]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-cris.c
*** empty log message ***
[thirdparty/binutils-gdb.git] / bfd / elf32-cris.c
CommitLineData
06c15ad7 1/* CRIS-specific support for 32-bit ELF.
83bac4b0 2 Copyright 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008
3eb128b2 3 Free Software Foundation, Inc.
06c15ad7
HPN
4 Contributed by Axis Communications AB.
5 Written by Hans-Peter Nilsson, based on elf32-fr30.c
915e5146 6 PIC and shlib bits based primarily on elf32-m68k.c and elf32-i386.c.
06c15ad7 7
ae9a127f 8 This file is part of BFD, the Binary File Descriptor library.
06c15ad7 9
ae9a127f
NC
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
cd123cb7 12 the Free Software Foundation; either version 3 of the License, or
ae9a127f 13 (at your option) any later version.
06c15ad7 14
ae9a127f
NC
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
06c15ad7 19
ae9a127f
NC
20 You should have received a copy of the GNU General Public License
21 along with this program; if not, write to the Free Software
cd123cb7
NC
22 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
23 MA 02110-1301, USA. */
06c15ad7 24
06c15ad7 25#include "sysdep.h"
3db64b00 26#include "bfd.h"
06c15ad7
HPN
27#include "libbfd.h"
28#include "elf-bfd.h"
29#include "elf/cris.h"
100382c7 30#include <limits.h>
06c15ad7
HPN
31
32/* Forward declarations. */
33static reloc_howto_type * cris_reloc_type_lookup
34 PARAMS ((bfd *abfd, bfd_reloc_code_real_type code));
35
a7c10850 36static void cris_info_to_howto_rela
947216bf 37 PARAMS ((bfd *, arelent *, Elf_Internal_Rela *));
06c15ad7 38
bac23f82
HPN
39static bfd_reloc_status_type cris_elf_pcrel_reloc
40 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
41
b34976b6 42static bfd_boolean cris_elf_grok_prstatus
72209a1f
HPN
43 PARAMS ((bfd *abfd, Elf_Internal_Note *note));
44
b34976b6 45static bfd_boolean cris_elf_grok_psinfo
72209a1f
HPN
46 PARAMS ((bfd *abfd, Elf_Internal_Note *note));
47
b34976b6 48static bfd_boolean cris_elf_relocate_section
06c15ad7
HPN
49 PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *, bfd_byte *,
50 Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
51
52static bfd_reloc_status_type cris_final_link_relocate
53 PARAMS ((reloc_howto_type *, bfd *, asection *, bfd_byte *,
54 Elf_Internal_Rela *, bfd_vma));
55
b34976b6 56static bfd_boolean cris_elf_object_p PARAMS ((bfd *));
4da81684 57
b34976b6 58static void cris_elf_final_write_processing PARAMS ((bfd *, bfd_boolean));
4da81684 59
bac23f82
HPN
60static bfd_boolean cris_elf_set_mach_from_flags
61 PARAMS ((bfd *, unsigned long int));
62
b34976b6 63static bfd_boolean cris_elf_print_private_bfd_data PARAMS ((bfd *, PTR));
4da81684 64
b34976b6 65static bfd_boolean cris_elf_merge_private_bfd_data PARAMS ((bfd *, bfd *));
bac23f82 66static bfd_boolean cris_elf_copy_private_bfd_data PARAMS ((bfd *, bfd *));
4da81684 67
915e5146 68struct elf_cris_link_hash_entry;
b34976b6 69static bfd_boolean elf_cris_discard_excess_dso_dynamics
4d96d128 70 PARAMS ((struct elf_cris_link_hash_entry *, PTR));
b34976b6 71static bfd_boolean elf_cris_discard_excess_program_dynamics
915e5146 72 PARAMS ((struct elf_cris_link_hash_entry *, PTR));
b34976b6 73static bfd_boolean elf_cris_adjust_gotplt_to_got
915e5146 74 PARAMS ((struct elf_cris_link_hash_entry *, PTR));
b34976b6 75static bfd_boolean elf_cris_try_fold_plt_to_got
915e5146
HPN
76 PARAMS ((struct elf_cris_link_hash_entry *, PTR));
77static struct bfd_hash_entry *elf_cris_link_hash_newfunc
78 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
79static struct bfd_link_hash_table *elf_cris_link_hash_table_create
80 PARAMS ((bfd *));
b34976b6 81static bfd_boolean elf_cris_adjust_dynamic_symbol
915e5146 82 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
b34976b6 83static bfd_boolean cris_elf_check_relocs
99c79b2e
AJ
84 PARAMS ((bfd *, struct bfd_link_info *, asection *,
85 const Elf_Internal_Rela *));
86
b34976b6 87static bfd_boolean elf_cris_size_dynamic_sections
915e5146 88 PARAMS ((bfd *, struct bfd_link_info *));
b34976b6 89static bfd_boolean elf_cris_finish_dynamic_symbol
915e5146
HPN
90 PARAMS ((bfd *, struct bfd_link_info *, struct elf_link_hash_entry *,
91 Elf_Internal_Sym *));
b34976b6 92static bfd_boolean elf_cris_finish_dynamic_sections
915e5146
HPN
93 PARAMS ((bfd *, struct bfd_link_info *));
94static void elf_cris_hide_symbol
b34976b6 95 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *, bfd_boolean));
99e4ae17 96static enum elf_reloc_type_class elf_cris_reloc_type_class
f51e552e 97 PARAMS ((const Elf_Internal_Rela *));
915e5146 98
06c15ad7
HPN
99static reloc_howto_type cris_elf_howto_table [] =
100{
101 /* This reloc does nothing. */
102 HOWTO (R_CRIS_NONE, /* type */
103 0, /* rightshift */
104 2, /* size (0 = byte, 1 = short, 2 = long) */
105 32, /* bitsize */
b34976b6 106 FALSE, /* pc_relative */
06c15ad7
HPN
107 0, /* bitpos */
108 complain_overflow_bitfield, /* complain_on_overflow */
109 bfd_elf_generic_reloc, /* special_function */
110 "R_CRIS_NONE", /* name */
b34976b6 111 FALSE, /* partial_inplace */
06c15ad7
HPN
112 0, /* src_mask */
113 0, /* dst_mask */
b34976b6 114 FALSE), /* pcrel_offset */
06c15ad7
HPN
115
116 /* An 8 bit absolute relocation. */
117 HOWTO (R_CRIS_8, /* type */
118 0, /* rightshift */
119 0, /* size (0 = byte, 1 = short, 2 = long) */
120 8, /* bitsize */
b34976b6 121 FALSE, /* pc_relative */
06c15ad7
HPN
122 0, /* bitpos */
123 complain_overflow_bitfield, /* complain_on_overflow */
124 bfd_elf_generic_reloc, /* special_function */
125 "R_CRIS_8", /* name */
b34976b6 126 FALSE, /* partial_inplace */
06c15ad7
HPN
127 0x0000, /* src_mask */
128 0x00ff, /* dst_mask */
b34976b6 129 FALSE), /* pcrel_offset */
06c15ad7
HPN
130
131 /* A 16 bit absolute relocation. */
132 HOWTO (R_CRIS_16, /* type */
133 0, /* rightshift */
134 1, /* size (0 = byte, 1 = short, 2 = long) */
135 16, /* bitsize */
b34976b6 136 FALSE, /* pc_relative */
06c15ad7
HPN
137 0, /* bitpos */
138 complain_overflow_bitfield, /* complain_on_overflow */
139 bfd_elf_generic_reloc, /* special_function */
140 "R_CRIS_16", /* name */
b34976b6 141 FALSE, /* partial_inplace */
06c15ad7
HPN
142 0x00000000, /* src_mask */
143 0x0000ffff, /* dst_mask */
b34976b6 144 FALSE), /* pcrel_offset */
06c15ad7
HPN
145
146 /* A 32 bit absolute relocation. */
147 HOWTO (R_CRIS_32, /* type */
148 0, /* rightshift */
149 2, /* size (0 = byte, 1 = short, 2 = long) */
150 32, /* bitsize */
b34976b6 151 FALSE, /* pc_relative */
06c15ad7 152 0, /* bitpos */
b2efcd36
HPN
153 /* We don't want overflow complaints for 64-bit vma builds
154 for e.g. sym+0x40000000 (or actually sym-0xc0000000 in
155 32-bit ELF) where sym=0xc0001234.
156 Don't do this for the PIC relocs, as we don't expect to
157 see them with large offsets. */
158 complain_overflow_dont, /* complain_on_overflow */
06c15ad7
HPN
159 bfd_elf_generic_reloc, /* special_function */
160 "R_CRIS_32", /* name */
b34976b6 161 FALSE, /* partial_inplace */
06c15ad7
HPN
162 0x00000000, /* src_mask */
163 0xffffffff, /* dst_mask */
b34976b6 164 FALSE), /* pcrel_offset */
06c15ad7 165
915e5146 166 /* An 8 bit PC-relative relocation. */
06c15ad7
HPN
167 HOWTO (R_CRIS_8_PCREL, /* type */
168 0, /* rightshift */
169 0, /* size (0 = byte, 1 = short, 2 = long) */
170 8, /* bitsize */
b34976b6 171 TRUE, /* pc_relative */
06c15ad7
HPN
172 0, /* bitpos */
173 complain_overflow_bitfield, /* complain_on_overflow */
bac23f82 174 cris_elf_pcrel_reloc, /* special_function */
06c15ad7 175 "R_CRIS_8_PCREL", /* name */
b34976b6 176 FALSE, /* partial_inplace */
06c15ad7
HPN
177 0x0000, /* src_mask */
178 0x00ff, /* dst_mask */
b34976b6 179 TRUE), /* pcrel_offset */
06c15ad7 180
915e5146 181 /* A 16 bit PC-relative relocation. */
06c15ad7
HPN
182 HOWTO (R_CRIS_16_PCREL, /* type */
183 0, /* rightshift */
184 1, /* size (0 = byte, 1 = short, 2 = long) */
185 16, /* bitsize */
b34976b6 186 TRUE, /* pc_relative */
06c15ad7
HPN
187 0, /* bitpos */
188 complain_overflow_bitfield, /* complain_on_overflow */
bac23f82 189 cris_elf_pcrel_reloc, /* special_function */
44aa49bb 190 "R_CRIS_16_PCREL", /* name */
b34976b6 191 FALSE, /* partial_inplace */
06c15ad7
HPN
192 0x00000000, /* src_mask */
193 0x0000ffff, /* dst_mask */
b34976b6 194 TRUE), /* pcrel_offset */
06c15ad7 195
915e5146 196 /* A 32 bit PC-relative relocation. */
06c15ad7
HPN
197 HOWTO (R_CRIS_32_PCREL, /* type */
198 0, /* rightshift */
199 2, /* size (0 = byte, 1 = short, 2 = long) */
200 32, /* bitsize */
b34976b6 201 TRUE, /* pc_relative */
06c15ad7
HPN
202 0, /* bitpos */
203 complain_overflow_bitfield, /* complain_on_overflow */
bac23f82 204 cris_elf_pcrel_reloc, /* special_function */
44aa49bb 205 "R_CRIS_32_PCREL", /* name */
b34976b6 206 FALSE, /* partial_inplace */
06c15ad7
HPN
207 0x00000000, /* src_mask */
208 0xffffffff, /* dst_mask */
b34976b6 209 TRUE), /* pcrel_offset */
06c15ad7 210
915e5146
HPN
211 /* GNU extension to record C++ vtable hierarchy. */
212 HOWTO (R_CRIS_GNU_VTINHERIT, /* type */
06c15ad7
HPN
213 0, /* rightshift */
214 2, /* size (0 = byte, 1 = short, 2 = long) */
215 0, /* bitsize */
b34976b6 216 FALSE, /* pc_relative */
06c15ad7
HPN
217 0, /* bitpos */
218 complain_overflow_dont, /* complain_on_overflow */
219 NULL, /* special_function */
220 "R_CRIS_GNU_VTINHERIT", /* name */
b34976b6 221 FALSE, /* partial_inplace */
06c15ad7
HPN
222 0, /* src_mask */
223 0, /* dst_mask */
b34976b6 224 FALSE), /* pcrel_offset */
06c15ad7 225
915e5146
HPN
226 /* GNU extension to record C++ vtable member usage. */
227 HOWTO (R_CRIS_GNU_VTENTRY, /* type */
06c15ad7
HPN
228 0, /* rightshift */
229 2, /* size (0 = byte, 1 = short, 2 = long) */
230 0, /* bitsize */
b34976b6 231 FALSE, /* pc_relative */
06c15ad7
HPN
232 0, /* bitpos */
233 complain_overflow_dont, /* complain_on_overflow */
234 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
235 "R_CRIS_GNU_VTENTRY", /* name */
b34976b6 236 FALSE, /* partial_inplace */
06c15ad7
HPN
237 0, /* src_mask */
238 0, /* dst_mask */
b34976b6 239 FALSE), /* pcrel_offset */
915e5146
HPN
240
241 /* This is used only by the dynamic linker. The symbol should exist
242 both in the object being run and in some shared library. The
243 dynamic linker copies the data addressed by the symbol from the
244 shared library into the object, because the object being
245 run has to have the data at some particular address. */
246 HOWTO (R_CRIS_COPY, /* type */
247 0, /* rightshift */
248 2, /* size (0 = byte, 1 = short, 2 = long) */
249 32, /* bitsize */
b34976b6 250 FALSE, /* pc_relative */
915e5146
HPN
251 0, /* bitpos */
252 complain_overflow_bitfield, /* complain_on_overflow */
253 bfd_elf_generic_reloc, /* special_function */
254 "R_CRIS_COPY", /* name */
b34976b6 255 FALSE, /* partial_inplace */
915e5146
HPN
256 0, /* src_mask */
257 0, /* dst_mask */
b34976b6 258 FALSE), /* pcrel_offset */
915e5146
HPN
259
260 /* Like R_CRIS_32, but used when setting global offset table entries. */
261 HOWTO (R_CRIS_GLOB_DAT, /* type */
262 0, /* rightshift */
263 2, /* size (0 = byte, 1 = short, 2 = long) */
264 32, /* bitsize */
b34976b6 265 FALSE, /* pc_relative */
915e5146
HPN
266 0, /* bitpos */
267 complain_overflow_bitfield, /* complain_on_overflow */
268 bfd_elf_generic_reloc, /* special_function */
269 "R_CRIS_GLOB_DAT", /* name */
b34976b6 270 FALSE, /* partial_inplace */
915e5146
HPN
271 0, /* src_mask */
272 0xffffffff, /* dst_mask */
b34976b6 273 FALSE), /* pcrel_offset */
915e5146
HPN
274
275 /* Marks a procedure linkage table entry for a symbol. */
276 HOWTO (R_CRIS_JUMP_SLOT, /* type */
277 0, /* rightshift */
278 2, /* size (0 = byte, 1 = short, 2 = long) */
279 32, /* bitsize */
b34976b6 280 FALSE, /* pc_relative */
915e5146
HPN
281 0, /* bitpos */
282 complain_overflow_bitfield, /* complain_on_overflow */
283 bfd_elf_generic_reloc, /* special_function */
284 "R_CRIS_JUMP_SLOT", /* name */
b34976b6 285 FALSE, /* partial_inplace */
915e5146
HPN
286 0, /* src_mask */
287 0, /* dst_mask */
b34976b6 288 FALSE), /* pcrel_offset */
915e5146
HPN
289
290 /* Used only by the dynamic linker. When the object is run, this
291 longword is set to the load address of the object, plus the
292 addend. */
293 HOWTO (R_CRIS_RELATIVE, /* type */
294 0, /* rightshift */
295 2, /* size (0 = byte, 1 = short, 2 = long) */
296 32, /* bitsize */
b34976b6 297 FALSE, /* pc_relative */
915e5146
HPN
298 0, /* bitpos */
299 complain_overflow_bitfield, /* complain_on_overflow */
300 bfd_elf_generic_reloc, /* special_function */
301 "R_CRIS_RELATIVE", /* name */
b34976b6 302 FALSE, /* partial_inplace */
915e5146
HPN
303 0, /* src_mask */
304 0xffffffff, /* dst_mask */
b34976b6 305 FALSE), /* pcrel_offset */
915e5146
HPN
306
307 /* Like R_CRIS_32, but referring to the GOT table entry for the symbol. */
308 HOWTO (R_CRIS_16_GOT, /* type */
309 0, /* rightshift */
310 1, /* size (0 = byte, 1 = short, 2 = long) */
311 16, /* bitsize */
b34976b6 312 FALSE, /* pc_relative */
915e5146
HPN
313 0, /* bitpos */
314 complain_overflow_bitfield, /* complain_on_overflow */
315 bfd_elf_generic_reloc, /* special_function */
316 "R_CRIS_16_GOT", /* name */
b34976b6 317 FALSE, /* partial_inplace */
915e5146
HPN
318 0, /* src_mask */
319 0xffff, /* dst_mask */
b34976b6 320 FALSE), /* pcrel_offset */
915e5146
HPN
321
322 HOWTO (R_CRIS_32_GOT, /* type */
323 0, /* rightshift */
324 2, /* size (0 = byte, 1 = short, 2 = long) */
325 32, /* bitsize */
b34976b6 326 FALSE, /* pc_relative */
915e5146
HPN
327 0, /* bitpos */
328 complain_overflow_bitfield, /* complain_on_overflow */
329 bfd_elf_generic_reloc, /* special_function */
330 "R_CRIS_32_GOT", /* name */
b34976b6 331 FALSE, /* partial_inplace */
915e5146
HPN
332 0, /* src_mask */
333 0xffffffff, /* dst_mask */
b34976b6 334 FALSE), /* pcrel_offset */
915e5146
HPN
335
336 /* Like R_CRIS_32_GOT, but referring to (and requesting a) PLT part of
337 the GOT table for the symbol. */
338 HOWTO (R_CRIS_16_GOTPLT, /* type */
339 0, /* rightshift */
340 1, /* size (0 = byte, 1 = short, 2 = long) */
341 16, /* bitsize */
b34976b6 342 FALSE, /* pc_relative */
915e5146
HPN
343 0, /* bitpos */
344 complain_overflow_bitfield, /* complain_on_overflow */
345 bfd_elf_generic_reloc, /* special_function */
346 "R_CRIS_16_GOTPLT", /* name */
b34976b6 347 FALSE, /* partial_inplace */
915e5146
HPN
348 0, /* src_mask */
349 0xffff, /* dst_mask */
b34976b6 350 FALSE), /* pcrel_offset */
915e5146
HPN
351
352 HOWTO (R_CRIS_32_GOTPLT, /* type */
353 0, /* rightshift */
354 2, /* size (0 = byte, 1 = short, 2 = long) */
355 32, /* bitsize */
b34976b6 356 FALSE, /* pc_relative */
915e5146
HPN
357 0, /* bitpos */
358 complain_overflow_bitfield, /* complain_on_overflow */
359 bfd_elf_generic_reloc, /* special_function */
360 "R_CRIS_32_GOTPLT", /* name */
b34976b6 361 FALSE, /* partial_inplace */
915e5146
HPN
362 0, /* src_mask */
363 0xffffffff, /* dst_mask */
b34976b6 364 FALSE), /* pcrel_offset */
915e5146
HPN
365
366 /* A 32-bit offset from GOT to (local const) symbol: no GOT entry should
367 be necessary. */
368 HOWTO (R_CRIS_32_GOTREL, /* type */
369 0, /* rightshift */
370 2, /* size (0 = byte, 1 = short, 2 = long) */
371 32, /* bitsize */
b34976b6 372 FALSE, /* pc_relative */
915e5146
HPN
373 0, /* bitpos */
374 complain_overflow_bitfield, /* complain_on_overflow */
375 bfd_elf_generic_reloc, /* special_function */
376 "R_CRIS_32_GOTREL", /* name */
b34976b6 377 FALSE, /* partial_inplace */
915e5146
HPN
378 0, /* src_mask */
379 0xffffffff, /* dst_mask */
b34976b6 380 FALSE), /* pcrel_offset */
915e5146
HPN
381
382 /* A 32-bit offset from GOT to entry for this symbol in PLT and request
383 to create PLT entry for symbol. */
384 HOWTO (R_CRIS_32_PLT_GOTREL, /* type */
385 0, /* rightshift */
386 2, /* size (0 = byte, 1 = short, 2 = long) */
387 32, /* bitsize */
b34976b6 388 FALSE, /* pc_relative */
915e5146
HPN
389 0, /* bitpos */
390 complain_overflow_bitfield, /* complain_on_overflow */
391 bfd_elf_generic_reloc, /* special_function */
392 "R_CRIS_32_PLT_GOTREL", /* name */
b34976b6 393 FALSE, /* partial_inplace */
915e5146
HPN
394 0, /* src_mask */
395 0xffffffff, /* dst_mask */
b34976b6 396 FALSE), /* pcrel_offset */
915e5146
HPN
397
398 /* A 32-bit offset from PC (location after the relocation) + addend to
399 entry for this symbol in PLT and request to create PLT entry for
400 symbol. */
401 HOWTO (R_CRIS_32_PLT_PCREL, /* type */
402 0, /* rightshift */
403 2, /* size (0 = byte, 1 = short, 2 = long) */
404 32, /* bitsize */
b34976b6 405 TRUE, /* pc_relative */
915e5146
HPN
406 0, /* bitpos */
407 complain_overflow_bitfield, /* complain_on_overflow */
bac23f82 408 cris_elf_pcrel_reloc, /* special_function */
915e5146 409 "R_CRIS_32_PLT_PCREL", /* name */
b34976b6 410 FALSE, /* partial_inplace */
915e5146
HPN
411 0, /* src_mask */
412 0xffffffff, /* dst_mask */
3926fc54
HPN
413 TRUE), /* pcrel_offset */
414
415 /* We don't handle these in any special manner and cross-format
416 linking is not supported; just recognize them enough to pass them
417 around. FIXME: do the same for most PIC relocs and add sanity
418 tests to actually refuse gracefully to handle these and PIC
419 relocs for cross-format linking. */
420#define TLSHOWTO32(name) \
421 HOWTO (name, 0, 2, 32, FALSE, 0, complain_overflow_bitfield, \
422 bfd_elf_generic_reloc, #name, FALSE, 0, 0xffffffff, FALSE)
100382c7
HPN
423#define TLSHOWTO16X(name, X) \
424 HOWTO (name, 0, 1, 16, FALSE, 0, complain_overflow_ ## X, \
3926fc54 425 bfd_elf_generic_reloc, #name, FALSE, 0, 0xffff, FALSE)
100382c7
HPN
426#define TLSHOWTO16(name) TLSHOWTO16X(name, unsigned)
427#define TLSHOWTO16S(name) TLSHOWTO16X(name, signed)
3926fc54
HPN
428
429 TLSHOWTO32 (R_CRIS_32_GOT_GD),
430 TLSHOWTO16 (R_CRIS_16_GOT_GD),
431 TLSHOWTO32 (R_CRIS_32_GD),
432 TLSHOWTO32 (R_CRIS_DTP),
433 TLSHOWTO32 (R_CRIS_32_DTPREL),
100382c7 434 TLSHOWTO16S (R_CRIS_16_DTPREL),
3926fc54 435 TLSHOWTO32 (R_CRIS_32_GOT_TPREL),
100382c7 436 TLSHOWTO16S (R_CRIS_16_GOT_TPREL),
3926fc54 437 TLSHOWTO32 (R_CRIS_32_TPREL),
100382c7 438 TLSHOWTO16S (R_CRIS_16_TPREL),
75f500d7
HPN
439 TLSHOWTO32 (R_CRIS_DTPMOD),
440 TLSHOWTO32 (R_CRIS_32_IE)
06c15ad7
HPN
441};
442\f
443/* Map BFD reloc types to CRIS ELF reloc types. */
444
445struct cris_reloc_map
446{
447 bfd_reloc_code_real_type bfd_reloc_val;
448 unsigned int cris_reloc_val;
449};
450
451static const struct cris_reloc_map cris_reloc_map [] =
452{
453 { BFD_RELOC_NONE, R_CRIS_NONE },
454 { BFD_RELOC_8, R_CRIS_8 },
455 { BFD_RELOC_16, R_CRIS_16 },
456 { BFD_RELOC_32, R_CRIS_32 },
457 { BFD_RELOC_8_PCREL, R_CRIS_8_PCREL },
458 { BFD_RELOC_16_PCREL, R_CRIS_16_PCREL },
459 { BFD_RELOC_32_PCREL, R_CRIS_32_PCREL },
460 { BFD_RELOC_VTABLE_INHERIT, R_CRIS_GNU_VTINHERIT },
915e5146
HPN
461 { BFD_RELOC_VTABLE_ENTRY, R_CRIS_GNU_VTENTRY },
462 { BFD_RELOC_CRIS_COPY, R_CRIS_COPY },
463 { BFD_RELOC_CRIS_GLOB_DAT, R_CRIS_GLOB_DAT },
464 { BFD_RELOC_CRIS_JUMP_SLOT, R_CRIS_JUMP_SLOT },
465 { BFD_RELOC_CRIS_RELATIVE, R_CRIS_RELATIVE },
466 { BFD_RELOC_CRIS_16_GOT, R_CRIS_16_GOT },
467 { BFD_RELOC_CRIS_32_GOT, R_CRIS_32_GOT },
468 { BFD_RELOC_CRIS_16_GOTPLT, R_CRIS_16_GOTPLT },
469 { BFD_RELOC_CRIS_32_GOTPLT, R_CRIS_32_GOTPLT },
470 { BFD_RELOC_CRIS_32_GOTREL, R_CRIS_32_GOTREL },
471 { BFD_RELOC_CRIS_32_PLT_GOTREL, R_CRIS_32_PLT_GOTREL },
3926fc54
HPN
472 { BFD_RELOC_CRIS_32_PLT_PCREL, R_CRIS_32_PLT_PCREL },
473 { BFD_RELOC_CRIS_32_GOT_GD, R_CRIS_32_GOT_GD },
474 { BFD_RELOC_CRIS_16_GOT_GD, R_CRIS_16_GOT_GD },
475 { BFD_RELOC_CRIS_32_GD, R_CRIS_32_GD },
476 { BFD_RELOC_CRIS_DTP, R_CRIS_DTP },
477 { BFD_RELOC_CRIS_32_DTPREL, R_CRIS_32_DTPREL },
478 { BFD_RELOC_CRIS_16_DTPREL, R_CRIS_16_DTPREL },
479 { BFD_RELOC_CRIS_32_GOT_TPREL, R_CRIS_32_GOT_TPREL },
480 { BFD_RELOC_CRIS_16_GOT_TPREL, R_CRIS_16_GOT_TPREL },
481 { BFD_RELOC_CRIS_32_TPREL, R_CRIS_32_TPREL },
482 { BFD_RELOC_CRIS_16_TPREL, R_CRIS_16_TPREL },
75f500d7
HPN
483 { BFD_RELOC_CRIS_DTPMOD, R_CRIS_DTPMOD },
484 { BFD_RELOC_CRIS_32_IE, R_CRIS_32_IE }
06c15ad7
HPN
485};
486
487static reloc_howto_type *
488cris_reloc_type_lookup (abfd, code)
489 bfd * abfd ATTRIBUTE_UNUSED;
490 bfd_reloc_code_real_type code;
491{
908d94bf 492 unsigned int i;
06c15ad7 493
908d94bf 494 for (i = 0; i < sizeof (cris_reloc_map) / sizeof (cris_reloc_map[0]); i++)
06c15ad7
HPN
495 if (cris_reloc_map [i].bfd_reloc_val == code)
496 return & cris_elf_howto_table [cris_reloc_map[i].cris_reloc_val];
a7c10850 497
06c15ad7
HPN
498 return NULL;
499}
500
157090f7
AM
501static reloc_howto_type *
502cris_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED, const char *r_name)
503{
504 unsigned int i;
505
506 for (i = 0;
507 i < sizeof (cris_elf_howto_table) / sizeof (cris_elf_howto_table[0]);
508 i++)
509 if (cris_elf_howto_table[i].name != NULL
510 && strcasecmp (cris_elf_howto_table[i].name, r_name) == 0)
511 return &cris_elf_howto_table[i];
512
513 return NULL;
514}
515
06c15ad7
HPN
516/* Set the howto pointer for an CRIS ELF reloc. */
517
518static void
519cris_info_to_howto_rela (abfd, cache_ptr, dst)
520 bfd * abfd ATTRIBUTE_UNUSED;
521 arelent * cache_ptr;
947216bf 522 Elf_Internal_Rela * dst;
06c15ad7 523{
100382c7 524 enum elf_cris_reloc_type r_type;
06c15ad7
HPN
525
526 r_type = ELF32_R_TYPE (dst->r_info);
527 BFD_ASSERT (r_type < (unsigned int) R_CRIS_max);
528 cache_ptr->howto = & cris_elf_howto_table [r_type];
529}
bac23f82
HPN
530
531bfd_reloc_status_type
532cris_elf_pcrel_reloc (abfd, reloc_entry, symbol, data, input_section,
533 output_bfd, error_message)
534 bfd *abfd ATTRIBUTE_UNUSED;
535 arelent *reloc_entry;
536 asymbol *symbol;
537 PTR data ATTRIBUTE_UNUSED;
538 asection *input_section;
539 bfd *output_bfd;
540 char **error_message ATTRIBUTE_UNUSED;
541{
542 /* By default (using only bfd_elf_generic_reloc when linking to
543 non-ELF formats) PC-relative relocs are relative to the beginning
544 of the reloc. CRIS PC-relative relocs are relative to the position
545 *after* the reloc because that's what pre-CRISv32 PC points to
546 after reading an insn field with that reloc. (For CRISv32, PC is
547 actually relative to the start of the insn, but we keep the old
548 definition.) Still, we use as much generic machinery as we can.
