]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-arc.c
Update year range in copyright notice of binutils files
[thirdparty/binutils-gdb.git] / bfd / elf32-arc.c
CommitLineData
252b5132 1/* ARC-specific support for 32-bit ELF
250d07de 2 Copyright (C) 1994-2021 Free Software Foundation, Inc.
886a2506 3 Contributed by Cupertino Miranda (cmiranda@synopsys.com).
252b5132 4
0d2bcfaf 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
0d2bcfaf
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
0d2bcfaf 10 (at your option) any later version.
252b5132 11
0d2bcfaf
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
0d2bcfaf
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
47b0e7ad
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
252b5132 21
252b5132 22#include "sysdep.h"
3db64b00 23#include "bfd.h"
252b5132
RH
24#include "libbfd.h"
25#include "elf-bfd.h"
26#include "elf/arc.h"
ea04a8f6 27#include "libiberty.h"
886a2506 28#include "opcode/arc-func.h"
4b0c052e 29#include "opcode/arc.h"
34e967a5 30#include "arc-plt.h"
886a2506 31
53a346d8
CZ
32#define FEATURE_LIST_NAME bfd_feature_list
33#define CONFLICT_LIST bfd_conflict_list
34#include "opcode/arc-attrs.h"
35
08759e0f 36/* #define ARC_ENABLE_DEBUG 1 */
f7e8b360
NC
37#ifdef ARC_ENABLE_DEBUG
38static const char *
34e967a5
MC
39name_for_global_symbol (struct elf_link_hash_entry *h)
40{
41 static char *local_str = "(local)";
42 if (h == NULL)
43 return local_str;
f7e8b360 44 return h->root.root.string;
34e967a5 45}
f7e8b360
NC
46#define ARC_DEBUG(fmt, args...) fprintf (stderr, fmt, ##args)
47#else
48#define ARC_DEBUG(...)
34e967a5
MC
49#endif
50
51
52#define ADD_RELA(BFD, SECTION, OFFSET, SYM_IDX, TYPE, ADDEND) \
53 { \
54 struct elf_link_hash_table *_htab = elf_hash_table (info); \
55 Elf_Internal_Rela _rel; \
23a42089 56 bfd_byte * _loc; \
34e967a5 57 \
be9e3704
CM
58 if (_htab->dynamic_sections_created == TRUE) \
59 { \
60 BFD_ASSERT (_htab->srel##SECTION &&_htab->srel##SECTION->contents); \
07d6d2b8
AM
61 _loc = _htab->srel##SECTION->contents \
62 + ((_htab->srel##SECTION->reloc_count) \
63 * sizeof (Elf32_External_Rela)); \
64 _htab->srel##SECTION->reloc_count++; \
65 _rel.r_addend = ADDEND; \
66 _rel.r_offset = (_htab->s##SECTION)->output_section->vma \
67 + (_htab->s##SECTION)->output_offset + OFFSET; \
68 BFD_ASSERT ((long) SYM_IDX != -1); \
69 _rel.r_info = ELF32_R_INFO (SYM_IDX, TYPE); \
70 bfd_elf32_swap_reloca_out (BFD, &_rel, _loc); \
be9e3704 71 } \
34e967a5 72 }
886a2506 73
886a2506
NC
74#define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
75 case VALUE: \
b05a65d0 76 return "R_" #TYPE; \
886a2506
NC
77 break;
78
79static ATTRIBUTE_UNUSED const char *
80reloc_type_to_name (unsigned int type)
81{
82 switch (type)
83 {
95967518 84#include "elf/arc-reloc.def"
886a2506 85
95967518
CZ
86 default:
87 return "UNKNOWN";
88 break;
886a2506
NC
89 }
90}
68d20676 91
886a2506 92#undef ARC_RELOC_HOWTO
252b5132 93
252b5132
RH
94/* Try to minimize the amount of space occupied by relocation tables
95 on the ROM (not that the ROM won't be swamped by other ELF overhead). */
0d2bcfaf 96
886a2506
NC
97#define USE_REL 1
98
95967518
CZ
99/* Similar with bfd_get_32 but taking into account the
100 middle-endianess of the ARC CPUs. Only to be used in code
101 sections. */
102
ef551643
CZ
103static bfd_vma
104bfd_get_32_me (bfd * abfd,const unsigned char * data)
105{
106 bfd_vma value = 0;
107
95967518 108 if (bfd_big_endian (abfd))
ef551643 109 value = bfd_get_32 (abfd, data);
95967518
CZ
110 else
111 {
112 value = ((bfd_get_8 (abfd, data) & 255) << 16);
113 value |= ((bfd_get_8 (abfd, data + 1) & 255) << 24);
114 value |= (bfd_get_8 (abfd, data + 2) & 255);
115 value |= ((bfd_get_8 (abfd, data + 3) & 255) << 8);
116 }
ef551643
CZ
117
118 return value;
119}
120
121static void
122bfd_put_32_me (bfd *abfd, bfd_vma value,unsigned char *data)
123{
124 bfd_put_16 (abfd, (value & 0xffff0000) >> 16, data);
125 bfd_put_16 (abfd, value & 0xffff, data + 2);
126}
127
886a2506
NC
128static ATTRIBUTE_UNUSED bfd_boolean
129is_reloc_PC_relative (reloc_howto_type *howto)
130{
131 return (strstr (howto->name, "PC") != NULL) ? TRUE : FALSE;
132}
133
134static bfd_boolean
135is_reloc_SDA_relative (reloc_howto_type *howto)
136{
137 return (strstr (howto->name, "SDA") != NULL) ? TRUE : FALSE;
138}
139
140static bfd_boolean
141is_reloc_for_GOT (reloc_howto_type * howto)
142{
34e967a5
MC
143 if (strstr (howto->name, "TLS") != NULL)
144 return FALSE;
886a2506
NC
145 return (strstr (howto->name, "GOT") != NULL) ? TRUE : FALSE;
146}
147
148static bfd_boolean
149is_reloc_for_PLT (reloc_howto_type * howto)
150{
151 return (strstr (howto->name, "PLT") != NULL) ? TRUE : FALSE;
152}
153
34e967a5
MC
154static bfd_boolean
155is_reloc_for_TLS (reloc_howto_type *howto)
156{
157 return (strstr (howto->name, "TLS") != NULL) ? TRUE : FALSE;
158}
159
08759e0f
CM
160struct arc_relocation_data
161{
162 bfd_signed_vma reloc_offset;
163 bfd_signed_vma reloc_addend;
164 bfd_signed_vma got_offset_value;
165
166 bfd_signed_vma sym_value;
167 asection * sym_section;
168
169 reloc_howto_type *howto;
170
171 asection * input_section;
172
173 bfd_signed_vma sdata_begin_symbol_vma;
174 bfd_boolean sdata_begin_symbol_vma_set;
175 bfd_signed_vma got_symbol_vma;
176
177 bfd_boolean should_relocate;
178
179 const char * symbol_name;
180};
181
854b8506
CM
182/* ARC ELF linker hash entry. */
183struct elf_arc_link_hash_entry
184{
185 struct elf_link_hash_entry root;
186
854b8506
CM
187 struct got_entry *got_ents;
188};
189
190
08759e0f 191/* Should be included at this location due to static declarations
68d20676 192 defined before this point. */
08759e0f
CM
193#include "arc-got.h"
194
886a2506
NC
195#define arc_bfd_get_8(A,B,C) bfd_get_8(A,B)
196#define arc_bfd_get_16(A,B,C) bfd_get_16(A,B)
72f3b6aa 197#define arc_bfd_get_32(A,B,C) bfd_get_32(A,B)
886a2506
NC
198#define arc_bfd_put_8(A,B,C,D) bfd_put_8(A,B,C)
199#define arc_bfd_put_16(A,B,C,D) bfd_put_16(A,B,C)
72f3b6aa 200#define arc_bfd_put_32(A,B,C,D) bfd_put_32(A,B,C)
886a2506 201
252b5132 202
47b0e7ad 203static bfd_reloc_status_type
886a2506
NC
204arc_elf_reloc (bfd *abfd ATTRIBUTE_UNUSED,
205 arelent *reloc_entry,
206 asymbol *symbol_in,
207 void *data ATTRIBUTE_UNUSED,
208 asection *input_section,
209 bfd *output_bfd,
210 char ** error_message ATTRIBUTE_UNUSED)
211{
212 if (output_bfd != NULL)
213 {
214 reloc_entry->address += input_section->output_offset;
215
216 /* In case of relocateable link and if the reloc is against a
217 section symbol, the addend needs to be adjusted according to
218 where the section symbol winds up in the output section. */
219 if ((symbol_in->flags & BSF_SECTION_SYM) && symbol_in->section)
220 reloc_entry->addend += symbol_in->section->output_offset;
221
222 return bfd_reloc_ok;
223 }
224
225 return bfd_reloc_continue;
226}
227
228
229#define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
230 TYPE = VALUE,
68d20676 231
886a2506
NC
232enum howto_list
233{
234#include "elf/arc-reloc.def"
235 HOWTO_LIST_LAST
236};
68d20676 237
886a2506
NC
238#undef ARC_RELOC_HOWTO
239
240#define ARC_RELOC_HOWTO(TYPE, VALUE, RSIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
f7e8b360
NC
241 [TYPE] = HOWTO (R_##TYPE, 0, RSIZE, BITSIZE, FALSE, 0, \
242 complain_overflow_##OVERFLOW, arc_elf_reloc, \
243 "R_" #TYPE, FALSE, 0, 0, FALSE),
886a2506
NC
244
245static struct reloc_howto_struct elf_arc_howto_table[] =
246{
247#include "elf/arc-reloc.def"
34e967a5
MC
248/* Example of what is generated by the preprocessor. Currently kept as an
249 example.
886a2506
NC
250 HOWTO (R_ARC_NONE, // Type.
251 0, // Rightshift.
