]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-tilepro.c
PR 30569, always call elf_backend_size_dynamic_sections
[thirdparty/binutils-gdb.git] / bfd / elf32-tilepro.c
CommitLineData
aa137e4d 1/* TILEPro-specific support for 32-bit ELF.
fd67aa11 2 Copyright (C) 2011-2024 Free Software Foundation, Inc.
aa137e4d
NC
3
4 This file is part of BFD, the Binary File Descriptor library.
5
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
10
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
15
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
19 MA 02110-1301, USA. */
20
aa137e4d 21#include "sysdep.h"
691bf19c 22#include "bfd.h"
aa137e4d
NC
23#include "libbfd.h"
24#include "elf-bfd.h"
25#include "elf/tilepro.h"
26#include "opcode/tilepro.h"
27#include "libiberty.h"
28#include "elf32-tilepro.h"
29
30#define TILEPRO_BYTES_PER_WORD 4
31
32static reloc_howto_type tilepro_elf_howto_table [] =
33{
34 /* This reloc does nothing. */
35 HOWTO (R_TILEPRO_NONE, /* type */
36 0, /* rightshift */
c94cb026 37 0, /* size */
6346d5ca 38 0, /* bitsize */
0a1b45a2 39 false, /* pc_relative */
aa137e4d 40 0, /* bitpos */
6346d5ca 41 complain_overflow_dont, /* complain_on_overflow */
aa137e4d
NC
42 bfd_elf_generic_reloc, /* special_function */
43 "R_TILEPRO_NONE", /* name */
0a1b45a2 44 false, /* partial_inplace */
aa137e4d
NC
45 0, /* src_mask */
46 0, /* dst_mask */
0a1b45a2 47 false), /* pcrel_offset */
aa137e4d
NC
48
49 /* A 32 bit absolute relocation. */
50 HOWTO (R_TILEPRO_32, /* type */
51 0, /* rightshift */
c94cb026 52 4, /* size */
aa137e4d 53 32, /* bitsize */
0a1b45a2 54 false, /* pc_relative */
aa137e4d
NC
55 0, /* bitpos */
56 complain_overflow_dont, /* complain_on_overflow */
57 bfd_elf_generic_reloc, /* special_function */
58 "R_TILEPRO_32", /* name */
0a1b45a2 59 false, /* partial_inplace */
aa137e4d
NC
60 0, /* src_mask */
61 0xffffffff, /* dst_mask */
0a1b45a2 62 false), /* pcrel_offset */
aa137e4d
NC
63
64 /* A 16 bit absolute relocation. */
65 HOWTO (R_TILEPRO_16, /* type */
66 0, /* rightshift */
c94cb026 67 2, /* size */
aa137e4d 68 16, /* bitsize */
0a1b45a2 69 false, /* pc_relative */
aa137e4d
NC
70 0, /* bitpos */
71 complain_overflow_bitfield, /* complain_on_overflow */
72 bfd_elf_generic_reloc, /* special_function */
73 "R_TILEPRO_16", /* name */
0a1b45a2 74 false, /* partial_inplace */
aa137e4d
NC
75 0, /* src_mask */
76 0xffff, /* dst_mask */
0a1b45a2 77 false), /* pcrel_offset */
aa137e4d
NC
78
79 /* An 8 bit absolute relocation. */
80 HOWTO (R_TILEPRO_8, /* type */
81 0, /* rightshift */
c94cb026 82 1, /* size */
aa137e4d 83 8, /* bitsize */
0a1b45a2 84 false, /* pc_relative */
aa137e4d
NC
85 0, /* bitpos */
86 complain_overflow_unsigned, /* complain_on_overflow */
87 bfd_elf_generic_reloc, /* special_function */
88 "R_TILEPRO_8", /* name */
0a1b45a2 89 false, /* partial_inplace */
aa137e4d
NC
90 0, /* src_mask */
91 0xff, /* dst_mask */
0a1b45a2 92 false), /* pcrel_offset */
aa137e4d
NC
93
94 /* A 32 bit pc-relative relocation. */
95 HOWTO (R_TILEPRO_32_PCREL,/* type */
96 0, /* rightshift */
c94cb026 97 4, /* size */
aa137e4d 98 32, /* bitsize */
0a1b45a2 99 true, /* pc_relative */
aa137e4d
NC
100 0, /* bitpos */
101 complain_overflow_dont, /* complain_on_overflow */
102 bfd_elf_generic_reloc, /* special_function */
103 "R_TILEPRO_32_PCREL", /* name */
0a1b45a2 104 false, /* partial_inplace */
aa137e4d
NC
105 0, /* src_mask */
106 0xffffffff, /* dst_mask */
0a1b45a2 107 true), /* pcrel_offset */
aa137e4d
NC
108
109 /* A 16 bit pc-relative relocation. */
110 HOWTO (R_TILEPRO_16_PCREL,/* type */
111 0, /* rightshift */
c94cb026 112 2, /* size */
aa137e4d 113 16, /* bitsize */
0a1b45a2 114 true, /* pc_relative */
aa137e4d
NC
115 0, /* bitpos */
116 complain_overflow_signed, /* complain_on_overflow */
117 bfd_elf_generic_reloc, /* special_function */
118 "R_TILEPRO_16_PCREL", /* name */
0a1b45a2 119 false, /* partial_inplace */
aa137e4d
NC
120 0, /* src_mask */
121 0xffff, /* dst_mask */
0a1b45a2 122 true), /* pcrel_offset */
aa137e4d
NC
123
124 /* An 8 bit pc-relative relocation. */
125 HOWTO (R_TILEPRO_8_PCREL, /* type */
126 0, /* rightshift */
c94cb026 127 1, /* size */
aa137e4d 128 8, /* bitsize */
0a1b45a2 129 true, /* pc_relative */
aa137e4d
NC
130 0, /* bitpos */
131 complain_overflow_signed, /* complain_on_overflow */
132 bfd_elf_generic_reloc, /* special_function */
133 "R_TILEPRO_8_PCREL",/* name */
0a1b45a2 134 false, /* partial_inplace */
aa137e4d
NC
135 0, /* src_mask */
136 0xff, /* dst_mask */
0a1b45a2 137 true), /* pcrel_offset */
aa137e4d
NC
138
139 /* A 16 bit relocation without overflow. */
140 HOWTO (R_TILEPRO_LO16, /* type */
141 0, /* rightshift */
c94cb026 142 2, /* size */
aa137e4d 143 16, /* bitsize */
0a1b45a2 144 false, /* pc_relative */
aa137e4d
NC
145 0, /* bitpos */
146 complain_overflow_dont,/* complain_on_overflow */
147 bfd_elf_generic_reloc, /* special_function */
148 "R_TILEPRO_LO16", /* name */
0a1b45a2 149 false, /* partial_inplace */
aa137e4d
NC
150 0, /* src_mask */
151 0xffff, /* dst_mask */
0a1b45a2 152 false), /* pcrel_offset */
aa137e4d
NC
153
154 /* The high order 16 bits of an address. */
155 HOWTO (R_TILEPRO_HI16, /* type */
156 16, /* rightshift */
c94cb026 157 2, /* size */
aa137e4d 158 16, /* bitsize */
0a1b45a2 159 false, /* pc_relative */
aa137e4d
NC
160 0, /* bitpos */
161 complain_overflow_dont, /* complain_on_overflow */
162 bfd_elf_generic_reloc, /* special_function */
163 "R_TILEPRO_HI16", /* name */
0a1b45a2 164 false, /* partial_inplace */
aa137e4d
NC
165 0, /* src_mask */
166 0xffff, /* dst_mask */
0a1b45a2 167 false), /* pcrel_offset */
aa137e4d
NC
168
169 /* The high order 16 bits of an address, plus 1 if the contents of
170 the low 16 bits, treated as a signed number, is negative. */
171 HOWTO (R_TILEPRO_HA16, /* type */
172 16, /* rightshift */
c94cb026 173 2, /* size */
aa137e4d 174 16, /* bitsize */
0a1b45a2 175 false, /* pc_relative */
aa137e4d
NC
176 0, /* bitpos */
177 complain_overflow_dont, /* complain_on_overflow */
178 bfd_elf_generic_reloc, /* special_function */
179 "R_TILEPRO_HA16", /* name */
0a1b45a2 180 false, /* partial_inplace */
aa137e4d
NC
181 0, /* src_mask */
182 0xffff, /* dst_mask */
0a1b45a2 183 false), /* pcrel_offset */
aa137e4d 184
c94cb026 185 HOWTO (R_TILEPRO_COPY, /* type */
aa137e4d 186 0, /* rightshift */
5d0feb98 187 0, /* size */
aa137e4d 188 0, /* bitsize */
0a1b45a2 189 false, /* pc_relative */
aa137e4d
NC
190 0, /* bitpos */
191 complain_overflow_dont, /* complain_on_overflow */
192 bfd_elf_generic_reloc, /* special_function */
193 "R_TILEPRO_COPY", /* name */
0a1b45a2 194 false, /* partial_inplace */
aa137e4d
NC
195 0, /* src_mask */
196 0, /* dst_mask */
0a1b45a2 197 true), /* pcrel_offset */
aa137e4d
NC
198
199 HOWTO (R_TILEPRO_GLOB_DAT, /* type */
200 0, /* rightshift */
5d0feb98 201 0, /* size */
aa137e4d 202 0, /* bitsize */
0a1b45a2 203 false, /* pc_relative */
aa137e4d
NC
204 0, /* bitpos */
205 complain_overflow_dont, /* complain_on_overflow */
206 bfd_elf_generic_reloc, /* special_function */
207 "R_TILEPRO_GLOB_DAT", /* name */
0a1b45a2 208 false, /* partial_inplace */
aa137e4d
NC
209 0, /* src_mask */
210 0, /* dst_mask */
0a1b45a2 211 true), /* pcrel_offset */
aa137e4d
NC
212
213 HOWTO (R_TILEPRO_JMP_SLOT, /* type */
214 0, /* rightshift */
5d0feb98 215 0, /* size */
aa137e4d 216 0, /* bitsize */
0a1b45a2 217 false, /* pc_relative */
aa137e4d
NC
218 0, /* bitpos */
219 complain_overflow_dont, /* complain_on_overflow */
220 bfd_elf_generic_reloc, /* special_function */
221 "R_TILEPRO_JMP_SLOT", /* name */
0a1b45a2 222 false, /* partial_inplace */
aa137e4d
NC
223 0, /* src_mask */
224 0, /* dst_mask */
0a1b45a2 225 true), /* pcrel_offset */
aa137e4d
NC
226
227 HOWTO (R_TILEPRO_RELATIVE, /* type */
228 0, /* rightshift */
5d0feb98 229 0, /* size */
aa137e4d 230 0, /* bitsize */
0a1b45a2 231 false, /* pc_relative */
aa137e4d
NC
232 0, /* bitpos */
233 complain_overflow_dont, /* complain_on_overflow */
234 bfd_elf_generic_reloc, /* special_function */
235 "R_TILEPRO_RELATIVE", /* name */
0a1b45a2 236 false, /* partial_inplace */
aa137e4d
NC
237 0, /* src_mask */
238 0, /* dst_mask */
0a1b45a2 239 true), /* pcrel_offset */
aa137e4d
NC
240
241 HOWTO (R_TILEPRO_BROFF_X1, /* type */
242 TILEPRO_LOG2_BUNDLE_ALIGNMENT_IN_BYTES, /* rightshift */
c94cb026 243 4, /* size */
aa137e4d 244 17, /* bitsize */
0a1b45a2 245 true, /* pc_relative */
aa137e4d
NC
246 0, /* bitpos */
247 complain_overflow_signed, /* complain_on_overflow */
248 bfd_elf_generic_reloc, /* special_function */
249 "R_TILEPRO_BROFF_X1", /* name */
0a1b45a2 250 false, /* partial_inplace */
aa137e4d
NC
251 0, /* src_mask */
252 -1, /* dst_mask */
0a1b45a2 253 true), /* pcrel_offset */
aa137e4d
NC
254
255 HOWTO (R_TILEPRO_JOFFLONG_X1, /* type */
256 TILEPRO_LOG2_BUNDLE_ALIGNMENT_IN_BYTES, /* rightshift */
c94cb026 257 4, /* size */
aa137e4d 258 29, /* bitsize */
0a1b45a2 259 true, /* pc_relative */
aa137e4d
NC
260 0, /* bitpos */
261 complain_overflow_signed,/* complain_on_overflow */
262 bfd_elf_generic_reloc, /* special_function */
263 "R_TILEPRO_JOFFLONG_X1", /* name */
0a1b45a2 264 false, /* partial_inplace */
aa137e4d
NC
265 0, /* src_mask */
266 -1, /* dst_mask */
0a1b45a2 267 true), /* pcrel_offset */
aa137e4d
NC
268
269 HOWTO (R_TILEPRO_JOFFLONG_X1_PLT, /* type */
270 TILEPRO_LOG2_BUNDLE_ALIGNMENT_IN_BYTES, /* rightshift */
c94cb026 271 4, /* size */
aa137e4d 272 29, /* bitsize */
0a1b45a2 273 true, /* pc_relative */
aa137e4d
NC
274 0, /* bitpos */
275 complain_overflow_signed,/* complain_on_overflow */
276 bfd_elf_generic_reloc, /* special_function */
277 "R_TILEPRO_JOFFLONG_X1_PLT", /* name */
0a1b45a2 278 false, /* partial_inplace */
aa137e4d
NC
279 0, /* src_mask */
280 -1, /* dst_mask */
0a1b45a2 281 true), /* pcrel_offset */
aa137e4d
NC
282
283#define TILEPRO_IMM_HOWTO(name, size, bitsize) \
0a1b45a2 284 HOWTO (name, 0, size, bitsize, false, 0, \
07d6d2b8 285 complain_overflow_signed, bfd_elf_generic_reloc, \
0a1b45a2 286 #name, false, 0, -1, false)
aa137e4d
NC
287
288#define TILEPRO_UIMM_HOWTO(name, size, bitsize) \
0a1b45a2 289 HOWTO (name, 0, size, bitsize, false, 0, \
07d6d2b8 290 complain_overflow_unsigned, bfd_elf_generic_reloc, \
0a1b45a2 291 #name, false, 0, -1, false)
aa137e4d 292
c94cb026
AM
293 TILEPRO_IMM_HOWTO(R_TILEPRO_IMM8_X0, 1, 8),
294 TILEPRO_IMM_HOWTO(R_TILEPRO_IMM8_Y0, 1, 8),
295 TILEPRO_IMM_HOWTO(R_TILEPRO_IMM8_X1, 1, 8),
296 TILEPRO_IMM_HOWTO(R_TILEPRO_IMM8_Y1, 1, 8),
297 TILEPRO_UIMM_HOWTO(R_TILEPRO_MT_IMM15_X1, 2, 15),
298 TILEPRO_UIMM_HOWTO(R_TILEPRO_MF_IMM15_X1, 2, 15),
299 TILEPRO_IMM_HOWTO(R_TILEPRO_IMM16_X0, 2, 16),
300 TILEPRO_IMM_HOWTO(R_TILEPRO_IMM16_X1, 2, 16),
aa137e4d
NC
301
302#define TILEPRO_IMM16_HOWTO(name, rshift) \
c94cb026 303 HOWTO (name, rshift, 2, 16, false, 0, \
07d6d2b8 304 complain_overflow_dont, bfd_elf_generic_reloc, \
0a1b45a2 305 #name, false, 0, 0xffff, false)
aa137e4d
NC
306
307 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_LO, 0),
308 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_LO, 0),
309 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_HI, 16),
310 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_HI, 16),
311 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_HA, 16),
312 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_HA, 16),
313
314 /* PC-relative offsets. */
315
316 HOWTO (R_TILEPRO_IMM16_X0_PCREL, /* type */
317 0, /* rightshift */
c94cb026 318 2, /* size */
aa137e4d 319 16, /* bitsize */
0a1b45a2 320 true, /* pc_relative */
aa137e4d
NC
321 0, /* bitpos */
322 complain_overflow_signed, /* complain_on_overflow */
323 bfd_elf_generic_reloc, /* special_function */
324 "R_TILEPRO_IMM16_X0_PCREL",/* name */
0a1b45a2 325 false, /* partial_inplace */
aa137e4d
NC
326 0, /* src_mask */
327 -1, /* dst_mask */
0a1b45a2 328 true), /* pcrel_offset */
aa137e4d
NC
329
330 HOWTO (R_TILEPRO_IMM16_X1_PCREL, /* type */
331 0, /* rightshift */
c94cb026 332 2, /* size */
aa137e4d 333 16, /* bitsize */
0a1b45a2 334 true, /* pc_relative */
aa137e4d
NC
335 0, /* bitpos */
336 complain_overflow_signed, /* complain_on_overflow */
337 bfd_elf_generic_reloc, /* special_function */
338 "R_TILEPRO_IMM16_X1_PCREL",/* name */
0a1b45a2 339 false, /* partial_inplace */
aa137e4d
NC
340 0, /* src_mask */
341 -1, /* dst_mask */
0a1b45a2 342 true), /* pcrel_offset */
aa137e4d
NC
343
344#define TILEPRO_IMM16_HOWTO_PCREL(name, rshift) \
c94cb026 345 HOWTO (name, rshift, 2, 16, true, 0, \
07d6d2b8 346 complain_overflow_dont, bfd_elf_generic_reloc, \
0a1b45a2 347 #name, false, 0, 0xffff, true)
aa137e4d
NC
348
349 TILEPRO_IMM16_HOWTO_PCREL (R_TILEPRO_IMM16_X0_LO_PCREL, 0),
350 TILEPRO_IMM16_HOWTO_PCREL (R_TILEPRO_IMM16_X1_LO_PCREL, 0),
351 TILEPRO_IMM16_HOWTO_PCREL (R_TILEPRO_IMM16_X0_HI_PCREL, 16),
352 TILEPRO_IMM16_HOWTO_PCREL (R_TILEPRO_IMM16_X1_HI_PCREL, 16),
353 TILEPRO_IMM16_HOWTO_PCREL (R_TILEPRO_IMM16_X0_HA_PCREL, 16),
354 TILEPRO_IMM16_HOWTO_PCREL (R_TILEPRO_IMM16_X1_HA_PCREL, 16),
355
356 /* Byte offset into GOT for a particular symbol. */
c94cb026
AM
357 TILEPRO_IMM_HOWTO(R_TILEPRO_IMM16_X0_GOT, 2, 16),
358 TILEPRO_IMM_HOWTO(R_TILEPRO_IMM16_X1_GOT, 2, 16),
aa137e4d
NC
359 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_GOT_LO, 0),
360 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_GOT_LO, 0),
361 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_GOT_HI, 16),
362 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_GOT_HI, 16),
363 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_GOT_HA, 16),
364 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_GOT_HA, 16),
365
c94cb026
AM
366 TILEPRO_UIMM_HOWTO(R_TILEPRO_MMSTART_X0, 1, 5),
367 TILEPRO_UIMM_HOWTO(R_TILEPRO_MMEND_X0, 1, 5),
368 TILEPRO_UIMM_HOWTO(R_TILEPRO_MMSTART_X1, 1, 5),
369 TILEPRO_UIMM_HOWTO(R_TILEPRO_MMEND_X1, 1, 5),
aa137e4d 370
c94cb026
AM
371 TILEPRO_UIMM_HOWTO(R_TILEPRO_SHAMT_X0, 1, 5),
372 TILEPRO_UIMM_HOWTO(R_TILEPRO_SHAMT_X1, 1, 5),
373 TILEPRO_UIMM_HOWTO(R_TILEPRO_SHAMT_Y0, 1, 5),
374 TILEPRO_UIMM_HOWTO(R_TILEPRO_SHAMT_Y1, 1, 5),
aa137e4d 375
c94cb026 376 TILEPRO_IMM_HOWTO(R_TILEPRO_DEST_IMM8_X1, 1, 8),
aa137e4d
NC
377
378 /* These relocs are currently not defined. */
379 EMPTY_HOWTO (56),
380 EMPTY_HOWTO (57),
381 EMPTY_HOWTO (58),
382 EMPTY_HOWTO (59),
6f7be959
WL
383
384 HOWTO (R_TILEPRO_TLS_GD_CALL, /* type */
385 TILEPRO_LOG2_BUNDLE_ALIGNMENT_IN_BYTES, /* rightshift */
c94cb026 386 4, /* size */
6f7be959 387 29, /* bitsize */
0a1b45a2 388 true, /* pc_relative */
6f7be959
WL
389 0, /* bitpos */
390 complain_overflow_signed,/* complain_on_overflow */
391 bfd_elf_generic_reloc, /* special_function */
392 "R_TILEPRO_TLS_GD_CALL", /* name */
0a1b45a2 393 false, /* partial_inplace */
6f7be959
WL
394 0, /* src_mask */
395 -1, /* dst_mask */
0a1b45a2 396 true), /* pcrel_offset */
6f7be959 397
c94cb026
AM
398 TILEPRO_IMM_HOWTO(R_TILEPRO_IMM8_X0_TLS_GD_ADD, 1, 8),
399 TILEPRO_IMM_HOWTO(R_TILEPRO_IMM8_X1_TLS_GD_ADD, 1, 8),
400 TILEPRO_IMM_HOWTO(R_TILEPRO_IMM8_Y0_TLS_GD_ADD, 1, 8),
401 TILEPRO_IMM_HOWTO(R_TILEPRO_IMM8_Y1_TLS_GD_ADD, 1, 8),
402 TILEPRO_IMM_HOWTO(R_TILEPRO_TLS_IE_LOAD, 1, 8),
aa137e4d
NC
403
404 /* Offsets into the GOT of TLS Descriptors. */
405
406 HOWTO (R_TILEPRO_IMM16_X0_TLS_GD,/* type */
407 0, /* rightshift */
c94cb026 408 2, /* size */
aa137e4d 409 16, /* bitsize */
