2ARM_GLUE_SECTION_NAME);
1718
1719 if (sec == NULL)
1720 {
57e8b36a
NC
1721 flags = SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1722 | SEC_CODE | SEC_READONLY;
252b5132
RH
1723
1724 sec = bfd_make_section (abfd, THUMB2ARM_GLUE_SECTION_NAME);
1725
1726 if (sec == NULL
1727 || !bfd_set_section_flags (abfd, sec, flags)
1728 || !bfd_set_section_alignment (abfd, sec, 2))
b34976b6 1729 return FALSE;
9a5aca8c 1730
57db232e 1731 sec->gc_mark = 1;
252b5132
RH
1732 }
1733
b34976b6 1734 return TRUE;
8afb0e02
NC
1735}
1736
1737/* Select a BFD to be used to hold the sections used by the glue code.
1738 This function is called from the linker scripts in ld/emultempl/
1739 {armelf/pe}.em */
1740
b34976b6 1741bfd_boolean
57e8b36a 1742bfd_elf32_arm_get_bfd_for_interworking (bfd *abfd, struct bfd_link_info *info)
8afb0e02
NC
1743{
1744 struct elf32_arm_link_hash_table *globals;
1745
1746 /* If we are only performing a partial link
1747 do not bother getting a bfd to hold the glue. */
1049f94e 1748 if (info->relocatable)
b34976b6 1749 return TRUE;
8afb0e02 1750
b7693d02
DJ
1751 /* Make sure we don't attach the glue sections to a dynamic object. */
1752 BFD_ASSERT (!(abfd->flags & DYNAMIC));
1753
8afb0e02
NC
1754 globals = elf32_arm_hash_table (info);
1755
1756 BFD_ASSERT (globals != NULL);
1757
1758 if (globals->bfd_of_glue_owner != NULL)
b34976b6 1759 return TRUE;
8afb0e02 1760
252b5132
RH
1761 /* Save the bfd for later use. */
1762 globals->bfd_of_glue_owner = abfd;
cedb70c5 1763
b34976b6 1764 return TRUE;
252b5132
RH
1765}
1766
b34976b6 1767bfd_boolean
57e8b36a
NC
1768bfd_elf32_arm_process_before_allocation (bfd *abfd,
1769 struct bfd_link_info *link_info,
eb043451 1770 int byteswap_code)
252b5132
RH
1771{
1772 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 1773 Elf_Internal_Rela *internal_relocs = NULL;
252b5132
RH
1774 Elf_Internal_Rela *irel, *irelend;
1775 bfd_byte *contents = NULL;
252b5132
RH
1776
1777 asection *sec;
1778 struct elf32_arm_link_hash_table *globals;
1779
1780 /* If we are only performing a partial link do not bother
1781 to construct any glue. */
1049f94e 1782 if (link_info->relocatable)
b34976b6 1783 return TRUE;
252b5132
RH
1784
1785 /* Here we have a bfd that is to be included on the link. We have a hook
1786 to do reloc rummaging, before section sizes are nailed down. */
252b5132
RH
1787 globals = elf32_arm_hash_table (link_info);
1788
1789 BFD_ASSERT (globals != NULL);
1790 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
1791
e489d0ae
PB
1792 if (byteswap_code && !bfd_big_endian (abfd))
1793 {
d003868e
AM
1794 _bfd_error_handler (_("%B: BE8 images only valid in big-endian mode."),
1795 abfd);
e489d0ae
PB
1796 return FALSE;
1797 }
1798 globals->byteswap_code = byteswap_code;
f21f3fe0 1799
252b5132
RH
1800 /* Rummage around all the relocs and map the glue vectors. */
1801 sec = abfd->sections;
1802
1803 if (sec == NULL)
b34976b6 1804 return TRUE;
252b5132
RH
1805
1806 for (; sec != NULL; sec = sec->next)
1807 {
1808 if (sec->reloc_count == 0)
1809 continue;
1810
1811 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
252b5132 1812
9b485d32 1813 /* Load the relocs. */
6cdc0ccc 1814 internal_relocs
57e8b36a 1815 = _bfd_elf_link_read_relocs (abfd, sec, (void *) NULL,
45d6a902 1816 (Elf_Internal_Rela *) NULL, FALSE);
252b5132 1817
6cdc0ccc
AM
1818 if (internal_relocs == NULL)
1819 goto error_return;
252b5132 1820
6cdc0ccc
AM
1821 irelend = internal_relocs + sec->reloc_count;
1822 for (irel = internal_relocs; irel < irelend; irel++)
252b5132
RH
1823 {
1824 long r_type;
1825 unsigned long r_index;
252b5132
RH
1826
1827 struct elf_link_hash_entry *h;
1828
1829 r_type = ELF32_R_TYPE (irel->r_info);
1830 r_index = ELF32_R_SYM (irel->r_info);
1831
9b485d32 1832 /* These are the only relocation types we care about. */
ba96a88f 1833 if ( r_type != R_ARM_PC24
b7693d02 1834 && r_type != R_ARM_PLT32
5b5bb741
PB
1835#ifndef OLD_ARM_ABI
1836 && r_type != R_ARM_CALL
1837 && r_type != R_ARM_JUMP24
1838#endif
252b5132
RH
1839 && r_type != R_ARM_THM_PC22)
1840 continue;
1841
1842 /* Get the section contents if we haven't done so already. */
1843 if (contents == NULL)
1844 {
1845 /* Get cached copy if it exists. */
1846 if (elf_section_data (sec)->this_hdr.contents != NULL)
1847 contents = elf_section_data (sec)->this_hdr.contents;
1848 else
1849 {
1850 /* Go get them off disk. */
57e8b36a 1851 if (! bfd_malloc_and_get_section (abfd, sec, &contents))
252b5132
RH
1852 goto error_return;
1853 }
1854 }
1855
a7c10850 1856 /* If the relocation is not against a symbol it cannot concern us. */
252b5132
RH
1857 h = NULL;
1858
9b485d32 1859 /* We don't care about local symbols. */
252b5132
RH
1860 if (r_index < symtab_hdr->sh_info)
1861 continue;
1862
9b485d32 1863 /* This is an external symbol. */
252b5132
RH
1864 r_index -= symtab_hdr->sh_info;
1865 h = (struct elf_link_hash_entry *)
1866 elf_sym_hashes (abfd)[r_index];
1867
1868 /* If the relocation is against a static symbol it must be within
1869 the current section and so cannot be a cross ARM/Thumb relocation. */
1870 if (h == NULL)
1871 continue;
1872
b7693d02
DJ
1873 /* If the call will go through a PLT entry then we do not need
1874 glue. */
1875 if (globals->splt != NULL && h->plt.offset != (bfd_vma) -1)
1876 continue;
1877
252b5132
RH
1878 switch (r_type)
1879 {
1880 case R_ARM_PC24:
5b5bb741
PB
1881#ifndef OLD_ARM_ABI
1882 case R_ARM_CALL:
1883 case R_ARM_JUMP24:
1884#endif
252b5132 1885 /* This one is a call from arm code. We need to look up
2f0ca46a 1886 the target of the call. If it is a thumb target, we
252b5132 1887 insert glue. */
252b5132
RH
1888 if (ELF_ST_TYPE(h->type) == STT_ARM_TFUNC)
1889 record_arm_to_thumb_glue (link_info, h);
1890 break;
1891
1892 case R_ARM_THM_PC22:
f21f3fe0 1893 /* This one is a call from thumb code. We look
2f0ca46a 1894 up the target of the call. If it is not a thumb
bcbdc74c 1895 target, we insert glue. */
252b5132
RH
1896 if (ELF_ST_TYPE (h->type) != STT_ARM_TFUNC)
1897 record_thumb_to_arm_glue (link_info, h);
1898 break;
1899
1900 default:
1901 break;
1902 }
1903 }
6cdc0ccc
AM
1904
1905 if (contents != NULL
1906 && elf_section_data (sec)->this_hdr.contents != contents)
1907 free (contents);
1908 contents = NULL;
1909
1910 if (internal_relocs != NULL
1911 && elf_section_data (sec)->relocs != internal_relocs)
1912 free (internal_relocs);
1913 internal_relocs = NULL;
252b5132
RH
1914 }
1915
b34976b6 1916 return TRUE;
9a5aca8c 1917
252b5132 1918error_return:
6cdc0ccc
AM
1919 if (contents != NULL
1920 && elf_section_data (sec)->this_hdr.contents != contents)
1921 free (contents);
1922 if (internal_relocs != NULL
1923 && elf_section_data (sec)->relocs != internal_relocs)
1924 free (internal_relocs);
9a5aca8c 1925
b34976b6 1926 return FALSE;
252b5132 1927}
7e392df6 1928#endif
252b5132 1929
eb043451
PB
1930
1931#ifndef OLD_ARM_ABI
1932/* Set target relocation values needed during linking. */
1933
1934void
1935bfd_elf32_arm_set_target_relocs (struct bfd_link_info *link_info,
1936 int target1_is_rel,
319850b4
JB
1937 char * target2_type,
1938 int fix_v4bx)
eb043451
PB
1939{
1940 struct elf32_arm_link_hash_table *globals;
1941
1942 globals = elf32_arm_hash_table (link_info);
1943
1944 globals->target1_is_rel = target1_is_rel;
1945 if (strcmp (target2_type, "rel") == 0)
1946 globals->target2_reloc = R_ARM_REL32;
eeac373a
PB
1947 else if (strcmp (target2_type, "abs") == 0)
1948 globals->target2_reloc = R_ARM_ABS32;
eb043451
PB
1949 else if (strcmp (target2_type, "got-rel") == 0)
1950 globals->target2_reloc = R_ARM_GOT_PREL;
1951 else
1952 {
1953 _bfd_error_handler (_("Invalid TARGET2 relocation type '%s'."),
1954 target2_type);
1955 }
319850b4 1956 globals->fix_v4bx = fix_v4bx;
eb043451
PB
1957}
1958#endif
1959
252b5132
RH
1960/* The thumb form of a long branch is a bit finicky, because the offset
1961 encoding is split over two fields, each in it's own instruction. They
f21f3fe0 1962 can occur in any order. So given a thumb form of long branch, and an
252b5132 1963 offset, insert the offset into the thumb branch and return finished
f21f3fe0 1964 instruction.
252b5132 1965
f21f3fe0 1966 It takes two thumb instructions to encode the target address. Each has
4cc11e76 1967 11 bits to invest. The upper 11 bits are stored in one (identified by
f21f3fe0
UD
1968 H-0.. see below), the lower 11 bits are stored in the other (identified
1969 by H-1).
252b5132 1970
f21f3fe0 1971 Combine together and shifted left by 1 (it's a half word address) and
252b5132
RH
1972 there you have it.
1973
1974 Op: 1111 = F,
1975 H-0, upper address-0 = 000
1976 Op: 1111 = F,
1977 H-1, lower address-0 = 800
1978
f21f3fe0 1979 They can be ordered either way, but the arm tools I've seen always put
252b5132
RH
1980 the lower one first. It probably doesn't matter. krk@cygnus.com
1981
1982 XXX: Actually the order does matter. The second instruction (H-1)
1983 moves the computed address into the PC, so it must be the second one
1984 in the sequence. The problem, however is that whilst little endian code
1985 stores the instructions in HI then LOW order, big endian code does the
dfc5f959 1986 reverse. nickc@cygnus.com. */
252b5132 1987
dfc5f959
NC
1988#define LOW_HI_ORDER 0xF800F000
1989#define HI_LOW_ORDER 0xF000F800
252b5132
RH
1990
1991static insn32
57e8b36a 1992insert_thumb_branch (insn32 br_insn, int rel_off)
252b5132
RH
1993{
1994 unsigned int low_bits;
1995 unsigned int high_bits;
1996
252b5132
RH
1997 BFD_ASSERT ((rel_off & 1) != 1);
1998
dfc5f959
NC
1999 rel_off >>= 1; /* Half word aligned address. */
2000 low_bits = rel_off & 0x000007FF; /* The bottom 11 bits. */
2001 high_bits = (rel_off >> 11) & 0x000007FF; /* The top 11 bits. */
252b5132
RH
2002
2003 if ((br_insn & LOW_HI_ORDER) == LOW_HI_ORDER)
2004 br_insn = LOW_HI_ORDER | (low_bits << 16) | high_bits;
2005 else if ((br_insn & HI_LOW_ORDER) == HI_LOW_ORDER)
2006 br_insn = HI_LOW_ORDER | (high_bits << 16) | low_bits;
2007 else
9b485d32 2008 /* FIXME: abort is probably not the right call. krk@cygnus.com */
57e8b36a 2009 abort (); /* Error - not a valid branch instruction form. */
252b5132 2010
252b5132
RH
2011 return br_insn;
2012}
2013
9b485d32
NC
2014/* Thumb code calling an ARM function. */
2015
252b5132 2016static int
57e8b36a
NC
2017elf32_thumb_to_arm_stub (struct bfd_link_info * info,
2018 const char * name,
2019 bfd * input_bfd,
2020 bfd * output_bfd,
2021 asection * input_section,
2022 bfd_byte * hit_data,
2023 asection * sym_sec,
2024 bfd_vma offset,
2025 bfd_signed_vma addend,
2026 bfd_vma val)
252b5132 2027{
bcbdc74c 2028 asection * s = 0;
dc810e39 2029 bfd_vma my_offset;
252b5132
RH
2030 unsigned long int tmp;
2031 long int ret_offset;
bcbdc74c
NC
2032 struct elf_link_hash_entry * myh;
2033 struct elf32_arm_link_hash_table * globals;
252b5132
RH
2034
2035 myh = find_thumb_glue (info, name, input_bfd);
2036 if (myh == NULL)
b34976b6 2037 return FALSE;
252b5132
RH
2038
2039 globals = elf32_arm_hash_table (info);
2040
2041 BFD_ASSERT (globals != NULL);
2042 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
2043
2044 my_offset = myh->root.u.def.value;
2045
2046 s = bfd_get_section_by_name (globals->bfd_of_glue_owner,
2047 THUMB2ARM_GLUE_SECTION_NAME);
2048
2049 BFD_ASSERT (s != NULL);
2050 BFD_ASSERT (s->contents != NULL);
2051 BFD_ASSERT (s->output_section != NULL);
2052
2053 if ((my_offset & 0x01) == 0x01)
2054 {
2055 if (sym_sec != NULL
2056 && sym_sec->owner != NULL
2057 && !INTERWORK_FLAG (sym_sec->owner))
2058 {
8f615d07 2059 (*_bfd_error_handler)
d003868e
AM
2060 (_("%B(%s): warning: interworking not enabled.\n"
2061 " first occurrence: %B: thumb call to arm"),
2062 sym_sec->owner, input_bfd, name);
252b5132 2063
b34976b6 2064 return FALSE;
252b5132
RH
2065 }
2066
2067 --my_offset;
2068 myh->root.u.def.value = my_offset;
2069
dc810e39 2070 bfd_put_16 (output_bfd, (bfd_vma) t2a1_bx_pc_insn,
252b5132
RH
2071 s->contents + my_offset);
2072
dc810e39 2073 bfd_put_16 (output_bfd, (bfd_vma) t2a2_noop_insn,
252b5132
RH
2074 s->contents + my_offset + 2);
2075
2076 ret_offset =
9b485d32
NC
2077 /* Address of destination of the stub. */
2078 ((bfd_signed_vma) val)
252b5132 2079 - ((bfd_signed_vma)
57e8b36a
NC
2080 /* Offset from the start of the current section
2081 to the start of the stubs. */
9b485d32
NC
2082 (s->output_offset
2083 /* Offset of the start of this stub from the start of the stubs. */
2084 + my_offset
2085 /* Address of the start of the current section. */
2086 + s->output_section->vma)
2087 /* The branch instruction is 4 bytes into the stub. */
2088 + 4
2089 /* ARM branches work from the pc of the instruction + 8. */
2090 + 8);
252b5132
RH
2091
2092 bfd_put_32 (output_bfd,
dc810e39 2093 (bfd_vma) t2a3_b_insn | ((ret_offset >> 2) & 0x00FFFFFF),
252b5132
RH
2094 s->contents + my_offset + 4);
2095 }
2096
2097 BFD_ASSERT (my_offset <= globals->thumb_glue_size);
2098
427bfd90
NC
2099 /* Now go back and fix up the original BL insn to point to here. */
2100 ret_offset =
2101 /* Address of where the stub is located. */
2102 (s->output_section->vma + s->output_offset + my_offset)
2103 /* Address of where the BL is located. */
57e8b36a
NC
2104 - (input_section->output_section->vma + input_section->output_offset
2105 + offset)
427bfd90
NC
2106 /* Addend in the relocation. */
2107 - addend
2108 /* Biassing for PC-relative addressing. */
2109 - 8;
252b5132
RH
2110
2111 tmp = bfd_get_32 (input_bfd, hit_data
2112 - input_section->vma);
2113
2114 bfd_put_32 (output_bfd,
dc810e39 2115 (bfd_vma) insert_thumb_branch (tmp, ret_offset),
252b5132
RH
2116 hit_data - input_section->vma);
2117
b34976b6 2118 return TRUE;
252b5132
RH
2119}
2120
9b485d32
NC
2121/* Arm code calling a Thumb function. */
2122
252b5132 2123static int
57e8b36a
NC
2124elf32_arm_to_thumb_stub (struct bfd_link_info * info,
2125 const char * name,
2126 bfd * input_bfd,
2127 bfd * output_bfd,
2128 asection * input_section,
2129 bfd_byte * hit_data,
2130 asection * sym_sec,
2131 bfd_vma offset,
2132 bfd_signed_vma addend,
2133 bfd_vma val)
252b5132
RH
2134{
2135 unsigned long int tmp;
dc810e39 2136 bfd_vma my_offset;
bcbdc74c 2137 asection * s;
252b5132 2138 long int ret_offset;
bcbdc74c
NC
2139 struct elf_link_hash_entry * myh;
2140 struct elf32_arm_link_hash_table * globals;
252b5132
RH
2141
2142 myh = find_arm_glue (info, name, input_bfd);
2143 if (myh == NULL)
b34976b6 2144 return FALSE;
252b5132
RH
2145
2146 globals = elf32_arm_hash_table (info);
2147
2148 BFD_ASSERT (globals != NULL);
2149 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
2150
2151 my_offset = myh->root.u.def.value;
2152 s = bfd_get_section_by_name (globals->bfd_of_glue_owner,
2153 ARM2THUMB_GLUE_SECTION_NAME);
2154 BFD_ASSERT (s != NULL);
2155 BFD_ASSERT (s->contents != NULL);
2156 BFD_ASSERT (s->output_section != NULL);
2157
2158 if ((my_offset & 0x01) == 0x01)
2159 {
2160 if (sym_sec != NULL
2161 && sym_sec->owner != NULL
2162 && !INTERWORK_FLAG (sym_sec->owner))
2163 {
8f615d07 2164 (*_bfd_error_handler)
d003868e
AM
2165 (_("%B(%s): warning: interworking not enabled.\n"
2166 " first occurrence: %B: arm call to thumb"),
2167 sym_sec->owner, input_bfd, name);
252b5132 2168 }
9b485d32 2169
252b5132
RH
2170 --my_offset;
2171 myh->root.u.def.value = my_offset;
2172
dc810e39 2173 bfd_put_32 (output_bfd, (bfd_vma) a2t1_ldr_insn,
252b5132
RH
2174 s->contents + my_offset);
2175
dc810e39 2176 bfd_put_32 (output_bfd, (bfd_vma) a2t2_bx_r12_insn,
252b5132
RH
2177 s->contents + my_offset + 4);
2178
2179 /* It's a thumb address. Add the low order bit. */
2180 bfd_put_32 (output_bfd, val | a2t3_func_addr_insn,
2181 s->contents + my_offset + 8);
2182 }
2183
2184 BFD_ASSERT (my_offset <= globals->arm_glue_size);
2185
2186 tmp = bfd_get_32 (input_bfd, hit_data);
2187 tmp = tmp & 0xFF000000;
2188
9b485d32 2189 /* Somehow these are both 4 too far, so subtract 8. */
dc810e39
AM
2190 ret_offset = (s->output_offset
2191 + my_offset
2192 + s->output_section->vma
2193 - (input_section->output_offset
2194 + input_section->output_section->vma
2195 + offset + addend)
2196 - 8);
9a5aca8c 2197
252b5132
RH
2198 tmp = tmp | ((ret_offset >> 2) & 0x00FFFFFF);
2199
dc810e39 2200 bfd_put_32 (output_bfd, (bfd_vma) tmp, hit_data - input_section->vma);
252b5132 2201
b34976b6 2202 return TRUE;
252b5132
RH
2203}
2204
eb043451
PB
2205
2206#ifndef OLD_ARM_ABI
2207/* Some relocations map to different relocations depending on the
2208 target. Return the real relocation. */
2209static int
2210arm_real_reloc_type (struct elf32_arm_link_hash_table * globals,
2211 int r_type)
2212{
2213 switch (r_type)
2214 {
2215 case R_ARM_TARGET1:
2216 if (globals->target1_is_rel)
2217 return R_ARM_REL32;
2218 else
2219 return R_ARM_ABS32;
2220
2221 case R_ARM_TARGET2:
2222 return globals->target2_reloc;
2223
2224 default:
2225 return r_type;
2226 }
2227}
2228#endif /* OLD_ARM_ABI */
2229
2230
252b5132 2231/* Perform a relocation as part of a final link. */
9b485d32 2232
252b5132 2233static bfd_reloc_status_type
57e8b36a
NC
2234elf32_arm_final_link_relocate (reloc_howto_type * howto,
2235 bfd * input_bfd,
2236 bfd * output_bfd,
2237 asection * input_section,
2238 bfd_byte * contents,
2239 Elf_Internal_Rela * rel,
2240 bfd_vma value,
2241 struct bfd_link_info * info,
2242 asection * sym_sec,
2243 const char * sym_name,
2244 int sym_flags,
2245 struct elf_link_hash_entry * h)
252b5132
RH
2246{
2247 unsigned long r_type = howto->type;
2248 unsigned long r_symndx;
2249 bfd_byte * hit_data = contents + rel->r_offset;
2250 bfd * dynobj = NULL;
2251 Elf_Internal_Shdr * symtab_hdr;
2252 struct elf_link_hash_entry ** sym_hashes;
2253 bfd_vma * local_got_offsets;
2254 asection * sgot = NULL;
2255 asection * splt = NULL;
2256 asection * sreloc = NULL;
252b5132 2257 bfd_vma addend;
ba96a88f
NC
2258 bfd_signed_vma signed_addend;
2259 struct elf32_arm_link_hash_table * globals;
f21f3fe0 2260
9c504268
PB
2261 globals = elf32_arm_hash_table (info);
2262
2263#ifndef OLD_ARM_ABI
2264 /* Some relocation type map to different relocations depending on the
2265 target. We pick the right one here. */
eb043451
PB
2266 r_type = arm_real_reloc_type (globals, r_type);
2267 if (r_type != howto->type)
2268 howto = elf32_arm_howto_from_type (r_type);
9c504268
PB
2269#endif /* OLD_ARM_ABI */
2270
cac15327
NC
2271 /* If the start address has been set, then set the EF_ARM_HASENTRY
2272 flag. Setting this more than once is redundant, but the cost is
2273 not too high, and it keeps the code simple.
