]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blob - bfd/elf32-sh.c
* elf32-sh.c (sh_elf_create_dynamic_sections): Return if dynamic
[thirdparty/binutils-gdb.git] / bfd / elf32-sh.c
1 /* Renesas / SuperH SH specific support for 32-bit ELF
2 Copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003
3 Free Software Foundation, Inc.
4 Contributed by Ian Lance Taylor, Cygnus Support.
5
6 This file is part of BFD, the Binary File Descriptor library.
7
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
12
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
21
22 #include "bfd.h"
23 #include "sysdep.h"
24 #include "bfdlink.h"
25 #include "libbfd.h"
26 #include "elf-bfd.h"
27 #include "elf/sh.h"
28
29 static bfd_reloc_status_type sh_elf_reloc
30 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
31 static bfd_reloc_status_type sh_elf_ignore_reloc
32 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
33 static reloc_howto_type *sh_elf_reloc_type_lookup
34 PARAMS ((bfd *, bfd_reloc_code_real_type));
35 static void sh_elf_info_to_howto
36 PARAMS ((bfd *, arelent *, Elf_Internal_Rela *));
37 static bfd_boolean sh_elf_set_private_flags
38 PARAMS ((bfd *, flagword));
39 static bfd_boolean sh_elf_copy_private_data
40 PARAMS ((bfd *, bfd *));
41 static bfd_boolean sh_elf_merge_private_data
42 PARAMS ((bfd *, bfd *));
43 static bfd_boolean sh_elf_set_mach_from_flags
44 PARAMS ((bfd *));
45 static bfd_boolean sh_elf_relax_section
46 PARAMS ((bfd *, asection *, struct bfd_link_info *, bfd_boolean *));
47 static bfd_boolean sh_elf_relax_delete_bytes
48 PARAMS ((bfd *, asection *, bfd_vma, int));
49 static bfd_boolean sh_elf_align_loads
50 PARAMS ((bfd *, asection *, Elf_Internal_Rela *, bfd_byte *, bfd_boolean *));
51 static bfd_boolean sh_elf_swap_insns
52 PARAMS ((bfd *, asection *, PTR, bfd_byte *, bfd_vma));
53 static bfd_boolean sh_elf_relocate_section
54 PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *, bfd_byte *,
55 Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
56 static bfd_byte *sh_elf_get_relocated_section_contents
57 PARAMS ((bfd *, struct bfd_link_info *, struct bfd_link_order *,
58 bfd_byte *, bfd_boolean, asymbol **));
59 static void sh_elf_copy_indirect_symbol
60 PARAMS ((struct elf_backend_data *, struct elf_link_hash_entry *,
61 struct elf_link_hash_entry *));
62 static int sh_elf_optimized_tls_reloc
63 PARAMS ((struct bfd_link_info *, int, int));
64 static bfd_boolean sh_elf_mkobject
65 PARAMS ((bfd *));
66 static bfd_boolean sh_elf_object_p
67 PARAMS ((bfd *));
68 static bfd_boolean sh_elf_check_relocs
69 PARAMS ((bfd *, struct bfd_link_info *, asection *,
70 const Elf_Internal_Rela *));
71 static struct bfd_hash_entry *sh_elf_link_hash_newfunc
72 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
73 static struct bfd_link_hash_table *sh_elf_link_hash_table_create
74 PARAMS ((bfd *));
75 static bfd_boolean sh_elf_adjust_dynamic_symbol
76 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
77 static bfd_boolean sh_elf_size_dynamic_sections
78 PARAMS ((bfd *, struct bfd_link_info *));
79 static bfd_boolean sh_elf_finish_dynamic_symbol
80 PARAMS ((bfd *, struct bfd_link_info *, struct elf_link_hash_entry *,
81 Elf_Internal_Sym *));
82 static bfd_boolean sh_elf_finish_dynamic_sections
83 PARAMS ((bfd *, struct bfd_link_info *));
84 static bfd_reloc_status_type sh_elf_reloc_loop
85 PARAMS ((int, bfd *, asection *, bfd_byte *, bfd_vma, asection *,
86 bfd_vma, bfd_vma));
87 static bfd_boolean create_got_section
88 PARAMS ((bfd *, struct bfd_link_info *));
89 static bfd_boolean sh_elf_create_dynamic_sections
90 PARAMS ((bfd *, struct bfd_link_info *));
91 static bfd_vma dtpoff_base
92 PARAMS ((struct bfd_link_info *));
93 static bfd_vma tpoff
94 PARAMS ((struct bfd_link_info *, bfd_vma));
95 static asection * sh_elf_gc_mark_hook
96 PARAMS ((asection *, struct bfd_link_info *, Elf_Internal_Rela *,
97 struct elf_link_hash_entry *, Elf_Internal_Sym *));
98 static bfd_boolean sh_elf_gc_sweep_hook
99 PARAMS ((bfd *, struct bfd_link_info *, asection *,
100 const Elf_Internal_Rela *));
101 static bfd_boolean allocate_dynrelocs
102 PARAMS ((struct elf_link_hash_entry *, PTR));
103 static bfd_boolean readonly_dynrelocs
104 PARAMS ((struct elf_link_hash_entry *, PTR));
105 static enum elf_reloc_type_class sh_elf_reloc_type_class
106 PARAMS ((const Elf_Internal_Rela *));
107 #ifdef INCLUDE_SHMEDIA
108 inline static void movi_shori_putval PARAMS ((bfd *, unsigned long, char *));
109 #endif
110 static bfd_boolean elf32_shlin_grok_prstatus
111 PARAMS ((bfd *abfd, Elf_Internal_Note *note));
112 static bfd_boolean elf32_shlin_grok_psinfo
113 PARAMS ((bfd *abfd, Elf_Internal_Note *note));
114
115 /* The name of the dynamic interpreter. This is put in the .interp
116 section. */
117
118 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/libc.so.1"
119
120 static reloc_howto_type sh_elf_howto_table[] =
121 {
122 /* No relocation. */
123 HOWTO (R_SH_NONE, /* type */
124 0, /* rightshift */
125 0, /* size (0 = byte, 1 = short, 2 = long) */
126 0, /* bitsize */
127 FALSE, /* pc_relative */
128 0, /* bitpos */
129 complain_overflow_dont, /* complain_on_overflow */
130 sh_elf_ignore_reloc, /* special_function */
131 "R_SH_NONE", /* name */
132 FALSE, /* partial_inplace */
133 0, /* src_mask */
134 0, /* dst_mask */
135 FALSE), /* pcrel_offset */
136
137 /* 32 bit absolute relocation. Setting partial_inplace to TRUE and
138 src_mask to a non-zero value is similar to the COFF toolchain. */
139 HOWTO (R_SH_DIR32, /* type */
140 0, /* rightshift */
141 2, /* size (0 = byte, 1 = short, 2 = long) */
142 32, /* bitsize */
143 FALSE, /* pc_relative */
144 0, /* bitpos */
145 complain_overflow_bitfield, /* complain_on_overflow */
146 sh_elf_reloc, /* special_function */
147 "R_SH_DIR32", /* name */
148 TRUE, /* partial_inplace */
149 0xffffffff, /* src_mask */
150 0xffffffff, /* dst_mask */
151 FALSE), /* pcrel_offset */
152
153 /* 32 bit PC relative relocation. */
154 HOWTO (R_SH_REL32, /* type */
155 0, /* rightshift */
156 2, /* size (0 = byte, 1 = short, 2 = long) */
157 32, /* bitsize */
158 TRUE, /* pc_relative */
159 0, /* bitpos */
160 complain_overflow_signed, /* complain_on_overflow */
161 sh_elf_ignore_reloc, /* special_function */
162 "R_SH_REL32", /* name */
163 TRUE, /* partial_inplace */
164 0xffffffff, /* src_mask */
165 0xffffffff, /* dst_mask */
166 TRUE), /* pcrel_offset */
167
168 /* 8 bit PC relative branch divided by 2. */
169 HOWTO (R_SH_DIR8WPN, /* type */
170 1, /* rightshift */
171 1, /* size (0 = byte, 1 = short, 2 = long) */
172 8, /* bitsize */
173 TRUE, /* pc_relative */
174 0, /* bitpos */
175 complain_overflow_signed, /* complain_on_overflow */
176 sh_elf_ignore_reloc, /* special_function */
177 "R_SH_DIR8WPN", /* name */
178 TRUE, /* partial_inplace */
179 0xff, /* src_mask */
180 0xff, /* dst_mask */
181 TRUE), /* pcrel_offset */
182
183 /* 12 bit PC relative branch divided by 2. */
184 /* This cannot be partial_inplace because relaxation can't know the
185 eventual value of a symbol. */
186 HOWTO (R_SH_IND12W, /* type */
187 1, /* rightshift */
188 1, /* size (0 = byte, 1 = short, 2 = long) */
189 12, /* bitsize */
190 TRUE, /* pc_relative */
191 0, /* bitpos */
192 complain_overflow_signed, /* complain_on_overflow */
193 NULL, /* special_function */
194 "R_SH_IND12W", /* name */
195 FALSE, /* partial_inplace */
196 0x0, /* src_mask */
197 0xfff, /* dst_mask */
198 TRUE), /* pcrel_offset */
199
200 /* 8 bit unsigned PC relative divided by 4. */
201 HOWTO (R_SH_DIR8WPL, /* type */
202 2, /* rightshift */
203 1, /* size (0 = byte, 1 = short, 2 = long) */
204 8, /* bitsize */
205 TRUE, /* pc_relative */
206 0, /* bitpos */
207 complain_overflow_unsigned, /* complain_on_overflow */
208 sh_elf_ignore_reloc, /* special_function */
209 "R_SH_DIR8WPL", /* name */
210 TRUE, /* partial_inplace */
211 0xff, /* src_mask */
212 0xff, /* dst_mask */
213 TRUE), /* pcrel_offset */
214
215 /* 8 bit unsigned PC relative divided by 2. */
216 HOWTO (R_SH_DIR8WPZ, /* type */
217 1, /* rightshift */
218 1, /* size (0 = byte, 1 = short, 2 = long) */
219 8, /* bitsize */
220 TRUE, /* pc_relative */
221 0, /* bitpos */
222 complain_overflow_unsigned, /* complain_on_overflow */
223 sh_elf_ignore_reloc, /* special_function */
224 "R_SH_DIR8WPZ", /* name */
225 TRUE, /* partial_inplace */
226 0xff, /* src_mask */
227 0xff, /* dst_mask */
228 TRUE), /* pcrel_offset */
229
230 /* 8 bit GBR relative. FIXME: This only makes sense if we have some
231 special symbol for the GBR relative area, and that is not
232 implemented. */
233 HOWTO (R_SH_DIR8BP, /* type */
234 0, /* rightshift */
235 1, /* size (0 = byte, 1 = short, 2 = long) */
236 8, /* bitsize */
237 FALSE, /* pc_relative */
238 0, /* bitpos */
239 complain_overflow_unsigned, /* complain_on_overflow */
240 sh_elf_ignore_reloc, /* special_function */
241 "R_SH_DIR8BP", /* name */
242 FALSE, /* partial_inplace */
243 0, /* src_mask */
244 0xff, /* dst_mask */
245 TRUE), /* pcrel_offset */
246
247 /* 8 bit GBR relative divided by 2. FIXME: This only makes sense if
248 we have some special symbol for the GBR relative area, and that
249 is not implemented. */
250 HOWTO (R_SH_DIR8W, /* type */
251 1, /* rightshift */
252 1, /* size (0 = byte, 1 = short, 2 = long) */
253 8, /* bitsize */
254 FALSE, /* pc_relative */
255 0, /* bitpos */
256 complain_overflow_unsigned, /* complain_on_overflow */
257 sh_elf_ignore_reloc, /* special_function */
258 "R_SH_DIR8W", /* name */
259 FALSE, /* partial_inplace */
260 0, /* src_mask */
261 0xff, /* dst_mask */
262 TRUE), /* pcrel_offset */
263
264 /* 8 bit GBR relative divided by 4. FIXME: This only makes sense if
265 we have some special symbol for the GBR relative area, and that
266 is not implemented. */
267 HOWTO (R_SH_DIR8L, /* type */
268 2, /* rightshift */
269 1, /* size (0 = byte, 1 = short, 2 = long) */
270 8, /* bitsize */
271 FALSE, /* pc_relative */
272 0, /* bitpos */
273 complain_overflow_unsigned, /* complain_on_overflow */
274 sh_elf_ignore_reloc, /* special_function */
275 "R_SH_DIR8L", /* name */
276 FALSE, /* partial_inplace */
277 0, /* src_mask */
278 0xff, /* dst_mask */
279 TRUE), /* pcrel_offset */
280
281 EMPTY_HOWTO (10),
282 EMPTY_HOWTO (11),
283 EMPTY_HOWTO (12),
284 EMPTY_HOWTO (13),
285 EMPTY_HOWTO (14),
286 EMPTY_HOWTO (15),
287 EMPTY_HOWTO (16),
288 EMPTY_HOWTO (17),
289 EMPTY_HOWTO (18),
290 EMPTY_HOWTO (19),
291 EMPTY_HOWTO (20),
292 EMPTY_HOWTO (21),
293 EMPTY_HOWTO (22),
294 EMPTY_HOWTO (23),
295 EMPTY_HOWTO (24),
296
297 /* The remaining relocs are a GNU extension used for relaxing. The
298 final pass of the linker never needs to do anything with any of
299 these relocs. Any required operations are handled by the
300 relaxation code. */
301
302 /* A 16 bit switch table entry. This is generated for an expression
303 such as ``.word L1 - L2''. The offset holds the difference
304 between the reloc address and L2. */
305 HOWTO (R_SH_SWITCH16, /* type */
306 0, /* rightshift */
307 1, /* size (0 = byte, 1 = short, 2 = long) */
308 16, /* bitsize */
309 FALSE, /* pc_relative */
310 0, /* bitpos */
311 complain_overflow_unsigned, /* complain_on_overflow */
312 sh_elf_ignore_reloc, /* special_function */
313 "R_SH_SWITCH16", /* name */
314 FALSE, /* partial_inplace */
315 0, /* src_mask */
316 0, /* dst_mask */
317 TRUE), /* pcrel_offset */
318
319 /* A 32 bit switch table entry. This is generated for an expression
320 such as ``.long L1 - L2''. The offset holds the difference
321 between the reloc address and L2. */
322 HOWTO (R_SH_SWITCH32, /* type */
323 0, /* rightshift */
324 2, /* size (0 = byte, 1 = short, 2 = long) */
325 32, /* bitsize */
326 FALSE, /* pc_relative */
327 0, /* bitpos */
328 complain_overflow_unsigned, /* complain_on_overflow */
329 sh_elf_ignore_reloc, /* special_function */
330 "R_SH_SWITCH32", /* name */
331 FALSE, /* partial_inplace */
332 0, /* src_mask */
333 0, /* dst_mask */
334 TRUE), /* pcrel_offset */
335
336 /* Indicates a .uses pseudo-op. The compiler will generate .uses
337 pseudo-ops when it finds a function call which can be relaxed.
338 The offset field holds the PC relative offset to the instruction
339 which loads the register used in the function call. */
340 HOWTO (R_SH_USES, /* type */
341 0, /* rightshift */
342 1, /* size (0 = byte, 1 = short, 2 = long) */
343 0, /* bitsize */
344 FALSE, /* pc_relative */
345 0, /* bitpos */
346 complain_overflow_unsigned, /* complain_on_overflow */
347 sh_elf_ignore_reloc, /* special_function */
348 "R_SH_USES", /* name */
349 FALSE, /* partial_inplace */
350 0, /* src_mask */
351 0, /* dst_mask */
352 TRUE), /* pcrel_offset */
353
354 /* The assembler will generate this reloc for addresses referred to
355 by the register loads associated with USES relocs. The offset
356 field holds the number of times the address is referenced in the
357 object file. */
358 HOWTO (R_SH_COUNT, /* type */
359 0, /* rightshift */
360 1, /* size (0 = byte, 1 = short, 2 = long) */
361 0, /* bitsize */
362 FALSE, /* pc_relative */
363 0, /* bitpos */
364 complain_overflow_unsigned, /* complain_on_overflow */
365 sh_elf_ignore_reloc, /* special_function */
366 "R_SH_COUNT", /* name */
367 FALSE, /* partial_inplace */
368 0, /* src_mask */
369 0, /* dst_mask */
370 TRUE), /* pcrel_offset */
371
372 /* Indicates an alignment statement. The offset field is the power
373 of 2 to which subsequent portions of the object file must be
374 aligned. */
375 HOWTO (R_SH_ALIGN, /* type */
376 0, /* rightshift */
377 1, /* size (0 = byte, 1 = short, 2 = long) */
378 0, /* bitsize */
379 FALSE, /* pc_relative */
380 0, /* bitpos */
381 complain_overflow_unsigned, /* complain_on_overflow */
382 sh_elf_ignore_reloc, /* special_function */
383 "R_SH_ALIGN", /* name */
384 FALSE, /* partial_inplace */
385 0, /* src_mask */
386 0, /* dst_mask */
387 TRUE), /* pcrel_offset */
388
389 /* The assembler will generate this reloc before a block of
390 instructions. A section should be processed as assumining it
391 contains data, unless this reloc is seen. */
392 HOWTO (R_SH_CODE, /* type */
393 0, /* rightshift */
394 1, /* size (0 = byte, 1 = short, 2 = long) */
395 0, /* bitsize */
396 FALSE, /* pc_relative */
397 0, /* bitpos */
398 complain_overflow_unsigned, /* complain_on_overflow */
399 sh_elf_ignore_reloc, /* special_function */
400 "R_SH_CODE", /* name */
401 FALSE, /* partial_inplace */
402 0, /* src_mask */
403 0, /* dst_mask */
404 TRUE), /* pcrel_offset */
405
406 /* The assembler will generate this reloc after a block of
407 instructions when it sees data that is not instructions. */
408 HOWTO (R_SH_DATA, /* type */
409 0, /* rightshift */
410 1, /* size (0 = byte, 1 = short, 2 = long) */
411 0, /* bitsize */
412 FALSE, /* pc_relative */
413 0, /* bitpos */
414 complain_overflow_unsigned, /* complain_on_overflow */
415 sh_elf_ignore_reloc, /* special_function */
416 "R_SH_DATA", /* name */
417 FALSE, /* partial_inplace */
418 0, /* src_mask */
419 0, /* dst_mask */
420 TRUE), /* pcrel_offset */
421
422 /* The assembler generates this reloc for each label within a block
423 of instructions. This permits the linker to avoid swapping
424 instructions which are the targets of branches. */
425 HOWTO (R_SH_LABEL, /* type */
426 0, /* rightshift */
427 1, /* size (0 = byte, 1 = short, 2 = long) */
428 0, /* bitsize */
429 FALSE, /* pc_relative */
430 0, /* bitpos */
431 complain_overflow_unsigned, /* complain_on_overflow */
432 sh_elf_ignore_reloc, /* special_function */
433 "R_SH_LABEL", /* name */
434 FALSE, /* partial_inplace */
435 0, /* src_mask */
436 0, /* dst_mask */
437 TRUE), /* pcrel_offset */
438
439 /* An 8 bit switch table entry. This is generated for an expression
440 such as ``.word L1 - L2''. The offset holds the difference
441 between the reloc address and L2. */
442 HOWTO (R_SH_SWITCH8, /* type */
443 0, /* rightshift */
444 0, /* size (0 = byte, 1 = short, 2 = long) */
445 8, /* bitsize */
446 FALSE, /* pc_relative */
447 0, /* bitpos */
448 complain_overflow_unsigned, /* complain_on_overflow */
449 sh_elf_ignore_reloc, /* special_function */
450 "R_SH_SWITCH8", /* name */
451 FALSE, /* partial_inplace */
452 0, /* src_mask */
453 0, /* dst_mask */
454 TRUE), /* pcrel_offset */
455
456 /* GNU extension to record C++ vtable hierarchy */
457 HOWTO (R_SH_GNU_VTINHERIT, /* type */
458 0, /* rightshift */
459 2, /* size (0 = byte, 1 = short, 2 = long) */
460 0, /* bitsize */
461 FALSE, /* pc_relative */
462 0, /* bitpos */
463 complain_overflow_dont, /* complain_on_overflow */
464 NULL, /* special_function */
465 "R_SH_GNU_VTINHERIT", /* name */
466 FALSE, /* partial_inplace */
467 0, /* src_mask */
468 0, /* dst_mask */
469 FALSE), /* pcrel_offset */
470
471 /* GNU extension to record C++ vtable member usage */
472 HOWTO (R_SH_GNU_VTENTRY, /* type */
473 0, /* rightshift */
474 2, /* size (0 = byte, 1 = short, 2 = long) */
475 0, /* bitsize */
476 FALSE, /* pc_relative */
477 0, /* bitpos */
478 complain_overflow_dont, /* complain_on_overflow */
479 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
480 "R_SH_GNU_VTENTRY", /* name */
481 FALSE, /* partial_inplace */
482 0, /* src_mask */
483 0, /* dst_mask */
484 FALSE), /* pcrel_offset */
485
486 /* 8 bit PC relative divided by 2 - but specified in a very odd way. */
487 HOWTO (R_SH_LOOP_START, /* type */
488 1, /* rightshift */
489 1, /* size (0 = byte, 1 = short, 2 = long) */
490 8, /* bitsize */
491 FALSE, /* pc_relative */
492 0, /* bitpos */
493 complain_overflow_signed, /* complain_on_overflow */
494 sh_elf_ignore_reloc, /* special_function */
495 "R_SH_LOOP_START", /* name */
496 TRUE, /* partial_inplace */
497 0xff, /* src_mask */
498 0xff, /* dst_mask */
499 TRUE), /* pcrel_offset */
500
501 /* 8 bit PC relative divided by 2 - but specified in a very odd way. */
502 HOWTO (R_SH_LOOP_END, /* type */
503 1, /* rightshift */
504 1, /* size (0 = byte, 1 = short, 2 = long) */
505 8, /* bitsize */
506 FALSE, /* pc_relative */
507 0, /* bitpos */
508 complain_overflow_signed, /* complain_on_overflow */
509 sh_elf_ignore_reloc, /* special_function */
510 "R_SH_LOOP_END", /* name */
511 TRUE, /* partial_inplace */
512 0xff, /* src_mask */
513 0xff, /* dst_mask */
514 TRUE), /* pcrel_offset */
515
516 EMPTY_HOWTO (38),
517 EMPTY_HOWTO (39),
518 EMPTY_HOWTO (40),
519 EMPTY_HOWTO (41),
520 EMPTY_HOWTO (42),
521 EMPTY_HOWTO (43),
522 EMPTY_HOWTO (44),
523
524 #ifdef INCLUDE_SHMEDIA
525 /* Used in SHLLI.L and SHLRI.L. */
526 HOWTO (R_SH_DIR5U, /* type */
527 0, /* rightshift */
528 2, /* size (0 = byte, 1 = short, 2 = long) */
529 5, /* bitsize */
530 FALSE, /* pc_relative */
531 10, /* bitpos */
532 complain_overflow_unsigned, /* complain_on_overflow */
533 bfd_elf_generic_reloc, /* special_function */
534 "R_SH_DIR5U", /* name */
535 FALSE, /* partial_inplace */
536 0, /* src_mask */
537 0xfc00, /* dst_mask */
538 FALSE), /* pcrel_offset */
539
540 /* Used in SHARI, SHLLI et al. */
541 HOWTO (R_SH_DIR6U, /* type */
542 0, /* rightshift */
543 2, /* size (0 = byte, 1 = short, 2 = long) */
544 6, /* bitsize */
545 FALSE, /* pc_relative */
546 10, /* bitpos */
547 complain_overflow_unsigned, /* complain_on_overflow */
548 bfd_elf_generic_reloc, /* special_function */
549 "R_SH_DIR6U", /* name */
550 FALSE, /* partial_inplace */
551 0, /* src_mask */
552 0xfc00, /* dst_mask */
553 FALSE), /* pcrel_offset */
554
555 /* Used in BxxI, LDHI.L et al. */
556 HOWTO (R_SH_DIR6S, /* type */
557 0, /* rightshift */
558 2, /* size (0 = byte, 1 = short, 2 = long) */
559 6, /* bitsize */
560 FALSE, /* pc_relative */
561 10, /* bitpos */
562 complain_overflow_signed, /* complain_on_overflow */
563 bfd_elf_generic_reloc, /* special_function */
564 "R_SH_DIR6S", /* name */
565 FALSE, /* partial_inplace */
566 0, /* src_mask */
567 0xfc00, /* dst_mask */
568 FALSE), /* pcrel_offset */
569
570 /* Used in ADDI, ANDI et al. */
571 HOWTO (R_SH_DIR10S, /* type */
572 0, /* rightshift */
573 2, /* size (0 = byte, 1 = short, 2 = long) */
574 10, /* bitsize */
575 FALSE, /* pc_relative */
576 10, /* bitpos */
577 complain_overflow_signed, /* complain_on_overflow */
578 bfd_elf_generic_reloc, /* special_function */
579 "R_SH_DIR10S", /* name */
580 FALSE, /* partial_inplace */
581 0, /* src_mask */
582 0xffc00, /* dst_mask */
583 FALSE), /* pcrel_offset */
584
585 /* Used in LD.UW, ST.W et al. */
586 HOWTO (R_SH_DIR10SW, /* type */
587 1, /* rightshift */
588 2, /* size (0 = byte, 1 = short, 2 = long) */
589 11, /* bitsize */
590 FALSE, /* pc_relative */
591 10, /* bitpos */
592 complain_overflow_signed, /* complain_on_overflow */
593 bfd_elf_generic_reloc, /* special_function */
594 "R_SH_DIR10SW", /* name */
595 FALSE, /* partial_inplace */
596 0, /* src_mask */
597 0xffc00, /* dst_mask */
598 FALSE), /* pcrel_offset */
599
600 /* Used in LD.L, FLD.S et al. */
601 HOWTO (R_SH_DIR10SL, /* type */
602 2, /* rightshift */
603 2, /* size (0 = byte, 1 = short, 2 = long) */
604 12, /* bitsize */
605 FALSE, /* pc_relative */
606 10, /* bitpos */
607 complain_overflow_signed, /* complain_on_overflow */
608 bfd_elf_generic_reloc, /* special_function */
609 "R_SH_DIR10SL", /* name */
610 FALSE, /* partial_inplace */
611 0, /* src_mask */
612 0xffc00, /* dst_mask */
613 FALSE), /* pcrel_offset */
614
615 /* Used in FLD.D, FST.P et al. */
616 HOWTO (R_SH_DIR10SQ, /* type */
617 3, /* rightshift */
618 2, /* size (0 = byte, 1 = short, 2 = long) */
619 13, /* bitsize */
620 FALSE, /* pc_relative */
621 10, /* bitpos */
622 complain_overflow_signed, /* complain_on_overflow */
623 bfd_elf_generic_reloc, /* special_function */
624 "R_SH_DIR10SQ", /* name */
625 FALSE, /* partial_inplace */
626 0, /* src_mask */
627 0xffc00, /* dst_mask */
628 FALSE), /* pcrel_offset */
629
630 #else
631 EMPTY_HOWTO (45),
632 EMPTY_HOWTO (46),
633 EMPTY_HOWTO (47),
634 EMPTY_HOWTO (48),
635 EMPTY_HOWTO (49),
636 EMPTY_HOWTO (50),
637 EMPTY_HOWTO (51),
638 #endif
639
640 EMPTY_HOWTO (52),
641 EMPTY_HOWTO (53),
642 EMPTY_HOWTO (54),
643 EMPTY_HOWTO (55),
644 EMPTY_HOWTO (56),
645 EMPTY_HOWTO (57),
646 EMPTY_HOWTO (58),
647 EMPTY_HOWTO (59),
648 EMPTY_HOWTO (60),
649 EMPTY_HOWTO (61),
650 EMPTY_HOWTO (62),
651 EMPTY_HOWTO (63),
652 EMPTY_HOWTO (64),
653 EMPTY_HOWTO (65),
654 EMPTY_HOWTO (66),
655 EMPTY_HOWTO (67),
656 EMPTY_HOWTO (68),
657 EMPTY_HOWTO (69),
658 EMPTY_HOWTO (70),
659 EMPTY_HOWTO (71),
660 EMPTY_HOWTO (72),
661 EMPTY_HOWTO (73),
662 EMPTY_HOWTO (74),
663 EMPTY_HOWTO (75),
664 EMPTY_HOWTO (76),
665 EMPTY_HOWTO (77),
666 EMPTY_HOWTO (78),
667 EMPTY_HOWTO (79),
668 EMPTY_HOWTO (80),
669 EMPTY_HOWTO (81),
670 EMPTY_HOWTO (82),
671 EMPTY_HOWTO (83),
672 EMPTY_HOWTO (84),
673 EMPTY_HOWTO (85),
674 EMPTY_HOWTO (86),
675 EMPTY_HOWTO (87),
676 EMPTY_HOWTO (88),
677 EMPTY_HOWTO (89),
678 EMPTY_HOWTO (90),
679 EMPTY_HOWTO (91),
680 EMPTY_HOWTO (92),
681 EMPTY_HOWTO (93),
682 EMPTY_HOWTO (94),
683 EMPTY_HOWTO (95),
684 EMPTY_HOWTO (96),
685 EMPTY_HOWTO (97),
686 EMPTY_HOWTO (98),
687 EMPTY_HOWTO (99),
688 EMPTY_HOWTO (100),
689 EMPTY_HOWTO (101),
690 EMPTY_HOWTO (102),
691 EMPTY_HOWTO (103),
692 EMPTY_HOWTO (104),
693 EMPTY_HOWTO (105),
694 EMPTY_HOWTO (106),
695 EMPTY_HOWTO (107),
696 EMPTY_HOWTO (108),
697 EMPTY_HOWTO (109),
698 EMPTY_HOWTO (110),
699 EMPTY_HOWTO (111),
700 EMPTY_HOWTO (112),
701 EMPTY_HOWTO (113),
702 EMPTY_HOWTO (114),
703 EMPTY_HOWTO (115),
704 EMPTY_HOWTO (116),
705 EMPTY_HOWTO (117),
706 EMPTY_HOWTO (118),
707 EMPTY_HOWTO (119),
708 EMPTY_HOWTO (120),
709 EMPTY_HOWTO (121),
710 EMPTY_HOWTO (122),
711 EMPTY_HOWTO (123),
712 EMPTY_HOWTO (124),
713 EMPTY_HOWTO (125),