549
550 Only adjust when doing a final link. */
551 if (output_bfd == (bfd *) NULL)
552 reloc_entry->addend -= 1 << reloc_entry->howto->size;
553
554 return
555 bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
556 input_section, output_bfd, error_message);
557}
06c15ad7 558\f
bac23f82
HPN
559/* Support for core dump NOTE sections.
560 The slightly unintuitive code layout is an attempt to keep at least
561 some similarities with other ports, hoping to simplify general
562 changes, while still keeping Linux/CRIS and Linux/CRISv32 code apart. */
72209a1f 563
b34976b6 564static bfd_boolean
72209a1f
HPN
565cris_elf_grok_prstatus (abfd, note)
566 bfd *abfd;
567 Elf_Internal_Note *note;
568{
569 int offset;
eea6121a 570 size_t size;
72209a1f 571
bac23f82
HPN
572 if (bfd_get_mach (abfd) == bfd_mach_cris_v32)
573 switch (note->descsz)
574 {
575 default:
576 return FALSE;
577
578 case 202: /* Linux/CRISv32 */
579 /* pr_cursig */
580 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
581
582 /* pr_pid */
583 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 22);
584
585 /* pr_reg */
586 offset = 70;
587 size = 128;
588
589 break;
590 }
591 else
592 switch (note->descsz)
593 {
72209a1f 594 default:
b34976b6 595 return FALSE;
72209a1f 596
bc0d28ee 597 case 214: /* Linux/CRIS */
72209a1f
HPN
598 /* pr_cursig */
599 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
600
601 /* pr_pid */
602 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 22);
603
604 /* pr_reg */
605 offset = 70;
eea6121a 606 size = 140;
72209a1f
HPN
607
608 break;
bac23f82 609 }
72209a1f
HPN
610
611 /* Make a ".reg/999" section. */
612 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 613 size, note->descpos + offset);
72209a1f
HPN
614}
615
b34976b6 616static bfd_boolean
72209a1f
HPN
617cris_elf_grok_psinfo (abfd, note)
618 bfd *abfd;
619 Elf_Internal_Note *note;
620{
bac23f82
HPN
621 if (bfd_get_mach (abfd) == bfd_mach_cris_v32)
622 switch (note->descsz)
623 {
624 default:
625 return FALSE;
626
627 case 124: /* Linux/CRISv32 elf_prpsinfo */
628 elf_tdata (abfd)->core_program
629 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
630 elf_tdata (abfd)->core_command
631 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
632 }
633 else
634 switch (note->descsz)
635 {
72209a1f 636 default:
b34976b6 637 return FALSE;
72209a1f
HPN
638
639 case 124: /* Linux/CRIS elf_prpsinfo */
640 elf_tdata (abfd)->core_program
bac23f82 641 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
72209a1f 642 elf_tdata (abfd)->core_command
bac23f82
HPN
643 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
644 }
72209a1f
HPN
645
646 /* Note that for some reason, a spurious space is tacked
647 onto the end of the args in some (at least one anyway)
648 implementations, so strip it off if it exists. */
649
650 {
651 char *command = elf_tdata (abfd)->core_command;
652 int n = strlen (command);
653
654 if (0 < n && command[n - 1] == ' ')
655 command[n - 1] = '\0';
656 }
657
b34976b6 658 return TRUE;
72209a1f
HPN
659}
660\f
915e5146
HPN
661/* The name of the dynamic interpreter. This is put in the .interp
662 section. */
663
664#define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
665
666/* The size in bytes of an entry in the procedure linkage table. */
667
668#define PLT_ENTRY_SIZE 20
bac23f82 669#define PLT_ENTRY_SIZE_V32 26
915e5146
HPN
670
671/* The first entry in an absolute procedure linkage table looks like this. */
672
673static const bfd_byte elf_cris_plt0_entry[PLT_ENTRY_SIZE] =
674{
675 0xfc, 0xe1,
cedb70c5 676 0x7e, 0x7e, /* push mof. */
915e5146
HPN
677 0x7f, 0x0d, /* (dip [pc+]) */
678 0, 0, 0, 0, /* Replaced with address of .got + 4. */
679 0x30, 0x7a, /* move [...],mof */
680 0x7f, 0x0d, /* (dip [pc+]) */
681 0, 0, 0, 0, /* Replaced with address of .got + 8. */
bac23f82
HPN
682 0x30, 0x09 /* jump [...] */
683};
684
685static const bfd_byte elf_cris_plt0_entry_v32[PLT_ENTRY_SIZE_V32] =
686{
687 0x84, 0xe2, /* subq 4,$sp */
688 0x6f, 0xfe, /* move.d 0,$acr */
689 0, 0, 0, 0, /* Replaced by address of .got + 4. */
690 0x7e, 0x7a, /* move $mof,[$sp] */
691 0x3f, 0x7a, /* move [$acr],$mof */
692 0x04, 0xf2, /* addq 4,acr */
693 0x6f, 0xfa, /* move.d [$acr],$acr */
694 0xbf, 0x09, /* jump $acr */
695 0xb0, 0x05, /* nop */
696 0, 0 /* Pad out to 26 bytes. */
915e5146
HPN
697};
698
699/* Subsequent entries in an absolute procedure linkage table look like
700 this. */
701
702static const bfd_byte elf_cris_plt_entry[PLT_ENTRY_SIZE] =
703{
704 0x7f, 0x0d, /* (dip [pc+]) */
705 0, 0, 0, 0, /* Replaced with address of this symbol in .got. */
706 0x30, 0x09, /* jump [...] */
707 0x3f, 0x7e, /* move [pc+],mof */
708 0, 0, 0, 0, /* Replaced with offset into relocation table. */
709 0x2f, 0xfe, /* add.d [pc+],pc */
710 0xec, 0xff,
711 0xff, 0xff /* Replaced with offset to start of .plt. */
712};
713
bac23f82
HPN
714static const bfd_byte elf_cris_plt_entry_v32[PLT_ENTRY_SIZE_V32] =
715{
716 0x6f, 0xfe, /* move.d 0,$acr */
717 0, 0, 0, 0, /* Replaced with address of this symbol in .got. */
718 0x6f, 0xfa, /* move.d [$acr],$acr */
719 0xbf, 0x09, /* jump $acr */
720 0xb0, 0x05, /* nop */
721 0x3f, 0x7e, /* move 0,mof */
722 0, 0, 0, 0, /* Replaced with offset into relocation table. */
723 0xbf, 0x0e, /* ba start_of_plt0_entry */
724 0, 0, 0, 0, /* Replaced with offset to plt0 entry. */
725 0xb0, 0x05 /* nop */
726};
727
915e5146
HPN
728/* The first entry in a PIC procedure linkage table looks like this. */
729
730static const bfd_byte elf_cris_pic_plt0_entry[PLT_ENTRY_SIZE] =
731{
732 0xfc, 0xe1, 0x7e, 0x7e, /* push mof */
733 0x04, 0x01, 0x30, 0x7a, /* move [r0+4],mof */
734 0x08, 0x01, 0x30, 0x09, /* jump [r0+8] */
735 0, 0, 0, 0, 0, 0, 0, 0, /* Pad out to 20 bytes. */
736};
737
bac23f82
HPN
738static const bfd_byte elf_cris_pic_plt0_entry_v32[PLT_ENTRY_SIZE_V32] =
739{
740 0x84, 0xe2, /* subq 4,$sp */
741 0x04, 0x01, /* addoq 4,$r0,$acr */
742 0x7e, 0x7a, /* move $mof,[$sp] */
743 0x3f, 0x7a, /* move [$acr],$mof */
744 0x04, 0xf2, /* addq 4,$acr */
745 0x6f, 0xfa, /* move.d [$acr],$acr */
746 0xbf, 0x09, /* jump $acr */
747 0xb0, 0x05, /* nop */
748 0, 0, /* Pad out to 26 bytes. */
749 0, 0, 0, 0,
750 0, 0, 0, 0
751};
752
915e5146
HPN
753/* Subsequent entries in a PIC procedure linkage table look like this. */
754
755static const bfd_byte elf_cris_pic_plt_entry[PLT_ENTRY_SIZE] =
756{
757 0x6f, 0x0d, /* (bdap [pc+].d,r0) */
758 0, 0, 0, 0, /* Replaced with offset of this symbol in .got. */
759 0x30, 0x09, /* jump [...] */
760 0x3f, 0x7e, /* move [pc+],mof */
761 0, 0, 0, 0, /* Replaced with offset into relocation table. */
762 0x2f, 0xfe, /* add.d [pc+],pc */
763 0xec, 0xff, /* Replaced with offset to start of .plt. */
764 0xff, 0xff
765};
bac23f82
HPN
766
767static const bfd_byte elf_cris_pic_plt_entry_v32[PLT_ENTRY_SIZE_V32] =
768{
769 0x6f, 0x0d, /* addo.d 0,$r0,$acr */
770 0, 0, 0, 0, /* Replaced with offset of this symbol in .got. */
771 0x6f, 0xfa, /* move.d [$acr],$acr */
772 0xbf, 0x09, /* jump $acr */
773 0xb0, 0x05, /* nop */
774 0x3f, 0x7e, /* move relocoffs,$mof */
775 0, 0, 0, 0, /* Replaced with offset into relocation table. */
776 0xbf, 0x0e, /* ba start_of_plt */
777 0, 0, 0, 0, /* Replaced with offset to start of .plt. */
778 0xb0, 0x05 /* nop */
779};
915e5146
HPN
780\f
781/* We copy elf32-m68k.c and elf32-i386.c for the basic linker hash bits
782 (and most other PIC/shlib stuff). Check that we don't drift away
783 without reason.
784
785 The CRIS linker, like the m68k and i386 linkers (and probably the rest
786 too) needs to keep track of the number of relocs that it decides to
787 copy in check_relocs for each symbol. This is so that it can discard
788 PC relative relocs if it doesn't need them when linking with
789 -Bsymbolic. We store the information in a field extending the regular
790 ELF linker hash table. */
791
792/* This structure keeps track of the number of PC relative relocs we have
793 copied for a given symbol. */
794
795struct elf_cris_pcrel_relocs_copied
796{
797 /* Next section. */
798 struct elf_cris_pcrel_relocs_copied *next;
0d08de41 799
915e5146
HPN
800 /* A section in dynobj. */
801 asection *section;
0d08de41 802
915e5146
HPN
803 /* Number of relocs copied in this section. */
804 bfd_size_type count;
0d08de41
HPN
805
806 /* Example of reloc being copied, for message. */
807 enum elf_cris_reloc_type r_type;
915e5146
HPN
808};
809
810/* CRIS ELF linker hash entry. */
811
812struct elf_cris_link_hash_entry
813{
814 struct elf_link_hash_entry root;
815
816 /* Number of PC relative relocs copied for this symbol. */
817 struct elf_cris_pcrel_relocs_copied *pcrel_relocs_copied;
818
819 /* The GOTPLT references are CRIS-specific; the goal is to avoid having
820 both a general GOT and a PLT-specific GOT entry for the same symbol,
821 when it is referenced both as a function and as a function pointer.
822
823 Number of GOTPLT references for a function. */
824 bfd_signed_vma gotplt_refcount;
825
826 /* Actual GOTPLT index for this symbol, if applicable, or zero if not
827 (zero is never used as an index). FIXME: We should be able to fold
828 this with gotplt_refcount in a union, like the got and plt unions in
829 elf_link_hash_entry. */
830 bfd_size_type gotplt_offset;
100382c7
HPN
831
832 /* The root.got.refcount is the sum of the regular reference counts
833 (this) and those members below. We have to keep a separate count
834 to track when we've found the first (or last) reference to a
835 regular got entry. The offset is in root.got.offset. */
836 bfd_signed_vma reg_got_refcount;
837
838 /* Similar to the above, the number of reloc references to this
839 symbols that need a R_CRIS_32_TPREL slot. The offset is in
840 root.got.offset, because this and .dtp_refcount can't validly
841 happen when there's also a regular GOT entry; that's invalid
842 input for which an error is emitted. */
843 bfd_signed_vma tprel_refcount;
844
845 /* Similar to the above, the number of reloc references to this
846 symbols that need a R_CRIS_DTP slot. The offset is in
847 root.got.offset; plus 4 if .tprel_refcount > 0. */
848 bfd_signed_vma dtp_refcount;
915e5146
HPN
849};
850
100382c7
HPN
851/* The local_got_refcounts and local_got_offsets are a multiple of
852 LSNUM in size, namely LGOT_ALLOC_NELTS_FOR(LSNUM) (plus one for the
853 refcount for GOT itself, see code), with the summary / group offset
854 for local symbols located at offset N, reference counts for
855 ordinary (address) relocs at offset N + LSNUM, for R_CRIS_DTP
856 relocs at offset N + 2*LSNUM, and for R_CRIS_32_TPREL relocs at N +
857 3*LSNUM. */
858
859#define LGOT_REG_NDX(x) ((x) + symtab_hdr->sh_info)
860#define LGOT_DTP_NDX(x) ((x) + 2 * symtab_hdr->sh_info)
861#define LGOT_TPREL_NDX(x) ((x) + 3 * symtab_hdr->sh_info)
862#define LGOT_ALLOC_NELTS_FOR(x) ((x) * 4)
863
915e5146
HPN
864/* CRIS ELF linker hash table. */
865
866struct elf_cris_link_hash_table
867{
868 struct elf_link_hash_table root;
869
870 /* We can't use the PLT offset and calculate to get the GOTPLT offset,
871 since we try and avoid creating GOTPLT:s when there's already a GOT.