99e4ae17 2274
cac15327
NC
2275 The test is done here, rather than somewhere else, because the
2276 start address is only set just before the final link commences.
2277
2278 Note - if the user deliberately sets a start address of 0, the
2279 flag will not be set. */
2280 if (bfd_get_start_address (output_bfd) != 0)
2281 elf_elfheader (output_bfd)->e_flags |= EF_ARM_HASENTRY;
99e4ae17 2282
252b5132
RH
2283 dynobj = elf_hash_table (info)->dynobj;
2284 if (dynobj)
2285 {
2286 sgot = bfd_get_section_by_name (dynobj, ".got");
2287 splt = bfd_get_section_by_name (dynobj, ".plt");
2288 }
2289 symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr;
2290 sym_hashes = elf_sym_hashes (input_bfd);
2291 local_got_offsets = elf_local_got_offsets (input_bfd);
2292 r_symndx = ELF32_R_SYM (rel->r_info);
2293
4e7fd91e 2294 if (globals->use_rel)
ba96a88f 2295 {
4e7fd91e
PB
2296 addend = bfd_get_32 (input_bfd, hit_data) & howto->src_mask;
2297
2298 if (addend & ((howto->src_mask + 1) >> 1))
2299 {
2300 signed_addend = -1;
2301 signed_addend &= ~ howto->src_mask;
2302 signed_addend |= addend;
2303 }
2304 else
2305 signed_addend = addend;
ba96a88f
NC
2306 }
2307 else
4e7fd91e 2308 addend = signed_addend = rel->r_addend;
f21f3fe0 2309
252b5132
RH
2310 switch (r_type)
2311 {
2312 case R_ARM_NONE:
2313 return bfd_reloc_ok;
2314
2315 case R_ARM_PC24:
2316 case R_ARM_ABS32:
2317 case R_ARM_REL32:
dfc5f959 2318#ifndef OLD_ARM_ABI
5b5bb741
PB
2319 case R_ARM_CALL:
2320 case R_ARM_JUMP24:
dfc5f959 2321 case R_ARM_XPC25:
eb043451 2322 case R_ARM_PREL31:
dfc5f959 2323#endif
7359ea65 2324 case R_ARM_PLT32:
5e681ec4
PB
2325 /* r_symndx will be zero only for relocs against symbols
2326 from removed linkonce sections, or sections discarded by
2327 a linker script. */
2328 if (r_symndx == 0)
2329 return bfd_reloc_ok;
2330
7359ea65
DJ
2331 /* Handle relocations which should use the PLT entry. ABS32/REL32
2332 will use the symbol's value, which may point to a PLT entry, but we
2333 don't need to handle that here. If we created a PLT entry, all
2334 branches in this object should go to it. */
ee06dc07 2335 if ((r_type != R_ARM_ABS32 && r_type != R_ARM_REL32)
7359ea65 2336 && h != NULL
c84cd8ee 2337 && splt != NULL
7359ea65
DJ
2338 && h->plt.offset != (bfd_vma) -1)
2339 {
c84cd8ee
DJ
2340 /* If we've created a .plt section, and assigned a PLT entry to
2341 this function, it should not be known to bind locally. If
2342 it were, we would have cleared the PLT entry. */
7359ea65
DJ
2343 BFD_ASSERT (!SYMBOL_CALLS_LOCAL (info, h));
2344
2345 value = (splt->output_section->vma
2346 + splt->output_offset
2347 + h->plt.offset);
2348 return _bfd_final_link_relocate (howto, input_bfd, input_section,
2349 contents, rel->r_offset, value,
2350 (bfd_vma) 0);
2351 }
2352
252b5132 2353 /* When generating a shared object, these relocations are copied
9b485d32 2354 into the output file to be resolved at run time. */
7359ea65
DJ
2355 if (info->shared
2356 && (input_section->flags & SEC_ALLOC)
ee06dc07
PB
2357 && (r_type != R_ARM_REL32
2358 || !SYMBOL_CALLS_LOCAL (info, h))
7359ea65
DJ
2359 && (h == NULL
2360 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2361 || h->root.type != bfd_link_hash_undefweak)
2362 && r_type != R_ARM_PC24
5b5bb741
PB
2363#ifndef OLD_ARM_ABI
2364 && r_type != R_ARM_CALL
2365 && r_type != R_ARM_JUMP24
ee06dc07 2366 && r_type != R_ARM_PREL31
5b5bb741 2367#endif
7359ea65 2368 && r_type != R_ARM_PLT32)
252b5132 2369 {
947216bf
AM
2370 Elf_Internal_Rela outrel;
2371 bfd_byte *loc;
b34976b6 2372 bfd_boolean skip, relocate;
f21f3fe0 2373
252b5132
RH
2374 if (sreloc == NULL)
2375 {
2376 const char * name;
f21f3fe0 2377
252b5132
RH
2378 name = (bfd_elf_string_from_elf_section
2379 (input_bfd,
2380 elf_elfheader (input_bfd)->e_shstrndx,
2381 elf_section_data (input_section)->rel_hdr.sh_name));
2382 if (name == NULL)
2383 return bfd_reloc_notsupported;
f21f3fe0 2384
252b5132
RH
2385 BFD_ASSERT (strncmp (name, ".rel", 4) == 0
2386 && strcmp (bfd_get_section_name (input_bfd,
2387 input_section),
2388 name + 4) == 0);
f21f3fe0 2389
252b5132
RH
2390 sreloc = bfd_get_section_by_name (dynobj, name);
2391 BFD_ASSERT (sreloc != NULL);
2392 }
f21f3fe0 2393
b34976b6
AM
2394 skip = FALSE;
2395 relocate = FALSE;
f21f3fe0 2396
c629eae0
JJ
2397 outrel.r_offset =
2398 _bfd_elf_section_offset (output_bfd, info, input_section,
2399 rel->r_offset);
2400 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 2401 skip = TRUE;
0bb2d96a 2402 else if (outrel.r_offset == (bfd_vma) -2)
b34976b6 2403 skip = TRUE, relocate = TRUE;
252b5132
RH
2404 outrel.r_offset += (input_section->output_section->vma
2405 + input_section->output_offset);
f21f3fe0 2406
252b5132 2407 if (skip)
0bb2d96a 2408 memset (&outrel, 0, sizeof outrel);
5e681ec4
PB
2409 else if (h != NULL
2410 && h->dynindx != -1
7359ea65 2411 && (!info->shared
5e681ec4 2412 || !info->symbolic
f5385ebf 2413 || !h->def_regular))
5e681ec4 2414 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
252b5132
RH
2415 else
2416 {
a16385dc
MM
2417 int symbol;
2418
5e681ec4
PB
2419 /* This symbol is local, or marked to become local. */
2420 relocate = TRUE;
b7693d02
DJ
2421 if (sym_flags == STT_ARM_TFUNC)
2422 value |= 1;
a16385dc 2423 if (globals->symbian_p)
6366ff1e
MM
2424 {
2425 /* On Symbian OS, the data segment and text segement
2426 can be relocated independently. Therefore, we
2427 must indicate the segment to which this
2428 relocation is relative. The BPABI allows us to
2429 use any symbol in the right segment; we just use
2430 the section symbol as it is convenient. (We
2431 cannot use the symbol given by "h" directly as it
2432 will not appear in the dynamic symbol table.) */
2433 symbol = elf_section_data (sym_sec->output_section)->dynindx;
2434 BFD_ASSERT (symbol != 0);
2435 }
a16385dc
MM
2436 else
2437 /* On SVR4-ish systems, the dynamic loader cannot
2438 relocate the text and data segments independently,
2439 so the symbol does not matter. */
2440 symbol = 0;
2441 outrel.r_info = ELF32_R_INFO (symbol, R_ARM_RELATIVE);
252b5132 2442 }
f21f3fe0 2443
947216bf
AM
2444 loc = sreloc->contents;
2445 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rel);
2446 bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
9a5aca8c 2447
f21f3fe0 2448 /* If this reloc is against an external symbol, we do not want to
252b5132 2449 fiddle with the addend. Otherwise, we need to include the symbol
9b485d32 2450 value so that it becomes an addend for the dynamic reloc. */
252b5132
RH
2451 if (! relocate)
2452 return bfd_reloc_ok;
9a5aca8c 2453
f21f3fe0 2454 return _bfd_final_link_relocate (howto, input_bfd, input_section,
252b5132
RH
2455 contents, rel->r_offset, value,
2456 (bfd_vma) 0);
2457 }
2458 else switch (r_type)
2459 {
dfc5f959
NC
2460#ifndef OLD_ARM_ABI
2461 case R_ARM_XPC25: /* Arm BLX instruction. */
5b5bb741
PB
2462 case R_ARM_CALL:
2463 case R_ARM_JUMP24:
dfc5f959
NC
2464#endif
2465 case R_ARM_PC24: /* Arm B/BL instruction */
7359ea65 2466 case R_ARM_PLT32:
dfc5f959
NC
2467#ifndef OLD_ARM_ABI
2468 if (r_type == R_ARM_XPC25)
252b5132 2469 {
dfc5f959
NC
2470 /* Check for Arm calling Arm function. */
2471 /* FIXME: Should we translate the instruction into a BL
2472 instruction instead ? */
2473 if (sym_flags != STT_ARM_TFUNC)
d003868e
AM
2474 (*_bfd_error_handler)
2475 (_("\%B: Warning: Arm BLX instruction targets Arm function '%s'."),
2476 input_bfd,
2477 h ? h->root.root.string : "(local)");
dfc5f959
NC
2478 }
2479 else
2480#endif
2481 {
2482 /* Check for Arm calling Thumb function. */
2483 if (sym_flags == STT_ARM_TFUNC)
2484 {
57e8b36a
NC
2485 elf32_arm_to_thumb_stub (info, sym_name, input_bfd,
2486 output_bfd, input_section,
2487 hit_data, sym_sec, rel->r_offset,
dfc5f959
NC
2488 signed_addend, value);
2489 return bfd_reloc_ok;
2490 }
252b5132 2491 }
ba96a88f 2492
dea514f5
PB
2493 /* The ARM ELF ABI says that this reloc is computed as: S - P + A
2494 where:
2495 S is the address of the symbol in the relocation.
2496 P is address of the instruction being relocated.
2497 A is the addend (extracted from the instruction) in bytes.
2498
2499 S is held in 'value'.
2500 P is the base address of the section containing the
2501 instruction plus the offset of the reloc into that
2502 section, ie:
2503 (input_section->output_section->vma +
2504 input_section->output_offset +
2505 rel->r_offset).
2506 A is the addend, converted into bytes, ie:
2507 (signed_addend * 4)
2508
2509 Note: None of these operations have knowledge of the pipeline
2510 size of the processor, thus it is up to the assembler to
2511 encode this information into the addend. */
2512 value -= (input_section->output_section->vma
2513 + input_section->output_offset);
2514 value -= rel->r_offset;
4e7fd91e
PB
2515 if (globals->use_rel)
2516 value += (signed_addend << howto->size);
2517 else
2518 /* RELA addends do not have to be adjusted by howto->size. */
2519 value += signed_addend;
23080146 2520
dcb5e6e6
NC
2521 signed_addend = value;
2522 signed_addend >>= howto->rightshift;
9a5aca8c 2523
59f2c4e7
NC
2524 /* It is not an error for an undefined weak reference to be
2525 out of range. Any program that branches to such a symbol
9a5aca8c
AM
2526 is going to crash anyway, so there is no point worrying
2527 about getting the destination exactly right. */
59f2c4e7
NC
2528 if (! h || h->root.type != bfd_link_hash_undefweak)
2529 {
9b485d32 2530 /* Perform a signed range check. */
dcb5e6e6 2531 if ( signed_addend > ((bfd_signed_vma) (howto->dst_mask >> 1))
59f2c4e7
NC
2532 || signed_addend < - ((bfd_signed_vma) ((howto->dst_mask + 1) >> 1)))
2533 return bfd_reloc_overflow;
2534 }
9a5aca8c 2535
dcb5e6e6
NC
2536#ifndef OLD_ARM_ABI
2537 /* If necessary set the H bit in the BLX instruction. */
2538 if (r_type == R_ARM_XPC25 && ((value & 2) == 2))
2539 value = (signed_addend & howto->dst_mask)
2540 | (bfd_get_32 (input_bfd, hit_data) & (~ howto->dst_mask))
2541 | (1 << 24);
2542 else
2543#endif
2544 value = (signed_addend & howto->dst_mask)
2545 | (bfd_get_32 (input_bfd, hit_data) & (~ howto->dst_mask));
252b5132 2546 break;
f21f3fe0 2547
252b5132
RH
2548 case R_ARM_ABS32:
2549 value += addend;
2550 if (sym_flags == STT_ARM_TFUNC)
2551 value |= 1;
2552 break;
f21f3fe0 2553
252b5132
RH
2554 case R_ARM_REL32:
2555 value -= (input_section->output_section->vma
62efb346 2556 + input_section->output_offset + rel->r_offset);
252b5132
RH
2557 value += addend;
2558 break;
eb043451
PB
2559
2560#ifndef OLD_ARM_ABI
2561 case R_ARM_PREL31:
2562 value -= (input_section->output_section->vma
2563 + input_section->output_offset + rel->r_offset);
2564 value += signed_addend;
2565 if (! h || h->root.type != bfd_link_hash_undefweak)
2566 {
2567 /* Check for overflow */
2568 if ((value ^ (value >> 1)) & (1 << 30))
2569 return bfd_reloc_overflow;
2570 }
2571 value &= 0x7fffffff;
2572 value |= (bfd_get_32 (input_bfd, hit_data) & 0x80000000);
2573 if (sym_flags == STT_ARM_TFUNC)
2574 value |= 1;
2575 break;
2576#endif
252b5132 2577 }
f21f3fe0 2578
252b5132
RH
2579 bfd_put_32 (input_bfd, value, hit_data);
2580 return bfd_reloc_ok;
2581
2582 case R_ARM_ABS8:
2583 value += addend;
2584 if ((long) value > 0x7f || (long) value < -0x80)
2585 return bfd_reloc_overflow;
2586
2587 bfd_put_8 (input_bfd, value, hit_data);
2588 return bfd_reloc_ok;
2589
2590 case R_ARM_ABS16:
2591 value += addend;
2592
2593 if ((long) value > 0x7fff || (long) value < -0x8000)
2594 return bfd_reloc_overflow;
2595
2596 bfd_put_16 (input_bfd, value, hit_data);
2597 return bfd_reloc_ok;
2598
2599 case R_ARM_ABS12:
2600 /* Support ldr and str instruction for the arm */
2601 /* Also thumb b (unconditional branch). ??? Really? */
2602 value += addend;
2603
2604 if ((long) value > 0x7ff || (long) value < -0x800)
2605 return bfd_reloc_overflow;
2606
2607 value |= (bfd_get_32 (input_bfd, hit_data) & 0xfffff000);
2608 bfd_put_32 (input_bfd, value, hit_data);
2609 return bfd_reloc_ok;
2610
2611 case R_ARM_THM_ABS5:
9b485d32 2612 /* Support ldr and str instructions for the thumb. */
4e7fd91e
PB
2613 if (globals->use_rel)
2614 {
2615 /* Need to refetch addend. */
2616 addend = bfd_get_16 (input_bfd, hit_data) & howto->src_mask;
2617 /* ??? Need to determine shift amount from operand size. */
2618 addend >>= howto->rightshift;
2619 }
252b5132
RH
2620 value += addend;
2621
2622 /* ??? Isn't value unsigned? */
2623 if ((long) value > 0x1f || (long) value < -0x10)
2624 return bfd_reloc_overflow;
2625
2626 /* ??? Value needs to be properly shifted into place first. */
2627 value |= bfd_get_16 (input_bfd, hit_data) & 0xf83f;
2628 bfd_put_16 (input_bfd, value, hit_data);
2629 return bfd_reloc_ok;
2630
dfc5f959
NC
2631#ifndef OLD_ARM_ABI
2632 case R_ARM_THM_XPC22:
2633#endif
252b5132 2634 case R_ARM_THM_PC22:
dfc5f959 2635 /* Thumb BL (branch long instruction). */
252b5132 2636 {
b34976b6
AM
2637 bfd_vma relocation;
2638 bfd_boolean overflow = FALSE;
2639 bfd_vma upper_insn = bfd_get_16 (input_bfd, hit_data);
2640 bfd_vma lower_insn = bfd_get_16 (input_bfd, hit_data + 2);
df212a7e 2641 bfd_signed_vma reloc_signed_max = ((1 << (howto->bitsize - 1)) - 1) >> howto->rightshift;
ba96a88f 2642 bfd_signed_vma reloc_signed_min = ~ reloc_signed_max;
b34976b6 2643 bfd_vma check;
252b5132 2644 bfd_signed_vma signed_check;
252b5132 2645
252b5132
RH
2646 /* Need to refetch the addend and squish the two 11 bit pieces
2647 together. */
4e7fd91e
PB
2648 if (globals->use_rel)
2649 {
2650 bfd_vma upper = upper_insn & 0x7ff;
2651 bfd_vma lower = lower_insn & 0x7ff;
2652 upper = (upper ^ 0x400) - 0x400; /* Sign extend. */
2653 addend = (upper << 12) | (lower << 1);
2654 signed_addend = addend;
2655 }
dfc5f959
NC
2656#ifndef OLD_ARM_ABI
2657 if (r_type == R_ARM_THM_XPC22)
2658 {
2659 /* Check for Thumb to Thumb call. */
2660 /* FIXME: Should we translate the instruction into a BL
2661 instruction instead ? */
2662 if (sym_flags == STT_ARM_TFUNC)
d003868e
AM
2663 (*_bfd_error_handler)
2664 (_("%B: Warning: Thumb BLX instruction targets thumb function '%s'."),
2665 input_bfd,
2666 h ? h->root.root.string : "(local)");
dfc5f959
NC
2667 }
2668 else
2669#endif
252b5132 2670 {
dfc5f959
NC
2671 /* If it is not a call to Thumb, assume call to Arm.