714 EMPTY_HOWTO (126),
715 EMPTY_HOWTO (127),
716 EMPTY_HOWTO (128),
717 EMPTY_HOWTO (129),
718 EMPTY_HOWTO (130),
719 EMPTY_HOWTO (131),
720 EMPTY_HOWTO (132),
721 EMPTY_HOWTO (133),
722 EMPTY_HOWTO (134),
723 EMPTY_HOWTO (135),
724 EMPTY_HOWTO (136),
725 EMPTY_HOWTO (137),
726 EMPTY_HOWTO (138),
727 EMPTY_HOWTO (139),
728 EMPTY_HOWTO (140),
729 EMPTY_HOWTO (141),
730 EMPTY_HOWTO (142),
731 EMPTY_HOWTO (143),
732
733 HOWTO (R_SH_TLS_GD_32, /* type */
734 0, /* rightshift */
735 2, /* size (0 = byte, 1 = short, 2 = long) */
736 32, /* bitsize */
737 FALSE, /* pc_relative */
738 0, /* bitpos */
739 complain_overflow_bitfield, /* complain_on_overflow */
740 bfd_elf_generic_reloc, /* */
741 "R_SH_TLS_GD_32", /* name */
742 TRUE, /* partial_inplace */
743 0xffffffff, /* src_mask */
744 0xffffffff, /* dst_mask */
745 FALSE), /* pcrel_offset */
746
747 HOWTO (R_SH_TLS_LD_32, /* type */
748 0, /* rightshift */
749 2, /* size (0 = byte, 1 = short, 2 = long) */
750 32, /* bitsize */
751 FALSE, /* pc_relative */
752 0, /* bitpos */
753 complain_overflow_bitfield, /* complain_on_overflow */
754 bfd_elf_generic_reloc, /* */
755 "R_SH_TLS_LD_32", /* name */
756 TRUE, /* partial_inplace */
757 0xffffffff, /* src_mask */
758 0xffffffff, /* dst_mask */
759 FALSE), /* pcrel_offset */
760
761 HOWTO (R_SH_TLS_LDO_32, /* type */
762 0, /* rightshift */
763 2, /* size (0 = byte, 1 = short, 2 = long) */
764 32, /* bitsize */
765 FALSE, /* pc_relative */
766 0, /* bitpos */
767 complain_overflow_bitfield, /* complain_on_overflow */
768 bfd_elf_generic_reloc, /* */
769 "R_SH_TLS_LDO_32", /* name */
770 TRUE, /* partial_inplace */
771 0xffffffff, /* src_mask */
772 0xffffffff, /* dst_mask */
773 FALSE), /* pcrel_offset */
774
775 HOWTO (R_SH_TLS_IE_32, /* type */
776 0, /* rightshift */
777 2, /* size (0 = byte, 1 = short, 2 = long) */
778 32, /* bitsize */
779 FALSE, /* pc_relative */
780 0, /* bitpos */
781 complain_overflow_bitfield, /* complain_on_overflow */
782 bfd_elf_generic_reloc, /* */
783 "R_SH_TLS_IE_32", /* name */
784 TRUE, /* partial_inplace */
785 0xffffffff, /* src_mask */
786 0xffffffff, /* dst_mask */
787 FALSE), /* pcrel_offset */
788
789 HOWTO (R_SH_TLS_LE_32, /* type */
790 0, /* rightshift */
791 2, /* size (0 = byte, 1 = short, 2 = long) */
792 32, /* bitsize */
793 FALSE, /* pc_relative */
794 0, /* bitpos */
795 complain_overflow_bitfield, /* complain_on_overflow */
796 bfd_elf_generic_reloc, /* */
797 "R_SH_TLS_LE_32", /* name */
798 TRUE, /* partial_inplace */
799 0xffffffff, /* src_mask */
800 0xffffffff, /* dst_mask */
801 FALSE), /* pcrel_offset */
802
803 HOWTO (R_SH_TLS_DTPMOD32, /* type */
804 0, /* rightshift */
805 2, /* size (0 = byte, 1 = short, 2 = long) */
806 32, /* bitsize */
807 FALSE, /* pc_relative */
808 0, /* bitpos */
809 complain_overflow_bitfield, /* complain_on_overflow */
810 bfd_elf_generic_reloc, /* */
811 "R_SH_TLS_DTPMOD32", /* name */
812 TRUE, /* partial_inplace */
813 0xffffffff, /* src_mask */
814 0xffffffff, /* dst_mask */
815 FALSE), /* pcrel_offset */
816
817 HOWTO (R_SH_TLS_DTPOFF32, /* type */
818 0, /* rightshift */
819 2, /* size (0 = byte, 1 = short, 2 = long) */
820 32, /* bitsize */
821 FALSE, /* pc_relative */
822 0, /* bitpos */
823 complain_overflow_bitfield, /* complain_on_overflow */
824 bfd_elf_generic_reloc, /* */
825 "R_SH_TLS_DTPOFF32", /* name */
826 TRUE, /* partial_inplace */
827 0xffffffff, /* src_mask */
828 0xffffffff, /* dst_mask */
829 FALSE), /* pcrel_offset */
830
831 HOWTO (R_SH_TLS_TPOFF32, /* type */
832 0, /* rightshift */
833 2, /* size (0 = byte, 1 = short, 2 = long) */
834 32, /* bitsize */
835 FALSE, /* pc_relative */
836 0, /* bitpos */
837 complain_overflow_bitfield, /* complain_on_overflow */
838 bfd_elf_generic_reloc, /* */
839 "R_SH_TLS_TPOFF32", /* name */
840 TRUE, /* partial_inplace */
841 0xffffffff, /* src_mask */
842 0xffffffff, /* dst_mask */
843 FALSE), /* pcrel_offset */
844
845 EMPTY_HOWTO (152),
846 EMPTY_HOWTO (153),
847 EMPTY_HOWTO (154),
848 EMPTY_HOWTO (155),
849 EMPTY_HOWTO (156),
850 EMPTY_HOWTO (157),
851 EMPTY_HOWTO (158),
852 EMPTY_HOWTO (159),
853
854 HOWTO (R_SH_GOT32, /* type */
855 0, /* rightshift */
856 2, /* size (0 = byte, 1 = short, 2 = long) */
857 32, /* bitsize */
858 FALSE, /* pc_relative */
859 0, /* bitpos */
860 complain_overflow_bitfield, /* complain_on_overflow */
861 bfd_elf_generic_reloc, /* */
862 "R_SH_GOT32", /* name */
863 TRUE, /* partial_inplace */
864 0xffffffff, /* src_mask */
865 0xffffffff, /* dst_mask */
866 FALSE), /* pcrel_offset */
867
868 HOWTO (R_SH_PLT32, /* type */
869 0, /* rightshift */
870 2, /* size (0 = byte, 1 = short, 2 = long) */
871 32, /* bitsize */
872 TRUE, /* pc_relative */
873 0, /* bitpos */
874 complain_overflow_bitfield, /* complain_on_overflow */
875 bfd_elf_generic_reloc, /* */
876 "R_SH_PLT32", /* name */
877 TRUE, /* partial_inplace */
878 0xffffffff, /* src_mask */
879 0xffffffff, /* dst_mask */
880 TRUE), /* pcrel_offset */
881
882 HOWTO (R_SH_COPY, /* type */
883 0, /* rightshift */
884 2, /* size (0 = byte, 1 = short, 2 = long) */
885 32, /* bitsize */
886 FALSE, /* pc_relative */
887 0, /* bitpos */
888 complain_overflow_bitfield, /* complain_on_overflow */
889 bfd_elf_generic_reloc, /* */
890 "R_SH_COPY", /* name */
891 TRUE, /* partial_inplace */
892 0xffffffff, /* src_mask */
893 0xffffffff, /* dst_mask */
894 FALSE), /* pcrel_offset */
895
896 HOWTO (R_SH_GLOB_DAT, /* type */
897 0, /* rightshift */
898 2, /* size (0 = byte, 1 = short, 2 = long) */
899 32, /* bitsize */
900 FALSE, /* pc_relative */
901 0, /* bitpos */
902 complain_overflow_bitfield, /* complain_on_overflow */
903 bfd_elf_generic_reloc, /* */
904 "R_SH_GLOB_DAT", /* name */
905 TRUE, /* partial_inplace */
906 0xffffffff, /* src_mask */
907 0xffffffff, /* dst_mask */
908 FALSE), /* pcrel_offset */
909
910 HOWTO (R_SH_JMP_SLOT, /* type */
911 0, /* rightshift */
912 2, /* size (0 = byte, 1 = short, 2 = long) */
913 32, /* bitsize */
914 FALSE, /* pc_relative */
915 0, /* bitpos */
916 complain_overflow_bitfield, /* complain_on_overflow */
917 bfd_elf_generic_reloc, /* */
918 "R_SH_JMP_SLOT", /* name */
919 TRUE, /* partial_inplace */
920 0xffffffff, /* src_mask */
921 0xffffffff, /* dst_mask */
922 FALSE), /* pcrel_offset */
923
924 HOWTO (R_SH_RELATIVE, /* type */
925 0, /* rightshift */
926 2, /* size (0 = byte, 1 = short, 2 = long) */
927 32, /* bitsize */
928 FALSE, /* pc_relative */
929 0, /* bitpos */
930 complain_overflow_bitfield, /* complain_on_overflow */
931 bfd_elf_generic_reloc, /* */
932 "R_SH_RELATIVE", /* name */
933 TRUE, /* partial_inplace */
934 0xffffffff, /* src_mask */
935 0xffffffff, /* dst_mask */
936 FALSE), /* pcrel_offset */
937
938 HOWTO (R_SH_GOTOFF, /* type */
939 0, /* rightshift */
940 2, /* size (0 = byte, 1 = short, 2 = long) */
941 32, /* bitsize */
942 FALSE, /* pc_relative */
943 0, /* bitpos */
944 complain_overflow_bitfield, /* complain_on_overflow */
945 bfd_elf_generic_reloc, /* */
946 "R_SH_GOTOFF", /* name */
947 TRUE, /* partial_inplace */
948 0xffffffff, /* src_mask */
949 0xffffffff, /* dst_mask */
950 FALSE), /* pcrel_offset */
951
952 HOWTO (R_SH_GOTPC, /* type */
953 0, /* rightshift */
954 2, /* size (0 = byte, 1 = short, 2 = long) */
955 32, /* bitsize */
956 TRUE, /* pc_relative */
957 0, /* bitpos */
958 complain_overflow_bitfield, /* complain_on_overflow */
959 bfd_elf_generic_reloc, /* */
960 "R_SH_GOTPC", /* name */
961 TRUE, /* partial_inplace */
962 0xffffffff, /* src_mask */
963 0xffffffff, /* dst_mask */
964 TRUE), /* pcrel_offset */
965
966 HOWTO (R_SH_GOTPLT32, /* type */
967 0, /* rightshift */
968 2, /* size (0 = byte, 1 = short, 2 = long) */
969 32, /* bitsize */
970 FALSE, /* pc_relative */
971 0, /* bitpos */
972 complain_overflow_bitfield, /* complain_on_overflow */
973 bfd_elf_generic_reloc, /* */
974 "R_SH_GOTPLT32", /* name */
975 FALSE, /* partial_inplace */
976 0xffffffff, /* src_mask */
977 0xffffffff, /* dst_mask */
978 FALSE), /* pcrel_offset */
979
980 #ifdef INCLUDE_SHMEDIA
981 /* Used in MOVI and SHORI (x & 65536). */
982 HOWTO (R_SH_GOT_LOW16, /* type */
983 0, /* rightshift */
984 2, /* size (0 = byte, 1 = short, 2 = long) */
985 64, /* bitsize */
986 FALSE, /* pc_relative */
987 10, /* bitpos */
988 complain_overflow_dont, /* complain_on_overflow */
989 bfd_elf_generic_reloc, /* special_function */
990 "R_SH_GOT_LOW16", /* name */
991 FALSE, /* partial_inplace */
992 0, /* src_mask */
993 0x3fffc00, /* dst_mask */
994 FALSE), /* pcrel_offset */
995
996 /* Used in MOVI and SHORI ((x >> 16) & 65536). */
997 HOWTO (R_SH_GOT_MEDLOW16, /* type */
998 16, /* rightshift */
999 2, /* size (0 = byte, 1 = short, 2 = long) */
1000 64, /* bitsize */
1001 FALSE, /* pc_relative */
1002 10, /* bitpos */
1003 complain_overflow_dont, /* complain_on_overflow */
1004 bfd_elf_generic_reloc, /* special_function */
1005 "R_SH_GOT_MEDLOW16", /* name */
1006 FALSE, /* partial_inplace */
1007 0, /* src_mask */
1008 0x3fffc00, /* dst_mask */
1009 FALSE), /* pcrel_offset */
1010
1011 /* Used in MOVI and SHORI ((x >> 32) & 65536). */
1012 HOWTO (R_SH_GOT_MEDHI16, /* type */
1013 32, /* rightshift */
1014 2, /* size (0 = byte, 1 = short, 2 = long) */
1015 64, /* bitsize */
1016 FALSE, /* pc_relative */
1017 10, /* bitpos */
1018 complain_overflow_dont, /* complain_on_overflow */
1019 bfd_elf_generic_reloc, /* special_function */
1020 "R_SH_GOT_MEDHI16", /* name */
1021 FALSE, /* partial_inplace */
1022 0, /* src_mask */
1023 0x3fffc00, /* dst_mask */
1024 FALSE), /* pcrel_offset */
1025
1026 /* Used in MOVI and SHORI ((x >> 48) & 65536). */
1027 HOWTO (R_SH_GOT_HI16, /* type */
1028 48, /* rightshift */
1029 2, /* size (0 = byte, 1 = short, 2 = long) */
1030 64, /* bitsize */
1031 FALSE, /* pc_relative */
1032 10, /* bitpos */
1033 complain_overflow_dont, /* complain_on_overflow */
1034 bfd_elf_generic_reloc, /* special_function */
1035 "R_SH_GOT_HI16", /* name */
1036 FALSE, /* partial_inplace */
1037 0, /* src_mask */
1038 0x3fffc00, /* dst_mask */
1039 FALSE), /* pcrel_offset */
1040
1041 /* Used in MOVI and SHORI (x & 65536). */
1042 HOWTO (R_SH_GOTPLT_LOW16, /* type */
1043 0, /* rightshift */
1044 2, /* size (0 = byte, 1 = short, 2 = long) */
1045 64, /* bitsize */
1046 FALSE, /* pc_relative */
1047 10, /* bitpos */
1048 complain_overflow_dont, /* complain_on_overflow */
1049 bfd_elf_generic_reloc, /* special_function */
1050 "R_SH_GOTPLT_LOW16", /* name */
1051 FALSE, /* partial_inplace */
1052 0, /* src_mask */
1053 0x3fffc00, /* dst_mask */
1054 FALSE), /* pcrel_offset */
1055
1056 /* Used in MOVI and SHORI ((x >> 16) & 65536). */
1057 HOWTO (R_SH_GOTPLT_MEDLOW16, /* type */
1058 16, /* rightshift */
1059 2, /* size (0 = byte, 1 = short, 2 = long) */
1060 64, /* bitsize */
1061 FALSE, /* pc_relative */
1062 10, /* bitpos */
1063 complain_overflow_dont, /* complain_on_overflow */
1064 bfd_elf_generic_reloc, /* special_function */
1065 "R_SH_GOTPLT_MEDLOW16", /* name */
1066 FALSE, /* partial_inplace */
1067 0, /* src_mask */
1068 0x3fffc00, /* dst_mask */
1069 FALSE), /* pcrel_offset */
1070
1071 /* Used in MOVI and SHORI ((x >> 32) & 65536). */
1072 HOWTO (R_SH_GOTPLT_MEDHI16, /* type */
1073 32, /* rightshift */
1074 2, /* size (0 = byte, 1 = short, 2 = long) */
1075 64, /* bitsize */
1076 FALSE, /* pc_relative */
1077 10, /* bitpos */
1078 complain_overflow_dont, /* complain_on_overflow */
1079 bfd_elf_generic_reloc, /* special_function */
1080 "R_SH_GOTPLT_MEDHI16", /* name */
1081 FALSE, /* partial_inplace */
1082 0, /* src_mask */
1083 0x3fffc00, /* dst_mask */
1084 FALSE), /* pcrel_offset */
1085
1086 /* Used in MOVI and SHORI ((x >> 48) & 65536). */
1087 HOWTO (R_SH_GOTPLT_HI16, /* type */
1088 48, /* rightshift */
1089 2, /* size (0 = byte, 1 = short, 2 = long) */
1090 64, /* bitsize */
1091 FALSE, /* pc_relative */
1092 10, /* bitpos */
1093 complain_overflow_dont, /* complain_on_overflow */
1094 bfd_elf_generic_reloc, /* special_function */
1095 "R_SH_GOTPLT_HI16", /* name */
1096 FALSE, /* partial_inplace */
1097 0, /* src_mask */
1098 0x3fffc00, /* dst_mask */
1099 FALSE), /* pcrel_offset */
1100
1101 /* Used in MOVI and SHORI (x & 65536). */
1102 HOWTO (R_SH_PLT_LOW16, /* type */
1103 0, /* rightshift */
1104 2, /* size (0 = byte, 1 = short, 2 = long) */
1105 64, /* bitsize */
1106 TRUE, /* pc_relative */
1107 10, /* bitpos */
1108 complain_overflow_dont, /* complain_on_overflow */
1109 bfd_elf_generic_reloc, /* special_function */
1110 "R_SH_PLT_LOW16", /* name */
1111 FALSE, /* partial_inplace */
1112 0, /* src_mask */
1113 0x3fffc00, /* dst_mask */
1114 TRUE), /* pcrel_offset */
1115
1116 /* Used in MOVI and SHORI ((x >> 16) & 65536). */
1117 HOWTO (R_SH_PLT_MEDLOW16, /* type */
1118 16, /* rightshift */
1119 2, /* size (0 = byte, 1 = short, 2 = long) */
1120 64, /* bitsize */
1121 TRUE, /* pc_relative */
1122 10, /* bitpos */
1123 complain_overflow_dont, /* complain_on_overflow */
1124 bfd_elf_generic_reloc, /* special_function */
1125 "R_SH_PLT_MEDLOW16", /* name */
1126 FALSE, /* partial_inplace */
1127 0, /* src_mask */
1128 0x3fffc00, /* dst_mask */
1129 TRUE), /* pcrel_offset */
1130
1131 /* Used in MOVI and SHORI ((x >> 32) & 65536). */
1132 HOWTO (R_SH_PLT_MEDHI16, /* type */
1133 32, /* rightshift */
1134 2, /* size (0 = byte, 1 = short, 2 = long) */
1135 64, /* bitsize */
1136 TRUE, /* pc_relative */
1137 10, /* bitpos */
1138 complain_overflow_dont, /* complain_on_overflow */
1139 bfd_elf_generic_reloc, /* special_function */
1140 "R_SH_PLT_MEDHI16", /* name */
1141 FALSE, /* partial_inplace */
1142 0, /* src_mask */
1143 0x3fffc00, /* dst_mask */
1144 TRUE), /* pcrel_offset */
1145
1146 /* Used in MOVI and SHORI ((x >> 48) & 65536). */
1147 HOWTO (R_SH_PLT_HI16, /* type */
1148 48, /* rightshift */
1149 2, /* size (0 = byte, 1 = short, 2 = long) */
1150 64, /* bitsize */
1151 TRUE, /* pc_relative */
1152 10, /* bitpos */
1153 complain_overflow_dont, /* complain_on_overflow */
1154 bfd_elf_generic_reloc, /* special_function */
1155 "R_SH_PLT_HI16", /* name */
1156 FALSE, /* partial_inplace */
1157 0, /* src_mask */
1158 0x3fffc00, /* dst_mask */
1159 TRUE), /* pcrel_offset */
1160
1161 /* Used in MOVI and SHORI (x & 65536). */
1162 HOWTO (R_SH_GOTOFF_LOW16, /* type */
1163 0, /* rightshift */
1164 2, /* size (0 = byte, 1 = short, 2 = long) */
1165 64, /* bitsize */
1166 FALSE, /* pc_relative */
1167 10, /* bitpos */
1168 complain_overflow_dont, /* complain_on_overflow */
1169 bfd_elf_generic_reloc, /* special_function */
1170 "R_SH_GOTOFF_LOW16", /* name */
1171 FALSE, /* partial_inplace */
1172 0, /* src_mask */
1173 0x3fffc00, /* dst_mask */
1174 FALSE), /* pcrel_offset */
1175
1176 /* Used in MOVI and SHORI ((x >> 16) & 65536). */
1177 HOWTO (R_SH_GOTOFF_MEDLOW16, /* type */
1178 16, /* rightshift */
1179 2, /* size (0 = byte, 1 = short, 2 = long) */
1180 64, /* bitsize */
1181 FALSE, /* pc_relative */
1182 10, /* bitpos */
1183 complain_overflow_dont, /* complain_on_overflow */
1184 bfd_elf_generic_reloc, /* special_function */
1185 "R_SH_GOTOFF_MEDLOW16", /* name */
1186 FALSE, /* partial_inplace */
1187 0, /* src_mask */
1188 0x3fffc00, /* dst_mask */
1189 FALSE), /* pcrel_offset */
1190
1191 /* Used in MOVI and SHORI ((x >> 32) & 65536). */
1192 HOWTO (R_SH_GOTOFF_MEDHI16, /* type */
1193 32, /* rightshift */
1194 2, /* size (0 = byte, 1 = short, 2 = long) */
1195 64, /* bitsize */
1196 FALSE, /* pc_relative */
1197 10, /* bitpos */
1198 complain_overflow_dont, /* complain_on_overflow */
1199 bfd_elf_generic_reloc, /* special_function */
1200 "R_SH_GOTOFF_MEDHI16", /* name */
1201 FALSE, /* partial_inplace */
1202 0, /* src_mask */
1203 0x3fffc00, /* dst_mask */
1204 FALSE), /* pcrel_offset */
1205
1206 /* Used in MOVI and SHORI ((x >> 48) & 65536). */
1207 HOWTO (R_SH_GOTOFF_HI16, /* type */
1208 48, /* rightshift */
1209 2, /* size (0 = byte, 1 = short, 2 = long) */
1210 64, /* bitsize */
1211 FALSE, /* pc_relative */
1212 10, /* bitpos */
1213 complain_overflow_dont, /* complain_on_overflow */
1214 bfd_elf_generic_reloc, /* special_function */
1215 "R_SH_GOTOFF_HI16", /* name */
1216 FALSE, /* partial_inplace */
1217 0, /* src_mask */
1218 0x3fffc00, /* dst_mask */
1219 FALSE), /* pcrel_offset */
1220
1221 /* Used in MOVI and SHORI (x & 65536). */
1222 HOWTO (R_SH_GOTPC_LOW16, /* type */
1223 0, /* rightshift */
1224 2, /* size (0 = byte, 1 = short, 2 = long) */
1225 64, /* bitsize */
1226 TRUE, /* pc_relative */
1227 10, /* bitpos */
1228 complain_overflow_dont, /* complain_on_overflow */
1229 bfd_elf_generic_reloc, /* special_function */
1230 "R_SH_GOTPC_LOW16", /* name */
1231 FALSE, /* partial_inplace */
1232 0, /* src_mask */
1233 0x3fffc00, /* dst_mask */
1234 TRUE), /* pcrel_offset */
1235
1236 /* Used in MOVI and SHORI ((x >> 16) & 65536). */
1237 HOWTO (R_SH_GOTPC_MEDLOW16, /* type */
1238 16, /* rightshift */
1239 2, /* size (0 = byte, 1 = short, 2 = long) */
1240 64, /* bitsize */
1241 TRUE, /* pc_relative */
1242 10, /* bitpos */
1243 complain_overflow_dont, /* complain_on_overflow */
1244 bfd_elf_generic_reloc, /* special_function */
1245 "R_SH_GOTPC_MEDLOW16", /* name */
1246 FALSE, /* partial_inplace */
1247 0, /* src_mask */
1248 0x3fffc00, /* dst_mask */
1249 TRUE), /* pcrel_offset */
1250
1251 /* Used in MOVI and SHORI ((x >> 32) & 65536). */
1252 HOWTO (R_SH_GOTPC_MEDHI16, /* type */
1253 32, /* rightshift */
1254 2, /* size (0 = byte, 1 = short, 2 = long) */
1255 64, /* bitsize */
1256 TRUE, /* pc_relative */
1257 10, /* bitpos */
1258 complain_overflow_dont, /* complain_on_overflow */
1259 bfd_elf_generic_reloc, /* special_function */
1260 "R_SH_GOTPC_MEDHI16", /* name */
1261 FALSE, /* partial_inplace */
1262 0, /* src_mask */
1263 0x3fffc00, /* dst_mask */
1264 TRUE), /* pcrel_offset */
1265
1266 /* Used in MOVI and SHORI ((x >> 48) & 65536). */
1267 HOWTO (R_SH_GOTPC_HI16, /* type */
1268 48, /* rightshift */
1269 2, /* size (0 = byte, 1 = short, 2 = long) */
1270 64, /* bitsize */
1271 TRUE, /* pc_relative */
1272 10, /* bitpos */
1273 complain_overflow_dont, /* complain_on_overflow */
1274 bfd_elf_generic_reloc, /* special_function */
1275 "R_SH_GOTPC_HI16", /* name */
1276 FALSE, /* partial_inplace */
1277 0, /* src_mask */
1278 0x3fffc00, /* dst_mask */
1279 TRUE), /* pcrel_offset */
1280
1281 /* Used in LD.L, FLD.S et al. */
1282 HOWTO (R_SH_GOT10BY4, /* type */
1283 2, /* rightshift */
1284 2, /* size (0 = byte, 1 = short, 2 = long) */
1285 12, /* bitsize */
1286 FALSE, /* pc_relative */
1287 10, /* bitpos */
1288 complain_overflow_signed, /* complain_on_overflow */
1289 bfd_elf_generic_reloc, /* special_function */
1290 "R_SH_GOT10BY4", /* name */
1291 FALSE, /* partial_inplace */
1292 0, /* src_mask */
1293 0xffc00, /* dst_mask */
1294 FALSE), /* pcrel_offset */
1295
1296 /* Used in LD.L, FLD.S et al. */
1297 HOWTO (R_SH_GOTPLT10BY4, /* type */
1298 2, /* rightshift */
1299 2, /* size (0 = byte, 1 = short, 2 = long) */
1300 12, /* bitsize */
1301 FALSE, /* pc_relative */
1302 10, /* bitpos */
1303 complain_overflow_signed, /* complain_on_overflow */
1304 bfd_elf_generic_reloc, /* special_function */
1305 "R_SH_GOTPLT10BY4", /* name */
1306 FALSE, /* partial_inplace */
1307 0, /* src_mask */
1308 0xffc00, /* dst_mask */
1309 FALSE), /* pcrel_offset */
1310
1311 /* Used in FLD.D, FST.P et al. */
1312 HOWTO (R_SH_GOT10BY8, /* type */
1313 3, /* rightshift */
1314 2, /* size (0 = byte, 1 = short, 2 = long) */
1315 13, /* bitsize */
1316 FALSE, /* pc_relative */
1317 10, /* bitpos */
1318 complain_overflow_signed, /* complain_on_overflow */
1319 bfd_elf_generic_reloc, /* special_function */
1320 "R_SH_GOT10BY8", /* name */
1321 FALSE, /* partial_inplace */
1322 0, /* src_mask */
1323 0xffc00, /* dst_mask */
1324 FALSE), /* pcrel_offset */
1325
1326 /* Used in FLD.D, FST.P et al. */
1327 HOWTO (R_SH_GOTPLT10BY8, /* type */
1328 3, /* rightshift */
1329 2, /* size (0 = byte, 1 = short, 2 = long) */
1330 13, /* bitsize */
1331 FALSE, /* pc_relative */
1332 10, /* bitpos */
1333 complain_overflow_signed, /* complain_on_overflow */
1334 bfd_elf_generic_reloc, /* special_function */
1335 "R_SH_GOTPLT10BY8", /* name */
1336 FALSE, /* partial_inplace */
1337 0, /* src_mask */
1338 0xffc00, /* dst_mask */
1339 FALSE), /* pcrel_offset */
1340
1341 HOWTO (R_SH_COPY64, /* type */
1342 0, /* rightshift */
1343 4, /* size (0 = byte, 1 = short, 2 = long) */
1344 64, /* bitsize */
1345 FALSE, /* pc_relative */
1346 0, /* bitpos */
1347 complain_overflow_dont, /* complain_on_overflow */
1348 bfd_elf_generic_reloc, /* special_function */
1349 "R_SH_COPY64", /* name */
1350 FALSE, /* partial_inplace */
1351 0, /* src_mask */
1352 ((bfd_vma) 0) - 1, /* dst_mask */
1353 FALSE), /* pcrel_offset */
1354
1355 HOWTO (R_SH_GLOB_DAT64, /* type */
1356 0, /* rightshift */
1357 4, /* size (0 = byte, 1 = short, 2 = long) */
1358 64, /* bitsize */
1359 FALSE, /* pc_relative */
1360 0, /* bitpos */
1361 complain_overflow_dont, /* complain_on_overflow */
1362 bfd_elf_generic_reloc, /* special_function */
1363 "R_SH_GLOB_DAT64", /* name */
1364 FALSE, /* partial_inplace */
1365 0, /* src_mask */
1366 ((bfd_vma) 0) - 1, /* dst_mask */
1367 FALSE), /* pcrel_offset */
1368
1369 HOWTO (R_SH_JMP_SLOT64, /* type */
1370 0, /* rightshift */
1371 4, /* size (0 = byte, 1 = short, 2 = long) */
1372 64, /* bitsize */
1373 FALSE, /* pc_relative */
1374 0, /* bitpos */
1375 complain_overflow_dont, /* complain_on_overflow */
1376 bfd_elf_generic_reloc, /* special_function */
1377 "R_SH_JMP_SLOT64", /* name */
1378 FALSE, /* partial_inplace */
1379 0, /* src_mask */
1380 ((bfd_vma) 0) - 1, /* dst_mask */
1381 FALSE), /* pcrel_offset */
1382
1383 HOWTO (R_SH_RELATIVE64, /* type */
1384 0, /* rightshift */
1385 4, /* size (0 = byte, 1 = short, 2 = long) */
1386 64, /* bitsize */
1387 FALSE, /* pc_relative */
1388 0, /* bitpos */
1389 complain_overflow_dont, /* complain_on_overflow */
1390 bfd_elf_generic_reloc, /* special_function */
1391 "R_SH_RELATIVE64", /* name */
1392 FALSE, /* partial_inplace */
1393 0, /* src_mask */
1394 ((bfd_vma) 0) - 1, /* dst_mask */
1395 FALSE), /* pcrel_offset */
1396
1397 EMPTY_HOWTO (197),
1398 EMPTY_HOWTO (198),
1399 EMPTY_HOWTO (199),
1400 EMPTY_HOWTO (200),
1401 EMPTY_HOWTO (201),
1402 EMPTY_HOWTO (202),
1403 EMPTY_HOWTO (203),
1404 EMPTY_HOWTO (204),
1405 EMPTY_HOWTO (205),
1406 EMPTY_HOWTO (206),
1407 EMPTY_HOWTO (207),
1408 EMPTY_HOWTO (208),
1409 EMPTY_HOWTO (209),
1410 EMPTY_HOWTO (210),
1411 EMPTY_HOWTO (211),
1412 EMPTY_HOWTO (212),
1413 EMPTY_HOWTO (213),
1414 EMPTY_HOWTO (214),
1415 EMPTY_HOWTO (215),
1416 EMPTY_HOWTO (216),
1417 EMPTY_HOWTO (217),
1418 EMPTY_HOWTO (218),
1419 EMPTY_HOWTO (219),
1420 EMPTY_HOWTO (220),
1421 EMPTY_HOWTO (221),
1422 EMPTY_HOWTO (222),
1423 EMPTY_HOWTO (223),
1424 EMPTY_HOWTO (224),
1425 EMPTY_HOWTO (225),
1426 EMPTY_HOWTO (226),
1427 EMPTY_HOWTO (227),
1428 EMPTY_HOWTO (228),
1429 EMPTY_HOWTO (229),
1430 EMPTY_HOWTO (230),
1431 EMPTY_HOWTO (231),
1432 EMPTY_HOWTO (232),
1433 EMPTY_HOWTO (233),
1434 EMPTY_HOWTO (234),
1435 EMPTY_HOWTO (235),
1436 EMPTY_HOWTO (236),
1437 EMPTY_HOWTO (237),
1438 EMPTY_HOWTO (238),
1439 EMPTY_HOWTO (239),
1440 EMPTY_HOWTO (240),
1441 EMPTY_HOWTO (241),
1442
1443 /* Relocations for SHmedia code. None of these are partial_inplace or
1444 use the field being relocated (except R_SH_PT_16). */
1445
1446 /* The assembler will generate this reloc before a block of SHmedia
1447 instructions. A section should be processed as assuming it contains
1448 data, unless this reloc is seen. Note that a block of SHcompact
1449 instructions are instead preceded by R_SH_CODE.
