]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-arm.h
* aclocal.m4: Regenerate.
[thirdparty/binutils-gdb.git] / bfd / elf32-arm.h
CommitLineData
252b5132 1/* 32-bit ELF support for ARM
d1f161ea
NC
2 Copyright 1998, 1999, 2000, 2001, 2002, 2003, 2004
3 Free Software Foundation, Inc.
252b5132
RH
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
20
acf8aed4
AM
21#ifndef USE_REL
22#define USE_REL 0
23#endif
24
252b5132
RH
25typedef unsigned long int insn32;
26typedef unsigned short int insn16;
27
85a84e7a 28/* In leiu of proper flags, assume all EABIv3 objects are interworkable. */
57e8b36a 29#define INTERWORK_FLAG(abfd) \
85a84e7a
PB
30 (EF_ARM_EABI_VERSION (elf_elfheader (abfd)->e_flags) == EF_ARM_EABI_VER3 \
31 || (elf_elfheader (abfd)->e_flags & EF_ARM_INTERWORK))
9b485d32 32
252b5132
RH
33/* The linker script knows the section names for placement.
34 The entry_names are used to do simple name mangling on the stubs.
35 Given a function name, and its type, the stub can be found. The
9b485d32 36 name can be changed. The only requirement is the %s be present. */
252b5132
RH
37#define THUMB2ARM_GLUE_SECTION_NAME ".glue_7t"
38#define THUMB2ARM_GLUE_ENTRY_NAME "__%s_from_thumb"
39
40#define ARM2THUMB_GLUE_SECTION_NAME ".glue_7"
41#define ARM2THUMB_GLUE_ENTRY_NAME "__%s_from_arm"
42
43/* The name of the dynamic interpreter. This is put in the .interp
44 section. */
45#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
46
5e681ec4
PB
47#ifdef FOUR_WORD_PLT
48
252b5132
RH
49/* The first entry in a procedure linkage table looks like
50 this. It is set up so that any shared library function that is
59f2c4e7 51 called before the relocation has been set up calls the dynamic
9b485d32 52 linker first. */
e5a52504 53static const bfd_vma elf32_arm_plt0_entry [] =
5e681ec4
PB
54 {
55 0xe52de004, /* str lr, [sp, #-4]! */
56 0xe59fe010, /* ldr lr, [pc, #16] */
57 0xe08fe00e, /* add lr, pc, lr */
58 0xe5bef008, /* ldr pc, [lr, #8]! */
59 };
60
61/* Subsequent entries in a procedure linkage table look like
62 this. */
e5a52504 63static const bfd_vma elf32_arm_plt_entry [] =
5e681ec4
PB
64 {
65 0xe28fc600, /* add ip, pc, #NN */
66 0xe28cca00, /* add ip, ip, #NN */
67 0xe5bcf000, /* ldr pc, [ip, #NN]! */
68 0x00000000, /* unused */
69 };
70
71#else
72
5e681ec4
PB
73/* The first entry in a procedure linkage table looks like
74 this. It is set up so that any shared library function that is
75 called before the relocation has been set up calls the dynamic
76 linker first. */
e5a52504 77static const bfd_vma elf32_arm_plt0_entry [] =
917583ad 78 {
5e681ec4
PB
79 0xe52de004, /* str lr, [sp, #-4]! */
80 0xe59fe004, /* ldr lr, [pc, #4] */
81 0xe08fe00e, /* add lr, pc, lr */
82 0xe5bef008, /* ldr pc, [lr, #8]! */
83 0x00000000, /* &GOT[0] - . */
917583ad 84 };
252b5132
RH
85
86/* Subsequent entries in a procedure linkage table look like
87 this. */
e5a52504 88static const bfd_vma elf32_arm_plt_entry [] =
5e681ec4
PB
89 {
90 0xe28fc600, /* add ip, pc, #0xNN00000 */
91 0xe28cca00, /* add ip, ip, #0xNN000 */
92 0xe5bcf000, /* ldr pc, [ip, #0xNNN]! */
93 };
94
95#endif
252b5132 96
e5a52504
MM
97/* The entries in a PLT when using a DLL-based target with multiple
98 address spaces. */
99static const bfd_vma elf32_arm_symbian_plt_entry [] =
100 {
101 0xe51ff004, /* ldr pr, [pc, #-4] */
102 0x00000000, /* dcd R_ARM_GLOB_DAT(X) */
103 };
104
e489d0ae
PB
105/* Used to build a map of a section. This is required for mixed-endian
106 code/data. */
107
108typedef struct elf32_elf_section_map
109{
110 bfd_vma vma;
111 char type;
112}
113elf32_arm_section_map;
114
115struct _arm_elf_section_data
116{
117 struct bfd_elf_section_data elf;
118 int mapcount;
119 elf32_arm_section_map *map;
120};
121
122#define elf32_arm_section_data(sec) \
123 ((struct _arm_elf_section_data *) elf_section_data (sec))
124
252b5132
RH
125/* The ARM linker needs to keep track of the number of relocs that it
126 decides to copy in check_relocs for each symbol. This is so that
127 it can discard PC relative relocs if it doesn't need them when
128 linking with -Bsymbolic. We store the information in a field
129 extending the regular ELF linker hash table. */
130
131/* This structure keeps track of the number of PC relative relocs we
132 have copied for a given symbol. */
5e681ec4 133struct elf32_arm_relocs_copied
917583ad
NC
134 {
135 /* Next section. */
5e681ec4 136 struct elf32_arm_relocs_copied * next;
917583ad
NC
137 /* A section in dynobj. */
138 asection * section;
139 /* Number of relocs copied in this section. */
140 bfd_size_type count;
141 };
252b5132 142
ba96a88f 143/* Arm ELF linker hash entry. */
252b5132 144struct elf32_arm_link_hash_entry
917583ad
NC
145 {
146 struct elf_link_hash_entry root;
252b5132 147
917583ad 148 /* Number of PC relative relocs copied for this symbol. */
5e681ec4 149 struct elf32_arm_relocs_copied * relocs_copied;
917583ad 150 };
252b5132 151
252b5132 152/* Traverse an arm ELF linker hash table. */
252b5132
RH
153#define elf32_arm_link_hash_traverse(table, func, info) \
154 (elf_link_hash_traverse \
155 (&(table)->root, \
57e8b36a 156 (bfd_boolean (*) (struct elf_link_hash_entry *, void *))) (func), \
252b5132
RH
157 (info)))
158
159/* Get the ARM elf linker hash table from a link_info structure. */
160#define elf32_arm_hash_table(info) \
161 ((struct elf32_arm_link_hash_table *) ((info)->hash))
162
9b485d32 163/* ARM ELF linker hash table. */
252b5132 164struct elf32_arm_link_hash_table
917583ad
NC
165 {
166 /* The main hash table. */
167 struct elf_link_hash_table root;
252b5132 168
4cc11e76 169 /* The size in bytes of the section containing the Thumb-to-ARM glue. */
dc810e39 170 bfd_size_type thumb_glue_size;
252b5132 171
4cc11e76 172 /* The size in bytes of the section containing the ARM-to-Thumb glue. */
dc810e39 173 bfd_size_type arm_glue_size;
252b5132 174
4cc11e76 175 /* An arbitrary input BFD chosen to hold the glue sections. */
917583ad 176 bfd * bfd_of_glue_owner;
ba96a88f 177
917583ad
NC
178 /* A boolean indicating whether knowledge of the ARM's pipeline
179 length should be applied by the linker. */
180 int no_pipeline_knowledge;
5e681ec4 181
e489d0ae
PB
182 /* Nonzero to output a BE8 image. */
183 int byteswap_code;
184
9c504268
PB
185 /* Zero if R_ARM_TARGET1 means R_ARM_ABS32.
186 Nonzero if R_ARM_TARGET1 means R_ARM_ABS32. */
187 int target1_is_rel;
188
e5a52504
MM
189 /* The number of bytes in the initial entry in the PLT. */
190 bfd_size_type plt_header_size;
191
192 /* The number of bytes in the subsequent PLT etries. */
193 bfd_size_type plt_entry_size;
194
195 /* True if the target system is Symbian OS. */
196 int symbian_p;
197
5e681ec4
PB
198 /* Short-cuts to get to dynamic linker sections. */
199 asection *sgot;
200 asection *sgotplt;
201 asection *srelgot;
202 asection *splt;
203 asection *srelplt;
204 asection *sdynbss;
205 asection *srelbss;
206
207 /* Small local sym to section mapping cache. */
208 struct sym_sec_cache sym_sec;
917583ad 209 };
252b5132 210
780a67af
NC
211/* Create an entry in an ARM ELF linker hash table. */
212
213static struct bfd_hash_entry *
57e8b36a
NC
214elf32_arm_link_hash_newfunc (struct bfd_hash_entry * entry,
215 struct bfd_hash_table * table,
216 const char * string)
780a67af
NC
217{
218 struct elf32_arm_link_hash_entry * ret =
219 (struct elf32_arm_link_hash_entry *) entry;
220
221 /* Allocate the structure if it has not already been allocated by a
222 subclass. */
223 if (ret == (struct elf32_arm_link_hash_entry *) NULL)
57e8b36a
NC
224 ret = bfd_hash_allocate (table, sizeof (struct elf32_arm_link_hash_entry));
225 if (ret == NULL)
780a67af
NC
226 return (struct bfd_hash_entry *) ret;
227
228 /* Call the allocation method of the superclass. */
229 ret = ((struct elf32_arm_link_hash_entry *)
230 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
231 table, string));
57e8b36a 232 if (ret != NULL)
5e681ec4 233 ret->relocs_copied = NULL;
780a67af
NC
234
235 return (struct bfd_hash_entry *) ret;
236}
237
5e681ec4
PB
238/* Create .got, .gotplt, and .rel.got sections in DYNOBJ, and set up
239 shortcuts to them in our hash table. */
240
241static bfd_boolean
57e8b36a 242create_got_section (bfd *dynobj, struct bfd_link_info *info)
5e681ec4
PB
243{
244 struct elf32_arm_link_hash_table *htab;
245
e5a52504
MM
246 htab = elf32_arm_hash_table (info);
247 /* BPABI objects never have a GOT, or associated sections. */
248 if (htab->symbian_p)
249 return TRUE;
250
5e681ec4
PB
251 if (! _bfd_elf_create_got_section (dynobj, info))
252 return FALSE;
253
5e681ec4
PB
254 htab->sgot = bfd_get_section_by_name (dynobj, ".got");
255 htab->sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
256 if (!htab->sgot || !htab->sgotplt)
257 abort ();
258
259 htab->srelgot = bfd_make_section (dynobj, ".rel.got");
260 if (htab->srelgot == NULL
261 || ! bfd_set_section_flags (dynobj, htab->srelgot,
262 (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
263 | SEC_IN_MEMORY | SEC_LINKER_CREATED
264 | SEC_READONLY))
265 || ! bfd_set_section_alignment (dynobj, htab->srelgot, 2))
266 return FALSE;
267 return TRUE;
268}
269
270/* Create .plt, .rel.plt, .got, .got.plt, .rel.got, .dynbss, and
271 .rel.bss sections in DYNOBJ, and set up shortcuts to them in our
272 hash table. */
273
274static bfd_boolean
57e8b36a 275elf32_arm_create_dynamic_sections (bfd *dynobj, struct bfd_link_info *info)
5e681ec4
PB
276{
277 struct elf32_arm_link_hash_table *htab;
278
279 htab = elf32_arm_hash_table (info);
280 if (!htab->sgot && !create_got_section (dynobj, info))
281 return FALSE;
282
283 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
284 return FALSE;
285
286 htab->splt = bfd_get_section_by_name (dynobj, ".plt");
287 htab->srelplt = bfd_get_section_by_name (dynobj, ".rel.plt");
288 htab->sdynbss = bfd_get_section_by_name (dynobj, ".dynbss");
289 if (!info->shared)
290 htab->srelbss = bfd_get_section_by_name (dynobj, ".rel.bss");
291
e5a52504
MM
292 if (!htab->splt
293 || !htab->srelplt
294 || !htab->sdynbss
5e681ec4
PB
295 || (!info->shared && !htab->srelbss))
296 abort ();
297
298 return TRUE;
299}
300
301/* Copy the extra info we tack onto an elf_link_hash_entry. */
302
303static void
304elf32_arm_copy_indirect_symbol (const struct elf_backend_data *bed,
305 struct elf_link_hash_entry *dir,
306 struct elf_link_hash_entry *ind)
307{
308 struct elf32_arm_link_hash_entry *edir, *eind;
309
310 edir = (struct elf32_arm_link_hash_entry *) dir;
311 eind = (struct elf32_arm_link_hash_entry *) ind;
312
313 if (eind->relocs_copied != NULL)
314 {
315 if (edir->relocs_copied != NULL)
316 {
317 struct elf32_arm_relocs_copied **pp;
318 struct elf32_arm_relocs_copied *p;
319
320 if (ind->root.type == bfd_link_hash_indirect)
321 abort ();
322
323 /* Add reloc counts against the weak sym to the strong sym
324 list. Merge any entries against the same section. */
325 for (pp = &eind->relocs_copied; (p = *pp) != NULL; )
326 {
327 struct elf32_arm_relocs_copied *q;
328
329 for (q = edir->relocs_copied; q != NULL; q = q->next)
330 if (q->section == p->section)
331 {
5e681ec4
PB
332 q->count += p->count;
333 *pp = p->next;
334 break;
335 }
336 if (q == NULL)
337 pp = &p->next;
338 }
339 *pp = edir->relocs_copied;
340 }
341
342 edir->relocs_copied = eind->relocs_copied;
343 eind->relocs_copied = NULL;
344 }
345
346 _bfd_elf_link_hash_copy_indirect (bed, dir, ind);
347}
348
9b485d32 349/* Create an ARM elf linker hash table. */
252b5132
RH
350
351static struct bfd_link_hash_table *
57e8b36a 352elf32_arm_link_hash_table_create (bfd *abfd)
252b5132
RH
353{
354 struct elf32_arm_link_hash_table *ret;
dc810e39 355 bfd_size_type amt = sizeof (struct elf32_arm_link_hash_table);
252b5132 356
57e8b36a
NC
357 ret = bfd_malloc (amt);
358 if (ret == NULL)
252b5132
RH
359 return NULL;
360
57e8b36a 361 if (!_bfd_elf_link_hash_table_init (& ret->root, abfd,
780a67af 362 elf32_arm_link_hash_newfunc))
252b5132 363 {
e2d34d7d 364 free (ret);
252b5132
RH
365 return NULL;
366 }
367
5e681ec4
PB
368 ret->sgot = NULL;
369 ret->sgotplt = NULL;
370 ret->srelgot = NULL;
371 ret->splt = NULL;
372 ret->srelplt = NULL;
373 ret->sdynbss = NULL;
374 ret->srelbss = NULL;
252b5132
RH
375 ret->thumb_glue_size = 0;
376 ret->arm_glue_size = 0;
377 ret->bfd_of_glue_owner = NULL;
ba96a88f 378 ret->no_pipeline_knowledge = 0;
e489d0ae 379 ret->byteswap_code = 0;
9c504268 380 ret->target1_is_rel = 0;
e5a52504
MM
381#ifdef FOUR_WORD_PLT
382 ret->plt_header_size = 16;
383 ret->plt_entry_size = 16;
384#else
385 ret->plt_header_size = 20;
386 ret->plt_entry_size = 12;
387#endif
388 ret->symbian_p = 0;
5e681ec4 389 ret->sym_sec.abfd = NULL;
252b5132
RH
390
391 return &ret->root.root;
392}
393
9b485d32
NC
394/* Locate the Thumb encoded calling stub for NAME. */
395
252b5132 396static struct elf_link_hash_entry *
57e8b36a
NC
397find_thumb_glue (struct bfd_link_info *link_info,
398 const char *name,
399 bfd *input_bfd)
252b5132
RH
400{
401 char *tmp_name;
402 struct elf_link_hash_entry *hash;
403 struct elf32_arm_link_hash_table *hash_table;
404
405 /* We need a pointer to the armelf specific hash table. */
406 hash_table = elf32_arm_hash_table (link_info);
407
57e8b36a
NC
408 tmp_name = bfd_malloc ((bfd_size_type) strlen (name)
409 + strlen (THUMB2ARM_GLUE_ENTRY_NAME) + 1);
252b5132
RH
410
411 BFD_ASSERT (tmp_name);
412
413 sprintf (tmp_name, THUMB2ARM_GLUE_ENTRY_NAME, name);
414
415 hash = elf_link_hash_lookup
b34976b6 416 (&(hash_table)->root, tmp_name, FALSE, FALSE, TRUE);
252b5132
RH
417
418 if (hash == NULL)
419 /* xgettext:c-format */
d003868e
AM
420 (*_bfd_error_handler) (_("%B: unable to find THUMB glue '%s' for `%s'"),
421 input_bfd, tmp_name, name);
252b5132
RH
422
423 free (tmp_name);
424
425 return hash;
426}
427
9b485d32
NC
428/* Locate the ARM encoded calling stub for NAME. */
429
252b5132 430static struct elf_link_hash_entry *
57e8b36a
NC
431find_arm_glue (struct bfd_link_info *link_info,
432 const char *name,
433 bfd *input_bfd)
252b5132
RH
434{
435 char *tmp_name;
436 struct elf_link_hash_entry *myh;
437 struct elf32_arm_link_hash_table *hash_table;
438
439 /* We need a pointer to the elfarm specific hash table. */
440 hash_table = elf32_arm_hash_table (link_info);
441
57e8b36a
NC
442 tmp_name = bfd_malloc ((bfd_size_type) strlen (name)
443 + strlen (ARM2THUMB_GLUE_ENTRY_NAME) + 1);
252b5132
RH
444
445 BFD_ASSERT (tmp_name);
446
447 sprintf (tmp_name, ARM2THUMB_GLUE_ENTRY_NAME, name);
448
449 myh = elf_link_hash_lookup
b34976b6 450 (&(hash_table)->root, tmp_name, FALSE, FALSE, TRUE);
252b5132
RH
451
452 if (myh == NULL)
453 /* xgettext:c-format */
d003868e
AM
454 (*_bfd_error_handler) (_("%B: unable to find ARM glue '%s' for `%s'"),
455 input_bfd, tmp_name, name);
252b5132
RH
456
457 free (tmp_name);
458
459 return myh;
460}
461
9b485d32 462/* ARM->Thumb glue:
252b5132
RH
463
464 .arm
465 __func_from_arm:
466 ldr r12, __func_addr
467 bx r12
468 __func_addr:
9b485d32 469 .word func @ behave as if you saw a ARM_32 reloc. */
252b5132
RH
470
471#define ARM2THUMB_GLUE_SIZE 12
472static const insn32 a2t1_ldr_insn = 0xe59fc000;
473static const insn32 a2t2_bx_r12_insn = 0xe12fff1c;
474static const insn32 a2t3_func_addr_insn = 0x00000001;
475
9b485d32 476/* Thumb->ARM: Thumb->(non-interworking aware) ARM
252b5132
RH
477
478 .thumb .thumb
479 .align 2 .align 2
480 __func_from_thumb: __func_from_thumb:
481 bx pc push {r6, lr}
482 nop ldr r6, __func_addr
483 .arm mov lr, pc
484 __func_change_to_arm: bx r6
485 b func .arm
486 __func_back_to_thumb:
487 ldmia r13! {r6, lr}
488 bx lr
489 __func_addr:
9b485d32 490 .word func */
252b5132
RH
491
492#define THUMB2ARM_GLUE_SIZE 8
493static const insn16 t2a1_bx_pc_insn = 0x4778;
494static const insn16 t2a2_noop_insn = 0x46c0;
495static const insn32 t2a3_b_insn = 0xea000000;
496
7e392df6 497#ifndef ELFARM_NABI_C_INCLUDED
b34976b6 498bfd_boolean
57e8b36a 499bfd_elf32_arm_allocate_interworking_sections (struct bfd_link_info * info)
252b5132
RH
500{
501 asection * s;
502 bfd_byte * foo;
503 struct elf32_arm_link_hash_table * globals;
504
505 globals = elf32_arm_hash_table (info);
506
507 BFD_ASSERT (globals != NULL);
508
509 if (globals->arm_glue_size != 0)
510 {
511 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
512
dc810e39
AM
513 s = bfd_get_section_by_name (globals->bfd_of_glue_owner,
514 ARM2THUMB_GLUE_SECTION_NAME);
252b5132
RH
515
516 BFD_ASSERT (s != NULL);
517
57e8b36a 518 foo = bfd_alloc (globals->bfd_of_glue_owner, globals->arm_glue_size);
252b5132 519
eea6121a 520 s->size = globals->arm_glue_size;
252b5132
RH
521 s->contents = foo;
522 }
523
524 if (globals->thumb_glue_size != 0)
525 {
526 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
527
528 s = bfd_get_section_by_name
529 (globals->bfd_of_glue_owner, THUMB2ARM_GLUE_SECTION_NAME);
530
531 BFD_ASSERT (s != NULL);
532
57e8b36a 533 foo = bfd_alloc (globals->bfd_of_glue_owner, globals->thumb_glue_size);
252b5132 534
eea6121a 535 s->size = globals->thumb_glue_size;
252b5132
RH
536 s->contents = foo;
537 }
538
b34976b6 539 return TRUE;
252b5132
RH
540}
541
542static void
57e8b36a
NC
543record_arm_to_thumb_glue (struct bfd_link_info * link_info,
544 struct elf_link_hash_entry * h)
252b5132
RH
545{
546 const char * name = h->root.root.string;
63b0f745 547 asection * s;
252b5132
RH
548 char * tmp_name;
549 struct elf_link_hash_entry * myh;
14a793b2 550 struct bfd_link_hash_entry * bh;
252b5132 551 struct elf32_arm_link_hash_table * globals;
dc810e39 552 bfd_vma val;
252b5132
RH
553
554 globals = elf32_arm_hash_table (link_info);
555
556 BFD_ASSERT (globals != NULL);
557 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
558
559 s = bfd_get_section_by_name
560 (globals->bfd_of_glue_owner, ARM2THUMB_GLUE_SECTION_NAME);
561
252b5132
RH
562 BFD_ASSERT (s != NULL);
563
57e8b36a 564 tmp_name = bfd_malloc ((bfd_size_type) strlen (name) + strlen (ARM2THUMB_GLUE_ENTRY_NAME) + 1);
252b5132
RH
565
566 BFD_ASSERT (tmp_name);
567
568 sprintf (tmp_name, ARM2THUMB_GLUE_ENTRY_NAME, name);
569
570 myh = elf_link_hash_lookup
b34976b6 571 (&(globals)->root, tmp_name, FALSE, FALSE, TRUE);
252b5132
RH
572
573 if (myh != NULL)
574 {
9b485d32 575 /* We've already seen this guy. */
252b5132 576 free (tmp_name);
9b485d32 577 return;
252b5132
RH
578 }
579
57e8b36a
NC
580 /* The only trick here is using hash_table->arm_glue_size as the value.