0a1b45a2 410 false, /* pc_relative */
aa137e4d
NC
411 0, /* bitpos */
412 complain_overflow_signed, /* complain_on_overflow */
413 bfd_elf_generic_reloc, /* special_function */
414 "R_TILEPRO_IMM16_X0_TLS_GD",/* name */
0a1b45a2 415 false, /* partial_inplace */
aa137e4d
NC
416 0, /* src_mask */
417 0xffff, /* dst_mask */
0a1b45a2 418 false), /* pcrel_offset */
aa137e4d
NC
419
420 HOWTO (R_TILEPRO_IMM16_X1_TLS_GD,/* type */
421 0, /* rightshift */
c94cb026 422 2, /* size */
aa137e4d 423 16, /* bitsize */
0a1b45a2 424 false, /* pc_relative */
aa137e4d
NC
425 0, /* bitpos */
426 complain_overflow_signed, /* complain_on_overflow */
427 bfd_elf_generic_reloc, /* special_function */
428 "R_TILEPRO_IMM16_X1_TLS_GD",/* name */
0a1b45a2 429 false, /* partial_inplace */
aa137e4d
NC
430 0, /* src_mask */
431 0xffff, /* dst_mask */
0a1b45a2 432 false), /* pcrel_offset */
aa137e4d
NC
433
434 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_TLS_GD_LO, 0),
435 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_TLS_GD_LO, 0),
436 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_TLS_GD_HI, 16),
437 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_TLS_GD_HI, 16),
438 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_TLS_GD_HA, 16),
439 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_TLS_GD_HA, 16),
440
441 /* Offsets into the GOT of TLS Descriptors. */
442
443 HOWTO (R_TILEPRO_IMM16_X0_TLS_IE,/* type */
444 0, /* rightshift */
c94cb026 445 2, /* size */
aa137e4d 446 16, /* bitsize */
0a1b45a2 447 false, /* pc_relative */
aa137e4d
NC
448 0, /* bitpos */
449 complain_overflow_signed, /* complain_on_overflow */
450 bfd_elf_generic_reloc, /* special_function */
451 "R_TILEPRO_IMM16_X0_TLS_IE",/* name */
0a1b45a2 452 false, /* partial_inplace */
aa137e4d
NC
453 0, /* src_mask */
454 -1, /* dst_mask */
0a1b45a2 455 true), /* pcrel_offset */
aa137e4d
NC
456
457 HOWTO (R_TILEPRO_IMM16_X1_TLS_IE,/* type */
458 0, /* rightshift */
c94cb026 459 2, /* size */
aa137e4d 460 16, /* bitsize */
0a1b45a2 461 false, /* pc_relative */
aa137e4d
NC
462 0, /* bitpos */
463 complain_overflow_signed, /* complain_on_overflow */
464 bfd_elf_generic_reloc, /* special_function */
465 "R_TILEPRO_IMM16_X1_TLS_IE",/* name */
0a1b45a2 466 false, /* partial_inplace */
aa137e4d
NC
467 0, /* src_mask */
468 -1, /* dst_mask */
0a1b45a2 469 true), /* pcrel_offset */
aa137e4d 470
6f7be959
WL
471 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_TLS_IE_LO, 0),
472 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_TLS_IE_LO, 0),
473 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_TLS_IE_HI, 16),
474 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_TLS_IE_HI, 16),
475 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_TLS_IE_HA, 16),
476 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_TLS_IE_HA, 16),
aa137e4d
NC
477
478 /* These are common with the Solaris TLS implementation. */
5d0feb98 479 HOWTO(R_TILEPRO_TLS_DTPMOD32, 0, 0, 0, false, 0, complain_overflow_dont,
07d6d2b8 480 bfd_elf_generic_reloc, "R_TILEPRO_TLS_DTPMOD32",
0a1b45a2 481 false, 0, 0, true),
c94cb026 482 HOWTO(R_TILEPRO_TLS_DTPOFF32, 0, 4, 32, false, 0, complain_overflow_bitfield,
07d6d2b8 483 bfd_elf_generic_reloc, "R_TILEPRO_TLS_DTPOFF32",
0a1b45a2 484 false, 0, 0xFFFFFFFF, true),
5d0feb98 485 HOWTO(R_TILEPRO_TLS_TPOFF32, 0, 0, 0, false, 0, complain_overflow_dont,
07d6d2b8 486 bfd_elf_generic_reloc, "R_TILEPRO_TLS_TPOFF32",
0a1b45a2 487 false, 0, 0, true),
aa137e4d 488
6f7be959
WL
489 HOWTO (R_TILEPRO_IMM16_X0_TLS_LE,/* type */
490 0, /* rightshift */
c94cb026 491 2, /* size */
6f7be959 492 16, /* bitsize */
0a1b45a2 493 false, /* pc_relative */
6f7be959
WL
494 0, /* bitpos */
495 complain_overflow_signed, /* complain_on_overflow */
496 bfd_elf_generic_reloc, /* special_function */
497 "R_TILEPRO_IMM16_X0_TLS_LE",/* name */
0a1b45a2 498 false, /* partial_inplace */
6f7be959
WL
499 0, /* src_mask */
500 -1, /* dst_mask */
0a1b45a2 501 true), /* pcrel_offset */
6f7be959
WL
502
503 HOWTO (R_TILEPRO_IMM16_X1_TLS_LE,/* type */
504 0, /* rightshift */
c94cb026 505 2, /* size */
6f7be959 506 16, /* bitsize */
0a1b45a2 507 false, /* pc_relative */
6f7be959
WL
508 0, /* bitpos */
509 complain_overflow_signed, /* complain_on_overflow */
510 bfd_elf_generic_reloc, /* special_function */
511 "R_TILEPRO_IMM16_X1_TLS_LE",/* name */
0a1b45a2 512 false, /* partial_inplace */
6f7be959
WL
513 0, /* src_mask */
514 -1, /* dst_mask */
0a1b45a2 515 true), /* pcrel_offset */
6f7be959
WL
516
517 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_TLS_LE_LO, 0),
518 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_TLS_LE_LO, 0),
519 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_TLS_LE_HI, 16),
520 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_TLS_LE_HI, 16),
521 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_TLS_LE_HA, 16),
522 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_TLS_LE_HA, 16),
aa137e4d
NC
523};
524
525static reloc_howto_type tilepro_elf_howto_table2 [] =
526{
527 /* GNU extension to record C++ vtable hierarchy */
528 HOWTO (R_TILEPRO_GNU_VTINHERIT, /* type */
07d6d2b8 529 0, /* rightshift */
c94cb026 530 4, /* size */
07d6d2b8 531 0, /* bitsize */
0a1b45a2 532 false, /* pc_relative */
07d6d2b8
AM
533 0, /* bitpos */
534 complain_overflow_dont, /* complain_on_overflow */
535 NULL, /* special_function */
536 "R_TILEPRO_GNU_VTINHERIT", /* name */
0a1b45a2 537 false, /* partial_inplace */
07d6d2b8
AM
538 0, /* src_mask */
539 0, /* dst_mask */
0a1b45a2 540 false), /* pcrel_offset */
aa137e4d
NC
541
542 /* GNU extension to record C++ vtable member usage */
07d6d2b8
AM
543 HOWTO (R_TILEPRO_GNU_VTENTRY, /* type */
544 0, /* rightshift */
c94cb026 545 4, /* size */
07d6d2b8 546 0, /* bitsize */
0a1b45a2 547 false, /* pc_relative */
07d6d2b8
AM
548 0, /* bitpos */
549 complain_overflow_dont, /* complain_on_overflow */
550 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
551 "R_TILEPRO_GNU_VTENTRY", /* name */
0a1b45a2 552 false, /* partial_inplace */
07d6d2b8
AM
553 0, /* src_mask */
554 0, /* dst_mask */
0a1b45a2 555 false), /* pcrel_offset */
aa137e4d
NC
556
557};
558\f
559/* Map BFD reloc types to TILEPRO ELF reloc types. */
560
561typedef struct tilepro_reloc_map
562{
563 bfd_reloc_code_real_type bfd_reloc_val;
07d6d2b8
AM
564 unsigned int tilepro_reloc_val;
565 reloc_howto_type * table;
aa137e4d
NC
566} reloc_map;
567
568static const reloc_map tilepro_reloc_map [] =
569{
570#define TH_REMAP(bfd, tilepro) \
571 { bfd, tilepro, tilepro_elf_howto_table },
572
573 /* Standard relocations. */
07d6d2b8
AM
574 TH_REMAP (BFD_RELOC_NONE, R_TILEPRO_NONE)
575 TH_REMAP (BFD_RELOC_32, R_TILEPRO_32)
576 TH_REMAP (BFD_RELOC_16, R_TILEPRO_16)
577 TH_REMAP (BFD_RELOC_8, R_TILEPRO_8)
578 TH_REMAP (BFD_RELOC_32_PCREL, R_TILEPRO_32_PCREL)
579 TH_REMAP (BFD_RELOC_16_PCREL, R_TILEPRO_16_PCREL)
580 TH_REMAP (BFD_RELOC_8_PCREL, R_TILEPRO_8_PCREL)
581 TH_REMAP (BFD_RELOC_LO16, R_TILEPRO_LO16)
582 TH_REMAP (BFD_RELOC_HI16, R_TILEPRO_HI16)
583 TH_REMAP (BFD_RELOC_HI16_S, R_TILEPRO_HA16)
aa137e4d
NC
584
585 /* Custom relocations. */
07d6d2b8
AM
586 TH_REMAP (BFD_RELOC_TILEPRO_COPY, R_TILEPRO_COPY)
587 TH_REMAP (BFD_RELOC_TILEPRO_GLOB_DAT, R_TILEPRO_GLOB_DAT)
588 TH_REMAP (BFD_RELOC_TILEPRO_JMP_SLOT, R_TILEPRO_JMP_SLOT)
589 TH_REMAP (BFD_RELOC_TILEPRO_RELATIVE, R_TILEPRO_RELATIVE)
590 TH_REMAP (BFD_RELOC_TILEPRO_BROFF_X1, R_TILEPRO_BROFF_X1)
aa137e4d
NC
591 TH_REMAP (BFD_RELOC_TILEPRO_JOFFLONG_X1, R_TILEPRO_JOFFLONG_X1)
592 TH_REMAP (BFD_RELOC_TILEPRO_JOFFLONG_X1_PLT, R_TILEPRO_JOFFLONG_X1_PLT)
07d6d2b8
AM
593 TH_REMAP (BFD_RELOC_TILEPRO_IMM8_X0, R_TILEPRO_IMM8_X0)
594 TH_REMAP (BFD_RELOC_TILEPRO_IMM8_Y0, R_TILEPRO_IMM8_Y0)
595 TH_REMAP (BFD_RELOC_TILEPRO_IMM8_X1, R_TILEPRO_IMM8_X1)
596 TH_REMAP (BFD_RELOC_TILEPRO_IMM8_Y1, R_TILEPRO_IMM8_Y1)
aa137e4d
NC
597 TH_REMAP (BFD_RELOC_TILEPRO_DEST_IMM8_X1, R_TILEPRO_DEST_IMM8_X1)
598 TH_REMAP (BFD_RELOC_TILEPRO_MT_IMM15_X1, R_TILEPRO_MT_IMM15_X1)
599 TH_REMAP (BFD_RELOC_TILEPRO_MF_IMM15_X1, R_TILEPRO_MF_IMM15_X1)
07d6d2b8
AM
600 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0, R_TILEPRO_IMM16_X0)
601 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1, R_TILEPRO_IMM16_X1)
aa137e4d
NC
602 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_LO, R_TILEPRO_IMM16_X0_LO)
603 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_LO, R_TILEPRO_IMM16_X1_LO)
604 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_HI, R_TILEPRO_IMM16_X0_HI)
605 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_HI, R_TILEPRO_IMM16_X1_HI)
606 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_HA, R_TILEPRO_IMM16_X0_HA)
607 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_HA, R_TILEPRO_IMM16_X1_HA)
608
07d6d2b8
AM
609 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_PCREL, R_TILEPRO_IMM16_X0_PCREL)
610 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_PCREL, R_TILEPRO_IMM16_X1_PCREL)
aa137e4d
NC
611 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_LO_PCREL, R_TILEPRO_IMM16_X0_LO_PCREL)
612 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_LO_PCREL, R_TILEPRO_IMM16_X1_LO_PCREL)
613 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_HI_PCREL, R_TILEPRO_IMM16_X0_HI_PCREL)
614 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_HI_PCREL, R_TILEPRO_IMM16_X1_HI_PCREL)
615 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_HA_PCREL, R_TILEPRO_IMM16_X0_HA_PCREL)
616 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_HA_PCREL, R_TILEPRO_IMM16_X1_HA_PCREL)
617
618 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_GOT, R_TILEPRO_IMM16_X0_GOT)
619 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_GOT, R_TILEPRO_IMM16_X1_GOT)
620 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_GOT_LO, R_TILEPRO_IMM16_X0_GOT_LO)
621 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_GOT_LO, R_TILEPRO_IMM16_X1_GOT_LO)
622 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_GOT_HI, R_TILEPRO_IMM16_X0_GOT_HI)
623 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_GOT_HI, R_TILEPRO_IMM16_X1_GOT_HI)
624 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_GOT_HA, R_TILEPRO_IMM16_X0_GOT_HA)
625 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_GOT_HA, R_TILEPRO_IMM16_X1_GOT_HA)
626
627 TH_REMAP (BFD_RELOC_TILEPRO_MMSTART_X0, R_TILEPRO_MMSTART_X0)
07d6d2b8 628 TH_REMAP (BFD_RELOC_TILEPRO_MMEND_X0, R_TILEPRO_MMEND_X0)
aa137e4d 629 TH_REMAP (BFD_RELOC_TILEPRO_MMSTART_X1, R_TILEPRO_MMSTART_X1)
07d6d2b8
AM
630 TH_REMAP (BFD_RELOC_TILEPRO_MMEND_X1, R_TILEPRO_MMEND_X1)
631 TH_REMAP (BFD_RELOC_TILEPRO_SHAMT_X0, R_TILEPRO_SHAMT_X0)
632 TH_REMAP (BFD_RELOC_TILEPRO_SHAMT_X1, R_TILEPRO_SHAMT_X1)
633 TH_REMAP (BFD_RELOC_TILEPRO_SHAMT_Y0, R_TILEPRO_SHAMT_Y0)
634 TH_REMAP (BFD_RELOC_TILEPRO_SHAMT_Y1, R_TILEPRO_SHAMT_Y1)
aa137e4d 635
07d6d2b8 636 TH_REMAP (BFD_RELOC_TILEPRO_TLS_GD_CALL, R_TILEPRO_TLS_GD_CALL)
6f7be959
WL
637 TH_REMAP (BFD_RELOC_TILEPRO_IMM8_X0_TLS_GD_ADD, R_TILEPRO_IMM8_X0_TLS_GD_ADD)
638 TH_REMAP (BFD_RELOC_TILEPRO_IMM8_X1_TLS_GD_ADD, R_TILEPRO_IMM8_X1_TLS_GD_ADD)
639 TH_REMAP (BFD_RELOC_TILEPRO_IMM8_Y0_TLS_GD_ADD, R_TILEPRO_IMM8_Y0_TLS_GD_ADD)
640 TH_REMAP (BFD_RELOC_TILEPRO_IMM8_Y1_TLS_GD_ADD, R_TILEPRO_IMM8_Y1_TLS_GD_ADD)
07d6d2b8 641 TH_REMAP (BFD_RELOC_TILEPRO_TLS_IE_LOAD, R_TILEPRO_TLS_IE_LOAD)
6f7be959 642
07d6d2b8
AM
643 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_TLS_GD, R_TILEPRO_IMM16_X0_TLS_GD)
644 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_TLS_GD, R_TILEPRO_IMM16_X1_TLS_GD)
aa137e4d
NC
645 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_TLS_GD_LO, R_TILEPRO_IMM16_X0_TLS_GD_LO)
646 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_TLS_GD_LO, R_TILEPRO_IMM16_X1_TLS_GD_LO)
647 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_TLS_GD_HI, R_TILEPRO_IMM16_X0_TLS_GD_HI)
648 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_TLS_GD_HI, R_TILEPRO_IMM16_X1_TLS_GD_HI)
649 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_TLS_GD_HA, R_TILEPRO_IMM16_X0_TLS_GD_HA)
650 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_TLS_GD_HA, R_TILEPRO_IMM16_X1_TLS_GD_HA)
651
07d6d2b8
AM
652 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_TLS_IE, R_TILEPRO_IMM16_X0_TLS_IE)
653 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_TLS_IE, R_TILEPRO_IMM16_X1_TLS_IE)
aa137e4d
NC
654 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_TLS_IE_LO, R_TILEPRO_IMM16_X0_TLS_IE_LO)
655 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_TLS_IE_LO, R_TILEPRO_IMM16_X1_TLS_IE_LO)
656 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_TLS_IE_HI, R_TILEPRO_IMM16_X0_TLS_IE_HI)
657 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_TLS_IE_HI, R_TILEPRO_IMM16_X1_TLS_IE_HI)
658 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_TLS_IE_HA, R_TILEPRO_IMM16_X0_TLS_IE_HA)
659 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_TLS_IE_HA, R_TILEPRO_IMM16_X1_TLS_IE_HA)
660
661 TH_REMAP (BFD_RELOC_TILEPRO_TLS_DTPMOD32, R_TILEPRO_TLS_DTPMOD32)
662 TH_REMAP (BFD_RELOC_TILEPRO_TLS_DTPOFF32, R_TILEPRO_TLS_DTPOFF32)
663 TH_REMAP (BFD_RELOC_TILEPRO_TLS_TPOFF32, R_TILEPRO_TLS_TPOFF32)
664
07d6d2b8
AM
665 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_TLS_LE, R_TILEPRO_IMM16_X0_TLS_LE)
666 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_TLS_LE, R_TILEPRO_IMM16_X1_TLS_LE)
6f7be959
WL
667 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_TLS_LE_LO, R_TILEPRO_IMM16_X0_TLS_LE_LO)
668 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_TLS_LE_LO, R_TILEPRO_IMM16_X1_TLS_LE_LO)
669 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_TLS_LE_HI, R_TILEPRO_IMM16_X0_TLS_LE_HI)
670 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_TLS_LE_HI, R_TILEPRO_IMM16_X1_TLS_LE_HI)
671 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_TLS_LE_HA, R_TILEPRO_IMM16_X0_TLS_LE_HA)
672 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_TLS_LE_HA, R_TILEPRO_IMM16_X1_TLS_LE_HA)
673
aa137e4d
NC
674#undef TH_REMAP
675
676 { BFD_RELOC_VTABLE_INHERIT, R_TILEPRO_GNU_VTINHERIT, tilepro_elf_howto_table2 },
677 { BFD_RELOC_VTABLE_ENTRY, R_TILEPRO_GNU_VTENTRY, tilepro_elf_howto_table2 },
678};
679
680
681
aa137e4d
NC
682/* TILEPRO ELF linker hash entry. */
683
684struct tilepro_elf_link_hash_entry
685{
686 struct elf_link_hash_entry elf;
687
aa137e4d
NC
688#define GOT_UNKNOWN 0
689#define GOT_NORMAL 1
690#define GOT_TLS_GD 2
691#define GOT_TLS_IE 4
692 unsigned char tls_type;
693};
694
695#define tilepro_elf_hash_entry(ent) \
696 ((struct tilepro_elf_link_hash_entry *)(ent))
697
698struct _bfd_tilepro_elf_obj_tdata
699{
700 struct elf_obj_tdata root;
701
702 /* tls_type for each local got entry. */
703 char *local_got_tls_type;
704};
705
706#define _bfd_tilepro_elf_tdata(abfd) \
707 ((struct _bfd_tilepro_elf_obj_tdata *) (abfd)->tdata.any)
708
709#define _bfd_tilepro_elf_local_got_tls_type(abfd) \
710 (_bfd_tilepro_elf_tdata (abfd)->local_got_tls_type)
711
712#define is_tilepro_elf(bfd) \
713 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
714 && elf_tdata (bfd) != NULL \
715 && elf_object_id (bfd) == TILEPRO_ELF_DATA)
716
a412bee5
MR
717/* Allocate TILEPro ELF private object data. */
718
0a1b45a2 719static bool
a412bee5
MR
720tilepro_elf_mkobject (bfd *abfd)
721{
