]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blob - bfd/elf32-tilepro.c
ebd5046c46c8be8f9a93b8fb3abb4842c90278e8
[thirdparty/binutils-gdb.git] / bfd / elf32-tilepro.c
1 /* TILEPro-specific support for 32-bit ELF.
2 Copyright (C) 2011-2016 Free Software Foundation, Inc.
3
4 This file is part of BFD, the Binary File Descriptor library.
5
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
10
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
15
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
19 MA 02110-1301, USA. */
20
21 #include "sysdep.h"
22 #include "bfd.h"
23 #include "libbfd.h"
24 #include "elf-bfd.h"
25 #include "elf/tilepro.h"
26 #include "opcode/tilepro.h"
27 #include "libiberty.h"
28 #include "elf32-tilepro.h"
29
30 #define TILEPRO_BYTES_PER_WORD 4
31
32 static reloc_howto_type tilepro_elf_howto_table [] =
33 {
34 /* This reloc does nothing. */
35 HOWTO (R_TILEPRO_NONE, /* type */
36 0, /* rightshift */
37 3, /* size (0 = byte, 1 = short, 2 = long) */
38 0, /* bitsize */
39 FALSE, /* pc_relative */
40 0, /* bitpos */
41 complain_overflow_dont, /* complain_on_overflow */
42 bfd_elf_generic_reloc, /* special_function */
43 "R_TILEPRO_NONE", /* name */
44 FALSE, /* partial_inplace */
45 0, /* src_mask */
46 0, /* dst_mask */
47 FALSE), /* pcrel_offset */
48
49 /* A 32 bit absolute relocation. */
50 HOWTO (R_TILEPRO_32, /* type */
51 0, /* rightshift */
52 2, /* size (0 = byte, 1 = short, 2 = long) */
53 32, /* bitsize */
54 FALSE, /* pc_relative */
55 0, /* bitpos */
56 complain_overflow_dont, /* complain_on_overflow */
57 bfd_elf_generic_reloc, /* special_function */
58 "R_TILEPRO_32", /* name */
59 FALSE, /* partial_inplace */
60 0, /* src_mask */
61 0xffffffff, /* dst_mask */
62 FALSE), /* pcrel_offset */
63
64 /* A 16 bit absolute relocation. */
65 HOWTO (R_TILEPRO_16, /* type */
66 0, /* rightshift */
67 1, /* size (0 = byte, 1 = short, 2 = long) */
68 16, /* bitsize */
69 FALSE, /* pc_relative */
70 0, /* bitpos */
71 complain_overflow_bitfield, /* complain_on_overflow */
72 bfd_elf_generic_reloc, /* special_function */
73 "R_TILEPRO_16", /* name */
74 FALSE, /* partial_inplace */
75 0, /* src_mask */
76 0xffff, /* dst_mask */
77 FALSE), /* pcrel_offset */
78
79 /* An 8 bit absolute relocation. */
80 HOWTO (R_TILEPRO_8, /* type */
81 0, /* rightshift */
82 0, /* size (0 = byte, 1 = short, 2 = long) */
83 8, /* bitsize */
84 FALSE, /* pc_relative */
85 0, /* bitpos */
86 complain_overflow_unsigned, /* complain_on_overflow */
87 bfd_elf_generic_reloc, /* special_function */
88 "R_TILEPRO_8", /* name */
89 FALSE, /* partial_inplace */
90 0, /* src_mask */
91 0xff, /* dst_mask */
92 FALSE), /* pcrel_offset */
93
94 /* A 32 bit pc-relative relocation. */
95 HOWTO (R_TILEPRO_32_PCREL,/* type */
96 0, /* rightshift */
97 2, /* size (0 = byte, 1 = short, 2 = long) */
98 32, /* bitsize */
99 TRUE, /* pc_relative */
100 0, /* bitpos */
101 complain_overflow_dont, /* complain_on_overflow */
102 bfd_elf_generic_reloc, /* special_function */
103 "R_TILEPRO_32_PCREL", /* name */
104 FALSE, /* partial_inplace */
105 0, /* src_mask */
106 0xffffffff, /* dst_mask */
107 TRUE), /* pcrel_offset */
108
109 /* A 16 bit pc-relative relocation. */
110 HOWTO (R_TILEPRO_16_PCREL,/* type */
111 0, /* rightshift */
112 1, /* size (0 = byte, 1 = short, 2 = long) */
113 16, /* bitsize */
114 TRUE, /* pc_relative */
115 0, /* bitpos */
116 complain_overflow_signed, /* complain_on_overflow */
117 bfd_elf_generic_reloc, /* special_function */
118 "R_TILEPRO_16_PCREL", /* name */
119 FALSE, /* partial_inplace */
120 0, /* src_mask */
121 0xffff, /* dst_mask */
122 TRUE), /* pcrel_offset */
123
124 /* An 8 bit pc-relative relocation. */
125 HOWTO (R_TILEPRO_8_PCREL, /* type */
126 0, /* rightshift */
127 0, /* size (0 = byte, 1 = short, 2 = long) */
128 8, /* bitsize */
129 TRUE, /* pc_relative */
130 0, /* bitpos */
131 complain_overflow_signed, /* complain_on_overflow */
132 bfd_elf_generic_reloc, /* special_function */
133 "R_TILEPRO_8_PCREL",/* name */
134 FALSE, /* partial_inplace */
135 0, /* src_mask */
136 0xff, /* dst_mask */
137 TRUE), /* pcrel_offset */
138
139 /* A 16 bit relocation without overflow. */
140 HOWTO (R_TILEPRO_LO16, /* type */
141 0, /* rightshift */
142 1, /* size (0 = byte, 1 = short, 2 = long) */
143 16, /* bitsize */
144 FALSE, /* pc_relative */
145 0, /* bitpos */
146 complain_overflow_dont,/* complain_on_overflow */
147 bfd_elf_generic_reloc, /* special_function */
148 "R_TILEPRO_LO16", /* name */
149 FALSE, /* partial_inplace */
150 0, /* src_mask */
151 0xffff, /* dst_mask */
152 FALSE), /* pcrel_offset */
153
154 /* The high order 16 bits of an address. */
155 HOWTO (R_TILEPRO_HI16, /* type */
156 16, /* rightshift */
157 1, /* size (0 = byte, 1 = short, 2 = long) */
158 16, /* bitsize */
159 FALSE, /* pc_relative */
160 0, /* bitpos */
161 complain_overflow_dont, /* complain_on_overflow */
162 bfd_elf_generic_reloc, /* special_function */
163 "R_TILEPRO_HI16", /* name */
164 FALSE, /* partial_inplace */
165 0, /* src_mask */
166 0xffff, /* dst_mask */
167 FALSE), /* pcrel_offset */
168
169 /* The high order 16 bits of an address, plus 1 if the contents of
170 the low 16 bits, treated as a signed number, is negative. */
171 HOWTO (R_TILEPRO_HA16, /* type */
172 16, /* rightshift */
173 1, /* size (0 = byte, 1 = short, 2 = long) */
174 16, /* bitsize */
175 FALSE, /* pc_relative */
176 0, /* bitpos */
177 complain_overflow_dont, /* complain_on_overflow */
178 bfd_elf_generic_reloc, /* special_function */
179 "R_TILEPRO_HA16", /* name */
180 FALSE, /* partial_inplace */
181 0, /* src_mask */
182 0xffff, /* dst_mask */
183 FALSE), /* pcrel_offset */
184
185 HOWTO (R_TILEPRO_COPY, /* type */
186 0, /* rightshift */
187 0, /* size (0 = byte, 1 = short, 2 = long) */
188 0, /* bitsize */
189 FALSE, /* pc_relative */
190 0, /* bitpos */
191 complain_overflow_dont, /* complain_on_overflow */
192 bfd_elf_generic_reloc, /* special_function */
193 "R_TILEPRO_COPY", /* name */
194 FALSE, /* partial_inplace */
195 0, /* src_mask */
196 0, /* dst_mask */
197 TRUE), /* pcrel_offset */
198
199 HOWTO (R_TILEPRO_GLOB_DAT, /* type */
200 0, /* rightshift */
201 0, /* size (0 = byte, 1 = short, 2 = long) */
202 0, /* bitsize */
203 FALSE, /* pc_relative */
204 0, /* bitpos */
205 complain_overflow_dont, /* complain_on_overflow */
206 bfd_elf_generic_reloc, /* special_function */
207 "R_TILEPRO_GLOB_DAT", /* name */
208 FALSE, /* partial_inplace */
209 0, /* src_mask */
210 0, /* dst_mask */
211 TRUE), /* pcrel_offset */
212
213 HOWTO (R_TILEPRO_JMP_SLOT, /* type */
214 0, /* rightshift */
215 0, /* size (0 = byte, 1 = short, 2 = long) */
216 0, /* bitsize */
217 FALSE, /* pc_relative */
218 0, /* bitpos */
219 complain_overflow_dont, /* complain_on_overflow */
220 bfd_elf_generic_reloc, /* special_function */
221 "R_TILEPRO_JMP_SLOT", /* name */
222 FALSE, /* partial_inplace */
223 0, /* src_mask */
224 0, /* dst_mask */
225 TRUE), /* pcrel_offset */
226
227 HOWTO (R_TILEPRO_RELATIVE, /* type */
228 0, /* rightshift */
229 0, /* size (0 = byte, 1 = short, 2 = long) */
230 0, /* bitsize */
231 FALSE, /* pc_relative */
232 0, /* bitpos */
233 complain_overflow_dont, /* complain_on_overflow */
234 bfd_elf_generic_reloc, /* special_function */
235 "R_TILEPRO_RELATIVE", /* name */
236 FALSE, /* partial_inplace */
237 0, /* src_mask */
238 0, /* dst_mask */
239 TRUE), /* pcrel_offset */
240
241 HOWTO (R_TILEPRO_BROFF_X1, /* type */
242 TILEPRO_LOG2_BUNDLE_ALIGNMENT_IN_BYTES, /* rightshift */
243 2, /* size (0 = byte, 1 = short, 2 = long) */
244 17, /* bitsize */
245 TRUE, /* pc_relative */
246 0, /* bitpos */
247 complain_overflow_signed, /* complain_on_overflow */
248 bfd_elf_generic_reloc, /* special_function */
249 "R_TILEPRO_BROFF_X1", /* name */
250 FALSE, /* partial_inplace */
251 0, /* src_mask */
252 -1, /* dst_mask */
253 TRUE), /* pcrel_offset */
254
255 HOWTO (R_TILEPRO_JOFFLONG_X1, /* type */
256 TILEPRO_LOG2_BUNDLE_ALIGNMENT_IN_BYTES, /* rightshift */
257 2, /* size (0 = byte, 1 = short, 2 = long) */
258 29, /* bitsize */
259 TRUE, /* pc_relative */
260 0, /* bitpos */
261 complain_overflow_signed,/* complain_on_overflow */
262 bfd_elf_generic_reloc, /* special_function */
263 "R_TILEPRO_JOFFLONG_X1", /* name */
264 FALSE, /* partial_inplace */
265 0, /* src_mask */
266 -1, /* dst_mask */
267 TRUE), /* pcrel_offset */
268
269 HOWTO (R_TILEPRO_JOFFLONG_X1_PLT, /* type */
270 TILEPRO_LOG2_BUNDLE_ALIGNMENT_IN_BYTES, /* rightshift */
271 2, /* size (0 = byte, 1 = short, 2 = long) */
272 29, /* bitsize */
273 TRUE, /* pc_relative */
274 0, /* bitpos */
275 complain_overflow_signed,/* complain_on_overflow */
276 bfd_elf_generic_reloc, /* special_function */
277 "R_TILEPRO_JOFFLONG_X1_PLT", /* name */
278 FALSE, /* partial_inplace */
279 0, /* src_mask */
280 -1, /* dst_mask */
281 TRUE), /* pcrel_offset */
282
283 #define TILEPRO_IMM_HOWTO(name, size, bitsize) \
284 HOWTO (name, 0, size, bitsize, FALSE, 0, \
285 complain_overflow_signed, bfd_elf_generic_reloc, \
286 #name, FALSE, 0, -1, FALSE)
287
288 #define TILEPRO_UIMM_HOWTO(name, size, bitsize) \
289 HOWTO (name, 0, size, bitsize, FALSE, 0, \
290 complain_overflow_unsigned, bfd_elf_generic_reloc, \
291 #name, FALSE, 0, -1, FALSE)
292
293 TILEPRO_IMM_HOWTO(R_TILEPRO_IMM8_X0, 0, 8),
294 TILEPRO_IMM_HOWTO(R_TILEPRO_IMM8_Y0, 0, 8),
295 TILEPRO_IMM_HOWTO(R_TILEPRO_IMM8_X1, 0, 8),
296 TILEPRO_IMM_HOWTO(R_TILEPRO_IMM8_Y1, 0, 8),
297 TILEPRO_UIMM_HOWTO(R_TILEPRO_MT_IMM15_X1, 1, 15),
298 TILEPRO_UIMM_HOWTO(R_TILEPRO_MF_IMM15_X1, 1, 15),
299 TILEPRO_IMM_HOWTO(R_TILEPRO_IMM16_X0, 1, 16),
300 TILEPRO_IMM_HOWTO(R_TILEPRO_IMM16_X1, 1, 16),
301
302 #define TILEPRO_IMM16_HOWTO(name, rshift) \
303 HOWTO (name, rshift, 1, 16, FALSE, 0, \
304 complain_overflow_dont, bfd_elf_generic_reloc, \
305 #name, FALSE, 0, 0xffff, FALSE)
306
307 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_LO, 0),
308 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_LO, 0),
309 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_HI, 16),
310 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_HI, 16),
311 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_HA, 16),
312 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_HA, 16),
313
314 /* PC-relative offsets. */
315
316 HOWTO (R_TILEPRO_IMM16_X0_PCREL, /* type */
317 0, /* rightshift */
318 1, /* size (0 = byte, 1 = short, 2 = long) */
319 16, /* bitsize */
320 TRUE, /* pc_relative */
321 0, /* bitpos */
322 complain_overflow_signed, /* complain_on_overflow */
323 bfd_elf_generic_reloc, /* special_function */
324 "R_TILEPRO_IMM16_X0_PCREL",/* name */
325 FALSE, /* partial_inplace */
326 0, /* src_mask */
327 -1, /* dst_mask */
328 TRUE), /* pcrel_offset */
329
330 HOWTO (R_TILEPRO_IMM16_X1_PCREL, /* type */
331 0, /* rightshift */
332 1, /* size (0 = byte, 1 = short, 2 = long) */
333 16, /* bitsize */
334 TRUE, /* pc_relative */
335 0, /* bitpos */
336 complain_overflow_signed, /* complain_on_overflow */
337 bfd_elf_generic_reloc, /* special_function */
338 "R_TILEPRO_IMM16_X1_PCREL",/* name */
339 FALSE, /* partial_inplace */
340 0, /* src_mask */
341 -1, /* dst_mask */
342 TRUE), /* pcrel_offset */
343
344 #define TILEPRO_IMM16_HOWTO_PCREL(name, rshift) \
345 HOWTO (name, rshift, 1, 16, TRUE, 0, \
346 complain_overflow_dont, bfd_elf_generic_reloc, \
347 #name, FALSE, 0, 0xffff, TRUE)
348
349 TILEPRO_IMM16_HOWTO_PCREL (R_TILEPRO_IMM16_X0_LO_PCREL, 0),
350 TILEPRO_IMM16_HOWTO_PCREL (R_TILEPRO_IMM16_X1_LO_PCREL, 0),
351 TILEPRO_IMM16_HOWTO_PCREL (R_TILEPRO_IMM16_X0_HI_PCREL, 16),
352 TILEPRO_IMM16_HOWTO_PCREL (R_TILEPRO_IMM16_X1_HI_PCREL, 16),
353 TILEPRO_IMM16_HOWTO_PCREL (R_TILEPRO_IMM16_X0_HA_PCREL, 16),
354 TILEPRO_IMM16_HOWTO_PCREL (R_TILEPRO_IMM16_X1_HA_PCREL, 16),
355
356 /* Byte offset into GOT for a particular symbol. */
357 TILEPRO_IMM_HOWTO(R_TILEPRO_IMM16_X0_GOT, 1, 16),
358 TILEPRO_IMM_HOWTO(R_TILEPRO_IMM16_X1_GOT, 1, 16),
359 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_GOT_LO, 0),
360 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_GOT_LO, 0),
361 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_GOT_HI, 16),
362 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_GOT_HI, 16),
363 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_GOT_HA, 16),
364 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_GOT_HA, 16),
365
366 TILEPRO_UIMM_HOWTO(R_TILEPRO_MMSTART_X0, 0, 5),
367 TILEPRO_UIMM_HOWTO(R_TILEPRO_MMEND_X0, 0, 5),
368 TILEPRO_UIMM_HOWTO(R_TILEPRO_MMSTART_X1, 0, 5),
369 TILEPRO_UIMM_HOWTO(R_TILEPRO_MMEND_X1, 0, 5),
370
371 TILEPRO_UIMM_HOWTO(R_TILEPRO_SHAMT_X0, 0, 5),
372 TILEPRO_UIMM_HOWTO(R_TILEPRO_SHAMT_X1, 0, 5),
373 TILEPRO_UIMM_HOWTO(R_TILEPRO_SHAMT_Y0, 0, 5),
374 TILEPRO_UIMM_HOWTO(R_TILEPRO_SHAMT_Y1, 0, 5),
375
376 TILEPRO_IMM_HOWTO(R_TILEPRO_DEST_IMM8_X1, 0, 8),
377
378 /* These relocs are currently not defined. */
379 EMPTY_HOWTO (56),
380 EMPTY_HOWTO (57),
381 EMPTY_HOWTO (58),
382 EMPTY_HOWTO (59),
383
384 HOWTO (R_TILEPRO_TLS_GD_CALL, /* type */
385 TILEPRO_LOG2_BUNDLE_ALIGNMENT_IN_BYTES, /* rightshift */
386 2, /* size (0 = byte, 1 = short, 2 = long) */
387 29, /* bitsize */
388 TRUE, /* pc_relative */
389 0, /* bitpos */
390 complain_overflow_signed,/* complain_on_overflow */
391 bfd_elf_generic_reloc, /* special_function */
392 "R_TILEPRO_TLS_GD_CALL", /* name */
393 FALSE, /* partial_inplace */
394 0, /* src_mask */
395 -1, /* dst_mask */
396 TRUE), /* pcrel_offset */
397
398 TILEPRO_IMM_HOWTO(R_TILEPRO_IMM8_X0_TLS_GD_ADD, 0, 8),
399 TILEPRO_IMM_HOWTO(R_TILEPRO_IMM8_X1_TLS_GD_ADD, 0, 8),
400 TILEPRO_IMM_HOWTO(R_TILEPRO_IMM8_Y0_TLS_GD_ADD, 0, 8),
401 TILEPRO_IMM_HOWTO(R_TILEPRO_IMM8_Y1_TLS_GD_ADD, 0, 8),