1450 This is currently not implemented, but should be used for SHmedia
1451 linker relaxation. */
1452 HOWTO (R_SH_SHMEDIA_CODE, /* type */
1453 0, /* rightshift */
1454 1, /* size (0 = byte, 1 = short, 2 = long) */
1455 0, /* bitsize */
1456 FALSE, /* pc_relative */
1457 0, /* bitpos */
1458 complain_overflow_unsigned, /* complain_on_overflow */
1459 sh_elf_ignore_reloc, /* special_function */
1460 "R_SH_SHMEDIA_CODE", /* name */
1461 FALSE, /* partial_inplace */
1462 0, /* src_mask */
1463 0, /* dst_mask */
1464 FALSE), /* pcrel_offset */
1465
1466 /* The assembler will generate this reloc at a PTA or PTB instruction,
1467 and the linker checks the right type of target, or changes a PTA to a
1468 PTB, if the original insn was PT. */
1469 HOWTO (R_SH_PT_16, /* type */
1470 2, /* rightshift */
1471 2, /* size (0 = byte, 1 = short, 2 = long) */
1472 18, /* bitsize */
1473 TRUE, /* pc_relative */
1474 10, /* bitpos */
1475 complain_overflow_signed, /* complain_on_overflow */
1476 bfd_elf_generic_reloc, /* special_function */
1477 "R_SH_PT_16", /* name */
1478 FALSE, /* partial_inplace */
1479 0, /* src_mask */
1480 0x3fffc00, /* dst_mask */
1481 TRUE), /* pcrel_offset */
1482
1483 /* Used in unexpanded MOVI. */
1484 HOWTO (R_SH_IMMS16, /* type */
1485 0, /* rightshift */
1486 2, /* size (0 = byte, 1 = short, 2 = long) */
1487 16, /* bitsize */
1488 FALSE, /* pc_relative */
1489 10, /* bitpos */
1490 complain_overflow_signed, /* complain_on_overflow */
1491 bfd_elf_generic_reloc, /* special_function */
1492 "R_SH_IMMS16", /* name */
1493 FALSE, /* partial_inplace */
1494 0, /* src_mask */
1495 0x3fffc00, /* dst_mask */
1496 FALSE), /* pcrel_offset */
1497
1498 /* Used in SHORI. */
1499 HOWTO (R_SH_IMMU16, /* type */
1500 0, /* rightshift */
1501 2, /* size (0 = byte, 1 = short, 2 = long) */
1502 16, /* bitsize */
1503 FALSE, /* pc_relative */
1504 10, /* bitpos */
1505 complain_overflow_unsigned, /* complain_on_overflow */
1506 bfd_elf_generic_reloc, /* special_function */
1507 "R_SH_IMMU16", /* name */
1508 FALSE, /* partial_inplace */
1509 0, /* src_mask */
1510 0x3fffc00, /* dst_mask */
1511 FALSE), /* pcrel_offset */
1512
1513 /* Used in MOVI and SHORI (x & 65536). */
1514 HOWTO (R_SH_IMM_LOW16, /* type */
1515 0, /* rightshift */
1516 2, /* size (0 = byte, 1 = short, 2 = long) */
1517 64, /* bitsize */
1518 FALSE, /* pc_relative */
1519 10, /* bitpos */
1520 complain_overflow_dont, /* complain_on_overflow */
1521 bfd_elf_generic_reloc, /* special_function */
1522 "R_SH_IMM_LOW16", /* name */
1523 FALSE, /* partial_inplace */
1524 0, /* src_mask */
1525 0x3fffc00, /* dst_mask */
1526 FALSE), /* pcrel_offset */
1527
1528 /* Used in MOVI and SHORI ((x - $) & 65536). */
1529 HOWTO (R_SH_IMM_LOW16_PCREL, /* type */
1530 0, /* rightshift */
1531 2, /* size (0 = byte, 1 = short, 2 = long) */
1532 64, /* bitsize */
1533 TRUE, /* pc_relative */
1534 10, /* bitpos */
1535 complain_overflow_dont, /* complain_on_overflow */
1536 bfd_elf_generic_reloc, /* special_function */
1537 "R_SH_IMM_LOW16_PCREL", /* name */
1538 FALSE, /* partial_inplace */
1539 0, /* src_mask */
1540 0x3fffc00, /* dst_mask */
1541 TRUE), /* pcrel_offset */
1542
1543 /* Used in MOVI and SHORI ((x >> 16) & 65536). */
1544 HOWTO (R_SH_IMM_MEDLOW16, /* type */
1545 16, /* rightshift */
1546 2, /* size (0 = byte, 1 = short, 2 = long) */
1547 64, /* bitsize */
1548 FALSE, /* pc_relative */
1549 10, /* bitpos */
1550 complain_overflow_dont, /* complain_on_overflow */
1551 bfd_elf_generic_reloc, /* special_function */
1552 "R_SH_IMM_MEDLOW16", /* name */
1553 FALSE, /* partial_inplace */
1554 0, /* src_mask */
1555 0x3fffc00, /* dst_mask */
1556 FALSE), /* pcrel_offset */
1557
1558 /* Used in MOVI and SHORI (((x - $) >> 16) & 65536). */
1559 HOWTO (R_SH_IMM_MEDLOW16_PCREL, /* type */
1560 16, /* rightshift */
1561 2, /* size (0 = byte, 1 = short, 2 = long) */
1562 64, /* bitsize */
1563 TRUE, /* pc_relative */
1564 10, /* bitpos */
1565 complain_overflow_dont, /* complain_on_overflow */
1566 bfd_elf_generic_reloc, /* special_function */
1567 "R_SH_IMM_MEDLOW16_PCREL", /* name */
1568 FALSE, /* partial_inplace */
1569 0, /* src_mask */
1570 0x3fffc00, /* dst_mask */
1571 TRUE), /* pcrel_offset */
1572
1573 /* Used in MOVI and SHORI ((x >> 32) & 65536). */
1574 HOWTO (R_SH_IMM_MEDHI16, /* type */
1575 32, /* rightshift */
1576 2, /* size (0 = byte, 1 = short, 2 = long) */
1577 64, /* bitsize */
1578 FALSE, /* pc_relative */
1579 10, /* bitpos */
1580 complain_overflow_dont, /* complain_on_overflow */
1581 bfd_elf_generic_reloc, /* special_function */
1582 "R_SH_IMM_MEDHI16", /* name */
1583 FALSE, /* partial_inplace */
1584 0, /* src_mask */
1585 0x3fffc00, /* dst_mask */
1586 FALSE), /* pcrel_offset */
1587
1588 /* Used in MOVI and SHORI (((x - $) >> 32) & 65536). */
1589 HOWTO (R_SH_IMM_MEDHI16_PCREL, /* type */
1590 32, /* rightshift */
1591 2, /* size (0 = byte, 1 = short, 2 = long) */
1592 64, /* bitsize */
1593 TRUE, /* pc_relative */
1594 10, /* bitpos */
1595 complain_overflow_dont, /* complain_on_overflow */
1596 bfd_elf_generic_reloc, /* special_function */
1597 "R_SH_IMM_MEDHI16_PCREL", /* name */
1598 FALSE, /* partial_inplace */
1599 0, /* src_mask */
1600 0x3fffc00, /* dst_mask */
1601 TRUE), /* pcrel_offset */
1602
1603 /* Used in MOVI and SHORI ((x >> 48) & 65536). */
1604 HOWTO (R_SH_IMM_HI16, /* type */
1605 48, /* rightshift */
1606 2, /* size (0 = byte, 1 = short, 2 = long) */
1607 64, /* bitsize */
1608 FALSE, /* pc_relative */
1609 10, /* bitpos */
1610 complain_overflow_dont, /* complain_on_overflow */
1611 bfd_elf_generic_reloc, /* special_function */
1612 "R_SH_IMM_HI16", /* name */
1613 FALSE, /* partial_inplace */
1614 0, /* src_mask */
1615 0x3fffc00, /* dst_mask */
1616 FALSE), /* pcrel_offset */
1617
1618 /* Used in MOVI and SHORI (((x - $) >> 48) & 65536). */
1619 HOWTO (R_SH_IMM_HI16_PCREL, /* type */
1620 48, /* rightshift */
1621 2, /* size (0 = byte, 1 = short, 2 = long) */
1622 64, /* bitsize */
1623 TRUE, /* pc_relative */
1624 10, /* bitpos */
1625 complain_overflow_dont, /* complain_on_overflow */
1626 bfd_elf_generic_reloc, /* special_function */
1627 "R_SH_IMM_HI16_PCREL", /* name */
1628 FALSE, /* partial_inplace */
1629 0, /* src_mask */
1630 0x3fffc00, /* dst_mask */
1631 TRUE), /* pcrel_offset */
1632
1633 /* For the .uaquad pseudo. */
1634 HOWTO (R_SH_64, /* type */
1635 0, /* rightshift */
1636 4, /* size (0 = byte, 1 = short, 2 = long) */
1637 64, /* bitsize */
1638 FALSE, /* pc_relative */
1639 0, /* bitpos */
1640 complain_overflow_dont, /* complain_on_overflow */
1641 bfd_elf_generic_reloc, /* special_function */
1642 "R_SH_64", /* name */
1643 FALSE, /* partial_inplace */
1644 0, /* src_mask */
1645 ((bfd_vma) 0) - 1, /* dst_mask */
1646 FALSE), /* pcrel_offset */
1647
1648 /* For the .uaquad pseudo, (x - $). */
1649 HOWTO (R_SH_64_PCREL, /* type */
1650 48, /* rightshift */
1651 2, /* size (0 = byte, 1 = short, 2 = long) */
1652 64, /* bitsize */
1653 TRUE, /* pc_relative */
1654 10, /* bitpos */
1655 complain_overflow_dont, /* complain_on_overflow */
1656 bfd_elf_generic_reloc, /* special_function */
1657 "R_SH_64_PCREL", /* name */
1658 FALSE, /* partial_inplace */
1659 0, /* src_mask */
1660 ((bfd_vma) 0) - 1, /* dst_mask */
1661 TRUE), /* pcrel_offset */
1662
1663 #endif
1664 };
1665
1666 static bfd_reloc_status_type
1667 sh_elf_reloc_loop (r_type, input_bfd, input_section, contents, addr,
1668 symbol_section, start, end)
1669 int r_type ATTRIBUTE_UNUSED;
1670 bfd *input_bfd;
1671 asection *input_section;
1672 bfd_byte *contents;
1673 bfd_vma addr;
1674 asection *symbol_section;
1675 bfd_vma start, end;
1676 {
1677 static bfd_vma last_addr;
1678 static asection *last_symbol_section;
1679 bfd_byte *start_ptr, *ptr, *last_ptr;
1680 int diff, cum_diff;
1681 bfd_signed_vma x;
1682 int insn;
1683
1684 /* Sanity check the address. */
1685 if (addr > input_section->_raw_size)
1686 return bfd_reloc_outofrange;
1687
1688 /* We require the start and end relocations to be processed consecutively -
1689 although we allow then to be processed forwards or backwards. */
1690 if (! last_addr)
1691 {
1692 last_addr = addr;
1693 last_symbol_section = symbol_section;
1694 return bfd_reloc_ok;
1695 }
1696 if (last_addr != addr)
1697 abort ();
1698 last_addr = 0;
1699
1700 if (! symbol_section || last_symbol_section != symbol_section || end < start)
1701 return bfd_reloc_outofrange;
1702
1703 /* Get the symbol_section contents. */
1704 if (symbol_section != input_section)
1705 {
1706 if (elf_section_data (symbol_section)->this_hdr.contents != NULL)
1707 contents = elf_section_data (symbol_section)->this_hdr.contents;
1708 else
1709 {
1710 contents = (bfd_byte *) bfd_malloc (symbol_section->_raw_size);
1711 if (contents == NULL)
1712 return bfd_reloc_outofrange;
1713 if (! bfd_get_section_contents (input_bfd, symbol_section, contents,
1714 (file_ptr) 0,
1715 symbol_section->_raw_size))
1716 {
1717 free (contents);
1718 return bfd_reloc_outofrange;
1719 }
1720 }
1721 }
1722 #define IS_PPI(PTR) ((bfd_get_16 (input_bfd, (PTR)) & 0xfc00) == 0xf800)
1723 start_ptr = contents + start;
1724 for (cum_diff = -6, ptr = contents + end; cum_diff < 0 && ptr > start_ptr;)
1725 {
1726 for (last_ptr = ptr, ptr -= 4; ptr >= start_ptr && IS_PPI (ptr);)
1727 ptr -= 2;
1728 ptr += 2;
1729 diff = (last_ptr - ptr) >> 1;
1730 cum_diff += diff & 1;
1731 cum_diff += diff;
1732 }
1733 /* Calculate the start / end values to load into rs / re minus four -
1734 so that will cancel out the four we would otherwise have to add to
1735 addr to get the value to subtract in order to get relative addressing. */
1736 if (cum_diff >= 0)
1737 {
1738 start -= 4;
1739 end = (ptr + cum_diff * 2) - contents;
1740 }
1741 else
1742 {
1743 bfd_vma start0 = start - 4;
1744
1745 while (start0 && IS_PPI (contents + start0))
1746 start0 -= 2;
1747 start0 = start - 2 - ((start - start0) & 2);
1748 start = start0 - cum_diff - 2;
1749 end = start0;
1750 }
1751
1752 if (contents != NULL
1753 && elf_section_data (symbol_section)->this_hdr.contents != contents)
1754 free (contents);
1755
1756 insn = bfd_get_16 (input_bfd, contents + addr);
1757
1758 x = (insn & 0x200 ? end : start) - addr;
1759 if (input_section != symbol_section)
1760 x += ((symbol_section->output_section->vma + symbol_section->output_offset)
1761 - (input_section->output_section->vma
1762 + input_section->output_offset));
1763 x >>= 1;
1764 if (x < -128 || x > 127)
1765 return bfd_reloc_overflow;
1766
1767 x = (insn & ~0xff) | (x & 0xff);
1768 bfd_put_16 (input_bfd, (bfd_vma) x, contents + addr);
1769
1770 return bfd_reloc_ok;
1771 }
1772
1773 /* This function is used for normal relocs. This used to be like the COFF
1774 function, and is almost certainly incorrect for other ELF targets. */
1775
1776 static bfd_reloc_status_type
1777 sh_elf_reloc (abfd, reloc_entry, symbol_in, data, input_section, output_bfd,
1778 error_message)
1779 bfd *abfd;
1780 arelent *reloc_entry;
1781 asymbol *symbol_in;
1782 PTR data;
1783 asection *input_section;
1784 bfd *output_bfd;
1785 char **error_message ATTRIBUTE_UNUSED;
1786 {
1787 unsigned long insn;
1788 bfd_vma sym_value;
1789 enum elf_sh_reloc_type r_type;
1790 bfd_vma addr = reloc_entry->address;
1791 bfd_byte *hit_data = addr + (bfd_byte *) data;
1792
1793 r_type = (enum elf_sh_reloc_type) reloc_entry->howto->type;
1794
1795 if (output_bfd != NULL)
1796 {
1797 /* Partial linking--do nothing. */
1798 reloc_entry->address += input_section->output_offset;
1799 return bfd_reloc_ok;
1800 }
1801
1802 /* Almost all relocs have to do with relaxing. If any work must be
1803 done for them, it has been done in sh_relax_section. */
1804 if (r_type == R_SH_IND12W && (symbol_in->flags & BSF_LOCAL) != 0)
1805 return bfd_reloc_ok;
1806
1807 if (symbol_in != NULL
1808 && bfd_is_und_section (symbol_in->section))
1809 return bfd_reloc_undefined;
1810
1811 if (bfd_is_com_section (symbol_in->section))
1812 sym_value = 0;
1813 else
1814 sym_value = (symbol_in->value +
1815 symbol_in->section->output_section->vma +
1816 symbol_in->section->output_offset);
1817
1818 switch (r_type)
1819 {
1820 case R_SH_DIR32:
1821 insn = bfd_get_32 (abfd, hit_data);
1822 insn += sym_value + reloc_entry->addend;
1823 bfd_put_32 (abfd, (bfd_vma) insn, hit_data);
1824 break;
1825 case R_SH_IND12W:
1826 insn = bfd_get_16 (abfd, hit_data);
1827 sym_value += reloc_entry->addend;
1828 sym_value -= (input_section->output_section->vma
1829 + input_section->output_offset
1830 + addr
1831 + 4);
1832 sym_value += (insn & 0xfff) << 1;
1833 if (insn & 0x800)
1834 sym_value -= 0x1000;
1835 insn = (insn & 0xf000) | (sym_value & 0xfff);
1836 bfd_put_16 (abfd, (bfd_vma) insn, hit_data);
1837 if (sym_value < (bfd_vma) -0x1000 || sym_value >= 0x1000)
1838 return bfd_reloc_overflow;
1839 break;
1840 default:
1841 abort ();
1842 break;
1843 }
1844
1845 return bfd_reloc_ok;
1846 }
1847
1848 /* This function is used for relocs which are only used for relaxing,
1849 which the linker should otherwise ignore. */
1850
1851 static bfd_reloc_status_type
1852 sh_elf_ignore_reloc (abfd, reloc_entry, symbol, data, input_section,
1853 output_bfd, error_message)
1854 bfd *abfd ATTRIBUTE_UNUSED;
1855 arelent *reloc_entry;
1856 asymbol *symbol ATTRIBUTE_UNUSED;
1857 PTR data ATTRIBUTE_UNUSED;
1858 asection *input_section;
1859 bfd *output_bfd;
1860 char **error_message ATTRIBUTE_UNUSED;
1861 {
1862 if (output_bfd != NULL)
1863 reloc_entry->address += input_section->output_offset;
1864 return bfd_reloc_ok;
1865 }
1866
1867 /* This structure is used to map BFD reloc codes to SH ELF relocs. */
1868
1869 struct elf_reloc_map
1870 {
1871 bfd_reloc_code_real_type bfd_reloc_val;
1872 unsigned char elf_reloc_val;
1873 };
1874
1875 /* An array mapping BFD reloc codes to SH ELF relocs. */
1876
1877 static const struct elf_reloc_map sh_reloc_map[] =
1878 {
1879 { BFD_RELOC_NONE, R_SH_NONE },
1880 { BFD_RELOC_32, R_SH_DIR32 },
1881 { BFD_RELOC_CTOR, R_SH_DIR32 },
1882 { BFD_RELOC_32_PCREL, R_SH_REL32 },
1883 { BFD_RELOC_SH_PCDISP8BY2, R_SH_DIR8WPN },
1884 { BFD_RELOC_SH_PCDISP12BY2, R_SH_IND12W },
1885 { BFD_RELOC_SH_PCRELIMM8BY2, R_SH_DIR8WPZ },
1886 { BFD_RELOC_SH_PCRELIMM8BY4, R_SH_DIR8WPL },
1887 { BFD_RELOC_8_PCREL, R_SH_SWITCH8 },
1888 { BFD_RELOC_SH_SWITCH16, R_SH_SWITCH16 },
1889 { BFD_RELOC_SH_SWITCH32, R_SH_SWITCH32 },
1890 { BFD_RELOC_SH_USES, R_SH_USES },
1891 { BFD_RELOC_SH_COUNT, R_SH_COUNT },
1892 { BFD_RELOC_SH_ALIGN, R_SH_ALIGN },
1893 { BFD_RELOC_SH_CODE, R_SH_CODE },
1894 { BFD_RELOC_SH_DATA, R_SH_DATA },
1895 { BFD_RELOC_SH_LABEL, R_SH_LABEL },
1896 { BFD_RELOC_VTABLE_INHERIT, R_SH_GNU_VTINHERIT },
1897 { BFD_RELOC_VTABLE_ENTRY, R_SH_GNU_VTENTRY },
1898 { BFD_RELOC_SH_LOOP_START, R_SH_LOOP_START },
1899 { BFD_RELOC_SH_LOOP_END, R_SH_LOOP_END },
1900 { BFD_RELOC_SH_TLS_GD_32, R_SH_TLS_GD_32 },
1901 { BFD_RELOC_SH_TLS_LD_32, R_SH_TLS_LD_32 },
1902 { BFD_RELOC_SH_TLS_LDO_32, R_SH_TLS_LDO_32 },
1903 { BFD_RELOC_SH_TLS_IE_32, R_SH_TLS_IE_32 },
1904 { BFD_RELOC_SH_TLS_LE_32, R_SH_TLS_LE_32 },
1905 { BFD_RELOC_SH_TLS_DTPMOD32, R_SH_TLS_DTPMOD32 },
1906 { BFD_RELOC_SH_TLS_DTPOFF32, R_SH_TLS_DTPOFF32 },
1907 { BFD_RELOC_SH_TLS_TPOFF32, R_SH_TLS_TPOFF32 },
1908 { BFD_RELOC_32_GOT_PCREL, R_SH_GOT32 },
1909 { BFD_RELOC_32_PLT_PCREL, R_SH_PLT32 },
1910 { BFD_RELOC_SH_COPY, R_SH_COPY },
1911 { BFD_RELOC_SH_GLOB_DAT, R_SH_GLOB_DAT },
1912 { BFD_RELOC_SH_JMP_SLOT, R_SH_JMP_SLOT },
1913 { BFD_RELOC_SH_RELATIVE, R_SH_RELATIVE },
1914 { BFD_RELOC_32_GOTOFF, R_SH_GOTOFF },
1915 { BFD_RELOC_SH_GOTPC, R_SH_GOTPC },
1916 { BFD_RELOC_SH_GOTPLT32, R_SH_GOTPLT32 },
1917 #ifdef INCLUDE_SHMEDIA
1918 { BFD_RELOC_SH_GOT_LOW16, R_SH_GOT_LOW16 },
1919 { BFD_RELOC_SH_GOT_MEDLOW16, R_SH_GOT_MEDLOW16 },
1920 { BFD_RELOC_SH_GOT_MEDHI16, R_SH_GOT_MEDHI16 },
1921 { BFD_RELOC_SH_GOT_HI16, R_SH_GOT_HI16 },
1922 { BFD_RELOC_SH_GOTPLT_LOW16, R_SH_GOTPLT_LOW16 },
1923 { BFD_RELOC_SH_GOTPLT_MEDLOW16, R_SH_GOTPLT_MEDLOW16 },
1924 { BFD_RELOC_SH_GOTPLT_MEDHI16, R_SH_GOTPLT_MEDHI16 },
1925 { BFD_RELOC_SH_GOTPLT_HI16, R_SH_GOTPLT_HI16 },
1926 { BFD_RELOC_SH_PLT_LOW16, R_SH_PLT_LOW16 },
1927 { BFD_RELOC_SH_PLT_MEDLOW16, R_SH_PLT_MEDLOW16 },
1928 { BFD_RELOC_SH_PLT_MEDHI16, R_SH_PLT_MEDHI16 },
1929 { BFD_RELOC_SH_PLT_HI16, R_SH_PLT_HI16 },
1930 { BFD_RELOC_SH_GOTOFF_LOW16, R_SH_GOTOFF_LOW16 },
1931 { BFD_RELOC_SH_GOTOFF_MEDLOW16, R_SH_GOTOFF_MEDLOW16 },
1932 { BFD_RELOC_SH_GOTOFF_MEDHI16, R_SH_GOTOFF_MEDHI16 },
1933 { BFD_RELOC_SH_GOTOFF_HI16, R_SH_GOTOFF_HI16 },
1934 { BFD_RELOC_SH_GOTPC_LOW16, R_SH_GOTPC_LOW16 },
1935 { BFD_RELOC_SH_GOTPC_MEDLOW16, R_SH_GOTPC_MEDLOW16 },
1936 { BFD_RELOC_SH_GOTPC_MEDHI16, R_SH_GOTPC_MEDHI16 },
1937 { BFD_RELOC_SH_GOTPC_HI16, R_SH_GOTPC_HI16 },
1938 { BFD_RELOC_SH_COPY64, R_SH_COPY64 },
1939 { BFD_RELOC_SH_GLOB_DAT64, R_SH_GLOB_DAT64 },
1940 { BFD_RELOC_SH_JMP_SLOT64, R_SH_JMP_SLOT64 },
1941 { BFD_RELOC_SH_RELATIVE64, R_SH_RELATIVE64 },
1942 { BFD_RELOC_SH_GOT10BY4, R_SH_GOT10BY4 },
1943 { BFD_RELOC_SH_GOT10BY8, R_SH_GOT10BY8 },
1944 { BFD_RELOC_SH_GOTPLT10BY4, R_SH_GOTPLT10BY4 },
1945 { BFD_RELOC_SH_GOTPLT10BY8, R_SH_GOTPLT10BY8 },
1946 { BFD_RELOC_SH_PT_16, R_SH_PT_16 },
1947 { BFD_RELOC_SH_SHMEDIA_CODE, R_SH_SHMEDIA_CODE },
1948 { BFD_RELOC_SH_IMMU5, R_SH_DIR5U },
1949 { BFD_RELOC_SH_IMMS6, R_SH_DIR6S },
1950 { BFD_RELOC_SH_IMMU6, R_SH_DIR6U },
1951 { BFD_RELOC_SH_IMMS10, R_SH_DIR10S },
1952 { BFD_RELOC_SH_IMMS10BY2, R_SH_DIR10SW },
1953 { BFD_RELOC_SH_IMMS10BY4, R_SH_DIR10SL },
1954 { BFD_RELOC_SH_IMMS10BY8, R_SH_DIR10SQ },
1955 { BFD_RELOC_SH_IMMS16, R_SH_IMMS16 },
1956 { BFD_RELOC_SH_IMMU16, R_SH_IMMU16 },
1957 { BFD_RELOC_SH_IMM_LOW16, R_SH_IMM_LOW16 },
1958 { BFD_RELOC_SH_IMM_LOW16_PCREL, R_SH_IMM_LOW16_PCREL },
1959 { BFD_RELOC_SH_IMM_MEDLOW16, R_SH_IMM_MEDLOW16 },
1960 { BFD_RELOC_SH_IMM_MEDLOW16_PCREL, R_SH_IMM_MEDLOW16_PCREL },
1961 { BFD_RELOC_SH_IMM_MEDHI16, R_SH_IMM_MEDHI16 },
1962 { BFD_RELOC_SH_IMM_MEDHI16_PCREL, R_SH_IMM_MEDHI16_PCREL },
1963 { BFD_RELOC_SH_IMM_HI16, R_SH_IMM_HI16 },
1964 { BFD_RELOC_SH_IMM_HI16_PCREL, R_SH_IMM_HI16_PCREL },
1965 { BFD_RELOC_64, R_SH_64 },
1966 { BFD_RELOC_64_PCREL, R_SH_64_PCREL },
1967 #endif /* not INCLUDE_SHMEDIA */
1968 };
1969
1970 /* Given a BFD reloc code, return the howto structure for the
1971 corresponding SH ELf reloc. */
1972
1973 static reloc_howto_type *
1974 sh_elf_reloc_type_lookup (abfd, code)
1975 bfd *abfd ATTRIBUTE_UNUSED;
1976 bfd_reloc_code_real_type code;
1977 {
1978 unsigned int i;
1979
1980 for (i = 0; i < sizeof (sh_reloc_map) / sizeof (struct elf_reloc_map); i++)
1981 {
1982 if (sh_reloc_map[i].bfd_reloc_val == code)
1983 return &sh_elf_howto_table[(int) sh_reloc_map[i].elf_reloc_val];
1984 }
1985
1986 return NULL;
1987 }
1988
1989 /* Given an ELF reloc, fill in the howto field of a relent. */
1990
1991 static void
1992 sh_elf_info_to_howto (abfd, cache_ptr, dst)
1993 bfd *abfd ATTRIBUTE_UNUSED;
1994 arelent *cache_ptr;
1995 Elf_Internal_Rela *dst;
1996 {
1997 unsigned int r;
1998
1999 r = ELF32_R_TYPE (dst->r_info);
2000
2001 BFD_ASSERT (r < (unsigned int) R_SH_max);
2002 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC || r > R_SH_LAST_INVALID_RELOC);
2003 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC_2 || r > R_SH_LAST_INVALID_RELOC_2);
2004 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC_3 || r > R_SH_LAST_INVALID_RELOC_3);
2005 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC_4 || r > R_SH_LAST_INVALID_RELOC_4);
2006 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC_5 || r > R_SH_LAST_INVALID_RELOC_5);
2007
2008 cache_ptr->howto = &sh_elf_howto_table[r];
2009 }
2010 \f
2011 /* This function handles relaxing for SH ELF. See the corresponding
2012 function in coff-sh.c for a description of what this does. FIXME:
2013 There is a lot of duplication here between this code and the COFF
2014 specific code. The format of relocs and symbols is wound deeply
2015 into this code, but it would still be better if the duplication
2016 could be eliminated somehow. Note in particular that although both
2017 functions use symbols like R_SH_CODE, those symbols have different
2018 values; in coff-sh.c they come from include/coff/sh.h, whereas here
2019 they come from enum elf_sh_reloc_type in include/elf/sh.h. */
2020
2021 static bfd_boolean
2022 sh_elf_relax_section (abfd, sec, link_info, again)
2023 bfd *abfd;
2024 asection *sec;
2025 struct bfd_link_info *link_info;
2026 bfd_boolean *again;
2027 {
2028 Elf_Internal_Shdr *symtab_hdr;
2029 Elf_Internal_Rela *internal_relocs;
2030 bfd_boolean have_code;
2031 Elf_Internal_Rela *irel, *irelend;
2032 bfd_byte *contents = NULL;
2033 Elf_Internal_Sym *isymbuf = NULL;
2034
2035 *again = FALSE;
2036
2037 if (link_info->relocatable
2038 || (sec->flags & SEC_RELOC) == 0
2039 || sec->reloc_count == 0)
2040 return TRUE;
2041
2042 #ifdef INCLUDE_SHMEDIA
2043 if (elf_section_data (sec)->this_hdr.sh_flags
2044 & (SHF_SH5_ISA32 | SHF_SH5_ISA32_MIXED))
2045 {
2046 return TRUE;
2047 }
2048 #endif
2049
2050 /* If this is the first time we have been called for this section,
2051 initialize the cooked size. */
2052 if (sec->_cooked_size == 0)
2053 sec->_cooked_size = sec->_raw_size;
2054
2055 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2056
2057 internal_relocs = (_bfd_elf_link_read_relocs
2058 (abfd, sec, (PTR) NULL, (Elf_Internal_Rela *) NULL,
2059 link_info->keep_memory));
2060 if (internal_relocs == NULL)
2061 goto error_return;
2062
2063 have_code = FALSE;
2064
2065 irelend = internal_relocs + sec->reloc_count;
2066 for (irel = internal_relocs; irel < irelend; irel++)
2067 {
2068 bfd_vma laddr, paddr, symval;
2069 unsigned short insn;
2070 Elf_Internal_Rela *irelfn, *irelscan, *irelcount;
2071 bfd_signed_vma foff;
2072
2073 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_CODE)
2074 have_code = TRUE;
2075
2076 if (ELF32_R_TYPE (irel->r_info) != (int) R_SH_USES)
2077 continue;
2078
2079 /* Get the section contents. */
2080 if (contents == NULL)
2081 {
2082 if (elf_section_data (sec)->this_hdr.contents != NULL)
2083 contents = elf_section_data (sec)->this_hdr.contents;
2084 else
2085 {
2086 contents = (bfd_byte *) bfd_malloc (sec->_raw_size);
2087 if (contents == NULL)
2088 goto error_return;
2089
2090 if (! bfd_get_section_contents (abfd, sec, contents,
2091 (file_ptr) 0, sec->_raw_size))
2092 goto error_return;
2093 }
2094 }
2095
2096 /* The r_addend field of the R_SH_USES reloc will point us to
2097 the register load. The 4 is because the r_addend field is
2098 computed as though it were a jump offset, which are based
2099 from 4 bytes after the jump instruction. */
2100 laddr = irel->r_offset + 4 + irel->r_addend;
2101 if (laddr >= sec->_raw_size)
2102 {
2103 (*_bfd_error_handler) (_("%s: 0x%lx: warning: bad R_SH_USES offset"),
2104 bfd_archive_filename (abfd),
2105 (unsigned long) irel->r_offset);
2106 continue;
2107 }
2108 insn = bfd_get_16 (abfd, contents + laddr);
2109
2110 /* If the instruction is not mov.l NN,rN, we don't know what to
2111 do. */
2112 if ((insn & 0xf000) != 0xd000)
2113 {
2114 ((*_bfd_error_handler)
2115 (_("%s: 0x%lx: warning: R_SH_USES points to unrecognized insn 0x%x"),
2116 bfd_archive_filename (abfd), (unsigned long) irel->r_offset, insn));
2117 continue;
2118 }
2119
2120 /* Get the address from which the register is being loaded. The
2121 displacement in the mov.l instruction is quadrupled. It is a
2122 displacement from four bytes after the movl instruction, but,
2123 before adding in the PC address, two least significant bits
2124 of the PC are cleared. We assume that the section is aligned
2125 on a four byte boundary. */
2126 paddr = insn & 0xff;
2127 paddr *= 4;
2128 paddr += (laddr + 4) &~ (bfd_vma) 3;
2129 if (paddr >= sec->_raw_size)
2130 {
2131 ((*_bfd_error_handler)
2132 (_("%s: 0x%lx: warning: bad R_SH_USES load offset"),
2133 bfd_archive_filename (abfd), (unsigned long) irel->r_offset));
2134 continue;
2135 }
2136
2137 /* Get the reloc for the address from which the register is
2138 being loaded. This reloc will tell us which function is
2139 actually being called. */
2140 for (irelfn = internal_relocs; irelfn < irelend; irelfn++)
2141 if (irelfn->r_offset == paddr
2142 && ELF32_R_TYPE (irelfn->r_info) == (int) R_SH_DIR32)
2143 break;
2144 if (irelfn >= irelend)
2145 {
2146 ((*_bfd_error_handler)
2147 (_("%s: 0x%lx: warning: could not find expected reloc"),
2148 bfd_archive_filename (abfd), (unsigned long) paddr));
2149 continue;
2150 }
2151
2152 /* Read this BFD's symbols if we haven't done so already. */
2153 if (isymbuf == NULL && symtab_hdr->sh_info != 0)
2154 {
2155 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
2156 if (isymbuf == NULL)
2157 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
2158 symtab_hdr->sh_info, 0,
2159 NULL, NULL, NULL);
2160 if (isymbuf == NULL)
2161 goto error_return;
2162 }
2163
2164 /* Get the value of the symbol referred to by the reloc. */
2165 if (ELF32_R_SYM (irelfn->r_info) < symtab_hdr->sh_info)
2166 {
2167 /* A local symbol. */
2168 Elf_Internal_Sym *isym;
2169
2170 isym = isymbuf + ELF32_R_SYM (irelfn->r_info);
2171 if (isym->st_shndx
2172 != (unsigned int) _bfd_elf_section_from_bfd_section (abfd, sec))
2173 {
2174 ((*_bfd_error_handler)
2175 (_("%s: 0x%lx: warning: symbol in unexpected section"),
2176 bfd_archive_filename (abfd), (unsigned long) paddr));
2177 continue;
2178 }
2179
2180 symval = (isym->st_value
2181 + sec->output_section->vma
2182 + sec->output_offset);
2183 }
2184 else
2185 {
2186 unsigned long indx;
2187 struct elf_link_hash_entry *h;
2188
2189 indx = ELF32_R_SYM (irelfn->r_info) - symtab_hdr->sh_info;
2190 h = elf_sym_hashes (abfd)[indx];
2191 BFD_ASSERT (h != NULL);
2192 if (h->root.type != bfd_link_hash_defined
2193 && h->root.type != bfd_link_hash_defweak)
2194 {
2195 /* This appears to be a reference to an undefined
2196 symbol. Just ignore it--it will be caught by the
2197 regular reloc processing. */
2198 continue;
2199 }
2200
2201 symval = (h->root.u.def.value
2202 + h->root.u.def.section->output_section->vma
2203 + h->root.u.def.section->output_offset);
2204 }
2205
2206 symval += bfd_get_32 (abfd, contents + paddr);
2207
2208 /* See if this function call can be shortened. */
2209 foff = (symval
2210 - (irel->r_offset
2211 + sec->output_section->vma
2212 + sec->output_offset
2213 + 4));
2214 if (foff < -0x1000 || foff >= 0x1000)
2215 {
2216 /* After all that work, we can't shorten this function call. */
2217 continue;
2218 }
2219
2220 /* Shorten the function call. */
2221
2222 /* For simplicity of coding, we are going to modify the section
2223 contents, the section relocs, and the BFD symbol table. We
2224 must tell the rest of the code not to free up this
2225 information. It would be possible to instead create a table
2226 of changes which have to be made, as is done in coff-mips.c;
2227 that would be more work, but would require less memory when
2228 the linker is run. */
2229
2230 elf_section_data (sec)->relocs = internal_relocs;
2231 elf_section_data (sec)->this_hdr.contents = contents;
2232 symtab_hdr->contents = (unsigned char *) isymbuf;
2233
2234 /* Replace the jsr with a bsr. */
2235
2236 /* Change the R_SH_USES reloc into an R_SH_IND12W reloc, and
2237 replace the jsr with a bsr. */
2238 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irelfn->r_info), R_SH_IND12W);
2239 /* We used to test (ELF32_R_SYM (irelfn->r_info) < symtab_hdr->sh_info)
2240 here, but that only checks if the symbol is an external symbol,
2241 not if the symbol is in a different section. Besides, we need
2242 a consistent meaning for the relocation, so we just assume here that
2243 the value of the symbol is not available. */
2244 #if 0
2245 if (ELF32_R_SYM (irelfn->r_info) < symtab_hdr->sh_info)
2246 {
2247 /* If this needs to be changed because of future relaxing,
2248 it will be handled here like other internal IND12W
2249 relocs. */
2250 bfd_put_16 (abfd,
2251 (bfd_vma) 0xb000 | ((foff >> 1) & 0xfff),
2252 contents + irel->r_offset);
2253 }
2254 else
2255 #endif
2256 {
2257 /* We can't fully resolve this yet, because the external
2258 symbol value may be changed by future relaxing. We let
2259 the final link phase handle it. */
2260 bfd_put_16 (abfd, (bfd_vma) 0xb000, contents + irel->r_offset);
2261 }
2262 irel->r_addend = -4;
2263
2264 /* See if there is another R_SH_USES reloc referring to the same
2265 register load. */
2266 for (irelscan = internal_relocs; irelscan < irelend; irelscan++)
2267 if (ELF32_R_TYPE (irelscan->r_info) == (int) R_SH_USES
2268 && laddr == irelscan->r_offset + 4 + irelscan->r_addend)
2269 break;
2270 if (irelscan < irelend)
2271 {
2272 /* Some other function call depends upon this register load,
2273 and we have not yet converted that function call.
2274 Indeed, we may never be able to convert it. There is
2275 nothing else we can do at this point. */
2276 continue;
2277 }
2278
2279 /* Look for a R_SH_COUNT reloc on the location where the
2280 function address is stored. Do this before deleting any
2281 bytes, to avoid confusion about the address. */
2282 for (irelcount = internal_relocs; irelcount < irelend; irelcount++)
2283 if (irelcount->r_offset == paddr
2284 && ELF32_R_TYPE (irelcount->r_info) == (int) R_SH_COUNT)
2285 break;
2286
2287 /* Delete the register load. */
2288 if (! sh_elf_relax_delete_bytes (abfd, sec, laddr, 2))
2289 goto error_return;
2290
2291 /* That will change things, so, just in case it permits some
2292 other function call to come within range, we should relax
2293 again. Note that this is not required, and it may be slow. */
2294 *again = TRUE;
2295
2296 /* Now check whether we got a COUNT reloc. */
2297 if (irelcount >= irelend)
2298 {
2299 ((*_bfd_error_handler)
2300 (_("%s: 0x%lx: warning: could not find expected COUNT reloc"),
2301 bfd_archive_filename (abfd), (unsigned long) paddr));
2302 continue;
2303 }
2304
2305 /* The number of uses is stored in the r_addend field. We've
2306 just deleted one. */
2307 if (irelcount->r_addend == 0)
2308 {
2309 ((*_bfd_error_handler) (_("%s: 0x%lx: warning: bad count"),
2310 bfd_archive_filename (abfd),
2311 (unsigned long) paddr));
2312 continue;
2313 }
2314
2315 --irelcount->r_addend;
2316
2317 /* If there are no more uses, we can delete the address. Reload
2318 the address from irelfn, in case it was changed by the
2319 previous call to sh_elf_relax_delete_bytes. */
2320 if (irelcount->r_addend == 0)
2321 {
2322 if (! sh_elf_relax_delete_bytes (abfd, sec, irelfn->r_offset, 4))
2323 goto error_return;
2324 }
2325
2326 /* We've done all we can with that function call. */
2327 }
2328
2329 /* Look for load and store instructions that we can align on four
2330 byte boundaries. */
2331 if ((elf_elfheader (abfd)->e_flags & EF_SH_MACH_MASK) != EF_SH4
2332 && have_code)
2333 {
2334 bfd_boolean swapped;
2335
2336 /* Get the section contents. */
2337 if (contents == NULL)
2338 {
2339 if (elf_section_data (sec)->this_hdr.contents != NULL)
2340 contents = elf_section_data (sec)->this_hdr.contents;
2341 else
2342 {
2343 contents = (bfd_byte *) bfd_malloc (sec->_raw_size);
2344 if (contents == NULL)
2345 goto error_return;
2346
2347 if (! bfd_get_section_contents (abfd, sec, contents,
2348 (file_ptr) 0, sec->_raw_size))
2349 goto error_return;
2350 }
2351 }
2352
2353 if (! sh_elf_align_loads (abfd, sec, internal_relocs, contents,
2354 &swapped))
2355 goto error_return;
2356
2357 if (swapped)
2358 {
2359 elf_section_data (sec)->relocs = internal_relocs;
2360 elf_section_data (sec)->this_hdr.contents = contents;
2361 symtab_hdr->contents = (unsigned char *) isymbuf;
2362 }
2363 }
2364
2365 if (isymbuf != NULL
2366 && symtab_hdr->contents != (unsigned char *) isymbuf)
2367 {
2368 if (! link_info->keep_memory)
2369 free (isymbuf);
2370 else
2371 {
2372 /* Cache the symbols for elf_link_input_bfd. */
2373 symtab_hdr->contents = (unsigned char *) isymbuf;
2374 }
2375 }
2376
2377 if (contents != NULL
2378 && elf_section_data (sec)->this_hdr.contents != contents)
2379 {
2380 if (! link_info->keep_memory)
2381 free (contents);
2382 else
2383 {
2384 /* Cache the section contents for elf_link_input_bfd. */
2385 elf_section_data (sec)->this_hdr.contents = contents;
2386 }
2387 }
2388
2389 if (internal_relocs != NULL
2390 && elf_section_data (sec)->relocs != internal_relocs)
2391 free (internal_relocs);
2392
2393 return TRUE;
2394
2395 error_return:
2396 if (isymbuf != NULL
2397 && symtab_hdr->contents != (unsigned char *) isymbuf)
2398 free (isymbuf);
2399 if (contents != NULL
2400 && elf_section_data (sec)->this_hdr.contents != contents)
2401 free (contents);
2402 if (internal_relocs != NULL
2403 && elf_section_data (sec)->relocs != internal_relocs)
2404 free (internal_relocs);
2405
2406 return FALSE;
2407 }
2408
2409 /* Delete some bytes from a section while relaxing. FIXME: There is a
2410 lot of duplication between this function and sh_relax_delete_bytes
2411 in coff-sh.c. */
2412
2413 static bfd_boolean
2414 sh_elf_relax_delete_bytes (abfd, sec, addr, count)
2415 bfd *abfd;
2416 asection *sec;
2417 bfd_vma addr;
2418 int count;
2419 {
2420 Elf_Internal_Shdr *symtab_hdr;
2421 unsigned int sec_shndx;
2422 bfd_byte *contents;
2423 Elf_Internal_Rela *irel, *irelend;
2424 Elf_Internal_Rela *irelalign;
2425 bfd_vma toaddr;
2426 Elf_Internal_Sym *isymbuf, *isym, *isymend;
2427 struct elf_link_hash_entry **sym_hashes;
2428 struct elf_link_hash_entry **end_hashes;
2429 unsigned int symcount;
2430 asection *o;
2431
2432 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2433 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
2434
2435 sec_shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
2436
2437 contents = elf_section_data (sec)->this_hdr.contents;
2438
2439 /* The deletion must stop at the next ALIGN reloc for an aligment
2440 power larger than the number of bytes we are deleting. */
2441
2442 irelalign = NULL;
2443 toaddr = sec->_cooked_size;
2444
2445 irel = elf_section_data (sec)->relocs;
2446 irelend = irel + sec->reloc_count;
2447 for (; irel < irelend; irel++)
2448 {
2449 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_ALIGN
2450 && irel->r_offset > addr
2451 && count < (1 << irel->r_addend))
2452 {
2453 irelalign = irel;
2454 toaddr = irel->r_offset;
2455 break;
2456 }
2457 }
2458
2459 /* Actually delete the bytes. */
2460 memmove (contents + addr, contents + addr + count,
2461 (size_t) (toaddr - addr - count));
2462 if (irelalign == NULL)
2463 sec->_cooked_size -= count;
2464 else
2465 {
2466 int i;
2467
2468 #define NOP_OPCODE (0x0009)
2469
2470 BFD_ASSERT ((count & 1) == 0);
2471 for (i = 0; i < count; i += 2)
2472 bfd_put_16 (abfd, (bfd_vma) NOP_OPCODE, contents + toaddr - count + i);
2473 }
2474
2475 /* Adjust all the relocs. */
2476 for (irel = elf_section_data (sec)->relocs; irel < irelend; irel++)
2477 {
2478 bfd_vma nraddr, stop;
2479 bfd_vma start = 0;
2480 int insn = 0;
2481 int off, adjust, oinsn;
2482 bfd_signed_vma voff = 0;
2483 bfd_boolean overflow;
2484
2485 /* Get the new reloc address. */
2486 nraddr = irel->r_offset;
2487 if ((irel->r_offset > addr
2488 && irel->r_offset < toaddr)
2489 || (ELF32_R_TYPE (irel->r_info) == (int) R_SH_ALIGN
2490 && irel->r_offset == toaddr))
2491 nraddr -= count;
2492
2493 /* See if this reloc was for the bytes we have deleted, in which
2494 case we no longer care about it. Don't delete relocs which
2495 represent addresses, though. */
2496 if (irel->r_offset >= addr
2497 && irel->r_offset < addr + count
2498 && ELF32_R_TYPE (irel->r_info) != (int) R_SH_ALIGN
2499 && ELF32_R_TYPE (irel->r_info) != (int) R_SH_CODE
2500 && ELF32_R_TYPE (irel->r_info) != (int) R_SH_DATA
2501 && ELF32_R_TYPE (irel->r_info) != (int) R_SH_LABEL)
2502 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
2503 (int) R_SH_NONE);
2504
2505 /* If this is a PC relative reloc, see if the range it covers
2506 includes the bytes we have deleted. */
2507 switch ((enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info))
2508 {
2509 default:
2510 break;
2511
2512 case R_SH_DIR8WPN:
2513 case R_SH_IND12W:
2514 case R_SH_DIR8WPZ:
2515 case R_SH_DIR8WPL:
2516 start = irel->r_offset;
2517 insn = bfd_get_16 (abfd, contents + nraddr);
2518 break;
2519 }
2520
2521 switch ((enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info))
2522 {
2523 default:
2524 start = stop = addr;
2525 break;
2526
2527 case R_SH_DIR32:
2528 /* If this reloc is against a symbol defined in this
2529 section, and the symbol will not be adjusted below, we
2530 must check the addend to see it will put the value in
2531 range to be adjusted, and hence must be changed. */
2532 if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
2533 {
2534 isym = isymbuf + ELF32_R_SYM (irel->r_info);
2535 if (isym->st_shndx == sec_shndx
2536 && (isym->st_value <= addr
2537 || isym->st_value >= toaddr))
2538 {
2539 bfd_vma val;
2540
2541 val = bfd_get_32 (abfd, contents + nraddr);
2542 val += isym->st_value;
2543 if (val > addr && val < toaddr)
2544 bfd_put_32 (abfd, val - count, contents + nraddr);
2545 }
2546 }
2547 start = stop = addr;
2548 break;
2549
2550 case R_SH_DIR8WPN:
2551 off = insn & 0xff;
2552 if (off & 0x80)
2553 off -= 0x100;
2554 stop = (bfd_vma) ((bfd_signed_vma) start + 4 + off * 2);
2555 break;
2556
2557 case R_SH_IND12W:
2558 off = insn & 0xfff;
2559 if (! off)
2560 {
2561 /* This has been made by previous relaxation. Since the
2562 relocation will be against an external symbol, the
2563 final relocation will just do the right thing. */
2564 start = stop = addr;
2565 }
2566 else
2567 {
2568 if (off & 0x800)
2569 off -= 0x1000;
2570 stop = (bfd_vma) ((bfd_signed_vma) start + 4 + off * 2);
2571
2572 /* The addend will be against the section symbol, thus
2573 for adjusting the addend, the relevant start is the
2574 start of the section.
