]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-csky.c
Update year range in copyright notice of binutils files
[thirdparty/binutils-gdb.git] / bfd / elf32-csky.c
CommitLineData
b8891f8d 1/* 32-bit ELF support for C-SKY.
fd67aa11 2 Copyright (C) 1998-2024 Free Software Foundation, Inc.
b8891f8d
AJ
3 Contributed by C-SKY Microsystems and Mentor Graphics.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22#include "sysdep.h"
23#include "bfd.h"
24#include "bfdlink.h"
25#include "libbfd.h"
26#include "elf-bfd.h"
27#include "elf/csky.h"
28#include "opcode/csky.h"
29#include <assert.h>
30#include "libiberty.h"
6e67e6b0 31#include "elf32-csky.h"
b8891f8d
AJ
32
33/* Data structures used for merging different arch variants.
34 V1 (510/610) and V2 (8xx) processors are incompatible, but
35 we can merge wthin each family. */
36
37enum merge_class
38{
39 CSKY_V1,
40 CSKY_V2
41};
42
bd38246a 43typedef const struct csky_arch_for_merge
b8891f8d
AJ
44{
45 const char *name;
46 const unsigned long arch_eflag;
47 /* The files can merge only if they are in same class. */
48 enum merge_class class;
49 /* When input files have different levels,
50 the target sets arch_eflag to the largest level file's arch_eflag. */
51 unsigned int class_level;
52 /* Control whether to print warning when merging with different arch. */
53 unsigned int do_warning;
54} csky_arch_for_merge;
55
bd38246a 56static csky_arch_for_merge csky_archs[] =
b8891f8d
AJ
57{
58 /* 510 and 610 merge to 610 without warning. */
0861f561
CQ
59 { "ck510", CSKY_ARCH_510, CSKY_V1, 0, 0},
60 { "ck610", CSKY_ARCH_610, CSKY_V1, 1, 0},
b8891f8d 61 /* 801, 802, 803, 807, 810 merge to largest one. */
0861f561
CQ
62 { "ck801", CSKY_ARCH_801, CSKY_V2, 0, 1},
63 { "ck802", CSKY_ARCH_802, CSKY_V2, 1, 1},
64 { "ck803", CSKY_ARCH_803, CSKY_V2, 2, 1},
65 { "ck807", CSKY_ARCH_807, CSKY_V2, 3, 1},
66 { "ck810", CSKY_ARCH_810, CSKY_V2, 4, 1},
67 { "ck860", CSKY_ARCH_860, CSKY_V2, 5, 1},
b8891f8d
AJ
68 { NULL, 0, 0, 0, 0}
69};
70
71/* Return the ARCH bits out of ABFD. */
72#define bfd_csky_arch(abfd) \
73 (elf_elfheader (abfd)->e_flags & CSKY_ARCH_MASK)
74
75/* Return the ABI bits out of ABFD. */
76#define bfd_csky_abi(abfd) \
77 (elf_elfheader (abfd)->e_flags & CSKY_ABI_MASK)
78
79
80/* The index of a howto-item is implicitly equal to
81 the corresponding Relocation Type Encoding. */
82static reloc_howto_type csky_elf_howto_table[] =
83{
84 /* 0 */
85 HOWTO (R_CKCORE_NONE, /* type */
86 0, /* rightshift */
c94cb026 87 0, /* size */
b8891f8d 88 0, /* bitsize */
0a1b45a2 89 false, /* pc_relative */
b8891f8d
AJ
90 0, /* bitpos */
91 complain_overflow_dont, /* complain_on_overflow */
92 NULL, /* special_function */
93 "R_CKCORE_NONE", /* name */
0a1b45a2 94 false, /* partial_inplace */
b8891f8d
AJ
95 0, /* src_mask */
96 0, /* dst_mask */
0a1b45a2 97 false), /* pcrel_offset */
b8891f8d
AJ
98
99 /* 1. */
100 HOWTO (R_CKCORE_ADDR32, /* type */
101 0, /* rightshift */
c94cb026 102 4, /* size */
b8891f8d 103 32, /* bitsize */
0a1b45a2 104 false, /* pc_relative */
b8891f8d
AJ
105 0, /* bitpos */
106 complain_overflow_dont, /* complain_on_overflow */
107 bfd_elf_generic_reloc, /* special_function */
108 "R_CKCORE_ADDR32", /* name */
0a1b45a2 109 false, /* partial_inplace */
b8891f8d
AJ
110 0, /* src_mask */
111 0xffffffff, /* dst_mask */
0a1b45a2 112 false), /* pcrel_offset */
b8891f8d
AJ
113
114 /* 2: Only for csky v1. */
115 HOWTO (R_CKCORE_PCREL_IMM8BY4, /* type */
116 2, /* rightshift */
c94cb026 117 2, /* size */
b8891f8d 118 8, /* bitsize */
0a1b45a2 119 true, /* pc_relative */
b8891f8d
AJ
120 0, /* bitpos */
121 complain_overflow_bitfield, /* complain_on_overflow */
122 NULL, /* special_function */
123 "R_CKCORE_PCREL_IMM8BY4", /* name */
0a1b45a2 124 false, /* partial_inplace */
b8891f8d
AJ
125 0xff, /* src_mask */
126 0xff, /* dst_mask */
0a1b45a2 127 true), /* pcrel_offset */
b8891f8d
AJ
128
129 /* 3: Only for csky v1. */
130 HOWTO (R_CKCORE_PCREL_IMM11BY2, /* type */
131 1, /* rightshift */
c94cb026 132 2, /* size */
b8891f8d 133 11, /* bitsize */
0a1b45a2 134 true, /* pc_relative */
b8891f8d
AJ
135 0, /* bitpos */
136 complain_overflow_signed, /* complain_on_overflow */
137 bfd_elf_generic_reloc, /* special_function */
138 "R_CKCORE_PCREL_IMM11BY2", /* name */
0a1b45a2 139 false, /* partial_inplace */
b8891f8d
AJ
140 0x7ff, /* src_mask */
141 0x7ff, /* dst_mask */
0a1b45a2 142 true), /* pcrel_offset */
b8891f8d
AJ
143
144 /* 4: DELETED. */
5d0feb98 145 HOWTO (R_CKCORE_PCREL_IMM4BY2,0,0,0,0,0,0,0,"R_CKCORE_PCREL_IMM4BY2",0,0,0,0),
b8891f8d
AJ
146
147 /* 5. */
148 HOWTO (R_CKCORE_PCREL32, /* type */
149 0, /* rightshift */
c94cb026 150 4, /* size */
b8891f8d 151 32, /* bitsize */
0a1b45a2 152 true, /* pc_relative */
b8891f8d
AJ
153 0, /* bitpos */
154 complain_overflow_dont, /* complain_on_overflow */
fe75f42e 155 bfd_elf_generic_reloc, /* special_function */
b8891f8d 156 "R_CKCORE_PCREL32", /* name */
0a1b45a2 157 false, /* partial_inplace */
b8891f8d
AJ
158 0x0, /* src_mask */
159 0xffffffff, /* dst_mask */
0a1b45a2 160 true), /* pcrel_offset */
b8891f8d
AJ
161
162 /* 6: Only for csky v1. */
163 HOWTO (R_CKCORE_PCREL_JSR_IMM11BY2, /* type */
164 1, /* rightshift */
c94cb026 165 2, /* size */
b8891f8d 166 11, /* bitsize */
0a1b45a2 167 true, /* pc_relative */
b8891f8d
AJ
168 0, /* bitpos */
169 complain_overflow_signed, /* complain_on_overflow */
170 bfd_elf_generic_reloc, /* special_function */
171 "R_CKCORE_PCREL_JSR_IMM11BY2", /* name */
0a1b45a2 172 false, /* partial_inplace */
b8891f8d
AJ
173 0x7ff, /* src_mask */
174 0x7ff, /* dst_mask */
0a1b45a2 175 true), /* pcrel_offset */
b8891f8d
AJ
176
177 /* 7: GNU extension to record C++ vtable member usage. */
178 HOWTO (R_CKCORE_GNU_VTENTRY, /* type */
179 0, /* rightshift */
c94cb026 180 4, /* size */
b8891f8d 181 0, /* bitsize */
0a1b45a2 182 false, /* pc_relative */
b8891f8d
AJ
183 0, /* bitpos */
184 complain_overflow_dont, /* complain_on_overflow */
185 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
186 "R_CKCORE_GNU_VTENTRY", /* name */
0a1b45a2 187 false, /* partial_inplace */
b8891f8d
AJ
188 0x0, /* src_mask */
189 0x0, /* dst_mask */
0a1b45a2 190 false), /* pcrel_offset */
b8891f8d
AJ
191
192 /* 8: GNU extension to record C++ vtable hierarchy. */
193 HOWTO (R_CKCORE_GNU_VTINHERIT, /* type */
194 0, /* rightshift */
c94cb026 195 4, /* size */
b8891f8d 196 0, /* bitsize */
0a1b45a2 197 false, /* pc_relative */
b8891f8d
AJ
198 0, /* bitpos */
199 complain_overflow_dont, /* complain_on_overflow */
200 NULL, /* special_function */
201 "R_CKCORE_GNU_VTINHERIT", /* name */
0a1b45a2 202 false, /* partial_inplace */
b8891f8d
AJ
203 0x0, /* src_mask */
204 0x0, /* dst_mask */
0a1b45a2 205 false), /* pcrel_offset */
b8891f8d
AJ
206
207 /* 9. */
208 HOWTO (R_CKCORE_RELATIVE, /* type */
209 0, /* rightshift */
c94cb026 210 4, /* size */
b8891f8d 211 32, /* bitsize */
0a1b45a2 212 false, /* pc_relative */
b8891f8d
AJ
213 0, /* bitpos */
214 complain_overflow_signed, /* complain_on_overflow */
215 bfd_elf_generic_reloc, /* special_function */
216 "R_CKCORE_RELATIVE", /* name */
0a1b45a2 217 true, /* partial_inplace */
b8891f8d
AJ
218 0x0, /* src_mask */
219 0xffffffff, /* dst_mask */
0a1b45a2 220 false), /* pcrel_offset */
b8891f8d
AJ
221
222 /* 10: None. */
223 /* FIXME: It is a bug that copy relocations are not implemented. */
224 HOWTO (R_CKCORE_COPY, /* type */
225 0, /* rightshift */
c94cb026 226 4, /* size */
b8891f8d 227 32, /* bitsize */
0a1b45a2 228 false, /* pc_relative */
b8891f8d
AJ
229 0, /* bitpos */
230 complain_overflow_bitfield, /* complain_on_overflow */
231 bfd_elf_generic_reloc, /* special_function */
232 "R_CKCORE_COPY", /* name */
0a1b45a2 233 true, /* partial_inplace */
b8891f8d
AJ
234 0xffffffff, /* src_mask */
235 0xffffffff, /* dst_mask */
0a1b45a2 236 false), /* pcrel_offset */
b8891f8d
AJ
237
238 /* 11: None. */
5d0feb98 239 HOWTO (R_CKCORE_GLOB_DAT,0,0,0,0,0,0,0,"R_CKCORE_GLOB_DAT",0,0,0,0),
b8891f8d
AJ
240
241 /* 12: None. */
5d0feb98 242 HOWTO (R_CKCORE_JUMP_SLOT,0,0,0,0,0,0,0,"R_CKCORE_JUMP_SLOT",0,0,0,0),
b8891f8d
AJ
243
244 /* 13. */
245 HOWTO (R_CKCORE_GOTOFF, /* type */
246 0, /* rightshift */
c94cb026 247 4, /* size */
b8891f8d 248 32, /* bitsize */
0a1b45a2 249 false, /* pc_relative */
b8891f8d
AJ
250 0, /* bitpos */
251 complain_overflow_dont, /* complain_on_overflow */
252 bfd_elf_generic_reloc, /* special_function */
253 "R_CKCORE_GOTOFF", /* name */
0a1b45a2 254 true, /* partial_inplace */
b8891f8d
AJ
255 0x0, /* src_mask */
256 0xffffffffl, /* dst_mask */
0a1b45a2 257 false), /* pcrel_offset */
b8891f8d
AJ
258
259 /* 14. */
260 HOWTO (R_CKCORE_GOTPC, /* type */
261 0, /* rightshift */
c94cb026 262 4, /* size */
b8891f8d 263 32, /* bitsize */
0a1b45a2 264 true, /* pc_relative */
b8891f8d
AJ
265 0, /* bitpos */
266 complain_overflow_dont, /* complain_on_overflow */
267 bfd_elf_generic_reloc, /* special_function */
268 "R_CKCORE_GOTPC", /* name */
0a1b45a2 269 true, /* partial_inplace */
b8891f8d
AJ
270 0x0, /* src_mask */
271 0xffffffff, /* dst_mask */
0a1b45a2 272 false), /* pcrel_offset */
b8891f8d
AJ
273
274 /* 15. */
275 HOWTO (R_CKCORE_GOT32, /* type */
276 0, /* rightshift */
c94cb026 277 4, /* size */
b8891f8d 278 32, /* bitsize */
0a1b45a2 279 false, /* pc_relative */
b8891f8d
AJ
280 0, /* bitpos */
281 complain_overflow_dont, /* complain_on_overflow */
282 bfd_elf_generic_reloc, /* special_function */
283 "R_CKCORE_GOT32", /* name */
0a1b45a2 284 true, /* partial_inplace */
b8891f8d
AJ
285 0x0, /* src_mask */
286 0xffffffff, /* dst_mask */
0a1b45a2 287 true), /* pcrel_offset */
b8891f8d
AJ
288
289 /* 16. */
290 HOWTO (R_CKCORE_PLT32, /* type */
291 0, /* rightshift */
c94cb026 292 4, /* size */
b8891f8d 293 32, /* bitsize */
0a1b45a2 294 false, /* pc_relative */
b8891f8d
AJ
295 0, /* bitpos */
296 complain_overflow_dont, /* complain_on_overflow */
297 bfd_elf_generic_reloc, /* special_function */
298 "R_CKCORE_PLT32", /* name */
0a1b45a2 299 true, /* partial_inplace */
b8891f8d
AJ
300 0x0, /* src_mask */
301 0xffffffff, /* dst_mask */
0a1b45a2 302 true), /* pcrel_offset */
b8891f8d
AJ
303
304 /* 17: None. */
5d0feb98 305 HOWTO (R_CKCORE_ADDRGOT,0,0,0,0,0,0,0,"R_CKCORE_ADDRGOT",0,0,0,0),
b8891f8d
AJ
306
307 /* 18: None. */
5d0feb98 308 HOWTO (R_CKCORE_ADDRPLT,0,0,0,0,0,0,0,"R_CKCORE_ADDRPLT",0,0,0,0),
b8891f8d
AJ
309
310 /* 19: Only for csky v2. */
311 HOWTO (R_CKCORE_PCREL_IMM26BY2, /* type */
312 1, /* rightshift */
c94cb026 313 4, /* size */
b8891f8d 314 26, /* bitsize */
0a1b45a2 315 true, /* pc_relative */
b8891f8d
AJ
316 0, /* bitpos */
317 complain_overflow_signed, /* complain_on_overflow */
318 bfd_elf_generic_reloc, /* special_function */
319 "R_CKCORE_PCREL_IMM26BY2", /* name */
0a1b45a2 320 false, /* partial_inplace */
b8891f8d
AJ
321 0x0, /* src_mask */
322 0x3ffffff, /* dst_mask */
0a1b45a2 323 true), /* pcrel_offset */
b8891f8d
AJ
324
325 /* 20: Only for csky v2. */
326 HOWTO (R_CKCORE_PCREL_IMM16BY2, /* type */
f6a1f957 327 1, /* rightshift */
c94cb026 328 4, /* size */
f6a1f957
LX
329 16, /* bitsize */
330 true, /* pc_relative */
331 0, /* bitpos */
332 complain_overflow_signed, /* complain_on_overflow */
333 bfd_elf_generic_reloc, /* special_function */
334 "R_CKCORE_PCREL_IMM16BY2", /* name */
335 false, /* partial_inplace */
336 0x0, /* src_mask */
337 0xffff, /* dst_mask */
338 true), /* pcrel_offset */
b8891f8d
AJ
339
340 /* 21: Only for csky v2. */
341 HOWTO (R_CKCORE_PCREL_IMM16BY4, /* type */
f6a1f957 342 2, /* rightshift */
c94cb026 343 4, /* size */
f6a1f957
LX
344 16, /* bitsize */
345 true, /* pc_relative */
346 0, /* bitpos */
347 complain_overflow_bitfield, /* complain_on_overflow */
348 bfd_elf_generic_reloc, /* special_function */
349 "R_CKCORE_PCREL_IMM16BY4", /* name */
350 false, /* partial_inplace */
351 0xffff0000, /* src_mask */
352 0xffff, /* dst_mask */
353 true), /* pcrel_offset */
b8891f8d
AJ
354
355 /* 22: Only for csky v2. */
356 HOWTO (R_CKCORE_PCREL_IMM10BY2, /* type */
357 1, /* rightshift */
c94cb026 358 2, /* size */
b8891f8d 359 10, /* bitsize */
0a1b45a2 360 true, /* pc_relative */
b8891f8d
AJ
361 0, /* bitpos */
362 complain_overflow_signed, /* complain_on_overflow */
363 bfd_elf_generic_reloc, /* special_function */
364 "R_CKCORE_PCREL_IMM10BY2", /* name */
0a1b45a2 365 false, /* partial_inplace */
b8891f8d
AJ
366 0x0, /* src_mask */
367 0x3ff, /* dst_mask */
0a1b45a2 368 true), /* pcrel_offset */
b8891f8d
AJ
369
370 /* 23: Only for csky v2. */
371 HOWTO (R_CKCORE_PCREL_IMM10BY4, /* type */
f6a1f957 372 2, /* rightshift */
c94cb026 373 4, /* size */
f6a1f957
LX
374 10, /* bitsize */
375 true, /* pc_relative */
376 0, /* bitpos */
377 complain_overflow_bitfield, /* complain_on_overflow */
378 bfd_elf_generic_reloc, /* special_function */
379 "R_CKCORE_PCREL_IMM10BY4", /* name */
380 false, /* partial_inplace */
381 0x0, /* src_mask */
382 0x3ff, /* dst_mask */
383 true), /* pcrel_offset */
b8891f8d
AJ
384
385 /* 24: Only for csky v2. */
386 HOWTO (R_CKCORE_ADDR_HI16, /* type */
387 16, /* rightshift */
c94cb026 388 4, /* size */
b8891f8d 389 16, /* bitsize */
0a1b45a2 390 false, /* pc_relative */
b8891f8d
AJ
391 0, /* bitpos */
392 complain_overflow_dont, /* complain_on_overflow */
393 bfd_elf_generic_reloc, /* special_function */
394 "R_CKCORE_ADDR_HI16", /* name */
0a1b45a2 395 false, /* partial_inplace */
b8891f8d
AJ
396 0x0, /* src_mask */
397 0xffff, /* dst_mask */
0a1b45a2 398 false), /* pcrel_offset */
b8891f8d
AJ
399
400 /* 25. */
401 HOWTO (R_CKCORE_ADDR_LO16, /* type */
402 0, /* rightshift */
c94cb026 403 4, /* size */
b8891f8d 404 16, /* bitsize */
0a1b45a2 405 false, /* pc_relative */
b8891f8d
AJ
406 0, /* bitpos */
407 complain_overflow_dont, /* complain_on_overflow */
408 bfd_elf_generic_reloc, /* special_function */
409 "R_CKCORE_ADDR_LO16", /* name */
0a1b45a2 410 false, /* partial_inplace */
b8891f8d
AJ
411 0x0, /* src_mask */
412 0xffff, /* dst_mask */
0a1b45a2 413 false), /* pcrel_offset */
b8891f8d
AJ
414
415 /* 26. */
416 HOWTO (R_CKCORE_GOTPC_HI16, /* type */
417 16, /* rightshift */
c94cb026 418 4, /* size */
b8891f8d 419 16, /* bitsize */
0a1b45a2 420 true, /* pc_relative */
b8891f8d
AJ
421 0, /* bitpos */
422 complain_overflow_dont, /* complain_on_overflow */
423 bfd_elf_generic_reloc, /* special_function */
424 "R_CKCORE_GOTPC_HI16", /* name */
0a1b45a2 425 false, /* partial_inplace */
b8891f8d
AJ
426 0x0, /* src_mask */
427 0xffff, /* dst_mask */
0a1b45a2 428 false), /* pcrel_offset */
b8891f8d
AJ
429
430 /* 27. */
431 HOWTO (R_CKCORE_GOTPC_LO16, /* type */
432 0, /* rightshift */
c94cb026 433 4, /* size */
b8891f8d 434 16, /* bitsize */
0a1b45a2 435 true, /* pc_relative */
b8891f8d
AJ
436 0, /* bitpos */
437 complain_overflow_dont, /* complain_on_overflow */
438 bfd_elf_generic_reloc, /* special_function */
439 "R_CKCORE_GOTPC_LO16", /* name */
0a1b45a2 440 false, /* partial_inplace */
b8891f8d
AJ
441 0x0, /* src_mask */
442 0xffff, /* dst_mask */
0a1b45a2 443 false), /* pcrel_offset */
b8891f8d
AJ
444
445 /* 28. */
446 HOWTO (R_CKCORE_GOTOFF_HI16, /* type */
447 16, /* rightshift */
c94cb026 448 4, /* size */
b8891f8d 449 16, /* bitsize */
0a1b45a2 450 false, /* pc_relative */
b8891f8d
AJ
451 0, /* bitpos */
452 complain_overflow_dont, /* complain_on_overflow */
453 bfd_elf_generic_reloc, /* special_function */
454 "R_CKCORE_GOTOFF_HI16", /* name */
0a1b45a2 455 false, /* partial_inplace */
b8891f8d
AJ
456 0x0, /* src_mask */
457 0xffff, /* dst_mask */
0a1b45a2 458 false), /* pcrel_offset */
b8891f8d
AJ
459
460 /* 29. */
461 HOWTO (R_CKCORE_GOTOFF_LO16, /* type */
462 0, /* rightshift */
c94cb026 463 4, /* size */
b8891f8d 464 16, /* bitsize */
0a1b45a2 465 false, /* pc_relative */
b8891f8d
AJ
466 0, /* bitpos */
467 complain_overflow_dont, /* complain_on_overflow */
468 bfd_elf_generic_reloc, /* special_function */
469 "R_CKCORE_GOTOFF_LO16", /* name */
0a1b45a2 470 false, /* partial_inplace */
b8891f8d
AJ
471 0x0, /* src_mask */
472 0xffff, /* dst_mask */
0a1b45a2 473 false), /* pcrel_offset */
b8891f8d
AJ
474
475 /* 30. */
476 HOWTO (R_CKCORE_GOT12, /* type */
477 2, /* rightshift */
c94cb026 478 4, /* size */
b8891f8d 479 12, /* bitsize */
0a1b45a2 480 false, /* pc_relative */
b8891f8d
AJ
481 0, /* bitpos */
482 complain_overflow_bitfield, /* complain_on_overflow */
483 bfd_elf_generic_reloc, /* special_function */
484 "R_CKCORE_GOT12", /* name */
0a1b45a2 485 true, /* partial_inplace */
b8891f8d
AJ
486 0x0, /* src_mask */
487 0xfff, /* dst_mask */
0a1b45a2 488 false), /* pcrel_offset */
b8891f8d
AJ
489
490 /* 31. */
491 HOWTO (R_CKCORE_GOT_HI16, /* type */
492 16, /* rightshift */
c94cb026 493 4, /* size */
b8891f8d 494 16, /* bitsize */
0a1b45a2 495 false, /* pc_relative */
b8891f8d
AJ
496 0, /* bitpos */
497 complain_overflow_dont, /* complain_on_overflow */
498 bfd_elf_generic_reloc, /* special_function */
499 "R_CKCORE_GOT_HI16", /* name */
0a1b45a2 500 true, /* partial_inplace */
b8891f8d
AJ
501 0x0, /* src_mask */
502 0xffff, /* dst_mask */
0a1b45a2 503 false), /* pcrel_offset */
b8891f8d
AJ
504
505 /* 32. */
506 HOWTO (R_CKCORE_GOT_LO16, /* type */
507 0, /* rightshift */
c94cb026 508 4, /* size */
b8891f8d 509 16, /* bitsize */
0a1b45a2 510 false, /* pc_relative */
b8891f8d
AJ
511 0, /* bitpos */
512 complain_overflow_dont, /* complain_on_overflow */
513 bfd_elf_generic_reloc, /* special_function */
514 "R_CKCORE_GOT_LO16", /* name */
0a1b45a2 515 true, /* partial_inplace */
b8891f8d
AJ
516 0x0, /* src_mask */
517 0xffff, /* dst_mask */
0a1b45a2 518 false), /* pcrel_offset */
b8891f8d
AJ
519
520 /* 33. */
521 HOWTO (R_CKCORE_PLT12, /* type */
522 2, /* rightshift */
c94cb026 523 4, /* size */
b8891f8d 524 12, /* bitsize */
0a1b45a2 525 false, /* pc_relative */
b8891f8d
AJ
526 0, /* bitpos */
527 complain_overflow_bitfield, /* complain_on_overflow */
528 bfd_elf_generic_reloc, /* special_function */
529 "R_CKCORE_PLT12", /* name */
0a1b45a2 530 true, /* partial_inplace */
b8891f8d
AJ
531 0x0, /* src_mask */
532 0xfff, /* dst_mask */
0a1b45a2 533 false), /* pcrel_offset */
b8891f8d
AJ
534
535 /* 34. */
536 HOWTO (R_CKCORE_PLT_HI16, /* type */
537 16, /* rightshift */
c94cb026 538 4, /* size */
b8891f8d 539 16, /* bitsize */
0a1b45a2 540 false, /* pc_relative */
b8891f8d
AJ
541 0, /* bitpos */
542 complain_overflow_dont, /* complain_on_overflow */
543 bfd_elf_generic_reloc, /* special_function */
544 "R_CKCORE_PLT_HI16", /* name */
0a1b45a2 545 true, /* partial_inplace */
b8891f8d
AJ
546 0x0, /* src_mask */
547 0xffff, /* dst_mask */
0a1b45a2 548 false), /* pcrel_offset */
b8891f8d
AJ
549
550 /* 35. */
551 HOWTO (R_CKCORE_PLT_LO16, /* type */
552 0, /* rightshift */
c94cb026 553 4, /* size */
b8891f8d 554 16, /* bitsize */
0a1b45a2 555 false, /* pc_relative */
b8891f8d
AJ
556 0, /* bitpos */
557 complain_overflow_dont, /* complain_on_overflow */
558 bfd_elf_generic_reloc, /* special_function */
559 "R_CKCORE_PLT_LO16", /* name */
0a1b45a2 560 true, /* partial_inplace */
b8891f8d
AJ
561 0x0, /* src_mask */
562 0xffff, /* dst_mask */
0a1b45a2 563 false), /* pcrel_offset */
b8891f8d
AJ
564
565 /* 36: None. */
5d0feb98 566 HOWTO (R_CKCORE_ADDRGOT_HI16,0,0,0,0,0,0,0,"R_CKCORE_",0,0,0,0),
b8891f8d
AJ
567
568 /* 37: None. */
5d0feb98 569 HOWTO (R_CKCORE_ADDRGOT_LO16,0,0,0,0,0,0,0,"R_CKCORE_",0,0,0,0),
b8891f8d
AJ
570
571 /* 38: None. */
5d0feb98 572 HOWTO (R_CKCORE_ADDRPLT_HI16,0,0,0,0,0,0,0,"R_CKCORE_",0,0,0,0),
b8891f8d
AJ
573
574 /* 39: None. */
5d0feb98 575 HOWTO (R_CKCORE_ADDRPLT_LO16,0,0,0,0,0,0,0,"R_CKCORE_",0,0,0,0),
b8891f8d
AJ
576
577 /* 40. */
578 HOWTO (R_CKCORE_PCREL_JSR_IMM26BY2, /* type */
579 1, /* rightshift */
c94cb026 580 4, /* size */
b8891f8d 581 26, /* bitsize */
0a1b45a2 582 true, /* pc_relative */
b8891f8d
AJ
583 0, /* bitpos */
584 complain_overflow_signed, /* complain_on_overflow */
585 bfd_elf_generic_reloc, /* special_function */
586 "R_CKCORE_PCREL_JSR_IMM26BY2", /* name */
0a1b45a2 587 false, /* partial_inplace */
b8891f8d
AJ
588 0x0, /* src_mask */
589 0x3ffffff, /* dst_mask */
0a1b45a2 590 true), /* pcrel_offset */
b8891f8d
AJ
591
592 /* 41. */
593 HOWTO (R_CKCORE_TOFFSET_LO16, /* type */
594 0, /* rightshift */
c94cb026 595 4, /* size */
b8891f8d 596 16, /* bitsize */
0a1b45a2 597 false, /* pc_relative */
b8891f8d
AJ
598 0, /* bitpos */
599 complain_overflow_unsigned, /* complain_on_overflow */
600 NULL, /* special_function */
601 "R_CKCORE_TOFFSET_LO16", /* name */
0a1b45a2 602 false, /* partial_inplace */
b8891f8d
AJ
603 0x0, /* src_mask */
604 0xffff, /* dst_mask */
0a1b45a2 605 false), /* pcrel_offset */
b8891f8d
AJ
606
607 /* 42. */
608 HOWTO (R_CKCORE_DOFFSET_LO16, /* type */
609 0, /* rightshift */
c94cb026 610 4, /* size */
b8891f8d 611 16, /* bitsize */
0a1b45a2 612 false, /* pc_relative */
b8891f8d
AJ
613 0, /* bitpos */
614 complain_overflow_unsigned, /* complain_on_overflow */