252 2, // Size (0 = byte, 1 = short, 2 = long).
253 32, // Bitsize.
254 FALSE, // PC_relative.
255 0, // Bitpos.
256 complain_overflow_bitfield, // Complain_on_overflow.
257 bfd_elf_generic_reloc, // Special_function.
258 "R_ARC_NONE", // Name.
259 TRUE, // Partial_inplace.
260 0, // Src_mask.
261 0, // Dst_mask.
262 FALSE), // PCrel_offset.
263*/
264};
265#undef ARC_RELOC_HOWTO
266
68d20676
NC
267static void
268arc_elf_howto_init (void)
886a2506
NC
269{
270#define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
68d20676 271 elf_arc_howto_table[TYPE].pc_relative = \
0a5ff21b 272 (strstr (#FORMULA, " P ") != NULL || strstr (#FORMULA, " PDATA ") != NULL); \
68d20676
NC
273 elf_arc_howto_table[TYPE].dst_mask = RELOC_FUNCTION(0, ~0); \
274 /* Only 32 bit data relocations should be marked as ME. */ \
275 if (strstr (#FORMULA, " ME ") != NULL) \
276 { \
277 BFD_ASSERT (SIZE == 2); \
72f3b6aa 278 }
886a2506 279
34e967a5 280#include "elf/arc-reloc.def"
72f3b6aa 281
47b0e7ad 282}
886a2506 283#undef ARC_RELOC_HOWTO
47b0e7ad 284
886a2506
NC
285
286#define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
287 [TYPE] = VALUE,
68d20676 288
886a2506
NC
289const int howto_table_lookup[] =
290{
34e967a5 291#include "elf/arc-reloc.def"
252b5132 292};
68d20676 293
886a2506
NC
294#undef ARC_RELOC_HOWTO
295
f26dd308
AM
296static reloc_howto_type *
297arc_elf_howto (unsigned int r_type)
298{
299 if (elf_arc_howto_table[R_ARC_32].dst_mask == 0)
300 arc_elf_howto_init ();
301 return &elf_arc_howto_table[r_type];
302}
252b5132
RH
303
304/* Map BFD reloc types to ARC ELF reloc types. */
305
306struct arc_reloc_map
307{
34e967a5 308 bfd_reloc_code_real_type bfd_reloc_val;
08759e0f 309 unsigned char elf_reloc_val;
252b5132
RH
310};
311
8a36df4d
CM
312/* ARC ELF linker hash table. */
313struct elf_arc_link_hash_table
314{
315 struct elf_link_hash_table elf;
8a36df4d
CM
316};
317
318static struct bfd_hash_entry *
319elf_arc_link_hash_newfunc (struct bfd_hash_entry *entry,
320 struct bfd_hash_table *table,
321 const char *string)
322{
854b8506
CM
323 struct elf_arc_link_hash_entry * ret =
324 (struct elf_arc_link_hash_entry *) entry;
325
8a36df4d
CM
326 /* Allocate the structure if it has not already been allocated by a
327 subclass. */
854b8506
CM
328 if (ret == NULL)
329 ret = (struct elf_arc_link_hash_entry *)
330 bfd_hash_allocate (table, sizeof (struct elf_arc_link_hash_entry));
331 if (ret == NULL)
332 return (struct bfd_hash_entry *) ret;
8a36df4d
CM
333
334 /* Call the allocation method of the superclass. */
854b8506
CM
335 ret = ((struct elf_arc_link_hash_entry *)
336 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
337 table, string));
338 if (ret != NULL)
8a36df4d 339 {
854b8506 340 ret->got_ents = NULL;
8a36df4d
CM
341 }
342
854b8506 343 return (struct bfd_hash_entry *) ret;
8a36df4d
CM
344}
345
346/* Destroy an ARC ELF linker hash table. */
347static void
348elf_arc_link_hash_table_free (bfd *obfd)
349{
350 _bfd_elf_link_hash_table_free (obfd);
351}
352
353/* Create an ARC ELF linker hash table. */
354
355static struct bfd_link_hash_table *
356arc_elf_link_hash_table_create (bfd *abfd)
357{
358 struct elf_arc_link_hash_table *ret;
359
360 ret = (struct elf_arc_link_hash_table *) bfd_zmalloc (sizeof (*ret));
361 if (ret == NULL)
362 return NULL;
363
364 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
365 elf_arc_link_hash_newfunc,
366 sizeof (struct elf_arc_link_hash_entry),
367 ARC_ELF_DATA))
368 {
369 free (ret);
370 return NULL;
371 }
372
8a36df4d
CM
373 ret->elf.root.hash_table_free = elf_arc_link_hash_table_free;
374
375 return &ret->elf.root;
376}
377
886a2506
NC
378#define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
379 { BFD_RELOC_##TYPE, R_##TYPE },
68d20676 380
252b5132
RH
381static const struct arc_reloc_map arc_reloc_map[] =
382{
34e967a5
MC
383#include "elf/arc-reloc.def"
384
886a2506
NC
385 {BFD_RELOC_NONE, R_ARC_NONE},
386 {BFD_RELOC_8, R_ARC_8},
387 {BFD_RELOC_16, R_ARC_16},
388 {BFD_RELOC_24, R_ARC_24},
389 {BFD_RELOC_32, R_ARC_32},
252b5132 390};
68d20676 391
886a2506 392#undef ARC_RELOC_HOWTO
252b5132 393
e7f2f959 394typedef ATTRIBUTE_UNUSED unsigned (*replace_func) (unsigned, int ATTRIBUTE_UNUSED);
094fb063
CZ
395
396#define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
397 case TYPE: \
e7f2f959 398 func = RELOC_FUNCTION; \
094fb063 399 break;
68d20676 400
094fb063
CZ
401static replace_func
402get_replace_function (bfd *abfd, unsigned int r_type)
403{
e7f2f959 404 replace_func func = NULL;
094fb063
CZ
405
406 switch (r_type)
407 {
408 #include "elf/arc-reloc.def"
409 }
410
411 if (func == replace_bits24 && bfd_big_endian (abfd))
68d20676 412 func = replace_bits24_be;
094fb063 413
e7f2f959 414 return func;
094fb063
CZ
415}
416#undef ARC_RELOC_HOWTO
417
252b5132 418static reloc_howto_type *
34e967a5 419arc_elf32_bfd_reloc_type_lookup (bfd * abfd ATTRIBUTE_UNUSED,
47b0e7ad 420 bfd_reloc_code_real_type code)
252b5132
RH
421{
422 unsigned int i;
423
ea04a8f6 424 for (i = ARRAY_SIZE (arc_reloc_map); i--;)
886a2506
NC
425 {
426 if (arc_reloc_map[i].bfd_reloc_val == code)
f26dd308 427 return arc_elf_howto (arc_reloc_map[i].elf_reloc_val);
886a2506 428 }
ea04a8f6 429
252b5132
RH
430 return NULL;
431}
432
34e967a5
MC
433/* Function to set the ELF flag bits. */
434static bfd_boolean
435arc_elf_set_private_flags (bfd *abfd, flagword flags)
436{
437 elf_elfheader (abfd)->e_flags = flags;
438 elf_flags_init (abfd) = TRUE;
439 return TRUE;
440}
441
442/* Print private flags. */
443static bfd_boolean
444arc_elf_print_private_bfd_data (bfd *abfd, void * ptr)
445{
446 FILE *file = (FILE *) ptr;
447 flagword flags;
448
449 BFD_ASSERT (abfd != NULL && ptr != NULL);
450
451 /* Print normal ELF private data. */
452 _bfd_elf_print_private_bfd_data (abfd, ptr);
453
454 flags = elf_elfheader (abfd)->e_flags;
455 fprintf (file, _("private flags = 0x%lx:"), (unsigned long) flags);
456
457 switch (flags & EF_ARC_MACH_MSK)
458 {
34e967a5
MC
459 case EF_ARC_CPU_ARCV2HS : fprintf (file, " -mcpu=ARCv2HS"); break;
460 case EF_ARC_CPU_ARCV2EM : fprintf (file, " -mcpu=ARCv2EM"); break;
461 case E_ARC_MACH_ARC600 : fprintf (file, " -mcpu=ARC600"); break;
462 case E_ARC_MACH_ARC601 : fprintf (file, " -mcpu=ARC601"); break;
463 case E_ARC_MACH_ARC700 : fprintf (file, " -mcpu=ARC700"); break;
464 default:
465 fprintf (file, "-mcpu=unknown");
466 break;
467 }
468
469 switch (flags & EF_ARC_OSABI_MSK)
470 {
471 case E_ARC_OSABI_ORIG : fprintf (file, " (ABI:legacy)"); break;
472 case E_ARC_OSABI_V2 : fprintf (file, " (ABI:v2)"); break;
473 case E_ARC_OSABI_V3 : fprintf (file, " (ABI:v3)"); break;
53a346d8 474 case E_ARC_OSABI_V4 : fprintf (file, " (ABI:v4)"); break;
34e967a5 475 default:
53a346d8 476 fprintf (file, " (ABI:unknown)");
34e967a5
MC
477 break;
478 }
479
480 fputc ('\n', file);
481 return TRUE;
482}
483
484/* Copy backend specific data from one object module to another. */
485
486static bfd_boolean
487arc_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
488{
489 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
490 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
491 return TRUE;
492
493 BFD_ASSERT (!elf_flags_init (obfd)
494 || elf_elfheader (obfd)->e_flags == elf_elfheader (ibfd)->e_flags);
495
496 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
497 elf_flags_init (obfd) = TRUE;
498
499 /* Copy object attributes. */
500 _bfd_elf_copy_obj_attributes (ibfd, obfd);
501
502 return _bfd_elf_copy_private_bfd_data (ibfd, obfd);
503}
504
157090f7 505static reloc_howto_type *
34e967a5
MC
506bfd_elf32_bfd_reloc_name_lookup (bfd * abfd ATTRIBUTE_UNUSED,
507 const char *r_name)
157090f7
AM
508{
509 unsigned int i;
510
886a2506 511 for (i = 0; i < ARRAY_SIZE (elf_arc_howto_table); i++)
157090f7
AM
512 if (elf_arc_howto_table[i].name != NULL
513 && strcasecmp (elf_arc_howto_table[i].name, r_name) == 0)