722 return bfd_elf_allocate_object (abfd,
723 sizeof (struct _bfd_tilepro_elf_obj_tdata),
724 TILEPRO_ELF_DATA);
725}
726
aa137e4d
NC
727#include "elf/common.h"
728#include "elf/internal.h"
729
aa137e4d
NC
730/* Get the Tilepro ELF linker hash table from a link_info structure. */
731#define tilepro_elf_hash_table(p) \
0f55320b
AM
732 ((is_elf_hash_table ((p)->hash) \
733 && elf_hash_table_id (elf_hash_table (p)) == TILEPRO_ELF_DATA) \
734 ? (struct elf_link_hash_table *) (p)->hash : NULL)
aa137e4d
NC
735
736static reloc_howto_type *
737tilepro_reloc_type_lookup (bfd * abfd ATTRIBUTE_UNUSED,
07d6d2b8 738 bfd_reloc_code_real_type code)
aa137e4d
NC
739{
740 unsigned int i;
741
0ba38529 742 for (i = ARRAY_SIZE (tilepro_reloc_map); i--;)
aa137e4d
NC
743 {
744 const reloc_map * entry;
745
746 entry = tilepro_reloc_map + i;
747
748 if (entry->bfd_reloc_val == code)
749 return entry->table + (entry->tilepro_reloc_val
750 - entry->table[0].type);
751 }
752
753 return NULL;
754}
755
756static reloc_howto_type *
757tilepro_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
758 const char *r_name)
759{
760 unsigned int i;
761
762 for (i = 0;
763 i < (sizeof (tilepro_elf_howto_table)
07d6d2b8 764 / sizeof (tilepro_elf_howto_table[0]));
aa137e4d
NC
765 i++)
766 if (tilepro_elf_howto_table[i].name != NULL
07d6d2b8 767 && strcasecmp (tilepro_elf_howto_table[i].name, r_name) == 0)
aa137e4d
NC
768 return &tilepro_elf_howto_table[i];
769
770 return NULL;
771}
772
773/* Set the howto pointer for an TILEPro ELF reloc. */
774
0a1b45a2 775static bool
aa137e4d 776tilepro_info_to_howto_rela (bfd * abfd ATTRIBUTE_UNUSED,
07d6d2b8
AM
777 arelent * cache_ptr,
778 Elf_Internal_Rela * dst)
aa137e4d
NC
779{
780 unsigned int r_type = ELF32_R_TYPE (dst->r_info);
781
6f7be959 782 if (r_type <= (unsigned int) R_TILEPRO_IMM16_X1_TLS_LE_HA)
aa137e4d
NC
783 cache_ptr->howto = &tilepro_elf_howto_table [r_type];
784 else if (r_type - R_TILEPRO_GNU_VTINHERIT
f3185997
NC
785 <= ((unsigned int) R_TILEPRO_GNU_VTENTRY
786 - (unsigned int) R_TILEPRO_GNU_VTINHERIT))
aa137e4d
NC
787 cache_ptr->howto
788 = &tilepro_elf_howto_table2 [r_type - R_TILEPRO_GNU_VTINHERIT];
789 else
f3185997
NC
790 {
791 /* xgettext:c-format */
792 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
793 abfd, r_type);
794 bfd_set_error (bfd_error_bad_value);
0a1b45a2 795 return false;
f3185997 796 }
0a1b45a2 797 return true;
aa137e4d
NC
798}
799
800typedef tilepro_bundle_bits (*tilepro_create_func)(int);
801
802static const tilepro_create_func reloc_to_create_func[] =
803{
804 /* The first fourteen relocation types don't correspond to operands */
805 NULL,
806 NULL,
807 NULL,
808 NULL,
809 NULL,
810 NULL,
811 NULL,
812 NULL,
813 NULL,
814 NULL,
815 NULL,
816 NULL,
817 NULL,
818 NULL,
819
820 /* The remaining relocations are used for immediate operands */
821 create_BrOff_X1,
822 create_JOffLong_X1,
823 create_JOffLong_X1,
824 create_Imm8_X0,
825 create_Imm8_Y0,
826 create_Imm8_X1,
827 create_Imm8_Y1,
828 create_MT_Imm15_X1,
829 create_MF_Imm15_X1,
830 create_Imm16_X0,
831 create_Imm16_X1,
832 create_Imm16_X0,
833 create_Imm16_X1,
834 create_Imm16_X0,
835 create_Imm16_X1,
836 create_Imm16_X0,
837 create_Imm16_X1,
838 create_Imm16_X0,
839 create_Imm16_X1,
840 create_Imm16_X0,
841 create_Imm16_X1,
842 create_Imm16_X0,
843 create_Imm16_X1,
844 create_Imm16_X0,
845 create_Imm16_X1,
846 create_Imm16_X0,
847 create_Imm16_X1,
848 create_Imm16_X0,
849 create_Imm16_X1,
850 create_Imm16_X0,
851 create_Imm16_X1,
852 create_Imm16_X0,
853 create_Imm16_X1,
854 create_MMStart_X0,
855 create_MMEnd_X0,
856 create_MMStart_X1,
857 create_MMEnd_X1,
858 create_ShAmt_X0,
859 create_ShAmt_X1,
860 create_ShAmt_Y0,
861 create_ShAmt_Y1,
862
863 create_Dest_Imm8_X1,
864 NULL,
865 NULL,
866 NULL,
867 NULL,
868 NULL,
869 NULL,
870 NULL,
871 NULL,
872 NULL,
873 NULL,
874
875 create_Imm16_X0,
876 create_Imm16_X1,
877 create_Imm16_X0,
878 create_Imm16_X1,
879 create_Imm16_X0,
880 create_Imm16_X1,
881 create_Imm16_X0,
882 create_Imm16_X1,
883 create_Imm16_X0,
884 create_Imm16_X1,
885 create_Imm16_X0,
886 create_Imm16_X1,
887 create_Imm16_X0,
888 create_Imm16_X1,
889 create_Imm16_X0,
6f7be959
WL
890 create_Imm16_X1,
891
892 NULL,
893 NULL,
894 NULL,
895
896 create_Imm16_X0,
897 create_Imm16_X1,
898 create_Imm16_X0,
899 create_Imm16_X1,
900 create_Imm16_X0,
901 create_Imm16_X1,
902 create_Imm16_X0,
903 create_Imm16_X1,
aa137e4d
NC
904};
905
906#define NELEMS(a) ((int) (sizeof (a) / sizeof ((a)[0])))
907
908/* Support for core dump NOTE sections. */
909
0a1b45a2 910static bool
aa137e4d
NC
911tilepro_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
912{
913 int offset;
914 size_t size;
915
916 if (note->descsz != TILEPRO_PRSTATUS_SIZEOF)
0a1b45a2 917 return false;
aa137e4d
NC
918
919 /* pr_cursig */
228e534f 920 elf_tdata (abfd)->core->signal =
aa137e4d
NC
921 bfd_get_16 (abfd, note->descdata + TILEPRO_PRSTATUS_OFFSET_PR_CURSIG);
922
923 /* pr_pid */
228e534f 924 elf_tdata (abfd)->core->pid =
aa137e4d
NC
925 bfd_get_32 (abfd, note->descdata + TILEPRO_PRSTATUS_OFFSET_PR_PID);
926
927 /* pr_reg */
928 offset = TILEPRO_PRSTATUS_OFFSET_PR_REG;
929 size = TILEPRO_GREGSET_T_SIZE;
930
931 /* Make a ".reg/999" section. */
932 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
933 size, note->descpos + offset);
934}
935
0a1b45a2 936static bool
aa137e4d
NC
937tilepro_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
938{
939 if (note->descsz != TILEPRO_PRPSINFO_SIZEOF)
0a1b45a2 940 return false;
aa137e4d 941
228e534f 942 elf_tdata (abfd)->core->program
aa137e4d
NC
943 = _bfd_elfcore_strndup (abfd,
944 note->descdata + TILEPRO_PRPSINFO_OFFSET_PR_FNAME,
945 16);
228e534f 946 elf_tdata (abfd)->core->command
aa137e4d
NC
947 = _bfd_elfcore_strndup (abfd,
948 note->descdata + TILEPRO_PRPSINFO_OFFSET_PR_PSARGS,
949 ELF_PR_PSARGS_SIZE);
950
951
952 /* Note that for some reason, a spurious space is tacked
953 onto the end of the args in some (at least one anyway)
954 implementations, so strip it off if it exists. */
955 {
228e534f 956 char *command = elf_tdata (abfd)->core->command;
aa137e4d
NC
957 int n = strlen (command);
958
959 if (0 < n && command[n - 1] == ' ')
960 command[n - 1] = '\0';
961 }
962
0a1b45a2 963 return true;
aa137e4d
NC
964}
965
966
967static void
968tilepro_elf_append_rela_32 (bfd *abfd, asection *s, Elf_Internal_Rela *rel)
969{
970 Elf32_External_Rela *loc32;
971
972 loc32 = (Elf32_External_Rela *) s->contents;
973 loc32 += s->reloc_count++;
974 bfd_elf32_swap_reloca_out (abfd, rel, (bfd_byte *) loc32);
975}
976
977/* PLT/GOT stuff */
978
979/* The procedure linkage table starts with the following header:
980
981 {
07d6d2b8 982 rli r29, r29, 16
aa137e4d
NC
983 lwadd r28, r27, 4
984 }
07d6d2b8 985 lw r27, r27
aa137e4d 986 {
07d6d2b8
AM
987 info 10 ## SP not offset, return PC in LR
988 jr r27
aa137e4d
NC
989 }
990
991 Subsequent entries are the following, jumping to the header at the end:
992
07d6d2b8 993 lnk r28
aa137e4d
NC
9941:
995 {
996 auli r28, r28, <_GLOBAL_OFFSET_TABLE_ - 1b + MY_GOT_OFFSET>
997 auli r27, r28, <_GLOBAL_OFFSET_TABLE_ - 1b>
998 }
999 {
1000 addli r28, r28, <_GLOBAL_OFFSET_TABLE_ - 1b + MY_GOT_OFFSET>
1001 addli r27, r27, <_GLOBAL_OFFSET_TABLE_ - 1b>
1002 }
1003 {
1004 auli r29, zero, MY_PLT_INDEX
07d6d2b8 1005 lw r28, r28
aa137e4d
NC
1006 }
1007 {
07d6d2b8
AM
1008 info 10 ## SP not offset, return PC in LR
1009 jr r28
aa137e4d
NC
1010 }
1011
1012 We initially store MY_PLT_INDEX in the high bits so that we can use the all
1013 16 bits as an unsigned offset; if we use the low bits we would get an
1014 unwanted sign extension. The PLT header then rotates the index to get the
1015 right value, before calling the resolution routine. This computation can
1016 fit in unused bundle slots so it's free.
1017
1018 This code sequence lets the code at at the start of the PLT determine
1019 which PLT entry was executed by examining 'r29'.
1020
1021 Note that MY_PLT_INDEX skips over the header entries, so the first
1022 actual jump table entry has index zero.
1023*/
1024
1025#define PLT_HEADER_SIZE_IN_BUNDLES 3
1026#define PLT_ENTRY_SIZE_IN_BUNDLES 5
1027
1028#define PLT_HEADER_SIZE \
1029 (PLT_HEADER_SIZE_IN_BUNDLES * TILEPRO_BUNDLE_SIZE_IN_BYTES)
1030#define PLT_ENTRY_SIZE \
1031 (PLT_ENTRY_SIZE_IN_BUNDLES * TILEPRO_BUNDLE_SIZE_IN_BYTES)
1032
1033/* The size in bytes of an entry in the global offset table. */
1034
1035#define GOT_ENTRY_SIZE TILEPRO_BYTES_PER_WORD
1036
1037#define GOTPLT_HEADER_SIZE (2 * GOT_ENTRY_SIZE)
1038
1039
1040static const bfd_byte
1041tilepro_plt0_entry[PLT_HEADER_SIZE] =
1042{
1043 0x5d, 0x07, 0x03, 0x70,
1044 0x6e, 0x23, 0xd0, 0x30, /* { rli r29, r29, 16 ; lwadd r28, r27, 4 } */
1045 0x00, 0x50, 0xba, 0x6d,
1046 0x00, 0x08, 0x6d, 0xdc, /* { lw r27, r27 } */
1047 0xff, 0xaf, 0x10, 0x50,
1048 0x60, 0x03, 0x18, 0x08, /* { info 10 ; jr r27 } */
1049};
1050
1051static const bfd_byte
1052tilepro_short_plt_entry[PLT_ENTRY_SIZE] =
1053{
1054 0x00, 0x50, 0x16, 0x70,
1055 0x0e, 0x00, 0x1a, 0x08, /* { lnk r28 } */
1056 0x1c, 0x07, 0x00, 0xa0,
1057 0x8d, 0x03, 0x00, 0x18, /* { addli r28, r28, 0 ; addli r27, r28, 0 } */
1058 0xdd, 0x0f, 0x00, 0x30,
1059 0x8e, 0x73, 0x0b, 0x40, /* { auli r29, zero, 0 ; lw r28, r28 } */
1060 0xff, 0xaf, 0x10, 0x50,
1061 0x80, 0x03, 0x18, 0x08, /* { info 10 ; jr r28 } */
1062 0x00, 0x00, 0x00, 0x00,
1063 0x00, 0x00, 0x00, 0x00,
1064};
1065
1066static const bfd_byte
1067tilepro_long_plt_entry[PLT_ENTRY_SIZE] =
1068{
1069 0x00, 0x50, 0x16, 0x70,
1070 0x0e, 0x00, 0x1a, 0x08, /* { lnk r28 } */
1071 0x1c, 0x07, 0x00, 0xb0,
1072 0x8d, 0x03, 0x00, 0x20, /* { auli r28, r28, 0 ; auli r27, r28, 0 } */
1073 0x1c, 0x07, 0x00, 0xa0,
1074 0x6d, 0x03, 0x00, 0x18, /* { addli r28, r28, 0 ; addli r27, r27, 0 } */
1075 0xdd, 0x0f, 0x00, 0x30,
1076 0x8e, 0x73, 0x0b, 0x40, /* { auli r29, zero, 0 ; lw r28, r28 } */
1077 0xff, 0xaf, 0x10, 0x50,
1078 0x80, 0x03, 0x18, 0x08, /* { info 10 ; jr r28 } */
1079};
1080
1081static bfd_vma
1082tilepro_ha16(bfd_vma vma)
1083{
1084 return ((vma >> 16) + ((vma >> 15) & 1)) & 0xffff;
1085}
1086
1087static int
1088tilepro_plt_entry_build (asection *splt, asection *sgotplt, bfd_vma offset,
1089 bfd_vma *r_offset)
1090{
663b5850 1091 int plt_index = (offset - PLT_ENTRY_SIZE) / PLT_ENTRY_SIZE;
aa137e4d
NC
1092 int got_offset = plt_index * GOT_ENTRY_SIZE + GOTPLT_HEADER_SIZE;
1093 tilepro_bundle_bits *pc;
1094
1095 /* Compute the distance from the got entry to the lnk. */
1096 bfd_signed_vma dist_got_entry = sgotplt->output_section->vma
1097 + sgotplt->output_offset
1098 + got_offset
1099 - splt->output_section->vma
1100 - splt->output_offset
1101 - offset
1102 - TILEPRO_BUNDLE_SIZE_IN_BYTES;
1103
1104 /* Compute the distance to GOTPLT[0]. */
1105 bfd_signed_vma dist_got0 = dist_got_entry - got_offset;
1106
1107 /* Check whether we can use the short plt entry with 16-bit offset. */
0a1b45a2 1108 bool short_plt_entry =
aa137e4d
NC
1109 (dist_got_entry <= 0x7fff && dist_got0 >= -0x8000);
1110
1111 /* Copy the plt entry template. */
1112 memcpy (splt->contents + offset,
1113 short_plt_entry ? tilepro_short_plt_entry : tilepro_long_plt_entry,
1114 PLT_ENTRY_SIZE);
1115
1116 /* Write the immediate offsets. */
1117 pc = (tilepro_bundle_bits *)(splt->contents + offset);
1118 pc++;
1119
1120 if (!short_plt_entry)
1121 {
1122 /* { auli r28, r28, &GOTPLT[MY_GOT_INDEX] ; auli r27, r28, &GOTPLT[0] } */
1123 *pc++ |= create_Imm16_X0 (tilepro_ha16 (dist_got_entry))
1124 | create_Imm16_X1 (tilepro_ha16 (dist_got0));
1125 }
1126
1127 /* { addli r28, r28, &GOTPLT[MY_GOT_INDEX] ; addli r27, r28, &GOTPLT[0] } or
1128 { addli r28, r28, &GOTPLT[MY_GOT_INDEX] ; addli r27, r27, &GOTPLT[0] } */
1129 *pc++ |= create_Imm16_X0 (dist_got_entry)
1130 | create_Imm16_X1 (dist_got0);
1131
1132 /* { auli r29, zero, MY_PLT_INDEX ; lw r28, r28 } */
1133 *pc |= create_Imm16_X0 (plt_index);
1134
1135 /* Set the relocation offset. */
1136 *r_offset = got_offset;
1137
1138 return plt_index;
1139}
1140
1141#define TILEPRO_ELF_RELA_BYTES (sizeof(Elf32_External_Rela))
1142
1143
1144/* Create an entry in an TILEPro ELF linker hash table. */
1145
1146static struct bfd_hash_entry *
1147link_hash_newfunc (struct bfd_hash_entry *entry,
1148 struct bfd_hash_table *table, const char *string)
1149{
1150 /* Allocate the structure if it has not already been allocated by a
1151 subclass. */
1152 if (entry == NULL)
1153 {
1154 entry =
07d6d2b8
AM
1155 bfd_hash_allocate (table,
1156 sizeof (struct tilepro_elf_link_hash_entry));
aa137e4d
NC
1157 if (entry == NULL)
1158 return entry;
1159 }
1160
1161 /* Call the allocation method of the superclass. */
1162 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
1163 if (entry != NULL)
1164 {
1165 struct tilepro_elf_link_hash_entry *eh;
1166
1167 eh = (struct tilepro_elf_link_hash_entry *) entry;
aa137e4d
NC
1168 eh->tls_type = GOT_UNKNOWN;
1169 }
1170
1171 return entry;
1172}
1173
1174/* Create a TILEPRO ELF linker hash table. */
1175
1176static struct bfd_link_hash_table *
1177tilepro_elf_link_hash_table_create (bfd *abfd)
1178{
f1dfbfdb
L
1179 struct elf_link_hash_table *ret;
1180 size_t amt = sizeof (struct elf_link_hash_table);
aa137e4d 1181
f1dfbfdb 1182 ret = (struct elf_link_hash_table *) bfd_zmalloc (amt);
aa137e4d
NC
1183 if (ret == NULL)
1184 return NULL;
1185
f1dfbfdb 1186 if (!_bfd_elf_link_hash_table_init (ret, abfd, link_hash_newfunc,
aa137e4d
NC
1187 sizeof (struct tilepro_elf_link_hash_entry),
1188 TILEPRO_ELF_DATA))
1189 {
1190 free (ret);
1191 return NULL;
1192 }
1193
f1dfbfdb 1194 return &ret->root;
aa137e4d
NC
1195}
1196
1197/* Create the .got section. */
1198
0a1b45a2 1199static bool
aa137e4d
NC
1200tilepro_elf_create_got_section (bfd *abfd, struct bfd_link_info *info)
1201{
1202 flagword flags;
1203 asection *s, *s_got;
1204 struct elf_link_hash_entry *h;
1205 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
1206 struct elf_link_hash_table *htab = elf_hash_table (info);
1207
1208 /* This function may be called more than once. */
ce558b89 1209 if (htab->sgot != NULL)
0a1b45a2 1210 return true;
aa137e4d
NC
1211
1212 flags = bed->dynamic_sec_flags;
1213
1214 s = bfd_make_section_with_flags (abfd,
1215 (bed->rela_plts_and_copies_p
1216 ? ".rela.got" : ".rel.got"),
1217 (bed->dynamic_sec_flags
1218 | SEC_READONLY));
1219 if (s == NULL
fd361982 1220 || !bfd_set_section_alignment (s, bed->s->log_file_align))
0a1b45a2 1221 return false;
aa137e4d
NC
1222 htab->srelgot = s;
1223
1224 s = s_got = bfd_make_section_with_flags (abfd, ".got", flags);
1225 if (s == NULL
fd361982 1226 || !bfd_set_section_alignment (s, bed->s->log_file_align))
0a1b45a2 1227 return false;
aa137e4d
NC
1228 htab->sgot = s;
1229
1230 /* The first bit of the global offset table is the header. */
1231 s->size += bed->got_header_size;
1232
1233 if (bed->want_got_plt)
1234 {
1235 s = bfd_make_section_with_flags (abfd, ".got.plt", flags);
1236 if (s == NULL
fd361982 1237 || !bfd_set_section_alignment (s, bed->s->log_file_align))
0a1b45a2 1238 return false;
aa137e4d
NC
1239 htab->sgotplt = s;
1240
1241 /* Reserve room for the header. */
1242 s->size += GOTPLT_HEADER_SIZE;
1243 }
1244
1245 if (bed->want_got_sym)
1246 {
1247 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the .got
1248 section. We don't do this in the linker script because we don't want