581 Even though the section isn't allocated yet, this is where we will be
582 putting it. */
14a793b2 583 bh = NULL;
dc810e39
AM
584 val = globals->arm_glue_size + 1;
585 _bfd_generic_link_add_one_symbol (link_info, globals->bfd_of_glue_owner,
586 tmp_name, BSF_GLOBAL, s, val,
b34976b6 587 NULL, TRUE, FALSE, &bh);
252b5132
RH
588
589 free (tmp_name);
590
591 globals->arm_glue_size += ARM2THUMB_GLUE_SIZE;
592
593 return;
594}
595
596static void
57e8b36a
NC
597record_thumb_to_arm_glue (struct bfd_link_info *link_info,
598 struct elf_link_hash_entry *h)
252b5132
RH
599{
600 const char *name = h->root.root.string;
63b0f745 601 asection *s;
252b5132
RH
602 char *tmp_name;
603 struct elf_link_hash_entry *myh;
14a793b2 604 struct bfd_link_hash_entry *bh;
252b5132
RH
605 struct elf32_arm_link_hash_table *hash_table;
606 char bind;
dc810e39 607 bfd_vma val;
252b5132
RH
608
609 hash_table = elf32_arm_hash_table (link_info);
610
611 BFD_ASSERT (hash_table != NULL);
612 BFD_ASSERT (hash_table->bfd_of_glue_owner != NULL);
613
614 s = bfd_get_section_by_name
615 (hash_table->bfd_of_glue_owner, THUMB2ARM_GLUE_SECTION_NAME);
616
617 BFD_ASSERT (s != NULL);
618
57e8b36a
NC
619 tmp_name = bfd_malloc ((bfd_size_type) strlen (name)
620 + strlen (THUMB2ARM_GLUE_ENTRY_NAME) + 1);
252b5132
RH
621
622 BFD_ASSERT (tmp_name);
623
624 sprintf (tmp_name, THUMB2ARM_GLUE_ENTRY_NAME, name);
625
626 myh = elf_link_hash_lookup
b34976b6 627 (&(hash_table)->root, tmp_name, FALSE, FALSE, TRUE);
252b5132
RH
628
629 if (myh != NULL)
630 {
9b485d32 631 /* We've already seen this guy. */
252b5132 632 free (tmp_name);
9b485d32 633 return;
252b5132
RH
634 }
635
14a793b2 636 bh = NULL;
dc810e39
AM
637 val = hash_table->thumb_glue_size + 1;
638 _bfd_generic_link_add_one_symbol (link_info, hash_table->bfd_of_glue_owner,
639 tmp_name, BSF_GLOBAL, s, val,
b34976b6 640 NULL, TRUE, FALSE, &bh);
252b5132 641
9b485d32 642 /* If we mark it 'Thumb', the disassembler will do a better job. */
14a793b2 643 myh = (struct elf_link_hash_entry *) bh;
252b5132
RH
644 bind = ELF_ST_BIND (myh->type);
645 myh->type = ELF_ST_INFO (bind, STT_ARM_TFUNC);
646
647 free (tmp_name);
648
252b5132
RH
649#define CHANGE_TO_ARM "__%s_change_to_arm"
650#define BACK_FROM_ARM "__%s_back_from_arm"
651
9b485d32 652 /* Allocate another symbol to mark where we switch to Arm mode. */
57e8b36a
NC
653 tmp_name = bfd_malloc ((bfd_size_type) strlen (name)
654 + strlen (CHANGE_TO_ARM) + 1);
252b5132
RH
655
656 BFD_ASSERT (tmp_name);
657
658 sprintf (tmp_name, CHANGE_TO_ARM, name);
659
14a793b2 660 bh = NULL;
dc810e39
AM
661 val = hash_table->thumb_glue_size + 4,
662 _bfd_generic_link_add_one_symbol (link_info, hash_table->bfd_of_glue_owner,
663 tmp_name, BSF_LOCAL, s, val,
b34976b6 664 NULL, TRUE, FALSE, &bh);
252b5132
RH
665
666 free (tmp_name);
667
668 hash_table->thumb_glue_size += THUMB2ARM_GLUE_SIZE;
669
670 return;
671}
672
8afb0e02
NC
673/* Add the glue sections to ABFD. This function is called from the
674 linker scripts in ld/emultempl/{armelf}.em. */
9b485d32 675
b34976b6 676bfd_boolean
57e8b36a
NC
677bfd_elf32_arm_add_glue_sections_to_bfd (bfd *abfd,
678 struct bfd_link_info *info)
252b5132 679{
252b5132
RH
680 flagword flags;
681 asection *sec;
682
8afb0e02
NC
683 /* If we are only performing a partial
684 link do not bother adding the glue. */
1049f94e 685 if (info->relocatable)
b34976b6 686 return TRUE;
252b5132 687
252b5132
RH
688 sec = bfd_get_section_by_name (abfd, ARM2THUMB_GLUE_SECTION_NAME);
689
690 if (sec == NULL)
691 {
57db232e
NC
692 /* Note: we do not include the flag SEC_LINKER_CREATED, as this
693 will prevent elf_link_input_bfd() from processing the contents
694 of this section. */
811b4bf6 695 flags = SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_CODE | SEC_READONLY;
252b5132
RH
696
697 sec = bfd_make_section (abfd, ARM2THUMB_GLUE_SECTION_NAME);
698
699 if (sec == NULL
700 || !bfd_set_section_flags (abfd, sec, flags)
701 || !bfd_set_section_alignment (abfd, sec, 2))
b34976b6 702 return FALSE;
9a5aca8c 703
57db232e
NC
704 /* Set the gc mark to prevent the section from being removed by garbage
705 collection, despite the fact that no relocs refer to this section. */
706 sec->gc_mark = 1;
252b5132
RH
707 }
708
709 sec = bfd_get_section_by_name (abfd, THUMB2ARM_GLUE_SECTION_NAME);
710
711 if (sec == NULL)
712 {
57e8b36a
NC
713 flags = SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
714 | SEC_CODE | SEC_READONLY;
252b5132
RH
715
716 sec = bfd_make_section (abfd, THUMB2ARM_GLUE_SECTION_NAME);
717
718 if (sec == NULL
719 || !bfd_set_section_flags (abfd, sec, flags)
720 || !bfd_set_section_alignment (abfd, sec, 2))
b34976b6 721 return FALSE;
9a5aca8c 722
57db232e 723 sec->gc_mark = 1;
252b5132
RH
724 }
725
b34976b6 726 return TRUE;
8afb0e02
NC
727}
728
729/* Select a BFD to be used to hold the sections used by the glue code.
730 This function is called from the linker scripts in ld/emultempl/
731 {armelf/pe}.em */
732
b34976b6 733bfd_boolean
57e8b36a 734bfd_elf32_arm_get_bfd_for_interworking (bfd *abfd, struct bfd_link_info *info)
8afb0e02
NC
735{
736 struct elf32_arm_link_hash_table *globals;
737
738 /* If we are only performing a partial link
739 do not bother getting a bfd to hold the glue. */
1049f94e 740 if (info->relocatable)
b34976b6 741 return TRUE;
8afb0e02
NC
742
743 globals = elf32_arm_hash_table (info);
744
745 BFD_ASSERT (globals != NULL);
746
747 if (globals->bfd_of_glue_owner != NULL)
b34976b6 748 return TRUE;
8afb0e02 749
252b5132
RH
750 /* Save the bfd for later use. */
751 globals->bfd_of_glue_owner = abfd;
cedb70c5 752
b34976b6 753 return TRUE;
252b5132
RH
754}
755
b34976b6 756bfd_boolean
57e8b36a
NC
757bfd_elf32_arm_process_before_allocation (bfd *abfd,
758 struct bfd_link_info *link_info,
759 int no_pipeline_knowledge,
9c504268
PB
760 int byteswap_code,
761 int target1_is_rel)
252b5132
RH
762{
763 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 764 Elf_Internal_Rela *internal_relocs = NULL;
252b5132
RH
765 Elf_Internal_Rela *irel, *irelend;
766 bfd_byte *contents = NULL;
252b5132
RH
767
768 asection *sec;
769 struct elf32_arm_link_hash_table *globals;
770
771 /* If we are only performing a partial link do not bother
772 to construct any glue. */
1049f94e 773 if (link_info->relocatable)
b34976b6 774 return TRUE;
252b5132
RH
775
776 /* Here we have a bfd that is to be included on the link. We have a hook
777 to do reloc rummaging, before section sizes are nailed down. */
252b5132
RH
778 globals = elf32_arm_hash_table (link_info);
779
780 BFD_ASSERT (globals != NULL);
781 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
782
ba96a88f 783 globals->no_pipeline_knowledge = no_pipeline_knowledge;
9c504268 784 globals->target1_is_rel = target1_is_rel;
e489d0ae
PB
785 if (byteswap_code && !bfd_big_endian (abfd))
786 {
d003868e
AM
787 _bfd_error_handler (_("%B: BE8 images only valid in big-endian mode."),
788 abfd);
e489d0ae
PB
789 return FALSE;
790 }
791 globals->byteswap_code = byteswap_code;
f21f3fe0 792
252b5132
RH
793 /* Rummage around all the relocs and map the glue vectors. */
794 sec = abfd->sections;
795
796 if (sec == NULL)
b34976b6 797 return TRUE;
252b5132
RH
798
799 for (; sec != NULL; sec = sec->next)
800 {
801 if (sec->reloc_count == 0)
802 continue;
803
804 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
252b5132 805
9b485d32 806 /* Load the relocs. */
6cdc0ccc 807 internal_relocs
57e8b36a 808 = _bfd_elf_link_read_relocs (abfd, sec, (void *) NULL,
45d6a902 809 (Elf_Internal_Rela *) NULL, FALSE);
252b5132 810
6cdc0ccc
AM
811 if (internal_relocs == NULL)
812 goto error_return;
252b5132 813
6cdc0ccc
AM
814 irelend = internal_relocs + sec->reloc_count;
815 for (irel = internal_relocs; irel < irelend; irel++)
252b5132
RH
816 {
817 long r_type;
818 unsigned long r_index;
252b5132
RH
819
820 struct elf_link_hash_entry *h;
821
822 r_type = ELF32_R_TYPE (irel->r_info);
823 r_index = ELF32_R_SYM (irel->r_info);
824
9b485d32 825 /* These are the only relocation types we care about. */
ba96a88f 826 if ( r_type != R_ARM_PC24
252b5132
RH
827 && r_type != R_ARM_THM_PC22)
828 continue;
829
830 /* Get the section contents if we haven't done so already. */
831 if (contents == NULL)
832 {
833 /* Get cached copy if it exists. */
834 if (elf_section_data (sec)->this_hdr.contents != NULL)
835 contents = elf_section_data (sec)->this_hdr.contents;
836 else
837 {
838 /* Go get them off disk. */
57e8b36a 839 if (! bfd_malloc_and_get_section (abfd, sec, &contents))
252b5132
RH
840 goto error_return;
841 }
842 }
843
a7c10850 844 /* If the relocation is not against a symbol it cannot concern us. */
252b5132
RH
845 h = NULL;
846
9b485d32 847 /* We don't care about local symbols. */
252b5132
RH
848 if (r_index < symtab_hdr->sh_info)
849 continue;
850
9b485d32 851 /* This is an external symbol. */
252b5132
RH
852 r_index -= symtab_hdr->sh_info;
853 h = (struct elf_link_hash_entry *)
854 elf_sym_hashes (abfd)[r_index];
855
856 /* If the relocation is against a static symbol it must be within
857 the current section and so cannot be a cross ARM/Thumb relocation. */
858 if (h == NULL)
859 continue;
860
861 switch (r_type)
862 {
863 case R_ARM_PC24:
864 /* This one is a call from arm code. We need to look up
2f0ca46a 865 the target of the call. If it is a thumb target, we
252b5132 866 insert glue. */
252b5132
RH
867 if (ELF_ST_TYPE(h->type) == STT_ARM_TFUNC)
868 record_arm_to_thumb_glue (link_info, h);
869 break;
870
871 case R_ARM_THM_PC22:
f21f3fe0 872 /* This one is a call from thumb code. We look
2f0ca46a 873 up the target of the call. If it is not a thumb
bcbdc74c 874 target, we insert glue. */
252b5132
RH
875 if (ELF_ST_TYPE (h->type) != STT_ARM_TFUNC)
876 record_thumb_to_arm_glue (link_info, h);
877 break;
878
879 default:
880 break;
881 }
882 }
6cdc0ccc
AM
883
884 if (contents != NULL
885 && elf_section_data (sec)->this_hdr.contents != contents)
886 free (contents);
887 contents = NULL;
888
889 if (internal_relocs != NULL
890 && elf_section_data (sec)->relocs != internal_relocs)
891 free (internal_relocs);
892 internal_relocs = NULL;
252b5132
RH
893 }
894
b34976b6 895 return TRUE;
9a5aca8c 896
252b5132 897error_return:
6cdc0ccc
AM
898 if (contents != NULL
899 && elf_section_data (sec)->this_hdr.contents != contents)
900 free (contents);
901 if (internal_relocs != NULL
902 && elf_section_data (sec)->relocs != internal_relocs)
903 free (internal_relocs);
9a5aca8c 904
b34976b6 905 return FALSE;
252b5132 906}
7e392df6 907#endif
252b5132
RH
908
909/* The thumb form of a long branch is a bit finicky, because the offset
910 encoding is split over two fields, each in it's own instruction. They
f21f3fe0 911 can occur in any order. So given a thumb form of long branch, and an
252b5132 912 offset, insert the offset into the thumb branch and return finished
f21f3fe0 913 instruction.
252b5132 914
f21f3fe0 915 It takes two thumb instructions to encode the target address. Each has
4cc11e76 916 11 bits to invest. The upper 11 bits are stored in one (identified by
f21f3fe0
UD
917 H-0.. see below), the lower 11 bits are stored in the other (identified
918 by H-1).
252b5132 919
f21f3fe0 920 Combine together and shifted left by 1 (it's a half word address) and
252b5132
RH
921 there you have it.
922
923 Op: 1111 = F,
924 H-0, upper address-0 = 000
925 Op: 1111 = F,
926 H-1, lower address-0 = 800
927
f21f3fe0 928 They can be ordered either way, but the arm tools I've seen always put
252b5132
RH
929 the lower one first. It probably doesn't matter. krk@cygnus.com
930
931 XXX: Actually the order does matter. The second instruction (H-1)
932 moves the computed address into the PC, so it must be the second one
933 in the sequence. The problem, however is that whilst little endian code
934 stores the instructions in HI then LOW order, big endian code does the
dfc5f959 935 reverse. nickc@cygnus.com. */
252b5132 936
dfc5f959
NC
937#define LOW_HI_ORDER 0xF800F000
938#define HI_LOW_ORDER 0xF000F800
252b5132
RH
939
940static insn32
57e8b36a 941insert_thumb_branch (insn32 br_insn, int rel_off)
252b5132
RH
942{
943 unsigned int low_bits;
944 unsigned int high_bits;
945
252b5132
RH
946 BFD_ASSERT ((rel_off & 1) != 1);
947
dfc5f959
NC
948 rel_off >>= 1; /* Half word aligned address. */
949 low_bits = rel_off & 0x000007FF; /* The bottom 11 bits. */
950 high_bits = (rel_off >> 11) & 0x000007FF; /* The top 11 bits. */
252b5132
RH
951
952 if ((br_insn & LOW_HI_ORDER) == LOW_HI_ORDER)
953 br_insn = LOW_HI_ORDER | (low_bits << 16) | high_bits;
954 else if ((br_insn & HI_LOW_ORDER) == HI_LOW_ORDER)
955 br_insn = HI_LOW_ORDER | (high_bits << 16) | low_bits;
956 else
9b485d32 957 /* FIXME: abort is probably not the right call. krk@cygnus.com */
57e8b36a 958 abort (); /* Error - not a valid branch instruction form. */
252b5132 959
252b5132
RH
960 return br_insn;
961}
962
9b485d32
NC
963/* Thumb code calling an ARM function. */
964
252b5132 965static int
57e8b36a
NC
966elf32_thumb_to_arm_stub (struct bfd_link_info * info,
967 const char * name,
968 bfd * input_bfd,
969 bfd * output_bfd,
970 asection * input_section,
971 bfd_byte * hit_data,
972 asection * sym_sec,
973 bfd_vma offset,
974 bfd_signed_vma addend,
975 bfd_vma val)
252b5132 976{
bcbdc74c 977 asection * s = 0;
dc810e39 978 bfd_vma my_offset;
252b5132
RH
979 unsigned long int tmp;
980 long int ret_offset;
bcbdc74c
NC
981 struct elf_link_hash_entry * myh;
982 struct elf32_arm_link_hash_table * globals;
252b5132
RH
983
984 myh = find_thumb_glue (info, name, input_bfd);
985 if (myh == NULL)
b34976b6 986 return FALSE;
252b5132
RH
987
988 globals = elf32_arm_hash_table (info);
989
990 BFD_ASSERT (globals != NULL);
991 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
992
993 my_offset = myh->root.u.def.value;
994
995 s = bfd_get_section_by_name (globals->bfd_of_glue_owner,
996 THUMB2ARM_GLUE_SECTION_NAME);
997
998 BFD_ASSERT (s != NULL);
999 BFD_ASSERT (s->contents != NULL);
1000 BFD_ASSERT (s->output_section != NULL);
1001
1002 if ((my_offset & 0x01) == 0x01)
1003 {
1004 if (sym_sec != NULL
1005 && sym_sec->owner != NULL
1006 && !INTERWORK_FLAG (sym_sec->owner))
1007 {
8f615d07 1008 (*_bfd_error_handler)
d003868e
AM
1009 (_("%B(%s): warning: interworking not enabled.\n"
1010 " first occurrence: %B: thumb call to arm"),
1011 sym_sec->owner, input_bfd, name);
252b5132 1012
b34976b6 1013 return FALSE;
252b5132
RH
1014 }
1015
1016 --my_offset;
1017 myh->root.u.def.value = my_offset;
1018
dc810e39 1019 bfd_put_16 (output_bfd, (bfd_vma) t2a1_bx_pc_insn,
252b5132
RH
1020 s->contents + my_offset);
1021
dc810e39 1022 bfd_put_16 (output_bfd, (bfd_vma) t2a2_noop_insn,
252b5132
RH
1023 s->contents + my_offset + 2);
1024
1025 ret_offset =
9b485d32
NC
1026 /* Address of destination of the stub. */
1027 ((bfd_signed_vma) val)
252b5132 1028 - ((bfd_signed_vma)
57e8b36a
NC
1029 /* Offset from the start of the current section
1030 to the start of the stubs. */
9b485d32
NC
1031 (s->output_offset
1032 /* Offset of the start of this stub from the start of the stubs. */
1033 + my_offset
1034 /* Address of the start of the current section. */
1035 + s->output_section->vma)
1036 /* The branch instruction is 4 bytes into the stub. */
1037 + 4
1038 /* ARM branches work from the pc of the instruction + 8. */
1039 + 8);
252b5132
RH
1040
1041 bfd_put_32 (output_bfd,
dc810e39 1042 (bfd_vma) t2a3_b_insn | ((ret_offset >> 2) & 0x00FFFFFF),
252b5132
RH
1043 s->contents + my_offset + 4);
1044 }
1045
1046 BFD_ASSERT (my_offset <= globals->thumb_glue_size);
1047
427bfd90
NC
1048 /* Now go back and fix up the original BL insn to point to here. */
1049 ret_offset =
1050 /* Address of where the stub is located. */
1051 (s->output_section->vma + s->output_offset + my_offset)
1052 /* Address of where the BL is located. */
57e8b36a
NC
1053 - (input_section->output_section->vma + input_section->output_offset
1054 + offset)
427bfd90
NC
1055 /* Addend in the relocation. */
1056 - addend
1057 /* Biassing for PC-relative addressing. */
1058 - 8;
252b5132
RH
1059
1060 tmp = bfd_get_32 (input_bfd, hit_data
1061 - input_section->vma);
1062
1063 bfd_put_32 (output_bfd,
dc810e39 1064 (bfd_vma) insert_thumb_branch (tmp, ret_offset),
252b5132
RH
1065 hit_data - input_section->vma);
1066
b34976b6 1067 return TRUE;
252b5132
RH
1068}
1069
9b485d32
NC
1070/* Arm code calling a Thumb function. */
1071
252b5132 1072static int
57e8b36a
NC
1073elf32_arm_to_thumb_stub (struct bfd_link_info * info,
1074 const char * name,
1075 bfd * input_bfd,
1076 bfd * output_bfd,
1077 asection * input_section,
1078 bfd_byte * hit_data,
1079 asection * sym_sec,
1080 bfd_vma offset,
1081 bfd_signed_vma addend,
1082 bfd_vma val)
252b5132
RH
1083{
1084 unsigned long int tmp;
dc810e39 1085 bfd_vma my_offset;
bcbdc74c 1086 asection * s;
252b5132 1087 long int ret_offset;
bcbdc74c
NC
1088 struct elf_link_hash_entry * myh;
1089 struct elf32_arm_link_hash_table * globals;
252b5132
RH
1090
1091 myh = find_arm_glue (info, name, input_bfd);
1092 if (myh == NULL)
b34976b6 1093 return FALSE;
252b5132
RH
1094
1095 globals = elf32_arm_hash_table (info);
1096
1097 BFD_ASSERT (globals != NULL);
1098 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
1099
1100 my_offset = myh->root.u.def.value;
1101 s = bfd_get_section_by_name (globals->bfd_of_glue_owner,
1102 ARM2THUMB_GLUE_SECTION_NAME);
1103 BFD_ASSERT (s != NULL);
1104 BFD_ASSERT (s->contents != NULL);
1105 BFD_ASSERT (s->output_section != NULL);
1106
1107 if ((my_offset & 0x01) == 0x01)
1108 {
1109 if (sym_sec != NULL
1110 && sym_sec->owner != NULL
1111 && !INTERWORK_FLAG (sym_sec->owner))
1112 {
8f615d07 1113 (*_bfd_error_handler)
d003868e
AM
1114 (_("%B(%s): warning: interworking not enabled.\n"
1115 " first occurrence: %B: arm call to thumb"),
1116 sym_sec->owner, input_bfd, name);
252b5132 1117 }
9b485d32 1118
252b5132
RH
1119 --my_offset;
1120 myh->root.u.def.value = my_offset;
1121
dc810e39 1122 bfd_put_32 (output_bfd, (bfd_vma) a2t1_ldr_insn,
252b5132
RH
1123 s->contents + my_offset);
1124
dc810e39 1125 bfd_put_32 (output_bfd, (bfd_vma) a2t2_bx_r12_insn,
252b5132
RH
1126 s->contents + my_offset + 4);
1127
1128 /* It's a thumb address. Add the low order bit. */
1129 bfd_put_32 (output_bfd, val | a2t3_func_addr_insn,
1130 s->contents + my_offset + 8);
1131 }
1132
1133 BFD_ASSERT (my_offset <= globals->arm_glue_size);
1134
1135 tmp = bfd_get_32 (input_bfd, hit_data);
1136 tmp = tmp & 0xFF000000;
1137
9b485d32 1138 /* Somehow these are both 4 too far, so subtract 8. */
dc810e39
AM
1139 ret_offset = (s->output_offset
1140 + my_offset
1141 + s->output_section->vma
1142 - (input_section->output_offset
1143 + input_section->output_section->vma
1144 + offset + addend)
1145 - 8);
9a5aca8c 1146
252b5132
RH
1147 tmp = tmp | ((ret_offset >> 2) & 0x00FFFFFF);
1148
dc810e39 1149 bfd_put_32 (output_bfd, (bfd_vma) tmp, hit_data - input_section->vma);
252b5132 1150
b34976b6 1151 return TRUE;
252b5132
RH
1152}
1153
1154/* Perform a relocation as part of a final link. */
9b485d32 1155
252b5132 1156static bfd_reloc_status_type
57e8b36a
NC
1157elf32_arm_final_link_relocate (reloc_howto_type * howto,
1158 bfd * input_bfd,
1159 bfd * output_bfd,
1160 asection * input_section,
1161 bfd_byte * contents,
1162 Elf_Internal_Rela * rel,
1163 bfd_vma value,
1164 struct bfd_link_info * info,
1165 asection * sym_sec,
1166 const char * sym_name,
1167 int sym_flags,
1168 struct elf_link_hash_entry * h)
252b5132
RH
1169{
1170 unsigned long r_type = howto->type;
1171 unsigned long r_symndx;
1172 bfd_byte * hit_data = contents + rel->r_offset;
1173 bfd * dynobj = NULL;
1174 Elf_Internal_Shdr * symtab_hdr;
1175 struct elf_link_hash_entry ** sym_hashes;
1176 bfd_vma * local_got_offsets;
1177 asection * sgot = NULL;
1178 asection * splt = NULL;
1179 asection * sreloc = NULL;
252b5132 1180 bfd_vma addend;
ba96a88f
NC
1181 bfd_signed_vma signed_addend;
1182 struct elf32_arm_link_hash_table * globals;
f21f3fe0 1183
9c504268
PB
1184 globals = elf32_arm_hash_table (info);
1185
1186#ifndef OLD_ARM_ABI
1187 /* Some relocation type map to different relocations depending on the
1188 target. We pick the right one here. */
1189 if (r_type == R_ARM_TARGET1)
1190 {
1191 if (globals->target1_is_rel)
1192 r_type = R_ARM_REL32;
1193 else
1194 r_type = R_ARM_ABS32;
1195
1196 howto = &elf32_arm_howto_table[r_type];
1197 }
1198#endif /* OLD_ARM_ABI */
1199
cac15327
NC
1200 /* If the start address has been set, then set the EF_ARM_HASENTRY
1201 flag. Setting this more than once is redundant, but the cost is
1202 not too high, and it keeps the code simple.