402 TILEPRO_IMM_HOWTO(R_TILEPRO_TLS_IE_LOAD, 0, 8),
403
404 /* Offsets into the GOT of TLS Descriptors. */
405
406 HOWTO (R_TILEPRO_IMM16_X0_TLS_GD,/* type */
407 0, /* rightshift */
408 1, /* size (0 = byte, 1 = short, 2 = long) */
409 16, /* bitsize */
410 FALSE, /* pc_relative */
411 0, /* bitpos */
412 complain_overflow_signed, /* complain_on_overflow */
413 bfd_elf_generic_reloc, /* special_function */
414 "R_TILEPRO_IMM16_X0_TLS_GD",/* name */
415 FALSE, /* partial_inplace */
416 0, /* src_mask */
417 0xffff, /* dst_mask */
418 FALSE), /* pcrel_offset */
419
420 HOWTO (R_TILEPRO_IMM16_X1_TLS_GD,/* type */
421 0, /* rightshift */
422 1, /* size (0 = byte, 1 = short, 2 = long) */
423 16, /* bitsize */
424 FALSE, /* pc_relative */
425 0, /* bitpos */
426 complain_overflow_signed, /* complain_on_overflow */
427 bfd_elf_generic_reloc, /* special_function */
428 "R_TILEPRO_IMM16_X1_TLS_GD",/* name */
429 FALSE, /* partial_inplace */
430 0, /* src_mask */
431 0xffff, /* dst_mask */
432 FALSE), /* pcrel_offset */
433
434 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_TLS_GD_LO, 0),
435 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_TLS_GD_LO, 0),
436 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_TLS_GD_HI, 16),
437 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_TLS_GD_HI, 16),
438 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_TLS_GD_HA, 16),
439 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_TLS_GD_HA, 16),
440
441 /* Offsets into the GOT of TLS Descriptors. */
442
443 HOWTO (R_TILEPRO_IMM16_X0_TLS_IE,/* type */
444 0, /* rightshift */
445 1, /* size (0 = byte, 1 = short, 2 = long) */
446 16, /* bitsize */
447 FALSE, /* pc_relative */
448 0, /* bitpos */
449 complain_overflow_signed, /* complain_on_overflow */
450 bfd_elf_generic_reloc, /* special_function */
451 "R_TILEPRO_IMM16_X0_TLS_IE",/* name */
452 FALSE, /* partial_inplace */
453 0, /* src_mask */
454 -1, /* dst_mask */
455 TRUE), /* pcrel_offset */
456
457 HOWTO (R_TILEPRO_IMM16_X1_TLS_IE,/* type */
458 0, /* rightshift */
459 1, /* size (0 = byte, 1 = short, 2 = long) */
460 16, /* bitsize */
461 FALSE, /* pc_relative */
462 0, /* bitpos */
463 complain_overflow_signed, /* complain_on_overflow */
464 bfd_elf_generic_reloc, /* special_function */
465 "R_TILEPRO_IMM16_X1_TLS_IE",/* name */
466 FALSE, /* partial_inplace */
467 0, /* src_mask */
468 -1, /* dst_mask */
469 TRUE), /* pcrel_offset */
470
471 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_TLS_IE_LO, 0),
472 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_TLS_IE_LO, 0),
473 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_TLS_IE_HI, 16),
474 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_TLS_IE_HI, 16),
475 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_TLS_IE_HA, 16),
476 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_TLS_IE_HA, 16),
477
478 /* These are common with the Solaris TLS implementation. */
479 HOWTO(R_TILEPRO_TLS_DTPMOD32, 0, 0, 0, FALSE, 0, complain_overflow_dont,
480 bfd_elf_generic_reloc, "R_TILEPRO_TLS_DTPMOD32",
481 FALSE, 0, 0, TRUE),
482 HOWTO(R_TILEPRO_TLS_DTPOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
483 bfd_elf_generic_reloc, "R_TILEPRO_TLS_DTPOFF32",
484 FALSE, 0, 0xFFFFFFFF, TRUE),
485 HOWTO(R_TILEPRO_TLS_TPOFF32, 0, 0, 0, FALSE, 0, complain_overflow_dont,
486 bfd_elf_generic_reloc, "R_TILEPRO_TLS_TPOFF32",
487 FALSE, 0, 0, TRUE),
488
489 HOWTO (R_TILEPRO_IMM16_X0_TLS_LE,/* type */
490 0, /* rightshift */
491 1, /* size (0 = byte, 1 = short, 2 = long) */
492 16, /* bitsize */
493 FALSE, /* pc_relative */
494 0, /* bitpos */
495 complain_overflow_signed, /* complain_on_overflow */
496 bfd_elf_generic_reloc, /* special_function */
497 "R_TILEPRO_IMM16_X0_TLS_LE",/* name */
498 FALSE, /* partial_inplace */
499 0, /* src_mask */
500 -1, /* dst_mask */
501 TRUE), /* pcrel_offset */
502
503 HOWTO (R_TILEPRO_IMM16_X1_TLS_LE,/* type */
504 0, /* rightshift */
505 1, /* size (0 = byte, 1 = short, 2 = long) */
506 16, /* bitsize */
507 FALSE, /* pc_relative */
508 0, /* bitpos */
509 complain_overflow_signed, /* complain_on_overflow */
510 bfd_elf_generic_reloc, /* special_function */
511 "R_TILEPRO_IMM16_X1_TLS_LE",/* name */
512 FALSE, /* partial_inplace */
513 0, /* src_mask */
514 -1, /* dst_mask */
515 TRUE), /* pcrel_offset */
516
517 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_TLS_LE_LO, 0),
518 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_TLS_LE_LO, 0),
519 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_TLS_LE_HI, 16),
520 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_TLS_LE_HI, 16),
521 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X0_TLS_LE_HA, 16),
522 TILEPRO_IMM16_HOWTO (R_TILEPRO_IMM16_X1_TLS_LE_HA, 16),
523 };
524
525 static reloc_howto_type tilepro_elf_howto_table2 [] =
526 {
527 /* GNU extension to record C++ vtable hierarchy */
528 HOWTO (R_TILEPRO_GNU_VTINHERIT, /* type */
529 0, /* rightshift */
530 2, /* size (0 = byte, 1 = short, 2 = long) */
531 0, /* bitsize */
532 FALSE, /* pc_relative */
533 0, /* bitpos */
534 complain_overflow_dont, /* complain_on_overflow */
535 NULL, /* special_function */
536 "R_TILEPRO_GNU_VTINHERIT", /* name */
537 FALSE, /* partial_inplace */
538 0, /* src_mask */
539 0, /* dst_mask */
540 FALSE), /* pcrel_offset */
541
542 /* GNU extension to record C++ vtable member usage */
543 HOWTO (R_TILEPRO_GNU_VTENTRY, /* type */
544 0, /* rightshift */
545 2, /* size (0 = byte, 1 = short, 2 = long) */
546 0, /* bitsize */
547 FALSE, /* pc_relative */
548 0, /* bitpos */
549 complain_overflow_dont, /* complain_on_overflow */
550 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
551 "R_TILEPRO_GNU_VTENTRY", /* name */
552 FALSE, /* partial_inplace */
553 0, /* src_mask */
554 0, /* dst_mask */
555 FALSE), /* pcrel_offset */
556
557 };
558 \f
559 /* Map BFD reloc types to TILEPRO ELF reloc types. */
560
561 typedef struct tilepro_reloc_map
562 {
563 bfd_reloc_code_real_type bfd_reloc_val;
564 unsigned int tilepro_reloc_val;
565 reloc_howto_type * table;
566 } reloc_map;
567
568 static const reloc_map tilepro_reloc_map [] =
569 {
570 #define TH_REMAP(bfd, tilepro) \
571 { bfd, tilepro, tilepro_elf_howto_table },
572
573 /* Standard relocations. */
574 TH_REMAP (BFD_RELOC_NONE, R_TILEPRO_NONE)
575 TH_REMAP (BFD_RELOC_32, R_TILEPRO_32)
576 TH_REMAP (BFD_RELOC_16, R_TILEPRO_16)
577 TH_REMAP (BFD_RELOC_8, R_TILEPRO_8)
578 TH_REMAP (BFD_RELOC_32_PCREL, R_TILEPRO_32_PCREL)
579 TH_REMAP (BFD_RELOC_16_PCREL, R_TILEPRO_16_PCREL)
580 TH_REMAP (BFD_RELOC_8_PCREL, R_TILEPRO_8_PCREL)
581 TH_REMAP (BFD_RELOC_LO16, R_TILEPRO_LO16)
582 TH_REMAP (BFD_RELOC_HI16, R_TILEPRO_HI16)
583 TH_REMAP (BFD_RELOC_HI16_S, R_TILEPRO_HA16)
584
585 /* Custom relocations. */
586 TH_REMAP (BFD_RELOC_TILEPRO_COPY, R_TILEPRO_COPY)
587 TH_REMAP (BFD_RELOC_TILEPRO_GLOB_DAT, R_TILEPRO_GLOB_DAT)
588 TH_REMAP (BFD_RELOC_TILEPRO_JMP_SLOT, R_TILEPRO_JMP_SLOT)
589 TH_REMAP (BFD_RELOC_TILEPRO_RELATIVE, R_TILEPRO_RELATIVE)
590 TH_REMAP (BFD_RELOC_TILEPRO_BROFF_X1, R_TILEPRO_BROFF_X1)
591 TH_REMAP (BFD_RELOC_TILEPRO_JOFFLONG_X1, R_TILEPRO_JOFFLONG_X1)
592 TH_REMAP (BFD_RELOC_TILEPRO_JOFFLONG_X1_PLT, R_TILEPRO_JOFFLONG_X1_PLT)
593 TH_REMAP (BFD_RELOC_TILEPRO_IMM8_X0, R_TILEPRO_IMM8_X0)
594 TH_REMAP (BFD_RELOC_TILEPRO_IMM8_Y0, R_TILEPRO_IMM8_Y0)
595 TH_REMAP (BFD_RELOC_TILEPRO_IMM8_X1, R_TILEPRO_IMM8_X1)
596 TH_REMAP (BFD_RELOC_TILEPRO_IMM8_Y1, R_TILEPRO_IMM8_Y1)
597 TH_REMAP (BFD_RELOC_TILEPRO_DEST_IMM8_X1, R_TILEPRO_DEST_IMM8_X1)
598 TH_REMAP (BFD_RELOC_TILEPRO_MT_IMM15_X1, R_TILEPRO_MT_IMM15_X1)
599 TH_REMAP (BFD_RELOC_TILEPRO_MF_IMM15_X1, R_TILEPRO_MF_IMM15_X1)
600 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0, R_TILEPRO_IMM16_X0)
601 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1, R_TILEPRO_IMM16_X1)
602 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_LO, R_TILEPRO_IMM16_X0_LO)
603 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_LO, R_TILEPRO_IMM16_X1_LO)
604 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_HI, R_TILEPRO_IMM16_X0_HI)
605 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_HI, R_TILEPRO_IMM16_X1_HI)
606 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_HA, R_TILEPRO_IMM16_X0_HA)
607 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_HA, R_TILEPRO_IMM16_X1_HA)
608
609 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_PCREL, R_TILEPRO_IMM16_X0_PCREL)
610 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_PCREL, R_TILEPRO_IMM16_X1_PCREL)
611 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_LO_PCREL, R_TILEPRO_IMM16_X0_LO_PCREL)
612 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_LO_PCREL, R_TILEPRO_IMM16_X1_LO_PCREL)
613 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_HI_PCREL, R_TILEPRO_IMM16_X0_HI_PCREL)
614 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_HI_PCREL, R_TILEPRO_IMM16_X1_HI_PCREL)
615 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_HA_PCREL, R_TILEPRO_IMM16_X0_HA_PCREL)
616 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_HA_PCREL, R_TILEPRO_IMM16_X1_HA_PCREL)
617
618 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_GOT, R_TILEPRO_IMM16_X0_GOT)
619 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_GOT, R_TILEPRO_IMM16_X1_GOT)
620 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_GOT_LO, R_TILEPRO_IMM16_X0_GOT_LO)
621 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_GOT_LO, R_TILEPRO_IMM16_X1_GOT_LO)
622 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_GOT_HI, R_TILEPRO_IMM16_X0_GOT_HI)
623 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_GOT_HI, R_TILEPRO_IMM16_X1_GOT_HI)
624 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_GOT_HA, R_TILEPRO_IMM16_X0_GOT_HA)
625 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_GOT_HA, R_TILEPRO_IMM16_X1_GOT_HA)
626
627 TH_REMAP (BFD_RELOC_TILEPRO_MMSTART_X0, R_TILEPRO_MMSTART_X0)
628 TH_REMAP (BFD_RELOC_TILEPRO_MMEND_X0, R_TILEPRO_MMEND_X0)
629 TH_REMAP (BFD_RELOC_TILEPRO_MMSTART_X1, R_TILEPRO_MMSTART_X1)
630 TH_REMAP (BFD_RELOC_TILEPRO_MMEND_X1, R_TILEPRO_MMEND_X1)
631 TH_REMAP (BFD_RELOC_TILEPRO_SHAMT_X0, R_TILEPRO_SHAMT_X0)
632 TH_REMAP (BFD_RELOC_TILEPRO_SHAMT_X1, R_TILEPRO_SHAMT_X1)
633 TH_REMAP (BFD_RELOC_TILEPRO_SHAMT_Y0, R_TILEPRO_SHAMT_Y0)
634 TH_REMAP (BFD_RELOC_TILEPRO_SHAMT_Y1, R_TILEPRO_SHAMT_Y1)
635
636 TH_REMAP (BFD_RELOC_TILEPRO_TLS_GD_CALL, R_TILEPRO_TLS_GD_CALL)
637 TH_REMAP (BFD_RELOC_TILEPRO_IMM8_X0_TLS_GD_ADD, R_TILEPRO_IMM8_X0_TLS_GD_ADD)
638 TH_REMAP (BFD_RELOC_TILEPRO_IMM8_X1_TLS_GD_ADD, R_TILEPRO_IMM8_X1_TLS_GD_ADD)
639 TH_REMAP (BFD_RELOC_TILEPRO_IMM8_Y0_TLS_GD_ADD, R_TILEPRO_IMM8_Y0_TLS_GD_ADD)
640 TH_REMAP (BFD_RELOC_TILEPRO_IMM8_Y1_TLS_GD_ADD, R_TILEPRO_IMM8_Y1_TLS_GD_ADD)
641 TH_REMAP (BFD_RELOC_TILEPRO_TLS_IE_LOAD, R_TILEPRO_TLS_IE_LOAD)
642
643 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_TLS_GD, R_TILEPRO_IMM16_X0_TLS_GD)
644 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_TLS_GD, R_TILEPRO_IMM16_X1_TLS_GD)
645 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_TLS_GD_LO, R_TILEPRO_IMM16_X0_TLS_GD_LO)
646 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_TLS_GD_LO, R_TILEPRO_IMM16_X1_TLS_GD_LO)
647 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_TLS_GD_HI, R_TILEPRO_IMM16_X0_TLS_GD_HI)
648 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_TLS_GD_HI, R_TILEPRO_IMM16_X1_TLS_GD_HI)
649 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_TLS_GD_HA, R_TILEPRO_IMM16_X0_TLS_GD_HA)
650 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_TLS_GD_HA, R_TILEPRO_IMM16_X1_TLS_GD_HA)
651
652 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_TLS_IE, R_TILEPRO_IMM16_X0_TLS_IE)
653 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_TLS_IE, R_TILEPRO_IMM16_X1_TLS_IE)
654 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_TLS_IE_LO, R_TILEPRO_IMM16_X0_TLS_IE_LO)
655 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_TLS_IE_LO, R_TILEPRO_IMM16_X1_TLS_IE_LO)
656 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_TLS_IE_HI, R_TILEPRO_IMM16_X0_TLS_IE_HI)
657 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_TLS_IE_HI, R_TILEPRO_IMM16_X1_TLS_IE_HI)
658 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_TLS_IE_HA, R_TILEPRO_IMM16_X0_TLS_IE_HA)
659 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_TLS_IE_HA, R_TILEPRO_IMM16_X1_TLS_IE_HA)
660
661 TH_REMAP (BFD_RELOC_TILEPRO_TLS_DTPMOD32, R_TILEPRO_TLS_DTPMOD32)
662 TH_REMAP (BFD_RELOC_TILEPRO_TLS_DTPOFF32, R_TILEPRO_TLS_DTPOFF32)
663 TH_REMAP (BFD_RELOC_TILEPRO_TLS_TPOFF32, R_TILEPRO_TLS_TPOFF32)
664
665 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_TLS_LE, R_TILEPRO_IMM16_X0_TLS_LE)
666 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_TLS_LE, R_TILEPRO_IMM16_X1_TLS_LE)
667 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_TLS_LE_LO, R_TILEPRO_IMM16_X0_TLS_LE_LO)
668 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_TLS_LE_LO, R_TILEPRO_IMM16_X1_TLS_LE_LO)
669 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_TLS_LE_HI, R_TILEPRO_IMM16_X0_TLS_LE_HI)
670 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_TLS_LE_HI, R_TILEPRO_IMM16_X1_TLS_LE_HI)
671 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X0_TLS_LE_HA, R_TILEPRO_IMM16_X0_TLS_LE_HA)
672 TH_REMAP (BFD_RELOC_TILEPRO_IMM16_X1_TLS_LE_HA, R_TILEPRO_IMM16_X1_TLS_LE_HA)
673
674 #undef TH_REMAP
675
676 { BFD_RELOC_VTABLE_INHERIT, R_TILEPRO_GNU_VTINHERIT, tilepro_elf_howto_table2 },
677 { BFD_RELOC_VTABLE_ENTRY, R_TILEPRO_GNU_VTENTRY, tilepro_elf_howto_table2 },
678 };
679
680
681
682 /* The TILEPro linker needs to keep track of the number of relocs that it
683 decides to copy as dynamic relocs in check_relocs for each symbol.