2575 N.B. If we want to abandom in-place changes here and
2576 test directly using symbol + addend, we have to take into
2577 account that the addend has already been adjusted by -4. */
2578 if (stop > addr && stop < toaddr)
2579 irel->r_addend -= count;
2580 }
2581 break;
2582
2583 case R_SH_DIR8WPZ:
2584 off = insn & 0xff;
2585 stop = start + 4 + off * 2;
2586 break;
2587
2588 case R_SH_DIR8WPL:
2589 off = insn & 0xff;
2590 stop = (start & ~(bfd_vma) 3) + 4 + off * 4;
2591 break;
2592
2593 case R_SH_SWITCH8:
2594 case R_SH_SWITCH16:
2595 case R_SH_SWITCH32:
2596 /* These relocs types represent
2597 .word L2-L1
2598 The r_addend field holds the difference between the reloc
2599 address and L1. That is the start of the reloc, and
2600 adding in the contents gives us the top. We must adjust
2601 both the r_offset field and the section contents.
2602 N.B. in gas / coff bfd, the elf bfd r_addend is called r_offset,
2603 and the elf bfd r_offset is called r_vaddr. */
2604
2605 stop = irel->r_offset;
2606 start = (bfd_vma) ((bfd_signed_vma) stop - (long) irel->r_addend);
2607
2608 if (start > addr
2609 && start < toaddr
2610 && (stop <= addr || stop >= toaddr))
2611 irel->r_addend += count;
2612 else if (stop > addr
2613 && stop < toaddr
2614 && (start <= addr || start >= toaddr))
2615 irel->r_addend -= count;
2616
2617 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_SWITCH16)
2618 voff = bfd_get_signed_16 (abfd, contents + nraddr);
2619 else if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_SWITCH8)
2620 voff = bfd_get_8 (abfd, contents + nraddr);
2621 else
2622 voff = bfd_get_signed_32 (abfd, contents + nraddr);
2623 stop = (bfd_vma) ((bfd_signed_vma) start + voff);
2624
2625 break;
2626
2627 case R_SH_USES:
2628 start = irel->r_offset;
2629 stop = (bfd_vma) ((bfd_signed_vma) start
2630 + (long) irel->r_addend
2631 + 4);
2632 break;
2633 }
2634
2635 if (start > addr
2636 && start < toaddr
2637 && (stop <= addr || stop >= toaddr))
2638 adjust = count;
2639 else if (stop > addr
2640 && stop < toaddr
2641 && (start <= addr || start >= toaddr))
2642 adjust = - count;
2643 else
2644 adjust = 0;
2645
2646 if (adjust != 0)
2647 {
2648 oinsn = insn;
2649 overflow = FALSE;
2650 switch ((enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info))
2651 {
2652 default:
2653 abort ();
2654 break;
2655
2656 case R_SH_DIR8WPN:
2657 case R_SH_DIR8WPZ:
2658 insn += adjust / 2;
2659 if ((oinsn & 0xff00) != (insn & 0xff00))
2660 overflow = TRUE;
2661 bfd_put_16 (abfd, (bfd_vma) insn, contents + nraddr);
2662 break;
2663
2664 case R_SH_IND12W:
2665 insn += adjust / 2;
2666 if ((oinsn & 0xf000) != (insn & 0xf000))
2667 overflow = TRUE;
2668 bfd_put_16 (abfd, (bfd_vma) insn, contents + nraddr);
2669 break;
2670
2671 case R_SH_DIR8WPL:
2672 BFD_ASSERT (adjust == count || count >= 4);
2673 if (count >= 4)
2674 insn += adjust / 4;
2675 else
2676 {
2677 if ((irel->r_offset & 3) == 0)
2678 ++insn;
2679 }
2680 if ((oinsn & 0xff00) != (insn & 0xff00))
2681 overflow = TRUE;
2682 bfd_put_16 (abfd, (bfd_vma) insn, contents + nraddr);
2683 break;
2684
2685 case R_SH_SWITCH8:
2686 voff += adjust;
2687 if (voff < 0 || voff >= 0xff)
2688 overflow = TRUE;
2689 bfd_put_8 (abfd, voff, contents + nraddr);
2690 break;
2691
2692 case R_SH_SWITCH16:
2693 voff += adjust;
2694 if (voff < - 0x8000 || voff >= 0x8000)
2695 overflow = TRUE;
2696 bfd_put_signed_16 (abfd, (bfd_vma) voff, contents + nraddr);
2697 break;
2698
2699 case R_SH_SWITCH32:
2700 voff += adjust;
2701 bfd_put_signed_32 (abfd, (bfd_vma) voff, contents + nraddr);
2702 break;
2703
2704 case R_SH_USES:
2705 irel->r_addend += adjust;
2706 break;
2707 }
2708
2709 if (overflow)
2710 {
2711 ((*_bfd_error_handler)
2712 (_("%s: 0x%lx: fatal: reloc overflow while relaxing"),
2713 bfd_archive_filename (abfd), (unsigned long) irel->r_offset));
2714 bfd_set_error (bfd_error_bad_value);
2715 return FALSE;
2716 }
2717 }
2718
2719 irel->r_offset = nraddr;
2720 }
2721
2722 /* Look through all the other sections. If there contain any IMM32
2723 relocs against internal symbols which we are not going to adjust
2724 below, we may need to adjust the addends. */
2725 for (o = abfd->sections; o != NULL; o = o->next)
2726 {
2727 Elf_Internal_Rela *internal_relocs;
2728 Elf_Internal_Rela *irelscan, *irelscanend;
2729 bfd_byte *ocontents;
2730
2731 if (o == sec
2732 || (o->flags & SEC_RELOC) == 0
2733 || o->reloc_count == 0)
2734 continue;
2735
2736 /* We always cache the relocs. Perhaps, if info->keep_memory is
2737 FALSE, we should free them, if we are permitted to, when we
2738 leave sh_coff_relax_section. */
2739 internal_relocs = (_bfd_elf_link_read_relocs
2740 (abfd, o, (PTR) NULL, (Elf_Internal_Rela *) NULL,
2741 TRUE));
2742 if (internal_relocs == NULL)
2743 return FALSE;
2744
2745 ocontents = NULL;
2746 irelscanend = internal_relocs + o->reloc_count;
2747 for (irelscan = internal_relocs; irelscan < irelscanend; irelscan++)
2748 {
2749 /* Dwarf line numbers use R_SH_SWITCH32 relocs. */
2750 if (ELF32_R_TYPE (irelscan->r_info) == (int) R_SH_SWITCH32)
2751 {
2752 bfd_vma start, stop;
2753 bfd_signed_vma voff;
2754
2755 if (ocontents == NULL)
2756 {
2757 if (elf_section_data (o)->this_hdr.contents != NULL)
2758 ocontents = elf_section_data (o)->this_hdr.contents;
2759 else
2760 {
2761 /* We always cache the section contents.
2762 Perhaps, if info->keep_memory is FALSE, we
2763 should free them, if we are permitted to,
2764 when we leave sh_coff_relax_section. */
2765 ocontents = (bfd_byte *) bfd_malloc (o->_raw_size);
2766 if (ocontents == NULL)
2767 return FALSE;
2768 if (! bfd_get_section_contents (abfd, o, ocontents,
2769 (file_ptr) 0,
2770 o->_raw_size))
2771 return FALSE;
2772 elf_section_data (o)->this_hdr.contents = ocontents;
2773 }
2774 }
2775
2776 stop = irelscan->r_offset;
2777 start
2778 = (bfd_vma) ((bfd_signed_vma) stop - (long) irelscan->r_addend);
2779
2780 /* STOP is in a different section, so it won't change. */
2781 if (start > addr && start < toaddr)
2782 irelscan->r_addend += count;
2783
2784 voff = bfd_get_signed_32 (abfd, ocontents + irelscan->r_offset);
2785 stop = (bfd_vma) ((bfd_signed_vma) start + voff);
2786
2787 if (start > addr
2788 && start < toaddr
2789 && (stop <= addr || stop >= toaddr))
2790 bfd_put_signed_32 (abfd, (bfd_vma) voff + count,
2791 ocontents + irelscan->r_offset);
2792 else if (stop > addr
2793 && stop < toaddr
2794 && (start <= addr || start >= toaddr))
2795 bfd_put_signed_32 (abfd, (bfd_vma) voff - count,
2796 ocontents + irelscan->r_offset);
2797 }
2798
2799 if (ELF32_R_TYPE (irelscan->r_info) != (int) R_SH_DIR32)
2800 continue;
2801
2802 if (ELF32_R_SYM (irelscan->r_info) >= symtab_hdr->sh_info)
2803 continue;
2804
2805
2806 isym = isymbuf + ELF32_R_SYM (irelscan->r_info);
2807 if (isym->st_shndx == sec_shndx
2808 && (isym->st_value <= addr
2809 || isym->st_value >= toaddr))
2810 {
2811 bfd_vma val;
2812
2813 if (ocontents == NULL)
2814 {
2815 if (elf_section_data (o)->this_hdr.contents != NULL)
2816 ocontents = elf_section_data (o)->this_hdr.contents;
2817 else
2818 {
2819 /* We always cache the section contents.
2820 Perhaps, if info->keep_memory is FALSE, we
2821 should free them, if we are permitted to,
2822 when we leave sh_coff_relax_section. */
2823 ocontents = (bfd_byte *) bfd_malloc (o->_raw_size);
2824 if (ocontents == NULL)
2825 return FALSE;
2826 if (! bfd_get_section_contents (abfd, o, ocontents,
2827 (file_ptr) 0,
2828 o->_raw_size))
2829 return FALSE;
2830 elf_section_data (o)->this_hdr.contents = ocontents;
2831 }
2832 }
2833
2834 val = bfd_get_32 (abfd, ocontents + irelscan->r_offset);
2835 val += isym->st_value;
2836 if (val > addr && val < toaddr)
2837 bfd_put_32 (abfd, val - count,
2838 ocontents + irelscan->r_offset);
2839 }
2840 }
2841 }
2842
2843 /* Adjust the local symbols defined in this section. */
2844 isymend = isymbuf + symtab_hdr->sh_info;
2845 for (isym = isymbuf; isym < isymend; isym++)
2846 {
2847 if (isym->st_shndx == sec_shndx
2848 && isym->st_value > addr
2849 && isym->st_value < toaddr)
2850 isym->st_value -= count;
2851 }
2852
2853 /* Now adjust the global symbols defined in this section. */
2854 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2855 - symtab_hdr->sh_info);
2856 sym_hashes = elf_sym_hashes (abfd);
2857 end_hashes = sym_hashes + symcount;
2858 for (; sym_hashes < end_hashes; sym_hashes++)
2859 {
2860 struct elf_link_hash_entry *sym_hash = *sym_hashes;
2861 if ((sym_hash->root.type == bfd_link_hash_defined
2862 || sym_hash->root.type == bfd_link_hash_defweak)
2863 && sym_hash->root.u.def.section == sec
2864 && sym_hash->root.u.def.value > addr
2865 && sym_hash->root.u.def.value < toaddr)
2866 {
2867 sym_hash->root.u.def.value -= count;
2868 }
2869 }
2870
2871 /* See if we can move the ALIGN reloc forward. We have adjusted
2872 r_offset for it already. */
2873 if (irelalign != NULL)
2874 {
2875 bfd_vma alignto, alignaddr;
2876
2877 alignto = BFD_ALIGN (toaddr, 1 << irelalign->r_addend);
2878 alignaddr = BFD_ALIGN (irelalign->r_offset,
2879 1 << irelalign->r_addend);
2880 if (alignto != alignaddr)
2881 {
2882 /* Tail recursion. */
2883 return sh_elf_relax_delete_bytes (abfd, sec, alignaddr,
2884 (int) (alignto - alignaddr));
2885 }
2886 }
2887
2888 return TRUE;
2889 }
2890
2891 /* Look for loads and stores which we can align to four byte
2892 boundaries. This is like sh_align_loads in coff-sh.c. */
2893
2894 static bfd_boolean
2895 sh_elf_align_loads (abfd, sec, internal_relocs, contents, pswapped)
2896 bfd *abfd ATTRIBUTE_UNUSED;
2897 asection *sec;
2898 Elf_Internal_Rela *internal_relocs;
2899 bfd_byte *contents ATTRIBUTE_UNUSED;
2900 bfd_boolean *pswapped;
2901 {
2902 Elf_Internal_Rela *irel, *irelend;
2903 bfd_vma *labels = NULL;
2904 bfd_vma *label, *label_end;
2905 bfd_size_type amt;
2906
2907 *pswapped = FALSE;
2908
2909 irelend = internal_relocs + sec->reloc_count;
2910
2911 /* Get all the addresses with labels on them. */
2912 amt = sec->reloc_count;
2913 amt *= sizeof (bfd_vma);
2914 labels = (bfd_vma *) bfd_malloc (amt);
2915 if (labels == NULL)
2916 goto error_return;
2917 label_end = labels;
2918 for (irel = internal_relocs; irel < irelend; irel++)
2919 {
2920 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_LABEL)
2921 {
2922 *label_end = irel->r_offset;
2923 ++label_end;
2924 }
2925 }
2926
2927 /* Note that the assembler currently always outputs relocs in
2928 address order. If that ever changes, this code will need to sort
2929 the label values and the relocs. */
2930
2931 label = labels;
2932
2933 for (irel = internal_relocs; irel < irelend; irel++)
2934 {
2935 bfd_vma start, stop;
2936
2937 if (ELF32_R_TYPE (irel->r_info) != (int) R_SH_CODE)
2938 continue;
2939
2940 start = irel->r_offset;
2941
2942 for (irel++; irel < irelend; irel++)
2943 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_DATA)
2944 break;
2945 if (irel < irelend)
2946 stop = irel->r_offset;
2947 else
2948 stop = sec->_cooked_size;
2949
2950 if (! _bfd_sh_align_load_span (abfd, sec, contents, sh_elf_swap_insns,
2951 (PTR) internal_relocs, &label,
2952 label_end, start, stop, pswapped))
2953 goto error_return;
2954 }
2955
2956 free (labels);
2957
2958 return TRUE;
2959
2960 error_return:
2961 if (labels != NULL)
2962 free (labels);
2963 return FALSE;
2964 }
2965
2966 /* Swap two SH instructions. This is like sh_swap_insns in coff-sh.c. */
2967
2968 static bfd_boolean
2969 sh_elf_swap_insns (abfd, sec, relocs, contents, addr)
2970 bfd *abfd;
2971 asection *sec;
2972 PTR relocs;
2973 bfd_byte *contents;
2974 bfd_vma addr;
2975 {
2976 Elf_Internal_Rela *internal_relocs = (Elf_Internal_Rela *) relocs;
2977 unsigned short i1, i2;
2978 Elf_Internal_Rela *irel, *irelend;
2979
2980 /* Swap the instructions themselves. */
2981 i1 = bfd_get_16 (abfd, contents + addr);
2982 i2 = bfd_get_16 (abfd, contents + addr + 2);
2983 bfd_put_16 (abfd, (bfd_vma) i2, contents + addr);
2984 bfd_put_16 (abfd, (bfd_vma) i1, contents + addr + 2);
2985
2986 /* Adjust all reloc addresses. */
2987 irelend = internal_relocs + sec->reloc_count;
2988 for (irel = internal_relocs; irel < irelend; irel++)
2989 {
2990 enum elf_sh_reloc_type type;
2991 int add;
2992
2993 /* There are a few special types of relocs that we don't want to
2994 adjust. These relocs do not apply to the instruction itself,
2995 but are only associated with the address. */
2996 type = (enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info);
2997 if (type == R_SH_ALIGN
2998 || type == R_SH_CODE
2999 || type == R_SH_DATA
3000 || type == R_SH_LABEL)
3001 continue;
3002
3003 /* If an R_SH_USES reloc points to one of the addresses being
3004 swapped, we must adjust it. It would be incorrect to do this
3005 for a jump, though, since we want to execute both
3006 instructions after the jump. (We have avoided swapping
3007 around a label, so the jump will not wind up executing an
3008 instruction it shouldn't). */
3009 if (type == R_SH_USES)
3010 {
3011 bfd_vma off;
3012
3013 off = irel->r_offset + 4 + irel->r_addend;
3014 if (off == addr)
3015 irel->r_offset += 2;
3016 else if (off == addr + 2)
3017 irel->r_offset -= 2;
3018 }
3019
3020 if (irel->r_offset == addr)
3021 {
3022 irel->r_offset += 2;
3023 add = -2;
3024 }
3025 else if (irel->r_offset == addr + 2)
3026 {
3027 irel->r_offset -= 2;
3028 add = 2;
3029 }
3030 else
3031 add = 0;
3032
3033 if (add != 0)
3034 {
3035 bfd_byte *loc;
3036 unsigned short insn, oinsn;
3037 bfd_boolean overflow;
3038
3039 loc = contents + irel->r_offset;
3040 overflow = FALSE;
3041 switch (type)
3042 {
3043 default:
3044 break;
3045
3046 case R_SH_DIR8WPN:
3047 case R_SH_DIR8WPZ:
3048 insn = bfd_get_16 (abfd, loc);
3049 oinsn = insn;
3050 insn += add / 2;
3051 if ((oinsn & 0xff00) != (insn & 0xff00))
3052 overflow = TRUE;
3053 bfd_put_16 (abfd, (bfd_vma) insn, loc);
3054 break;
3055
3056 case R_SH_IND12W:
3057 insn = bfd_get_16 (abfd, loc);
3058 oinsn = insn;
3059 insn += add / 2;
3060 if ((oinsn & 0xf000) != (insn & 0xf000))
3061 overflow = TRUE;
3062 bfd_put_16 (abfd, (bfd_vma) insn, loc);
3063 break;
3064
3065 case R_SH_DIR8WPL:
3066 /* This reloc ignores the least significant 3 bits of
3067 the program counter before adding in the offset.
3068 This means that if ADDR is at an even address, the
3069 swap will not affect the offset. If ADDR is an at an
3070 odd address, then the instruction will be crossing a
3071 four byte boundary, and must be adjusted. */
3072 if ((addr & 3) != 0)
3073 {
3074 insn = bfd_get_16 (abfd, loc);
3075 oinsn = insn;
3076 insn += add / 2;
3077 if ((oinsn & 0xff00) != (insn & 0xff00))
3078 overflow = TRUE;
3079 bfd_put_16 (abfd, (bfd_vma) insn, loc);
3080 }
3081
3082 break;
3083 }
3084
3085 if (overflow)
3086 {
3087 ((*_bfd_error_handler)
3088 (_("%s: 0x%lx: fatal: reloc overflow while relaxing"),
3089 bfd_archive_filename (abfd), (unsigned long) irel->r_offset));
3090 bfd_set_error (bfd_error_bad_value);
3091 return FALSE;
3092 }
3093 }
3094 }
3095
3096 return TRUE;
3097 }
3098 \f
3099 #ifdef INCLUDE_SHMEDIA
3100
3101 /* The size in bytes of an entry in the procedure linkage table. */
3102
3103 #define PLT_ENTRY_SIZE 64
3104
3105 /* First entry in an absolute procedure linkage table look like this. */
3106
3107 static const bfd_byte elf_sh_plt0_entry_be[PLT_ENTRY_SIZE] =
3108 {
3109 0xcc, 0x00, 0x01, 0x10, /* movi .got.plt >> 16, r17 */
3110 0xc8, 0x00, 0x01, 0x10, /* shori .got.plt & 65535, r17 */
3111 0x89, 0x10, 0x09, 0x90, /* ld.l r17, 8, r25 */
3112 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
3113 0x89, 0x10, 0x05, 0x10, /* ld.l r17, 4, r17 */
3114 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
3115 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3116 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3117 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3118 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3119 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3120 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3121 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3122 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3123 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3124 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3125 };
3126
3127 static const bfd_byte elf_sh_plt0_entry_le[PLT_ENTRY_SIZE] =
3128 {
3129 0x10, 0x01, 0x00, 0xcc, /* movi .got.plt >> 16, r17 */
3130 0x10, 0x01, 0x00, 0xc8, /* shori .got.plt & 65535, r17 */
3131 0x90, 0x09, 0x10, 0x89, /* ld.l r17, 8, r25 */
3132 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
3133 0x10, 0x05, 0x10, 0x89, /* ld.l r17, 4, r17 */
3134 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
3135 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3136 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3137 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3138 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3139 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3140 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3141 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3142 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3143 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3144 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3145 };
3146
3147 /* Sebsequent entries in an absolute procedure linkage table look like
3148 this. */
3149
3150 static const bfd_byte elf_sh_plt_entry_be[PLT_ENTRY_SIZE] =
3151 {
3152 0xcc, 0x00, 0x01, 0x90, /* movi nameN-in-GOT >> 16, r25 */
3153 0xc8, 0x00, 0x01, 0x90, /* shori nameN-in-GOT & 65535, r25 */
3154 0x89, 0x90, 0x01, 0x90, /* ld.l r25, 0, r25 */
3155 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
3156 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
3157 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3158 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3159 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3160 0xcc, 0x00, 0x01, 0x90, /* movi .PLT0 >> 16, r25 */
3161 0xc8, 0x00, 0x01, 0x90, /* shori .PLT0 & 65535, r25 */
3162 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
3163 0xcc, 0x00, 0x01, 0x50, /* movi reloc-offset >> 16, r21 */
3164 0xc8, 0x00, 0x01, 0x50, /* shori reloc-offset & 65535, r21 */
3165 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
3166 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3167 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3168 };
3169
3170 static const bfd_byte elf_sh_plt_entry_le[PLT_ENTRY_SIZE] =
3171 {
3172 0x90, 0x01, 0x00, 0xcc, /* movi nameN-in-GOT >> 16, r25 */
3173 0x90, 0x01, 0x00, 0xc8, /* shori nameN-in-GOT & 65535, r25 */
3174 0x90, 0x01, 0x90, 0x89, /* ld.l r25, 0, r25 */
3175 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
3176 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
3177 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3178 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3179 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3180 0x90, 0x01, 0x00, 0xcc, /* movi .PLT0 >> 16, r25 */
3181 0x90, 0x01, 0x00, 0xc8, /* shori .PLT0 & 65535, r25 */
3182 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
3183 0x50, 0x01, 0x00, 0xcc, /* movi reloc-offset >> 16, r21 */
3184 0x50, 0x01, 0x00, 0xc8, /* shori reloc-offset & 65535, r21 */
3185 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
3186 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3187 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3188 };
3189
3190 /* Entries in a PIC procedure linkage table look like this. */
3191
3192 static const bfd_byte elf_sh_pic_plt_entry_be[PLT_ENTRY_SIZE] =
3193 {
3194 0xcc, 0x00, 0x01, 0x90, /* movi nameN@GOT >> 16, r25 */
3195 0xc8, 0x00, 0x01, 0x90, /* shori nameN@GOT & 65535, r25 */
3196 0x40, 0xc2, 0x65, 0x90, /* ldx.l r12, r25, r25 */
3197 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
3198 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
3199 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3200 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3201 0x6f, 0xf0, 0xff, 0xf0, /* nop */
3202 0xce, 0x00, 0x01, 0x10, /* movi -GOT_BIAS, r17 */
3203 0x00, 0xc8, 0x45, 0x10, /* add.l r12, r17, r17 */
3204 0x89, 0x10, 0x09, 0x90, /* ld.l r17, 8, r25 */
3205 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
3206 0x89, 0x10, 0x05, 0x10, /* ld.l r17, 4, r17 */
3207 0xcc, 0x00, 0x01, 0x50, /* movi reloc-offset >> 16, r21 */
3208 0xc8, 0x00, 0x01, 0x50, /* shori reloc-offset & 65535, r21 */
3209 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
3210 };
3211
3212 static const bfd_byte elf_sh_pic_plt_entry_le[PLT_ENTRY_SIZE] =
3213 {
3214 0x90, 0x01, 0x00, 0xcc, /* movi nameN@GOT >> 16, r25 */
3215 0x90, 0x01, 0x00, 0xc8, /* shori nameN@GOT & 65535, r25 */
3216 0x90, 0x65, 0xc2, 0x40, /* ldx.l r12, r25, r25 */
3217 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
3218 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
3219 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3220 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3221 0xf0, 0xff, 0xf0, 0x6f, /* nop */
3222 0x10, 0x01, 0x00, 0xce, /* movi -GOT_BIAS, r17 */
3223 0x10, 0x45, 0xc8, 0x00, /* add.l r12, r17, r17 */
3224 0x90, 0x09, 0x10, 0x89, /* ld.l r17, 8, r25 */
3225 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
3226 0x10, 0x05, 0x10, 0x89, /* ld.l r17, 4, r17 */
3227 0x50, 0x01, 0x00, 0xcc, /* movi reloc-offset >> 16, r21 */
3228 0x50, 0x01, 0x00, 0xc8, /* shori reloc-offset & 65535, r21 */
3229 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
3230 };
3231
3232 static const bfd_byte *elf_sh_plt0_entry;
3233 static const bfd_byte *elf_sh_plt_entry;
3234 static const bfd_byte *elf_sh_pic_plt_entry;
3235
3236 /* Return size of a PLT entry. */
3237 #define elf_sh_sizeof_plt(info) PLT_ENTRY_SIZE
3238
3239 /* Return offset of the PLT0 address in an absolute PLT entry. */
3240 #define elf_sh_plt_plt0_offset(info) 32
3241
3242 /* Return offset of the linker in PLT0 entry. */
3243 #define elf_sh_plt0_gotplt_offset(info) 0
3244
3245 /* Return offset of the trampoline in PLT entry */
3246 #define elf_sh_plt_temp_offset(info) 33 /* Add one because it's SHmedia. */
3247
3248 /* Return offset of the symbol in PLT entry. */
3249 #define elf_sh_plt_symbol_offset(info) 0
3250
3251 /* Return offset of the relocation in PLT entry. */
3252 #define elf_sh_plt_reloc_offset(info) (info->shared ? 52 : 44)
3253
3254 inline static void
3255 movi_shori_putval (output_bfd, value, addr)
3256 bfd *output_bfd;
3257 unsigned long value;
3258 char *addr;
3259 {
3260 bfd_put_32 (output_bfd,
3261 bfd_get_32 (output_bfd, addr)
3262 | ((value >> 6) & 0x3fffc00),
3263 addr);
3264 bfd_put_32 (output_bfd,
3265 bfd_get_32 (output_bfd, addr + 4)
3266 | ((value << 10) & 0x3fffc00),
3267 addr + 4);
3268 }
3269
3270 #else
3271 /* The size in bytes of an entry in the procedure linkage table. */
3272
3273 #define PLT_ENTRY_SIZE 28
3274
3275 /* First entry in an absolute procedure linkage table look like this. */
3276
3277 #if 1
3278 /* Note - this code has been "optimised" not to use r2. r2 is used by
3279 GCC to return the address of large strutcures, so it should not be
3280 corrupted here. This does mean however, that this PLT does not conform
3281 to the SH PIC ABI. That spec says that r0 contains the type of the PLT
3282 and r2 contains the GOT id. This version stores the GOT id in r0 and
3283 ignores the type. Loaders can easily detect this difference however,
3284 since the type will always be 0 or 8, and the GOT ids will always be
3285 greater than or equal to 12. */
3286 static const bfd_byte elf_sh_plt0_entry_be[PLT_ENTRY_SIZE] =
3287 {
3288 0xd0, 0x05, /* mov.l 2f,r0 */
3289 0x60, 0x02, /* mov.l @r0,r0 */
3290 0x2f, 0x06, /* mov.l r0,@-r15 */
3291 0xd0, 0x03, /* mov.l 1f,r0 */
3292 0x60, 0x02, /* mov.l @r0,r0 */
3293 0x40, 0x2b, /* jmp @r0 */
3294 0x60, 0xf6, /* mov.l @r15+,r0 */
3295 0x00, 0x09, /* nop */
3296 0x00, 0x09, /* nop */
3297 0x00, 0x09, /* nop */
3298 0, 0, 0, 0, /* 1: replaced with address of .got.plt + 8. */
3299 0, 0, 0, 0, /* 2: replaced with address of .got.plt + 4. */
3300 };
3301
3302 static const bfd_byte elf_sh_plt0_entry_le[PLT_ENTRY_SIZE] =
3303 {
3304 0x05, 0xd0, /* mov.l 2f,r0 */
3305 0x02, 0x60, /* mov.l @r0,r0 */
3306 0x06, 0x2f, /* mov.l r0,@-r15 */
3307 0x03, 0xd0, /* mov.l 1f,r0 */
3308 0x02, 0x60, /* mov.l @r0,r0 */
3309 0x2b, 0x40, /* jmp @r0 */
3310 0xf6, 0x60, /* mov.l @r15+,r0 */
3311 0x09, 0x00, /* nop */
3312 0x09, 0x00, /* nop */
3313 0x09, 0x00, /* nop */
3314 0, 0, 0, 0, /* 1: replaced with address of .got.plt + 8. */
3315 0, 0, 0, 0, /* 2: replaced with address of .got.plt + 4. */
3316 };
3317
3318 /* Sebsequent entries in an absolute procedure linkage table look like
3319 this. */
3320
3321 static const bfd_byte elf_sh_plt_entry_be[PLT_ENTRY_SIZE] =
3322 {
3323 0xd0, 0x04, /* mov.l 1f,r0 */
3324 0x60, 0x02, /* mov.l @r0,r0 */
3325 0xd1, 0x02, /* mov.l 0f,r1 */
3326 0x40, 0x2b, /* jmp @r0 */
3327 0x60, 0x13, /* mov r1,r0 */
3328 0xd1, 0x03, /* mov.l 2f,r1 */
3329 0x40, 0x2b, /* jmp @r0 */
3330 0x00, 0x09, /* nop */
3331 0, 0, 0, 0, /* 0: replaced with address of .PLT0. */
3332 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
3333 0, 0, 0, 0, /* 2: replaced with offset into relocation table. */
3334 };
3335
3336 static const bfd_byte elf_sh_plt_entry_le[PLT_ENTRY_SIZE] =
3337 {
3338 0x04, 0xd0, /* mov.l 1f,r0 */
3339 0x02, 0x60, /* mov.l @r0,r0 */
3340 0x02, 0xd1, /* mov.l 0f,r1 */
3341 0x2b, 0x40, /* jmp @r0 */
3342 0x13, 0x60, /* mov r1,r0 */
3343 0x03, 0xd1, /* mov.l 2f,r1 */
3344 0x2b, 0x40, /* jmp @r0 */
3345 0x09, 0x00, /* nop */
3346 0, 0, 0, 0, /* 0: replaced with address of .PLT0. */
3347 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
3348 0, 0, 0, 0, /* 2: replaced with offset into relocation table. */
3349 };
3350
3351 /* Entries in a PIC procedure linkage table look like this. */
3352
3353 static const bfd_byte elf_sh_pic_plt_entry_be[PLT_ENTRY_SIZE] =
3354 {
3355 0xd0, 0x04, /* mov.l 1f,r0 */
3356 0x00, 0xce, /* mov.l @(r0,r12),r0 */
3357 0x40, 0x2b, /* jmp @r0 */
3358 0x00, 0x09, /* nop */
3359 0x50, 0xc2, /* mov.l @(8,r12),r0 */
3360 0xd1, 0x03, /* mov.l 2f,r1 */
3361 0x40, 0x2b, /* jmp @r0 */
3362 0x50, 0xc1, /* mov.l @(4,r12),r0 */
3363 0x00, 0x09, /* nop */
3364 0x00, 0x09, /* nop */
3365 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
3366 0, 0, 0, 0 /* 2: replaced with offset into relocation table. */
3367 };
3368
3369 static const bfd_byte elf_sh_pic_plt_entry_le[PLT_ENTRY_SIZE] =
3370 {
3371 0x04, 0xd0, /* mov.l 1f,r0 */
3372 0xce, 0x00, /* mov.l @(r0,r12),r0 */
3373 0x2b, 0x40, /* jmp @r0 */
3374 0x09, 0x00, /* nop */
3375 0xc2, 0x50, /* mov.l @(8,r12),r0 */
3376 0x03, 0xd1, /* mov.l 2f,r1 */
3377 0x2b, 0x40, /* jmp @r0 */
3378 0xc1, 0x50, /* mov.l @(4,r12),r0 */
3379 0x09, 0x00, /* nop */
3380 0x09, 0x00, /* nop */
3381 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
3382 0, 0, 0, 0 /* 2: replaced with offset into relocation table. */
3383 };
3384
3385 #else /* These are the old style PLT entries. */
3386 static const bfd_byte elf_sh_plt0_entry_be[PLT_ENTRY_SIZE] =
3387 {
3388 0xd0, 0x04, /* mov.l 1f,r0 */
3389 0xd2, 0x05, /* mov.l 2f,r2 */
3390 0x60, 0x02, /* mov.l @r0,r0 */
3391 0x62, 0x22, /* mov.l @r2,r2 */
3392 0x40, 0x2b, /* jmp @r0 */
3393 0xe0, 0x00, /* mov #0,r0 */
3394 0x00, 0x09, /* nop */
3395 0x00, 0x09, /* nop */
3396 0x00, 0x09, /* nop */
3397 0x00, 0x09, /* nop */
3398 0, 0, 0, 0, /* 1: replaced with address of .got.plt + 8. */
3399 0, 0, 0, 0, /* 2: replaced with address of .got.plt + 4. */
3400 };
3401
3402 static const bfd_byte elf_sh_plt0_entry_le[PLT_ENTRY_SIZE] =
3403 {
3404 0x04, 0xd0, /* mov.l 1f,r0 */
3405 0x05, 0xd2, /* mov.l 2f,r2 */
3406 0x02, 0x60, /* mov.l @r0,r0 */
3407 0x22, 0x62, /* mov.l @r2,r2 */
3408 0x2b, 0x40, /* jmp @r0 */
3409 0x00, 0xe0, /* mov #0,r0 */
3410 0x09, 0x00, /* nop */
3411 0x09, 0x00, /* nop */
3412 0x09, 0x00, /* nop */
3413 0x09, 0x00, /* nop */
3414 0, 0, 0, 0, /* 1: replaced with address of .got.plt + 8. */
3415 0, 0, 0, 0, /* 2: replaced with address of .got.plt + 4. */
3416 };
3417
3418 /* Sebsequent entries in an absolute procedure linkage table look like
3419 this. */
3420
3421 static const bfd_byte elf_sh_plt_entry_be[PLT_ENTRY_SIZE] =
3422 {
3423 0xd0, 0x04, /* mov.l 1f,r0 */
3424 0x60, 0x02, /* mov.l @r0,r0 */
3425 0xd2, 0x02, /* mov.l 0f,r2 */
3426 0x40, 0x2b, /* jmp @r0 */
3427 0x60, 0x23, /* mov r2,r0 */
3428 0xd1, 0x03, /* mov.l 2f,r1 */
3429 0x40, 0x2b, /* jmp @r0 */
3430 0x00, 0x09, /* nop */
3431 0, 0, 0, 0, /* 0: replaced with address of .PLT0. */
3432 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
3433 0, 0, 0, 0, /* 2: replaced with offset into relocation table. */
3434 };
3435
3436 static const bfd_byte elf_sh_plt_entry_le[PLT_ENTRY_SIZE] =
3437 {
3438 0x04, 0xd0, /* mov.l 1f,r0 */
3439 0x02, 0x60, /* mov.l @r0,r0 */
3440 0x02, 0xd2, /* mov.l 0f,r2 */
3441 0x2b, 0x40, /* jmp @r0 */
3442 0x23, 0x60, /* mov r2,r0 */
3443 0x03, 0xd1, /* mov.l 2f,r1 */
3444 0x2b, 0x40, /* jmp @r0 */
3445 0x09, 0x00, /* nop */
3446 0, 0, 0, 0, /* 0: replaced with address of .PLT. */
3447 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
3448 0, 0, 0, 0, /* 2: replaced with offset into relocation table. */
3449 };
3450
3451 /* Entries in a PIC procedure linkage table look like this. */
3452
3453 static const bfd_byte elf_sh_pic_plt_entry_be[PLT_ENTRY_SIZE] =
3454 {
3455 0xd0, 0x04, /* mov.l 1f,r0 */
3456 0x00, 0xce, /* mov.l @(r0,r12),r0 */
3457 0x40, 0x2b, /* jmp @r0 */
3458 0x00, 0x09, /* nop */
3459 0x50, 0xc2, /* 0: mov.l @(8,r12),r0 */
3460 0x52, 0xc1, /* 1: mov.l @(4,r12),r2 */
3461 0xd1, 0x02, /* mov.l 2f,r1 */
3462 0x40, 0x2b, /* jmp @r0 */
3463 0xe0, 0x00, /* mov #0,r0 ! shows the type of PLT. */
3464 0x00, 0x09, /* nop */
3465 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
3466 0, 0, 0, 0 /* 2: replaced with offset into relocation table. */
3467 };
3468
3469 static const bfd_byte elf_sh_pic_plt_entry_le[PLT_ENTRY_SIZE] =
3470 {
3471 0x04, 0xd0, /* mov.l 1f,r0 */
3472 0xce, 0x00, /* mov.l @(r0,r12),r0 */
3473 0x2b, 0x40, /* jmp @r0 */
3474 0x09, 0x00, /* nop */
3475 0xc2, 0x50, /* 0: mov.l @(8,r12),r0 */
3476 0xc1, 0x52, /* 1: mov.l @(4,r12),r2 */
3477 0x02, 0xd1, /* mov.l 2f,r1 */
3478 0x2b, 0x40, /* jmp @r0 */
3479 0x00, 0xe0, /* mov #0,r0 ! shows the type of PLT. */
3480 0x09, 0x00, /* nop */
3481 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
3482 0, 0, 0, 0 /* 2: replaced with offset into relocation table. */
3483 };
3484 #endif /* old style PLT entries. */
3485
3486 static const bfd_byte *elf_sh_plt0_entry;
3487 static const bfd_byte *elf_sh_plt_entry;
3488 static const bfd_byte *elf_sh_pic_plt_entry;
3489
3490 /* Return size of a PLT entry. */
3491 #define elf_sh_sizeof_plt(info) PLT_ENTRY_SIZE
3492
3493 /* Return offset of the PLT0 address in an absolute PLT entry. */
3494 #define elf_sh_plt_plt0_offset(info) 16
3495
3496 /* Return offset of the linker in PLT0 entry. */
3497 #define elf_sh_plt0_linker_offset(info) 20
3498
3499 /* Return offset of the GOT id in PLT0 entry. */
3500 #define elf_sh_plt0_gotid_offset(info) 24
3501
3502 /* Return offset of the tempoline in PLT entry */
3503 #define elf_sh_plt_temp_offset(info) 8
3504
3505 /* Return offset of the symbol in PLT entry. */
3506 #define elf_sh_plt_symbol_offset(info) 20
3507
3508 /* Return offset of the relocation in PLT entry. */
3509 #define elf_sh_plt_reloc_offset(info) 24
3510 #endif
3511
3512 /* The sh linker needs to keep track of the number of relocs that it
3513 decides to copy as dynamic relocs in check_relocs for each symbol.