615 NULL, /* special_function */
616 "R_CKCORE_DOFFSET_LO16", /* name */
0a1b45a2 617 false, /* partial_inplace */
b8891f8d
AJ
618 0x0, /* src_mask */
619 0xffff, /* dst_mask */
0a1b45a2 620 false), /* pcrel_offset */
b8891f8d
AJ
621
622 /* 43. */
623 HOWTO (R_CKCORE_PCREL_IMM18BY2, /* type */
f6a1f957 624 1, /* rightshift */
c94cb026 625 4, /* size */
f6a1f957
LX
626 18, /* bitsize */
627 true, /* pc_relative */
628 0, /* bitpos */
629 complain_overflow_signed, /* complain_on_overflow */
630 bfd_elf_generic_reloc, /* special_function */
631 "R_CKCORE_PCREL_IMM18BY2", /* name */
632 false, /* partial_inplace */
633 0x0, /* src_mask */
634 0x3ffff, /* dst_mask */
635 true), /* pcrel_offset */
b8891f8d
AJ
636
637 /* 44. */
638 HOWTO (R_CKCORE_DOFFSET_IMM18, /* type */
639 0, /* rightshift */
c94cb026 640 4, /* size */
b8891f8d 641 18, /* bitsize */
0a1b45a2 642 false, /* pc_relative */
b8891f8d
AJ
643 0, /* bitpos */
644 complain_overflow_unsigned, /* complain_on_overflow */
645 NULL, /* special_function */
646 "R_CKCORE_DOFFSET_IMM18", /* name */
0a1b45a2 647 false, /* partial_inplace */
b8891f8d
AJ
648 0x0, /* src_mask */
649 0x3ffff, /* dst_mask */
0a1b45a2 650 false), /* pcrel_offset */
b8891f8d
AJ
651
652 /* 45. */
653 HOWTO (R_CKCORE_DOFFSET_IMM18BY2, /* type */
654 1, /* rightshift */
c94cb026 655 4, /* size */
b8891f8d 656 18, /* bitsize */
0a1b45a2 657 false, /* pc_relative */
b8891f8d
AJ
658 0, /* bitpos */
659 complain_overflow_unsigned, /* complain_on_overflow */
660 NULL, /* special_function */
661 "R_CKCORE_DOFFSET_IMM18BY2", /* name */
0a1b45a2 662 false, /* partial_inplace */
b8891f8d
AJ
663 0x0, /* src_mask */
664 0x3ffff, /* dst_mask */
0a1b45a2 665 false), /* pcrel_offset */
b8891f8d
AJ
666
667 /* 46. */
668 HOWTO (R_CKCORE_DOFFSET_IMM18BY4, /* type */
669 2, /* rightshift */
c94cb026 670 4, /* size */
b8891f8d 671 18, /* bitsize */
0a1b45a2 672 false, /* pc_relative */
b8891f8d
AJ
673 0, /* bitpos */
674 complain_overflow_unsigned, /* complain_on_overflow */
675 NULL, /* special_function */
676 "R_CKCORE_DOFFSET_IMM18BY4", /* name */
0a1b45a2 677 false, /* partial_inplace */
b8891f8d
AJ
678 0x0, /* src_mask */
679 0x3ffff, /* dst_mask */
0a1b45a2 680 false), /* pcrel_offset */
b8891f8d
AJ
681
682 /* 47. */
683 HOWTO (R_CKCORE_GOTOFF_IMM18, /* type */
684 0, /* rightshift */
c94cb026 685 4, /* size */
b8891f8d 686 18, /* bitsize */
0a1b45a2 687 false, /* pc_relative */
b8891f8d
AJ
688 0, /* bitpos */
689 complain_overflow_bitfield, /* complain_on_overflow */
690 bfd_elf_generic_reloc, /* special_function */
691 "R_CKCORE_GOTOFF_IMM18", /* name */
0a1b45a2 692 true, /* partial_inplace */
b8891f8d
AJ
693 0xfffc, /* src_mask */
694 0x3ffff, /* dst_mask */
0a1b45a2 695 false), /* pcrel_offset */
b8891f8d
AJ
696
697 /* 48. */
698 HOWTO (R_CKCORE_GOT_IMM18BY4, /* type */
699 2, /* rightshift */
c94cb026 700 4, /* size */
b8891f8d 701 18, /* bitsize */
0a1b45a2 702 false, /* pc_relative */
b8891f8d
AJ
703 0, /* bitpos */
704 complain_overflow_bitfield, /* complain_on_overflow */
705 bfd_elf_generic_reloc, /* special_function */
706 "R_CKCORE_GOT_IMM18BY4", /* name */
0a1b45a2 707 true, /* partial_inplace */
b8891f8d
AJ
708 0xfffc, /* src_mask */
709 0x3ffff, /* dst_mask */
0a1b45a2 710 false), /* pcrel_offset */
b8891f8d
AJ
711
712 /* 49. */
713 HOWTO (R_CKCORE_PLT_IMM18BY4, /* type */
714 2, /* rightshift */
c94cb026 715 4, /* size */
b8891f8d 716 18, /* bitsize */
0a1b45a2 717 false, /* pc_relative */
b8891f8d
AJ
718 0, /* bitpos */
719 complain_overflow_bitfield, /* complain_on_overflow */
720 bfd_elf_generic_reloc, /* special_function */
721 "R_CKCORE_PLT_IMM18BY4", /* name */
0a1b45a2 722 true, /* partial_inplace */
b8891f8d
AJ
723 0xfffc, /* src_mask */
724 0x3ffff, /* dst_mask */
0a1b45a2 725 true), /* pcrel_offset */
b8891f8d
AJ
726
727 /* 50: for lrw16. */
728 HOWTO (R_CKCORE_PCREL_IMM7BY4, /* type */
729 2, /* rightshift */
c94cb026 730 2, /* size */
b8891f8d 731 7, /* bitsize */
0a1b45a2 732 true, /* pc_relative */
b8891f8d
AJ
733 0, /* bitpos */
734 complain_overflow_bitfield, /* complain_on_overflow */
735 bfd_elf_generic_reloc, /* special_function */
736 "R_CKCORE_PCREL_IMM7BY4", /* name */
0a1b45a2 737 false, /* partial_inplace */
b8891f8d
AJ
738 0xec1f, /* src_mask */
739 0x31f, /* dst_mask */
0a1b45a2 740 true), /* pcrel_offset */
b8891f8d
AJ
741
742 /* 51: for static nptl. */
743 HOWTO (R_CKCORE_TLS_LE32, /* type */
744 0, /* rightshift */
c94cb026 745 4, /* size */
b8891f8d 746 32, /* bitsize */
0a1b45a2 747 false, /* pc_relative */
b8891f8d
AJ
748 0, /* bitpos */
749 complain_overflow_dont, /* complain_on_overflow */
750 bfd_elf_generic_reloc, /* special_function */
751 "R_CKCORE_TLS_LE32", /* name */
0a1b45a2 752 false, /* partial_inplace */
b8891f8d
AJ
753 0x0, /* src_mask */
754 0xffffffff, /* dst_mask */
0a1b45a2 755 true), /* pcrel_offset */
b8891f8d
AJ
756
757 /* 52: for static nptl. */
758 HOWTO (R_CKCORE_TLS_IE32, /* type */
759 0, /* rightshift */
c94cb026 760 4, /* size */
b8891f8d 761 32, /* bitsize */
0a1b45a2 762 false, /* pc_relative */
b8891f8d
AJ
763 0, /* bitpos */
764 complain_overflow_dont, /* complain_on_overflow */
765 bfd_elf_generic_reloc, /* special_function */
766 "R_CKCORE_TLS_IE32", /* name */
0a1b45a2 767 false, /* partial_inplace */
b8891f8d
AJ
768 0x0, /* src_mask */
769 0xffffffff, /* dst_mask */
0a1b45a2 770 true), /* pcrel_offset */
b8891f8d
AJ
771
772 /* 53: for pic nptl. */
773 HOWTO (R_CKCORE_TLS_GD32, /* type */
774 0, /* rightshift */
c94cb026 775 4, /* size */
b8891f8d 776 32, /* bitsize */
0a1b45a2 777 false, /* pc_relative */
b8891f8d
AJ
778 0, /* bitpos */
779 complain_overflow_dont, /* complain_on_overflow */
780 bfd_elf_generic_reloc, /* special_function */
781 "R_CKCORE_TLS_GD32", /* name */
0a1b45a2 782 false, /* partial_inplace */
b8891f8d
AJ
783 0x0, /* src_mask */
784 0xffffffff, /* dst_mask */
0a1b45a2 785 true), /* pcrel_offset */
b8891f8d
AJ
786
787 /* 54: for pic nptl. */
788 HOWTO (R_CKCORE_TLS_LDM32, /* type */
789 0, /* rightshift */
c94cb026 790 4, /* size */
b8891f8d 791 32, /* bitsize */
0a1b45a2 792 false, /* pc_relative */
b8891f8d
AJ
793 0, /* bitpos */
794 complain_overflow_dont, /* complain_on_overflow */
795 bfd_elf_generic_reloc, /* special_function */
796 "R_CKCORE_TLS_LDM32", /* name */
0a1b45a2 797 false, /* partial_inplace */
b8891f8d
AJ
798 0x0, /* src_mask */
799 0xffffffff, /* dst_mask */
0a1b45a2 800 true), /* pcrel_offset */
b8891f8d
AJ
801
802 /* 55: for pic nptl. */
803 HOWTO (R_CKCORE_TLS_LDO32, /* type */
804 0, /* rightshift */
c94cb026 805 4, /* size */
b8891f8d 806 32, /* bitsize */
0a1b45a2 807 false, /* pc_relative */
b8891f8d
AJ
808 0, /* bitpos */
809 complain_overflow_dont, /* complain_on_overflow */
810 bfd_elf_generic_reloc, /* special_function */
811 "R_CKCORE_TLS_LDO32", /* name */
0a1b45a2 812 false, /* partial_inplace */
b8891f8d
AJ
813 0x0, /* src_mask */
814 0xffffffff, /* dst_mask */
0a1b45a2 815 true), /* pcrel_offset */
b8891f8d
AJ
816
817 /* 56: for linker. */
5d0feb98 818 HOWTO (R_CKCORE_TLS_DTPMOD32,0,0,0,0,0,0,0,"R_CKCORE_TLS_DTPMOD32",0,0,0,0),
b8891f8d
AJ
819
820 /* 57: for linker. */
5d0feb98 821 HOWTO (R_CKCORE_TLS_DTPOFF32,0,0,0,0,0,0,0,"R_CKCORE_TLS_DTPOFF32",0,0,0,0),
b8891f8d
AJ
822
823 /* 58: for linker. */
5d0feb98 824 HOWTO (R_CKCORE_TLS_TPOFF32,0,0,0,0,0,0,0,"R_CKCORE_TLS_TPOFF32",0,0,0,0),
b8891f8d
AJ
825
826 /* 59: for ck807f. */
827 HOWTO (R_CKCORE_PCREL_FLRW_IMM8BY4, /* type */
f6a1f957 828 2, /* rightshift */
c94cb026 829 4, /* size */
f6a1f957
LX
830 8, /* bitsize */
831 true, /* pc_relative */
832 0, /* bitpos */
833 complain_overflow_bitfield, /* complain_on_overflow */
834 bfd_elf_generic_reloc, /* special_function */
835 "R_CKCORE_PCREL_FLRW_IMM8BY4",/* name */
836 false, /* partial_inplace */
837 0xfe1fff0f, /* src_mask */
838 0x1e000f0, /* dst_mask */
839 true), /* pcrel_offset */
b8891f8d
AJ
840
841 /* 60: for 810 not to generate jsri. */
842 HOWTO (R_CKCORE_NOJSRI, /* type */
843 0, /* rightshift */
c94cb026 844 4, /* size */
b8891f8d 845 32, /* bitsize */
0a1b45a2 846 false, /* pc_relative */
b8891f8d
AJ
847 0, /* bitpos */
848 complain_overflow_dont, /* complain_on_overflow */
849 bfd_elf_generic_reloc, /* special_function */
850 "R_CKCORE_NOJSRI", /* name */
0a1b45a2 851 false, /* partial_inplace */
b8891f8d
AJ
852 0xffff, /* src_mask */
853 0xffff, /* dst_mask */
0a1b45a2 854 false), /* pcrel_offset */
b8891f8d
AJ
855
856 /* 61: for callgraph. */
857 HOWTO (R_CKCORE_CALLGRAPH, /* type */
858 0, /* rightshift */
5d0feb98 859 0, /* size */
b8891f8d 860 0, /* bitsize */
0a1b45a2 861 false, /* pc_relative */
b8891f8d
AJ
862 0, /* bitpos */
863 complain_overflow_dont, /* complain_on_overflow */
864 NULL, /* special_function */
865 "R_CKCORE_CALLGRAPH", /* name */
0a1b45a2 866 false, /* partial_inplace */
b8891f8d
AJ
867 0x0, /* src_mask */
868 0x0, /* dst_mask */
0a1b45a2 869 true), /* pcrel_offset */
b8891f8d
AJ
870
871 /* 62: IRELATIVE*/
5d0feb98 872 HOWTO (R_CKCORE_IRELATIVE,0,0,0,0,0,0,0,"R_CKCORE_IRELATIVE",0,0,0,0),
b8891f8d
AJ
873
874 /* 63: for bloop instruction */
875 HOWTO (R_CKCORE_PCREL_BLOOP_IMM4BY4, /* type */
876 1, /* rightshift */
c94cb026 877 4, /* size */
b8891f8d
AJ
878 4, /* bitsize */
879 1, /* pc_relative */
880 0, /* bitpos */
881 complain_overflow_signed, /* complain_on_overflow */
882 bfd_elf_generic_reloc, /* special_function */
883 "R_CKCORE_PCREL_BLOOP_IMM4BY4", /* name */
0a1b45a2 884 false, /* partial_inplace */
b8891f8d
AJ
885 0x0, /* src_mask */
886 0xf, /* dst_mask */
0a1b45a2 887 true), /* pcrel_offset */
b8891f8d
AJ
888 /* 64: for bloop instruction */
889 HOWTO (R_CKCORE_PCREL_BLOOP_IMM12BY4, /* type */
890 1, /* rightshift */
c94cb026 891 4, /* size */
b8891f8d
AJ
892 12, /* bitsize */
893 1, /* pc_relative */
894 0, /* bitpos */
895 complain_overflow_signed, /* complain_on_overflow */
896 bfd_elf_generic_reloc, /* special_function */
897 "R_CKCORE_PCREL_BLOOP_IMM12BY4", /* name */
0a1b45a2 898 false, /* partial_inplace */
b8891f8d
AJ
899 0x0, /* src_mask */
900 0xfff, /* dst_mask */
0a1b45a2 901 true), /* pcrel_offset */
b8891f8d
AJ
902
903
904};
905
906
907/* Whether GOT overflow checking is needed. */
908static int check_got_overflow = 0;
909
910/* Whether the target 32 bits is forced so that the high
911 16 bits is at the low address. */
912static int need_reverse_bits;
913
914/* Used for relaxation. See csky_relocate_contents. */
915static bfd_vma read_content_substitute;
916
917/* NOTICE!
918 The way the following two look-up functions work demands
919 that BFD_RELOC_CKCORE_xxx are defined contiguously. */
920
921static reloc_howto_type *
922csky_elf_reloc_type_lookup (bfd * abfd ATTRIBUTE_UNUSED,
923 bfd_reloc_code_real_type code)
924{
925 int csky_code = code - BFD_RELOC_CKCORE_NONE;
926
927 if (csky_code < 0 || csky_code >= R_CKCORE_MAX)
928 {
929 switch (code)
930 {
931 case BFD_RELOC_NONE:
932 csky_code = R_CKCORE_NONE;
933 break;
934 case BFD_RELOC_32:
935 csky_code = R_CKCORE_ADDR32;
936 break;
937 case BFD_RELOC_32_PCREL:
938 csky_code = R_CKCORE_PCREL32;
939 break;
940 case BFD_RELOC_VTABLE_INHERIT:
941 csky_code = R_CKCORE_GNU_VTINHERIT;
942 break;
943 case BFD_RELOC_VTABLE_ENTRY:
944 csky_code = R_CKCORE_GNU_VTENTRY;
945 break;
946 case BFD_RELOC_RVA:
947 csky_code = R_CKCORE_RELATIVE;
948 break;
949 default:
950 return (reloc_howto_type *)NULL;
951 }
952 }
953 /* Note: when adding csky bfd reloc types in bfd-in2.h
954 and csky elf reloc types in elf/csky.h,
955 the order of the two reloc type tables should be consistent. */
956 return &csky_elf_howto_table[csky_code];
957}
958
959static reloc_howto_type *
960csky_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
961 const char *r_name)
962{
963 unsigned int i;
964 for (i = 0; i < R_CKCORE_MAX; i++)
965 if (strcasecmp (csky_elf_howto_table[i].name, r_name) == 0)
966 return &csky_elf_howto_table[i];
967 return NULL;
968}
969
970static reloc_howto_type *
971elf32_csky_howto_from_type (unsigned int r_type)
972{
973 if (r_type < R_CKCORE_MAX)
974 return &csky_elf_howto_table[r_type];
975 else
976 return NULL;
977}
978
0a1b45a2 979static bool
b8891f8d
AJ
980csky_elf_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
981 arelent *cache_ptr,
982 Elf_Internal_Rela *dst)
983{
984 unsigned int r_type;
985
986 r_type = ELF32_R_TYPE (dst->r_info);
987 cache_ptr->howto = elf32_csky_howto_from_type (r_type);
988 if (cache_ptr->howto == NULL)
989 {
990 /* xgettext:c-format */
991 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
992 abfd, r_type);
993 bfd_set_error (bfd_error_bad_value);
0a1b45a2 994 return false;
b8891f8d 995 }
0a1b45a2 996 return true;
b8891f8d
AJ
997}
998
999/* The Global Offset Table max size. */
1000#define GOT_MAX_SIZE 0xFFFF8
1001
1002/* The name of the dynamic interpreter. This is put in the .interp
1003 section. */
1004#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
1005
1006/* The size in bytes of an entry in the procedure linkage table. */
1007#define PLT_ENTRY_SIZE 12
1008#define PLT_ENTRY_SIZE_P 16
1009
1010/* The first entry in a procedure linkage table looks like
1011 this. It is set up so that any shared library function that is
1012 called before the relocation has been set up calls the dynamic
1013 linker first. */
1014static const bfd_vma csky_elf_plt_entry_v2[PLT_ENTRY_SIZE / 4] =
1015{
1016 0xd99c2002, /* ldw r12, (gb, 8) */
1017 0xea0d0000, /* movi r13,offset */
1018 0xe8cc0000 /* jmp r12 */
1019};
1020
1021static const bfd_vma csky_elf_plt_entry_v1[PLT_ENTRY_SIZE / 2 ] =
1022{
1023 0x25f0, /* subi r0, 32 */
1024 0x9200, /* stw r2, (r0, 0) */
1025 0x9310, /* stw r3, (r0, 4) */
1026 0x822e, /* ldw r2, (gb, 8) */
1027 0x7301, /* lrw r3, #offset */
1028 0x00c2, /* jmp r2 */
1029};
1030
1031/* Branch stub support. */
1032
1033enum stub_insn_type
1034{
1035 INSN16,
1036 INSN32,
1037 DATA_TYPE
1038};
1039
0a1b45a2 1040bool use_branch_stub = true;
b8891f8d
AJ
1041typedef struct
1042{
1043 bfd_vma data;
1044 enum stub_insn_type type;
1045 unsigned int r_type;
1046 int reloc_addend;
1047} insn_sequence;
1048
1049static const insn_sequence elf32_csky_stub_long_branch[] =
1050{
1051 {0xea8d0002, INSN32, R_CKCORE_NONE, 0x0}, /* lrw t1,[pc+8] */
1052 {0x7834, INSN16, R_CKCORE_NONE, 0x0}, /* jmp t1 */
1053 {0x6c03, INSN16, R_CKCORE_NONE, 0x0}, /* nop */
1054 {0x0, DATA_TYPE, R_CKCORE_ADDR32, 0x0} /* .long addr */
1055};
1056
1057static const insn_sequence elf32_csky_stub_long_branch_jmpi[] =
1058{
1059 {0xeac00001, INSN32, R_CKCORE_NONE, 0x0}, /* jmpi [pc+4] */
1060 {0x0, DATA_TYPE, R_CKCORE_ADDR32, 0x0} /* .long addr */
1061};
1062
1063/* The bsr instruction offset limit. */
1064#define BSR_MAX_FWD_BRANCH_OFFSET (((1 << 25) - 1) << 1)
1065#define BSR_MAX_BWD_BRANCH_OFFSET (-(1 << 26))
1066
1067#define STUB_SUFFIX ".stub"
1068#define STUB_ENTRY_NAME "__%s_veneer"
1069
1070/* One entry per long/short branch stub defined above. */
1071#define DEF_STUBS \
1072 DEF_STUB(long_branch) \
1073 DEF_STUB(long_branch_jmpi)
1074
1075#define DEF_STUB(x) csky_stub_##x,
1076enum elf32_csky_stub_type
1077{
1078 csky_stub_none,
1079 DEF_STUBS
1080};
1081#undef DEF_STUB
1082
1083typedef struct
1084{
1085 const insn_sequence* template_sequence;
1086 int template_size;
1087} stub_def;
1088
1089#define DEF_STUB(x) {elf32_csky_stub_##x, ARRAY_SIZE(elf32_csky_stub_##x)},
1090static const stub_def stub_definitions[] = {
1091 {NULL, 0},
1092 DEF_STUBS
1093};
1094
1095/* The size of the thread control block. */
1096#define TCB_SIZE 8
1097
1098struct csky_elf_obj_tdata
1099{
1100 struct elf_obj_tdata root;
1101
1102 /* tls_type for each local got entry. */
1103 char *local_got_tls_type;
1104};
1105
1106#define csky_elf_local_got_tls_type(bfd) \
1107 (csky_elf_tdata (bfd)->local_got_tls_type)
1108
1109#define csky_elf_tdata(bfd) \
1110 ((struct csky_elf_obj_tdata *) (bfd)->tdata.any)
1111
1112struct elf32_csky_stub_hash_entry
1113{
1114 /* Base hash table entry structure. */
1115 struct bfd_hash_entry root;
1116
1117 /* The stub section. */
1118 asection *stub_sec;
1119
1120 /* Offset within stub_sec of the beginning of this stub. */
1121 bfd_vma stub_offset;
1122
1123 /* Given the symbol's value and its section we can determine its final
1124 value when building the stubs (so the stub knows where to jump). */
1125 bfd_vma target_value;
1126 asection *target_section;
1127
1128 /* Offset to apply to relocation referencing target_value. */
1129 bfd_vma target_addend;
1130
1131 /* The stub type. */
1132 enum elf32_csky_stub_type stub_type;
1133 /* Its encoding size in bytes. */
1134 int stub_size;
1135 /* Its template. */
1136 const insn_sequence *stub_template;
1137 /* The size of the template (number of entries). */
1138 int stub_template_size;
1139
1140 /* The symbol table entry, if any, that this was derived from. */
1141 struct csky_elf_link_hash_entry *h;
1142
1143 /* Destination symbol type. */
1144 unsigned char st_type;
1145
1146 /* Where this stub is being called from, or, in the case of combined
1147 stub sections, the first input section in the group. */
1148 asection *id_sec;
1149
1150 /* The name for the local symbol at the start of this stub. The
1151 stub name in the hash table has to be unique; this does not, so
1152 it can be friendlier. */
1153 char *output_name;
1154};
1155
1156#define csky_stub_hash_lookup(table, string, create, copy) \
1157 ((struct elf32_csky_stub_hash_entry *) \
1158 bfd_hash_lookup ((table), (string), (create), (copy)))
1159
1160/* C-SKY ELF linker hash entry. */
1161struct csky_elf_link_hash_entry
1162{
1163 struct elf_link_hash_entry elf;
1164 int plt_refcount;
1165 /* For sub jsri2bsr relocs count. */
1166 int jsri2bsr_refcount;
b8891f8d
AJ
1167
1168#define GOT_UNKNOWN 0
1169#define GOT_NORMAL 1
1170#define GOT_TLS_GD 2
1171#define GOT_TLS_IE 4
1172
1173 unsigned char tls_type;
1174
1175 /* A pointer to the most recently used stub hash entry against this
1176 symbol. */
1177 struct elf32_csky_stub_hash_entry *stub_cache;
1178};
1179
1180/* Traverse an C-SKY ELF linker hash table. */
0a1b45a2
AM
1181#define csky_elf_link_hash_traverse(table, func, info) \
1182 (elf_link_hash_traverse \
1183 (&(table)->root, \
f3b9cfd1 1184 (bool (*) (struct elf_link_hash_entry *, void *)) (func), \
b8891f8d
AJ
1185 (info)))
1186
1187/* Get the C-SKY ELF linker hash table from a link_info structure. */
0f55320b
AM
1188#define csky_elf_hash_table(p) \
1189 ((is_elf_hash_table ((p)->hash) \
1190 && elf_hash_table_id (elf_hash_table (p)) == CSKY_ELF_DATA) \
1191 ? (struct csky_elf_link_hash_table *) (p)->hash : NULL)
b8891f8d
AJ
1192
1193#define csky_elf_hash_entry(ent) ((struct csky_elf_link_hash_entry*)(ent))
1194
1195/* Array to keep track of which stub sections have been created, and
1196 information on stub grouping. */
1197struct map_stub
1198{
1199 /* This is the section to which stubs in the group will be
1200 attached. */
1201 asection *link_sec;
1202 /* The stub section. */
1203 asection *stub_sec;
1204};
1205
1206/* C-SKY ELF linker hash table. */
1207struct csky_elf_link_hash_table
1208{
1209 struct elf_link_hash_table elf;
1210
b8891f8d
AJ
1211 /* Data for R_CKCORE_TLS_LDM32 relocations. */
1212 union
1213 {
1214 bfd_signed_vma refcount;
1215 bfd_vma offset;
1216 } tls_ldm_got;
1217
1218 /* The stub hash table. */
1219 struct bfd_hash_table stub_hash_table;
1220
1221 /* Linker stub bfd. */
1222 bfd *stub_bfd;
1223
1224 /* Linker call-backs. */
1225 asection * (*add_stub_section) (const char *, asection *);
1226 void (*layout_sections_again) (void);
1227
1228 /* Array to keep track of which stub sections have been created, and
1229 * information on stub grouping. */
1230 struct map_stub *stub_group;
1231
1232 /* Number of elements in stub_group. */
1233 unsigned int top_id;
1234
1235 /* Assorted information used by elf32_csky_size_stubs. */
1236 unsigned int bfd_count;
1237 unsigned int top_index;
1238 asection **input_list;
1239};
1240
1241/* We can't change vectors in the bfd target which will apply to
1242 data sections, however we only do this to the text sections. */
1243
1244static bfd_vma
1245csky_get_insn_32 (bfd *input_bfd,
1246 bfd_byte *location)
1247{
1248 if (bfd_big_endian (input_bfd))
1249 return bfd_get_32 (input_bfd, location);
1250 else
1251 return (bfd_get_16 (input_bfd, location) << 16
1252 | bfd_get_16 (input_bfd, location + 2));
1253}
1254
1255static void
1256csky_put_insn_32 (bfd *input_bfd,
1257 bfd_vma x,
1258 bfd_byte *location)
1259{
1260 if (bfd_big_endian (input_bfd))
1261 bfd_put_32 (input_bfd, x, location);
1262 else
1263 {
1264 bfd_put_16 (input_bfd, x >> 16, location);
1265 bfd_put_16 (input_bfd, x & 0xffff, location + 2);
1266 }
1267}
1268
1269/* Find or create a stub section. Returns a pointer to the stub section, and
1270 the section to which the stub section will be attached (in *LINK_SEC_P).