1249 to define the symbol if we are not creating a global offset
1250 table. */
1251 h = _bfd_elf_define_linkage_sym (abfd, info, s_got,
1252 "_GLOBAL_OFFSET_TABLE_");
1253 elf_hash_table (info)->hgot = h;
1254 if (h == NULL)
0a1b45a2 1255 return false;
aa137e4d
NC
1256 }
1257
0a1b45a2 1258 return true;
aa137e4d
NC
1259}
1260
1261/* Create .plt, .rela.plt, .got, .got.plt, .rela.got, .dynbss, and
1262 .rela.bss sections in DYNOBJ, and set up shortcuts to them in our
1263 hash table. */
1264
0a1b45a2 1265static bool
aa137e4d
NC
1266tilepro_elf_create_dynamic_sections (bfd *dynobj,
1267 struct bfd_link_info *info)
1268{
aa137e4d 1269 if (!tilepro_elf_create_got_section (dynobj, info))
0a1b45a2 1270 return false;
aa137e4d 1271
9d19e4fd 1272 return _bfd_elf_create_dynamic_sections (dynobj, info);
aa137e4d
NC
1273}
1274
1275/* Copy the extra info we tack onto an elf_link_hash_entry. */
1276
1277static void
1278tilepro_elf_copy_indirect_symbol (struct bfd_link_info *info,
1279 struct elf_link_hash_entry *dir,
1280 struct elf_link_hash_entry *ind)
1281{
1282 struct tilepro_elf_link_hash_entry *edir, *eind;
1283
1284 edir = (struct tilepro_elf_link_hash_entry *) dir;
1285 eind = (struct tilepro_elf_link_hash_entry *) ind;
1286
aa137e4d
NC
1287 if (ind->root.type == bfd_link_hash_indirect
1288 && dir->got.refcount <= 0)
1289 {
1290 edir->tls_type = eind->tls_type;
1291 eind->tls_type = GOT_UNKNOWN;
1292 }
1293 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
1294}
1295
6f7be959
WL
1296static int
1297tilepro_tls_translate_to_le (int r_type)
1298{
1299 switch (r_type)
1300 {
1301 case R_TILEPRO_IMM16_X0_TLS_GD:
1302 case R_TILEPRO_IMM16_X0_TLS_IE:
1303 return R_TILEPRO_IMM16_X0_TLS_LE;
1304
1305 case R_TILEPRO_IMM16_X1_TLS_GD:
1306 case R_TILEPRO_IMM16_X1_TLS_IE:
1307 return R_TILEPRO_IMM16_X1_TLS_LE;
1308
1309 case R_TILEPRO_IMM16_X0_TLS_GD_LO:
1310 case R_TILEPRO_IMM16_X0_TLS_IE_LO:
1311 return R_TILEPRO_IMM16_X0_TLS_LE_LO;
1312
1313 case R_TILEPRO_IMM16_X1_TLS_GD_LO:
1314 case R_TILEPRO_IMM16_X1_TLS_IE_LO:
1315 return R_TILEPRO_IMM16_X1_TLS_LE_LO;
1316
1317 case R_TILEPRO_IMM16_X0_TLS_GD_HI:
1318 case R_TILEPRO_IMM16_X0_TLS_IE_HI:
1319 return R_TILEPRO_IMM16_X0_TLS_LE_HI;
1320
1321 case R_TILEPRO_IMM16_X1_TLS_GD_HI:
1322 case R_TILEPRO_IMM16_X1_TLS_IE_HI:
1323 return R_TILEPRO_IMM16_X1_TLS_LE_HI;
1324
1325 case R_TILEPRO_IMM16_X0_TLS_GD_HA:
1326 case R_TILEPRO_IMM16_X0_TLS_IE_HA:
1327 return R_TILEPRO_IMM16_X0_TLS_LE_HA;
1328
1329 case R_TILEPRO_IMM16_X1_TLS_GD_HA:
1330 case R_TILEPRO_IMM16_X1_TLS_IE_HA:
1331 return R_TILEPRO_IMM16_X1_TLS_LE_HA;
1332 }
1333 return r_type;
1334}
1335
1336static int
1337tilepro_tls_translate_to_ie (int r_type)
1338{
1339 switch (r_type)
1340 {
1341 case R_TILEPRO_IMM16_X0_TLS_GD:
1342 case R_TILEPRO_IMM16_X0_TLS_IE:
1343 return R_TILEPRO_IMM16_X0_TLS_IE;
1344
1345 case R_TILEPRO_IMM16_X1_TLS_GD:
1346 case R_TILEPRO_IMM16_X1_TLS_IE:
1347 return R_TILEPRO_IMM16_X1_TLS_IE;
1348
1349 case R_TILEPRO_IMM16_X0_TLS_GD_LO:
1350 case R_TILEPRO_IMM16_X0_TLS_IE_LO:
1351 return R_TILEPRO_IMM16_X0_TLS_IE_LO;
1352
1353 case R_TILEPRO_IMM16_X1_TLS_GD_LO:
1354 case R_TILEPRO_IMM16_X1_TLS_IE_LO:
1355 return R_TILEPRO_IMM16_X1_TLS_IE_LO;
1356
1357 case R_TILEPRO_IMM16_X0_TLS_GD_HI:
1358 case R_TILEPRO_IMM16_X0_TLS_IE_HI:
1359 return R_TILEPRO_IMM16_X0_TLS_IE_HI;
1360
1361 case R_TILEPRO_IMM16_X1_TLS_GD_HI:
1362 case R_TILEPRO_IMM16_X1_TLS_IE_HI:
1363 return R_TILEPRO_IMM16_X1_TLS_IE_HI;
1364
1365 case R_TILEPRO_IMM16_X0_TLS_GD_HA:
1366 case R_TILEPRO_IMM16_X0_TLS_IE_HA:
1367 return R_TILEPRO_IMM16_X0_TLS_IE_HA;
1368
1369 case R_TILEPRO_IMM16_X1_TLS_GD_HA:
1370 case R_TILEPRO_IMM16_X1_TLS_IE_HA:
1371 return R_TILEPRO_IMM16_X1_TLS_IE_HA;
1372 }
1373 return r_type;
1374}
1375
1376static int
1377tilepro_elf_tls_transition (struct bfd_link_info *info, int r_type,
1378 int is_local)
1379{
1ba1f393 1380 if (!bfd_link_executable (info))
6f7be959
WL
1381 return r_type;
1382
1383 if (is_local)
1384 return tilepro_tls_translate_to_le (r_type);
1385 else
1386 return tilepro_tls_translate_to_ie (r_type);
1387}
1388
aa137e4d
NC
1389/* Look through the relocs for a section during the first phase, and
1390 allocate space in the global offset table or procedure linkage
1391 table. */
1392
0a1b45a2 1393static bool
aa137e4d
NC
1394tilepro_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
1395 asection *sec, const Elf_Internal_Rela *relocs)
1396{
f1dfbfdb 1397 struct elf_link_hash_table *htab;
aa137e4d
NC
1398 Elf_Internal_Shdr *symtab_hdr;
1399 struct elf_link_hash_entry **sym_hashes;
aa137e4d
NC
1400 const Elf_Internal_Rela *rel;
1401 const Elf_Internal_Rela *rel_end;
1402 asection *sreloc;
1403 int num_relocs;
1404
0e1862bb 1405 if (bfd_link_relocatable (info))
0a1b45a2 1406 return true;
aa137e4d
NC
1407
1408 htab = tilepro_elf_hash_table (info);
1409 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1410 sym_hashes = elf_sym_hashes (abfd);
aa137e4d
NC
1411
1412 sreloc = NULL;
1413
1414 num_relocs = sec->reloc_count;
1415
1416 BFD_ASSERT (is_tilepro_elf (abfd) || num_relocs == 0);
1417
f1dfbfdb
L
1418 if (htab->dynobj == NULL)
1419 htab->dynobj = abfd;
aa137e4d
NC
1420
1421 rel_end = relocs + num_relocs;
1422 for (rel = relocs; rel < rel_end; rel++)
1423 {
1424 unsigned int r_type;
d42c267e 1425 unsigned int r_symndx;
aa137e4d
NC
1426 struct elf_link_hash_entry *h;
1427 int tls_type;
1428
1429 r_symndx = ELF32_R_SYM (rel->r_info);
1430 r_type = ELF32_R_TYPE (rel->r_info);
1431
1432 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
1433 {
695344c0 1434 /* xgettext:c-format */
871b3ab2 1435 _bfd_error_handler (_("%pB: bad symbol index: %d"),
4eca0228 1436 abfd, r_symndx);
0a1b45a2 1437 return false;
aa137e4d
NC
1438 }
1439
1440 if (r_symndx < symtab_hdr->sh_info)
1441 h = NULL;
1442 else
1443 {
1444 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1445 while (h->root.type == bfd_link_hash_indirect
1446 || h->root.type == bfd_link_hash_warning)
1447 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1448 }
1449
6f7be959 1450 r_type = tilepro_elf_tls_transition (info, r_type, h == NULL);
aa137e4d
NC
1451 switch (r_type)
1452 {
07d6d2b8
AM
1453 case R_TILEPRO_IMM16_X0_TLS_LE:
1454 case R_TILEPRO_IMM16_X1_TLS_LE:
1455 case R_TILEPRO_IMM16_X0_TLS_LE_LO:
1456 case R_TILEPRO_IMM16_X1_TLS_LE_LO:
1457 case R_TILEPRO_IMM16_X0_TLS_LE_HI:
1458 case R_TILEPRO_IMM16_X1_TLS_LE_HI:
1459 case R_TILEPRO_IMM16_X0_TLS_LE_HA:
1460 case R_TILEPRO_IMM16_X1_TLS_LE_HA:
1ba1f393 1461 if (!bfd_link_executable (info))
6f7be959
WL
1462 goto r_tilepro_plt32;
1463 break;
1464
07d6d2b8
AM
1465 case R_TILEPRO_IMM16_X0_TLS_GD:
1466 case R_TILEPRO_IMM16_X1_TLS_GD:
1467 case R_TILEPRO_IMM16_X0_TLS_GD_LO:
1468 case R_TILEPRO_IMM16_X1_TLS_GD_LO:
1469 case R_TILEPRO_IMM16_X0_TLS_GD_HI:
1470 case R_TILEPRO_IMM16_X1_TLS_GD_HI:
1471 case R_TILEPRO_IMM16_X0_TLS_GD_HA:
1472 case R_TILEPRO_IMM16_X1_TLS_GD_HA:
0e1862bb 1473 BFD_ASSERT (bfd_link_pic (info));
6f7be959 1474 tls_type = GOT_TLS_GD;
07d6d2b8
AM
1475 goto have_got_reference;
1476
1477 case R_TILEPRO_IMM16_X0_TLS_IE:
1478 case R_TILEPRO_IMM16_X1_TLS_IE:
1479 case R_TILEPRO_IMM16_X0_TLS_IE_LO:
1480 case R_TILEPRO_IMM16_X1_TLS_IE_LO:
1481 case R_TILEPRO_IMM16_X0_TLS_IE_HI:
1482 case R_TILEPRO_IMM16_X1_TLS_IE_HI:
1483 case R_TILEPRO_IMM16_X0_TLS_IE_HA:
1484 case R_TILEPRO_IMM16_X1_TLS_IE_HA:
1485 tls_type = GOT_TLS_IE;
1486 if (!bfd_link_executable (info))
1487 info->flags |= DF_STATIC_TLS;
1488 goto have_got_reference;
1489
1490 case R_TILEPRO_IMM16_X0_GOT:
1491 case R_TILEPRO_IMM16_X1_GOT:
1492 case R_TILEPRO_IMM16_X0_GOT_LO:
1493 case R_TILEPRO_IMM16_X1_GOT_LO:
1494 case R_TILEPRO_IMM16_X0_GOT_HI:
1495 case R_TILEPRO_IMM16_X1_GOT_HI:
1496 case R_TILEPRO_IMM16_X0_GOT_HA:
1497 case R_TILEPRO_IMM16_X1_GOT_HA:
1498 tls_type = GOT_NORMAL;
1499 /* Fall Through */
1500
1501 have_got_reference:
aa137e4d
NC
1502 /* This symbol requires a global offset table entry. */
1503 {
07d6d2b8 1504 int old_tls_type;
aa137e4d
NC
1505
1506 if (h != NULL)
1507 {
1508 h->got.refcount += 1;
1509 old_tls_type = tilepro_elf_hash_entry(h)->tls_type;
1510 }
1511 else
1512 {
1513 bfd_signed_vma *local_got_refcounts;
1514
1515 /* This is a global offset table entry for a local symbol. */
1516 local_got_refcounts = elf_local_got_refcounts (abfd);
1517 if (local_got_refcounts == NULL)
1518 {
1519 bfd_size_type size;
1520
1521 size = symtab_hdr->sh_info;
1522 size *= (sizeof (bfd_signed_vma) + sizeof(char));
1523 local_got_refcounts = ((bfd_signed_vma *)
1524 bfd_zalloc (abfd, size));
1525 if (local_got_refcounts == NULL)
0a1b45a2 1526 return false;
aa137e4d
NC
1527 elf_local_got_refcounts (abfd) = local_got_refcounts;
1528 _bfd_tilepro_elf_local_got_tls_type (abfd)
1529 = (char *) (local_got_refcounts + symtab_hdr->sh_info);
1530 }
1531 local_got_refcounts[r_symndx] += 1;
1532 old_tls_type =
1533 _bfd_tilepro_elf_local_got_tls_type (abfd) [r_symndx];
1534 }
1535
1536 /* If a TLS symbol is accessed using IE at least once,
1537 there is no point to use dynamic model for it. */
1538 if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN
1539 && (old_tls_type != GOT_TLS_GD
1540 || tls_type != GOT_TLS_IE))
1541 {
1542 if (old_tls_type == GOT_TLS_IE && tls_type == GOT_TLS_GD)
1543 tls_type = old_tls_type;
1544 else
1545 {
4eca0228 1546 _bfd_error_handler
695344c0 1547 /* xgettext:c-format */
871b3ab2 1548 (_("%pB: `%s' accessed both as normal and thread local symbol"),
aa137e4d 1549 abfd, h ? h->root.root.string : "<local>");
0a1b45a2 1550 return false;
aa137e4d
NC
1551 }
1552 }
1553
1554 if (old_tls_type != tls_type)
1555 {
1556 if (h != NULL)
1557 tilepro_elf_hash_entry (h)->tls_type = tls_type;
1558 else
1559 _bfd_tilepro_elf_local_got_tls_type (abfd) [r_symndx] =
1560 tls_type;
1561 }
1562 }
1563
f1dfbfdb 1564 if (htab->sgot == NULL)
aa137e4d 1565 {
f1dfbfdb 1566 if (!tilepro_elf_create_got_section (htab->dynobj, info))
0a1b45a2 1567 return false;
aa137e4d
NC
1568 }
1569 break;
1570
6f7be959 1571 case R_TILEPRO_TLS_GD_CALL:
1ba1f393 1572 if (!bfd_link_executable (info))
6f7be959
WL
1573 {
1574 /* These are basically R_TILEPRO_JOFFLONG_X1_PLT relocs
1575 against __tls_get_addr. */
1576 struct bfd_link_hash_entry *bh = NULL;
1577 if (! _bfd_generic_link_add_one_symbol (info, abfd,
1578 "__tls_get_addr", 0,
1579 bfd_und_section_ptr, 0,
0a1b45a2 1580 NULL, false, false,
6f7be959 1581 &bh))
0a1b45a2 1582 return false;
6f7be959
WL
1583 h = (struct elf_link_hash_entry *) bh;
1584 }
1585 else
1586 break;
1587 /* Fall through */
1588
07d6d2b8 1589 case R_TILEPRO_JOFFLONG_X1_PLT:
aa137e4d
NC
1590 /* This symbol requires a procedure linkage table entry. We
1591 actually build the entry in adjust_dynamic_symbol,
1592 because this might be a case of linking PIC code without
1593 linking in any dynamic objects, in which case we don't
1594 need to generate a procedure linkage table after all. */
1595
1596 if (h != NULL)
07d6d2b8
AM
1597 {
1598 h->needs_plt = 1;
1599 h->plt.refcount += 1;
1600 }
aa137e4d
NC
1601 break;
1602
07d6d2b8
AM
1603 case R_TILEPRO_32_PCREL:
1604 case R_TILEPRO_16_PCREL:
1605 case R_TILEPRO_8_PCREL:
1606 case R_TILEPRO_IMM16_X0_PCREL:
1607 case R_TILEPRO_IMM16_X1_PCREL:
1608 case R_TILEPRO_IMM16_X0_LO_PCREL:
1609 case R_TILEPRO_IMM16_X1_LO_PCREL:
1610 case R_TILEPRO_IMM16_X0_HI_PCREL:
1611 case R_TILEPRO_IMM16_X1_HI_PCREL:
1612 case R_TILEPRO_IMM16_X0_HA_PCREL:
1613 case R_TILEPRO_IMM16_X1_HA_PCREL:
aa137e4d
NC
1614 if (h != NULL)
1615 h->non_got_ref = 1;
1616
1617 if (h != NULL
1618 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
1619 break;
1620 /* Fall through. */
1621
07d6d2b8
AM
1622 case R_TILEPRO_32:
1623 case R_TILEPRO_16:
1624 case R_TILEPRO_8:
1625 case R_TILEPRO_LO16:
1626 case R_TILEPRO_HI16:
1627 case R_TILEPRO_HA16:
1628 case R_TILEPRO_COPY:
1629 case R_TILEPRO_GLOB_DAT:
1630 case R_TILEPRO_JMP_SLOT:
1631 case R_TILEPRO_RELATIVE:
1632 case R_TILEPRO_BROFF_X1:
1633 case R_TILEPRO_JOFFLONG_X1:
1634 case R_TILEPRO_IMM8_X0:
1635 case R_TILEPRO_IMM8_Y0:
1636 case R_TILEPRO_IMM8_X1:
1637 case R_TILEPRO_IMM8_Y1:
1638 case R_TILEPRO_DEST_IMM8_X1:
1639 case R_TILEPRO_MT_IMM15_X1:
1640 case R_TILEPRO_MF_IMM15_X1:
1641 case R_TILEPRO_IMM16_X0:
1642 case R_TILEPRO_IMM16_X1:
1643 case R_TILEPRO_IMM16_X0_LO:
1644 case R_TILEPRO_IMM16_X1_LO:
1645 case R_TILEPRO_IMM16_X0_HI:
1646 case R_TILEPRO_IMM16_X1_HI:
1647 case R_TILEPRO_IMM16_X0_HA:
1648 case R_TILEPRO_IMM16_X1_HA:
1649 case R_TILEPRO_MMSTART_X0:
1650 case R_TILEPRO_MMEND_X0:
1651 case R_TILEPRO_MMSTART_X1:
1652 case R_TILEPRO_MMEND_X1:
1653 case R_TILEPRO_SHAMT_X0:
1654 case R_TILEPRO_SHAMT_X1:
1655 case R_TILEPRO_SHAMT_Y0:
1656 case R_TILEPRO_SHAMT_Y1:
aa137e4d 1657 if (h != NULL)
07d6d2b8 1658 h->non_got_ref = 1;
aa137e4d 1659
6f7be959 1660 r_tilepro_plt32:
0e1862bb 1661 if (h != NULL && !bfd_link_pic (info))
6f7be959
WL
1662 {
1663 /* We may need a .plt entry if the function this reloc
1664 refers to is in a shared lib. */
1665 h->plt.refcount += 1;
07d6d2b8 1666 }
aa137e4d
NC
1667
1668 /* If we are creating a shared library, and this is a reloc
1669 against a global symbol, or a non PC relative reloc
1670 against a local symbol, then we need to copy the reloc
1671 into the shared library. However, if we are linking with
1672 -Bsymbolic, we do not need to copy a reloc against a
1673 global symbol which is defined in an object we are
1674 including in the link (i.e., DEF_REGULAR is set). At
1675 this point we have not seen all the input files, so it is
1676 possible that DEF_REGULAR is not set now but will be set
1677 later (it is never cleared). In case of a weak definition,
1678 DEF_REGULAR may be cleared later by a strong definition in
1679 a shared library. We account for that possibility below by
1680 storing information in the relocs_copied field of the hash
1681 table entry. A similar situation occurs when creating
1682 shared libraries and symbol visibility changes render the
1683 symbol local.
1684
1685 If on the other hand, we are creating an executable, we
1686 may need to keep relocations for symbols satisfied by a
1687 dynamic library if we manage to avoid copy relocs for the
1688 symbol. */
0e1862bb 1689 if ((bfd_link_pic (info)
aa137e4d
NC
1690 && (sec->flags & SEC_ALLOC) != 0
1691 && (! tilepro_elf_howto_table[r_type].pc_relative
1692 || (h != NULL
1693 && (! info->symbolic
1694 || h->root.type == bfd_link_hash_defweak
1695 || !h->def_regular))))
0e1862bb 1696 || (!bfd_link_pic (info)
aa137e4d
NC
1697 && (sec->flags & SEC_ALLOC) != 0
1698 && h != NULL
1699 && (h->root.type == bfd_link_hash_defweak
1700 || !h->def_regular)))
1701 {
3bf083ed
AM
1702 struct elf_dyn_relocs *p;
1703 struct elf_dyn_relocs **head;
aa137e4d
NC
1704
1705 /* When creating a shared object, we must copy these
1706 relocs into the output file. We create a reloc
1707 section in dynobj and make room for the reloc. */
1708 if (sreloc == NULL)
1709 {
1710 sreloc = _bfd_elf_make_dynamic_reloc_section
0a1b45a2 1711 (sec, htab->dynobj, 2, abfd, /*rela?*/ true);
aa137e4d
NC
1712
1713 if (sreloc == NULL)
0a1b45a2 1714 return false;
aa137e4d
NC
1715 }
1716
1717 /* If this is a global symbol, we count the number of
1718 relocations we need for this symbol. */
1719 if (h != NULL)
190eb1dd 1720 head = &h->dyn_relocs;
aa137e4d
NC
1721 else
1722 {
1723 /* Track dynamic relocs needed for local syms too.