872 Instead, we keep and update the next available index here. */
873 bfd_size_type next_gotplt_entry;
100382c7
HPN
874
875 /* The number of R_CRIS_32_DTPREL and R_CRIS_16_DTPREL that have
876 been seen for any input; if != 0, then the constant-offset
877 R_CRIS_DTPMOD is needed for this DSO/executable. This turns
878 negative at relocation, so that we don't need an extra flag for
879 when the reloc is output. */
880 bfd_signed_vma dtpmod_refcount;
915e5146
HPN
881};
882
883/* Traverse a CRIS ELF linker hash table. */
884
885#define elf_cris_link_hash_traverse(table, func, info) \
886 (elf_link_hash_traverse \
887 (&(table)->root, \
b34976b6 888 (bfd_boolean (*) PARAMS ((struct elf_link_hash_entry *, PTR))) (func), \
915e5146
HPN
889 (info)))
890
891/* Get the CRIS ELF linker hash table from a link_info structure. */
892
893#define elf_cris_hash_table(p) \
894 ((struct elf_cris_link_hash_table *) (p)->hash)
895
100382c7
HPN
896/* Get the CRIS ELF linker hash entry from a regular hash entry (the
897 "parent class"). The .root reference is just a simple type
898 check on the argument. */
899
900#define elf_cris_hash_entry(p) \
901 ((struct elf_cris_link_hash_entry *) (&(p)->root))
902
915e5146
HPN
903/* Create an entry in a CRIS ELF linker hash table. */
904
905static struct bfd_hash_entry *
906elf_cris_link_hash_newfunc (entry, table, string)
907 struct bfd_hash_entry *entry;
908 struct bfd_hash_table *table;
909 const char *string;
910{
911 struct elf_cris_link_hash_entry *ret =
912 (struct elf_cris_link_hash_entry *) entry;
913
914 /* Allocate the structure if it has not already been allocated by a
915 subclass. */
916 if (ret == (struct elf_cris_link_hash_entry *) NULL)
917 ret = ((struct elf_cris_link_hash_entry *)
918 bfd_hash_allocate (table,
919 sizeof (struct elf_cris_link_hash_entry)));
920 if (ret == (struct elf_cris_link_hash_entry *) NULL)
921 return (struct bfd_hash_entry *) ret;
922
923 /* Call the allocation method of the superclass. */
924 ret = ((struct elf_cris_link_hash_entry *)
925 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
926 table, string));
927 if (ret != (struct elf_cris_link_hash_entry *) NULL)
928 {
929 ret->pcrel_relocs_copied = NULL;
930 ret->gotplt_refcount = 0;
931 ret->gotplt_offset = 0;
100382c7
HPN
932 ret->dtp_refcount = 0;
933 ret->tprel_refcount = 0;
934 ret->reg_got_refcount = 0;
915e5146
HPN
935 }
936
937 return (struct bfd_hash_entry *) ret;
938}
939
940/* Create a CRIS ELF linker hash table. */
941
942static struct bfd_link_hash_table *
943elf_cris_link_hash_table_create (abfd)
944 bfd *abfd;
945{
946 struct elf_cris_link_hash_table *ret;
dc810e39 947 bfd_size_type amt = sizeof (struct elf_cris_link_hash_table);
915e5146 948
e2d34d7d 949 ret = ((struct elf_cris_link_hash_table *) bfd_malloc (amt));
915e5146
HPN
950 if (ret == (struct elf_cris_link_hash_table *) NULL)
951 return NULL;
952
66eb6687
AM
953 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
954 elf_cris_link_hash_newfunc,
955 sizeof (struct elf_cris_link_hash_entry)))
915e5146 956 {
e2d34d7d 957 free (ret);
915e5146
HPN
958 return NULL;
959 }
960
961 /* Initialize to skip over the first three entries in the gotplt; they
962 are used for run-time symbol evaluation. */
963 ret->next_gotplt_entry = 12;
964
100382c7
HPN
965 /* We haven't seen any R_CRIS_nn_GOT_TPREL initially. */
966 ret->dtpmod_refcount = 0;
967
915e5146
HPN
968 return &ret->root.root;
969}
970\f
06c15ad7 971/* Perform a single relocation. By default we use the standard BFD
915e5146 972 routines, with a few tweaks. */
06c15ad7
HPN
973
974static bfd_reloc_status_type
975cris_final_link_relocate (howto, input_bfd, input_section, contents, rel,
976 relocation)
977 reloc_howto_type * howto;
978 bfd * input_bfd;
979 asection * input_section;
980 bfd_byte * contents;
981 Elf_Internal_Rela * rel;
982 bfd_vma relocation;
983{
915e5146 984 bfd_reloc_status_type r;
100382c7 985 enum elf_cris_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
915e5146
HPN
986
987 /* PC-relative relocations are relative to the position *after*
988 the reloc. Note that for R_CRIS_8_PCREL the adjustment is
989 not a single byte, since PC must be 16-bit-aligned. */
100382c7 990 switch (r_type)
915e5146
HPN
991 {
992 /* Check that the 16-bit GOT relocs are positive. */
993 case R_CRIS_16_GOTPLT:
994 case R_CRIS_16_GOT:
995 if ((bfd_signed_vma) relocation < 0)
996 return bfd_reloc_overflow;
997 break;
998
999 case R_CRIS_32_PLT_PCREL:
1000 case R_CRIS_32_PCREL:
1001 relocation -= 2;
1002 /* Fall through. */
1003 case R_CRIS_8_PCREL:
1004 case R_CRIS_16_PCREL:
1005 relocation -= 2;
1006 break;
1007
1008 default:
1009 break;
1010 }
1011
1012 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
06c15ad7
HPN
1013 contents, rel->r_offset,
1014 relocation, rel->r_addend);
1015 return r;
1016}
1017\f
100382c7
HPN
1018
1019/* The number of errors left before we stop outputting reloc-specific
1020 explanatory messages. By coincidence, this works nicely together
1021 with the default number of messages you'll get from LD about
1022 "relocation truncated to fit" messages before you get an
1023 "additional relocation overflows omitted from the output". */
1024static int additional_relocation_error_msg_count = 10;
1025
06c15ad7
HPN
1026/* Relocate an CRIS ELF section. See elf32-fr30.c, from where this was
1027 copied, for further comments. */
1028
b34976b6 1029static bfd_boolean
06c15ad7
HPN
1030cris_elf_relocate_section (output_bfd, info, input_bfd, input_section,
1031 contents, relocs, local_syms, local_sections)
b34976b6
AM
1032 bfd *output_bfd ATTRIBUTE_UNUSED;
1033 struct bfd_link_info *info;
1034 bfd *input_bfd;
1035 asection *input_section;
1036 bfd_byte *contents;
1037 Elf_Internal_Rela *relocs;
1038 Elf_Internal_Sym *local_syms;
1039 asection **local_sections;
06c15ad7 1040{
915e5146 1041 bfd *dynobj;
b34976b6
AM
1042 Elf_Internal_Shdr *symtab_hdr;
1043 struct elf_link_hash_entry **sym_hashes;
915e5146
HPN
1044 bfd_vma *local_got_offsets;
1045 asection *sgot;
1046 asection *splt;
1047 asection *sreloc;
b34976b6
AM
1048 Elf_Internal_Rela *rel;
1049 Elf_Internal_Rela *relend;
100382c7 1050 asection *srelgot;
06c15ad7 1051
915e5146
HPN
1052 dynobj = elf_hash_table (info)->dynobj;
1053 local_got_offsets = elf_local_got_offsets (input_bfd);
06c15ad7
HPN
1054 symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr;
1055 sym_hashes = elf_sym_hashes (input_bfd);
1056 relend = relocs + input_section->reloc_count;
1057
915e5146
HPN
1058 sgot = NULL;
1059 splt = NULL;
1060 sreloc = NULL;
100382c7 1061 srelgot = NULL;
915e5146
HPN
1062
1063 if (dynobj != NULL)
1064 {
1065 splt = bfd_get_section_by_name (dynobj, ".plt");
1066 sgot = bfd_get_section_by_name (dynobj, ".got");
1067 }
1068
06c15ad7
HPN
1069 for (rel = relocs; rel < relend; rel ++)
1070 {
b34976b6
AM
1071 reloc_howto_type *howto;
1072 unsigned long r_symndx;
1073 Elf_Internal_Sym *sym;
1074 asection *sec;
1075 struct elf_link_hash_entry *h;
1076 bfd_vma relocation;
1077 bfd_reloc_status_type r;
1078 const char *symname = NULL;
100382c7 1079 enum elf_cris_reloc_type r_type;
a7c10850 1080
06c15ad7 1081 r_type = ELF32_R_TYPE (rel->r_info);
a7c10850 1082
06c15ad7
HPN
1083 if ( r_type == R_CRIS_GNU_VTINHERIT
1084 || r_type == R_CRIS_GNU_VTENTRY)
1085 continue;
a7c10850 1086
f0fe0e16 1087 r_symndx = ELF32_R_SYM (rel->r_info);
915e5146 1088 howto = cris_elf_howto_table + r_type;
06c15ad7
HPN
1089 h = NULL;
1090 sym = NULL;
1091 sec = NULL;
a7c10850 1092
06c15ad7
HPN
1093 if (r_symndx < symtab_hdr->sh_info)
1094 {
1095 sym = local_syms + r_symndx;
1096 sec = local_sections [r_symndx];
8517fae7 1097 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
a7c10850 1098
dc810e39
AM
1099 symname = (bfd_elf_string_from_elf_section
1100 (input_bfd, symtab_hdr->sh_link, sym->st_name));
1101 if (symname == NULL)
1102 symname = bfd_section_name (input_bfd, sec);
06c15ad7
HPN
1103 }
1104 else
1105 {
560e09e9
NC
1106 bfd_boolean warned;
1107 bfd_boolean unresolved_reloc;
0a4787a0 1108
b2a8e766
AM
1109 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1110 r_symndx, symtab_hdr, sym_hashes,
1111 h, sec, relocation,
1112 unresolved_reloc, warned);
915e5146 1113
100382c7
HPN
1114 symname = h->root.root.string;
1115
560e09e9 1116 if (unresolved_reloc
915e5146
HPN
1117 /* Perhaps we should detect the cases that
1118 sec->output_section is expected to be NULL like i386 and
1119 m68k, but apparently (and according to elfxx-ia64.c) all
1120 valid cases are where the symbol is defined in a shared
1121 object which we link dynamically against. This includes
1122 PLT relocs for which we've created a PLT entry and other
1123 relocs for which we're prepared to create dynamic
1124 relocations.
1125
1126 For now, new situations cause us to just err when
1127 sec->output_offset is NULL but the object with the symbol
1128 is *not* dynamically linked against. Thus this will
1129 automatically remind us so we can see if there are other
1130 valid cases we need to revisit. */
560e09e9
NC
1131 && (sec->owner->flags & DYNAMIC) != 0)
1132 relocation = 0;
1133
1134 else if (h->root.type == bfd_link_hash_defined
1135 || h->root.type == bfd_link_hash_defweak)
1136 {
1137 /* Here follow the cases where the relocation value must
1138 be zero (or when further handling is simplified when
1139 zero). I can't claim to understand the various
1140 conditions and they weren't described in the files
1141 where I copied them from (elf32-m68k.c and
1142 elf32-i386.c), but let's mention examples of where
1143 they happen. FIXME: Perhaps define and use a
1144 dynamic_symbol_p function like ia64.
1145
1146 - When creating a shared library, we can have an
1147 ordinary relocation for a symbol defined in a shared
1148 library (perhaps the one we create). We then make
1149 the relocation value zero, as the value seen now will
1150 be added into the relocation addend in this shared
1151 library, but must be handled only at dynamic-link
1152 time. FIXME: Not sure this example covers the
1153 h->elf_link_hash_flags test, though it's there in
1154 other targets. */
1155 if (info->shared
1156 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1157 || !h->def_regular)
560e09e9
NC
1158 && (input_section->flags & SEC_ALLOC) != 0
1159 && (r_type == R_CRIS_8
1160 || r_type == R_CRIS_16
1161 || r_type == R_CRIS_32
1162 || r_type == R_CRIS_8_PCREL
1163 || r_type == R_CRIS_16_PCREL
1164 || r_type == R_CRIS_32_PCREL))
915e5146 1165 relocation = 0;
ab96bf03 1166 else if (!info->relocatable && unresolved_reloc)
915e5146 1167 {
560e09e9 1168 _bfd_error_handler
bac23f82 1169 (_("%B, section %A: unresolvable relocation %s against symbol `%s'"),
d003868e
AM
1170 input_bfd,
1171 input_section,
8f615d07 1172 cris_elf_howto_table[r_type].name,
d003868e 1173 symname);
915e5146 1174 bfd_set_error (bfd_error_bad_value);
b34976b6 1175 return FALSE;
915e5146 1176 }
06c15ad7 1177 }
06c15ad7 1178 }
a7c10850 1179
ab96bf03
AM
1180 if (sec != NULL && elf_discarded_section (sec))
1181 {
1182 /* For relocs against symbols from removed linkonce sections,
1183 or sections discarded by a linker script, we just want the
1184 section contents zeroed. Avoid any special processing. */
1185 _bfd_clear_contents (howto, input_bfd, contents + rel->r_offset);
1186 rel->r_info = 0;
1187 rel->r_addend = 0;
1188 continue;
1189 }
1190
1191 if (info->relocatable)
1192 continue;
1193
915e5146 1194 switch (r_type)
06c15ad7 1195 {
915e5146
HPN
1196 case R_CRIS_16_GOTPLT:
1197 case R_CRIS_32_GOTPLT:
1198 /* This is like the case for R_CRIS_32_GOT and R_CRIS_16_GOT,
1199 but we require a PLT, and the PLT handling will take care of
1200 filling in the PLT-specific GOT entry. For the GOT offset,
1201 calculate it as we do when filling it in for the .got.plt
1202 section. If we don't have a PLT, punt to GOT handling. */
1203 if (h != NULL
1204 && ((struct elf_cris_link_hash_entry *) h)->gotplt_offset != 0)
06c15ad7 1205 {
915e5146
HPN
1206 asection *sgotplt
1207 = bfd_get_section_by_name (dynobj, ".got.plt");
1208 bfd_vma got_offset;
a7c10850 1209
915e5146
HPN
1210 BFD_ASSERT (h->dynindx != -1);
1211 BFD_ASSERT (sgotplt != NULL);
a7c10850 1212
915e5146
HPN
1213 got_offset
1214 = ((struct elf_cris_link_hash_entry *) h)->gotplt_offset;
06c15ad7 1215
915e5146 1216 relocation = got_offset;
06c15ad7 1217 break;
915e5146 1218 }
06c15ad7 1219
4d96d128 1220 /* We didn't make a PLT entry for this symbol. Maybe everything is
915e5146
HPN
1221 folded into the GOT. Other than folding, this happens when
1222 statically linking PIC code, or when using -Bsymbolic. Check
1223 that we instead have a GOT entry as done for us by
1224 elf_cris_adjust_dynamic_symbol, and drop through into the
e4a2175c
HPN
1225 ordinary GOT cases. This must not happen for the
1226 executable, because any reference it does to a function
1227 that is satisfied by a DSO must generate a PLT. We assume
1228 these call-specific relocs don't address non-functions. */
1229 if (h != NULL
1230 && (h->got.offset == (bfd_vma) -1
1231 || (!info->shared
f5385ebf
AM
1232 && !(h->def_regular
1233 || (!h->def_dynamic
1234 && h->root.type == bfd_link_hash_undefweak)))))
915e5146
HPN
1235 {
1236 (*_bfd_error_handler)
e4a2175c 1237 ((h->got.offset == (bfd_vma) -1)
bac23f82 1238 ? _("%B, section %A: No PLT nor GOT for relocation %s"
d003868e 1239 " against symbol `%s'")
bac23f82 1240 : _("%B, section %A: No PLT for relocation %s"
d003868e
AM
1241 " against symbol `%s'"),
1242 input_bfd,
1243 input_section,
915e5146 1244 cris_elf_howto_table[r_type].name,
ada1953e
HPN
1245 (symname != NULL && symname[0] != '\0'
1246 ? symname : _("[whose name is lost]")));
915e5146
HPN
1247
1248 /* FIXME: Perhaps blaming input is not the right thing to
1249 do; this is probably an internal error. But it is true
1250 that we didn't like that particular input. */
1251 bfd_set_error (bfd_error_bad_value);
b34976b6 1252 return FALSE;
915e5146
HPN
1253 }
1254 /* Fall through. */
1255
1256 /* The size of the actual relocation is not used here; we only
1257 fill in the GOT table here. */
1258 case R_CRIS_16_GOT:
1259 case R_CRIS_32_GOT:
1260 {
1261 bfd_vma off;
1262
1263 /* Note that despite using RELA relocations, the .got contents
1264 is always filled in with the link-relative relocation
1265 value; the addend. */
1266
1267 if (h != NULL)
1268 {
1269 off = h->got.offset;
1270 BFD_ASSERT (off != (bfd_vma) -1);
1271
1272 if (!elf_hash_table (info)->dynamic_sections_created
205cfeb0 1273 || (! info->shared
f5385ebf 1274 && (h->def_regular
e4a2175c 1275 || h->type == STT_FUNC
f5385ebf 1276 || h->needs_plt))
915e5146
HPN
1277 || (info->shared
1278 && (info->symbolic || h->dynindx == -1)
f5385ebf 1279 && h->def_regular))
915e5146 1280 {
4d96d128 1281 /* This wasn't checked above for ! info->shared, but
e4a2175c
HPN
1282 must hold there if we get here; the symbol must
1283 be defined in the regular program or be undefweak
1284 or be a function or otherwise need a PLT. */
6849c52f
HPN
1285 BFD_ASSERT (!elf_hash_table (info)->dynamic_sections_created
1286 || info->shared
f5385ebf 1287 || h->def_regular
e4a2175c 1288 || h->type == STT_FUNC
f5385ebf 1289 || h->needs_plt
6849c52f 1290 || h->root.type == bfd_link_hash_undefweak);
4d96d128 1291
915e5146 1292 /* This is actually a static link, or it is a
6849c52f
HPN
1293 -Bsymbolic link and the symbol is defined locally,
1294 or is undefweak, or the symbol was forced to be
1295 local because of a version file, or we're not
1296 creating a dynamic object. We must initialize this
1297 entry in the global offset table. Since the offset
1298 must always be a multiple of 4, we use the least
1299 significant bit to record whether we have
1300 initialized it already.
1301
1302 If this GOT entry should be runtime-initialized, we
1303 will create a .rela.got relocation entry to
1304 initialize the value. This is done in the
1305 finish_dynamic_symbol routine. */
915e5146
HPN
1306 if ((off & 1) != 0)
1307 off &= ~1;
1308 else
1309 {
1310 bfd_put_32 (output_bfd, relocation,
1311 sgot->contents + off);
1312 h->got.offset |= 1;
1313 }
1314 }
1315 }
1316 else
1317 {
1318 BFD_ASSERT (local_got_offsets != NULL
1319 && local_got_offsets[r_symndx] != (bfd_vma) -1);
1320
1321 off = local_got_offsets[r_symndx];
1322
1323 /* The offset must always be a multiple of 4. We use
1324 the least significant bit to record whether we have
1325 already generated the necessary reloc. */
1326 if ((off & 1) != 0)
1327 off &= ~1;
1328 else
1329 {
1330 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
1331
1332 if (info->shared)
1333 {
915e5146 1334 Elf_Internal_Rela outrel;
947216bf 1335 bfd_byte *loc;
915e5146 1336
100382c7
HPN
1337 if (srelgot == NULL)
1338 srelgot
1339 = bfd_get_section_by_name (dynobj, ".rela.got");
1340 BFD_ASSERT (srelgot != NULL);
915e5146
HPN
1341
1342 outrel.r_offset = (sgot->output_section->vma
1343 + sgot->output_offset
1344 + off);
1345 outrel.r_info = ELF32_R_INFO (0, R_CRIS_RELATIVE);
1346 outrel.r_addend = relocation;
100382c7
HPN
1347 loc = srelgot->contents;
1348 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
947216bf 1349 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
915e5146
HPN
1350 }
1351
1352 local_got_offsets[r_symndx] |= 1;
1353 }
1354 }
1355
1356 relocation = sgot->output_offset + off;
1357 if (rel->r_addend != 0)
1358 {
1359 /* We can't do anything for a relocation which is against
1360 a symbol *plus offset*. GOT holds relocations for
1361 symbols. Make this an error; the compiler isn't
1362 allowed to pass us these kinds of things. */
1363 if (h == NULL)
1364 (*_bfd_error_handler)
bac23f82 1365 (_("%B, section %A: relocation %s with non-zero addend %d"
d003868e
AM
1366 " against local symbol"),
1367 input_bfd,
1368 input_section,
915e5146 1369 cris_elf_howto_table[r_type].name,
d003868e 1370 rel->r_addend);
915e5146
HPN
1371 else
1372 (*_bfd_error_handler)
bac23f82 1373 (_("%B, section %A: relocation %s with non-zero addend %d"
d003868e
AM
1374 " against symbol `%s'"),
1375 input_bfd,
1376 input_section,
915e5146
HPN
1377 cris_elf_howto_table[r_type].name,
1378 rel->r_addend,
d003868e 1379 symname[0] != '\0' ? symname : _("[whose name is lost]"));
915e5146
HPN
1380
1381 bfd_set_error (bfd_error_bad_value);
b34976b6 1382 return FALSE;
915e5146
HPN
1383 }
1384 }
1385 break;
06c15ad7 1386
915e5146 1387 case R_CRIS_32_GOTREL:
3dab95d3
HPN
1388 /* This relocation must only be performed against local symbols.