1271 LINK_SEC_P may be NULL. */
1272
1273static asection *
1274elf32_csky_create_or_find_stub_sec (asection **link_sec_p, asection *section,
1275 struct csky_elf_link_hash_table *htab)
1276{
1277 asection *link_sec;
1278 asection *stub_sec;
1279
1280 link_sec = htab->stub_group[section->id].link_sec;
1281 stub_sec = htab->stub_group[section->id].stub_sec;
1282 if (stub_sec == NULL)
1283 {
1284 stub_sec = htab->stub_group[link_sec->id].stub_sec;
1285 if (stub_sec == NULL)
1286 {
1287 size_t namelen;
1288 bfd_size_type len;
1289 char *s_name;
1290
1291 namelen = strlen (link_sec->name);
1292 len = namelen + sizeof (STUB_SUFFIX);
1293 s_name = bfd_alloc (htab->stub_bfd, len);
1294 if (s_name == NULL)
1295 return NULL;
1296
1297 memcpy (s_name, link_sec->name, namelen);
1298 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
1299 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
1300 if (stub_sec == NULL)
1301 return NULL;
1302 htab->stub_group[link_sec->id].stub_sec = stub_sec;
1303 }
1304 htab->stub_group[section->id].stub_sec = stub_sec;
1305 }
1306
1307 if (link_sec_p)
1308 *link_sec_p = link_sec;
1309
1310 return stub_sec;
1311}
1312
1313/* Build a name for an entry in the stub hash table. */
1314
1315static char *
1316elf32_csky_stub_name (const asection *input_section,
1317 const asection *sym_sec,
1318 const struct csky_elf_link_hash_entry *hash,
1319 const Elf_Internal_Rela *rel)
1320{
1321 char *stub_name;
1322 bfd_size_type len;
1323
1324 if (hash)
1325 {
1326 len = 8 + 1 + strlen (hash->elf.root.root.string) + 1 + 8 + 1;
1327 stub_name = bfd_malloc (len);
1328 if (stub_name != NULL)
1329 sprintf (stub_name, "%08x_%s+%x",
1330 input_section->id & 0xffffffff,
1331 hash->elf.root.root.string,
1332 (int) rel->r_addend & 0xffffffff);
1333 }
1334 else
1335 {
1336 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
1337 stub_name = bfd_malloc (len);
1338 if (stub_name != NULL)
1339 sprintf (stub_name, "%08x_%x:%x+%x",
1340 input_section->id & 0xffffffff,
1341 sym_sec->id & 0xffffffff,
1342 (int) ELF32_R_SYM (rel->r_info) & 0xffffffff,
1343 (int) rel->r_addend & 0xffffffff);
1344 }
1345
1346 return stub_name;
1347}
1348
1349/* Determine the type of stub needed, if any, for a call. */
1350
1351static enum elf32_csky_stub_type
1352csky_type_of_stub (struct bfd_link_info *info,
1353 asection *input_sec,
1354 const Elf_Internal_Rela *rel,
1355 unsigned char st_type,
1356 struct csky_elf_link_hash_entry *hash,
1357 bfd_vma destination,
1358 asection *sym_sec ATTRIBUTE_UNUSED,
1359 bfd *input_bfd ATTRIBUTE_UNUSED,
1360 const char *name ATTRIBUTE_UNUSED)
1361{
1362 bfd_vma location;
1363 bfd_signed_vma branch_offset;
1364 unsigned int r_type;
1365 enum elf32_csky_stub_type stub_type = csky_stub_none;
1366 struct elf_link_hash_entry * h = &hash->elf;
1367
1368 /* We don't know the actual type of destination in case it is of
1369 type STT_SECTION: give up. */
1370 if (st_type == STT_SECTION)
1371 return stub_type;
1372
1373 location = (input_sec->output_offset
1374 + input_sec->output_section->vma
1375 + rel->r_offset);
1376
1377 branch_offset = (bfd_signed_vma)(destination - location);
1378 r_type = ELF32_R_TYPE (rel->r_info);
1379 if (r_type == R_CKCORE_PCREL_IMM26BY2
1380 && ((h != NULL
1381 && ((h->def_dynamic && !h->def_regular)
1382 || (bfd_link_pic (info)
1383 && h->root.type == bfd_link_hash_defweak)))
1384 || branch_offset > BSR_MAX_FWD_BRANCH_OFFSET
1385 || branch_offset < BSR_MAX_BWD_BRANCH_OFFSET))
1386 {
1387 if (bfd_csky_arch (info->output_bfd) == CSKY_ARCH_810
1388 || bfd_csky_arch (info->output_bfd) == CSKY_ARCH_807)
1389 stub_type = csky_stub_long_branch_jmpi;
1390 else
1391 stub_type = csky_stub_long_branch;
1392 }
1393
1394 return stub_type;
1395}
1396
1397/* Create an entry in an C-SKY ELF linker hash table. */
1398
1399static struct bfd_hash_entry *
1400csky_elf_link_hash_newfunc (struct bfd_hash_entry * entry,
1401 struct bfd_hash_table * table,
1402 const char * string)
1403{
1404 struct csky_elf_link_hash_entry * ret =
1405 (struct csky_elf_link_hash_entry *) entry;
1406
1407 /* Allocate the structure if it has not already been allocated by a
1408 subclass. */
1409 if (ret == NULL)
1410 {
1411 ret = (struct csky_elf_link_hash_entry *)
1412 bfd_hash_allocate (table,
1413 sizeof (struct csky_elf_link_hash_entry));
1414 if (ret == NULL)
1415 return (struct bfd_hash_entry *) ret;
1416 }
1417
1418 /* Call the allocation method of the superclass. */
1419 ret = ((struct csky_elf_link_hash_entry *)
1420 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *)ret,
1421 table, string));
1422 if (ret != NULL)
1423 {
1424 struct csky_elf_link_hash_entry *eh;
1425
1426 eh = (struct csky_elf_link_hash_entry *) ret;
b8891f8d
AJ
1427 eh->plt_refcount = 0;
1428 eh->jsri2bsr_refcount = 0;
1429 eh->tls_type = GOT_NORMAL;
1430 ret->stub_cache = NULL;
1431 }
1432
1433 return (struct bfd_hash_entry *) ret;
1434}
1435
1436/* Initialize an entry in the stub hash table. */
1437
1438static struct bfd_hash_entry *
1439stub_hash_newfunc (struct bfd_hash_entry *entry,
1440 struct bfd_hash_table *table,
1441 const char *string)
1442{
1443 /* Allocate the structure if it has not already been allocated by a
1444 subclass. */
1445 if (entry == NULL)
1446 {
1447 entry = ((struct bfd_hash_entry *)
1448 bfd_hash_allocate (table,
1449 sizeof (struct elf32_csky_stub_hash_entry)));
1450 if (entry == NULL)
1451 return entry;
1452 }
1453
1454 /* Call the allocation method of the superclass. */
1455 entry = bfd_hash_newfunc (entry, table, string);
1456 if (entry != NULL)
1457 {
1458 struct elf32_csky_stub_hash_entry *eh;
1459
1460 /* Initialize the local fields. */
1461 eh = (struct elf32_csky_stub_hash_entry *) entry;
1462 eh->stub_sec = NULL;
1463 eh->stub_offset = 0;
1464 eh->target_value = 0;
1465 eh->target_section = NULL;
1466 eh->target_addend = 0;
1467 eh->stub_type = csky_stub_none;
1468 eh->stub_size = 0;
1469 eh->stub_template = NULL;
1470 eh->stub_template_size = -1;
1471 eh->h = NULL;
1472 eh->id_sec = NULL;
1473 eh->output_name = NULL;
1474 }
1475
1476 return entry;
1477}
1478
1479/* Free the derived linker hash table. */
1480
1481static void
1482csky_elf_link_hash_table_free (bfd *obfd)
1483{
1484 struct csky_elf_link_hash_table *ret
1485 = (struct csky_elf_link_hash_table *) obfd->link.hash;
1486
1487 bfd_hash_table_free (&ret->stub_hash_table);
1488 _bfd_elf_link_hash_table_free (obfd);
1489}
1490
1491/* Create an CSKY elf linker hash table. */
1492
1493static struct bfd_link_hash_table *
1494csky_elf_link_hash_table_create (bfd *abfd)
1495{
1496 struct csky_elf_link_hash_table *ret;
986f0783 1497 size_t amt = sizeof (struct csky_elf_link_hash_table);
b8891f8d
AJ
1498
1499 ret = (struct csky_elf_link_hash_table*) bfd_zmalloc (amt);
1500 if (ret == NULL)
1501 return NULL;
1502
1503 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
1504 csky_elf_link_hash_newfunc,
1505 sizeof (struct csky_elf_link_hash_entry),
1506 CSKY_ELF_DATA))
1507 {
1508 free (ret);
1509 return NULL;
1510 }
1511
1512 if (!bfd_hash_table_init (&ret->stub_hash_table, stub_hash_newfunc,
1513 sizeof (struct elf32_csky_stub_hash_entry)))
1514 {
1515 free (ret);
1516 return NULL;
1517 }
1518 ret->elf.root.hash_table_free = csky_elf_link_hash_table_free;
1519 return &ret->elf.root;
1520}
1521
0a1b45a2 1522static bool
b8891f8d
AJ
1523csky_elf_mkobject (bfd *abfd)
1524{
1525 return bfd_elf_allocate_object (abfd, sizeof (struct csky_elf_obj_tdata),
1526 CSKY_ELF_DATA);
1527}
1528
1529/* Adjust a symbol defined by a dynamic object and referenced by a
1530 regular object. The current definition is in some section of the
1531 dynamic object, but we're not including those sections. We have to
1532 change the definition to something the rest of the link can
1533 understand. */
1534
0a1b45a2 1535static bool
b8891f8d
AJ
1536csky_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
1537 struct elf_link_hash_entry *h)
1538{
1539 struct csky_elf_link_hash_entry *eh;
1540 struct csky_elf_link_hash_table *htab;
1541 asection *srel;
1542 asection *s;
1543 eh = (struct csky_elf_link_hash_entry *)h;
1544 if (eh == NULL)
0a1b45a2 1545 return false;
b8891f8d
AJ
1546
1547 htab = csky_elf_hash_table (info);
1548 if (htab == NULL)
0a1b45a2 1549 return false;
b8891f8d
AJ
1550
1551 /* Clear jsri2bsr_refcount, if creating shared library files. */
1552 if (bfd_link_pic (info) && eh->jsri2bsr_refcount > 0)
1553 eh->jsri2bsr_refcount = 0;
1554
1555 /* If there is a function, put it in the procedure linkage table. We
1556 will fill in the contents of the procedure linkage table later. */
1557 if (h->needs_plt)
1558 {
1559 /* Calls to STT_GNU_IFUNC symbols always use a PLT, even if the
1560 symbol binds locally. */
1561 if (h->plt.refcount <= 0
1562 || (h->type != STT_GNU_IFUNC
1563 && (SYMBOL_CALLS_LOCAL (info, h)
1564 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1565 && h->root.type == bfd_link_hash_undefweak))))
1566
1567 {
1568 /* This case can occur if we saw a PLT32 reloc in an input
1569 file, but the symbol was never referred to by a dynamic
1570 object, or if all references were garbage collected. In
1571 such a case, we don't actually need to build a procedure
1572 linkage table, and we can just do a PC32 reloc instead. */
1573 h->plt.offset = (bfd_vma) -1;
1574 h->needs_plt = 0;
1575 if (h->got.refcount == 0)
1576 h->got.refcount += 1;
1577 }
1578 else if (h->got.refcount != 0)
1579 {
1580 h->got.refcount -= eh->plt_refcount;
1581 eh->plt_refcount = 0;
1582 }
0a1b45a2 1583 return true;
b8891f8d
AJ
1584 }
1585 else
1586 /* It's possible that we incorrectly decided a .plt reloc was
1587 needed for an R_CKCORE_PC32 or similar reloc to a non-function
1588 sym in check_relocs. We can't decide accurately between function
1589 and non-function syms in check_relocs; objects loaded later in
1590 the link may change h->type. So fix it now. */
1591 h->plt.offset = (bfd_vma) -1;
1592
1593 /* If this is a weak symbol, and there is a real definition, the
1594 processor independent code will have arranged for us to see the
1595 real definition first, and we can just use the same value. */
1596 if (h->is_weakalias)
1597 {
1598 struct elf_link_hash_entry *def = weakdef (h);
1599 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
1600 h->root.u.def.section = def->root.u.def.section;
1601 h->root.u.def.value = def->root.u.def.value;
0a1b45a2 1602 return true;
b8891f8d
AJ
1603 }
1604
1605 /* If there are no non-GOT references, we do not need a copy
1606 relocation. */
1607 if (!h->non_got_ref)
0a1b45a2 1608 return true;
b8891f8d
AJ
1609
1610 /* This is a reference to a symbol defined by a dynamic object which
1611 is not a function. */
1612
1613 /* If we are creating a shared library, we must presume that the
1614 only references to the symbol are via the global offset table.
1615 For such cases we need not do anything here; the relocations will
1616 be handled correctly by relocate_section. */
1617 if (bfd_link_pic (info) || htab->elf.is_relocatable_executable)
0a1b45a2 1618 return true;
b8891f8d
AJ
1619
1620 /* We must allocate the symbol in our .dynbss section, which will
1621 become part of the .bss section of the executable. There will be
1622 an entry for this symbol in the .dynsym section. The dynamic
1623 object will contain position independent code, so all references
1624 from the dynamic object to this symbol will go through the global
1625 offset table. The dynamic linker will use the .dynsym entry to
1626 determine the address it must put in the global offset table, so
1627 both the dynamic object and the regular object will refer to the
1628 same memory location for the variable. */
1629 /* We must generate a R_CKCORE_COPY reloc to tell the dynamic linker to
1630 copy the initial value out of the dynamic object and into the
1631 runtime process image. We need to remember the offset into the
1632 .rela.bss section we are going to use. */
1633 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
1634 {
1635 s = htab->elf.sdynrelro;
1636 srel = htab->elf.sreldynrelro;
1637 }
1638 else
1639 {
1640 s = htab->elf.sdynbss;
1641 srel = htab->elf.srelbss;
1642 }
1643 if (info->nocopyreloc == 0
1644 && (h->root.u.def.section->flags & SEC_ALLOC) != 0
1645 && h->size != 0
1646 && srel != NULL
1647 && s != NULL)
1648 {
1649 srel->size += sizeof (Elf32_External_Rela);
1650 h->needs_copy = 1;
1651 return _bfd_elf_adjust_dynamic_copy (info, h, s);
1652 }
1653
1654 h->non_got_ref = 0;
0a1b45a2 1655 return true;
b8891f8d
AJ
1656}
1657
1658/* Allocate space in .plt, .got and associated reloc sections for
1659 dynamic relocs. */
1660
0a1b45a2 1661static bool
f3b9cfd1 1662csky_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
b8891f8d
AJ
1663{
1664 struct bfd_link_info *info;
1665 struct csky_elf_link_hash_table *htab;
1666 struct csky_elf_link_hash_entry *eh;
1667 struct elf_dyn_relocs *p;
1668
1669 /* For indirect case, such as _ZdlPv to _ZdlPv@@GLIBCXX_3.4. */
1670 if (h->root.type == bfd_link_hash_indirect)
0a1b45a2 1671 return true;
b8891f8d
AJ
1672
1673 if (h->root.type == bfd_link_hash_warning)
1674 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1675
1676
1677 info = (struct bfd_link_info *) inf;
1678 htab = csky_elf_hash_table (info);
1679 if (htab == NULL)
0a1b45a2 1680 return false;
b8891f8d
AJ
1681 /*TODO: how to deal with weak symbol relocs. */
1682 if ((htab->elf.dynamic_sections_created || h->type == STT_GNU_IFUNC)
1683 && h->plt.refcount > 0)
1684 {
1685 /* Make sure this symbol is output as a dynamic symbol.
1686 Undefined weak syms won't yet be marked as dynamic. */
1687 if (h->dynindx == -1 && !h->forced_local
1688 && h->root.type == bfd_link_hash_undefweak
1689 && ! bfd_elf_link_record_dynamic_symbol (info, h))
0a1b45a2 1690 return false;
b8891f8d
AJ
1691 if (bfd_link_pic (info) || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
1692 {
1693 asection *splt = htab->elf.splt;
1694
1695 /* If this is the first .plt entry, make room for the special
1696 first entry. */
1697 if (splt->size == 0)
1698 {
1699 if (bfd_csky_abi (info->output_bfd) == CSKY_ABI_V1)
1700 splt->size += PLT_ENTRY_SIZE_P;
1701 else
1702 splt->size += PLT_ENTRY_SIZE;
1703 }
1704 h->plt.offset = splt->size;
1705
1706 /* If this symbol is not defined in a regular file, and we are
1707 not generating a shared library, then set the symbol to this
1708 location in the .plt. This is required to make function
1709 pointers compare as equal between the normal executable and
1710 the shared library. */
1711 if (!bfd_link_pic (info) && !h->def_regular)
1712 {
1713 h->root.u.def.section = splt;
1714 h->root.u.def.value = h->plt.offset;
1715 }
1716
1717 /* Make room for this entry. */
1718 if (bfd_csky_abi (info->output_bfd) == CSKY_ABI_V1)
1719 splt->size += PLT_ENTRY_SIZE_P;
1720 else
1721 splt->size += PLT_ENTRY_SIZE;
1722 /* We also need to make an entry in the .rela.plt section. */
1723 htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
1724
1725 /* We also need to make an entry in the .got.plt section, which
1726 will be placed in the .got section by the linker script. */
1727 htab->elf.sgotplt->size += 4;
1728 }
1729 else
1730 {
1731 h->plt.offset = (bfd_vma) -1;
1732 h->needs_plt = 0;
1733 }
1734 }
1735 else
1736 {
1737 h->plt.offset = (bfd_vma) -1;
1738 h->needs_plt = 0;
1739 }
1740
1741 if (h->got.refcount > 0)
1742 {
1743 asection *sgot;
0a1b45a2 1744 bool dyn;
b8891f8d
AJ
1745 int indx;
1746
1747 int tls_type = csky_elf_hash_entry (h)->tls_type;
1748 /* Make sure this symbol is output as a dynamic symbol.
1749 Undefined weak syms won't yet be marked as dynamic. */
1750 if (h->dynindx == -1 && !h->forced_local
1751 && h->root.type == bfd_link_hash_undefweak
1752 && ! bfd_elf_link_record_dynamic_symbol (info, h))
0a1b45a2 1753 return false;
b8891f8d
AJ
1754
1755 sgot = htab->elf.sgot;
1756 h->got.offset = sgot->size;
1757 BFD_ASSERT (tls_type != GOT_UNKNOWN);
1758 if (tls_type == GOT_NORMAL)
1759 /* Non-TLS symbols need one GOT slot. */
1760 sgot->size += 4;
1761 else
1762 {
1763 if (tls_type & GOT_TLS_GD)
1764 /* R_CKCORE_TLS_GD32 needs 2 consecutive GOT slots. */
1765 sgot->size += 8;
1766 if (tls_type & GOT_TLS_IE)
1767 /* R_CKCORE_TLS_IE32 needs one GOT slot. */
1768 sgot->size += 4;
1769 }
1770 dyn = htab->elf.dynamic_sections_created;
1771 indx = 0;
1772 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, bfd_link_pic (info), h)
1773 && (! bfd_link_pic (info) || !SYMBOL_REFERENCES_LOCAL (info, h)))
1774 indx = h->dynindx;
1775
1776 if (tls_type != GOT_NORMAL
1777 && (bfd_link_pic (info) || indx != 0)
1778 && ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1779 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
1780 || h->root.type != bfd_link_hash_undefweak))
1781 {
1782 if (tls_type & GOT_TLS_IE)
1783 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1784 if (tls_type & GOT_TLS_GD)
1785 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1786 if ((tls_type & GOT_TLS_GD) && indx != 0)
1787 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1788 }
1789 else if (((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1790 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
1791 || h->root.type != bfd_link_hash_undefweak)
1792 && (bfd_link_pic (info)
1793 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)
1794 || h->plt.offset == (bfd_vma) -1))
1795 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1796 }
1797 else
1798 h->got.offset = (bfd_vma) -1;
1799
1800 eh = (struct csky_elf_link_hash_entry *) h;
190eb1dd 1801 if (h->dyn_relocs == NULL)
0a1b45a2 1802 return true;
b8891f8d
AJ
1803
1804 /* In the shared -Bsymbolic case, discard space allocated for
1805 dynamic pc-relative relocs against symbols which turn out to be
1806 defined in regular objects. For the normal shared case, discard
1807 space for pc-relative relocs that have become local due to symbol
1808 visibility changes. */
1809
1810 if (bfd_link_pic (info))
1811 {
1812 if (SYMBOL_CALLS_LOCAL (info, h))
1813 {
1814 struct elf_dyn_relocs **pp;
1815
190eb1dd 1816 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
b8891f8d
AJ
1817 {
1818 p->count -= p->pc_count;
1819 p->pc_count = 0;
1820 if (p->count == 0)
1821 *pp = p->next;
1822 else
1823 pp = &p->next;
1824 }
1825 }
1826
1827 if (eh->jsri2bsr_refcount
1828 && h->root.type == bfd_link_hash_defined
190eb1dd
L
1829 && h->dyn_relocs != NULL)
1830 h->dyn_relocs->count -= eh->jsri2bsr_refcount;
b8891f8d
AJ
1831
1832 /* Also discard relocs on undefined weak syms with non-default
1833 visibility. */
190eb1dd 1834 if (h->dyn_relocs != NULL
b8891f8d
AJ
1835 && h->root.type == bfd_link_hash_undefweak)
1836 {
1837 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1838 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
190eb1dd 1839 h->dyn_relocs = NULL;
b8891f8d
AJ
1840
1841 /* Make sure undefined weak symbols are output as a dynamic
1842 symbol in PIEs. */
1843 else if (h->dynindx == -1
1844 && !h->forced_local
1845 && !bfd_elf_link_record_dynamic_symbol (info, h))
0a1b45a2 1846 return false;
b8891f8d
AJ
1847 }
1848
1849 }
1850 else
1851 {
1852 /* For the non-shared case, discard space for relocs against
1853 symbols which turn out to need copy relocs or are not
1854 dynamic. */
1855
1856 if (!h->non_got_ref
1857 && ((h->def_dynamic && !h->def_regular)
1858 || (htab->elf.dynamic_sections_created
1859 && (h->root.type == bfd_link_hash_undefweak
1860 || h->root.type == bfd_link_hash_indirect
1861 || h->root.type == bfd_link_hash_undefined))))
1862 {
1863 /* Make sure this symbol is output as a dynamic symbol.