99e4ae17 1203
cac15327
NC
1204 The test is done here, rather than somewhere else, because the
1205 start address is only set just before the final link commences.
1206
1207 Note - if the user deliberately sets a start address of 0, the
1208 flag will not be set. */
1209 if (bfd_get_start_address (output_bfd) != 0)
1210 elf_elfheader (output_bfd)->e_flags |= EF_ARM_HASENTRY;
99e4ae17 1211
252b5132
RH
1212 dynobj = elf_hash_table (info)->dynobj;
1213 if (dynobj)
1214 {
1215 sgot = bfd_get_section_by_name (dynobj, ".got");
1216 splt = bfd_get_section_by_name (dynobj, ".plt");
1217 }
1218 symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr;
1219 sym_hashes = elf_sym_hashes (input_bfd);
1220 local_got_offsets = elf_local_got_offsets (input_bfd);
1221 r_symndx = ELF32_R_SYM (rel->r_info);
1222
acf8aed4 1223#if USE_REL
ba96a88f
NC
1224 addend = bfd_get_32 (input_bfd, hit_data) & howto->src_mask;
1225
1226 if (addend & ((howto->src_mask + 1) >> 1))
1227 {
1228 signed_addend = -1;
1229 signed_addend &= ~ howto->src_mask;
1230 signed_addend |= addend;
1231 }
1232 else
1233 signed_addend = addend;
252b5132 1234#else
ba96a88f 1235 addend = signed_addend = rel->r_addend;
252b5132 1236#endif
f21f3fe0 1237
252b5132
RH
1238 switch (r_type)
1239 {
1240 case R_ARM_NONE:
1241 return bfd_reloc_ok;
1242
1243 case R_ARM_PC24:
1244 case R_ARM_ABS32:
1245 case R_ARM_REL32:
dfc5f959
NC
1246#ifndef OLD_ARM_ABI
1247 case R_ARM_XPC25:
1248#endif
7359ea65 1249 case R_ARM_PLT32:
5e681ec4
PB
1250 /* r_symndx will be zero only for relocs against symbols
1251 from removed linkonce sections, or sections discarded by
1252 a linker script. */
1253 if (r_symndx == 0)
1254 return bfd_reloc_ok;
1255
7359ea65
DJ
1256 /* Handle relocations which should use the PLT entry. ABS32/REL32
1257 will use the symbol's value, which may point to a PLT entry, but we
1258 don't need to handle that here. If we created a PLT entry, all
1259 branches in this object should go to it. */
1260 if ((r_type != R_ARM_ABS32 && r_type != R_ARM_REL32)
1261 && h != NULL
c84cd8ee 1262 && splt != NULL
7359ea65
DJ
1263 && h->plt.offset != (bfd_vma) -1)
1264 {
c84cd8ee
DJ
1265 /* If we've created a .plt section, and assigned a PLT entry to
1266 this function, it should not be known to bind locally. If
1267 it were, we would have cleared the PLT entry. */
7359ea65
DJ
1268 BFD_ASSERT (!SYMBOL_CALLS_LOCAL (info, h));
1269
1270 value = (splt->output_section->vma
1271 + splt->output_offset
1272 + h->plt.offset);
1273 return _bfd_final_link_relocate (howto, input_bfd, input_section,
1274 contents, rel->r_offset, value,
1275 (bfd_vma) 0);
1276 }
1277
252b5132 1278 /* When generating a shared object, these relocations are copied
9b485d32 1279 into the output file to be resolved at run time. */
7359ea65
DJ
1280 if (info->shared
1281 && (input_section->flags & SEC_ALLOC)
955af222
PB
1282 && (r_type != R_ARM_REL32
1283 || !SYMBOL_CALLS_LOCAL (info, h))
7359ea65
DJ
1284 && (h == NULL
1285 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1286 || h->root.type != bfd_link_hash_undefweak)
1287 && r_type != R_ARM_PC24
1288 && r_type != R_ARM_PLT32)
252b5132 1289 {
947216bf
AM
1290 Elf_Internal_Rela outrel;
1291 bfd_byte *loc;
b34976b6 1292 bfd_boolean skip, relocate;
f21f3fe0 1293
252b5132
RH
1294 if (sreloc == NULL)
1295 {
1296 const char * name;
f21f3fe0 1297
252b5132
RH
1298 name = (bfd_elf_string_from_elf_section
1299 (input_bfd,
1300 elf_elfheader (input_bfd)->e_shstrndx,
1301 elf_section_data (input_section)->rel_hdr.sh_name));
1302 if (name == NULL)
1303 return bfd_reloc_notsupported;
f21f3fe0 1304
252b5132
RH
1305 BFD_ASSERT (strncmp (name, ".rel", 4) == 0
1306 && strcmp (bfd_get_section_name (input_bfd,
1307 input_section),
1308 name + 4) == 0);
f21f3fe0 1309
252b5132
RH
1310 sreloc = bfd_get_section_by_name (dynobj, name);
1311 BFD_ASSERT (sreloc != NULL);
1312 }
f21f3fe0 1313
b34976b6
AM
1314 skip = FALSE;
1315 relocate = FALSE;
f21f3fe0 1316
c629eae0
JJ
1317 outrel.r_offset =
1318 _bfd_elf_section_offset (output_bfd, info, input_section,
1319 rel->r_offset);
1320 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 1321 skip = TRUE;
0bb2d96a 1322 else if (outrel.r_offset == (bfd_vma) -2)
b34976b6 1323 skip = TRUE, relocate = TRUE;
252b5132
RH
1324 outrel.r_offset += (input_section->output_section->vma
1325 + input_section->output_offset);
f21f3fe0 1326
252b5132 1327 if (skip)
0bb2d96a 1328 memset (&outrel, 0, sizeof outrel);
5e681ec4
PB
1329 else if (h != NULL
1330 && h->dynindx != -1
7359ea65 1331 && (!info->shared
5e681ec4 1332 || !info->symbolic
f5385ebf 1333 || !h->def_regular))
5e681ec4 1334 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
252b5132
RH
1335 else
1336 {
5e681ec4
PB
1337 /* This symbol is local, or marked to become local. */
1338 relocate = TRUE;
1339 outrel.r_info = ELF32_R_INFO (0, R_ARM_RELATIVE);
252b5132 1340 }
f21f3fe0 1341
947216bf
AM
1342 loc = sreloc->contents;
1343 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rel);
1344 bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
9a5aca8c 1345
f21f3fe0 1346 /* If this reloc is against an external symbol, we do not want to
252b5132 1347 fiddle with the addend. Otherwise, we need to include the symbol
9b485d32 1348 value so that it becomes an addend for the dynamic reloc. */
252b5132
RH
1349 if (! relocate)
1350 return bfd_reloc_ok;
9a5aca8c 1351
f21f3fe0 1352 return _bfd_final_link_relocate (howto, input_bfd, input_section,
252b5132
RH
1353 contents, rel->r_offset, value,
1354 (bfd_vma) 0);
1355 }
1356 else switch (r_type)
1357 {
dfc5f959
NC
1358#ifndef OLD_ARM_ABI
1359 case R_ARM_XPC25: /* Arm BLX instruction. */
1360#endif
1361 case R_ARM_PC24: /* Arm B/BL instruction */
7359ea65 1362 case R_ARM_PLT32:
dfc5f959
NC
1363#ifndef OLD_ARM_ABI
1364 if (r_type == R_ARM_XPC25)
252b5132 1365 {
dfc5f959
NC
1366 /* Check for Arm calling Arm function. */
1367 /* FIXME: Should we translate the instruction into a BL
1368 instruction instead ? */
1369 if (sym_flags != STT_ARM_TFUNC)
d003868e
AM
1370 (*_bfd_error_handler)
1371 (_("\%B: Warning: Arm BLX instruction targets Arm function '%s'."),
1372 input_bfd,
1373 h ? h->root.root.string : "(local)");
dfc5f959
NC
1374 }
1375 else
1376#endif
1377 {
1378 /* Check for Arm calling Thumb function. */
1379 if (sym_flags == STT_ARM_TFUNC)
1380 {
57e8b36a
NC
1381 elf32_arm_to_thumb_stub (info, sym_name, input_bfd,
1382 output_bfd, input_section,
1383 hit_data, sym_sec, rel->r_offset,
dfc5f959
NC
1384 signed_addend, value);
1385 return bfd_reloc_ok;
1386 }
252b5132 1387 }
ba96a88f
NC
1388
1389 if ( strcmp (bfd_get_target (input_bfd), "elf32-littlearm-oabi") == 0
1390 || strcmp (bfd_get_target (input_bfd), "elf32-bigarm-oabi") == 0)
1391 {
1392 /* The old way of doing things. Trearing the addend as a
1393 byte sized field and adding in the pipeline offset. */
ba96a88f
NC
1394 value -= (input_section->output_section->vma
1395 + input_section->output_offset);
1396 value -= rel->r_offset;
1397 value += addend;
f21f3fe0 1398
ba96a88f
NC
1399 if (! globals->no_pipeline_knowledge)
1400 value -= 8;
1401 }
1402 else
1403 {
1404 /* The ARM ELF ABI says that this reloc is computed as: S - P + A
1405 where:
1406 S is the address of the symbol in the relocation.
1407 P is address of the instruction being relocated.
1408 A is the addend (extracted from the instruction) in bytes.
f21f3fe0 1409
ba96a88f 1410 S is held in 'value'.
57e8b36a
NC
1411 P is the base address of the section containing the
1412 instruction plus the offset of the reloc into that
1413 section, ie:
ba96a88f
NC
1414 (input_section->output_section->vma +
1415 input_section->output_offset +
1416 rel->r_offset).
1417 A is the addend, converted into bytes, ie:
1418 (signed_addend * 4)
1419
1420 Note: None of these operations have knowledge of the pipeline
57e8b36a
NC
1421 size of the processor, thus it is up to the assembler to
1422 encode this information into the addend. */
ba96a88f
NC
1423 value -= (input_section->output_section->vma
1424 + input_section->output_offset);
1425 value -= rel->r_offset;
1426 value += (signed_addend << howto->size);
f21f3fe0 1427
57e8b36a
NC
1428 /* Previous versions of this code also used to add in the
1429 pipeline offset here. This is wrong because the linker is
1430 not supposed to know about such things, and one day it might
1431 change. In order to support old binaries that need the old
1432 behaviour however, so we attempt to detect which ABI was
1433 used to create the reloc. */
ba96a88f 1434 if (! globals->no_pipeline_knowledge)
f21f3fe0 1435 {
ba96a88f 1436 Elf_Internal_Ehdr * i_ehdrp; /* Elf file header, internal form */
f21f3fe0 1437
ba96a88f 1438 i_ehdrp = elf_elfheader (input_bfd);
f21f3fe0 1439
ba96a88f
NC
1440 if (i_ehdrp->e_ident[EI_OSABI] == 0)
1441 value -= 8;
1442 }
1443 }
23080146 1444
dcb5e6e6
NC
1445 signed_addend = value;
1446 signed_addend >>= howto->rightshift;
9a5aca8c 1447
59f2c4e7
NC
1448 /* It is not an error for an undefined weak reference to be
1449 out of range. Any program that branches to such a symbol
9a5aca8c
AM
1450 is going to crash anyway, so there is no point worrying
1451 about getting the destination exactly right. */
59f2c4e7
NC
1452 if (! h || h->root.type != bfd_link_hash_undefweak)
1453 {
9b485d32 1454 /* Perform a signed range check. */
dcb5e6e6 1455 if ( signed_addend > ((bfd_signed_vma) (howto->dst_mask >> 1))
59f2c4e7
NC
1456 || signed_addend < - ((bfd_signed_vma) ((howto->dst_mask + 1) >> 1)))
1457 return bfd_reloc_overflow;
1458 }
9a5aca8c 1459
dcb5e6e6
NC
1460#ifndef OLD_ARM_ABI
1461 /* If necessary set the H bit in the BLX instruction. */
1462 if (r_type == R_ARM_XPC25 && ((value & 2) == 2))
1463 value = (signed_addend & howto->dst_mask)
1464 | (bfd_get_32 (input_bfd, hit_data) & (~ howto->dst_mask))
1465 | (1 << 24);
1466 else
1467#endif
1468 value = (signed_addend & howto->dst_mask)
1469 | (bfd_get_32 (input_bfd, hit_data) & (~ howto->dst_mask));
252b5132 1470 break;
f21f3fe0 1471
252b5132
RH
1472 case R_ARM_ABS32:
1473 value += addend;
1474 if (sym_flags == STT_ARM_TFUNC)
1475 value |= 1;
1476 break;
f21f3fe0 1477
252b5132
RH
1478 case R_ARM_REL32:
1479 value -= (input_section->output_section->vma
62efb346 1480 + input_section->output_offset + rel->r_offset);
252b5132
RH
1481 value += addend;
1482 break;
1483 }
f21f3fe0 1484
252b5132
RH
1485 bfd_put_32 (input_bfd, value, hit_data);
1486 return bfd_reloc_ok;
1487
1488 case R_ARM_ABS8:
1489 value += addend;
1490 if ((long) value > 0x7f || (long) value < -0x80)
1491 return bfd_reloc_overflow;
1492
1493 bfd_put_8 (input_bfd, value, hit_data);
1494 return bfd_reloc_ok;
1495
1496 case R_ARM_ABS16:
1497 value += addend;
1498
1499 if ((long) value > 0x7fff || (long) value < -0x8000)
1500 return bfd_reloc_overflow;
1501
1502 bfd_put_16 (input_bfd, value, hit_data);
1503 return bfd_reloc_ok;
1504
1505 case R_ARM_ABS12:
1506 /* Support ldr and str instruction for the arm */
1507 /* Also thumb b (unconditional branch). ??? Really? */
1508 value += addend;
1509
1510 if ((long) value > 0x7ff || (long) value < -0x800)
1511 return bfd_reloc_overflow;
1512
1513 value |= (bfd_get_32 (input_bfd, hit_data) & 0xfffff000);
1514 bfd_put_32 (input_bfd, value, hit_data);
1515 return bfd_reloc_ok;
1516
1517 case R_ARM_THM_ABS5:
9b485d32 1518 /* Support ldr and str instructions for the thumb. */
acf8aed4 1519#if USE_REL
252b5132
RH
1520 /* Need to refetch addend. */
1521 addend = bfd_get_16 (input_bfd, hit_data) & howto->src_mask;
1522 /* ??? Need to determine shift amount from operand size. */
1523 addend >>= howto->rightshift;
1524#endif
1525 value += addend;
1526
1527 /* ??? Isn't value unsigned? */
1528 if ((long) value > 0x1f || (long) value < -0x10)
1529 return bfd_reloc_overflow;
1530
1531 /* ??? Value needs to be properly shifted into place first. */
1532 value |= bfd_get_16 (input_bfd, hit_data) & 0xf83f;
1533 bfd_put_16 (input_bfd, value, hit_data);
1534 return bfd_reloc_ok;
1535
dfc5f959
NC
1536#ifndef OLD_ARM_ABI
1537 case R_ARM_THM_XPC22:
1538#endif
252b5132 1539 case R_ARM_THM_PC22:
dfc5f959 1540 /* Thumb BL (branch long instruction). */
252b5132 1541 {
b34976b6
AM
1542 bfd_vma relocation;
1543 bfd_boolean overflow = FALSE;
1544 bfd_vma upper_insn = bfd_get_16 (input_bfd, hit_data);
1545 bfd_vma lower_insn = bfd_get_16 (input_bfd, hit_data + 2);
df212a7e 1546 bfd_signed_vma reloc_signed_max = ((1 << (howto->bitsize - 1)) - 1) >> howto->rightshift;
ba96a88f 1547 bfd_signed_vma reloc_signed_min = ~ reloc_signed_max;
b34976b6 1548 bfd_vma check;
252b5132 1549 bfd_signed_vma signed_check;
252b5132 1550
acf8aed4 1551#if USE_REL
252b5132
RH
1552 /* Need to refetch the addend and squish the two 11 bit pieces
1553 together. */
1554 {
ba96a88f
NC
1555 bfd_vma upper = upper_insn & 0x7ff;
1556 bfd_vma lower = lower_insn & 0x7ff;
9b485d32 1557 upper = (upper ^ 0x400) - 0x400; /* Sign extend. */
252b5132 1558 addend = (upper << 12) | (lower << 1);
ba96a88f 1559 signed_addend = addend;
252b5132
RH
1560 }
1561#endif
dfc5f959
NC
1562#ifndef OLD_ARM_ABI
1563 if (r_type == R_ARM_THM_XPC22)
1564 {
1565 /* Check for Thumb to Thumb call. */
1566 /* FIXME: Should we translate the instruction into a BL
1567 instruction instead ? */
1568 if (sym_flags == STT_ARM_TFUNC)
d003868e
AM
1569 (*_bfd_error_handler)
1570 (_("%B: Warning: Thumb BLX instruction targets thumb function '%s'."),
1571 input_bfd,
1572 h ? h->root.root.string : "(local)");
dfc5f959
NC
1573 }
1574 else
1575#endif
252b5132 1576 {
dfc5f959
NC
1577 /* If it is not a call to Thumb, assume call to Arm.