3514 This is so that it can later discard them if they are found to be
3515 unnecessary. We store the information in a field extending the
3516 regular ELF linker hash table. */
3517
3518 struct elf_sh_dyn_relocs
3519 {
3520 struct elf_sh_dyn_relocs *next;
3521
3522 /* The input section of the reloc. */
3523 asection *sec;
3524
3525 /* Total number of relocs copied for the input section. */
3526 bfd_size_type count;
3527
3528 /* Number of pc-relative relocs copied for the input section. */
3529 bfd_size_type pc_count;
3530 };
3531
3532 /* sh ELF linker hash entry. */
3533
3534 struct elf_sh_link_hash_entry
3535 {
3536 struct elf_link_hash_entry root;
3537
3538 #ifdef INCLUDE_SHMEDIA
3539 union
3540 {
3541 bfd_signed_vma refcount;
3542 bfd_vma offset;
3543 } datalabel_got;
3544 #endif
3545
3546 /* Track dynamic relocs copied for this symbol. */
3547 struct elf_sh_dyn_relocs *dyn_relocs;
3548
3549 bfd_signed_vma gotplt_refcount;
3550
3551 enum {
3552 GOT_UNKNOWN = 0, GOT_NORMAL, GOT_TLS_GD, GOT_TLS_IE
3553 } tls_type;
3554 };
3555
3556 #define sh_elf_hash_entry(ent) ((struct elf_sh_link_hash_entry *)(ent))
3557
3558 struct sh_elf_obj_tdata
3559 {
3560 struct elf_obj_tdata root;
3561
3562 /* tls_type for each local got entry. */
3563 char *local_got_tls_type;
3564 };
3565
3566 #define sh_elf_tdata(abfd) \
3567 ((struct sh_elf_obj_tdata *) (abfd)->tdata.any)
3568
3569 #define sh_elf_local_got_tls_type(abfd) \
3570 (sh_elf_tdata (abfd)->local_got_tls_type)
3571
3572 /* Override the generic function because we need to store sh_elf_obj_tdata
3573 as the specific tdata. */
3574
3575 static bfd_boolean
3576 sh_elf_mkobject (abfd)
3577 bfd *abfd;
3578 {
3579 bfd_size_type amt = sizeof (struct sh_elf_obj_tdata);
3580 abfd->tdata.any = bfd_zalloc (abfd, amt);
3581 if (abfd->tdata.any == NULL)
3582 return FALSE;
3583 return TRUE;
3584 }
3585
3586 /* sh ELF linker hash table. */
3587
3588 struct elf_sh_link_hash_table
3589 {
3590 struct elf_link_hash_table root;
3591
3592 /* Short-cuts to get to dynamic linker sections. */
3593 asection *sgot;
3594 asection *sgotplt;
3595 asection *srelgot;
3596 asection *splt;
3597 asection *srelplt;
3598 asection *sdynbss;
3599 asection *srelbss;
3600
3601 /* Small local sym to section mapping cache. */
3602 struct sym_sec_cache sym_sec;
3603
3604 /* A counter or offset to track a TLS got entry. */
3605 union
3606 {
3607 bfd_signed_vma refcount;
3608 bfd_vma offset;
3609 } tls_ldm_got;
3610 };
3611
3612 /* Traverse an sh ELF linker hash table. */
3613
3614 #define sh_elf_link_hash_traverse(table, func, info) \
3615 (elf_link_hash_traverse \
3616 (&(table)->root, \
3617 (bfd_boolean (*) PARAMS ((struct elf_link_hash_entry *, PTR))) (func), \
3618 (info)))
3619
3620 /* Get the sh ELF linker hash table from a link_info structure. */
3621
3622 #define sh_elf_hash_table(p) \
3623 ((struct elf_sh_link_hash_table *) ((p)->hash))
3624
3625 /* Create an entry in an sh ELF linker hash table. */
3626
3627 static struct bfd_hash_entry *
3628 sh_elf_link_hash_newfunc (entry, table, string)
3629 struct bfd_hash_entry *entry;
3630 struct bfd_hash_table *table;
3631 const char *string;
3632 {
3633 struct elf_sh_link_hash_entry *ret =
3634 (struct elf_sh_link_hash_entry *) entry;
3635
3636 /* Allocate the structure if it has not already been allocated by a
3637 subclass. */
3638 if (ret == (struct elf_sh_link_hash_entry *) NULL)
3639 ret = ((struct elf_sh_link_hash_entry *)
3640 bfd_hash_allocate (table,
3641 sizeof (struct elf_sh_link_hash_entry)));
3642 if (ret == (struct elf_sh_link_hash_entry *) NULL)
3643 return (struct bfd_hash_entry *) ret;
3644
3645 /* Call the allocation method of the superclass. */
3646 ret = ((struct elf_sh_link_hash_entry *)
3647 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
3648 table, string));
3649 if (ret != (struct elf_sh_link_hash_entry *) NULL)
3650 {
3651 ret->dyn_relocs = NULL;
3652 ret->gotplt_refcount = 0;
3653 #ifdef INCLUDE_SHMEDIA
3654 ret->datalabel_got.refcount = ret->root.got.refcount;
3655 #endif
3656 ret->tls_type = GOT_UNKNOWN;
3657 }
3658
3659 return (struct bfd_hash_entry *) ret;
3660 }
3661
3662 /* Create an sh ELF linker hash table. */
3663
3664 static struct bfd_link_hash_table *
3665 sh_elf_link_hash_table_create (abfd)
3666 bfd *abfd;
3667 {
3668 struct elf_sh_link_hash_table *ret;
3669 bfd_size_type amt = sizeof (struct elf_sh_link_hash_table);
3670
3671 ret = (struct elf_sh_link_hash_table *) bfd_malloc (amt);
3672 if (ret == (struct elf_sh_link_hash_table *) NULL)
3673 return NULL;
3674
3675 if (! _bfd_elf_link_hash_table_init (&ret->root, abfd,
3676 sh_elf_link_hash_newfunc))
3677 {
3678 free (ret);
3679 return NULL;
3680 }
3681
3682 ret->sgot = NULL;
3683 ret->sgotplt = NULL;
3684 ret->srelgot = NULL;
3685 ret->splt = NULL;
3686 ret->srelplt = NULL;
3687 ret->sdynbss = NULL;
3688 ret->srelbss = NULL;
3689 ret->sym_sec.abfd = NULL;
3690 ret->tls_ldm_got.refcount = 0;
3691
3692 return &ret->root.root;
3693 }
3694
3695 /* Create .got, .gotplt, and .rela.got sections in DYNOBJ, and set up
3696 shortcuts to them in our hash table. */
3697
3698 static bfd_boolean
3699 create_got_section (dynobj, info)
3700 bfd *dynobj;
3701 struct bfd_link_info *info;
3702 {
3703 struct elf_sh_link_hash_table *htab;
3704
3705 if (! _bfd_elf_create_got_section (dynobj, info))
3706 return FALSE;
3707
3708 htab = sh_elf_hash_table (info);
3709 htab->sgot = bfd_get_section_by_name (dynobj, ".got");
3710 htab->sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
3711 if (! htab->sgot || ! htab->sgotplt)
3712 abort ();
3713
3714 htab->srelgot = bfd_make_section (dynobj, ".rela.got");
3715 if (htab->srelgot == NULL
3716 || ! bfd_set_section_flags (dynobj, htab->srelgot,
3717 (SEC_ALLOC
3718 | SEC_LOAD
3719 | SEC_HAS_CONTENTS
3720 | SEC_IN_MEMORY
3721 | SEC_LINKER_CREATED
3722 | SEC_READONLY))
3723 || ! bfd_set_section_alignment (dynobj, htab->srelgot, 2))
3724 return FALSE;
3725 return TRUE;
3726 }
3727
3728 /* Create dynamic sections when linking against a dynamic object. */
3729
3730 static bfd_boolean
3731 sh_elf_create_dynamic_sections (abfd, info)
3732 bfd *abfd;
3733 struct bfd_link_info *info;
3734 {
3735 struct elf_sh_link_hash_table *htab;
3736 flagword flags, pltflags;
3737 register asection *s;
3738 struct elf_backend_data *bed = get_elf_backend_data (abfd);
3739 int ptralign = 0;
3740
3741 switch (bed->s->arch_size)
3742 {
3743 case 32:
3744 ptralign = 2;
3745 break;
3746
3747 case 64:
3748 ptralign = 3;
3749 break;
3750
3751 default:
3752 bfd_set_error (bfd_error_bad_value);
3753 return FALSE;
3754 }
3755
3756 htab = sh_elf_hash_table (info);
3757 if (htab->root.dynamic_sections_created)
3758 return TRUE;
3759
3760 /* We need to create .plt, .rel[a].plt, .got, .got.plt, .dynbss, and
3761 .rel[a].bss sections. */
3762
3763 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3764 | SEC_LINKER_CREATED);
3765
3766 pltflags = flags;
3767 pltflags |= SEC_CODE;
3768 if (bed->plt_not_loaded)
3769 pltflags &= ~ (SEC_LOAD | SEC_HAS_CONTENTS);
3770 if (bed->plt_readonly)
3771 pltflags |= SEC_READONLY;
3772
3773 s = bfd_make_section (abfd, ".plt");
3774 htab->splt = s;
3775 if (s == NULL
3776 || ! bfd_set_section_flags (abfd, s, pltflags)
3777 || ! bfd_set_section_alignment (abfd, s, bed->plt_alignment))
3778 return FALSE;
3779
3780 if (bed->want_plt_sym)
3781 {
3782 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
3783 .plt section. */
3784 struct elf_link_hash_entry *h;
3785 struct bfd_link_hash_entry *bh = NULL;
3786
3787 if (! (_bfd_generic_link_add_one_symbol
3788 (info, abfd, "_PROCEDURE_LINKAGE_TABLE_", BSF_GLOBAL, s,
3789 (bfd_vma) 0, (const char *) NULL, FALSE,
3790 get_elf_backend_data (abfd)->collect, &bh)))
3791 return FALSE;
3792
3793 h = (struct elf_link_hash_entry *) bh;
3794 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
3795 h->type = STT_OBJECT;
3796
3797 if (info->shared
3798 && ! _bfd_elf_link_record_dynamic_symbol (info, h))
3799 return FALSE;
3800 }
3801
3802 s = bfd_make_section (abfd,
3803 bed->default_use_rela_p ? ".rela.plt" : ".rel.plt");
3804 htab->srelplt = s;
3805 if (s == NULL
3806 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
3807 || ! bfd_set_section_alignment (abfd, s, ptralign))
3808 return FALSE;
3809
3810 if (htab->sgot == NULL
3811 && !create_got_section (abfd, info))
3812 return FALSE;
3813
3814 {
3815 const char *secname;
3816 char *relname;
3817 flagword secflags;
3818 asection *sec;
3819
3820 for (sec = abfd->sections; sec; sec = sec->next)
3821 {
3822 secflags = bfd_get_section_flags (abfd, sec);
3823 if ((secflags & (SEC_DATA | SEC_LINKER_CREATED))
3824 || ((secflags & SEC_HAS_CONTENTS) != SEC_HAS_CONTENTS))
3825 continue;
3826 secname = bfd_get_section_name (abfd, sec);
3827 relname = (char *) bfd_malloc ((bfd_size_type) strlen (secname) + 6);
3828 strcpy (relname, ".rela");
3829 strcat (relname, secname);
3830 if (bfd_get_section_by_name (abfd, secname))
3831 continue;
3832 s = bfd_make_section (abfd, relname);
3833 if (s == NULL
3834 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
3835 || ! bfd_set_section_alignment (abfd, s, ptralign))
3836 return FALSE;
3837 }
3838 }
3839
3840 if (bed->want_dynbss)
3841 {
3842 /* The .dynbss section is a place to put symbols which are defined
3843 by dynamic objects, are referenced by regular objects, and are
3844 not functions. We must allocate space for them in the process
3845 image and use a R_*_COPY reloc to tell the dynamic linker to
3846 initialize them at run time. The linker script puts the .dynbss
3847 section into the .bss section of the final image. */
3848 s = bfd_make_section (abfd, ".dynbss");
3849 htab->sdynbss = s;
3850 if (s == NULL
3851 || ! bfd_set_section_flags (abfd, s, SEC_ALLOC))
3852 return FALSE;
3853
3854 /* The .rel[a].bss section holds copy relocs. This section is not
3855 normally needed. We need to create it here, though, so that the
3856 linker will map it to an output section. We can't just create it
3857 only if we need it, because we will not know whether we need it
3858 until we have seen all the input files, and the first time the
3859 main linker code calls BFD after examining all the input files
3860 (size_dynamic_sections) the input sections have already been
3861 mapped to the output sections. If the section turns out not to
3862 be needed, we can discard it later. We will never need this
3863 section when generating a shared object, since they do not use
3864 copy relocs. */
3865 if (! info->shared)
3866 {
3867 s = bfd_make_section (abfd,
3868 (bed->default_use_rela_p
3869 ? ".rela.bss" : ".rel.bss"));
3870 htab->srelbss = s;
3871 if (s == NULL
3872 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
3873 || ! bfd_set_section_alignment (abfd, s, ptralign))
3874 return FALSE;
3875 }
3876 }
3877
3878 return TRUE;
3879 }
3880 \f
3881 /* Adjust a symbol defined by a dynamic object and referenced by a
3882 regular object. The current definition is in some section of the
3883 dynamic object, but we're not including those sections. We have to
3884 change the definition to something the rest of the link can
3885 understand. */
3886
3887 static bfd_boolean
3888 sh_elf_adjust_dynamic_symbol (info, h)
3889 struct bfd_link_info *info;
3890 struct elf_link_hash_entry *h;
3891 {
3892 struct elf_sh_link_hash_table *htab;
3893 struct elf_sh_link_hash_entry *eh;
3894 struct elf_sh_dyn_relocs *p;
3895 asection *s;
3896 unsigned int power_of_two;
3897
3898 htab = sh_elf_hash_table (info);
3899
3900 /* Make sure we know what is going on here. */
3901 BFD_ASSERT (htab->root.dynobj != NULL
3902 && ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT)
3903 || h->weakdef != NULL
3904 || ((h->elf_link_hash_flags
3905 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
3906 && (h->elf_link_hash_flags
3907 & ELF_LINK_HASH_REF_REGULAR) != 0
3908 && (h->elf_link_hash_flags
3909 & ELF_LINK_HASH_DEF_REGULAR) == 0)));
3910
3911 /* If this is a function, put it in the procedure linkage table. We
3912 will fill in the contents of the procedure linkage table later,
3913 when we know the address of the .got section. */
3914 if (h->type == STT_FUNC
3915 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
3916 {
3917 if (h->plt.refcount <= 0
3918 || (! info->shared
3919 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
3920 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) == 0
3921 && h->root.type != bfd_link_hash_undefweak
3922 && h->root.type != bfd_link_hash_undefined))
3923 {
3924 /* This case can occur if we saw a PLT reloc in an input
3925 file, but the symbol was never referred to by a dynamic
3926 object. In such a case, we don't actually need to build
3927 a procedure linkage table, and we can just do a REL32
3928 reloc instead. */
3929 h->plt.offset = (bfd_vma) -1;
3930 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
3931 }
3932
3933 return TRUE;
3934 }
3935 else
3936 h->plt.offset = (bfd_vma) -1;
3937
3938 /* If this is a weak symbol, and there is a real definition, the
3939 processor independent code will have arranged for us to see the
3940 real definition first, and we can just use the same value. */
3941 if (h->weakdef != NULL)
3942 {
3943 BFD_ASSERT (h->weakdef->root.type == bfd_link_hash_defined
3944 || h->weakdef->root.type == bfd_link_hash_defweak);
3945 h->root.u.def.section = h->weakdef->root.u.def.section;
3946 h->root.u.def.value = h->weakdef->root.u.def.value;
3947 if (info->nocopyreloc)
3948 h->elf_link_hash_flags
3949 = ((h->elf_link_hash_flags & ~ELF_LINK_NON_GOT_REF)
3950 | (h->weakdef->elf_link_hash_flags & ELF_LINK_NON_GOT_REF));
3951 return TRUE;
3952 }
3953
3954 /* This is a reference to a symbol defined by a dynamic object which
3955 is not a function. */
3956
3957 /* If we are creating a shared library, we must presume that the
3958 only references to the symbol are via the global offset table.
3959 For such cases we need not do anything here; the relocations will
3960 be handled correctly by relocate_section. */
3961 if (info->shared)
3962 return TRUE;
3963
3964 /* If there are no references to this symbol that do not use the
3965 GOT, we don't need to generate a copy reloc. */
3966 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0)
3967 return TRUE;
3968
3969 /* If -z nocopyreloc was given, we won't generate them either. */
3970 if (info->nocopyreloc)
3971 {
3972 h->elf_link_hash_flags &= ~ELF_LINK_NON_GOT_REF;
3973 return TRUE;
3974 }
3975
3976 eh = (struct elf_sh_link_hash_entry *) h;
3977 for (p = eh->dyn_relocs; p != NULL; p = p->next)
3978 {
3979 s = p->sec->output_section;
3980 if (s != NULL && (s->flags & (SEC_READONLY | SEC_HAS_CONTENTS)) != 0)
3981 break;
3982 }
3983
3984 /* If we didn't find any dynamic relocs in sections which needs the
3985 copy reloc, then we'll be keeping the dynamic relocs and avoiding
3986 the copy reloc. */
3987 if (p == NULL)
3988 {
3989 h->elf_link_hash_flags &= ~ELF_LINK_NON_GOT_REF;
3990 return TRUE;
3991 }
3992
3993 /* We must allocate the symbol in our .dynbss section, which will
3994 become part of the .bss section of the executable. There will be
3995 an entry for this symbol in the .dynsym section. The dynamic
3996 object will contain position independent code, so all references
3997 from the dynamic object to this symbol will go through the global
3998 offset table. The dynamic linker will use the .dynsym entry to
3999 determine the address it must put in the global offset table, so
4000 both the dynamic object and the regular object will refer to the
4001 same memory location for the variable. */
4002
4003 s = htab->sdynbss;
4004 BFD_ASSERT (s != NULL);
4005
4006 /* We must generate a R_SH_COPY reloc to tell the dynamic linker to
4007 copy the initial value out of the dynamic object and into the
4008 runtime process image. We need to remember the offset into the
4009 .rela.bss section we are going to use. */
4010 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
4011 {
4012 asection *srel;
4013
4014 srel = htab->srelbss;
4015 BFD_ASSERT (srel != NULL);
4016 srel->_raw_size += sizeof (Elf32_External_Rela);
4017 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
4018 }
4019
4020 /* We need to figure out the alignment required for this symbol. I
4021 have no idea how ELF linkers handle this. */
4022 power_of_two = bfd_log2 (h->size);
4023 if (power_of_two > 3)
4024 power_of_two = 3;
4025
4026 /* Apply the required alignment. */
4027 s->_raw_size = BFD_ALIGN (s->_raw_size, (bfd_size_type) (1 << power_of_two));
4028 if (power_of_two > bfd_get_section_alignment (htab->root.dynobj, s))
4029 {
4030 if (! bfd_set_section_alignment (htab->root.dynobj, s, power_of_two))
4031 return FALSE;
4032 }
4033
4034 /* Define the symbol as being at this point in the section. */
4035 h->root.u.def.section = s;
4036 h->root.u.def.value = s->_raw_size;
4037
4038 /* Increment the section size to make room for the symbol. */
4039 s->_raw_size += h->size;
4040
4041 return TRUE;
4042 }
4043
4044 /* This is the condition under which sh_elf_finish_dynamic_symbol
4045 will be called from elflink.h. If elflink.h doesn't call our
4046 finish_dynamic_symbol routine, we'll need to do something about
4047 initializing any .plt and .got entries in sh_elf_relocate_section. */
4048 #define WILL_CALL_FINISH_DYNAMIC_SYMBOL(DYN, SHARED, H) \
4049 ((DYN) \
4050 && ((SHARED) \
4051 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0) \
4052 && ((H)->dynindx != -1 \
4053 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0))
4054
4055 /* Allocate space in .plt, .got and associated reloc sections for
4056 dynamic relocs. */
4057
4058 static bfd_boolean
4059 allocate_dynrelocs (h, inf)
4060 struct elf_link_hash_entry *h;
4061 PTR inf;
4062 {
4063 struct bfd_link_info *info;
4064 struct elf_sh_link_hash_table *htab;
4065 struct elf_sh_link_hash_entry *eh;
4066 struct elf_sh_dyn_relocs *p;
4067
4068 if (h->root.type == bfd_link_hash_indirect)
4069 return TRUE;
4070
4071 if (h->root.type == bfd_link_hash_warning)
4072 /* When warning symbols are created, they **replace** the "real"
4073 entry in the hash table, thus we never get to see the real
4074 symbol in a hash traversal. So look at it now. */
4075 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4076
4077 info = (struct bfd_link_info *) inf;
4078 htab = sh_elf_hash_table (info);
4079
4080 eh = (struct elf_sh_link_hash_entry *) h;
4081 if ((h->got.refcount > 0
4082 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL))
4083 && eh->gotplt_refcount > 0)
4084 {
4085 /* The symbol has been forced local, or we have some direct got refs,
4086 so treat all the gotplt refs as got refs. */
4087 h->got.refcount += eh->gotplt_refcount;
4088 if (h->plt.refcount >= eh->gotplt_refcount)
4089 h->plt.refcount -= eh->gotplt_refcount;
4090 }
4091
4092 if (htab->root.dynamic_sections_created
4093 && h->plt.refcount > 0
4094 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
4095 || h->root.type != bfd_link_hash_undefweak))
4096 {
4097 /* Make sure this symbol is output as a dynamic symbol.
4098 Undefined weak syms won't yet be marked as dynamic. */
4099 if (h->dynindx == -1
4100 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
4101 {
4102 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
4103 return FALSE;
4104 }
4105
4106 if (info->shared
4107 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
4108 {
4109 asection *s = htab->splt;
4110
4111 /* If this is the first .plt entry, make room for the special
4112 first entry. */
4113 if (s->_raw_size == 0)
4114 s->_raw_size += PLT_ENTRY_SIZE;
4115
4116 h->plt.offset = s->_raw_size;
4117
4118 /* If this symbol is not defined in a regular file, and we are
4119 not generating a shared library, then set the symbol to this
4120 location in the .plt. This is required to make function
4121 pointers compare as equal between the normal executable and
4122 the shared library. */
4123 if (! info->shared
4124 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
4125 {
4126 h->root.u.def.section = s;
4127 h->root.u.def.value = h->plt.offset;
4128 }
4129
4130 /* Make room for this entry. */
4131 s->_raw_size += PLT_ENTRY_SIZE;
4132
4133 /* We also need to make an entry in the .got.plt section, which
4134 will be placed in the .got section by the linker script. */
4135 htab->sgotplt->_raw_size += 4;
4136
4137 /* We also need to make an entry in the .rel.plt section. */
4138 htab->srelplt->_raw_size += sizeof (Elf32_External_Rela);
4139 }
4140 else
4141 {
4142 h->plt.offset = (bfd_vma) -1;
4143 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
4144 }
4145 }
4146 else
4147 {
4148 h->plt.offset = (bfd_vma) -1;
4149 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
4150 }
4151
4152 if (h->got.refcount > 0)
4153 {
4154 asection *s;
4155 bfd_boolean dyn;
4156 int tls_type = sh_elf_hash_entry (h)->tls_type;
4157
4158 /* Make sure this symbol is output as a dynamic symbol.
4159 Undefined weak syms won't yet be marked as dynamic. */
4160 if (h->dynindx == -1
4161 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
4162 {
4163 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
4164 return FALSE;
4165 }
4166
4167 s = htab->sgot;
4168 h->got.offset = s->_raw_size;
4169 s->_raw_size += 4;
4170 /* R_SH_TLS_GD needs 2 consecutive GOT slots. */
4171 if (tls_type == GOT_TLS_GD)
4172 s->_raw_size += 4;
4173 dyn = htab->root.dynamic_sections_created;
4174 /* R_SH_TLS_IE_32 needs one dynamic relocation if dynamic,
4175 R_SH_TLS_GD needs one if local symbol and two if global. */
4176 if ((tls_type == GOT_TLS_GD && h->dynindx == -1)
4177 || (tls_type == GOT_TLS_IE && dyn))
4178 htab->srelgot->_raw_size += sizeof (Elf32_External_Rela);
4179 else if (tls_type == GOT_TLS_GD)
4180 htab->srelgot->_raw_size += 2 * sizeof (Elf32_External_Rela);
4181 else if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
4182 || h->root.type != bfd_link_hash_undefweak)
4183 && (info->shared
4184 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
4185 htab->srelgot->_raw_size += sizeof (Elf32_External_Rela);
4186 }
4187 else
4188 h->got.offset = (bfd_vma) -1;
4189
4190 #ifdef INCLUDE_SHMEDIA
4191 if (eh->datalabel_got.refcount > 0)
4192 {
4193 asection *s;
4194 bfd_boolean dyn;
4195
4196 /* Make sure this symbol is output as a dynamic symbol.
4197 Undefined weak syms won't yet be marked as dynamic. */
4198 if (h->dynindx == -1
4199 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
4200 {
4201 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
4202 return FALSE;
4203 }
4204
4205 s = htab->sgot;
4206 eh->datalabel_got.offset = s->_raw_size;
4207 s->_raw_size += 4;
4208 dyn = htab->root.dynamic_sections_created;
4209 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h))
4210 htab->srelgot->_raw_size += sizeof (Elf32_External_Rela);
4211 }
4212 else
4213 eh->datalabel_got.offset = (bfd_vma) -1;
4214 #endif
4215
4216 if (eh->dyn_relocs == NULL)
4217 return TRUE;
4218
4219 /* In the shared -Bsymbolic case, discard space allocated for
4220 dynamic pc-relative relocs against symbols which turn out to be
4221 defined in regular objects. For the normal shared case, discard
4222 space for pc-relative relocs that have become local due to symbol
4223 visibility changes. */
4224
4225 if (info->shared)
4226 {
4227 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
4228 && ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0
4229 || info->symbolic))
4230 {
4231 struct elf_sh_dyn_relocs **pp;
4232
4233 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
4234 {
4235 p->count -= p->pc_count;
4236 p->pc_count = 0;
4237 if (p->count == 0)
4238 *pp = p->next;
4239 else
4240 pp = &p->next;
4241 }
4242 }
4243
4244 /* Also discard relocs on undefined weak syms with non-default
4245 visibility. */
4246 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
4247 && h->root.type == bfd_link_hash_undefweak)
4248 eh->dyn_relocs = NULL;
4249 }
4250 else
4251 {
4252 /* For the non-shared case, discard space for relocs against
4253 symbols which turn out to need copy relocs or are not
4254 dynamic. */
4255
4256 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
4257 && (((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
4258 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
4259 || (htab->root.dynamic_sections_created
4260 && (h->root.type == bfd_link_hash_undefweak
4261 || h->root.type == bfd_link_hash_undefined))))
4262 {
4263 /* Make sure this symbol is output as a dynamic symbol.
4264 Undefined weak syms won't yet be marked as dynamic. */
4265 if (h->dynindx == -1
4266 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
4267 {
4268 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
4269 return FALSE;
4270 }
4271
4272 /* If that succeeded, we know we'll be keeping all the
4273 relocs. */
4274 if (h->dynindx != -1)
4275 goto keep;
4276 }
4277
4278 eh->dyn_relocs = NULL;
4279
4280 keep: ;
4281 }
4282
4283 /* Finally, allocate space. */
4284 for (p = eh->dyn_relocs; p != NULL; p = p->next)
4285 {
4286 asection *sreloc = elf_section_data (p->sec)->sreloc;
4287 sreloc->_raw_size += p->count * sizeof (Elf32_External_Rela);
4288 }
4289
4290 return TRUE;
4291 }
4292
4293 /* Find any dynamic relocs that apply to read-only sections. */
4294
4295 static bfd_boolean
4296 readonly_dynrelocs (h, inf)
4297 struct elf_link_hash_entry *h;
4298 PTR inf;
4299 {
4300 struct elf_sh_link_hash_entry *eh;
4301 struct elf_sh_dyn_relocs *p;
4302
4303 if (h->root.type == bfd_link_hash_warning)
4304 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4305
4306 eh = (struct elf_sh_link_hash_entry *) h;
4307 for (p = eh->dyn_relocs; p != NULL; p = p->next)
4308 {
4309 asection *s = p->sec->output_section;
4310
4311 if (s != NULL && (s->flags & SEC_READONLY) != 0)
4312 {
4313 struct bfd_link_info *info = (struct bfd_link_info *) inf;
4314
4315 info->flags |= DF_TEXTREL;
4316
4317 /* Not an error, just cut short the traversal. */
4318 return FALSE;
4319 }
4320 }
4321 return TRUE;
4322 }
4323
4324 /* Set the sizes of the dynamic sections. */
4325
4326 static bfd_boolean
4327 sh_elf_size_dynamic_sections (output_bfd, info)
4328 bfd *output_bfd ATTRIBUTE_UNUSED;
4329 struct bfd_link_info *info;
4330 {
4331 struct elf_sh_link_hash_table *htab;
4332 bfd *dynobj;
4333 asection *s;
4334 bfd_boolean relocs;
4335 bfd *ibfd;
4336
4337 htab = sh_elf_hash_table (info);
4338 dynobj = htab->root.dynobj;
4339 BFD_ASSERT (dynobj != NULL);
4340
4341 if (htab->root.dynamic_sections_created)
4342 {
4343 /* Set the contents of the .interp section to the interpreter. */
4344 if (info->executable)
4345 {
4346 s = bfd_get_section_by_name (dynobj, ".interp");
4347 BFD_ASSERT (s != NULL);
4348 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
4349 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
4350 }
4351 }
4352
4353 /* Set up .got offsets for local syms, and space for local dynamic
4354 relocs. */
4355 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
4356 {
4357 bfd_signed_vma *local_got;
4358 bfd_signed_vma *end_local_got;
4359 char *local_tls_type;
4360 bfd_size_type locsymcount;
4361 Elf_Internal_Shdr *symtab_hdr;
4362 asection *srel;
4363
4364 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
4365 continue;
4366
4367 for (s = ibfd->sections; s != NULL; s = s->next)
4368 {
4369 struct elf_sh_dyn_relocs *p;
4370
4371 for (p = ((struct elf_sh_dyn_relocs *)
4372 elf_section_data (s)->local_dynrel);
4373 p != NULL;
4374 p = p->next)
4375 {
4376 if (! bfd_is_abs_section (p->sec)
4377 && bfd_is_abs_section (p->sec->output_section))
4378 {
4379 /* Input section has been discarded, either because
4380 it is a copy of a linkonce section or due to
4381 linker script /DISCARD/, so we'll be discarding
4382 the relocs too. */
4383 }
4384 else if (p->count != 0)
4385 {
4386 srel = elf_section_data (p->sec)->sreloc;
4387 srel->_raw_size += p->count * sizeof (Elf32_External_Rela);
4388 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
4389 info->flags |= DF_TEXTREL;
4390 }
4391 }
4392 }
4393
4394 local_got = elf_local_got_refcounts (ibfd);
4395 if (!local_got)
4396 continue;
4397
4398 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
4399 locsymcount = symtab_hdr->sh_info;
4400 #ifdef INCLUDE_SHMEDIA
4401 /* Count datalabel local GOT. */
4402 locsymcount *= 2;
4403 #endif
4404 end_local_got = local_got + locsymcount;
4405 local_tls_type = sh_elf_local_got_tls_type (ibfd);
4406 s = htab->sgot;
4407 srel = htab->srelgot;
4408 for (; local_got < end_local_got; ++local_got)
4409 {
4410 if (*local_got > 0)
4411 {
4412 *local_got = s->_raw_size;
4413 s->_raw_size += 4;
4414 if (*local_tls_type == GOT_TLS_GD)
4415 s->_raw_size += 4;
4416 if (info->shared)
4417 srel->_raw_size += sizeof (Elf32_External_Rela);
4418 }
4419 else
4420 *local_got = (bfd_vma) -1;
4421 ++local_tls_type;
4422 }
4423 }
4424
4425 if (htab->tls_ldm_got.refcount > 0)
4426 {
4427 /* Allocate 2 got entries and 1 dynamic reloc for R_SH_TLS_LD_32
4428 relocs. */
4429 htab->tls_ldm_got.offset = htab->sgot->_raw_size;
4430 htab->sgot->_raw_size += 8;
4431 htab->srelgot->_raw_size += sizeof (Elf32_External_Rela);
4432 }
4433 else
4434 htab->tls_ldm_got.offset = -1;
4435
4436 /* Allocate global sym .plt and .got entries, and space for global
4437 sym dynamic relocs. */
4438 elf_link_hash_traverse (&htab->root, allocate_dynrelocs, (PTR) info);
4439
4440 /* We now have determined the sizes of the various dynamic sections.