684 This is so that it can later discard them if they are found to be
685 unnecessary. We store the information in a field extending the
686 regular ELF linker hash table. */
687
688 struct tilepro_elf_dyn_relocs
689 {
690 struct tilepro_elf_dyn_relocs *next;
691
692 /* The input section of the reloc. */
693 asection *sec;
694
695 /* Total number of relocs copied for the input section. */
696 bfd_size_type count;
697
698 /* Number of pc-relative relocs copied for the input section. */
699 bfd_size_type pc_count;
700 };
701
702 /* TILEPRO ELF linker hash entry. */
703
704 struct tilepro_elf_link_hash_entry
705 {
706 struct elf_link_hash_entry elf;
707
708 /* Track dynamic relocs copied for this symbol. */
709 struct tilepro_elf_dyn_relocs *dyn_relocs;
710
711 #define GOT_UNKNOWN 0
712 #define GOT_NORMAL 1
713 #define GOT_TLS_GD 2
714 #define GOT_TLS_IE 4
715 unsigned char tls_type;
716 };
717
718 #define tilepro_elf_hash_entry(ent) \
719 ((struct tilepro_elf_link_hash_entry *)(ent))
720
721 struct _bfd_tilepro_elf_obj_tdata
722 {
723 struct elf_obj_tdata root;
724
725 /* tls_type for each local got entry. */
726 char *local_got_tls_type;
727 };
728
729 #define _bfd_tilepro_elf_tdata(abfd) \
730 ((struct _bfd_tilepro_elf_obj_tdata *) (abfd)->tdata.any)
731
732 #define _bfd_tilepro_elf_local_got_tls_type(abfd) \
733 (_bfd_tilepro_elf_tdata (abfd)->local_got_tls_type)
734
735 #define is_tilepro_elf(bfd) \
736 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
737 && elf_tdata (bfd) != NULL \
738 && elf_object_id (bfd) == TILEPRO_ELF_DATA)
739
740 /* Allocate TILEPro ELF private object data. */
741
742 static bfd_boolean
743 tilepro_elf_mkobject (bfd *abfd)
744 {
745 return bfd_elf_allocate_object (abfd,
746 sizeof (struct _bfd_tilepro_elf_obj_tdata),
747 TILEPRO_ELF_DATA);
748 }
749
750 #include "elf/common.h"
751 #include "elf/internal.h"
752
753 struct tilepro_elf_link_hash_table
754 {
755 struct elf_link_hash_table elf;
756
757 /* Short-cuts to get to dynamic linker sections. */
758 asection *sdynbss;
759 asection *srelbss;
760
761 /* Small local sym to section mapping cache. */
762 struct sym_cache sym_cache;
763 };
764
765 /* Get the Tilepro ELF linker hash table from a link_info structure. */
766 #define tilepro_elf_hash_table(p) \
767 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
768 == TILEPRO_ELF_DATA \
769 ? ((struct tilepro_elf_link_hash_table *) ((p)->hash)) : NULL)
770
771 static reloc_howto_type *
772 tilepro_reloc_type_lookup (bfd * abfd ATTRIBUTE_UNUSED,
773 bfd_reloc_code_real_type code)
774 {
775 unsigned int i;
776
777 for (i = ARRAY_SIZE (tilepro_reloc_map); i--;)
778 {
779 const reloc_map * entry;
780
781 entry = tilepro_reloc_map + i;
782
783 if (entry->bfd_reloc_val == code)
784 return entry->table + (entry->tilepro_reloc_val
785 - entry->table[0].type);
786 }
787
788 return NULL;
789 }
790
791 static reloc_howto_type *
792 tilepro_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
793 const char *r_name)
794 {
795 unsigned int i;
796
797 for (i = 0;
798 i < (sizeof (tilepro_elf_howto_table)
799 / sizeof (tilepro_elf_howto_table[0]));
800 i++)
801 if (tilepro_elf_howto_table[i].name != NULL
802 && strcasecmp (tilepro_elf_howto_table[i].name, r_name) == 0)
803 return &tilepro_elf_howto_table[i];
804
805 return NULL;
806 }
807
808 /* Set the howto pointer for an TILEPro ELF reloc. */
809
810 static void
811 tilepro_info_to_howto_rela (bfd * abfd ATTRIBUTE_UNUSED,
812 arelent * cache_ptr,
813 Elf_Internal_Rela * dst)
814 {
815 unsigned int r_type = ELF32_R_TYPE (dst->r_info);
816
817 if (r_type <= (unsigned int) R_TILEPRO_IMM16_X1_TLS_LE_HA)
818 cache_ptr->howto = &tilepro_elf_howto_table [r_type];
819 else if (r_type - R_TILEPRO_GNU_VTINHERIT
820 <= (unsigned int) R_TILEPRO_GNU_VTENTRY)
821 cache_ptr->howto
822 = &tilepro_elf_howto_table2 [r_type - R_TILEPRO_GNU_VTINHERIT];
823 else
824 abort ();
825 }
826
827 typedef tilepro_bundle_bits (*tilepro_create_func)(int);
828
829 static const tilepro_create_func reloc_to_create_func[] =
830 {
831 /* The first fourteen relocation types don't correspond to operands */
832 NULL,
833 NULL,
834 NULL,
835 NULL,
836 NULL,
837 NULL,
838 NULL,
839 NULL,
840 NULL,
841 NULL,
842 NULL,
843 NULL,
844 NULL,
845 NULL,
846
847 /* The remaining relocations are used for immediate operands */
848 create_BrOff_X1,
849 create_JOffLong_X1,
850 create_JOffLong_X1,
851 create_Imm8_X0,
852 create_Imm8_Y0,
853 create_Imm8_X1,
854 create_Imm8_Y1,
855 create_MT_Imm15_X1,
856 create_MF_Imm15_X1,
857 create_Imm16_X0,
858 create_Imm16_X1,
859 create_Imm16_X0,
860 create_Imm16_X1,
861 create_Imm16_X0,
862 create_Imm16_X1,
863 create_Imm16_X0,
864 create_Imm16_X1,
865 create_Imm16_X0,
866 create_Imm16_X1,
867 create_Imm16_X0,
868 create_Imm16_X1,
869 create_Imm16_X0,
870 create_Imm16_X1,
871 create_Imm16_X0,
872 create_Imm16_X1,
873 create_Imm16_X0,
874 create_Imm16_X1,
875 create_Imm16_X0,
876 create_Imm16_X1,
877 create_Imm16_X0,
878 create_Imm16_X1,
879 create_Imm16_X0,
880 create_Imm16_X1,
881 create_MMStart_X0,
882 create_MMEnd_X0,
883 create_MMStart_X1,
884 create_MMEnd_X1,
885 create_ShAmt_X0,
886 create_ShAmt_X1,
887 create_ShAmt_Y0,
888 create_ShAmt_Y1,
889
890 create_Dest_Imm8_X1,
891 NULL,
892 NULL,
893 NULL,
894 NULL,
895 NULL,
896 NULL,
897 NULL,
898 NULL,
899 NULL,
900 NULL,
901
902 create_Imm16_X0,
903 create_Imm16_X1,
904 create_Imm16_X0,
905 create_Imm16_X1,
906 create_Imm16_X0,
907 create_Imm16_X1,
908 create_Imm16_X0,
909 create_Imm16_X1,
910 create_Imm16_X0,
911 create_Imm16_X1,
912 create_Imm16_X0,
913 create_Imm16_X1,
914 create_Imm16_X0,
915 create_Imm16_X1,
916 create_Imm16_X0,
917 create_Imm16_X1,
918
919 NULL,
920 NULL,
921 NULL,
922
923 create_Imm16_X0,
924 create_Imm16_X1,
925 create_Imm16_X0,
926 create_Imm16_X1,
927 create_Imm16_X0,
928 create_Imm16_X1,
929 create_Imm16_X0,
930 create_Imm16_X1,
931 };
932
933 #define NELEMS(a) ((int) (sizeof (a) / sizeof ((a)[0])))
934
935 /* Support for core dump NOTE sections. */
936
937 static bfd_boolean
938 tilepro_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
939 {
940 int offset;
941 size_t size;
942
943 if (note->descsz != TILEPRO_PRSTATUS_SIZEOF)
944 return FALSE;
945
946 /* pr_cursig */
947 elf_tdata (abfd)->core->signal =
948 bfd_get_16 (abfd, note->descdata + TILEPRO_PRSTATUS_OFFSET_PR_CURSIG);
949
950 /* pr_pid */
951 elf_tdata (abfd)->core->pid =
952 bfd_get_32 (abfd, note->descdata + TILEPRO_PRSTATUS_OFFSET_PR_PID);
953
954 /* pr_reg */
955 offset = TILEPRO_PRSTATUS_OFFSET_PR_REG;
956 size = TILEPRO_GREGSET_T_SIZE;
957
958 /* Make a ".reg/999" section. */
959 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
960 size, note->descpos + offset);
961 }
962
963 static bfd_boolean
964 tilepro_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
965 {
966 if (note->descsz != TILEPRO_PRPSINFO_SIZEOF)
967 return FALSE;
968
969 elf_tdata (abfd)->core->program
970 = _bfd_elfcore_strndup (abfd,
971 note->descdata + TILEPRO_PRPSINFO_OFFSET_PR_FNAME,
972 16);
973 elf_tdata (abfd)->core->command
974 = _bfd_elfcore_strndup (abfd,
975 note->descdata + TILEPRO_PRPSINFO_OFFSET_PR_PSARGS,
976 ELF_PR_PSARGS_SIZE);
977
978
979 /* Note that for some reason, a spurious space is tacked
980 onto the end of the args in some (at least one anyway)
981 implementations, so strip it off if it exists. */
982 {
983 char *command = elf_tdata (abfd)->core->command;
984 int n = strlen (command);
985
986 if (0 < n && command[n - 1] == ' ')
987 command[n - 1] = '\0';
988 }
989
990 return TRUE;
991 }
992
993
994 static void
995 tilepro_elf_append_rela_32 (bfd *abfd, asection *s, Elf_Internal_Rela *rel)
996 {
997 Elf32_External_Rela *loc32;
998
999 loc32 = (Elf32_External_Rela *) s->contents;
1000 loc32 += s->reloc_count++;
1001 bfd_elf32_swap_reloca_out (abfd, rel, (bfd_byte *) loc32);
1002 }
1003
1004 /* PLT/GOT stuff */
1005
1006 /* The procedure linkage table starts with the following header:
1007
1008 {
1009 rli r29, r29, 16
1010 lwadd r28, r27, 4
1011 }
1012 lw r27, r27
1013 {
1014 info 10 ## SP not offset, return PC in LR
1015 jr r27
1016 }
1017
1018 Subsequent entries are the following, jumping to the header at the end:
1019
1020 lnk r28
1021 1:
1022 {
1023 auli r28, r28, <_GLOBAL_OFFSET_TABLE_ - 1b + MY_GOT_OFFSET>
1024 auli r27, r28, <_GLOBAL_OFFSET_TABLE_ - 1b>
1025 }
1026 {
1027 addli r28, r28, <_GLOBAL_OFFSET_TABLE_ - 1b + MY_GOT_OFFSET>
1028 addli r27, r27, <_GLOBAL_OFFSET_TABLE_ - 1b>
1029 }
1030 {
1031 auli r29, zero, MY_PLT_INDEX
1032 lw r28, r28
1033 }
1034 {
1035 info 10 ## SP not offset, return PC in LR
1036 jr r28
1037 }
1038
1039 We initially store MY_PLT_INDEX in the high bits so that we can use the all
1040 16 bits as an unsigned offset; if we use the low bits we would get an
1041 unwanted sign extension. The PLT header then rotates the index to get the
1042 right value, before calling the resolution routine. This computation can
1043 fit in unused bundle slots so it's free.
1044
1045 This code sequence lets the code at at the start of the PLT determine
1046 which PLT entry was executed by examining 'r29'.
1047
1048 Note that MY_PLT_INDEX skips over the header entries, so the first
1049 actual jump table entry has index zero.
1050 */
1051
1052 #define PLT_HEADER_SIZE_IN_BUNDLES 3
1053 #define PLT_ENTRY_SIZE_IN_BUNDLES 5
1054
1055 #define PLT_HEADER_SIZE \
1056 (PLT_HEADER_SIZE_IN_BUNDLES * TILEPRO_BUNDLE_SIZE_IN_BYTES)
1057 #define PLT_ENTRY_SIZE \
1058 (PLT_ENTRY_SIZE_IN_BUNDLES * TILEPRO_BUNDLE_SIZE_IN_BYTES)
1059
1060 /* The size in bytes of an entry in the global offset table. */
1061
1062 #define GOT_ENTRY_SIZE TILEPRO_BYTES_PER_WORD
1063
1064 #define GOTPLT_HEADER_SIZE (2 * GOT_ENTRY_SIZE)
1065
1066
1067 static const bfd_byte
1068 tilepro_plt0_entry[PLT_HEADER_SIZE] =
1069 {
1070 0x5d, 0x07, 0x03, 0x70,
1071 0x6e, 0x23, 0xd0, 0x30, /* { rli r29, r29, 16 ; lwadd r28, r27, 4 } */
1072 0x00, 0x50, 0xba, 0x6d,
1073 0x00, 0x08, 0x6d, 0xdc, /* { lw r27, r27 } */
1074 0xff, 0xaf, 0x10, 0x50,
1075 0x60, 0x03, 0x18, 0x08, /* { info 10 ; jr r27 } */
1076 };
1077
1078 static const bfd_byte
1079 tilepro_short_plt_entry[PLT_ENTRY_SIZE] =
1080 {
1081 0x00, 0x50, 0x16, 0x70,
1082 0x0e, 0x00, 0x1a, 0x08, /* { lnk r28 } */
1083 0x1c, 0x07, 0x00, 0xa0,
1084 0x8d, 0x03, 0x00, 0x18, /* { addli r28, r28, 0 ; addli r27, r28, 0 } */
1085 0xdd, 0x0f, 0x00, 0x30,
1086 0x8e, 0x73, 0x0b, 0x40, /* { auli r29, zero, 0 ; lw r28, r28 } */
1087 0xff, 0xaf, 0x10, 0x50,
1088 0x80, 0x03, 0x18, 0x08, /* { info 10 ; jr r28 } */
1089 0x00, 0x00, 0x00, 0x00,
1090 0x00, 0x00, 0x00, 0x00,
1091 };
1092
1093 static const bfd_byte
1094 tilepro_long_plt_entry[PLT_ENTRY_SIZE] =
1095 {
1096 0x00, 0x50, 0x16, 0x70,
1097 0x0e, 0x00, 0x1a, 0x08, /* { lnk r28 } */
1098 0x1c, 0x07, 0x00, 0xb0,
1099 0x8d, 0x03, 0x00, 0x20, /* { auli r28, r28, 0 ; auli r27, r28, 0 } */
1100 0x1c, 0x07, 0x00, 0xa0,
1101 0x6d, 0x03, 0x00, 0x18, /* { addli r28, r28, 0 ; addli r27, r27, 0 } */
1102 0xdd, 0x0f, 0x00, 0x30,
1103 0x8e, 0x73, 0x0b, 0x40, /* { auli r29, zero, 0 ; lw r28, r28 } */
1104 0xff, 0xaf, 0x10, 0x50,
1105 0x80, 0x03, 0x18, 0x08, /* { info 10 ; jr r28 } */
1106 };
1107
1108 static bfd_vma
1109 tilepro_ha16(bfd_vma vma)
1110 {
1111 return ((vma >> 16) + ((vma >> 15) & 1)) & 0xffff;
1112 }
1113
1114 static int
1115 tilepro_plt_entry_build (asection *splt, asection *sgotplt, bfd_vma offset,
1116 bfd_vma *r_offset)
1117 {
1118 int plt_index = (offset - PLT_ENTRY_SIZE) / PLT_ENTRY_SIZE;
1119 int got_offset = plt_index * GOT_ENTRY_SIZE + GOTPLT_HEADER_SIZE;
1120 tilepro_bundle_bits *pc;
1121
1122 /* Compute the distance from the got entry to the lnk. */
1123 bfd_signed_vma dist_got_entry = sgotplt->output_section->vma
1124 + sgotplt->output_offset
1125 + got_offset
1126 - splt->output_section->vma
1127 - splt->output_offset
1128 - offset
1129 - TILEPRO_BUNDLE_SIZE_IN_BYTES;
1130
1131 /* Compute the distance to GOTPLT[0]. */
1132 bfd_signed_vma dist_got0 = dist_got_entry - got_offset;
1133
1134 /* Check whether we can use the short plt entry with 16-bit offset. */
1135 bfd_boolean short_plt_entry =
1136 (dist_got_entry <= 0x7fff && dist_got0 >= -0x8000);
1137
1138 /* Copy the plt entry template. */
1139 memcpy (splt->contents + offset,
1140 short_plt_entry ? tilepro_short_plt_entry : tilepro_long_plt_entry,
1141 PLT_ENTRY_SIZE);
1142
1143 /* Write the immediate offsets. */
1144 pc = (tilepro_bundle_bits *)(splt->contents + offset);
1145 pc++;
1146
1147 if (!short_plt_entry)
1148 {
1149 /* { auli r28, r28, &GOTPLT[MY_GOT_INDEX] ; auli r27, r28, &GOTPLT[0] } */
1150 *pc++ |= create_Imm16_X0 (tilepro_ha16 (dist_got_entry))
1151 | create_Imm16_X1 (tilepro_ha16 (dist_got0));
1152 }
1153
1154 /* { addli r28, r28, &GOTPLT[MY_GOT_INDEX] ; addli r27, r28, &GOTPLT[0] } or
1155 { addli r28, r28, &GOTPLT[MY_GOT_INDEX] ; addli r27, r27, &GOTPLT[0] } */
1156 *pc++ |= create_Imm16_X0 (dist_got_entry)
1157 | create_Imm16_X1 (dist_got0);
1158
1159 /* { auli r29, zero, MY_PLT_INDEX ; lw r28, r28 } */
1160 *pc |= create_Imm16_X0 (plt_index);
1161
1162 /* Set the relocation offset. */
1163 *r_offset = got_offset;
1164
1165 return plt_index;
1166 }
1167
1168 #define TILEPRO_ELF_RELA_BYTES (sizeof(Elf32_External_Rela))
1169
1170
1171 /* Create an entry in an TILEPro ELF linker hash table. */
1172
1173 static struct bfd_hash_entry *
1174 link_hash_newfunc (struct bfd_hash_entry *entry,
1175 struct bfd_hash_table *table, const char *string)
1176 {
1177 /* Allocate the structure if it has not already been allocated by a
1178 subclass. */
1179 if (entry == NULL)
1180 {
1181 entry =
1182 bfd_hash_allocate (table,
1183 sizeof (struct tilepro_elf_link_hash_entry));
1184 if (entry == NULL)
1185 return entry;
1186 }
1187
1188 /* Call the allocation method of the superclass. */
1189 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
1190 if (entry != NULL)
1191 {
1192 struct tilepro_elf_link_hash_entry *eh;
1193
1194 eh = (struct tilepro_elf_link_hash_entry *) entry;
1195 eh->dyn_relocs = NULL;
1196 eh->tls_type = GOT_UNKNOWN;
1197 }
1198
1199 return entry;
1200 }
1201
1202 /* Create a TILEPRO ELF linker hash table. */
1203
1204 static struct bfd_link_hash_table *
1205 tilepro_elf_link_hash_table_create (bfd *abfd)
1206 {
1207 struct tilepro_elf_link_hash_table *ret;
1208 bfd_size_type amt = sizeof (struct tilepro_elf_link_hash_table);
1209
1210 ret = (struct tilepro_elf_link_hash_table *) bfd_zmalloc (amt);
1211 if (ret == NULL)
1212 return NULL;
1213
1214 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, link_hash_newfunc,
1215 sizeof (struct tilepro_elf_link_hash_entry),
1216 TILEPRO_ELF_DATA))
1217 {
1218 free (ret);
1219 return NULL;
1220 }
1221
1222 return &ret->elf.root;
1223 }
1224
1225 /* Create the .got section. */
1226
1227 static bfd_boolean
1228 tilepro_elf_create_got_section (bfd *abfd, struct bfd_link_info *info)
1229 {
1230 flagword flags;
1231 asection *s, *s_got;
1232 struct elf_link_hash_entry *h;
1233 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
1234 struct elf_link_hash_table *htab = elf_hash_table (info);
1235
1236 /* This function may be called more than once. */
1237 s = bfd_get_linker_section (abfd, ".got");
1238 if (s != NULL)
1239 return TRUE;
1240
1241 flags = bed->dynamic_sec_flags;
1242
1243 s = bfd_make_section_with_flags (abfd,
1244 (bed->rela_plts_and_copies_p
1245 ? ".rela.got" : ".rel.got"),
1246 (bed->dynamic_sec_flags
1247 | SEC_READONLY));
1248 if (s == NULL
1249 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
1250 return FALSE;
1251 htab->srelgot = s;
1252
1253 s = s_got = bfd_make_section_with_flags (abfd, ".got", flags);
1254 if (s == NULL
1255 || !bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
1256 return FALSE;
1257 htab->sgot = s;
1258
1259 /* The first bit of the global offset table is the header. */
1260 s->size += bed->got_header_size;
1261
1262 if (bed->want_got_plt)
1263 {
1264 s = bfd_make_section_with_flags (abfd, ".got.plt", flags);
1265 if (s == NULL
1266 || !bfd_set_section_alignment (abfd, s,
1267 bed->s->log_file_align))
1268 return FALSE;
1269 htab->sgotplt = s;
1270