1578 If it is a call relative to a section name, then it is not a
1579 function call at all, but rather a long jump. */
1580 if (sym_flags != STT_ARM_TFUNC && sym_flags != STT_SECTION)
1581 {
1582 if (elf32_thumb_to_arm_stub
1583 (info, sym_name, input_bfd, output_bfd, input_section,
1584 hit_data, sym_sec, rel->r_offset, signed_addend, value))
1585 return bfd_reloc_ok;
1586 else
1587 return bfd_reloc_dangerous;
1588 }
252b5132 1589 }
f21f3fe0 1590
ba96a88f 1591 relocation = value + signed_addend;
f21f3fe0 1592
252b5132 1593 relocation -= (input_section->output_section->vma
ba96a88f
NC
1594 + input_section->output_offset
1595 + rel->r_offset);
9a5aca8c 1596
ba96a88f
NC
1597 if (! globals->no_pipeline_knowledge)
1598 {
9b485d32 1599 Elf_Internal_Ehdr * i_ehdrp; /* Elf file header, internal form. */
9a5aca8c 1600
ba96a88f 1601 i_ehdrp = elf_elfheader (input_bfd);
f21f3fe0 1602
ba96a88f
NC
1603 /* Previous versions of this code also used to add in the pipline
1604 offset here. This is wrong because the linker is not supposed
1605 to know about such things, and one day it might change. In order
1606 to support old binaries that need the old behaviour however, so
1607 we attempt to detect which ABI was used to create the reloc. */
1608 if ( strcmp (bfd_get_target (input_bfd), "elf32-littlearm-oabi") == 0
1609 || strcmp (bfd_get_target (input_bfd), "elf32-bigarm-oabi") == 0
1610 || i_ehdrp->e_ident[EI_OSABI] == 0)
1611 relocation += 4;
1612 }
f21f3fe0 1613
252b5132
RH
1614 check = relocation >> howto->rightshift;
1615
1616 /* If this is a signed value, the rightshift just dropped
1617 leading 1 bits (assuming twos complement). */
1618 if ((bfd_signed_vma) relocation >= 0)
1619 signed_check = check;
1620 else
1621 signed_check = check | ~((bfd_vma) -1 >> howto->rightshift);
1622
252b5132 1623 /* Assumes two's complement. */
ba96a88f 1624 if (signed_check > reloc_signed_max || signed_check < reloc_signed_min)
b34976b6 1625 overflow = TRUE;
252b5132 1626
df425bc0 1627#ifndef OLD_ARM_ABI
4f3c3dbb
NC
1628 if (r_type == R_ARM_THM_XPC22
1629 && ((lower_insn & 0x1800) == 0x0800))
c62e1cc3
NC
1630 /* For a BLX instruction, make sure that the relocation is rounded up
1631 to a word boundary. This follows the semantics of the instruction
1632 which specifies that bit 1 of the target address will come from bit
1633 1 of the base address. */
1634 relocation = (relocation + 2) & ~ 3;
99e4ae17 1635#endif
c62e1cc3
NC
1636 /* Put RELOCATION back into the insn. */
1637 upper_insn = (upper_insn & ~(bfd_vma) 0x7ff) | ((relocation >> 12) & 0x7ff);
1638 lower_insn = (lower_insn & ~(bfd_vma) 0x7ff) | ((relocation >> 1) & 0x7ff);
1639
252b5132
RH
1640 /* Put the relocated value back in the object file: */
1641 bfd_put_16 (input_bfd, upper_insn, hit_data);
1642 bfd_put_16 (input_bfd, lower_insn, hit_data + 2);
1643
1644 return (overflow ? bfd_reloc_overflow : bfd_reloc_ok);
1645 }
1646 break;
1647
51c5503b
NC
1648 case R_ARM_THM_PC11:
1649 /* Thumb B (branch) instruction). */
1650 {
6cf9e9fe 1651 bfd_signed_vma relocation;
51c5503b
NC
1652 bfd_signed_vma reloc_signed_max = (1 << (howto->bitsize - 1)) - 1;
1653 bfd_signed_vma reloc_signed_min = ~ reloc_signed_max;
51c5503b
NC
1654 bfd_signed_vma signed_check;
1655
acf8aed4 1656#if USE_REL
51c5503b
NC
1657 /* Need to refetch addend. */
1658 addend = bfd_get_16 (input_bfd, hit_data) & howto->src_mask;
6cf9e9fe
NC
1659 if (addend & ((howto->src_mask + 1) >> 1))
1660 {
1661 signed_addend = -1;
1662 signed_addend &= ~ howto->src_mask;
1663 signed_addend |= addend;
1664 }
1665 else
1666 signed_addend = addend;
1667 /* The value in the insn has been right shifted. We need to
1668 undo this, so that we can perform the address calculation
1669 in terms of bytes. */
1670 signed_addend <<= howto->rightshift;
51c5503b 1671#endif
6cf9e9fe 1672 relocation = value + signed_addend;
51c5503b
NC
1673
1674 relocation -= (input_section->output_section->vma
1675 + input_section->output_offset
1676 + rel->r_offset);
1677
6cf9e9fe
NC
1678 relocation >>= howto->rightshift;
1679 signed_check = relocation;
1680 relocation &= howto->dst_mask;
51c5503b 1681 relocation |= (bfd_get_16 (input_bfd, hit_data) & (~ howto->dst_mask));
cedb70c5 1682
51c5503b
NC
1683 bfd_put_16 (input_bfd, relocation, hit_data);
1684
1685 /* Assumes two's complement. */
1686 if (signed_check > reloc_signed_max || signed_check < reloc_signed_min)
1687 return bfd_reloc_overflow;
1688
1689 return bfd_reloc_ok;
1690 }
cedb70c5 1691
1f433d93 1692#ifndef OLD_ARM_ABI
8375c36b
PB
1693 case R_ARM_ALU_PCREL7_0:
1694 case R_ARM_ALU_PCREL15_8:
1695 case R_ARM_ALU_PCREL23_15:
1696 {
1697 bfd_vma insn;
1698 bfd_vma relocation;
1699
1700 insn = bfd_get_32 (input_bfd, hit_data);
1701#if USE_REL
1702 /* Extract the addend. */
1703 addend = (insn & 0xff) << ((insn & 0xf00) >> 7);
1704 signed_addend = addend;
1705#endif
1706 relocation = value + signed_addend;
1707
1708 relocation -= (input_section->output_section->vma
1709 + input_section->output_offset
1710 + rel->r_offset);
1711 insn = (insn & ~0xfff)
1712 | ((howto->bitpos << 7) & 0xf00)
1713 | ((relocation >> howto->bitpos) & 0xff);
1714 bfd_put_32 (input_bfd, value, hit_data);
1715 }
1716 return bfd_reloc_ok;
1f433d93 1717#endif
8375c36b 1718
252b5132
RH
1719 case R_ARM_GNU_VTINHERIT:
1720 case R_ARM_GNU_VTENTRY:
1721 return bfd_reloc_ok;
1722
1723 case R_ARM_COPY:
1724 return bfd_reloc_notsupported;
1725
1726 case R_ARM_GLOB_DAT:
1727 return bfd_reloc_notsupported;
1728
1729 case R_ARM_JUMP_SLOT:
1730 return bfd_reloc_notsupported;
1731
1732 case R_ARM_RELATIVE:
1733 return bfd_reloc_notsupported;
1734
1735 case R_ARM_GOTOFF:
1736 /* Relocation is relative to the start of the
1737 global offset table. */
1738
1739 BFD_ASSERT (sgot != NULL);
1740 if (sgot == NULL)
1741 return bfd_reloc_notsupported;
9a5aca8c 1742
cedb70c5 1743 /* If we are addressing a Thumb function, we need to adjust the
ee29b9fb
RE
1744 address by one, so that attempts to call the function pointer will
1745 correctly interpret it as Thumb code. */
1746 if (sym_flags == STT_ARM_TFUNC)
1747 value += 1;
1748
252b5132
RH
1749 /* Note that sgot->output_offset is not involved in this
1750 calculation. We always want the start of .got. If we
1751 define _GLOBAL_OFFSET_TABLE in a different way, as is
1752 permitted by the ABI, we might have to change this
9b485d32 1753 calculation. */
252b5132 1754 value -= sgot->output_section->vma;
f21f3fe0 1755 return _bfd_final_link_relocate (howto, input_bfd, input_section,
99e4ae17
AJ
1756 contents, rel->r_offset, value,
1757 (bfd_vma) 0);
252b5132
RH
1758
1759 case R_ARM_GOTPC:
a7c10850 1760 /* Use global offset table as symbol value. */
252b5132 1761 BFD_ASSERT (sgot != NULL);
f21f3fe0 1762
252b5132
RH
1763 if (sgot == NULL)
1764 return bfd_reloc_notsupported;
1765
1766 value = sgot->output_section->vma;
f21f3fe0 1767 return _bfd_final_link_relocate (howto, input_bfd, input_section,
99e4ae17
AJ
1768 contents, rel->r_offset, value,
1769 (bfd_vma) 0);
f21f3fe0 1770
252b5132
RH
1771 case R_ARM_GOT32:
1772 /* Relocation is to the entry for this symbol in the
9b485d32 1773 global offset table. */
252b5132
RH
1774 if (sgot == NULL)
1775 return bfd_reloc_notsupported;
f21f3fe0 1776
252b5132
RH
1777 if (h != NULL)
1778 {
1779 bfd_vma off;
5e681ec4 1780 bfd_boolean dyn;
f21f3fe0 1781
252b5132
RH
1782 off = h->got.offset;
1783 BFD_ASSERT (off != (bfd_vma) -1);
5e681ec4 1784 dyn = globals->root.dynamic_sections_created;
f21f3fe0 1785
5e681ec4 1786 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
50d6c878 1787 || (info->shared
5e681ec4
PB
1788 && SYMBOL_REFERENCES_LOCAL (info, h))
1789 || (ELF_ST_VISIBILITY (h->other)
1790 && h->root.type == bfd_link_hash_undefweak))
252b5132
RH
1791 {
1792 /* This is actually a static link, or it is a -Bsymbolic link
1793 and the symbol is defined locally. We must initialize this
1794 entry in the global offset table. Since the offset must
1795 always be a multiple of 4, we use the least significant bit
1796 to record whether we have initialized it already.
f21f3fe0 1797
252b5132 1798 When doing a dynamic link, we create a .rel.got relocation
f21f3fe0 1799 entry to initialize the value. This is done in the
9b485d32 1800 finish_dynamic_symbol routine. */
252b5132
RH
1801 if ((off & 1) != 0)
1802 off &= ~1;
1803 else
1804 {
ee29b9fb
RE
1805 /* If we are addressing a Thumb function, we need to
1806 adjust the address by one, so that attempts to
1807 call the function pointer will correctly
1808 interpret it as Thumb code. */
1809 if (sym_flags == STT_ARM_TFUNC)
1810 value |= 1;
1811
252b5132
RH
1812 bfd_put_32 (output_bfd, value, sgot->contents + off);
1813 h->got.offset |= 1;
1814 }
1815 }
f21f3fe0 1816
252b5132
RH
1817 value = sgot->output_offset + off;
1818 }
1819 else
1820 {
1821 bfd_vma off;
f21f3fe0 1822
252b5132
RH
1823 BFD_ASSERT (local_got_offsets != NULL &&
1824 local_got_offsets[r_symndx] != (bfd_vma) -1);
f21f3fe0 1825
252b5132 1826 off = local_got_offsets[r_symndx];
f21f3fe0 1827
252b5132
RH
1828 /* The offset must always be a multiple of 4. We use the
1829 least significant bit to record whether we have already
9b485d32 1830 generated the necessary reloc. */
252b5132
RH
1831 if ((off & 1) != 0)
1832 off &= ~1;
1833 else
1834 {
1835 bfd_put_32 (output_bfd, value, sgot->contents + off);
f21f3fe0 1836
252b5132
RH
1837 if (info->shared)
1838 {
1839 asection * srelgot;
947216bf
AM
1840 Elf_Internal_Rela outrel;
1841 bfd_byte *loc;
f21f3fe0 1842
252b5132
RH
1843 srelgot = bfd_get_section_by_name (dynobj, ".rel.got");
1844 BFD_ASSERT (srelgot != NULL);
f21f3fe0 1845
252b5132 1846 outrel.r_offset = (sgot->output_section->vma
f21f3fe0 1847 + sgot->output_offset
252b5132
RH
1848 + off);
1849 outrel.r_info = ELF32_R_INFO (0, R_ARM_RELATIVE);
947216bf
AM
1850 loc = srelgot->contents;
1851 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rel);
1852 bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
252b5132 1853 }
f21f3fe0 1854
252b5132
RH
1855 local_got_offsets[r_symndx] |= 1;
1856 }
f21f3fe0 1857
252b5132
RH
1858 value = sgot->output_offset + off;
1859 }
9a5aca8c 1860
f21f3fe0 1861 return _bfd_final_link_relocate (howto, input_bfd, input_section,
99e4ae17
AJ
1862 contents, rel->r_offset, value,
1863 (bfd_vma) 0);
f21f3fe0 1864
252b5132
RH
1865 case R_ARM_SBREL32:
1866 return bfd_reloc_notsupported;
1867
1868 case R_ARM_AMP_VCALL9:
1869 return bfd_reloc_notsupported;
1870
1871 case R_ARM_RSBREL32:
1872 return bfd_reloc_notsupported;
1873
1874 case R_ARM_THM_RPC22:
1875 return bfd_reloc_notsupported;
1876
1877 case R_ARM_RREL32:
1878 return bfd_reloc_notsupported;
1879
1880 case R_ARM_RABS32:
1881 return bfd_reloc_notsupported;
1882
1883 case R_ARM_RPC24:
1884 return bfd_reloc_notsupported;
1885
1886 case R_ARM_RBASE:
1887 return bfd_reloc_notsupported;
1888
1889 default:
1890 return bfd_reloc_notsupported;
1891 }
1892}
1893
acf8aed4 1894#if USE_REL
98c1d4aa
NC
1895/* Add INCREMENT to the reloc (of type HOWTO) at ADDRESS. */
1896static void
57e8b36a
NC
1897arm_add_to_rel (bfd * abfd,
1898 bfd_byte * address,
1899 reloc_howto_type * howto,
1900 bfd_signed_vma increment)
98c1d4aa 1901{
98c1d4aa
NC
1902 bfd_signed_vma addend;
1903
9a5aca8c 1904 if (howto->type == R_ARM_THM_PC22)
98c1d4aa 1905 {
9a5aca8c
AM
1906 int upper_insn, lower_insn;
1907 int upper, lower;
98c1d4aa 1908
9a5aca8c
AM
1909 upper_insn = bfd_get_16 (abfd, address);
1910 lower_insn = bfd_get_16 (abfd, address + 2);
1911 upper = upper_insn & 0x7ff;
1912 lower = lower_insn & 0x7ff;
1913
1914 addend = (upper << 12) | (lower << 1);
ddda4409 1915 addend += increment;
9a5aca8c 1916 addend >>= 1;
98c1d4aa 1917
9a5aca8c
AM
1918 upper_insn = (upper_insn & 0xf800) | ((addend >> 11) & 0x7ff);
1919 lower_insn = (lower_insn & 0xf800) | (addend & 0x7ff);
1920
dc810e39
AM
1921 bfd_put_16 (abfd, (bfd_vma) upper_insn, address);
1922 bfd_put_16 (abfd, (bfd_vma) lower_insn, address + 2);
9a5aca8c
AM
1923 }
1924 else
1925 {
1926 bfd_vma contents;
1927
1928 contents = bfd_get_32 (abfd, address);
1929
1930 /* Get the (signed) value from the instruction. */
1931 addend = contents & howto->src_mask;
1932 if (addend & ((howto->src_mask + 1) >> 1))
1933 {
1934 bfd_signed_vma mask;
1935
1936 mask = -1;
1937 mask &= ~ howto->src_mask;
1938 addend |= mask;
1939 }
1940
1941 /* Add in the increment, (which is a byte value). */
1942 switch (howto->type)
1943 {
1944 default:
1945 addend += increment;
1946 break;
1947
1948 case R_ARM_PC24:
1949 addend <<= howto->size;
dc810e39 1950 addend += increment;
9a5aca8c
AM
1951
1952 /* Should we check for overflow here ? */
1953
1954 /* Drop any undesired bits. */
1955 addend >>= howto->rightshift;
1956 break;
1957 }
1958
1959 contents = (contents & ~ howto->dst_mask) | (addend & howto->dst_mask);
1960
1961 bfd_put_32 (abfd, contents, address);
ddda4409 1962 }
98c1d4aa
NC
1963}
1964#endif /* USE_REL */
252b5132
RH
1965
1966/* Relocate an ARM ELF section. */
b34976b6 1967static bfd_boolean
57e8b36a
NC
1968elf32_arm_relocate_section (bfd * output_bfd,
1969 struct bfd_link_info * info,
1970 bfd * input_bfd,
1971 asection * input_section,
1972 bfd_byte * contents,
1973 Elf_Internal_Rela * relocs,
1974 Elf_Internal_Sym * local_syms,
1975 asection ** local_sections)
252b5132 1976{
b34976b6
AM
1977 Elf_Internal_Shdr *symtab_hdr;
1978 struct elf_link_hash_entry **sym_hashes;
1979 Elf_Internal_Rela *rel;
1980 Elf_Internal_Rela *relend;
1981 const char *name;
252b5132 1982
acf8aed4 1983#if !USE_REL
1049f94e 1984 if (info->relocatable)
b34976b6 1985 return TRUE;
b491616a
AM
1986#endif
1987
252b5132
RH
1988 symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr;
1989 sym_hashes = elf_sym_hashes (input_bfd);
1990
1991 rel = relocs;
1992 relend = relocs + input_section->reloc_count;
1993 for (; rel < relend; rel++)
1994 {
ba96a88f
NC
1995 int r_type;
1996 reloc_howto_type * howto;
1997 unsigned long r_symndx;
1998 Elf_Internal_Sym * sym;
1999 asection * sec;
252b5132 2000 struct elf_link_hash_entry * h;
ba96a88f
NC
2001 bfd_vma relocation;
2002 bfd_reloc_status_type r;
2003 arelent bfd_reloc;
f21f3fe0 2004
252b5132 2005 r_symndx = ELF32_R_SYM (rel->r_info);
ba96a88f 2006 r_type = ELF32_R_TYPE (rel->r_info);
252b5132 2007
ba96a88f
NC
2008 if ( r_type == R_ARM_GNU_VTENTRY
2009 || r_type == R_ARM_GNU_VTINHERIT)
252b5132
RH
2010 continue;
2011
dc810e39 2012 elf32_arm_info_to_howto (input_bfd, & bfd_reloc, rel);
ba96a88f 2013 howto = bfd_reloc.howto;
252b5132 2014
acf8aed4 2015#if USE_REL
1049f94e 2016 if (info->relocatable)
252b5132 2017 {
1049f94e 2018 /* This is a relocatable link. We don't have to change
252b5132
RH
2019 anything, unless the reloc is against a section symbol,
2020 in which case we have to adjust according to where the
2021 section symbol winds up in the output section. */
2022 if (r_symndx < symtab_hdr->sh_info)
2023 {
2024 sym = local_syms + r_symndx;
2025 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
2026 {
2027 sec = local_sections[r_symndx];
98c1d4aa 2028 arm_add_to_rel (input_bfd, contents + rel->r_offset,
dc810e39
AM
2029 howto,
2030 (bfd_signed_vma) (sec->output_offset
2031 + sym->st_value));
252b5132
RH
2032 }
2033 }
2034
2035 continue;
2036 }
b491616a 2037#endif
252b5132
RH
2038
2039 /* This is a final link. */
2040 h = NULL;
2041 sym = NULL;
2042 sec = NULL;
9b485d32 2043
252b5132
RH
2044 if (r_symndx < symtab_hdr->sh_info)
2045 {
2046 sym = local_syms + r_symndx;
2047 sec = local_sections[r_symndx];
acf8aed4 2048#if USE_REL
252b5132
RH
2049 relocation = (sec->output_section->vma
2050 + sec->output_offset
2051 + sym->st_value);
f8df10f4
JJ
2052 if ((sec->flags & SEC_MERGE)
2053 && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
2054 {
2055 asection *msec;
2056 bfd_vma addend, value;
2057
2058 if (howto->rightshift)
2059 {
2060 (*_bfd_error_handler)
d003868e
AM
2061 (_("%B(%A+0x%lx): %s relocation against SEC_MERGE section"),
2062 input_bfd, input_section,
f8df10f4 2063 (long) rel->r_offset, howto->name);
b34976b6 2064 return FALSE;
f8df10f4
JJ
2065 }
2066
2067 value = bfd_get_32 (input_bfd, contents + rel->r_offset);
2068
2069 /* Get the (signed) value from the instruction. */
2070 addend = value & howto->src_mask;
2071 if (addend & ((howto->src_mask + 1) >> 1))
2072 {
2073 bfd_signed_vma mask;
2074
2075 mask = -1;
2076 mask &= ~ howto->src_mask;
2077 addend |= mask;
2078 }
2079 msec = sec;
2080 addend =
c629eae0 2081 _bfd_elf_rel_local_sym (output_bfd, sym, &msec, addend)
f8df10f4
JJ
2082 - relocation;
2083 addend += msec->output_section->vma + msec->output_offset;
2084 value = (value & ~ howto->dst_mask) | (addend & howto->dst_mask);
2085 bfd_put_32 (input_bfd, value, contents + rel->r_offset);
2086 }
2087#else
8517fae7 2088 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
f8df10f4 2089#endif
252b5132
RH
2090 }
2091 else
2092 {
560e09e9
NC
2093 bfd_boolean warned;
2094 bfd_boolean unresolved_reloc;
2095
b2a8e766
AM
2096 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2097 r_symndx, symtab_hdr, sym_hashes,
2098 h, sec, relocation,
2099 unresolved_reloc, warned);
57e8b36a 2100
560e09e9 2101 if (unresolved_reloc || relocation != 0)
252b5132 2102 {
252b5132 2103 /* In these cases, we don't need the relocation value.