1724 We really need local syms available to do this
1725 easily. Oh well. */
1726
1727 asection *s;
1728 void *vpp;
1729 Elf_Internal_Sym *isym;
1730
1731 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1732 abfd, r_symndx);
1733 if (isym == NULL)
0a1b45a2 1734 return false;
aa137e4d
NC
1735
1736 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
1737 if (s == NULL)
1738 s = sec;
1739
1740 vpp = &elf_section_data (s)->local_dynrel;
3bf083ed 1741 head = (struct elf_dyn_relocs **) vpp;
aa137e4d
NC
1742 }
1743
1744 p = *head;
1745 if (p == NULL || p->sec != sec)
1746 {
986f0783 1747 size_t amt = sizeof *p;
3bf083ed 1748 p = ((struct elf_dyn_relocs *)
f1dfbfdb 1749 bfd_alloc (htab->dynobj, amt));
aa137e4d 1750 if (p == NULL)
0a1b45a2 1751 return false;
aa137e4d
NC
1752 p->next = *head;
1753 *head = p;
1754 p->sec = sec;
1755 p->count = 0;
1756 p->pc_count = 0;
1757 }
1758
1759 p->count += 1;
1760 if (tilepro_elf_howto_table[r_type].pc_relative)
1761 p->pc_count += 1;
1762 }
1763
1764 break;
1765
1766 case R_TILEPRO_GNU_VTINHERIT:
1767 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
0a1b45a2 1768 return false;
aa137e4d
NC
1769 break;
1770
1771 case R_TILEPRO_GNU_VTENTRY:
1772 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
0a1b45a2 1773 return false;
aa137e4d
NC
1774 break;
1775
1776 default:
1777 break;
1778 }
1779 }
1780
0a1b45a2 1781 return true;
aa137e4d
NC
1782}
1783
1784\f
1785static asection *
1786tilepro_elf_gc_mark_hook (asection *sec,
07d6d2b8
AM
1787 struct bfd_link_info *info,
1788 Elf_Internal_Rela *rel,
1789 struct elf_link_hash_entry *h,
1790 Elf_Internal_Sym *sym)
aa137e4d
NC
1791{
1792 if (h != NULL)
1793 {
1794 switch (ELF32_R_TYPE (rel->r_info))
b45b6908
AM
1795 {
1796 case R_TILEPRO_GNU_VTINHERIT:
1797 case R_TILEPRO_GNU_VTENTRY:
1798 return NULL;
1799 }
1800 }
1801
1802 /* FIXME: The test here, in check_relocs and in relocate_section
0e1862bb
L
1803 dealing with TLS optimization, ought to be !bfd_link_executable (info). */
1804 if (bfd_link_pic (info))
b45b6908 1805 {
8e354058
L
1806 struct bfd_link_hash_entry *bh;
1807
b45b6908
AM
1808 switch (ELF32_R_TYPE (rel->r_info))
1809 {
1810 case R_TILEPRO_TLS_GD_CALL:
1811 /* This reloc implicitly references __tls_get_addr. We know
1812 another reloc will reference the same symbol as the one
1813 on this reloc, so the real symbol and section will be
1814 gc marked when processing the other reloc. That lets
1815 us handle __tls_get_addr here. */
8e354058
L
1816 bh = NULL;
1817 if (! _bfd_generic_link_add_one_symbol (info, sec->owner,
1818 "__tls_get_addr", 0,
1819 bfd_und_section_ptr,
0a1b45a2
AM
1820 0, NULL, false,
1821 false, &bh))
8e354058
L
1822 return NULL;
1823 h = (struct elf_link_hash_entry *) bh;
b45b6908
AM
1824 BFD_ASSERT (h != NULL);
1825 h->mark = 1;
60d67dc8
AM
1826 if (h->is_weakalias)
1827 weakdef (h)->mark = 1;
b45b6908
AM
1828 sym = NULL;
1829 }
aa137e4d
NC
1830 }
1831
1832 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
1833}
1834
aa137e4d
NC
1835/* Adjust a symbol defined by a dynamic object and referenced by a
1836 regular object. The current definition is in some section of the
1837 dynamic object, but we're not including those sections. We have to
1838 change the definition to something the rest of the link can
1839 understand. */
1840
0a1b45a2 1841static bool
aa137e4d
NC
1842tilepro_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
1843 struct elf_link_hash_entry *h)
1844{
f1dfbfdb 1845 struct elf_link_hash_table *htab;
5474d94f 1846 asection *s, *srel;
aa137e4d
NC
1847
1848 htab = tilepro_elf_hash_table (info);
1849 BFD_ASSERT (htab != NULL);
1850
1851 /* Make sure we know what is going on here. */
f1dfbfdb 1852 BFD_ASSERT (htab->dynobj != NULL
aa137e4d 1853 && (h->needs_plt
60d67dc8 1854 || h->is_weakalias
aa137e4d
NC
1855 || (h->def_dynamic
1856 && h->ref_regular
1857 && !h->def_regular)));
1858
1859 /* If this is a function, put it in the procedure linkage table. We
1860 will fill in the contents of the procedure linkage table later
1861 (although we could actually do it here). */
1862 if (h->type == STT_FUNC || h->needs_plt)
1863 {
1864 if (h->plt.refcount <= 0
1865 || SYMBOL_CALLS_LOCAL (info, h)
1866 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1867 && h->root.type == bfd_link_hash_undefweak))
1868 {
1869 /* This case can occur if we saw a R_TILEPRO_JOFFLONG_X1_PLT
07d6d2b8
AM
1870 reloc in an input file, but the symbol was never referred
1871 to by a dynamic object, or if all references were garbage
1872 collected. In such a case, we don't actually need to build
1873 a procedure linkage table, and we can just do a
1874 R_TILEPRO_JOFFLONG_X1 relocation instead. */
aa137e4d
NC
1875 h->plt.offset = (bfd_vma) -1;
1876 h->needs_plt = 0;
1877 }
1878
0a1b45a2 1879 return true;
aa137e4d
NC
1880 }
1881 else
1882 h->plt.offset = (bfd_vma) -1;
1883
1884 /* If this is a weak symbol, and there is a real definition, the
1885 processor independent code will have arranged for us to see the
1886 real definition first, and we can just use the same value. */
60d67dc8 1887 if (h->is_weakalias)
aa137e4d 1888 {
60d67dc8
AM
1889 struct elf_link_hash_entry *def = weakdef (h);
1890 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
1891 h->root.u.def.section = def->root.u.def.section;
1892 h->root.u.def.value = def->root.u.def.value;
0a1b45a2 1893 return true;
aa137e4d
NC
1894 }
1895
1896 /* This is a reference to a symbol defined by a dynamic object which
1897 is not a function. */
1898
1899 /* If we are creating a shared library, we must presume that the
1900 only references to the symbol are via the global offset table.
1901 For such cases we need not do anything here; the relocations will
1902 be handled correctly by relocate_section. */
0e1862bb 1903 if (bfd_link_pic (info))
0a1b45a2 1904 return true;
aa137e4d
NC
1905
1906 /* If there are no references to this symbol that do not use the
1907 GOT, we don't need to generate a copy reloc. */
1908 if (!h->non_got_ref)
0a1b45a2 1909 return true;
aa137e4d
NC
1910
1911 /* If -z nocopyreloc was given, we won't generate them either. */
1912 if (info->nocopyreloc)
1913 {
1914 h->non_got_ref = 0;
0a1b45a2 1915 return true;
aa137e4d
NC
1916 }
1917
3bf083ed 1918 /* If we don't find any dynamic relocs in read-only sections, then
aa137e4d 1919 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
5dbc8b37 1920 if (!_bfd_elf_readonly_dynrelocs (h))
aa137e4d
NC
1921 {
1922 h->non_got_ref = 0;
0a1b45a2 1923 return true;
aa137e4d
NC
1924 }
1925
aa137e4d
NC
1926 /* We must allocate the symbol in our .dynbss section, which will
1927 become part of the .bss section of the executable. There will be
1928 an entry for this symbol in the .dynsym section. The dynamic
1929 object will contain position independent code, so all references
1930 from the dynamic object to this symbol will go through the global
1931 offset table. The dynamic linker will use the .dynsym entry to
1932 determine the address it must put in the global offset table, so
1933 both the dynamic object and the regular object will refer to the
1934 same memory location for the variable. */
1935
1936 /* We must generate a R_TILEPRO_COPY reloc to tell the dynamic linker
1937 to copy the initial value out of the dynamic object and into the
1938 runtime process image. We need to remember the offset into the
1939 .rel.bss section we are going to use. */
5474d94f
AM
1940 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
1941 {
f1dfbfdb
L
1942 s = htab->sdynrelro;
1943 srel = htab->sreldynrelro;
5474d94f
AM
1944 }
1945 else
1946 {
f1dfbfdb
L
1947 s = htab->sdynbss;
1948 srel = htab->srelbss;
5474d94f 1949 }
1d7e9d18 1950 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
aa137e4d 1951 {
5474d94f 1952 srel->size += TILEPRO_ELF_RELA_BYTES;
aa137e4d
NC
1953 h->needs_copy = 1;
1954 }
1955
5474d94f 1956 return _bfd_elf_adjust_dynamic_copy (info, h, s);
aa137e4d
NC
1957}
1958
1959/* Allocate space in .plt, .got and associated reloc sections for
1960 dynamic relocs. */
1961
0a1b45a2 1962static bool
e4d34ace 1963allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
aa137e4d
NC
1964{
1965 struct bfd_link_info *info;
f1dfbfdb 1966 struct elf_link_hash_table *htab;
3bf083ed 1967 struct elf_dyn_relocs *p;
aa137e4d
NC
1968
1969 if (h->root.type == bfd_link_hash_indirect)
0a1b45a2 1970 return true;
aa137e4d 1971
aa137e4d
NC
1972 info = (struct bfd_link_info *) inf;
1973 htab = tilepro_elf_hash_table (info);
1974 BFD_ASSERT (htab != NULL);
1975
f1dfbfdb 1976 if (htab->dynamic_sections_created
aa137e4d
NC
1977 && h->plt.refcount > 0)
1978 {
1979 /* Make sure this symbol is output as a dynamic symbol.
1980 Undefined weak syms won't yet be marked as dynamic. */
1981 if (h->dynindx == -1
1982 && !h->forced_local)
1983 {
1984 if (! bfd_elf_link_record_dynamic_symbol (info, h))
0a1b45a2 1985 return false;
aa137e4d
NC
1986 }
1987
0e1862bb 1988 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, bfd_link_pic (info), h))
aa137e4d 1989 {
f1dfbfdb 1990 asection *s = htab->splt;
aa137e4d
NC
1991
1992 /* Allocate room for the header. */
1993 if (s->size == 0)
1994 {
663b5850 1995 s->size = PLT_ENTRY_SIZE;
aa137e4d
NC
1996 }
1997
07d6d2b8 1998 h->plt.offset = s->size;
aa137e4d
NC
1999
2000 /* If this symbol is not defined in a regular file, and we are
2001 not generating a shared library, then set the symbol to this
2002 location in the .plt. This is required to make function
2003 pointers compare as equal between the normal executable and
2004 the shared library. */
0e1862bb 2005 if (! bfd_link_pic (info)
aa137e4d
NC
2006 && !h->def_regular)
2007 {
2008 h->root.u.def.section = s;
2009 h->root.u.def.value = h->plt.offset;
2010 }
2011
2012 /* Make room for this entry. */
2013 s->size += PLT_ENTRY_SIZE;
2014
2015 /* We also need to make an entry in the .got.plt section. */
f1dfbfdb 2016 htab->sgotplt->size += GOT_ENTRY_SIZE;
aa137e4d
NC
2017
2018 /* We also need to make an entry in the .rela.plt section. */
f1dfbfdb 2019 htab->srelplt->size += TILEPRO_ELF_RELA_BYTES;
aa137e4d
NC
2020 }
2021 else
2022 {
2023 h->plt.offset = (bfd_vma) -1;
2024 h->needs_plt = 0;
2025 }
2026 }
2027 else
2028 {
2029 h->plt.offset = (bfd_vma) -1;
2030 h->needs_plt = 0;
2031 }
2032
6f7be959
WL
2033 /* If a TLS_IE symbol is now local to the binary, make it a TLS_LE
2034 requiring no TLS entry. */
2035 if (h->got.refcount > 0
1ba1f393 2036 && bfd_link_executable (info)
6f7be959
WL
2037 && h->dynindx == -1
2038 && tilepro_elf_hash_entry(h)->tls_type == GOT_TLS_IE)
2039 h->got.offset = (bfd_vma) -1;
2040 else if (h->got.refcount > 0)
aa137e4d
NC
2041 {
2042 asection *s;
0a1b45a2 2043 bool dyn;
aa137e4d
NC
2044 int tls_type = tilepro_elf_hash_entry(h)->tls_type;
2045
2046 /* Make sure this symbol is output as a dynamic symbol.
2047 Undefined weak syms won't yet be marked as dynamic. */
2048 if (h->dynindx == -1
2049 && !h->forced_local)
2050 {
2051 if (! bfd_elf_link_record_dynamic_symbol (info, h))
0a1b45a2 2052 return false;
aa137e4d
NC
2053 }
2054
f1dfbfdb 2055 s = htab->sgot;
aa137e4d
NC
2056 h->got.offset = s->size;
2057 s->size += TILEPRO_BYTES_PER_WORD;
2058 /* R_TILEPRO_IMM16_Xn_TLS_GD entries need 2 consecutive GOT slots. */
2059 if (tls_type == GOT_TLS_GD)
2060 s->size += TILEPRO_BYTES_PER_WORD;
f1dfbfdb 2061 dyn = htab->dynamic_sections_created;
aa137e4d
NC
2062 /* R_TILEPRO_IMM16_Xn_TLS_IE_xxx needs one dynamic relocation,
2063 R_TILEPRO_IMM16_Xn_TLS_GD_xxx needs two if local symbol and two if
2064 global. */
2065 if (tls_type == GOT_TLS_GD || tls_type == GOT_TLS_IE)
f1dfbfdb 2066 htab->srelgot->size += 2 * TILEPRO_ELF_RELA_BYTES;
0e1862bb
L
2067 else if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
2068 bfd_link_pic (info),
2069 h))
f1dfbfdb 2070 htab->srelgot->size += TILEPRO_ELF_RELA_BYTES;
aa137e4d
NC
2071 }
2072 else
2073 h->got.offset = (bfd_vma) -1;
2074
190eb1dd 2075 if (h->dyn_relocs == NULL)
0a1b45a2 2076 return true;
aa137e4d
NC
2077
2078 /* In the shared -Bsymbolic case, discard space allocated for
2079 dynamic pc-relative relocs against symbols which turn out to be
2080 defined in regular objects. For the normal shared case, discard
2081 space for pc-relative relocs that have become local due to symbol
2082 visibility changes. */
2083
0e1862bb 2084 if (bfd_link_pic (info))
aa137e4d
NC
2085 {
2086 if (SYMBOL_CALLS_LOCAL (info, h))
2087 {
3bf083ed 2088 struct elf_dyn_relocs **pp;
aa137e4d 2089
190eb1dd 2090 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
aa137e4d
NC
2091 {
2092 p->count -= p->pc_count;
2093 p->pc_count = 0;
2094 if (p->count == 0)
2095 *pp = p->next;
2096 else
2097 pp = &p->next;
2098 }
2099 }
2100
2101 /* Also discard relocs on undefined weak syms with non-default
2102 visibility. */
190eb1dd 2103 if (h->dyn_relocs != NULL
aa137e4d
NC
2104 && h->root.type == bfd_link_hash_undefweak)
2105 {
a3cd202a
L
2106 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
2107 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
190eb1dd 2108 h->dyn_relocs = NULL;
aa137e4d
NC
2109
2110 /* Make sure undefined weak symbols are output as a dynamic
2111 symbol in PIEs. */
2112 else if (h->dynindx == -1
2113 && !h->forced_local)
2114 {
2115 if (! bfd_elf_link_record_dynamic_symbol (info, h))
0a1b45a2 2116 return false;
aa137e4d
NC
2117 }
2118 }
2119 }
2120 else
2121 {
2122 /* For the non-shared case, discard space for relocs against
2123 symbols which turn out to need copy relocs or are not
2124 dynamic. */
2125
2126 if (!h->non_got_ref
2127 && ((h->def_dynamic
2128 && !h->def_regular)
f1dfbfdb 2129 || (htab->dynamic_sections_created
aa137e4d
NC
2130 && (h->root.type == bfd_link_hash_undefweak
2131 || h->root.type == bfd_link_hash_undefined))))
2132 {
2133 /* Make sure this symbol is output as a dynamic symbol.
2134 Undefined weak syms won't yet be marked as dynamic. */
2135 if (h->dynindx == -1
2136 && !h->forced_local)
2137 {
2138 if (! bfd_elf_link_record_dynamic_symbol (info, h))
0a1b45a2 2139 return false;
aa137e4d
NC
2140 }
2141
2142 /* If that succeeded, we know we'll be keeping all the
2143 relocs. */
2144 if (h->dynindx != -1)
2145 goto keep;
2146 }
2147
190eb1dd 2148 h->dyn_relocs = NULL;
aa137e4d
NC
2149
2150 keep: ;
2151 }
2152
2153 /* Finally, allocate space. */
190eb1dd 2154 for (p = h->dyn_relocs; p != NULL; p = p->next)
aa137e4d
NC
2155 {
2156 asection *sreloc = elf_section_data (p->sec)->sreloc;
2157 sreloc->size += p->count * TILEPRO_ELF_RELA_BYTES;
2158 }
2159
0a1b45a2 2160 return true;
aa137e4d
NC
2161}
2162
aa137e4d
NC
2163/* Return true if the dynamic symbol for a given section should be
2164 omitted when creating a shared library. */
2165
0a1b45a2 2166static bool
aa137e4d
NC
2167tilepro_elf_omit_section_dynsym (bfd *output_bfd,
2168 struct bfd_link_info *info,
2169 asection *p)
2170{
2171 /* We keep the .got section symbol so that explicit relocations
2172 against the _GLOBAL_OFFSET_TABLE_ symbol emitted in PIC mode
2173 can be turned into relocations against the .got symbol. */
2174 if (strcmp (p->name, ".got") == 0)
0a1b45a2 2175 return false;
aa137e4d 2176
d00dd7dc 2177 return _bfd_elf_omit_section_dynsym_default (output_bfd, info, p);
aa137e4d
NC
2178}
2179
2180/* Set the sizes of the dynamic sections. */
2181
2182#define ELF32_DYNAMIC_INTERPRETER "/lib/ld.so.1"
2183
0a1b45a2 2184static bool
af969b14
AM
2185tilepro_elf_late_size_sections (bfd *output_bfd,
2186 struct bfd_link_info *info)
aa137e4d 2187{
f1dfbfdb 2188 struct elf_link_hash_table *htab;
aa137e4d
NC
2189 bfd *dynobj;
2190 asection *s;
2191 bfd *ibfd;
2192
2193 htab = tilepro_elf_hash_table (info);
2194 BFD_ASSERT (htab != NULL);
f1dfbfdb 2195 dynobj = htab->dynobj;
af969b14
AM
2196 if (dynobj == NULL)
2197 return true;
aa137e4d
NC
2198
2199 if (elf_hash_table (info)->dynamic_sections_created)
2200 {
2201 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 2202 if (bfd_link_executable (info) && !info->nointerp)
aa137e4d 2203 {
3d4d4302 2204 s = bfd_get_linker_section (dynobj, ".interp");
aa137e4d
NC
2205 BFD_ASSERT (s != NULL);
2206 s->size = sizeof ELF32_DYNAMIC_INTERPRETER;
2207 s->contents = (unsigned char *) ELF32_DYNAMIC_INTERPRETER;
2208 }
2209 }
2210
2211 /* Set up .got offsets for local syms, and space for local dynamic
2212 relocs. */
c72f2fb2 2213 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
aa137e4d
NC
2214 {
2215 bfd_signed_vma *local_got;
2216 bfd_signed_vma *end_local_got;
2217 char *local_tls_type;
2218 bfd_size_type locsymcount;
2219 Elf_Internal_Shdr *symtab_hdr;
2220 asection *srel;
2221
2222 if (! is_tilepro_elf (ibfd))
2223 continue;
2224
2225 for (s = ibfd->sections; s != NULL; s = s->next)
2226 {
3bf083ed 2227 struct elf_dyn_relocs *p;
aa137e4d
NC
2228
2229 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
2230 {
2231 if (!bfd_is_abs_section (p->sec)
2232 && bfd_is_abs_section (p->sec->output_section))
2233 {
2234 /* Input section has been discarded, either because
2235 it is a copy of a linkonce section or due to
2236 linker script /DISCARD/, so we'll be discarding
2237 the relocs too. */
2238 }
2239 else if (p->count != 0)
2240 {
2241 srel = elf_section_data (p->sec)->sreloc;
2242 srel->size += p->count * TILEPRO_ELF_RELA_BYTES;
2243 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
007873f5
L
2244 {
2245 info->flags |= DF_TEXTREL;
2246
871b3ab2 2247 info->callbacks->minfo (_("%pB: dynamic relocation in read-only section `%pA'\n"),
007873f5
L
2248 p->sec->owner, p->sec);
2249 }
aa137e4d
NC
2250 }
2251 }
2252 }
2253
2254 local_got = elf_local_got_refcounts (ibfd);
2255 if (!local_got)
2256 continue;
2257
2258 symtab_hdr = &elf_symtab_hdr (ibfd);
2259 locsymcount = symtab_hdr->sh_info;
2260 end_local_got = local_got + locsymcount;
2261 local_tls_type = _bfd_tilepro_elf_local_got_tls_type (ibfd);
f1dfbfdb
L
2262 s = htab->sgot;
2263 srel = htab->srelgot;
aa137e4d
NC
2264 for (; local_got < end_local_got; ++local_got, ++local_tls_type)
2265 {
2266 if (*local_got > 0)
2267 {
2268 *local_got = s->size;
2269 s->size += TILEPRO_BYTES_PER_WORD;
2270 if (*local_tls_type == GOT_TLS_GD)
2271 s->size += TILEPRO_BYTES_PER_WORD;
0e1862bb 2272 if (bfd_link_pic (info)
aa137e4d
NC
2273 || *local_tls_type == GOT_TLS_GD
2274 || *local_tls_type == GOT_TLS_IE)
2275 srel->size += TILEPRO_ELF_RELA_BYTES;
2276 }
2277 else
2278 *local_got = (bfd_vma) -1;
2279 }
2280 }
2281
2282 /* Allocate global sym .plt and .got entries, and space for global
2283 sym dynamic relocs. */
f1dfbfdb 2284 elf_link_hash_traverse (htab, allocate_dynrelocs, info);
aa137e4d
NC
2285
2286 if (elf_hash_table (info)->dynamic_sections_created)
2287 {
2288 /* If the .got section is more than 0x8000 bytes, we add
2289 0x8000 to the value of _GLOBAL_OFFSET_TABLE_, so that 16
2290 bit relocations have a greater chance of working. */
f1dfbfdb 2291 if (htab->sgot->size >= 0x8000
aa137e4d
NC
2292 && elf_hash_table (info)->hgot->root.u.def.value == 0)
2293 elf_hash_table (info)->hgot->root.u.def.value = 0x8000;
2294 }
2295
f1dfbfdb 2296 if (htab->sgotplt)
aa137e4d
NC
2297 {
2298 struct elf_link_hash_entry *got;
2299 got = elf_link_hash_lookup (elf_hash_table (info),
2300 "_GLOBAL_OFFSET_TABLE_",
0a1b45a2 2301 false, false, false);
aa137e4d
NC
2302
2303 /* Don't allocate .got.plt section if there are no GOT nor PLT
07d6d2b8 2304 entries and there is no refeence to _GLOBAL_OFFSET_TABLE_. */
aa137e4d
NC
2305 if ((got == NULL
2306 || !got->ref_regular_nonweak)
f1dfbfdb 2307 && (htab->sgotplt->size
aa137e4d 2308 == GOTPLT_HEADER_SIZE)
f1dfbfdb
L
2309 && (htab->splt == NULL
2310 || htab->splt->size == 0)
2311 && (htab->sgot == NULL
2312 || (htab->sgot->size
aa137e4d 2313 == get_elf_backend_data (output_bfd)->got_header_size)))
f1dfbfdb 2314 htab->sgotplt->size = 0;
aa137e4d
NC
2315 }
2316
2317 /* The check_relocs and adjust_dynamic_symbol entry points have
2318 determined the sizes of the various dynamic sections. Allocate
2319 memory for them. */
2320 for (s = dynobj->sections; s != NULL; s = s->next)
2321 {
2322 if ((s->flags & SEC_LINKER_CREATED) == 0)
2323 continue;
2324
f1dfbfdb
L
2325 if (s == htab->splt
2326 || s == htab->sgot
2327 || s == htab->sgotplt
2328 || s == htab->sdynbss
2329 || s == htab->sdynrelro)
aa137e4d
NC
2330 {
2331 /* Strip this section if we don't need it; see the
2332 comment below. */
2333 }
3f3328b8 2334 else if (startswith (s->name, ".rela"))
aa137e4d
NC
2335 {
2336 if (s->size != 0)
2337 {
2338 /* We use the reloc_count field as a counter if we need
2339 to copy relocs into the output file. */
2340 s->reloc_count = 0;
2341 }
2342 }
2343 else
2344 {
2345 /* It's not one of our sections. */
2346 continue;
2347 }
2348
2349 if (s->size == 0)
2350 {
2351 /* If we don't need this section, strip it from the
2352 output file. This is mostly to handle .rela.bss and
2353 .rela.plt. We must create both sections in
2354 create_dynamic_sections, because they must be created
2355 before the linker maps input sections to output
2356 sections. The linker does that before
2357 adjust_dynamic_symbol is called, and it is that
2358 function which decides whether anything needs to go
2359 into these sections. */
2360 s->flags |= SEC_EXCLUDE;
2361 continue;
2362 }
2363
2364 if ((s->flags & SEC_HAS_CONTENTS) == 0)
2365 continue;
2366
2367 /* Allocate memory for the section contents. Zero the memory
2368 for the benefit of .rela.plt, which has 4 unused entries
2369 at the beginning, and we don't want garbage. */
2370 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
2371 if (s->contents == NULL)
0a1b45a2 2372 return false;
aa137e4d
NC
2373 }
2374
0a1b45a2 2375 return _bfd_elf_add_dynamic_tags (output_bfd, info, true);
aa137e4d
NC
2376}
2377\f
2378/* Return the base VMA address which should be subtracted from real addresses
2379 when resolving @dtpoff relocation.