1389 It's also ok when we link a program and the symbol is either
1390 defined in an ordinary (non-DSO) object or is undefined weak. */
1391 if (h != NULL
1392 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1393 && !(!info->shared
f5385ebf
AM
1394 && (h->def_regular
1395 || (!h->def_dynamic
3dab95d3 1396 && h->root.type == bfd_link_hash_undefweak))))
915e5146
HPN
1397 {
1398 (*_bfd_error_handler)
bac23f82
HPN
1399 (_("%B, section %A: relocation %s is"
1400 " not allowed for global symbol: `%s'"),
d003868e
AM
1401 input_bfd,
1402 input_section,
915e5146 1403 cris_elf_howto_table[r_type].name,
d003868e 1404 symname);
915e5146 1405 bfd_set_error (bfd_error_bad_value);
b34976b6 1406 return FALSE;
06c15ad7
HPN
1407 }
1408
58255df3
HPN
1409 /* This can happen if we get a link error with the input ELF
1410 variant mismatching the output variant. Emit an error so
1411 it's noticed if it happens elsewhere. */
1412 if (sgot == NULL)
1413 {
1414 (*_bfd_error_handler)
bac23f82 1415 (_("%B, section %A: relocation %s with no GOT created"),
d003868e
AM
1416 input_bfd,
1417 input_section,
1418 cris_elf_howto_table[r_type].name);
58255df3 1419 bfd_set_error (bfd_error_bad_value);
b34976b6 1420 return FALSE;
58255df3
HPN
1421 }
1422
915e5146
HPN
1423 /* This relocation is like a PC-relative one, except the
1424 reference point is the location of GOT. Note that
1425 sgot->output_offset is not involved in this calculation. We
1426 always want the start of entire .got section, not the
1427 position after the reserved header. */
1428 relocation -= sgot->output_section->vma;
1429 break;
06c15ad7 1430
915e5146
HPN
1431 case R_CRIS_32_PLT_PCREL:
1432 /* Relocation is to the entry for this symbol in the
1433 procedure linkage table. */
06c15ad7 1434
915e5146
HPN
1435 /* Resolve a PLT_PCREL reloc against a local symbol directly,
1436 without using the procedure linkage table. */
0a4787a0 1437 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
915e5146
HPN
1438 break;
1439
1440 if (h->plt.offset == (bfd_vma) -1
1441 || splt == NULL)
1442 {
1443 /* We didn't make a PLT entry for this symbol. This
1444 happens when statically linking PIC code, or when
1445 using -Bsymbolic. */
1446 break;
1447 }
1448
1449 relocation = (splt->output_section->vma
1450 + splt->output_offset
1451 + h->plt.offset);
1452 break;
1453
1454 case R_CRIS_32_PLT_GOTREL:
1455 /* Like R_CRIS_32_PLT_PCREL, but the reference point is the
1456 start of the .got section. See also comment at
1457 R_CRIS_32_GOT. */
1458 relocation -= sgot->output_section->vma;
1459
1460 /* Resolve a PLT_GOTREL reloc against a local symbol directly,
1461 without using the procedure linkage table. */
0a4787a0 1462 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
915e5146
HPN
1463 break;
1464
1465 if (h->plt.offset == (bfd_vma) -1
1466 || splt == NULL)
1467 {
1468 /* We didn't make a PLT entry for this symbol. This
1469 happens when statically linking PIC code, or when
1470 using -Bsymbolic. */
1471 break;
1472 }
1473
1474 relocation = (splt->output_section->vma
1475 + splt->output_offset
1476 + h->plt.offset
1477 - sgot->output_section->vma);
1478 break;
1479
1480 case R_CRIS_8_PCREL:
1481 case R_CRIS_16_PCREL:
1482 case R_CRIS_32_PCREL:
1483 /* If the symbol was local, we need no shlib-specific handling. */
0d08de41
HPN
1484 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1485 || h->dynindx == -1)
915e5146
HPN
1486 break;
1487
1488 /* Fall through. */
1489 case R_CRIS_8:
1490 case R_CRIS_16:
1491 case R_CRIS_32:
1492 if (info->shared
ec338859 1493 && r_symndx != 0
915e5146
HPN
1494 && (input_section->flags & SEC_ALLOC) != 0
1495 && ((r_type != R_CRIS_8_PCREL
1496 && r_type != R_CRIS_16_PCREL
1497 && r_type != R_CRIS_32_PCREL)
1498 || (!info->symbolic
02865b8e 1499 || (h != NULL && !h->def_regular))))
915e5146
HPN
1500 {
1501 Elf_Internal_Rela outrel;
947216bf 1502 bfd_byte *loc;
b34976b6 1503 bfd_boolean skip, relocate;
915e5146
HPN
1504
1505 /* When generating a shared object, these relocations
1506 are copied into the output file to be resolved at run
1507 time. */
1508
1509 if (sreloc == NULL)
1510 {
83bac4b0
NC
1511 sreloc = _bfd_elf_get_dynamic_reloc_section
1512 (input_bfd, input_section, /*rela?*/ TRUE);
1513 /* The section should have been created in cris_elf_check_relocs,
1514 but that function will not be called for objects which fail in
915e5146
HPN
1515 cris_elf_merge_private_bfd_data. */
1516 if (sreloc == NULL)
1517 {
915e5146 1518 bfd_set_error (bfd_error_bad_value);
b34976b6 1519 return FALSE;
915e5146
HPN
1520 }
1521 }
1522
b34976b6
AM
1523 skip = FALSE;
1524 relocate = FALSE;
915e5146 1525
c629eae0
JJ
1526 outrel.r_offset =
1527 _bfd_elf_section_offset (output_bfd, info, input_section,
1528 rel->r_offset);
1529 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 1530 skip = TRUE;
0bb2d96a 1531 else if (outrel.r_offset == (bfd_vma) -2)
b34976b6 1532 skip = TRUE, relocate = TRUE;
915e5146
HPN
1533 outrel.r_offset += (input_section->output_section->vma
1534 + input_section->output_offset);
1535
1536 if (skip)
0bb2d96a 1537 memset (&outrel, 0, sizeof outrel);
915e5146
HPN
1538 /* h->dynindx may be -1 if the symbol was marked to
1539 become local. */
1540 else if (h != NULL
1541 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1542 || !h->def_regular))
915e5146
HPN
1543 {
1544 BFD_ASSERT (h->dynindx != -1);
915e5146
HPN
1545 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1546 outrel.r_addend = relocation + rel->r_addend;
1547 }
1548 else
1549 {
74541ad4
AM
1550 outrel.r_addend = relocation + rel->r_addend;
1551
915e5146
HPN
1552 if (r_type == R_CRIS_32)
1553 {
b34976b6 1554 relocate = TRUE;
915e5146 1555 outrel.r_info = ELF32_R_INFO (0, R_CRIS_RELATIVE);
915e5146
HPN
1556 }
1557 else
1558 {
1559 long indx;
1560
8517fae7 1561 if (bfd_is_abs_section (sec))
915e5146
HPN
1562 indx = 0;
1563 else if (sec == NULL || sec->owner == NULL)
1564 {
1565 bfd_set_error (bfd_error_bad_value);
b34976b6 1566 return FALSE;
915e5146
HPN
1567 }
1568 else
1569 {
1570 asection *osec;
1571
74541ad4
AM
1572 /* We are turning this relocation into one
1573 against a section symbol. It would be
1574 proper to subtract the symbol's value,
1575 osec->vma, from the emitted reloc addend,
1576 but ld.so expects buggy relocs. */
915e5146
HPN
1577 osec = sec->output_section;
1578 indx = elf_section_data (osec)->dynindx;
74541ad4
AM
1579 if (indx == 0)
1580 {
1581 struct elf_cris_link_hash_table *htab;
1582 htab = elf_cris_hash_table (info);
1583 osec = htab->root.text_index_section;
1584 indx = elf_section_data (osec)->dynindx;
1585 }
1586 BFD_ASSERT (indx != 0);
915e5146
HPN
1587 }
1588
915e5146 1589 outrel.r_info = ELF32_R_INFO (indx, r_type);
915e5146
HPN
1590 }
1591 }
1592
947216bf
AM
1593 loc = sreloc->contents;
1594 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1595 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
915e5146
HPN
1596
1597 /* This reloc will be computed at runtime, so there's no
1598 need to do anything now, except for R_CRIS_32 relocations
1599 that have been turned into R_CRIS_RELATIVE. */
1600 if (!relocate)
1601 continue;
1602 }
1603
1604 break;
100382c7
HPN
1605
1606 case R_CRIS_16_DTPREL:
1607 case R_CRIS_32_DTPREL:
1608 /* This relocation must only be performed against local
1609 symbols. It's also ok when we link a program and the
1610 symbol is defined in an ordinary (non-DSO) object (if
1611 it's undefined there, we've already seen an error). */
1612 if (h != NULL
1613 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1614 && (info->shared
1615 || (!h->def_regular
1616 && h->root.type != bfd_link_hash_undefined)))
1617 {
1618 (*_bfd_error_handler)
1619 ((h->root.type == bfd_link_hash_undefined)
1620 /* We shouldn't get here for GCC-emitted code. */
1621 ? _("%B, section %A: relocation %s has an undefined"
1622 " reference to `%s', perhaps a declaration mixup?")
1623 : ("%B, section %A: relocation %s is"
1624 " not allowed for `%s', a global symbol with default"
1625 " visibility, perhaps a declaration mixup?"),
1626 input_bfd,
1627 input_section,
1628 cris_elf_howto_table[r_type].name,
1629 symname != NULL && symname[0] != '\0'
1630 ? symname : _("[whose name is lost]"));
1631 bfd_set_error (bfd_error_bad_value);
1632 return FALSE;
1633 }
1634
1635 BFD_ASSERT (elf_cris_hash_table (info)->dtpmod_refcount != 0);
1636
1637 /* Fill in a R_CRIS_DTPMOD reloc at offset 3 if we haven't
1638 already done so. Note that we do this in .got.plt, not
1639 in .got, as .got.plt contains the first part, still the
1640 reloc is against .got, because the linker script directs
1641 (is required to direct) them both into .got. */
1642 if (elf_cris_hash_table (info)->dtpmod_refcount > 0)
1643 {
1644 asection *sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
1645 BFD_ASSERT (sgotplt != NULL);
1646
1647 if (info->shared)
1648 {
1649 Elf_Internal_Rela outrel;
1650 bfd_byte *loc;
1651
1652 if (srelgot == NULL)
1653 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1654 BFD_ASSERT (srelgot != NULL);
1655 loc = srelgot->contents;
1656 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
1657
1658 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 12);
1659 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 16);
1660 outrel.r_offset = (sgotplt->output_section->vma
1661 + sgotplt->output_offset
1662 + 12);
1663 outrel.r_info = ELF32_R_INFO (0, R_CRIS_DTPMOD);
1664 outrel.r_addend = 0;
1665 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1666 }
1667 else
1668 {
1669 /* For an executable, the GOT entry contents is known. */
1670 bfd_put_32 (output_bfd, (bfd_vma) 1, sgotplt->contents + 12);
1671 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 16);
1672 }
1673
1674 /* Reverse the sign to mark that we've emitted the
1675 required GOT entry. */
1676 elf_cris_hash_table (info)->dtpmod_refcount
1677 = -elf_cris_hash_table (info)->dtpmod_refcount;
1678 }
1679
1680 /* The thread-based offset to the local symbol is the
1681 relocation. */
1682 relocation -= elf_hash_table (info)->tls_sec == NULL
1683 ? 0 : elf_hash_table (info)->tls_sec->vma;
1684 break;
1685
1686 case R_CRIS_32_GD:
1687 if (info->shared)
1688 {
1689 bfd_set_error (bfd_error_invalid_operation);
1690
1691 /* We've already informed in cris_elf_check_relocs that
1692 this is an error. */
1693 return FALSE;
1694 }
1695 /* Fall through. */
1696
1697 case R_CRIS_16_GOT_GD:
1698 case R_CRIS_32_GOT_GD:
1699 if (rel->r_addend != 0)
1700 {
1701 /* We can't do anything for a relocation which is against a
1702 symbol *plus offset*. The GOT holds relocations for
1703 symbols. Make this an error; the compiler isn't allowed
1704 to pass us these kinds of things. */
1705 (*_bfd_error_handler)
1706 (_("%B, section %A: relocation %s with non-zero addend %d"
1707 " against symbol `%s'"),
1708 input_bfd,
1709 input_section,
1710 cris_elf_howto_table[r_type].name,
1711 rel->r_addend,
1712 symname[0] != '\0' ? symname : _("[whose name is lost]"));
1713
1714 bfd_set_error (bfd_error_bad_value);
1715 return FALSE;
1716 }
1717
1718 if (!info->shared && (h == NULL || h->def_regular))
1719 {
1720 /* Known contents of the GOT. */
1721 bfd_vma off;
1722
1723 /* The symbol is defined in the program, so just write
1724 (1, known_tpoffset) into the GOT. */
1725 relocation -= elf_hash_table (info)->tls_sec->vma;
1726
1727 if (h != NULL)
1728 {
1729 off = elf_cris_hash_entry (h)->tprel_refcount > 0
1730 ? h->got.offset + 4 : h->got.offset;
1731 }
1732 else
1733 {
1734 off = local_got_offsets[r_symndx];
1735 if (local_got_offsets[LGOT_TPREL_NDX (r_symndx)])
1736 off += 4;
1737 }
1738
1739 /* We use bit 1 of the offset as a flag for GOT entry with
1740 the R_CRIS_DTP reloc, setting it when we've emitted the
1741 GOT entry and reloc. Bit 0 is used for R_CRIS_32_TPREL
1742 relocs. */
1743 if ((off & 2) == 0)
1744 {
1745 off &= ~3;
1746
1747 if (h != NULL)
1748 h->got.offset |= 2;
1749 else
1750 local_got_offsets[r_symndx] |= 2;
1751
1752 bfd_put_32 (output_bfd, 1, sgot->contents + off);
1753 bfd_put_32 (output_bfd, relocation, sgot->contents + off + 4);
1754 }
1755 else
1756 off &= ~3;
1757
1758 relocation = sgot->output_offset + off
1759 + (r_type == R_CRIS_32_GD ? sgot->output_section->vma : 0);
1760 }
1761 else
1762 {
1763 /* Not all parts of the GOT entry are known; emit a real
1764 relocation. */
1765 bfd_vma off;
1766
1767 if (h != NULL)
1768 off = elf_cris_hash_entry (h)->tprel_refcount > 0
1769 ? h->got.offset + 4 : h->got.offset;
1770 else
1771 {
1772 off = local_got_offsets[r_symndx];
1773 if (local_got_offsets[LGOT_TPREL_NDX (r_symndx)])
1774 off += 4;
1775 }
1776
1777 /* See above re bit 1 and bit 0 usage. */
1778 if ((off & 2) == 0)
1779 {
1780 Elf_Internal_Rela outrel;
1781 bfd_byte *loc;
1782
1783 off &= ~3;
1784
1785 if (h != NULL)
1786 h->got.offset |= 2;
1787 else
1788 local_got_offsets[r_symndx] |= 2;
1789
1790 /* Clear the target contents of the GOT (just as a
1791 gesture; it's already cleared on allocation): this
1792 relocation is not like the other dynrelocs. */
1793 bfd_put_32 (output_bfd, 0, sgot->contents + off);
1794 bfd_put_32 (output_bfd, 0, sgot->contents + off + 4);
1795
1796 if (srelgot == NULL)
1797 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1798 BFD_ASSERT (srelgot != NULL);
1799
1800 if (h != NULL && h->dynindx != -1)
1801 {
1802 outrel.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_DTP);
1803 relocation = 0;
1804 }
1805 else
1806 {
1807 outrel.r_info = ELF32_R_INFO (0, R_CRIS_DTP);
1808
1809 /* NULL if we had an error. */
1810 relocation -= elf_hash_table (info)->tls_sec == NULL
1811 ? 0 : elf_hash_table (info)->tls_sec->vma;
1812 }
1813
1814 outrel.r_offset = (sgot->output_section->vma
1815 + sgot->output_offset
1816 + off);
1817 outrel.r_addend = relocation;
1818 loc = srelgot->contents;
1819 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
1820
1821 /* NULL if we had an error. */
1822 if (srelgot->contents != NULL)
1823 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1824 }
1825 else
1826 off &= ~3;
1827
1828 relocation = sgot->output_offset + off
1829 + (r_type == R_CRIS_32_GD ? sgot->output_section->vma : 0);
1830 }
1831
1832 /* The GOT-relative offset to the GOT entry is the
1833 relocation, or for R_CRIS_32_GD, the actual address of
1834 the GOT entry. */
1835 break;
1836
75f500d7
HPN
1837 case R_CRIS_32_IE:
1838 if (info->shared)
1839 {
1840 bfd_set_error (bfd_error_invalid_operation);
1841
1842 /* We've already informed in cris_elf_check_relocs that
1843 this is an error. */
1844 return FALSE;
1845 }
1846 /* Fall through. */
1847
100382c7
HPN
1848 case R_CRIS_32_GOT_TPREL:
1849 case R_CRIS_16_GOT_TPREL:
1850 if (rel->r_addend != 0)
1851 {
1852 /* We can't do anything for a relocation which is
1853 against a symbol *plus offset*. GOT holds
1854 relocations for symbols. Make this an error; the
1855 compiler isn't allowed to pass us these kinds of
1856 things. */
1857 (*_bfd_error_handler)
1858 (_("%B, section %A: relocation %s with non-zero addend %d"
1859 " against symbol `%s'"),
1860 input_bfd,
1861 input_section,
1862 cris_elf_howto_table[r_type].name,
1863 rel->r_addend,
1864 symname[0] != '\0' ? symname : _("[whose name is lost]"));
1865 bfd_set_error (bfd_error_bad_value);
1866 return FALSE;
1867 }
1868
1869 if (!info->shared && (h == NULL || h->def_regular))
1870 {
1871 /* Known contents of the GOT. */
1872 bfd_vma off;
1873
1874 /* The symbol is defined in the program, so just write
1875 the known_tpoffset into the GOT. */
1876 relocation -= elf_hash_table (info)->tls_sec->vma;
1877
1878 if (h != NULL)
1879 off = h->got.offset;
1880 else
1881 off = local_got_offsets[r_symndx];
1882
1883 /* Bit 0 is used to mark whether we've emitted the required
1884 entry (and if needed R_CRIS_32_TPREL reloc). Bit 1
1885 is used similarly for R_CRIS_DTP, see above. */
1886 if ((off & 1) == 0)
1887 {
1888 off &= ~3;
1889
1890 if (h != NULL)
1891 h->got.offset |= 1;
1892 else
1893 local_got_offsets[r_symndx] |= 1;
1894
1895 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
1896 }
1897 else
1898 off &= ~3;
1899
75f500d7
HPN
1900 relocation = sgot->output_offset + off
1901 + (r_type == R_CRIS_32_IE ? sgot->output_section->vma : 0);
100382c7
HPN
1902 }
1903 else
1904 {
1905 /* Emit a real relocation. */
1906 bfd_vma off;
1907
1908 if (h != NULL)
1909 off = h->got.offset;
1910 else
1911 off = local_got_offsets[r_symndx];
1912
1913 /* See above re usage of bit 0 and 1. */
1914 if ((off & 1) == 0)
1915 {
1916 Elf_Internal_Rela outrel;
1917 bfd_byte *loc;
1918
1919 off &= ~3;
1920
1921 if (h != NULL)
1922 h->got.offset |= 1;
1923 else
1924 local_got_offsets[r_symndx] |= 1;
1925
1926 if (srelgot == NULL)
1927 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1928 BFD_ASSERT (srelgot != NULL);
1929
1930 if (h != NULL && h->dynindx != -1)
1931 {
1932 outrel.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_32_TPREL);
1933 relocation = 0;
1934 }
1935 else
1936 {
1937 outrel.r_info = ELF32_R_INFO (0, R_CRIS_32_TPREL);
1938
1939 /* NULL if we had an error. */
1940 relocation -= elf_hash_table (info)->tls_sec == NULL
1941 ? 0 : elf_hash_table (info)->tls_sec->vma;
1942 }
1943
1944 /* Just "define" the initial contents in some
1945 semi-logical way. */
1946 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
1947
1948 outrel.r_offset = (sgot->output_section->vma
1949 + sgot->output_offset
1950 + off);
1951 outrel.r_addend = relocation;
1952 loc = srelgot->contents;
1953 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
1954 /* NULL if we had an error. */
1955 if (srelgot->contents != NULL)
1956 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1957 }
1958 else
1959 off &= ~3;
1960
75f500d7
HPN
1961 relocation = sgot->output_offset + off
1962 + (r_type == R_CRIS_32_IE ? sgot->output_section->vma : 0);
100382c7
HPN
1963 }
1964
75f500d7
HPN
1965 /* The GOT-relative offset to the GOT entry is the relocation,
1966 or for R_CRIS_32_GD, the actual address of the GOT entry. */
100382c7
HPN
1967 break;
1968
1969 case R_CRIS_16_TPREL:
1970 case R_CRIS_32_TPREL:
1971 /* This relocation must only be performed against symbols
1972 defined in an ordinary (non-DSO) object. */
1973 if (info->shared)
1974 {
1975 bfd_set_error (bfd_error_invalid_operation);
1976
1977 /* We've already informed in cris_elf_check_relocs that
1978 this is an error. */
1979 return FALSE;
1980 }
1981
1982 if (h != NULL
1983 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1984 && !h->def_regular
1985 /* If it's undefined, then an error message has already
1986 been emitted. */
1987 && h->root.type != bfd_link_hash_undefined)
1988 {
1989 (*_bfd_error_handler)
1990 (_("%B, section %A: relocation %s is"
1991 " not allowed for symbol: `%s'"
1992 " which is defined outside the program,"
1993 " perhaps a declaration mixup?"),
1994 input_bfd,
1995 input_section,
1996 cris_elf_howto_table[r_type].name,
1997 symname);
1998 bfd_set_error (bfd_error_bad_value);
1999 return FALSE;
2000 }
2001
2002 /* NULL if we had an error. */
2003 relocation -= elf_hash_table (info)->tls_sec == NULL
2004 ? 0 : elf_hash_table (info)->tls_sec->vma;
2005
2006 /* The TLS-relative offset is the relocation. */
2007 break;
2008
2009 default:
2010 BFD_FAIL ();
2011 return FALSE;
915e5146
HPN
2012 }
2013
2014 r = cris_final_link_relocate (howto, input_bfd, input_section,
2015 contents, rel, relocation);
2016
2017 if (r != bfd_reloc_ok)
2018 {
2019 const char * msg = (const char *) NULL;
2020
2021 switch (r)
2022 {
2023 case bfd_reloc_overflow:
2024 r = info->callbacks->reloc_overflow
dfeffb9f
L
2025 (info, (h ? &h->root : NULL), symname, howto->name,
2026 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
100382c7
HPN
2027 if (additional_relocation_error_msg_count > 0)
2028 {
2029 additional_relocation_error_msg_count--;
2030 switch (r_type)
2031 {
2032 case R_CRIS_16_GOTPLT:
2033 case R_CRIS_16_GOT:
2034
2035 /* Not just TLS is involved here, so we make
2036 generation and message depend on -fPIC/-fpic
2037 only. */
2038 case R_CRIS_16_GOT_TPREL:
2039 case R_CRIS_16_GOT_GD:
2040 (*_bfd_error_handler)
2041 (_("(too many global variables for -fpic:"
2042 " recompile with -fPIC)"));
2043 break;
2044
2045 case R_CRIS_16_TPREL:
2046 case R_CRIS_16_DTPREL:
2047 (*_bfd_error_handler)
2048 (_("(thread-local data too big for -fpic or"
2049 " -msmall-tls: recompile with -fPIC or"
2050 " -mno-small-tls)"));
2051 break;
2052
2053 /* No known cause for overflow for other relocs. */
2054 default:
2055 break;
2056 }
2057 }
915e5146
HPN
2058 break;
2059
2060 case bfd_reloc_undefined:
2061 r = info->callbacks->undefined_symbol
dc810e39 2062 (info, symname, input_bfd, input_section, rel->r_offset,
b34976b6 2063 TRUE);
915e5146
HPN
2064 break;
2065
2066 case bfd_reloc_outofrange:
2067 msg = _("internal error: out of range error");
2068 break;
2069
2070 case bfd_reloc_notsupported:
2071 msg = _("internal error: unsupported relocation error");
2072 break;
2073
2074 case bfd_reloc_dangerous:
2075 msg = _("internal error: dangerous relocation");
2076 break;
2077
2078 default:
2079 msg = _("internal error: unknown error");
2080 break;
2081 }
2082
2083 if (msg)
2084 r = info->callbacks->warning
dc810e39 2085 (info, msg, symname, input_bfd, input_section, rel->r_offset);
915e5146
HPN
2086
2087 if (! r)
b34976b6 2088 return FALSE;
915e5146
HPN
2089 }
2090 }
2091
b34976b6 2092 return TRUE;
915e5146
HPN
2093}
2094\f
2095/* Finish up dynamic symbol handling. We set the contents of various
2096 dynamic sections here. */
2097
b34976b6 2098static bfd_boolean
915e5146
HPN
2099elf_cris_finish_dynamic_symbol (output_bfd, info, h, sym)
2100 bfd *output_bfd;
2101 struct bfd_link_info *info;
2102 struct elf_link_hash_entry *h;
2103 Elf_Internal_Sym *sym;
2104{
2105 bfd *dynobj;
bac23f82
HPN
2106
2107 /* Where in the plt entry to put values. */
915e5146
HPN
2108 int plt_off1 = 2, plt_off2 = 10, plt_off3 = 16;
2109
bac23f82
HPN
2110 /* What offset to add to the distance to the first PLT entry for the
2111 value at plt_off3. */
2112 int plt_off3_value_bias = 4;
2113
2114 /* Where in the PLT entry the call-dynlink-stub is (happens to be same
2115 for PIC and non-PIC for v32 and pre-v32). */
2116 int plt_stub_offset = 8;
2117 int plt_entry_size = PLT_ENTRY_SIZE;
2118 const bfd_byte *plt_entry = elf_cris_plt_entry;
2119 const bfd_byte *plt_pic_entry = elf_cris_pic_plt_entry;
2120
2121 /* Adjust the various PLT entry offsets. */
2122 if (bfd_get_mach (output_bfd) == bfd_mach_cris_v32)
2123 {
2124 plt_off2 = 14;
2125 plt_off3 = 20;
2126 plt_off3_value_bias = -2;
2127 plt_stub_offset = 12;
2128 plt_entry_size = PLT_ENTRY_SIZE_V32;
2129 plt_entry = elf_cris_plt_entry_v32;
2130 plt_pic_entry = elf_cris_pic_plt_entry_v32;
2131 }
2132
915e5146
HPN
2133 dynobj = elf_hash_table (info)->dynobj;
2134
2135 if (h->plt.offset != (bfd_vma) -1)
2136 {
2137 asection *splt;
2138 asection *sgotplt;
2139 asection *sgot;
2140 asection *srela;
2141 bfd_vma got_base;
2142
2143 bfd_vma gotplt_offset
100382c7 2144 = elf_cris_hash_entry (h)->gotplt_offset;
915e5146 2145 Elf_Internal_Rela rela;
947216bf 2146 bfd_byte *loc;
b34976b6 2147 bfd_boolean has_gotplt = gotplt_offset != 0;
915e5146
HPN
2148
2149 /* Get the index in the procedure linkage table which
2150 corresponds to this symbol. This is the index of this symbol
2151 in all the symbols for which we are making plt entries. The
2152 first entry in the procedure linkage table is reserved. */
2153 /* We have to count backwards here, and the result is only valid as
2154 an index into .got.plt and its relocations. FIXME: Constants... */
2155 bfd_vma gotplt_index = gotplt_offset/4 - 3;
2156
2157 /* Get the offset into the .got table of the entry that corresponds
2158 to this function. Note that we embed knowledge that "incoming"
2159 .got goes after .got.plt in the output without padding (pointer
2160 aligned). However, that knowledge is present in several other
c152c796 2161 places too. */
915e5146
HPN
2162 bfd_vma got_offset
2163 = (has_gotplt
2164 ? gotplt_offset
2165 : h->got.offset + elf_cris_hash_table(info)->next_gotplt_entry);
2166
2167 /* This symbol has an entry in the procedure linkage table. Set it
2168 up. */
2169
2170 BFD_ASSERT (h->dynindx != -1);
2171
2172 splt = bfd_get_section_by_name (dynobj, ".plt");
2173 sgot = bfd_get_section_by_name (dynobj, ".got");
2174 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
2175 srela = bfd_get_section_by_name (dynobj, ".rela.plt");
2176 BFD_ASSERT (splt != NULL && sgotplt != NULL
2177 && (! has_gotplt || srela != NULL));
2178
2179 got_base = sgotplt->output_section->vma + sgotplt->output_offset;
2180
2181 /* Fill in the entry in the procedure linkage table. */
2182 if (! info->shared)
2183 {
bac23f82
HPN
2184 memcpy (splt->contents + h->plt.offset, plt_entry,
2185 plt_entry_size);
915e5146
HPN
2186
2187 /* We need to enter the absolute address of the GOT entry here. */
2188 bfd_put_32 (output_bfd, got_base + got_offset,
2189 splt->contents + h->plt.offset + plt_off1);
2190 }
2191 else
2192 {
bac23f82
HPN
2193 memcpy (splt->contents + h->plt.offset, plt_pic_entry,
2194 plt_entry_size);
915e5146
HPN
2195 bfd_put_32 (output_bfd, got_offset,
2196 splt->contents + h->plt.offset + plt_off1);
2197 }
2198
2199 /* Fill in the plt entry and make a relocation, if this is a "real"
2200 PLT entry. */
2201 if (has_gotplt)
2202 {
bac23f82 2203 /* Fill in the offset to the reloc table. */
915e5146
HPN
2204 bfd_put_32 (output_bfd,
2205 gotplt_index * sizeof (Elf32_External_Rela),
2206 splt->contents + h->plt.offset + plt_off2);
2207
2208 /* Fill in the offset to the first PLT entry, where to "jump". */
bac23f82
HPN
2209 bfd_put_32 (output_bfd,
2210 - (h->plt.offset + plt_off3 + plt_off3_value_bias),
915e5146
HPN
2211 splt->contents + h->plt.offset + plt_off3);
2212
2213 /* Fill in the entry in the global offset table with the address of
2214 the relocating stub. */
2215 bfd_put_32 (output_bfd,
2216 (splt->output_section->vma
2217 + splt->output_offset
2218 + h->plt.offset
bac23f82 2219 + plt_stub_offset),
915e5146
HPN
2220 sgotplt->contents + got_offset);
2221
2222 /* Fill in the entry in the .rela.plt section. */
2223 rela.r_offset = (sgotplt->output_section->vma
2224 + sgotplt->output_offset
2225 + got_offset);
2226 rela.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_JUMP_SLOT);
2227 rela.r_addend = 0;
947216bf
AM
2228 loc = srela->contents + gotplt_index * sizeof (Elf32_External_Rela);
2229 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
915e5146
HPN
2230 }
2231
f5385ebf 2232 if (!h->def_regular)
915e5146
HPN
2233 {
2234 /* Mark the symbol as undefined, rather than as defined in
2235 the .plt section. Leave the value alone. */
2236 sym->st_shndx = SHN_UNDEF;
2237
2238 /* FIXME: From elf32-sparc.c 2001-02-19 (1.18). I still don't
2239 know whether resetting the value is significant; if it really
2240 is, rather than a quirk or bug in the sparc port, then I
2241 believe we'd see this elsewhere. */
2242 /* If the symbol is weak, we do need to clear the value.