f21f3fe0 2104 We check specially because in some obscure cases
9b485d32 2105 sec->output_section will be NULL. */
252b5132
RH
2106 switch (r_type)
2107 {
2108 case R_ARM_PC24:
2109 case R_ARM_ABS32:
6a360bf4 2110 case R_ARM_THM_PC22:
ecb2d096
DJ
2111 case R_ARM_PLT32:
2112
252b5132 2113 if (info->shared
f5385ebf
AM
2114 && ((!info->symbolic && h->dynindx != -1)
2115 || !h->def_regular)
5e681ec4 2116 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
05924f36
PB
2117 && ((input_section->flags & SEC_ALLOC) != 0
2118 /* DWARF will emit R_ARM_ABS32 relocations in its
2119 sections against symbols defined externally
2120 in shared libraries. We can't do anything
2121 with them here. */
2122 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 2123 && h->def_dynamic))
252b5132 2124 )
560e09e9 2125 relocation = 0;
252b5132 2126 break;
f21f3fe0 2127
252b5132 2128 case R_ARM_GOTPC:
560e09e9 2129 relocation = 0;
252b5132 2130 break;
f21f3fe0 2131
252b5132 2132 case R_ARM_GOT32:
50d6c878 2133 if ((WILL_CALL_FINISH_DYNAMIC_SYMBOL
560e09e9 2134 (elf_hash_table (info)->dynamic_sections_created,
50d6c878
DJ
2135 info->shared, h))
2136 && (!info->shared
252b5132 2137 || (!info->symbolic && h->dynindx != -1)
f5385ebf 2138 || !h->def_regular))
560e09e9 2139 relocation = 0;
252b5132 2140 break;
f21f3fe0 2141
252b5132 2142 default:
560e09e9
NC
2143 if (unresolved_reloc)
2144 _bfd_error_handler
d003868e
AM
2145 (_("%B(%A): warning: unresolvable relocation %d against symbol `%s'"),
2146 input_bfd, input_section,
560e09e9 2147 r_type,
d003868e 2148 h->root.root.string);
560e09e9 2149 break;
252b5132 2150 }
252b5132
RH
2151 }
2152 }
2153
2154 if (h != NULL)
2155 name = h->root.root.string;
2156 else
2157 {
2158 name = (bfd_elf_string_from_elf_section
2159 (input_bfd, symtab_hdr->sh_link, sym->st_name));
2160 if (name == NULL || *name == '\0')
2161 name = bfd_section_name (input_bfd, sec);
2162 }
f21f3fe0 2163
252b5132
RH
2164 r = elf32_arm_final_link_relocate (howto, input_bfd, output_bfd,
2165 input_section, contents, rel,
2166 relocation, info, sec, name,
2167 (h ? ELF_ST_TYPE (h->type) :
780a67af 2168 ELF_ST_TYPE (sym->st_info)), h);
252b5132
RH
2169
2170 if (r != bfd_reloc_ok)
2171 {
2172 const char * msg = (const char *) 0;
2173
2174 switch (r)
2175 {
2176 case bfd_reloc_overflow:
cf919dfd
PB
2177 /* If the overflowing reloc was to an undefined symbol,
2178 we have already printed one error message and there
2179 is no point complaining again. */
2180 if ((! h ||
2181 h->root.type != bfd_link_hash_undefined)
2182 && (!((*info->callbacks->reloc_overflow)
2183 (info, name, howto->name, (bfd_vma) 0,
2184 input_bfd, input_section, rel->r_offset))))
b34976b6 2185 return FALSE;
252b5132
RH
2186 break;
2187
2188 case bfd_reloc_undefined:
2189 if (!((*info->callbacks->undefined_symbol)
2190 (info, name, input_bfd, input_section,
b34976b6
AM
2191 rel->r_offset, TRUE)))
2192 return FALSE;
252b5132
RH
2193 break;
2194
2195 case bfd_reloc_outofrange:
9b485d32 2196 msg = _("internal error: out of range error");
252b5132
RH
2197 goto common_error;
2198
2199 case bfd_reloc_notsupported:
9b485d32 2200 msg = _("internal error: unsupported relocation error");
252b5132
RH
2201 goto common_error;
2202
2203 case bfd_reloc_dangerous:
9b485d32 2204 msg = _("internal error: dangerous error");
252b5132
RH
2205 goto common_error;
2206
2207 default:
9b485d32 2208 msg = _("internal error: unknown error");
252b5132
RH
2209 /* fall through */
2210
2211 common_error:
2212 if (!((*info->callbacks->warning)
2213 (info, msg, name, input_bfd, input_section,
2214 rel->r_offset)))
b34976b6 2215 return FALSE;
252b5132
RH
2216 break;
2217 }
2218 }
2219 }
2220
b34976b6 2221 return TRUE;
252b5132
RH
2222}
2223
c178919b
NC
2224/* Set the right machine number. */
2225
2226static bfd_boolean
57e8b36a 2227elf32_arm_object_p (bfd *abfd)
c178919b 2228{
5a6c6817 2229 unsigned int mach;
57e8b36a 2230
5a6c6817 2231 mach = bfd_arm_get_mach_from_notes (abfd, ARM_NOTE_SECTION);
c178919b 2232
5a6c6817
NC
2233 if (mach != bfd_mach_arm_unknown)
2234 bfd_default_set_arch_mach (abfd, bfd_arch_arm, mach);
2235
2236 else if (elf_elfheader (abfd)->e_flags & EF_ARM_MAVERICK_FLOAT)
2237 bfd_default_set_arch_mach (abfd, bfd_arch_arm, bfd_mach_arm_ep9312);
e16bb312 2238
e16bb312 2239 else
5a6c6817 2240 bfd_default_set_arch_mach (abfd, bfd_arch_arm, mach);
c178919b
NC
2241
2242 return TRUE;
2243}
2244
fc830a83 2245/* Function to keep ARM specific flags in the ELF header. */
b34976b6 2246static bfd_boolean
57e8b36a 2247elf32_arm_set_private_flags (bfd *abfd, flagword flags)
252b5132
RH
2248{
2249 if (elf_flags_init (abfd)
2250 && elf_elfheader (abfd)->e_flags != flags)
2251 {
fc830a83
NC
2252 if (EF_ARM_EABI_VERSION (flags) == EF_ARM_EABI_UNKNOWN)
2253 {
fd2ec330 2254 if (flags & EF_ARM_INTERWORK)
d003868e
AM
2255 (*_bfd_error_handler)
2256 (_("Warning: Not setting interworking flag of %B since it has already been specified as non-interworking"),
2257 abfd);
fc830a83 2258 else
d003868e
AM
2259 _bfd_error_handler
2260 (_("Warning: Clearing the interworking flag of %B due to outside request"),
2261 abfd);
fc830a83 2262 }
252b5132
RH
2263 }
2264 else
2265 {
2266 elf_elfheader (abfd)->e_flags = flags;
b34976b6 2267 elf_flags_init (abfd) = TRUE;
252b5132
RH
2268 }
2269
b34976b6 2270 return TRUE;
252b5132
RH
2271}
2272
fc830a83 2273/* Copy backend specific data from one object module to another. */
9b485d32 2274
b34976b6 2275static bfd_boolean
57e8b36a 2276elf32_arm_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
252b5132
RH
2277{
2278 flagword in_flags;
2279 flagword out_flags;
2280
fc830a83 2281 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
252b5132 2282 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 2283 return TRUE;
252b5132 2284
fc830a83 2285 in_flags = elf_elfheader (ibfd)->e_flags;
252b5132
RH
2286 out_flags = elf_elfheader (obfd)->e_flags;
2287
fc830a83
NC
2288 if (elf_flags_init (obfd)
2289 && EF_ARM_EABI_VERSION (out_flags) == EF_ARM_EABI_UNKNOWN
2290 && in_flags != out_flags)
252b5132 2291 {
252b5132 2292 /* Cannot mix APCS26 and APCS32 code. */
fd2ec330 2293 if ((in_flags & EF_ARM_APCS_26) != (out_flags & EF_ARM_APCS_26))
b34976b6 2294 return FALSE;
252b5132
RH
2295
2296 /* Cannot mix float APCS and non-float APCS code. */
fd2ec330 2297 if ((in_flags & EF_ARM_APCS_FLOAT) != (out_flags & EF_ARM_APCS_FLOAT))
b34976b6 2298 return FALSE;
252b5132
RH
2299
2300 /* If the src and dest have different interworking flags
2301 then turn off the interworking bit. */
fd2ec330 2302 if ((in_flags & EF_ARM_INTERWORK) != (out_flags & EF_ARM_INTERWORK))
252b5132 2303 {
fd2ec330 2304 if (out_flags & EF_ARM_INTERWORK)
d003868e
AM
2305 _bfd_error_handler
2306 (_("Warning: Clearing the interworking flag of %B because non-interworking code in %B has been linked with it"),
2307 obfd, ibfd);
252b5132 2308
fd2ec330 2309 in_flags &= ~EF_ARM_INTERWORK;
252b5132 2310 }
1006ba19
PB
2311
2312 /* Likewise for PIC, though don't warn for this case. */
fd2ec330
PB
2313 if ((in_flags & EF_ARM_PIC) != (out_flags & EF_ARM_PIC))
2314 in_flags &= ~EF_ARM_PIC;
252b5132
RH
2315 }
2316
2317 elf_elfheader (obfd)->e_flags = in_flags;
b34976b6 2318 elf_flags_init (obfd) = TRUE;
252b5132 2319
b34976b6 2320 return TRUE;
252b5132
RH
2321}
2322
2323/* Merge backend specific data from an object file to the output
2324 object file when linking. */
9b485d32 2325
b34976b6 2326static bfd_boolean
57e8b36a 2327elf32_arm_merge_private_bfd_data (bfd * ibfd, bfd * obfd)
252b5132
RH
2328{
2329 flagword out_flags;
2330 flagword in_flags;
b34976b6 2331 bfd_boolean flags_compatible = TRUE;
cf919dfd 2332 asection *sec;
252b5132 2333
9b485d32 2334 /* Check if we have the same endianess. */
82e51918 2335 if (! _bfd_generic_verify_endian_match (ibfd, obfd))
b34976b6 2336 return FALSE;
1fe494a5 2337
252b5132
RH
2338 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
2339 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 2340 return TRUE;
252b5132 2341
252b5132
RH
2342 /* The input BFD must have had its flags initialised. */
2343 /* The following seems bogus to me -- The flags are initialized in
2344 the assembler but I don't think an elf_flags_init field is
9b485d32 2345 written into the object. */
252b5132
RH
2346 /* BFD_ASSERT (elf_flags_init (ibfd)); */
2347
2348 in_flags = elf_elfheader (ibfd)->e_flags;
2349 out_flags = elf_elfheader (obfd)->e_flags;
2350
2351 if (!elf_flags_init (obfd))
2352 {
fe077fa6
NC
2353 /* If the input is the default architecture and had the default
2354 flags then do not bother setting the flags for the output
2355 architecture, instead allow future merges to do this. If no
2356 future merges ever set these flags then they will retain their
2357 uninitialised values, which surprise surprise, correspond
252b5132 2358 to the default values. */
fe077fa6
NC
2359 if (bfd_get_arch_info (ibfd)->the_default
2360 && elf_elfheader (ibfd)->e_flags == 0)
b34976b6 2361 return TRUE;
252b5132 2362
b34976b6 2363 elf_flags_init (obfd) = TRUE;
252b5132
RH
2364 elf_elfheader (obfd)->e_flags = in_flags;
2365
2366 if (bfd_get_arch (obfd) == bfd_get_arch (ibfd)
2367 && bfd_get_arch_info (obfd)->the_default)
2368 return bfd_set_arch_mach (obfd, bfd_get_arch (ibfd), bfd_get_mach (ibfd));
2369
b34976b6 2370 return TRUE;
252b5132
RH
2371 }
2372
5a6c6817
NC
2373 /* Determine what should happen if the input ARM architecture
2374 does not match the output ARM architecture. */
2375 if (! bfd_arm_merge_machines (ibfd, obfd))
2376 return FALSE;
e16bb312 2377
1006ba19 2378 /* Identical flags must be compatible. */
252b5132 2379 if (in_flags == out_flags)
b34976b6 2380 return TRUE;
252b5132 2381
35a0f415
DJ
2382 /* Check to see if the input BFD actually contains any sections. If
2383 not, its flags may not have been initialised either, but it
2384 cannot actually cause any incompatibility. Do not short-circuit
2385 dynamic objects; their section list may be emptied by
d1f161ea 2386 elf_link_add_object_symbols.
35a0f415 2387
d1f161ea
NC
2388 Also check to see if there are no code sections in the input.
2389 In this case there is no need to check for code specific flags.
2390 XXX - do we need to worry about floating-point format compatability
2391 in data sections ? */
35a0f415 2392 if (!(ibfd->flags & DYNAMIC))
cf919dfd 2393 {
35a0f415 2394 bfd_boolean null_input_bfd = TRUE;
d1f161ea 2395 bfd_boolean only_data_sections = TRUE;
35a0f415
DJ
2396
2397 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
cf919dfd 2398 {
35a0f415
DJ
2399 /* Ignore synthetic glue sections. */
2400 if (strcmp (sec->name, ".glue_7")
2401 && strcmp (sec->name, ".glue_7t"))
2402 {
d1f161ea
NC
2403 if ((bfd_get_section_flags (ibfd, sec)
2404 & (SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS))
2405 == (SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS))
2406 only_data_sections = FALSE;
2407
35a0f415
DJ
2408 null_input_bfd = FALSE;
2409 break;
2410 }
cf919dfd 2411 }
d1f161ea
NC
2412
2413 if (null_input_bfd || only_data_sections)
35a0f415 2414 return TRUE;
cf919dfd 2415 }
cf919dfd 2416
252b5132 2417 /* Complain about various flag mismatches. */
fc830a83
NC
2418 if (EF_ARM_EABI_VERSION (in_flags) != EF_ARM_EABI_VERSION (out_flags))
2419 {
d003868e
AM
2420 _bfd_error_handler
2421 (_("ERROR: %B is compiled for EABI version %d, whereas %B is compiled for version %d"),
2422 ibfd, obfd,
2423 (in_flags & EF_ARM_EABIMASK) >> 24,
2424 (out_flags & EF_ARM_EABIMASK) >> 24);
b34976b6 2425 return FALSE;
fc830a83 2426 }
252b5132 2427
1006ba19
PB
2428 /* Not sure what needs to be checked for EABI versions >= 1. */
2429 if (EF_ARM_EABI_VERSION (in_flags) == EF_ARM_EABI_UNKNOWN)
2430 {
fd2ec330 2431 if ((in_flags & EF_ARM_APCS_26) != (out_flags & EF_ARM_APCS_26))
1006ba19 2432 {
d003868e
AM
2433 _bfd_error_handler
2434 (_("ERROR: %B is compiled for APCS-%d, whereas target %B uses APCS-%d"),
2435 ibfd, obfd,
2436 in_flags & EF_ARM_APCS_26 ? 26 : 32,
2437 out_flags & EF_ARM_APCS_26 ? 26 : 32);
b34976b6 2438 flags_compatible = FALSE;
1006ba19 2439 }
252b5132 2440
fd2ec330 2441 if ((in_flags & EF_ARM_APCS_FLOAT) != (out_flags & EF_ARM_APCS_FLOAT))
1006ba19 2442 {
5eefb65f 2443 if (in_flags & EF_ARM_APCS_FLOAT)
d003868e
AM
2444 _bfd_error_handler
2445 (_("ERROR: %B passes floats in float registers, whereas %B passes them in integer registers"),
2446 ibfd, obfd);
5eefb65f 2447 else
d003868e
AM
2448 _bfd_error_handler
2449 (_("ERROR: %B passes floats in integer registers, whereas %B passes them in float registers"),
2450 ibfd, obfd);
63b0f745 2451
b34976b6 2452 flags_compatible = FALSE;
1006ba19 2453 }
252b5132 2454
96a846ea 2455 if ((in_flags & EF_ARM_VFP_FLOAT) != (out_flags & EF_ARM_VFP_FLOAT))
1006ba19 2456 {
96a846ea 2457 if (in_flags & EF_ARM_VFP_FLOAT)
d003868e
AM
2458 _bfd_error_handler
2459 (_("ERROR: %B uses VFP instructions, whereas %B does not"),
2460 ibfd, obfd);
5eefb65f 2461 else
d003868e
AM
2462 _bfd_error_handler
2463 (_("ERROR: %B uses FPA instructions, whereas %B does not"),
2464 ibfd, obfd);
fde78edd
NC
2465
2466 flags_compatible = FALSE;
2467 }
2468
2469 if ((in_flags & EF_ARM_MAVERICK_FLOAT) != (out_flags & EF_ARM_MAVERICK_FLOAT))
2470 {
2471 if (in_flags & EF_ARM_MAVERICK_FLOAT)
d003868e
AM
2472 _bfd_error_handler
2473 (_("ERROR: %B uses Maverick instructions, whereas %B does not"),
2474 ibfd, obfd);
fde78edd 2475 else
d003868e
AM
2476 _bfd_error_handler
2477 (_("ERROR: %B does not use Maverick instructions, whereas %B does"),
2478 ibfd, obfd);
63b0f745 2479
b34976b6 2480 flags_compatible = FALSE;
1006ba19 2481 }
96a846ea
RE
2482
2483#ifdef EF_ARM_SOFT_FLOAT
2484 if ((in_flags & EF_ARM_SOFT_FLOAT) != (out_flags & EF_ARM_SOFT_FLOAT))
2485 {
2486 /* We can allow interworking between code that is VFP format
2487 layout, and uses either soft float or integer regs for
2488 passing floating point arguments and results. We already
2489 know that the APCS_FLOAT flags match; similarly for VFP
2490 flags. */
2491 if ((in_flags & EF_ARM_APCS_FLOAT) != 0
2492 || (in_flags & EF_ARM_VFP_FLOAT) == 0)
2493 {
2494 if (in_flags & EF_ARM_SOFT_FLOAT)
d003868e
AM
2495 _bfd_error_handler
2496 (_("ERROR: %B uses software FP, whereas %B uses hardware FP"),
2497 ibfd, obfd);
96a846ea 2498 else
d003868e
AM
2499 _bfd_error_handler
2500 (_("ERROR: %B uses hardware FP, whereas %B uses software FP"),
2501 ibfd, obfd);
96a846ea 2502
b34976b6 2503 flags_compatible = FALSE;
96a846ea
RE
2504 }
2505 }
ee43f35e 2506#endif
252b5132 2507
1006ba19 2508 /* Interworking mismatch is only a warning. */
fd2ec330 2509 if ((in_flags & EF_ARM_INTERWORK) != (out_flags & EF_ARM_INTERWORK))
8f615d07 2510 {
e3c8793a
NC
2511 if (in_flags & EF_ARM_INTERWORK)
2512 {
d003868e
AM
2513 _bfd_error_handler
2514 (_("Warning: %B supports interworking, whereas %B does not"),
2515 ibfd, obfd);
e3c8793a
NC
2516 }
2517 else
2518 {
d003868e
AM
2519 _bfd_error_handler
2520 (_("Warning: %B does not support interworking, whereas %B does"),
2521 ibfd, obfd);
e3c8793a 2522 }
8f615d07 2523 }
252b5132 2524 }
63b0f745 2525
1006ba19 2526 return flags_compatible;
252b5132
RH
2527}
2528
9b485d32
NC
2529/* Display the flags field. */
2530
b34976b6 2531static bfd_boolean
57e8b36a 2532elf32_arm_print_private_bfd_data (bfd *abfd, void * ptr)
252b5132 2533{
fc830a83
NC
2534 FILE * file = (FILE *) ptr;
2535 unsigned long flags;
252b5132
RH
2536
2537 BFD_ASSERT (abfd != NULL && ptr != NULL);
2538
2539 /* Print normal ELF private data. */
2540 _bfd_elf_print_private_bfd_data (abfd, ptr);
2541
fc830a83 2542 flags = elf_elfheader (abfd)->e_flags;
9b485d32
NC
2543 /* Ignore init flag - it may not be set, despite the flags field
2544 containing valid data. */
252b5132
RH
2545
2546 /* xgettext:c-format */
9b485d32 2547 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
252b5132 2548
fc830a83
NC
2549 switch (EF_ARM_EABI_VERSION (flags))
2550 {
2551 case EF_ARM_EABI_UNKNOWN:
4cc11e76 2552 /* The following flag bits are GNU extensions and not part of the
fc830a83
NC
2553 official ARM ELF extended ABI. Hence they are only decoded if
2554 the EABI version is not set. */
fd2ec330 2555 if (flags & EF_ARM_INTERWORK)
9b485d32 2556 fprintf (file, _(" [interworking enabled]"));
9a5aca8c 2557
fd2ec330 2558 if (flags & EF_ARM_APCS_26)
6c571f00 2559 fprintf (file, " [APCS-26]");
fc830a83 2560 else
6c571f00 2561 fprintf (file, " [APCS-32]");
9a5aca8c 2562
96a846ea
RE
2563 if (flags & EF_ARM_VFP_FLOAT)
2564 fprintf (file, _(" [VFP float format]"));
fde78edd
NC
2565 else if (flags & EF_ARM_MAVERICK_FLOAT)
2566 fprintf (file, _(" [Maverick float format]"));
96a846ea
RE
2567 else
2568 fprintf (file, _(" [FPA float format]"));
2569
fd2ec330 2570 if (flags & EF_ARM_APCS_FLOAT)
9b485d32 2571 fprintf (file, _(" [floats passed in float registers]"));
9a5aca8c 2572
fd2ec330 2573 if (flags & EF_ARM_PIC)
9b485d32 2574 fprintf (file, _(" [position independent]"));
fc830a83 2575
fd2ec330 2576 if (flags & EF_ARM_NEW_ABI)
9b485d32 2577 fprintf (file, _(" [new ABI]"));
9a5aca8c 2578
fd2ec330 2579 if (flags & EF_ARM_OLD_ABI)
9b485d32 2580 fprintf (file, _(" [old ABI]"));
9a5aca8c 2581
fd2ec330 2582 if (flags & EF_ARM_SOFT_FLOAT)
9b485d32 2583 fprintf (file, _(" [software FP]"));
9a5aca8c 2584
96a846ea
RE
2585 flags &= ~(EF_ARM_INTERWORK | EF_ARM_APCS_26 | EF_ARM_APCS_FLOAT
2586 | EF_ARM_PIC | EF_ARM_NEW_ABI | EF_ARM_OLD_ABI
fde78edd
NC
2587 | EF_ARM_SOFT_FLOAT | EF_ARM_VFP_FLOAT
2588 | EF_ARM_MAVERICK_FLOAT);
fc830a83 2589 break;
9a5aca8c 2590
fc830a83 2591 case EF_ARM_EABI_VER1:
9b485d32 2592 fprintf (file, _(" [Version1 EABI]"));
9a5aca8c 2593
fc830a83 2594 if (flags & EF_ARM_SYMSARESORTED)
9b485d32 2595 fprintf (file, _(" [sorted symbol table]"));
fc830a83 2596 else
9b485d32 2597 fprintf (file, _(" [unsorted symbol table]"));
9a5aca8c 2598
fc830a83
NC
2599 flags &= ~ EF_ARM_SYMSARESORTED;
2600 break;
9a5aca8c 2601
fd2ec330
PB
2602 case EF_ARM_EABI_VER2:
2603 fprintf (file, _(" [Version2 EABI]"));
2604
2605 if (flags & EF_ARM_SYMSARESORTED)
2606 fprintf (file, _(" [sorted symbol table]"));
2607 else
2608 fprintf (file, _(" [unsorted symbol table]"));
2609
2610 if (flags & EF_ARM_DYNSYMSUSESEGIDX)
2611 fprintf (file, _(" [dynamic symbols use segment index]"));
2612
2613 if (flags & EF_ARM_MAPSYMSFIRST)
2614 fprintf (file, _(" [mapping symbols precede others]"));
2615
99e4ae17 2616 flags &= ~(EF_ARM_SYMSARESORTED | EF_ARM_DYNSYMSUSESEGIDX
fd2ec330
PB
2617 | EF_ARM_MAPSYMSFIRST);
2618 break;
2619
d507cf36
PB
2620 case EF_ARM_EABI_VER3:
2621 fprintf (file, _(" [Version3 EABI]"));
2622
2623 if (flags & EF_ARM_BE8)
2624 fprintf (file, _(" [BE8]"));
2625
2626 if (flags & EF_ARM_LE8)
2627 fprintf (file, _(" [LE8]"));
2628
2629 flags &= ~(EF_ARM_LE8 | EF_ARM_BE8);
2630 break;
2631
fc830a83 2632 default:
9b485d32 2633 fprintf (file, _(" <EABI version unrecognised>"));
fc830a83
NC
2634 break;
2635 }
252b5132 2636
fc830a83 2637 flags &= ~ EF_ARM_EABIMASK;
252b5132 2638
fc830a83 2639 if (flags & EF_ARM_RELEXEC)
9b485d32 2640 fprintf (file, _(" [relocatable executable]"));
252b5132 2641
fc830a83 2642 if (flags & EF_ARM_HASENTRY)
9b485d32 2643 fprintf (file, _(" [has entry point]"));
252b5132 2644
fc830a83
NC
2645 flags &= ~ (EF_ARM_RELEXEC | EF_ARM_HASENTRY);
2646
2647 if (flags)
9b485d32 2648 fprintf (file, _("<Unrecognised flag bits set>"));
9a5aca8c 2649
252b5132
RH
2650 fputc ('\n', file);
2651
b34976b6 2652 return TRUE;
252b5132
RH
2653}
2654
2655static int
57e8b36a 2656elf32_arm_get_symbol_type (Elf_Internal_Sym * elf_sym, int type)
252b5132 2657{
2f0ca46a
NC
2658 switch (ELF_ST_TYPE (elf_sym->st_info))
2659 {
2660 case STT_ARM_TFUNC:
2661 return ELF_ST_TYPE (elf_sym->st_info);
ce855c42 2662
2f0ca46a
NC
2663 case STT_ARM_16BIT:
2664 /* If the symbol is not an object, return the STT_ARM_16BIT flag.