2672 If it is a call relative to a section name, then it is not a
b7693d02
DJ
2673 function call at all, but rather a long jump. Calls through
2674 the PLT do not require stubs. */
2675 if (sym_flags != STT_ARM_TFUNC && sym_flags != STT_SECTION
2676 && (h == NULL || splt == NULL
2677 || h->plt.offset == (bfd_vma) -1))
dfc5f959
NC
2678 {
2679 if (elf32_thumb_to_arm_stub
2680 (info, sym_name, input_bfd, output_bfd, input_section,
2681 hit_data, sym_sec, rel->r_offset, signed_addend, value))
2682 return bfd_reloc_ok;
2683 else
2684 return bfd_reloc_dangerous;
2685 }
252b5132 2686 }
f21f3fe0 2687
b7693d02
DJ
2688 /* Handle calls via the PLT. */
2689 if (h != NULL && splt != NULL && h->plt.offset != (bfd_vma) -1)
2690 {
2691 value = (splt->output_section->vma
2692 + splt->output_offset
2693 + h->plt.offset);
2694 /* Target the Thumb stub before the ARM PLT entry. */
2695 value -= 4;
2696 }
2697
ba96a88f 2698 relocation = value + signed_addend;
f21f3fe0 2699
252b5132 2700 relocation -= (input_section->output_section->vma
ba96a88f
NC
2701 + input_section->output_offset
2702 + rel->r_offset);
9a5aca8c 2703
252b5132
RH
2704 check = relocation >> howto->rightshift;
2705
2706 /* If this is a signed value, the rightshift just dropped
2707 leading 1 bits (assuming twos complement). */
2708 if ((bfd_signed_vma) relocation >= 0)
2709 signed_check = check;
2710 else
2711 signed_check = check | ~((bfd_vma) -1 >> howto->rightshift);
2712
252b5132 2713 /* Assumes two's complement. */
ba96a88f 2714 if (signed_check > reloc_signed_max || signed_check < reloc_signed_min)
b34976b6 2715 overflow = TRUE;
252b5132 2716
df425bc0 2717#ifndef OLD_ARM_ABI
4f3c3dbb
NC
2718 if (r_type == R_ARM_THM_XPC22
2719 && ((lower_insn & 0x1800) == 0x0800))
c62e1cc3
NC
2720 /* For a BLX instruction, make sure that the relocation is rounded up
2721 to a word boundary. This follows the semantics of the instruction
2722 which specifies that bit 1 of the target address will come from bit
2723 1 of the base address. */
2724 relocation = (relocation + 2) & ~ 3;
99e4ae17 2725#endif
c62e1cc3
NC
2726 /* Put RELOCATION back into the insn. */
2727 upper_insn = (upper_insn & ~(bfd_vma) 0x7ff) | ((relocation >> 12) & 0x7ff);
2728 lower_insn = (lower_insn & ~(bfd_vma) 0x7ff) | ((relocation >> 1) & 0x7ff);
2729
252b5132
RH
2730 /* Put the relocated value back in the object file: */
2731 bfd_put_16 (input_bfd, upper_insn, hit_data);
2732 bfd_put_16 (input_bfd, lower_insn, hit_data + 2);
2733
2734 return (overflow ? bfd_reloc_overflow : bfd_reloc_ok);
2735 }
2736 break;
2737
51c5503b
NC
2738 case R_ARM_THM_PC11:
2739 /* Thumb B (branch) instruction). */
2740 {
6cf9e9fe 2741 bfd_signed_vma relocation;
51c5503b
NC
2742 bfd_signed_vma reloc_signed_max = (1 << (howto->bitsize - 1)) - 1;
2743 bfd_signed_vma reloc_signed_min = ~ reloc_signed_max;
51c5503b
NC
2744 bfd_signed_vma signed_check;
2745
4e7fd91e 2746 if (globals->use_rel)
6cf9e9fe 2747 {
4e7fd91e
PB
2748 /* Need to refetch addend. */
2749 addend = bfd_get_16 (input_bfd, hit_data) & howto->src_mask;
2750 if (addend & ((howto->src_mask + 1) >> 1))
2751 {
2752 signed_addend = -1;
2753 signed_addend &= ~ howto->src_mask;
2754 signed_addend |= addend;
2755 }
2756 else
2757 signed_addend = addend;
2758 /* The value in the insn has been right shifted. We need to
2759 undo this, so that we can perform the address calculation
2760 in terms of bytes. */
2761 signed_addend <<= howto->rightshift;
6cf9e9fe 2762 }
6cf9e9fe 2763 relocation = value + signed_addend;
51c5503b
NC
2764
2765 relocation -= (input_section->output_section->vma
2766 + input_section->output_offset
2767 + rel->r_offset);
2768
6cf9e9fe
NC
2769 relocation >>= howto->rightshift;
2770 signed_check = relocation;
2771 relocation &= howto->dst_mask;
51c5503b 2772 relocation |= (bfd_get_16 (input_bfd, hit_data) & (~ howto->dst_mask));
cedb70c5 2773
51c5503b
NC
2774 bfd_put_16 (input_bfd, relocation, hit_data);
2775
2776 /* Assumes two's complement. */
2777 if (signed_check > reloc_signed_max || signed_check < reloc_signed_min)
2778 return bfd_reloc_overflow;
2779
2780 return bfd_reloc_ok;
2781 }
cedb70c5 2782
1f433d93 2783#ifndef OLD_ARM_ABI
8375c36b
PB
2784 case R_ARM_ALU_PCREL7_0:
2785 case R_ARM_ALU_PCREL15_8:
2786 case R_ARM_ALU_PCREL23_15:
2787 {
2788 bfd_vma insn;
2789 bfd_vma relocation;
2790
2791 insn = bfd_get_32 (input_bfd, hit_data);
4e7fd91e
PB
2792 if (globals->use_rel)
2793 {
2794 /* Extract the addend. */
2795 addend = (insn & 0xff) << ((insn & 0xf00) >> 7);
2796 signed_addend = addend;
2797 }
8375c36b
PB
2798 relocation = value + signed_addend;
2799
2800 relocation -= (input_section->output_section->vma
2801 + input_section->output_offset
2802 + rel->r_offset);
2803 insn = (insn & ~0xfff)
2804 | ((howto->bitpos << 7) & 0xf00)
2805 | ((relocation >> howto->bitpos) & 0xff);
2806 bfd_put_32 (input_bfd, value, hit_data);
2807 }
2808 return bfd_reloc_ok;
1f433d93 2809#endif
8375c36b 2810
252b5132
RH
2811 case R_ARM_GNU_VTINHERIT:
2812 case R_ARM_GNU_VTENTRY:
2813 return bfd_reloc_ok;
2814
2815 case R_ARM_COPY:
2816 return bfd_reloc_notsupported;
2817
2818 case R_ARM_GLOB_DAT:
2819 return bfd_reloc_notsupported;
2820
2821 case R_ARM_JUMP_SLOT:
2822 return bfd_reloc_notsupported;
2823
2824 case R_ARM_RELATIVE:
2825 return bfd_reloc_notsupported;
2826
2827 case R_ARM_GOTOFF:
2828 /* Relocation is relative to the start of the
2829 global offset table. */
2830
2831 BFD_ASSERT (sgot != NULL);
2832 if (sgot == NULL)
2833 return bfd_reloc_notsupported;
9a5aca8c 2834
cedb70c5 2835 /* If we are addressing a Thumb function, we need to adjust the
ee29b9fb
RE
2836 address by one, so that attempts to call the function pointer will
2837 correctly interpret it as Thumb code. */
2838 if (sym_flags == STT_ARM_TFUNC)
2839 value += 1;
2840
252b5132
RH
2841 /* Note that sgot->output_offset is not involved in this
2842 calculation. We always want the start of .got. If we
2843 define _GLOBAL_OFFSET_TABLE in a different way, as is
2844 permitted by the ABI, we might have to change this
9b485d32 2845 calculation. */
252b5132 2846 value -= sgot->output_section->vma;
f21f3fe0 2847 return _bfd_final_link_relocate (howto, input_bfd, input_section,
99e4ae17
AJ
2848 contents, rel->r_offset, value,
2849 (bfd_vma) 0);
252b5132
RH
2850
2851 case R_ARM_GOTPC:
a7c10850 2852 /* Use global offset table as symbol value. */
252b5132 2853 BFD_ASSERT (sgot != NULL);
f21f3fe0 2854
252b5132
RH
2855 if (sgot == NULL)
2856 return bfd_reloc_notsupported;
2857
2858 value = sgot->output_section->vma;
f21f3fe0 2859 return _bfd_final_link_relocate (howto, input_bfd, input_section,
99e4ae17
AJ
2860 contents, rel->r_offset, value,
2861 (bfd_vma) 0);
f21f3fe0 2862
252b5132 2863 case R_ARM_GOT32:
eb043451
PB
2864#ifndef OLD_ARM_ABI
2865 case R_ARM_GOT_PREL:
2866#endif
252b5132 2867 /* Relocation is to the entry for this symbol in the
9b485d32 2868 global offset table. */
252b5132
RH
2869 if (sgot == NULL)
2870 return bfd_reloc_notsupported;
f21f3fe0 2871
252b5132
RH
2872 if (h != NULL)
2873 {
2874 bfd_vma off;
5e681ec4 2875 bfd_boolean dyn;
f21f3fe0 2876
252b5132
RH
2877 off = h->got.offset;
2878 BFD_ASSERT (off != (bfd_vma) -1);
5e681ec4 2879 dyn = globals->root.dynamic_sections_created;
f21f3fe0 2880
5e681ec4 2881 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
50d6c878 2882 || (info->shared
5e681ec4
PB
2883 && SYMBOL_REFERENCES_LOCAL (info, h))
2884 || (ELF_ST_VISIBILITY (h->other)
2885 && h->root.type == bfd_link_hash_undefweak))
252b5132
RH
2886 {
2887 /* This is actually a static link, or it is a -Bsymbolic link
2888 and the symbol is defined locally. We must initialize this
2889 entry in the global offset table. Since the offset must
2890 always be a multiple of 4, we use the least significant bit
2891 to record whether we have initialized it already.
f21f3fe0 2892
252b5132 2893 When doing a dynamic link, we create a .rel.got relocation
f21f3fe0 2894 entry to initialize the value. This is done in the
9b485d32 2895 finish_dynamic_symbol routine. */
252b5132
RH
2896 if ((off & 1) != 0)
2897 off &= ~1;
2898 else
2899 {
ee29b9fb
RE
2900 /* If we are addressing a Thumb function, we need to
2901 adjust the address by one, so that attempts to
2902 call the function pointer will correctly
2903 interpret it as Thumb code. */
2904 if (sym_flags == STT_ARM_TFUNC)
2905 value |= 1;
2906
252b5132
RH
2907 bfd_put_32 (output_bfd, value, sgot->contents + off);
2908 h->got.offset |= 1;
2909 }
2910 }
f21f3fe0 2911
252b5132
RH
2912 value = sgot->output_offset + off;
2913 }
2914 else
2915 {
2916 bfd_vma off;
f21f3fe0 2917
252b5132
RH
2918 BFD_ASSERT (local_got_offsets != NULL &&
2919 local_got_offsets[r_symndx] != (bfd_vma) -1);
f21f3fe0 2920
252b5132 2921 off = local_got_offsets[r_symndx];
f21f3fe0 2922
252b5132
RH
2923 /* The offset must always be a multiple of 4. We use the
2924 least significant bit to record whether we have already
9b485d32 2925 generated the necessary reloc. */
252b5132
RH
2926 if ((off & 1) != 0)
2927 off &= ~1;
2928 else
2929 {
b7693d02
DJ
2930 /* If we are addressing a Thumb function, we need to
2931 adjust the address by one, so that attempts to
2932 call the function pointer will correctly
2933 interpret it as Thumb code. */
2934 if (sym_flags == STT_ARM_TFUNC)
2935 value |= 1;
2936
252b5132 2937 bfd_put_32 (output_bfd, value, sgot->contents + off);
f21f3fe0 2938
252b5132
RH
2939 if (info->shared)
2940 {
2941 asection * srelgot;
947216bf
AM
2942 Elf_Internal_Rela outrel;
2943 bfd_byte *loc;
f21f3fe0 2944
252b5132
RH
2945 srelgot = bfd_get_section_by_name (dynobj, ".rel.got");
2946 BFD_ASSERT (srelgot != NULL);
f21f3fe0 2947
252b5132 2948 outrel.r_offset = (sgot->output_section->vma
f21f3fe0 2949 + sgot->output_offset
252b5132
RH
2950 + off);
2951 outrel.r_info = ELF32_R_INFO (0, R_ARM_RELATIVE);
947216bf
AM
2952 loc = srelgot->contents;
2953 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rel);
2954 bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
252b5132 2955 }
f21f3fe0 2956
252b5132
RH
2957 local_got_offsets[r_symndx] |= 1;
2958 }
f21f3fe0 2959
252b5132
RH
2960 value = sgot->output_offset + off;
2961 }
eb043451
PB
2962 if (r_type != R_ARM_GOT32)
2963 value += sgot->output_section->vma;
9a5aca8c 2964
f21f3fe0 2965 return _bfd_final_link_relocate (howto, input_bfd, input_section,
99e4ae17
AJ
2966 contents, rel->r_offset, value,
2967 (bfd_vma) 0);
f21f3fe0 2968
252b5132
RH
2969 case R_ARM_SBREL32:
2970 return bfd_reloc_notsupported;
2971
2972 case R_ARM_AMP_VCALL9:
2973 return bfd_reloc_notsupported;
2974
2975 case R_ARM_RSBREL32:
2976 return bfd_reloc_notsupported;
2977
2978 case R_ARM_THM_RPC22:
2979 return bfd_reloc_notsupported;
2980
2981 case R_ARM_RREL32:
2982 return bfd_reloc_notsupported;
2983
2984 case R_ARM_RABS32:
2985 return bfd_reloc_notsupported;
2986
2987 case R_ARM_RPC24:
2988 return bfd_reloc_notsupported;
2989
2990 case R_ARM_RBASE:
2991 return bfd_reloc_notsupported;
2992
319850b4
JB
2993 case R_ARM_V4BX:
2994 if (globals->fix_v4bx)
2995 {
2996 bfd_vma insn = bfd_get_32 (input_bfd, hit_data);
2997
2998 /* Ensure that we have a BX instruction. */
2999 BFD_ASSERT ((insn & 0x0ffffff0) == 0x012fff10);
3000
3001 /* Preserve Rm (lowest four bits) and the condition code
3002 (highest four bits). Other bits encode MOV PC,Rm. */
3003 insn = (insn & 0xf000000f) | 0x01a0f000;
3004
3005 bfd_put_32 (input_bfd, insn, hit_data);
3006 }
3007 return bfd_reloc_ok;
3008
252b5132
RH
3009 default:
3010 return bfd_reloc_notsupported;
3011 }
3012}
3013
98c1d4aa
NC
3014/* Add INCREMENT to the reloc (of type HOWTO) at ADDRESS. */
3015static void
57e8b36a
NC
3016arm_add_to_rel (bfd * abfd,
3017 bfd_byte * address,
3018 reloc_howto_type * howto,
3019 bfd_signed_vma increment)
98c1d4aa 3020{
98c1d4aa
NC
3021 bfd_signed_vma addend;
3022
9a5aca8c 3023 if (howto->type == R_ARM_THM_PC22)
98c1d4aa 3024 {
9a5aca8c
AM
3025 int upper_insn, lower_insn;
3026 int upper, lower;
98c1d4aa 3027
9a5aca8c
AM
3028 upper_insn = bfd_get_16 (abfd, address);
3029 lower_insn = bfd_get_16 (abfd, address + 2);
3030 upper = upper_insn & 0x7ff;
3031 lower = lower_insn & 0x7ff;
3032
3033 addend = (upper << 12) | (lower << 1);
ddda4409 3034 addend += increment;
9a5aca8c 3035 addend >>= 1;
98c1d4aa 3036
9a5aca8c
AM
3037 upper_insn = (upper_insn & 0xf800) | ((addend >> 11) & 0x7ff);
3038 lower_insn = (lower_insn & 0xf800) | (addend & 0x7ff);
3039
dc810e39
AM
3040 bfd_put_16 (abfd, (bfd_vma) upper_insn, address);
3041 bfd_put_16 (abfd, (bfd_vma) lower_insn, address + 2);
9a5aca8c
AM
3042 }
3043 else
3044 {
3045 bfd_vma contents;
3046
3047 contents = bfd_get_32 (abfd, address);
3048
3049 /* Get the (signed) value from the instruction. */
3050 addend = contents & howto->src_mask;
3051 if (addend & ((howto->src_mask + 1) >> 1))
3052 {
3053 bfd_signed_vma mask;
3054
3055 mask = -1;
3056 mask &= ~ howto->src_mask;
3057 addend |= mask;
3058 }
3059
3060 /* Add in the increment, (which is a byte value). */
3061 switch (howto->type)
3062 {
3063 default:
3064 addend += increment;
3065 break;
3066
3067 case R_ARM_PC24:
5b5bb741
PB
3068#ifndef OLD_ARM_ABI
3069 case R_ARM_CALL:
3070 case R_ARM_JUMP24:
3071#endif
9a5aca8c 3072 addend <<= howto->size;
dc810e39 3073 addend += increment;
9a5aca8c
AM
3074
3075 /* Should we check for overflow here ? */
3076
3077 /* Drop any undesired bits. */
3078 addend >>= howto->rightshift;
3079 break;
3080 }
3081
3082 contents = (contents & ~ howto->dst_mask) | (addend & howto->dst_mask);
3083
3084 bfd_put_32 (abfd, contents, address);
ddda4409 3085 }
98c1d4aa 3086}
252b5132
RH
3087
3088/* Relocate an ARM ELF section. */
b34976b6 3089static bfd_boolean
57e8b36a
NC
3090elf32_arm_relocate_section (bfd * output_bfd,
3091 struct bfd_link_info * info,
3092 bfd * input_bfd,
3093 asection * input_section,
3094 bfd_byte * contents,
3095 Elf_Internal_Rela * relocs,
3096 Elf_Internal_Sym * local_syms,
3097 asection ** local_sections)
252b5132 3098{
b34976b6
AM
3099 Elf_Internal_Shdr *symtab_hdr;
3100 struct elf_link_hash_entry **sym_hashes;
3101 Elf_Internal_Rela *rel;
3102 Elf_Internal_Rela *relend;
3103 const char *name;
b32d3aa2 3104 struct elf32_arm_link_hash_table * globals;
252b5132 3105
4e7fd91e
PB
3106 globals = elf32_arm_hash_table (info);
3107 if (info->relocatable && !globals->use_rel)
b34976b6 3108 return TRUE;
b491616a 3109
252b5132
RH
3110 symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr;
3111 sym_hashes = elf_sym_hashes (input_bfd);
3112
3113 rel = relocs;
3114 relend = relocs + input_section->reloc_count;
3115 for (; rel < relend; rel++)
3116 {
ba96a88f
NC
3117 int r_type;
3118 reloc_howto_type * howto;
3119 unsigned long r_symndx;
3120 Elf_Internal_Sym * sym;
3121 asection * sec;
252b5132 3122 struct elf_link_hash_entry * h;
ba96a88f
NC
3123 bfd_vma relocation;
3124 bfd_reloc_status_type r;
3125 arelent bfd_reloc;
f21f3fe0 3126
252b5132 3127 r_symndx = ELF32_R_SYM (rel->r_info);
ba96a88f 3128 r_type = ELF32_R_TYPE (rel->r_info);
b32d3aa2 3129 r_type = arm_real_reloc_type (globals, r_type);
252b5132 3130
ba96a88f
NC
3131 if ( r_type == R_ARM_GNU_VTENTRY
3132 || r_type == R_ARM_GNU_VTINHERIT)
252b5132
RH
3133 continue;
3134
b32d3aa2 3135 bfd_reloc.howto = elf32_arm_howto_from_type (r_type);
ba96a88f 3136 howto = bfd_reloc.howto;
252b5132 3137
4e7fd91e 3138 if (info->relocatable && globals->use_rel)
252b5132 3139 {
1049f94e 3140 /* This is a relocatable link. We don't have to change
252b5132
RH
3141 anything, unless the reloc is against a section symbol,
3142 in which case we have to adjust according to where the
3143 section symbol winds up in the output section. */
3144 if (r_symndx < symtab_hdr->sh_info)
3145 {
3146 sym = local_syms + r_symndx;
3147 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
3148 {
3149 sec = local_sections[r_symndx];
98c1d4aa 3150 arm_add_to_rel (input_bfd, contents + rel->r_offset,
dc810e39
AM
3151 howto,
3152 (bfd_signed_vma) (sec->output_offset
3153 + sym->st_value));
252b5132
RH
3154 }
3155 }
3156
3157 continue;
3158 }
3159
3160 /* This is a final link. */
3161 h = NULL;
3162 sym = NULL;
3163 sec = NULL;
9b485d32 3164
252b5132
RH
3165 if (r_symndx < symtab_hdr->sh_info)
3166 {
3167 sym = local_syms + r_symndx;
3168 sec = local_sections[r_symndx];
4e7fd91e 3169 if (globals->use_rel)
f8df10f4 3170 {
4e7fd91e
PB
3171 relocation = (sec->output_section->vma
3172 + sec->output_offset
3173 + sym->st_value);
3174 if ((sec->flags & SEC_MERGE)
3175 && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
f8df10f4 3176 {
4e7fd91e
PB
3177 asection *msec;
3178 bfd_vma addend, value;
3179
3180 if (howto->rightshift)
3181 {
3182 (*_bfd_error_handler)
3183 (_("%B(%A+0x%lx): %s relocation against SEC_MERGE section"),
3184 input_bfd, input_section,
3185 (long) rel->r_offset, howto->name);
3186 return FALSE;
3187 }
f8df10f4 3188
4e7fd91e 3189 value = bfd_get_32 (input_bfd, contents + rel->r_offset);
f8df10f4 3190
4e7fd91e
PB
3191 /* Get the (signed) value from the instruction. */
3192 addend = value & howto->src_mask;
3193 if (addend & ((howto->src_mask + 1) >> 1))
3194 {
3195 bfd_signed_vma mask;
f8df10f4 3196
4e7fd91e
PB
3197 mask = -1;
3198 mask &= ~ howto->src_mask;
3199 addend |= mask;
3200 }
3201 msec = sec;
3202 addend =
3203 _bfd_elf_rel_local_sym (output_bfd, sym, &msec, addend)
3204 - relocation;
3205 addend += msec->output_section->vma + msec->output_offset;
3206 value = (value & ~ howto->dst_mask) | (addend & howto->dst_mask);
3207 bfd_put_32 (input_bfd, value, contents + rel->r_offset);
f8df10f4 3208 }
f8df10f4 3209 }
4e7fd91e
PB
3210 else
3211 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
252b5132
RH
3212 }
3213 else
3214 {
560e09e9
NC
3215 bfd_boolean warned;
3216 bfd_boolean unresolved_reloc;
3217
b2a8e766
AM
3218 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
3219 r_symndx, symtab_hdr, sym_hashes,
3220 h, sec, relocation,
3221 unresolved_reloc, warned);
57e8b36a 3222
560e09e9 3223 if (unresolved_reloc || relocation != 0)
252b5132 3224 {
252b5132 3225 /* In these cases, we don't need the relocation value.