1864 Undefined weak syms won't yet be marked as dynamic. */
1865 if (h->dynindx == -1 && !h->forced_local
1866 && h->root.type == bfd_link_hash_undefweak)
1867 {
1868 if (! bfd_elf_link_record_dynamic_symbol (info, h))
0a1b45a2 1869 return false;
b8891f8d
AJ
1870 }
1871
1872 /* If that succeeded, we know we'll be keeping all the
1873 relocs. */
1874 if (h->dynindx != -1)
1875 goto keep;
1876 }
1877
190eb1dd 1878 h->dyn_relocs = NULL;
b8891f8d
AJ
1879
1880 keep: ;
1881 }
1882
1883 /* Finally, allocate space. */
190eb1dd 1884 for (p = h->dyn_relocs; p != NULL; p = p->next)
b8891f8d
AJ
1885 {
1886 asection *srelgot = htab->elf.srelgot;
1887 srelgot->size += p->count * sizeof (Elf32_External_Rela);
1888 }
1889
0a1b45a2 1890 return true;
b8891f8d
AJ
1891}
1892
b8891f8d
AJ
1893/* Set the sizes of the dynamic sections. */
1894
0a1b45a2 1895static bool
b8891f8d
AJ
1896csky_elf_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
1897 struct bfd_link_info *info)
1898{
1899 struct csky_elf_link_hash_table *htab;
1900 bfd *dynobj;
1901 asection *s;
0a1b45a2 1902 bool relocs;
b8891f8d
AJ
1903 bfd *ibfd;
1904
1905 htab = csky_elf_hash_table (info);
1906 if (htab == NULL)
0a1b45a2 1907 return false;
b8891f8d
AJ
1908 dynobj = htab->elf.dynobj;
1909 if (dynobj == NULL)
0a1b45a2 1910 return false;
b8891f8d
AJ
1911
1912 if (htab->elf.dynamic_sections_created)
1913 {
1914 /* Set the contents of the .interp section to the interpreter. */
1915 if (!bfd_link_pic (info) && !info->nointerp)
1916 {
1917 s = bfd_get_section_by_name (dynobj, ".interp");
1918 BFD_ASSERT (s != NULL);
1919 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
1920 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1921 }
1922 }
1923
1924 /* Set up .got offsets for local syms, and space for local dynamic
1925 relocs. */
1926 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1927 {
1928 bfd_signed_vma *local_got_refcounts;
1929 bfd_signed_vma *end_local_got;
1930 bfd_size_type locsymcount;
1931 Elf_Internal_Shdr *symtab_hdr;
1932 asection *srelgot, *sgot;
1933 char *local_tls_type;
1934
1935 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
1936 continue;
1937
1938 sgot = htab->elf.sgot;
1939 srelgot = htab->elf.srelgot;
1940
1941 for (s = ibfd->sections; s != NULL; s = s->next)
1942 {
1943 struct elf_dyn_relocs *p;
1944
3318d800 1945 for (p = elf_section_data (s)->local_dynrel;
b8891f8d
AJ
1946 p != NULL;
1947 p = p->next)
1948 {
1949 if (!bfd_is_abs_section (p->sec)
1950 && bfd_is_abs_section (p->sec->output_section))
1951 /* Input section has been discarded, either because
1952 it is a copy of a linkonce section or due to
1953 linker script /DISCARD/, so we'll be discarding
1954 the relocs too. */
1955 ;
1956 else if (p->count != 0)
1957 {
1958 srelgot->size += p->count * sizeof (Elf32_External_Rela);
1959 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
1960 info->flags |= DF_TEXTREL;
1961 }
1962 }
1963 }
1964
1965 local_got_refcounts = elf_local_got_refcounts (ibfd);
1966 if (!local_got_refcounts)
1967 continue;
1968
1969 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
1970 locsymcount = symtab_hdr->sh_info;
1971 end_local_got = local_got_refcounts + locsymcount;
1972 local_tls_type = csky_elf_local_got_tls_type (ibfd);
1973
1974 for (; local_got_refcounts < end_local_got;
1975 ++local_got_refcounts, ++local_tls_type)
1976 {
1977 if (*local_got_refcounts > 0)
1978 {
1979 /* GOT_TLS_GD and GOT_TLS_IE type for TLS, GOT_NORMAL type
1980 for GOT. If output file is shared library, we should output
1981 GOT_TLS_GD type relocation in .rel.got. */
1982 *local_got_refcounts = sgot->size;
1983 if (*local_tls_type & GOT_TLS_GD)
1984 /* TLS_GD relocs need an 8-byte structure in the GOT. */
1985 sgot->size += 8;
1986 if (*local_tls_type & GOT_TLS_IE)
1987 sgot->size += 4;
1988 if (*local_tls_type == GOT_NORMAL)
1989 sgot->size += 4;
1990 if (bfd_link_pic (info) || *local_tls_type == GOT_TLS_GD)
1991 srelgot->size += sizeof (Elf32_External_Rela);
1992 }
1993 else
1994 *local_got_refcounts = (bfd_vma) -1;
1995 }
1996 }
1997
1998 if (htab->tls_ldm_got.refcount > 0)
1999 {
2000 /* Allocate two GOT entries and one dynamic relocation (if necessary)
2001 for R_CSKY_TLS_LDM32 relocations. */
2002 htab->tls_ldm_got.offset = htab->elf.sgot->size;
2003 htab->elf.sgot->size += 8;
2004 if (bfd_link_pic (info))
2005 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
2006 }
2007 else
2008 htab->tls_ldm_got.offset = -1;
2009
2010 /* Allocate global sym .plt and .got entries, and space for global
2011 sym dynamic relocs. */
f3b9cfd1 2012 elf_link_hash_traverse (&htab->elf, csky_allocate_dynrelocs, info);
b8891f8d
AJ
2013
2014 /* Check for GOT overflow. */
2015 if (check_got_overflow == 1
2016 && htab->elf.sgot->size + htab->elf.sgotplt->size > GOT_MAX_SIZE)
2017 {
2018 _bfd_error_handler (_("GOT table size out of range")); /* */
0a1b45a2 2019 return false;
b8891f8d
AJ
2020 }
2021
2022 /* We now have determined the sizes of the various dynamic sections.
2023 Allocate memory for them. */
0a1b45a2 2024 relocs = false;
b8891f8d
AJ
2025 for (s = dynobj->sections; s != NULL; s = s->next)
2026 {
0a1b45a2 2027 bool strip_section = true;
b8891f8d
AJ
2028
2029 if ((s->flags & SEC_LINKER_CREATED) == 0)
2030 continue;
2031
2032 if (s == htab->elf.splt
2033 || s == htab->elf.sgot
2034 || s == htab->elf.sgotplt
2035 || s == htab->elf.sdynrelro
2036 || s == htab->elf.sreldynrelro)
2037 {
2038 /* Strip this section if we don't need it;
2039 see the comment below. */
2040 /* We'd like to strip these sections if they aren't needed, but if
2041 we've exported dynamic symbols from them we must leave them.
2042 It's too late to tell BFD to get rid of the symbols. */
2043
2044 if (htab->elf.hplt != NULL)
0a1b45a2 2045 strip_section = false;
b8891f8d 2046 }
08dedd66 2047 else if (startswith (bfd_section_name (s), ".rel") )
b8891f8d
AJ
2048 {
2049 if (s->size != 0 )
0a1b45a2 2050 relocs = true;
b8891f8d
AJ
2051
2052 /* We use the reloc_count field as a counter if we need
2053 to copy relocs into the output file. */
2054 s->reloc_count = 0;
2055 }
2056 else
2057 /* It's not one of our sections, so don't allocate space. */
2058 continue;
2059
2060 /* Strip this section if we don't need it; see the
2061 comment below. */
2062 if (s->size == 0)
2063 {
2064 /* If we don't need this section, strip it from the
2065 output file. This is mostly to handle .rel.bss and
2066 .rel.plt. We must create both sections in
2067 create_dynamic_sections, because they must be created
2068 before the linker maps input sections to output
2069 sections. The linker does that before
2070 adjust_dynamic_symbol is called, and it is that
2071 function which decides whether anything needs to go
2072 into these sections. */
2073 if (strip_section)
2074 s->flags |= SEC_EXCLUDE;
2075 continue;
2076 }
2077
2078 if ((s->flags & SEC_HAS_CONTENTS) == 0)
2079 continue;
2080
2081 /* Allocate memory for the section contents. We use bfd_zalloc
2082 here in case unused entries are not reclaimed before the
2083 section's contents are written out. This should not happen,
2084 but this way if it does, we get a R_CKCORE_NONE reloc instead
2085 of garbage. */
2086 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
2087 if (s->contents == NULL)
0a1b45a2 2088 return false;
b8891f8d
AJ
2089 }
2090
2091 if (htab->elf.dynamic_sections_created)
2c8e3708
L
2092 htab->elf.dt_pltgot_required = htab->elf.sgot->size != 0;
2093 return _bfd_elf_add_dynamic_tags (output_bfd, info, relocs);
b8891f8d
AJ
2094}
2095
2096/* Finish up dynamic symbol handling. We set the contents of various
2097 dynamic sections here. */
2098
0a1b45a2 2099static bool
b8891f8d
AJ
2100csky_elf_finish_dynamic_symbol (bfd *output_bfd,
2101 struct bfd_link_info *info,
2102 struct elf_link_hash_entry *h,
2103 Elf_Internal_Sym *sym)
2104{
2105 struct csky_elf_link_hash_table *htab;
2106
2107 htab = csky_elf_hash_table (info);
2108 if (htab == NULL)
0a1b45a2 2109 return false;
b8891f8d
AJ
2110
2111 /* Sanity check to make sure no unexpected symbol reaches here.
2112 This matches the test in csky_elf_relocate_section handling
2113 of GOT/PLT entries. */
2114 BFD_ASSERT (! (h->dynindx == -1
2115 && !h->forced_local
2116 && h->root.type != bfd_link_hash_undefweak
2117 && bfd_link_pic (info)));
2118
2119 if (h->plt.offset != (bfd_vma) -1)
2120 {
2121 bfd_vma plt_index;
2122 bfd_vma got_offset;
2123 Elf_Internal_Rela rel;
2124 bfd_byte *loc;
2125 asection *plt, *relplt, *gotplt;
2126
2127 plt = htab->elf.splt;
2128 relplt = htab->elf.srelplt;
2129 gotplt = htab->elf.sgotplt;
2130
2131 /* This symbol has an entry in the procedure linkage table. Set
2132 it up. */
2133 BFD_ASSERT (h->dynindx != -1
2134 || ((h->forced_local || bfd_link_executable (info))
2135 && h->def_regular));
2136 BFD_ASSERT (plt != NULL && gotplt != NULL && relplt != NULL);
2137 if (bfd_csky_abi (output_bfd) == CSKY_ABI_V2)
2138 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
2139 else
2140 plt_index = h->plt.offset / PLT_ENTRY_SIZE_P - 1;
2141 got_offset = (plt_index + 3) * 4;
2142
2143 /* Fill in the entry in the procedure linkage table. */
2144 if (bfd_csky_abi (output_bfd) == CSKY_ABI_V2)
2145 {
2146 csky_put_insn_32 (output_bfd, csky_elf_plt_entry_v2[0],
2147 plt->contents + h->plt.offset);
2148 csky_put_insn_32 (output_bfd,
2149 (csky_elf_plt_entry_v2[1] | plt_index),
2150 plt->contents + h->plt.offset + 4);
2151 csky_put_insn_32 (output_bfd, csky_elf_plt_entry_v2[2],
2152 plt->contents + h->plt.offset + 8);
2153 }
2154 else
2155 {
2156 int i;
2157 for (i = 0; i < 6; i++)
2158 bfd_put_16 (output_bfd, csky_elf_plt_entry_v1[i],
2159 plt->contents + h->plt.offset + i * 2);
2160 bfd_put_32 (output_bfd, plt_index,
2161 plt->contents + h->plt.offset + i * 2);
2162 }
2163
2164 /* Fill in the entry in the .rel.plt section. */
2165 rel.r_offset = (htab->elf.sgotplt->output_section->vma
2166 + htab->elf.sgotplt->output_offset
2167 + got_offset);
2168 rel.r_info = ELF32_R_INFO (h->dynindx, R_CKCORE_JUMP_SLOT);
2169 rel.r_addend = (plt->output_section->vma
2170 + plt->output_offset
2171 + h->plt.offset);
2172 loc = (htab->elf.srelplt->contents
2173 + plt_index * sizeof (Elf32_External_Rela));
2174
2175 if (loc != NULL)
2176 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
2177 if (! h->def_regular)
2178 {
2179 /* Mark the symbol as undefined, rather than as defined in
2180 the .plt section. Leave the value alone. */
2181 sym->st_shndx = SHN_UNDEF;
2182 /* If the symbol is weak, we do need to clear the value.
2183 Otherwise, the PLT entry would provide a definition for
2184 the symbol even if the symbol wasn't defined anywhere,
2185 and so the symbol would never be NULL. Leave the value if
2186 there were any relocations where pointer equality matters
2187 (this is a clue for the dynamic linker, to make function
2188 pointer comparisons work between an application and shared
2189 library). */
2190 if (!h->ref_regular_nonweak || !h->pointer_equality_needed)
2191 sym->st_value = 0;
2192 }
2193 }
2194
2195 /* Fill in the entry in the .got section. */
2196 if (h->got.offset != (bfd_vma) -1
2197 && ((csky_elf_hash_entry (h)->tls_type & GOT_TLS_GD) == 0)
2198 && ((csky_elf_hash_entry (h)->tls_type & GOT_TLS_IE) == 0))
2199 {
2200 Elf_Internal_Rela rel;
2201 bfd_byte *loc;
2202
2203 /* This symbol has an entry in the global offset table.
2204 Set it up. */
2205 BFD_ASSERT (htab->elf.sgot != NULL && htab->elf.srelgot != NULL);
2206
2207 rel.r_offset = (htab->elf.sgot->output_section->vma
2208 + htab->elf.sgot->output_offset
2209 + (h->got.offset & ~(bfd_vma) 1));
2210
2211 /* If this is a static link, or it is a -Bsymbolic link and the
2212 symbol is defined locally or was forced to be local because
2213 of a version file, we just want to emit a RELATIVE reloc.
2214 The entry in the global offset table will already have been
2215 initialized in the relocate_section function. */
2216 if (bfd_link_pic (info) && SYMBOL_REFERENCES_LOCAL (info, h))
2217 {
2218 BFD_ASSERT ((h->got.offset & 1) != 0);
2219 rel.r_info = ELF32_R_INFO (0, R_CKCORE_RELATIVE);
2220 rel.r_addend = (h->root.u.def.value
2221 + h->root.u.def.section->output_offset
2222 + h->root.u.def.section->output_section->vma);
2223 }
2224 else
2225 {
2226 BFD_ASSERT ((h->got.offset & 1) == 0);
2227 bfd_put_32 (output_bfd, (bfd_vma) 0,
2228 htab->elf.sgot->contents + h->got.offset);
2229 rel.r_info = ELF32_R_INFO (h->dynindx, R_CKCORE_GLOB_DAT);
2230 rel.r_addend = 0;
2231 }
2232
2233 loc = htab->elf.srelgot->contents;
2234 loc += htab->elf.srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
2235
2236 if (loc != NULL)
2237 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
2238 }
2239
2240 if (h->needs_copy)
2241 {
2242 asection *s;
2243 Elf_Internal_Rela rela;
2244 bfd_byte *loc;
2245
2246 /* This symbol needs a copy reloc. Set it up. */
2247 BFD_ASSERT (h->dynindx != -1
2248 && (h->root.type == bfd_link_hash_defined
2249 || h->root.type == bfd_link_hash_defweak));
2250
2251 rela.r_offset = (h->root.u.def.value
2252 + h->root.u.def.section->output_section->vma
2253 + h->root.u.def.section->output_offset);
2254 rela.r_info = ELF32_R_INFO (h->dynindx, R_CKCORE_COPY);
2255 rela.r_addend = 0;
2256 if (h->root.u.def.section == htab->elf.sdynrelro)
2257 s = htab->elf.sreldynrelro;
2258 else
2259 s = htab->elf.srelbss;
2260 BFD_ASSERT (s != NULL);
2261 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
2262 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
2263 }
2264
2265 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
2266 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
2267 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
2268 sym->st_shndx = SHN_ABS;
2269
0a1b45a2 2270 return true;
b8891f8d
AJ
2271}
2272
2273/* Finish up the dynamic sections. */
2274
0a1b45a2 2275static bool
b8891f8d
AJ
2276csky_elf_finish_dynamic_sections (bfd *output_bfd,
2277 struct bfd_link_info *info)
2278{
2279 struct csky_elf_link_hash_table *htab;
2280 bfd *dynobj;
2281 asection *sdyn;
2282 asection *got_sec;
2283
2284 htab = csky_elf_hash_table (info);
2285 if (htab == NULL)
0a1b45a2 2286 return false;
b8891f8d
AJ
2287
2288 dynobj = htab->elf.dynobj;
2289 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
2290
2291 if (htab->elf.dynamic_sections_created)
2292 {
2293 Elf32_External_Dyn *dyncon, *dynconend;
2294
2295 BFD_ASSERT (sdyn != NULL && htab->elf.sgot != NULL);
2296
2297 dyncon = (Elf32_External_Dyn *) sdyn->contents;
2298 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
2299 for (; dyncon < dynconend; dyncon++)
2300 {
2301 Elf_Internal_Dyn dyn;
0a1b45a2 2302 bool size = false;
b8891f8d
AJ
2303 const char *name = NULL;
2304
2305 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
2306 switch (dyn.d_tag)
2307 {
2308 default:
2309 continue;
2310 case DT_RELA:
2311 name = ".rela.dyn";
0a1b45a2 2312 size = false;
b8891f8d
AJ
2313 break;
2314 case DT_RELASZ:
2315 name = ".rela.dyn";
0a1b45a2 2316 size = true;
b8891f8d
AJ
2317 break;
2318 case DT_PLTRELSZ:
2319 name = ".rela.plt";
0a1b45a2 2320 size = true;
b8891f8d
AJ
2321 break;
2322 case DT_PLTGOT:
2323 dyn.d_un.d_ptr = htab->elf.sgot->output_section->vma;
2324 break;
2325 case DT_JMPREL:
2326 dyn.d_un.d_ptr = htab->elf.srelplt->output_section->vma
2327 + htab->elf.srelplt->output_offset;
2328 break;
2329 }
2330
2331 if (name != NULL)
2332 {
2333 asection *s = bfd_get_section_by_name (output_bfd, name);
2334
2335 if (s == NULL)
2336 dyn.d_un.d_val = 0;
2337 else if (!size)
2338 dyn.d_un.d_ptr = s->vma;
2339 else
2340 dyn.d_un.d_val = s->size;
2341 }
2342 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2343 }
2344 }
2345
2346 /* Fill in the first three entries in the global offset table. */
2347 if (htab->elf.sgotplt)
2348 got_sec = htab->elf.sgotplt;
2349 else
2350 got_sec = htab->elf.sgot;
2351 if (got_sec != NULL)
2352 {
2353 if (got_sec->size > 0)
2354 {
2355 bfd_put_32 (output_bfd,
2356 (sdyn == NULL ? (bfd_vma) 0
2357 : sdyn->output_section->vma + sdyn->output_offset),
2358 got_sec->contents);
2359 bfd_put_32 (output_bfd, (bfd_vma) 0, got_sec->contents + 4);
2360 bfd_put_32 (output_bfd, (bfd_vma) 0, got_sec->contents + 8);
2361 }
2362 elf_section_data (got_sec->output_section)->this_hdr.sh_entsize = 4;
2363 }
0a1b45a2 2364 return true;
b8891f8d
AJ
2365}
2366
2367/* Copy the extra info we tack onto an elf_link_hash_entry. */
2368
2369static void
2370csky_elf_copy_indirect_symbol (struct bfd_link_info *info,
2371 struct elf_link_hash_entry *dir,
2372 struct elf_link_hash_entry *ind)
2373{
2374 struct csky_elf_link_hash_entry *edir, *eind;
2375
2376 edir = (struct csky_elf_link_hash_entry *) dir;
2377 eind = (struct csky_elf_link_hash_entry *) ind;
2378
b8891f8d
AJ
2379 if (ind->root.type == bfd_link_hash_indirect
2380 && dir->got.refcount <= 0)
2381 {
2382 edir->tls_type = eind->tls_type;
2383 eind->tls_type = GOT_UNKNOWN;
2384 }
2385 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
2386}
2387
2388/* Used to decide how to sort relocs in an optimal manner for the
2389 dynamic linker, before writing them out. */
2390
2391static enum elf_reloc_type_class
2392csky_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
2393 const asection *rel_sec ATTRIBUTE_UNUSED,
2394 const Elf_Internal_Rela *rela)
2395{
2396 switch ((int) ELF32_R_TYPE (rela->r_info))
2397 {
2398 case R_CKCORE_RELATIVE:
2399 return reloc_class_relative;
2400 case R_CKCORE_JUMP_SLOT:
2401 return reloc_class_plt;
2402 case R_CKCORE_COPY:
2403 return reloc_class_copy;
2404 case R_CKCORE_IRELATIVE:
2405 return reloc_class_ifunc;
2406 default:
2407 return reloc_class_normal;
2408 }
2409}
2410
2411/* Return the section that should be marked against GC for a given
2412 relocation. */
2413
2414static asection *
2415csky_elf_gc_mark_hook (asection *sec,
2416 struct bfd_link_info *info,
2417 Elf_Internal_Rela *rel,
2418 struct elf_link_hash_entry *h,
2419 Elf_Internal_Sym *sym)
2420{
2421 if (h != NULL)
2422 {
2423 switch (ELF32_R_TYPE (rel->r_info))
2424 {
2425 case R_CKCORE_GNU_VTINHERIT:
2426 case R_CKCORE_GNU_VTENTRY:
2427 return NULL;
2428 }
2429 }
2430
2431 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2432}
2433
5072b52d
AM
2434/* Match symbol names created by tc-csky.c:make_mapping_symbol. */
2435
2436static bool
2437is_mapping_symbol_name (const char *name)
2438{
2439 return (name && name[0] == '$'
2440 && (name[1] == 't' || name[1] == 'd')
2441 && name[2] == 0);
2442}
2443
2444/* Treat mapping symbols as special target symbols. */
2445
2446static bool
2447csky_elf_is_target_special_symbol (bfd *abfd ATTRIBUTE_UNUSED, asymbol *sym)
2448{
2449 return is_mapping_symbol_name (sym->name);
2450}
2451
2452/* Exclude mapping symbols from being treated as function symbols by
2453 objdump and nm. */
2454
2455static bfd_size_type
2456csky_elf_maybe_function_sym (const asymbol *sym, asection *sec,
2457 bfd_vma *code_off)
2458{
2459 if ((sym->flags & BSF_LOCAL) != 0
2460 && is_mapping_symbol_name (sym->name))
2461 return 0;
2462
2463 return _bfd_elf_maybe_function_sym (sym, sec, code_off);
2464}
2465
b8891f8d
AJ
2466/* Look through the relocs for a section during the first phase.
2467 Since we don't do .gots or .plts, we just need to consider the
2468 virtual table relocs for gc. */
2469
0a1b45a2 2470static bool
b8891f8d
AJ
2471csky_elf_check_relocs (bfd * abfd,
2472 struct bfd_link_info * info,
2473 asection * sec,
2474 const Elf_Internal_Rela * relocs)
2475{
2476 Elf_Internal_Shdr * symtab_hdr;
2477 struct elf_link_hash_entry ** sym_hashes;
2478 const Elf_Internal_Rela * rel;
2479 const Elf_Internal_Rela * rel_end;
2480 struct csky_elf_link_hash_table *htab;
2481 asection *sreloc;
2482
2483 /* if output type is relocatable, return. */
2484 if (bfd_link_relocatable (info))
0a1b45a2 2485 return true;
b8891f8d
AJ
2486
2487 htab = csky_elf_hash_table (info);
2488 if (htab == NULL)
0a1b45a2 2489 return false;
b8891f8d
AJ
2490
2491 symtab_hdr = & elf_tdata (abfd)->symtab_hdr;
2492 sym_hashes = elf_sym_hashes (abfd);
2493
2494 rel_end = relocs + sec->reloc_count;
2495 sreloc = NULL;
2496 for (rel = relocs; rel < rel_end; rel++)
2497 {
2498 struct elf_link_hash_entry *h;
2499 unsigned long r_symndx;
2500 Elf_Internal_Sym *isym;
2501 int r_type;
2502
2503 r_symndx = ELF32_R_SYM (rel->r_info);
2504 r_type = ELF32_R_TYPE (rel->r_info);
2505 if (r_symndx < symtab_hdr->sh_info)
2506 {
2507 /* A local symbol. */
f1dfbfdb 2508 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
b8891f8d
AJ
2509 abfd, r_symndx);
2510 if (isym == NULL)
0a1b45a2 2511 return false;
b8891f8d
AJ
2512 h = NULL;
2513 }
2514 else
2515 {
2516 isym = NULL;
2517 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2518 while (h->root.type == bfd_link_hash_indirect
2519 || h->root.type == bfd_link_hash_warning)
2520 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2521 }
2522
2523 switch (r_type)
2524 {
2525 case R_CKCORE_PCREL_IMM26BY2:
2526 case R_CKCORE_PCREL_IMM11BY2:
2527 case R_CKCORE_PCREL_JSR_IMM11BY2:
2528 case R_CKCORE_PCREL_JSR_IMM26BY2:
2529 /* If the symbol is '*UND*', means this reloc is used for
2530 * callgraph, don't need to leave to shared object. */
2531 if (r_symndx == 0)
2532 break;
2533 /* Else fall through. */
2534 case R_CKCORE_ADDR32:
2535 case R_CKCORE_ADDR_HI16:
2536 case R_CKCORE_ADDR_LO16:
2537 if (h != NULL
2538 && bfd_link_executable (info)
2539 && r_type == R_CKCORE_ADDR32
2540 && h->type == STT_OBJECT
2541 && (sec->flags & SEC_ALLOC) != 0
2542 && (sec->flags & SEC_READONLY))
2543 /* If this reloc is in a read-only section, we might
2544 need a copy reloc. We can't check reliably at this
2545 stage whether the section is read-only, as input
2546 sections have not yet been mapped to output sections.
2547 Tentatively set the flag for now, and correct in
2548 adjust_dynamic_symbol. */
2549 h->non_got_ref = 1;
2550
2551 /* If we are creating a shared library or relocatable executable,
2552 and this is a reloc against a global symbol, then we need to
2553 copy the reloc into the shared library. However, if we are
2554 linking with -Bsymbolic, we do not need to copy a reloc
2555 against a global symbol which is defined in an object we are
2556 including in the link (i.e., DEF_REGULAR is set). At
2557 this point we have not seen all the input files, so it is
2558 possible that DEF_REGULAR is not set now but will be set
2559 later (it is never cleared). We account for that possibility
2560 below by storing information in the relocs_copied field of
2561 the hash table entry. */
2562 if ((bfd_link_pic (info) && (sec->flags & SEC_ALLOC) != 0)
2563 || (!bfd_link_pic (info)
2564 && (sec->flags & SEC_ALLOC) != 0
2565 && h != NULL
2566 && (h->root.type == bfd_link_hash_defweak
2567 || !h->def_regular)))
2568 {
2569 struct elf_dyn_relocs *p;
2570 struct elf_dyn_relocs **head;
2571 /* We must copy these reloc types into the output file.
2572 Create a reloc section in dynobj and make room for
2573 this reloc. */
2574 if (sreloc == NULL)
2575 {
2576 if (htab->elf.dynobj == NULL)
2577 htab->elf.dynobj = abfd;
2578
2579 sreloc = _bfd_elf_make_dynamic_reloc_section
0a1b45a2 2580 (sec, htab->elf.dynobj, 2, abfd, true);
b8891f8d
AJ
2581
2582 if (sreloc == NULL)
0a1b45a2 2583 return false;
b8891f8d
AJ
2584 }
2585
2586 if (h == NULL && !use_branch_stub
2587 && ((ELF32_R_TYPE (rel->r_info)
2588 == R_CKCORE_PCREL_IMM26BY2)
2589 || (ELF32_R_TYPE (rel->r_info)
2590 == R_CKCORE_PCREL_IMM11BY2)))
2591 break;
2592
2593 /* If this is a global symbol, we count the number of
2594 relocations we need for this symbol. */
2595 if (h != NULL)
2596 {
2597 struct csky_elf_link_hash_entry *eh;
2598 eh = (struct csky_elf_link_hash_entry *)h;
2599 if ((ELF32_R_TYPE (rel->r_info)
2600 == R_CKCORE_PCREL_JSR_IMM26BY2)
2601 || (ELF32_R_TYPE (rel->r_info)
2602 == R_CKCORE_PCREL_JSR_IMM11BY2))
2603 eh->jsri2bsr_refcount += 1;
190eb1dd 2604 head = &h->dyn_relocs;
b8891f8d
AJ
2605 }
2606 else
2607 {
2608 /* Track dynamic relocs needed for local syms too.