2665 This allows us to distinguish between data used by Thumb instructions
2666 and non-data (which is probably code) inside Thumb regions of an
2667 executable. */
2668 if (type != STT_OBJECT)
2669 return ELF_ST_TYPE (elf_sym->st_info);
2670 break;
9a5aca8c 2671
ce855c42
NC
2672 default:
2673 break;
2f0ca46a
NC
2674 }
2675
2676 return type;
252b5132 2677}
f21f3fe0 2678
252b5132 2679static asection *
57e8b36a
NC
2680elf32_arm_gc_mark_hook (asection * sec,
2681 struct bfd_link_info * info ATTRIBUTE_UNUSED,
2682 Elf_Internal_Rela * rel,
2683 struct elf_link_hash_entry * h,
2684 Elf_Internal_Sym * sym)
252b5132
RH
2685{
2686 if (h != NULL)
2687 {
2688 switch (ELF32_R_TYPE (rel->r_info))
2689 {
2690 case R_ARM_GNU_VTINHERIT:
2691 case R_ARM_GNU_VTENTRY:
2692 break;
2693
2694 default:
2695 switch (h->root.type)
2696 {
2697 case bfd_link_hash_defined:
2698 case bfd_link_hash_defweak:
2699 return h->root.u.def.section;
2700
2701 case bfd_link_hash_common:
2702 return h->root.u.c.p->section;
e049a0de
ILT
2703
2704 default:
2705 break;
252b5132
RH
2706 }
2707 }
2708 }
2709 else
1e2f5b6e 2710 return bfd_section_from_elf_index (sec->owner, sym->st_shndx);
9ad5cbcf 2711
252b5132
RH
2712 return NULL;
2713}
2714
780a67af
NC
2715/* Update the got entry reference counts for the section being removed. */
2716
b34976b6 2717static bfd_boolean
57e8b36a
NC
2718elf32_arm_gc_sweep_hook (bfd * abfd ATTRIBUTE_UNUSED,
2719 struct bfd_link_info * info ATTRIBUTE_UNUSED,
2720 asection * sec ATTRIBUTE_UNUSED,
2721 const Elf_Internal_Rela * relocs ATTRIBUTE_UNUSED)
252b5132 2722{
5e681ec4
PB
2723 Elf_Internal_Shdr *symtab_hdr;
2724 struct elf_link_hash_entry **sym_hashes;
2725 bfd_signed_vma *local_got_refcounts;
2726 const Elf_Internal_Rela *rel, *relend;
2727 unsigned long r_symndx;
2728 struct elf_link_hash_entry *h;
2729
2730 elf_section_data (sec)->local_dynrel = NULL;
2731
2732 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2733 sym_hashes = elf_sym_hashes (abfd);
2734 local_got_refcounts = elf_local_got_refcounts (abfd);
2735
2736 relend = relocs + sec->reloc_count;
2737 for (rel = relocs; rel < relend; rel++)
2738 switch (ELF32_R_TYPE (rel->r_info))
2739 {
2740 case R_ARM_GOT32:
2741 r_symndx = ELF32_R_SYM (rel->r_info);
2742 if (r_symndx >= symtab_hdr->sh_info)
2743 {
2744 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2745 if (h->got.refcount > 0)
2746 h->got.refcount -= 1;
2747 }
2748 else if (local_got_refcounts != NULL)
2749 {
2750 if (local_got_refcounts[r_symndx] > 0)
2751 local_got_refcounts[r_symndx] -= 1;
2752 }
2753 break;
2754
2755 case R_ARM_ABS32:
2756 case R_ARM_REL32:
b6ee372a 2757#ifndef OLD_ARM_ABI
9c504268 2758 case R_ARM_TARGET1:
b6ee372a 2759#endif
5e681ec4 2760 case R_ARM_PC24:
7359ea65 2761 case R_ARM_PLT32:
5e681ec4
PB
2762 r_symndx = ELF32_R_SYM (rel->r_info);
2763 if (r_symndx >= symtab_hdr->sh_info)
2764 {
2765 struct elf32_arm_link_hash_entry *eh;
2766 struct elf32_arm_relocs_copied **pp;
2767 struct elf32_arm_relocs_copied *p;
2768
2769 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2770
7359ea65 2771 if (h->plt.refcount > 0)
5e681ec4
PB
2772 h->plt.refcount -= 1;
2773
7359ea65 2774 if (ELF32_R_TYPE (rel->r_info) == R_ARM_ABS32
b6ee372a
AM
2775#ifndef OLD_ARM_ABI
2776 || ELF32_R_TYPE (rel->r_info) == R_ARM_TARGET1
2777#endif
2778 || ELF32_R_TYPE (rel->r_info) == R_ARM_REL32)
7359ea65
DJ
2779 {
2780 eh = (struct elf32_arm_link_hash_entry *) h;
5e681ec4 2781
7359ea65
DJ
2782 for (pp = &eh->relocs_copied; (p = *pp) != NULL;
2783 pp = &p->next)
2784 if (p->section == sec)
2785 {
2786 p->count -= 1;
2787 if (p->count == 0)
2788 *pp = p->next;
2789 break;
2790 }
2791 }
5e681ec4
PB
2792 }
2793 break;
2794
2795 default:
2796 break;
2797 }
2798
b34976b6 2799 return TRUE;
252b5132
RH
2800}
2801
780a67af
NC
2802/* Look through the relocs for a section during the first phase. */
2803
b34976b6 2804static bfd_boolean
57e8b36a
NC
2805elf32_arm_check_relocs (bfd *abfd, struct bfd_link_info *info,
2806 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 2807{
b34976b6
AM
2808 Elf_Internal_Shdr *symtab_hdr;
2809 struct elf_link_hash_entry **sym_hashes;
2810 struct elf_link_hash_entry **sym_hashes_end;
2811 const Elf_Internal_Rela *rel;
2812 const Elf_Internal_Rela *rel_end;
2813 bfd *dynobj;
5e681ec4 2814 asection *sreloc;
b34976b6 2815 bfd_vma *local_got_offsets;
5e681ec4 2816 struct elf32_arm_link_hash_table *htab;
9a5aca8c 2817
1049f94e 2818 if (info->relocatable)
b34976b6 2819 return TRUE;
9a5aca8c 2820
5e681ec4
PB
2821 htab = elf32_arm_hash_table (info);
2822 sreloc = NULL;
9a5aca8c 2823
252b5132
RH
2824 dynobj = elf_hash_table (info)->dynobj;
2825 local_got_offsets = elf_local_got_offsets (abfd);
f21f3fe0 2826
252b5132
RH
2827 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2828 sym_hashes = elf_sym_hashes (abfd);
9b485d32
NC
2829 sym_hashes_end = sym_hashes
2830 + symtab_hdr->sh_size / sizeof (Elf32_External_Sym);
2831
252b5132
RH
2832 if (!elf_bad_symtab (abfd))
2833 sym_hashes_end -= symtab_hdr->sh_info;
9b485d32 2834
252b5132
RH
2835 rel_end = relocs + sec->reloc_count;
2836 for (rel = relocs; rel < rel_end; rel++)
2837 {
2838 struct elf_link_hash_entry *h;
2839 unsigned long r_symndx;
9a5aca8c 2840
252b5132
RH
2841 r_symndx = ELF32_R_SYM (rel->r_info);
2842 if (r_symndx < symtab_hdr->sh_info)
2843 h = NULL;
2844 else
2845 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
9a5aca8c 2846
252b5132
RH
2847 switch (ELF32_R_TYPE (rel->r_info))
2848 {
5e681ec4
PB
2849 case R_ARM_GOT32:
2850 /* This symbol requires a global offset table entry. */
252b5132
RH
2851 if (h != NULL)
2852 {
5e681ec4 2853 h->got.refcount++;
252b5132
RH
2854 }
2855 else
2856 {
5e681ec4
PB
2857 bfd_signed_vma *local_got_refcounts;
2858
2859 /* This is a global offset table entry for a local symbol. */
2860 local_got_refcounts = elf_local_got_refcounts (abfd);
2861 if (local_got_refcounts == NULL)
252b5132 2862 {
dc810e39 2863 bfd_size_type size;
252b5132 2864
dc810e39 2865 size = symtab_hdr->sh_info;
57e8b36a
NC
2866 size *= (sizeof (bfd_signed_vma) + sizeof (char));
2867 local_got_refcounts = bfd_zalloc (abfd, size);
5e681ec4 2868 if (local_got_refcounts == NULL)
b34976b6 2869 return FALSE;
5e681ec4 2870 elf_local_got_refcounts (abfd) = local_got_refcounts;
252b5132 2871 }
5e681ec4 2872 local_got_refcounts[r_symndx] += 1;
252b5132 2873 }
252b5132
RH
2874 break;
2875
5e681ec4
PB
2876 case R_ARM_GOTOFF:
2877 case R_ARM_GOTPC:
2878 if (htab->sgot == NULL)
2879 {
2880 if (htab->root.dynobj == NULL)
2881 htab->root.dynobj = abfd;
2882 if (!create_got_section (htab->root.dynobj, info))
2883 return FALSE;
2884 }
252b5132
RH
2885 break;
2886
2887 case R_ARM_ABS32:
2888 case R_ARM_REL32:
b6ee372a 2889#ifndef OLD_ARM_ABI
9c504268 2890 case R_ARM_TARGET1:
b6ee372a 2891#endif
252b5132 2892 case R_ARM_PC24:
7359ea65
DJ
2893 case R_ARM_PLT32:
2894 if (h != NULL)
5e681ec4
PB
2895 {
2896 /* If this reloc is in a read-only section, we might
2897 need a copy reloc. We can't check reliably at this
2898 stage whether the section is read-only, as input
2899 sections have not yet been mapped to output sections.
2900 Tentatively set the flag for now, and correct in
2901 adjust_dynamic_symbol. */
7359ea65 2902 if (!info->shared)
f5385ebf 2903 h->non_got_ref = 1;
7359ea65 2904
5e681ec4 2905 /* We may need a .plt entry if the function this reloc
c84cd8ee
DJ
2906 refers to is in a different object. We can't tell for
2907 sure yet, because something later might force the
2908 symbol local. */
7359ea65
DJ
2909 if (ELF32_R_TYPE (rel->r_info) == R_ARM_PC24
2910 || ELF32_R_TYPE (rel->r_info) == R_ARM_PLT32)
f5385ebf 2911 h->needs_plt = 1;
4f199be3
DJ
2912
2913 /* If we create a PLT entry, this relocation will reference
2914 it, even if it's an ABS32 relocation. */
2915 h->plt.refcount += 1;
5e681ec4
PB
2916 }
2917
252b5132
RH
2918 /* If we are creating a shared library, and this is a reloc
2919 against a global symbol, or a non PC relative reloc
2920 against a local symbol, then we need to copy the reloc
2921 into the shared library. However, if we are linking with
2922 -Bsymbolic, we do not need to copy a reloc against a
2923 global symbol which is defined in an object we are
2924 including in the link (i.e., DEF_REGULAR is set). At
2925 this point we have not seen all the input files, so it is
2926 possible that DEF_REGULAR is not set now but will be set
2927 later (it is never cleared). We account for that
2928 possibility below by storing information in the
5e681ec4 2929 relocs_copied field of the hash table entry. */
252b5132 2930 if (info->shared
5e681ec4 2931 && (sec->flags & SEC_ALLOC) != 0
7359ea65 2932 && ((ELF32_R_TYPE (rel->r_info) != R_ARM_PC24
955af222 2933 && ELF32_R_TYPE (rel->r_info) != R_ARM_PLT32
b6ee372a
AM
2934#ifndef OLD_ARM_ABI
2935 && ELF32_R_TYPE (rel->r_info) != R_ARM_TARGET1
2936#endif
2937 && ELF32_R_TYPE (rel->r_info) != R_ARM_REL32)
5e681ec4
PB
2938 || (h != NULL
2939 && (! info->symbolic
f5385ebf 2940 || !h->def_regular))))
252b5132 2941 {
5e681ec4
PB
2942 struct elf32_arm_relocs_copied *p, **head;
2943
252b5132
RH
2944 /* When creating a shared object, we must copy these
2945 reloc types into the output file. We create a reloc
2946 section in dynobj and make room for this reloc. */
2947 if (sreloc == NULL)
2948 {
2949 const char * name;
2950
2951 name = (bfd_elf_string_from_elf_section
2952 (abfd,
2953 elf_elfheader (abfd)->e_shstrndx,
2954 elf_section_data (sec)->rel_hdr.sh_name));
2955 if (name == NULL)
b34976b6 2956 return FALSE;
252b5132
RH
2957
2958 BFD_ASSERT (strncmp (name, ".rel", 4) == 0
99e4ae17 2959 && strcmp (bfd_get_section_name (abfd, sec),
252b5132
RH
2960 name + 4) == 0);
2961
2962 sreloc = bfd_get_section_by_name (dynobj, name);
2963 if (sreloc == NULL)
2964 {
2965 flagword flags;
2966
2967 sreloc = bfd_make_section (dynobj, name);
2968 flags = (SEC_HAS_CONTENTS | SEC_READONLY
2969 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
e5a52504
MM
2970 if ((sec->flags & SEC_ALLOC) != 0
2971 /* BPABI objects never have dynamic
2972 relocations mapped. */
2973 && !htab->symbian_p)
252b5132
RH
2974 flags |= SEC_ALLOC | SEC_LOAD;
2975 if (sreloc == NULL
2976 || ! bfd_set_section_flags (dynobj, sreloc, flags)
2977 || ! bfd_set_section_alignment (dynobj, sreloc, 2))
b34976b6 2978 return FALSE;
252b5132 2979 }
5e681ec4
PB
2980
2981 elf_section_data (sec)->sreloc = sreloc;
252b5132
RH
2982 }
2983
5e681ec4
PB
2984 /* If this is a global symbol, we count the number of
2985 relocations we need for this symbol. */
2986 if (h != NULL)
252b5132 2987 {
5e681ec4
PB
2988 head = &((struct elf32_arm_link_hash_entry *) h)->relocs_copied;
2989 }
2990 else
2991 {
2992 /* Track dynamic relocs needed for local syms too.
2993 We really need local syms available to do this
2994 easily. Oh well. */
57e8b36a 2995
5e681ec4
PB
2996 asection *s;
2997 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
2998 sec, r_symndx);
2999 if (s == NULL)
3000 return FALSE;
57e8b36a 3001
5e681ec4
PB
3002 head = ((struct elf32_arm_relocs_copied **)
3003 &elf_section_data (s)->local_dynrel);
3004 }
57e8b36a 3005
5e681ec4
PB
3006 p = *head;
3007 if (p == NULL || p->section != sec)
3008 {
3009 bfd_size_type amt = sizeof *p;
57e8b36a 3010
5e681ec4 3011 p = bfd_alloc (htab->root.dynobj, amt);
252b5132 3012 if (p == NULL)
5e681ec4
PB
3013 return FALSE;
3014 p->next = *head;
3015 *head = p;
3016 p->section = sec;
3017 p->count = 0;
252b5132 3018 }
57e8b36a 3019
7359ea65 3020 if (ELF32_R_TYPE (rel->r_info) == R_ARM_ABS32
b6ee372a
AM
3021#ifndef OLD_ARM_ABI
3022 || ELF32_R_TYPE (rel->r_info) == R_ARM_TARGET1
3023#endif
3024 || ELF32_R_TYPE (rel->r_info) == R_ARM_REL32)
7359ea65 3025 p->count += 1;
252b5132
RH
3026 }
3027 break;
3028
3029 /* This relocation describes the C++ object vtable hierarchy.
3030 Reconstruct it for later use during GC. */
3031 case R_ARM_GNU_VTINHERIT:
c152c796 3032 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 3033 return FALSE;
252b5132 3034 break;
9a5aca8c 3035
252b5132
RH
3036 /* This relocation describes which C++ vtable entries are actually
3037 used. Record for later use during GC. */
3038 case R_ARM_GNU_VTENTRY:
c152c796 3039 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_offset))
b34976b6 3040 return FALSE;
252b5132
RH
3041 break;
3042 }
3043 }
f21f3fe0 3044
b34976b6 3045 return TRUE;
252b5132
RH
3046}
3047
b34976b6 3048static bfd_boolean
0367ecfb 3049is_arm_mapping_symbol_name (const char * name)
252b5132 3050{
0367ecfb
NC
3051 return (name != NULL)
3052 && (name[0] == '$')
3053 && ((name[1] == 'a') || (name[1] == 't') || (name[1] == 'd'))
3054 && (name[2] == 0);
3055}
f21f3fe0 3056
0367ecfb
NC
3057/* This is a copy of elf_find_function() from elf.c except that
3058 ARM mapping symbols are ignored when looking for function names
3059 and STT_ARM_TFUNC is considered to a function type. */
252b5132 3060
0367ecfb
NC
3061static bfd_boolean
3062arm_elf_find_function (bfd * abfd ATTRIBUTE_UNUSED,
3063 asection * section,
3064 asymbol ** symbols,
3065 bfd_vma offset,
3066 const char ** filename_ptr,
3067 const char ** functionname_ptr)
3068{
3069 const char * filename = NULL;
3070 asymbol * func = NULL;
3071 bfd_vma low_func = 0;
3072 asymbol ** p;
252b5132
RH
3073
3074 for (p = symbols; *p != NULL; p++)
3075 {
3076 elf_symbol_type *q;
3077
3078 q = (elf_symbol_type *) *p;
3079
3080 if (bfd_get_section (&q->symbol) != section)
3081 continue;
3082
3083 switch (ELF_ST_TYPE (q->internal_elf_sym.st_info))
3084 {
3085 default:
3086 break;
3087 case STT_FILE:
3088 filename = bfd_asymbol_name (&q->symbol);
3089 break;
252b5132
RH
3090 case STT_FUNC:
3091 case STT_ARM_TFUNC:
0367ecfb
NC
3092 /* Skip $a and $t symbols. */
3093 if ((q->symbol.flags & BSF_LOCAL)
3094 && is_arm_mapping_symbol_name (q->symbol.name))
3095 continue;
3096 /* Fall through. */
3097 case STT_NOTYPE:
252b5132
RH
3098 if (q->symbol.section == section
3099 && q->symbol.value >= low_func
3100 && q->symbol.value <= offset)
3101 {
3102 func = (asymbol *) q;
3103 low_func = q->symbol.value;
3104 }
3105 break;
3106 }
3107 }
3108
3109 if (func == NULL)
b34976b6 3110 return FALSE;
252b5132 3111
0367ecfb
NC
3112 if (filename_ptr)
3113 *filename_ptr = filename;
3114 if (functionname_ptr)
3115 *functionname_ptr = bfd_asymbol_name (func);
3116
3117 return TRUE;
3118}
3119
3120
3121/* Find the nearest line to a particular section and offset, for error
3122 reporting. This code is a duplicate of the code in elf.c, except
3123 that it uses arm_elf_find_function. */
3124
3125static bfd_boolean
3126elf32_arm_find_nearest_line (bfd * abfd,
3127 asection * section,
3128 asymbol ** symbols,
3129 bfd_vma offset,
3130 const char ** filename_ptr,
3131 const char ** functionname_ptr,
3132 unsigned int * line_ptr)
3133{
3134 bfd_boolean found = FALSE;
3135
3136 /* We skip _bfd_dwarf1_find_nearest_line since no known ARM toolchain uses it. */
3137
3138 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
3139 filename_ptr, functionname_ptr,
3140 line_ptr, 0,
3141 & elf_tdata (abfd)->dwarf2_find_line_info))
3142 {
3143 if (!*functionname_ptr)
3144 arm_elf_find_function (abfd, section, symbols, offset,
3145 *filename_ptr ? NULL : filename_ptr,
3146 functionname_ptr);
f21f3fe0 3147
0367ecfb
NC
3148 return TRUE;
3149 }
3150
3151 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
3152 & found, filename_ptr,
3153 functionname_ptr, line_ptr,
3154 & elf_tdata (abfd)->line_info))
3155 return FALSE;
3156
3157 if (found && (*functionname_ptr || *line_ptr))
3158 return TRUE;
3159
3160 if (symbols == NULL)
3161 return FALSE;
3162
3163 if (! arm_elf_find_function (abfd, section, symbols, offset,
3164 filename_ptr, functionname_ptr))
3165 return FALSE;
3166
3167 *line_ptr = 0;
b34976b6 3168 return TRUE;
252b5132
RH
3169}
3170
3171/* Adjust a symbol defined by a dynamic object and referenced by a
3172 regular object. The current definition is in some section of the
3173 dynamic object, but we're not including those sections. We have to
3174 change the definition to something the rest of the link can
3175 understand. */
3176
b34976b6 3177static bfd_boolean
57e8b36a
NC
3178elf32_arm_adjust_dynamic_symbol (struct bfd_link_info * info,
3179 struct elf_link_hash_entry * h)
252b5132
RH
3180{
3181 bfd * dynobj;
3182 asection * s;
3183 unsigned int power_of_two;
3184
3185 dynobj = elf_hash_table (info)->dynobj;
3186
3187 /* Make sure we know what is going on here. */
3188 BFD_ASSERT (dynobj != NULL
f5385ebf 3189 && (h->needs_plt
252b5132 3190 || h->weakdef != NULL
f5385ebf
AM
3191 || (h->def_dynamic
3192 && h->ref_regular
3193 && !h->def_regular)));
252b5132
RH
3194
3195 /* If this is a function, put it in the procedure linkage table. We
3196 will fill in the contents of the procedure linkage table later,
3197 when we know the address of the .got section. */
24a1ba0f 3198 if (h->type == STT_FUNC
f5385ebf 3199 || h->needs_plt)
252b5132 3200 {
5e681ec4
PB
3201 if (h->plt.refcount <= 0
3202 || SYMBOL_CALLS_LOCAL (info, h)
3203 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
3204 && h->root.type == bfd_link_hash_undefweak))
252b5132
RH
3205 {
3206 /* This case can occur if we saw a PLT32 reloc in an input
5e681ec4
PB
3207 file, but the symbol was never referred to by a dynamic
3208 object, or if all references were garbage collected. In
3209 such a case, we don't actually need to build a procedure
3210 linkage table, and we can just do a PC24 reloc instead. */
3211 h->plt.offset = (bfd_vma) -1;
f5385ebf 3212 h->needs_plt = 0;
252b5132
RH
3213 }
3214
b34976b6 3215 return TRUE;
252b5132 3216 }
5e681ec4
PB
3217 else
3218 /* It's possible that we incorrectly decided a .plt reloc was
3219 needed for an R_ARM_PC24 reloc to a non-function sym in
3220 check_relocs. We can't decide accurately between function and
3221 non-function syms in check-relocs; Objects loaded later in
3222 the link may change h->type. So fix it now. */
3223 h->plt.offset = (bfd_vma) -1;
252b5132
RH
3224
3225 /* If this is a weak symbol, and there is a real definition, the
3226 processor independent code will have arranged for us to see the
3227 real definition first, and we can just use the same value. */
3228 if (h->weakdef != NULL)
3229 {
3230 BFD_ASSERT (h->weakdef->root.type == bfd_link_hash_defined
3231 || h->weakdef->root.type == bfd_link_hash_defweak);
3232 h->root.u.def.section = h->weakdef->root.u.def.section;
3233 h->root.u.def.value = h->weakdef->root.u.def.value;
b34976b6 3234 return TRUE;
252b5132
RH
3235 }
3236
3237 /* This is a reference to a symbol defined by a dynamic object which
3238 is not a function. */
3239
3240 /* If we are creating a shared library, we must presume that the
3241 only references to the symbol are via the global offset table.