f21f3fe0 3226 We check specially because in some obscure cases
9b485d32 3227 sec->output_section will be NULL. */
252b5132
RH
3228 switch (r_type)
3229 {
3230 case R_ARM_PC24:
5b5bb741
PB
3231#ifndef OLD_ARM_ABI
3232 case R_ARM_CALL:
3233 case R_ARM_JUMP24:
ee06dc07 3234 case R_ARM_PREL31:
5b5bb741 3235#endif
252b5132 3236 case R_ARM_ABS32:
6a360bf4 3237 case R_ARM_THM_PC22:
ecb2d096
DJ
3238 case R_ARM_PLT32:
3239
252b5132 3240 if (info->shared
f5385ebf
AM
3241 && ((!info->symbolic && h->dynindx != -1)
3242 || !h->def_regular)
5e681ec4 3243 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
05924f36
PB
3244 && ((input_section->flags & SEC_ALLOC) != 0
3245 /* DWARF will emit R_ARM_ABS32 relocations in its
3246 sections against symbols defined externally
3247 in shared libraries. We can't do anything
3248 with them here. */
3249 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 3250 && h->def_dynamic))
252b5132 3251 )
560e09e9 3252 relocation = 0;
252b5132 3253 break;
f21f3fe0 3254
252b5132 3255 case R_ARM_GOTPC:
560e09e9 3256 relocation = 0;
252b5132 3257 break;
f21f3fe0 3258
252b5132 3259 case R_ARM_GOT32:
eb043451
PB
3260#ifndef OLD_ARM_ABI
3261 case R_ARM_GOT_PREL:
3262#endif
50d6c878 3263 if ((WILL_CALL_FINISH_DYNAMIC_SYMBOL
560e09e9 3264 (elf_hash_table (info)->dynamic_sections_created,
50d6c878
DJ
3265 info->shared, h))
3266 && (!info->shared
252b5132 3267 || (!info->symbolic && h->dynindx != -1)
f5385ebf 3268 || !h->def_regular))
560e09e9 3269 relocation = 0;
252b5132 3270 break;
f21f3fe0 3271
252b5132 3272 default:
560e09e9
NC
3273 if (unresolved_reloc)
3274 _bfd_error_handler
d003868e
AM
3275 (_("%B(%A): warning: unresolvable relocation %d against symbol `%s'"),
3276 input_bfd, input_section,
560e09e9 3277 r_type,
d003868e 3278 h->root.root.string);
560e09e9 3279 break;
252b5132 3280 }
252b5132
RH
3281 }
3282 }
3283
3284 if (h != NULL)
3285 name = h->root.root.string;
3286 else
3287 {
3288 name = (bfd_elf_string_from_elf_section
3289 (input_bfd, symtab_hdr->sh_link, sym->st_name));
3290 if (name == NULL || *name == '\0')
3291 name = bfd_section_name (input_bfd, sec);
3292 }
f21f3fe0 3293
252b5132
RH
3294 r = elf32_arm_final_link_relocate (howto, input_bfd, output_bfd,
3295 input_section, contents, rel,
3296 relocation, info, sec, name,
3297 (h ? ELF_ST_TYPE (h->type) :
780a67af 3298 ELF_ST_TYPE (sym->st_info)), h);
252b5132
RH
3299
3300 if (r != bfd_reloc_ok)
3301 {
3302 const char * msg = (const char *) 0;
3303
3304 switch (r)
3305 {
3306 case bfd_reloc_overflow:
cf919dfd
PB
3307 /* If the overflowing reloc was to an undefined symbol,
3308 we have already printed one error message and there
3309 is no point complaining again. */
3310 if ((! h ||
3311 h->root.type != bfd_link_hash_undefined)
3312 && (!((*info->callbacks->reloc_overflow)
dfeffb9f
L
3313 (info, (h ? &h->root : NULL), name, howto->name,
3314 (bfd_vma) 0, input_bfd, input_section,
3315 rel->r_offset))))
b34976b6 3316 return FALSE;
252b5132
RH
3317 break;
3318
3319 case bfd_reloc_undefined:
3320 if (!((*info->callbacks->undefined_symbol)
3321 (info, name, input_bfd, input_section,
b34976b6
AM
3322 rel->r_offset, TRUE)))
3323 return FALSE;
252b5132
RH
3324 break;
3325
3326 case bfd_reloc_outofrange:
9b485d32 3327 msg = _("internal error: out of range error");
252b5132
RH
3328 goto common_error;
3329
3330 case bfd_reloc_notsupported:
9b485d32 3331 msg = _("internal error: unsupported relocation error");
252b5132
RH
3332 goto common_error;
3333
3334 case bfd_reloc_dangerous:
9b485d32 3335 msg = _("internal error: dangerous error");
252b5132
RH
3336 goto common_error;
3337
3338 default:
9b485d32 3339 msg = _("internal error: unknown error");
252b5132
RH
3340 /* fall through */
3341
3342 common_error:
3343 if (!((*info->callbacks->warning)
3344 (info, msg, name, input_bfd, input_section,
3345 rel->r_offset)))
b34976b6 3346 return FALSE;
252b5132
RH
3347 break;
3348 }
3349 }
3350 }
3351
b34976b6 3352 return TRUE;
252b5132
RH
3353}
3354
c178919b
NC
3355/* Set the right machine number. */
3356
3357static bfd_boolean
57e8b36a 3358elf32_arm_object_p (bfd *abfd)
c178919b 3359{
5a6c6817 3360 unsigned int mach;
57e8b36a 3361
5a6c6817 3362 mach = bfd_arm_get_mach_from_notes (abfd, ARM_NOTE_SECTION);
c178919b 3363
5a6c6817
NC
3364 if (mach != bfd_mach_arm_unknown)
3365 bfd_default_set_arch_mach (abfd, bfd_arch_arm, mach);
3366
3367 else if (elf_elfheader (abfd)->e_flags & EF_ARM_MAVERICK_FLOAT)
3368 bfd_default_set_arch_mach (abfd, bfd_arch_arm, bfd_mach_arm_ep9312);
e16bb312 3369
e16bb312 3370 else
5a6c6817 3371 bfd_default_set_arch_mach (abfd, bfd_arch_arm, mach);
c178919b
NC
3372
3373 return TRUE;
3374}
3375
fc830a83 3376/* Function to keep ARM specific flags in the ELF header. */
3c9458e9 3377
b34976b6 3378static bfd_boolean
57e8b36a 3379elf32_arm_set_private_flags (bfd *abfd, flagword flags)
252b5132
RH
3380{
3381 if (elf_flags_init (abfd)
3382 && elf_elfheader (abfd)->e_flags != flags)
3383 {
fc830a83
NC
3384 if (EF_ARM_EABI_VERSION (flags) == EF_ARM_EABI_UNKNOWN)
3385 {
fd2ec330 3386 if (flags & EF_ARM_INTERWORK)
d003868e
AM
3387 (*_bfd_error_handler)
3388 (_("Warning: Not setting interworking flag of %B since it has already been specified as non-interworking"),
3389 abfd);
fc830a83 3390 else
d003868e
AM
3391 _bfd_error_handler
3392 (_("Warning: Clearing the interworking flag of %B due to outside request"),
3393 abfd);
fc830a83 3394 }
252b5132
RH
3395 }
3396 else
3397 {
3398 elf_elfheader (abfd)->e_flags = flags;
b34976b6 3399 elf_flags_init (abfd) = TRUE;
252b5132
RH
3400 }
3401
b34976b6 3402 return TRUE;
252b5132
RH
3403}
3404
fc830a83 3405/* Copy backend specific data from one object module to another. */
9b485d32 3406
b34976b6 3407static bfd_boolean
57e8b36a 3408elf32_arm_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
252b5132
RH
3409{
3410 flagword in_flags;
3411 flagword out_flags;
3412
fc830a83 3413 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
252b5132 3414 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 3415 return TRUE;
252b5132 3416
fc830a83 3417 in_flags = elf_elfheader (ibfd)->e_flags;
252b5132
RH
3418 out_flags = elf_elfheader (obfd)->e_flags;
3419
fc830a83
NC
3420 if (elf_flags_init (obfd)
3421 && EF_ARM_EABI_VERSION (out_flags) == EF_ARM_EABI_UNKNOWN
3422 && in_flags != out_flags)
252b5132 3423 {
252b5132 3424 /* Cannot mix APCS26 and APCS32 code. */
fd2ec330 3425 if ((in_flags & EF_ARM_APCS_26) != (out_flags & EF_ARM_APCS_26))
b34976b6 3426 return FALSE;
252b5132
RH
3427
3428 /* Cannot mix float APCS and non-float APCS code. */
fd2ec330 3429 if ((in_flags & EF_ARM_APCS_FLOAT) != (out_flags & EF_ARM_APCS_FLOAT))
b34976b6 3430 return FALSE;
252b5132
RH
3431
3432 /* If the src and dest have different interworking flags
3433 then turn off the interworking bit. */
fd2ec330 3434 if ((in_flags & EF_ARM_INTERWORK) != (out_flags & EF_ARM_INTERWORK))
252b5132 3435 {
fd2ec330 3436 if (out_flags & EF_ARM_INTERWORK)
d003868e
AM
3437 _bfd_error_handler
3438 (_("Warning: Clearing the interworking flag of %B because non-interworking code in %B has been linked with it"),
3439 obfd, ibfd);
252b5132 3440
fd2ec330 3441 in_flags &= ~EF_ARM_INTERWORK;
252b5132 3442 }
1006ba19
PB
3443
3444 /* Likewise for PIC, though don't warn for this case. */
fd2ec330
PB
3445 if ((in_flags & EF_ARM_PIC) != (out_flags & EF_ARM_PIC))
3446 in_flags &= ~EF_ARM_PIC;
252b5132
RH
3447 }
3448
3449 elf_elfheader (obfd)->e_flags = in_flags;
b34976b6 3450 elf_flags_init (obfd) = TRUE;
252b5132 3451
94a3258f
PB
3452 /* Also copy the EI_OSABI field. */
3453 elf_elfheader (obfd)->e_ident[EI_OSABI] =
3454 elf_elfheader (ibfd)->e_ident[EI_OSABI];
3455
b34976b6 3456 return TRUE;
252b5132
RH
3457}
3458
3459/* Merge backend specific data from an object file to the output
3460 object file when linking. */
9b485d32 3461
b34976b6 3462static bfd_boolean
57e8b36a 3463elf32_arm_merge_private_bfd_data (bfd * ibfd, bfd * obfd)
252b5132
RH
3464{
3465 flagword out_flags;
3466 flagword in_flags;
b34976b6 3467 bfd_boolean flags_compatible = TRUE;
cf919dfd 3468 asection *sec;
252b5132 3469
9b485d32 3470 /* Check if we have the same endianess. */
82e51918 3471 if (! _bfd_generic_verify_endian_match (ibfd, obfd))
b34976b6 3472 return FALSE;
1fe494a5 3473
252b5132
RH
3474 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
3475 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 3476 return TRUE;
252b5132 3477
252b5132
RH
3478 /* The input BFD must have had its flags initialised. */
3479 /* The following seems bogus to me -- The flags are initialized in
3480 the assembler but I don't think an elf_flags_init field is
9b485d32 3481 written into the object. */
252b5132
RH
3482 /* BFD_ASSERT (elf_flags_init (ibfd)); */
3483
3484 in_flags = elf_elfheader (ibfd)->e_flags;
3485 out_flags = elf_elfheader (obfd)->e_flags;
3486
3487 if (!elf_flags_init (obfd))
3488 {
fe077fa6
NC
3489 /* If the input is the default architecture and had the default
3490 flags then do not bother setting the flags for the output
3491 architecture, instead allow future merges to do this. If no
3492 future merges ever set these flags then they will retain their
3493 uninitialised values, which surprise surprise, correspond
252b5132 3494 to the default values. */
fe077fa6
NC
3495 if (bfd_get_arch_info (ibfd)->the_default
3496 && elf_elfheader (ibfd)->e_flags == 0)
b34976b6 3497 return TRUE;
252b5132 3498
b34976b6 3499 elf_flags_init (obfd) = TRUE;
252b5132
RH
3500 elf_elfheader (obfd)->e_flags = in_flags;
3501
3502 if (bfd_get_arch (obfd) == bfd_get_arch (ibfd)
3503 && bfd_get_arch_info (obfd)->the_default)
3504 return bfd_set_arch_mach (obfd, bfd_get_arch (ibfd), bfd_get_mach (ibfd));
3505
b34976b6 3506 return TRUE;
252b5132
RH
3507 }
3508
5a6c6817
NC
3509 /* Determine what should happen if the input ARM architecture
3510 does not match the output ARM architecture. */
3511 if (! bfd_arm_merge_machines (ibfd, obfd))
3512 return FALSE;
e16bb312 3513
1006ba19 3514 /* Identical flags must be compatible. */
252b5132 3515 if (in_flags == out_flags)
b34976b6 3516 return TRUE;
252b5132 3517
35a0f415
DJ
3518 /* Check to see if the input BFD actually contains any sections. If
3519 not, its flags may not have been initialised either, but it
3520 cannot actually cause any incompatibility. Do not short-circuit
3521 dynamic objects; their section list may be emptied by
d1f161ea 3522 elf_link_add_object_symbols.
35a0f415 3523
d1f161ea
NC
3524 Also check to see if there are no code sections in the input.
3525 In this case there is no need to check for code specific flags.
3526 XXX - do we need to worry about floating-point format compatability
3527 in data sections ? */
35a0f415 3528 if (!(ibfd->flags & DYNAMIC))
cf919dfd 3529 {
35a0f415 3530 bfd_boolean null_input_bfd = TRUE;
d1f161ea 3531 bfd_boolean only_data_sections = TRUE;
35a0f415
DJ
3532
3533 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
cf919dfd 3534 {
35a0f415
DJ
3535 /* Ignore synthetic glue sections. */
3536 if (strcmp (sec->name, ".glue_7")
3537 && strcmp (sec->name, ".glue_7t"))
3538 {
d1f161ea
NC
3539 if ((bfd_get_section_flags (ibfd, sec)
3540 & (SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS))
3541 == (SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS))
3542 only_data_sections = FALSE;
3543
35a0f415
DJ
3544 null_input_bfd = FALSE;
3545 break;
3546 }
cf919dfd 3547 }
d1f161ea
NC
3548
3549 if (null_input_bfd || only_data_sections)
35a0f415 3550 return TRUE;
cf919dfd 3551 }
cf919dfd 3552
252b5132 3553 /* Complain about various flag mismatches. */
fc830a83
NC
3554 if (EF_ARM_EABI_VERSION (in_flags) != EF_ARM_EABI_VERSION (out_flags))
3555 {
d003868e 3556 _bfd_error_handler
3656d5e3 3557 (_("ERROR: Source object %B has EABI version %d, but target %B has EABI version %d"),
d003868e
AM
3558 ibfd, obfd,
3559 (in_flags & EF_ARM_EABIMASK) >> 24,
3560 (out_flags & EF_ARM_EABIMASK) >> 24);
b34976b6 3561 return FALSE;
fc830a83 3562 }
252b5132 3563
1006ba19
PB
3564 /* Not sure what needs to be checked for EABI versions >= 1. */
3565 if (EF_ARM_EABI_VERSION (in_flags) == EF_ARM_EABI_UNKNOWN)
3566 {
fd2ec330 3567 if ((in_flags & EF_ARM_APCS_26) != (out_flags & EF_ARM_APCS_26))
1006ba19 3568 {
d003868e
AM
3569 _bfd_error_handler
3570 (_("ERROR: %B is compiled for APCS-%d, whereas target %B uses APCS-%d"),
3571 ibfd, obfd,
3572 in_flags & EF_ARM_APCS_26 ? 26 : 32,
3573 out_flags & EF_ARM_APCS_26 ? 26 : 32);
b34976b6 3574 flags_compatible = FALSE;
1006ba19 3575 }
252b5132 3576
fd2ec330 3577 if ((in_flags & EF_ARM_APCS_FLOAT) != (out_flags & EF_ARM_APCS_FLOAT))
1006ba19 3578 {
5eefb65f 3579 if (in_flags & EF_ARM_APCS_FLOAT)
d003868e
AM
3580 _bfd_error_handler
3581 (_("ERROR: %B passes floats in float registers, whereas %B passes them in integer registers"),
3582 ibfd, obfd);
5eefb65f 3583 else
d003868e
AM
3584 _bfd_error_handler
3585 (_("ERROR: %B passes floats in integer registers, whereas %B passes them in float registers"),
3586 ibfd, obfd);
63b0f745 3587
b34976b6 3588 flags_compatible = FALSE;
1006ba19 3589 }
252b5132 3590
96a846ea 3591 if ((in_flags & EF_ARM_VFP_FLOAT) != (out_flags & EF_ARM_VFP_FLOAT))
1006ba19 3592 {
96a846ea 3593 if (in_flags & EF_ARM_VFP_FLOAT)
d003868e
AM
3594 _bfd_error_handler
3595 (_("ERROR: %B uses VFP instructions, whereas %B does not"),
3596 ibfd, obfd);
5eefb65f 3597 else
d003868e
AM
3598 _bfd_error_handler
3599 (_("ERROR: %B uses FPA instructions, whereas %B does not"),
3600 ibfd, obfd);
fde78edd
NC
3601
3602 flags_compatible = FALSE;
3603 }
3604
3605 if ((in_flags & EF_ARM_MAVERICK_FLOAT) != (out_flags & EF_ARM_MAVERICK_FLOAT))
3606 {
3607 if (in_flags & EF_ARM_MAVERICK_FLOAT)
d003868e
AM
3608 _bfd_error_handler
3609 (_("ERROR: %B uses Maverick instructions, whereas %B does not"),
3610 ibfd, obfd);
fde78edd 3611 else
d003868e
AM
3612 _bfd_error_handler
3613 (_("ERROR: %B does not use Maverick instructions, whereas %B does"),
3614 ibfd, obfd);
63b0f745 3615
b34976b6 3616 flags_compatible = FALSE;
1006ba19 3617 }
96a846ea
RE
3618
3619#ifdef EF_ARM_SOFT_FLOAT
3620 if ((in_flags & EF_ARM_SOFT_FLOAT) != (out_flags & EF_ARM_SOFT_FLOAT))
3621 {
3622 /* We can allow interworking between code that is VFP format
3623 layout, and uses either soft float or integer regs for
3624 passing floating point arguments and results. We already
3625 know that the APCS_FLOAT flags match; similarly for VFP
3626 flags. */
3627 if ((in_flags & EF_ARM_APCS_FLOAT) != 0
3628 || (in_flags & EF_ARM_VFP_FLOAT) == 0)
3629 {
3630 if (in_flags & EF_ARM_SOFT_FLOAT)
d003868e
AM
3631 _bfd_error_handler
3632 (_("ERROR: %B uses software FP, whereas %B uses hardware FP"),
3633 ibfd, obfd);
96a846ea 3634 else
d003868e
AM
3635 _bfd_error_handler
3636 (_("ERROR: %B uses hardware FP, whereas %B uses software FP"),
3637 ibfd, obfd);
96a846ea 3638
b34976b6 3639 flags_compatible = FALSE;
96a846ea
RE
3640 }
3641 }
ee43f35e 3642#endif
252b5132 3643
1006ba19 3644 /* Interworking mismatch is only a warning. */
fd2ec330 3645 if ((in_flags & EF_ARM_INTERWORK) != (out_flags & EF_ARM_INTERWORK))
8f615d07 3646 {
e3c8793a
NC
3647 if (in_flags & EF_ARM_INTERWORK)
3648 {
d003868e
AM
3649 _bfd_error_handler
3650 (_("Warning: %B supports interworking, whereas %B does not"),
3651 ibfd, obfd);
e3c8793a
NC
3652 }
3653 else
3654 {
d003868e
AM
3655 _bfd_error_handler
3656 (_("Warning: %B does not support interworking, whereas %B does"),
3657 ibfd, obfd);
e3c8793a 3658 }
8f615d07 3659 }
252b5132 3660 }
63b0f745 3661
1006ba19 3662 return flags_compatible;
252b5132
RH
3663}
3664
9b485d32
NC
3665/* Display the flags field. */
3666
b34976b6 3667static bfd_boolean
57e8b36a 3668elf32_arm_print_private_bfd_data (bfd *abfd, void * ptr)
252b5132 3669{
fc830a83
NC
3670 FILE * file = (FILE *) ptr;
3671 unsigned long flags;
252b5132
RH
3672
3673 BFD_ASSERT (abfd != NULL && ptr != NULL);
3674
3675 /* Print normal ELF private data. */
3676 _bfd_elf_print_private_bfd_data (abfd, ptr);
3677
fc830a83 3678 flags = elf_elfheader (abfd)->e_flags;
9b485d32
NC
3679 /* Ignore init flag - it may not be set, despite the flags field
3680 containing valid data. */
252b5132
RH
3681
3682 /* xgettext:c-format */
9b485d32 3683 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
252b5132 3684
fc830a83
NC
3685 switch (EF_ARM_EABI_VERSION (flags))
3686 {
3687 case EF_ARM_EABI_UNKNOWN:
4cc11e76 3688 /* The following flag bits are GNU extensions and not part of the
fc830a83
NC
3689 official ARM ELF extended ABI. Hence they are only decoded if
3690 the EABI version is not set. */
fd2ec330 3691 if (flags & EF_ARM_INTERWORK)
9b485d32 3692 fprintf (file, _(" [interworking enabled]"));
9a5aca8c 3693
fd2ec330 3694 if (flags & EF_ARM_APCS_26)
6c571f00 3695 fprintf (file, " [APCS-26]");
fc830a83 3696 else
6c571f00 3697 fprintf (file, " [APCS-32]");
9a5aca8c 3698
96a846ea
RE
3699 if (flags & EF_ARM_VFP_FLOAT)
3700 fprintf (file, _(" [VFP float format]"));
fde78edd
NC
3701 else if (flags & EF_ARM_MAVERICK_FLOAT)
3702 fprintf (file, _(" [Maverick float format]"));
96a846ea
RE
3703 else
3704 fprintf (file, _(" [FPA float format]"));
3705
fd2ec330 3706 if (flags & EF_ARM_APCS_FLOAT)
9b485d32 3707 fprintf (file, _(" [floats passed in float registers]"));
9a5aca8c 3708
fd2ec330 3709 if (flags & EF_ARM_PIC)
9b485d32 3710 fprintf (file, _(" [position independent]"));
fc830a83 3711
fd2ec330 3712 if (flags & EF_ARM_NEW_ABI)
9b485d32 3713 fprintf (file, _(" [new ABI]"));
9a5aca8c 3714
fd2ec330 3715 if (flags & EF_ARM_OLD_ABI)
9b485d32 3716 fprintf (file, _(" [old ABI]"));
9a5aca8c 3717
fd2ec330 3718 if (flags & EF_ARM_SOFT_FLOAT)
9b485d32 3719 fprintf (file, _(" [software FP]"));
9a5aca8c 3720
96a846ea
RE
3721 flags &= ~(EF_ARM_INTERWORK | EF_ARM_APCS_26 | EF_ARM_APCS_FLOAT
3722 | EF_ARM_PIC | EF_ARM_NEW_ABI | EF_ARM_OLD_ABI
fde78edd
NC
3723 | EF_ARM_SOFT_FLOAT | EF_ARM_VFP_FLOAT
3724 | EF_ARM_MAVERICK_FLOAT);
fc830a83 3725 break;
9a5aca8c 3726
fc830a83 3727 case EF_ARM_EABI_VER1:
9b485d32 3728 fprintf (file, _(" [Version1 EABI]"));
9a5aca8c 3729
fc830a83 3730 if (flags & EF_ARM_SYMSARESORTED)
9b485d32 3731 fprintf (file, _(" [sorted symbol table]"));
fc830a83 3732 else
9b485d32 3733 fprintf (file, _(" [unsorted symbol table]"));
9a5aca8c 3734
fc830a83
NC
3735 flags &= ~ EF_ARM_SYMSARESORTED;
3736 break;
9a5aca8c 3737
fd2ec330
PB
3738 case EF_ARM_EABI_VER2:
3739 fprintf (file, _(" [Version2 EABI]"));
3740
3741 if (flags & EF_ARM_SYMSARESORTED)
3742 fprintf (file, _(" [sorted symbol table]"));
3743 else
3744 fprintf (file, _(" [unsorted symbol table]"));
3745
3746 if (flags & EF_ARM_DYNSYMSUSESEGIDX)
3747 fprintf (file, _(" [dynamic symbols use segment index]"));
3748
3749 if (flags & EF_ARM_MAPSYMSFIRST)
3750 fprintf (file, _(" [mapping symbols precede others]"));
3751
99e4ae17 3752 flags &= ~(EF_ARM_SYMSARESORTED | EF_ARM_DYNSYMSUSESEGIDX
fd2ec330
PB
3753 | EF_ARM_MAPSYMSFIRST);
3754 break;
3755
d507cf36
PB
3756 case EF_ARM_EABI_VER3:
3757 fprintf (file, _(" [Version3 EABI]"));
8cb51566
PB
3758 break;
3759
3760 case EF_ARM_EABI_VER4:
3761 fprintf (file, _(" [Version4 EABI]"));
d507cf36
PB
3762
3763 if (flags & EF_ARM_BE8)
3764 fprintf (file, _(" [BE8]"));
3765
3766 if (flags & EF_ARM_LE8)
3767 fprintf (file, _(" [LE8]"));
3768
3769 flags &= ~(EF_ARM_LE8 | EF_ARM_BE8);
3770 break;
3771
fc830a83 3772 default:
9b485d32 3773 fprintf (file, _(" <EABI version unrecognised>"));
fc830a83
NC
3774 break;
3775 }
252b5132 3776
fc830a83 3777 flags &= ~ EF_ARM_EABIMASK;
252b5132 3778
fc830a83 3779 if (flags & EF_ARM_RELEXEC)
9b485d32 3780 fprintf (file, _(" [relocatable executable]"));
252b5132 3781
fc830a83 3782 if (flags & EF_ARM_HASENTRY)
9b485d32 3783 fprintf (file, _(" [has entry point]"));
252b5132 3784
fc830a83
NC
3785 flags &= ~ (EF_ARM_RELEXEC | EF_ARM_HASENTRY);
3786
3787 if (flags)
9b485d32 3788 fprintf (file, _("<Unrecognised flag bits set>"));
9a5aca8c 3789
252b5132
RH
3790 fputc ('\n', file);
3791
b34976b6 3792 return TRUE;
252b5132
RH
3793}
3794
3795static int
57e8b36a 3796elf32_arm_get_symbol_type (Elf_Internal_Sym * elf_sym, int type)
252b5132 3797{
2f0ca46a
NC
3798 switch (ELF_ST_TYPE (elf_sym->st_info))
3799 {
3800 case STT_ARM_TFUNC:
3801 return ELF_ST_TYPE (elf_sym->st_info);
ce855c42 3802
2f0ca46a
NC
3803 case STT_ARM_16BIT:
3804 /* If the symbol is not an object, return the STT_ARM_16BIT flag.