1271 /* Reserve room for the header. */
1272 s->size += GOTPLT_HEADER_SIZE;
1273 }
1274
1275 if (bed->want_got_sym)
1276 {
1277 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the .got
1278 section. We don't do this in the linker script because we don't want
1279 to define the symbol if we are not creating a global offset
1280 table. */
1281 h = _bfd_elf_define_linkage_sym (abfd, info, s_got,
1282 "_GLOBAL_OFFSET_TABLE_");
1283 elf_hash_table (info)->hgot = h;
1284 if (h == NULL)
1285 return FALSE;
1286 }
1287
1288 return TRUE;
1289 }
1290
1291 /* Create .plt, .rela.plt, .got, .got.plt, .rela.got, .dynbss, and
1292 .rela.bss sections in DYNOBJ, and set up shortcuts to them in our
1293 hash table. */
1294
1295 static bfd_boolean
1296 tilepro_elf_create_dynamic_sections (bfd *dynobj,
1297 struct bfd_link_info *info)
1298 {
1299 struct tilepro_elf_link_hash_table *htab;
1300
1301 htab = tilepro_elf_hash_table (info);
1302 BFD_ASSERT (htab != NULL);
1303
1304 if (!tilepro_elf_create_got_section (dynobj, info))
1305 return FALSE;
1306
1307 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
1308 return FALSE;
1309
1310 htab->sdynbss = bfd_get_linker_section (dynobj, ".dynbss");
1311 if (!bfd_link_pic (info))
1312 htab->srelbss = bfd_get_linker_section (dynobj, ".rela.bss");
1313
1314 if (!htab->elf.splt || !htab->elf.srelplt || !htab->sdynbss
1315 || (!bfd_link_pic (info) && !htab->srelbss))
1316 abort ();
1317
1318 return TRUE;
1319 }
1320
1321 /* Copy the extra info we tack onto an elf_link_hash_entry. */
1322
1323 static void
1324 tilepro_elf_copy_indirect_symbol (struct bfd_link_info *info,
1325 struct elf_link_hash_entry *dir,
1326 struct elf_link_hash_entry *ind)
1327 {
1328 struct tilepro_elf_link_hash_entry *edir, *eind;
1329
1330 edir = (struct tilepro_elf_link_hash_entry *) dir;
1331 eind = (struct tilepro_elf_link_hash_entry *) ind;
1332
1333 if (eind->dyn_relocs != NULL)
1334 {
1335 if (edir->dyn_relocs != NULL)
1336 {
1337 struct tilepro_elf_dyn_relocs **pp;
1338 struct tilepro_elf_dyn_relocs *p;
1339
1340 /* Add reloc counts against the indirect sym to the direct sym
1341 list. Merge any entries against the same section. */
1342 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
1343 {
1344 struct tilepro_elf_dyn_relocs *q;
1345
1346 for (q = edir->dyn_relocs; q != NULL; q = q->next)
1347 if (q->sec == p->sec)
1348 {
1349 q->pc_count += p->pc_count;
1350 q->count += p->count;
1351 *pp = p->next;
1352 break;
1353 }
1354 if (q == NULL)
1355 pp = &p->next;
1356 }
1357 *pp = edir->dyn_relocs;
1358 }
1359
1360 edir->dyn_relocs = eind->dyn_relocs;
1361 eind->dyn_relocs = NULL;
1362 }
1363
1364 if (ind->root.type == bfd_link_hash_indirect
1365 && dir->got.refcount <= 0)
1366 {
1367 edir->tls_type = eind->tls_type;
1368 eind->tls_type = GOT_UNKNOWN;
1369 }
1370 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
1371 }
1372
1373 static int
1374 tilepro_tls_translate_to_le (int r_type)
1375 {
1376 switch (r_type)
1377 {
1378 case R_TILEPRO_IMM16_X0_TLS_GD:
1379 case R_TILEPRO_IMM16_X0_TLS_IE:
1380 return R_TILEPRO_IMM16_X0_TLS_LE;
1381
1382 case R_TILEPRO_IMM16_X1_TLS_GD:
1383 case R_TILEPRO_IMM16_X1_TLS_IE:
1384 return R_TILEPRO_IMM16_X1_TLS_LE;
1385
1386 case R_TILEPRO_IMM16_X0_TLS_GD_LO:
1387 case R_TILEPRO_IMM16_X0_TLS_IE_LO:
1388 return R_TILEPRO_IMM16_X0_TLS_LE_LO;
1389
1390 case R_TILEPRO_IMM16_X1_TLS_GD_LO:
1391 case R_TILEPRO_IMM16_X1_TLS_IE_LO:
1392 return R_TILEPRO_IMM16_X1_TLS_LE_LO;
1393
1394 case R_TILEPRO_IMM16_X0_TLS_GD_HI:
1395 case R_TILEPRO_IMM16_X0_TLS_IE_HI:
1396 return R_TILEPRO_IMM16_X0_TLS_LE_HI;
1397
1398 case R_TILEPRO_IMM16_X1_TLS_GD_HI:
1399 case R_TILEPRO_IMM16_X1_TLS_IE_HI:
1400 return R_TILEPRO_IMM16_X1_TLS_LE_HI;
1401
1402 case R_TILEPRO_IMM16_X0_TLS_GD_HA:
1403 case R_TILEPRO_IMM16_X0_TLS_IE_HA:
1404 return R_TILEPRO_IMM16_X0_TLS_LE_HA;
1405
1406 case R_TILEPRO_IMM16_X1_TLS_GD_HA:
1407 case R_TILEPRO_IMM16_X1_TLS_IE_HA:
1408 return R_TILEPRO_IMM16_X1_TLS_LE_HA;
1409 }
1410 return r_type;
1411 }
1412
1413 static int
1414 tilepro_tls_translate_to_ie (int r_type)
1415 {
1416 switch (r_type)
1417 {
1418 case R_TILEPRO_IMM16_X0_TLS_GD:
1419 case R_TILEPRO_IMM16_X0_TLS_IE:
1420 return R_TILEPRO_IMM16_X0_TLS_IE;
1421
1422 case R_TILEPRO_IMM16_X1_TLS_GD:
1423 case R_TILEPRO_IMM16_X1_TLS_IE:
1424 return R_TILEPRO_IMM16_X1_TLS_IE;
1425
1426 case R_TILEPRO_IMM16_X0_TLS_GD_LO:
1427 case R_TILEPRO_IMM16_X0_TLS_IE_LO:
1428 return R_TILEPRO_IMM16_X0_TLS_IE_LO;
1429
1430 case R_TILEPRO_IMM16_X1_TLS_GD_LO:
1431 case R_TILEPRO_IMM16_X1_TLS_IE_LO:
1432 return R_TILEPRO_IMM16_X1_TLS_IE_LO;
1433
1434 case R_TILEPRO_IMM16_X0_TLS_GD_HI:
1435 case R_TILEPRO_IMM16_X0_TLS_IE_HI:
1436 return R_TILEPRO_IMM16_X0_TLS_IE_HI;
1437
1438 case R_TILEPRO_IMM16_X1_TLS_GD_HI:
1439 case R_TILEPRO_IMM16_X1_TLS_IE_HI:
1440 return R_TILEPRO_IMM16_X1_TLS_IE_HI;
1441
1442 case R_TILEPRO_IMM16_X0_TLS_GD_HA:
1443 case R_TILEPRO_IMM16_X0_TLS_IE_HA:
1444 return R_TILEPRO_IMM16_X0_TLS_IE_HA;
1445
1446 case R_TILEPRO_IMM16_X1_TLS_GD_HA:
1447 case R_TILEPRO_IMM16_X1_TLS_IE_HA:
1448 return R_TILEPRO_IMM16_X1_TLS_IE_HA;
1449 }
1450 return r_type;
1451 }
1452
1453 static int
1454 tilepro_elf_tls_transition (struct bfd_link_info *info, int r_type,
1455 int is_local)
1456 {
1457 if (bfd_link_pic (info))
1458 return r_type;
1459
1460 if (is_local)
1461 return tilepro_tls_translate_to_le (r_type);
1462 else
1463 return tilepro_tls_translate_to_ie (r_type);
1464 }
1465
1466 /* Look through the relocs for a section during the first phase, and
1467 allocate space in the global offset table or procedure linkage
1468 table. */
1469
1470 static bfd_boolean
1471 tilepro_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
1472 asection *sec, const Elf_Internal_Rela *relocs)
1473 {
1474 struct tilepro_elf_link_hash_table *htab;
1475 Elf_Internal_Shdr *symtab_hdr;
1476 struct elf_link_hash_entry **sym_hashes;
1477 const Elf_Internal_Rela *rel;
1478 const Elf_Internal_Rela *rel_end;
1479 asection *sreloc;
1480 int num_relocs;
1481
1482 if (bfd_link_relocatable (info))
1483 return TRUE;
1484
1485 htab = tilepro_elf_hash_table (info);
1486 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1487 sym_hashes = elf_sym_hashes (abfd);
1488
1489 sreloc = NULL;
1490
1491 num_relocs = sec->reloc_count;
1492
1493 BFD_ASSERT (is_tilepro_elf (abfd) || num_relocs == 0);
1494
1495 if (htab->elf.dynobj == NULL)
1496 htab->elf.dynobj = abfd;
1497
1498 rel_end = relocs + num_relocs;
1499 for (rel = relocs; rel < rel_end; rel++)
1500 {
1501 unsigned int r_type;
1502 unsigned long r_symndx;
1503 struct elf_link_hash_entry *h;
1504 int tls_type;
1505
1506 r_symndx = ELF32_R_SYM (rel->r_info);
1507 r_type = ELF32_R_TYPE (rel->r_info);
1508
1509 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
1510 {
1511 /* xgettext:c-format */
1512 _bfd_error_handler (_("%B: bad symbol index: %d"),
1513 abfd, r_symndx);
1514 return FALSE;
1515 }
1516
1517 if (r_symndx < symtab_hdr->sh_info)
1518 h = NULL;
1519 else
1520 {
1521 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1522 while (h->root.type == bfd_link_hash_indirect
1523 || h->root.type == bfd_link_hash_warning)
1524 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1525
1526 /* PR15323, ref flags aren't set for references in the same
1527 object. */
1528 h->root.non_ir_ref = 1;
1529 }
1530
1531 r_type = tilepro_elf_tls_transition (info, r_type, h == NULL);
1532 switch (r_type)
1533 {
1534 case R_TILEPRO_IMM16_X0_TLS_LE:
1535 case R_TILEPRO_IMM16_X1_TLS_LE:
1536 case R_TILEPRO_IMM16_X0_TLS_LE_LO:
1537 case R_TILEPRO_IMM16_X1_TLS_LE_LO:
1538 case R_TILEPRO_IMM16_X0_TLS_LE_HI:
1539 case R_TILEPRO_IMM16_X1_TLS_LE_HI:
1540 case R_TILEPRO_IMM16_X0_TLS_LE_HA:
1541 case R_TILEPRO_IMM16_X1_TLS_LE_HA:
1542 if (bfd_link_pic (info))
1543 goto r_tilepro_plt32;
1544 break;
1545
1546 case R_TILEPRO_IMM16_X0_TLS_GD:
1547 case R_TILEPRO_IMM16_X1_TLS_GD:
1548 case R_TILEPRO_IMM16_X0_TLS_GD_LO:
1549 case R_TILEPRO_IMM16_X1_TLS_GD_LO:
1550 case R_TILEPRO_IMM16_X0_TLS_GD_HI:
1551 case R_TILEPRO_IMM16_X1_TLS_GD_HI:
1552 case R_TILEPRO_IMM16_X0_TLS_GD_HA:
1553 case R_TILEPRO_IMM16_X1_TLS_GD_HA:
1554 BFD_ASSERT (bfd_link_pic (info));
1555 tls_type = GOT_TLS_GD;
1556 goto have_got_reference;
1557
1558 case R_TILEPRO_IMM16_X0_TLS_IE:
1559 case R_TILEPRO_IMM16_X1_TLS_IE:
1560 case R_TILEPRO_IMM16_X0_TLS_IE_LO:
1561 case R_TILEPRO_IMM16_X1_TLS_IE_LO:
1562 case R_TILEPRO_IMM16_X0_TLS_IE_HI:
1563 case R_TILEPRO_IMM16_X1_TLS_IE_HI:
1564 case R_TILEPRO_IMM16_X0_TLS_IE_HA:
1565 case R_TILEPRO_IMM16_X1_TLS_IE_HA:
1566 tls_type = GOT_TLS_IE;
1567 if (bfd_link_pic (info))
1568 info->flags |= DF_STATIC_TLS;
1569 goto have_got_reference;
1570
1571 case R_TILEPRO_IMM16_X0_GOT:
1572 case R_TILEPRO_IMM16_X1_GOT:
1573 case R_TILEPRO_IMM16_X0_GOT_LO:
1574 case R_TILEPRO_IMM16_X1_GOT_LO:
1575 case R_TILEPRO_IMM16_X0_GOT_HI:
1576 case R_TILEPRO_IMM16_X1_GOT_HI:
1577 case R_TILEPRO_IMM16_X0_GOT_HA:
1578 case R_TILEPRO_IMM16_X1_GOT_HA:
1579 tls_type = GOT_NORMAL;
1580 /* Fall Through */
1581
1582 have_got_reference:
1583 /* This symbol requires a global offset table entry. */
1584 {
1585 int old_tls_type;
1586
1587 if (h != NULL)
1588 {
1589 h->got.refcount += 1;
1590 old_tls_type = tilepro_elf_hash_entry(h)->tls_type;
1591 }
1592 else
1593 {
1594 bfd_signed_vma *local_got_refcounts;
1595
1596 /* This is a global offset table entry for a local symbol. */
1597 local_got_refcounts = elf_local_got_refcounts (abfd);
1598 if (local_got_refcounts == NULL)
1599 {
1600 bfd_size_type size;
1601
1602 size = symtab_hdr->sh_info;
1603 size *= (sizeof (bfd_signed_vma) + sizeof(char));
1604 local_got_refcounts = ((bfd_signed_vma *)
1605 bfd_zalloc (abfd, size));
1606 if (local_got_refcounts == NULL)
1607 return FALSE;
1608 elf_local_got_refcounts (abfd) = local_got_refcounts;
1609 _bfd_tilepro_elf_local_got_tls_type (abfd)
1610 = (char *) (local_got_refcounts + symtab_hdr->sh_info);
1611 }
1612 local_got_refcounts[r_symndx] += 1;
1613 old_tls_type =
1614 _bfd_tilepro_elf_local_got_tls_type (abfd) [r_symndx];
1615 }
1616
1617 /* If a TLS symbol is accessed using IE at least once,
1618 there is no point to use dynamic model for it. */
1619 if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN
1620 && (old_tls_type != GOT_TLS_GD
1621 || tls_type != GOT_TLS_IE))
1622 {
1623 if (old_tls_type == GOT_TLS_IE && tls_type == GOT_TLS_GD)
1624 tls_type = old_tls_type;
1625 else
1626 {
1627 _bfd_error_handler
1628 /* xgettext:c-format */
1629 (_("%B: `%s' accessed both as normal and thread local symbol"),
1630 abfd, h ? h->root.root.string : "<local>");
1631 return FALSE;
1632 }
1633 }
1634
1635 if (old_tls_type != tls_type)
1636 {
1637 if (h != NULL)
1638 tilepro_elf_hash_entry (h)->tls_type = tls_type;
1639 else
1640 _bfd_tilepro_elf_local_got_tls_type (abfd) [r_symndx] =
1641 tls_type;
1642 }
1643 }
1644
1645 if (htab->elf.sgot == NULL)
1646 {
1647 if (!tilepro_elf_create_got_section (htab->elf.dynobj, info))
1648 return FALSE;
1649 }
1650 break;
1651
1652 case R_TILEPRO_TLS_GD_CALL:
1653 if (bfd_link_pic (info))
1654 {
1655 /* These are basically R_TILEPRO_JOFFLONG_X1_PLT relocs
1656 against __tls_get_addr. */
1657 struct bfd_link_hash_entry *bh = NULL;
1658 if (! _bfd_generic_link_add_one_symbol (info, abfd,
1659 "__tls_get_addr", 0,
1660 bfd_und_section_ptr, 0,
1661 NULL, FALSE, FALSE,
1662 &bh))
1663 return FALSE;
1664 h = (struct elf_link_hash_entry *) bh;
1665 }
1666 else
1667 break;
1668 /* Fall through */
1669
1670 case R_TILEPRO_JOFFLONG_X1_PLT:
1671 /* This symbol requires a procedure linkage table entry. We
1672 actually build the entry in adjust_dynamic_symbol,
1673 because this might be a case of linking PIC code without
1674 linking in any dynamic objects, in which case we don't
1675 need to generate a procedure linkage table after all. */
1676
1677 if (h != NULL)
1678 {
1679 h->needs_plt = 1;
1680 h->plt.refcount += 1;
1681 }
1682 break;
1683
1684 case R_TILEPRO_32_PCREL:
1685 case R_TILEPRO_16_PCREL:
1686 case R_TILEPRO_8_PCREL:
1687 case R_TILEPRO_IMM16_X0_PCREL:
1688 case R_TILEPRO_IMM16_X1_PCREL:
1689 case R_TILEPRO_IMM16_X0_LO_PCREL:
1690 case R_TILEPRO_IMM16_X1_LO_PCREL:
1691 case R_TILEPRO_IMM16_X0_HI_PCREL:
1692 case R_TILEPRO_IMM16_X1_HI_PCREL:
1693 case R_TILEPRO_IMM16_X0_HA_PCREL:
1694 case R_TILEPRO_IMM16_X1_HA_PCREL:
1695 if (h != NULL)
1696 h->non_got_ref = 1;
1697
1698 if (h != NULL
1699 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
1700 break;
1701 /* Fall through. */
1702
1703 case R_TILEPRO_32:
1704 case R_TILEPRO_16:
1705 case R_TILEPRO_8:
1706 case R_TILEPRO_LO16:
1707 case R_TILEPRO_HI16:
1708 case R_TILEPRO_HA16:
1709 case R_TILEPRO_COPY:
1710 case R_TILEPRO_GLOB_DAT:
1711 case R_TILEPRO_JMP_SLOT:
1712 case R_TILEPRO_RELATIVE:
1713 case R_TILEPRO_BROFF_X1:
1714 case R_TILEPRO_JOFFLONG_X1:
1715 case R_TILEPRO_IMM8_X0:
1716 case R_TILEPRO_IMM8_Y0:
1717 case R_TILEPRO_IMM8_X1:
1718 case R_TILEPRO_IMM8_Y1:
1719 case R_TILEPRO_DEST_IMM8_X1:
1720 case R_TILEPRO_MT_IMM15_X1:
1721 case R_TILEPRO_MF_IMM15_X1:
1722 case R_TILEPRO_IMM16_X0:
1723 case R_TILEPRO_IMM16_X1:
1724 case R_TILEPRO_IMM16_X0_LO:
1725 case R_TILEPRO_IMM16_X1_LO:
1726 case R_TILEPRO_IMM16_X0_HI:
1727 case R_TILEPRO_IMM16_X1_HI:
1728 case R_TILEPRO_IMM16_X0_HA:
1729 case R_TILEPRO_IMM16_X1_HA:
1730 case R_TILEPRO_MMSTART_X0:
1731 case R_TILEPRO_MMEND_X0:
1732 case R_TILEPRO_MMSTART_X1:
1733 case R_TILEPRO_MMEND_X1:
1734 case R_TILEPRO_SHAMT_X0:
1735 case R_TILEPRO_SHAMT_X1:
1736 case R_TILEPRO_SHAMT_Y0:
1737 case R_TILEPRO_SHAMT_Y1:
1738 if (h != NULL)
1739 h->non_got_ref = 1;
1740
1741 r_tilepro_plt32:
1742 if (h != NULL && !bfd_link_pic (info))
1743 {
1744 /* We may need a .plt entry if the function this reloc
1745 refers to is in a shared lib. */
1746 h->plt.refcount += 1;
1747 }
1748
1749 /* If we are creating a shared library, and this is a reloc
1750 against a global symbol, or a non PC relative reloc
1751 against a local symbol, then we need to copy the reloc
1752 into the shared library. However, if we are linking with
1753 -Bsymbolic, we do not need to copy a reloc against a
1754 global symbol which is defined in an object we are
1755 including in the link (i.e., DEF_REGULAR is set). At
1756 this point we have not seen all the input files, so it is
1757 possible that DEF_REGULAR is not set now but will be set
1758 later (it is never cleared). In case of a weak definition,
1759 DEF_REGULAR may be cleared later by a strong definition in
1760 a shared library. We account for that possibility below by
1761 storing information in the relocs_copied field of the hash
1762 table entry. A similar situation occurs when creating
1763 shared libraries and symbol visibility changes render the
1764 symbol local.
1765
1766 If on the other hand, we are creating an executable, we
1767 may need to keep relocations for symbols satisfied by a
1768 dynamic library if we manage to avoid copy relocs for the
1769 symbol. */
1770 if ((bfd_link_pic (info)
1771 && (sec->flags & SEC_ALLOC) != 0
1772 && (! tilepro_elf_howto_table[r_type].pc_relative
1773 || (h != NULL
1774 && (! info->symbolic
1775 || h->root.type == bfd_link_hash_defweak
1776 || !h->def_regular))))
1777 || (!bfd_link_pic (info)
1778 && (sec->flags & SEC_ALLOC) != 0
1779 && h != NULL
1780 && (h->root.type == bfd_link_hash_defweak
1781 || !h->def_regular)))
1782 {
1783 struct tilepro_elf_dyn_relocs *p;
1784 struct tilepro_elf_dyn_relocs **head;
1785
1786 /* When creating a shared object, we must copy these
1787 relocs into the output file. We create a reloc
1788 section in dynobj and make room for the reloc. */
1789 if (sreloc == NULL)
1790 {
1791 sreloc = _bfd_elf_make_dynamic_reloc_section
1792 (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ TRUE);
1793
1794 if (sreloc == NULL)
1795 return FALSE;
1796 }
1797
1798 /* If this is a global symbol, we count the number of
1799 relocations we need for this symbol. */
1800 if (h != NULL)
1801 head =
1802 &((struct tilepro_elf_link_hash_entry *) h)->dyn_relocs;
1803 else
1804 {
1805 /* Track dynamic relocs needed for local syms too.