2380 This is PT_TLS segment p_vaddr. */
2381
2382static bfd_vma
2383dtpoff_base (struct bfd_link_info *info)
2384{
2385 /* If tls_sec is NULL, we should have signalled an error already. */
2386 if (elf_hash_table (info)->tls_sec == NULL)
2387 return 0;
2388 return elf_hash_table (info)->tls_sec->vma;
2389}
2390
2391/* Return the relocation value for R_TILEPRO_TLS_TPOFF32. */
2392
2393static bfd_vma
2394tpoff (struct bfd_link_info *info, bfd_vma address)
2395{
2396 struct elf_link_hash_table *htab = elf_hash_table (info);
2397
2398 /* If tls_sec is NULL, we should have signalled an error already. */
2399 if (htab->tls_sec == NULL)
2400 return 0;
2401
2402 return (address - htab->tls_sec->vma);
2403}
2404
6f7be959
WL
2405/* Replace the MASK bits in ADDR with those in INSN, for the next
2406 TILEPRO_BUNDLE_SIZE_IN_BYTES bytes. */
2407
2408static void
2409tilepro_replace_insn (bfd_byte *addr, const bfd_byte *mask,
2410 const bfd_byte *insn)
2411{
2412 int i;
2413 for (i = 0; i < TILEPRO_BUNDLE_SIZE_IN_BYTES; i++)
2414 {
2415 addr[i] = (addr[i] & ~mask[i]) | (insn[i] & mask[i]);
2416 }
2417}
2418
2419/* Mask to extract the bits corresponding to an instruction in a
2420 specific pipe of a bundle. */
2421static const bfd_byte insn_mask_X1[] = {
2422 0x00, 0x00, 0x00, 0x80, 0xff, 0xff, 0xff, 0x7f
2423};
2424
2425/* Mask to extract the bits corresponding to an instruction in a
2426 specific pipe of a bundle, minus the destination operand and the
2427 first source operand. */
2428static const bfd_byte insn_mask_X0_no_dest_no_srca[] = {
2429 0x00, 0xf0, 0xff, 0x7f, 0x00, 0x00, 0x00, 0x00
2430};
2431
2432static const bfd_byte insn_mask_X1_no_dest_no_srca[] = {
2433 0x00, 0x00, 0x00, 0x00, 0x00, 0xf8, 0xff, 0x7f
2434};
2435
2436static const bfd_byte insn_mask_Y0_no_dest_no_srca[] = {
2437 0x00, 0xf0, 0x0f, 0x78, 0x00, 0x00, 0x00, 0x00
2438};
2439
2440static const bfd_byte insn_mask_Y1_no_dest_no_srca[] = {
2441 0x00, 0x00, 0x00, 0x00, 0x00, 0xf8, 0x07, 0x78
2442};
2443
2444/* Mask to extract the first source operand of an instruction. */
2445static const bfd_byte srca_mask_X0[] = {
2446 0xc0, 0x0f, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
2447};
2448
2449static const bfd_byte srca_mask_X1[] = {
2450 0x00, 0x00, 0x00, 0x00, 0xe0, 0x07, 0x00, 0x00
2451};
2452
2453/* Various instructions synthesized to support tls references. */
2454
2455/* move r0, r0 in the X1 pipe, used for tls le. */
2456static const bfd_byte insn_tls_le_move_X1[] = {
2457 0x00, 0x00, 0x00, 0x00, 0x00, 0xf8, 0x33, 0x08
2458};
2459
2460/* move r0, zero in the X0 and X1 pipe, used for tls le. */
2461static const bfd_byte insn_tls_le_move_zero_X0X1[] = {
2462 0xc0, 0xff, 0xcf, 0x00, 0xe0, 0xff, 0x33, 0x08
2463};
2464
2465/* lw r0, r0 in the X1 pipe, used for tls ie. */
2466static const bfd_byte insn_tls_ie_lw_X1[] = {
2467 0x00, 0x00, 0x00, 0x00, 0x00, 0x70, 0x0b, 0x40
2468};
2469
2470/* add r0, r0, tp in various pipes, used for tls ie. */
2471static const bfd_byte insn_tls_ie_add_X0X1[] = {
2472 0x00, 0x50, 0x0f, 0x00, 0x00, 0xa8, 0x07, 0x08
2473};
2474static const bfd_byte insn_tls_ie_add_Y0Y1[] = {
2475 0x00, 0x50, 0x03, 0x08, 0x00, 0xa8, 0x01, 0x8c
2476};
2477
2478/* move r0, r0 in various pipes, used for tls gd. */
2479static const bfd_byte insn_tls_gd_add_X0X1[] = {
2480 0x00, 0xf0, 0xcf, 0x00, 0x00, 0xf8, 0x33, 0x08
2481};
2482static const bfd_byte insn_tls_gd_add_Y0Y1[] = {
2483 0x00, 0xf0, 0x0b, 0x18, 0x00, 0xf8, 0x05, 0x9c
2484};
2485
aa137e4d
NC
2486/* Relocate an TILEPRO ELF section.
2487
2488 The RELOCATE_SECTION function is called by the new ELF backend linker
2489 to handle the relocations for a section.
2490
2491 The relocs are always passed as Rela structures.
2492
2493 This function is responsible for adjusting the section contents as
2494 necessary, and (if generating a relocatable output file) adjusting
2495 the reloc addend as necessary.
2496
2497 This function does not have to worry about setting the reloc
2498 address or the reloc symbol index.
2499
2500 LOCAL_SYMS is a pointer to the swapped in local symbols.
2501
2502 LOCAL_SECTIONS is an array giving the section in the input file
2503 corresponding to the st_shndx field of each local symbol.
2504
2505 The global hash table entry for the global symbols can be found
2506 via elf_sym_hashes (input_bfd).
2507
2508 When generating relocatable output, this function must handle
2509 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
2510 going to be the section symbol corresponding to the output
2511 section, which means that the addend must be adjusted
2512 accordingly. */
2513
0f684201 2514static int
aa137e4d 2515tilepro_elf_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
07d6d2b8
AM
2516 bfd *input_bfd, asection *input_section,
2517 bfd_byte *contents, Elf_Internal_Rela *relocs,
2518 Elf_Internal_Sym *local_syms,
2519 asection **local_sections)
aa137e4d 2520{
f1dfbfdb 2521 struct elf_link_hash_table *htab;
aa137e4d
NC
2522 Elf_Internal_Shdr *symtab_hdr;
2523 struct elf_link_hash_entry **sym_hashes;
2524 bfd_vma *local_got_offsets;
535127d2 2525 bfd_vma got_base;
aa137e4d
NC
2526 asection *sreloc;
2527 Elf_Internal_Rela *rel;
2528 Elf_Internal_Rela *relend;
2529 int num_relocs;
2530
2531 htab = tilepro_elf_hash_table (info);
2532 BFD_ASSERT (htab != NULL);
2533 symtab_hdr = &elf_symtab_hdr (input_bfd);
2534 sym_hashes = elf_sym_hashes (input_bfd);
2535 local_got_offsets = elf_local_got_offsets (input_bfd);
2536
535127d2
WL
2537 if (elf_hash_table (info)->hgot == NULL)
2538 got_base = 0;
2539 else
2540 got_base = elf_hash_table (info)->hgot->root.u.def.value;
2541
aa137e4d
NC
2542 sreloc = elf_section_data (input_section)->sreloc;
2543
2544 rel = relocs;
2545 num_relocs = input_section->reloc_count;
2546 relend = relocs + num_relocs;
2547 for (; rel < relend; rel++)
2548 {
2549 int r_type, tls_type;
0a1b45a2 2550 bool is_tls_iele, is_tls_le;
aa137e4d
NC
2551 reloc_howto_type *howto;
2552 unsigned long r_symndx;
2553 struct elf_link_hash_entry *h;
2554 Elf_Internal_Sym *sym;
2555 tilepro_create_func create_func;
2556 asection *sec;
2557 bfd_vma relocation;
2558 bfd_reloc_status_type r;
2559 const char *name;
2560 bfd_vma off;
0a1b45a2
AM
2561 bool is_plt = false;
2562 bool resolved_to_zero;
2563 bool unresolved_reloc;
aa137e4d
NC
2564
2565 r_type = ELF32_R_TYPE (rel->r_info);
2566 if (r_type == R_TILEPRO_GNU_VTINHERIT
2567 || r_type == R_TILEPRO_GNU_VTENTRY)
2568 continue;
2569
2570 if ((unsigned int)r_type >= NELEMS(tilepro_elf_howto_table))
47aeb64c 2571 return _bfd_unrecognized_reloc (input_bfd, input_section, r_type);
aa137e4d
NC
2572
2573 howto = tilepro_elf_howto_table + r_type;
2574
2575 /* This is a final link. */
2576 r_symndx = ELF32_R_SYM (rel->r_info);
2577 h = NULL;
2578 sym = NULL;
2579 sec = NULL;
0a1b45a2 2580 unresolved_reloc = false;
aa137e4d
NC
2581 if (r_symndx < symtab_hdr->sh_info)
2582 {
2583 sym = local_syms + r_symndx;
2584 sec = local_sections[r_symndx];
2585 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
2586 }
2587 else
2588 {
0a1b45a2
AM
2589 bool warned ATTRIBUTE_UNUSED;
2590 bool ignored ATTRIBUTE_UNUSED;
aa137e4d
NC
2591
2592 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2593 r_symndx, symtab_hdr, sym_hashes,
2594 h, sec, relocation,
62d887d4 2595 unresolved_reloc, warned, ignored);
aa137e4d
NC
2596 if (warned)
2597 {
2598 /* To avoid generating warning messages about truncated
2599 relocations, set the relocation's address to be the same as
2600 the start of this section. */
2601 if (input_section->output_section != NULL)
2602 relocation = input_section->output_section->vma;
2603 else
2604 relocation = 0;
2605 }
2606 }
2607
dbaa2011 2608 if (sec != NULL && discarded_section (sec))
aa137e4d 2609 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 2610 rel, 1, relend, howto, 0, contents);
aa137e4d 2611
0e1862bb 2612 if (bfd_link_relocatable (info))
aa137e4d
NC
2613 continue;
2614
2615 if (h != NULL)
2616 name = h->root.root.string;
2617 else
2618 {
2619 name = (bfd_elf_string_from_elf_section
2620 (input_bfd, symtab_hdr->sh_link, sym->st_name));
2621 if (name == NULL || *name == '\0')
fd361982 2622 name = bfd_section_name (sec);
aa137e4d
NC
2623 }
2624
6f7be959
WL
2625 switch (r_type)
2626 {
2627 case R_TILEPRO_TLS_GD_CALL:
2628 case R_TILEPRO_IMM8_X0_TLS_GD_ADD:
2629 case R_TILEPRO_IMM8_Y0_TLS_GD_ADD:
2630 case R_TILEPRO_IMM8_X1_TLS_GD_ADD:
2631 case R_TILEPRO_IMM8_Y1_TLS_GD_ADD:
2632 case R_TILEPRO_IMM16_X0_TLS_GD_HA:
2633 case R_TILEPRO_IMM16_X1_TLS_GD_HA:
2634 case R_TILEPRO_IMM16_X0_TLS_IE_HA:
2635 case R_TILEPRO_IMM16_X1_TLS_IE_HA:
2636 tls_type = GOT_UNKNOWN;
2637 if (h == NULL && local_got_offsets)
2638 tls_type =
2639 _bfd_tilepro_elf_local_got_tls_type (input_bfd) [r_symndx];
2640 else if (h != NULL)
2641 tls_type = tilepro_elf_hash_entry(h)->tls_type;
2642
1ba1f393
L
2643 is_tls_iele = (bfd_link_executable (info) || tls_type == GOT_TLS_IE);
2644 is_tls_le = is_tls_iele && (bfd_link_executable (info)
6f7be959
WL
2645 && (h == NULL || h->dynindx == -1));
2646
2647 if (r_type == R_TILEPRO_TLS_GD_CALL)
2648 {
2649 if (is_tls_le)
2650 {
2651 /* GD -> LE */
2652 tilepro_replace_insn (contents + rel->r_offset,
2653 insn_mask_X1, insn_tls_le_move_X1);
2654 continue;
2655 }
2656 else if (is_tls_iele)
2657 {
2658 /* GD -> IE */
2659 tilepro_replace_insn (contents + rel->r_offset,
2660 insn_mask_X1, insn_tls_ie_lw_X1);
2661 continue;
2662 }
2663
2664 /* GD -> GD */
2665 h = (struct elf_link_hash_entry *)
0a1b45a2
AM
2666 bfd_link_hash_lookup (info->hash, "__tls_get_addr", false,
2667 false, true);
6f7be959
WL
2668 BFD_ASSERT (h != NULL);
2669 r_type = R_TILEPRO_JOFFLONG_X1_PLT;
2670 howto = tilepro_elf_howto_table + r_type;
2671 }
2672 else if (r_type == R_TILEPRO_IMM16_X0_TLS_GD_HA
2673 || r_type == R_TILEPRO_IMM16_X0_TLS_IE_HA)
2674 {
2675 if (is_tls_le)
2676 tilepro_replace_insn (contents + rel->r_offset, srca_mask_X0,
2677 insn_tls_le_move_zero_X0X1);
2678 }
2679 else if (r_type == R_TILEPRO_IMM16_X1_TLS_GD_HA
2680 || r_type == R_TILEPRO_IMM16_X1_TLS_IE_HA)
2681 {
2682 if (is_tls_le)
2683 tilepro_replace_insn (contents + rel->r_offset, srca_mask_X1,
2684 insn_tls_le_move_zero_X0X1);
2685 }
2686 else
2687 {
2688 const bfd_byte *mask = NULL;
2689 const bfd_byte *add_insn = NULL;
2690
2691 switch (r_type)
2692 {
2693 case R_TILEPRO_IMM8_X0_TLS_GD_ADD:
2694 add_insn = is_tls_iele ? insn_tls_ie_add_X0X1
2695 : insn_tls_gd_add_X0X1;
2696 mask = insn_mask_X0_no_dest_no_srca;
2697 break;
2698 case R_TILEPRO_IMM8_X1_TLS_GD_ADD:
2699 add_insn = is_tls_iele ? insn_tls_ie_add_X0X1
2700 : insn_tls_gd_add_X0X1;
2701 mask = insn_mask_X1_no_dest_no_srca;
2702 break;
2703 case R_TILEPRO_IMM8_Y0_TLS_GD_ADD:
2704 add_insn = is_tls_iele ? insn_tls_ie_add_Y0Y1
2705 : insn_tls_gd_add_Y0Y1;
2706 mask = insn_mask_Y0_no_dest_no_srca;
2707 break;
2708 case R_TILEPRO_IMM8_Y1_TLS_GD_ADD:
2709 add_insn = is_tls_iele ? insn_tls_ie_add_Y0Y1
2710 : insn_tls_gd_add_Y0Y1;
2711 mask = insn_mask_Y1_no_dest_no_srca;
2712 break;
2713 }
2714
2715 tilepro_replace_insn (contents + rel->r_offset, mask, add_insn);
2716
2717 continue;
2718 }
2719 break;
2720 case R_TILEPRO_TLS_IE_LOAD:
1ba1f393 2721 if (bfd_link_executable (info) && (h == NULL || h->dynindx == -1))
6f7be959
WL
2722 /* IE -> LE */
2723 tilepro_replace_insn (contents + rel->r_offset,
2724 insn_mask_X1_no_dest_no_srca,
2725 insn_tls_le_move_X1);
2726 else
2727 /* IE -> IE */
2728 tilepro_replace_insn (contents + rel->r_offset,
2729 insn_mask_X1_no_dest_no_srca,
2730 insn_tls_ie_lw_X1);
2731 continue;
2732 break;
2733 default:
2734 break;
2735 }
2736
a3cd202a
L
2737 resolved_to_zero = (h != NULL
2738 && UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
2739
aa137e4d
NC
2740 switch (r_type)
2741 {
07d6d2b8
AM
2742 case R_TILEPRO_IMM16_X0_GOT:
2743 case R_TILEPRO_IMM16_X1_GOT:
2744 case R_TILEPRO_IMM16_X0_GOT_LO:
2745 case R_TILEPRO_IMM16_X1_GOT_LO:
2746 case R_TILEPRO_IMM16_X0_GOT_HI:
2747 case R_TILEPRO_IMM16_X1_GOT_HI:
2748 case R_TILEPRO_IMM16_X0_GOT_HA:
2749 case R_TILEPRO_IMM16_X1_GOT_HA:
aa137e4d
NC
2750 /* Relocation is to the entry for this symbol in the global
2751 offset table. */
f1dfbfdb 2752 if (htab->sgot == NULL)
aa137e4d
NC
2753 abort ();
2754
2755 if (h != NULL)
2756 {
0a1b45a2 2757 bool dyn;
aa137e4d
NC
2758
2759 off = h->got.offset;
2760 BFD_ASSERT (off != (bfd_vma) -1);
2761 dyn = elf_hash_table (info)->dynamic_sections_created;
2762
0e1862bb
L
2763 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
2764 bfd_link_pic (info),
2765 h)
2766 || (bfd_link_pic (info)
aa137e4d
NC
2767 && SYMBOL_REFERENCES_LOCAL (info, h)))
2768 {
2769 /* This is actually a static link, or it is a
2770 -Bsymbolic link and the symbol is defined
2771 locally, or the symbol was forced to be local
2772 because of a version file. We must initialize
2773 this entry in the global offset table. Since the
2774 offset must always be a multiple
2775 of 4 for 32-bit, we use the least significant bit
2776 to record whether we have initialized it already.
2777
2778 When doing a dynamic link, we create a .rela.got
2779 relocation entry to initialize the value. This
2780 is done in the finish_dynamic_symbol routine. */
2781 if ((off & 1) != 0)
2782 off &= ~1;
2783 else
2784 {
2785 bfd_put_32 (output_bfd, relocation,
f1dfbfdb 2786 htab->sgot->contents + off);
aa137e4d
NC
2787 h->got.offset |= 1;
2788 }
2789 }
2790 else
0a1b45a2 2791 unresolved_reloc = false;
aa137e4d
NC
2792 }
2793 else
2794 {
2795 BFD_ASSERT (local_got_offsets != NULL
2796 && local_got_offsets[r_symndx] != (bfd_vma) -1);
2797
2798 off = local_got_offsets[r_symndx];
2799
2800 /* The offset must always be a multiple of 4 on 32-bit.