2609 We really need local syms available to do this
2610 easily. Oh well. */
2611 void **vpp;
2612 asection *s;
2613 Elf_Internal_Sym *loc_isym;
2614
f1dfbfdb 2615 loc_isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
b8891f8d
AJ
2616 abfd, r_symndx);
2617 if (loc_isym == NULL)
0a1b45a2 2618 return false;
b8891f8d
AJ
2619 s = bfd_section_from_elf_index (abfd, loc_isym->st_shndx);
2620 if (s == NULL)
2621 s = sec;
2622 vpp = &elf_section_data (s)->local_dynrel;
2623 head = (struct elf_dyn_relocs **)vpp;
2624 }
2625
2626 p = *head;
2627 if (p == NULL || p->sec != sec)
2628 {
986f0783 2629 size_t amt = sizeof *p;
b8891f8d
AJ
2630 p = ((struct elf_dyn_relocs *)
2631 bfd_alloc (htab->elf.dynobj, amt));
2632 if (p == NULL)
0a1b45a2 2633 return false;
b8891f8d
AJ
2634 p->next = *head;
2635 *head = p;
2636 p->sec = sec;
2637 p->count = 0;
2638 p->pc_count = 0;
2639 }
2640
2641 if (ELF32_R_TYPE (rel->r_info) == R_CKCORE_PCREL_IMM26BY2
2642 || ELF32_R_TYPE (rel->r_info) == R_CKCORE_PCREL_IMM11BY2)
2643 p->pc_count += 1;
2644 p->count += 1;
2645 }
2646 break;
2647
2648 case R_CKCORE_PLT_IMM18BY4:
2649 case R_CKCORE_PLT32:
2650 /* This symbol requires a procedure linkage table entry. We
2651 actually build the entry in adjust_dynamic_symbol,
2652 because this might be a case of linking PIC code which is
2653 never referenced by a dynamic object, in which case we
2654 don't need to generate a procedure linkage table entry
2655 after all. */
2656
2657 /* If this is a local symbol, we resolve it directly without
2658 creating a procedure linkage table entry. */
2659 if (h == NULL)
2660 continue;
2661 if (ELF32_R_TYPE (rel->r_info) == R_CKCORE_PLT_IMM18BY4)
2662 check_got_overflow = 1;
2663
2664 h->needs_plt = 1;
2665 h->plt.refcount += 1;
2666 h->got.refcount += 1;
2667 ((struct csky_elf_link_hash_entry *)h)->plt_refcount += 1;
2668 break;
2669
2670 case R_CKCORE_GOT12:
2671 case R_CKCORE_PLT12:
2672 case R_CKCORE_GOT32:
2673 case R_CKCORE_GOT_HI16:
2674 case R_CKCORE_GOT_LO16:
2675 case R_CKCORE_PLT_HI16:
2676 case R_CKCORE_PLT_LO16:
2677 case R_CKCORE_GOT_IMM18BY4:
2678 case R_CKCORE_TLS_IE32:
2679 case R_CKCORE_TLS_GD32:
2680 {
2681 int tls_type, old_tls_type;
2682
2683 if (h != NULL
2684 && bfd_link_executable (info)
2685 && r_type == R_CKCORE_GOT_IMM18BY4
2686 && (sec->flags & SEC_ALLOC) != 0
2687 && (sec->flags & SEC_READONLY))
2688 /* If this reloc is in a read-only section, we might
2689 need a copy reloc. We can't check reliably at this
2690 stage whether the section is read-only, as input
2691 sections have not yet been mapped to output sections.
2692 Tentatively set the flag for now, and correct in
2693 adjust_dynamic_symbol. */
2694 h->non_got_ref = 1;
2695
2696 switch (ELF32_R_TYPE (rel->r_info))
2697 {
2698 case R_CKCORE_TLS_IE32:
2699 tls_type = GOT_TLS_IE;
2700 break;
2701 case R_CKCORE_TLS_GD32:
2702 tls_type = GOT_TLS_GD;
2703 break;
2704 default:
2705 tls_type = GOT_NORMAL;
2706 break;
2707 }
2708 if (h != NULL)
2709 {
2710 if (ELF32_R_TYPE (rel->r_info) == R_CKCORE_GOT_IMM18BY4)
2711 check_got_overflow = 1;
2712 h->got.refcount += 1;
2713 old_tls_type = csky_elf_hash_entry (h)->tls_type;
2714 }
2715 else
2716 {
2717 bfd_signed_vma *local_got_refcounts;
2718
2719 /* This is a global offset table entry for a local symbol. */
2720 /* we can write a new function named
2721 elf32_csky_allocate_local_sym_info() to replace
2722 following code. */
2723 local_got_refcounts = elf_local_got_refcounts (abfd);
2724 if (local_got_refcounts == NULL)
2725 {
2726 bfd_size_type size;
2727
2728 size = symtab_hdr->sh_info;
2729 size *= (sizeof (bfd_signed_vma) + sizeof (char));
2730 local_got_refcounts = ((bfd_signed_vma *)
2731 bfd_zalloc (abfd, size));
2732 if (local_got_refcounts == NULL)
0a1b45a2 2733 return false;
b8891f8d
AJ
2734 elf_local_got_refcounts (abfd) = local_got_refcounts;
2735 csky_elf_local_got_tls_type (abfd)
2736 = (char *) (local_got_refcounts + symtab_hdr->sh_info);
2737 }
2738 local_got_refcounts[r_symndx] += 1;
2739 old_tls_type = csky_elf_local_got_tls_type (abfd)[r_symndx];
2740 }
2741
2742 /* We will already have issued an error message if there is a
2743 TLS / non-TLS mismatch, based on the symbol type. We don't
2744 support any linker relaxations. So just combine any TLS
2745 types needed. */
2746 if (old_tls_type != GOT_UNKNOWN && old_tls_type != GOT_NORMAL
2747 && tls_type != GOT_NORMAL)
2748 tls_type |= old_tls_type;
2749
2750 if (old_tls_type != tls_type)
2751 {
2752 if (h != NULL)
2753 csky_elf_hash_entry (h)->tls_type = tls_type;
2754 else
2755 csky_elf_local_got_tls_type (abfd)[r_symndx] = tls_type;
2756 }
2757 }
2758 /* Fall through. */
2759
2760 case R_CKCORE_TLS_LDM32:
2761 if (ELF32_R_TYPE (rel->r_info) == R_CKCORE_TLS_LDM32)
2762 htab->tls_ldm_got.refcount++;
2763 /* Fall through. */
2764
2765 case R_CKCORE_GOTOFF:
2766 case R_CKCORE_GOTPC:
2767 case R_CKCORE_GOTOFF_HI16:
2768 case R_CKCORE_GOTOFF_LO16:
2769 case R_CKCORE_GOTPC_HI16:
2770 case R_CKCORE_GOTPC_LO16:
2771 case R_CKCORE_GOTOFF_IMM18:
2772 if (htab->elf.sgot == NULL)
2773 {
2774 if (htab->elf.dynobj == NULL)
2775 htab->elf.dynobj = abfd;
2776 if (!_bfd_elf_create_got_section (htab->elf.dynobj, info))
0a1b45a2 2777 return false;
b8891f8d
AJ
2778 }
2779 break;
2780
2781 /* This relocation describes the C++ object vtable hierarchy.
2782 Reconstruct it for later use during GC. */
2783 case R_CKCORE_GNU_VTINHERIT:
2784 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
0a1b45a2 2785 return false;
b8891f8d
AJ
2786 break;
2787
2788 /* This relocation describes which C++ vtable entries are actually
2789 used. Record for later use during GC. */
2790 case R_CKCORE_GNU_VTENTRY:
a0ea3a14 2791 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
0a1b45a2 2792 return false;
b8891f8d
AJ
2793 break;
2794 }
2795 }
2796
0a1b45a2 2797 return true;
b8891f8d
AJ
2798}
2799
2800static const struct bfd_elf_special_section csky_elf_special_sections[]=
2801{
2802 { STRING_COMMA_LEN (".ctors"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2803 { STRING_COMMA_LEN (".dtors"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2804 { NULL, 0, 0, 0, 0 }
2805};
2806
2807/* Function to keep CSKY specific flags in the ELF header. */
2808
0a1b45a2 2809static bool
b8891f8d
AJ
2810csky_elf_set_private_flags (bfd * abfd, flagword flags)
2811{
2812 BFD_ASSERT (! elf_flags_init (abfd)
2813 || elf_elfheader (abfd)->e_flags == flags);
2814
2815 elf_elfheader (abfd)->e_flags = flags;
0a1b45a2
AM
2816 elf_flags_init (abfd) = true;
2817 return true;
b8891f8d
AJ
2818}
2819
2820static csky_arch_for_merge *
2821csky_find_arch_with_eflag (const unsigned long arch_eflag)
2822{
2823 csky_arch_for_merge *csky_arch = NULL;
2824
2825 for (csky_arch = csky_archs; csky_arch->name != NULL; csky_arch++)
2826 if (csky_arch->arch_eflag == arch_eflag)
2827 break;
2828 if (csky_arch == NULL)
2829 {
2830 _bfd_error_handler (_("warning: unrecognized arch eflag '%#lx'"),
2831 arch_eflag);
2832 bfd_set_error (bfd_error_wrong_format);
2833 }
2834 return csky_arch;
2835}
2836
0861f561
CQ
2837static csky_arch_for_merge *
2838csky_find_arch_with_name (const char *name)
2839{
2840 csky_arch_for_merge *csky_arch = NULL;
2841 const char *msg;
2842
2843 if (name == NULL)
2844 return NULL;
2845
2846 for (csky_arch = csky_archs; csky_arch->name != NULL; csky_arch++)
2847 {
2848 if (strncmp (csky_arch->name, name, strlen (csky_arch->name)) == 0)
2849 break;
2850 }
2851 if (csky_arch == NULL)
2852 {
2853 msg = _("warning: unrecognised arch name '%#x'");
2854 (*_bfd_error_handler) (msg, name);
2855 bfd_set_error (bfd_error_wrong_format);
2856 }
2857 return csky_arch;
2858}
2859
0a1b45a2 2860static bool
0861f561
CQ
2861elf32_csky_merge_attributes (bfd *ibfd, struct bfd_link_info *info)
2862{
2863 bfd *obfd = info->output_bfd;
2864 obj_attribute *in_attr;
2865 obj_attribute *out_attr;
0861f561
CQ
2866 csky_arch_for_merge *old_arch = NULL;
2867 csky_arch_for_merge *new_arch = NULL;
2868 int i;
0a1b45a2 2869 bool result = true;
0861f561
CQ
2870 const char *msg = NULL;
2871
2872 const char *sec_name = get_elf_backend_data (ibfd)->obj_attrs_section;
2873
2874 /* Skip the linker stubs file. This preserves previous behavior
2875 of accepting unknown attributes in the first input file - but
2876 is that a bug? */
2877 if (ibfd->flags & BFD_LINKER_CREATED)
0a1b45a2 2878 return true;
0861f561
CQ
2879
2880 /* Skip any input that hasn't attribute section.
2881 This enables to link object files without attribute section with
2882 any others. */
2883 if (bfd_get_section_by_name (ibfd, sec_name) == NULL)
2884 {
0a1b45a2 2885 return true;
0861f561
CQ
2886 }
2887
2888 if (!elf_known_obj_attributes_proc (obfd)[0].i)
2889 {
2890 /* This is the first object. Copy the attributes. */
2891 out_attr = elf_known_obj_attributes_proc (obfd);
2892
0861f561
CQ
2893 _bfd_elf_copy_obj_attributes (ibfd, obfd);
2894
0861f561
CQ
2895 /* Use the Tag_null value to indicate the attributes have been
2896 initialized. */
2897 out_attr[0].i = 1;
2898 }
2899
2900 in_attr = elf_known_obj_attributes_proc (ibfd);
2901 out_attr = elf_known_obj_attributes_proc (obfd);
2902
2903 for (i = LEAST_KNOWN_OBJ_ATTRIBUTE; i < NUM_KNOWN_OBJ_ATTRIBUTES; i++)
2904 {
2905 /* Merge this attribute with existing attributes. */
2906 switch (i)
2907 {
2908 case Tag_CSKY_CPU_NAME:
2909 case Tag_CSKY_ARCH_NAME:
2910 /* Do arch merge. */
2911 new_arch = csky_find_arch_with_name (in_attr[Tag_CSKY_ARCH_NAME].s);
2912 old_arch = csky_find_arch_with_name (out_attr[Tag_CSKY_ARCH_NAME].s);
2913
2914 if (new_arch != NULL && old_arch != NULL)
2915 {
2916 if (new_arch->class != old_arch->class)
2917 {
2918 msg = _("%pB: machine flag conflict with target");
2919 (*_bfd_error_handler) (msg, ibfd);
2920 bfd_set_error (bfd_error_wrong_format);
0a1b45a2 2921 return false;
0861f561
CQ
2922 }
2923 else if (new_arch->class_level != old_arch->class_level)
2924 {
2925 csky_arch_for_merge *newest_arch =
2926 ((new_arch->class_level > old_arch->class_level) ?
2927 new_arch : old_arch);
2928
2929 if (new_arch->do_warning || old_arch->do_warning)
2930 {
2931 msg = _("warning: file %pB's arch flag %s conflict "
2932 "with target %s,set target arch flag to %s");
2933 (*_bfd_error_handler) (msg, ibfd, new_arch->name,
2934 old_arch->name,
2935 (newest_arch->name));
2936 bfd_set_error (bfd_error_wrong_format);
2937 }
2938
2939 if (out_attr[Tag_CSKY_ARCH_NAME].s != NULL)
2940 bfd_release (obfd, out_attr[Tag_CSKY_ARCH_NAME].s);
2941
2942 out_attr[Tag_CSKY_ARCH_NAME].s =
2943 _bfd_elf_attr_strdup (obfd, newest_arch->name);
2944 }
2945 }
2946
2947 break;
2948
2949 case Tag_CSKY_ISA_FLAGS:
2950 case Tag_CSKY_ISA_EXT_FLAGS:
2951 /* Do ISA merge. */
2952 break;
2953
2954 case Tag_CSKY_VDSP_VERSION:
2955 if (out_attr[i].i == 0)
2956 out_attr[i].i = in_attr[i].i;
2957 else if (out_attr[i].i != in_attr[i].i)
2958 {
2959 _bfd_error_handler
2960 (_("Error: %pB and %pB has different VDSP version"), ibfd, obfd);
0a1b45a2 2961 result = false;
0861f561
CQ
2962 }
2963 break;
2964
2965 case Tag_CSKY_FPU_VERSION:
2966 if (out_attr[i].i <= in_attr[i].i
2967 && out_attr[i].i == 0)
2968 out_attr[i].i = in_attr[i].i;
2969 break;
2970
2971 case Tag_CSKY_DSP_VERSION:
2972 if (out_attr[i].i == 0)
2973 out_attr[i].i = in_attr[i].i;
2974 else if (out_attr[i].i != in_attr[i].i)
2975 {
2976 _bfd_error_handler
2977 (_("Error: %pB and %pB has different DSP version"), ibfd, obfd);
0a1b45a2 2978 result = false;
0861f561
CQ
2979 }
2980 break;
2981
2982 case Tag_CSKY_FPU_ABI:
2983 if (out_attr[i].i != in_attr[i].i
2984 && (out_attr[i].i == 0
2985 || (out_attr[i].i == VAL_CSKY_FPU_ABI_SOFT
2986 && in_attr[i].i == VAL_CSKY_FPU_ABI_SOFTFP)))
2987 {
2988 out_attr[i].i = in_attr[i].i;
2989 }
2990 else if (out_attr[i].i == VAL_CSKY_FPU_ABI_HARD
2991 && (out_attr[i].i != in_attr[i].i
2992 && in_attr[i].i != 0))
2993 {
2994 _bfd_error_handler
2995 (_("Error: %pB and %pB has different FPU ABI"), ibfd, obfd);
0a1b45a2 2996 result = false;
0861f561
CQ
2997 }
2998 break;
2999
3000 default:
3001 result =
3002 result && _bfd_elf_merge_unknown_attribute_low (ibfd, obfd, i);
3003 break;
3004 }
3005
3006 /* If out_attr was copied from in_attr then it won't have a type yet. */
3007 if (in_attr[i].type && !out_attr[i].type)
3008 out_attr[i].type = in_attr[i].type;
3009 }
3010
3011 /* Merge Tag_compatibility attributes and any common GNU ones. */
3012 if (!_bfd_elf_merge_object_attributes (ibfd, info))
0a1b45a2 3013 return false;
0861f561
CQ
3014
3015 /* Check for any attributes not known on CSKY. */
3016 result &= _bfd_elf_merge_unknown_attribute_list (ibfd, obfd);
3017
3018 return result;
3019}
3020
b8891f8d
AJ
3021/* Merge backend specific data from an object file to the output
3022 object file when linking. */
3023
0a1b45a2 3024static bool
b8891f8d
AJ
3025csky_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
3026{
3027 bfd *obfd = info->output_bfd;
3028 flagword old_flags;
3029 flagword new_flags;
3030 csky_arch_for_merge *old_arch = NULL;
3031 csky_arch_for_merge *new_arch = NULL;
0861f561
CQ
3032 flagword newest_flag = 0;
3033 const char *sec_name;
3034 obj_attribute *out_attr;
b8891f8d
AJ
3035
3036 /* Check if we have the same endianness. */
3037 if (! _bfd_generic_verify_endian_match (ibfd, info))
0a1b45a2 3038 return false;
b8891f8d
AJ
3039
3040 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
3041 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
0a1b45a2 3042 return true;
b8891f8d 3043
0861f561
CQ
3044 /* Merge ".csky.attribute" section. */
3045 if (!elf32_csky_merge_attributes (ibfd, info))
0a1b45a2 3046 return false;
b8891f8d
AJ
3047
3048 if (! elf_flags_init (obfd))
3049 {
3050 /* First call, no flags set. */
0a1b45a2 3051 elf_flags_init (obfd) = true;
b8891f8d 3052 }
0861f561
CQ
3053
3054 /* Try to merge e_flag. */
3055 new_flags = elf_elfheader (ibfd)->e_flags;
3056 old_flags = elf_elfheader (obfd)->e_flags;
3057 out_attr = elf_known_obj_attributes_proc (obfd);
3058
fd1b3e0e
XQ
3059 /* The flags like "e , f ,g ..." , we take collection. */
3060 newest_flag = old_flags | new_flags;
0861f561
CQ
3061
3062 sec_name = get_elf_backend_data (ibfd)->obj_attrs_section;
fd1b3e0e
XQ
3063
3064 if (bfd_get_section_by_name (ibfd, sec_name) == NULL
13023445
NC
3065 || ((new_flags & (CSKY_ARCH_MASK | CSKY_ABI_MASK)) !=
3066 (old_flags & (CSKY_ARCH_MASK | CSKY_ABI_MASK))))
b8891f8d 3067 {
0861f561
CQ
3068 /* Input BFDs have no ".csky.attribute" section. */
3069 new_arch = csky_find_arch_with_eflag (new_flags & CSKY_ARCH_MASK);
3070 old_arch = csky_find_arch_with_name (out_attr[Tag_CSKY_ARCH_NAME].s);
b8891f8d 3071
0861f561 3072 if (new_arch != NULL && old_arch != NULL)
b8891f8d 3073 {
0861f561 3074 if (new_arch->class != old_arch->class)
b8891f8d 3075 {
0861f561
CQ
3076 _bfd_error_handler
3077 /* xgettext:c-format */
3078 (_("%pB: machine flag conflict with target"), ibfd);
3079 bfd_set_error (bfd_error_wrong_format);
0a1b45a2 3080 return false;
0861f561
CQ
3081 }
3082 else if (new_arch->class_level != old_arch->class_level)
3083 {
3084 csky_arch_for_merge *newest_arch =
3085 (new_arch->class_level > old_arch->class_level
3086 ? new_arch : old_arch);
3087
3088 if (new_arch->do_warning || old_arch->do_warning)
b8891f8d
AJ
3089 {
3090 _bfd_error_handler
3091 /* xgettext:c-format */
0861f561
CQ
3092 (_("warning: file %pB's arch flag %s conflicts with "
3093 "target ck%s, using %s"),
3094 ibfd, new_arch->name, old_arch->name,
3095 newest_arch->name);
b8891f8d 3096 bfd_set_error (bfd_error_wrong_format);
b8891f8d 3097 }
b8891f8d 3098
0861f561
CQ
3099 if (out_attr[Tag_CSKY_ARCH_NAME].s != NULL)
3100 bfd_release (obfd, out_attr[Tag_CSKY_ARCH_NAME].s);
3101
3102 out_attr[Tag_CSKY_ARCH_NAME].s =
3103 _bfd_elf_attr_strdup (obfd, newest_arch->name);
b8891f8d 3104 }
b8891f8d
AJ
3105 }
3106 else
0861f561
CQ
3107 {
3108 if (new_arch && new_arch->name != NULL)
3109 out_attr[Tag_CSKY_ARCH_NAME].s =
3110 _bfd_elf_attr_strdup (obfd, new_arch->name);
3111 }
b8891f8d 3112 }
0861f561
CQ
3113
3114 elf_elfheader (obfd)->e_flags = newest_flag;
3115
0a1b45a2 3116 return true;
b8891f8d
AJ
3117}
3118
3119/* Ignore the discarded relocs in special sections in link time. */
3120
0a1b45a2 3121static bool
b8891f8d
AJ
3122csky_elf_ignore_discarded_relocs (asection *sec)
3123{
3124 if (strcmp (sec->name, ".csky_stack_size") == 0)
0a1b45a2
AM
3125 return true;
3126 return false;
b8891f8d
AJ
3127}
3128
3129/* .csky_stack_size are not referenced directly. This pass marks all of
3130 them as required. */
3131
0a1b45a2 3132static bool
b8891f8d
AJ
3133elf32_csky_gc_mark_extra_sections (struct bfd_link_info *info,
3134 elf_gc_mark_hook_fn gc_mark_hook ATTRIBUTE_UNUSED)
3135{
3136 bfd *sub;
3137
3138 _bfd_elf_gc_mark_extra_sections (info, gc_mark_hook);
3139
3140 for (sub = info->input_bfds; sub != NULL; sub = sub->link.next)
3141 {
3142 asection *o;
3143
3144 for (o = sub->sections; o != NULL; o = o->next)
3145 if (strcmp (o->name, ".csky_stack_size") == 0)
3146 o->gc_mark = 1;
3147 }
3148
0a1b45a2 3149 return true;
b8891f8d
AJ
3150}
3151
3152/* The linker repeatedly calls this function for each input section,
3153 in the order that input sections are linked into output sections.
3154 Build lists of input sections to determine groupings between which
3155 we may insert linker stubs. */
3156
3157void
3158elf32_csky_next_input_section (struct bfd_link_info *info,
3159 asection *isec)
3160{
3161 struct csky_elf_link_hash_table *htab = csky_elf_hash_table (info);
3162 if (htab == NULL)
3163 return;
3164 if (isec->output_section->index <= htab->top_index)
3165 {
3166 asection **list = htab->input_list + isec->output_section->index;
3167
3168 if (*list != bfd_abs_section_ptr)
3169 {
3170 /* Steal the link_sec pointer for our list. */
3171#define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
3172 /* This happens to make the list in reverse order,
3173 which we reverse later in group_sections. */
3174 PREV_SEC (isec) = *list;
3175 *list = isec;
3176 }
3177 }
3178}
3179
3180/* See whether we can group stub sections together. Grouping stub
3181 sections may result in fewer stubs. More importantly, we need to
3182 put all .init* and .fini* stubs at the end of the .init or
3183 .fini output sections respectively, because glibc splits the
3184 _init and _fini functions into multiple parts. Putting a stub in
3185 the middle of a function is not a good idea. */
3186
3187static void
3188group_sections (struct csky_elf_link_hash_table *htab,
3189 bfd_size_type stub_group_size,
0a1b45a2 3190 bool stubs_always_after_branch)
b8891f8d
AJ
3191{
3192 asection **list = htab->input_list;
3193
3194 do
3195 {
3196 asection *tail = *list;
3197 asection *head;
3198
3199 if (tail == bfd_abs_section_ptr)
3200 continue;
3201
3202 /* Reverse the list: we must avoid placing stubs at the
4b24dd1a
AM
3203 beginning of the section because the beginning of the text
3204 section may be required for an interrupt vector in bare metal
3205 code. */
b8891f8d
AJ
3206#define NEXT_SEC PREV_SEC
3207 head = NULL;
3208 while (tail != NULL)
3209 {
3210 /* Pop from tail. */
3211 asection *item = tail;
3212 tail = PREV_SEC (item);
3213
3214 /* Push on head. */
3215 NEXT_SEC (item) = head;
3216 head = item;
3217 }
3218
3219 while (head != NULL)
3220 {
3221 asection *curr;
3222 asection *next;
3223 bfd_vma stub_group_start = head->output_offset;
3224 bfd_vma end_of_next;
3225
3226 curr = head;
3227 while (NEXT_SEC (curr) != NULL)
3228 {
3229 next = NEXT_SEC (curr);
3230 end_of_next = next->output_offset + next->size;
3231 if (end_of_next - stub_group_start >= stub_group_size)
3232 /* End of NEXT is too far from start, so stop. */
3233 break;
3234 curr = next;
3235 }
3236
3237 /* OK, the size from the start to the start of CURR is less
3238 * than stub_group_size and thus can be handled by one stub
3239 * section. (Or the head section is itself larger than
3240 * stub_group_size, in which case we may be toast.)
3241 * We should really be keeping track of the total size of
3242 * stubs added here, as stubs contribute to the final output
3243 * section size. */
3244 do
3245 {
3246 next = NEXT_SEC (head);
3247 /* Set up this stub group. */
3248 htab->stub_group[head->id].link_sec = curr;
3249 }
3250 while (head != curr && (head = next) != NULL);
3251
3252 /* But wait, there's more! Input sections up to stub_group_size
3253 * bytes after the stub section can be handled by it too. */
3254 if (!stubs_always_after_branch)
3255 {
3256 stub_group_start = curr->output_offset + curr->size;
3257
3258 while (next != NULL)
3259 {
3260 end_of_next = next->output_offset + next->size;
3261 if (end_of_next - stub_group_start >= stub_group_size)
3262 /* End of NEXT is too far from stubs, so stop. */
3263 break;
3264 /* Add NEXT to the stub group. */
3265 head = next;
3266 next = NEXT_SEC (head);
3267 htab->stub_group[head->id].link_sec = curr;
3268 }
3269 }
3270 head = next;
3271 }
3272 }
3273 while (list++ != htab->input_list + htab->top_index);
3274
3275 free (htab->input_list);
3276#undef PREV_SEC
3277#undef NEXT_SEC
3278}
3279
3280/* If the symbol referenced by bsr is defined in shared object file,
3281 or it is a weak symbol and we aim to create shared object file,
3282 we must create a stub for this bsr. */
3283
0a1b45a2 3284static bool
b8891f8d
AJ
3285sym_must_create_stub (struct elf_link_hash_entry *h,
3286 struct bfd_link_info *info)
3287{
3288 if (h != NULL
3289 && ((h->def_dynamic && !h->def_regular)
3290 || (bfd_link_pic (info) && h->root.type == bfd_link_hash_defweak)))
0a1b45a2 3291 return true;
b8891f8d 3292 else
0a1b45a2 3293 return false;
b8891f8d
AJ
3294}
3295
3296/* Calculate the template, template size and instruction size for a stub.