2243 Otherwise, the PLT entry would provide a definition for
2244 the symbol even if the symbol wasn't defined anywhere,
2245 and so the symbol would never be NULL. */
f5385ebf 2246 if (!h->ref_regular_nonweak)
915e5146
HPN
2247 sym->st_value = 0;
2248 }
2249 }
2250
e4a2175c
HPN
2251 /* For an ordinary program, we emit .got relocs only for symbols that
2252 are in the dynamic-symbols table and are either defined by the
2253 program or are undefined weak symbols, or are function symbols
2254 where we do not output a PLT: the PLT reloc was output above and all
2255 references to the function symbol are redirected to the PLT. */
4d96d128 2256 if (h->got.offset != (bfd_vma) -1
100382c7 2257 && (elf_cris_hash_entry (h)->reg_got_refcount > 0)
6849c52f
HPN
2258 && (info->shared
2259 || (h->dynindx != -1
e4a2175c 2260 && h->plt.offset == (bfd_vma) -1
f5385ebf 2261 && !h->def_regular
6849c52f 2262 && h->root.type != bfd_link_hash_undefweak)))
915e5146
HPN
2263 {
2264 asection *sgot;
2265 asection *srela;
2266 Elf_Internal_Rela rela;
947216bf 2267 bfd_byte *loc;
dc810e39 2268 bfd_byte *where;
915e5146
HPN
2269
2270 /* This symbol has an entry in the global offset table. Set it up. */
2271
2272 sgot = bfd_get_section_by_name (dynobj, ".got");
2273 srela = bfd_get_section_by_name (dynobj, ".rela.got");
2274 BFD_ASSERT (sgot != NULL && srela != NULL);
2275
2276 rela.r_offset = (sgot->output_section->vma
2277 + sgot->output_offset
dc810e39 2278 + (h->got.offset &~ (bfd_vma) 1));
915e5146
HPN
2279
2280 /* If this is a static link, or it is a -Bsymbolic link and the
2281 symbol is defined locally or was forced to be local because
2282 of a version file, we just want to emit a RELATIVE reloc.
2283 The entry in the global offset table will already have been
2284 initialized in the relocate_section function. */
dc810e39 2285 where = sgot->contents + (h->got.offset &~ (bfd_vma) 1);
915e5146
HPN
2286 if (! elf_hash_table (info)->dynamic_sections_created
2287 || (info->shared
2288 && (info->symbolic || h->dynindx == -1)
f5385ebf 2289 && h->def_regular))
915e5146
HPN
2290 {
2291 rela.r_info = ELF32_R_INFO (0, R_CRIS_RELATIVE);
dc810e39 2292 rela.r_addend = bfd_get_signed_32 (output_bfd, where);
915e5146
HPN
2293 }
2294 else
2295 {
dc810e39 2296 bfd_put_32 (output_bfd, (bfd_vma) 0, where);
915e5146
HPN
2297 rela.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_GLOB_DAT);
2298 rela.r_addend = 0;
2299 }
2300
947216bf
AM
2301 loc = srela->contents;
2302 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
2303 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
915e5146
HPN
2304 }
2305
f5385ebf 2306 if (h->needs_copy)
915e5146
HPN
2307 {
2308 asection *s;
2309 Elf_Internal_Rela rela;
947216bf 2310 bfd_byte *loc;
915e5146
HPN
2311
2312 /* This symbol needs a copy reloc. Set it up. */
2313
2314 BFD_ASSERT (h->dynindx != -1
2315 && (h->root.type == bfd_link_hash_defined
2316 || h->root.type == bfd_link_hash_defweak));
2317
2318 s = bfd_get_section_by_name (h->root.u.def.section->owner,
2319 ".rela.bss");
2320 BFD_ASSERT (s != NULL);
2321
2322 rela.r_offset = (h->root.u.def.value
2323 + h->root.u.def.section->output_section->vma
2324 + h->root.u.def.section->output_offset);
2325 rela.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_COPY);
2326 rela.r_addend = 0;
947216bf
AM
2327 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
2328 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
915e5146
HPN
2329 }
2330
2331 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
2332 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
22edb2f1 2333 || h == elf_hash_table (info)->hgot)
915e5146
HPN
2334 sym->st_shndx = SHN_ABS;
2335
b34976b6 2336 return TRUE;
915e5146
HPN
2337}
2338\f
100382c7
HPN
2339/* Finish up the dynamic sections. Do *not* emit relocs here, as their
2340 offsets were changed, as part of -z combreloc handling, from those we
2341 computed. */
915e5146 2342
b34976b6 2343static bfd_boolean
915e5146
HPN
2344elf_cris_finish_dynamic_sections (output_bfd, info)
2345 bfd *output_bfd;
2346 struct bfd_link_info *info;
2347{
2348 bfd *dynobj;
2349 asection *sgot;
2350 asection *sdyn;
2351
2352 dynobj = elf_hash_table (info)->dynobj;
2353
2354 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
2355 BFD_ASSERT (sgot != NULL);
2356 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
2357
2358 if (elf_hash_table (info)->dynamic_sections_created)
2359 {
2360 asection *splt;
2361 Elf32_External_Dyn *dyncon, *dynconend;
2362
2363 splt = bfd_get_section_by_name (dynobj, ".plt");
2364 BFD_ASSERT (splt != NULL && sdyn != NULL);
2365
2366 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 2367 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
915e5146
HPN
2368 for (; dyncon < dynconend; dyncon++)
2369 {
2370 Elf_Internal_Dyn dyn;
2371 asection *s;
2372
2373 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
2374
2375 switch (dyn.d_tag)
2376 {
2377 default:
2378 break;
2379
2380 case DT_PLTGOT:
2381 s = bfd_get_section_by_name (output_bfd, ".got");
2382 BFD_ASSERT (s != NULL);
2383 dyn.d_un.d_ptr = s->vma;
2384 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2385 break;
2386
2387 case DT_JMPREL:
2388 /* Yes, we *can* have a .plt and no .plt.rela, for instance
2389 if all symbols are found in the .got (not .got.plt). */
2390 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2391 dyn.d_un.d_ptr = s != NULL ? s->vma : 0;
2392 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2393 break;
2394
2395 case DT_PLTRELSZ:
2396 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2397 if (s == NULL)
2398 dyn.d_un.d_val = 0;
915e5146 2399 else
eea6121a 2400 dyn.d_un.d_val = s->size;
915e5146
HPN
2401 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2402 break;
2403
2404 case DT_RELASZ:
2405 /* The procedure linkage table relocs (DT_JMPREL) should
2406 not be included in the overall relocs (DT_RELA).
2407 Therefore, we override the DT_RELASZ entry here to
2408 make it not include the JMPREL relocs. Since the
2409 linker script arranges for .rela.plt to follow all
2410 other relocation sections, we don't have to worry
2411 about changing the DT_RELA entry. */
2412 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2413 if (s != NULL)
eea6121a 2414 dyn.d_un.d_val -= s->size;
915e5146
HPN
2415 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2416 break;
2417 }
2418 }
2419
2420 /* Fill in the first entry in the procedure linkage table. */
eea6121a 2421 if (splt->size > 0)
915e5146 2422 {
bac23f82
HPN
2423 if (bfd_get_mach (output_bfd) == bfd_mach_cris_v32)
2424 {
2425 if (info->shared)
2426 memcpy (splt->contents, elf_cris_pic_plt0_entry_v32,
2427 PLT_ENTRY_SIZE_V32);
2428 else
2429 {
2430 memcpy (splt->contents, elf_cris_plt0_entry_v32,
2431 PLT_ENTRY_SIZE_V32);
2432 bfd_put_32 (output_bfd,
2433 sgot->output_section->vma
2434 + sgot->output_offset + 4,
2435 splt->contents + 4);
2436
2437 elf_section_data (splt->output_section)->this_hdr.sh_entsize
2438 = PLT_ENTRY_SIZE_V32;
2439 }
2440 }
915e5146 2441 else
bac23f82
HPN
2442 {
2443 if (info->shared)
2444 memcpy (splt->contents, elf_cris_pic_plt0_entry,
2445 PLT_ENTRY_SIZE);
2446 else
2447 {
2448 memcpy (splt->contents, elf_cris_plt0_entry,
2449 PLT_ENTRY_SIZE);
2450 bfd_put_32 (output_bfd,
2451 sgot->output_section->vma
2452 + sgot->output_offset + 4,
2453 splt->contents + 6);
2454 bfd_put_32 (output_bfd,
2455 sgot->output_section->vma
2456 + sgot->output_offset + 8,
2457 splt->contents + 14);
2458
2459 elf_section_data (splt->output_section)->this_hdr.sh_entsize
2460 = PLT_ENTRY_SIZE;
2461 }
915e5146
HPN
2462 }
2463 }
2464 }
2465
2466 /* Fill in the first three entries in the global offset table. */
eea6121a 2467 if (sgot->size > 0)
915e5146
HPN
2468 {
2469 if (sdyn == NULL)
2470 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
2471 else
2472 bfd_put_32 (output_bfd,
2473 sdyn->output_section->vma + sdyn->output_offset,
2474 sgot->contents);
2475 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
2476 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
2477 }
2478
2479 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
2480
b34976b6 2481 return TRUE;
06c15ad7
HPN
2482}
2483\f
2484/* Return the section that should be marked against GC for a given
2485 relocation. */
2486
2487static asection *
07adf181
AM
2488cris_elf_gc_mark_hook (asection *sec,
2489 struct bfd_link_info *info,
2490 Elf_Internal_Rela *rel,
2491 struct elf_link_hash_entry *h,
2492 Elf_Internal_Sym *sym)
06c15ad7 2493{
100382c7 2494 enum elf_cris_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
06c15ad7 2495 if (h != NULL)
100382c7 2496 switch (r_type)
07adf181
AM
2497 {
2498 case R_CRIS_GNU_VTINHERIT:
2499 case R_CRIS_GNU_VTENTRY:
2500 return NULL;
100382c7
HPN
2501
2502 default:
2503 break;
07adf181 2504 }
06c15ad7 2505
07adf181 2506 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
06c15ad7
HPN
2507}
2508
2509/* Update the got entry reference counts for the section being removed. */
2510
b34976b6 2511static bfd_boolean
07adf181
AM
2512cris_elf_gc_sweep_hook (bfd *abfd,
2513 struct bfd_link_info *info,
2514 asection *sec,
2515 const Elf_Internal_Rela *relocs)
06c15ad7 2516{
915e5146
HPN
2517 Elf_Internal_Shdr *symtab_hdr;
2518 struct elf_link_hash_entry **sym_hashes;
2519 bfd_signed_vma *local_got_refcounts;
2520 const Elf_Internal_Rela *rel, *relend;
915e5146
HPN
2521 bfd *dynobj;
2522 asection *sgot;
2523 asection *srelgot;
2524
7dda2462
TG
2525 if (info->relocatable)
2526 return TRUE;
2527
915e5146
HPN
2528 dynobj = elf_hash_table (info)->dynobj;
2529 if (dynobj == NULL)
b34976b6 2530 return TRUE;
915e5146 2531
babfd660
KH
2532 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2533 sym_hashes = elf_sym_hashes (abfd);
2534 local_got_refcounts = elf_local_got_refcounts (abfd);
2535
915e5146
HPN
2536 sgot = bfd_get_section_by_name (dynobj, ".got");
2537 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
2538
2539 relend = relocs + sec->reloc_count;
2540 for (rel = relocs; rel < relend; rel++)
2541 {
babfd660 2542 unsigned long r_symndx;
3eb128b2 2543 struct elf_link_hash_entry *h = NULL;
100382c7
HPN
2544 bfd_signed_vma got_element_size = 4;
2545 bfd_signed_vma *specific_refcount = NULL;
2546 enum elf_cris_reloc_type r_type;
3eb128b2
AM
2547
2548 r_symndx = ELF32_R_SYM (rel->r_info);
2549 if (r_symndx >= symtab_hdr->sh_info)
2550 {
2551 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2552 while (h->root.type == bfd_link_hash_indirect
2553 || h->root.type == bfd_link_hash_warning)
2554 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2555 }
babfd660 2556
100382c7
HPN
2557 r_type = ELF32_R_TYPE (rel->r_info);
2558 switch (r_type)
2559 {
2560 case R_CRIS_32_GOT:
2561 case R_CRIS_16_GOT:
2562 case R_CRIS_16_GOTPLT:
2563 case R_CRIS_32_GOTPLT:
2564 specific_refcount = h != NULL
2565 ? &((struct elf_cris_link_hash_entry *) h)->reg_got_refcount
2566 : &local_got_refcounts[LGOT_REG_NDX (r_symndx)];
2567 break;
2568
2569 case R_CRIS_32_GD:
2570 case R_CRIS_32_GOT_GD:
2571 case R_CRIS_16_GOT_GD:
2572 got_element_size = 8;
2573 specific_refcount = h != NULL
2574 ? &((struct elf_cris_link_hash_entry *) h)->dtp_refcount
2575 : &local_got_refcounts[LGOT_DTP_NDX (r_symndx)];
2576 break;
2577
75f500d7 2578 case R_CRIS_32_IE:
100382c7
HPN
2579 case R_CRIS_16_GOT_TPREL:
2580 case R_CRIS_32_GOT_TPREL:
2581 specific_refcount = h != NULL
2582 ? &((struct elf_cris_link_hash_entry *) h)->tprel_refcount
2583 : &local_got_refcounts[LGOT_TPREL_NDX (r_symndx)];
2584 break;
2585
2586 default:
2587 break;
2588 }
2589
2590 switch (r_type)
915e5146 2591 {
75f500d7 2592 case R_CRIS_32_IE:
100382c7
HPN
2593 case R_CRIS_32_GD:
2594 case R_CRIS_16_GOT_TPREL:
2595 case R_CRIS_32_GOT_TPREL:
2596 case R_CRIS_32_GOT_GD:
2597 case R_CRIS_16_GOT_GD:
915e5146
HPN
2598 case R_CRIS_16_GOT:
2599 case R_CRIS_32_GOT:
3eb128b2 2600 if (h != NULL)
915e5146 2601 {
100382c7
HPN
2602 /* If the counters are 0 when we got here, we've
2603 miscounted somehow somewhere, an internal error. */
2604 BFD_ASSERT (h->got.refcount > 0);
2605 --h->got.refcount;
2606
2607 BFD_ASSERT (*specific_refcount > 0);
2608 --*specific_refcount;
2609 if (*specific_refcount == 0)
915e5146 2610 {
100382c7
HPN
2611 /* We don't need the .got entry any more. */
2612 sgot->size -= got_element_size;
2613 srelgot->size -= sizeof (Elf32_External_Rela);
915e5146
HPN
2614 }
2615 break;
2616 }
2617
2618 local_got_reloc:
2619 if (local_got_refcounts != NULL)
2620 {
100382c7
HPN
2621 /* If the counters are 0 when we got here, we've
2622 miscounted somehow somewhere, an internal error. */
2623 BFD_ASSERT (local_got_refcounts[r_symndx] > 0);
2624 --local_got_refcounts[r_symndx];
2625
2626 BFD_ASSERT (*specific_refcount > 0);
2627 --*specific_refcount;
2628 if (*specific_refcount == 0)
915e5146 2629 {
100382c7
HPN
2630 /* We don't need the .got entry any more. */
2631 sgot->size -= got_element_size;
2632 if (info->shared)
2633 srelgot->size -= sizeof (Elf32_External_Rela);
915e5146
HPN
2634 }
2635 }
2636 break;
2637
2638 case R_CRIS_16_GOTPLT:
2639 case R_CRIS_32_GOTPLT:
2640 /* For local symbols, treat these like GOT relocs. */
3eb128b2 2641 if (h == NULL)
915e5146 2642 goto local_got_reloc;
e4a2175c 2643 /* Fall through. */
3eb128b2 2644
915e5146
HPN
2645 case R_CRIS_32_PLT_GOTREL:
2646 /* FIXME: We don't garbage-collect away the .got section. */
2647 if (local_got_refcounts != NULL)
2648 local_got_refcounts[-1]--;
2649 /* Fall through. */
3eb128b2 2650
915e5146
HPN
2651 case R_CRIS_8_PCREL:
2652 case R_CRIS_16_PCREL:
2653 case R_CRIS_32_PCREL:
2654 case R_CRIS_32_PLT_PCREL:
3eb128b2 2655 if (h != NULL)
915e5146 2656 {
0a4787a0
HPN
2657 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2658 && h->plt.refcount > 0)
915e5146
HPN
2659 --h->plt.refcount;
2660 }
2661 break;
2662
100382c7
HPN
2663 case R_CRIS_32_DTPREL:
2664 case R_CRIS_16_DTPREL:
2665 elf_cris_hash_table (info)->dtpmod_refcount--;
2666 if (elf_cris_hash_table (info)->dtpmod_refcount == 0)
2667 elf_cris_hash_table (info)->next_gotplt_entry -= 8;
2668 BFD_ASSERT (local_got_refcounts != NULL);
2669 local_got_refcounts[-1]--;
2670 break;
2671
915e5146
HPN
2672 default:
2673 break;
2674 }
2675 }
2676
b34976b6 2677 return TRUE;
06c15ad7
HPN
2678}
2679
915e5146
HPN
2680/* Make sure we emit a GOT entry if the symbol was supposed to have a PLT
2681 entry but we found we will not create any. Called when we find we will
4d96d128
HPN
2682 not have any PLT for this symbol, by for example
2683 elf_cris_adjust_dynamic_symbol when we're doing a proper dynamic link,
2684 or elf_cris_size_dynamic_sections if no dynamic sections will be
2685 created (we're only linking static objects). */
915e5146 2686
b34976b6 2687static bfd_boolean
915e5146
HPN
2688elf_cris_adjust_gotplt_to_got (h, p)
2689 struct elf_cris_link_hash_entry *h;
2690 PTR p;
2691{
2692 struct bfd_link_info *info = (struct bfd_link_info *) p;
915e5146 2693
e92d460e
AM
2694 if (h->root.root.type == bfd_link_hash_warning)
2695 h = (struct elf_cris_link_hash_entry *) h->root.root.u.i.link;
2696
915e5146
HPN
2697 /* If nobody wanted a GOTPLT with this symbol, we're done. */
2698 if (h->gotplt_refcount <= 0)
b34976b6 2699 return TRUE;
915e5146 2700
100382c7 2701 if (h->reg_got_refcount > 0)
915e5146 2702 {
100382c7
HPN
2703 /* There's a GOT entry for this symbol. Just adjust the refcounts.