f26dd308 514 return arc_elf_howto (i);
157090f7
AM
515
516 return NULL;
517}
518
886a2506 519/* Set the howto pointer for an ARC ELF reloc. */
34e967a5 520
f3185997
NC
521static bfd_boolean
522arc_info_to_howto_rel (bfd * abfd,
886a2506
NC
523 arelent * cache_ptr,
524 Elf_Internal_Rela * dst)
252b5132
RH
525{
526 unsigned int r_type;
527
528 r_type = ELF32_R_TYPE (dst->r_info);
f3185997
NC
529 if (r_type >= (unsigned int) R_ARC_max)
530 {
531 /* xgettext:c-format */
532 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
533 abfd, r_type);
534 bfd_set_error (bfd_error_bad_value);
535 return FALSE;
536 }
537
f26dd308 538 cache_ptr->howto = arc_elf_howto (r_type);
f3185997 539 return TRUE;
252b5132
RH
540}
541
53a346d8
CZ
542/* Extract CPU features from an NTBS. */
543
544static unsigned
545arc_extract_features (const char *p)
546{
547 unsigned i, r = 0;
548
549 if (!p)
550 return 0;
551
552 for (i = 0; i < ARRAY_SIZE (bfd_feature_list); i++)
553 {
554 char *t = strstr (p, bfd_feature_list[i].attr);
555 unsigned l = strlen (bfd_feature_list[i].attr);
556 if ((t != NULL)
557 && (t[l] == ','
558 || t[l] == '\0'))
559 r |= bfd_feature_list[i].feature;
560 }
561
562 return r;
563}
564
565/* Concatenate two strings. s1 can be NULL but not
566 s2. */
567
568static char *
569arc_stralloc (char * s1, const char * s2)
570{
571 char *p;
572
573 /* Only s1 can be null. */
574 BFD_ASSERT (s2);
575
576 p = s1 ? concat (s1, ",", s2, NULL) : (char *)s2;
577
578 return p;
579}
580
581/* Merge ARC object attributes from IBFD into OBFD. Raise an error if
582 there are conflicting attributes. */
583
584static bfd_boolean
585arc_elf_merge_attributes (bfd *ibfd, struct bfd_link_info *info)
586{
587 bfd *obfd = info->output_bfd;
588 obj_attribute *in_attr;
589 obj_attribute *out_attr;
590 int i;
591 bfd_boolean result = TRUE;
592 const char *sec_name = get_elf_backend_data (ibfd)->obj_attrs_section;
593 char *tagname = NULL;
594
595 /* Skip the linker stubs file. This preserves previous behavior
596 of accepting unknown attributes in the first input file - but
597 is that a bug? */
598 if (ibfd->flags & BFD_LINKER_CREATED)
599 return TRUE;
600
601 /* Skip any input that hasn't attribute section.
602 This enables to link object files without attribute section with
603 any others. */
604 if (bfd_get_section_by_name (ibfd, sec_name) == NULL)
605 return TRUE;
606
607 if (!elf_known_obj_attributes_proc (obfd)[0].i)
608 {
609 /* This is the first object. Copy the attributes. */
610 _bfd_elf_copy_obj_attributes (ibfd, obfd);
611
612 out_attr = elf_known_obj_attributes_proc (obfd);
613
614 /* Use the Tag_null value to indicate the attributes have been
615 initialized. */
616 out_attr[0].i = 1;
617
618 return TRUE;
619 }
620
621 in_attr = elf_known_obj_attributes_proc (ibfd);
622 out_attr = elf_known_obj_attributes_proc (obfd);
623
624 for (i = LEAST_KNOWN_OBJ_ATTRIBUTE; i < NUM_KNOWN_OBJ_ATTRIBUTES; i++)
625 {
626 /* Merge this attribute with existing attributes. */
627 switch (i)
628 {
629 case Tag_ARC_PCS_config:
630 if (out_attr[i].i == 0)
631 out_attr[i].i = in_attr[i].i;
632 else if (in_attr[i].i != 0 && out_attr[i].i != in_attr[i].i)
633 {
634 const char *tagval[] = { "Absent", "Bare-metal/mwdt",
635 "Bare-metal/newlib", "Linux/uclibc",
636 "Linux/glibc" };
637 BFD_ASSERT (in_attr[i].i < 5);
638 BFD_ASSERT (out_attr[i].i < 5);
639 /* It's sometimes ok to mix different configs, so this is only
640 a warning. */
641 _bfd_error_handler
38f14ab8
AM
642 (_("warning: %pB: conflicting platform configuration "
643 "%s with %s"), ibfd,
53a346d8
CZ
644 tagval[in_attr[i].i],
645 tagval[out_attr[i].i]);
646 }
647 break;
648
649 case Tag_ARC_CPU_base:
650 if (out_attr[i].i == 0)
651 out_attr[i].i = in_attr[i].i;
652 else if (in_attr[i].i != 0 && out_attr[i].i != in_attr[i].i
653 && ((out_attr[i].i + in_attr[i].i) < 6))
654 {
655 const char *tagval[] = { "Absent", "ARC6xx", "ARC7xx",
656 "ARCEM", "ARCHS" };
657 BFD_ASSERT (in_attr[i].i < 5);
658 BFD_ASSERT (out_attr[i].i < 5);
659 /* We cannot mix code for different CPUs. */
660 _bfd_error_handler
871b3ab2 661 (_("error: %pB: unable to merge CPU base attributes "
38f14ab8 662 "%s with %s"),
53a346d8
CZ
663 obfd,
664 tagval[in_attr[i].i],
665 tagval[out_attr[i].i]);
666 result = FALSE;
667 break;
668 }
669 else
670 {
671 /* The CPUs may be different, check if we can still mix
672 the objects against the output choosen CPU. */
673 unsigned in_feature = 0;
674 unsigned out_feature = 0;
675 char *p1 = in_attr[Tag_ARC_ISA_config].s;
676 char *p2 = out_attr[Tag_ARC_ISA_config].s;
677 unsigned j;
678 unsigned cpu_out;
679 unsigned opcode_map[] = {0, ARC_OPCODE_ARC600, ARC_OPCODE_ARC700,
680 ARC_OPCODE_ARCv2EM, ARC_OPCODE_ARCv2HS};
681
682 BFD_ASSERT (in_attr[i].i < (sizeof (opcode_map)
683 / sizeof (unsigned)));
684 BFD_ASSERT (out_attr[i].i < (sizeof (opcode_map)
685 / sizeof (unsigned)));
686 cpu_out = opcode_map[out_attr[i].i];
687
688 in_feature = arc_extract_features (p1);
689 out_feature = arc_extract_features (p2);
690
691 /* First, check if a feature is compatible with the
692 output object chosen CPU. */
693 for (j = 0; j < ARRAY_SIZE (bfd_feature_list); j++)
694 if (((in_feature | out_feature) & bfd_feature_list[j].feature)
695 && (!(cpu_out & bfd_feature_list[j].cpus)))
696 {
697 _bfd_error_handler
871b3ab2 698 (_("error: %pB: unable to merge ISA extension attributes "
38f14ab8 699 "%s"),
53a346d8
CZ
700 obfd, bfd_feature_list[j].name);
701 result = FALSE;
702 break;
703 }
704 /* Second, if we have compatible features with the
705 chosen CPU, check if they are compatible among
706 them. */
707 for (j = 0; j < ARRAY_SIZE (bfd_conflict_list); j++)
708 if (((in_feature | out_feature) & bfd_conflict_list[j])
709 == bfd_conflict_list[j])
710 {
711 unsigned k;
712 for (k = 0; k < ARRAY_SIZE (bfd_feature_list); k++)
713 {
714 if (in_feature & bfd_feature_list[k].feature
715 & bfd_conflict_list[j])
716 p1 = (char *) bfd_feature_list[k].name;
717 if (out_feature & bfd_feature_list[k].feature
718 & bfd_conflict_list[j])
719 p2 = (char *) bfd_feature_list[k].name;
720 }
721 _bfd_error_handler
871b3ab2 722 (_("error: %pB: conflicting ISA extension attributes "
38f14ab8 723 "%s with %s"),
53a346d8
CZ
724 obfd, p1, p2);
725 result = FALSE;
726 break;
727 }
728 /* Everithing is alright. */
729 out_feature |= in_feature;
730 p1 = NULL;
731 for (j = 0; j < ARRAY_SIZE (bfd_feature_list); j++)
732 if (out_feature & bfd_feature_list[j].feature)
733 p1 = arc_stralloc (p1, bfd_feature_list[j].attr);
734 if (p1)
735 out_attr[Tag_ARC_ISA_config].s =
736 _bfd_elf_attr_strdup (obfd, p1);
737 }
738 /* Fall through. */
739 case Tag_ARC_CPU_variation:
740 case Tag_ARC_ISA_mpy_option:
741 case Tag_ARC_ABI_osver:
742 /* Use the largest value specified. */
743 if (in_attr[i].i > out_attr[i].i)
744 out_attr[i].i = in_attr[i].i;
745 break;
746
2fd43d78 747 /* The CPU name is given by the vendor, just choose an
748 existing one if missing or different. There are no fail
749 criteria if they different or both missing. */
53a346d8 750 case Tag_ARC_CPU_name:
2fd43d78 751 if (!out_attr[i].s && in_attr[i].s)
752 out_attr[i].s = _bfd_elf_attr_strdup (obfd, in_attr[i].s);
53a346d8
CZ
753 break;
754
755 case Tag_ARC_ABI_rf16:
756 if (out_attr[i].i == 0)
757 out_attr[i].i = in_attr[i].i;
758 else if (out_attr[i].i != in_attr[i].i)
759 {
760 /* We cannot mix code with rf16 and without. */
761 _bfd_error_handler
38f14ab8 762 (_("error: %pB: cannot mix rf16 with full register set %pB"),
53a346d8
CZ
763 obfd, ibfd);
764 result = FALSE;
765 }
766 break;
767
768 case Tag_ARC_ABI_pic:
769 tagname = "PIC";
8e7f04f1 770 /* fall through */
53a346d8
CZ
771 case Tag_ARC_ABI_sda:
772 if (!tagname)
773 tagname = "SDA";
8e7f04f1 774 /* fall through */
53a346d8
CZ
775 case Tag_ARC_ABI_tls:
776 {