3805 This allows us to distinguish between data used by Thumb instructions
3806 and non-data (which is probably code) inside Thumb regions of an
3807 executable. */
3808 if (type != STT_OBJECT)
3809 return ELF_ST_TYPE (elf_sym->st_info);
3810 break;
9a5aca8c 3811
ce855c42
NC
3812 default:
3813 break;
2f0ca46a
NC
3814 }
3815
3816 return type;
252b5132 3817}
f21f3fe0 3818
252b5132 3819static asection *
57e8b36a
NC
3820elf32_arm_gc_mark_hook (asection * sec,
3821 struct bfd_link_info * info ATTRIBUTE_UNUSED,
3822 Elf_Internal_Rela * rel,
3823 struct elf_link_hash_entry * h,
3824 Elf_Internal_Sym * sym)
252b5132
RH
3825{
3826 if (h != NULL)
3827 {
3828 switch (ELF32_R_TYPE (rel->r_info))
3829 {
3830 case R_ARM_GNU_VTINHERIT:
3831 case R_ARM_GNU_VTENTRY:
3832 break;
3833
3834 default:
3835 switch (h->root.type)
3836 {
3837 case bfd_link_hash_defined:
3838 case bfd_link_hash_defweak:
3839 return h->root.u.def.section;
3840
3841 case bfd_link_hash_common:
3842 return h->root.u.c.p->section;
e049a0de
ILT
3843
3844 default:
3845 break;
252b5132
RH
3846 }
3847 }
3848 }
3849 else
1e2f5b6e 3850 return bfd_section_from_elf_index (sec->owner, sym->st_shndx);
9ad5cbcf 3851
252b5132
RH
3852 return NULL;
3853}
3854
780a67af
NC
3855/* Update the got entry reference counts for the section being removed. */
3856
b34976b6 3857static bfd_boolean
57e8b36a
NC
3858elf32_arm_gc_sweep_hook (bfd * abfd ATTRIBUTE_UNUSED,
3859 struct bfd_link_info * info ATTRIBUTE_UNUSED,
3860 asection * sec ATTRIBUTE_UNUSED,
3861 const Elf_Internal_Rela * relocs ATTRIBUTE_UNUSED)
252b5132 3862{
5e681ec4
PB
3863 Elf_Internal_Shdr *symtab_hdr;
3864 struct elf_link_hash_entry **sym_hashes;
3865 bfd_signed_vma *local_got_refcounts;
3866 const Elf_Internal_Rela *rel, *relend;
eb043451
PB
3867 struct elf32_arm_link_hash_table * globals;
3868
3869 globals = elf32_arm_hash_table (info);
5e681ec4
PB
3870
3871 elf_section_data (sec)->local_dynrel = NULL;
3872
3873 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3874 sym_hashes = elf_sym_hashes (abfd);
3875 local_got_refcounts = elf_local_got_refcounts (abfd);
3876
3877 relend = relocs + sec->reloc_count;
3878 for (rel = relocs; rel < relend; rel++)
eb043451 3879 {
3eb128b2
AM
3880 unsigned long r_symndx;
3881 struct elf_link_hash_entry *h = NULL;
eb043451 3882 int r_type;
5e681ec4 3883
3eb128b2
AM
3884 r_symndx = ELF32_R_SYM (rel->r_info);
3885 if (r_symndx >= symtab_hdr->sh_info)
3886 {
3887 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3888 while (h->root.type == bfd_link_hash_indirect
3889 || h->root.type == bfd_link_hash_warning)
3890 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3891 }
3892
eb043451 3893 r_type = ELF32_R_TYPE (rel->r_info);
b6ee372a 3894#ifndef OLD_ARM_ABI
eb043451 3895 r_type = arm_real_reloc_type (globals, r_type);
b6ee372a 3896#endif
eb043451
PB
3897 switch (r_type)
3898 {
3899 case R_ARM_GOT32:
3900#ifndef OLD_ARM_ABI
3901 case R_ARM_GOT_PREL:
3902#endif
3eb128b2 3903 if (h != NULL)
eb043451 3904 {
eb043451
PB
3905 if (h->got.refcount > 0)
3906 h->got.refcount -= 1;
3907 }
3908 else if (local_got_refcounts != NULL)
3909 {
3910 if (local_got_refcounts[r_symndx] > 0)
3911 local_got_refcounts[r_symndx] -= 1;
3912 }
3913 break;
3914
3915 case R_ARM_ABS32:
3916 case R_ARM_REL32:
3917 case R_ARM_PC24:
3918 case R_ARM_PLT32:
3919#ifndef OLD_ARM_ABI
5b5bb741
PB
3920 case R_ARM_CALL:
3921 case R_ARM_JUMP24:
eb043451
PB
3922 case R_ARM_PREL31:
3923#endif
b7693d02
DJ
3924 case R_ARM_THM_PC22:
3925 /* Should the interworking branches be here also? */
3926
3eb128b2 3927 if (h != NULL)
eb043451
PB
3928 {
3929 struct elf32_arm_link_hash_entry *eh;
3930 struct elf32_arm_relocs_copied **pp;
3931 struct elf32_arm_relocs_copied *p;
5e681ec4 3932
b7693d02 3933 eh = (struct elf32_arm_link_hash_entry *) h;
5e681ec4 3934
eb043451 3935 if (h->plt.refcount > 0)
b7693d02
DJ
3936 {
3937 h->plt.refcount -= 1;
3938 if (ELF32_R_TYPE (rel->r_info) == R_ARM_THM_PC22)
3939 eh->plt_thumb_refcount--;
3940 }
5e681ec4 3941
eb043451 3942 if (r_type == R_ARM_ABS32
eb043451
PB
3943 || r_type == R_ARM_REL32)
3944 {
eb043451
PB
3945 for (pp = &eh->relocs_copied; (p = *pp) != NULL;
3946 pp = &p->next)
3947 if (p->section == sec)
3948 {
3949 p->count -= 1;
3950 if (p->count == 0)
3951 *pp = p->next;
3952 break;
3953 }
3954 }
3955 }
3956 break;
5e681ec4 3957
eb043451
PB
3958 default:
3959 break;
3960 }
3961 }
5e681ec4 3962
b34976b6 3963 return TRUE;
252b5132
RH
3964}
3965
780a67af
NC
3966/* Look through the relocs for a section during the first phase. */
3967
b34976b6 3968static bfd_boolean
57e8b36a
NC
3969elf32_arm_check_relocs (bfd *abfd, struct bfd_link_info *info,
3970 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 3971{
b34976b6
AM
3972 Elf_Internal_Shdr *symtab_hdr;
3973 struct elf_link_hash_entry **sym_hashes;
3974 struct elf_link_hash_entry **sym_hashes_end;
3975 const Elf_Internal_Rela *rel;
3976 const Elf_Internal_Rela *rel_end;
3977 bfd *dynobj;
5e681ec4 3978 asection *sreloc;
b34976b6 3979 bfd_vma *local_got_offsets;
5e681ec4 3980 struct elf32_arm_link_hash_table *htab;
9a5aca8c 3981
1049f94e 3982 if (info->relocatable)
b34976b6 3983 return TRUE;
9a5aca8c 3984
5e681ec4
PB
3985 htab = elf32_arm_hash_table (info);
3986 sreloc = NULL;
9a5aca8c 3987
252b5132
RH
3988 dynobj = elf_hash_table (info)->dynobj;
3989 local_got_offsets = elf_local_got_offsets (abfd);
f21f3fe0 3990
252b5132
RH
3991 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3992 sym_hashes = elf_sym_hashes (abfd);
9b485d32
NC
3993 sym_hashes_end = sym_hashes
3994 + symtab_hdr->sh_size / sizeof (Elf32_External_Sym);
3995
252b5132
RH
3996 if (!elf_bad_symtab (abfd))
3997 sym_hashes_end -= symtab_hdr->sh_info;
9b485d32 3998
252b5132
RH
3999 rel_end = relocs + sec->reloc_count;
4000 for (rel = relocs; rel < rel_end; rel++)
4001 {
4002 struct elf_link_hash_entry *h;
b7693d02 4003 struct elf32_arm_link_hash_entry *eh;
252b5132 4004 unsigned long r_symndx;
eb043451 4005 int r_type;
9a5aca8c 4006
252b5132 4007 r_symndx = ELF32_R_SYM (rel->r_info);
eb043451
PB
4008 r_type = ELF32_R_TYPE (rel->r_info);
4009#ifndef OLD_ARM_ABI
4010 r_type = arm_real_reloc_type (htab, r_type);
4011#endif
252b5132
RH
4012 if (r_symndx < symtab_hdr->sh_info)
4013 h = NULL;
4014 else
4015 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
9a5aca8c 4016
b7693d02
DJ
4017 eh = (struct elf32_arm_link_hash_entry *) h;
4018
eb043451 4019 switch (r_type)
252b5132 4020 {
5e681ec4 4021 case R_ARM_GOT32:
eb043451
PB
4022#ifndef OLD_ARM_ABI
4023 case R_ARM_GOT_PREL:
4024#endif
5e681ec4 4025 /* This symbol requires a global offset table entry. */
252b5132
RH
4026 if (h != NULL)
4027 {
5e681ec4 4028 h->got.refcount++;
252b5132
RH
4029 }
4030 else
4031 {
5e681ec4
PB
4032 bfd_signed_vma *local_got_refcounts;
4033
4034 /* This is a global offset table entry for a local symbol. */
4035 local_got_refcounts = elf_local_got_refcounts (abfd);
4036 if (local_got_refcounts == NULL)
252b5132 4037 {
dc810e39 4038 bfd_size_type size;
252b5132 4039
dc810e39 4040 size = symtab_hdr->sh_info;
57e8b36a
NC
4041 size *= (sizeof (bfd_signed_vma) + sizeof (char));
4042 local_got_refcounts = bfd_zalloc (abfd, size);
5e681ec4 4043 if (local_got_refcounts == NULL)
b34976b6 4044 return FALSE;
5e681ec4 4045 elf_local_got_refcounts (abfd) = local_got_refcounts;
252b5132 4046 }
5e681ec4 4047 local_got_refcounts[r_symndx] += 1;
252b5132 4048 }
eb043451
PB
4049 if (r_type == R_ARM_GOT32)
4050 break;
4051 /* Fall through. */
252b5132 4052
5e681ec4
PB
4053 case R_ARM_GOTOFF:
4054 case R_ARM_GOTPC:
4055 if (htab->sgot == NULL)
4056 {
4057 if (htab->root.dynobj == NULL)
4058 htab->root.dynobj = abfd;
4059 if (!create_got_section (htab->root.dynobj, info))
4060 return FALSE;
4061 }
252b5132
RH
4062 break;
4063
4064 case R_ARM_ABS32:
4065 case R_ARM_REL32:
4066 case R_ARM_PC24:
7359ea65 4067 case R_ARM_PLT32:
eb043451 4068#ifndef OLD_ARM_ABI
5b5bb741
PB
4069 case R_ARM_CALL:
4070 case R_ARM_JUMP24:
eb043451
PB
4071 case R_ARM_PREL31:
4072#endif
b7693d02
DJ
4073 case R_ARM_THM_PC22:
4074 /* Should the interworking branches be listed here? */
7359ea65 4075 if (h != NULL)
5e681ec4
PB
4076 {
4077 /* If this reloc is in a read-only section, we might
4078 need a copy reloc. We can't check reliably at this
4079 stage whether the section is read-only, as input
4080 sections have not yet been mapped to output sections.
4081 Tentatively set the flag for now, and correct in
4082 adjust_dynamic_symbol. */
7359ea65 4083 if (!info->shared)
f5385ebf 4084 h->non_got_ref = 1;
7359ea65 4085
5e681ec4 4086 /* We may need a .plt entry if the function this reloc
c84cd8ee
DJ
4087 refers to is in a different object. We can't tell for
4088 sure yet, because something later might force the
4089 symbol local. */
eb043451 4090 if (r_type == R_ARM_PC24
5b5bb741
PB
4091#ifndef OLD_ARM_ABI
4092 || r_type == R_ARM_CALL
4093 || r_type == R_ARM_JUMP24
ee06dc07 4094 || r_type == R_ARM_PREL31
5b5bb741 4095#endif
b7693d02
DJ
4096 || r_type == R_ARM_PLT32
4097 || r_type == R_ARM_THM_PC22)
f5385ebf 4098 h->needs_plt = 1;
4f199be3
DJ
4099
4100 /* If we create a PLT entry, this relocation will reference
4101 it, even if it's an ABS32 relocation. */
4102 h->plt.refcount += 1;
b7693d02
DJ
4103
4104 if (r_type == R_ARM_THM_PC22)
4105 eh->plt_thumb_refcount += 1;
5e681ec4
PB
4106 }
4107
252b5132
RH
4108 /* If we are creating a shared library, and this is a reloc
4109 against a global symbol, or a non PC relative reloc
4110 against a local symbol, then we need to copy the reloc
4111 into the shared library. However, if we are linking with
4112 -Bsymbolic, we do not need to copy a reloc against a
4113 global symbol which is defined in an object we are
4114 including in the link (i.e., DEF_REGULAR is set). At
4115 this point we have not seen all the input files, so it is
4116 possible that DEF_REGULAR is not set now but will be set
4117 later (it is never cleared). We account for that
4118 possibility below by storing information in the
5e681ec4 4119 relocs_copied field of the hash table entry. */
252b5132 4120 if (info->shared
5e681ec4 4121 && (sec->flags & SEC_ALLOC) != 0
eb043451
PB
4122 && ((r_type != R_ARM_PC24
4123 && r_type != R_ARM_PLT32
b6ee372a 4124#ifndef OLD_ARM_ABI
5b5bb741
PB
4125 && r_type != R_ARM_CALL
4126 && r_type != R_ARM_JUMP24
eb043451 4127 && r_type != R_ARM_PREL31
b6ee372a 4128#endif
b7693d02
DJ
4129 && r_type != R_ARM_REL32
4130 && r_type != R_ARM_THM_PC22)
5e681ec4
PB
4131 || (h != NULL
4132 && (! info->symbolic
f5385ebf 4133 || !h->def_regular))))
252b5132 4134 {
5e681ec4
PB
4135 struct elf32_arm_relocs_copied *p, **head;
4136
252b5132
RH
4137 /* When creating a shared object, we must copy these
4138 reloc types into the output file. We create a reloc
4139 section in dynobj and make room for this reloc. */
4140 if (sreloc == NULL)
4141 {
4142 const char * name;
4143
4144 name = (bfd_elf_string_from_elf_section
4145 (abfd,
4146 elf_elfheader (abfd)->e_shstrndx,
4147 elf_section_data (sec)->rel_hdr.sh_name));
4148 if (name == NULL)
b34976b6 4149 return FALSE;
252b5132
RH
4150
4151 BFD_ASSERT (strncmp (name, ".rel", 4) == 0
99e4ae17 4152 && strcmp (bfd_get_section_name (abfd, sec),
252b5132
RH
4153 name + 4) == 0);
4154
4155 sreloc = bfd_get_section_by_name (dynobj, name);
4156 if (sreloc == NULL)
4157 {
4158 flagword flags;
4159
4160 sreloc = bfd_make_section (dynobj, name);
4161 flags = (SEC_HAS_CONTENTS | SEC_READONLY
4162 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
e5a52504
MM
4163 if ((sec->flags & SEC_ALLOC) != 0
4164 /* BPABI objects never have dynamic
4165 relocations mapped. */
4166 && !htab->symbian_p)
252b5132
RH
4167 flags |= SEC_ALLOC | SEC_LOAD;
4168 if (sreloc == NULL
4169 || ! bfd_set_section_flags (dynobj, sreloc, flags)
4170 || ! bfd_set_section_alignment (dynobj, sreloc, 2))
b34976b6 4171 return FALSE;
252b5132 4172 }
5e681ec4
PB
4173
4174 elf_section_data (sec)->sreloc = sreloc;
252b5132
RH
4175 }
4176
5e681ec4
PB
4177 /* If this is a global symbol, we count the number of
4178 relocations we need for this symbol. */
4179 if (h != NULL)
252b5132 4180 {
5e681ec4
PB
4181 head = &((struct elf32_arm_link_hash_entry *) h)->relocs_copied;
4182 }
4183 else
4184 {
4185 /* Track dynamic relocs needed for local syms too.
4186 We really need local syms available to do this
4187 easily. Oh well. */
57e8b36a 4188
5e681ec4
PB
4189 asection *s;
4190 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
4191 sec, r_symndx);
4192 if (s == NULL)
4193 return FALSE;
57e8b36a 4194
5e681ec4
PB
4195 head = ((struct elf32_arm_relocs_copied **)
4196 &elf_section_data (s)->local_dynrel);
4197 }
57e8b36a 4198
5e681ec4
PB
4199 p = *head;
4200 if (p == NULL || p->section != sec)
4201 {
4202 bfd_size_type amt = sizeof *p;
57e8b36a 4203
5e681ec4 4204 p = bfd_alloc (htab->root.dynobj, amt);
252b5132 4205 if (p == NULL)
5e681ec4
PB
4206 return FALSE;
4207 p->next = *head;
4208 *head = p;
4209 p->section = sec;
4210 p->count = 0;
252b5132 4211 }
57e8b36a 4212
eb043451 4213 if (r_type == R_ARM_ABS32
eb043451 4214 || r_type == R_ARM_REL32)
7359ea65 4215 p->count += 1;
252b5132
RH
4216 }
4217 break;
4218
4219 /* This relocation describes the C++ object vtable hierarchy.