3297 Return value is the instruction size. */
3298
3299static unsigned int
3300find_stub_size_and_template (enum elf32_csky_stub_type stub_type,
3301 const insn_sequence **stub_template,
3302 int *stub_template_size)
3303{
3304 const insn_sequence *template_sequence = NULL;
3305 int template_size = 0;
3306 int i;
3307 unsigned int size;
3308
3309 template_sequence = stub_definitions[stub_type].template_sequence;
3310 template_size = stub_definitions[stub_type].template_size;
3311
3312 size = 0;
3313 for (i = 0; i < template_size; i++)
3314 {
3315 switch (template_sequence[i].type)
3316 {
3317 case INSN16:
3318 size += 2;
3319 break;
3320
3321 case INSN32:
3322 case DATA_TYPE:
3323 size += 4;
3324 break;
3325
3326 default:
3327 BFD_FAIL ();
0a1b45a2 3328 return false;
b8891f8d
AJ
3329 }
3330 }
3331
3332 if (stub_template)
3333 *stub_template = template_sequence;
3334 if (stub_template_size)
3335 *stub_template_size = template_size;
3336
3337 return size;
3338}
3339
3340/* As above, but don't actually build the stub. Just bump offset so
3341 we know stub section sizes. */
3342
0a1b45a2 3343static bool
b8891f8d
AJ
3344csky_size_one_stub (struct bfd_hash_entry *gen_entry,
3345 void * in_arg ATTRIBUTE_UNUSED)
3346{
3347 struct elf32_csky_stub_hash_entry *stub_entry;
3348 const insn_sequence *template_sequence = NULL;
3349 int template_size = 0;
3350 int size = 0;
3351
3352 /* Massage our args to the form they really have. */
3353 stub_entry = (struct elf32_csky_stub_hash_entry *) gen_entry;
3354
3355 BFD_ASSERT (stub_entry->stub_type > csky_stub_none
3356 && stub_entry->stub_type < ARRAY_SIZE (stub_definitions));
3357 size = find_stub_size_and_template (stub_entry->stub_type,
3358 &template_sequence, &template_size);
3359 stub_entry->stub_size = size;
3360 stub_entry->stub_template = template_sequence;
3361 stub_entry->stub_template_size = template_size;
3362
3363 size = (size + 7) & ~7;
3364 stub_entry->stub_sec->size += size;
0a1b45a2 3365 return true;
b8891f8d
AJ
3366}
3367
3368/* Add a new stub entry to the stub hash. Not all fields of the new
3369 stub entry are initialised. */
3370
3371static struct elf32_csky_stub_hash_entry *
3372elf32_csky_add_stub (const char *stub_name,
3373 asection *section,
3374 struct csky_elf_link_hash_table *htab)
3375{
3376 asection *link_sec;
3377 asection *stub_sec;
3378 struct elf32_csky_stub_hash_entry *stub_entry;
3379
3380 stub_sec = elf32_csky_create_or_find_stub_sec (&link_sec, section, htab);
3381 if (stub_sec == NULL)
3382 return NULL;
3383
3384 /* Enter this entry into the linker stub hash table. */
3385 stub_entry = csky_stub_hash_lookup (&htab->stub_hash_table, stub_name,
0a1b45a2 3386 true, false);
b8891f8d
AJ
3387 if (stub_entry == NULL)
3388 {
3389 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
3390 section->owner, stub_name);
3391 return NULL;
3392 }
3393
3394 stub_entry->stub_sec = stub_sec;
3395 stub_entry->stub_offset = 0;
3396 stub_entry->id_sec = link_sec;
3397
3398 return stub_entry;
3399}
3400
3401/* Determine and set the size of the stub section for a final link.
3402 The basic idea here is to examine all the relocations looking for
3403 PC-relative calls to a target that is unreachable with a "bsr"
3404 instruction. */
3405
0a1b45a2 3406bool
b8891f8d
AJ
3407elf32_csky_size_stubs (bfd *output_bfd,
3408 bfd *stub_bfd,
3409 struct bfd_link_info *info,
3410 bfd_signed_vma group_size,
3411 asection *(*add_stub_section) (const char*, asection*),
3412 void (*layout_sections_again) (void))
3413{
3414 bfd_size_type stub_group_size;
0a1b45a2 3415 bool stubs_always_after_branch;
b8891f8d
AJ
3416 struct csky_elf_link_hash_table *htab = csky_elf_hash_table (info);
3417
3418 if (htab == NULL)
0a1b45a2 3419 return false;
b8891f8d
AJ
3420
3421 /* Propagate mach to stub bfd, because it may not have been
3422 finalized when we created stub_bfd. */
3423 bfd_set_arch_mach (stub_bfd, bfd_get_arch (output_bfd),
3424 bfd_get_mach (output_bfd));
3425
3426 /* Stash our params away. */
3427 htab->stub_bfd = stub_bfd;
3428 htab->add_stub_section = add_stub_section;
3429 htab->layout_sections_again = layout_sections_again;
3430 stubs_always_after_branch = group_size < 0;
3431
3432 if (group_size < 0)
3433 stub_group_size = -group_size;
3434 else
3435 stub_group_size = group_size;
3436
3437 if (stub_group_size == 1)
3438 /* The 'bsr' range in abiv2 is +-64MB has to be used as the
3439 default maximum size.
3440 This value is 128K less than that, which allows for 131072
3441 byte stubs. If we exceed that, then we will fail to link.
3442 The user will have to relink with an explicit group size
3443 option. */
3444 stub_group_size = 66977792;
3445
3446 group_sections (htab, stub_group_size, stubs_always_after_branch);
3447
3448 while (1)
3449 {
3450 bfd *input_bfd;
3451 unsigned int bfd_indx;
3452 asection *stub_sec;
0a1b45a2 3453 bool stub_changed = false;
b8891f8d
AJ
3454
3455 for (input_bfd = info->input_bfds, bfd_indx = 0;
3456 input_bfd != NULL;
3457 input_bfd = input_bfd->link.next, bfd_indx++)
3458 {
3459 Elf_Internal_Shdr *symtab_hdr;
3460 asection *section;
3461 Elf_Internal_Sym *local_syms = NULL;
3462
3463 /* We'll need the symbol table in a second. */
3464 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3465 if (symtab_hdr->sh_info == 0)
3466 continue;
3467
3468 /* Walk over each section attached to the input bfd. */
3469 for (section = input_bfd->sections;
3470 section != NULL;
3471 section = section->next)
3472 {
3473 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
3474
3475 /* If there aren't any relocs, then there's nothing more
3476 * to do. */
3477 if ((section->flags & SEC_RELOC) == 0
3478 || section->reloc_count == 0
3479 || (section->flags & SEC_CODE) == 0)
3480 continue;
3481
3482 /* If this section is a link-once section that will be
3483 discarded, then don't create any stubs. */
3484 if (section->output_section == NULL
3485 || section->output_section->owner != output_bfd)
3486 continue;
3487
3488 /* Get the relocs. */
3489 internal_relocs = _bfd_elf_link_read_relocs (input_bfd,
3490 section,
3491 NULL, NULL,
3492 info->keep_memory);
3493
3494 if (internal_relocs == NULL)
3495 goto error_ret_free_local;
3496
3497 /* Now examine each relocation. */
3498 irela = internal_relocs;
3499 irelaend = irela + section->reloc_count;
3500 for (; irela < irelaend; irela++)
3501 {
3502 unsigned int r_type, r_indx;
3503 enum elf32_csky_stub_type stub_type;
3504 struct elf32_csky_stub_hash_entry *stub_entry;
3505 asection *sym_sec;
3506 bfd_vma sym_value;
3507 bfd_vma destination;
3508 struct csky_elf_link_hash_entry *hash;
3509 const char *sym_name;
3510 char *stub_name;
3511 const asection *id_sec;
3512 unsigned char st_type;
3513
3514 r_type = ELF32_R_TYPE (irela->r_info);
3515 r_indx = ELF32_R_SYM (irela->r_info);
3516 if (r_type >= (unsigned int) R_CKCORE_MAX)
3517 {
3518 bfd_set_error (bfd_error_bad_value);
dc1e8a47 3519 error_ret_free_internal:
b8891f8d
AJ
3520 if (elf_section_data (section)->relocs == NULL)
3521 free (internal_relocs);
3522 goto error_ret_free_local;
3523 }
3524
3525 /* Only look for stubs on branch instructions. */
3526 if (r_type != (unsigned int) R_CKCORE_PCREL_IMM26BY2)
3527 continue;
3528 /* Now determine the call target, its name, value,
3529 section. */
3530 sym_sec = NULL;
3531 sym_value = 0;
3532 destination = 0;
3533 hash = NULL;
3534 sym_name = NULL;
3535 if (r_indx < symtab_hdr->sh_info)
3536 {
3537 /* It's a local symbol. */
3538 Elf_Internal_Sym *sym;
3539 Elf_Internal_Shdr *hdr;
3540 if (local_syms == NULL)
3541 local_syms =
3542 (Elf_Internal_Sym *) symtab_hdr->contents;
3543 if (local_syms == NULL)
3544 {
3545 local_syms =
3546 bfd_elf_get_elf_syms (input_bfd,
3547 symtab_hdr,
3548 symtab_hdr->sh_info,
3549 0, NULL, NULL, NULL);
3550 if (local_syms == NULL)
3551 goto error_ret_free_internal;
3552 }
3553 sym = local_syms + r_indx;
3554 hdr = elf_elfsections (input_bfd)[sym->st_shndx];
3555 sym_sec = hdr->bfd_section;
3556 if (!sym_sec)
3557 /* This is an undefined symbol. It can never
3558 be resolved. */
3559 continue;
3560 if (ELF_ST_TYPE (sym->st_info) != STT_SECTION)
3561 sym_value = sym->st_value;
3562 destination = (sym_value + irela->r_addend
3563 + sym_sec->output_offset
3564 + sym_sec->output_section->vma);
3565 st_type = ELF_ST_TYPE (sym->st_info);
3566 sym_name =
3567 bfd_elf_string_from_elf_section (input_bfd,
3568 symtab_hdr->sh_link,
3569 sym->st_name);
3570 }
3571 else
3572 {
3573 /* It's an external symbol. */
3574 int e_indx;
3575 e_indx = r_indx - symtab_hdr->sh_info;
3576 hash = ((struct csky_elf_link_hash_entry *)
3577 elf_sym_hashes (input_bfd)[e_indx]);
3578
3579 while (hash->elf.root.type == bfd_link_hash_indirect
3580 || hash->elf.root.type == bfd_link_hash_warning)
3581 hash = ((struct csky_elf_link_hash_entry *)
3582 hash->elf.root.u.i.link);
3583 if (hash->elf.root.type == bfd_link_hash_defined
3584 || hash->elf.root.type == bfd_link_hash_defweak)
3585 {
3586 sym_sec = hash->elf.root.u.def.section;
3587 sym_value = hash->elf.root.u.def.value;
3588
3589 struct csky_elf_link_hash_table *globals =
3590 csky_elf_hash_table (info);
3591 /* FIXME For a destination in a shared library. */
3592 if (globals->elf.splt != NULL && hash != NULL
3593 && hash->elf.plt.offset != (bfd_vma) -1)
3594 continue;
3595 else if (sym_sec->output_section != NULL)
3596 destination = (sym_value + irela->r_addend
3597 + sym_sec->output_offset
3598 + sym_sec->output_section->vma);
3599 }
3600 else if (hash->elf.root.type == bfd_link_hash_undefined
3601 || (hash->elf.root.type
3602 == bfd_link_hash_undefweak))
3603 /* FIXME For a destination in a shared library. */
3604 continue;
3605 else
3606 {
3607 bfd_set_error (bfd_error_bad_value);
3608 goto error_ret_free_internal;
3609 }
3610 st_type = ELF_ST_TYPE (hash->elf.type);
3611 sym_name = hash->elf.root.root.string;
3612 }
3613 do
3614 {
3615 /* Determine what (if any) linker stub is needed. */
3616 stub_type = csky_type_of_stub (info, section, irela,
3617 st_type, hash,
3618 destination, sym_sec,
3619 input_bfd, sym_name);
3620 if (stub_type == csky_stub_none)
3621 break;
3622
3623 /* Support for grouping stub sections. */
3624 id_sec = htab->stub_group[section->id].link_sec;
3625
3626 /* Get the name of this stub. */
3627 stub_name = elf32_csky_stub_name (id_sec, sym_sec, hash,
3628 irela);
3629 if (!stub_name)
3630 goto error_ret_free_internal;
3631 /* We've either created a stub for this reloc already,
3632 or we are about to. */
3633 stub_entry
3634 = csky_stub_hash_lookup (&htab->stub_hash_table,
3635 stub_name,
0a1b45a2 3636 false, false);
b8891f8d
AJ
3637 if (stub_entry != NULL)
3638 {
3639 /* The proper stub has already been created. */
3640 free (stub_name);
3641 stub_entry->target_value = sym_value;
3642 break;
3643 }
3644 stub_entry = elf32_csky_add_stub (stub_name, section,
3645 htab);
3646 if (stub_entry == NULL)
3647 {
3648 free (stub_name);
3649 goto error_ret_free_internal;
3650 }
3651 stub_entry->target_value = sym_value;
3652 stub_entry->target_section = sym_sec;
3653 stub_entry->stub_type = stub_type;
3654 stub_entry->h = hash;
3655 stub_entry->st_type = st_type;
3656
3657 if (sym_name == NULL)
3658 sym_name = "unnamed";
3659 stub_entry->output_name =
3660 bfd_alloc (htab->stub_bfd,
3661 (sizeof (STUB_ENTRY_NAME)
3662 + strlen (sym_name)));
3663 if (stub_entry->output_name == NULL)
3664 {
3665 free (stub_name);
3666 goto error_ret_free_internal;
3667 }
3668 sprintf (stub_entry->output_name, STUB_ENTRY_NAME,
3669 sym_name);
0a1b45a2 3670 stub_changed = true;
b8891f8d
AJ
3671 }
3672 while (0);
3673 }
3674 /* We're done with the internal relocs, free them. */
3675 if (elf_section_data (section)->relocs == NULL)
3676 free (internal_relocs);
3677 }
3678 }
3679 if (!stub_changed)
3680 break;
3681 /* OK, we've added some stubs. Find out the new size of the
3682 stub sections. */
3683 for (stub_sec = htab->stub_bfd->sections;
3684 stub_sec != NULL;
3685 stub_sec = stub_sec->next)
3686 {
3687 /* Ignore non-stub sections. */
3688 if (!strstr (stub_sec->name, STUB_SUFFIX))
3689 continue;
3690 stub_sec->size = 0;
3691 }
3692 bfd_hash_traverse (&htab->stub_hash_table, csky_size_one_stub, htab);
3693 /* Ask the linker to do its stuff. */
3694 (*htab->layout_sections_again) ();
3695 }
3696
0a1b45a2 3697 return true;
dc1e8a47 3698 error_ret_free_local:
0a1b45a2 3699 return false;
b8891f8d
AJ
3700}
3701
0a1b45a2 3702static bool
b8891f8d
AJ
3703csky_build_one_stub (struct bfd_hash_entry *gen_entry,
3704 void * in_arg)
3705{
3706#define MAXRELOCS 2
3707 struct elf32_csky_stub_hash_entry *stub_entry;
3708 struct bfd_link_info *info;
3709 asection *stub_sec;
3710 bfd *stub_bfd;
3711 bfd_byte *loc;
3712 bfd_vma sym_value;
3713 int template_size;
3714 int size;
3715 const insn_sequence *template_sequence;
3716 int i;
3717 struct csky_elf_link_hash_table * globals;
3718 int stub_reloc_idx[MAXRELOCS] = {-1, -1};
3719 int stub_reloc_offset[MAXRELOCS] = {0, 0};
3720 int nrelocs = 0;
3721 struct elf_link_hash_entry *h = NULL;
3722
3723 /* Massage our args to the form they really have. */
3724 stub_entry = (struct elf32_csky_stub_hash_entry *)gen_entry;
3725 info = (struct bfd_link_info *) in_arg;
3726
abf874aa
CL
3727 /* Fail if the target section could not be assigned to an output
3728 section. The user should fix his linker script. */
3729 if (stub_entry->target_section->output_section == NULL
3730 && info->non_contiguous_regions)
c63d4862 3731 info->callbacks->einfo (_("%F%P: Could not assign `%pA' to an output section. "
53215f21
CL
3732 "Retry without --enable-non-contiguous-regions.\n"),
3733 stub_entry->target_section);
abf874aa 3734
b8891f8d
AJ
3735 globals = csky_elf_hash_table (info);
3736 if (globals == NULL)
0a1b45a2 3737 return false;
b8891f8d
AJ
3738 stub_sec = stub_entry->stub_sec;
3739
3740 /* Make a note of the offset within the stubs for this entry. */
3741 stub_entry->stub_offset = stub_sec->size;
3742 loc = stub_sec->contents + stub_entry->stub_offset;
3743
3744 stub_bfd = stub_sec->owner;
3745
3746 /* This is the address of the stub destination. */
3747 h = &stub_entry->h->elf;
3748 if (sym_must_create_stub (h, info)
3749 && !(bfd_link_pic (info)
3750 && h->root.type == bfd_link_hash_defweak
3751 && h->def_regular
3752 && !h->def_dynamic))
3753 sym_value = 0;
3754 else
3755 sym_value = (stub_entry->target_value
3756 + stub_entry->target_section->output_offset
3757 + stub_entry->target_section->output_section->vma);
3758
3759 template_sequence = stub_entry->stub_template;
3760 template_size = stub_entry->stub_template_size;
3761
3762 size = 0;
3763 for (i = 0; i < template_size; i++)
3764 switch (template_sequence[i].type)
3765 {
3766 case INSN16:
3767 bfd_put_16 (stub_bfd, (bfd_vma) template_sequence[i].data,
3768 loc + size);
3769 size += 2;
3770 break;
3771 case INSN32:
3772 csky_put_insn_32 (stub_bfd, (bfd_vma) template_sequence[i].data,
3773 loc + size);
3774 size += 4;
3775 break;
3776 case DATA_TYPE:
3777 bfd_put_32 (stub_bfd, (bfd_vma) template_sequence[i].data,
3778 loc + size);
3779 stub_reloc_idx[nrelocs] = i;
3780 stub_reloc_offset[nrelocs++] = size;
3781 size += 4;
3782 break;
3783 default:
3784 BFD_FAIL ();
0a1b45a2 3785 return false;
b8891f8d
AJ
3786 }
3787 stub_sec->size += size;
3788
3789 /* Stub size has already been computed in csky_size_one_stub. Check
3790 consistency. */
3791 BFD_ASSERT (size == stub_entry->stub_size);
3792
3793 /* Assume there is at least one and at most MAXRELOCS entries to relocate
3794 in each stub. */
3795 BFD_ASSERT (nrelocs != 0 && nrelocs <= MAXRELOCS);
3796
3797 for (i = 0; i < nrelocs; i++)
3798 {
3799 if (sym_must_create_stub (h, info))
3800 {
3801 Elf_Internal_Rela outrel;
3802 asection * sreloc = globals->elf.srelgot;
3803
3804 outrel.r_offset = stub_entry->stub_offset + stub_reloc_offset[i];
3805 outrel.r_info =
3806 ELF32_R_INFO (h->dynindx,
3807 template_sequence[stub_reloc_idx[i]].r_type);
3808 outrel.r_addend = template_sequence[stub_reloc_idx[i]].reloc_addend;
3809
3810 loc = sreloc->contents;
3811 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
3812
3813 if (loc != NULL)
3814 bfd_elf32_swap_reloca_out (info->output_bfd, &outrel, loc);
3815 }
3816 _bfd_final_link_relocate (elf32_csky_howto_from_type
3817 (template_sequence[stub_reloc_idx[i]].r_type),
3818 stub_bfd, stub_sec, stub_sec->contents,
3819 stub_entry->stub_offset + stub_reloc_offset[i],
3820 sym_value + stub_entry->target_addend,
3821 template_sequence[stub_reloc_idx[i]].reloc_addend);
3822 }
3823
0a1b45a2 3824 return true;
b8891f8d
AJ
3825#undef MAXRELOCS
3826}
3827
3828/* Build all the stubs associated with the current output file. The
3829 stubs are kept in a hash table attached to the main linker hash
3830 table. We also set up the .plt entries for statically linked PIC
3831 functions here. This function is called via arm_elf_finish in the
3832 linker. */
3833
0a1b45a2 3834bool
b8891f8d
AJ
3835elf32_csky_build_stubs (struct bfd_link_info *info)
3836{
3837 asection *stub_sec;
3838 struct bfd_hash_table *table;
3839 struct csky_elf_link_hash_table *htab;
3840
3841 htab = csky_elf_hash_table (info);
3842
3843 if (htab == NULL)
0a1b45a2 3844 return false;
b8891f8d
AJ
3845
3846 for (stub_sec = htab->stub_bfd->sections;
3847 stub_sec != NULL;
3848 stub_sec = stub_sec->next)
3849 {
3850 bfd_size_type size;
3851
3852 /* Ignore non-stub sections. */
3853 if (!strstr (stub_sec->name, STUB_SUFFIX))
3854 continue;
3855
3856 /* Allocate memory to hold the linker stubs. */
3857 size = stub_sec->size;
3858 stub_sec->contents = bfd_zalloc (htab->stub_bfd, size);
3859 if (stub_sec->contents == NULL && size != 0)
0a1b45a2 3860 return false;
b8891f8d
AJ
3861 stub_sec->size = 0;
3862 }
3863
3864 /* Build the stubs as directed by the stub hash table. */
3865 table = &htab->stub_hash_table;
3866 bfd_hash_traverse (table, csky_build_one_stub, info);
3867
0a1b45a2 3868 return true;
b8891f8d
AJ
3869}
3870
3871/* Set up various things so that we can make a list of input sections
3872 for each output section included in the link. Returns -1 on error,
3873 0 when no stubs will be needed, and 1 on success. */
3874
3875int
3876elf32_csky_setup_section_lists (bfd *output_bfd,
3877 struct bfd_link_info *info)
3878{
3879 bfd *input_bfd;
3880 unsigned int bfd_count;
3881 unsigned int top_id, top_index;
3882 asection *section;
3883 asection **input_list, **list;
986f0783 3884 size_t amt;
b8891f8d
AJ
3885 struct csky_elf_link_hash_table *htab = csky_elf_hash_table (info);
3886
3887 if (!htab)
3888 return 0;
b8891f8d
AJ
3889
3890 /* Count the number of input BFDs and find the top input section id. */
3891 for (input_bfd = info->input_bfds, bfd_count = 0, top_id = 0;
3892 input_bfd != NULL;
3893 input_bfd = input_bfd->link.next)
3894 {
3895 bfd_count += 1;
3896 for (section = input_bfd->sections;
3897 section != NULL;
3898 section = section->next)
3899 if (top_id < section->id)
3900 top_id = section->id;
3901 }
3902 htab->bfd_count = bfd_count;
3903 amt = sizeof (struct map_stub) * (top_id + 1);
3904 htab->stub_group = bfd_zmalloc (amt);
3905 if (htab->stub_group == NULL)
3906 return -1;
3907
3908 /* We can't use output_bfd->section_count here to find the top output
3909 section index as some sections may have been removed, and
3910 _bfd_strip_section_from_output doesn't renumber the indices. */
3911 for (section = output_bfd->sections, top_index = 0;
3912 section != NULL;
3913 section = section->next)
3914 if (top_index < section->index)
3915 top_index = section->index;
3916 htab->top_index = top_index;
3917 amt = sizeof (asection *) * (top_index + 1);
3918 input_list = bfd_malloc (amt);
3919 htab->input_list = input_list;
3920 if (input_list == NULL)
3921 return -1;
3922 /* For sections we aren't interested in, mark their entries with a
3923 value we can check later. */
3924 list = input_list + top_index;
3925 do
3926 *list = bfd_abs_section_ptr;
3927 while (list-- != input_list);
3928 for (section = output_bfd->sections;
3929 section != NULL;
3930 section = section->next)
3931 if ((section->flags & SEC_CODE) != 0)
3932 input_list[section->index] = NULL;
3933
3934 return 1;
3935}
3936
3937static bfd_reloc_status_type
3938csky_relocate_contents (reloc_howto_type *howto,
3939 bfd *input_bfd,
f2173852 3940 bfd_vma relocation,
b8891f8d
AJ
3941 bfd_byte *location)
3942{
3943 int size;
3944 bfd_vma x = 0;
3945 bfd_reloc_status_type flag;
3946 unsigned int rightshift = howto->rightshift;
3947 unsigned int bitpos = howto->bitpos;
3948
fde0214a 3949 if (howto->negate)
b8891f8d
AJ
3950 relocation = -relocation;
3951
3952 /* FIXME: these macros should be defined at file head or head file head. */
3953#define CSKY_INSN_ADDI_TO_SUBI 0x04000000
279edac5
AM
3954#define CSKY_INSN_MOV_RTB 0xc41d4820 /* mov32 rx, r29, 0 */
3955#define CSKY_INSN_MOV_RDB 0xc41c4820 /* mov32 rx, r28, 0 */
b8891f8d
AJ
3956#define CSKY_INSN_GET_ADDI_RZ(x) (((x) & 0x03e00000) >> 21)
3957#define CSKY_INSN_SET_MOV_RZ(x) ((x) & 0x0000001f)
3958#define CSKY_INSN_JSRI_TO_LRW 0xea9a0000
3959#define CSKY_INSN_JSR_R26 0xe8fa0000
3960
3961 /* Get the value we are going to relocate. */
3962 size = bfd_get_reloc_size (howto);
3963 switch (size)
3964 {
3965 default:
3966 case 0:
3967 abort ();
3968 case 1:
3969 x = bfd_get_8 (input_bfd, location);
3970 break;
3971 case 2:
3972 x = bfd_get_16 (input_bfd, location);
3973 break;
3974 case 4:
3975 if (need_reverse_bits)
3976 {
3977 x = csky_get_insn_32 (input_bfd, location);
3978
3979 if (R_CKCORE_DOFFSET_LO16 == howto->type)
3980 {
f2173852 3981 if ((bfd_signed_vma) relocation < 0)
b8891f8d
AJ
3982 {
3983 x |= CSKY_INSN_ADDI_TO_SUBI;
3984 relocation = -relocation;
3985 }
3986 else if (0 == relocation)
3987 x = (CSKY_INSN_MOV_RDB |
3988 CSKY_INSN_SET_MOV_RZ (CSKY_INSN_GET_ADDI_RZ (x)));
3989 }
3990 else if (R_CKCORE_TOFFSET_LO16 == howto->type)
3991 {
f2173852 3992 if ((bfd_signed_vma) relocation < 0)
b8891f8d
AJ
3993 {
3994 x |= CSKY_INSN_ADDI_TO_SUBI;
3995 relocation = -relocation;
3996 }
3997 else if (0 == relocation)
3998 x = (CSKY_INSN_MOV_RTB |
3999 CSKY_INSN_SET_MOV_RZ (CSKY_INSN_GET_ADDI_RZ (x)));
4000 }
4001 }
4002 else
4003 x = bfd_get_32 (input_bfd, location);
4004 break;
4005 }
4006 /* Check for overflow. FIXME: We may drop bits during the addition
4007 which we don't check for. We must either check at every single
4008 operation, which would be tedious, or we must do the computations
4009 in a type larger than bfd_vma, which would be inefficient. */
4010 flag = bfd_reloc_ok;
4011 if (howto->complain_on_overflow != complain_overflow_dont)
4012 {
f2173852
AM
4013 bfd_vma addrmask;
4014 bfd_vma fieldmask;
4015 bfd_vma signmask;
4016 bfd_vma ss;
4017 bfd_vma a;
4018 bfd_vma b;
4019 bfd_vma sum;
b8891f8d
AJ
4020 /* Get the values to be added together. For signed and unsigned
4021 relocations, we assume that all values should be truncated to
4022 the size of an address. For bitfields, all the bits matter.