4441 Allocate memory for them. */
4442 relocs = FALSE;
4443 for (s = dynobj->sections; s != NULL; s = s->next)
4444 {
4445 if ((s->flags & SEC_LINKER_CREATED) == 0)
4446 continue;
4447
4448 if (s == htab->splt
4449 || s == htab->sgot
4450 || s == htab->sgotplt)
4451 {
4452 /* Strip this section if we don't need it; see the
4453 comment below. */
4454 }
4455 else if (strncmp (bfd_get_section_name (dynobj, s), ".rela", 5) == 0)
4456 {
4457 if (s->_raw_size != 0 && s != htab->srelplt)
4458 relocs = TRUE;
4459
4460 /* We use the reloc_count field as a counter if we need
4461 to copy relocs into the output file. */
4462 s->reloc_count = 0;
4463 }
4464 else
4465 {
4466 /* It's not one of our sections, so don't allocate space. */
4467 continue;
4468 }
4469
4470 if (s->_raw_size == 0)
4471 {
4472 /* If we don't need this section, strip it from the
4473 output file. This is mostly to handle .rela.bss and
4474 .rela.plt. We must create both sections in
4475 create_dynamic_sections, because they must be created
4476 before the linker maps input sections to output
4477 sections. The linker does that before
4478 adjust_dynamic_symbol is called, and it is that
4479 function which decides whether anything needs to go
4480 into these sections. */
4481
4482 _bfd_strip_section_from_output (info, s);
4483 continue;
4484 }
4485
4486 /* Allocate memory for the section contents. We use bfd_zalloc
4487 here in case unused entries are not reclaimed before the
4488 section's contents are written out. This should not happen,
4489 but this way if it does, we get a R_SH_NONE reloc instead
4490 of garbage. */
4491 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->_raw_size);
4492 if (s->contents == NULL)
4493 return FALSE;
4494 }
4495
4496 if (htab->root.dynamic_sections_created)
4497 {
4498 /* Add some entries to the .dynamic section. We fill in the
4499 values later, in sh_elf_finish_dynamic_sections, but we
4500 must add the entries now so that we get the correct size for
4501 the .dynamic section. The DT_DEBUG entry is filled in by the
4502 dynamic linker and used by the debugger. */
4503 #define add_dynamic_entry(TAG, VAL) \
4504 bfd_elf32_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
4505
4506 if (info->executable)
4507 {
4508 if (! add_dynamic_entry (DT_DEBUG, 0))
4509 return FALSE;
4510 }
4511
4512 if (htab->splt->_raw_size != 0)
4513 {
4514 if (! add_dynamic_entry (DT_PLTGOT, 0)
4515 || ! add_dynamic_entry (DT_PLTRELSZ, 0)
4516 || ! add_dynamic_entry (DT_PLTREL, DT_RELA)
4517 || ! add_dynamic_entry (DT_JMPREL, 0))
4518 return FALSE;
4519 }
4520
4521 if (relocs)
4522 {
4523 if (! add_dynamic_entry (DT_RELA, 0)
4524 || ! add_dynamic_entry (DT_RELASZ, 0)
4525 || ! add_dynamic_entry (DT_RELAENT,
4526 sizeof (Elf32_External_Rela)))
4527 return FALSE;
4528
4529 /* If any dynamic relocs apply to a read-only section,
4530 then we need a DT_TEXTREL entry. */
4531 if ((info->flags & DF_TEXTREL) == 0)
4532 elf_link_hash_traverse (&htab->root, readonly_dynrelocs,
4533 (PTR) info);
4534
4535 if ((info->flags & DF_TEXTREL) != 0)
4536 {
4537 if (! add_dynamic_entry (DT_TEXTREL, 0))
4538 return FALSE;
4539 }
4540 }
4541 }
4542 #undef add_dynamic_entry
4543
4544 return TRUE;
4545 }
4546 \f
4547 /* Relocate an SH ELF section. */
4548
4549 static bfd_boolean
4550 sh_elf_relocate_section (output_bfd, info, input_bfd, input_section,
4551 contents, relocs, local_syms, local_sections)
4552 bfd *output_bfd;
4553 struct bfd_link_info *info;
4554 bfd *input_bfd;
4555 asection *input_section;
4556 bfd_byte *contents;
4557 Elf_Internal_Rela *relocs;
4558 Elf_Internal_Sym *local_syms;
4559 asection **local_sections;
4560 {
4561 struct elf_sh_link_hash_table *htab;
4562 Elf_Internal_Shdr *symtab_hdr;
4563 struct elf_link_hash_entry **sym_hashes;
4564 Elf_Internal_Rela *rel, *relend;
4565 bfd *dynobj;
4566 bfd_vma *local_got_offsets;
4567 asection *sgot;
4568 asection *sgotplt;
4569 asection *splt;
4570 asection *sreloc;
4571 asection *srelgot;
4572
4573 htab = sh_elf_hash_table (info);
4574 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
4575 sym_hashes = elf_sym_hashes (input_bfd);
4576 dynobj = htab->root.dynobj;
4577 local_got_offsets = elf_local_got_offsets (input_bfd);
4578
4579 sgot = htab->sgot;
4580 sgotplt = htab->sgotplt;
4581 splt = htab->splt;
4582 sreloc = NULL;
4583 srelgot = NULL;
4584
4585 rel = relocs;
4586 relend = relocs + input_section->reloc_count;
4587 for (; rel < relend; rel++)
4588 {
4589 int r_type;
4590 reloc_howto_type *howto;
4591 unsigned long r_symndx;
4592 Elf_Internal_Sym *sym;
4593 asection *sec;
4594 struct elf_link_hash_entry *h;
4595 bfd_vma relocation;
4596 bfd_vma addend = (bfd_vma) 0;
4597 bfd_reloc_status_type r;
4598 int seen_stt_datalabel = 0;
4599 bfd_vma off;
4600 int tls_type;
4601
4602 r_symndx = ELF32_R_SYM (rel->r_info);
4603
4604 r_type = ELF32_R_TYPE (rel->r_info);
4605
4606 /* Many of the relocs are only used for relaxing, and are
4607 handled entirely by the relaxation code. */
4608 if (r_type > (int) R_SH_LAST_INVALID_RELOC
4609 && r_type < (int) R_SH_LOOP_START)
4610 continue;
4611 if (r_type == (int) R_SH_NONE)
4612 continue;
4613
4614 if (r_type < 0
4615 || r_type >= R_SH_max
4616 || (r_type >= (int) R_SH_FIRST_INVALID_RELOC
4617 && r_type <= (int) R_SH_LAST_INVALID_RELOC)
4618 || ( r_type >= (int) R_SH_FIRST_INVALID_RELOC_3
4619 && r_type <= (int) R_SH_LAST_INVALID_RELOC_3)
4620 || ( r_type >= (int) R_SH_FIRST_INVALID_RELOC_4
4621 && r_type <= (int) R_SH_LAST_INVALID_RELOC_4)
4622 || ( r_type >= (int) R_SH_FIRST_INVALID_RELOC_5
4623 && r_type <= (int) R_SH_LAST_INVALID_RELOC_5)
4624 || (r_type >= (int) R_SH_FIRST_INVALID_RELOC_2
4625 && r_type <= (int) R_SH_LAST_INVALID_RELOC_2))
4626 {
4627 bfd_set_error (bfd_error_bad_value);
4628 return FALSE;
4629 }
4630
4631 howto = sh_elf_howto_table + r_type;
4632
4633 /* For relocs that aren't partial_inplace, we get the addend from
4634 the relocation. */
4635 if (! howto->partial_inplace)
4636 addend = rel->r_addend;
4637
4638 h = NULL;
4639 sym = NULL;
4640 sec = NULL;
4641 if (r_symndx < symtab_hdr->sh_info)
4642 {
4643 sym = local_syms + r_symndx;
4644 sec = local_sections[r_symndx];
4645 relocation = (sec->output_section->vma
4646 + sec->output_offset
4647 + sym->st_value);
4648 /* A local symbol never has STO_SH5_ISA32, so we don't need
4649 datalabel processing here. Make sure this does not change
4650 without notice. */
4651 if ((sym->st_other & STO_SH5_ISA32) != 0)
4652 ((*info->callbacks->reloc_dangerous)
4653 (info,
4654 _("Unexpected STO_SH5_ISA32 on local symbol is not handled"),
4655 input_bfd, input_section, rel->r_offset));
4656 if (info->relocatable)
4657 {
4658 /* This is a relocatable link. We don't have to change
4659 anything, unless the reloc is against a section symbol,
4660 in which case we have to adjust according to where the
4661 section symbol winds up in the output section. */
4662 sym = local_syms + r_symndx;
4663 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4664 {
4665 if (! howto->partial_inplace)
4666 {
4667 /* For relocations with the addend in the
4668 relocation, we need just to update the addend.
4669 All real relocs are of type partial_inplace; this
4670 code is mostly for completeness. */
4671 rel->r_addend += sec->output_offset + sym->st_value;
4672
4673 continue;
4674 }
4675
4676 /* Relocs of type partial_inplace need to pick up the
4677 contents in the contents and add the offset resulting
4678 from the changed location of the section symbol.
4679 Using _bfd_final_link_relocate (e.g. goto
4680 final_link_relocate) here would be wrong, because
4681 relocations marked pc_relative would get the current
4682 location subtracted, and we must only do that at the
4683 final link. */
4684 r = _bfd_relocate_contents (howto, input_bfd,
4685 sec->output_offset
4686 + sym->st_value,
4687 contents + rel->r_offset);
4688 goto relocation_done;
4689 }
4690
4691 continue;
4692 }
4693 else if (! howto->partial_inplace)
4694 {
4695 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, sec, rel);
4696 addend = rel->r_addend;
4697 }
4698 else if ((sec->flags & SEC_MERGE)
4699 && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4700 {
4701 asection *msec;
4702
4703 if (howto->rightshift || howto->src_mask != 0xffffffff)
4704 {
4705 (*_bfd_error_handler)
4706 (_("%s(%s+0x%lx): %s relocation against SEC_MERGE section"),
4707 bfd_archive_filename (input_bfd),
4708 bfd_get_section_name (input_bfd, input_section),
4709 (long) rel->r_offset, howto->name);
4710 return FALSE;
4711 }
4712
4713 addend = bfd_get_32 (input_bfd, contents + rel->r_offset);
4714 msec = sec;
4715 addend =
4716 _bfd_elf_rel_local_sym (output_bfd, sym, &msec, addend)
4717 - relocation;
4718 addend += msec->output_section->vma + msec->output_offset;
4719 bfd_put_32 (input_bfd, addend, contents + rel->r_offset);
4720 addend = 0;
4721 }
4722 }
4723 else
4724 {
4725 /* Section symbol are never (?) placed in the hash table, so
4726 we can just ignore hash relocations when creating a
4727 relocatable object file. */
4728 if (info->relocatable)
4729 continue;
4730
4731 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4732 while (h->root.type == bfd_link_hash_indirect
4733 || h->root.type == bfd_link_hash_warning)
4734 {
4735 #ifdef INCLUDE_SHMEDIA
4736 /* If the reference passes a symbol marked with
4737 STT_DATALABEL, then any STO_SH5_ISA32 on the final value
4738 doesn't count. */
4739 seen_stt_datalabel |= h->type == STT_DATALABEL;
4740 #endif
4741 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4742 }
4743 if (h->root.type == bfd_link_hash_defined
4744 || h->root.type == bfd_link_hash_defweak)
4745 {
4746 bfd_boolean dyn;
4747
4748 dyn = htab->root.dynamic_sections_created;
4749 sec = h->root.u.def.section;
4750 /* In these cases, we don't need the relocation value.
4751 We check specially because in some obscure cases
4752 sec->output_section will be NULL. */
4753 if (r_type == R_SH_GOTPC
4754 || r_type == R_SH_GOTPC_LOW16
4755 || r_type == R_SH_GOTPC_MEDLOW16
4756 || r_type == R_SH_GOTPC_MEDHI16
4757 || r_type == R_SH_GOTPC_HI16
4758 || ((r_type == R_SH_PLT32
4759 || r_type == R_SH_PLT_LOW16
4760 || r_type == R_SH_PLT_MEDLOW16
4761 || r_type == R_SH_PLT_MEDHI16
4762 || r_type == R_SH_PLT_HI16)
4763 && h->plt.offset != (bfd_vma) -1)
4764 || ((r_type == R_SH_GOT32
4765 || r_type == R_SH_GOT_LOW16
4766 || r_type == R_SH_GOT_MEDLOW16
4767 || r_type == R_SH_GOT_MEDHI16
4768 || r_type == R_SH_GOT_HI16)
4769 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
4770 && (! info->shared
4771 || (! info->symbolic && h->dynindx != -1)
4772 || (h->elf_link_hash_flags
4773 & ELF_LINK_HASH_DEF_REGULAR) == 0))
4774 /* The cases above are those in which relocation is
4775 overwritten in the switch block below. The cases
4776 below are those in which we must defer relocation
4777 to run-time, because we can't resolve absolute
4778 addresses when creating a shared library. */
4779 || (info->shared
4780 && ((! info->symbolic && h->dynindx != -1)
4781 || (h->elf_link_hash_flags
4782 & ELF_LINK_HASH_DEF_REGULAR) == 0)
4783 && ((r_type == R_SH_DIR32
4784 && (h->elf_link_hash_flags
4785 & ELF_LINK_FORCED_LOCAL) == 0)
4786 || r_type == R_SH_REL32)
4787 && ((input_section->flags & SEC_ALLOC) != 0
4788 /* DWARF will emit R_SH_DIR32 relocations in its
4789 sections against symbols defined externally
4790 in shared libraries. We can't do anything
4791 with them here. */
4792 || ((input_section->flags & SEC_DEBUGGING) != 0
4793 && (h->elf_link_hash_flags
4794 & ELF_LINK_HASH_DEF_DYNAMIC) != 0)))
4795 /* Dynamic relocs are not propagated for SEC_DEBUGGING
4796 sections because such sections are not SEC_ALLOC and
4797 thus ld.so will not process them. */
4798 || (sec->output_section == NULL
4799 && ((input_section->flags & SEC_DEBUGGING) != 0
4800 && (h->elf_link_hash_flags
4801 & ELF_LINK_HASH_DEF_DYNAMIC) != 0))
4802 || (sec->output_section == NULL
4803 && (sh_elf_hash_entry (h)->tls_type == GOT_TLS_IE
4804 || sh_elf_hash_entry (h)->tls_type == GOT_TLS_GD)))
4805 relocation = 0;
4806 else if (sec->output_section == NULL)
4807 {
4808 (*_bfd_error_handler)
4809 (_("%s: unresolvable relocation against symbol `%s' from %s section"),
4810 bfd_archive_filename (input_bfd), h->root.root.string,
4811 bfd_get_section_name (input_bfd, input_section));
4812 return FALSE;
4813 }
4814 else
4815 relocation = ((h->root.u.def.value
4816 + sec->output_section->vma
4817 + sec->output_offset)
4818 /* A STO_SH5_ISA32 causes a "bitor 1" to the
4819 symbol value, unless we've seen
4820 STT_DATALABEL on the way to it. */
4821 | ((h->other & STO_SH5_ISA32) != 0
4822 && ! seen_stt_datalabel));
4823 }
4824 else if (h->root.type == bfd_link_hash_undefweak)
4825 relocation = 0;
4826 else if (info->shared
4827 && ! info->no_undefined
4828 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
4829 relocation = 0;
4830 else
4831 {
4832 if (! ((*info->callbacks->undefined_symbol)
4833 (info, h->root.root.string, input_bfd,
4834 input_section, rel->r_offset,
4835 (!info->shared || info->no_undefined
4836 || ELF_ST_VISIBILITY (h->other)))))
4837 return FALSE;
4838 relocation = 0;
4839 }
4840 }
4841
4842 switch ((int) r_type)
4843 {
4844 final_link_relocate:
4845 /* COFF relocs don't use the addend. The addend is used for
4846 R_SH_DIR32 to be compatible with other compilers. */
4847 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
4848 contents, rel->r_offset,
4849 relocation, addend);
4850 break;
4851
4852 case R_SH_IND12W:
4853 goto final_link_relocate;
4854
4855 case R_SH_DIR8WPN:
4856 case R_SH_DIR8WPZ:
4857 case R_SH_DIR8WPL:
4858 /* If the reloc is against the start of this section, then
4859 the assembler has already taken care of it and the reloc
4860 is here only to assist in relaxing. If the reloc is not
4861 against the start of this section, then it's against an
4862 external symbol and we must deal with it ourselves. */
4863 if (input_section->output_section->vma + input_section->output_offset
4864 != relocation)
4865 {
4866 int disp = (relocation
4867 - input_section->output_section->vma
4868 - input_section->output_offset
4869 - rel->r_offset);
4870 int mask = 0;
4871 switch (r_type)
4872 {
4873 case R_SH_DIR8WPN:
4874 case R_SH_DIR8WPZ: mask = 1; break;
4875 case R_SH_DIR8WPL: mask = 3; break;
4876 default: mask = 0; break;
4877 }
4878 if (disp & mask)
4879 {
4880 ((*_bfd_error_handler)
4881 (_("%s: 0x%lx: fatal: unaligned branch target for relax-support relocation"),
4882 bfd_archive_filename (input_section->owner),
4883 (unsigned long) rel->r_offset));
4884 bfd_set_error (bfd_error_bad_value);
4885 return FALSE;
4886 }
4887 relocation -= 4;
4888 goto final_link_relocate;
4889 }
4890 r = bfd_reloc_ok;
4891 break;
4892
4893 default:
4894 #ifdef INCLUDE_SHMEDIA
4895 if (shmedia_prepare_reloc (info, input_bfd, input_section,
4896 contents, rel, &relocation))
4897 goto final_link_relocate;
4898 #endif
4899 bfd_set_error (bfd_error_bad_value);
4900 return FALSE;
4901
4902 case R_SH_DIR32:
4903 case R_SH_REL32:
4904 if (info->shared
4905 && (h == NULL
4906 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
4907 || h->root.type != bfd_link_hash_undefweak)
4908 && r_symndx != 0
4909 && (input_section->flags & SEC_ALLOC) != 0
4910 && (r_type != R_SH_REL32
4911 || (h != NULL
4912 && h->dynindx != -1
4913 && (! info->symbolic
4914 || (h->elf_link_hash_flags
4915 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
4916 {
4917 Elf_Internal_Rela outrel;
4918 bfd_byte *loc;
4919 bfd_boolean skip, relocate;
4920
4921 /* When generating a shared object, these relocations
4922 are copied into the output file to be resolved at run
4923 time. */
4924
4925 if (sreloc == NULL)
4926 {
4927 const char *name;
4928
4929 name = (bfd_elf_string_from_elf_section
4930 (input_bfd,
4931 elf_elfheader (input_bfd)->e_shstrndx,
4932 elf_section_data (input_section)->rel_hdr.sh_name));
4933 if (name == NULL)
4934 return FALSE;
4935
4936 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
4937 && strcmp (bfd_get_section_name (input_bfd,
4938 input_section),
4939 name + 5) == 0);
4940
4941 sreloc = bfd_get_section_by_name (dynobj, name);
4942 BFD_ASSERT (sreloc != NULL);
4943 }
4944
4945 skip = FALSE;
4946 relocate = FALSE;
4947
4948 outrel.r_offset =
4949 _bfd_elf_section_offset (output_bfd, info, input_section,
4950 rel->r_offset);
4951 if (outrel.r_offset == (bfd_vma) -1)
4952 skip = TRUE;
4953 else if (outrel.r_offset == (bfd_vma) -2)
4954 skip = TRUE, relocate = TRUE;
4955 outrel.r_offset += (input_section->output_section->vma
4956 + input_section->output_offset);
4957
4958 if (skip)
4959 memset (&outrel, 0, sizeof outrel);
4960 else if (r_type == R_SH_REL32)
4961 {
4962 BFD_ASSERT (h != NULL && h->dynindx != -1);
4963 outrel.r_info = ELF32_R_INFO (h->dynindx, R_SH_REL32);
4964 outrel.r_addend
4965 = bfd_get_32 (input_bfd, contents + rel->r_offset);
4966 }
4967 else
4968 {
4969 /* h->dynindx may be -1 if this symbol was marked to
4970 become local. */
4971 if (h == NULL
4972 || ((info->symbolic || h->dynindx == -1)
4973 && (h->elf_link_hash_flags
4974 & ELF_LINK_HASH_DEF_REGULAR) != 0))
4975 {
4976 relocate = TRUE;
4977 outrel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
4978 outrel.r_addend
4979 = relocation + bfd_get_32 (input_bfd,
4980 contents + rel->r_offset);
4981 }
4982 else
4983 {
4984 BFD_ASSERT (h->dynindx != -1);
4985 outrel.r_info = ELF32_R_INFO (h->dynindx, R_SH_DIR32);
4986 outrel.r_addend
4987 = relocation + bfd_get_32 (input_bfd,
4988 contents + rel->r_offset);
4989 }
4990 }
4991
4992 loc = sreloc->contents;
4993 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
4994 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4995
4996 /* If this reloc is against an external symbol, we do
4997 not want to fiddle with the addend. Otherwise, we
4998 need to include the symbol value so that it becomes
4999 an addend for the dynamic reloc. */
5000 if (! relocate)
5001 continue;
5002 }
5003 goto final_link_relocate;
5004
5005 case R_SH_GOTPLT32:
5006 #ifdef INCLUDE_SHMEDIA
5007 case R_SH_GOTPLT_LOW16:
5008 case R_SH_GOTPLT_MEDLOW16:
5009 case R_SH_GOTPLT_MEDHI16:
5010 case R_SH_GOTPLT_HI16:
5011 case R_SH_GOTPLT10BY4:
5012 case R_SH_GOTPLT10BY8:
5013 #endif
5014 /* Relocation is to the entry for this symbol in the
5015 procedure linkage table. */
5016
5017 if (h == NULL
5018 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL)
5019 || ! info->shared
5020 || info->symbolic
5021 || h->dynindx == -1
5022 || h->plt.offset == (bfd_vma) -1
5023 || h->got.offset != (bfd_vma) -1)
5024 goto force_got;
5025
5026 /* Relocation is to the entry for this symbol in the global
5027 offset table extension for the procedure linkage table. */
5028
5029 BFD_ASSERT (sgotplt != NULL);
5030 relocation = (sgotplt->output_offset
5031 + ((h->plt.offset / elf_sh_sizeof_plt (info)
5032 - 1 + 3) * 4));
5033
5034 #ifdef GOT_BIAS
5035 relocation -= GOT_BIAS;
5036 #endif
5037
5038 goto final_link_relocate;
5039
5040 force_got:
5041 case R_SH_GOT32:
5042 #ifdef INCLUDE_SHMEDIA
5043 case R_SH_GOT_LOW16:
5044 case R_SH_GOT_MEDLOW16:
5045 case R_SH_GOT_MEDHI16:
5046 case R_SH_GOT_HI16:
5047 case R_SH_GOT10BY4:
5048 case R_SH_GOT10BY8:
5049 #endif
5050 /* Relocation is to the entry for this symbol in the global
5051 offset table. */
5052
5053 BFD_ASSERT (sgot != NULL);
5054
5055 if (h != NULL)
5056 {
5057 bfd_boolean dyn;
5058
5059 off = h->got.offset;
5060 #ifdef INCLUDE_SHMEDIA
5061 if (seen_stt_datalabel)
5062 {
5063 struct elf_sh_link_hash_entry *hsh;
5064
5065 hsh = (struct elf_sh_link_hash_entry *)h;
5066 off = hsh->datalabel_got.offset;
5067 }
5068 #endif
5069 BFD_ASSERT (off != (bfd_vma) -1);
5070
5071 dyn = htab->root.dynamic_sections_created;
5072 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
5073 || (info->shared
5074 && (info->symbolic || h->dynindx == -1
5075 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL))
5076 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR))
5077 || (ELF_ST_VISIBILITY (h->other)
5078 && h->root.type == bfd_link_hash_undefweak))
5079 {
5080 /* This is actually a static link, or it is a
5081 -Bsymbolic link and the symbol is defined
5082 locally, or the symbol was forced to be local
5083 because of a version file. We must initialize
5084 this entry in the global offset table. Since the
5085 offset must always be a multiple of 4, we use the
5086 least significant bit to record whether we have
5087 initialized it already.
5088
5089 When doing a dynamic link, we create a .rela.got
5090 relocation entry to initialize the value. This
5091 is done in the finish_dynamic_symbol routine. */
5092 if ((off & 1) != 0)
5093 off &= ~1;
5094 else
5095 {
5096 bfd_put_32 (output_bfd, relocation,
5097 sgot->contents + off);
5098 #ifdef INCLUDE_SHMEDIA
5099 if (seen_stt_datalabel)
5100 {
5101 struct elf_sh_link_hash_entry *hsh;
5102
5103 hsh = (struct elf_sh_link_hash_entry *)h;
5104 hsh->datalabel_got.offset |= 1;
5105 }
5106 else
5107 #endif
5108 h->got.offset |= 1;
5109 }
5110 }
5111
5112 relocation = sgot->output_offset + off;
5113 }
5114 else
5115 {
5116 #ifdef INCLUDE_SHMEDIA
5117 if (rel->r_addend)
5118 {
5119 BFD_ASSERT (local_got_offsets != NULL
5120 && (local_got_offsets[symtab_hdr->sh_info
5121 + r_symndx]
5122 != (bfd_vma) -1));
5123
5124 off = local_got_offsets[symtab_hdr->sh_info
5125 + r_symndx];
5126 }
5127 else
5128 {
5129 #endif
5130 BFD_ASSERT (local_got_offsets != NULL
5131 && local_got_offsets[r_symndx] != (bfd_vma) -1);
5132
5133 off = local_got_offsets[r_symndx];
5134 #ifdef INCLUDE_SHMEDIA
5135 }
5136 #endif
5137
5138 /* The offset must always be a multiple of 4. We use
5139 the least significant bit to record whether we have
5140 already generated the necessary reloc. */
5141 if ((off & 1) != 0)
5142 off &= ~1;
5143 else
5144 {
5145 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
5146
5147 if (info->shared)
5148 {
5149 Elf_Internal_Rela outrel;
5150 bfd_byte *loc;
5151
5152 if (srelgot == NULL)
5153 {
5154 srelgot = bfd_get_section_by_name (dynobj,
5155 ".rela.got");
5156 BFD_ASSERT (srelgot != NULL);
5157 }
5158
5159 outrel.r_offset = (sgot->output_section->vma
5160 + sgot->output_offset
5161 + off);
5162 outrel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
5163 outrel.r_addend = relocation;
5164 loc = srelgot->contents;
5165 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
5166 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
5167 }
5168
5169 #ifdef INCLUDE_SHMEDIA
5170 if (rel->r_addend)
5171 local_got_offsets[symtab_hdr->sh_info + r_symndx] |= 1;
5172 else
5173 #endif
5174 local_got_offsets[r_symndx] |= 1;
5175 }
5176
5177 relocation = sgot->output_offset + off;
5178 }
5179
5180 #ifdef GOT_BIAS
5181 relocation -= GOT_BIAS;
5182 #endif
5183
5184 goto final_link_relocate;
5185
5186 case R_SH_GOTOFF:
5187 #ifdef INCLUDE_SHMEDIA
5188 case R_SH_GOTOFF_LOW16:
5189 case R_SH_GOTOFF_MEDLOW16:
5190 case R_SH_GOTOFF_MEDHI16:
5191 case R_SH_GOTOFF_HI16:
5192 #endif
5193 /* Relocation is relative to the start of the global offset
5194 table. */
5195
5196 BFD_ASSERT (sgot != NULL);
5197
5198 /* Note that sgot->output_offset is not involved in this
5199 calculation. We always want the start of .got. If we
5200 defined _GLOBAL_OFFSET_TABLE in a different way, as is
5201 permitted by the ABI, we might have to change this
5202 calculation. */
5203 relocation -= sgot->output_section->vma;
5204
5205 #ifdef GOT_BIAS
5206 relocation -= GOT_BIAS;
5207 #endif
5208
5209 addend = rel->r_addend;
5210
5211 goto final_link_relocate;
5212
5213 case R_SH_GOTPC:
5214 #ifdef INCLUDE_SHMEDIA
5215 case R_SH_GOTPC_LOW16:
5216 case R_SH_GOTPC_MEDLOW16:
5217 case R_SH_GOTPC_MEDHI16:
5218 case R_SH_GOTPC_HI16:
5219 #endif
5220 /* Use global offset table as symbol value. */
5221
5222 BFD_ASSERT (sgot != NULL);
5223 relocation = sgot->output_section->vma;
5224
5225 #ifdef GOT_BIAS
5226 relocation += GOT_BIAS;
5227 #endif
5228
5229 addend = rel->r_addend;
5230
5231 goto final_link_relocate;
5232
5233 case R_SH_PLT32:
5234 #ifdef INCLUDE_SHMEDIA
5235 case R_SH_PLT_LOW16:
5236 case R_SH_PLT_MEDLOW16:
5237 case R_SH_PLT_MEDHI16:
5238 case R_SH_PLT_HI16:
5239 #endif
5240 /* Relocation is to the entry for this symbol in the
5241 procedure linkage table. */
5242
5243 /* Resolve a PLT reloc against a local symbol directly,
5244 without using the procedure linkage table. */
5245 if (h == NULL)
5246 goto final_link_relocate;
5247
5248 if (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL)
5249 goto final_link_relocate;
5250
5251 if (h->plt.offset == (bfd_vma) -1)
5252 {
5253 /* We didn't make a PLT entry for this symbol. This
5254 happens when statically linking PIC code, or when
5255 using -Bsymbolic. */
5256 goto final_link_relocate;
5257 }
5258
5259 BFD_ASSERT (splt != NULL);
5260 relocation = (splt->output_section->vma
5261 + splt->output_offset
5262 + h->plt.offset);
5263
5264 #ifdef INCLUDE_SHMEDIA
5265 relocation++;
5266 #endif
5267
5268 addend = rel->r_addend;
5269
5270 goto final_link_relocate;
5271
5272 case R_SH_LOOP_START:
5273 {
5274 static bfd_vma start, end;
5275
5276 start = (relocation + rel->r_addend
5277 - (sec->output_section->vma + sec->output_offset));
5278 r = sh_elf_reloc_loop (r_type, input_bfd, input_section, contents,
5279 rel->r_offset, sec, start, end);
5280 break;
5281
5282 case R_SH_LOOP_END:
5283 end = (relocation + rel->r_addend
5284 - (sec->output_section->vma + sec->output_offset));
5285 r = sh_elf_reloc_loop (r_type, input_bfd, input_section, contents,
5286 rel->r_offset, sec, start, end);
5287 break;
5288 }
5289
5290 case R_SH_TLS_GD_32:
5291 case R_SH_TLS_IE_32:
5292 r_type = sh_elf_optimized_tls_reloc (info, r_type, h == NULL);
5293 tls_type = GOT_UNKNOWN;
5294 if (h == NULL && local_got_offsets)
5295 tls_type = sh_elf_local_got_tls_type (input_bfd) [r_symndx];
5296 else if (h != NULL)
5297 {
5298 tls_type = sh_elf_hash_entry (h)->tls_type;
5299 if (! info->shared
5300 && (h->dynindx == -1
5301 || (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)))
5302 r_type = R_SH_TLS_LE_32;
5303 }
5304
5305 if (r_type == R_SH_TLS_GD_32 && tls_type == GOT_TLS_IE)
5306 r_type = R_SH_TLS_IE_32;
5307
5308 if (r_type == R_SH_TLS_LE_32)
5309 {
5310 bfd_vma offset;
5311 unsigned short insn;
5312
5313 if (ELF32_R_TYPE (rel->r_info) == R_SH_TLS_GD_32)
5314 {
5315 /* GD->LE transition:
5316 mov.l 1f,r4; mova 2f,r0; mov.l 2f,r1; add r0,r1;
5317 jsr @r1; add r12,r4; bra 3f; nop; .align 2;
5318 1: .long x$TLSGD; 2: .long __tls_get_addr@PLT; 3:
5319 We change it into:
5320 mov.l 1f,r4; stc gbr,r0; add r4,r0; nop;
5321 nop; nop; ...