1806 We really need local syms available to do this
1807 easily. Oh well. */
1808
1809 asection *s;
1810 void *vpp;
1811 Elf_Internal_Sym *isym;
1812
1813 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1814 abfd, r_symndx);
1815 if (isym == NULL)
1816 return FALSE;
1817
1818 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
1819 if (s == NULL)
1820 s = sec;
1821
1822 vpp = &elf_section_data (s)->local_dynrel;
1823 head = (struct tilepro_elf_dyn_relocs **) vpp;
1824 }
1825
1826 p = *head;
1827 if (p == NULL || p->sec != sec)
1828 {
1829 bfd_size_type amt = sizeof *p;
1830 p = ((struct tilepro_elf_dyn_relocs *)
1831 bfd_alloc (htab->elf.dynobj, amt));
1832 if (p == NULL)
1833 return FALSE;
1834 p->next = *head;
1835 *head = p;
1836 p->sec = sec;
1837 p->count = 0;
1838 p->pc_count = 0;
1839 }
1840
1841 p->count += 1;
1842 if (tilepro_elf_howto_table[r_type].pc_relative)
1843 p->pc_count += 1;
1844 }
1845
1846 break;
1847
1848 case R_TILEPRO_GNU_VTINHERIT:
1849 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
1850 return FALSE;
1851 break;
1852
1853 case R_TILEPRO_GNU_VTENTRY:
1854 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
1855 return FALSE;
1856 break;
1857
1858 default:
1859 break;
1860 }
1861 }
1862
1863 return TRUE;
1864 }
1865
1866 \f
1867 static asection *
1868 tilepro_elf_gc_mark_hook (asection *sec,
1869 struct bfd_link_info *info,
1870 Elf_Internal_Rela *rel,
1871 struct elf_link_hash_entry *h,
1872 Elf_Internal_Sym *sym)
1873 {
1874 if (h != NULL)
1875 {
1876 switch (ELF32_R_TYPE (rel->r_info))
1877 {
1878 case R_TILEPRO_GNU_VTINHERIT:
1879 case R_TILEPRO_GNU_VTENTRY:
1880 return NULL;
1881 }
1882 }
1883
1884 /* FIXME: The test here, in check_relocs and in relocate_section
1885 dealing with TLS optimization, ought to be !bfd_link_executable (info). */
1886 if (bfd_link_pic (info))
1887 {
1888 switch (ELF32_R_TYPE (rel->r_info))
1889 {
1890 case R_TILEPRO_TLS_GD_CALL:
1891 /* This reloc implicitly references __tls_get_addr. We know
1892 another reloc will reference the same symbol as the one
1893 on this reloc, so the real symbol and section will be
1894 gc marked when processing the other reloc. That lets
1895 us handle __tls_get_addr here. */
1896 h = elf_link_hash_lookup (elf_hash_table (info), "__tls_get_addr",
1897 FALSE, FALSE, TRUE);
1898 BFD_ASSERT (h != NULL);
1899 h->mark = 1;
1900 if (h->u.weakdef != NULL)
1901 h->u.weakdef->mark = 1;
1902 sym = NULL;
1903 }
1904 }
1905
1906 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
1907 }
1908
1909 /* Update the got entry reference counts for the section being removed. */
1910 static bfd_boolean
1911 tilepro_elf_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info,
1912 asection *sec, const Elf_Internal_Rela *relocs)
1913 {
1914 struct tilepro_elf_link_hash_table *htab;
1915 Elf_Internal_Shdr *symtab_hdr;
1916 struct elf_link_hash_entry **sym_hashes;
1917 bfd_signed_vma *local_got_refcounts;
1918 const Elf_Internal_Rela *rel, *relend;
1919
1920 if (bfd_link_relocatable (info))
1921 return TRUE;
1922
1923 BFD_ASSERT (is_tilepro_elf (abfd) || sec->reloc_count == 0);
1924
1925 elf_section_data (sec)->local_dynrel = NULL;
1926
1927 htab = tilepro_elf_hash_table (info);
1928 BFD_ASSERT (htab != NULL);
1929 symtab_hdr = &elf_symtab_hdr (abfd);
1930 sym_hashes = elf_sym_hashes (abfd);
1931 local_got_refcounts = elf_local_got_refcounts (abfd);
1932
1933 relend = relocs + sec->reloc_count;
1934 for (rel = relocs; rel < relend; rel++)
1935 {
1936 unsigned long r_symndx;
1937 unsigned int r_type;
1938 struct elf_link_hash_entry *h = NULL;
1939
1940 r_symndx = ELF32_R_SYM (rel->r_info);
1941 if (r_symndx >= symtab_hdr->sh_info)
1942 {
1943 struct tilepro_elf_link_hash_entry *eh;
1944 struct tilepro_elf_dyn_relocs **pp;
1945 struct tilepro_elf_dyn_relocs *p;
1946
1947 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1948 while (h->root.type == bfd_link_hash_indirect
1949 || h->root.type == bfd_link_hash_warning)
1950 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1951 eh = (struct tilepro_elf_link_hash_entry *) h;
1952 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1953 if (p->sec == sec)
1954 {
1955 /* Everything must go for SEC. */
1956 *pp = p->next;
1957 break;
1958 }
1959 }
1960
1961 r_type = ELF32_R_TYPE (rel->r_info);
1962 r_type = tilepro_elf_tls_transition (info, r_type, h != NULL);
1963 switch (r_type)
1964 {
1965 case R_TILEPRO_IMM16_X0_GOT:
1966 case R_TILEPRO_IMM16_X1_GOT:
1967 case R_TILEPRO_IMM16_X0_GOT_LO:
1968 case R_TILEPRO_IMM16_X1_GOT_LO:
1969 case R_TILEPRO_IMM16_X0_GOT_HI:
1970 case R_TILEPRO_IMM16_X1_GOT_HI:
1971 case R_TILEPRO_IMM16_X0_GOT_HA:
1972 case R_TILEPRO_IMM16_X1_GOT_HA:
1973 case R_TILEPRO_IMM16_X0_TLS_GD:
1974 case R_TILEPRO_IMM16_X1_TLS_GD:
1975 case R_TILEPRO_IMM16_X0_TLS_GD_LO:
1976 case R_TILEPRO_IMM16_X1_TLS_GD_LO:
1977 case R_TILEPRO_IMM16_X0_TLS_GD_HI:
1978 case R_TILEPRO_IMM16_X1_TLS_GD_HI:
1979 case R_TILEPRO_IMM16_X0_TLS_GD_HA:
1980 case R_TILEPRO_IMM16_X1_TLS_GD_HA:
1981 case R_TILEPRO_IMM16_X0_TLS_IE:
1982 case R_TILEPRO_IMM16_X1_TLS_IE:
1983 case R_TILEPRO_IMM16_X0_TLS_IE_LO:
1984 case R_TILEPRO_IMM16_X1_TLS_IE_LO:
1985 case R_TILEPRO_IMM16_X0_TLS_IE_HI:
1986 case R_TILEPRO_IMM16_X1_TLS_IE_HI:
1987 case R_TILEPRO_IMM16_X0_TLS_IE_HA:
1988 case R_TILEPRO_IMM16_X1_TLS_IE_HA:
1989 if (h != NULL)
1990 {
1991 if (h->got.refcount > 0)
1992 h->got.refcount--;
1993 }
1994 else
1995 {
1996 if (local_got_refcounts &&
1997 local_got_refcounts[r_symndx] > 0)
1998 local_got_refcounts[r_symndx]--;
1999 }
2000 break;
2001
2002 case R_TILEPRO_32_PCREL:
2003 case R_TILEPRO_16_PCREL:
2004 case R_TILEPRO_8_PCREL:
2005 case R_TILEPRO_IMM16_X0_PCREL:
2006 case R_TILEPRO_IMM16_X1_PCREL:
2007 case R_TILEPRO_IMM16_X0_LO_PCREL:
2008 case R_TILEPRO_IMM16_X1_LO_PCREL:
2009 case R_TILEPRO_IMM16_X0_HI_PCREL:
2010 case R_TILEPRO_IMM16_X1_HI_PCREL:
2011 case R_TILEPRO_IMM16_X0_HA_PCREL:
2012 case R_TILEPRO_IMM16_X1_HA_PCREL:
2013 if (h != NULL
2014 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
2015 break;
2016 /* Fall through. */
2017
2018 case R_TILEPRO_32:
2019 case R_TILEPRO_16:
2020 case R_TILEPRO_8:
2021 case R_TILEPRO_LO16:
2022 case R_TILEPRO_HI16:
2023 case R_TILEPRO_HA16:
2024 case R_TILEPRO_COPY:
2025 case R_TILEPRO_GLOB_DAT:
2026 case R_TILEPRO_JMP_SLOT:
2027 case R_TILEPRO_RELATIVE:
2028 case R_TILEPRO_BROFF_X1:
2029 case R_TILEPRO_JOFFLONG_X1:
2030 case R_TILEPRO_IMM8_X0:
2031 case R_TILEPRO_IMM8_Y0:
2032 case R_TILEPRO_IMM8_X1:
2033 case R_TILEPRO_IMM8_Y1:
2034 case R_TILEPRO_DEST_IMM8_X1:
2035 case R_TILEPRO_MT_IMM15_X1:
2036 case R_TILEPRO_MF_IMM15_X1:
2037 case R_TILEPRO_IMM16_X0:
2038 case R_TILEPRO_IMM16_X1:
2039 case R_TILEPRO_IMM16_X0_LO:
2040 case R_TILEPRO_IMM16_X1_LO:
2041 case R_TILEPRO_IMM16_X0_HI:
2042 case R_TILEPRO_IMM16_X1_HI:
2043 case R_TILEPRO_IMM16_X0_HA:
2044 case R_TILEPRO_IMM16_X1_HA:
2045 case R_TILEPRO_MMSTART_X0:
2046 case R_TILEPRO_MMEND_X0:
2047 case R_TILEPRO_MMSTART_X1:
2048 case R_TILEPRO_MMEND_X1:
2049 case R_TILEPRO_SHAMT_X0:
2050 case R_TILEPRO_SHAMT_X1:
2051 case R_TILEPRO_SHAMT_Y0:
2052 case R_TILEPRO_SHAMT_Y1:
2053 if (bfd_link_pic (info))
2054 break;
2055 /* Fall through. */
2056
2057 case R_TILEPRO_JOFFLONG_X1_PLT:
2058 if (h != NULL)
2059 {
2060 if (h->plt.refcount > 0)
2061 h->plt.refcount--;
2062 }
2063 break;
2064
2065 default:
2066 break;
2067 }
2068 }
2069
2070 return TRUE;
2071 }
2072
2073 /* Adjust a symbol defined by a dynamic object and referenced by a
2074 regular object. The current definition is in some section of the
2075 dynamic object, but we're not including those sections. We have to
2076 change the definition to something the rest of the link can
2077 understand. */
2078
2079 static bfd_boolean
2080 tilepro_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
2081 struct elf_link_hash_entry *h)
2082 {
2083 struct tilepro_elf_link_hash_table *htab;
2084 struct tilepro_elf_link_hash_entry * eh;
2085 struct tilepro_elf_dyn_relocs *p;
2086 asection *s;
2087
2088 htab = tilepro_elf_hash_table (info);
2089 BFD_ASSERT (htab != NULL);
2090
2091 /* Make sure we know what is going on here. */
2092 BFD_ASSERT (htab->elf.dynobj != NULL
2093 && (h->needs_plt
2094 || h->u.weakdef != NULL
2095 || (h->def_dynamic
2096 && h->ref_regular
2097 && !h->def_regular)));
2098
2099 /* If this is a function, put it in the procedure linkage table. We
2100 will fill in the contents of the procedure linkage table later
2101 (although we could actually do it here). */
2102 if (h->type == STT_FUNC || h->needs_plt)
2103 {
2104 if (h->plt.refcount <= 0
2105 || SYMBOL_CALLS_LOCAL (info, h)
2106 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
2107 && h->root.type == bfd_link_hash_undefweak))
2108 {
2109 /* This case can occur if we saw a R_TILEPRO_JOFFLONG_X1_PLT
2110 reloc in an input file, but the symbol was never referred
2111 to by a dynamic object, or if all references were garbage
2112 collected. In such a case, we don't actually need to build
2113 a procedure linkage table, and we can just do a
2114 R_TILEPRO_JOFFLONG_X1 relocation instead. */
2115 h->plt.offset = (bfd_vma) -1;
2116 h->needs_plt = 0;
2117 }
2118
2119 return TRUE;
2120 }
2121 else
2122 h->plt.offset = (bfd_vma) -1;
2123
2124 /* If this is a weak symbol, and there is a real definition, the
2125 processor independent code will have arranged for us to see the
2126 real definition first, and we can just use the same value. */
2127 if (h->u.weakdef != NULL)
2128 {
2129 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
2130 || h->u.weakdef->root.type == bfd_link_hash_defweak);
2131 h->root.u.def.section = h->u.weakdef->root.u.def.section;
2132 h->root.u.def.value = h->u.weakdef->root.u.def.value;
2133 return TRUE;
2134 }
2135
2136 /* This is a reference to a symbol defined by a dynamic object which
2137 is not a function. */
2138
2139 /* If we are creating a shared library, we must presume that the
2140 only references to the symbol are via the global offset table.
2141 For such cases we need not do anything here; the relocations will
2142 be handled correctly by relocate_section. */
2143 if (bfd_link_pic (info))
2144 return TRUE;
2145
2146 /* If there are no references to this symbol that do not use the
2147 GOT, we don't need to generate a copy reloc. */
2148 if (!h->non_got_ref)
2149 return TRUE;
2150
2151 /* If -z nocopyreloc was given, we won't generate them either. */
2152 if (info->nocopyreloc)
2153 {
2154 h->non_got_ref = 0;
2155 return TRUE;
2156 }
2157
2158 eh = (struct tilepro_elf_link_hash_entry *) h;
2159 for (p = eh->dyn_relocs; p != NULL; p = p->next)
2160 {
2161 s = p->sec->output_section;
2162 if (s != NULL && (s->flags & SEC_READONLY) != 0)
2163 break;
2164 }
2165
2166 /* If we didn't find any dynamic relocs in read-only sections, then
2167 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
2168 if (p == NULL)
2169 {
2170 h->non_got_ref = 0;
2171 return TRUE;
2172 }
2173
2174 /* We must allocate the symbol in our .dynbss section, which will
2175 become part of the .bss section of the executable. There will be
2176 an entry for this symbol in the .dynsym section. The dynamic
2177 object will contain position independent code, so all references
2178 from the dynamic object to this symbol will go through the global
2179 offset table. The dynamic linker will use the .dynsym entry to
2180 determine the address it must put in the global offset table, so
2181 both the dynamic object and the regular object will refer to the
2182 same memory location for the variable. */
2183
2184 /* We must generate a R_TILEPRO_COPY reloc to tell the dynamic linker
2185 to copy the initial value out of the dynamic object and into the
2186 runtime process image. We need to remember the offset into the
2187 .rel.bss section we are going to use. */
2188 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
2189 {
2190 htab->srelbss->size += TILEPRO_ELF_RELA_BYTES;
2191 h->needs_copy = 1;
2192 }
2193
2194 return _bfd_elf_adjust_dynamic_copy (info, h, htab->sdynbss);
2195 }
2196
2197 /* Allocate space in .plt, .got and associated reloc sections for
2198 dynamic relocs. */
2199
2200 static bfd_boolean
2201 allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
2202 {
2203 struct bfd_link_info *info;
2204 struct tilepro_elf_link_hash_table *htab;
2205 struct tilepro_elf_link_hash_entry *eh;
2206 struct tilepro_elf_dyn_relocs *p;
2207
2208 if (h->root.type == bfd_link_hash_indirect)
2209 return TRUE;
2210
2211 info = (struct bfd_link_info *) inf;
2212 htab = tilepro_elf_hash_table (info);
2213 BFD_ASSERT (htab != NULL);
2214
2215 if (htab->elf.dynamic_sections_created
2216 && h->plt.refcount > 0)
2217 {
2218 /* Make sure this symbol is output as a dynamic symbol.
2219 Undefined weak syms won't yet be marked as dynamic. */
2220 if (h->dynindx == -1
2221 && !h->forced_local)
2222 {
2223 if (! bfd_elf_link_record_dynamic_symbol (info, h))
2224 return FALSE;
2225 }
2226
2227 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, bfd_link_pic (info), h))
2228 {
2229 asection *s = htab->elf.splt;
2230
2231 /* Allocate room for the header. */
2232 if (s->size == 0)
2233 {
2234 s->size = PLT_ENTRY_SIZE;
2235 }
2236
2237 h->plt.offset = s->size;
2238
2239 /* If this symbol is not defined in a regular file, and we are
2240 not generating a shared library, then set the symbol to this
2241 location in the .plt. This is required to make function
2242 pointers compare as equal between the normal executable and
2243 the shared library. */
2244 if (! bfd_link_pic (info)
2245 && !h->def_regular)
2246 {
2247 h->root.u.def.section = s;
2248 h->root.u.def.value = h->plt.offset;
2249 }
2250
2251 /* Make room for this entry. */
2252 s->size += PLT_ENTRY_SIZE;
2253
2254 /* We also need to make an entry in the .got.plt section. */
2255 htab->elf.sgotplt->size += GOT_ENTRY_SIZE;
2256
2257 /* We also need to make an entry in the .rela.plt section. */
2258 htab->elf.srelplt->size += TILEPRO_ELF_RELA_BYTES;
2259 }
2260 else
2261 {
2262 h->plt.offset = (bfd_vma) -1;
2263 h->needs_plt = 0;
2264 }
2265 }
2266 else
2267 {
2268 h->plt.offset = (bfd_vma) -1;
2269 h->needs_plt = 0;
2270 }
2271
2272 /* If a TLS_IE symbol is now local to the binary, make it a TLS_LE
2273 requiring no TLS entry. */
2274 if (h->got.refcount > 0
2275 && !bfd_link_pic (info)
2276 && h->dynindx == -1
2277 && tilepro_elf_hash_entry(h)->tls_type == GOT_TLS_IE)
2278 h->got.offset = (bfd_vma) -1;
2279 else if (h->got.refcount > 0)
2280 {
2281 asection *s;
2282 bfd_boolean dyn;
2283 int tls_type = tilepro_elf_hash_entry(h)->tls_type;
2284
2285 /* Make sure this symbol is output as a dynamic symbol.
2286 Undefined weak syms won't yet be marked as dynamic. */
2287 if (h->dynindx == -1
2288 && !h->forced_local)
2289 {
2290 if (! bfd_elf_link_record_dynamic_symbol (info, h))
2291 return FALSE;
2292 }
2293
2294 s = htab->elf.sgot;
2295 h->got.offset = s->size;
2296 s->size += TILEPRO_BYTES_PER_WORD;
2297 /* R_TILEPRO_IMM16_Xn_TLS_GD entries need 2 consecutive GOT slots. */
2298 if (tls_type == GOT_TLS_GD)
2299 s->size += TILEPRO_BYTES_PER_WORD;
2300 dyn = htab->elf.dynamic_sections_created;
2301 /* R_TILEPRO_IMM16_Xn_TLS_IE_xxx needs one dynamic relocation,
2302 R_TILEPRO_IMM16_Xn_TLS_GD_xxx needs two if local symbol and two if
2303 global. */
2304 if (tls_type == GOT_TLS_GD || tls_type == GOT_TLS_IE)
2305 htab->elf.srelgot->size += 2 * TILEPRO_ELF_RELA_BYTES;
2306 else if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
2307 bfd_link_pic (info),
2308 h))
2309 htab->elf.srelgot->size += TILEPRO_ELF_RELA_BYTES;
2310 }
2311 else
2312 h->got.offset = (bfd_vma) -1;
2313
2314 eh = (struct tilepro_elf_link_hash_entry *) h;
2315 if (eh->dyn_relocs == NULL)
2316 return TRUE;
2317
2318 /* In the shared -Bsymbolic case, discard space allocated for
2319 dynamic pc-relative relocs against symbols which turn out to be
2320 defined in regular objects. For the normal shared case, discard
2321 space for pc-relative relocs that have become local due to symbol
2322 visibility changes. */
2323
2324 if (bfd_link_pic (info))
2325 {
2326 if (SYMBOL_CALLS_LOCAL (info, h))
2327 {
2328 struct tilepro_elf_dyn_relocs **pp;
2329
2330 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
2331 {
2332 p->count -= p->pc_count;
2333 p->pc_count = 0;
2334 if (p->count == 0)
2335 *pp = p->next;
2336 else
2337 pp = &p->next;
2338 }
2339 }
2340
2341 /* Also discard relocs on undefined weak syms with non-default
2342 visibility. */
2343 if (eh->dyn_relocs != NULL
2344 && h->root.type == bfd_link_hash_undefweak)
2345 {
2346 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
2347 eh->dyn_relocs = NULL;
2348
2349 /* Make sure undefined weak symbols are output as a dynamic
2350 symbol in PIEs. */
2351 else if (h->dynindx == -1
2352 && !h->forced_local)
2353 {
2354 if (! bfd_elf_link_record_dynamic_symbol (info, h))
2355 return FALSE;
2356 }
2357 }
2358 }
2359 else
2360 {
2361 /* For the non-shared case, discard space for relocs against
2362 symbols which turn out to need copy relocs or are not
2363 dynamic. */
2364
2365 if (!h->non_got_ref
2366 && ((h->def_dynamic
2367 && !h->def_regular)
2368 || (htab->elf.dynamic_sections_created
2369 && (h->root.type == bfd_link_hash_undefweak
2370 || h->root.type == bfd_link_hash_undefined))))
2371 {
2372 /* Make sure this symbol is output as a dynamic symbol.