777 const char *tagval[] = { "Absent", "MWDT", "GNU" };
778
779 if (!tagname)
780 tagname = "TLS";
781
782 BFD_ASSERT (in_attr[i].i < 3);
783 BFD_ASSERT (out_attr[i].i < 3);
2fd43d78 784 if (out_attr[i].i == 0)
785 out_attr[i].i = in_attr[i].i;
786 else if (out_attr[i].i != 0 && in_attr[i].i != 0
53a346d8
CZ
787 && out_attr[i].i != in_attr[i].i)
788 {
789 _bfd_error_handler
38f14ab8 790 (_("error: %pB: conflicting attributes %s: %s with %s"),
53a346d8
CZ
791 obfd, tagname,
792 tagval[in_attr[i].i],
793 tagval[out_attr[i].i]);
794 result = FALSE;
795 }
796 tagname = NULL;
797 break;
798 }
799
800 case Tag_ARC_ABI_double_size:
801 tagname = "Double size";
8e7f04f1 802 /* fall through */
53a346d8
CZ
803 case Tag_ARC_ABI_enumsize:
804 if (!tagname)
805 tagname = "Enum size";
8e7f04f1 806 /* fall through */
53a346d8
CZ
807 case Tag_ARC_ABI_exceptions:
808 if (!tagname)
809 tagname = "ABI exceptions";
810
2fd43d78 811 if (out_attr[i].i == 0)
812 out_attr[i].i = in_attr[i].i;
813 else if (out_attr[i].i != 0 && in_attr[i].i != 0
53a346d8
CZ
814 && out_attr[i].i != in_attr[i].i)
815 {
816 _bfd_error_handler
38f14ab8 817 (_("error: %pB: conflicting attributes %s"),
53a346d8
CZ
818 obfd, tagname);
819 result = FALSE;
820 }
821 break;
822
823 case Tag_ARC_ISA_apex:
824 break; /* Do nothing for APEX attributes. */
825
826 case Tag_ARC_ISA_config:
827 /* It is handled in Tag_ARC_CPU_base. */
828 break;
829
db1e1b45 830 case Tag_ARC_ATR_version:
831 if (out_attr[i].i == 0)
832 out_attr[i].i = in_attr[i].i;
833 break;
834
53a346d8
CZ
835 default:
836 result
837 = result && _bfd_elf_merge_unknown_attribute_low (ibfd, obfd, i);
838 }
839
840 /* If out_attr was copied from in_attr then it won't have a type yet. */
841 if (in_attr[i].type && !out_attr[i].type)
842 out_attr[i].type = in_attr[i].type;
843 }
844
845 /* Merge Tag_compatibility attributes and any common GNU ones. */
846 if (!_bfd_elf_merge_object_attributes (ibfd, info))
847 return FALSE;
848
849 /* Check for any attributes not known on ARC. */
850 result &= _bfd_elf_merge_unknown_attribute_list (ibfd, obfd);
851
852 return result;
853}
854
34e967a5
MC
855/* Merge backend specific data from an object file to the output
856 object file when linking. */
857
858static bfd_boolean
50e03d47 859arc_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
34e967a5 860{
50e03d47 861 bfd *obfd = info->output_bfd;
34e967a5
MC
862 unsigned short mach_ibfd;
863 static unsigned short mach_obfd = EM_NONE;
864 flagword out_flags;
865 flagword in_flags;
866 asection *sec;
867
868 /* Check if we have the same endianess. */
50e03d47 869 if (! _bfd_generic_verify_endian_match (ibfd, info))
1047201f 870 return FALSE;
34e967a5 871
53a346d8
CZ
872 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
873 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
874 return TRUE;
875
34e967a5
MC
876 /* Collect ELF flags. */
877 in_flags = elf_elfheader (ibfd)->e_flags & EF_ARC_MACH_MSK;
878 out_flags = elf_elfheader (obfd)->e_flags & EF_ARC_MACH_MSK;
879
880 if (!elf_flags_init (obfd)) /* First call, no flags set. */
881 {
882 elf_flags_init (obfd) = TRUE;
883 out_flags = in_flags;
884 }
885
53a346d8
CZ
886 if (!arc_elf_merge_attributes (ibfd, info))
887 return FALSE;
34e967a5
MC
888
889 /* Check to see if the input BFD actually contains any sections. Do
890 not short-circuit dynamic objects; their section list may be
891 emptied by elf_link_add_object_symbols. */
892 if (!(ibfd->flags & DYNAMIC))
893 {
894 bfd_boolean null_input_bfd = TRUE;
895 bfd_boolean only_data_sections = TRUE;
896
897 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
898 {
fd361982 899 if ((bfd_section_flags (sec)
34e967a5
MC
900 & (SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS))
901 == (SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS))
902 only_data_sections = FALSE;
903
904 null_input_bfd = FALSE;
905 }
906
907 if (null_input_bfd || only_data_sections)
908 return TRUE;
909 }
910
911 /* Complain about various flag/architecture mismatches. */
912 mach_ibfd = elf_elfheader (ibfd)->e_machine;
913 if (mach_obfd == EM_NONE)
914 {
915 mach_obfd = mach_ibfd;
916 }
917 else
918 {
919 if (mach_ibfd != mach_obfd)
920 {
695344c0 921 /* xgettext:c-format */
38f14ab8 922 _bfd_error_handler (_("error: attempting to link %pB "
871b3ab2 923 "with a binary %pB of different architecture"),
dae82561 924 ibfd, obfd);
34e967a5
MC
925 return FALSE;
926 }
53a346d8
CZ
927 else if ((in_flags != out_flags)
928 /* If we have object attributes, then we already
929 checked the objects compatibility, skip it. */
930 && !bfd_elf_get_obj_attr_int (ibfd, OBJ_ATTR_PROC,
931 Tag_ARC_CPU_base))
34e967a5 932 {
34e967a5 933 if (in_flags && out_flags)
6af04484
CZ
934 {
935 /* Warn if different flags. */
936 _bfd_error_handler
937 /* xgettext:c-format */
938 (_("%pB: uses different e_flags (%#x) fields than "
939 "previous modules (%#x)"),
940 ibfd, in_flags, out_flags);
941 return FALSE;
942 }
34e967a5
MC
943 /* MWDT doesnt set the eflags hence make sure we choose the
944 eflags set by gcc. */
945 in_flags = in_flags > out_flags ? in_flags : out_flags;
946 }
53a346d8
CZ
947 else
948 {
949 /* Everything is correct; don't change the output flags. */
950 in_flags = out_flags;
951 }
34e967a5
MC
952 }
953
954 /* Update the flags. */
955 elf_elfheader (obfd)->e_flags = in_flags;
956
957 if (bfd_get_mach (obfd) < bfd_get_mach (ibfd))
958 {
959 return bfd_set_arch_mach (obfd, bfd_arch_arc, bfd_get_mach (ibfd));
960 }
961
962 return TRUE;
963}
964
53a346d8
CZ
965/* Return a best guess for the machine number based on the attributes. */
966
967static unsigned int
968bfd_arc_get_mach_from_attributes (bfd * abfd)
969{
970 int arch = bfd_elf_get_obj_attr_int (abfd, OBJ_ATTR_PROC, Tag_ARC_CPU_base);
971 unsigned e_machine = elf_elfheader (abfd)->e_machine;
972
973 switch (arch)
974 {
975 case TAG_CPU_ARC6xx:
976 return bfd_mach_arc_arc600;
977 case TAG_CPU_ARC7xx:
978 return bfd_mach_arc_arc700;
979 case TAG_CPU_ARCEM:
980 case TAG_CPU_ARCHS:
981 return bfd_mach_arc_arcv2;
982 default:
983 break;
984 }
985 return (e_machine == EM_ARC_COMPACT)
986 ? bfd_mach_arc_arc700 : bfd_mach_arc_arcv2;
987}
988
252b5132 989/* Set the right machine number for an ARC ELF file. */
b34976b6 990static bfd_boolean
886a2506 991arc_elf_object_p (bfd * abfd)
252b5132 992{
886a2506
NC
993 /* Make sure this is initialised, or you'll have the potential of passing
994 garbage---or misleading values---into the call to
995 bfd_default_set_arch_mach (). */
53a346d8 996 unsigned int mach = bfd_mach_arc_arc700;
886a2506
NC
997 unsigned long arch = elf_elfheader (abfd)->e_flags & EF_ARC_MACH_MSK;
998 unsigned e_machine = elf_elfheader (abfd)->e_machine;
252b5132 999
886a2506 1000 if (e_machine == EM_ARC_COMPACT || e_machine == EM_ARC_COMPACT2)
252b5132 1001 {
0d2bcfaf
NC
1002 switch (arch)
1003 {
95967518
CZ
1004 case E_ARC_MACH_ARC600:
1005 mach = bfd_mach_arc_arc600;
1006 break;
1007 case E_ARC_MACH_ARC601:
1008 mach = bfd_mach_arc_arc601;
1009 break;
1010 case E_ARC_MACH_ARC700:
1011 mach = bfd_mach_arc_arc700;
1012 break;
1013 case EF_ARC_CPU_ARCV2HS:
1014 case EF_ARC_CPU_ARCV2EM:
1015 mach = bfd_mach_arc_arcv2;
1016 break;
1017 default:
1018 mach = bfd_arc_get_mach_from_attributes (abfd);
1019 break;
886a2506
NC
1020 }
1021 }
1022 else
1023 {
1024 if (e_machine == EM_ARC)
1025 {
4eca0228 1026 _bfd_error_handler
38f14ab8 1027 (_("error: the ARC4 architecture is no longer supported"));
886a2506
NC
1028 return FALSE;
1029 }
1030 else
1031 {
4eca0228 1032 _bfd_error_handler
38f14ab8
AM
1033 (_("warning: unset or old architecture flags; "
1034 "use default machine"));
0d2bcfaf 1035 }
252b5132 1036 }
886a2506 1037
0d2bcfaf 1038 return bfd_default_set_arch_mach (abfd, bfd_arch_arc, mach);
252b5132
RH
1039}
1040
1041/* The final processing done just before writing out an ARC ELF object file.