5322 1: .long x@TPOFF; 2: .long __tls_get_addr@PLT; 3:. */
5323
5324 offset = rel->r_offset;
5325 BFD_ASSERT (offset >= 16);
5326 /* Size of GD instructions is 16 or 18. */
5327 offset -= 16;
5328 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5329 if ((insn & 0xff00) == 0xc700)
5330 {
5331 BFD_ASSERT (offset >= 2);
5332 offset -= 2;
5333 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5334 }
5335
5336 BFD_ASSERT ((insn & 0xff00) == 0xd400);
5337 insn = bfd_get_16 (input_bfd, contents + offset + 2);
5338 BFD_ASSERT ((insn & 0xff00) == 0xc700);
5339 insn = bfd_get_16 (input_bfd, contents + offset + 4);
5340 BFD_ASSERT ((insn & 0xff00) == 0xd100);
5341 insn = bfd_get_16 (input_bfd, contents + offset + 6);
5342 BFD_ASSERT (insn == 0x310c);
5343 insn = bfd_get_16 (input_bfd, contents + offset + 8);
5344 BFD_ASSERT (insn == 0x410b);
5345 insn = bfd_get_16 (input_bfd, contents + offset + 10);
5346 BFD_ASSERT (insn == 0x34cc);
5347
5348 bfd_put_16 (output_bfd, 0x0012, contents + offset + 2);
5349 bfd_put_16 (output_bfd, 0x304c, contents + offset + 4);
5350 bfd_put_16 (output_bfd, 0x0009, contents + offset + 6);
5351 bfd_put_16 (output_bfd, 0x0009, contents + offset + 8);
5352 bfd_put_16 (output_bfd, 0x0009, contents + offset + 10);
5353 }
5354 else
5355 {
5356 int index;
5357
5358 /* IE->LE transition:
5359 mov.l 1f,r0; stc gbr,rN; mov.l @(r0,r12),rM;
5360 bra 2f; add ...; .align 2; 1: x@GOTTPOFF; 2:
5361 We change it into:
5362 mov.l .Ln,rM; stc gbr,rN; nop; ...;
5363 1: x@TPOFF; 2:. */
5364
5365 offset = rel->r_offset;
5366 BFD_ASSERT (offset >= 16);
5367 /* Size of IE instructions is 10 or 12. */
5368 offset -= 10;
5369 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5370 if ((insn & 0xf0ff) == 0x0012)
5371 {
5372 BFD_ASSERT (offset >= 2);
5373 offset -= 2;
5374 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5375 }
5376
5377 BFD_ASSERT ((insn & 0xff00) == 0xd000);
5378 index = insn & 0x00ff;
5379 insn = bfd_get_16 (input_bfd, contents + offset + 2);
5380 BFD_ASSERT ((insn & 0xf0ff) == 0x0012);
5381 insn = bfd_get_16 (input_bfd, contents + offset + 4);
5382 BFD_ASSERT ((insn & 0xf0ff) == 0x00ce);
5383 insn = 0xd000 | (insn & 0x0f00) | index;
5384 bfd_put_16 (output_bfd, insn, contents + offset + 0);
5385 bfd_put_16 (output_bfd, 0x0009, contents + offset + 4);
5386 }
5387
5388 bfd_put_32 (output_bfd, tpoff (info, relocation),
5389 contents + rel->r_offset);
5390 continue;
5391 }
5392
5393 sgot = htab->sgot;
5394 if (sgot == NULL)
5395 abort ();
5396
5397 if (h != NULL)
5398 off = h->got.offset;
5399 else
5400 {
5401 if (local_got_offsets == NULL)
5402 abort ();
5403
5404 off = local_got_offsets[r_symndx];
5405 }
5406
5407 /* Relocate R_SH_TLS_IE_32 directly when statically linking. */
5408 if (r_type == R_SH_TLS_IE_32
5409 && ! htab->root.dynamic_sections_created)
5410 {
5411 off &= ~1;
5412 bfd_put_32 (output_bfd, tpoff (info, relocation),
5413 sgot->contents + off);
5414 bfd_put_32 (output_bfd, sgot->output_offset + off,
5415 contents + rel->r_offset);
5416 continue;
5417 }
5418
5419 if ((off & 1) != 0)
5420 off &= ~1;
5421 else
5422 {
5423 Elf_Internal_Rela outrel;
5424 bfd_byte *loc;
5425 int dr_type, indx;
5426
5427 if (srelgot == NULL)
5428 {
5429 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
5430 BFD_ASSERT (srelgot != NULL);
5431 }
5432
5433 outrel.r_offset = (sgot->output_section->vma
5434 + sgot->output_offset + off);
5435
5436 if (h == NULL || h->dynindx == -1)
5437 indx = 0;
5438 else
5439 indx = h->dynindx;
5440
5441 dr_type = (r_type == R_SH_TLS_GD_32 ? R_SH_TLS_DTPMOD32 :
5442 R_SH_TLS_TPOFF32);
5443 if (dr_type == R_SH_TLS_TPOFF32 && indx == 0)
5444 outrel.r_addend = relocation - dtpoff_base (info);
5445 else
5446 outrel.r_addend = 0;
5447 outrel.r_info = ELF32_R_INFO (indx, dr_type);
5448 loc = srelgot->contents;
5449 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
5450 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
5451
5452 if (r_type == R_SH_TLS_GD_32)
5453 {
5454 if (indx == 0)
5455 {
5456 bfd_put_32 (output_bfd,
5457 relocation - dtpoff_base (info),
5458 sgot->contents + off + 4);
5459 }
5460 else
5461 {
5462 outrel.r_info = ELF32_R_INFO (indx,
5463 R_SH_TLS_DTPOFF32);
5464 outrel.r_offset += 4;
5465 outrel.r_addend = 0;
5466 srelgot->reloc_count++;
5467 loc += sizeof (Elf32_External_Rela);
5468 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
5469 }
5470 }
5471
5472 if (h != NULL)
5473 h->got.offset |= 1;
5474 else
5475 local_got_offsets[r_symndx] |= 1;
5476 }
5477
5478 if (off >= (bfd_vma) -2)
5479 abort ();
5480
5481 if (r_type == (int) ELF32_R_TYPE (rel->r_info))
5482 relocation = sgot->output_offset + off;
5483 else
5484 {
5485 bfd_vma offset;
5486 unsigned short insn;
5487
5488 /* GD->IE transition:
5489 mov.l 1f,r4; mova 2f,r0; mov.l 2f,r1; add r0,r1;
5490 jsr @r1; add r12,r4; bra 3f; nop; .align 2;
5491 1: .long x$TLSGD; 2: .long __tls_get_addr@PLT; 3:
5492 We change it into:
5493 mov.l 1f,r0; stc gbr,r4; mov.l @(r0,r12),r0; add r4,r0;
5494 nop; nop; bra 3f; nop; .align 2;
5495 1: .long x@TPOFF; 2:...; 3:. */
5496
5497 offset = rel->r_offset;
5498 BFD_ASSERT (offset >= 16);
5499 /* Size of GD instructions is 16 or 18. */
5500 offset -= 16;
5501 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5502 if ((insn & 0xff00) == 0xc700)
5503 {
5504 BFD_ASSERT (offset >= 2);
5505 offset -= 2;
5506 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5507 }
5508
5509 BFD_ASSERT ((insn & 0xff00) == 0xd400);
5510
5511 /* Replace mov.l 1f,R4 with mov.l 1f,r0. */
5512 bfd_put_16 (output_bfd, insn & 0xf0ff, contents + offset);
5513
5514 insn = bfd_get_16 (input_bfd, contents + offset + 2);
5515 BFD_ASSERT ((insn & 0xff00) == 0xc700);
5516 insn = bfd_get_16 (input_bfd, contents + offset + 4);
5517 BFD_ASSERT ((insn & 0xff00) == 0xd100);
5518 insn = bfd_get_16 (input_bfd, contents + offset + 6);
5519 BFD_ASSERT (insn == 0x310c);
5520 insn = bfd_get_16 (input_bfd, contents + offset + 8);
5521 BFD_ASSERT (insn == 0x410b);
5522 insn = bfd_get_16 (input_bfd, contents + offset + 10);
5523 BFD_ASSERT (insn == 0x34cc);
5524
5525 bfd_put_16 (output_bfd, 0x0412, contents + offset + 2);
5526 bfd_put_16 (output_bfd, 0x00ce, contents + offset + 4);
5527 bfd_put_16 (output_bfd, 0x304c, contents + offset + 6);
5528 bfd_put_16 (output_bfd, 0x0009, contents + offset + 8);
5529 bfd_put_16 (output_bfd, 0x0009, contents + offset + 10);
5530
5531 bfd_put_32 (output_bfd, sgot->output_offset + off,
5532 contents + rel->r_offset);
5533
5534 continue;
5535 }
5536
5537 addend = rel->r_addend;
5538
5539 goto final_link_relocate;
5540
5541 case R_SH_TLS_LD_32:
5542 if (! info->shared)
5543 {
5544 bfd_vma offset;
5545 unsigned short insn;
5546
5547 /* LD->LE transition:
5548 mov.l 1f,r4; mova 2f,r0; mov.l 2f,r1; add r0,r1;
5549 jsr @r1; add r12,r4; bra 3f; nop; .align 2;
5550 1: .long x$TLSLD; 2: .long __tls_get_addr@PLT; 3:
5551 We change it into:
5552 stc gbr,r0; nop; nop; nop;
5553 nop; nop; bra 3f; ...; 3:. */
5554
5555 offset = rel->r_offset;
5556 BFD_ASSERT (offset >= 16);
5557 /* Size of LD instructions is 16 or 18. */
5558 offset -= 16;
5559 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5560 if ((insn & 0xff00) == 0xc700)
5561 {
5562 BFD_ASSERT (offset >= 2);
5563 offset -= 2;
5564 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5565 }
5566
5567 BFD_ASSERT ((insn & 0xff00) == 0xd400);
5568 insn = bfd_get_16 (input_bfd, contents + offset + 2);
5569 BFD_ASSERT ((insn & 0xff00) == 0xc700);
5570 insn = bfd_get_16 (input_bfd, contents + offset + 4);
5571 BFD_ASSERT ((insn & 0xff00) == 0xd100);
5572 insn = bfd_get_16 (input_bfd, contents + offset + 6);
5573 BFD_ASSERT (insn == 0x310c);
5574 insn = bfd_get_16 (input_bfd, contents + offset + 8);
5575 BFD_ASSERT (insn == 0x410b);
5576 insn = bfd_get_16 (input_bfd, contents + offset + 10);
5577 BFD_ASSERT (insn == 0x34cc);
5578
5579 bfd_put_16 (output_bfd, 0x0012, contents + offset + 0);
5580 bfd_put_16 (output_bfd, 0x0009, contents + offset + 2);
5581 bfd_put_16 (output_bfd, 0x0009, contents + offset + 4);
5582 bfd_put_16 (output_bfd, 0x0009, contents + offset + 6);
5583 bfd_put_16 (output_bfd, 0x0009, contents + offset + 8);
5584 bfd_put_16 (output_bfd, 0x0009, contents + offset + 10);
5585
5586 continue;
5587 }
5588
5589 sgot = htab->sgot;
5590 if (sgot == NULL)
5591 abort ();
5592
5593 off = htab->tls_ldm_got.offset;
5594 if (off & 1)
5595 off &= ~1;
5596 else
5597 {
5598 Elf_Internal_Rela outrel;
5599 bfd_byte *loc;
5600
5601 srelgot = htab->srelgot;
5602 if (srelgot == NULL)
5603 abort ();
5604
5605 outrel.r_offset = (sgot->output_section->vma
5606 + sgot->output_offset + off);
5607 outrel.r_addend = 0;
5608 outrel.r_info = ELF32_R_INFO (0, R_SH_TLS_DTPMOD32);
5609 loc = srelgot->contents;
5610 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
5611 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
5612 htab->tls_ldm_got.offset |= 1;
5613 }
5614
5615 relocation = sgot->output_offset + off;
5616 addend = rel->r_addend;
5617
5618 goto final_link_relocate;
5619
5620 case R_SH_TLS_LDO_32:
5621 if (! info->shared)
5622 relocation = tpoff (info, relocation);
5623 else
5624 relocation -= dtpoff_base (info);
5625
5626 addend = rel->r_addend;
5627 goto final_link_relocate;
5628
5629 case R_SH_TLS_LE_32:
5630 {
5631 int indx;
5632 Elf_Internal_Rela outrel;
5633 bfd_byte *loc;
5634
5635 if (! info->shared)
5636 {
5637 relocation = tpoff (info, relocation);
5638 addend = rel->r_addend;
5639 goto final_link_relocate;
5640 }
5641
5642 if (sreloc == NULL)
5643 {
5644 const char *name;
5645
5646 name = (bfd_elf_string_from_elf_section
5647 (input_bfd,
5648 elf_elfheader (input_bfd)->e_shstrndx,
5649 elf_section_data (input_section)->rel_hdr.sh_name));
5650 if (name == NULL)
5651 return FALSE;
5652
5653 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
5654 && strcmp (bfd_get_section_name (input_bfd,
5655 input_section),
5656 name + 5) == 0);
5657
5658 sreloc = bfd_get_section_by_name (dynobj, name);
5659 BFD_ASSERT (sreloc != NULL);
5660 }
5661
5662 if (h == NULL || h->dynindx == -1)
5663 indx = 0;
5664 else
5665 indx = h->dynindx;
5666
5667 outrel.r_offset = (input_section->output_section->vma
5668 + input_section->output_offset
5669 + rel->r_offset);
5670 outrel.r_info = ELF32_R_INFO (indx, R_SH_TLS_TPOFF32);
5671 if (indx == 0)
5672 outrel.r_addend = relocation - dtpoff_base (info);
5673 else
5674 outrel.r_addend = 0;
5675
5676 loc = sreloc->contents;
5677 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
5678 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
5679 continue;
5680 }
5681 }
5682
5683 relocation_done:
5684 if (r != bfd_reloc_ok)
5685 {
5686 switch (r)
5687 {
5688 default:
5689 case bfd_reloc_outofrange:
5690 abort ();
5691 case bfd_reloc_overflow:
5692 {
5693 const char *name;
5694
5695 if (h != NULL)
5696 name = h->root.root.string;
5697 else
5698 {
5699 name = (bfd_elf_string_from_elf_section
5700 (input_bfd, symtab_hdr->sh_link, sym->st_name));
5701 if (name == NULL)
5702 return FALSE;
5703 if (*name == '\0')
5704 name = bfd_section_name (input_bfd, sec);
5705 }
5706 if (! ((*info->callbacks->reloc_overflow)
5707 (info, name, howto->name, (bfd_vma) 0,
5708 input_bfd, input_section, rel->r_offset)))
5709 return FALSE;
5710 }
5711 break;
5712 }
5713 }
5714 }
5715
5716 return TRUE;
5717 }
5718
5719 /* This is a version of bfd_generic_get_relocated_section_contents
5720 which uses sh_elf_relocate_section. */
5721
5722 static bfd_byte *
5723 sh_elf_get_relocated_section_contents (output_bfd, link_info, link_order,
5724 data, relocatable, symbols)
5725 bfd *output_bfd;
5726 struct bfd_link_info *link_info;
5727 struct bfd_link_order *link_order;
5728 bfd_byte *data;
5729 bfd_boolean relocatable;
5730 asymbol **symbols;
5731 {
5732 Elf_Internal_Shdr *symtab_hdr;
5733 asection *input_section = link_order->u.indirect.section;
5734 bfd *input_bfd = input_section->owner;
5735 asection **sections = NULL;
5736 Elf_Internal_Rela *internal_relocs = NULL;
5737 Elf_Internal_Sym *isymbuf = NULL;
5738
5739 /* We only need to handle the case of relaxing, or of having a
5740 particular set of section contents, specially. */
5741 if (relocatable
5742 || elf_section_data (input_section)->this_hdr.contents == NULL)
5743 return bfd_generic_get_relocated_section_contents (output_bfd, link_info,
5744 link_order, data,
5745 relocatable,
5746 symbols);
5747
5748 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
5749
5750 memcpy (data, elf_section_data (input_section)->this_hdr.contents,
5751 (size_t) input_section->_raw_size);
5752
5753 if ((input_section->flags & SEC_RELOC) != 0
5754 && input_section->reloc_count > 0)
5755 {
5756 asection **secpp;
5757 Elf_Internal_Sym *isym, *isymend;
5758 bfd_size_type amt;
5759
5760 internal_relocs = (_bfd_elf_link_read_relocs
5761 (input_bfd, input_section, (PTR) NULL,
5762 (Elf_Internal_Rela *) NULL, FALSE));
5763 if (internal_relocs == NULL)
5764 goto error_return;
5765
5766 if (symtab_hdr->sh_info != 0)
5767 {
5768 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
5769 if (isymbuf == NULL)
5770 isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
5771 symtab_hdr->sh_info, 0,
5772 NULL, NULL, NULL);
5773 if (isymbuf == NULL)
5774 goto error_return;
5775 }
5776
5777 amt = symtab_hdr->sh_info;
5778 amt *= sizeof (asection *);
5779 sections = (asection **) bfd_malloc (amt);
5780 if (sections == NULL && amt != 0)
5781 goto error_return;
5782
5783 isymend = isymbuf + symtab_hdr->sh_info;
5784 for (isym = isymbuf, secpp = sections; isym < isymend; ++isym, ++secpp)
5785 {
5786 asection *isec;
5787
5788 if (isym->st_shndx == SHN_UNDEF)
5789 isec = bfd_und_section_ptr;
5790 else if (isym->st_shndx == SHN_ABS)
5791 isec = bfd_abs_section_ptr;
5792 else if (isym->st_shndx == SHN_COMMON)
5793 isec = bfd_com_section_ptr;
5794 else
5795 isec = bfd_section_from_elf_index (input_bfd, isym->st_shndx);
5796
5797 *secpp = isec;
5798 }
5799
5800 if (! sh_elf_relocate_section (output_bfd, link_info, input_bfd,
5801 input_section, data, internal_relocs,
5802 isymbuf, sections))
5803 goto error_return;
5804
5805 if (sections != NULL)
5806 free (sections);
5807 if (isymbuf != NULL
5808 && symtab_hdr->contents != (unsigned char *) isymbuf)
5809 free (isymbuf);
5810 if (elf_section_data (input_section)->relocs != internal_relocs)
5811 free (internal_relocs);
5812 }
5813
5814 return data;
5815
5816 error_return:
5817 if (sections != NULL)
5818 free (sections);
5819 if (isymbuf != NULL
5820 && symtab_hdr->contents != (unsigned char *) isymbuf)
5821 free (isymbuf);
5822 if (internal_relocs != NULL
5823 && elf_section_data (input_section)->relocs != internal_relocs)
5824 free (internal_relocs);
5825 return NULL;
5826 }
5827
5828 /* Return the base VMA address which should be subtracted from real addresses
5829 when resolving @dtpoff relocation.
5830 This is PT_TLS segment p_vaddr. */
5831
5832 static bfd_vma
5833 dtpoff_base (info)
5834 struct bfd_link_info *info;
5835 {
5836 /* If tls_segment is NULL, we should have signalled an error already. */
5837 if (elf_hash_table (info)->tls_segment == NULL)
5838 return 0;
5839 return elf_hash_table (info)->tls_segment->start;
5840 }
5841
5842 /* Return the relocation value for R_SH_TLS_TPOFF32.. */
5843
5844 static bfd_vma
5845 tpoff (info, address)
5846 struct bfd_link_info *info;
5847 bfd_vma address;
5848 {
5849 /* If tls_segment is NULL, we should have signalled an error already. */
5850 if (elf_hash_table (info)->tls_segment == NULL)
5851 return 0;
5852 /* SH TLS ABI is variant I and static TLS block start just after tcbhead
5853 structure which has 2 pointer fields. */
5854 return (address - dtpoff_base (info) + 8);
5855 }
5856
5857 static asection *
5858 sh_elf_gc_mark_hook (sec, info, rel, h, sym)
5859 asection *sec;
5860 struct bfd_link_info *info ATTRIBUTE_UNUSED;
5861 Elf_Internal_Rela *rel;
5862 struct elf_link_hash_entry *h;
5863 Elf_Internal_Sym *sym;
5864 {
5865 if (h != NULL)
5866 {
5867 switch (ELF32_R_TYPE (rel->r_info))
5868 {
5869 case R_SH_GNU_VTINHERIT:
5870 case R_SH_GNU_VTENTRY:
5871 break;
5872
5873 default:
5874 #ifdef INCLUDE_SHMEDIA
5875 while (h->root.type == bfd_link_hash_indirect
5876 && h->root.u.i.link)
5877 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5878 #endif
5879 switch (h->root.type)
5880 {
5881 case bfd_link_hash_defined:
5882 case bfd_link_hash_defweak:
5883 return h->root.u.def.section;
5884
5885 case bfd_link_hash_common:
5886 return h->root.u.c.p->section;
5887
5888 default:
5889 break;
5890 }
5891 }
5892 }
5893 else
5894 return bfd_section_from_elf_index (sec->owner, sym->st_shndx);
5895
5896 return NULL;
5897 }
5898
5899 /* Update the got entry reference counts for the section being removed. */
5900
5901 static bfd_boolean
5902 sh_elf_gc_sweep_hook (abfd, info, sec, relocs)
5903 bfd *abfd;
5904 struct bfd_link_info *info;
5905 asection *sec;
5906 const Elf_Internal_Rela *relocs;
5907 {
5908 Elf_Internal_Shdr *symtab_hdr;
5909 struct elf_link_hash_entry **sym_hashes;
5910 bfd_signed_vma *local_got_refcounts;
5911 const Elf_Internal_Rela *rel, *relend;
5912
5913 elf_section_data (sec)->local_dynrel = NULL;
5914
5915 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
5916 sym_hashes = elf_sym_hashes (abfd);
5917 local_got_refcounts = elf_local_got_refcounts (abfd);
5918
5919 relend = relocs + sec->reloc_count;
5920 for (rel = relocs; rel < relend; rel++)
5921 {
5922 unsigned long r_symndx;
5923 unsigned int r_type;
5924 struct elf_link_hash_entry *h = NULL;
5925 #ifdef INCLUDE_SHMEDIA
5926 int seen_stt_datalabel = 0;
5927 #endif
5928
5929 r_symndx = ELF32_R_SYM (rel->r_info);
5930 if (r_symndx >= symtab_hdr->sh_info)
5931 {
5932 struct elf_sh_link_hash_entry *eh;
5933 struct elf_sh_dyn_relocs **pp;
5934 struct elf_sh_dyn_relocs *p;
5935
5936 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5937 #ifdef INCLUDE_SHMEDIA
5938 while (h->root.type == bfd_link_hash_indirect
5939 || h->root.type == bfd_link_hash_warning)
5940 {
5941 seen_stt_datalabel |= h->type == STT_DATALABEL;
5942 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5943 }
5944 #endif
5945 eh = (struct elf_sh_link_hash_entry *) h;
5946 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
5947 if (p->sec == sec)
5948 {
5949 /* Everything must go for SEC. */
5950 *pp = p->next;
5951 break;
5952 }
5953 }
5954
5955 r_type = ELF32_R_TYPE (rel->r_info);
5956 switch (sh_elf_optimized_tls_reloc (info, r_type, h != NULL))
5957 {
5958 case R_SH_TLS_LD_32:
5959 if (sh_elf_hash_table (info)->tls_ldm_got.refcount > 0)
5960 sh_elf_hash_table (info)->tls_ldm_got.refcount -= 1;
5961 break;
5962
5963 case R_SH_GOT32:
5964 case R_SH_GOTOFF:
5965 case R_SH_GOTPC:
5966 #ifdef INCLUDE_SHMEDIA
5967 case R_SH_GOT_LOW16:
5968 case R_SH_GOT_MEDLOW16:
5969 case R_SH_GOT_MEDHI16:
5970 case R_SH_GOT_HI16:
5971 case R_SH_GOT10BY4:
5972 case R_SH_GOT10BY8:
5973 case R_SH_GOTOFF_LOW16:
5974 case R_SH_GOTOFF_MEDLOW16:
5975 case R_SH_GOTOFF_MEDHI16:
5976 case R_SH_GOTOFF_HI16:
5977 case R_SH_GOTPC_LOW16:
5978 case R_SH_GOTPC_MEDLOW16:
5979 case R_SH_GOTPC_MEDHI16:
5980 case R_SH_GOTPC_HI16:
5981 #endif
5982 case R_SH_TLS_GD_32:
5983 case R_SH_TLS_IE_32:
5984 if (h != NULL)
5985 {
5986 #ifdef INCLUDE_SHMEDIA
5987 if (seen_stt_datalabel)
5988 {
5989 struct elf_sh_link_hash_entry *eh;
5990 eh = (struct elf_sh_link_hash_entry *) h;
5991 if (eh->datalabel_got.refcount > 0)
5992 eh->datalabel_got.refcount -= 1;
5993 }
5994 else
5995 #endif
5996 if (h->got.refcount > 0)
5997 h->got.refcount -= 1;
5998 }
5999 else if (local_got_refcounts != NULL)
6000 {
6001 #ifdef INCLUDE_SHMEDIA
6002 if (rel->r_addend & 1)
6003 {
6004 if (local_got_refcounts[symtab_hdr->sh_info + r_symndx] > 0)
6005 local_got_refcounts[symtab_hdr->sh_info + r_symndx] -= 1;
6006 }
6007 else
6008 #endif
6009 if (local_got_refcounts[r_symndx] > 0)
6010 local_got_refcounts[r_symndx] -= 1;
6011 }
6012 break;
6013
6014 case R_SH_DIR32:
6015 case R_SH_REL32:
6016 if (info->shared)
6017 break;
6018 /* Fall thru */
6019
6020 case R_SH_PLT32:
6021 #ifdef INCLUDE_SHMEDIA
6022 case R_SH_PLT_LOW16:
6023 case R_SH_PLT_MEDLOW16:
6024 case R_SH_PLT_MEDHI16:
6025 case R_SH_PLT_HI16:
6026 #endif
6027 if (h != NULL)
6028 {
6029 if (h->plt.refcount > 0)
6030 h->plt.refcount -= 1;
6031 }
6032 break;
6033
6034 case R_SH_GOTPLT32:
6035 #ifdef INCLUDE_SHMEDIA
6036 case R_SH_GOTPLT_LOW16:
6037 case R_SH_GOTPLT_MEDLOW16:
6038 case R_SH_GOTPLT_MEDHI16:
6039 case R_SH_GOTPLT_HI16:
6040 case R_SH_GOTPLT10BY4:
6041 case R_SH_GOTPLT10BY8:
6042 #endif
6043 if (h != NULL)
6044 {
6045 struct elf_sh_link_hash_entry *eh;
6046 eh = (struct elf_sh_link_hash_entry *) h;
6047 if (eh->gotplt_refcount > 0)
6048 {
6049 eh->gotplt_refcount -= 1;
6050 if (h->plt.refcount > 0)
6051 h->plt.refcount -= 1;
6052 }
6053 #ifdef INCLUDE_SHMEDIA
6054 else if (seen_stt_datalabel)
6055 {
6056 if (eh->datalabel_got.refcount > 0)
6057 eh->datalabel_got.refcount -= 1;
6058 }
6059 #endif
6060 else if (h->got.refcount > 0)
6061 h->got.refcount -= 1;
6062 }
6063 else if (local_got_refcounts != NULL)
6064 {
6065 #ifdef INCLUDE_SHMEDIA
6066 if (rel->r_addend & 1)
6067 {
6068 if (local_got_refcounts[symtab_hdr->sh_info + r_symndx] > 0)
6069 local_got_refcounts[symtab_hdr->sh_info + r_symndx] -= 1;
6070 }
6071 else
6072 #endif
6073 if (local_got_refcounts[r_symndx] > 0)
6074 local_got_refcounts[r_symndx] -= 1;
6075 }
6076 break;
6077
6078 default:
6079 break;
6080 }
6081 }
6082
6083 return TRUE;
6084 }
6085
6086 /* Copy the extra info we tack onto an elf_link_hash_entry. */
6087
6088 static void
6089 sh_elf_copy_indirect_symbol (bed, dir, ind)
6090 struct elf_backend_data *bed;
6091 struct elf_link_hash_entry *dir, *ind;
6092 {
6093 struct elf_sh_link_hash_entry *edir, *eind;
6094 #ifdef INCLUDE_SHMEDIA
6095 bfd_signed_vma tmp;
6096 #endif
6097
6098 edir = (struct elf_sh_link_hash_entry *) dir;
6099 eind = (struct elf_sh_link_hash_entry *) ind;
6100
6101 if (eind->dyn_relocs != NULL)
6102 {
6103 if (edir->dyn_relocs != NULL)
6104 {
6105 struct elf_sh_dyn_relocs **pp;
6106 struct elf_sh_dyn_relocs *p;
6107
6108 BFD_ASSERT (ind->root.type != bfd_link_hash_indirect);
6109
6110 /* Add reloc counts against the weak sym to the strong sym
6111 list. Merge any entries against the same section. */
6112 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
6113 {
6114 struct elf_sh_dyn_relocs *q;
6115
6116 for (q = edir->dyn_relocs; q != NULL; q = q->next)
6117 if (q->sec == p->sec)
6118 {
6119 q->pc_count += p->pc_count;
6120 q->count += p->count;
6121 *pp = p->next;
6122 break;
6123 }
6124 if (q == NULL)
6125 pp = &p->next;
6126 }
6127 *pp = edir->dyn_relocs;
6128 }
6129
6130 edir->dyn_relocs = eind->dyn_relocs;
6131 eind->dyn_relocs = NULL;
6132 }
6133 edir->gotplt_refcount = eind->gotplt_refcount;
6134 eind->gotplt_refcount = 0;
6135 #ifdef INCLUDE_SHMEDIA
6136 tmp = edir->datalabel_got.refcount;
6137 if (tmp < 1)
6138 {
6139 edir->datalabel_got.refcount = eind->datalabel_got.refcount;
6140 eind->datalabel_got.refcount = tmp;
6141 }
6142 else
6143 BFD_ASSERT (eind->datalabel_got.refcount < 1);
6144 #endif
6145
6146 if (ind->root.type == bfd_link_hash_indirect
6147 && dir->got.refcount <= 0)
6148 {
6149 edir->tls_type = eind->tls_type;
6150 eind->tls_type = GOT_UNKNOWN;
6151 }
6152
6153 if (ind->root.type != bfd_link_hash_indirect
6154 && (dir->elf_link_hash_flags & ELF_LINK_HASH_DYNAMIC_ADJUSTED) != 0)
6155 /* If called to transfer flags for a weakdef during processing
6156 of elf_adjust_dynamic_symbol, don't copy ELF_LINK_NON_GOT_REF.
6157 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
6158 dir->elf_link_hash_flags |=
6159 (ind->elf_link_hash_flags & (ELF_LINK_HASH_REF_DYNAMIC
6160 | ELF_LINK_HASH_REF_REGULAR
6161 | ELF_LINK_HASH_REF_REGULAR_NONWEAK));
6162 else
6163 _bfd_elf_link_hash_copy_indirect (bed, dir, ind);
6164 }
6165
6166 static int
6167 sh_elf_optimized_tls_reloc (info, r_type, is_local)
6168 struct bfd_link_info *info;
6169 int r_type;
6170 int is_local;
6171 {
6172 if (info->shared)
6173 return r_type;
6174
6175 switch (r_type)
6176 {
6177 case R_SH_TLS_GD_32:
6178 case R_SH_TLS_IE_32:
6179 if (is_local)
6180 return R_SH_TLS_LE_32;
6181 return R_SH_TLS_IE_32;
6182 case R_SH_TLS_LD_32:
6183 return R_SH_TLS_LE_32;
6184 }
6185
6186 return r_type;
6187 }
6188
6189 /* Look through the relocs for a section during the first phase.
6190 Since we don't do .gots or .plts, we just need to consider the
6191 virtual table relocs for gc. */
6192
6193 static bfd_boolean
6194 sh_elf_check_relocs (abfd, info, sec, relocs)
6195 bfd *abfd;
6196 struct bfd_link_info *info;
6197 asection *sec;
6198 const Elf_Internal_Rela *relocs;
6199 {
6200 Elf_Internal_Shdr *symtab_hdr;
6201 struct elf_link_hash_entry **sym_hashes, **sym_hashes_end;
6202 struct elf_sh_link_hash_table *htab;
6203 const Elf_Internal_Rela *rel;
6204 const Elf_Internal_Rela *rel_end;
6205 bfd_vma *local_got_offsets;
6206 asection *sgot;
6207 asection *srelgot;
6208 asection *sreloc;
6209 unsigned int r_type;
6210 int tls_type, old_tls_type;
6211
6212 sgot = NULL;
6213 srelgot = NULL;
6214 sreloc = NULL;
6215
6216 if (info->relocatable)
6217 return TRUE;
6218
6219 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6220 sym_hashes = elf_sym_hashes (abfd);
6221 sym_hashes_end = sym_hashes + symtab_hdr->sh_size/sizeof (Elf32_External_Sym);
6222 if (!elf_bad_symtab (abfd))
6223 sym_hashes_end -= symtab_hdr->sh_info;
6224
6225 htab = sh_elf_hash_table (info);
6226 local_got_offsets = elf_local_got_offsets (abfd);
6227
6228 rel_end = relocs + sec->reloc_count;
6229 for (rel = relocs; rel < rel_end; rel++)
6230 {
6231 struct elf_link_hash_entry *h;
6232 unsigned long r_symndx;
6233 #ifdef INCLUDE_SHMEDIA
6234 int seen_stt_datalabel = 0;
6235 #endif
6236
6237 r_symndx = ELF32_R_SYM (rel->r_info);
6238 r_type = ELF32_R_TYPE (rel->r_info);
6239
6240 if (r_symndx < symtab_hdr->sh_info)
6241 h = NULL;
6242 else
6243 {
6244 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
6245 #ifdef INCLUDE_SHMEDIA
6246 while (h->root.type == bfd_link_hash_indirect
6247 || h->root.type == bfd_link_hash_warning)
6248 {
6249 seen_stt_datalabel |= h->type == STT_DATALABEL;
6250 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6251 }
6252 #endif
6253 }
6254
6255 r_type = sh_elf_optimized_tls_reloc (info, r_type, h == NULL);
6256 if (! info->shared
6257 && r_type == R_SH_TLS_IE_32
6258 && h != NULL
6259 && h->root.type != bfd_link_hash_undefined
6260 && h->root.type != bfd_link_hash_undefweak
6261 && (h->dynindx == -1
6262 || (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)))
6263 r_type = R_SH_TLS_LE_32;
6264
6265 /* Some relocs require a global offset table. */
6266 if (htab->sgot == NULL)
6267 {
6268 switch (r_type)
6269 {
6270 case R_SH_GOTPLT32:
6271 case R_SH_GOT32:
6272 case R_SH_GOTOFF:
6273 case R_SH_GOTPC:
6274 #ifdef INCLUDE_SHMEDIA
6275 case R_SH_GOTPLT_LOW16:
6276 case R_SH_GOTPLT_MEDLOW16:
6277 case R_SH_GOTPLT_MEDHI16:
6278 case R_SH_GOTPLT_HI16:
6279 case R_SH_GOTPLT10BY4:
6280 case R_SH_GOTPLT10BY8:
6281 case R_SH_GOT_LOW16:
6282 case R_SH_GOT_MEDLOW16:
6283 case R_SH_GOT_MEDHI16:
6284 case R_SH_GOT_HI16:
6285 case R_SH_GOT10BY4:
6286 case R_SH_GOT10BY8:
6287 case R_SH_GOTOFF_LOW16:
6288 case R_SH_GOTOFF_MEDLOW16:
6289 case R_SH_GOTOFF_MEDHI16:
6290 case R_SH_GOTOFF_HI16:
6291 case R_SH_GOTPC_LOW16:
6292 case R_SH_GOTPC_MEDLOW16:
6293 case R_SH_GOTPC_MEDHI16:
6294 case R_SH_GOTPC_HI16:
6295 #endif
6296 case R_SH_TLS_GD_32:
6297 case R_SH_TLS_LD_32:
6298 case R_SH_TLS_IE_32:
6299 if (htab->sgot == NULL)
6300 {
6301 if (htab->root.dynobj == NULL)
6302 htab->root.dynobj = abfd;
6303 if (!create_got_section (htab->root.dynobj, info))
6304 return FALSE;
6305 }
6306 break;
6307
6308 default:
6309 break;
6310 }
6311 }
6312
6313 switch (r_type)
6314 {
6315 /* This relocation describes the C++ object vtable hierarchy.