4023 See also bfd_check_overflow. */
4024#define N_ONES(n) (((((bfd_vma) 1 << ((n) - 1)) - 1) << 1) | 1)
4025 fieldmask = N_ONES (howto->bitsize);
4026 signmask = ~fieldmask;
4027 addrmask = N_ONES (bfd_arch_bits_per_address (input_bfd)) | fieldmask;
4028 a = (relocation & addrmask) >> rightshift;
4029 if (read_content_substitute)
4030 x = read_content_substitute;
4031 b = (x & howto->src_mask & addrmask) >> bitpos;
4032
4033 switch (howto->complain_on_overflow)
4034 {
4035 case complain_overflow_signed:
4036 /* If any sign bits are set, all sign bits must be set.
4037 That is, A must be a valid negative address after
4038 shifting. */
4039 signmask = ~(fieldmask >> 1);
4040 /* Fall through. */
4041
4042 case complain_overflow_bitfield:
4043 /* Much like the signed check, but for a field one bit
4044 wider. We allow a bitfield to represent numbers in the
4045 range -2**n to 2**n-1, where n is the number of bits in the
4046 field. Note that when bfd_vma is 32 bits, a 32-bit reloc
4047 can't overflow, which is exactly what we want. */
4048 ss = a & signmask;
4049 if (ss != 0 && ss != ((addrmask >> rightshift) & signmask))
4050 flag = bfd_reloc_overflow;
4051 /* We only need this next bit of code if the sign bit of B
4052 is below the sign bit of A. This would only happen if
4053 SRC_MASK had fewer bits than BITSIZE. Note that if
4054 SRC_MASK has more bits than BITSIZE, we can get into
4055 trouble; we would need to verify that B is in range, as
4056 we do for A above. */
4057 ss = ((~howto->src_mask) >> 1) & howto->src_mask;
4058 ss >>= bitpos;
4059
4060 /* Set all the bits above the sign bit. */
4061 b = (b ^ ss) - ss;
4062
4063 /* Now we can do the addition. */
4064 sum = a + b;
4065
4066 /* See if the result has the correct sign. Bits above the
4067 sign bit are junk now; ignore them. If the sum is
4068 positive, make sure we did not have all negative inputs;
4069 if the sum is negative, make sure we did not have all
4070 positive inputs. The test below looks only at the sign
4071 bits, and it really just
4072 SIGN (A) == SIGN (B) && SIGN (A) != SIGN (SUM)
4073
4074 We mask with addrmask here to explicitly allow an address
4075 wrap-around. The Linux kernel relies on it, and it is
4076 the only way to write assembler code which can run when
4077 loaded at a location 0x80000000 away from the location at
4078 which it is linked. */
4079
4080 if (((~(a ^ b)) & (a ^ sum)) & signmask & addrmask)
4081 flag = bfd_reloc_overflow;
4082 break;
4083 case complain_overflow_unsigned:
4084 /* Checking for an unsigned overflow is relatively easy:
4085 trim the addresses and add, and trim the result as well.
4086 Overflow is normally indicated when the result does not
4087 fit in the field. However, we also need to consider the
4088 case when, e.g., fieldmask is 0x7fffffff or smaller, an
4089 input is 0x80000000, and bfd_vma is only 32 bits; then we
4090 will get sum == 0, but there is an overflow, since the
4091 inputs did not fit in the field. Instead of doing a
4092 separate test, we can check for this by or-ing in the
4093 operands when testing for the sum overflowing its final
4094 field. */
4095 sum = (a + b) & addrmask;
4096 if ((a | b | sum) & signmask)
4097 flag = bfd_reloc_overflow;
4098 break;
4099 default:
4100 abort ();
4101 }
4102
4103 }
4104 /* Put RELOCATION in the right bits. */
f2173852 4105 relocation >>= rightshift;
b8891f8d
AJ
4106
4107 if ((howto->type == R_CKCORE_DOFFSET_LO16
4108 || howto->type == R_CKCORE_TOFFSET_LO16)
4109 && relocation == 0)
4110 /* Do nothing lsli32 rx, rz, 0. */
4111 ;
4112 else
4113 {
4114 /* Fir V1, all this relocation must be x -1. */
4115 if (howto->type == R_CKCORE_PCREL_IMM11BY2
4116 || howto->type == R_CKCORE_PCREL_JSR_IMM11BY2
4117 || howto->type == R_CKCORE_DOFFSET_LO16
4118 || howto->type == R_CKCORE_TOFFSET_LO16)
4119 relocation -= 1;
4120 else if (howto->type == R_CKCORE_PCREL_IMM7BY4)
4121 relocation = (relocation & 0x1f) + ((relocation << 3) & 0x300);
4122 else if (howto->type == R_CKCORE_PCREL_FLRW_IMM8BY4)
4123 relocation
4124 = ((relocation << 4) & 0xf0) + ((relocation << 17) & 0x1e00000);
4125 else if (howto->type == R_CKCORE_NOJSRI)
4126 {
4127 x = (x & howto->dst_mask) | CSKY_INSN_JSRI_TO_LRW;
4128 relocation = 0;
4129 csky_put_insn_32 (input_bfd, CSKY_INSN_JSR_R26, location + 4);
4130 }
4131
f2173852 4132 relocation <<= bitpos;
b8891f8d
AJ
4133 /* Add RELOCATION to the right bits of X. */
4134 x = ((x & ~howto->dst_mask)
4135 | (((x & howto->src_mask) + relocation) & howto->dst_mask));
4136 }
4137 /* Put the relocated value back in the object file. */
4138 switch (size)
4139 {
4140 default:
4141 abort ();
4142 case 1:
4143 bfd_put_8 (input_bfd, x, location);
4144 break;
4145 case 2:
4146 bfd_put_16 (input_bfd, x, location);
4147 break;
4148 case 4:
4149 if (need_reverse_bits)
4150 csky_put_insn_32 (input_bfd, x, location);
4151 else
4152 bfd_put_32 (input_bfd, x, location);
4153 break;
4154 }
4155 return flag;
4156}
4157
4158/* Look up an entry in the stub hash. Stub entries are cached because
4159 creating the stub name takes a bit of time. */
4160
4161static struct elf32_csky_stub_hash_entry *
4162elf32_csky_get_stub_entry (const asection *input_section,
4163 const asection *sym_sec,
4164 struct elf_link_hash_entry *hash,
4165 const Elf_Internal_Rela *rel,
4166 struct csky_elf_link_hash_table *htab)
4167{
4168 struct elf32_csky_stub_hash_entry *stub_entry;
4169 struct csky_elf_link_hash_entry *h
4170 = (struct csky_elf_link_hash_entry *) hash;
4171 const asection *id_sec;
4172
4173 if ((input_section->flags & SEC_CODE) == 0)
4174 return NULL;
4175
4176 /* If this input section is part of a group of sections sharing one
4177 stub section, then use the id of the first section in the group.
4178 Stub names need to include a section id, as there may well be
4179 more than one stub used to reach say, printf, and we need to
4180 distinguish between them. */
4181 id_sec = htab->stub_group[input_section->id].link_sec;
4182 if (h != NULL && h->stub_cache != NULL
4183 && h->stub_cache->h == h && h->stub_cache->id_sec == id_sec)
4184 stub_entry = h->stub_cache;
4185 else
4186 {
4187 char *stub_name;
4188 stub_name = elf32_csky_stub_name (id_sec, sym_sec, h, rel);
4189 if (stub_name == NULL)
4190 return NULL;
4191 stub_entry = csky_stub_hash_lookup (&htab->stub_hash_table,
0a1b45a2 4192 stub_name, false, false);
b8891f8d
AJ
4193 if (h != NULL)
4194 h->stub_cache = stub_entry;
4195 free (stub_name);
4196 }
4197
4198 return stub_entry;
4199}
4200
4201static bfd_reloc_status_type
4202csky_final_link_relocate (reloc_howto_type *howto,
4203 bfd *input_bfd,
4204 asection *input_section,
4205 bfd_byte *contents,
4206 bfd_vma address,
4207 bfd_vma value,
4208 bfd_vma addend)
4209{
4210 bfd_vma relocation;
4211
4212 /* Sanity check the address. */
4213 if (address > bfd_get_section_limit (input_bfd, input_section))
4214 return bfd_reloc_outofrange;
4215
4216 /* This function assumes that we are dealing with a basic relocation
4217 against a symbol. We want to compute the value of the symbol to
4218 relocate to. This is just VALUE, the value of the symbol,
4219 plus ADDEND, any addend associated with the reloc. */
4220 relocation = value + addend;
4221
4222 /* If the relocation is PC relative, we want to set RELOCATION to
4223 the distance between the symbol (currently in RELOCATION) and the
4224 location we are relocating. Some targets (e.g., i386-aout)
4225 arrange for the contents of the section to be the negative of the
4226 offset of the location within the section; for such targets
4227 pcrel_offset is FALSE. Other targets (e.g., m88kbcs or ELF)
4228 simply leave the contents of the section as zero; for such
4229 targets pcrel_offset is TRUE. If pcrel_offset is FALSE we do not
4230 need to subtract out the offset of the location within the
4231 section (which is just ADDRESS). */
4232 if (howto->pc_relative)
4233 {
4234 relocation -= (input_section->output_section->vma
4235 + input_section->output_offset);
4236 if (howto->pcrel_offset)
4237 relocation -= address;
4238 }
4239
4240 return csky_relocate_contents (howto, input_bfd, relocation,
4241 contents + address);
4242
4243}
4244
4245/* Return the base VMA address which should be subtracted from real addresses
4246 when resolving @dtpoff relocation.
4247 This is PT_TLS segment p_vaddr. */
4248
4249static bfd_vma
4250dtpoff_base (struct bfd_link_info *info)
4251{
4252 /* If tls_sec is NULL, we should have signalled an error already. */
4253 if (elf_hash_table (info)->tls_sec == NULL)
4254 return 0;
4255 return elf_hash_table (info)->tls_sec->vma;
4256}
4257
4258/* Return the relocation value for @tpoff relocation
4259 if STT_TLS virtual address is ADDRESS. */
4260
4261static bfd_vma
4262tpoff (struct bfd_link_info *info, bfd_vma address)
4263{
4264 struct elf_link_hash_table *htab = elf_hash_table (info);
4265 bfd_vma base;
4266
4267 /* If tls_sec is NULL, we should have signalled an error already. */
4268 if (htab->tls_sec == NULL)
4269 return 0;
4270 base = align_power ((bfd_vma) TCB_SIZE, htab->tls_sec->alignment_power);
4271 return address - htab->tls_sec->vma + base;
4272}
4273
4274/* Relocate a csky section. */
4275
0f684201 4276static int
b8891f8d
AJ
4277csky_elf_relocate_section (bfd * output_bfd,
4278 struct bfd_link_info * info,
4279 bfd * input_bfd,
4280 asection * input_section,
4281 bfd_byte * contents,
4282 Elf_Internal_Rela * relocs,
4283 Elf_Internal_Sym * local_syms,
4284 asection ** local_sections)
4285{
4286 Elf_Internal_Shdr *symtab_hdr;
4287 struct elf_link_hash_entry **sym_hashes;
4288 Elf_Internal_Rela *rel;
4289 Elf_Internal_Rela *relend;
4290 const char *name;
0a1b45a2 4291 bool ret = true;
b8891f8d
AJ
4292 struct csky_elf_link_hash_table * htab;
4293 bfd_vma *local_got_offsets = elf_local_got_offsets (input_bfd);
4294
4295 htab = csky_elf_hash_table (info);
4296 if (htab == NULL)
0a1b45a2 4297 return false;
b8891f8d
AJ
4298
4299 symtab_hdr = & elf_symtab_hdr (input_bfd);
4300 sym_hashes = elf_sym_hashes (input_bfd);
4301
4302 rel = relocs;
4303 relend = relocs + input_section->reloc_count;
4304 for (; rel < relend; rel++)
4305 {
0a1b45a2 4306 enum elf_csky_reloc_type r_type
b8891f8d 4307 = (enum elf_csky_reloc_type) ELF32_R_TYPE (rel->r_info);
0a1b45a2
AM
4308 unsigned long r_symndx;
4309 reloc_howto_type *howto;
4310 Elf_Internal_Sym *sym;
4311 asection *sec;
4312 bfd_vma relocation;
4313 bfd_vma off;
b8891f8d 4314 struct elf_link_hash_entry * h;
0a1b45a2
AM
4315 bfd_vma addend = (bfd_vma)rel->r_addend;
4316 bfd_reloc_status_type r = bfd_reloc_ok;
4317 bool unresolved_reloc = false;
4318 int do_final_relocate = true;
4319 bool relative_reloc = false;
b8891f8d
AJ
4320 bfd_signed_vma disp;
4321
4322 /* Ignore these relocation types:
4323 R_CKCORE_GNU_VTINHERIT, R_CKCORE_GNU_VTENTRY. */
4324 if (r_type == R_CKCORE_GNU_VTINHERIT || r_type == R_CKCORE_GNU_VTENTRY)
4325 continue;
4326
4327 if ((unsigned) r_type >= (unsigned) R_CKCORE_MAX)
4328 {
4329 /* The r_type is error, not support it. */
4330 /* xgettext:c-format */
4331 _bfd_error_handler (_("%pB: unsupported relocation type: %#x"),
4332 input_bfd, r_type);
4333 bfd_set_error (bfd_error_bad_value);
0a1b45a2 4334 ret = false;
b8891f8d
AJ
4335 continue;
4336 }
4337
4338 howto = &csky_elf_howto_table[(int) r_type];
4339
4340 r_symndx = ELF32_R_SYM(rel->r_info);
4341 h = NULL;
4342 sym = NULL;
4343 sec = NULL;
0a1b45a2 4344 unresolved_reloc = false;
b8891f8d
AJ
4345
4346 if (r_symndx < symtab_hdr->sh_info)
4347 {
4348 /* Get symbol table entry. */
4349 sym = local_syms + r_symndx;
4350 sec = local_sections[r_symndx];
4351 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
4352 addend = (bfd_vma)rel->r_addend;
4353 }
4354 else
4355 {
0a1b45a2 4356 bool warned, ignored;
b8891f8d
AJ
4357
4358 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4359 r_symndx, symtab_hdr, sym_hashes,
4360 h, sec, relocation,
4361 unresolved_reloc, warned, ignored);
4362 }
4363
4364 if (sec != NULL && discarded_section (sec))
4365 {
4366 /* For relocs against symbols from removed linkonce sections,
4367 or sections discarded by a linker script, we just want the
4368 section contents zeroed. Avoid any special processing.
4369 And if the symbol is referenced in '.csky_stack_size' section,
4370 set the address to SEC_DISCARDED(0xffffffff). */
4371#if 0
4372 /* The .csky_stack_size section is just for callgraph. */
4373 if (strcmp (input_section->name, ".csky_stack_size") == 0)
4374 {
4375/* FIXME: it should define in head file. */
4376#define SEC_DISCARDED 0xffffffff
4377 bfd_put_32 (input_bfd, SEC_DISCARDED, contents + rel->r_offset);
4378 rel->r_info = 0;
4379 rel->r_addend = 0;
4380 continue;
4381 }
4382 else
4383#endif
4384 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
4385 rel, 1, relend, howto, 0,
4386 contents);
4387 }
4388
4389 if (bfd_link_relocatable (info))
4390 continue;
4391
4392 read_content_substitute = 0;
4393
4394 /* Final link. */
4395 disp = (relocation
4396 + (bfd_signed_vma) addend
4397 - input_section->output_section->vma
4398 - input_section->output_offset
4399 - rel->r_offset);
4400/* It is for ck8xx. */
4401#define CSKY_INSN_BSR32 0xe0000000
4402/* It is for ck5xx/ck6xx. */
4403#define CSKY_INSN_BSR16 0xf800
4404#define within_range(x, L) (-(1 << (L - 1)) < (x) && (x) < (1 << (L -1)) - 2)
4405 switch (howto->type)
4406 {
4407 case R_CKCORE_PCREL_IMM18BY2:
4408 /* When h is NULL, means the instruction written as
4409 grs rx, imm32
4410 if the highest bit is set, prevent the high 32bits
4411 turn to 0xffffffff when signed extern in 64bit
4412 host machine. */
4413 if (h == NULL && (addend & 0x80000000))
4414 addend &= 0xffffffff;
4415 break;
fe75f42e
LX
4416
4417 case R_CKCORE_PCREL32:
4418 break;
4419
b8891f8d
AJ
4420 case R_CKCORE_GOT12:
4421 case R_CKCORE_PLT12:
4422 case R_CKCORE_GOT_HI16:
4423 case R_CKCORE_GOT_LO16:
4424 case R_CKCORE_PLT_HI16:
4425 case R_CKCORE_PLT_LO16:
4426 case R_CKCORE_GOT32:
4427 case R_CKCORE_GOT_IMM18BY4:
4428 /* Relocation is to the entry for this symbol in the global
4429 offset table. */
4430 BFD_ASSERT (htab->elf.sgot != NULL);
4431 if (h != NULL)
4432 {
4433 /* Global symbol is defined by other modules. */
0a1b45a2 4434 bool dyn;
b8891f8d
AJ
4435 off = h->got.offset;
4436 dyn = htab->elf.dynamic_sections_created;
4437 if (!WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
4438 bfd_link_pic (info), h)
4439 || (bfd_link_pic (info) && SYMBOL_REFERENCES_LOCAL (info,h))
4440 || (ELF_ST_VISIBILITY(h->other)
4441 && h->root.type == bfd_link_hash_undefweak))
4442 {
4443 /* This is actually a static link, or it is a
4444 -Bsymbolic link and the symbol is defined
4445 locally, or the symbol was forced to be local
4446 because of a version file. We must initialize
4447 this entry in the global offset table. Since the
4448 offset must always be a multiple of 4, we use the
4449 least significant bit to record whether we have
4450 initialized it already.
4451 When doing a dynamic link, we create a .rela.dyn
4452 relocation entry to initialize the value. This
4453 is done in the finish_dynamic_symbol routine. FIXME */
4454 if (off & 1)
4455 off &= ~1;
4456 else
4457 {
4458 bfd_put_32 (output_bfd, relocation,
4459 htab->elf.sgot->contents + off);
4460 h->got.offset |= 1;
4461
4462/* TRUE if relative relocation should be generated. GOT reference to
4463 global symbol in PIC will lead to dynamic symbol. It becomes a
4464 problem when "time" or "times" is defined as a variable in an
4465 executable, clashing with functions of the same name in libc. If a
4466 symbol isn't undefined weak symbol, don't make it dynamic in PIC and
4467 generate relative relocation. */
4468#define GENERATE_RELATIVE_RELOC_P(INFO, H) \
4469 ((H)->dynindx == -1 \
4470 && !(H)->forced_local \
4471 && (H)->root.type != bfd_link_hash_undefweak \
4472 && bfd_link_pic (INFO))
4473
4474 if (GENERATE_RELATIVE_RELOC_P (info, h))
4475 /* If this symbol isn't dynamic
4476 in PIC, generate R_CKCORE_RELATIVE here. */
0a1b45a2 4477 relative_reloc = true;
b8891f8d
AJ
4478 }
4479 }
4480 else
0a1b45a2 4481 unresolved_reloc = false;
b8891f8d
AJ
4482 } /* End if h != NULL. */
4483 else
4484 {
4485 BFD_ASSERT (local_got_offsets != NULL);
4486 off = local_got_offsets[r_symndx];
4487
4488 /* The offset must always be a multiple of 4. We use
4489 the least significant bit to record whether we have
4490 already generated the necessary reloc. */
4491 if (off & 1)
4492 off &= ~1;
4493 else
4494 {
4495 bfd_put_32 (output_bfd, relocation,
4496 htab->elf.sgot->contents + off);
4497 local_got_offsets[r_symndx] |= 1;
4498 if (bfd_link_pic (info))
0a1b45a2 4499 relative_reloc = true;
b8891f8d
AJ
4500 }
4501 }
4502 if (relative_reloc)
4503 {
4504 asection *srelgot;
4505 Elf_Internal_Rela outrel;
4506 bfd_byte *loc;
4507
4508 srelgot = htab->elf.srelgot;
4509 BFD_ASSERT (srelgot != NULL);
4510
4511 outrel.r_offset
4512 = (htab->elf.sgot->output_section->vma
4513 + htab->elf.sgot->output_offset + off);
4514 outrel.r_info = ELF32_R_INFO (0, R_CKCORE_RELATIVE);
4515 outrel.r_addend = relocation;
4516 loc = srelgot->contents;
4517 loc += (srelgot->reloc_count++ * sizeof (Elf32_External_Rela));
4518 if (loc != NULL)
4519 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4520 }
4521 relocation = htab->elf.sgot->output_offset + off;
4522 break;
4523
4524 case R_CKCORE_GOTOFF_IMM18:
4525 case R_CKCORE_GOTOFF:
4526 case R_CKCORE_GOTOFF_HI16:
4527 case R_CKCORE_GOTOFF_LO16:
4528 /* Relocation is relative to the start of the global offset
4529 table. */
4530 /* Note that sgot->output_offset is not involved in this
4531 calculation. We always want the start of .got. If we
4532 defined _GLOBAL_OFFSET_TABLE in a different way, as is
4533 permitted by the ABI, we might have to change this
4534 calculation. */
4535 relocation -= htab->elf.sgot->output_section->vma;
4536 break;
4537
4538 case R_CKCORE_GOTPC:
4539 case R_CKCORE_GOTPC_HI16:
4540 case R_CKCORE_GOTPC_LO16:
4541 /* Use global offset table as symbol value. */
4542 relocation = htab->elf.sgot->output_section->vma;
4543 addend = -addend;
0a1b45a2 4544 unresolved_reloc = false;
b8891f8d
AJ
4545 break;
4546
4547 case R_CKCORE_DOFFSET_IMM18:
4548 case R_CKCORE_DOFFSET_IMM18BY2:
4549 case R_CKCORE_DOFFSET_IMM18BY4:
4550 {
4551 asection *sdata = bfd_get_section_by_name (output_bfd, ".data");
4552 relocation -= sdata->output_section->vma;
4553 }
4554 break;
4555
4556 case R_CKCORE_DOFFSET_LO16:
4557 {
4558 asection *sdata = bfd_get_section_by_name (output_bfd, ".data");
4559 relocation -= sdata->output_section->vma;
4560 }
4561 break;
4562
4563 case R_CKCORE_TOFFSET_LO16:
4564 {
4565 asection *stext = bfd_get_section_by_name (output_bfd, ".text");
4566 if (stext)
4567 relocation -= stext->output_section->vma;
4568 }
4569 break;
4570
4571 case R_CKCORE_PLT_IMM18BY4:
4572 case R_CKCORE_PLT32:
4573 /* Relocation is to the entry for this symbol in the
4574 procedure linkage table. */
4575
4576 /* Resolve a PLT32 reloc against a local symbol directly,
4577 without using the procedure linkage table. */
4578 if (h == NULL)
4579 break;
4580
4581 if (h->plt.offset == (bfd_vma) -1 || htab->elf.splt == NULL)
4582 {
4583 /* We didn't make a PLT entry for this symbol. This
4584 happens when statically linking PIC code, or when
4585 using -Bsymbolic. */
4586 if (h->got.offset != (bfd_vma) -1)
4587 {
0a1b45a2 4588 bool dyn;
b8891f8d
AJ
4589
4590 off = h->got.offset;
4591 dyn = htab->elf.dynamic_sections_created;
4592 if (!WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
4593 bfd_link_pic (info), h)
4594 || (bfd_link_pic (info)
4595 && SYMBOL_REFERENCES_LOCAL (info, h))
4596 || (ELF_ST_VISIBILITY (h->other)
4597 && h->root.type == bfd_link_hash_undefweak))
4598 {
4599 /* This is actually a static link, or it is a
4600 -Bsymbolic link and the symbol is defined
4601 locally, or the symbol was forced to be local
4602 because of a version file. We must initialize
4603 this entry in the global offset table. Since the
4604 offset must always be a multiple of 4, we use the
4605 least significant bit to record whether we have
4606 initialized it already.
4607
4608 When doing a dynamic link, we create a .rela.dyn
4609 relocation entry to initialize the value. This
4610 is done in the finish_dynamic_symbol routine.