2373 Undefined weak syms won't yet be marked as dynamic. */
2374 if (h->dynindx == -1
2375 && !h->forced_local)
2376 {
2377 if (! bfd_elf_link_record_dynamic_symbol (info, h))
2378 return FALSE;
2379 }
2380
2381 /* If that succeeded, we know we'll be keeping all the
2382 relocs. */
2383 if (h->dynindx != -1)
2384 goto keep;
2385 }
2386
2387 eh->dyn_relocs = NULL;
2388
2389 keep: ;
2390 }
2391
2392 /* Finally, allocate space. */
2393 for (p = eh->dyn_relocs; p != NULL; p = p->next)
2394 {
2395 asection *sreloc = elf_section_data (p->sec)->sreloc;
2396 sreloc->size += p->count * TILEPRO_ELF_RELA_BYTES;
2397 }
2398
2399 return TRUE;
2400 }
2401
2402 /* Find any dynamic relocs that apply to read-only sections. */
2403
2404 static bfd_boolean
2405 readonly_dynrelocs (struct elf_link_hash_entry *h, void *inf)
2406 {
2407 struct tilepro_elf_link_hash_entry *eh;
2408 struct tilepro_elf_dyn_relocs *p;
2409
2410 eh = (struct tilepro_elf_link_hash_entry *) h;
2411 for (p = eh->dyn_relocs; p != NULL; p = p->next)
2412 {
2413 asection *s = p->sec->output_section;
2414
2415 if (s != NULL && (s->flags & SEC_READONLY) != 0)
2416 {
2417 struct bfd_link_info *info = (struct bfd_link_info *) inf;
2418
2419 info->flags |= DF_TEXTREL;
2420
2421 /* Not an error, just cut short the traversal. */
2422 return FALSE;
2423 }
2424 }
2425 return TRUE;
2426 }
2427
2428 /* Return true if the dynamic symbol for a given section should be
2429 omitted when creating a shared library. */
2430
2431 static bfd_boolean
2432 tilepro_elf_omit_section_dynsym (bfd *output_bfd,
2433 struct bfd_link_info *info,
2434 asection *p)
2435 {
2436 /* We keep the .got section symbol so that explicit relocations
2437 against the _GLOBAL_OFFSET_TABLE_ symbol emitted in PIC mode
2438 can be turned into relocations against the .got symbol. */
2439 if (strcmp (p->name, ".got") == 0)
2440 return FALSE;
2441
2442 return _bfd_elf_link_omit_section_dynsym (output_bfd, info, p);
2443 }
2444
2445 /* Set the sizes of the dynamic sections. */
2446
2447 #define ELF32_DYNAMIC_INTERPRETER "/lib/ld.so.1"
2448
2449 static bfd_boolean
2450 tilepro_elf_size_dynamic_sections (bfd *output_bfd,
2451 struct bfd_link_info *info)
2452 {
2453 (void)output_bfd;
2454
2455 struct tilepro_elf_link_hash_table *htab;
2456 bfd *dynobj;
2457 asection *s;
2458 bfd *ibfd;
2459
2460 htab = tilepro_elf_hash_table (info);
2461 BFD_ASSERT (htab != NULL);
2462 dynobj = htab->elf.dynobj;
2463 BFD_ASSERT (dynobj != NULL);
2464
2465 if (elf_hash_table (info)->dynamic_sections_created)
2466 {
2467 /* Set the contents of the .interp section to the interpreter. */
2468 if (bfd_link_executable (info) && !info->nointerp)
2469 {
2470 s = bfd_get_linker_section (dynobj, ".interp");
2471 BFD_ASSERT (s != NULL);
2472 s->size = sizeof ELF32_DYNAMIC_INTERPRETER;
2473 s->contents = (unsigned char *) ELF32_DYNAMIC_INTERPRETER;
2474 }
2475 }
2476
2477 /* Set up .got offsets for local syms, and space for local dynamic
2478 relocs. */
2479 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
2480 {
2481 bfd_signed_vma *local_got;
2482 bfd_signed_vma *end_local_got;
2483 char *local_tls_type;
2484 bfd_size_type locsymcount;
2485 Elf_Internal_Shdr *symtab_hdr;
2486 asection *srel;
2487
2488 if (! is_tilepro_elf (ibfd))
2489 continue;
2490
2491 for (s = ibfd->sections; s != NULL; s = s->next)
2492 {
2493 struct tilepro_elf_dyn_relocs *p;
2494
2495 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
2496 {
2497 if (!bfd_is_abs_section (p->sec)
2498 && bfd_is_abs_section (p->sec->output_section))
2499 {
2500 /* Input section has been discarded, either because
2501 it is a copy of a linkonce section or due to
2502 linker script /DISCARD/, so we'll be discarding
2503 the relocs too. */
2504 }
2505 else if (p->count != 0)
2506 {
2507 srel = elf_section_data (p->sec)->sreloc;
2508 srel->size += p->count * TILEPRO_ELF_RELA_BYTES;
2509 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
2510 info->flags |= DF_TEXTREL;
2511 }
2512 }
2513 }
2514
2515 local_got = elf_local_got_refcounts (ibfd);
2516 if (!local_got)
2517 continue;
2518
2519 symtab_hdr = &elf_symtab_hdr (ibfd);
2520 locsymcount = symtab_hdr->sh_info;
2521 end_local_got = local_got + locsymcount;
2522 local_tls_type = _bfd_tilepro_elf_local_got_tls_type (ibfd);
2523 s = htab->elf.sgot;
2524 srel = htab->elf.srelgot;
2525 for (; local_got < end_local_got; ++local_got, ++local_tls_type)
2526 {
2527 if (*local_got > 0)
2528 {
2529 *local_got = s->size;
2530 s->size += TILEPRO_BYTES_PER_WORD;
2531 if (*local_tls_type == GOT_TLS_GD)
2532 s->size += TILEPRO_BYTES_PER_WORD;
2533 if (bfd_link_pic (info)
2534 || *local_tls_type == GOT_TLS_GD
2535 || *local_tls_type == GOT_TLS_IE)
2536 srel->size += TILEPRO_ELF_RELA_BYTES;
2537 }
2538 else
2539 *local_got = (bfd_vma) -1;
2540 }
2541 }
2542
2543 /* Allocate global sym .plt and .got entries, and space for global
2544 sym dynamic relocs. */
2545 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
2546
2547 if (elf_hash_table (info)->dynamic_sections_created)
2548 {
2549 /* If the .got section is more than 0x8000 bytes, we add
2550 0x8000 to the value of _GLOBAL_OFFSET_TABLE_, so that 16
2551 bit relocations have a greater chance of working. */
2552 if (htab->elf.sgot->size >= 0x8000
2553 && elf_hash_table (info)->hgot->root.u.def.value == 0)
2554 elf_hash_table (info)->hgot->root.u.def.value = 0x8000;
2555 }
2556
2557 if (htab->elf.sgotplt)
2558 {
2559 struct elf_link_hash_entry *got;
2560 got = elf_link_hash_lookup (elf_hash_table (info),
2561 "_GLOBAL_OFFSET_TABLE_",
2562 FALSE, FALSE, FALSE);
2563
2564 /* Don't allocate .got.plt section if there are no GOT nor PLT
2565 entries and there is no refeence to _GLOBAL_OFFSET_TABLE_. */
2566 if ((got == NULL
2567 || !got->ref_regular_nonweak)
2568 && (htab->elf.sgotplt->size
2569 == GOTPLT_HEADER_SIZE)
2570 && (htab->elf.splt == NULL
2571 || htab->elf.splt->size == 0)
2572 && (htab->elf.sgot == NULL
2573 || (htab->elf.sgot->size
2574 == get_elf_backend_data (output_bfd)->got_header_size)))
2575 htab->elf.sgotplt->size = 0;
2576 }
2577
2578 /* The check_relocs and adjust_dynamic_symbol entry points have
2579 determined the sizes of the various dynamic sections. Allocate
2580 memory for them. */
2581 for (s = dynobj->sections; s != NULL; s = s->next)
2582 {
2583 if ((s->flags & SEC_LINKER_CREATED) == 0)
2584 continue;
2585
2586 if (s == htab->elf.splt
2587 || s == htab->elf.sgot
2588 || s == htab->elf.sgotplt
2589 || s == htab->sdynbss)
2590 {
2591 /* Strip this section if we don't need it; see the
2592 comment below. */
2593 }
2594 else if (strncmp (s->name, ".rela", 5) == 0)
2595 {
2596 if (s->size != 0)
2597 {
2598 /* We use the reloc_count field as a counter if we need
2599 to copy relocs into the output file. */
2600 s->reloc_count = 0;
2601 }
2602 }
2603 else
2604 {
2605 /* It's not one of our sections. */
2606 continue;
2607 }
2608
2609 if (s->size == 0)
2610 {
2611 /* If we don't need this section, strip it from the
2612 output file. This is mostly to handle .rela.bss and
2613 .rela.plt. We must create both sections in
2614 create_dynamic_sections, because they must be created
2615 before the linker maps input sections to output
2616 sections. The linker does that before
2617 adjust_dynamic_symbol is called, and it is that
2618 function which decides whether anything needs to go
2619 into these sections. */
2620 s->flags |= SEC_EXCLUDE;
2621 continue;
2622 }
2623
2624 if ((s->flags & SEC_HAS_CONTENTS) == 0)
2625 continue;
2626
2627 /* Allocate memory for the section contents. Zero the memory
2628 for the benefit of .rela.plt, which has 4 unused entries
2629 at the beginning, and we don't want garbage. */
2630 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
2631 if (s->contents == NULL)
2632 return FALSE;
2633 }
2634
2635 if (elf_hash_table (info)->dynamic_sections_created)
2636 {
2637 /* Add some entries to the .dynamic section. We fill in the
2638 values later, in tilepro_elf_finish_dynamic_sections, but we
2639 must add the entries now so that we get the correct size for
2640 the .dynamic section. The DT_DEBUG entry is filled in by the
2641 dynamic linker and used by the debugger. */
2642 #define add_dynamic_entry(TAG, VAL) \
2643 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
2644
2645 if (bfd_link_executable (info))
2646 {
2647 if (!add_dynamic_entry (DT_DEBUG, 0))
2648 return FALSE;
2649 }
2650
2651 if (htab->elf.srelplt->size != 0)
2652 {
2653 if (!add_dynamic_entry (DT_PLTGOT, 0)
2654 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2655 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2656 || !add_dynamic_entry (DT_JMPREL, 0))
2657 return FALSE;
2658 }
2659
2660 if (!add_dynamic_entry (DT_RELA, 0)
2661 || !add_dynamic_entry (DT_RELASZ, 0)
2662 || !add_dynamic_entry (DT_RELAENT, TILEPRO_ELF_RELA_BYTES))
2663 return FALSE;
2664
2665 /* If any dynamic relocs apply to a read-only section,
2666 then we need a DT_TEXTREL entry. */
2667 if ((info->flags & DF_TEXTREL) == 0)
2668 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs, info);
2669
2670 if (info->flags & DF_TEXTREL)
2671 {
2672 if (!add_dynamic_entry (DT_TEXTREL, 0))
2673 return FALSE;
2674 }
2675 }
2676 #undef add_dynamic_entry
2677
2678 return TRUE;
2679 }
2680 \f
2681 /* Return the base VMA address which should be subtracted from real addresses
2682 when resolving @dtpoff relocation.
2683 This is PT_TLS segment p_vaddr. */
2684
2685 static bfd_vma
2686 dtpoff_base (struct bfd_link_info *info)
2687 {
2688 /* If tls_sec is NULL, we should have signalled an error already. */
2689 if (elf_hash_table (info)->tls_sec == NULL)
2690 return 0;
2691 return elf_hash_table (info)->tls_sec->vma;
2692 }
2693
2694 /* Return the relocation value for R_TILEPRO_TLS_TPOFF32. */
2695
2696 static bfd_vma
2697 tpoff (struct bfd_link_info *info, bfd_vma address)
2698 {
2699 struct elf_link_hash_table *htab = elf_hash_table (info);
2700
2701 /* If tls_sec is NULL, we should have signalled an error already. */
2702 if (htab->tls_sec == NULL)
2703 return 0;
2704
2705 return (address - htab->tls_sec->vma);
2706 }
2707
2708 /* Replace the MASK bits in ADDR with those in INSN, for the next
2709 TILEPRO_BUNDLE_SIZE_IN_BYTES bytes. */
2710
2711 static void
2712 tilepro_replace_insn (bfd_byte *addr, const bfd_byte *mask,
2713 const bfd_byte *insn)
2714 {
2715 int i;
2716 for (i = 0; i < TILEPRO_BUNDLE_SIZE_IN_BYTES; i++)
2717 {
2718 addr[i] = (addr[i] & ~mask[i]) | (insn[i] & mask[i]);
2719 }
2720 }
2721
2722 /* Mask to extract the bits corresponding to an instruction in a
2723 specific pipe of a bundle. */
2724 static const bfd_byte insn_mask_X1[] = {
2725 0x00, 0x00, 0x00, 0x80, 0xff, 0xff, 0xff, 0x7f
2726 };
2727
2728 /* Mask to extract the bits corresponding to an instruction in a
2729 specific pipe of a bundle, minus the destination operand and the
2730 first source operand. */
2731 static const bfd_byte insn_mask_X0_no_dest_no_srca[] = {
2732 0x00, 0xf0, 0xff, 0x7f, 0x00, 0x00, 0x00, 0x00
2733 };
2734
2735 static const bfd_byte insn_mask_X1_no_dest_no_srca[] = {
2736 0x00, 0x00, 0x00, 0x00, 0x00, 0xf8, 0xff, 0x7f
2737 };
2738
2739 static const bfd_byte insn_mask_Y0_no_dest_no_srca[] = {
2740 0x00, 0xf0, 0x0f, 0x78, 0x00, 0x00, 0x00, 0x00
2741 };
2742
2743 static const bfd_byte insn_mask_Y1_no_dest_no_srca[] = {
2744 0x00, 0x00, 0x00, 0x00, 0x00, 0xf8, 0x07, 0x78
2745 };
2746
2747 /* Mask to extract the first source operand of an instruction. */
2748 static const bfd_byte srca_mask_X0[] = {
2749 0xc0, 0x0f, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
2750 };
2751
2752 static const bfd_byte srca_mask_X1[] = {
2753 0x00, 0x00, 0x00, 0x00, 0xe0, 0x07, 0x00, 0x00
2754 };
2755
2756 /* Various instructions synthesized to support tls references. */
2757
2758 /* move r0, r0 in the X1 pipe, used for tls le. */
2759 static const bfd_byte insn_tls_le_move_X1[] = {
2760 0x00, 0x00, 0x00, 0x00, 0x00, 0xf8, 0x33, 0x08
2761 };
2762
2763 /* move r0, zero in the X0 and X1 pipe, used for tls le. */
2764 static const bfd_byte insn_tls_le_move_zero_X0X1[] = {
2765 0xc0, 0xff, 0xcf, 0x00, 0xe0, 0xff, 0x33, 0x08
2766 };
2767
2768 /* lw r0, r0 in the X1 pipe, used for tls ie. */
2769 static const bfd_byte insn_tls_ie_lw_X1[] = {
2770 0x00, 0x00, 0x00, 0x00, 0x00, 0x70, 0x0b, 0x40
2771 };
2772
2773 /* add r0, r0, tp in various pipes, used for tls ie. */
2774 static const bfd_byte insn_tls_ie_add_X0X1[] = {
2775 0x00, 0x50, 0x0f, 0x00, 0x00, 0xa8, 0x07, 0x08
2776 };
2777 static const bfd_byte insn_tls_ie_add_Y0Y1[] = {
2778 0x00, 0x50, 0x03, 0x08, 0x00, 0xa8, 0x01, 0x8c
2779 };
2780
2781 /* move r0, r0 in various pipes, used for tls gd. */
2782 static const bfd_byte insn_tls_gd_add_X0X1[] = {
2783 0x00, 0xf0, 0xcf, 0x00, 0x00, 0xf8, 0x33, 0x08
2784 };
2785 static const bfd_byte insn_tls_gd_add_Y0Y1[] = {
2786 0x00, 0xf0, 0x0b, 0x18, 0x00, 0xf8, 0x05, 0x9c
2787 };
2788
2789 /* Relocate an TILEPRO ELF section.
2790
2791 The RELOCATE_SECTION function is called by the new ELF backend linker
2792 to handle the relocations for a section.
2793
2794 The relocs are always passed as Rela structures.
2795
2796 This function is responsible for adjusting the section contents as
2797 necessary, and (if generating a relocatable output file) adjusting
2798 the reloc addend as necessary.
2799
2800 This function does not have to worry about setting the reloc
2801 address or the reloc symbol index.
2802
2803 LOCAL_SYMS is a pointer to the swapped in local symbols.
2804
2805 LOCAL_SECTIONS is an array giving the section in the input file
2806 corresponding to the st_shndx field of each local symbol.
2807
2808 The global hash table entry for the global symbols can be found
2809 via elf_sym_hashes (input_bfd).
2810
2811 When generating relocatable output, this function must handle
2812 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
2813 going to be the section symbol corresponding to the output
2814 section, which means that the addend must be adjusted
2815 accordingly. */
2816
2817 static bfd_boolean
2818 tilepro_elf_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
2819 bfd *input_bfd, asection *input_section,
2820 bfd_byte *contents, Elf_Internal_Rela *relocs,
2821 Elf_Internal_Sym *local_syms,
2822 asection **local_sections)
2823 {
2824 struct tilepro_elf_link_hash_table *htab;
2825 Elf_Internal_Shdr *symtab_hdr;
2826 struct elf_link_hash_entry **sym_hashes;
2827 bfd_vma *local_got_offsets;
2828 bfd_vma got_base;
2829 asection *sreloc;
2830 Elf_Internal_Rela *rel;
2831 Elf_Internal_Rela *relend;
2832 int num_relocs;
2833
2834 htab = tilepro_elf_hash_table (info);
2835 BFD_ASSERT (htab != NULL);
2836 symtab_hdr = &elf_symtab_hdr (input_bfd);
2837 sym_hashes = elf_sym_hashes (input_bfd);
2838 local_got_offsets = elf_local_got_offsets (input_bfd);
2839
2840 if (elf_hash_table (info)->hgot == NULL)
2841 got_base = 0;
2842 else
2843 got_base = elf_hash_table (info)->hgot->root.u.def.value;
2844
2845 sreloc = elf_section_data (input_section)->sreloc;
2846
2847 rel = relocs;
2848 num_relocs = input_section->reloc_count;
2849 relend = relocs + num_relocs;
2850 for (; rel < relend; rel++)
2851 {
2852 int r_type, tls_type;
2853 bfd_boolean is_tls_iele, is_tls_le;
2854 reloc_howto_type *howto;
2855 unsigned long r_symndx;
2856 struct elf_link_hash_entry *h;
2857 Elf_Internal_Sym *sym;
2858 tilepro_create_func create_func;
2859 asection *sec;
2860 bfd_vma relocation;
2861 bfd_reloc_status_type r;
2862 const char *name;
2863 bfd_vma off;
2864 bfd_boolean is_plt = FALSE;
2865
2866 bfd_boolean unresolved_reloc;
2867
2868 r_type = ELF32_R_TYPE (rel->r_info);
2869 if (r_type == R_TILEPRO_GNU_VTINHERIT
2870 || r_type == R_TILEPRO_GNU_VTENTRY)
2871 continue;
2872
2873 if ((unsigned int)r_type >= NELEMS(tilepro_elf_howto_table))
2874 {
2875 /* Not clear if we need to check here, but just be paranoid. */
2876 _bfd_error_handler
2877 /* xgettext:c-format */
2878 (_("%B: unrecognized relocation (0x%x) in section `%A'"),
2879 input_bfd, r_type, input_section);
2880 bfd_set_error (bfd_error_bad_value);
2881 return FALSE;
2882 }
2883
2884 howto = tilepro_elf_howto_table + r_type;
2885
2886 /* This is a final link. */
2887 r_symndx = ELF32_R_SYM (rel->r_info);
2888 h = NULL;
2889 sym = NULL;
2890 sec = NULL;
2891 unresolved_reloc = FALSE;
2892 if (r_symndx < symtab_hdr->sh_info)
2893 {
2894 sym = local_syms + r_symndx;
2895 sec = local_sections[r_symndx];
2896 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
2897 }
2898 else
2899 {
2900 bfd_boolean warned ATTRIBUTE_UNUSED;
2901 bfd_boolean ignored ATTRIBUTE_UNUSED;
2902
2903 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2904 r_symndx, symtab_hdr, sym_hashes,
2905 h, sec, relocation,
2906 unresolved_reloc, warned, ignored);
2907 if (warned)
2908 {
2909 /* To avoid generating warning messages about truncated
2910 relocations, set the relocation's address to be the same as
2911 the start of this section. */
2912 if (input_section->output_section != NULL)
2913 relocation = input_section->output_section->vma;
2914 else
2915 relocation = 0;
2916 }
2917 }
2918
2919 if (sec != NULL && discarded_section (sec))
2920 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
2921 rel, 1, relend, howto, 0, contents);
2922
2923 if (bfd_link_relocatable (info))
2924 continue;
2925
2926 if (h != NULL)
2927 name = h->root.root.string;
2928 else
2929 {
2930 name = (bfd_elf_string_from_elf_section
2931 (input_bfd, symtab_hdr->sh_link, sym->st_name));
2932 if (name == NULL || *name == '\0')
2933 name = bfd_section_name (input_bfd, sec);
2934 }
2935
2936 switch (r_type)
2937 {
2938 case R_TILEPRO_TLS_GD_CALL:
2939 case R_TILEPRO_IMM8_X0_TLS_GD_ADD:
2940 case R_TILEPRO_IMM8_Y0_TLS_GD_ADD:
2941 case R_TILEPRO_IMM8_X1_TLS_GD_ADD:
2942 case R_TILEPRO_IMM8_Y1_TLS_GD_ADD:
2943 case R_TILEPRO_IMM16_X0_TLS_GD_HA:
2944 case R_TILEPRO_IMM16_X1_TLS_GD_HA:
2945 case R_TILEPRO_IMM16_X0_TLS_IE_HA:
2946 case R_TILEPRO_IMM16_X1_TLS_IE_HA:
2947 tls_type = GOT_UNKNOWN;
2948 if (h == NULL && local_got_offsets)
2949 tls_type =
2950 _bfd_tilepro_elf_local_got_tls_type (input_bfd) [r_symndx];
2951 else if (h != NULL)
2952 tls_type = tilepro_elf_hash_entry(h)->tls_type;
2953
2954 is_tls_iele = (! bfd_link_pic (info) || tls_type == GOT_TLS_IE);
2955 is_tls_le = is_tls_iele && (!bfd_link_pic (info)
2956 && (h == NULL || h->dynindx == -1));
2957
2958 if (r_type == R_TILEPRO_TLS_GD_CALL)
2959 {
2960 if (is_tls_le)
2961 {
2962 /* GD -> LE */
2963 tilepro_replace_insn (contents + rel->r_offset,
2964 insn_mask_X1, insn_tls_le_move_X1);
2965 continue;
2966 }
2967 else if (is_tls_iele)
2968 {
2969 /* GD -> IE */
2970 tilepro_replace_insn (contents + rel->r_offset,
2971 insn_mask_X1, insn_tls_ie_lw_X1);
2972 continue;
2973 }
2974
2975 /* GD -> GD */
2976 h = (struct elf_link_hash_entry *)
2977 bfd_link_hash_lookup (info->hash, "__tls_get_addr", FALSE,
2978 FALSE, TRUE);
2979 BFD_ASSERT (h != NULL);
2980 r_type = R_TILEPRO_JOFFLONG_X1_PLT;
2981 howto = tilepro_elf_howto_table + r_type;
2982 }
2983 else if (r_type == R_TILEPRO_IMM16_X0_TLS_GD_HA
2984 || r_type == R_TILEPRO_IMM16_X0_TLS_IE_HA)
2985 {
2986 if (is_tls_le)
2987 tilepro_replace_insn (contents + rel->r_offset, srca_mask_X0,
2988 insn_tls_le_move_zero_X0X1);
2989 }
2990 else if (r_type == R_TILEPRO_IMM16_X1_TLS_GD_HA
2991 || r_type == R_TILEPRO_IMM16_X1_TLS_IE_HA)
2992 {
2993 if (is_tls_le)
2994 tilepro_replace_insn (contents + rel->r_offset, srca_mask_X1,
2995 insn_tls_le_move_zero_X0X1);
2996 }
2997 else
2998 {
2999 const bfd_byte *mask = NULL;
3000 const bfd_byte *add_insn = NULL;
3001
3002 switch (r_type)
3003 {
3004 case R_TILEPRO_IMM8_X0_TLS_GD_ADD:
3005 add_insn = is_tls_iele ? insn_tls_ie_add_X0X1
3006 : insn_tls_gd_add_X0X1;
3007 mask = insn_mask_X0_no_dest_no_srca;
3008 break;
3009 case R_TILEPRO_IMM8_X1_TLS_GD_ADD:
3010 add_insn = is_tls_iele ? insn_tls_ie_add_X0X1
3011 : insn_tls_gd_add_X0X1;
3012 mask = insn_mask_X1_no_dest_no_srca;
3013 break;
3014 case R_TILEPRO_IMM8_Y0_TLS_GD_ADD:
3015 add_insn = is_tls_iele ? insn_tls_ie_add_Y0Y1
3016 : insn_tls_gd_add_Y0Y1;
3017 mask = insn_mask_Y0_no_dest_no_srca;
3018 break;
3019 case R_TILEPRO_IMM8_Y1_TLS_GD_ADD:
3020 add_insn = is_tls_iele ? insn_tls_ie_add_Y0Y1
3021 : insn_tls_gd_add_Y0Y1;
3022 mask = insn_mask_Y1_no_dest_no_srca;
3023 break;
3024 }
3025
3026 tilepro_replace_insn (contents + rel->r_offset, mask, add_insn);
3027
3028 continue;
3029 }
3030 break;
3031 case R_TILEPRO_TLS_IE_LOAD:
3032 if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
3033 /* IE -> LE */
3034 tilepro_replace_insn (contents + rel->r_offset,
3035 insn_mask_X1_no_dest_no_srca,
3036 insn_tls_le_move_X1);
3037 else
3038 /* IE -> IE */
3039 tilepro_replace_insn (contents + rel->r_offset,
3040 insn_mask_X1_no_dest_no_srca,
3041 insn_tls_ie_lw_X1);
3042 continue;
3043 break;
3044 default:
3045 break;
3046 }
3047
3048 switch (r_type)
3049 {
3050 case R_TILEPRO_IMM16_X0_GOT:
3051 case R_TILEPRO_IMM16_X1_GOT:
3052 case R_TILEPRO_IMM16_X0_GOT_LO:
3053 case R_TILEPRO_IMM16_X1_GOT_LO:
3054 case R_TILEPRO_IMM16_X0_GOT_HI:
3055 case R_TILEPRO_IMM16_X1_GOT_HI:
3056 case R_TILEPRO_IMM16_X0_GOT_HA:
3057 case R_TILEPRO_IMM16_X1_GOT_HA:
3058 /* Relocation is to the entry for this symbol in the global
3059 offset table. */
3060 if (htab->elf.sgot == NULL)
3061 abort ();
3062
3063 if (h != NULL)
3064 {
3065 bfd_boolean dyn;
3066
3067 off = h->got.offset;
3068 BFD_ASSERT (off != (bfd_vma) -1);
3069 dyn = elf_hash_table (info)->dynamic_sections_created;
3070
3071 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
3072 bfd_link_pic (info),
3073 h)
3074 || (bfd_link_pic (info)
3075 && SYMBOL_REFERENCES_LOCAL (info, h)))
3076 {
3077 /* This is actually a static link, or it is a
3078 -Bsymbolic link and the symbol is defined
3079 locally, or the symbol was forced to be local
3080 because of a version file. We must initialize
3081 this entry in the global offset table. Since the
3082 offset must always be a multiple
3083 of 4 for 32-bit, we use the least significant bit
3084 to record whether we have initialized it already.