4220 Reconstruct it for later use during GC. */
4221 case R_ARM_GNU_VTINHERIT:
c152c796 4222 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 4223 return FALSE;
252b5132 4224 break;
9a5aca8c 4225
252b5132
RH
4226 /* This relocation describes which C++ vtable entries are actually
4227 used. Record for later use during GC. */
4228 case R_ARM_GNU_VTENTRY:
c152c796 4229 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_offset))
b34976b6 4230 return FALSE;
252b5132
RH
4231 break;
4232 }
4233 }
f21f3fe0 4234
b34976b6 4235 return TRUE;
252b5132
RH
4236}
4237
b34976b6 4238static bfd_boolean
0367ecfb 4239is_arm_mapping_symbol_name (const char * name)
252b5132 4240{
0367ecfb
NC
4241 return (name != NULL)
4242 && (name[0] == '$')
4243 && ((name[1] == 'a') || (name[1] == 't') || (name[1] == 'd'))
4244 && (name[2] == 0);
4245}
f21f3fe0 4246
3c9458e9
NC
4247/* Treat mapping symbols as special target symbols. */
4248
4249static bfd_boolean
4250elf32_arm_is_target_special_symbol (bfd * abfd ATTRIBUTE_UNUSED, asymbol * sym)
4251{
4252 return is_arm_mapping_symbol_name (sym->name);
4253}
4254
0367ecfb
NC
4255/* This is a copy of elf_find_function() from elf.c except that
4256 ARM mapping symbols are ignored when looking for function names
4257 and STT_ARM_TFUNC is considered to a function type. */
252b5132 4258
0367ecfb
NC
4259static bfd_boolean
4260arm_elf_find_function (bfd * abfd ATTRIBUTE_UNUSED,
4261 asection * section,
4262 asymbol ** symbols,
4263 bfd_vma offset,
4264 const char ** filename_ptr,
4265 const char ** functionname_ptr)
4266{
4267 const char * filename = NULL;
4268 asymbol * func = NULL;
4269 bfd_vma low_func = 0;
4270 asymbol ** p;
252b5132
RH
4271
4272 for (p = symbols; *p != NULL; p++)
4273 {
4274 elf_symbol_type *q;
4275
4276 q = (elf_symbol_type *) *p;
4277
252b5132
RH
4278 switch (ELF_ST_TYPE (q->internal_elf_sym.st_info))
4279 {
4280 default:
4281 break;
4282 case STT_FILE:
4283 filename = bfd_asymbol_name (&q->symbol);
4284 break;
252b5132
RH
4285 case STT_FUNC:
4286 case STT_ARM_TFUNC:
0367ecfb
NC
4287 /* Skip $a and $t symbols. */
4288 if ((q->symbol.flags & BSF_LOCAL)
4289 && is_arm_mapping_symbol_name (q->symbol.name))
4290 continue;
4291 /* Fall through. */
4292 case STT_NOTYPE:
6b40fcba 4293 if (bfd_get_section (&q->symbol) == section
252b5132
RH
4294 && q->symbol.value >= low_func
4295 && q->symbol.value <= offset)
4296 {
4297 func = (asymbol *) q;
4298 low_func = q->symbol.value;
4299 }
4300 break;
4301 }
4302 }
4303
4304 if (func == NULL)
b34976b6 4305 return FALSE;
252b5132 4306
0367ecfb
NC
4307 if (filename_ptr)
4308 *filename_ptr = filename;
4309 if (functionname_ptr)
4310 *functionname_ptr = bfd_asymbol_name (func);
4311
4312 return TRUE;
4313}
4314
4315
4316/* Find the nearest line to a particular section and offset, for error
4317 reporting. This code is a duplicate of the code in elf.c, except
4318 that it uses arm_elf_find_function. */
4319
4320static bfd_boolean
4321elf32_arm_find_nearest_line (bfd * abfd,
4322 asection * section,
4323 asymbol ** symbols,
4324 bfd_vma offset,
4325 const char ** filename_ptr,
4326 const char ** functionname_ptr,
4327 unsigned int * line_ptr)
4328{
4329 bfd_boolean found = FALSE;
4330
4331 /* We skip _bfd_dwarf1_find_nearest_line since no known ARM toolchain uses it. */
4332
4333 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4334 filename_ptr, functionname_ptr,
4335 line_ptr, 0,
4336 & elf_tdata (abfd)->dwarf2_find_line_info))
4337 {
4338 if (!*functionname_ptr)
4339 arm_elf_find_function (abfd, section, symbols, offset,
4340 *filename_ptr ? NULL : filename_ptr,
4341 functionname_ptr);
f21f3fe0 4342
0367ecfb
NC
4343 return TRUE;
4344 }
4345
4346 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4347 & found, filename_ptr,
4348 functionname_ptr, line_ptr,
4349 & elf_tdata (abfd)->line_info))
4350 return FALSE;
4351
4352 if (found && (*functionname_ptr || *line_ptr))
4353 return TRUE;
4354
4355 if (symbols == NULL)
4356 return FALSE;
4357
4358 if (! arm_elf_find_function (abfd, section, symbols, offset,
4359 filename_ptr, functionname_ptr))
4360 return FALSE;
4361
4362 *line_ptr = 0;
b34976b6 4363 return TRUE;
252b5132
RH
4364}
4365
4366/* Adjust a symbol defined by a dynamic object and referenced by a
4367 regular object. The current definition is in some section of the
4368 dynamic object, but we're not including those sections. We have to
4369 change the definition to something the rest of the link can
4370 understand. */
4371
b34976b6 4372static bfd_boolean
57e8b36a
NC
4373elf32_arm_adjust_dynamic_symbol (struct bfd_link_info * info,
4374 struct elf_link_hash_entry * h)
252b5132
RH
4375{
4376 bfd * dynobj;
4377 asection * s;
4378 unsigned int power_of_two;
b7693d02 4379 struct elf32_arm_link_hash_entry * eh;
252b5132
RH
4380
4381 dynobj = elf_hash_table (info)->dynobj;
4382
4383 /* Make sure we know what is going on here. */
4384 BFD_ASSERT (dynobj != NULL
f5385ebf 4385 && (h->needs_plt
f6e332e6 4386 || h->u.weakdef != NULL
f5385ebf
AM
4387 || (h->def_dynamic
4388 && h->ref_regular
4389 && !h->def_regular)));
252b5132 4390
b7693d02
DJ
4391 eh = (struct elf32_arm_link_hash_entry *) h;
4392
252b5132
RH
4393 /* If this is a function, put it in the procedure linkage table. We
4394 will fill in the contents of the procedure linkage table later,
4395 when we know the address of the .got section. */
b7693d02 4396 if (h->type == STT_FUNC || h->type == STT_ARM_TFUNC
f5385ebf 4397 || h->needs_plt)
252b5132 4398 {
5e681ec4
PB
4399 if (h->plt.refcount <= 0
4400 || SYMBOL_CALLS_LOCAL (info, h)
4401 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
4402 && h->root.type == bfd_link_hash_undefweak))
252b5132
RH
4403 {
4404 /* This case can occur if we saw a PLT32 reloc in an input
5e681ec4
PB
4405 file, but the symbol was never referred to by a dynamic
4406 object, or if all references were garbage collected. In
4407 such a case, we don't actually need to build a procedure
4408 linkage table, and we can just do a PC24 reloc instead. */
4409 h->plt.offset = (bfd_vma) -1;
b7693d02 4410 eh->plt_thumb_refcount = 0;
f5385ebf 4411 h->needs_plt = 0;
252b5132
RH
4412 }
4413
b34976b6 4414 return TRUE;
252b5132 4415 }
5e681ec4 4416 else
b7693d02
DJ
4417 {
4418 /* It's possible that we incorrectly decided a .plt reloc was
4419 needed for an R_ARM_PC24 or similar reloc to a non-function sym
4420 in check_relocs. We can't decide accurately between function
4421 and non-function syms in check-relocs; Objects loaded later in
4422 the link may change h->type. So fix it now. */
4423 h->plt.offset = (bfd_vma) -1;
4424 eh->plt_thumb_refcount = 0;
4425 }
252b5132
RH
4426
4427 /* If this is a weak symbol, and there is a real definition, the
4428 processor independent code will have arranged for us to see the
4429 real definition first, and we can just use the same value. */
f6e332e6 4430 if (h->u.weakdef != NULL)
252b5132 4431 {
f6e332e6
AM
4432 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
4433 || h->u.weakdef->root.type == bfd_link_hash_defweak);
4434 h->root.u.def.section = h->u.weakdef->root.u.def.section;
4435 h->root.u.def.value = h->u.weakdef->root.u.def.value;
b34976b6 4436 return TRUE;
252b5132
RH
4437 }
4438
4439 /* This is a reference to a symbol defined by a dynamic object which
4440 is not a function. */
4441
4442 /* If we are creating a shared library, we must presume that the
4443 only references to the symbol are via the global offset table.
4444 For such cases we need not do anything here; the relocations will
4445 be handled correctly by relocate_section. */
4446 if (info->shared)
b34976b6 4447 return TRUE;
252b5132
RH
4448
4449 /* We must allocate the symbol in our .dynbss section, which will
4450 become part of the .bss section of the executable. There will be
4451 an entry for this symbol in the .dynsym section. The dynamic
4452 object will contain position independent code, so all references
4453 from the dynamic object to this symbol will go through the global
4454 offset table. The dynamic linker will use the .dynsym entry to
4455 determine the address it must put in the global offset table, so
4456 both the dynamic object and the regular object will refer to the
4457 same memory location for the variable. */
252b5132
RH
4458 s = bfd_get_section_by_name (dynobj, ".dynbss");
4459 BFD_ASSERT (s != NULL);
4460
4461 /* We must generate a R_ARM_COPY reloc to tell the dynamic linker to
4462 copy the initial value out of the dynamic object and into the
4463 runtime process image. We need to remember the offset into the
4464 .rel.bss section we are going to use. */
4465 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
4466 {
4467 asection *srel;
4468
4469 srel = bfd_get_section_by_name (dynobj, ".rel.bss");
4470 BFD_ASSERT (srel != NULL);
eea6121a 4471 srel->size += sizeof (Elf32_External_Rel);
f5385ebf 4472 h->needs_copy = 1;
252b5132
RH
4473 }
4474
4475 /* We need to figure out the alignment required for this symbol. I
4476 have no idea how ELF linkers handle this. */
4477 power_of_two = bfd_log2 (h->size);
4478 if (power_of_two > 3)
4479 power_of_two = 3;
4480
4481 /* Apply the required alignment. */
eea6121a 4482 s->size = BFD_ALIGN (s->size, (bfd_size_type) (1 << power_of_two));
252b5132
RH
4483 if (power_of_two > bfd_get_section_alignment (dynobj, s))
4484 {
4485 if (! bfd_set_section_alignment (dynobj, s, power_of_two))
b34976b6 4486 return FALSE;
252b5132
RH
4487 }
4488
4489 /* Define the symbol as being at this point in the section. */
4490 h->root.u.def.section = s;
eea6121a 4491 h->root.u.def.value = s->size;
252b5132
RH
4492
4493 /* Increment the section size to make room for the symbol. */
eea6121a 4494 s->size += h->size;
252b5132 4495
b34976b6 4496 return TRUE;
252b5132
RH
4497}
4498
5e681ec4
PB
4499/* Allocate space in .plt, .got and associated reloc sections for
4500 dynamic relocs. */
4501
4502static bfd_boolean
57e8b36a 4503allocate_dynrelocs (struct elf_link_hash_entry *h, void * inf)
5e681ec4
PB
4504{
4505 struct bfd_link_info *info;
4506 struct elf32_arm_link_hash_table *htab;
4507 struct elf32_arm_link_hash_entry *eh;
4508 struct elf32_arm_relocs_copied *p;
4509
b7693d02
DJ
4510 eh = (struct elf32_arm_link_hash_entry *) h;
4511
5e681ec4
PB
4512 if (h->root.type == bfd_link_hash_indirect)
4513 return TRUE;
4514
4515 if (h->root.type == bfd_link_hash_warning)
4516 /* When warning symbols are created, they **replace** the "real"
4517 entry in the hash table, thus we never get to see the real
4518 symbol in a hash traversal. So look at it now. */
4519 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4520
4521 info = (struct bfd_link_info *) inf;
4522 htab = elf32_arm_hash_table (info);
4523
4524 if (htab->root.dynamic_sections_created
4525 && h->plt.refcount > 0)
4526 {
4527 /* Make sure this symbol is output as a dynamic symbol.
4528 Undefined weak syms won't yet be marked as dynamic. */
4529 if (h->dynindx == -1
f5385ebf 4530 && !h->forced_local)
5e681ec4 4531 {
c152c796 4532 if (! bfd_elf_link_record_dynamic_symbol (info, h))
5e681ec4
PB
4533 return FALSE;
4534 }
4535
4536 if (info->shared
7359ea65 4537 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
5e681ec4
PB
4538 {
4539 asection *s = htab->splt;
4540
4541 /* If this is the first .plt entry, make room for the special
4542 first entry. */
eea6121a 4543 if (s->size == 0)
e5a52504 4544 s->size += htab->plt_header_size;
5e681ec4 4545
eea6121a 4546 h->plt.offset = s->size;
5e681ec4 4547
b7693d02
DJ
4548 /* If we will insert a Thumb trampoline before this PLT, leave room
4549 for it. */
4550 if (!htab->symbian_p && eh->plt_thumb_refcount > 0)
4551 {
4552 h->plt.offset += PLT_THUMB_STUB_SIZE;
4553 s->size += PLT_THUMB_STUB_SIZE;
4554 }
4555
5e681ec4
PB
4556 /* If this symbol is not defined in a regular file, and we are
4557 not generating a shared library, then set the symbol to this
4558 location in the .plt. This is required to make function
4559 pointers compare as equal between the normal executable and
4560 the shared library. */
4561 if (! info->shared
f5385ebf 4562 && !h->def_regular)
5e681ec4
PB
4563 {
4564 h->root.u.def.section = s;
4565 h->root.u.def.value = h->plt.offset;
b7693d02
DJ
4566
4567 /* Make sure the function is not marked as Thumb, in case
4568 it is the target of an ABS32 relocation, which will
4569 point to the PLT entry. */
4570 if (ELF_ST_TYPE (h->type) == STT_ARM_TFUNC)
4571 h->type = ELF_ST_INFO (ELF_ST_BIND (h->type), STT_FUNC);
5e681ec4
PB
4572 }
4573
4574 /* Make room for this entry. */
e5a52504 4575 s->size += htab->plt_entry_size;
5e681ec4 4576
e5a52504 4577 if (!htab->symbian_p)
b7693d02
DJ
4578 {
4579 /* We also need to make an entry in the .got.plt section, which
4580 will be placed in the .got section by the linker script. */
4581 eh->plt_got_offset = htab->sgotplt->size;
4582 htab->sgotplt->size += 4;
4583 }
5e681ec4
PB
4584
4585 /* We also need to make an entry in the .rel.plt section. */
eea6121a 4586 htab->srelplt->size += sizeof (Elf32_External_Rel);
5e681ec4
PB
4587 }
4588 else
4589 {
4590 h->plt.offset = (bfd_vma) -1;
f5385ebf 4591 h->needs_plt = 0;
5e681ec4
PB
4592 }
4593 }
4594 else
4595 {
4596 h->plt.offset = (bfd_vma) -1;
f5385ebf 4597 h->needs_plt = 0;
5e681ec4
PB
4598 }
4599
4600 if (h->got.refcount > 0)
4601 {
4602 asection *s;
4603 bfd_boolean dyn;
4604
4605 /* Make sure this symbol is output as a dynamic symbol.
4606 Undefined weak syms won't yet be marked as dynamic. */
4607 if (h->dynindx == -1
f5385ebf 4608 && !h->forced_local)
5e681ec4 4609 {
c152c796 4610 if (! bfd_elf_link_record_dynamic_symbol (info, h))
5e681ec4
PB
4611 return FALSE;
4612 }
4613
e5a52504
MM
4614 if (!htab->symbian_p)
4615 {
4616 s = htab->sgot;
4617 h->got.offset = s->size;
4618 s->size += 4;
4619 dyn = htab->root.dynamic_sections_created;
4620 if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
4621 || h->root.type != bfd_link_hash_undefweak)
4622 && (info->shared
4623 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
4624 htab->srelgot->size += sizeof (Elf32_External_Rel);
4625 }
5e681ec4
PB
4626 }
4627 else
4628 h->got.offset = (bfd_vma) -1;
4629
5e681ec4
PB
4630 if (eh->relocs_copied == NULL)
4631 return TRUE;
4632
4633 /* In the shared -Bsymbolic case, discard space allocated for
4634 dynamic pc-relative relocs against symbols which turn out to be
4635 defined in regular objects. For the normal shared case, discard
4636 space for pc-relative relocs that have become local due to symbol
4637 visibility changes. */
4638
4639 if (info->shared)
4640 {
7359ea65
DJ
4641 /* Discard relocs on undefined weak syms with non-default
4642 visibility. */
5e681ec4
PB
4643 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
4644 && h->root.type == bfd_link_hash_undefweak)
4645 eh->relocs_copied = NULL;
4646 }
4647 else
4648 {
4649 /* For the non-shared case, discard space for relocs against
4650 symbols which turn out to need copy relocs or are not
4651 dynamic. */
4652
f5385ebf
AM
4653 if (!h->non_got_ref
4654 && ((h->def_dynamic
4655 && !h->def_regular)
5e681ec4
PB
4656 || (htab->root.dynamic_sections_created
4657 && (h->root.type == bfd_link_hash_undefweak
4658 || h->root.type == bfd_link_hash_undefined))))
4659 {
4660 /* Make sure this symbol is output as a dynamic symbol.
4661 Undefined weak syms won't yet be marked as dynamic. */
4662 if (h->dynindx == -1
f5385ebf 4663 && !h->forced_local)
5e681ec4 4664 {
c152c796 4665 if (! bfd_elf_link_record_dynamic_symbol (info, h))
5e681ec4
PB
4666 return FALSE;
4667 }
4668
4669 /* If that succeeded, we know we'll be keeping all the
4670 relocs. */
4671 if (h->dynindx != -1)
4672 goto keep;
4673 }
4674
4675 eh->relocs_copied = NULL;
4676
4677 keep: ;
4678 }
4679
4680 /* Finally, allocate space. */
4681 for (p = eh->relocs_copied; p != NULL; p = p->next)
4682 {
4683 asection *sreloc = elf_section_data (p->section)->sreloc;
eea6121a 4684 sreloc->size += p->count * sizeof (Elf32_External_Rel);
5e681ec4
PB
4685 }
4686
4687 return TRUE;
4688}
4689
08d1f311
DJ
4690/* Find any dynamic relocs that apply to read-only sections. */
4691
4692static bfd_boolean
4693elf32_arm_readonly_dynrelocs (struct elf_link_hash_entry *h, PTR inf)
4694{
4695 struct elf32_arm_link_hash_entry *eh;
4696 struct elf32_arm_relocs_copied *p;
4697
4698 if (h->root.type == bfd_link_hash_warning)
4699 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4700
4701 eh = (struct elf32_arm_link_hash_entry *) h;
4702 for (p = eh->relocs_copied; p != NULL; p = p->next)
4703 {
4704 asection *s = p->section;
4705
4706 if (s != NULL && (s->flags & SEC_READONLY) != 0)
4707 {
4708 struct bfd_link_info *info = (struct bfd_link_info *) inf;
4709
4710 info->flags |= DF_TEXTREL;
4711
4712 /* Not an error, just cut short the traversal. */
4713 return FALSE;
4714 }
4715 }
4716 return TRUE;
4717}
4718
252b5132
RH
4719/* Set the sizes of the dynamic sections. */
4720
b34976b6 4721static bfd_boolean
57e8b36a
NC
4722elf32_arm_size_dynamic_sections (bfd * output_bfd ATTRIBUTE_UNUSED,
4723 struct bfd_link_info * info)
252b5132
RH
4724{
4725 bfd * dynobj;
4726 asection * s;
b34976b6
AM
4727 bfd_boolean plt;
4728 bfd_boolean relocs;
5e681ec4
PB
4729 bfd *ibfd;
4730 struct elf32_arm_link_hash_table *htab;
252b5132 4731
5e681ec4 4732 htab = elf32_arm_hash_table (info);
252b5132
RH
4733 dynobj = elf_hash_table (info)->dynobj;
4734 BFD_ASSERT (dynobj != NULL);
4735
4736 if (elf_hash_table (info)->dynamic_sections_created)
4737 {
4738 /* Set the contents of the .interp section to the interpreter. */
893c4fe2 4739 if (info->executable)
252b5132
RH
4740 {
4741 s = bfd_get_section_by_name (dynobj, ".interp");
4742 BFD_ASSERT (s != NULL);
eea6121a 4743 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
252b5132
RH
4744 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
4745 }
4746 }
5e681ec4
PB
4747
4748 /* Set up .got offsets for local syms, and space for local dynamic
4749 relocs. */
4750 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
252b5132 4751 {
5e681ec4
PB
4752 bfd_signed_vma *local_got;
4753 bfd_signed_vma *end_local_got;
4754 char *local_tls_type;
4755 bfd_size_type locsymcount;
4756 Elf_Internal_Shdr *symtab_hdr;
4757 asection *srel;
4758
4759 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
4760 continue;
4761
4762 for (s = ibfd->sections; s != NULL; s = s->next)
4763 {
4764 struct elf32_arm_relocs_copied *p;
4765
4766 for (p = *((struct elf32_arm_relocs_copied **)
4767 &elf_section_data (s)->local_dynrel);
4768 p != NULL;
4769 p = p->next)
4770 {
4771 if (!bfd_is_abs_section (p->section)
4772 && bfd_is_abs_section (p->section->output_section))
4773 {
4774 /* Input section has been discarded, either because
4775 it is a copy of a linkonce section or due to
4776 linker script /DISCARD/, so we'll be discarding
4777 the relocs too. */
4778 }
4779 else if (p->count != 0)
4780 {
4781 srel = elf_section_data (p->section)->sreloc;
eea6121a 4782 srel->size += p->count * sizeof (Elf32_External_Rel);
5e681ec4
PB
4783 if ((p->section->output_section->flags & SEC_READONLY) != 0)
4784 info->flags |= DF_TEXTREL;
4785 }
4786 }
4787 }
4788
4789 local_got = elf_local_got_refcounts (ibfd);
4790 if (!local_got)
4791 continue;
4792
4793 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
4794 locsymcount = symtab_hdr->sh_info;
4795 end_local_got = local_got + locsymcount;
4796 s = htab->sgot;
4797 srel = htab->srelgot;
4798 for (; local_got < end_local_got; ++local_got, ++local_tls_type)
4799 {
4800 if (*local_got > 0)
4801 {
eea6121a
AM
4802 *local_got = s->size;
4803 s->size += 4;
5e681ec4 4804 if (info->shared)
eea6121a 4805 srel->size += sizeof (Elf32_External_Rel);
5e681ec4
PB
4806 }
4807 else
4808 *local_got = (bfd_vma) -1;
4809 }
252b5132
RH
4810 }
4811
5e681ec4
PB
4812 /* Allocate global sym .plt and .got entries, and space for global
4813 sym dynamic relocs. */
57e8b36a 4814 elf_link_hash_traverse (& htab->root, allocate_dynrelocs, info);
252b5132
RH
4815
4816 /* The check_relocs and adjust_dynamic_symbol entry points have
4817 determined the sizes of the various dynamic sections. Allocate
4818 memory for them. */
b34976b6
AM
4819 plt = FALSE;
4820 relocs = FALSE;
252b5132
RH
4821 for (s = dynobj->sections; s != NULL; s = s->next)
4822 {
4823 const char * name;
b34976b6 4824 bfd_boolean strip;
252b5132
RH
4825
4826 if ((s->flags & SEC_LINKER_CREATED) == 0)
4827 continue;
4828
4829 /* It's OK to base decisions on the section name, because none
4830 of the dynobj section names depend upon the input files. */
4831 name = bfd_get_section_name (dynobj, s);
4832
b34976b6 4833 strip = FALSE;
252b5132 4834
24a1ba0f 4835 if (strcmp (name, ".plt") == 0)
252b5132 4836 {
eea6121a 4837 if (s->size == 0)
252b5132
RH
4838 {
4839 /* Strip this section if we don't need it; see the
4840 comment below. */
b34976b6 4841 strip = TRUE;
252b5132
RH
4842 }
4843 else
4844 {
4845 /* Remember whether there is a PLT. */
b34976b6 4846 plt = TRUE;
252b5132
RH
4847 }
4848 }
4849 else if (strncmp (name, ".rel", 4) == 0)
4850 {
eea6121a 4851 if (s->size == 0)
252b5132
RH
4852 {
4853 /* If we don't need this section, strip it from the
4854 output file. This is mostly to handle .rel.bss and