4611 FIXME! */
4612 if (off & 1)
4613 off &= ~1;
4614 else
4615 {
4616 h->got.offset |= 1;
4617 if (GENERATE_RELATIVE_RELOC_P (info, h))
0a1b45a2 4618 relative_reloc = true;
b8891f8d
AJ
4619 }
4620 }
4621 bfd_put_32 (output_bfd, relocation,
4622 htab->elf.sgot->contents + off);
4623
4624 if (relative_reloc)
4625 {
4626 asection *srelgot;
4627 Elf_Internal_Rela outrel;
4628 bfd_byte *loc;
4629
4630 srelgot = htab->elf.srelgot;
4631 BFD_ASSERT (srelgot != NULL);
4632
4633 outrel.r_offset
4634 = (htab->elf.sgot->output_section->vma
4635 + htab->elf.sgot->output_offset + off);
4636 outrel.r_info = ELF32_R_INFO (0, R_CKCORE_RELATIVE);
4637 outrel.r_addend = relocation;
4638 loc = srelgot->contents;
4639 loc += (srelgot->reloc_count++
4640 * sizeof (Elf32_External_Rela));
4641 if (loc != NULL)
4642 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4643 }
4644 relocation = off + htab->elf.sgot->output_offset;
4645 }
4646 break;
4647 }
4648 /* The relocation is the got offset. */
4649 if (bfd_csky_abi (output_bfd) == CSKY_ABI_V2)
4650 relocation = (h->plt.offset / PLT_ENTRY_SIZE + 2) * 4;
4651 else
4652 relocation = (h->plt.offset / PLT_ENTRY_SIZE_P + 2) * 4;
0a1b45a2 4653 unresolved_reloc = false;
b8891f8d
AJ
4654 break;
4655
4656 case R_CKCORE_PCREL_IMM26BY2:
4657 case R_CKCORE_PCREL_JSR_IMM26BY2:
4658 case R_CKCORE_PCREL_JSR_IMM11BY2:
4659 case R_CKCORE_PCREL_IMM11BY2:
4660 case R_CKCORE_CALLGRAPH:
4661 /* Emit callgraph information first. */
4662 /* TODO: deal with callgraph. */
4663 if (ELF32_R_TYPE (rel->r_info) == R_CKCORE_CALLGRAPH)
4664 break;
4665 /* Some reloc need further handling. */
4666 /* h == NULL means the symbol is a local symbol,
4667 r_symndx == 0 means the symbol is 'ABS' and
4668 the relocation is already handled in assemble,
4669 here just use for callgraph. */
4670 /* TODO: deal with callgraph. */
4671 if (h == NULL && r_symndx == 0)
4672 {
0a1b45a2 4673 do_final_relocate = false;
b8891f8d
AJ
4674 break;
4675 }
4676
4677 /* Ignore weak references to undefined symbols. */
4678 if (h != NULL && h->root.type == bfd_link_hash_undefweak)
4679 {
0a1b45a2 4680 do_final_relocate = false;
b8891f8d
AJ
4681 break;
4682 }
4683
4684 /* Using branch stub. */
0a1b45a2 4685 if (use_branch_stub == true
b8891f8d
AJ
4686 && ELF32_R_TYPE (rel->r_info) == R_CKCORE_PCREL_IMM26BY2)
4687 {
4688 struct elf32_csky_stub_hash_entry *stub_entry = NULL;
4689 if (sym_must_create_stub (h, info))
4690 stub_entry = elf32_csky_get_stub_entry (input_section,
4691 input_section,
4692 h, rel, htab);
4693 else if (disp > BSR_MAX_FWD_BRANCH_OFFSET
4694 || disp < BSR_MAX_BWD_BRANCH_OFFSET)
4695 stub_entry = elf32_csky_get_stub_entry (input_section,
4696 input_section,
4697 h, rel, htab);
4698 if (stub_entry != NULL)
4699 relocation
4700 = (stub_entry->stub_offset
4701 + stub_entry->stub_sec->output_offset
4702 + stub_entry->stub_sec->output_section->vma);
4703 break;
4704 }
4705
4706 else if (h == NULL
4707 || (h->root.type == bfd_link_hash_defined
4708 && h->dynindx == -1)
4709 || ((h->def_regular && !h->def_dynamic)
4710 && (h->root.type != bfd_link_hash_defweak
4711 || ! bfd_link_pic (info))))
4712 {
4713 if (ELF32_R_TYPE (rel->r_info) == R_CKCORE_PCREL_JSR_IMM26BY2)
4714 {
4715 if (within_range (disp, 26))
4716 {
4717 /* In range for BSR32. */
4718 howto = &csky_elf_howto_table[R_CKCORE_PCREL_IMM26BY2];
4719 read_content_substitute = CSKY_INSN_BSR32;
4720 }
4721 else if (bfd_csky_arch (output_bfd) == CSKY_ARCH_810)
4722 /* if bsr32 cannot reach, generate
4723 "lrw r25, label; jsr r25" instead of
4724 jsri label. */
4725 howto = &csky_elf_howto_table[R_CKCORE_NOJSRI];
4726 } /* if ELF32_R_TYPE (rel->r_info)... */
4727 else if (ELF32_R_TYPE (rel->r_info)
4728 == R_CKCORE_PCREL_JSR_IMM11BY2)
4729 {
4730 if (within_range (disp, 11))
4731 {
4732 /* In range for BSR16. */
4733 howto = &csky_elf_howto_table[R_CKCORE_PCREL_IMM11BY2];
4734 read_content_substitute = CSKY_INSN_BSR16;
4735 }
4736 }
4737 break;
4738 } /* else if h == NULL... */
4739
4740 else if (bfd_csky_arch (output_bfd) == CSKY_ARCH_810
4741 && (ELF32_R_TYPE (rel->r_info)
4742 == R_CKCORE_PCREL_JSR_IMM26BY2))
4743 {
4744 howto = &csky_elf_howto_table[R_CKCORE_NOJSRI];
4745 break;
4746 }
4747 /* Other situation, h->def_dynamic == 1,
4748 undefined_symbol when output file is shared object, etc. */
4749 /* Else fall through. */
4750
4751 case R_CKCORE_ADDR_HI16:
4752 case R_CKCORE_ADDR_LO16:
4753 if (bfd_link_pic (info)
4754 || (!bfd_link_pic (info)
4755 && h != NULL
4756 && h->dynindx != -1
4757 && !h->non_got_ref
4758 && ((h->def_dynamic && !h->def_regular)
4759 || (htab->elf.dynamic_sections_created
4760 && (h->root.type == bfd_link_hash_undefweak
4761 || h->root.type == bfd_link_hash_undefined
4762 || h->root.type == bfd_link_hash_indirect)))))
4763 {
4764 Elf_Internal_Rela outrel;
0a1b45a2 4765 bool skip, relocate;
b8891f8d
AJ
4766 bfd_byte *loc;
4767
4768 /* When generating a shared object, these relocations
4769 are copied into the output file to be resolved at
4770 run time. */
0a1b45a2
AM
4771 skip = false;
4772 relocate = false;
b8891f8d
AJ
4773
4774 outrel.r_offset =
4775 _bfd_elf_section_offset (output_bfd, info, input_section,
4776 rel->r_offset);
4777 if (outrel.r_offset == (bfd_vma) -1)
0a1b45a2 4778 skip = true;
b8891f8d
AJ
4779 else if (outrel.r_offset == (bfd_vma) -2)
4780 {
0a1b45a2
AM
4781 skip = true;
4782 relocate = true;
b8891f8d
AJ
4783 }
4784 outrel.r_offset += (input_section->output_section->vma
4785 + input_section->output_offset);
4786 if (skip)
4787 memset (&outrel, 0, sizeof (outrel));
4788 else if (h != NULL
4789 && h->dynindx != -1
4790 && (!bfd_link_pic (info)
4791 || (!SYMBOLIC_BIND (info, h)
4792 && h->root.type == bfd_link_hash_defweak)
4793 || !h->def_regular))
4794 {
4795 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
4796 outrel.r_addend = rel->r_addend;
4797 }
4798 else
4799 {
4800 /* This symbol is local, or marked to become local. */
0a1b45a2 4801 relocate = true;
b8891f8d
AJ
4802 outrel.r_info = ELF32_R_INFO (0, r_type);
4803 outrel.r_addend = relocation + rel->r_addend;
4804 }
4805 loc = htab->elf.srelgot->contents;
4806 loc += (htab->elf.srelgot->reloc_count++
4807 * sizeof (Elf32_External_Rela));
4808
4809 if (loc != NULL)
4810 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4811
4812 /* If this reloc is against an external symbol, we do not
4813 want to diddle with the addend. Otherwise, we need to
4814 include the symbol value so that it becomes an addend
4815 for the dynamic reloc. */
4816 if (!relocate)
4817 continue;
4818 } /* if bfd_link_pic (info) ... */
4819 break;
4820
4821 case R_CKCORE_ADDR32:
4822 /* r_symndx will be zero only for relocs against symbols
4823 from removed linkonce sections, or sections discarded
4824 by a linker script.
4825 This relocation don't nedd to handle, the value will
4826 be set to SEC_DISCARDED(0xffffffff). */
4827 if (r_symndx == 0
4828 && strcmp (sec->name, ".csky_stack_size") == 0)
4829 {
0a1b45a2 4830 do_final_relocate = false;
b8891f8d
AJ
4831 break;
4832 }
4833 if (r_symndx >= symtab_hdr->sh_info
4834 && h->non_got_ref
4835 && bfd_link_executable (info))
4836 break;
4837
4838 if (r_symndx == 0 || (input_section->flags & SEC_ALLOC) == 0)
4839 break;
4840
4841 if (bfd_link_pic (info)
4842 || (h != NULL
4843 && h->dynindx != -1
4844 && ((h->def_dynamic && !h->def_regular)
4845 || (htab->elf.dynamic_sections_created
4846 && (h->root.type == bfd_link_hash_undefweak
4847 || h->root.type == bfd_link_hash_undefined
4848 || h->root.type == bfd_link_hash_indirect)))))
4849 {
4850 Elf_Internal_Rela outrel;
0a1b45a2 4851 bool skip, relocate;
b8891f8d
AJ
4852 bfd_byte *loc;
4853
4854 /* When generating a shared object, these relocations
4855 are copied into the output file to be resolved at
4856 run time. */
0a1b45a2
AM
4857 skip = false;
4858 relocate = false;
b8891f8d
AJ
4859
4860 outrel.r_offset =
4861 _bfd_elf_section_offset (output_bfd, info, input_section,
4862 rel->r_offset);
4863
4864 if (outrel.r_offset == (bfd_vma) -1)
0a1b45a2 4865 skip = true;
b8891f8d
AJ
4866 else if (outrel.r_offset == (bfd_vma) -2)
4867 {
0a1b45a2
AM
4868 skip = true;
4869 relocate = true;
b8891f8d
AJ
4870 }
4871
4872 outrel.r_offset += (input_section->output_section->vma
4873 + input_section->output_offset);
4874
4875 if (skip)
4876 memset (&outrel, 0, sizeof (outrel));
4877 else if (h != NULL
4878 && h->dynindx != -1
4879 && (!bfd_link_pic (info)
4880 || (!SYMBOLIC_BIND (info, h)
4881 && h->root.type == bfd_link_hash_defweak)
4882 || !h->def_regular))
4883 {
4884 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
4885 outrel.r_addend = rel->r_addend;
4886 }
4887 else
4888 {
4889 /* This symbol is local, or marked to become local. */
4890 outrel.r_info = ELF32_R_INFO (0, R_CKCORE_RELATIVE);
4891 outrel.r_addend = relocation + rel->r_addend;
4892 }
4893
4894 loc = htab->elf.srelgot->contents;
4895 loc += (htab->elf.srelgot->reloc_count++
4896 * sizeof (Elf32_External_Rela));
4897
4898 if (loc != NULL)
4899 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4900
4901 /* If this reloc is against an external symbol, we do
4902 want to diddle with the addend. Otherwise, we need to
4903 include the symbol value so that it becomes an addend
4904 for the dynamic reloc. */
4905 if (! relocate)
4906 continue;
4907 }
4908 break;
4909
4910 case R_CKCORE_TLS_LDO32:
4911 relocation = relocation - dtpoff_base (info);
4912 break;
4913
4914 case R_CKCORE_TLS_LDM32:
4915 BFD_ASSERT (htab->elf.sgot != NULL);
4916 off = htab->tls_ldm_got.offset;
4917 if (off & 1)
4918 off &= ~1;
4919 else
4920 {
4921 /* If we don't know the module number,
4922 create a relocation for it. */
4923 if (!bfd_link_executable (info))
4924 {
4925 Elf_Internal_Rela outrel;
4926 bfd_byte *loc;
4927
4928 BFD_ASSERT (htab->elf.srelgot != NULL);
4929 outrel.r_addend = 0;
4930 outrel.r_offset
4931 = (htab->elf.sgot->output_section->vma
4932 + htab->elf.sgot->output_offset + off);
4933 outrel.r_info = ELF32_R_INFO (0, R_CKCORE_TLS_DTPMOD32);
4934 bfd_put_32 (output_bfd, outrel.r_addend,
4935 htab->elf.sgot->contents + off);
4936
4937 loc = htab->elf.srelgot->contents;
4938 loc += (htab->elf.srelgot->reloc_count++
4939 * sizeof (Elf32_External_Rela));
4940 if (loc)
4941 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4942 }
4943 else
4944 bfd_put_32 (output_bfd, 1,
4945 htab->elf.sgot->contents + off);
4946 htab->tls_ldm_got.offset |= 1;
4947 }
4948 relocation
4949 = (htab->elf.sgot->output_section->vma
4950 + htab->elf.sgot->output_offset + off
4951 - (input_section->output_section->vma
4952 + input_section->output_offset + rel->r_offset));
4953 break;
4954 case R_CKCORE_TLS_LE32:
4955 if (bfd_link_dll (info))
4956 {
4957 _bfd_error_handler
4958 /* xgettext:c-format */
4959 (_("%pB(%pA+%#" PRIx64 "): %s relocation not permitted "
4960 "in shared object"),
4961 input_bfd, input_section, (uint64_t)rel->r_offset,
4962 howto->name);
0a1b45a2 4963 return false;
b8891f8d
AJ
4964 }
4965 else
4966 relocation = tpoff (info, relocation);
4967 break;
4968 case R_CKCORE_TLS_GD32:
4969 case R_CKCORE_TLS_IE32:
4970 {
4971 int indx;
4972 char tls_type;
4973
4974 BFD_ASSERT (htab->elf.sgot != NULL);
4975
4976 indx = 0;
4977 if (h != NULL)
4978 {
0a1b45a2 4979 bool dyn;
b8891f8d
AJ
4980 dyn = htab->elf.dynamic_sections_created;
4981 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
4982 bfd_link_pic (info), h)
4983 && (!bfd_link_pic (info)
4984 || !SYMBOL_REFERENCES_LOCAL (info, h)))
4985 {
0a1b45a2 4986 unresolved_reloc = false;
b8891f8d
AJ
4987 indx = h->dynindx;
4988 }
4989 off = h->got.offset;
4990 tls_type = ((struct csky_elf_link_hash_entry *)h)->tls_type;
4991 }
4992 else
4993 {
4994 BFD_ASSERT (local_got_offsets != NULL);
4995 off = local_got_offsets[r_symndx];
4996 tls_type = csky_elf_local_got_tls_type (input_bfd)[r_symndx];
4997 }
4998
4999 BFD_ASSERT (tls_type != GOT_UNKNOWN);
5000
5001 if (off & 1)
5002 off &= ~1;
5003 else
5004 {
0a1b45a2 5005 bool need_relocs = false;
b8891f8d
AJ
5006 Elf_Internal_Rela outrel;
5007 bfd_byte *loc = NULL;
5008 int cur_off = off;
5009 /* The GOT entries have not been initialized yet. Do it
5010 now, and emit any relocations. If both an IE GOT and a
5011 GD GOT are necessary, we emit the GD first. */
5012 if ((!bfd_link_executable (info) || indx != 0)
5013 && (h == NULL
5014 || (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
5015 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
5016 || h->root.type != bfd_link_hash_undefined))
5017 {
0a1b45a2 5018 need_relocs = true;
b8891f8d
AJ
5019 BFD_ASSERT (htab->elf.srelgot != NULL);
5020
5021 loc = htab->elf.srelgot->contents;
5022 loc += (htab->elf.srelgot->reloc_count
5023 * sizeof (Elf32_External_Rela));
5024 }
5025 if (tls_type & GOT_TLS_GD)
5026 {
5027 if (need_relocs)
5028 {
5029 outrel.r_addend = 0;
5030 outrel.r_offset
5031 = (htab->elf.sgot->output_section->vma
5032 + htab->elf.sgot->output_offset
5033 + cur_off);
5034 outrel.r_info
5035 = ELF32_R_INFO (indx, R_CKCORE_TLS_DTPMOD32);
5036 bfd_put_32 (output_bfd, outrel.r_addend,
5037 htab->elf.sgot->contents + cur_off);
5038 if (loc)
5039 bfd_elf32_swap_reloca_out (output_bfd,
5040 &outrel, loc);
5041 loc += sizeof (Elf32_External_Rela);
5042 htab->elf.srelgot->reloc_count++;
5043 if (indx == 0)
5044 bfd_put_32 (output_bfd,
5045 relocation - dtpoff_base (info),
5046 (htab->elf.sgot->contents
5047 + cur_off + 4));
5048 else
5049 {
5050 outrel.r_addend = 0;
5051 outrel.r_info
5052 = ELF32_R_INFO (indx, R_CKCORE_TLS_DTPOFF32);
5053 outrel.r_offset += 4;
5054 bfd_put_32 (output_bfd, outrel.r_addend,
5055 (htab->elf.sgot->contents
5056 + cur_off + 4));
5057 outrel.r_info =
5058 ELF32_R_INFO (indx,
5059 R_CKCORE_TLS_DTPOFF32);
5060 if (loc)
5061 bfd_elf32_swap_reloca_out (output_bfd,
5062 &outrel,
5063 loc);
5064 htab->elf.srelgot->reloc_count++;
5065 loc += sizeof (Elf32_External_Rela);
5066 }
5067
5068 }
5069 else
5070 {
5071 /* If are not emitting relocations for a
5072 general dynamic reference, then we must be in a
5073 static link or an executable link with the
5074 symbol binding locally. Mark it as belonging
5075 to module 1, the executable. */
5076 bfd_put_32 (output_bfd, 1,
5077 htab->elf.sgot->contents + cur_off);
5078 bfd_put_32 (output_bfd,
5079 relocation - dtpoff_base (info),
5080 htab->elf.sgot->contents
5081 + cur_off + 4);
5082 }
5083 cur_off += 8;
5084 }
5085 if (tls_type & GOT_TLS_IE)
5086 {
5087 if (need_relocs)
5088 {
5089 if (indx == 0)
5090 outrel.r_addend = relocation - dtpoff_base (info);
5091 else
5092 outrel.r_addend = 0;
5093 outrel.r_offset
5094 = (htab->elf.sgot->output_section->vma
5095 + htab->elf.sgot->output_offset + cur_off);
5096 outrel.r_info
5097 = ELF32_R_INFO (indx, R_CKCORE_TLS_TPOFF32);
5098
5099 bfd_put_32 (output_bfd, outrel.r_addend,
5100 htab->elf.sgot->contents + cur_off);
5101 if (loc)
5102 bfd_elf32_swap_reloca_out (output_bfd,
5103 &outrel, loc);
5104 htab->elf.srelgot->reloc_count++;
5105 loc += sizeof (Elf32_External_Rela);
5106 }
5107 else
5108 bfd_put_32 (output_bfd, tpoff (info, relocation),
5109 htab->elf.sgot->contents + cur_off);
5110 }
5111 if (h != NULL)
5112 h->got.offset |= 1;
5113 else
5114 local_got_offsets[r_symndx] |= 1;
5115 }
5116 if ((tls_type & GOT_TLS_GD) && howto->type != R_CKCORE_TLS_GD32)
5117 off += 8;
5118 relocation
5119 = (htab->elf.sgot->output_section->vma
5120 + htab->elf.sgot->output_offset + off
5121 - (input_section->output_section->vma
5122 + input_section->output_offset
5123 + rel->r_offset));
5124 break;
5125 }
5126 default:
5127 /* No substitution when final linking. */
5128 read_content_substitute = 0;
5129 break;
5130 } /* End switch (howto->type). */
5131
5132 /* Make sure 32-bit data in the text section will not be affected by
5133 our special endianness.
5134 However, this currently affects noting, since the ADDR32 howto type
5135 does no change with the data read. But we may need this mechanism in
5136 the future. */
5137
57698478 5138 if (bfd_get_reloc_size (howto) == 4
b8891f8d 5139 && (howto->type == R_CKCORE_ADDR32
fe75f42e 5140 || howto->type == R_CKCORE_PCREL32
b8891f8d
AJ
5141 || howto->type == R_CKCORE_GOT32
5142 || howto->type == R_CKCORE_GOTOFF
5143 || howto->type == R_CKCORE_GOTPC
5144 || howto->type == R_CKCORE_PLT32
5145 || howto->type == R_CKCORE_TLS_LE32
5146 || howto->type == R_CKCORE_TLS_IE32
5147 || howto->type == R_CKCORE_TLS_LDM32
5148 || howto->type == R_CKCORE_TLS_GD32
5149 || howto->type == R_CKCORE_TLS_LDO32
5150 || howto->type == R_CKCORE_RELATIVE))
5151 need_reverse_bits = 0;
5152 else
5153 need_reverse_bits = 1;
5154 /* Do the final link. */
5155 if (howto->type != R_CKCORE_PCREL_JSR_IMM11BY2
5156 && howto->type != R_CKCORE_PCREL_JSR_IMM26BY2
5157 && howto->type != R_CKCORE_CALLGRAPH
5158 && do_final_relocate)
5159 r = csky_final_link_relocate (howto, input_bfd, input_section,
5160 contents, rel->r_offset,
5161 relocation, addend);
5162
5163 if (r != bfd_reloc_ok)
5164 {
0a1b45a2 5165 ret = false;
b8891f8d
AJ
5166 switch (r)
5167 {
5168 default:
5169 break;
5170 case bfd_reloc_overflow:
5171 if (h != NULL)
5172 name = NULL;
5173 else
5174 {
5175 name = bfd_elf_string_from_elf_section (input_bfd,
5176 symtab_hdr->sh_link,
5177 sym->st_name);
5178 if (name == NULL)
5179 break;
5180 if (*name == '\0')
fd361982 5181 name = bfd_section_name (sec);
b8891f8d
AJ
5182 }
5183 (*info->callbacks->reloc_overflow)
5184 (info,
5185 (h ? &h->root : NULL),
5186 name, howto->name, (bfd_vma) 0,
5187 input_bfd, input_section, rel->r_offset);
5188 break;
5189 }
5190 }
5191 } /* End for (;rel < relend; rel++). */
5192 return ret;
5193}
5194
0a1b45a2 5195static bool
b8891f8d
AJ
5196csky_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
5197{
5198 int offset;
5199 size_t size;
5200
5201 switch (note->descsz)
5202 {
5203 default:
0a1b45a2 5204 return false;
b8891f8d
AJ
5205 /* Sizeof (struct elf_prstatus) on C-SKY V1 arch. */
5206 case 148:
5207 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
5208 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
5209 offset = 72;
5210 size = 72;
5211 break;
5212 /* Sizeof (struct elf_prstatus) on C-SKY V1 arch. */
5213 case 220:
5214 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
5215 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
5216 offset = 72;
5217 size = 34 * 4;
5218 break;
5219 }
5220 /* Make a ".reg/999" section. */
5221 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
5222 size, note->descpos + offset);
5223}
5224
0a1b45a2 5225static bool
b8891f8d
AJ
5226csky_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
5227{
5228 switch (note->descsz)
5229 {
5230 default:
0a1b45a2 5231 return false;
b8891f8d
AJ
5232
5233 /* Sizeof (struct elf_prpsinfo) on linux csky. */
5234 case 124:
5235 elf_tdata (abfd)->core->program
5236 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
5237 elf_tdata (abfd)->core->command
5238 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
5239 }
5240
5241 /* Note that for some reason, a spurious space is tacked
5242 onto the end of the args in some (at least one anyway)
5243 implementations, so strip it off if it exists. */
5244 {
5245 char *command = elf_tdata (abfd)->core->command;
5246 int n = strlen (command);
5247
5248 if (0 < n && command[n - 1] == ' ')
5249 command[n - 1] = '\0';
5250 }
5251
0a1b45a2 5252 return true;
b8891f8d
AJ
5253}
5254
0861f561
CQ
5255/* Determine whether an object attribute tag takes an integer, a
5256 string or both. */
5257
5258static int
5259elf32_csky_obj_attrs_arg_type (int tag)
5260{
5261 switch (tag)
5262 {
5263 case Tag_compatibility:
5264 return ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_STR_VAL;
5265 case Tag_CSKY_ARCH_NAME:
5266 case Tag_CSKY_CPU_NAME:
5267 case Tag_CSKY_FPU_NUMBER_MODULE:
5268 return ATTR_TYPE_FLAG_STR_VAL;
5269 case Tag_CSKY_ISA_FLAGS:
5270 case Tag_CSKY_ISA_EXT_FLAGS:
5271 case Tag_CSKY_DSP_VERSION:
5272 case Tag_CSKY_VDSP_VERSION:
5273 case Tag_CSKY_FPU_VERSION:
5274 case Tag_CSKY_FPU_ABI:
5275 case Tag_CSKY_FPU_ROUNDING:
5276 case Tag_CSKY_FPU_HARDFP:
5277 case Tag_CSKY_FPU_Exception:
5278 case Tag_CSKY_FPU_DENORMAL:
5279 return ATTR_TYPE_FLAG_INT_VAL;
5280 default:
5281 break;
5282 }
5283
5284 return (tag & 1) != 0 ? ATTR_TYPE_FLAG_STR_VAL : ATTR_TYPE_FLAG_INT_VAL;
5285}
5286
5287/* Attribute numbers >=64 (mod 128) can be safely ignored. */
5288
0a1b45a2 5289static bool
0861f561
CQ
5290elf32_csky_obj_attrs_handle_unknown (bfd *abfd ATTRIBUTE_UNUSED,
5291 int tag ATTRIBUTE_UNUSED)
5292{
0a1b45a2 5293 return true;
0861f561
CQ
5294}
5295
b8891f8d
AJ
5296/* End of external entry points for sizing and building linker stubs. */
5297
5298/* CPU-related basic API. */
5299#define TARGET_BIG_SYM csky_elf32_be_vec
5300#define TARGET_BIG_NAME "elf32-csky-big"
5301#define TARGET_LITTLE_SYM csky_elf32_le_vec
5302#define TARGET_LITTLE_NAME "elf32-csky-little"
5303#define ELF_ARCH bfd_arch_csky
5304#define ELF_MACHINE_CODE EM_CSKY
5305#define ELF_MACHINE_ALT1 EM_CSKY_OLD
5306#define ELF_MAXPAGESIZE 0x1000
5307#define elf_info_to_howto csky_elf_info_to_howto
5308#define elf_info_to_howto_rel NULL
5309#define elf_backend_special_sections csky_elf_special_sections
5310#define bfd_elf32_bfd_link_hash_table_create csky_elf_link_hash_table_create
5311
5312/* Target related API. */
5313#define bfd_elf32_mkobject csky_elf_mkobject
5314#define bfd_elf32_bfd_merge_private_bfd_data csky_elf_merge_private_bfd_data
5315#define bfd_elf32_bfd_set_private_flags csky_elf_set_private_flags
5316#define elf_backend_copy_indirect_symbol csky_elf_copy_indirect_symbol
5072b52d
AM
5317#define bfd_elf32_bfd_is_target_special_symbol csky_elf_is_target_special_symbol
5318#define elf_backend_maybe_function_sym csky_elf_maybe_function_sym
b8891f8d
AJ
5319
5320/* GC section related API. */
5321#define elf_backend_can_gc_sections 1
5322#define elf_backend_gc_mark_hook csky_elf_gc_mark_hook
5323#define elf_backend_gc_mark_extra_sections elf32_csky_gc_mark_extra_sections
5324
5325/* Relocation related API. */
5326#define elf_backend_reloc_type_class csky_elf_reloc_type_class
5327#define bfd_elf32_bfd_reloc_type_lookup csky_elf_reloc_type_lookup
5328#define bfd_elf32_bfd_reloc_name_lookup csky_elf_reloc_name_lookup
5329#define elf_backend_ignore_discarded_relocs csky_elf_ignore_discarded_relocs
5330#define elf_backend_relocate_section csky_elf_relocate_section
5331#define elf_backend_check_relocs csky_elf_check_relocs
5332
5333/* Dynamic relocate related API. */
5334#define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
5335#define elf_backend_adjust_dynamic_symbol csky_elf_adjust_dynamic_symbol
5336#define elf_backend_size_dynamic_sections csky_elf_size_dynamic_sections
5337#define elf_backend_finish_dynamic_symbol csky_elf_finish_dynamic_symbol
5338#define elf_backend_finish_dynamic_sections csky_elf_finish_dynamic_sections
5339#define elf_backend_rela_normal 1
5340#define elf_backend_can_refcount 1
5341#define elf_backend_plt_readonly 1
5342#define elf_backend_want_got_sym 1
5343#define elf_backend_want_dynrelro 1
5344#define elf_backend_got_header_size 12
5345#define elf_backend_want_got_plt 1
5346
5347/* C-SKY coredump support. */
5348#define elf_backend_grok_prstatus csky_elf_grok_prstatus
5349#define elf_backend_grok_psinfo csky_elf_grok_psinfo
5350
0861f561
CQ
5351/* Attribute sections. */
5352#undef elf_backend_obj_attrs_vendor
5353#define elf_backend_obj_attrs_vendor "csky"
5354#undef elf_backend_obj_attrs_section
5355#define elf_backend_obj_attrs_section ".csky.attributes"
5356#undef elf_backend_obj_attrs_arg_type
5357#define elf_backend_obj_attrs_arg_type elf32_csky_obj_attrs_arg_type
5358#undef elf_backend_obj_attrs_section_type
5359#define elf_backend_obj_attrs_section_type SHT_CSKY_ATTRIBUTES
5360#define elf_backend_obj_attrs_handle_unknown elf32_csky_obj_attrs_handle_unknown
5361
b8891f8d 5362#include "elf32-target.h"