07d6d2b8 2801 We use the least significant bit to record
aa137e4d
NC
2802 whether we have already processed this entry. */
2803 if ((off & 1) != 0)
2804 off &= ~1;
2805 else
2806 {
0e1862bb 2807 if (bfd_link_pic (info))
aa137e4d
NC
2808 {
2809 asection *s;
2810 Elf_Internal_Rela outrel;
2811
2812 /* We need to generate a R_TILEPRO_RELATIVE reloc
2813 for the dynamic linker. */
f1dfbfdb 2814 s = htab->srelgot;
aa137e4d
NC
2815 BFD_ASSERT (s != NULL);
2816
f1dfbfdb
L
2817 outrel.r_offset = (htab->sgot->output_section->vma
2818 + htab->sgot->output_offset
aa137e4d
NC
2819 + off);
2820 outrel.r_info = ELF32_R_INFO (0, R_TILEPRO_RELATIVE);
2821 outrel.r_addend = relocation;
2822 relocation = 0;
2823 tilepro_elf_append_rela_32 (output_bfd, s, &outrel);
2824 }
2825
2826 bfd_put_32 (output_bfd, relocation,
f1dfbfdb 2827 htab->sgot->contents + off);
aa137e4d
NC
2828 local_got_offsets[r_symndx] |= 1;
2829 }
2830 }
535127d2 2831 relocation = off - got_base;
aa137e4d
NC
2832 break;
2833
07d6d2b8 2834 case R_TILEPRO_JOFFLONG_X1_PLT:
aa137e4d
NC
2835 /* Relocation is to the entry for this symbol in the
2836 procedure linkage table. */
07d6d2b8 2837 BFD_ASSERT (h != NULL);
aa137e4d 2838
f1dfbfdb 2839 if (h->plt.offset == (bfd_vma) -1 || htab->splt == NULL)
aa137e4d
NC
2840 {
2841 /* We didn't make a PLT entry for this symbol. This
2842 happens when statically linking PIC code, or when
2843 using -Bsymbolic. */
2844 break;
2845 }
2846
f1dfbfdb
L
2847 relocation = (htab->splt->output_section->vma
2848 + htab->splt->output_offset
aa137e4d 2849 + h->plt.offset);
0a1b45a2 2850 unresolved_reloc = false;
aa137e4d
NC
2851 break;
2852
07d6d2b8
AM
2853 case R_TILEPRO_32_PCREL:
2854 case R_TILEPRO_16_PCREL:
2855 case R_TILEPRO_8_PCREL:
2856 case R_TILEPRO_IMM16_X0_PCREL:
2857 case R_TILEPRO_IMM16_X1_PCREL:
2858 case R_TILEPRO_IMM16_X0_LO_PCREL:
2859 case R_TILEPRO_IMM16_X1_LO_PCREL:
2860 case R_TILEPRO_IMM16_X0_HI_PCREL:
2861 case R_TILEPRO_IMM16_X1_HI_PCREL:
2862 case R_TILEPRO_IMM16_X0_HA_PCREL:
2863 case R_TILEPRO_IMM16_X1_HA_PCREL:
aa137e4d
NC
2864 if (h != NULL
2865 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
2866 break;
2867 /* Fall through. */
07d6d2b8
AM
2868 case R_TILEPRO_32:
2869 case R_TILEPRO_16:
2870 case R_TILEPRO_8:
2871 case R_TILEPRO_LO16:
2872 case R_TILEPRO_HI16:
2873 case R_TILEPRO_HA16:
2874 case R_TILEPRO_COPY:
2875 case R_TILEPRO_GLOB_DAT:
2876 case R_TILEPRO_JMP_SLOT:
2877 case R_TILEPRO_RELATIVE:
2878 case R_TILEPRO_BROFF_X1:
2879 case R_TILEPRO_JOFFLONG_X1:
2880 case R_TILEPRO_IMM8_X0:
2881 case R_TILEPRO_IMM8_Y0:
2882 case R_TILEPRO_IMM8_X1:
2883 case R_TILEPRO_IMM8_Y1:
2884 case R_TILEPRO_DEST_IMM8_X1:
2885 case R_TILEPRO_MT_IMM15_X1:
2886 case R_TILEPRO_MF_IMM15_X1:
2887 case R_TILEPRO_IMM16_X0:
2888 case R_TILEPRO_IMM16_X1:
2889 case R_TILEPRO_IMM16_X0_LO:
2890 case R_TILEPRO_IMM16_X1_LO:
2891 case R_TILEPRO_IMM16_X0_HI:
2892 case R_TILEPRO_IMM16_X1_HI:
2893 case R_TILEPRO_IMM16_X0_HA:
2894 case R_TILEPRO_IMM16_X1_HA:
2895 case R_TILEPRO_MMSTART_X0:
2896 case R_TILEPRO_MMEND_X0:
2897 case R_TILEPRO_MMSTART_X1:
2898 case R_TILEPRO_MMEND_X1:
2899 case R_TILEPRO_SHAMT_X0:
2900 case R_TILEPRO_SHAMT_X1:
2901 case R_TILEPRO_SHAMT_Y0:
2902 case R_TILEPRO_SHAMT_Y1:
aa137e4d
NC
2903 if ((input_section->flags & SEC_ALLOC) == 0)
2904 break;
2905
0e1862bb 2906 if ((bfd_link_pic (info)
aa137e4d 2907 && (h == NULL
a3cd202a
L
2908 || (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2909 && !resolved_to_zero)
aa137e4d
NC
2910 || h->root.type != bfd_link_hash_undefweak)
2911 && (! howto->pc_relative
2912 || !SYMBOL_CALLS_LOCAL (info, h)))
0e1862bb 2913 || (!bfd_link_pic (info)
aa137e4d
NC
2914 && h != NULL
2915 && h->dynindx != -1
2916 && !h->non_got_ref
2917 && ((h->def_dynamic
2918 && !h->def_regular)
2919 || h->root.type == bfd_link_hash_undefweak
2920 || h->root.type == bfd_link_hash_undefined)))
2921 {
2922 Elf_Internal_Rela outrel;
0a1b45a2 2923 bool skip, relocate = false;
aa137e4d
NC
2924
2925 /* When generating a shared object, these relocations
2926 are copied into the output file to be resolved at run
2927 time. */
2928
2929 BFD_ASSERT (sreloc != NULL);
2930
0a1b45a2 2931 skip = false;
aa137e4d
NC
2932
2933 outrel.r_offset =
2934 _bfd_elf_section_offset (output_bfd, info, input_section,
2935 rel->r_offset);
2936 if (outrel.r_offset == (bfd_vma) -1)
0a1b45a2 2937 skip = true;
aa137e4d 2938 else if (outrel.r_offset == (bfd_vma) -2)
0a1b45a2 2939 skip = true, relocate = true;
aa137e4d
NC
2940 outrel.r_offset += (input_section->output_section->vma
2941 + input_section->output_offset);
2942
2943 switch (r_type)
2944 {
07d6d2b8
AM
2945 case R_TILEPRO_32_PCREL:
2946 case R_TILEPRO_16_PCREL:
2947 case R_TILEPRO_8_PCREL:
aa137e4d
NC
2948 /* If the symbol is not dynamic, we should not keep
2949 a dynamic relocation. But an .rela.* slot has been
2950 allocated for it, output R_TILEPRO_NONE.
2951 FIXME: Add code tracking needed dynamic relocs as
2952 e.g. i386 has. */
2953 if (h->dynindx == -1)
0a1b45a2 2954 skip = true, relocate = true;
aa137e4d
NC
2955 break;
2956 }
2957
2958 if (skip)
2959 memset (&outrel, 0, sizeof outrel);
2960 /* h->dynindx may be -1 if the symbol was marked to
2961 become local. */
2962 else if (h != NULL &&
2963 h->dynindx != -1
2964 && (! is_plt
0e1862bb 2965 || !bfd_link_pic (info)
aa137e4d
NC
2966 || !SYMBOLIC_BIND (info, h)
2967 || !h->def_regular))
2968 {
2969 BFD_ASSERT (h->dynindx != -1);
2970 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
2971 outrel.r_addend = rel->r_addend;
2972 }
2973 else
2974 {
2975 if (r_type == R_TILEPRO_32)
2976 {
2977 outrel.r_info = ELF32_R_INFO (0, R_TILEPRO_RELATIVE);
2978 outrel.r_addend = relocation + rel->r_addend;
2979 }
2980 else
2981 {
2982 long indx;
2983
2984 outrel.r_addend = relocation + rel->r_addend;
2985
2986 if (is_plt)
f1dfbfdb 2987 sec = htab->splt;
aa137e4d
NC
2988
2989 if (bfd_is_abs_section (sec))
2990 indx = 0;
2991 else if (sec == NULL || sec->owner == NULL)
2992 {
2993 bfd_set_error (bfd_error_bad_value);
0a1b45a2 2994 return false;
aa137e4d
NC
2995 }
2996 else
2997 {
2998 asection *osec;
2999
3000 /* We are turning this relocation into one
3001 against a section symbol. It would be
3002 proper to subtract the symbol's value,
3003 osec->vma, from the emitted reloc addend,
3004 but ld.so expects buggy relocs. */
3005 osec = sec->output_section;
3006 indx = elf_section_data (osec)->dynindx;
3007
3008 if (indx == 0)
3009 {
f1dfbfdb 3010 osec = htab->text_index_section;
aa137e4d
NC
3011 indx = elf_section_data (osec)->dynindx;
3012 }
3013
3014 /* FIXME: we really should be able to link non-pic
3015 shared libraries. */
3016 if (indx == 0)
3017 {
3018 BFD_FAIL ();
4eca0228 3019 _bfd_error_handler
871b3ab2 3020 (_("%pB: probably compiled without -fPIC?"),
aa137e4d
NC
3021 input_bfd);
3022 bfd_set_error (bfd_error_bad_value);
0a1b45a2 3023 return false;
aa137e4d
NC
3024 }
3025 }
3026
3027 outrel.r_info = ELF32_R_INFO (indx, r_type);
3028 }
3029 }
3030
3031 tilepro_elf_append_rela_32 (output_bfd, sreloc, &outrel);
3032
3033 /* This reloc will be computed at runtime, so there's no
3034 need to do anything now. */
3035 if (! relocate)
3036 continue;
3037 }
3038 break;
3039
07d6d2b8
AM
3040 case R_TILEPRO_IMM16_X0_TLS_LE:
3041 case R_TILEPRO_IMM16_X1_TLS_LE:
3042 case R_TILEPRO_IMM16_X0_TLS_LE_LO:
3043 case R_TILEPRO_IMM16_X1_TLS_LE_LO:
3044 case R_TILEPRO_IMM16_X0_TLS_LE_HI:
3045 case R_TILEPRO_IMM16_X1_TLS_LE_HI:
3046 case R_TILEPRO_IMM16_X0_TLS_LE_HA:
3047 case R_TILEPRO_IMM16_X1_TLS_LE_HA:
1ba1f393 3048 if (!bfd_link_executable (info))
6f7be959
WL
3049 {
3050 Elf_Internal_Rela outrel;
0a1b45a2 3051 bool skip;
6f7be959
WL
3052
3053 BFD_ASSERT (sreloc != NULL);
0a1b45a2 3054 skip = false;
6f7be959
WL
3055 outrel.r_offset =
3056 _bfd_elf_section_offset (output_bfd, info, input_section,
3057 rel->r_offset);
3058 if (outrel.r_offset == (bfd_vma) -1)
0a1b45a2 3059 skip = true;
6f7be959 3060 else if (outrel.r_offset == (bfd_vma) -2)
0a1b45a2 3061 skip = true;
6f7be959
WL
3062 outrel.r_offset += (input_section->output_section->vma
3063 + input_section->output_offset);
3064 if (skip)
3065 memset (&outrel, 0, sizeof outrel);
3066 else
3067 {
3068 outrel.r_info = ELF32_R_INFO (0, r_type);
3069 outrel.r_addend = relocation - dtpoff_base (info)
3070 + rel->r_addend;
3071 }
3072
3073 tilepro_elf_append_rela_32 (output_bfd, sreloc, &outrel);
3074 continue;
3075 }
3076 relocation = tpoff (info, relocation);
3077 break;
3078
07d6d2b8
AM
3079 case R_TILEPRO_IMM16_X0_TLS_GD:
3080 case R_TILEPRO_IMM16_X1_TLS_GD:
3081 case R_TILEPRO_IMM16_X0_TLS_GD_LO:
3082 case R_TILEPRO_IMM16_X1_TLS_GD_LO:
3083 case R_TILEPRO_IMM16_X0_TLS_GD_HI:
3084 case R_TILEPRO_IMM16_X1_TLS_GD_HI:
3085 case R_TILEPRO_IMM16_X0_TLS_GD_HA:
3086 case R_TILEPRO_IMM16_X1_TLS_GD_HA:
3087 case R_TILEPRO_IMM16_X0_TLS_IE:
3088 case R_TILEPRO_IMM16_X1_TLS_IE:
3089 case R_TILEPRO_IMM16_X0_TLS_IE_LO:
3090 case R_TILEPRO_IMM16_X1_TLS_IE_LO:
3091 case R_TILEPRO_IMM16_X0_TLS_IE_HI:
3092 case R_TILEPRO_IMM16_X1_TLS_IE_HI:
3093 case R_TILEPRO_IMM16_X0_TLS_IE_HA:
3094 case R_TILEPRO_IMM16_X1_TLS_IE_HA:
6f7be959 3095 r_type = tilepro_elf_tls_transition (info, r_type, h == NULL);
07d6d2b8 3096 tls_type = GOT_UNKNOWN;
aa137e4d
NC
3097 if (h == NULL && local_got_offsets)
3098 tls_type
3099 = _bfd_tilepro_elf_local_got_tls_type (input_bfd) [r_symndx];
3100 else if (h != NULL)
3101 {
3102 tls_type = tilepro_elf_hash_entry(h)->tls_type;
1ba1f393
L
3103 if (bfd_link_executable (info)
3104 && h->dynindx == -1
3105 && tls_type == GOT_TLS_IE)
6f7be959 3106 r_type = tilepro_tls_translate_to_le (r_type);
aa137e4d
NC
3107 }
3108 if (tls_type == GOT_TLS_IE)
6f7be959
WL
3109 r_type = tilepro_tls_translate_to_ie (r_type);
3110
3111 if (r_type == R_TILEPRO_IMM16_X0_TLS_LE
3112 || r_type == R_TILEPRO_IMM16_X1_TLS_LE
3113 || r_type == R_TILEPRO_IMM16_X0_TLS_LE_LO
3114 || r_type == R_TILEPRO_IMM16_X1_TLS_LE_LO
3115 || r_type == R_TILEPRO_IMM16_X0_TLS_LE_HI
3116 || r_type == R_TILEPRO_IMM16_X1_TLS_LE_HI
3117 || r_type == R_TILEPRO_IMM16_X0_TLS_LE_HA
3118 || r_type == R_TILEPRO_IMM16_X1_TLS_LE_HA)
3119 {
3120 relocation = tpoff (info, relocation);
3121 break;
3122 }
aa137e4d
NC
3123
3124 if (h != NULL)
3125 {
3126 off = h->got.offset;
3127 h->got.offset |= 1;
3128 }
3129 else
3130 {
3131 BFD_ASSERT (local_got_offsets != NULL);
3132 off = local_got_offsets[r_symndx];
3133 local_got_offsets[r_symndx] |= 1;
3134 }
3135
f1dfbfdb 3136 if (htab->sgot == NULL)
aa137e4d
NC
3137 abort ();
3138
3139 if ((off & 1) != 0)
3140 off &= ~1;
3141 else
3142 {
3143 Elf_Internal_Rela outrel;
3144 int indx = 0;
0a1b45a2 3145 bool need_relocs = false;
aa137e4d 3146
f1dfbfdb 3147 if (htab->srelgot == NULL)
aa137e4d
NC
3148 abort ();
3149
3150 if (h != NULL)
3151 {
0a1b45a2 3152 bool dyn;
f1dfbfdb 3153 dyn = htab->dynamic_sections_created;
aa137e4d 3154
0e1862bb
L
3155 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
3156 bfd_link_pic (info),
3157 h)
3158 && (!bfd_link_pic (info)
aa137e4d
NC
3159 || !SYMBOL_REFERENCES_LOCAL (info, h)))
3160 {
3161 indx = h->dynindx;
3162 }
3163 }
3164
3165 /* The GOT entries have not been initialized yet. Do it
07d6d2b8 3166 now, and emit any relocations. */
0e1862bb 3167 if ((bfd_link_pic (info) || indx != 0)
aa137e4d
NC
3168 && (h == NULL
3169 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
3170 || h->root.type != bfd_link_hash_undefweak))
0a1b45a2 3171 need_relocs = true;
aa137e4d 3172
07d6d2b8
AM
3173 switch (r_type)
3174 {
3175 case R_TILEPRO_IMM16_X0_TLS_IE:
3176 case R_TILEPRO_IMM16_X1_TLS_IE:
3177 case R_TILEPRO_IMM16_X0_TLS_IE_LO:
3178 case R_TILEPRO_IMM16_X1_TLS_IE_LO:
3179 case R_TILEPRO_IMM16_X0_TLS_IE_HI:
3180 case R_TILEPRO_IMM16_X1_TLS_IE_HI:
3181 case R_TILEPRO_IMM16_X0_TLS_IE_HA:
3182 case R_TILEPRO_IMM16_X1_TLS_IE_HA:
aa137e4d 3183 if (need_relocs) {
f1dfbfdb
L
3184 bfd_put_32 (output_bfd, 0, htab->sgot->contents + off);
3185 outrel.r_offset = (htab->sgot->output_section->vma
3186 + htab->sgot->output_offset + off);
07d6d2b8 3187 outrel.r_addend = 0;
aa137e4d 3188 if (indx == 0)
07d6d2b8 3189 outrel.r_addend = relocation - dtpoff_base (info);
aa137e4d 3190 outrel.r_info = ELF32_R_INFO (indx, R_TILEPRO_TLS_TPOFF32);
f1dfbfdb 3191 tilepro_elf_append_rela_32 (output_bfd, htab->srelgot,
aa137e4d 3192 &outrel);
07d6d2b8 3193 } else {
aa137e4d 3194 bfd_put_32 (output_bfd, tpoff (info, relocation),
f1dfbfdb 3195 htab->sgot->contents + off);
07d6d2b8
AM
3196 }
3197 break;
aa137e4d
NC
3198
3199 case R_TILEPRO_IMM16_X0_TLS_GD:
3200 case R_TILEPRO_IMM16_X1_TLS_GD:
3201 case R_TILEPRO_IMM16_X0_TLS_GD_LO:
3202 case R_TILEPRO_IMM16_X1_TLS_GD_LO:
3203 case R_TILEPRO_IMM16_X0_TLS_GD_HI:
3204 case R_TILEPRO_IMM16_X1_TLS_GD_HI:
3205 case R_TILEPRO_IMM16_X0_TLS_GD_HA:
3206 case R_TILEPRO_IMM16_X1_TLS_GD_HA:
3207 if (need_relocs) {
f1dfbfdb
L
3208 outrel.r_offset = (htab->sgot->output_section->vma
3209 + htab->sgot->output_offset + off);
07d6d2b8
AM
3210 outrel.r_addend = 0;
3211 outrel.r_info = ELF32_R_INFO (indx, R_TILEPRO_TLS_DTPMOD32);
f1dfbfdb
L
3212 bfd_put_32 (output_bfd, 0, htab->sgot->contents + off);
3213 tilepro_elf_append_rela_32 (output_bfd, htab->srelgot,
aa137e4d
NC
3214 &outrel);
3215 if (indx == 0)
07d6d2b8
AM
3216 {
3217 BFD_ASSERT (! unresolved_reloc);
3218 bfd_put_32 (output_bfd,
aa137e4d 3219 relocation - dtpoff_base (info),
f1dfbfdb 3220 (htab->sgot->contents + off +
aa137e4d 3221 TILEPRO_BYTES_PER_WORD));
07d6d2b8 3222 }
aa137e4d 3223 else
07d6d2b8
AM
3224 {
3225 bfd_put_32 (output_bfd, 0,
f1dfbfdb 3226 (htab->sgot->contents + off +
aa137e4d 3227 TILEPRO_BYTES_PER_WORD));
07d6d2b8 3228 outrel.r_info = ELF32_R_INFO (indx,
aa137e4d
NC
3229 R_TILEPRO_TLS_DTPOFF32);
3230 outrel.r_offset += TILEPRO_BYTES_PER_WORD;
07d6d2b8 3231 tilepro_elf_append_rela_32 (output_bfd,
f1dfbfdb 3232 htab->srelgot, &outrel);
07d6d2b8
AM
3233 }
3234 }
aa137e4d
NC
3235
3236 else {
3237 /* If we are not emitting relocations for a
07d6d2b8
AM
3238 general dynamic reference, then we must be in a
3239 static link or an executable link with the
3240 symbol binding locally. Mark it as belonging
3241 to module 1, the executable. */
aa137e4d 3242 bfd_put_32 (output_bfd, 1,
f1dfbfdb 3243 htab->sgot->contents + off );
aa137e4d 3244 bfd_put_32 (output_bfd, relocation - dtpoff_base (info),
f1dfbfdb 3245 htab->sgot->contents + off +
aa137e4d
NC
3246 TILEPRO_BYTES_PER_WORD);
3247 }
07d6d2b8
AM
3248 break;
3249 }
aa137e4d
NC
3250 }
3251
3252 if (off >= (bfd_vma) -2)
3253 abort ();
3254
535127d2 3255 relocation = off - got_base;
0a1b45a2 3256 unresolved_reloc = false;
aa137e4d
NC
3257 howto = tilepro_elf_howto_table + r_type;
3258 break;
3259
3260 default:
3261 break;
3262 }
3263
3264 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
3265 because such sections are not SEC_ALLOC and thus ld.so will
3266 not process them. */
3267 if (unresolved_reloc
3268 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
3269 && h->def_dynamic)
3270 && _bfd_elf_section_offset (output_bfd, info, input_section,
3271 rel->r_offset) != (bfd_vma) -1)
4eca0228 3272 _bfd_error_handler
695344c0 3273 /* xgettext:c-format */
2dcf00ce
AM
3274 (_("%pB(%pA+%#" PRIx64 "): "
3275 "unresolvable %s relocation against symbol `%s'"),
aa137e4d
NC
3276 input_bfd,
3277 input_section,
2dcf00ce 3278 (uint64_t) rel->r_offset,
aa137e4d
NC
3279 howto->name,
3280 h->root.root.string);
3281
3282 r = bfd_reloc_continue;
3283
3284 /* For the _HA types, we add 0x8000 so that if bit 15 is set,
3285 * we will increment bit 16. The howto->rightshift takes care
3286 * of the rest for us. */
3287 switch (r_type)
3288 {
3289 case R_TILEPRO_HA16:
3290 case R_TILEPRO_IMM16_X0_HA:
3291 case R_TILEPRO_IMM16_X1_HA:
3292 case R_TILEPRO_IMM16_X0_HA_PCREL:
3293 case R_TILEPRO_IMM16_X1_HA_PCREL:
3294 case R_TILEPRO_IMM16_X0_GOT_HA:
3295 case R_TILEPRO_IMM16_X1_GOT_HA:
3296 case R_TILEPRO_IMM16_X0_TLS_GD_HA:
3297 case R_TILEPRO_IMM16_X1_TLS_GD_HA:
3298 case R_TILEPRO_IMM16_X0_TLS_IE_HA:
3299 case R_TILEPRO_IMM16_X1_TLS_IE_HA:
07d6d2b8
AM
3300 relocation += 0x8000;
3301 break;
aa137e4d
NC
3302 }
3303
3304 /* Get the operand creation function, if any. */
3305 create_func = reloc_to_create_func[r_type];
3306 if (create_func == NULL)
3307 {
07d6d2b8
AM
3308 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3309 contents, rel->r_offset,
3310 relocation, rel->r_addend);
aa137e4d
NC
3311 }
3312 else
3313 {
07d6d2b8
AM
3314 if (howto->pc_relative)
3315 {
3316 relocation -=
3317 input_section->output_section->vma + input_section->output_offset;
3318 if (howto->pcrel_offset)
3319 relocation -= rel->r_offset;
3320 }
3321
3322 bfd_byte *data;
3323
3324 /* Add the relocation addend if any to the final target value */
3325 relocation += rel->r_addend;
3326
3327 /* Do basic range checking */
3328 r = bfd_check_overflow (howto->complain_on_overflow,
3329 howto->bitsize,
3330 howto->rightshift,
3331 32,
3332 relocation);
3333
3334 /*
3335 * Write the relocated value out into the raw section data.