2704 Probably not necessary at this stage, but keeping them accurate
915e5146
HPN
2705 helps avoiding surprises later. */
2706 h->root.got.refcount += h->gotplt_refcount;
100382c7 2707 h->reg_got_refcount += h->gotplt_refcount;
5e0f5ae3 2708 h->gotplt_refcount = 0;
915e5146
HPN
2709 }
2710 else
2711 {
4d96d128 2712 /* No GOT entry for this symbol. We need to create one. */
8d1d654f
AM
2713 bfd *dynobj = elf_hash_table (info)->dynobj;
2714 asection *sgot;
2715 asection *srelgot;
2716
2717 BFD_ASSERT (dynobj != NULL);
2718 sgot = bfd_get_section_by_name (dynobj, ".got");
2719 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
915e5146 2720
100382c7
HPN
2721 /* Put accurate refcounts there. */
2722 h->root.got.refcount += h->gotplt_refcount;
2723 h->reg_got_refcount = h->gotplt_refcount;
915e5146 2724
5e0f5ae3 2725 h->gotplt_refcount = 0;
915e5146 2726
44aa49bb
HPN
2727 /* We always have a .got and a .rela.got section if there were
2728 GOTPLT relocs in input. */
2729 BFD_ASSERT (sgot != NULL && srelgot != NULL);
915e5146
HPN
2730
2731 /* Allocate space in the .got section. */
eea6121a 2732 sgot->size += 4;
915e5146
HPN
2733
2734 /* Allocate relocation space. */
eea6121a 2735 srelgot->size += sizeof (Elf32_External_Rela);
915e5146
HPN
2736 }
2737
b34976b6 2738 return TRUE;
915e5146
HPN
2739}
2740
2741/* Try to fold PLT entries with GOT entries. There are two cases when we
2742 want to do this:
2743
2744 - When all PLT references are GOTPLT references, and there are GOT
e4a2175c
HPN
2745 references, and this is not the executable. We don't have to
2746 generate a PLT at all.
915e5146 2747
e4a2175c
HPN
2748 - When there are both (ordinary) PLT references and GOT references,
2749 and this isn't the executable.
915e5146 2750 We want to make the PLT reference use the ordinary GOT entry rather
e4a2175c
HPN
2751 than R_CRIS_JUMP_SLOT, a run-time dynamically resolved GOTPLT entry,
2752 since the GOT entry will have to be resolved at startup anyway.
915e5146
HPN
2753
2754 Though the latter case is handled when room for the PLT is allocated,
2755 not here.
2756
e4a2175c
HPN
2757 By folding into the GOT, we may need a round-trip to a PLT in the
2758 executable for calls, a loss in performance. Still, losing a
2759 reloc is a win in size and at least in start-up time.
2760
915e5146
HPN
2761 Note that this function is called before symbols are forced local by
2762 version scripts. The differing cases are handled by
2763 elf_cris_hide_symbol. */
2764
b34976b6 2765static bfd_boolean
915e5146
HPN
2766elf_cris_try_fold_plt_to_got (h, p)
2767 struct elf_cris_link_hash_entry *h;
2768 PTR p;
2769{
2770 struct bfd_link_info *info = (struct bfd_link_info *) p;
2771
2772 /* If there are no GOT references for this symbol, we can't fold any
2773 other reference so there's nothing to do. Likewise if there are no
2774 PLT references; GOTPLT references included. */
2775 if (h->root.got.refcount <= 0 || h->root.plt.refcount <= 0)
b34976b6 2776 return TRUE;
915e5146
HPN
2777
2778 /* GOTPLT relocs are supposed to be included into the PLT refcount. */
2779 BFD_ASSERT (h->gotplt_refcount <= h->root.plt.refcount);
2780
2781 if (h->gotplt_refcount == h->root.plt.refcount)
2782 {
4d96d128 2783 /* The only PLT references are GOTPLT references, and there are GOT
915e5146
HPN
2784 references. Convert PLT to GOT references. */
2785 if (! elf_cris_adjust_gotplt_to_got (h, info))
b34976b6 2786 return FALSE;
915e5146
HPN
2787
2788 /* Clear the PLT references, so no PLT will be created. */
2789 h->root.plt.offset = (bfd_vma) -1;
2790 }
2791
b34976b6 2792 return TRUE;
915e5146
HPN
2793}
2794
2795/* Our own version of hide_symbol, so that we can adjust a GOTPLT reloc
2796 to use a GOT entry (and create one) rather than requiring a GOTPLT
2797 entry. */
2798
2799static void
e5094212 2800elf_cris_hide_symbol (info, h, force_local)
915e5146
HPN
2801 struct bfd_link_info *info;
2802 struct elf_link_hash_entry *h;
b34976b6 2803 bfd_boolean force_local;
915e5146
HPN
2804{
2805 elf_cris_adjust_gotplt_to_got ((struct elf_cris_link_hash_entry *) h, info);
2806
e5094212 2807 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
915e5146
HPN
2808}
2809
2810/* Adjust a symbol defined by a dynamic object and referenced by a
2811 regular object. The current definition is in some section of the
2812 dynamic object, but we're not including those sections. We have to
2813 change the definition to something the rest of the link can
2814 understand. */
2815
b34976b6 2816static bfd_boolean
915e5146
HPN
2817elf_cris_adjust_dynamic_symbol (info, h)
2818 struct bfd_link_info *info;
2819 struct elf_link_hash_entry *h;
2820{
2821 bfd *dynobj;
2822 asection *s;
bac23f82 2823 bfd_size_type plt_entry_size;
915e5146
HPN
2824
2825 dynobj = elf_hash_table (info)->dynobj;
2826
2827 /* Make sure we know what is going on here. */
2828 BFD_ASSERT (dynobj != NULL
f5385ebf 2829 && (h->needs_plt
f6e332e6 2830 || h->u.weakdef != NULL
f5385ebf
AM
2831 || (h->def_dynamic
2832 && h->ref_regular
2833 && !h->def_regular)));
915e5146 2834
bac23f82
HPN
2835 plt_entry_size
2836 = (bfd_get_mach (dynobj) == bfd_mach_cris_v32
2837 ? PLT_ENTRY_SIZE_V32 : PLT_ENTRY_SIZE);
2838
915e5146
HPN
2839 /* If this is a function, put it in the procedure linkage table. We
2840 will fill in the contents of the procedure linkage table later,
2841 when we know the address of the .got section. */
2842 if (h->type == STT_FUNC
f5385ebf 2843 || h->needs_plt)
915e5146 2844 {
6849c52f
HPN
2845 /* If we link a program (not a DSO), we'll get rid of unnecessary
2846 PLT entries; we point to the actual symbols -- even for pic
2847 relocs, because a program built with -fpic should have the same
2848 result as one built without -fpic, specifically considering weak
2849 symbols.
2850 FIXME: m68k and i386 differ here, for unclear reasons. */
915e5146 2851 if (! info->shared
f5385ebf 2852 && !h->def_dynamic)
915e5146
HPN
2853 {
2854 /* This case can occur if we saw a PLT reloc in an input file,
6849c52f
HPN
2855 but the symbol was not defined by a dynamic object. In such
2856 a case, we don't actually need to build a procedure linkage
2857 table, and we can just do an absolute or PC reloc instead, or
4d96d128 2858 change a .got.plt index to a .got index for GOTPLT relocs. */
f5385ebf
AM
2859 BFD_ASSERT (h->needs_plt);
2860 h->needs_plt = 0;
915e5146 2861 h->plt.offset = (bfd_vma) -1;
915e5146
HPN
2862 return
2863 elf_cris_adjust_gotplt_to_got ((struct
2864 elf_cris_link_hash_entry *) h,
2865 info);
2866 }
2867
e4a2175c
HPN
2868 /* If we had a R_CRIS_GLOB_DAT that didn't have to point to a PLT;
2869 where a pointer-equivalent symbol was unimportant (i.e. more
2870 like R_CRIS_JUMP_SLOT after symbol evaluation) we could get rid
2871 of the PLT. We can't for the executable, because the GOT
2872 entries will point to the PLT there (and be constant). */
2873 if (info->shared
2874 && !elf_cris_try_fold_plt_to_got ((struct elf_cris_link_hash_entry*)
2875 h, info))
b34976b6 2876 return FALSE;
915e5146
HPN
2877
2878 /* GC or folding may have rendered this entry unused. */
2879 if (h->plt.refcount <= 0)
2880 {
f5385ebf 2881 h->needs_plt = 0;
915e5146 2882 h->plt.offset = (bfd_vma) -1;
b34976b6 2883 return TRUE;
915e5146
HPN
2884 }
2885
2886 /* Make sure this symbol is output as a dynamic symbol. */
2887 if (h->dynindx == -1)
2888 {
c152c796 2889 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 2890 return FALSE;
915e5146
HPN
2891 }
2892
2893 s = bfd_get_section_by_name (dynobj, ".plt");
2894 BFD_ASSERT (s != NULL);
2895
2896 /* If this is the first .plt entry, make room for the special
2897 first entry. */
eea6121a 2898 if (s->size == 0)
bac23f82 2899 s->size += plt_entry_size;
915e5146
HPN
2900
2901 /* If this symbol is not defined in a regular file, and we are
2902 not generating a shared library, then set the symbol to this
6849c52f 2903 location in the .plt. */
915e5146 2904 if (!info->shared
f5385ebf 2905 && !h->def_regular)
915e5146
HPN
2906 {
2907 h->root.u.def.section = s;
eea6121a 2908 h->root.u.def.value = s->size;
915e5146
HPN
2909 }
2910
4d96d128
HPN
2911 /* If there's already a GOT entry, use that, not a .got.plt. A
2912 GOT field still has a reference count when we get here; it's
e4a2175c
HPN
2913 not yet changed to an offset. We can't do this for an
2914 executable, because then the reloc associated with the PLT
2915 would get a non-PLT reloc pointing to the PLT. FIXME: Move
2916 this to elf_cris_try_fold_plt_to_got. */
2917 if (info->shared && h->got.refcount > 0)
915e5146
HPN
2918 {
2919 h->got.refcount += h->plt.refcount;
2920
2921 /* Mark the PLT offset to use the GOT entry by setting the low
2922 bit in the plt offset; it is always a multiple of
bac23f82
HPN
2923 plt_entry_size (which is at least a multiple of 2). */
2924 BFD_ASSERT ((s->size % plt_entry_size) == 0);
915e5146
HPN
2925
2926 /* Change the PLT refcount to an offset. */
eea6121a 2927 h->plt.offset = s->size;
915e5146
HPN
2928
2929 /* By not setting gotplt_offset (i.e. it remains at 0), we signal
2930 that the got entry should be used instead. */
2931 BFD_ASSERT (((struct elf_cris_link_hash_entry *)
2932 h)->gotplt_offset == 0);
2933
2934 /* Make room for this entry. */
bac23f82 2935 s->size += plt_entry_size;
915e5146 2936
b34976b6 2937 return TRUE;
915e5146
HPN
2938 }
2939
2940 /* No GOT reference for this symbol; prepare for an ordinary PLT. */
eea6121a 2941 h->plt.offset = s->size;
915e5146
HPN
2942
2943 /* Make room for this entry. */
bac23f82 2944 s->size += plt_entry_size;
915e5146
HPN
2945
2946 /* We also need to make an entry in the .got.plt section, which
2947 will be placed in the .got section by the linker script. */
2948 ((struct elf_cris_link_hash_entry *) h)->gotplt_offset
2949 = elf_cris_hash_table (info)->next_gotplt_entry;
2950 elf_cris_hash_table (info)->next_gotplt_entry += 4;
2951
2952 s = bfd_get_section_by_name (dynobj, ".got.plt");
2953 BFD_ASSERT (s != NULL);
eea6121a 2954 s->size += 4;
915e5146
HPN
2955
2956 /* We also need to make an entry in the .rela.plt section. */
2957
2958 s = bfd_get_section_by_name (dynobj, ".rela.plt");
2959 BFD_ASSERT (s != NULL);
eea6121a 2960 s->size += sizeof (Elf32_External_Rela);
915e5146 2961
b34976b6 2962 return TRUE;
915e5146
HPN
2963 }
2964
2965 /* Reinitialize the plt offset now that it is not used as a reference
2966 count any more. */
2967 h->plt.offset = (bfd_vma) -1;
2968
2969 /* If this is a weak symbol, and there is a real definition, the
2970 processor independent code will have arranged for us to see the
2971 real definition first, and we can just use the same value. */
f6e332e6 2972 if (h->u.weakdef != NULL)
915e5146 2973 {
f6e332e6
AM
2974 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
2975 || h->u.weakdef->root.type == bfd_link_hash_defweak);
2976 h->root.u.def.section = h->u.weakdef->root.u.def.section;
2977 h->root.u.def.value = h->u.weakdef->root.u.def.value;
b34976b6 2978 return TRUE;
915e5146
HPN
2979 }
2980
2981 /* This is a reference to a symbol defined by a dynamic object which
2982 is not a function. */
2983
2984 /* If we are creating a shared library, we must presume that the
2985 only references to the symbol are via the global offset table.
2986 For such cases we need not do anything here; the relocations will
2987 be handled correctly by relocate_section. */
2988 if (info->shared)
b34976b6 2989 return TRUE;
915e5146
HPN
2990
2991 /* If there are no references to this symbol that do not use the
2992 GOT, we don't need to generate a copy reloc. */
f5385ebf 2993 if (!h->non_got_ref)
b34976b6 2994 return TRUE;
915e5146 2995
909272ee
AM
2996 if (h->size == 0)
2997 {
2998 (*_bfd_error_handler) (_("dynamic variable `%s' is zero size"),
2999 h->root.root.string);
3000 return TRUE;
3001 }
3002
915e5146
HPN
3003 /* We must allocate the symbol in our .dynbss section, which will
3004 become part of the .bss section of the executable. There will be
3005 an entry for this symbol in the .dynsym section. The dynamic
3006 object will contain position independent code, so all references
3007 from the dynamic object to this symbol will go through the global
3008 offset table. The dynamic linker will use the .dynsym entry to
3009 determine the address it must put in the global offset table, so
3010 both the dynamic object and the regular object will refer to the
3011 same memory location for the variable. */
3012
3013 s = bfd_get_section_by_name (dynobj, ".dynbss");
3014 BFD_ASSERT (s != NULL);
3015
3016 /* We must generate a R_CRIS_COPY reloc to tell the dynamic linker to
3017 copy the initial value out of the dynamic object and into the
3018 runtime process image. We need to remember the offset into the
3019 .rela.bss section we are going to use. */
3020 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
3021 {
3022 asection *srel;
3023
3024 srel = bfd_get_section_by_name (dynobj, ".rela.bss");
3025 BFD_ASSERT (srel != NULL);
eea6121a 3026 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 3027 h->needs_copy = 1;
915e5146
HPN
3028 }
3029
027297b7 3030 return _bfd_elf_adjust_dynamic_copy (h, s);
915e5146
HPN
3031}
3032
237bc7f0
HPN
3033/* Adjust our "subclass" elements for an indirect symbol. */
3034
3035static void
3036elf_cris_copy_indirect_symbol (struct bfd_link_info *info,
3037 struct elf_link_hash_entry *dir,
3038 struct elf_link_hash_entry *ind)
3039{
3040 struct elf_cris_link_hash_entry *edir, *eind;
3041
3042 edir = (struct elf_cris_link_hash_entry *) dir;
3043 eind = (struct elf_cris_link_hash_entry *) ind;
3044
867ea5fd
HPN
3045 /* Only indirect symbols are replaced; we're not interested in
3046 updating any of EIND's fields for other symbols. */
3047 if (eind->root.root.type != bfd_link_hash_indirect)
3048 return;
3049
237bc7f0
HPN
3050 BFD_ASSERT (edir->pcrel_relocs_copied == NULL);
3051 BFD_ASSERT (edir->gotplt_offset == 0 || eind->gotplt_offset == 0);
3052
3053#define XMOVOPZ(F, OP, Z) edir->F OP eind->F; eind->F = Z
3054#define XMOVE(F) XMOVOPZ (F, +=, 0)
3055 XMOVOPZ (pcrel_relocs_copied, =, NULL);
3056 XMOVE (gotplt_refcount);
3057 XMOVE (gotplt_offset);
3058 XMOVE (reg_got_refcount);
3059 XMOVE (tprel_refcount);
3060 XMOVE (dtp_refcount);
3061#undef XMOVE
3062#undef XMOVOPZ
3063
3064 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
3065}
3066
915e5146 3067/* Look through the relocs for a section during the first phase. */
a7c10850 3068
b34976b6 3069static bfd_boolean
06c15ad7
HPN
3070cris_elf_check_relocs (abfd, info, sec, relocs)
3071 bfd *abfd;
3072 struct bfd_link_info *info;
3073 asection *sec;
3074 const Elf_Internal_Rela *relocs;
3075{
915e5146 3076 bfd *dynobj;
06c15ad7 3077 Elf_Internal_Shdr *symtab_hdr;
5582a088 3078 struct elf_link_hash_entry **sym_hashes;
915e5146 3079 bfd_signed_vma *local_got_refcounts;
06c15ad7
HPN
3080 const Elf_Internal_Rela *rel;
3081 const Elf_Internal_Rela *rel_end;
915e5146
HPN
3082 asection *sgot;
3083 asection *srelgot;
3084 asection *sreloc;
a7c10850 3085
1049f94e 3086 if (info->relocatable)
b34976b6 3087 return TRUE;
a7c10850 3088
915e5146 3089 dynobj = elf_hash_table (info)->dynobj;
06c15ad7
HPN
3090 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3091 sym_hashes = elf_sym_hashes (abfd);
915e5146
HPN
3092 local_got_refcounts = elf_local_got_refcounts (abfd);
3093
3094 sgot = NULL;
3095 srelgot = NULL;
3096 sreloc = NULL;
3097
06c15ad7
HPN
3098 rel_end = relocs + sec->reloc_count;
3099 for (rel = relocs; rel < rel_end; rel++)
3100 {
3101 struct elf_link_hash_entry *h;
3102 unsigned long r_symndx;
915e5146 3103 enum elf_cris_reloc_type r_type;
100382c7
HPN
3104 bfd_signed_vma got_element_size = 4;
3105 unsigned long r_symndx_lgot = INT_MAX;
a7c10850 3106
06c15ad7
HPN
3107 r_symndx = ELF32_R_SYM (rel->r_info);
3108 if (r_symndx < symtab_hdr->sh_info)
100382c7
HPN
3109 {
3110 h = NULL;
3111 r_symndx_lgot = LGOT_REG_NDX (r_symndx);
3112 }
06c15ad7 3113 else
973a3492
L
3114 {
3115 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3116 while (h->root.type == bfd_link_hash_indirect
3117 || h->root.type == bfd_link_hash_warning)
3118 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3119 }
a7c10850 3120
915e5146
HPN
3121 r_type = ELF32_R_TYPE (rel->r_info);
3122
3123 /* Some relocs require linker-created sections; we need to hang them
3124 on the first input bfd we found that contained dynamic relocs. */
3125 switch (r_type)
3126 {
100382c7
HPN
3127 case R_CRIS_16_DTPREL:
3128 case R_CRIS_32_DTPREL:
3129 /* The first .got.plt entry is right after the R_CRIS_DTPMOD
3130 entry at index 3. */
3131 if (elf_cris_hash_table (info)->dtpmod_refcount == 0)
3132 elf_cris_hash_table (info)->next_gotplt_entry += 8;
3133 elf_cris_hash_table (info)->dtpmod_refcount++;
3134 /* Fall through. */
3135
75f500d7 3136 case R_CRIS_32_IE:
100382c7
HPN
3137 case R_CRIS_32_GD:
3138 case R_CRIS_16_GOT_GD:
3139 case R_CRIS_32_GOT_GD:
3140 case R_CRIS_32_GOT_TPREL:
3141 case R_CRIS_16_GOT_TPREL:
915e5146
HPN
3142 case R_CRIS_16_GOT:
3143 case R_CRIS_32_GOT:
3144 case R_CRIS_32_GOTREL:
3145 case R_CRIS_32_PLT_GOTREL:
3146 case R_CRIS_32_PLT_PCREL:
3147 case R_CRIS_16_GOTPLT:
3148 case R_CRIS_32_GOTPLT:
3149 if (dynobj == NULL)
3150 {
3151 elf_hash_table (info)->dynobj = dynobj = abfd;
3152
bac23f82
HPN
3153 /* We could handle this if we can get a handle on the
3154 output bfd in elf_cris_adjust_dynamic_symbol. Failing
3155 that, we must insist on dynobj being a specific mach. */
3156 if (bfd_get_mach (dynobj) == bfd_mach_cris_v10_v32)
3157 {
3158 (*_bfd_error_handler)
3159 (_("%B, section %A:\n v10/v32 compatible object %s"
3160 " must not contain a PIC relocation"),
3161 abfd, sec);
3162 return FALSE;
3163 }
3164
915e5146
HPN
3165 /* Create the .got section, so we can assume it's always
3166 present whenever there's a dynobj. */
3167 if (!_bfd_elf_create_got_section (dynobj, info))
b34976b6 3168 return FALSE;
915e5146 3169 }