6316 Reconstruct it for later use during GC. */
6317 case R_SH_GNU_VTINHERIT:
6318 if (!_bfd_elf32_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
6319 return FALSE;
6320 break;
6321
6322 /* This relocation describes which C++ vtable entries are actually
6323 used. Record for later use during GC. */
6324 case R_SH_GNU_VTENTRY:
6325 if (!_bfd_elf32_gc_record_vtentry (abfd, sec, h, rel->r_addend))
6326 return FALSE;
6327 break;
6328
6329 case R_SH_TLS_IE_32:
6330 if (info->shared)
6331 info->flags |= DF_STATIC_TLS;
6332
6333 /* FALLTHROUGH */
6334 force_got:
6335 case R_SH_TLS_GD_32:
6336 case R_SH_GOT32:
6337 #ifdef INCLUDE_SHMEDIA
6338 case R_SH_GOT_LOW16:
6339 case R_SH_GOT_MEDLOW16:
6340 case R_SH_GOT_MEDHI16:
6341 case R_SH_GOT_HI16:
6342 case R_SH_GOT10BY4:
6343 case R_SH_GOT10BY8:
6344 #endif
6345 switch (r_type)
6346 {
6347 default:
6348 tls_type = GOT_NORMAL;
6349 break;
6350 case R_SH_TLS_GD_32:
6351 tls_type = GOT_TLS_GD;
6352 break;
6353 case R_SH_TLS_IE_32:
6354 tls_type = GOT_TLS_IE;
6355 break;
6356 }
6357
6358 if (h != NULL)
6359 {
6360 #ifdef INCLUDE_SHMEDIA
6361 if (seen_stt_datalabel)
6362 {
6363 struct elf_sh_link_hash_entry *eh
6364 = (struct elf_sh_link_hash_entry *) h;
6365
6366 eh->datalabel_got.refcount += 1;
6367 }
6368 else
6369 #endif
6370 h->got.refcount += 1;
6371 old_tls_type = sh_elf_hash_entry (h)->tls_type;
6372 }
6373 else
6374 {
6375 bfd_signed_vma *local_got_refcounts;
6376
6377 /* This is a global offset table entry for a local
6378 symbol. */
6379 local_got_refcounts = elf_local_got_refcounts (abfd);
6380 if (local_got_refcounts == NULL)
6381 {
6382 bfd_size_type size;
6383
6384 size = symtab_hdr->sh_info;
6385 size *= sizeof (bfd_signed_vma);
6386 #ifdef INCLUDE_SHMEDIA
6387 /* Reserve space for both the datalabel and
6388 codelabel local GOT offsets. */
6389 size *= 2;
6390 #endif
6391 size += symtab_hdr->sh_info;
6392 local_got_refcounts = ((bfd_signed_vma *)
6393 bfd_zalloc (abfd, size));
6394 if (local_got_refcounts == NULL)
6395 return FALSE;
6396 elf_local_got_refcounts (abfd) = local_got_refcounts;
6397 #ifdef INCLUDE_SHMEDIA
6398 /* Take care of both the datalabel and codelabel local
6399 GOT offsets. */
6400 sh_elf_local_got_tls_type (abfd)
6401 = (char *) (local_got_refcounts + 2 * symtab_hdr->sh_info);
6402 #else
6403 sh_elf_local_got_tls_type (abfd)
6404 = (char *) (local_got_refcounts + symtab_hdr->sh_info);
6405 #endif
6406 }
6407 #ifdef INCLUDE_SHMEDIA
6408 if (rel->r_addend & 1)
6409 local_got_refcounts[symtab_hdr->sh_info + r_symndx] += 1;
6410 else
6411 #endif
6412 local_got_refcounts[r_symndx] += 1;
6413 old_tls_type = sh_elf_local_got_tls_type (abfd) [r_symndx];
6414 }
6415
6416 /* If a TLS symbol is accessed using IE at least once,
6417 there is no point to use dynamic model for it. */
6418 if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN
6419 && (old_tls_type != GOT_TLS_GD || tls_type != GOT_TLS_IE))
6420 {
6421 if (old_tls_type == GOT_TLS_IE && tls_type == GOT_TLS_GD)
6422 tls_type = GOT_TLS_IE;
6423 else
6424 {
6425 (*_bfd_error_handler)
6426 (_("%s: `%s' accessed both as normal and thread local symbol"),
6427 bfd_archive_filename (abfd), h->root.root.string);
6428 return FALSE;
6429 }
6430 }
6431
6432 if (old_tls_type != tls_type)
6433 {
6434 if (h != NULL)
6435 sh_elf_hash_entry (h)->tls_type = tls_type;
6436 else
6437 sh_elf_local_got_tls_type (abfd) [r_symndx] = tls_type;
6438 }
6439
6440 break;
6441
6442 case R_SH_TLS_LD_32:
6443 sh_elf_hash_table(info)->tls_ldm_got.refcount += 1;
6444 break;
6445
6446 case R_SH_GOTPLT32:
6447 #ifdef INCLUDE_SHMEDIA
6448 case R_SH_GOTPLT_LOW16:
6449 case R_SH_GOTPLT_MEDLOW16:
6450 case R_SH_GOTPLT_MEDHI16:
6451 case R_SH_GOTPLT_HI16:
6452 case R_SH_GOTPLT10BY4:
6453 case R_SH_GOTPLT10BY8:
6454 #endif
6455 /* If this is a local symbol, we resolve it directly without
6456 creating a procedure linkage table entry. */
6457
6458 if (h == NULL
6459 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL)
6460 || ! info->shared
6461 || info->symbolic
6462 || h->dynindx == -1)
6463 goto force_got;
6464
6465 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
6466 h->plt.refcount += 1;
6467 ((struct elf_sh_link_hash_entry *) h)->gotplt_refcount += 1;
6468
6469 break;
6470
6471 case R_SH_PLT32:
6472 #ifdef INCLUDE_SHMEDIA
6473 case R_SH_PLT_LOW16:
6474 case R_SH_PLT_MEDLOW16:
6475 case R_SH_PLT_MEDHI16:
6476 case R_SH_PLT_HI16:
6477 #endif
6478 /* This symbol requires a procedure linkage table entry. We
6479 actually build the entry in adjust_dynamic_symbol,
6480 because this might be a case of linking PIC code which is
6481 never referenced by a dynamic object, in which case we
6482 don't need to generate a procedure linkage table entry
6483 after all. */
6484
6485 /* If this is a local symbol, we resolve it directly without
6486 creating a procedure linkage table entry. */
6487 if (h == NULL)
6488 continue;
6489
6490 if (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL)
6491 break;
6492
6493 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
6494 h->plt.refcount += 1;
6495 break;
6496
6497 case R_SH_DIR32:
6498 case R_SH_REL32:
6499 if (h != NULL && ! info->shared)
6500 {
6501 h->elf_link_hash_flags |= ELF_LINK_NON_GOT_REF;
6502 h->plt.refcount += 1;
6503 }
6504
6505 /* If we are creating a shared library, and this is a reloc
6506 against a global symbol, or a non PC relative reloc
6507 against a local symbol, then we need to copy the reloc
6508 into the shared library. However, if we are linking with
6509 -Bsymbolic, we do not need to copy a reloc against a
6510 global symbol which is defined in an object we are
6511 including in the link (i.e., DEF_REGULAR is set). At
6512 this point we have not seen all the input files, so it is
6513 possible that DEF_REGULAR is not set now but will be set
6514 later (it is never cleared). We account for that
6515 possibility below by storing information in the
6516 dyn_relocs field of the hash table entry. A similar
6517 situation occurs when creating shared libraries and symbol
6518 visibility changes render the symbol local.
6519
6520 If on the other hand, we are creating an executable, we
6521 may need to keep relocations for symbols satisfied by a
6522 dynamic library if we manage to avoid copy relocs for the
6523 symbol. */
6524 if ((info->shared
6525 && (sec->flags & SEC_ALLOC) != 0
6526 && (r_type != R_SH_REL32
6527 || (h != NULL
6528 && (! info->symbolic
6529 || h->root.type == bfd_link_hash_defweak
6530 || (h->elf_link_hash_flags
6531 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
6532 || (! info->shared
6533 && (sec->flags & SEC_ALLOC) != 0
6534 && h != NULL
6535 && (h->root.type == bfd_link_hash_defweak
6536 || (h->elf_link_hash_flags
6537 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
6538 {
6539 struct elf_sh_dyn_relocs *p;
6540 struct elf_sh_dyn_relocs **head;
6541
6542 if (htab->root.dynobj == NULL)
6543 htab->root.dynobj = abfd;
6544
6545 /* When creating a shared object, we must copy these
6546 reloc types into the output file. We create a reloc
6547 section in dynobj and make room for this reloc. */
6548 if (sreloc == NULL)
6549 {
6550 const char *name;
6551
6552 name = (bfd_elf_string_from_elf_section
6553 (abfd,
6554 elf_elfheader (abfd)->e_shstrndx,
6555 elf_section_data (sec)->rel_hdr.sh_name));
6556 if (name == NULL)
6557 return FALSE;
6558
6559 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
6560 && strcmp (bfd_get_section_name (abfd, sec),
6561 name + 5) == 0);
6562
6563 sreloc = bfd_get_section_by_name (htab->root.dynobj, name);
6564 if (sreloc == NULL)
6565 {
6566 flagword flags;
6567
6568 sreloc = bfd_make_section (htab->root.dynobj, name);
6569 flags = (SEC_HAS_CONTENTS | SEC_READONLY
6570 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
6571 if ((sec->flags & SEC_ALLOC) != 0)
6572 flags |= SEC_ALLOC | SEC_LOAD;
6573 if (sreloc == NULL
6574 || ! bfd_set_section_flags (htab->root.dynobj,
6575 sreloc, flags)
6576 || ! bfd_set_section_alignment (htab->root.dynobj,
6577 sreloc, 2))
6578 return FALSE;
6579 }
6580 if (sec->flags & SEC_READONLY)
6581 info->flags |= DF_TEXTREL;
6582 elf_section_data (sec)->sreloc = sreloc;
6583 }
6584
6585 /* If this is a global symbol, we count the number of
6586 relocations we need for this symbol. */
6587 if (h != NULL)
6588 head = &((struct elf_sh_link_hash_entry *) h)->dyn_relocs;
6589 else
6590 {
6591 asection *s;
6592
6593 /* Track dynamic relocs needed for local syms too. */
6594 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
6595 sec, r_symndx);
6596 if (s == NULL)
6597 return FALSE;
6598
6599 head = ((struct elf_sh_dyn_relocs **)
6600 &elf_section_data (s)->local_dynrel);
6601 }
6602
6603 p = *head;
6604 if (p == NULL || p->sec != sec)
6605 {
6606 bfd_size_type amt = sizeof (*p);
6607 p = bfd_alloc (htab->root.dynobj, amt);
6608 if (p == NULL)
6609 return FALSE;
6610 p->next = *head;
6611 *head = p;
6612 p->sec = sec;
6613 p->count = 0;
6614 p->pc_count = 0;
6615 }
6616
6617 p->count += 1;
6618 if (r_type == R_SH_REL32)
6619 p->pc_count += 1;
6620 }
6621
6622 break;
6623
6624 case R_SH_TLS_LE_32:
6625 if (info->shared)
6626 {
6627 (*_bfd_error_handler) (_("%s: TLS local exec code cannot be linked into shared objects"),
6628 bfd_archive_filename (abfd));
6629 return FALSE;
6630 }
6631
6632 break;
6633
6634 case R_SH_TLS_LDO_32:
6635 /* Nothing to do. */
6636 break;
6637
6638 default:
6639 break;
6640 }
6641 }
6642
6643 return TRUE;
6644 }
6645
6646 #ifndef sh_elf_set_mach_from_flags
6647 static bfd_boolean
6648 sh_elf_set_mach_from_flags (abfd)
6649 bfd *abfd;
6650 {
6651 flagword flags = elf_elfheader (abfd)->e_flags;
6652
6653 switch (flags & EF_SH_MACH_MASK)
6654 {
6655 case EF_SH1:
6656 bfd_default_set_arch_mach (abfd, bfd_arch_sh, bfd_mach_sh);
6657 break;
6658 case EF_SH2:
6659 bfd_default_set_arch_mach (abfd, bfd_arch_sh, bfd_mach_sh2);
6660 break;
6661 case EF_SH2E:
6662 bfd_default_set_arch_mach (abfd, bfd_arch_sh, bfd_mach_sh2e);
6663 break;
6664 case EF_SH_DSP:
6665 bfd_default_set_arch_mach (abfd, bfd_arch_sh, bfd_mach_sh_dsp);
6666 break;
6667 case EF_SH3:
6668 bfd_default_set_arch_mach (abfd, bfd_arch_sh, bfd_mach_sh3);
6669 break;
6670 case EF_SH3_DSP:
6671 bfd_default_set_arch_mach (abfd, bfd_arch_sh, bfd_mach_sh3_dsp);
6672 break;
6673 case EF_SH3E:
6674 bfd_default_set_arch_mach (abfd, bfd_arch_sh, bfd_mach_sh3e);
6675 break;
6676 case EF_SH_UNKNOWN:
6677 case EF_SH4:
6678 bfd_default_set_arch_mach (abfd, bfd_arch_sh, bfd_mach_sh4);
6679 break;
6680 default:
6681 return FALSE;
6682 }
6683 return TRUE;
6684 }
6685 #endif /* not sh_elf_set_mach_from_flags */
6686
6687 #ifndef sh_elf_set_private_flags
6688 /* Function to keep SH specific file flags. */
6689
6690 static bfd_boolean
6691 sh_elf_set_private_flags (abfd, flags)
6692 bfd *abfd;
6693 flagword flags;
6694 {
6695 BFD_ASSERT (! elf_flags_init (abfd)
6696 || elf_elfheader (abfd)->e_flags == flags);
6697
6698 elf_elfheader (abfd)->e_flags = flags;
6699 elf_flags_init (abfd) = TRUE;
6700 return sh_elf_set_mach_from_flags (abfd);
6701 }
6702 #endif /* not sh_elf_set_private_flags */
6703
6704 #ifndef sh_elf_copy_private_data
6705 /* Copy backend specific data from one object module to another */
6706
6707 static bfd_boolean
6708 sh_elf_copy_private_data (ibfd, obfd)
6709 bfd * ibfd;
6710 bfd * obfd;
6711 {
6712 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6713 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6714 return TRUE;
6715
6716 return sh_elf_set_private_flags (obfd, elf_elfheader (ibfd)->e_flags);
6717 }
6718 #endif /* not sh_elf_copy_private_data */
6719
6720 #ifndef sh_elf_merge_private_data
6721 /* This routine checks for linking big and little endian objects
6722 together, and for linking sh-dsp with sh3e / sh4 objects. */
6723
6724 static bfd_boolean
6725 sh_elf_merge_private_data (ibfd, obfd)
6726 bfd *ibfd;
6727 bfd *obfd;
6728 {
6729 flagword old_flags, new_flags;
6730
6731 if (! _bfd_generic_verify_endian_match (ibfd, obfd))
6732 return FALSE;
6733
6734 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6735 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6736 return TRUE;
6737
6738 if (! elf_flags_init (obfd))
6739 {
6740 /* This happens when ld starts out with a 'blank' output file. */
6741 elf_flags_init (obfd) = TRUE;
6742 elf_elfheader (obfd)->e_flags = EF_SH1;
6743 }
6744 old_flags = elf_elfheader (obfd)->e_flags;
6745 new_flags = elf_elfheader (ibfd)->e_flags;
6746 if ((EF_SH_HAS_DSP (old_flags) && EF_SH_HAS_FP (new_flags))
6747 || (EF_SH_HAS_DSP (new_flags) && EF_SH_HAS_FP (old_flags)))
6748 {
6749 (*_bfd_error_handler)
6750 ("%s: uses %s instructions while previous modules use %s instructions",
6751 bfd_archive_filename (ibfd),
6752 EF_SH_HAS_DSP (new_flags) ? "dsp" : "floating point",
6753 EF_SH_HAS_DSP (new_flags) ? "floating point" : "dsp");
6754 bfd_set_error (bfd_error_bad_value);
6755 return FALSE;
6756 }
6757 elf_elfheader (obfd)->e_flags = EF_SH_MERGE_MACH (old_flags, new_flags);
6758
6759 return sh_elf_set_mach_from_flags (obfd);
6760 }
6761 #endif /* not sh_elf_merge_private_data */
6762
6763 /* Override the generic function because we need to store sh_elf_obj_tdata
6764 as the specific tdata. We set also the machine architecture from flags
6765 here. */
6766
6767 static bfd_boolean
6768 sh_elf_object_p (abfd)
6769 bfd *abfd;
6770 {
6771 struct sh_elf_obj_tdata *new_tdata;
6772 bfd_size_type amt = sizeof (struct sh_elf_obj_tdata);
6773
6774 if (!sh_elf_set_mach_from_flags (abfd))
6775 return FALSE;
6776
6777 /* Allocate our special target data. */
6778 new_tdata = bfd_zalloc (abfd, amt);
6779 if (new_tdata == NULL)
6780 return FALSE;
6781 new_tdata->root = *abfd->tdata.elf_obj_data;
6782 abfd->tdata.any = new_tdata;
6783 return TRUE;
6784 }
6785
6786 /* Finish up dynamic symbol handling. We set the contents of various
6787 dynamic sections here. */
6788
6789 static bfd_boolean
6790 sh_elf_finish_dynamic_symbol (output_bfd, info, h, sym)
6791 bfd *output_bfd;
6792 struct bfd_link_info *info;
6793 struct elf_link_hash_entry *h;
6794 Elf_Internal_Sym *sym;
6795 {
6796 struct elf_sh_link_hash_table *htab;
6797
6798 htab = sh_elf_hash_table (info);
6799
6800 if (h->plt.offset != (bfd_vma) -1)
6801 {
6802 asection *splt;
6803 asection *sgot;
6804 asection *srel;
6805
6806 bfd_vma plt_index;
6807 bfd_vma got_offset;
6808 Elf_Internal_Rela rel;
6809 bfd_byte *loc;
6810
6811 /* This symbol has an entry in the procedure linkage table. Set
6812 it up. */
6813
6814 BFD_ASSERT (h->dynindx != -1);
6815
6816 splt = htab->splt;
6817 sgot = htab->sgotplt;
6818 srel = htab->srelplt;
6819 BFD_ASSERT (splt != NULL && sgot != NULL && srel != NULL);
6820
6821 /* Get the index in the procedure linkage table which
6822 corresponds to this symbol. This is the index of this symbol
6823 in all the symbols for which we are making plt entries. The
6824 first entry in the procedure linkage table is reserved. */
6825 plt_index = h->plt.offset / elf_sh_sizeof_plt (info) - 1;
6826
6827 /* Get the offset into the .got table of the entry that
6828 corresponds to this function. Each .got entry is 4 bytes.
6829 The first three are reserved. */
6830 got_offset = (plt_index + 3) * 4;
6831
6832 #ifdef GOT_BIAS
6833 if (info->shared)
6834 got_offset -= GOT_BIAS;
6835 #endif
6836
6837 /* Fill in the entry in the procedure linkage table. */
6838 if (! info->shared)
6839 {
6840 if (elf_sh_plt_entry == NULL)
6841 {
6842 elf_sh_plt_entry = (bfd_big_endian (output_bfd) ?
6843 elf_sh_plt_entry_be : elf_sh_plt_entry_le);
6844 }
6845 memcpy (splt->contents + h->plt.offset, elf_sh_plt_entry,
6846 elf_sh_sizeof_plt (info));
6847 #ifdef INCLUDE_SHMEDIA
6848 movi_shori_putval (output_bfd,
6849 (sgot->output_section->vma
6850 + sgot->output_offset
6851 + got_offset),
6852 (splt->contents + h->plt.offset
6853 + elf_sh_plt_symbol_offset (info)));
6854
6855 /* Set bottom bit because its for a branch to SHmedia */
6856 movi_shori_putval (output_bfd,
6857 (splt->output_section->vma + splt->output_offset)
6858 | 1,
6859 (splt->contents + h->plt.offset
6860 + elf_sh_plt_plt0_offset (info)));
6861 #else
6862 bfd_put_32 (output_bfd,
6863 (sgot->output_section->vma
6864 + sgot->output_offset
6865 + got_offset),
6866 (splt->contents + h->plt.offset
6867 + elf_sh_plt_symbol_offset (info)));
6868
6869 bfd_put_32 (output_bfd,
6870 (splt->output_section->vma + splt->output_offset),
6871 (splt->contents + h->plt.offset
6872 + elf_sh_plt_plt0_offset (info)));
6873 #endif
6874 }
6875 else
6876 {
6877 if (elf_sh_pic_plt_entry == NULL)
6878 {
6879 elf_sh_pic_plt_entry = (bfd_big_endian (output_bfd) ?
6880 elf_sh_pic_plt_entry_be :
6881 elf_sh_pic_plt_entry_le);
6882 }
6883 memcpy (splt->contents + h->plt.offset, elf_sh_pic_plt_entry,
6884 elf_sh_sizeof_plt (info));
6885 #ifdef INCLUDE_SHMEDIA
6886 movi_shori_putval (output_bfd, got_offset,
6887 (splt->contents + h->plt.offset
6888 + elf_sh_plt_symbol_offset (info)));
6889 #else
6890 bfd_put_32 (output_bfd, got_offset,
6891 (splt->contents + h->plt.offset
6892 + elf_sh_plt_symbol_offset (info)));
6893 #endif
6894 }
6895
6896 #ifdef GOT_BIAS
6897 if (info->shared)
6898 got_offset += GOT_BIAS;
6899 #endif
6900
6901 #ifdef INCLUDE_SHMEDIA
6902 movi_shori_putval (output_bfd,
6903 plt_index * sizeof (Elf32_External_Rela),
6904 (splt->contents + h->plt.offset
6905 + elf_sh_plt_reloc_offset (info)));
6906 #else
6907 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
6908 (splt->contents + h->plt.offset
6909 + elf_sh_plt_reloc_offset (info)));
6910 #endif
6911
6912 /* Fill in the entry in the global offset table. */
6913 bfd_put_32 (output_bfd,
6914 (splt->output_section->vma
6915 + splt->output_offset
6916 + h->plt.offset
6917 + elf_sh_plt_temp_offset (info)),
6918 sgot->contents + got_offset);
6919
6920 /* Fill in the entry in the .rela.plt section. */
6921 rel.r_offset = (sgot->output_section->vma
6922 + sgot->output_offset
6923 + got_offset);
6924 rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_JMP_SLOT);
6925 rel.r_addend = 0;
6926 #ifdef GOT_BIAS
6927 rel.r_addend = GOT_BIAS;
6928 #endif
6929 loc = srel->contents + plt_index * sizeof (Elf32_External_Rela);
6930 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
6931
6932 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
6933 {
6934 /* Mark the symbol as undefined, rather than as defined in
6935 the .plt section. Leave the value alone. */
6936 sym->st_shndx = SHN_UNDEF;
6937 }
6938 }
6939
6940 if (h->got.offset != (bfd_vma) -1
6941 && sh_elf_hash_entry (h)->tls_type != GOT_TLS_GD
6942 && sh_elf_hash_entry (h)->tls_type != GOT_TLS_IE)
6943 {
6944 asection *sgot;
6945 asection *srel;
6946 Elf_Internal_Rela rel;
6947 bfd_byte *loc;
6948
6949 /* This symbol has an entry in the global offset table. Set it
6950 up. */
6951
6952 sgot = htab->sgot;
6953 srel = htab->srelgot;
6954 BFD_ASSERT (sgot != NULL && srel != NULL);
6955
6956 rel.r_offset = (sgot->output_section->vma
6957 + sgot->output_offset
6958 + (h->got.offset &~ (bfd_vma) 1));
6959
6960 /* If this is a static link, or it is a -Bsymbolic link and the
6961 symbol is defined locally or was forced to be local because
6962 of a version file, we just want to emit a RELATIVE reloc.
6963 The entry in the global offset table will already have been
6964 initialized in the relocate_section function. */
6965 if (info->shared
6966 && (info->symbolic
6967 || h->dynindx == -1
6968 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL))
6969 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR))
6970 {
6971 rel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
6972 rel.r_addend = (h->root.u.def.value
6973 + h->root.u.def.section->output_section->vma
6974 + h->root.u.def.section->output_offset);
6975 }
6976 else
6977 {
6978 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset);
6979 rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_GLOB_DAT);
6980 rel.r_addend = 0;
6981 }
6982
6983 loc = srel->contents;
6984 loc += srel->reloc_count++ * sizeof (Elf32_External_Rela);
6985 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
6986 }
6987
6988 #ifdef INCLUDE_SHMEDIA
6989 {
6990 struct elf_sh_link_hash_entry *eh;
6991
6992 eh = (struct elf_sh_link_hash_entry *) h;
6993 if (eh->datalabel_got.offset != (bfd_vma) -1)
6994 {
6995 asection *sgot;
6996 asection *srel;
6997 Elf_Internal_Rela rel;
6998 bfd_byte *loc;
6999
7000 /* This symbol has a datalabel entry in the global offset table.
7001 Set it up. */
7002
7003 sgot = htab->sgot;
7004 srel = htab->srelgot;
7005 BFD_ASSERT (sgot != NULL && srel != NULL);
7006
7007 rel.r_offset = (sgot->output_section->vma
7008 + sgot->output_offset
7009 + (eh->datalabel_got.offset &~ (bfd_vma) 1));
7010
7011 /* If this is a static link, or it is a -Bsymbolic link and the
7012 symbol is defined locally or was forced to be local because
7013 of a version file, we just want to emit a RELATIVE reloc.
7014 The entry in the global offset table will already have been
7015 initialized in the relocate_section function. */
7016 if (info->shared
7017 && (info->symbolic
7018 || h->dynindx == -1
7019 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL))
7020 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR))
7021 {
7022 rel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
7023 rel.r_addend = (h->root.u.def.value
7024 + h->root.u.def.section->output_section->vma
7025 + h->root.u.def.section->output_offset);
7026 }
7027 else
7028 {
7029 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents
7030 + eh->datalabel_got.offset);
7031 rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_GLOB_DAT);
7032 rel.r_addend = 0;
7033 }
7034
7035 loc = srel->contents;
7036 loc += srel->reloc_count++ * sizeof (Elf32_External_Rela);
7037 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
7038 }
7039 }
7040 #endif
7041
7042 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
7043 {
7044 asection *s;
7045 Elf_Internal_Rela rel;
7046 bfd_byte *loc;
7047
7048 /* This symbol needs a copy reloc. Set it up. */
7049
7050 BFD_ASSERT (h->dynindx != -1
7051 && (h->root.type == bfd_link_hash_defined
7052 || h->root.type == bfd_link_hash_defweak));
7053
7054 s = bfd_get_section_by_name (h->root.u.def.section->owner,
7055 ".rela.bss");
7056 BFD_ASSERT (s != NULL);
7057
7058 rel.r_offset = (h->root.u.def.value
7059 + h->root.u.def.section->output_section->vma
7060 + h->root.u.def.section->output_offset);
7061 rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_COPY);
7062 rel.r_addend = 0;
7063 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
7064 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
7065 }
7066
7067 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
7068 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
7069 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
7070 sym->st_shndx = SHN_ABS;
7071
7072 return TRUE;
7073 }
7074
7075 /* Finish up the dynamic sections. */
7076
7077 static bfd_boolean
7078 sh_elf_finish_dynamic_sections (output_bfd, info)
7079 bfd *output_bfd;
7080 struct bfd_link_info *info;
7081 {
7082 struct elf_sh_link_hash_table *htab;
7083 asection *sgot;
7084 asection *sdyn;
7085
7086 htab = sh_elf_hash_table (info);
7087 sgot = htab->sgotplt;
7088 sdyn = bfd_get_section_by_name (htab->root.dynobj, ".dynamic");
7089
7090 if (htab->root.dynamic_sections_created)
7091 {
7092 asection *splt;
7093 Elf32_External_Dyn *dyncon, *dynconend;
7094
7095 BFD_ASSERT (sgot != NULL && sdyn != NULL);
7096
7097 dyncon = (Elf32_External_Dyn *) sdyn->contents;
7098 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
7099 for (; dyncon < dynconend; dyncon++)
7100 {
7101 Elf_Internal_Dyn dyn;
7102 asection *s;
7103 #ifdef INCLUDE_SHMEDIA
7104 const char *name;
7105 #endif
7106
7107 bfd_elf32_swap_dyn_in (htab->root.dynobj, dyncon, &dyn);
7108
7109 switch (dyn.d_tag)
7110 {
7111 default:
7112 break;
7113
7114 #ifdef INCLUDE_SHMEDIA
7115 case DT_INIT:
7116 name = info->init_function;
7117 goto get_sym;
7118
7119 case DT_FINI:
7120 name = info->fini_function;
7121 get_sym:
7122 if (dyn.d_un.d_val != 0)
7123 {
7124 struct elf_link_hash_entry *h;
7125
7126 h = elf_link_hash_lookup (&htab->root, name,
7127 FALSE, FALSE, TRUE);
7128 if (h != NULL && (h->other & STO_SH5_ISA32))
7129 {
7130 dyn.d_un.d_val |= 1;
7131 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7132 }
7133 }
7134 break;
7135 #endif
7136
7137 case DT_PLTGOT:
7138 s = htab->sgot->output_section;
7139 goto get_vma;
7140
7141 case DT_JMPREL:
7142 s = htab->srelplt->output_section;
7143 get_vma:
7144 BFD_ASSERT (s != NULL);
7145 dyn.d_un.d_ptr = s->vma;
7146 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7147 break;
7148
7149 case DT_PLTRELSZ:
7150 s = htab->srelplt->output_section;
7151 BFD_ASSERT (s != NULL);
7152 if (s->_cooked_size != 0)
7153 dyn.d_un.d_val = s->_cooked_size;
7154 else
7155 dyn.d_un.d_val = s->_raw_size;
7156 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7157 break;
7158
7159 case DT_RELASZ:
7160 /* My reading of the SVR4 ABI indicates that the
7161 procedure linkage table relocs (DT_JMPREL) should be
7162 included in the overall relocs (DT_RELA). This is
7163 what Solaris does. However, UnixWare can not handle
7164 that case. Therefore, we override the DT_RELASZ entry
7165 here to make it not include the JMPREL relocs. Since
7166 the linker script arranges for .rela.plt to follow all
7167 other relocation sections, we don't have to worry
7168 about changing the DT_RELA entry. */
7169 if (htab->srelplt != NULL)
7170 {
7171 s = htab->srelplt->output_section;
7172 if (s->_cooked_size != 0)
7173 dyn.d_un.d_val -= s->_cooked_size;
7174 else
7175 dyn.d_un.d_val -= s->_raw_size;
7176 }
7177 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7178 break;
7179 }
7180 }
7181
7182 /* Fill in the first entry in the procedure linkage table. */
7183 splt = htab->splt;
7184 if (splt && splt->_raw_size > 0)
7185 {
7186 if (info->shared)
7187 {
7188 if (elf_sh_pic_plt_entry == NULL)
7189 {
7190 elf_sh_pic_plt_entry = (bfd_big_endian (output_bfd) ?
7191 elf_sh_pic_plt_entry_be :
7192 elf_sh_pic_plt_entry_le);
7193 }
7194 memcpy (splt->contents, elf_sh_pic_plt_entry,
7195 elf_sh_sizeof_plt (info));
7196 }
7197 else
7198 {
7199 if (elf_sh_plt0_entry == NULL)
7200 {
7201 elf_sh_plt0_entry = (bfd_big_endian (output_bfd) ?
7202 elf_sh_plt0_entry_be :
7203 elf_sh_plt0_entry_le);
7204 }
7205 memcpy (splt->contents, elf_sh_plt0_entry, PLT_ENTRY_SIZE);
7206 #ifdef INCLUDE_SHMEDIA
7207 movi_shori_putval (output_bfd,
7208 sgot->output_section->vma
7209 + sgot->output_offset,
7210 splt->contents
7211 + elf_sh_plt0_gotplt_offset (info));
7212 #else
7213 bfd_put_32 (output_bfd,
7214 sgot->output_section->vma + sgot->output_offset + 4,
7215 splt->contents + elf_sh_plt0_gotid_offset (info));
7216 bfd_put_32 (output_bfd,
7217 sgot->output_section->vma + sgot->output_offset + 8,
7218 splt->contents + elf_sh_plt0_linker_offset (info));
7219 #endif
7220 }
7221
7222 /* UnixWare sets the entsize of .plt to 4, although that doesn't
7223 really seem like the right value. */
7224 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 4;
7225 }
7226 }
7227
7228 /* Fill in the first three entries in the global offset table. */
7229 if (sgot && sgot->_raw_size > 0)
7230 {
7231 if (sdyn == NULL)
7232 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
7233 else
7234 bfd_put_32 (output_bfd,
7235 sdyn->output_section->vma + sdyn->output_offset,
7236 sgot->contents);
7237 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
7238 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
7239
7240 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
7241 }
7242
7243 return TRUE;
7244 }
7245
7246 static enum elf_reloc_type_class
7247 sh_elf_reloc_type_class (rela)
7248 const Elf_Internal_Rela *rela;
7249 {
7250 switch ((int) ELF32_R_TYPE (rela->r_info))
7251 {
7252 case R_SH_RELATIVE:
7253 return reloc_class_relative;
7254 case R_SH_JMP_SLOT:
7255 return reloc_class_plt;
7256 case R_SH_COPY:
7257 return reloc_class_copy;
7258 default:
7259 return reloc_class_normal;
7260 }
7261 }
7262
7263 /* Support for Linux core dump NOTE sections. */
7264 static bfd_boolean
7265 elf32_shlin_grok_prstatus (abfd, note)
7266 bfd *abfd;
7267 Elf_Internal_Note *note;
7268 {
7269 int offset;
7270 unsigned int raw_size;
7271
7272 switch (note->descsz)
7273 {
7274 default:
7275 return FALSE;
7276
7277 case 168: /* Linux/SH */
7278 /* pr_cursig */
7279 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
7280
7281 /* pr_pid */
7282 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 24);
7283
7284 /* pr_reg */
7285 offset = 72;
7286 raw_size = 92;
7287
7288 break;
7289 }
7290
7291 /* Make a ".reg/999" section. */
7292 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
7293 raw_size, note->descpos + offset);
7294 }
7295
7296 static bfd_boolean
7297 elf32_shlin_grok_psinfo (abfd, note)
7298 bfd *abfd;
7299 Elf_Internal_Note *note;
7300 {
7301 switch (note->descsz)
7302 {
7303 default:
7304 return FALSE;
7305
7306 case 124: /* Linux/SH elf_prpsinfo */
7307 elf_tdata (abfd)->core_program
7308 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
7309 elf_tdata (abfd)->core_command
7310 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
7311 }
7312
7313 /* Note that for some reason, a spurious space is tacked
7314 onto the end of the args in some (at least one anyway)
7315 implementations, so strip it off if it exists. */
7316
7317 {
7318 char *command = elf_tdata (abfd)->core_command;
7319 int n = strlen (command);
7320
7321 if (0 < n && command[n - 1] == ' ')
7322 command[n - 1] = '\0';
7323 }
7324
7325 return TRUE;
7326 }
7327
7328 #define TARGET_BIG_SYM bfd_elf32_sh_vec
7329 #define TARGET_BIG_NAME "elf32-sh"
7330 #define TARGET_LITTLE_SYM bfd_elf32_shl_vec
7331 #define TARGET_LITTLE_NAME "elf32-shl"
7332 #define ELF_ARCH bfd_arch_sh
7333 #define ELF_MACHINE_CODE EM_SH
7334 #define ELF_MAXPAGESIZE 128
7335
7336 #define elf_symbol_leading_char '_'
7337
7338 #define bfd_elf32_bfd_reloc_type_lookup sh_elf_reloc_type_lookup
7339 #define elf_info_to_howto sh_elf_info_to_howto
7340 #define bfd_elf32_bfd_relax_section sh_elf_relax_section
7341 #define elf_backend_relocate_section sh_elf_relocate_section
7342 #define bfd_elf32_bfd_get_relocated_section_contents \
7343 sh_elf_get_relocated_section_contents
7344 #define bfd_elf32_mkobject sh_elf_mkobject
7345 #define elf_backend_object_p sh_elf_object_p
7346 #define bfd_elf32_bfd_set_private_bfd_flags \
7347 sh_elf_set_private_flags
7348 #define bfd_elf32_bfd_copy_private_bfd_data \
7349 sh_elf_copy_private_data
7350 #define bfd_elf32_bfd_merge_private_bfd_data \
7351 sh_elf_merge_private_data
7352
7353 #define elf_backend_gc_mark_hook sh_elf_gc_mark_hook
7354 #define elf_backend_gc_sweep_hook sh_elf_gc_sweep_hook
7355 #define elf_backend_check_relocs sh_elf_check_relocs
7356 #define elf_backend_copy_indirect_symbol \
7357 sh_elf_copy_indirect_symbol
7358 #define elf_backend_create_dynamic_sections \
7359 sh_elf_create_dynamic_sections
7360 #define bfd_elf32_bfd_link_hash_table_create \
7361 sh_elf_link_hash_table_create
7362 #define elf_backend_adjust_dynamic_symbol \
7363 sh_elf_adjust_dynamic_symbol
7364 #define elf_backend_size_dynamic_sections \
7365 sh_elf_size_dynamic_sections
7366 #define elf_backend_finish_dynamic_symbol \
7367 sh_elf_finish_dynamic_symbol
7368 #define elf_backend_finish_dynamic_sections \
7369 sh_elf_finish_dynamic_sections
7370 #define elf_backend_reloc_type_class sh_elf_reloc_type_class
7371
7372 #define elf_backend_can_gc_sections 1
7373 #define elf_backend_can_refcount 1
7374 #define elf_backend_want_got_plt 1
7375 #define elf_backend_plt_readonly 1
7376 #define elf_backend_want_plt_sym 0
7377 #define elf_backend_got_header_size 12
7378 #define elf_backend_plt_header_size PLT_ENTRY_SIZE
7379
7380 #ifndef INCLUDE_SHMEDIA
7381
7382 #include "elf32-target.h"
7383
7384 /* NetBSD support. */
7385 #undef TARGET_BIG_SYM
7386 #define TARGET_BIG_SYM bfd_elf32_shnbsd_vec
7387 #undef TARGET_BIG_NAME
7388 #define TARGET_BIG_NAME "elf32-sh-nbsd"
7389 #undef TARGET_LITTLE_SYM
7390 #define TARGET_LITTLE_SYM bfd_elf32_shlnbsd_vec
7391 #undef TARGET_LITTLE_NAME
7392 #define TARGET_LITTLE_NAME "elf32-shl-nbsd"
7393 #undef ELF_MAXPAGESIZE
7394 #define ELF_MAXPAGESIZE 0x10000
7395 #undef elf_symbol_leading_char
7396 #define elf_symbol_leading_char 0
7397 #undef elf32_bed
7398 #define elf32_bed elf32_sh_nbsd_bed
7399
7400 #include "elf32-target.h"
7401
7402
7403 /* Linux support. */
7404 #undef TARGET_BIG_SYM
7405 #define TARGET_BIG_SYM bfd_elf32_shblin_vec
7406 #undef TARGET_BIG_NAME
7407 #define TARGET_BIG_NAME "elf32-shbig-linux"
7408 #undef TARGET_LITTLE_SYM
7409 #define TARGET_LITTLE_SYM bfd_elf32_shlin_vec
7410 #undef TARGET_LITTLE_NAME
7411 #define TARGET_LITTLE_NAME "elf32-sh-linux"
7412
7413 #undef elf_backend_grok_prstatus
7414 #define elf_backend_grok_prstatus elf32_shlin_grok_prstatus
7415 #undef elf_backend_grok_psinfo
7416 #define elf_backend_grok_psinfo elf32_shlin_grok_psinfo
7417 #undef elf32_bed
7418 #define elf32_bed elf32_sh_lin_bed
7419
7420 #include "elf32-target.h"
7421
7422 #endif /* INCLUDE_SHMEDIA */