1042 This gets the ARC architecture right based on the machine number. */
1043
cc364be6
AM
1044static bfd_boolean
1045arc_elf_final_write_processing (bfd *abfd)
252b5132 1046{
886a2506 1047 unsigned long emf;
53a346d8
CZ
1048 int osver = bfd_elf_get_obj_attr_int (abfd, OBJ_ATTR_PROC,
1049 Tag_ARC_ABI_osver);
1050 flagword e_flags = elf_elfheader (abfd)->e_flags & ~EF_ARC_OSABI_MSK;
252b5132 1051
0d2bcfaf 1052 switch (bfd_get_mach (abfd))
252b5132 1053 {
886a2506 1054 case bfd_mach_arc_arcv2:
886a2506 1055 emf = EM_ARC_COMPACT2;
0d2bcfaf 1056 break;
886a2506 1057 default:
c5e20471
AM
1058 emf = EM_ARC_COMPACT;
1059 break;
252b5132 1060 }
34e967a5 1061
886a2506 1062 elf_elfheader (abfd)->e_machine = emf;
7e458899 1063
886a2506 1064 /* Record whatever is the current syscall ABI version. */
53a346d8
CZ
1065 if (osver)
1066 e_flags |= ((osver & 0x0f) << 8);
1067 else
1068 e_flags |= E_ARC_OSABI_V3;
3c8adaca 1069
c5e20471 1070 elf_elfheader (abfd)->e_flags |= e_flags;
cc364be6 1071 return _bfd_elf_final_write_processing (abfd);
252b5132
RH
1072}
1073
f7e8b360
NC
1074#ifdef ARC_ENABLE_DEBUG
1075#define DEBUG_ARC_RELOC(A) debug_arc_reloc (A)
886a2506
NC
1076
1077static void
1078debug_arc_reloc (struct arc_relocation_data reloc_data)
1079{
f7e8b360
NC
1080 ARC_DEBUG ("Reloc type=%s, should_relocate = %s\n",
1081 reloc_data.howto->name,
1082 reloc_data.should_relocate ? "true" : "false");
1083 ARC_DEBUG (" offset = 0x%x, addend = 0x%x\n",
1084 (unsigned int) reloc_data.reloc_offset,
1085 (unsigned int) reloc_data.reloc_addend);
1086 ARC_DEBUG (" Symbol:\n");
1087 ARC_DEBUG (" value = 0x%08x\n",
1088 (unsigned int) reloc_data.sym_value);
886a2506
NC
1089 if (reloc_data.sym_section != NULL)
1090 {
f7e8b360
NC
1091 ARC_DEBUG (" Symbol Section:\n");
1092 ARC_DEBUG (" section name = %s, output_offset 0x%08x",
1093 reloc_data.sym_section->name,
1094 (unsigned int) reloc_data.sym_section->output_offset);
34e967a5 1095 if (reloc_data.sym_section->output_section != NULL)
f7e8b360 1096 ARC_DEBUG (", output_section->vma = 0x%08x",
34e967a5 1097 ((unsigned int) reloc_data.sym_section->output_section->vma));
f7e8b360 1098 ARC_DEBUG ("\n");
95967518
CZ
1099 if (reloc_data.sym_section->owner
1100 && reloc_data.sym_section->owner->filename)
f7e8b360 1101 ARC_DEBUG (" file: %s\n", reloc_data.sym_section->owner->filename);
886a2506
NC
1102 }
1103 else
34e967a5 1104 {
f7e8b360 1105 ARC_DEBUG (" symbol section is NULL\n");
34e967a5 1106 }
886a2506 1107
f7e8b360 1108 ARC_DEBUG (" Input_section:\n");
886a2506
NC
1109 if (reloc_data.input_section != NULL)
1110 {
f7e8b360
NC
1111 ARC_DEBUG (" section name = %s, output_offset 0x%08x, output_section->vma = 0x%08x\n",
1112 reloc_data.input_section->name,
1113 (unsigned int) reloc_data.input_section->output_offset,
1114 (unsigned int) reloc_data.input_section->output_section->vma);
1115 ARC_DEBUG (" changed_address = 0x%08x\n",
1116 (unsigned int) (reloc_data.input_section->output_section->vma
1117 + reloc_data.input_section->output_offset
1118 + reloc_data.reloc_offset));
1119 ARC_DEBUG (" file: %s\n", reloc_data.input_section->owner->filename);
886a2506
NC
1120 }
1121 else
34e967a5 1122 {
f7e8b360 1123 ARC_DEBUG (" input section is NULL\n");
34e967a5 1124 }
886a2506 1125}
f7e8b360
NC
1126#else
1127#define DEBUG_ARC_RELOC(A)
1128#endif /* ARC_ENABLE_DEBUG */
886a2506 1129
72f3b6aa
CZ
1130static bfd_vma
1131middle_endian_convert (bfd_vma insn, bfd_boolean do_it)
6f4b1afc 1132{
72f3b6aa
CZ
1133 if (do_it)
1134 {
08759e0f
CM
1135 insn
1136 = ((insn & 0xffff0000) >> 16)
1137 | ((insn & 0xffff) << 16);
72f3b6aa
CZ
1138 }
1139 return insn;
6f4b1afc
CM
1140}
1141
4b0c052e
AB
1142/* This function is called for relocations that are otherwise marked as NOT
1143 requiring overflow checks. In here we perform non-standard checks of
1144 the relocation value. */
1145
1146static inline bfd_reloc_status_type
1147arc_special_overflow_checks (const struct arc_relocation_data reloc_data,
08759e0f 1148 bfd_signed_vma relocation,
4b0c052e
AB
1149 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1150{
1151 switch (reloc_data.howto->type)
1152 {
1153 case R_ARC_NPS_CMEM16:
1154 if (((relocation >> 16) & 0xffff) != NPS_CMEM_HIGH_VALUE)
08759e0f
CM
1155 {
1156 if (reloc_data.reloc_addend == 0)
4eca0228 1157 _bfd_error_handler
695344c0 1158 /* xgettext:c-format */
2dcf00ce
AM
1159 (_("%pB(%pA+%#" PRIx64 "): CMEM relocation to `%s' is invalid, "
1160 "16 MSB should be %#x (value is %#" PRIx64 ")"),
08759e0f
CM
1161 reloc_data.input_section->owner,
1162 reloc_data.input_section,
2dcf00ce 1163 (uint64_t) reloc_data.reloc_offset,
08759e0f
CM
1164 reloc_data.symbol_name,
1165 NPS_CMEM_HIGH_VALUE,
2dcf00ce 1166 (uint64_t) relocation);
08759e0f 1167 else
4eca0228 1168 _bfd_error_handler
695344c0 1169 /* xgettext:c-format */
2dcf00ce
AM
1170 (_("%pB(%pA+%#" PRIx64 "): CMEM relocation to `%s+%#" PRIx64
1171 "' is invalid, 16 MSB should be %#x (value is %#" PRIx64 ")"),
08759e0f
CM
1172 reloc_data.input_section->owner,
1173 reloc_data.input_section,
2dcf00ce 1174 (uint64_t) reloc_data.reloc_offset,
08759e0f 1175 reloc_data.symbol_name,
2dcf00ce 1176 (uint64_t) reloc_data.reloc_addend,
08759e0f 1177 NPS_CMEM_HIGH_VALUE,
2dcf00ce 1178 (uint64_t) relocation);
08759e0f
CM
1179 return bfd_reloc_overflow;
1180 }
4b0c052e
AB
1181 break;
1182
1183 default:
1184 break;
1185 }
1186
1187 return bfd_reloc_ok;
1188}
1189
72f3b6aa
CZ
1190#define ME(reloc) (reloc)
1191
1192#define IS_ME(FORMULA,BFD) ((strstr (FORMULA, "ME") != NULL) \
1193 && (!bfd_big_endian (BFD)))
1194
094fb063 1195#define S ((bfd_signed_vma) (reloc_data.sym_value \
34e967a5
MC
1196 + (reloc_data.sym_section->output_section != NULL ? \
1197 (reloc_data.sym_section->output_offset \
094fb063
CZ
1198 + reloc_data.sym_section->output_section->vma) : 0)))
1199#define L ((bfd_signed_vma) (reloc_data.sym_value \
34e967a5
MC
1200 + (reloc_data.sym_section->output_section != NULL ? \
1201 (reloc_data.sym_section->output_offset \
094fb063 1202 + reloc_data.sym_section->output_section->vma) : 0)))
886a2506
NC
1203#define A (reloc_data.reloc_addend)
1204#define B (0)
1205#define G (reloc_data.got_offset_value)
34e967a5
MC
1206#define GOT (reloc_data.got_symbol_vma)
1207#define GOT_BEGIN (htab->sgot->output_section->vma)
1208
886a2506 1209#define MES (0)
34e967a5
MC
1210 /* P: relative offset to PCL The offset should be to the
1211 current location aligned to 32 bits. */
094fb063 1212#define P ((bfd_signed_vma) ( \
34e967a5
MC
1213 ( \
1214 (reloc_data.input_section->output_section != NULL ? \
1215 reloc_data.input_section->output_section->vma : 0) \
1216 + reloc_data.input_section->output_offset \