100382c7
HPN
3170
3171 if (sgot == NULL)
3172 sgot = bfd_get_section_by_name (dynobj, ".got");
3173
3174 if (local_got_refcounts == NULL)
3175 {
3176 bfd_size_type amt;
3177
3178 /* We use index local_got_refcounts[-1] to count all
3179 GOT-relative relocations that do not have explicit
3180 GOT entries. */
3181 amt = LGOT_ALLOC_NELTS_FOR (symtab_hdr->sh_info) + 1;
3182 amt *= sizeof (bfd_signed_vma);
3183 local_got_refcounts = ((bfd_signed_vma *) bfd_zalloc (abfd, amt));
3184 if (local_got_refcounts == NULL)
3185 return FALSE;
3186
3187 local_got_refcounts++;
3188 elf_local_got_refcounts (abfd) = local_got_refcounts;
3189 }
915e5146
HPN
3190 break;
3191
3192 default:
3193 break;
3194 }
3195
3196 /* Some relocs require a global offset table (but perhaps not a
3197 specific GOT entry). */
4d96d128 3198 switch (r_type)
915e5146 3199 {
100382c7
HPN
3200 case R_CRIS_16_DTPREL:
3201 case R_CRIS_32_DTPREL:
3202 /* Not requesting .got.rela for an executable: the contents
3203 of the first entry is constant there. For a shared
3204 library, we need .got.rela for the R_CRIS_DTPMOD
3205 relocation at index 3. */
3206 if (!info->shared)
3207 break;
3208 /* Fall through. */
3209
75f500d7 3210 case R_CRIS_32_IE:
100382c7
HPN
3211 case R_CRIS_32_GD:
3212 case R_CRIS_16_GOT_GD:
3213 case R_CRIS_32_GOT_GD:
3214 case R_CRIS_32_GOT_TPREL:
3215 case R_CRIS_16_GOT_TPREL:
3216 /* Fall through. */
3217
44aa49bb
HPN
3218 /* For R_CRIS_16_GOTPLT and R_CRIS_32_GOTPLT, we need a GOT
3219 entry only for local symbols. Unfortunately, we don't know
3220 until later on if there's a version script that forces the
3221 symbol local. We must have the .rela.got section in place
3222 before we know if the symbol looks global now, so we need
3223 to treat the reloc just like for R_CRIS_16_GOT and
3224 R_CRIS_32_GOT. */
3225 case R_CRIS_16_GOTPLT:
3226 case R_CRIS_32_GOTPLT:
915e5146
HPN
3227 case R_CRIS_16_GOT:
3228 case R_CRIS_32_GOT:
44aa49bb
HPN
3229 if (srelgot == NULL
3230 && (h != NULL || info->shared))
3231 {
3232 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
3233 if (srelgot == NULL)
3234 {
3496cb2a
L
3235 srelgot = bfd_make_section_with_flags (dynobj,
3236 ".rela.got",
3237 (SEC_ALLOC
3238 | SEC_LOAD
3239 | SEC_HAS_CONTENTS
3240 | SEC_IN_MEMORY
3241 | SEC_LINKER_CREATED
3242 | SEC_READONLY));
44aa49bb 3243 if (srelgot == NULL
44aa49bb 3244 || !bfd_set_section_alignment (dynobj, srelgot, 2))
b34976b6 3245 return FALSE;
44aa49bb
HPN
3246 }
3247 }
100382c7 3248 break;
44aa49bb 3249
100382c7
HPN
3250 default:
3251 break;
3252 }
915e5146 3253
100382c7
HPN
3254 /* Warn and error for invalid input. */
3255 switch (r_type)
3256 {
75f500d7 3257 case R_CRIS_32_IE:
100382c7
HPN
3258 case R_CRIS_32_TPREL:
3259 case R_CRIS_16_TPREL:
3260 case R_CRIS_32_GD:
3261 if (info->shared)
915e5146 3262 {
100382c7
HPN
3263 (*_bfd_error_handler)
3264 (_("%B, section %A:\n relocation %s not valid"
3265 " in a shared object;"
3266 " typically an option mixup, recompile with -fPIC"),
3267 abfd,
3268 sec,
3269 cris_elf_howto_table[r_type].name);
3270 /* Don't return FALSE here; we want messages for all of
3271 these and the error behavior is ungraceful
3272 anyway. */
3273 }
3274 default:
3275 break;
3276 }
915e5146 3277
100382c7
HPN
3278 switch (r_type)
3279 {
3280 case R_CRIS_32_GD:
3281 case R_CRIS_16_GOT_GD:
3282 case R_CRIS_32_GOT_GD:
3283 /* These are requests for tls_index entries, run-time R_CRIS_DTP. */
3284 got_element_size = 8;
3285 r_symndx_lgot = LGOT_DTP_NDX (r_symndx);
3286 break;
915e5146 3287
100382c7
HPN
3288 case R_CRIS_16_DTPREL:
3289 case R_CRIS_32_DTPREL:
3290 /* These two just request for the constant-index
3291 module-local tls_index-sized GOT entry, which we add
3292 elsewhere. */
915e5146
HPN
3293 break;
3294
75f500d7 3295 case R_CRIS_32_IE:
100382c7
HPN
3296 case R_CRIS_32_GOT_TPREL:
3297 case R_CRIS_16_GOT_TPREL:
3298 r_symndx_lgot = LGOT_TPREL_NDX (r_symndx);
3299
75f500d7 3300 /* Those relocs also require that a DSO is of type
100382c7
HPN
3301 Initial Exec. Like other targets, we don't reset this
3302 flag even if the relocs are GC:ed away. */
3303 if (info->shared)
3304 info->flags |= DF_STATIC_TLS;
3305 break;
3306
3307 /* Let's list the other assembler-generated TLS-relocs too,
3308 just to show that they're not forgotten. */
3309 case R_CRIS_16_TPREL:
3310 case R_CRIS_32_TPREL:
915e5146
HPN
3311 default:
3312 break;
3313 }
3314
4d96d128 3315 switch (r_type)
06c15ad7 3316 {
915e5146
HPN
3317 case R_CRIS_16_GOTPLT:
3318 case R_CRIS_32_GOTPLT:
3319 /* Mark that we need a GOT entry if the PLT entry (and its GOT
3320 entry) is eliminated. We can only do this for a non-local
3321 symbol. */
3322 if (h != NULL)
3323 {
100382c7 3324 elf_cris_hash_entry (h)->gotplt_refcount++;
915e5146
HPN
3325 goto handle_gotplt_reloc;
3326 }
3327 /* If h is NULL then this is a local symbol, and we must make a
3328 GOT entry for it, so handle it like a GOT reloc. */
3329 /* Fall through. */
3330
75f500d7 3331 case R_CRIS_32_IE:
100382c7
HPN
3332 case R_CRIS_32_GD:
3333 case R_CRIS_16_GOT_GD:
3334 case R_CRIS_32_GOT_GD:
3335 case R_CRIS_32_GOT_TPREL:
3336 case R_CRIS_16_GOT_TPREL:
915e5146
HPN
3337 case R_CRIS_16_GOT:
3338 case R_CRIS_32_GOT:
3339 /* This symbol requires a global offset table entry. */
915e5146
HPN
3340 if (h != NULL)
3341 {
51b64d56 3342 if (h->got.refcount == 0)
915e5146 3343 {
915e5146
HPN
3344 /* Make sure this symbol is output as a dynamic symbol. */
3345 if (h->dynindx == -1)
3346 {
c152c796 3347 if (!bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 3348 return FALSE;
915e5146 3349 }
915e5146 3350 }
100382c7
HPN
3351
3352 /* Update the sum of reloc counts for this symbol. */
51b64d56 3353 h->got.refcount++;
100382c7
HPN
3354
3355 switch (r_type)
3356 {
3357 case R_CRIS_16_GOT:
3358 case R_CRIS_32_GOT:
3359 if (elf_cris_hash_entry (h)->reg_got_refcount == 0)
3360 {
3361 /* Allocate space in the .got section. */
3362 sgot->size += got_element_size;
3363 /* Allocate relocation space. */
3364 srelgot->size += sizeof (Elf32_External_Rela);
3365 }
3366 elf_cris_hash_entry (h)->reg_got_refcount++;
3367 break;
3368
3369 case R_CRIS_32_GD:
3370 case R_CRIS_16_GOT_GD:
3371 case R_CRIS_32_GOT_GD:
3372 if (elf_cris_hash_entry (h)->dtp_refcount == 0)
3373 {
3374 /* Allocate space in the .got section. */
3375 sgot->size += got_element_size;
3376 /* Allocate relocation space. */
3377 srelgot->size += sizeof (Elf32_External_Rela);
3378 }
3379 elf_cris_hash_entry (h)->dtp_refcount++;
3380 break;
3381
75f500d7 3382 case R_CRIS_32_IE:
100382c7
HPN
3383 case R_CRIS_32_GOT_TPREL:
3384 case R_CRIS_16_GOT_TPREL:
3385 if (elf_cris_hash_entry (h)->tprel_refcount == 0)
3386 {
3387 /* Allocate space in the .got section. */
3388 sgot->size += got_element_size;
3389 /* Allocate relocation space. */
3390 srelgot->size += sizeof (Elf32_External_Rela);
3391 }
3392 elf_cris_hash_entry (h)->tprel_refcount++;
3393 break;
3394
3395 default:
3396 BFD_FAIL ();
3397 break;
3398 }
915e5146
HPN
3399 }
3400 else
3401 {
3402 /* This is a global offset table entry for a local symbol. */
100382c7 3403 if (local_got_refcounts[r_symndx_lgot] == 0)
915e5146 3404 {
100382c7 3405 sgot->size += got_element_size;
915e5146
HPN
3406 if (info->shared)
3407 {
100382c7
HPN
3408 /* If we are generating a shared object, we need
3409 to output a R_CRIS_RELATIVE reloc so that the
3410 dynamic linker can adjust this GOT entry.
3411 Similarly for non-regular got entries. */
eea6121a 3412 srelgot->size += sizeof (Elf32_External_Rela);
915e5146
HPN
3413 }
3414 }
100382c7
HPN
3415 /* Update the reloc-specific count. */
3416 local_got_refcounts[r_symndx_lgot]++;
3417
3418 /* This one is the sum of all the others. */
51b64d56 3419 local_got_refcounts[r_symndx]++;
915e5146
HPN
3420 }
3421 break;
3422
100382c7
HPN
3423 case R_CRIS_16_DTPREL:
3424 case R_CRIS_32_DTPREL:
915e5146
HPN
3425 case R_CRIS_32_GOTREL:
3426 /* This reference requires a global offset table.
3427 FIXME: The actual refcount isn't used currently; the .got
3428 section can't be removed if there were any references in the
3429 input. */
3430 local_got_refcounts[-1]++;
3431 break;
3432
3433 handle_gotplt_reloc:
3434
3435 case R_CRIS_32_PLT_GOTREL:
3436 /* This reference requires a global offset table. */
3437 local_got_refcounts[-1]++;
3438 /* Fall through. */
3439
3440 case R_CRIS_32_PLT_PCREL:
3441 /* This symbol requires a procedure linkage table entry. We
3442 actually build the entry in adjust_dynamic_symbol,
3443 because this might be a case of linking PIC code which is
3444 never referenced by a dynamic object, in which case we
3445 don't need to generate a procedure linkage table entry
3446 after all. */
3447
ada1953e
HPN
3448 /* Beware: if we'd check for visibility of the symbol here
3449 (and not marking the need for a PLT when non-visible), we'd
3450 get into trouble with keeping handling consistent with
3451 regards to relocs found before definition and GOTPLT
3452 handling. Eliminable PLT entries will be dealt with later
3453 anyway. */
3454 if (h == NULL)
915e5146
HPN
3455 continue;
3456
f5385ebf 3457 h->needs_plt = 1;
51b64d56 3458 h->plt.refcount++;
915e5146
HPN
3459 break;
3460
3461 case R_CRIS_8:
3462 case R_CRIS_16:
3463 case R_CRIS_32:
3464 /* Let's help debug shared library creation. Any of these
0d08de41
HPN
3465 relocs *can* be used in shared libs, but pages containing
3466 them cannot be shared, so they're not appropriate for
3467 common use. Don't warn for sections we don't care about,
3468 such as debug sections or non-constant sections. We
3469 can't help tables of (global) function pointers, for
3470 example, though they must be emitted in a (writable) data
3471 section to avoid having impure text sections. */
915e5146
HPN
3472 if (info->shared
3473 && (sec->flags & SEC_ALLOC) != 0
3474 && (sec->flags & SEC_READONLY) != 0)
3475 {
3476 /* FIXME: How do we make this optionally a warning only? */
8f615d07 3477 (*_bfd_error_handler)
bac23f82
HPN
3478 (_("%B, section %A:\n relocation %s should not"
3479 " be used in a shared object; recompile with -fPIC"),
d003868e
AM
3480 abfd,
3481 sec,
8f615d07 3482 cris_elf_howto_table[r_type].name);
915e5146 3483 }
0d08de41
HPN
3484 if (h != NULL)
3485 {
3486 h->non_got_ref = 1;
100382c7 3487
0d08de41
HPN
3488 /* Make sure a plt entry is created for this symbol if it
3489 turns out to be a function defined by a dynamic object. */
3490 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
3491 h->plt.refcount++;
3492 }
3493
3494 /* If we are creating a shared library and this is not a local
3495 symbol, we need to copy the reloc into the shared library.
3496 However when linking with -Bsymbolic and this is a global
3497 symbol which is defined in an object we are including in the
3498 link (i.e., DEF_REGULAR is set), then we can resolve the
3499 reloc directly. At this point we have not seen all the input
3500 files, so it is possible that DEF_REGULAR is not set now but
3501 will be set later (it is never cleared). In case of a weak
3502 definition, DEF_REGULAR may be cleared later by a strong
3503 definition in a shared library. We account for that
3504 possibility below by storing information in the relocs_copied
3505 field of the hash table entry. A similar situation occurs
3506 when creating shared libraries and symbol visibility changes
3507 render the symbol local. */
3508
3509 /* No need to do anything if we're not creating a shared object. */
3510 if (! info->shared)
3511 break;
3512
3513 /* We don't need to handle relocs into sections not going into
3514 the "real" output. */
3515 if ((sec->flags & SEC_ALLOC) == 0)
3516 break;
3517
3518 /* We may need to create a reloc section in the dynobj and made room
3519 for this reloc. */
3520 if (sreloc == NULL)
3521 {
3522 sreloc = _bfd_elf_make_dynamic_reloc_section
3523 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
3524
3525 if (sreloc == NULL)
3526 return FALSE;
3527 }
3528
3529 if (sec->flags & SEC_READONLY)
3530 info->flags |= DF_TEXTREL;
3531
3532 sreloc->size += sizeof (Elf32_External_Rela);
3533 break;
915e5146
HPN
3534
3535 case R_CRIS_8_PCREL:
3536 case R_CRIS_16_PCREL:
3537 case R_CRIS_32_PCREL:
3538 if (h != NULL)
3539 {
f5385ebf 3540 h->non_got_ref = 1;
915e5146
HPN
3541
3542 /* Make sure a plt entry is created for this symbol if it
3543 turns out to be a function defined by a dynamic object. */
0a4787a0
HPN
3544 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
3545 h->plt.refcount++;
915e5146
HPN
3546 }
3547
3548 /* If we are creating a shared library and this is not a local
3549 symbol, we need to copy the reloc into the shared library.
3550 However when linking with -Bsymbolic and this is a global
3551 symbol which is defined in an object we are including in the
3552 link (i.e., DEF_REGULAR is set), then we can resolve the
3553 reloc directly. At this point we have not seen all the input
3554 files, so it is possible that DEF_REGULAR is not set now but
3555 will be set later (it is never cleared). In case of a weak
3556 definition, DEF_REGULAR may be cleared later by a strong
3557 definition in a shared library. We account for that
3558 possibility below by storing information in the relocs_copied
3559 field of the hash table entry. A similar situation occurs
3560 when creating shared libraries and symbol visibility changes
3561 render the symbol local. */
3562
3563 /* No need to do anything if we're not creating a shared object. */
3564 if (! info->shared)
3565 break;
3566
3567 /* We don't need to handle relocs into sections not going into
3568 the "real" output. */
3569 if ((sec->flags & SEC_ALLOC) == 0)
3570 break;
3571
0d08de41
HPN
3572 /* If the symbol is local, then we know already we can
3573 eliminate the reloc. */
3574 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
3575 break;
bac23f82 3576
0d08de41
HPN
3577 /* If this is with -Bsymbolic and the symbol isn't weak, and
3578 is defined by an ordinary object (the ones we include in
3579 this shared library) then we can also eliminate the
3580 reloc. See comment above for more eliminable cases which
3581 we can't identify at this time. */
3582 if (info->symbolic
3583 && h->root.type != bfd_link_hash_defweak
3584 && h->def_regular)
3585 break;
915e5146 3586
83bac4b0
NC
3587 /* We may need to create a reloc section in the dynobj and made room
3588 for this reloc. */
915e5146
HPN
3589 if (sreloc == NULL)
3590 {
83bac4b0
NC
3591 sreloc = _bfd_elf_make_dynamic_reloc_section
3592 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
915e5146 3593
83bac4b0 3594 if (sreloc == NULL)
b34976b6 3595 return FALSE;
915e5146
HPN
3596 }
3597
eea6121a 3598 sreloc->size += sizeof (Elf32_External_Rela);
915e5146 3599
0d08de41
HPN
3600 /* We count the number of PC relative relocations we have
3601 entered for this symbol, so that we can discard them
3602 again if the symbol is later defined by a regular object.
3603 We know that h is really a pointer to an
915e5146 3604 elf_cris_link_hash_entry. */
0d08de41
HPN
3605 {
3606 struct elf_cris_link_hash_entry *eh;
3607 struct elf_cris_pcrel_relocs_copied *p;
915e5146 3608
0d08de41 3609 eh = elf_cris_hash_entry (h);
915e5146 3610
0d08de41
HPN
3611 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
3612 if (p->section == sreloc)
3613 break;
915e5146 3614
0d08de41
HPN
3615 if (p == NULL)
3616 {
3617 p = ((struct elf_cris_pcrel_relocs_copied *)
3618 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
3619 if (p == NULL)
3620 return FALSE;
3621 p->next = eh->pcrel_relocs_copied;
3622 eh->pcrel_relocs_copied = p;
3623 p->section = sreloc;
3624 p->count = 0;
3625 p->r_type = r_type;
3626 }
915e5146 3627
0d08de41
HPN
3628 ++p->count;
3629 }
915e5146
HPN
3630 break;
3631
06c15ad7
HPN
3632 /* This relocation describes the C++ object vtable hierarchy.
3633 Reconstruct it for later use during GC. */
3634 case R_CRIS_GNU_VTINHERIT:
c152c796 3635 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 3636 return FALSE;
06c15ad7 3637 break;
a7c10850 3638
06c15ad7
HPN
3639 /* This relocation describes which C++ vtable entries are actually
3640 used. Record for later use during GC. */
3641 case R_CRIS_GNU_VTENTRY:
d17e0c6e
JB
3642 BFD_ASSERT (h != NULL);
3643 if (h != NULL
3644 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 3645 return FALSE;
06c15ad7 3646 break;
4d96d128 3647
100382c7
HPN
3648 case R_CRIS_16_TPREL:
3649 case R_CRIS_32_TPREL:
3650 /* Already warned above, when necessary. */
3651 break;
3652
4d96d128
HPN
3653 default:
3654 /* Other relocs do not appear here. */
3655 bfd_set_error (bfd_error_bad_value);
b34976b6 3656 return FALSE;
06c15ad7
HPN
3657 }
3658 }
a7c10850 3659
b34976b6 3660 return TRUE;
06c15ad7 3661}
4da81684 3662
915e5146
HPN
3663/* Set the sizes of the dynamic sections. */
3664
b34976b6 3665static bfd_boolean
915e5146 3666elf_cris_size_dynamic_sections (output_bfd, info)
99e4ae17 3667 bfd *output_bfd ATTRIBUTE_UNUSED;
915e5146
HPN
3668 struct bfd_link_info *info;
3669{
3670 bfd *dynobj;
3671 asection *s;
b34976b6
AM
3672 bfd_boolean plt;
3673 bfd_boolean relocs;
915e5146
HPN
3674
3675 dynobj = elf_hash_table (info)->dynobj;
3676 BFD_ASSERT (dynobj != NULL);
3677
3678 if (elf_hash_table (info)->dynamic_sections_created)
3679 {
3680 /* Set the contents of the .interp section to the interpreter. */
893c4fe2 3681 if (info->executable)
915e5146
HPN
3682 {
3683 s = bfd_get_section_by_name (dynobj, ".interp");
3684 BFD_ASSERT (s != NULL);
eea6121a 3685 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
915e5146
HPN
3686 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
3687 }
3688 }
3689 else
3690 {
3691 /* Adjust all expected GOTPLT uses to use a GOT entry instead. */
3692 elf_cris_link_hash_traverse (elf_cris_hash_table (info),
3693 elf_cris_adjust_gotplt_to_got,
3694 (PTR) info);
3695
3696 /* We may have created entries in the .rela.got section.