3085
3086 When doing a dynamic link, we create a .rela.got
3087 relocation entry to initialize the value. This
3088 is done in the finish_dynamic_symbol routine. */
3089 if ((off & 1) != 0)
3090 off &= ~1;
3091 else
3092 {
3093 bfd_put_32 (output_bfd, relocation,
3094 htab->elf.sgot->contents + off);
3095 h->got.offset |= 1;
3096 }
3097 }
3098 else
3099 unresolved_reloc = FALSE;
3100 }
3101 else
3102 {
3103 BFD_ASSERT (local_got_offsets != NULL
3104 && local_got_offsets[r_symndx] != (bfd_vma) -1);
3105
3106 off = local_got_offsets[r_symndx];
3107
3108 /* The offset must always be a multiple of 4 on 32-bit.
3109 We use the least significant bit to record
3110 whether we have already processed this entry. */
3111 if ((off & 1) != 0)
3112 off &= ~1;
3113 else
3114 {
3115 if (bfd_link_pic (info))
3116 {
3117 asection *s;
3118 Elf_Internal_Rela outrel;
3119
3120 /* We need to generate a R_TILEPRO_RELATIVE reloc
3121 for the dynamic linker. */
3122 s = htab->elf.srelgot;
3123 BFD_ASSERT (s != NULL);
3124
3125 outrel.r_offset = (htab->elf.sgot->output_section->vma
3126 + htab->elf.sgot->output_offset
3127 + off);
3128 outrel.r_info = ELF32_R_INFO (0, R_TILEPRO_RELATIVE);
3129 outrel.r_addend = relocation;
3130 relocation = 0;
3131 tilepro_elf_append_rela_32 (output_bfd, s, &outrel);
3132 }
3133
3134 bfd_put_32 (output_bfd, relocation,
3135 htab->elf.sgot->contents + off);
3136 local_got_offsets[r_symndx] |= 1;
3137 }
3138 }
3139 relocation = off - got_base;
3140 break;
3141
3142 case R_TILEPRO_JOFFLONG_X1_PLT:
3143 /* Relocation is to the entry for this symbol in the
3144 procedure linkage table. */
3145 BFD_ASSERT (h != NULL);
3146
3147 if (h->plt.offset == (bfd_vma) -1 || htab->elf.splt == NULL)
3148 {
3149 /* We didn't make a PLT entry for this symbol. This
3150 happens when statically linking PIC code, or when
3151 using -Bsymbolic. */
3152 break;
3153 }
3154
3155 relocation = (htab->elf.splt->output_section->vma
3156 + htab->elf.splt->output_offset
3157 + h->plt.offset);
3158 unresolved_reloc = FALSE;
3159 break;
3160
3161 case R_TILEPRO_32_PCREL:
3162 case R_TILEPRO_16_PCREL:
3163 case R_TILEPRO_8_PCREL:
3164 case R_TILEPRO_IMM16_X0_PCREL:
3165 case R_TILEPRO_IMM16_X1_PCREL:
3166 case R_TILEPRO_IMM16_X0_LO_PCREL:
3167 case R_TILEPRO_IMM16_X1_LO_PCREL:
3168 case R_TILEPRO_IMM16_X0_HI_PCREL:
3169 case R_TILEPRO_IMM16_X1_HI_PCREL:
3170 case R_TILEPRO_IMM16_X0_HA_PCREL:
3171 case R_TILEPRO_IMM16_X1_HA_PCREL:
3172 if (h != NULL
3173 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
3174 break;
3175 /* Fall through. */
3176 case R_TILEPRO_32:
3177 case R_TILEPRO_16:
3178 case R_TILEPRO_8:
3179 case R_TILEPRO_LO16:
3180 case R_TILEPRO_HI16:
3181 case R_TILEPRO_HA16:
3182 case R_TILEPRO_COPY:
3183 case R_TILEPRO_GLOB_DAT:
3184 case R_TILEPRO_JMP_SLOT:
3185 case R_TILEPRO_RELATIVE:
3186 case R_TILEPRO_BROFF_X1:
3187 case R_TILEPRO_JOFFLONG_X1:
3188 case R_TILEPRO_IMM8_X0:
3189 case R_TILEPRO_IMM8_Y0:
3190 case R_TILEPRO_IMM8_X1:
3191 case R_TILEPRO_IMM8_Y1:
3192 case R_TILEPRO_DEST_IMM8_X1:
3193 case R_TILEPRO_MT_IMM15_X1:
3194 case R_TILEPRO_MF_IMM15_X1:
3195 case R_TILEPRO_IMM16_X0:
3196 case R_TILEPRO_IMM16_X1:
3197 case R_TILEPRO_IMM16_X0_LO:
3198 case R_TILEPRO_IMM16_X1_LO:
3199 case R_TILEPRO_IMM16_X0_HI:
3200 case R_TILEPRO_IMM16_X1_HI:
3201 case R_TILEPRO_IMM16_X0_HA:
3202 case R_TILEPRO_IMM16_X1_HA:
3203 case R_TILEPRO_MMSTART_X0:
3204 case R_TILEPRO_MMEND_X0:
3205 case R_TILEPRO_MMSTART_X1:
3206 case R_TILEPRO_MMEND_X1:
3207 case R_TILEPRO_SHAMT_X0:
3208 case R_TILEPRO_SHAMT_X1:
3209 case R_TILEPRO_SHAMT_Y0:
3210 case R_TILEPRO_SHAMT_Y1:
3211 if ((input_section->flags & SEC_ALLOC) == 0)
3212 break;
3213
3214 if ((bfd_link_pic (info)
3215 && (h == NULL
3216 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
3217 || h->root.type != bfd_link_hash_undefweak)
3218 && (! howto->pc_relative
3219 || !SYMBOL_CALLS_LOCAL (info, h)))
3220 || (!bfd_link_pic (info)
3221 && h != NULL
3222 && h->dynindx != -1
3223 && !h->non_got_ref
3224 && ((h->def_dynamic
3225 && !h->def_regular)
3226 || h->root.type == bfd_link_hash_undefweak
3227 || h->root.type == bfd_link_hash_undefined)))
3228 {
3229 Elf_Internal_Rela outrel;
3230 bfd_boolean skip, relocate = FALSE;
3231
3232 /* When generating a shared object, these relocations
3233 are copied into the output file to be resolved at run
3234 time. */
3235
3236 BFD_ASSERT (sreloc != NULL);
3237
3238 skip = FALSE;
3239
3240 outrel.r_offset =
3241 _bfd_elf_section_offset (output_bfd, info, input_section,
3242 rel->r_offset);
3243 if (outrel.r_offset == (bfd_vma) -1)
3244 skip = TRUE;
3245 else if (outrel.r_offset == (bfd_vma) -2)
3246 skip = TRUE, relocate = TRUE;
3247 outrel.r_offset += (input_section->output_section->vma
3248 + input_section->output_offset);
3249
3250 switch (r_type)
3251 {
3252 case R_TILEPRO_32_PCREL:
3253 case R_TILEPRO_16_PCREL:
3254 case R_TILEPRO_8_PCREL:
3255 /* If the symbol is not dynamic, we should not keep
3256 a dynamic relocation. But an .rela.* slot has been
3257 allocated for it, output R_TILEPRO_NONE.
3258 FIXME: Add code tracking needed dynamic relocs as
3259 e.g. i386 has. */
3260 if (h->dynindx == -1)
3261 skip = TRUE, relocate = TRUE;
3262 break;
3263 }
3264
3265 if (skip)
3266 memset (&outrel, 0, sizeof outrel);
3267 /* h->dynindx may be -1 if the symbol was marked to
3268 become local. */
3269 else if (h != NULL &&
3270 h->dynindx != -1
3271 && (! is_plt
3272 || !bfd_link_pic (info)
3273 || !SYMBOLIC_BIND (info, h)
3274 || !h->def_regular))
3275 {
3276 BFD_ASSERT (h->dynindx != -1);
3277 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
3278 outrel.r_addend = rel->r_addend;
3279 }
3280 else
3281 {
3282 if (r_type == R_TILEPRO_32)
3283 {
3284 outrel.r_info = ELF32_R_INFO (0, R_TILEPRO_RELATIVE);
3285 outrel.r_addend = relocation + rel->r_addend;
3286 }
3287 else
3288 {
3289 long indx;
3290
3291 outrel.r_addend = relocation + rel->r_addend;
3292
3293 if (is_plt)
3294 sec = htab->elf.splt;
3295
3296 if (bfd_is_abs_section (sec))
3297 indx = 0;
3298 else if (sec == NULL || sec->owner == NULL)
3299 {
3300 bfd_set_error (bfd_error_bad_value);
3301 return FALSE;
3302 }
3303 else
3304 {
3305 asection *osec;
3306
3307 /* We are turning this relocation into one
3308 against a section symbol. It would be
3309 proper to subtract the symbol's value,
3310 osec->vma, from the emitted reloc addend,
3311 but ld.so expects buggy relocs. */
3312 osec = sec->output_section;
3313 indx = elf_section_data (osec)->dynindx;
3314
3315 if (indx == 0)
3316 {
3317 osec = htab->elf.text_index_section;
3318 indx = elf_section_data (osec)->dynindx;
3319 }
3320
3321 /* FIXME: we really should be able to link non-pic
3322 shared libraries. */
3323 if (indx == 0)
3324 {
3325 BFD_FAIL ();
3326 _bfd_error_handler
3327 (_("%B: probably compiled without -fPIC?"),
3328 input_bfd);
3329 bfd_set_error (bfd_error_bad_value);
3330 return FALSE;
3331 }
3332 }
3333
3334 outrel.r_info = ELF32_R_INFO (indx, r_type);
3335 }
3336 }
3337
3338 tilepro_elf_append_rela_32 (output_bfd, sreloc, &outrel);
3339
3340 /* This reloc will be computed at runtime, so there's no
3341 need to do anything now. */
3342 if (! relocate)
3343 continue;
3344 }
3345 break;
3346
3347 case R_TILEPRO_IMM16_X0_TLS_LE:
3348 case R_TILEPRO_IMM16_X1_TLS_LE:
3349 case R_TILEPRO_IMM16_X0_TLS_LE_LO:
3350 case R_TILEPRO_IMM16_X1_TLS_LE_LO:
3351 case R_TILEPRO_IMM16_X0_TLS_LE_HI:
3352 case R_TILEPRO_IMM16_X1_TLS_LE_HI:
3353 case R_TILEPRO_IMM16_X0_TLS_LE_HA:
3354 case R_TILEPRO_IMM16_X1_TLS_LE_HA:
3355 if (bfd_link_pic (info))
3356 {
3357 Elf_Internal_Rela outrel;
3358 bfd_boolean skip;
3359
3360 BFD_ASSERT (sreloc != NULL);
3361 skip = FALSE;
3362 outrel.r_offset =
3363 _bfd_elf_section_offset (output_bfd, info, input_section,
3364 rel->r_offset);
3365 if (outrel.r_offset == (bfd_vma) -1)
3366 skip = TRUE;
3367 else if (outrel.r_offset == (bfd_vma) -2)
3368 skip = TRUE;
3369 outrel.r_offset += (input_section->output_section->vma
3370 + input_section->output_offset);
3371 if (skip)
3372 memset (&outrel, 0, sizeof outrel);
3373 else
3374 {
3375 outrel.r_info = ELF32_R_INFO (0, r_type);
3376 outrel.r_addend = relocation - dtpoff_base (info)
3377 + rel->r_addend;
3378 }
3379
3380 tilepro_elf_append_rela_32 (output_bfd, sreloc, &outrel);
3381 continue;
3382 }
3383 relocation = tpoff (info, relocation);
3384 break;
3385
3386 case R_TILEPRO_IMM16_X0_TLS_GD:
3387 case R_TILEPRO_IMM16_X1_TLS_GD:
3388 case R_TILEPRO_IMM16_X0_TLS_GD_LO:
3389 case R_TILEPRO_IMM16_X1_TLS_GD_LO:
3390 case R_TILEPRO_IMM16_X0_TLS_GD_HI:
3391 case R_TILEPRO_IMM16_X1_TLS_GD_HI:
3392 case R_TILEPRO_IMM16_X0_TLS_GD_HA:
3393 case R_TILEPRO_IMM16_X1_TLS_GD_HA:
3394 case R_TILEPRO_IMM16_X0_TLS_IE:
3395 case R_TILEPRO_IMM16_X1_TLS_IE:
3396 case R_TILEPRO_IMM16_X0_TLS_IE_LO:
3397 case R_TILEPRO_IMM16_X1_TLS_IE_LO:
3398 case R_TILEPRO_IMM16_X0_TLS_IE_HI:
3399 case R_TILEPRO_IMM16_X1_TLS_IE_HI:
3400 case R_TILEPRO_IMM16_X0_TLS_IE_HA:
3401 case R_TILEPRO_IMM16_X1_TLS_IE_HA:
3402 r_type = tilepro_elf_tls_transition (info, r_type, h == NULL);
3403 tls_type = GOT_UNKNOWN;
3404 if (h == NULL && local_got_offsets)
3405 tls_type
3406 = _bfd_tilepro_elf_local_got_tls_type (input_bfd) [r_symndx];
3407 else if (h != NULL)
3408 {
3409 tls_type = tilepro_elf_hash_entry(h)->tls_type;
3410 if (!bfd_link_pic (info) && h->dynindx == -1 && tls_type == GOT_TLS_IE)
3411 r_type = tilepro_tls_translate_to_le (r_type);
3412 }
3413 if (tls_type == GOT_TLS_IE)
3414 r_type = tilepro_tls_translate_to_ie (r_type);
3415
3416 if (r_type == R_TILEPRO_IMM16_X0_TLS_LE
3417 || r_type == R_TILEPRO_IMM16_X1_TLS_LE
3418 || r_type == R_TILEPRO_IMM16_X0_TLS_LE_LO
3419 || r_type == R_TILEPRO_IMM16_X1_TLS_LE_LO
3420 || r_type == R_TILEPRO_IMM16_X0_TLS_LE_HI
3421 || r_type == R_TILEPRO_IMM16_X1_TLS_LE_HI
3422 || r_type == R_TILEPRO_IMM16_X0_TLS_LE_HA
3423 || r_type == R_TILEPRO_IMM16_X1_TLS_LE_HA)
3424 {
3425 relocation = tpoff (info, relocation);
3426 break;
3427 }
3428
3429 if (h != NULL)
3430 {
3431 off = h->got.offset;
3432 h->got.offset |= 1;
3433 }
3434 else
3435 {
3436 BFD_ASSERT (local_got_offsets != NULL);
3437 off = local_got_offsets[r_symndx];
3438 local_got_offsets[r_symndx] |= 1;
3439 }
3440
3441 if (htab->elf.sgot == NULL)
3442 abort ();
3443
3444 if ((off & 1) != 0)
3445 off &= ~1;
3446 else
3447 {
3448 Elf_Internal_Rela outrel;
3449 int indx = 0;
3450 bfd_boolean need_relocs = FALSE;
3451
3452 if (htab->elf.srelgot == NULL)
3453 abort ();
3454
3455 if (h != NULL)
3456 {
3457 bfd_boolean dyn;
3458 dyn = htab->elf.dynamic_sections_created;
3459
3460 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
3461 bfd_link_pic (info),
3462 h)
3463 && (!bfd_link_pic (info)
3464 || !SYMBOL_REFERENCES_LOCAL (info, h)))
3465 {
3466 indx = h->dynindx;
3467 }
3468 }
3469
3470 /* The GOT entries have not been initialized yet. Do it
3471 now, and emit any relocations. */
3472 if ((bfd_link_pic (info) || indx != 0)
3473 && (h == NULL
3474 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
3475 || h->root.type != bfd_link_hash_undefweak))
3476 need_relocs = TRUE;
3477
3478 switch (r_type)
3479 {
3480 case R_TILEPRO_IMM16_X0_TLS_IE:
3481 case R_TILEPRO_IMM16_X1_TLS_IE:
3482 case R_TILEPRO_IMM16_X0_TLS_IE_LO:
3483 case R_TILEPRO_IMM16_X1_TLS_IE_LO:
3484 case R_TILEPRO_IMM16_X0_TLS_IE_HI:
3485 case R_TILEPRO_IMM16_X1_TLS_IE_HI:
3486 case R_TILEPRO_IMM16_X0_TLS_IE_HA:
3487 case R_TILEPRO_IMM16_X1_TLS_IE_HA:
3488 if (need_relocs) {
3489 bfd_put_32 (output_bfd, 0, htab->elf.sgot->contents + off);
3490 outrel.r_offset = (htab->elf.sgot->output_section->vma
3491 + htab->elf.sgot->output_offset + off);
3492 outrel.r_addend = 0;
3493 if (indx == 0)
3494 outrel.r_addend = relocation - dtpoff_base (info);
3495 outrel.r_info = ELF32_R_INFO (indx, R_TILEPRO_TLS_TPOFF32);
3496 tilepro_elf_append_rela_32 (output_bfd, htab->elf.srelgot,
3497 &outrel);
3498 } else {
3499 bfd_put_32 (output_bfd, tpoff (info, relocation),
3500 htab->elf.sgot->contents + off);
3501 }
3502 break;
3503
3504 case R_TILEPRO_IMM16_X0_TLS_GD:
3505 case R_TILEPRO_IMM16_X1_TLS_GD:
3506 case R_TILEPRO_IMM16_X0_TLS_GD_LO:
3507 case R_TILEPRO_IMM16_X1_TLS_GD_LO:
3508 case R_TILEPRO_IMM16_X0_TLS_GD_HI:
3509 case R_TILEPRO_IMM16_X1_TLS_GD_HI:
3510 case R_TILEPRO_IMM16_X0_TLS_GD_HA:
3511 case R_TILEPRO_IMM16_X1_TLS_GD_HA:
3512 if (need_relocs) {
3513 outrel.r_offset = (htab->elf.sgot->output_section->vma
3514 + htab->elf.sgot->output_offset + off);
3515 outrel.r_addend = 0;
3516 outrel.r_info = ELF32_R_INFO (indx, R_TILEPRO_TLS_DTPMOD32);
3517 bfd_put_32 (output_bfd, 0, htab->elf.sgot->contents + off);
3518 tilepro_elf_append_rela_32 (output_bfd, htab->elf.srelgot,
3519 &outrel);
3520 if (indx == 0)
3521 {
3522 BFD_ASSERT (! unresolved_reloc);
3523 bfd_put_32 (output_bfd,
3524 relocation - dtpoff_base (info),
3525 (htab->elf.sgot->contents + off +
3526 TILEPRO_BYTES_PER_WORD));
3527 }
3528 else
3529 {
3530 bfd_put_32 (output_bfd, 0,
3531 (htab->elf.sgot->contents + off +
3532 TILEPRO_BYTES_PER_WORD));
3533 outrel.r_info = ELF32_R_INFO (indx,
3534 R_TILEPRO_TLS_DTPOFF32);
3535 outrel.r_offset += TILEPRO_BYTES_PER_WORD;
3536 tilepro_elf_append_rela_32 (output_bfd,
3537 htab->elf.srelgot, &outrel);
3538 }
3539 }
3540
3541 else {
3542 /* If we are not emitting relocations for a
3543 general dynamic reference, then we must be in a
3544 static link or an executable link with the
3545 symbol binding locally. Mark it as belonging
3546 to module 1, the executable. */
3547 bfd_put_32 (output_bfd, 1,
3548 htab->elf.sgot->contents + off );
3549 bfd_put_32 (output_bfd, relocation - dtpoff_base (info),
3550 htab->elf.sgot->contents + off +
3551 TILEPRO_BYTES_PER_WORD);
3552 }
3553 break;
3554 }
3555 }
3556
3557 if (off >= (bfd_vma) -2)
3558 abort ();
3559
3560 relocation = off - got_base;
3561 unresolved_reloc = FALSE;
3562 howto = tilepro_elf_howto_table + r_type;
3563 break;
3564
3565 default:
3566 break;
3567 }
3568
3569 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
3570 because such sections are not SEC_ALLOC and thus ld.so will
3571 not process them. */
3572 if (unresolved_reloc
3573 && !((input_section->flags & SEC_DEBUGGING) != 0
3574 && h->def_dynamic)
3575 && _bfd_elf_section_offset (output_bfd, info, input_section,
3576 rel->r_offset) != (bfd_vma) -1)
3577 _bfd_error_handler
3578 /* xgettext:c-format */
3579 (_("%B(%A+0x%lx): unresolvable %s relocation against symbol `%s'"),
3580 input_bfd,
3581 input_section,
3582 (long) rel->r_offset,
3583 howto->name,
3584 h->root.root.string);
3585
3586 r = bfd_reloc_continue;
3587
3588 /* For the _HA types, we add 0x8000 so that if bit 15 is set,
3589 * we will increment bit 16. The howto->rightshift takes care
3590 * of the rest for us. */
3591 switch (r_type)
3592 {
3593 case R_TILEPRO_HA16:
3594 case R_TILEPRO_IMM16_X0_HA:
3595 case R_TILEPRO_IMM16_X1_HA:
3596 case R_TILEPRO_IMM16_X0_HA_PCREL:
3597 case R_TILEPRO_IMM16_X1_HA_PCREL:
3598 case R_TILEPRO_IMM16_X0_GOT_HA:
3599 case R_TILEPRO_IMM16_X1_GOT_HA:
3600 case R_TILEPRO_IMM16_X0_TLS_GD_HA:
3601 case R_TILEPRO_IMM16_X1_TLS_GD_HA:
3602 case R_TILEPRO_IMM16_X0_TLS_IE_HA:
3603 case R_TILEPRO_IMM16_X1_TLS_IE_HA:
3604 relocation += 0x8000;
3605 break;
3606 }
3607
3608 /* Get the operand creation function, if any. */
3609 create_func = reloc_to_create_func[r_type];
3610 if (create_func == NULL)
3611 {
3612 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3613 contents, rel->r_offset,
3614 relocation, rel->r_addend);
3615 }
3616 else
3617 {
3618 if (howto->pc_relative)
3619 {
3620 relocation -=
3621 input_section->output_section->vma + input_section->output_offset;
3622 if (howto->pcrel_offset)
3623 relocation -= rel->r_offset;
3624 }
3625
3626 bfd_byte *data;
3627
3628 /* Add the relocation addend if any to the final target value */
3629 relocation += rel->r_addend;
3630
3631 /* Do basic range checking */
3632 r = bfd_check_overflow (howto->complain_on_overflow,
3633 howto->bitsize,
3634 howto->rightshift,
3635 32,
3636 relocation);
3637
3638 /*
3639 * Write the relocated value out into the raw section data.