094fb063
CZ
1217 + (reloc_data.reloc_offset - (bitsize >= 32 ? 4 : 0))) \
1218 & ~0x3))
1219#define PDATA ((bfd_signed_vma) ( \
6f4b1afc
CM
1220 (reloc_data.input_section->output_section->vma \
1221 + reloc_data.input_section->output_offset \
094fb063 1222 + (reloc_data.reloc_offset))))
2ab2f40d
CM
1223#define SECTSTART (bfd_signed_vma) (reloc_data.sym_section->output_section->vma \
1224 + reloc_data.sym_section->output_offset)
714e9a95
CM
1225#define FINAL_SECTSTART \
1226 (bfd_signed_vma) (reloc_data.sym_section->output_section->vma)
684d5a10 1227#define JLI (bfd_signed_vma) (reloc_data.sym_section->output_section->vma)
094fb063
CZ
1228#define _SDA_BASE_ (bfd_signed_vma) (reloc_data.sdata_begin_symbol_vma)
1229#define TLS_REL (bfd_signed_vma) \
1230 ((elf_hash_table (info))->tls_sec->output_section->vma)
0411fca5
CM
1231#define TLS_TBSS (align_power(TCB_SIZE, \
1232 reloc_data.sym_section->alignment_power))
34e967a5 1233
886a2506
NC
1234#define none (0)
1235
f7e8b360
NC
1236#ifdef ARC_ENABLE_DEBUG
1237#define PRINT_DEBUG_RELOC_INFO_BEFORE(FORMULA, TYPE) \
1238 do \
1239 { \
1240 asection *sym_section = reloc_data.sym_section; \
1241 asection *input_section = reloc_data.input_section; \
1242 ARC_DEBUG ("RELOC_TYPE = " TYPE "\n"); \
1243 ARC_DEBUG ("FORMULA = " FORMULA "\n"); \
1244 ARC_DEBUG ("S = %#lx\n", S); \
1245 ARC_DEBUG ("A = %#lx\n", A); \
1246 ARC_DEBUG ("L = %lx\n", L); \
1247 if (sym_section->output_section != NULL) \
1248 ARC_DEBUG ("symbol_section->vma = %#lx\n", \
1249 sym_section->output_section->vma \
1250 + sym_section->output_offset); \
1251 else \
1252 ARC_DEBUG ("symbol_section->vma = NULL\n"); \
1253 if (input_section->output_section != NULL) \
cf2611fe 1254 ARC_DEBUG ("input_section->vma = %#lx\n", \
f7e8b360
NC
1255 input_section->output_section->vma \
1256 + input_section->output_offset); \
1257 else \
cf2611fe 1258 ARC_DEBUG ("input_section->vma = NULL\n"); \
f7e8b360
NC
1259 ARC_DEBUG ("PCL = %#lx\n", P); \
1260 ARC_DEBUG ("P = %#lx\n", P); \
1261 ARC_DEBUG ("G = %#lx\n", G); \
1262 ARC_DEBUG ("SDA_OFFSET = %#lx\n", _SDA_BASE_); \
34e967a5 1263 ARC_DEBUG ("SDA_SET = %d\n", reloc_data.sdata_begin_symbol_vma_set); \
f7e8b360
NC
1264 ARC_DEBUG ("GOT_OFFSET = %#lx\n", GOT); \
1265 ARC_DEBUG ("relocation = %#08lx\n", relocation); \
1266 ARC_DEBUG ("before = %#08x\n", (unsigned) insn); \
1267 ARC_DEBUG ("data = %08x (%u) (%d)\n", (unsigned) relocation, \
1268 (unsigned) relocation, (int) relocation); \
1269 } \
1270 while (0)
1271
1272#define PRINT_DEBUG_RELOC_INFO_AFTER \
1273 do \
1274 { \
1275 ARC_DEBUG ("after = 0x%08x\n", (unsigned int) insn); \
1276 } \
1277 while (0)
34e967a5 1278
f7e8b360
NC
1279#else
1280
1281#define PRINT_DEBUG_RELOC_INFO_BEFORE(...)
07d6d2b8 1282#define PRINT_DEBUG_RELOC_INFO_AFTER
f7e8b360
NC
1283
1284#endif /* ARC_ENABLE_DEBUG */
34e967a5 1285
886a2506 1286#define ARC_RELOC_HOWTO(TYPE, VALUE, SIZE, BITSIZE, RELOC_FUNCTION, OVERFLOW, FORMULA) \
f7e8b360
NC
1287 case R_##TYPE: \
1288 { \
1289 bfd_signed_vma bitsize ATTRIBUTE_UNUSED = BITSIZE; \
1290 relocation = FORMULA ; \
1291 PRINT_DEBUG_RELOC_INFO_BEFORE (#FORMULA, #TYPE); \
1292 insn = middle_endian_convert (insn, IS_ME (#FORMULA, abfd)); \
1293 insn = (* get_replace_function (abfd, TYPE)) (insn, relocation); \
1294 insn = middle_endian_convert (insn, IS_ME (#FORMULA, abfd)); \
1295 PRINT_DEBUG_RELOC_INFO_AFTER; \
1296 } \
886a2506
NC
1297 break;
1298
1299static bfd_reloc_status_type
34e967a5
MC
1300arc_do_relocation (bfd_byte * contents,
1301 struct arc_relocation_data reloc_data,
1302 struct bfd_link_info *info)
886a2506 1303{
094fb063 1304 bfd_signed_vma relocation = 0;
886a2506
NC
1305 bfd_vma insn;
1306 bfd_vma orig_insn ATTRIBUTE_UNUSED;
72f3b6aa 1307 bfd * abfd = reloc_data.input_section->owner;
34e967a5 1308 struct elf_link_hash_table *htab ATTRIBUTE_UNUSED = elf_hash_table (info);
4b0c052e 1309 bfd_reloc_status_type flag;
886a2506 1310
535b785f 1311 if (!reloc_data.should_relocate)
34e967a5 1312 return bfd_reloc_ok;
886a2506
NC
1313
1314 switch (reloc_data.howto->size)
1315 {
95967518
CZ
1316 case 2:
1317 insn = arc_bfd_get_32 (abfd,
1318 contents + reloc_data.reloc_offset,
1319 reloc_data.input_section);
1320 break;
1321 case 1:
1322 insn = arc_bfd_get_16 (abfd,
1323 contents + reloc_data.reloc_offset,
1324 reloc_data.input_section);
1325 break;
1326 case 0:
1327 insn = arc_bfd_get_8 (abfd,
1328 contents + reloc_data.reloc_offset,
1329 reloc_data.input_section);
1330 break;
1331 default:
1332 insn = 0;
1333 BFD_ASSERT (0);
1334 break;
886a2506
NC
1335 }
1336
1337 orig_insn = insn;
1338
1339 switch (reloc_data.howto->type)
1340 {
34e967a5 1341#include "elf/arc-reloc.def"
886a2506 1342
95967518
CZ
1343 default:
1344 BFD_ASSERT (0);
1345 break;
886a2506
NC
1346 }
1347
1348 /* Check for relocation overflow. */
1349 if (reloc_data.howto->complain_on_overflow != complain_overflow_dont)
4b0c052e 1350 flag = bfd_check_overflow (reloc_data.howto->complain_on_overflow,
08759e0f
CM
1351 reloc_data.howto->bitsize,
1352 reloc_data.howto->rightshift,
1353 bfd_arch_bits_per_address (abfd),
1354 relocation);
4b0c052e
AB
1355 else
1356 flag = arc_special_overflow_checks (reloc_data, relocation, info);
886a2506 1357
4b0c052e
AB
1358 if (flag != bfd_reloc_ok)
1359 {
f7e8b360 1360 ARC_DEBUG ("Relocation overflows !\n");
4b0c052e 1361 DEBUG_ARC_RELOC (reloc_data);
f7e8b360
NC
1362 ARC_DEBUG ("Relocation value = signed -> %d, unsigned -> %u"
1363 ", hex -> (0x%08x)\n",
1364 (int) relocation, (unsigned) relocation, (int) relocation);
886a2506 1365
4b0c052e 1366 return flag;
886a2506 1367 }
886a2506 1368
4b0c052e 1369 /* Write updated instruction back to memory. */
886a2506
NC
1370 switch (reloc_data.howto->size)
1371 {
95967518
CZ
1372 case 2:
1373 arc_bfd_put_32 (abfd, insn,
1374 contents + reloc_data.reloc_offset,
1375 reloc_data.input_section);
1376 break;
1377 case 1:
72f3b6aa 1378 arc_bfd_put_16 (abfd, insn,
95967518
CZ
1379 contents + reloc_data.reloc_offset,
1380 reloc_data.input_section);
886a2506 1381 break;
95967518
CZ
1382 case 0:
1383 arc_bfd_put_8 (abfd, insn,
1384 contents + reloc_data.reloc_offset,
1385 reloc_data.input_section);
1386 break;
1387 default:
1388 ARC_DEBUG ("size = %d\n", reloc_data.howto->size);
1389 BFD_ASSERT (0);
1390 break;
886a2506
NC
1391 }
1392
1393 return bfd_reloc_ok;
1394}
1395#undef S
1396#undef A
1397#undef B
1398#undef G
1399#undef GOT
1400#undef L
1401#undef MES
1402#undef P
1403#undef SECTSTAR
1404#undef SECTSTART
684d5a10 1405#undef JLI
886a2506
NC
1406#undef _SDA_BASE_
1407#undef none
1408
1409#undef ARC_RELOC_HOWTO
1410
886a2506 1411
886a2506
NC
1412/* Relocate an arc ELF section.