3697 However, if we are not creating the dynamic sections, we will
3698 not actually use these entries. Reset the size of .rela.got,
3699 which will cause it to get stripped from the output file
3700 below. */
3701 s = bfd_get_section_by_name (dynobj, ".rela.got");
3702 if (s != NULL)
eea6121a 3703 s->size = 0;
915e5146
HPN
3704 }
3705
3706 /* If this is a -Bsymbolic shared link, then we need to discard all PC
3707 relative relocs against symbols defined in a regular object. We
3708 allocated space for them in the check_relocs routine, but we will not
3709 fill them in in the relocate_section routine. We also discard space
3710 for relocs that have become for local symbols due to symbol
4d96d128
HPN
3711 visibility changes. For programs, we discard space for relocs for
3712 symbols not referenced by any dynamic object. */
915e5146
HPN
3713 if (info->shared)
3714 elf_cris_link_hash_traverse (elf_cris_hash_table (info),
4d96d128
HPN
3715 elf_cris_discard_excess_dso_dynamics,
3716 (PTR) info);
3717 else
3718 elf_cris_link_hash_traverse (elf_cris_hash_table (info),
3719 elf_cris_discard_excess_program_dynamics,
915e5146
HPN
3720 (PTR) info);
3721
3722 /* The check_relocs and adjust_dynamic_symbol entry points have
3723 determined the sizes of the various dynamic sections. Allocate
3724 memory for them. */
b34976b6
AM
3725 plt = FALSE;
3726 relocs = FALSE;
915e5146
HPN
3727 for (s = dynobj->sections; s != NULL; s = s->next)
3728 {
3729 const char *name;
915e5146
HPN
3730
3731 if ((s->flags & SEC_LINKER_CREATED) == 0)
3732 continue;
3733
3734 /* It's OK to base decisions on the section name, because none
3735 of the dynobj section names depend upon the input files. */
3736 name = bfd_get_section_name (dynobj, s);
3737
915e5146
HPN
3738 if (strcmp (name, ".plt") == 0)
3739 {
c456f082
AM
3740 /* Remember whether there is a PLT. */
3741 plt = s->size != 0;
915e5146 3742 }
100382c7
HPN
3743 else if (strcmp (name, ".got.plt") == 0)
3744 {
3745 /* The .got.plt contains the .got header as well as the
3746 actual .got.plt contents. The .got header may contain a
3747 R_CRIS_DTPMOD entry at index 3. */
3748 s->size += elf_cris_hash_table (info)->dtpmod_refcount != 0
3749 ? 8 : 0;
3750 }
0112cd26 3751 else if (CONST_STRNEQ (name, ".rela"))
915e5146 3752 {
100382c7
HPN
3753 if (strcmp (name, ".rela.got") == 0
3754 && elf_cris_hash_table (info)->dtpmod_refcount != 0
3755 && info->shared)
3756 s->size += sizeof (Elf32_External_Rela);
3757
c456f082 3758 if (s->size != 0)
915e5146 3759 {
915e5146
HPN
3760 /* Remember whether there are any reloc sections other
3761 than .rela.plt. */
3762 if (strcmp (name, ".rela.plt") != 0)
b34976b6 3763 relocs = TRUE;
915e5146 3764
915e5146
HPN
3765 /* We use the reloc_count field as a counter if we need
3766 to copy relocs into the output file. */
3767 s->reloc_count = 0;
3768 }
3769 }
0112cd26 3770 else if (! CONST_STRNEQ (name, ".got")
c456f082 3771 && strcmp (name, ".dynbss") != 0)
915e5146
HPN
3772 {
3773 /* It's not one of our sections, so don't allocate space. */
3774 continue;
3775 }
3776
c456f082 3777 if (s->size == 0)
915e5146 3778 {
c456f082
AM
3779 /* If we don't need this section, strip it from the
3780 output file. This is mostly to handle .rela.bss and
3781 .rela.plt. We must create both sections in
3782 create_dynamic_sections, because they must be created
3783 before the linker maps input sections to output
3784 sections. The linker does that before
3785 adjust_dynamic_symbol is called, and it is that
3786 function which decides whether anything needs to go
3787 into these sections. */
8423293d 3788 s->flags |= SEC_EXCLUDE;
915e5146
HPN
3789 continue;
3790 }
3791
c456f082
AM
3792 if ((s->flags & SEC_HAS_CONTENTS) == 0)
3793 continue;
3794
915e5146
HPN
3795 /* Allocate memory for the section contents. We use bfd_zalloc here
3796 in case unused entries are not reclaimed before the section's
3797 contents are written out. This should not happen, but this way
3798 if it does, we will not write out garbage. For reloc sections,
3799 this will make entries have the type R_CRIS_NONE. */
eea6121a 3800 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 3801 if (s->contents == NULL)
b34976b6 3802 return FALSE;
915e5146
HPN
3803 }
3804
3805 if (elf_hash_table (info)->dynamic_sections_created)
3806 {
3807 /* Add some entries to the .dynamic section. We fill in the
3808 values later, in elf_cris_finish_dynamic_sections, but we
3809 must add the entries now so that we get the correct size for
3810 the .dynamic section. The DT_DEBUG entry is filled in by the
3811 dynamic linker and used by the debugger. */
dc810e39 3812#define add_dynamic_entry(TAG, VAL) \
5a580b3a 3813 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 3814
915e5146
HPN
3815 if (!info->shared)
3816 {
dc810e39 3817 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 3818 return FALSE;
915e5146
HPN
3819 }
3820
3821 if (plt)
3822 {
dc810e39
AM
3823 if (!add_dynamic_entry (DT_PLTGOT, 0)
3824 || !add_dynamic_entry (DT_PLTRELSZ, 0)
3825 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
3826 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 3827 return FALSE;
915e5146
HPN
3828 }
3829
3830 if (relocs)
3831 {
dc810e39
AM
3832 if (!add_dynamic_entry (DT_RELA, 0)
3833 || !add_dynamic_entry (DT_RELASZ, 0)
3834 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 3835 return FALSE;
915e5146
HPN
3836 }
3837
99e4ae17 3838 if ((info->flags & DF_TEXTREL) != 0)
915e5146 3839 {
dc810e39 3840 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 3841 return FALSE;
915e5146
HPN
3842 info->flags |= DF_TEXTREL;
3843 }
3844 }
dc810e39 3845#undef add_dynamic_entry
915e5146 3846
b34976b6 3847 return TRUE;
915e5146
HPN
3848}
3849
3850/* This function is called via elf_cris_link_hash_traverse if we are
3851 creating a shared object. In the -Bsymbolic case, it discards the
3852 space allocated to copy PC relative relocs against symbols which
3853 are defined in regular objects. For the normal non-symbolic case,
3854 we also discard space for relocs that have become local due to
3855 symbol visibility changes. We allocated space for them in the
3856 check_relocs routine, but we won't fill them in in the
3857 relocate_section routine. */
3858
b34976b6 3859static bfd_boolean
4d96d128 3860elf_cris_discard_excess_dso_dynamics (h, inf)
915e5146
HPN
3861 struct elf_cris_link_hash_entry *h;
3862 PTR inf;
3863{
3864 struct elf_cris_pcrel_relocs_copied *s;
3865 struct bfd_link_info *info = (struct bfd_link_info *) inf;
3866
e92d460e
AM
3867 if (h->root.root.type == bfd_link_hash_warning)
3868 h = (struct elf_cris_link_hash_entry *) h->root.root.u.i.link;
3869
915e5146
HPN
3870 /* If a symbol has been forced local or we have found a regular
3871 definition for the symbolic link case, then we won't be needing
3872 any relocs. */
f5385ebf
AM
3873 if (h->root.def_regular
3874 && (h->root.forced_local
915e5146
HPN
3875 || info->symbolic))
3876 {
3877 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
eea6121a 3878 s->section->size -= s->count * sizeof (Elf32_External_Rela);
0d08de41
HPN
3879
3880 return TRUE;
3881 }
3882
3883 /* If we have accounted for PC-relative relocs for read-only
3884 sections, now is the time to warn for them. We can't do it in
3885 cris_elf_check_relocs, because we don't know the status of all
3886 symbols at that time (and it's common to force symbols local
3887 late). */
3888
3889 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
3890 {
3891 BFD_ASSERT ((s->section->flags & SEC_READONLY) != 0);
3892
3893 /* FIXME: How do we make this optionally a warning only? */
3894 (*_bfd_error_handler)
3895 (_("%B, section `%A', to symbol `%s':\n"
3896 " relocation %s should not be used"
3897 " in a shared object; recompile with -fPIC"),
3898 s->section->owner,
3899 s->section,
3900 h->root.root.root.string,
3901 cris_elf_howto_table[s->r_type].name);
3902
3903 info->flags |= DF_TEXTREL;
4d96d128
HPN
3904 }
3905
b34976b6 3906 return TRUE;
4d96d128
HPN
3907}
3908
3909/* This function is called via elf_cris_link_hash_traverse if we are *not*
3910 creating a shared object. We discard space for relocs for symbols put
3911 in the .got, but which we found we do not have to resolve at run-time. */
3912
b34976b6 3913static bfd_boolean
4d96d128
HPN
3914elf_cris_discard_excess_program_dynamics (h, inf)
3915 struct elf_cris_link_hash_entry *h;
3916 PTR inf;
3917{
3918 struct bfd_link_info *info = (struct bfd_link_info *) inf;
3919
e92d460e
AM
3920 if (h->root.root.type == bfd_link_hash_warning)
3921 h = (struct elf_cris_link_hash_entry *) h->root.root.u.i.link;
3922
4d96d128
HPN
3923 /* If we're not creating a shared library and have a symbol which is
3924 referred to by .got references, but the symbol is defined locally,
e4a2175c
HPN
3925 (or rather, not defined by a DSO) then lose the reloc for the .got
3926 (don't allocate room for it). Likewise for relocs for something
3927 for which we create a PLT. */
f5385ebf 3928 if (!h->root.def_dynamic
e4a2175c 3929 || h->root.plt.refcount > 0)
4d96d128 3930 {
100382c7 3931 if (h->reg_got_refcount > 0
4d96d128
HPN
3932 /* The size of this section is only valid and in sync with the
3933 various reference counts if we do dynamic; don't decrement it
3934 otherwise. */
3935 && elf_hash_table (info)->dynamic_sections_created)
3936 {
3937 bfd *dynobj = elf_hash_table (info)->dynobj;
3938 asection *srelgot;
3939
3940 BFD_ASSERT (dynobj != NULL);
99c79b2e 3941
4d96d128
HPN
3942 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
3943
3944 BFD_ASSERT (srelgot != NULL);
3945
eea6121a 3946 srelgot->size -= sizeof (Elf32_External_Rela);
4d96d128
HPN
3947 }
3948
3949 /* If the locally-defined symbol isn't used by a DSO, then we don't
3950 have to export it as a dynamic symbol. This was already done for
3951 functions; doing this for all symbols would presumably not
e5dfef09
HPN
3952 introduce new problems. Of course we don't do this if we're
3953 exporting all dynamic symbols. */
0741c7be 3954 if (! info->export_dynamic
77cfaee6 3955 && h->root.dynindx != -1
f5385ebf
AM
3956 && !h->root.def_dynamic
3957 && !h->root.ref_dynamic)
e5dfef09
HPN
3958 {
3959 h->root.dynindx = -1;
3960 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3961 h->root.dynstr_index);
3962 }
915e5146
HPN
3963 }
3964
b34976b6 3965 return TRUE;
915e5146
HPN
3966}
3967
3968/* Reject a file depending on presence and expectation of prefixed
3969 underscores on symbols. */
4da81684 3970
b34976b6 3971static bfd_boolean
4da81684
HPN
3972cris_elf_object_p (abfd)
3973 bfd *abfd;
3974{
bac23f82
HPN
3975 if (! cris_elf_set_mach_from_flags (abfd, elf_elfheader (abfd)->e_flags))
3976 return FALSE;
3977
4da81684
HPN
3978 if ((elf_elfheader (abfd)->e_flags & EF_CRIS_UNDERSCORE))
3979 return (bfd_get_symbol_leading_char (abfd) == '_');
3980 else
3981 return (bfd_get_symbol_leading_char (abfd) == 0);
3982}
3983
bac23f82
HPN
3984/* Mark presence or absence of leading underscore. Set machine type
3985 flags from mach type. */
4da81684
HPN
3986
3987static void
3988cris_elf_final_write_processing (abfd, linker)
3989 bfd *abfd;
b34976b6 3990 bfd_boolean linker ATTRIBUTE_UNUSED;
4da81684 3991{
bac23f82
HPN
3992 unsigned long e_flags = elf_elfheader (abfd)->e_flags;
3993
3994 e_flags &= ~EF_CRIS_UNDERSCORE;
4da81684 3995 if (bfd_get_symbol_leading_char (abfd) == '_')
bac23f82
HPN
3996 e_flags |= EF_CRIS_UNDERSCORE;
3997
3998 switch (bfd_get_mach (abfd))
3999 {
4000 case bfd_mach_cris_v0_v10:
4001 e_flags |= EF_CRIS_VARIANT_ANY_V0_V10;
4002 break;
4003
4004 case bfd_mach_cris_v10_v32:
4005 e_flags |= EF_CRIS_VARIANT_COMMON_V10_V32;
4006 break;
4007
4008 case bfd_mach_cris_v32:
4009 e_flags |= EF_CRIS_VARIANT_V32;
4010 break;
4011
4012 default:
4013 _bfd_abort (__FILE__, __LINE__,
4014 _("Unexpected machine number"));
4015 }
4016
4017 elf_elfheader (abfd)->e_flags = e_flags;
4018}
4019
4020/* Set the mach type from e_flags value. */
4021
4022static bfd_boolean
4023cris_elf_set_mach_from_flags (abfd, flags)
4024 bfd *abfd;
4025 unsigned long flags;
4026{
4027 switch (flags & EF_CRIS_VARIANT_MASK)
4028 {
4029 case EF_CRIS_VARIANT_ANY_V0_V10:
4030 bfd_default_set_arch_mach (abfd, bfd_arch_cris, bfd_mach_cris_v0_v10);
4031 break;
4032
4033 case EF_CRIS_VARIANT_V32:
4034 bfd_default_set_arch_mach (abfd, bfd_arch_cris, bfd_mach_cris_v32);
4035 break;
4036
4037 case EF_CRIS_VARIANT_COMMON_V10_V32:
4038 bfd_default_set_arch_mach (abfd, bfd_arch_cris, bfd_mach_cris_v10_v32);
4039 break;
4040
4041 default:
4042 /* Since we don't recognize them, we obviously can't support them
4043 with this code; we'd have to require that all future handling
4044 would be optional. */
4045 bfd_set_error (bfd_error_wrong_format);
4046 return FALSE;
4047 }
4048
4049 return TRUE;
4da81684
HPN
4050}
4051
4052/* Display the flags field. */
4053
b34976b6 4054static bfd_boolean
4da81684
HPN
4055cris_elf_print_private_bfd_data (abfd, ptr)
4056 bfd *abfd;
4057 PTR ptr;
4058{
4059 FILE *file = (FILE *) ptr;
4060
f12123c0 4061 BFD_ASSERT (abfd != NULL && ptr != NULL);
4da81684
HPN
4062
4063 _bfd_elf_print_private_bfd_data (abfd, ptr);
4064
4065 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
4066
4067 if (elf_elfheader (abfd)->e_flags & EF_CRIS_UNDERSCORE)
4068 fprintf (file, _(" [symbols have a _ prefix]"));
bac23f82
HPN
4069 if ((elf_elfheader (abfd)->e_flags & EF_CRIS_VARIANT_MASK)
4070 == EF_CRIS_VARIANT_COMMON_V10_V32)
4071 fprintf (file, _(" [v10 and v32]"));
4072 if ((elf_elfheader (abfd)->e_flags & EF_CRIS_VARIANT_MASK)
4073 == EF_CRIS_VARIANT_V32)
4074 fprintf (file, _(" [v32]"));
4da81684
HPN
4075
4076 fputc ('\n', file);
b34976b6 4077 return TRUE;
4da81684
HPN
4078}
4079
4080/* Don't mix files with and without a leading underscore. */
4081
b34976b6 4082static bfd_boolean
4da81684
HPN
4083cris_elf_merge_private_bfd_data (ibfd, obfd)
4084 bfd *ibfd;
4085 bfd *obfd;
4086{
bac23f82 4087 int imach, omach;
4da81684 4088
82e51918 4089 if (! _bfd_generic_verify_endian_match (ibfd, obfd))
b34976b6 4090 return FALSE;
4da81684
HPN
4091
4092 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
4093 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 4094 return TRUE;
4da81684 4095
bac23f82
HPN
4096 imach = bfd_get_mach (ibfd);
4097
4da81684
HPN
4098 if (! elf_flags_init (obfd))
4099 {
4100 /* This happens when ld starts out with a 'blank' output file. */
b34976b6 4101 elf_flags_init (obfd) = TRUE;
4da81684 4102
bac23f82
HPN
4103 /* We ignore the linker-set mach, and instead set it according to
4104 the first input file. This would also happen if we could
4105 somehow filter out the OUTPUT_ARCH () setting from elf.sc.
4106 This allows us to keep the same linker config across
4107 cris(v0..v10) and crisv32. The drawback is that we can't force
4108 the output type, which might be a sane thing to do for a
4109 v10+v32 compatibility object. */
4110 if (! bfd_set_arch_mach (obfd, bfd_arch_cris, imach))
4111 return FALSE;
4da81684
HPN
4112 }
4113
bac23f82
HPN
4114 if (bfd_get_symbol_leading_char (ibfd)
4115 != bfd_get_symbol_leading_char (obfd))
4da81684
HPN
4116 {
4117 (*_bfd_error_handler)
bac23f82 4118 (bfd_get_symbol_leading_char (ibfd) == '_'
d003868e
AM
4119 ? _("%B: uses _-prefixed symbols, but writing file with non-prefixed symbols")
4120 : _("%B: uses non-prefixed symbols, but writing file with _-prefixed symbols"),
4121 ibfd);
4da81684 4122 bfd_set_error (bfd_error_bad_value);
b34976b6 4123 return FALSE;
4da81684
HPN
4124 }
4125
bac23f82
HPN
4126 omach = bfd_get_mach (obfd);
4127
4128 if (imach != omach)
4129 {
4130 /* We can get an incompatible combination only if either is
4131 bfd_mach_cris_v32, and the other one isn't compatible. */
4132 if ((imach == bfd_mach_cris_v32
4133 && omach != bfd_mach_cris_v10_v32)
4134 || (omach == bfd_mach_cris_v32
4135 && imach != bfd_mach_cris_v10_v32))
4136 {
4137 (*_bfd_error_handler)
4138 ((imach == bfd_mach_cris_v32)
4139 ? _("%B contains CRIS v32 code, incompatible"
4140 " with previous objects")
4141 : _("%B contains non-CRIS-v32 code, incompatible"
4142 " with previous objects"),
4143 ibfd);
4144 bfd_set_error (bfd_error_bad_value);
4145 return FALSE;
4146 }
4147
4148 /* We don't have to check the case where the input is compatible
4149 with v10 and v32, because the output is already known to be set
4150 to the other (compatible) mach. */
4151 if (omach == bfd_mach_cris_v10_v32
4152 && ! bfd_set_arch_mach (obfd, bfd_arch_cris, imach))
4153 return FALSE;
4154 }
4155
b34976b6 4156 return TRUE;
4da81684 4157}
99e4ae17 4158
bac23f82
HPN
4159/* Do side-effects of e_flags copying to obfd. */
4160
4161static bfd_boolean
4162cris_elf_copy_private_bfd_data (ibfd, obfd)
4163 bfd *ibfd;
4164 bfd *obfd;
4165{
4166 /* Call the base function. */
4167 if (!_bfd_elf_copy_private_bfd_data (ibfd, obfd))
4168 return FALSE;
4169
4170 /* If output is big-endian for some obscure reason, stop here. */
4171 if (_bfd_generic_verify_endian_match (ibfd, obfd) == FALSE)
4172 return FALSE;
4173
4174 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
4175 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
4176 return TRUE;
4177
4178 /* Do what we really came here for. */
4179 return bfd_set_arch_mach (obfd, bfd_arch_cris, bfd_get_mach (ibfd));
4180}
99e4ae17
AJ
4181
4182static enum elf_reloc_type_class
f51e552e
AM
4183elf_cris_reloc_type_class (rela)
4184 const Elf_Internal_Rela *rela;
99e4ae17 4185{
100382c7
HPN
4186 enum elf_cris_reloc_type r_type = ELF32_R_TYPE (rela->r_info);
4187 switch (r_type)
99e4ae17
AJ
4188 {
4189 case R_CRIS_RELATIVE:
4190 return reloc_class_relative;
4191 case R_CRIS_JUMP_SLOT:
4192 return reloc_class_plt;
4193 case R_CRIS_COPY:
4194 return reloc_class_copy;
4195 default:
4196 return reloc_class_normal;
4197 }
4198}
100382c7
HPN
4199
4200/* The elf_backend_got_elt_size worker. For one symbol, we can have up to
4201 two GOT entries from three types with two different sizes. We handle
4202 it as a single entry, so we can use the regular offset-calculation
4203 machinery. */
4204
4205static bfd_vma
4206elf_cris_got_elt_size (bfd *abfd ATTRIBUTE_UNUSED,
4207 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4208 struct elf_link_hash_entry *hr,
4209 bfd *ibfd,
4210 unsigned long symndx)
4211{
4212 struct elf_link_hash_entry *h = (struct elf_link_hash_entry *) hr;
100382c7
HPN
4213 bfd_vma eltsiz = 0;
4214
4215 /* We may have one regular GOT entry or up to two TLS GOT
4216 entries. */
4217 if (h == NULL)
4218 {
b2e254f9 4219 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
100382c7
HPN
4220 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (ibfd);
4221
4222 BFD_ASSERT (local_got_refcounts != NULL);
4223
4224 if (local_got_refcounts[LGOT_REG_NDX (symndx)] > 0)
4225 {
4226 /* We can't have a variable referred to both as a regular
4227 variable and through TLS relocs. */
4228 BFD_ASSERT (local_got_refcounts[LGOT_DTP_NDX (symndx)] == 0
4229 && local_got_refcounts[LGOT_TPREL_NDX (symndx)] == 0);
4230 return 4;
4231 }
4232
4233 if (local_got_refcounts[LGOT_DTP_NDX (symndx)] > 0)
4234 eltsiz += 8;
4235
4236 if (local_got_refcounts[LGOT_TPREL_NDX (symndx)] > 0)
4237 eltsiz += 4;
4238 }
4239 else
4240 {
4241 struct elf_cris_link_hash_entry *hh = elf_cris_hash_entry (h);
4242 if (hh->reg_got_refcount > 0)
4243 {
4244 /* The actual error-on-input is emitted elsewhere. */
4245 BFD_ASSERT (hh->dtp_refcount == 0 && hh->tprel_refcount == 0);
4246 return 4;
4247 }
4248
4249 if (hh->dtp_refcount > 0)
4250 eltsiz += 8;
4251
4252 if (hh->tprel_refcount > 0)
4253 eltsiz += 4;
4254 }
4255
b2e254f9
HPN
4256 /* We're only called when h->got.refcount is non-zero, so we must
4257 have a non-zero size. */
4258 BFD_ASSERT (eltsiz != 0);
100382c7
HPN
4259 return eltsiz;
4260}
06c15ad7
HPN
4261\f
4262#define ELF_ARCH bfd_arch_cris
4263#define ELF_MACHINE_CODE EM_CRIS
4264#define ELF_MAXPAGESIZE 0x2000
4265
4266#define TARGET_LITTLE_SYM bfd_elf32_cris_vec
4267#define TARGET_LITTLE_NAME "elf32-cris"
4da81684 4268#define elf_symbol_leading_char 0
06c15ad7
HPN
4269
4270#define elf_info_to_howto_rel NULL
4271#define elf_info_to_howto cris_info_to_howto_rela
4272#define elf_backend_relocate_section cris_elf_relocate_section
4273#define elf_backend_gc_mark_hook cris_elf_gc_mark_hook
4274#define elf_backend_gc_sweep_hook cris_elf_gc_sweep_hook
4275#define elf_backend_check_relocs cris_elf_check_relocs
72209a1f
HPN
4276#define elf_backend_grok_prstatus cris_elf_grok_prstatus
4277#define elf_backend_grok_psinfo cris_elf_grok_psinfo
06c15ad7
HPN
4278
4279#define elf_backend_can_gc_sections 1
51b64d56 4280#define elf_backend_can_refcount 1
06c15ad7 4281
4da81684
HPN
4282#define elf_backend_object_p cris_elf_object_p
4283#define elf_backend_final_write_processing \
4284 cris_elf_final_write_processing
4285#define bfd_elf32_bfd_print_private_bfd_data \
4286 cris_elf_print_private_bfd_data
4287#define bfd_elf32_bfd_merge_private_bfd_data \
4288 cris_elf_merge_private_bfd_data
bac23f82
HPN
4289#define bfd_elf32_bfd_copy_private_bfd_data \
4290 cris_elf_copy_private_bfd_data
4da81684 4291
06c15ad7 4292#define bfd_elf32_bfd_reloc_type_lookup cris_reloc_type_lookup
157090f7 4293#define bfd_elf32_bfd_reloc_name_lookup cris_reloc_name_lookup
06c15ad7 4294
915e5146
HPN
4295#define bfd_elf32_bfd_link_hash_table_create \
4296 elf_cris_link_hash_table_create
4297#define elf_backend_adjust_dynamic_symbol \
4298 elf_cris_adjust_dynamic_symbol
237bc7f0
HPN
4299#define elf_backend_copy_indirect_symbol \
4300 elf_cris_copy_indirect_symbol
915e5146
HPN
4301#define elf_backend_size_dynamic_sections \
4302 elf_cris_size_dynamic_sections
74541ad4 4303#define elf_backend_init_index_section _bfd_elf_init_1_index_section
915e5146
HPN
4304#define elf_backend_finish_dynamic_symbol \
4305 elf_cris_finish_dynamic_symbol
4306#define elf_backend_finish_dynamic_sections \
4307 elf_cris_finish_dynamic_sections
4308#define elf_backend_create_dynamic_sections \
4309 _bfd_elf_create_dynamic_sections
4310#define bfd_elf32_bfd_final_link \
c152c796 4311 bfd_elf_gc_common_final_link
915e5146 4312#define elf_backend_hide_symbol elf_cris_hide_symbol
99e4ae17 4313#define elf_backend_reloc_type_class elf_cris_reloc_type_class
915e5146
HPN
4314
4315#define elf_backend_want_got_plt 1
4316#define elf_backend_plt_readonly 1
4317#define elf_backend_want_plt_sym 0
4318#define elf_backend_got_header_size 12
100382c7 4319#define elf_backend_got_elt_size elf_cris_got_elt_size
915e5146 4320
06c15ad7
HPN
4321/* Later, we my want to optimize RELA entries into REL entries for dynamic
4322 linking and libraries (if it's a win of any significance). Until then,
4323 take the easy route. */
4324#define elf_backend_may_use_rel_p 0
4325#define elf_backend_may_use_rela_p 1
f0fe0e16 4326#define elf_backend_rela_normal 1
06c15ad7
HPN
4327
4328#include "elf32-target.h"
4da81684 4329
4da81684
HPN
4330#undef TARGET_LITTLE_SYM
4331#undef TARGET_LITTLE_NAME
4332#undef elf_symbol_leading_char
4333
4334#define TARGET_LITTLE_SYM bfd_elf32_us_cris_vec
4335#define TARGET_LITTLE_NAME "elf32-us-cris"
4336#define elf_symbol_leading_char '_'
16cecee5
L
4337#undef elf32_bed
4338#define elf32_bed elf32_us_cris_bed
4da81684
HPN
4339
4340#include "elf32-target.h"