4855 .rel.plt. We must create both sections in
4856 create_dynamic_sections, because they must be created
4857 before the linker maps input sections to output
4858 sections. The linker does that before
4859 adjust_dynamic_symbol is called, and it is that
4860 function which decides whether anything needs to go
4861 into these sections. */
b34976b6 4862 strip = TRUE;
252b5132
RH
4863 }
4864 else
4865 {
252b5132
RH
4866 /* Remember whether there are any reloc sections other
4867 than .rel.plt. */
4868 if (strcmp (name, ".rel.plt") != 0)
b34976b6 4869 relocs = TRUE;
252b5132
RH
4870
4871 /* We use the reloc_count field as a counter if we need
4872 to copy relocs into the output file. */
4873 s->reloc_count = 0;
4874 }
4875 }
4876 else if (strncmp (name, ".got", 4) != 0)
4877 {
4878 /* It's not one of our sections, so don't allocate space. */
4879 continue;
4880 }
4881
4882 if (strip)
4883 {
52585bb8 4884 _bfd_strip_section_from_output (info, s);
252b5132
RH
4885 continue;
4886 }
4887
4888 /* Allocate memory for the section contents. */
eea6121a
AM
4889 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
4890 if (s->contents == NULL && s->size != 0)
b34976b6 4891 return FALSE;
252b5132
RH
4892 }
4893
4894 if (elf_hash_table (info)->dynamic_sections_created)
4895 {
4896 /* Add some entries to the .dynamic section. We fill in the
4897 values later, in elf32_arm_finish_dynamic_sections, but we
4898 must add the entries now so that we get the correct size for
4899 the .dynamic section. The DT_DEBUG entry is filled in by the
4900 dynamic linker and used by the debugger. */
dc810e39 4901#define add_dynamic_entry(TAG, VAL) \
5a580b3a 4902 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39
AM
4903
4904 if (!info->shared)
252b5132 4905 {
dc810e39 4906 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 4907 return FALSE;
252b5132
RH
4908 }
4909
4910 if (plt)
4911 {
dc810e39
AM
4912 if ( !add_dynamic_entry (DT_PLTGOT, 0)
4913 || !add_dynamic_entry (DT_PLTRELSZ, 0)
4914 || !add_dynamic_entry (DT_PLTREL, DT_REL)
4915 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 4916 return FALSE;
252b5132
RH
4917 }
4918
4919 if (relocs)
4920 {
dc810e39
AM
4921 if ( !add_dynamic_entry (DT_REL, 0)
4922 || !add_dynamic_entry (DT_RELSZ, 0)
4923 || !add_dynamic_entry (DT_RELENT, sizeof (Elf32_External_Rel)))
b34976b6 4924 return FALSE;
252b5132
RH
4925 }
4926
08d1f311
DJ
4927 /* If any dynamic relocs apply to a read-only section,
4928 then we need a DT_TEXTREL entry. */
4929 if ((info->flags & DF_TEXTREL) == 0)
4930 elf_link_hash_traverse (&htab->root, elf32_arm_readonly_dynrelocs,
4931 (PTR) info);
4932
99e4ae17 4933 if ((info->flags & DF_TEXTREL) != 0)
252b5132 4934 {
dc810e39 4935 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 4936 return FALSE;
d6cf2879 4937 info->flags |= DF_TEXTREL;
252b5132
RH
4938 }
4939 }
dc810e39 4940#undef add_synamic_entry
252b5132 4941
b34976b6 4942 return TRUE;
252b5132
RH
4943}
4944
252b5132
RH
4945/* Finish up dynamic symbol handling. We set the contents of various
4946 dynamic sections here. */
4947
b34976b6 4948static bfd_boolean
57e8b36a
NC
4949elf32_arm_finish_dynamic_symbol (bfd * output_bfd, struct bfd_link_info * info,
4950 struct elf_link_hash_entry * h, Elf_Internal_Sym * sym)
252b5132
RH
4951{
4952 bfd * dynobj;
e5a52504 4953 struct elf32_arm_link_hash_table *htab;
b7693d02 4954 struct elf32_arm_link_hash_entry *eh;
252b5132
RH
4955
4956 dynobj = elf_hash_table (info)->dynobj;
e5a52504 4957 htab = elf32_arm_hash_table (info);
b7693d02 4958 eh = (struct elf32_arm_link_hash_entry *) h;
252b5132
RH
4959
4960 if (h->plt.offset != (bfd_vma) -1)
4961 {
4962 asection * splt;
252b5132 4963 asection * srel;
e5a52504 4964 bfd_byte *loc;
24a1ba0f 4965 bfd_vma plt_index;
947216bf 4966 Elf_Internal_Rela rel;
252b5132
RH
4967
4968 /* This symbol has an entry in the procedure linkage table. Set
4969 it up. */
4970
4971 BFD_ASSERT (h->dynindx != -1);
4972
4973 splt = bfd_get_section_by_name (dynobj, ".plt");
252b5132 4974 srel = bfd_get_section_by_name (dynobj, ".rel.plt");
e5a52504 4975 BFD_ASSERT (splt != NULL && srel != NULL);
252b5132 4976
e5a52504
MM
4977 /* Fill in the entry in the procedure linkage table. */
4978 if (htab->symbian_p)
4979 {
4980 unsigned i;
4981 for (i = 0; i < htab->plt_entry_size / 4; ++i)
4982 bfd_put_32 (output_bfd,
4983 elf32_arm_symbian_plt_entry[i],
4984 splt->contents + h->plt.offset + 4 * i);
4985
4986 /* Fill in the entry in the .rel.plt section. */
2a1b9a48
MM
4987 rel.r_offset = (splt->output_section->vma
4988 + splt->output_offset
e5a52504
MM
4989 + h->plt.offset + 4 * (i - 1));
4990 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARM_GLOB_DAT);
b7693d02
DJ
4991
4992 /* Get the index in the procedure linkage table which
4993 corresponds to this symbol. This is the index of this symbol
4994 in all the symbols for which we are making plt entries. The
4995 first entry in the procedure linkage table is reserved. */
4996 plt_index = ((h->plt.offset - htab->plt_header_size)
4997 / htab->plt_entry_size);
e5a52504
MM
4998 }
4999 else
5000 {
5001 bfd_vma got_offset;
5002 bfd_vma got_displacement;
5003 asection * sgot;
5004
5005 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
5006 BFD_ASSERT (sgot != NULL);
5007
b7693d02
DJ
5008 /* Get the offset into the .got.plt table of the entry that
5009 corresponds to this function. */
5010 got_offset = eh->plt_got_offset;
5011
5012 /* Get the index in the procedure linkage table which
5013 corresponds to this symbol. This is the index of this symbol
5014 in all the symbols for which we are making plt entries. The
5015 first three entries in .got.plt are reserved; after that
5016 symbols appear in the same order as in .plt. */
5017 plt_index = (got_offset - 12) / 4;
e5a52504
MM
5018
5019 /* Calculate the displacement between the PLT slot and the
b7693d02
DJ
5020 entry in the GOT. The eight-byte offset accounts for the
5021 value produced by adding to pc in the first instruction
5022 of the PLT stub. */
e5a52504
MM
5023 got_displacement = (sgot->output_section->vma
5024 + sgot->output_offset
5025 + got_offset
5026 - splt->output_section->vma
5027 - splt->output_offset
5028 - h->plt.offset
5029 - 8);
5e681ec4 5030
e5a52504 5031 BFD_ASSERT ((got_displacement & 0xf0000000) == 0);
5e681ec4 5032
b7693d02
DJ
5033 if (eh->plt_thumb_refcount > 0)
5034 {
5035 bfd_put_16 (output_bfd, elf32_arm_plt_thumb_stub[0],
5036 splt->contents + h->plt.offset - 4);
5037 bfd_put_16 (output_bfd, elf32_arm_plt_thumb_stub[1],
5038 splt->contents + h->plt.offset - 2);
5039 }
5040
e5a52504
MM
5041 bfd_put_32 (output_bfd, elf32_arm_plt_entry[0] | ((got_displacement & 0x0ff00000) >> 20),
5042 splt->contents + h->plt.offset + 0);
5043 bfd_put_32 (output_bfd, elf32_arm_plt_entry[1] | ((got_displacement & 0x000ff000) >> 12),
5044 splt->contents + h->plt.offset + 4);
5045 bfd_put_32 (output_bfd, elf32_arm_plt_entry[2] | (got_displacement & 0x00000fff),
5046 splt->contents + h->plt.offset + 8);
5e681ec4 5047#ifdef FOUR_WORD_PLT
e5a52504
MM
5048 bfd_put_32 (output_bfd, elf32_arm_plt_entry[3],
5049 splt->contents + h->plt.offset + 12);
5e681ec4 5050#endif
252b5132 5051
e5a52504
MM
5052 /* Fill in the entry in the global offset table. */
5053 bfd_put_32 (output_bfd,
5054 (splt->output_section->vma
5055 + splt->output_offset),
5056 sgot->contents + got_offset);
5057
5058 /* Fill in the entry in the .rel.plt section. */
5059 rel.r_offset = (sgot->output_section->vma
5060 + sgot->output_offset
5061 + got_offset);
5062 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARM_JUMP_SLOT);
5063 }
57e8b36a 5064
947216bf
AM
5065 loc = srel->contents + plt_index * sizeof (Elf32_External_Rel);
5066 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
252b5132 5067
f5385ebf 5068 if (!h->def_regular)
252b5132
RH
5069 {
5070 /* Mark the symbol as undefined, rather than as defined in
5071 the .plt section. Leave the value alone. */
5072 sym->st_shndx = SHN_UNDEF;
d982ba73
PB
5073 /* If the symbol is weak, we do need to clear the value.
5074 Otherwise, the PLT entry would provide a definition for
5075 the symbol even if the symbol wasn't defined anywhere,
5076 and so the symbol would never be NULL. */
f5385ebf 5077 if (!h->ref_regular_nonweak)
d982ba73 5078 sym->st_value = 0;
252b5132
RH
5079 }
5080 }
5081
5082 if (h->got.offset != (bfd_vma) -1)
5083 {
5084 asection * sgot;
5085 asection * srel;
947216bf
AM
5086 Elf_Internal_Rela rel;
5087 bfd_byte *loc;
252b5132
RH
5088
5089 /* This symbol has an entry in the global offset table. Set it
5090 up. */
252b5132
RH
5091 sgot = bfd_get_section_by_name (dynobj, ".got");
5092 srel = bfd_get_section_by_name (dynobj, ".rel.got");
5093 BFD_ASSERT (sgot != NULL && srel != NULL);
5094
5095 rel.r_offset = (sgot->output_section->vma
5096 + sgot->output_offset
dc810e39 5097 + (h->got.offset &~ (bfd_vma) 1));
252b5132 5098
5e681ec4
PB
5099 /* If this is a static link, or it is a -Bsymbolic link and the
5100 symbol is defined locally or was forced to be local because
5101 of a version file, we just want to emit a RELATIVE reloc.
5102 The entry in the global offset table will already have been
5103 initialized in the relocate_section function. */
252b5132 5104 if (info->shared
5e681ec4
PB
5105 && SYMBOL_REFERENCES_LOCAL (info, h))
5106 {
5107 BFD_ASSERT((h->got.offset & 1) != 0);
5108 rel.r_info = ELF32_R_INFO (0, R_ARM_RELATIVE);
5109 }
252b5132
RH
5110 else
5111 {
5e681ec4 5112 BFD_ASSERT((h->got.offset & 1) == 0);
252b5132
RH
5113 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset);
5114 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARM_GLOB_DAT);
5115 }
5116
947216bf
AM
5117 loc = srel->contents + srel->reloc_count++ * sizeof (Elf32_External_Rel);
5118 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
252b5132
RH
5119 }
5120
f5385ebf 5121 if (h->needs_copy)
252b5132
RH
5122 {
5123 asection * s;
947216bf
AM
5124 Elf_Internal_Rela rel;
5125 bfd_byte *loc;
252b5132
RH
5126
5127 /* This symbol needs a copy reloc. Set it up. */
252b5132
RH
5128 BFD_ASSERT (h->dynindx != -1
5129 && (h->root.type == bfd_link_hash_defined
5130 || h->root.type == bfd_link_hash_defweak));
5131
5132 s = bfd_get_section_by_name (h->root.u.def.section->owner,
5133 ".rel.bss");
5134 BFD_ASSERT (s != NULL);
5135
5136 rel.r_offset = (h->root.u.def.value
5137 + h->root.u.def.section->output_section->vma
5138 + h->root.u.def.section->output_offset);
5139 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARM_COPY);
947216bf
AM
5140 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rel);
5141 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
252b5132
RH
5142 }
5143
5144 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
5145 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
5146 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
5147 sym->st_shndx = SHN_ABS;
5148
b34976b6 5149 return TRUE;
252b5132
RH
5150}
5151
5152/* Finish up the dynamic sections. */
5153
b34976b6 5154static bfd_boolean
57e8b36a 5155elf32_arm_finish_dynamic_sections (bfd * output_bfd, struct bfd_link_info * info)
252b5132
RH
5156{
5157 bfd * dynobj;
5158 asection * sgot;
5159 asection * sdyn;
5160
5161 dynobj = elf_hash_table (info)->dynobj;
5162
5163 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
229fcec5 5164 BFD_ASSERT (elf32_arm_hash_table (info)->symbian_p || sgot != NULL);
252b5132
RH
5165 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
5166
5167 if (elf_hash_table (info)->dynamic_sections_created)
5168 {
5169 asection *splt;
5170 Elf32_External_Dyn *dyncon, *dynconend;
229fcec5 5171 struct elf32_arm_link_hash_table *htab;
252b5132 5172
229fcec5 5173 htab = elf32_arm_hash_table (info);
252b5132 5174 splt = bfd_get_section_by_name (dynobj, ".plt");
24a1ba0f 5175 BFD_ASSERT (splt != NULL && sdyn != NULL);
252b5132
RH
5176
5177 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 5178 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
9b485d32 5179
252b5132
RH
5180 for (; dyncon < dynconend; dyncon++)
5181 {
5182 Elf_Internal_Dyn dyn;
5183 const char * name;
5184 asection * s;
5185
5186 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
5187
5188 switch (dyn.d_tag)
5189 {
229fcec5
MM
5190 unsigned int type;
5191
252b5132
RH
5192 default:
5193 break;
5194
229fcec5
MM
5195 case DT_HASH:
5196 name = ".hash";
5197 goto get_vma_if_bpabi;
5198 case DT_STRTAB:
5199 name = ".dynstr";
5200 goto get_vma_if_bpabi;
5201 case DT_SYMTAB:
5202 name = ".dynsym";
5203 goto get_vma_if_bpabi;
c0042f5d
MM
5204 case DT_VERSYM:
5205 name = ".gnu.version";
5206 goto get_vma_if_bpabi;
5207 case DT_VERDEF:
5208 name = ".gnu.version_d";
5209 goto get_vma_if_bpabi;
5210 case DT_VERNEED:
5211 name = ".gnu.version_r";
5212 goto get_vma_if_bpabi;
5213
252b5132
RH
5214 case DT_PLTGOT:
5215 name = ".got";
5216 goto get_vma;
5217 case DT_JMPREL:
5218 name = ".rel.plt";
5219 get_vma:
5220 s = bfd_get_section_by_name (output_bfd, name);
5221 BFD_ASSERT (s != NULL);
229fcec5
MM
5222 if (!htab->symbian_p)
5223 dyn.d_un.d_ptr = s->vma;
5224 else
5225 /* In the BPABI, tags in the PT_DYNAMIC section point
5226 at the file offset, not the memory address, for the
5227 convenience of the post linker. */
5228 dyn.d_un.d_ptr = s->filepos;
252b5132
RH
5229 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5230 break;
5231
229fcec5
MM
5232 get_vma_if_bpabi:
5233 if (htab->symbian_p)
5234 goto get_vma;
5235 break;
5236
252b5132
RH
5237 case DT_PLTRELSZ:
5238 s = bfd_get_section_by_name (output_bfd, ".rel.plt");
5239 BFD_ASSERT (s != NULL);
eea6121a 5240 dyn.d_un.d_val = s->size;
252b5132
RH
5241 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5242 break;
229fcec5 5243
252b5132 5244 case DT_RELSZ:
229fcec5
MM
5245 if (!htab->symbian_p)
5246 {
5247 /* My reading of the SVR4 ABI indicates that the
5248 procedure linkage table relocs (DT_JMPREL) should be
5249 included in the overall relocs (DT_REL). This is
5250 what Solaris does. However, UnixWare can not handle
5251 that case. Therefore, we override the DT_RELSZ entry
5252 here to make it not include the JMPREL relocs. Since
5253 the linker script arranges for .rel.plt to follow all
5254 other relocation sections, we don't have to worry
5255 about changing the DT_REL entry. */
5256 s = bfd_get_section_by_name (output_bfd, ".rel.plt");
5257 if (s != NULL)
5258 dyn.d_un.d_val -= s->size;
5259 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5260 break;
5261 }
5262 /* Fall through */
5263
5264 case DT_REL:
5265 case DT_RELA:
5266 case DT_RELASZ:
5267 /* In the BPABI, the DT_REL tag must point at the file
5268 offset, not the VMA, of the first relocation
5269 section. So, we use code similar to that in
5270 elflink.c, but do not check for SHF_ALLOC on the
5271 relcoation section, since relocations sections are
5272 never allocated under the BPABI. The comments above
5273 about Unixware notwithstanding, we include all of the
5274 relocations here. */
5275 if (htab->symbian_p)
5276 {
5277 unsigned int i;
5278 type = ((dyn.d_tag == DT_REL || dyn.d_tag == DT_RELSZ)
5279 ? SHT_REL : SHT_RELA);
5280 dyn.d_un.d_val = 0;
5281 for (i = 1; i < elf_numsections (output_bfd); i++)
5282 {
5283 Elf_Internal_Shdr *hdr
5284 = elf_elfsections (output_bfd)[i];
5285 if (hdr->sh_type == type)
5286 {
5287 if (dyn.d_tag == DT_RELSZ
5288 || dyn.d_tag == DT_RELASZ)
5289 dyn.d_un.d_val += hdr->sh_size;
de52dba4
AM
5290 else if ((ufile_ptr) hdr->sh_offset
5291 <= dyn.d_un.d_val - 1)
229fcec5
MM
5292 dyn.d_un.d_val = hdr->sh_offset;
5293 }
5294 }
5295 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5296 }
252b5132 5297 break;
88f7bcd5
NC
5298
5299 /* Set the bottom bit of DT_INIT/FINI if the
5300 corresponding function is Thumb. */
5301 case DT_INIT:
5302 name = info->init_function;
5303 goto get_sym;
5304 case DT_FINI:
5305 name = info->fini_function;
5306 get_sym:
5307 /* If it wasn't set by elf_bfd_final_link
4cc11e76 5308 then there is nothing to adjust. */
88f7bcd5
NC
5309 if (dyn.d_un.d_val != 0)
5310 {
5311 struct elf_link_hash_entry * eh;
5312
5313 eh = elf_link_hash_lookup (elf_hash_table (info), name,
b34976b6 5314 FALSE, FALSE, TRUE);
88f7bcd5
NC
5315 if (eh != (struct elf_link_hash_entry *) NULL
5316 && ELF_ST_TYPE (eh->type) == STT_ARM_TFUNC)
5317 {
5318 dyn.d_un.d_val |= 1;
b34976b6 5319 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
88f7bcd5
NC
5320 }
5321 }
5322 break;
252b5132
RH
5323 }
5324 }
5325
24a1ba0f 5326 /* Fill in the first entry in the procedure linkage table. */
e5a52504 5327 if (splt->size > 0 && elf32_arm_hash_table (info)->plt_header_size)
f7a74f8c 5328 {
5e681ec4
PB
5329 bfd_vma got_displacement;
5330
5331 /* Calculate the displacement between the PLT slot and &GOT[0]. */
5332 got_displacement = (sgot->output_section->vma
5333 + sgot->output_offset
5334 - splt->output_section->vma
5335 - splt->output_offset
5336 - 16);
5337
f7a74f8c
NC
5338 bfd_put_32 (output_bfd, elf32_arm_plt0_entry[0], splt->contents + 0);
5339 bfd_put_32 (output_bfd, elf32_arm_plt0_entry[1], splt->contents + 4);
5340 bfd_put_32 (output_bfd, elf32_arm_plt0_entry[2], splt->contents + 8);
5341 bfd_put_32 (output_bfd, elf32_arm_plt0_entry[3], splt->contents + 12);
5e681ec4
PB
5342#ifdef FOUR_WORD_PLT
5343 /* The displacement value goes in the otherwise-unused last word of
5344 the second entry. */
5345 bfd_put_32 (output_bfd, got_displacement, splt->contents + 28);
5346#else
5347 bfd_put_32 (output_bfd, got_displacement, splt->contents + 16);
5348#endif
f7a74f8c 5349 }
252b5132
RH
5350
5351 /* UnixWare sets the entsize of .plt to 4, although that doesn't
5352 really seem like the right value. */
5353 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 4;
5354 }
5355
5356 /* Fill in the first three entries in the global offset table. */
229fcec5 5357 if (sgot)
252b5132 5358 {
229fcec5
MM
5359 if (sgot->size > 0)
5360 {
5361 if (sdyn == NULL)
5362 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
5363 else
5364 bfd_put_32 (output_bfd,
5365 sdyn->output_section->vma + sdyn->output_offset,
5366 sgot->contents);
5367 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
5368 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
5369 }
252b5132 5370
229fcec5
MM
5371 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
5372 }
252b5132 5373
b34976b6 5374 return TRUE;
252b5132
RH
5375}
5376
ba96a88f 5377static void
57e8b36a 5378elf32_arm_post_process_headers (bfd * abfd, struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
ba96a88f 5379{
9b485d32 5380 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
e489d0ae 5381 struct elf32_arm_link_hash_table *globals;
ba96a88f
NC
5382
5383 i_ehdrp = elf_elfheader (abfd);
5384
94a3258f
PB
5385 if (EF_ARM_EABI_VERSION (i_ehdrp->e_flags) == EF_ARM_EABI_UNKNOWN)
5386 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_ARM;
5387 else
5388 i_ehdrp->e_ident[EI_OSABI] = 0;
ba96a88f 5389 i_ehdrp->e_ident[EI_ABIVERSION] = ARM_ELF_ABI_VERSION;
e489d0ae 5390
93204d3a
PB
5391 if (link_info)
5392 {
5393 globals = elf32_arm_hash_table (link_info);
5394 if (globals->byteswap_code)
5395 i_ehdrp->e_flags |= EF_ARM_BE8;
5396 }
ba96a88f
NC
5397}
5398
99e4ae17 5399static enum elf_reloc_type_class
57e8b36a 5400elf32_arm_reloc_type_class (const Elf_Internal_Rela *rela)
99e4ae17 5401{
f51e552e 5402 switch ((int) ELF32_R_TYPE (rela->r_info))
99e4ae17
AJ
5403 {
5404 case R_ARM_RELATIVE:
5405 return reloc_class_relative;
5406 case R_ARM_JUMP_SLOT:
5407 return reloc_class_plt;
5408 case R_ARM_COPY:
5409 return reloc_class_copy;
5410 default:
5411 return reloc_class_normal;
5412 }
5413}
5414
e16bb312
NC
5415/* Set the right machine number for an Arm ELF file. */
5416
5417static bfd_boolean
57e8b36a 5418elf32_arm_section_flags (flagword *flags, const Elf_Internal_Shdr *hdr)
e16bb312
NC
5419{
5420 if (hdr->sh_type == SHT_NOTE)
5421 *flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_SAME_CONTENTS;
5422
5423 return TRUE;
5424}
5425
e489d0ae 5426static void
57e8b36a 5427elf32_arm_final_write_processing (bfd *abfd, bfd_boolean linker ATTRIBUTE_UNUSED)
e16bb312 5428{
5a6c6817 5429 bfd_arm_update_notes (abfd, ARM_NOTE_SECTION);
e16bb312
NC
5430}
5431
40a18ebd
NC
5432/* Return TRUE if this is an unwinding table entry. */
5433
5434static bfd_boolean
5435is_arm_elf_unwind_section_name (bfd * abfd ATTRIBUTE_UNUSED, const char * name)
5436{
5437 size_t len1, len2;
5438
5439 len1 = sizeof (ELF_STRING_ARM_unwind) - 1;
5440 len2 = sizeof (ELF_STRING_ARM_unwind_once) - 1;
5441 return (strncmp (name, ELF_STRING_ARM_unwind, len1) == 0
5442 || strncmp (name, ELF_STRING_ARM_unwind_once, len2) == 0);
5443}
5444
5445
5446/* Set the type and flags for an ARM section. We do this by
5447 the section name, which is a hack, but ought to work. */
5448
5449static bfd_boolean
5450elf32_arm_fake_sections (bfd * abfd, Elf_Internal_Shdr * hdr, asection * sec)
5451{
5452 const char * name;
5453
5454 name = bfd_get_section_name (abfd, sec);
5455
5456 if (is_arm_elf_unwind_section_name (abfd, name))
5457 {
5458 hdr->sh_type = SHT_ARM_EXIDX;
5459 hdr->sh_flags |= SHF_LINK_ORDER;
5460 }
5461 return TRUE;
5462}
5463
5464/* Handle an ARM specific section when reading an object file.