1413 Function : elf_arc_relocate_section
1414 Brief : Relocate an arc section, by handling all the relocations
34e967a5 1415 appearing in that section.
886a2506 1416 Args : output_bfd : The bfd being written to.
34e967a5
MC
1417 info : Link information.
1418 input_bfd : The input bfd.
1419 input_section : The section being relocated.
1420 contents : contents of the section being relocated.
1421 relocs : List of relocations in the section.
1422 local_syms : is a pointer to the swapped in local symbols.
1423 local_section : is an array giving the section in the input file
1424 corresponding to the st_shndx field of each
1425 local symbol. */
886a2506 1426static bfd_boolean
07d6d2b8 1427elf_arc_relocate_section (bfd * output_bfd,
886a2506 1428 struct bfd_link_info * info,
07d6d2b8
AM
1429 bfd * input_bfd,
1430 asection * input_section,
1431 bfd_byte * contents,
886a2506
NC
1432 Elf_Internal_Rela * relocs,
1433 Elf_Internal_Sym * local_syms,
07d6d2b8 1434 asection ** local_sections)
886a2506 1435{
07d6d2b8 1436 Elf_Internal_Shdr * symtab_hdr;
f7e8b360 1437 struct elf_link_hash_entry ** sym_hashes;
07d6d2b8
AM
1438 Elf_Internal_Rela * rel;
1439 Elf_Internal_Rela * wrel;
1440 Elf_Internal_Rela * relend;
f7e8b360 1441 struct elf_link_hash_table * htab = elf_hash_table (info);
886a2506
NC
1442
1443 symtab_hdr = &((elf_tdata (input_bfd))->symtab_hdr);
1444 sym_hashes = elf_sym_hashes (input_bfd);
1445
3c8adaca 1446 rel = wrel = relocs;
886a2506 1447 relend = relocs + input_section->reloc_count;
3c8adaca 1448 for (; rel < relend; wrel++, rel++)
886a2506 1449 {
07d6d2b8 1450 enum elf_arc_reloc_type r_type;
34e967a5 1451 reloc_howto_type * howto;
f7e8b360 1452 unsigned long r_symndx;
886a2506 1453 struct elf_link_hash_entry * h;
34e967a5
MC
1454 Elf_Internal_Sym * sym;
1455 asection * sec;
f7e8b360 1456 struct elf_link_hash_entry * h2;
07d6d2b8 1457 const char * msg;
f4e6805f 1458 bfd_boolean unresolved_reloc = FALSE;
886a2506
NC
1459
1460 struct arc_relocation_data reloc_data =
1461 {
34e967a5
MC
1462 .reloc_offset = 0,
1463 .reloc_addend = 0,
1464 .got_offset_value = 0,
07d6d2b8 1465 .sym_value = 0,
34e967a5
MC
1466 .sym_section = NULL,
1467 .howto = NULL,
1468 .input_section = NULL,
1469 .sdata_begin_symbol_vma = 0,
1470 .sdata_begin_symbol_vma_set = FALSE,
1471 .got_symbol_vma = 0,
1472 .should_relocate = FALSE
886a2506
NC
1473 };
1474
34e967a5
MC
1475 r_type = ELF32_R_TYPE (rel->r_info);
1476
1477 if (r_type >= (int) R_ARC_max)
1478 {
1479 bfd_set_error (bfd_error_bad_value);
1480 return FALSE;
1481 }
3c8adaca 1482 howto = arc_elf_howto (r_type);
34e967a5
MC
1483
1484 r_symndx = ELF32_R_SYM (rel->r_info);
1485
1486 /* If we are generating another .o file and the symbol in not
1487 local, skip this relocation. */
1488 if (bfd_link_relocatable (info))
1489 {
1490 /* This is a relocateable link. We don't have to change
1491 anything, unless the reloc is against a section symbol,
1492 in which case we have to adjust according to where the
1493 section symbol winds up in the output section. */
1494
1495 /* Checks if this is a local symbol and thus the reloc
1496 might (will??) be against a section symbol. */
1497 if (r_symndx < symtab_hdr->sh_info)
1498 {
1499 sym = local_syms + r_symndx;
1500 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
1501 {
1502 sec = local_sections[r_symndx];
1503
f7e8b360 1504 /* For RELA relocs. Just adjust the addend
34e967a5
MC
1505 value in the relocation entry. */
1506 rel->r_addend += sec->output_offset + sym->st_value;
1507
f7e8b360
NC
1508 ARC_DEBUG ("local symbols reloc (section=%d %s) seen in %s\n",
1509 (int) r_symndx, local_sections[r_symndx]->name,
1510 __PRETTY_FUNCTION__);
34e967a5
MC
1511 }
1512 }
34e967a5 1513 }
886a2506
NC
1514
1515 h2 = elf_link_hash_lookup (elf_hash_table (info), "__SDATA_BEGIN__",
1516 FALSE, FALSE, TRUE);
1517
535b785f
AM
1518 if (!reloc_data.sdata_begin_symbol_vma_set
1519 && h2 != NULL && h2->root.type != bfd_link_hash_undefined
1520 && h2->root.u.def.section->output_section != NULL)
34e967a5 1521 /* TODO: Verify this condition. */
886a2506
NC
1522 {
1523 reloc_data.sdata_begin_symbol_vma =
08759e0f
CM
1524 (h2->root.u.def.value
1525 + h2->root.u.def.section->output_section->vma);
886a2506
NC
1526 reloc_data.sdata_begin_symbol_vma_set = TRUE;
1527 }
1528
886a2506
NC
1529 reloc_data.input_section = input_section;
1530 reloc_data.howto = howto;
1531 reloc_data.reloc_offset = rel->r_offset;
1532 reloc_data.reloc_addend = rel->r_addend;
1533
886a2506
NC
1534 /* This is a final link. */
1535 h = NULL;
1536 sym = NULL;
1537 sec = NULL;
1538
1539 if (r_symndx < symtab_hdr->sh_info) /* A local symbol. */
1540 {
1541 sym = local_syms + r_symndx;
1542 sec = local_sections[r_symndx];
3c8adaca
CZ
1543 }
1544 else
1545 {
f4e6805f
CM
1546 bfd_boolean warned, ignored;
1547 bfd_vma relocation ATTRIBUTE_UNUSED;
1548
1549 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1550 r_symndx, symtab_hdr, sym_hashes,
1551 h, sec, relocation,
1552 unresolved_reloc, warned, ignored);
1553
3c8adaca
CZ
1554 /* TODO: This code is repeated from below. We should
1555 clean it and remove duplications.
1556 Sec is used check for discarded sections.
1557 Need to redesign code below. */
1558
1559 /* Get the symbol's entry in the symtab. */
1560 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1561
1562 while (h->root.type == bfd_link_hash_indirect
1563 || h->root.type == bfd_link_hash_warning)
1564 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1565
1566 /* If we have encountered a definition for this symbol. */
1567 if (h->root.type == bfd_link_hash_defined
1568 || h->root.type == bfd_link_hash_defweak)
1569 {
1570 reloc_data.sym_value = h->root.u.def.value;
1571 sec = h->root.u.def.section;
1572 }
1573 }
1574
1575 /* Clean relocs for symbols in discarded sections. */
1576 if (sec != NULL && discarded_section (sec))
1577 {
1578 _bfd_clear_contents (howto, input_bfd, input_section,
0930cb30 1579 contents, rel->r_offset);
3c8adaca
CZ
1580 rel->r_info = 0;
1581 rel->r_addend = 0;
1582
1583 /* For ld -r, remove relocations in debug sections against
1584 sections defined in discarded sections. Not done for
1585 eh_frame editing code expects to be present. */
1586 if (bfd_link_relocatable (info)
1587 && (input_section->flags & SEC_DEBUGGING))
1588 wrel--;
1589
1590 continue;
1591 }
1592
1593 if (bfd_link_relocatable (info))
1594 {
1595 if (wrel != rel)
1596 *wrel = *rel;
1597 continue;
1598 }
1599
1600 if (r_symndx < symtab_hdr->sh_info) /* A local symbol. */
1601 {
886a2506
NC
1602 reloc_data.sym_value = sym->st_value;
1603 reloc_data.sym_section = sec;
4b0c052e 1604 reloc_data.symbol_name =
3c8adaca
CZ
1605 bfd_elf_string_from_elf_section (input_bfd,
1606 symtab_hdr->sh_link,
1607 sym->st_name);
886a2506 1608
841fdfcd
CZ
1609 /* Mergeable section handling. */
1610 if ((sec->flags & SEC_MERGE)
1611 && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
1612 {
1613 asection *msec;
1614 msec = sec;
1615 rel->r_addend = _bfd_elf_rel_local_sym (output_bfd, sym,
1616 &msec, rel->r_addend);
1617 rel->r_addend -= (sec->output_section->vma
1618 + sec->output_offset
1619 + sym->st_value);
1620 rel->r_addend += msec->output_section->vma + msec->output_offset;
1621
1622 reloc_data.reloc_addend = rel->r_addend;
1623 }
1624
34e967a5
MC
1625 BFD_ASSERT (htab->sgot != NULL || !is_reloc_for_GOT (howto));
1626 if (htab->sgot != NULL)
1627 reloc_data.got_symbol_vma = htab->sgot->output_section->vma
1628 + htab->sgot->output_offset;
886a2506
NC
1629
1630 reloc_data.should_relocate = TRUE;
1631 }
1632 else /* Global symbol. */
1633 {
f7e8b360
NC
1634 /* FIXME: We should use the RELOC_FOR_GLOBAL_SYMBOL macro
1635 (defined in elf-bfd.h) here. */
1636
886a2506
NC
1637 /* Get the symbol's entry in the symtab. */
1638 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1639
1640 while (h->root.type == bfd_link_hash_indirect
1641 || h->root.type == bfd_link_hash_warning)
cc89d0b3 1642 {
854b8506
CM
1643 struct elf_arc_link_hash_entry *ah_old =
1644 (struct elf_arc_link_hash_entry *) h;
886a2506 1645 h = (struct elf_link_hash_entry *) h->root.u.i.link;
854b8506
CM
1646 struct elf_arc_link_hash_entry *ah =
1647 (struct elf_arc_link_hash_entry *) h;
1648
1649 if (ah->got_ents == 0 && ah_old->got_ents != ah->got_ents)
1650 ah->got_ents = ah_old->got_ents;
cc89d0b3 1651 }
886a2506 1652
3c8adaca
CZ
1653 /* TODO: Need to validate what was the intention. */
1654 /* BFD_ASSERT ((h->dynindx == -1) || (h->forced_local != 0)); */
4b0c052e 1655 reloc_data.symbol_name = h->root.root.string;
3c8adaca 1656
886a2506
NC
1657 /* If we have encountered a definition for this symbol. */
1658 if (h->root.type == bfd_link_hash_defined
1659 || h->root.type == bfd_link_hash_defweak)
1660 {
1661 reloc_data.sym_value = h->root.u.def.value;
1662 reloc_data.sym_section = h->root.u.def.section;
1663
1664 reloc_data.should_relocate = TRUE;
1665
34e967a5 1666 if (is_reloc_for_GOT (howto) && !bfd_link_pic (info))
886a2506 1667 {
854b8506
CM
1668 struct elf_arc_link_hash_entry *ah =
1669 (struct elf_arc_link_hash_entry *) h;
34e967a5
MC
1670 /* TODO: Change it to use arc_do_relocation with
1671 ARC_32 reloc. Try to use ADD_RELA macro. */
886a2506
NC
1672 bfd_vma relocation =
1673 reloc_data.sym_value + reloc_data.reloc_addend
34e967a5
MC
1674 + (reloc_data.sym_section->output_section != NULL ?