3242 For such cases we need not do anything here; the relocations will
3243 be handled correctly by relocate_section. */
3244 if (info->shared)
b34976b6 3245 return TRUE;
252b5132
RH
3246
3247 /* We must allocate the symbol in our .dynbss section, which will
3248 become part of the .bss section of the executable. There will be
3249 an entry for this symbol in the .dynsym section. The dynamic
3250 object will contain position independent code, so all references
3251 from the dynamic object to this symbol will go through the global
3252 offset table. The dynamic linker will use the .dynsym entry to
3253 determine the address it must put in the global offset table, so
3254 both the dynamic object and the regular object will refer to the
3255 same memory location for the variable. */
252b5132
RH
3256 s = bfd_get_section_by_name (dynobj, ".dynbss");
3257 BFD_ASSERT (s != NULL);
3258
3259 /* We must generate a R_ARM_COPY reloc to tell the dynamic linker to
3260 copy the initial value out of the dynamic object and into the
3261 runtime process image. We need to remember the offset into the
3262 .rel.bss section we are going to use. */
3263 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
3264 {
3265 asection *srel;
3266
3267 srel = bfd_get_section_by_name (dynobj, ".rel.bss");
3268 BFD_ASSERT (srel != NULL);
eea6121a 3269 srel->size += sizeof (Elf32_External_Rel);
f5385ebf 3270 h->needs_copy = 1;
252b5132
RH
3271 }
3272
3273 /* We need to figure out the alignment required for this symbol. I
3274 have no idea how ELF linkers handle this. */
3275 power_of_two = bfd_log2 (h->size);
3276 if (power_of_two > 3)
3277 power_of_two = 3;
3278
3279 /* Apply the required alignment. */
eea6121a 3280 s->size = BFD_ALIGN (s->size, (bfd_size_type) (1 << power_of_two));
252b5132
RH
3281 if (power_of_two > bfd_get_section_alignment (dynobj, s))
3282 {
3283 if (! bfd_set_section_alignment (dynobj, s, power_of_two))
b34976b6 3284 return FALSE;
252b5132
RH
3285 }
3286
3287 /* Define the symbol as being at this point in the section. */
3288 h->root.u.def.section = s;
eea6121a 3289 h->root.u.def.value = s->size;
252b5132
RH
3290
3291 /* Increment the section size to make room for the symbol. */
eea6121a 3292 s->size += h->size;
252b5132 3293
b34976b6 3294 return TRUE;
252b5132
RH
3295}
3296
5e681ec4
PB
3297/* Allocate space in .plt, .got and associated reloc sections for
3298 dynamic relocs. */
3299
3300static bfd_boolean
57e8b36a 3301allocate_dynrelocs (struct elf_link_hash_entry *h, void * inf)
5e681ec4
PB
3302{
3303 struct bfd_link_info *info;
3304 struct elf32_arm_link_hash_table *htab;
3305 struct elf32_arm_link_hash_entry *eh;
3306 struct elf32_arm_relocs_copied *p;
3307
3308 if (h->root.type == bfd_link_hash_indirect)
3309 return TRUE;
3310
3311 if (h->root.type == bfd_link_hash_warning)
3312 /* When warning symbols are created, they **replace** the "real"
3313 entry in the hash table, thus we never get to see the real
3314 symbol in a hash traversal. So look at it now. */
3315 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3316
3317 info = (struct bfd_link_info *) inf;
3318 htab = elf32_arm_hash_table (info);
3319
3320 if (htab->root.dynamic_sections_created
3321 && h->plt.refcount > 0)
3322 {
3323 /* Make sure this symbol is output as a dynamic symbol.
3324 Undefined weak syms won't yet be marked as dynamic. */
3325 if (h->dynindx == -1
f5385ebf 3326 && !h->forced_local)
5e681ec4 3327 {
c152c796 3328 if (! bfd_elf_link_record_dynamic_symbol (info, h))
5e681ec4
PB
3329 return FALSE;
3330 }
3331
3332 if (info->shared
7359ea65 3333 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
5e681ec4
PB
3334 {
3335 asection *s = htab->splt;
3336
3337 /* If this is the first .plt entry, make room for the special
3338 first entry. */
eea6121a 3339 if (s->size == 0)
e5a52504 3340 s->size += htab->plt_header_size;
5e681ec4 3341
eea6121a 3342 h->plt.offset = s->size;
5e681ec4
PB
3343
3344 /* If this symbol is not defined in a regular file, and we are
3345 not generating a shared library, then set the symbol to this
3346 location in the .plt. This is required to make function
3347 pointers compare as equal between the normal executable and
3348 the shared library. */
3349 if (! info->shared
f5385ebf 3350 && !h->def_regular)
5e681ec4
PB
3351 {
3352 h->root.u.def.section = s;
3353 h->root.u.def.value = h->plt.offset;
3354 }
3355
3356 /* Make room for this entry. */
e5a52504 3357 s->size += htab->plt_entry_size;
5e681ec4 3358
e5a52504
MM
3359 if (!htab->symbian_p)
3360 /* We also need to make an entry in the .got.plt section, which
3361 will be placed in the .got section by the linker script. */
3362 htab->sgotplt->size += 4;
5e681ec4
PB
3363
3364 /* We also need to make an entry in the .rel.plt section. */
eea6121a 3365 htab->srelplt->size += sizeof (Elf32_External_Rel);
5e681ec4
PB
3366 }
3367 else
3368 {
3369 h->plt.offset = (bfd_vma) -1;
f5385ebf 3370 h->needs_plt = 0;
5e681ec4
PB
3371 }
3372 }
3373 else
3374 {
3375 h->plt.offset = (bfd_vma) -1;
f5385ebf 3376 h->needs_plt = 0;
5e681ec4
PB
3377 }
3378
3379 if (h->got.refcount > 0)
3380 {
3381 asection *s;
3382 bfd_boolean dyn;
3383
3384 /* Make sure this symbol is output as a dynamic symbol.
3385 Undefined weak syms won't yet be marked as dynamic. */
3386 if (h->dynindx == -1
f5385ebf 3387 && !h->forced_local)
5e681ec4 3388 {
c152c796 3389 if (! bfd_elf_link_record_dynamic_symbol (info, h))
5e681ec4
PB
3390 return FALSE;
3391 }
3392
e5a52504
MM
3393 if (!htab->symbian_p)
3394 {
3395 s = htab->sgot;
3396 h->got.offset = s->size;
3397 s->size += 4;
3398 dyn = htab->root.dynamic_sections_created;
3399 if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
3400 || h->root.type != bfd_link_hash_undefweak)
3401 && (info->shared
3402 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
3403 htab->srelgot->size += sizeof (Elf32_External_Rel);
3404 }
5e681ec4
PB
3405 }
3406 else
3407 h->got.offset = (bfd_vma) -1;
3408
3409 eh = (struct elf32_arm_link_hash_entry *) h;
3410 if (eh->relocs_copied == NULL)
3411 return TRUE;
3412
3413 /* In the shared -Bsymbolic case, discard space allocated for
3414 dynamic pc-relative relocs against symbols which turn out to be
3415 defined in regular objects. For the normal shared case, discard
3416 space for pc-relative relocs that have become local due to symbol
3417 visibility changes. */
3418
3419 if (info->shared)
3420 {
7359ea65
DJ
3421 /* Discard relocs on undefined weak syms with non-default
3422 visibility. */
5e681ec4
PB
3423 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
3424 && h->root.type == bfd_link_hash_undefweak)
3425 eh->relocs_copied = NULL;
3426 }
3427 else
3428 {
3429 /* For the non-shared case, discard space for relocs against
3430 symbols which turn out to need copy relocs or are not
3431 dynamic. */
3432
f5385ebf
AM
3433 if (!h->non_got_ref
3434 && ((h->def_dynamic
3435 && !h->def_regular)
5e681ec4
PB
3436 || (htab->root.dynamic_sections_created
3437 && (h->root.type == bfd_link_hash_undefweak
3438 || h->root.type == bfd_link_hash_undefined))))
3439 {
3440 /* Make sure this symbol is output as a dynamic symbol.
3441 Undefined weak syms won't yet be marked as dynamic. */
3442 if (h->dynindx == -1
f5385ebf 3443 && !h->forced_local)
5e681ec4 3444 {
c152c796 3445 if (! bfd_elf_link_record_dynamic_symbol (info, h))
5e681ec4
PB
3446 return FALSE;
3447 }
3448
3449 /* If that succeeded, we know we'll be keeping all the
3450 relocs. */
3451 if (h->dynindx != -1)
3452 goto keep;
3453 }
3454
3455 eh->relocs_copied = NULL;
3456
3457 keep: ;
3458 }
3459
3460 /* Finally, allocate space. */
3461 for (p = eh->relocs_copied; p != NULL; p = p->next)
3462 {
3463 asection *sreloc = elf_section_data (p->section)->sreloc;
eea6121a 3464 sreloc->size += p->count * sizeof (Elf32_External_Rel);
5e681ec4
PB
3465 }
3466
3467 return TRUE;
3468}
3469
252b5132
RH
3470/* Set the sizes of the dynamic sections. */
3471
b34976b6 3472static bfd_boolean
57e8b36a
NC
3473elf32_arm_size_dynamic_sections (bfd * output_bfd ATTRIBUTE_UNUSED,
3474 struct bfd_link_info * info)
252b5132
RH
3475{
3476 bfd * dynobj;
3477 asection * s;
b34976b6
AM
3478 bfd_boolean plt;
3479 bfd_boolean relocs;
5e681ec4
PB
3480 bfd *ibfd;
3481 struct elf32_arm_link_hash_table *htab;
252b5132 3482
5e681ec4 3483 htab = elf32_arm_hash_table (info);
252b5132
RH
3484 dynobj = elf_hash_table (info)->dynobj;
3485 BFD_ASSERT (dynobj != NULL);
3486
3487 if (elf_hash_table (info)->dynamic_sections_created)
3488 {
3489 /* Set the contents of the .interp section to the interpreter. */
893c4fe2 3490 if (info->executable)
252b5132
RH
3491 {
3492 s = bfd_get_section_by_name (dynobj, ".interp");
3493 BFD_ASSERT (s != NULL);
eea6121a 3494 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
252b5132
RH
3495 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
3496 }
3497 }
5e681ec4
PB
3498
3499 /* Set up .got offsets for local syms, and space for local dynamic
3500 relocs. */
3501 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
252b5132 3502 {
5e681ec4
PB
3503 bfd_signed_vma *local_got;
3504 bfd_signed_vma *end_local_got;
3505 char *local_tls_type;
3506 bfd_size_type locsymcount;
3507 Elf_Internal_Shdr *symtab_hdr;
3508 asection *srel;
3509
3510 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
3511 continue;
3512
3513 for (s = ibfd->sections; s != NULL; s = s->next)
3514 {
3515 struct elf32_arm_relocs_copied *p;
3516
3517 for (p = *((struct elf32_arm_relocs_copied **)
3518 &elf_section_data (s)->local_dynrel);
3519 p != NULL;
3520 p = p->next)
3521 {
3522 if (!bfd_is_abs_section (p->section)
3523 && bfd_is_abs_section (p->section->output_section))
3524 {
3525 /* Input section has been discarded, either because
3526 it is a copy of a linkonce section or due to
3527 linker script /DISCARD/, so we'll be discarding
3528 the relocs too. */
3529 }
3530 else if (p->count != 0)
3531 {
3532 srel = elf_section_data (p->section)->sreloc;
eea6121a 3533 srel->size += p->count * sizeof (Elf32_External_Rel);
5e681ec4
PB
3534 if ((p->section->output_section->flags & SEC_READONLY) != 0)
3535 info->flags |= DF_TEXTREL;
3536 }
3537 }
3538 }
3539
3540 local_got = elf_local_got_refcounts (ibfd);
3541 if (!local_got)
3542 continue;
3543
3544 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
3545 locsymcount = symtab_hdr->sh_info;
3546 end_local_got = local_got + locsymcount;
3547 s = htab->sgot;
3548 srel = htab->srelgot;
3549 for (; local_got < end_local_got; ++local_got, ++local_tls_type)
3550 {
3551 if (*local_got > 0)
3552 {
eea6121a
AM
3553 *local_got = s->size;
3554 s->size += 4;
5e681ec4 3555 if (info->shared)
eea6121a 3556 srel->size += sizeof (Elf32_External_Rel);
5e681ec4
PB
3557 }
3558 else
3559 *local_got = (bfd_vma) -1;
3560 }
252b5132
RH
3561 }
3562
5e681ec4
PB
3563 /* Allocate global sym .plt and .got entries, and space for global
3564 sym dynamic relocs. */
57e8b36a 3565 elf_link_hash_traverse (& htab->root, allocate_dynrelocs, info);
252b5132
RH
3566
3567 /* The check_relocs and adjust_dynamic_symbol entry points have
3568 determined the sizes of the various dynamic sections. Allocate
3569 memory for them. */
b34976b6
AM
3570 plt = FALSE;
3571 relocs = FALSE;
252b5132
RH
3572 for (s = dynobj->sections; s != NULL; s = s->next)
3573 {
3574 const char * name;
b34976b6 3575 bfd_boolean strip;
252b5132
RH
3576
3577 if ((s->flags & SEC_LINKER_CREATED) == 0)
3578 continue;
3579
3580 /* It's OK to base decisions on the section name, because none
3581 of the dynobj section names depend upon the input files. */
3582 name = bfd_get_section_name (dynobj, s);
3583
b34976b6 3584 strip = FALSE;
252b5132 3585
24a1ba0f 3586 if (strcmp (name, ".plt") == 0)
252b5132 3587 {
eea6121a 3588 if (s->size == 0)
252b5132
RH
3589 {
3590 /* Strip this section if we don't need it; see the
3591 comment below. */
b34976b6 3592 strip = TRUE;
252b5132
RH
3593 }
3594 else
3595 {
3596 /* Remember whether there is a PLT. */
b34976b6 3597 plt = TRUE;
252b5132
RH
3598 }
3599 }
3600 else if (strncmp (name, ".rel", 4) == 0)
3601 {
eea6121a 3602 if (s->size == 0)
252b5132
RH
3603 {
3604 /* If we don't need this section, strip it from the
3605 output file. This is mostly to handle .rel.bss and
3606 .rel.plt. We must create both sections in
3607 create_dynamic_sections, because they must be created
3608 before the linker maps input sections to output
3609 sections. The linker does that before
3610 adjust_dynamic_symbol is called, and it is that
3611 function which decides whether anything needs to go
3612 into these sections. */
b34976b6 3613 strip = TRUE;
252b5132
RH
3614 }
3615 else
3616 {
252b5132
RH
3617 /* Remember whether there are any reloc sections other
3618 than .rel.plt. */
3619 if (strcmp (name, ".rel.plt") != 0)
b34976b6 3620 relocs = TRUE;
252b5132
RH
3621
3622 /* We use the reloc_count field as a counter if we need
3623 to copy relocs into the output file. */
3624 s->reloc_count = 0;
3625 }
3626 }
3627 else if (strncmp (name, ".got", 4) != 0)
3628 {
3629 /* It's not one of our sections, so don't allocate space. */
3630 continue;
3631 }
3632
3633 if (strip)
3634 {
52585bb8 3635 _bfd_strip_section_from_output (info, s);
252b5132
RH
3636 continue;
3637 }
3638
3639 /* Allocate memory for the section contents. */
eea6121a
AM
3640 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
3641 if (s->contents == NULL && s->size != 0)
b34976b6 3642 return FALSE;
252b5132
RH
3643 }
3644
3645 if (elf_hash_table (info)->dynamic_sections_created)
3646 {
3647 /* Add some entries to the .dynamic section. We fill in the
3648 values later, in elf32_arm_finish_dynamic_sections, but we
3649 must add the entries now so that we get the correct size for
3650 the .dynamic section. The DT_DEBUG entry is filled in by the
3651 dynamic linker and used by the debugger. */
dc810e39 3652#define add_dynamic_entry(TAG, VAL) \
5a580b3a 3653 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39
AM
3654
3655 if (!info->shared)
252b5132 3656 {
dc810e39 3657 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 3658 return FALSE;
252b5132
RH
3659 }
3660
3661 if (plt)
3662 {
dc810e39
AM
3663 if ( !add_dynamic_entry (DT_PLTGOT, 0)
3664 || !add_dynamic_entry (DT_PLTRELSZ, 0)
3665 || !add_dynamic_entry (DT_PLTREL, DT_REL)
3666 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 3667 return FALSE;
252b5132
RH
3668 }
3669
3670 if (relocs)
3671 {
dc810e39
AM
3672 if ( !add_dynamic_entry (DT_REL, 0)
3673 || !add_dynamic_entry (DT_RELSZ, 0)
3674 || !add_dynamic_entry (DT_RELENT, sizeof (Elf32_External_Rel)))
b34976b6 3675 return FALSE;
252b5132
RH
3676 }
3677
99e4ae17 3678 if ((info->flags & DF_TEXTREL) != 0)
252b5132 3679 {
dc810e39 3680 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 3681 return FALSE;
d6cf2879 3682 info->flags |= DF_TEXTREL;
252b5132
RH
3683 }
3684 }
dc810e39 3685#undef add_synamic_entry
252b5132 3686
b34976b6 3687 return TRUE;
252b5132
RH
3688}
3689
252b5132
RH
3690/* Finish up dynamic symbol handling. We set the contents of various
3691 dynamic sections here. */
3692
b34976b6 3693static bfd_boolean
57e8b36a
NC
3694elf32_arm_finish_dynamic_symbol (bfd * output_bfd, struct bfd_link_info * info,
3695 struct elf_link_hash_entry * h, Elf_Internal_Sym * sym)
252b5132
RH
3696{
3697 bfd * dynobj;
e5a52504 3698 struct elf32_arm_link_hash_table *htab;
252b5132
RH
3699
3700 dynobj = elf_hash_table (info)->dynobj;
e5a52504 3701 htab = elf32_arm_hash_table (info);
252b5132
RH
3702
3703 if (h->plt.offset != (bfd_vma) -1)
3704 {
3705 asection * splt;
252b5132 3706 asection * srel;
e5a52504 3707 bfd_byte *loc;
24a1ba0f 3708 bfd_vma plt_index;
947216bf 3709 Elf_Internal_Rela rel;
252b5132
RH
3710
3711 /* This symbol has an entry in the procedure linkage table. Set
3712 it up. */
3713
3714 BFD_ASSERT (h->dynindx != -1);
3715
3716 splt = bfd_get_section_by_name (dynobj, ".plt");
252b5132 3717 srel = bfd_get_section_by_name (dynobj, ".rel.plt");
e5a52504 3718 BFD_ASSERT (splt != NULL && srel != NULL);
252b5132 3719
24a1ba0f
NC
3720 /* Get the index in the procedure linkage table which
3721 corresponds to this symbol. This is the index of this symbol
3722 in all the symbols for which we are making plt entries. The
3723 first entry in the procedure linkage table is reserved. */
e5a52504
MM
3724 plt_index = ((h->plt.offset - htab->plt_header_size)
3725 / htab->plt_entry_size);
252b5132 3726
e5a52504
MM
3727 /* Fill in the entry in the procedure linkage table. */
3728 if (htab->symbian_p)
3729 {
3730 unsigned i;
3731 for (i = 0; i < htab->plt_entry_size / 4; ++i)
3732 bfd_put_32 (output_bfd,
3733 elf32_arm_symbian_plt_entry[i],
3734 splt->contents + h->plt.offset + 4 * i);
3735
3736 /* Fill in the entry in the .rel.plt section. */
3737 rel.r_offset = (splt->output_offset
3738 + h->plt.offset + 4 * (i - 1));
3739 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARM_GLOB_DAT);
3740 }
3741 else
3742 {
3743 bfd_vma got_offset;
3744 bfd_vma got_displacement;
3745 asection * sgot;
3746
3747 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
3748 BFD_ASSERT (sgot != NULL);
3749
3750 /* Get the offset into the .got table of the entry that
3751 corresponds to this function. Each .got entry is 4 bytes.
3752 The first three are reserved. */
3753 got_offset = (plt_index + 3) * 4;
3754
3755 /* Calculate the displacement between the PLT slot and the
3756 entry in the GOT. */
3757 got_displacement = (sgot->output_section->vma
3758 + sgot->output_offset
3759 + got_offset
3760 - splt->output_section->vma
3761 - splt->output_offset
3762 - h->plt.offset
3763 - 8);
5e681ec4 3764
e5a52504 3765 BFD_ASSERT ((got_displacement & 0xf0000000) == 0);
5e681ec4 3766
e5a52504
MM
3767 bfd_put_32 (output_bfd, elf32_arm_plt_entry[0] | ((got_displacement & 0x0ff00000) >> 20),
3768 splt->contents + h->plt.offset + 0);
3769 bfd_put_32 (output_bfd, elf32_arm_plt_entry[1] | ((got_displacement & 0x000ff000) >> 12),
3770 splt->contents + h->plt.offset + 4);
3771 bfd_put_32 (output_bfd, elf32_arm_plt_entry[2] | (got_displacement & 0x00000fff),
3772 splt->contents + h->plt.offset + 8);
5e681ec4 3773#ifdef FOUR_WORD_PLT
e5a52504
MM
3774 bfd_put_32 (output_bfd, elf32_arm_plt_entry[3],
3775 splt->contents + h->plt.offset + 12);
5e681ec4 3776#endif
252b5132 3777
e5a52504
MM
3778 /* Fill in the entry in the global offset table. */
3779 bfd_put_32 (output_bfd,
3780 (splt->output_section->vma
3781 + splt->output_offset),
3782 sgot->contents + got_offset);
3783
3784 /* Fill in the entry in the .rel.plt section. */
3785 rel.r_offset = (sgot->output_section->vma
3786 + sgot->output_offset
3787 + got_offset);
3788 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARM_JUMP_SLOT);
3789 }
57e8b36a 3790
947216bf
AM
3791 loc = srel->contents + plt_index * sizeof (Elf32_External_Rel);
3792 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
252b5132 3793
f5385ebf 3794 if (!h->def_regular)
252b5132
RH
3795 {
3796 /* Mark the symbol as undefined, rather than as defined in
3797 the .plt section. Leave the value alone. */
3798 sym->st_shndx = SHN_UNDEF;
d982ba73
PB
3799 /* If the symbol is weak, we do need to clear the value.