3640 * Don't put a relocation out in the .rela section.
3641 */
3642 tilepro_bundle_bits mask = create_func(-1);
3643 tilepro_bundle_bits value = create_func(relocation >> howto->rightshift);
3644
3645 /* Only touch bytes while the mask is not 0, so we
3646 don't write to out of bounds memory if this is actually
3647 a 16-bit switch instruction. */
3648 for (data = contents + rel->r_offset; mask != 0; data++)
3649 {
3650 bfd_byte byte_mask = (bfd_byte)mask;
3651 *data = (*data & ~byte_mask) | ((bfd_byte)value & byte_mask);
3652 mask >>= 8;
3653 value >>= 8;
3654 }
3655 }
3656
3657 if (r != bfd_reloc_ok)
3658 {
3659 const char *msg = NULL;
3660
3661 switch (r)
3662 {
3663 case bfd_reloc_overflow:
3664 (*info->callbacks->reloc_overflow)
3665 (info, (h ? &h->root : NULL), name, howto->name,
3666 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
3667 break;
3668
3669 case bfd_reloc_undefined:
3670 (*info->callbacks->undefined_symbol)
3671 (info, name, input_bfd, input_section, rel->r_offset, TRUE);
3672 break;
3673
3674 case bfd_reloc_outofrange:
3675 msg = _("internal error: out of range error");
3676 break;
3677
3678 case bfd_reloc_notsupported:
3679 msg = _("internal error: unsupported relocation error");
3680 break;
3681
3682 case bfd_reloc_dangerous:
3683 msg = _("internal error: dangerous relocation");
3684 break;
3685
3686 default:
3687 msg = _("internal error: unknown error");
3688 break;
3689 }
3690
3691 if (msg)
3692 (*info->callbacks->warning) (info, msg, name, input_bfd,
3693 input_section, rel->r_offset);
3694 }
3695 }
3696
3697 return TRUE;
3698 }
3699
3700 /* Finish up dynamic symbol handling. We set the contents of various
3701 dynamic sections here. */
3702
3703 static bfd_boolean
3704 tilepro_elf_finish_dynamic_symbol (bfd *output_bfd,
3705 struct bfd_link_info *info,
3706 struct elf_link_hash_entry *h,
3707 Elf_Internal_Sym *sym)
3708 {
3709 struct tilepro_elf_link_hash_table *htab;
3710
3711 htab = tilepro_elf_hash_table (info);
3712 BFD_ASSERT (htab != NULL);
3713
3714 if (h->plt.offset != (bfd_vma) -1)
3715 {
3716 asection *splt;
3717 asection *srela;
3718 asection *sgotplt;
3719 Elf_Internal_Rela rela;
3720 bfd_byte *loc;
3721 bfd_vma r_offset;
3722
3723 int rela_index;
3724
3725 /* This symbol has an entry in the PLT. Set it up. */
3726
3727 BFD_ASSERT (h->dynindx != -1);
3728
3729 splt = htab->elf.splt;
3730 srela = htab->elf.srelplt;
3731 sgotplt = htab->elf.sgotplt;
3732
3733 if (splt == NULL || srela == NULL)
3734 abort ();
3735
3736 /* Fill in the entry in the procedure linkage table. */
3737 rela_index = tilepro_plt_entry_build (splt, sgotplt, h->plt.offset,
3738 &r_offset);
3739
3740 /* Fill in the entry in the global offset table, which initially points
3741 to the beginning of the plt. */
3742 bfd_put_32 (output_bfd, splt->output_section->vma + splt->output_offset,
3743 sgotplt->contents + r_offset);
3744
3745 /* Fill in the entry in the .rela.plt section. */
3746 rela.r_offset = (sgotplt->output_section->vma
3747 + sgotplt->output_offset
3748 + r_offset);
3749 rela.r_addend = 0;
3750 rela.r_info = ELF32_R_INFO (h->dynindx, R_TILEPRO_JMP_SLOT);
3751
3752 loc = srela->contents + rela_index * sizeof (Elf32_External_Rela);
3753 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3754
3755 if (!h->def_regular)
3756 {
3757 /* Mark the symbol as undefined, rather than as defined in
3758 the .plt section. Leave the value alone. */
3759 sym->st_shndx = SHN_UNDEF;
3760 /* If the symbol is weak, we do need to clear the value.
3761 Otherwise, the PLT entry would provide a definition for
3762 the symbol even if the symbol wasn't defined anywhere,
3763 and so the symbol would never be NULL. */
3764 if (!h->ref_regular_nonweak)
3765 sym->st_value = 0;
3766 }
3767 }
3768
3769 if (h->got.offset != (bfd_vma) -1
3770 && tilepro_elf_hash_entry(h)->tls_type != GOT_TLS_GD
3771 && tilepro_elf_hash_entry(h)->tls_type != GOT_TLS_IE)
3772 {
3773 asection *sgot;
3774 asection *srela;
3775 Elf_Internal_Rela rela;
3776
3777 /* This symbol has an entry in the GOT. Set it up. */
3778
3779 sgot = htab->elf.sgot;
3780 srela = htab->elf.srelgot;
3781 BFD_ASSERT (sgot != NULL && srela != NULL);
3782
3783 rela.r_offset = (sgot->output_section->vma
3784 + sgot->output_offset
3785 + (h->got.offset &~ (bfd_vma) 1));
3786
3787 /* If this is a -Bsymbolic link, and the symbol is defined
3788 locally, we just want to emit a RELATIVE reloc. Likewise if
3789 the symbol was forced to be local because of a version file.
3790 The entry in the global offset table will already have been
3791 initialized in the relocate_section function. */
3792 if (bfd_link_pic (info)
3793 && (info->symbolic || h->dynindx == -1)
3794 && h->def_regular)
3795 {
3796 asection *sec = h->root.u.def.section;
3797 rela.r_info = ELF32_R_INFO (0, R_TILEPRO_RELATIVE);
3798 rela.r_addend = (h->root.u.def.value
3799 + sec->output_section->vma
3800 + sec->output_offset);
3801 }
3802 else
3803 {
3804 rela.r_info = ELF32_R_INFO (h->dynindx, R_TILEPRO_GLOB_DAT);
3805 rela.r_addend = 0;
3806 }
3807
3808 bfd_put_32 (output_bfd, 0,
3809 sgot->contents + (h->got.offset & ~(bfd_vma) 1));
3810 tilepro_elf_append_rela_32 (output_bfd, srela, &rela);
3811 }
3812
3813 if (h->needs_copy)
3814 {
3815 asection *s;
3816 Elf_Internal_Rela rela;
3817
3818 /* This symbols needs a copy reloc. Set it up. */
3819 BFD_ASSERT (h->dynindx != -1);
3820
3821 s = htab->srelbss;
3822 BFD_ASSERT (s != NULL);
3823
3824 rela.r_offset = (h->root.u.def.value
3825 + h->root.u.def.section->output_section->vma
3826 + h->root.u.def.section->output_offset);
3827 rela.r_info = ELF32_R_INFO (h->dynindx, R_TILEPRO_COPY);
3828 rela.r_addend = 0;
3829 tilepro_elf_append_rela_32 (output_bfd, s, &rela);
3830 }
3831
3832 /* Mark some specially defined symbols as absolute. */
3833 if (h == htab->elf.hdynamic
3834 || (h == htab->elf.hgot || h == htab->elf.hplt))
3835 sym->st_shndx = SHN_ABS;
3836
3837 return TRUE;
3838 }
3839
3840 /* Finish up the dynamic sections. */
3841
3842 static bfd_boolean
3843 tilepro_finish_dyn (bfd *output_bfd, struct bfd_link_info *info,
3844 bfd *dynobj, asection *sdyn,
3845 asection *splt ATTRIBUTE_UNUSED)
3846 {
3847 Elf32_External_Dyn *dyncon, *dynconend;
3848 struct tilepro_elf_link_hash_table *htab;
3849
3850 htab = tilepro_elf_hash_table (info);
3851 BFD_ASSERT (htab != NULL);
3852 dyncon = (Elf32_External_Dyn *) sdyn->contents;
3853 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
3854 for (; dyncon < dynconend; dyncon++)
3855 {
3856 Elf_Internal_Dyn dyn;
3857 asection *s;
3858
3859 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
3860
3861 switch (dyn.d_tag)
3862 {
3863 case DT_PLTGOT:
3864 s = htab->elf.sgotplt;
3865 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3866 break;
3867 case DT_JMPREL:
3868 s = htab->elf.srelplt;
3869 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3870 break;
3871 case DT_PLTRELSZ:
3872 s = htab->elf.srelplt;
3873 dyn.d_un.d_val = s->size;
3874 break;
3875 default:
3876 continue;
3877 }
3878
3879 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
3880 }
3881 return TRUE;
3882 }
3883
3884 static bfd_boolean
3885 tilepro_elf_finish_dynamic_sections (bfd *output_bfd,
3886 struct bfd_link_info *info)
3887 {
3888 bfd *dynobj;
3889 asection *sdyn;
3890 struct tilepro_elf_link_hash_table *htab;
3891
3892 htab = tilepro_elf_hash_table (info);
3893 BFD_ASSERT (htab != NULL);
3894 dynobj = htab->elf.dynobj;
3895
3896 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
3897
3898 if (elf_hash_table (info)->dynamic_sections_created)
3899 {
3900 asection *splt;
3901 bfd_boolean ret;
3902
3903 splt = htab->elf.splt;
3904 BFD_ASSERT (splt != NULL && sdyn != NULL);
3905
3906 ret = tilepro_finish_dyn (output_bfd, info, dynobj, sdyn, splt);
3907
3908 if (ret != TRUE)
3909 return ret;
3910
3911 /* Fill in the first entry in the procedure linkage table. */
3912 if (splt->size > 0)
3913 {
3914 memcpy (splt->contents, tilepro_plt0_entry, PLT_HEADER_SIZE);
3915 memset (splt->contents + PLT_HEADER_SIZE, 0,
3916 PLT_ENTRY_SIZE - PLT_HEADER_SIZE);
3917 }
3918
3919 if (elf_section_data (splt->output_section) != NULL)
3920 elf_section_data (splt->output_section)->this_hdr.sh_entsize
3921 = PLT_ENTRY_SIZE;
3922 }
3923
3924 if (htab->elf.sgotplt)
3925 {
3926 if (bfd_is_abs_section (htab->elf.sgotplt->output_section))
3927 {
3928 _bfd_error_handler
3929 (_("discarded output section: `%A'"), htab->elf.sgotplt);
3930 return FALSE;
3931 }
3932
3933 if (htab->elf.sgotplt->size > 0)
3934 {
3935 /* Write the first two entries in .got.plt, needed for the dynamic
3936 linker. */
3937 bfd_put_32 (output_bfd, (bfd_vma) -1,
3938 htab->elf.sgotplt->contents);
3939 bfd_put_32 (output_bfd, (bfd_vma) 0,
3940 htab->elf.sgotplt->contents + GOT_ENTRY_SIZE);
3941 }
3942
3943 elf_section_data (htab->elf.sgotplt->output_section)->this_hdr.sh_entsize
3944 = GOT_ENTRY_SIZE;
3945 }
3946
3947 if (htab->elf.sgot)
3948 {
3949 if (htab->elf.sgot->size > 0)
3950 {
3951 /* Set the first entry in the global offset table to the address of
3952 the dynamic section. */
3953 bfd_vma val = (sdyn ?
3954 sdyn->output_section->vma + sdyn->output_offset :
3955 0);
3956 bfd_put_32 (output_bfd, val, htab->elf.sgot->contents);
3957 }
3958
3959 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize
3960 = GOT_ENTRY_SIZE;
3961 }
3962
3963 return TRUE;
3964 }
3965
3966 \f
3967
3968 /* Return address for Ith PLT stub in section PLT, for relocation REL
3969 or (bfd_vma) -1 if it should not be included. */
3970
3971 static bfd_vma
3972 tilepro_elf_plt_sym_val (bfd_vma i, const asection *plt,
3973 const arelent *rel ATTRIBUTE_UNUSED)
3974 {
3975 return plt->vma + (i + 1) * PLT_ENTRY_SIZE;
3976 }
3977
3978 static enum elf_reloc_type_class
3979 tilepro_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
3980 const asection *rel_sec ATTRIBUTE_UNUSED,
3981 const Elf_Internal_Rela *rela)
3982 {
3983 switch ((int) ELF32_R_TYPE (rela->r_info))
3984 {
3985 case R_TILEPRO_RELATIVE:
3986 return reloc_class_relative;
3987 case R_TILEPRO_JMP_SLOT:
3988 return reloc_class_plt;
3989 case R_TILEPRO_COPY:
3990 return reloc_class_copy;
3991 default:
3992 return reloc_class_normal;
3993 }
3994 }
3995
3996 static int
3997 tilepro_additional_program_headers (bfd *abfd,
3998 struct bfd_link_info *info ATTRIBUTE_UNUSED)
3999 {
4000 /* Each .intrpt section specified by the user adds another PT_LOAD
4001 header since the sections are discontiguous. */
4002 static const char intrpt_sections[4][9] =
4003 {
4004 ".intrpt0", ".intrpt1", ".intrpt2", ".intrpt3"
4005 };
4006 int count = 0;
4007 int i;
4008
4009 for (i = 0; i < 4; i++)
4010 {
4011 asection *sec = bfd_get_section_by_name (abfd, intrpt_sections[i]);
4012 if (sec != NULL && (sec->flags & SEC_LOAD) != 0)
4013 ++count;
4014 }
4015
4016 /* Add four "padding" headers in to leave room in case a custom linker
4017 script does something fancy. Otherwise ld complains that it ran
4018 out of program headers and refuses to link. */
4019 count += 4;
4020
4021 return count;
4022 }
4023
4024 #define ELF_ARCH bfd_arch_tilepro
4025 #define ELF_TARGET_ID TILEPRO_ELF_DATA
4026 #define ELF_MACHINE_CODE EM_TILEPRO
4027 #define ELF_MAXPAGESIZE 0x10000
4028 #define ELF_COMMONPAGESIZE 0x10000
4029
4030 #define TARGET_LITTLE_SYM tilepro_elf32_vec
4031 #define TARGET_LITTLE_NAME "elf32-tilepro"
4032
4033 #define elf_backend_reloc_type_class tilepro_reloc_type_class
4034
4035 #define bfd_elf32_bfd_reloc_name_lookup tilepro_reloc_name_lookup
4036 #define bfd_elf32_bfd_link_hash_table_create tilepro_elf_link_hash_table_create
4037 #define bfd_elf32_bfd_reloc_type_lookup tilepro_reloc_type_lookup
4038
4039 #define elf_backend_copy_indirect_symbol tilepro_elf_copy_indirect_symbol
4040 #define elf_backend_create_dynamic_sections tilepro_elf_create_dynamic_sections
4041 #define elf_backend_check_relocs tilepro_elf_check_relocs
4042 #define elf_backend_adjust_dynamic_symbol tilepro_elf_adjust_dynamic_symbol
4043 #define elf_backend_omit_section_dynsym tilepro_elf_omit_section_dynsym
4044 #define elf_backend_size_dynamic_sections tilepro_elf_size_dynamic_sections
4045 #define elf_backend_relocate_section tilepro_elf_relocate_section
4046 #define elf_backend_finish_dynamic_symbol tilepro_elf_finish_dynamic_symbol
4047 #define elf_backend_finish_dynamic_sections tilepro_elf_finish_dynamic_sections
4048 #define elf_backend_gc_mark_hook tilepro_elf_gc_mark_hook
4049 #define elf_backend_gc_sweep_hook tilepro_elf_gc_sweep_hook
4050 #define elf_backend_plt_sym_val tilepro_elf_plt_sym_val
4051 #define elf_info_to_howto_rel NULL
4052 #define elf_info_to_howto tilepro_info_to_howto_rela
4053 #define elf_backend_grok_prstatus tilepro_elf_grok_prstatus
4054 #define elf_backend_grok_psinfo tilepro_elf_grok_psinfo
4055 #define elf_backend_additional_program_headers tilepro_additional_program_headers
4056
4057 #define bfd_elf32_mkobject tilepro_elf_mkobject
4058
4059 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
4060
4061 #define elf_backend_can_gc_sections 1
4062 #define elf_backend_can_refcount 1
4063 #define elf_backend_want_got_plt 1
4064 #define elf_backend_plt_readonly 1
4065 /* Align PLT mod 64 byte L2 line size. */
4066 #define elf_backend_plt_alignment 6
4067 #define elf_backend_want_plt_sym 1
4068 #define elf_backend_got_header_size GOT_ENTRY_SIZE
4069 #define elf_backend_rela_normal 1
4070 #define elf_backend_default_execstack 0
4071
4072 #include "elf32-target.h"