3336 * Don't put a relocation out in the .rela section.
3337 */
3338 tilepro_bundle_bits mask = create_func(-1);
3339 tilepro_bundle_bits value = create_func(relocation >> howto->rightshift);
3340
3341 /* Only touch bytes while the mask is not 0, so we
3342 don't write to out of bounds memory if this is actually
3343 a 16-bit switch instruction. */
3344 for (data = contents + rel->r_offset; mask != 0; data++)
3345 {
3346 bfd_byte byte_mask = (bfd_byte)mask;
3347 *data = (*data & ~byte_mask) | ((bfd_byte)value & byte_mask);
3348 mask >>= 8;
3349 value >>= 8;
3350 }
aa137e4d
NC
3351 }
3352
3353 if (r != bfd_reloc_ok)
3354 {
3355 const char *msg = NULL;
3356
3357 switch (r)
3358 {
3359 case bfd_reloc_overflow:
1a72702b 3360 (*info->callbacks->reloc_overflow)
aa137e4d
NC
3361 (info, (h ? &h->root : NULL), name, howto->name,
3362 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
3363 break;
3364
3365 case bfd_reloc_undefined:
1a72702b 3366 (*info->callbacks->undefined_symbol)
0a1b45a2 3367 (info, name, input_bfd, input_section, rel->r_offset, true);
aa137e4d
NC
3368 break;
3369
3370 case bfd_reloc_outofrange:
3371 msg = _("internal error: out of range error");
3372 break;
3373
3374 case bfd_reloc_notsupported:
3375 msg = _("internal error: unsupported relocation error");
3376 break;
3377
3378 case bfd_reloc_dangerous:
3379 msg = _("internal error: dangerous relocation");
3380 break;
3381
3382 default:
3383 msg = _("internal error: unknown error");
3384 break;
3385 }
3386
3387 if (msg)
1a72702b
AM
3388 (*info->callbacks->warning) (info, msg, name, input_bfd,
3389 input_section, rel->r_offset);
aa137e4d
NC
3390 }
3391 }
3392
0a1b45a2 3393 return true;
aa137e4d
NC
3394}
3395
3396/* Finish up dynamic symbol handling. We set the contents of various
3397 dynamic sections here. */
3398
0a1b45a2 3399static bool
aa137e4d
NC
3400tilepro_elf_finish_dynamic_symbol (bfd *output_bfd,
3401 struct bfd_link_info *info,
3402 struct elf_link_hash_entry *h,
3403 Elf_Internal_Sym *sym)
3404{
f1dfbfdb 3405 struct elf_link_hash_table *htab;
aa137e4d
NC
3406
3407 htab = tilepro_elf_hash_table (info);
3408 BFD_ASSERT (htab != NULL);
3409
3410 if (h->plt.offset != (bfd_vma) -1)
3411 {
3412 asection *splt;
3413 asection *srela;
3414 asection *sgotplt;
3415 Elf_Internal_Rela rela;
3416 bfd_byte *loc;
3417 bfd_vma r_offset;
3418
3419 int rela_index;
3420
3421 /* This symbol has an entry in the PLT. Set it up. */
3422
3423 BFD_ASSERT (h->dynindx != -1);
3424
f1dfbfdb
L
3425 splt = htab->splt;
3426 srela = htab->srelplt;
3427 sgotplt = htab->sgotplt;
aa137e4d
NC
3428
3429 if (splt == NULL || srela == NULL)
3430 abort ();
3431
3432 /* Fill in the entry in the procedure linkage table. */
3433 rela_index = tilepro_plt_entry_build (splt, sgotplt, h->plt.offset,
3434 &r_offset);
3435
3436 /* Fill in the entry in the global offset table, which initially points
3437 to the beginning of the plt. */
3438 bfd_put_32 (output_bfd, splt->output_section->vma + splt->output_offset,
3439 sgotplt->contents + r_offset);
3440
3441 /* Fill in the entry in the .rela.plt section. */
3442 rela.r_offset = (sgotplt->output_section->vma
3443 + sgotplt->output_offset
3444 + r_offset);
3445 rela.r_addend = 0;
3446 rela.r_info = ELF32_R_INFO (h->dynindx, R_TILEPRO_JMP_SLOT);
3447
3448 loc = srela->contents + rela_index * sizeof (Elf32_External_Rela);
3449 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3450
3451 if (!h->def_regular)
3452 {
3453 /* Mark the symbol as undefined, rather than as defined in
3454 the .plt section. Leave the value alone. */
3455 sym->st_shndx = SHN_UNDEF;
3456 /* If the symbol is weak, we do need to clear the value.
3457 Otherwise, the PLT entry would provide a definition for
3458 the symbol even if the symbol wasn't defined anywhere,
3459 and so the symbol would never be NULL. */
3460 if (!h->ref_regular_nonweak)
3461 sym->st_value = 0;
3462 }
3463 }
3464
3465 if (h->got.offset != (bfd_vma) -1
3466 && tilepro_elf_hash_entry(h)->tls_type != GOT_TLS_GD
3467 && tilepro_elf_hash_entry(h)->tls_type != GOT_TLS_IE)
3468 {
3469 asection *sgot;
3470 asection *srela;
3471 Elf_Internal_Rela rela;
3472
3473 /* This symbol has an entry in the GOT. Set it up. */
3474
f1dfbfdb
L
3475 sgot = htab->sgot;
3476 srela = htab->srelgot;
aa137e4d
NC
3477 BFD_ASSERT (sgot != NULL && srela != NULL);
3478
3479 rela.r_offset = (sgot->output_section->vma
3480 + sgot->output_offset
3481 + (h->got.offset &~ (bfd_vma) 1));
3482
3483 /* If this is a -Bsymbolic link, and the symbol is defined
3484 locally, we just want to emit a RELATIVE reloc. Likewise if
3485 the symbol was forced to be local because of a version file.
3486 The entry in the global offset table will already have been
3487 initialized in the relocate_section function. */
0e1862bb 3488 if (bfd_link_pic (info)
aa137e4d
NC
3489 && (info->symbolic || h->dynindx == -1)
3490 && h->def_regular)
3491 {
3492 asection *sec = h->root.u.def.section;
3493 rela.r_info = ELF32_R_INFO (0, R_TILEPRO_RELATIVE);
3494 rela.r_addend = (h->root.u.def.value
3495 + sec->output_section->vma
3496 + sec->output_offset);
3497 }
3498 else
3499 {
3500 rela.r_info = ELF32_R_INFO (h->dynindx, R_TILEPRO_GLOB_DAT);
3501 rela.r_addend = 0;
3502 }
3503
3504 bfd_put_32 (output_bfd, 0,
3505 sgot->contents + (h->got.offset & ~(bfd_vma) 1));
3506 tilepro_elf_append_rela_32 (output_bfd, srela, &rela);
3507 }
3508
3509 if (h->needs_copy)
3510 {
3511 asection *s;
3512 Elf_Internal_Rela rela;
3513
3514 /* This symbols needs a copy reloc. Set it up. */
3515 BFD_ASSERT (h->dynindx != -1);
3516
aa137e4d
NC
3517 rela.r_offset = (h->root.u.def.value
3518 + h->root.u.def.section->output_section->vma
3519 + h->root.u.def.section->output_offset);
3520 rela.r_info = ELF32_R_INFO (h->dynindx, R_TILEPRO_COPY);
3521 rela.r_addend = 0;
f1dfbfdb
L
3522 if (h->root.u.def.section == htab->sdynrelro)
3523 s = htab->sreldynrelro;
5474d94f 3524 else
f1dfbfdb 3525 s = htab->srelbss;
aa137e4d
NC
3526 tilepro_elf_append_rela_32 (output_bfd, s, &rela);
3527 }
3528
3529 /* Mark some specially defined symbols as absolute. */
f1dfbfdb
L
3530 if (h == htab->hdynamic
3531 || (h == htab->hgot || h == htab->hplt))
aa137e4d
NC
3532 sym->st_shndx = SHN_ABS;
3533
0a1b45a2 3534 return true;
aa137e4d
NC
3535}
3536
3537/* Finish up the dynamic sections. */
3538
0a1b45a2 3539static bool
aa137e4d
NC
3540tilepro_finish_dyn (bfd *output_bfd, struct bfd_link_info *info,
3541 bfd *dynobj, asection *sdyn,
3542 asection *splt ATTRIBUTE_UNUSED)
3543{
3544 Elf32_External_Dyn *dyncon, *dynconend;
f1dfbfdb 3545 struct elf_link_hash_table *htab;
aa137e4d
NC
3546
3547 htab = tilepro_elf_hash_table (info);
3548 BFD_ASSERT (htab != NULL);
3549 dyncon = (Elf32_External_Dyn *) sdyn->contents;
3550 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
3551 for (; dyncon < dynconend; dyncon++)
3552 {
3553 Elf_Internal_Dyn dyn;
3554 asection *s;
3555
3556 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
3557
3558 switch (dyn.d_tag)
3559 {
3560 case DT_PLTGOT:
f1dfbfdb 3561 s = htab->sgotplt;
aa137e4d
NC
3562 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3563 break;
3564 case DT_JMPREL:
f1dfbfdb 3565 s = htab->srelplt;
aa137e4d
NC
3566 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3567 break;
3568 case DT_PLTRELSZ:
f1dfbfdb 3569 s = htab->srelplt;
aa137e4d
NC
3570 dyn.d_un.d_val = s->size;
3571 break;
3572 default:
3573 continue;
3574 }
3575
3576 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
3577 }
0a1b45a2 3578 return true;
aa137e4d
NC
3579}
3580
0a1b45a2 3581static bool
aa137e4d 3582tilepro_elf_finish_dynamic_sections (bfd *output_bfd,
07d6d2b8 3583 struct bfd_link_info *info)
aa137e4d
NC
3584{
3585 bfd *dynobj;
3586 asection *sdyn;
f1dfbfdb 3587 struct elf_link_hash_table *htab;
aa137e4d
NC
3588
3589 htab = tilepro_elf_hash_table (info);
3590 BFD_ASSERT (htab != NULL);
f1dfbfdb 3591 dynobj = htab->dynobj;
aa137e4d 3592
3d4d4302 3593 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
aa137e4d
NC
3594
3595 if (elf_hash_table (info)->dynamic_sections_created)
3596 {
3597 asection *splt;
0a1b45a2 3598 bool ret;
aa137e4d 3599
f1dfbfdb 3600 splt = htab->splt;
aa137e4d
NC
3601 BFD_ASSERT (splt != NULL && sdyn != NULL);
3602
3603 ret = tilepro_finish_dyn (output_bfd, info, dynobj, sdyn, splt);
3604
535b785f 3605 if (!ret)
aa137e4d
NC
3606 return ret;
3607
3608 /* Fill in the first entry in the procedure linkage table. */
3609 if (splt->size > 0)
663b5850
WL
3610 {
3611 memcpy (splt->contents, tilepro_plt0_entry, PLT_HEADER_SIZE);
3612 memset (splt->contents + PLT_HEADER_SIZE, 0,
3613 PLT_ENTRY_SIZE - PLT_HEADER_SIZE);
3614 }
aa137e4d 3615
387f8054
MR
3616 if (elf_section_data (splt->output_section) != NULL)
3617 elf_section_data (splt->output_section)->this_hdr.sh_entsize
3618 = PLT_ENTRY_SIZE;
aa137e4d
NC
3619 }
3620
f1dfbfdb 3621 if (htab->sgotplt)
aa137e4d 3622 {
f1dfbfdb 3623 if (bfd_is_abs_section (htab->sgotplt->output_section))
aa137e4d 3624 {
4eca0228 3625 _bfd_error_handler
f1dfbfdb 3626 (_("discarded output section: `%pA'"), htab->sgotplt);
0a1b45a2 3627 return false;
aa137e4d
NC
3628 }
3629
f1dfbfdb 3630 if (htab->sgotplt->size > 0)
aa137e4d
NC
3631 {
3632 /* Write the first two entries in .got.plt, needed for the dynamic
3633 linker. */
3634 bfd_put_32 (output_bfd, (bfd_vma) -1,
f1dfbfdb 3635 htab->sgotplt->contents);
aa137e4d 3636 bfd_put_32 (output_bfd, (bfd_vma) 0,
f1dfbfdb 3637 htab->sgotplt->contents + GOT_ENTRY_SIZE);
aa137e4d
NC
3638 }
3639
f1dfbfdb 3640 elf_section_data (htab->sgotplt->output_section)->this_hdr.sh_entsize
aa137e4d
NC
3641 = GOT_ENTRY_SIZE;
3642 }
3643
f1dfbfdb 3644 if (htab->sgot)
aa137e4d 3645 {
f1dfbfdb 3646 if (htab->sgot->size > 0)
aa137e4d
NC
3647 {
3648 /* Set the first entry in the global offset table to the address of
3649 the dynamic section. */
3650 bfd_vma val = (sdyn ?
3651 sdyn->output_section->vma + sdyn->output_offset :
3652 0);
f1dfbfdb 3653 bfd_put_32 (output_bfd, val, htab->sgot->contents);
aa137e4d
NC
3654 }
3655
f1dfbfdb 3656 elf_section_data (htab->sgot->output_section)->this_hdr.sh_entsize
aa137e4d
NC
3657 = GOT_ENTRY_SIZE;
3658 }
3659
0a1b45a2 3660 return true;
aa137e4d
NC
3661}
3662
3663\f
3664
3665/* Return address for Ith PLT stub in section PLT, for relocation REL
3666 or (bfd_vma) -1 if it should not be included. */
3667
3668static bfd_vma
3669tilepro_elf_plt_sym_val (bfd_vma i, const asection *plt,
07d6d2b8 3670 const arelent *rel ATTRIBUTE_UNUSED)
aa137e4d 3671{
663b5850 3672 return plt->vma + (i + 1) * PLT_ENTRY_SIZE;
aa137e4d
NC
3673}
3674
3675static enum elf_reloc_type_class
7e612e98
AM
3676tilepro_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
3677 const asection *rel_sec ATTRIBUTE_UNUSED,
3678 const Elf_Internal_Rela *rela)
aa137e4d
NC
3679{
3680 switch ((int) ELF32_R_TYPE (rela->r_info))
3681 {
3682 case R_TILEPRO_RELATIVE:
3683 return reloc_class_relative;
3684 case R_TILEPRO_JMP_SLOT:
3685 return reloc_class_plt;
3686 case R_TILEPRO_COPY:
3687 return reloc_class_copy;
3688 default:
3689 return reloc_class_normal;
3690 }
3691}
3692
3693static int
3694tilepro_additional_program_headers (bfd *abfd,
07d6d2b8 3695 struct bfd_link_info *info ATTRIBUTE_UNUSED)
aa137e4d
NC
3696{
3697 /* Each .intrpt section specified by the user adds another PT_LOAD
3698 header since the sections are discontiguous. */
3699 static const char intrpt_sections[4][9] =
3700 {
3701 ".intrpt0", ".intrpt1", ".intrpt2", ".intrpt3"
3702 };
3703 int count = 0;
3704 int i;
3705
3706 for (i = 0; i < 4; i++)
3707 {
3708 asection *sec = bfd_get_section_by_name (abfd, intrpt_sections[i]);
3709 if (sec != NULL && (sec->flags & SEC_LOAD) != 0)
3710 ++count;
3711 }
3712
3713 /* Add four "padding" headers in to leave room in case a custom linker
3714 script does something fancy. Otherwise ld complains that it ran
3715 out of program headers and refuses to link. */
3716 count += 4;
3717
3718 return count;
3719}
3720
3721#define ELF_ARCH bfd_arch_tilepro
3722#define ELF_TARGET_ID TILEPRO_ELF_DATA
3723#define ELF_MACHINE_CODE EM_TILEPRO
3724#define ELF_MAXPAGESIZE 0x10000
3725#define ELF_COMMONPAGESIZE 0x10000
3726
6d00b590 3727#define TARGET_LITTLE_SYM tilepro_elf32_vec
aa137e4d
NC
3728#define TARGET_LITTLE_NAME "elf32-tilepro"
3729
3730#define elf_backend_reloc_type_class tilepro_reloc_type_class
3731
07d6d2b8 3732#define bfd_elf32_bfd_reloc_name_lookup tilepro_reloc_name_lookup
aa137e4d
NC
3733#define bfd_elf32_bfd_link_hash_table_create tilepro_elf_link_hash_table_create
3734#define bfd_elf32_bfd_reloc_type_lookup tilepro_reloc_type_lookup
3735
3736#define elf_backend_copy_indirect_symbol tilepro_elf_copy_indirect_symbol
3737#define elf_backend_create_dynamic_sections tilepro_elf_create_dynamic_sections
3738#define elf_backend_check_relocs tilepro_elf_check_relocs
3739#define elf_backend_adjust_dynamic_symbol tilepro_elf_adjust_dynamic_symbol
3740#define elf_backend_omit_section_dynsym tilepro_elf_omit_section_dynsym
af969b14 3741#define elf_backend_late_size_sections tilepro_elf_late_size_sections
aa137e4d
NC
3742#define elf_backend_relocate_section tilepro_elf_relocate_section
3743#define elf_backend_finish_dynamic_symbol tilepro_elf_finish_dynamic_symbol
3744#define elf_backend_finish_dynamic_sections tilepro_elf_finish_dynamic_sections
3745#define elf_backend_gc_mark_hook tilepro_elf_gc_mark_hook
aa137e4d 3746#define elf_backend_plt_sym_val tilepro_elf_plt_sym_val
07d6d2b8
AM
3747#define elf_info_to_howto_rel NULL
3748#define elf_info_to_howto tilepro_info_to_howto_rela
3749#define elf_backend_grok_prstatus tilepro_elf_grok_prstatus
3750#define elf_backend_grok_psinfo tilepro_elf_grok_psinfo
aa137e4d
NC
3751#define elf_backend_additional_program_headers tilepro_additional_program_headers
3752
a412bee5
MR
3753#define bfd_elf32_mkobject tilepro_elf_mkobject
3754
aa137e4d
NC
3755#define elf_backend_init_index_section _bfd_elf_init_1_index_section
3756
3757#define elf_backend_can_gc_sections 1
3758#define elf_backend_can_refcount 1
3759#define elf_backend_want_got_plt 1
3760#define elf_backend_plt_readonly 1
3761/* Align PLT mod 64 byte L2 line size. */
3762#define elf_backend_plt_alignment 6
3763#define elf_backend_want_plt_sym 1
3764#define elf_backend_got_header_size GOT_ENTRY_SIZE
5474d94f 3765#define elf_backend_want_dynrelro 1
aa137e4d
NC
3766#define elf_backend_rela_normal 1
3767#define elf_backend_default_execstack 0
3768
3769#include "elf32-target.h"