3800 Otherwise, the PLT entry would provide a definition for
3801 the symbol even if the symbol wasn't defined anywhere,
3802 and so the symbol would never be NULL. */
f5385ebf 3803 if (!h->ref_regular_nonweak)
d982ba73 3804 sym->st_value = 0;
252b5132
RH
3805 }
3806 }
3807
3808 if (h->got.offset != (bfd_vma) -1)
3809 {
3810 asection * sgot;
3811 asection * srel;
947216bf
AM
3812 Elf_Internal_Rela rel;
3813 bfd_byte *loc;
252b5132
RH
3814
3815 /* This symbol has an entry in the global offset table. Set it
3816 up. */
252b5132
RH
3817 sgot = bfd_get_section_by_name (dynobj, ".got");
3818 srel = bfd_get_section_by_name (dynobj, ".rel.got");
3819 BFD_ASSERT (sgot != NULL && srel != NULL);
3820
3821 rel.r_offset = (sgot->output_section->vma
3822 + sgot->output_offset
dc810e39 3823 + (h->got.offset &~ (bfd_vma) 1));
252b5132 3824
5e681ec4
PB
3825 /* If this is a static link, or it is a -Bsymbolic link and the
3826 symbol is defined locally or was forced to be local because
3827 of a version file, we just want to emit a RELATIVE reloc.
3828 The entry in the global offset table will already have been
3829 initialized in the relocate_section function. */
252b5132 3830 if (info->shared
5e681ec4
PB
3831 && SYMBOL_REFERENCES_LOCAL (info, h))
3832 {
3833 BFD_ASSERT((h->got.offset & 1) != 0);
3834 rel.r_info = ELF32_R_INFO (0, R_ARM_RELATIVE);
3835 }
252b5132
RH
3836 else
3837 {
5e681ec4 3838 BFD_ASSERT((h->got.offset & 1) == 0);
252b5132
RH
3839 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset);
3840 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARM_GLOB_DAT);
3841 }
3842
947216bf
AM
3843 loc = srel->contents + srel->reloc_count++ * sizeof (Elf32_External_Rel);
3844 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
252b5132
RH
3845 }
3846
f5385ebf 3847 if (h->needs_copy)
252b5132
RH
3848 {
3849 asection * s;
947216bf
AM
3850 Elf_Internal_Rela rel;
3851 bfd_byte *loc;
252b5132
RH
3852
3853 /* This symbol needs a copy reloc. Set it up. */
252b5132
RH
3854 BFD_ASSERT (h->dynindx != -1
3855 && (h->root.type == bfd_link_hash_defined
3856 || h->root.type == bfd_link_hash_defweak));
3857
3858 s = bfd_get_section_by_name (h->root.u.def.section->owner,
3859 ".rel.bss");
3860 BFD_ASSERT (s != NULL);
3861
3862 rel.r_offset = (h->root.u.def.value
3863 + h->root.u.def.section->output_section->vma
3864 + h->root.u.def.section->output_offset);
3865 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARM_COPY);
947216bf
AM
3866 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rel);
3867 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
252b5132
RH
3868 }
3869
3870 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
3871 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
3872 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
3873 sym->st_shndx = SHN_ABS;
3874
b34976b6 3875 return TRUE;
252b5132
RH
3876}
3877
3878/* Finish up the dynamic sections. */
3879
b34976b6 3880static bfd_boolean
57e8b36a 3881elf32_arm_finish_dynamic_sections (bfd * output_bfd, struct bfd_link_info * info)
252b5132
RH
3882{
3883 bfd * dynobj;
3884 asection * sgot;
3885 asection * sdyn;
3886
3887 dynobj = elf_hash_table (info)->dynobj;
3888
3889 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
229fcec5 3890 BFD_ASSERT (elf32_arm_hash_table (info)->symbian_p || sgot != NULL);
252b5132
RH
3891 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
3892
3893 if (elf_hash_table (info)->dynamic_sections_created)
3894 {
3895 asection *splt;
3896 Elf32_External_Dyn *dyncon, *dynconend;
229fcec5 3897 struct elf32_arm_link_hash_table *htab;
252b5132 3898
229fcec5 3899 htab = elf32_arm_hash_table (info);
252b5132 3900 splt = bfd_get_section_by_name (dynobj, ".plt");
24a1ba0f 3901 BFD_ASSERT (splt != NULL && sdyn != NULL);
252b5132
RH
3902
3903 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 3904 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
9b485d32 3905
252b5132
RH
3906 for (; dyncon < dynconend; dyncon++)
3907 {
3908 Elf_Internal_Dyn dyn;
3909 const char * name;
3910 asection * s;
3911
3912 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
3913
3914 switch (dyn.d_tag)
3915 {
229fcec5
MM
3916 unsigned int type;
3917
252b5132
RH
3918 default:
3919 break;
3920
229fcec5
MM
3921 case DT_HASH:
3922 name = ".hash";
3923 goto get_vma_if_bpabi;
3924 case DT_STRTAB:
3925 name = ".dynstr";
3926 goto get_vma_if_bpabi;
3927 case DT_SYMTAB:
3928 name = ".dynsym";
3929 goto get_vma_if_bpabi;
3930
252b5132
RH
3931 case DT_PLTGOT:
3932 name = ".got";
3933 goto get_vma;
3934 case DT_JMPREL:
3935 name = ".rel.plt";
3936 get_vma:
3937 s = bfd_get_section_by_name (output_bfd, name);
3938 BFD_ASSERT (s != NULL);
229fcec5
MM
3939 if (!htab->symbian_p)
3940 dyn.d_un.d_ptr = s->vma;
3941 else
3942 /* In the BPABI, tags in the PT_DYNAMIC section point
3943 at the file offset, not the memory address, for the
3944 convenience of the post linker. */
3945 dyn.d_un.d_ptr = s->filepos;
252b5132
RH
3946 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
3947 break;
3948
229fcec5
MM
3949 get_vma_if_bpabi:
3950 if (htab->symbian_p)
3951 goto get_vma;
3952 break;
3953
252b5132
RH
3954 case DT_PLTRELSZ:
3955 s = bfd_get_section_by_name (output_bfd, ".rel.plt");
3956 BFD_ASSERT (s != NULL);
eea6121a 3957 dyn.d_un.d_val = s->size;
252b5132
RH
3958 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
3959 break;
229fcec5 3960
252b5132 3961 case DT_RELSZ:
229fcec5
MM
3962 if (!htab->symbian_p)
3963 {
3964 /* My reading of the SVR4 ABI indicates that the
3965 procedure linkage table relocs (DT_JMPREL) should be
3966 included in the overall relocs (DT_REL). This is
3967 what Solaris does. However, UnixWare can not handle
3968 that case. Therefore, we override the DT_RELSZ entry
3969 here to make it not include the JMPREL relocs. Since
3970 the linker script arranges for .rel.plt to follow all
3971 other relocation sections, we don't have to worry
3972 about changing the DT_REL entry. */
3973 s = bfd_get_section_by_name (output_bfd, ".rel.plt");
3974 if (s != NULL)
3975 dyn.d_un.d_val -= s->size;
3976 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
3977 break;
3978 }
3979 /* Fall through */
3980
3981 case DT_REL:
3982 case DT_RELA:
3983 case DT_RELASZ:
3984 /* In the BPABI, the DT_REL tag must point at the file
3985 offset, not the VMA, of the first relocation
3986 section. So, we use code similar to that in
3987 elflink.c, but do not check for SHF_ALLOC on the
3988 relcoation section, since relocations sections are
3989 never allocated under the BPABI. The comments above
3990 about Unixware notwithstanding, we include all of the
3991 relocations here. */
3992 if (htab->symbian_p)
3993 {
3994 unsigned int i;
3995 type = ((dyn.d_tag == DT_REL || dyn.d_tag == DT_RELSZ)
3996 ? SHT_REL : SHT_RELA);
3997 dyn.d_un.d_val = 0;
3998 for (i = 1; i < elf_numsections (output_bfd); i++)
3999 {
4000 Elf_Internal_Shdr *hdr
4001 = elf_elfsections (output_bfd)[i];
4002 if (hdr->sh_type == type)
4003 {
4004 if (dyn.d_tag == DT_RELSZ
4005 || dyn.d_tag == DT_RELASZ)
4006 dyn.d_un.d_val += hdr->sh_size;
4007 else if (dyn.d_un.d_val == 0
4008 || hdr->sh_offset < dyn.d_un.d_val)
4009 dyn.d_un.d_val = hdr->sh_offset;
4010 }
4011 }
4012 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
4013 }
252b5132 4014 break;
88f7bcd5
NC
4015
4016 /* Set the bottom bit of DT_INIT/FINI if the
4017 corresponding function is Thumb. */
4018 case DT_INIT:
4019 name = info->init_function;
4020 goto get_sym;
4021 case DT_FINI:
4022 name = info->fini_function;
4023 get_sym:
4024 /* If it wasn't set by elf_bfd_final_link
4cc11e76 4025 then there is nothing to adjust. */
88f7bcd5
NC
4026 if (dyn.d_un.d_val != 0)
4027 {
4028 struct elf_link_hash_entry * eh;
4029
4030 eh = elf_link_hash_lookup (elf_hash_table (info), name,
b34976b6 4031 FALSE, FALSE, TRUE);
88f7bcd5
NC
4032 if (eh != (struct elf_link_hash_entry *) NULL
4033 && ELF_ST_TYPE (eh->type) == STT_ARM_TFUNC)
4034 {
4035 dyn.d_un.d_val |= 1;
b34976b6 4036 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
88f7bcd5
NC
4037 }
4038 }
4039 break;
252b5132
RH
4040 }
4041 }
4042
24a1ba0f 4043 /* Fill in the first entry in the procedure linkage table. */
e5a52504 4044 if (splt->size > 0 && elf32_arm_hash_table (info)->plt_header_size)
f7a74f8c 4045 {
5e681ec4
PB
4046 bfd_vma got_displacement;
4047
4048 /* Calculate the displacement between the PLT slot and &GOT[0]. */
4049 got_displacement = (sgot->output_section->vma
4050 + sgot->output_offset
4051 - splt->output_section->vma
4052 - splt->output_offset
4053 - 16);
4054
f7a74f8c
NC
4055 bfd_put_32 (output_bfd, elf32_arm_plt0_entry[0], splt->contents + 0);
4056 bfd_put_32 (output_bfd, elf32_arm_plt0_entry[1], splt->contents + 4);
4057 bfd_put_32 (output_bfd, elf32_arm_plt0_entry[2], splt->contents + 8);
4058 bfd_put_32 (output_bfd, elf32_arm_plt0_entry[3], splt->contents + 12);
5e681ec4
PB
4059#ifdef FOUR_WORD_PLT
4060 /* The displacement value goes in the otherwise-unused last word of
4061 the second entry. */
4062 bfd_put_32 (output_bfd, got_displacement, splt->contents + 28);
4063#else
4064 bfd_put_32 (output_bfd, got_displacement, splt->contents + 16);
4065#endif
f7a74f8c 4066 }
252b5132
RH
4067
4068 /* UnixWare sets the entsize of .plt to 4, although that doesn't
4069 really seem like the right value. */
4070 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 4;
4071 }
4072
4073 /* Fill in the first three entries in the global offset table. */
229fcec5 4074 if (sgot)
252b5132 4075 {
229fcec5
MM
4076 if (sgot->size > 0)
4077 {
4078 if (sdyn == NULL)
4079 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
4080 else
4081 bfd_put_32 (output_bfd,
4082 sdyn->output_section->vma + sdyn->output_offset,
4083 sgot->contents);
4084 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
4085 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
4086 }
252b5132 4087
229fcec5
MM
4088 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
4089 }
252b5132 4090
b34976b6 4091 return TRUE;
252b5132
RH
4092}
4093
ba96a88f 4094static void
57e8b36a 4095elf32_arm_post_process_headers (bfd * abfd, struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
ba96a88f 4096{
9b485d32 4097 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
e489d0ae 4098 struct elf32_arm_link_hash_table *globals;
ba96a88f
NC
4099
4100 i_ehdrp = elf_elfheader (abfd);
4101
4102 i_ehdrp->e_ident[EI_OSABI] = ARM_ELF_OS_ABI_VERSION;
4103 i_ehdrp->e_ident[EI_ABIVERSION] = ARM_ELF_ABI_VERSION;
e489d0ae 4104
93204d3a
PB
4105 if (link_info)
4106 {
4107 globals = elf32_arm_hash_table (link_info);
4108 if (globals->byteswap_code)
4109 i_ehdrp->e_flags |= EF_ARM_BE8;
4110 }
ba96a88f
NC
4111}
4112
99e4ae17 4113static enum elf_reloc_type_class
57e8b36a 4114elf32_arm_reloc_type_class (const Elf_Internal_Rela *rela)
99e4ae17 4115{
f51e552e 4116 switch ((int) ELF32_R_TYPE (rela->r_info))
99e4ae17
AJ
4117 {
4118 case R_ARM_RELATIVE:
4119 return reloc_class_relative;
4120 case R_ARM_JUMP_SLOT:
4121 return reloc_class_plt;
4122 case R_ARM_COPY:
4123 return reloc_class_copy;
4124 default:
4125 return reloc_class_normal;
4126 }
4127}
4128
57e8b36a
NC
4129static bfd_boolean elf32_arm_section_flags (flagword *, const Elf_Internal_Shdr *);
4130static void elf32_arm_final_write_processing (bfd *, bfd_boolean);
e16bb312
NC
4131
4132/* Set the right machine number for an Arm ELF file. */
4133
4134static bfd_boolean
57e8b36a 4135elf32_arm_section_flags (flagword *flags, const Elf_Internal_Shdr *hdr)
e16bb312
NC
4136{
4137 if (hdr->sh_type == SHT_NOTE)
4138 *flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_SAME_CONTENTS;
4139
4140 return TRUE;
4141}
4142
e489d0ae 4143static void
57e8b36a 4144elf32_arm_final_write_processing (bfd *abfd, bfd_boolean linker ATTRIBUTE_UNUSED)
e16bb312 4145{
5a6c6817 4146 bfd_arm_update_notes (abfd, ARM_NOTE_SECTION);
e16bb312
NC
4147}
4148
e489d0ae
PB
4149
4150/* Called for each symbol. Builds a section map based on mapping symbols.
4151 Does not alter any of the symbols. */
4152
4153static bfd_boolean
4154elf32_arm_output_symbol_hook (struct bfd_link_info *info,
4155 const char *name,
4156 Elf_Internal_Sym *elfsym,
4157 asection *input_sec,
4158 struct elf_link_hash_entry *h ATTRIBUTE_UNUSED)
4159{
4160 int mapcount;
4161 elf32_arm_section_map *map;
4162 struct elf32_arm_link_hash_table *globals;
4163
4164 /* Only do this on final link. */
4165 if (info->relocatable)
4166 return TRUE;
4167
4168 /* Only build a map if we need to byteswap code. */
4169 globals = elf32_arm_hash_table (info);
4170 if (!globals->byteswap_code)
4171 return TRUE;
4172
4173 /* We only want mapping symbols. */
0367ecfb 4174 if (! is_arm_mapping_symbol_name (name))
e489d0ae
PB
4175 return TRUE;
4176
4177 mapcount = ++(elf32_arm_section_data (input_sec)->mapcount);
4178 map = elf32_arm_section_data (input_sec)->map;
4179 /* TODO: This may be inefficient, but we probably don't usually have many
4180 mapping symbols per section. */
4181 map = bfd_realloc (map, mapcount * sizeof (elf32_arm_section_map));
4182 elf32_arm_section_data (input_sec)->map = map;
57e8b36a 4183
e489d0ae
PB
4184 map[mapcount - 1].vma = elfsym->st_value;
4185 map[mapcount - 1].type = name[1];
4186 return TRUE;
4187}
4188
4189
4190/* Allocate target specific section data. */
4191
4192static bfd_boolean
4193elf32_arm_new_section_hook (bfd *abfd, asection *sec)
4194{
4195 struct _arm_elf_section_data *sdata;
4196 bfd_size_type amt = sizeof (*sdata);
4197
4198 sdata = bfd_zalloc (abfd, amt);
4199 if (sdata == NULL)
4200 return FALSE;
4201 sec->used_by_bfd = sdata;
4202
4203 return _bfd_elf_new_section_hook (abfd, sec);
4204}
4205
4206
4207/* Used to order a list of mapping symbols by address. */
4208
4209static int
4210elf32_arm_compare_mapping (const void * a, const void * b)
4211{
4212 return ((const elf32_arm_section_map *) a)->vma
4213 > ((const elf32_arm_section_map *) b)->vma;
4214}
4215
4216
4217/* Do code byteswapping. Return FALSE afterwards so that the section is
4218 written out as normal. */
4219
4220static bfd_boolean
4221elf32_arm_write_section (bfd *output_bfd ATTRIBUTE_UNUSED, asection *sec,
4222 bfd_byte *contents)
4223{
4224 int mapcount;
4225 elf32_arm_section_map *map;
4226 bfd_vma ptr;
4227 bfd_vma end;
4228 bfd_vma offset;
4229 bfd_byte tmp;
4230 int i;
57e8b36a 4231
e489d0ae
PB
4232 mapcount = elf32_arm_section_data (sec)->mapcount;
4233 map = elf32_arm_section_data (sec)->map;
4234
4235 if (mapcount == 0)
4236 return FALSE;
4237
4238 qsort (map, mapcount, sizeof (elf32_arm_section_map),
4239 elf32_arm_compare_mapping);
4240
4241 offset = sec->output_section->vma + sec->output_offset;
4242 ptr = map[0].vma - offset;
4243 for (i = 0; i < mapcount; i++)
4244 {
4245 if (i == mapcount - 1)
eea6121a 4246 end = sec->size;
e489d0ae
PB
4247 else
4248 end = map[i + 1].vma - offset;
57e8b36a 4249
e489d0ae
PB
4250 switch (map[i].type)
4251 {
4252 case 'a':
4253 /* Byte swap code words. */
4254 while (ptr + 3 < end)
4255 {
4256 tmp = contents[ptr];
4257 contents[ptr] = contents[ptr + 3];
4258 contents[ptr + 3] = tmp;
4259 tmp = contents[ptr + 1];
4260 contents[ptr + 1] = contents[ptr + 2];
4261 contents[ptr + 2] = tmp;
4262 ptr += 4;
4263 }
4264 break;
4265
4266 case 't':
4267 /* Byte swap code halfwords. */
4268 while (ptr + 1 < end)
4269 {
4270 tmp = contents[ptr];
4271 contents[ptr] = contents[ptr + 1];
4272 contents[ptr + 1] = tmp;
4273 ptr += 2;
4274 }
4275 break;
4276
4277 case 'd':
4278 /* Leave data alone. */
4279 break;
4280 }
4281 ptr = end;
4282 }
93204d3a 4283 free (map);
e489d0ae
PB
4284 return FALSE;
4285}
4286
252b5132
RH
4287#define ELF_ARCH bfd_arch_arm
4288#define ELF_MACHINE_CODE EM_ARM
d0facd1b
NC
4289#ifdef __QNXTARGET__
4290#define ELF_MAXPAGESIZE 0x1000
4291#else
f21f3fe0 4292#define ELF_MAXPAGESIZE 0x8000
d0facd1b 4293#endif
252b5132 4294
99e4ae17
AJ
4295#define bfd_elf32_bfd_copy_private_bfd_data elf32_arm_copy_private_bfd_data
4296#define bfd_elf32_bfd_merge_private_bfd_data elf32_arm_merge_private_bfd_data
252b5132
RH
4297#define bfd_elf32_bfd_set_private_flags elf32_arm_set_private_flags
4298#define bfd_elf32_bfd_print_private_bfd_data elf32_arm_print_private_bfd_data
4299#define bfd_elf32_bfd_link_hash_table_create elf32_arm_link_hash_table_create
dc810e39 4300#define bfd_elf32_bfd_reloc_type_lookup elf32_arm_reloc_type_lookup
252b5132 4301#define bfd_elf32_find_nearest_line elf32_arm_find_nearest_line
e489d0ae 4302#define bfd_elf32_new_section_hook elf32_arm_new_section_hook
252b5132
RH
4303
4304#define elf_backend_get_symbol_type elf32_arm_get_symbol_type
4305#define elf_backend_gc_mark_hook elf32_arm_gc_mark_hook
4306#define elf_backend_gc_sweep_hook elf32_arm_gc_sweep_hook
4307#define elf_backend_check_relocs elf32_arm_check_relocs
dc810e39 4308#define elf_backend_relocate_section elf32_arm_relocate_section
e489d0ae 4309#define elf_backend_write_section elf32_arm_write_section
252b5132 4310#define elf_backend_adjust_dynamic_symbol elf32_arm_adjust_dynamic_symbol
5e681ec4 4311#define elf_backend_create_dynamic_sections elf32_arm_create_dynamic_sections
252b5132
RH
4312#define elf_backend_finish_dynamic_symbol elf32_arm_finish_dynamic_symbol
4313#define elf_backend_finish_dynamic_sections elf32_arm_finish_dynamic_sections
e489d0ae 4314#define elf_backend_link_output_symbol_hook elf32_arm_output_symbol_hook
252b5132 4315#define elf_backend_size_dynamic_sections elf32_arm_size_dynamic_sections
ba96a88f 4316#define elf_backend_post_process_headers elf32_arm_post_process_headers
99e4ae17 4317#define elf_backend_reloc_type_class elf32_arm_reloc_type_class
c178919b 4318#define elf_backend_object_p elf32_arm_object_p
e16bb312
NC
4319#define elf_backend_section_flags elf32_arm_section_flags
4320#define elf_backend_final_write_processing elf32_arm_final_write_processing
5e681ec4 4321#define elf_backend_copy_indirect_symbol elf32_arm_copy_indirect_symbol
252b5132 4322
5e681ec4 4323#define elf_backend_can_refcount 1
252b5132
RH
4324#define elf_backend_can_gc_sections 1
4325#define elf_backend_plt_readonly 1
4326#define elf_backend_want_got_plt 1
4327#define elf_backend_want_plt_sym 0
acf8aed4 4328#if !USE_REL
b491616a
AM
4329#define elf_backend_rela_normal 1
4330#endif
252b5132 4331
04f7c78d 4332#define elf_backend_got_header_size 12
04f7c78d 4333
252b5132 4334#include "elf32-target.h"