5465 This is called when elf.c finds a section with an unknown type. */
5466
5467static bfd_boolean
5468elf32_arm_section_from_shdr (bfd *abfd,
5469 Elf_Internal_Shdr * hdr,
5470 const char *name)
5471{
5472 /* There ought to be a place to keep ELF backend specific flags, but
5473 at the moment there isn't one. We just keep track of the
5474 sections by their name, instead. Fortunately, the ABI gives
5475 names for all the ARM specific sections, so we will probably get
5476 away with this. */
5477 switch (hdr->sh_type)
5478 {
5479 case SHT_ARM_EXIDX:
5480 break;
5481
5482 default:
5483 return FALSE;
5484 }
5485
5486 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name))
5487 return FALSE;
5488
5489 return TRUE;
5490}
e489d0ae
PB
5491
5492/* Called for each symbol. Builds a section map based on mapping symbols.
5493 Does not alter any of the symbols. */
5494
5495static bfd_boolean
5496elf32_arm_output_symbol_hook (struct bfd_link_info *info,
5497 const char *name,
5498 Elf_Internal_Sym *elfsym,
5499 asection *input_sec,
5500 struct elf_link_hash_entry *h ATTRIBUTE_UNUSED)
5501{
5502 int mapcount;
5503 elf32_arm_section_map *map;
5504 struct elf32_arm_link_hash_table *globals;
5505
5506 /* Only do this on final link. */
5507 if (info->relocatable)
5508 return TRUE;
5509
5510 /* Only build a map if we need to byteswap code. */
5511 globals = elf32_arm_hash_table (info);
5512 if (!globals->byteswap_code)
5513 return TRUE;
5514
5515 /* We only want mapping symbols. */
0367ecfb 5516 if (! is_arm_mapping_symbol_name (name))
e489d0ae
PB
5517 return TRUE;
5518
5519 mapcount = ++(elf32_arm_section_data (input_sec)->mapcount);
5520 map = elf32_arm_section_data (input_sec)->map;
5521 /* TODO: This may be inefficient, but we probably don't usually have many
5522 mapping symbols per section. */
5523 map = bfd_realloc (map, mapcount * sizeof (elf32_arm_section_map));
5524 elf32_arm_section_data (input_sec)->map = map;
57e8b36a 5525
e489d0ae
PB
5526 map[mapcount - 1].vma = elfsym->st_value;
5527 map[mapcount - 1].type = name[1];
5528 return TRUE;
5529}
5530
5531
5532/* Allocate target specific section data. */
5533
5534static bfd_boolean
5535elf32_arm_new_section_hook (bfd *abfd, asection *sec)
5536{
5537 struct _arm_elf_section_data *sdata;
5538 bfd_size_type amt = sizeof (*sdata);
5539
5540 sdata = bfd_zalloc (abfd, amt);
5541 if (sdata == NULL)
5542 return FALSE;
5543 sec->used_by_bfd = sdata;
5544
5545 return _bfd_elf_new_section_hook (abfd, sec);
5546}
5547
5548
5549/* Used to order a list of mapping symbols by address. */
5550
5551static int
5552elf32_arm_compare_mapping (const void * a, const void * b)
5553{
5554 return ((const elf32_arm_section_map *) a)->vma
5555 > ((const elf32_arm_section_map *) b)->vma;
5556}
5557
5558
5559/* Do code byteswapping. Return FALSE afterwards so that the section is
5560 written out as normal. */
5561
5562static bfd_boolean
5563elf32_arm_write_section (bfd *output_bfd ATTRIBUTE_UNUSED, asection *sec,
5564 bfd_byte *contents)
5565{
5566 int mapcount;
5567 elf32_arm_section_map *map;
5568 bfd_vma ptr;
5569 bfd_vma end;
5570 bfd_vma offset;
5571 bfd_byte tmp;
5572 int i;
57e8b36a 5573
e489d0ae
PB
5574 mapcount = elf32_arm_section_data (sec)->mapcount;
5575 map = elf32_arm_section_data (sec)->map;
5576
5577 if (mapcount == 0)
5578 return FALSE;
5579
5580 qsort (map, mapcount, sizeof (elf32_arm_section_map),
5581 elf32_arm_compare_mapping);
5582
5583 offset = sec->output_section->vma + sec->output_offset;
5584 ptr = map[0].vma - offset;
5585 for (i = 0; i < mapcount; i++)
5586 {
5587 if (i == mapcount - 1)
eea6121a 5588 end = sec->size;
e489d0ae
PB
5589 else
5590 end = map[i + 1].vma - offset;
57e8b36a 5591
e489d0ae
PB
5592 switch (map[i].type)
5593 {
5594 case 'a':
5595 /* Byte swap code words. */
5596 while (ptr + 3 < end)
5597 {
5598 tmp = contents[ptr];
5599 contents[ptr] = contents[ptr + 3];
5600 contents[ptr + 3] = tmp;
5601 tmp = contents[ptr + 1];
5602 contents[ptr + 1] = contents[ptr + 2];
5603 contents[ptr + 2] = tmp;
5604 ptr += 4;
5605 }
5606 break;
5607
5608 case 't':
5609 /* Byte swap code halfwords. */
5610 while (ptr + 1 < end)
5611 {
5612 tmp = contents[ptr];
5613 contents[ptr] = contents[ptr + 1];
5614 contents[ptr + 1] = tmp;
5615 ptr += 2;
5616 }
5617 break;
5618
5619 case 'd':
5620 /* Leave data alone. */
5621 break;
5622 }
5623 ptr = end;
5624 }
93204d3a 5625 free (map);
e489d0ae
PB
5626 return FALSE;
5627}
5628
b7693d02
DJ
5629/* Display STT_ARM_TFUNC symbols as functions. */
5630
5631static void
5632elf32_arm_symbol_processing (bfd *abfd ATTRIBUTE_UNUSED,
5633 asymbol *asym)
5634{
5635 elf_symbol_type *elfsym = (elf_symbol_type *) asym;
5636
5637 if (ELF_ST_TYPE (elfsym->internal_elf_sym.st_info) == STT_ARM_TFUNC)
5638 elfsym->symbol.flags |= BSF_FUNCTION;
5639}
5640
0beaef2b
PB
5641
5642/* Mangle thumb function symbols as we read them in. */
5643
5644static void
5645elf32_arm_swap_symbol_in (bfd * abfd,
5646 const void *psrc,
5647 const void *pshn,
5648 Elf_Internal_Sym *dst)
5649{
5650 bfd_elf32_swap_symbol_in (abfd, psrc, pshn, dst);
5651
5652 /* New EABI objects mark thumb function symbols by setting the low bit of
5653 the address. Turn these into STT_ARM_TFUNC. */
5654 if (ELF_ST_TYPE (dst->st_info) == STT_FUNC
5655 && (dst->st_value & 1))
5656 {
5657 dst->st_info = ELF_ST_INFO (ELF_ST_BIND (dst->st_info), STT_ARM_TFUNC);
5658 dst->st_value &= ~(bfd_vma) 1;
5659 }
5660}
5661
5662
5663/* Mangle thumb function symbols as we write them out. */
5664
5665static void
5666elf32_arm_swap_symbol_out (bfd *abfd,
5667 const Elf_Internal_Sym *src,
5668 void *cdst,
5669 void *shndx)
5670{
5671 Elf_Internal_Sym newsym;
5672
5673 /* We convert STT_ARM_TFUNC symbols into STT_FUNC with the low bit
5674 of the address set, as per the new EABI. We do this unconditionally
5675 because objcopy does not set the elf header flags until after
5676 it writes out the symbol table. */
5677 if (ELF_ST_TYPE (src->st_info) == STT_ARM_TFUNC)
5678 {
5679 newsym = *src;
5680 newsym.st_info = ELF_ST_INFO (ELF_ST_BIND (src->st_info), STT_FUNC);
5681 newsym.st_value |= 1;
5682
5683 src = &newsym;
5684 }
5685 bfd_elf32_swap_symbol_out (abfd, src, cdst, shndx);
5686}
5687
5688/* We use this to override swap_symbol_in and swap_symbol_out. */
5689const struct elf_size_info elf32_arm_size_info = {
5690 sizeof (Elf32_External_Ehdr),
5691 sizeof (Elf32_External_Phdr),
5692 sizeof (Elf32_External_Shdr),
5693 sizeof (Elf32_External_Rel),
5694 sizeof (Elf32_External_Rela),
5695 sizeof (Elf32_External_Sym),
5696 sizeof (Elf32_External_Dyn),
5697 sizeof (Elf_External_Note),
5698 4,
5699 1,
5700 32, 2,
5701 ELFCLASS32, EV_CURRENT,
5702 bfd_elf32_write_out_phdrs,
5703 bfd_elf32_write_shdrs_and_ehdr,
5704 bfd_elf32_write_relocs,
5705 elf32_arm_swap_symbol_in,
5706 elf32_arm_swap_symbol_out,
5707 bfd_elf32_slurp_reloc_table,
5708 bfd_elf32_slurp_symbol_table,
5709 bfd_elf32_swap_dyn_in,
5710 bfd_elf32_swap_dyn_out,
5711 bfd_elf32_swap_reloc_in,
5712 bfd_elf32_swap_reloc_out,
5713 bfd_elf32_swap_reloca_in,
5714 bfd_elf32_swap_reloca_out
5715};
5716
252b5132
RH
5717#define ELF_ARCH bfd_arch_arm
5718#define ELF_MACHINE_CODE EM_ARM
d0facd1b
NC
5719#ifdef __QNXTARGET__
5720#define ELF_MAXPAGESIZE 0x1000
5721#else
f21f3fe0 5722#define ELF_MAXPAGESIZE 0x8000
d0facd1b 5723#endif
b1342370 5724#define ELF_MINPAGESIZE 0x1000
252b5132 5725
99e4ae17
AJ
5726#define bfd_elf32_bfd_copy_private_bfd_data elf32_arm_copy_private_bfd_data
5727#define bfd_elf32_bfd_merge_private_bfd_data elf32_arm_merge_private_bfd_data
252b5132
RH
5728#define bfd_elf32_bfd_set_private_flags elf32_arm_set_private_flags
5729#define bfd_elf32_bfd_print_private_bfd_data elf32_arm_print_private_bfd_data
5730#define bfd_elf32_bfd_link_hash_table_create elf32_arm_link_hash_table_create
dc810e39 5731#define bfd_elf32_bfd_reloc_type_lookup elf32_arm_reloc_type_lookup
252b5132 5732#define bfd_elf32_find_nearest_line elf32_arm_find_nearest_line
e489d0ae 5733#define bfd_elf32_new_section_hook elf32_arm_new_section_hook
3c9458e9 5734#define bfd_elf32_bfd_is_target_special_symbol elf32_arm_is_target_special_symbol
252b5132
RH
5735
5736#define elf_backend_get_symbol_type elf32_arm_get_symbol_type
5737#define elf_backend_gc_mark_hook elf32_arm_gc_mark_hook
5738#define elf_backend_gc_sweep_hook elf32_arm_gc_sweep_hook
5739#define elf_backend_check_relocs elf32_arm_check_relocs
dc810e39 5740#define elf_backend_relocate_section elf32_arm_relocate_section
e489d0ae 5741#define elf_backend_write_section elf32_arm_write_section
252b5132 5742#define elf_backend_adjust_dynamic_symbol elf32_arm_adjust_dynamic_symbol
5e681ec4 5743#define elf_backend_create_dynamic_sections elf32_arm_create_dynamic_sections
252b5132
RH
5744#define elf_backend_finish_dynamic_symbol elf32_arm_finish_dynamic_symbol
5745#define elf_backend_finish_dynamic_sections elf32_arm_finish_dynamic_sections
e489d0ae 5746#define elf_backend_link_output_symbol_hook elf32_arm_output_symbol_hook
252b5132 5747#define elf_backend_size_dynamic_sections elf32_arm_size_dynamic_sections
ba96a88f 5748#define elf_backend_post_process_headers elf32_arm_post_process_headers
99e4ae17 5749#define elf_backend_reloc_type_class elf32_arm_reloc_type_class
c178919b 5750#define elf_backend_object_p elf32_arm_object_p
e16bb312 5751#define elf_backend_section_flags elf32_arm_section_flags
40a18ebd
NC
5752#define elf_backend_fake_sections elf32_arm_fake_sections
5753#define elf_backend_section_from_shdr elf32_arm_section_from_shdr
e16bb312 5754#define elf_backend_final_write_processing elf32_arm_final_write_processing
5e681ec4 5755#define elf_backend_copy_indirect_symbol elf32_arm_copy_indirect_symbol
b7693d02 5756#define elf_backend_symbol_processing elf32_arm_symbol_processing
0beaef2b 5757#define elf_backend_size_info elf32_arm_size_info
252b5132 5758
5e681ec4 5759#define elf_backend_can_refcount 1
252b5132
RH
5760#define elf_backend_can_gc_sections 1
5761#define elf_backend_plt_readonly 1
5762#define elf_backend_want_got_plt 1
5763#define elf_backend_want_plt_sym 0
4e7fd91e
PB
5764#define elf_backend_may_use_rel_p 1
5765#define elf_backend_may_use_rela_p 0
5766#define elf_backend_default_use_rela_p 0
5767#define elf_backend_rela_normal 0
252b5132 5768
04f7c78d 5769#define elf_backend_got_header_size 12
04f7c78d 5770
252b5132 5771#include "elf32-target.h"
7f266840 5772
4e7fd91e
PB
5773/* VxWorks Targets */
5774
5775#undef TARGET_LITTLE_SYM
5776#define TARGET_LITTLE_SYM bfd_elf32_littlearm_vxworks_vec
5777#undef TARGET_LITTLE_NAME
5778#define TARGET_LITTLE_NAME "elf32-littlearm-vxworks"
5779#undef TARGET_BIG_SYM
5780#define TARGET_BIG_SYM bfd_elf32_bigarm_vxworks_vec
5781#undef TARGET_BIG_NAME
5782#define TARGET_BIG_NAME "elf32-bigarm-vxworks"
5783
5784/* Like elf32_arm_link_hash_table_create -- but overrides
5785 appropriately for VxWorks. */
5786static struct bfd_link_hash_table *
5787elf32_arm_vxworks_link_hash_table_create (bfd *abfd)
5788{
5789 struct bfd_link_hash_table *ret;
5790
5791 ret = elf32_arm_link_hash_table_create (abfd);
5792 if (ret)
5793 {
5794 struct elf32_arm_link_hash_table *htab
5795 = (struct elf32_arm_link_hash_table *)ret;
5796 htab->use_rel = 0;
5797 }
5798 return ret;
5799}
5800
5801#undef elf32_bed
5802#define elf32_bed elf32_arm_vxworks_bed
5803
5804#undef bfd_elf32_bfd_link_hash_table_create
5805#define bfd_elf32_bfd_link_hash_table_create \
5806 elf32_arm_vxworks_link_hash_table_create
5807
5808#undef elf_backend_may_use_rel_p
5809#define elf_backend_may_use_rel_p 0
5810#undef elf_backend_may_use_rela_p
5811#define elf_backend_may_use_rela_p 1
5812#undef elf_backend_default_use_rela_p
5813#define elf_backend_default_use_rela_p 1
5814#undef elf_backend_rela_normal
5815#define elf_backend_rela_normal 1
5816
5817#include "elf32-target.h"
5818
5819
7f266840
DJ
5820/* Symbian OS Targets */
5821
5822#undef TARGET_LITTLE_SYM
5823#define TARGET_LITTLE_SYM bfd_elf32_littlearm_symbian_vec
5824#undef TARGET_LITTLE_NAME
5825#define TARGET_LITTLE_NAME "elf32-littlearm-symbian"
5826#undef TARGET_BIG_SYM
5827#define TARGET_BIG_SYM bfd_elf32_bigarm_symbian_vec
5828#undef TARGET_BIG_NAME
5829#define TARGET_BIG_NAME "elf32-bigarm-symbian"
5830
5831/* Like elf32_arm_link_hash_table_create -- but overrides
5832 appropriately for Symbian OS. */
5833static struct bfd_link_hash_table *
5834elf32_arm_symbian_link_hash_table_create (bfd *abfd)
5835{
5836 struct bfd_link_hash_table *ret;
5837
5838 ret = elf32_arm_link_hash_table_create (abfd);
5839 if (ret)
5840 {
5841 struct elf32_arm_link_hash_table *htab
5842 = (struct elf32_arm_link_hash_table *)ret;
5843 /* There is no PLT header for Symbian OS. */
5844 htab->plt_header_size = 0;
5845 /* The PLT entries are each three instructions. */
5846 htab->plt_entry_size = 4 * NUM_ELEM (elf32_arm_symbian_plt_entry);
5847 htab->symbian_p = 1;
5848 }
5849 return ret;
5850}
5851
7f266840
DJ
5852static struct bfd_elf_special_section const
5853 elf32_arm_symbian_special_sections[]=
5854{
5cd3778d
MM
5855 /* In a BPABI executable, the dynamic linking sections do not go in
5856 the loadable read-only segment. The post-linker may wish to
5857 refer to these sections, but they are not part of the final
5858 program image. */
7f266840
DJ
5859 { ".dynamic", 8, 0, SHT_DYNAMIC, 0 },
5860 { ".dynstr", 7, 0, SHT_STRTAB, 0 },
5861 { ".dynsym", 7, 0, SHT_DYNSYM, 0 },
5862 { ".got", 4, 0, SHT_PROGBITS, 0 },
5863 { ".hash", 5, 0, SHT_HASH, 0 },
5cd3778d
MM
5864 /* These sections do not need to be writable as the SymbianOS
5865 postlinker will arrange things so that no dynamic relocation is
5866 required. */
5867 { ".init_array", 11, 0, SHT_INIT_ARRAY, SHF_ALLOC },
5868 { ".fini_array", 11, 0, SHT_FINI_ARRAY, SHF_ALLOC },
5869 { ".preinit_array", 14, 0, SHT_PREINIT_ARRAY, SHF_ALLOC },
7f266840
DJ
5870 { NULL, 0, 0, 0, 0 }
5871};
5872
c3c76620 5873static void
b34af79c
MM
5874elf32_arm_symbian_begin_write_processing (bfd *abfd,
5875 struct bfd_link_info *link_info
5876 ATTRIBUTE_UNUSED)
c3c76620
MM
5877{
5878 /* BPABI objects are never loaded directly by an OS kernel; they are
5879 processed by a postlinker first, into an OS-specific format. If
5880 the D_PAGED bit is set on the file, BFD will align segments on
5881 page boundaries, so that an OS can directly map the file. With
5882 BPABI objects, that just results in wasted space. In addition,
5883 because we clear the D_PAGED bit, map_sections_to_segments will
5884 recognize that the program headers should not be mapped into any
5885 loadable segment. */
5886 abfd->flags &= ~D_PAGED;
5887}
7f266840
DJ
5888
5889static bfd_boolean
b34af79c
MM
5890elf32_arm_symbian_modify_segment_map (bfd *abfd,
5891 struct bfd_link_info *info
5892 ATTRIBUTE_UNUSED)
7f266840
DJ
5893{
5894 struct elf_segment_map *m;
5895 asection *dynsec;
5896
7f266840
DJ
5897 /* BPABI shared libraries and executables should have a PT_DYNAMIC
5898 segment. However, because the .dynamic section is not marked
5899 with SEC_LOAD, the generic ELF code will not create such a
5900 segment. */
5901 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
5902 if (dynsec)
5903 {
5904 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
5905 m->next = elf_tdata (abfd)->segment_map;
5906 elf_tdata (abfd)->segment_map = m;
5907 }
5908
5909 return TRUE;
5910}
5911
5912#undef elf32_bed
5913#define elf32_bed elf32_arm_symbian_bed
5914
5915/* The dynamic sections are not allocated on SymbianOS; the postlinker
5916 will process them and then discard them. */
5917#undef ELF_DYNAMIC_SEC_FLAGS
5918#define ELF_DYNAMIC_SEC_FLAGS \
5919 (SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED)
5920
5921#undef bfd_elf32_bfd_link_hash_table_create
5922#define bfd_elf32_bfd_link_hash_table_create \
5923 elf32_arm_symbian_link_hash_table_create
5924
5925#undef elf_backend_special_sections
5926#define elf_backend_special_sections elf32_arm_symbian_special_sections
5927
c3c76620
MM
5928#undef elf_backend_begin_write_processing
5929#define elf_backend_begin_write_processing \
5930 elf32_arm_symbian_begin_write_processing
5931
7f266840
DJ
5932#undef elf_backend_modify_segment_map
5933#define elf_backend_modify_segment_map elf32_arm_symbian_modify_segment_map
5934
5935/* There is no .got section for BPABI objects, and hence no header. */
5936#undef elf_backend_got_header_size
5937#define elf_backend_got_header_size 0
5938
5939/* Similarly, there is no .got.plt section. */
5940#undef elf_backend_want_got_plt
5941#define elf_backend_want_got_plt 0
5942
4e7fd91e
PB
5943#undef elf_backend_may_use_rel_p
5944#define elf_backend_may_use_rel_p 1
5945#undef elf_backend_may_use_rela_p
5946#define elf_backend_may_use_rela_p 0
5947#undef elf_backend_default_use_rela_p
dc4c9c19 5948#define elf_backend_default_use_rela_p 0
4e7fd91e
PB
5949#undef elf_backend_rela_normal
5950#define elf_backend_rela_normal 0
5951
7f266840 5952#include "elf32-target.h"