1675 (reloc_data.sym_section->output_offset
1676 + reloc_data.sym_section->output_section->vma)
1677 : 0);
1678
854b8506
CM
1679 BFD_ASSERT (ah->got_ents);
1680 bfd_vma got_offset = ah->got_ents->offset;
34e967a5
MC
1681 bfd_put_32 (output_bfd, relocation,
1682 htab->sgot->contents + got_offset);
1683 }
1684 if (is_reloc_for_PLT (howto) && h->plt.offset != (bfd_vma) -1)
1685 {
1686 /* TODO: This is repeated up here. */
1687 reloc_data.sym_value = h->plt.offset;
1688 reloc_data.sym_section = htab->splt;
886a2506
NC
1689 }
1690 }
1691 else if (h->root.type == bfd_link_hash_undefweak)
1692 {
1693 /* Is weak symbol and has no definition. */
34e967a5
MC
1694 if (is_reloc_for_GOT (howto))
1695 {
1696 reloc_data.sym_value = h->root.u.def.value;
1697 reloc_data.sym_section = htab->sgot;
1698 reloc_data.should_relocate = TRUE;
1699 }
1700 else if (is_reloc_for_PLT (howto)
1701 && h->plt.offset != (bfd_vma) -1)
1702 {
1703 /* TODO: This is repeated up here. */
1704 reloc_data.sym_value = h->plt.offset;
1705 reloc_data.sym_section = htab->splt;
1706 reloc_data.should_relocate = TRUE;
1707 }
1708 else
1709 continue;
886a2506
NC
1710 }
1711 else
1712 {
1713 if (is_reloc_for_GOT (howto))
1714 {
886a2506 1715 reloc_data.sym_value = h->root.u.def.value;
34e967a5 1716 reloc_data.sym_section = htab->sgot;
886a2506
NC
1717
1718 reloc_data.should_relocate = TRUE;
1719 }
1720 else if (is_reloc_for_PLT (howto))
1721 {
7e458899
CZ
1722 /* Fail if it is linking for PIE and the symbol is
1723 undefined. */
1a72702b
AM
1724 if (bfd_link_executable (info))
1725 (*info->callbacks->undefined_symbol)
1726 (info, h->root.root.string, input_bfd, input_section,
1727 rel->r_offset, TRUE);
886a2506 1728 reloc_data.sym_value = h->plt.offset;
34e967a5 1729 reloc_data.sym_section = htab->splt;
886a2506
NC
1730
1731 reloc_data.should_relocate = TRUE;
1732 }
8a36df4d 1733 else if (!bfd_link_pic (info) || bfd_link_executable (info))
1a72702b
AM
1734 (*info->callbacks->undefined_symbol)
1735 (info, h->root.root.string, input_bfd, input_section,
1736 rel->r_offset, TRUE);
886a2506
NC
1737 }
1738
34e967a5
MC
1739 BFD_ASSERT (htab->sgot != NULL || !is_reloc_for_GOT (howto));
1740 if (htab->sgot != NULL)
1741 reloc_data.got_symbol_vma = htab->sgot->output_section->vma
1742 + htab->sgot->output_offset;
886a2506
NC
1743 }
1744
08759e0f
CM
1745 if ((is_reloc_for_GOT (howto)
1746 || is_reloc_for_TLS (howto)))
1747 {
980aa3e6
CM
1748 reloc_data.should_relocate = TRUE;
1749
08759e0f 1750 struct got_entry **list
0f206410 1751 = get_got_entry_list_for_symbol (input_bfd, r_symndx, h);
08759e0f
CM
1752
1753 reloc_data.got_offset_value
1754 = relocate_fix_got_relocs_for_got_info (list,
1755 tls_type_for_reloc (howto),
1756 info,
1757 output_bfd,
1758 r_symndx,
1759 local_syms,
1760 local_sections,
1761 h,
1762 &reloc_data);
1763
1764 if (h == NULL)
1765 {
1766 create_got_dynrelocs_for_single_entry (
1767 got_entry_for_type (list,
07d6d2b8 1768 arc_got_entry_type_for_reloc (howto)),
08759e0f
CM
1769 output_bfd, info, NULL);
1770 }
1771 }
f7e8b360 1772
cd640291
CM
1773
1774#define IS_ARC_PCREL_TYPE(TYPE) \
1775 ( (TYPE == R_ARC_PC32) \
1776 || (TYPE == R_ARC_32_PCREL))
1777
34e967a5
MC
1778 switch (r_type)
1779 {
1780 case R_ARC_32:
1781 case R_ARC_32_ME:
1782 case R_ARC_PC32:
1783 case R_ARC_32_PCREL:
cd640291 1784 if (bfd_link_pic (info)
50d03636 1785 && (input_section->flags & SEC_ALLOC) != 0
cd640291 1786 && (!IS_ARC_PCREL_TYPE (r_type)
34e967a5
MC
1787 || (h != NULL
1788 && h->dynindx != -1
cd640291 1789 && !h->def_regular
34e967a5
MC
1790 && (!info->symbolic || !h->def_regular))))
1791 {
1792 Elf_Internal_Rela outrel;
1793 bfd_byte *loc;
1794 bfd_boolean skip = FALSE;
1795 bfd_boolean relocate = FALSE;
1796 asection *sreloc = _bfd_elf_get_dynamic_reloc_section
1797 (input_bfd, input_section,
1798 /*RELA*/ TRUE);
1799
1800 BFD_ASSERT (sreloc != NULL);
1801
1802 outrel.r_offset = _bfd_elf_section_offset (output_bfd,
1803 info,
1804 input_section,
1805 rel->r_offset);
cd640291 1806
34e967a5
MC
1807 if (outrel.r_offset == (bfd_vma) -1)
1808 skip = TRUE;
1809
1810 outrel.r_addend = rel->r_addend;
1811 outrel.r_offset += (input_section->output_section->vma
1812 + input_section->output_offset);
1813
1814 if (skip)
1815 {
1816 memset (&outrel, 0, sizeof outrel);
1817 relocate = FALSE;
1818 }
3c8adaca
CZ
1819 else if (h != NULL
1820 && h->dynindx != -1
cd640291
CM
1821 && (IS_ARC_PCREL_TYPE (r_type)
1822 || !(bfd_link_executable (info)
1823 || SYMBOLIC_BIND (info, h))
1824 || ! h->def_regular))
34e967a5 1825 {
94e5c971 1826 BFD_ASSERT (h != NULL);
34e967a5
MC
1827 if ((input_section->flags & SEC_ALLOC) != 0)
1828 relocate = FALSE;
1829 else
1830 relocate = TRUE;
94e5c971
CZ
1831
1832 BFD_ASSERT (h->dynindx != -1);
34e967a5
MC
1833 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1834 }
1835 else
1836 {
1837 /* Handle local symbols, they either do not have a
1838 global hash table entry (h == NULL), or are
1839 forced local due to a version script
1840 (h->forced_local), or the third condition is
1841 legacy, it appears to say something like, for
1842 links where we are pre-binding the symbols, or
1843 there's not an entry for this symbol in the
1844 dynamic symbol table, and it's a regular symbol
1845 not defined in a shared object, then treat the
1846 symbol as local, resolve it now. */
3c8adaca
CZ
1847 relocate = TRUE;
1848 /* outrel.r_addend = 0; */
1849 outrel.r_info = ELF32_R_INFO (0, R_ARC_RELATIVE);
34e967a5
MC
1850 }
1851
1852 BFD_ASSERT (sreloc->contents != 0);
1853
1854 loc = sreloc->contents;
1855 loc += sreloc->reloc_count * sizeof (Elf32_External_Rela);
1856 sreloc->reloc_count += 1;
1857
1858 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1859
535b785f 1860 if (!relocate)
34e967a5
MC
1861 continue;
1862 }
1863 break;
1864 default:
1865 break;
1866 }
1867
1868 if (is_reloc_SDA_relative (howto)
535b785f 1869 && !reloc_data.sdata_begin_symbol_vma_set)
886a2506 1870 {
4eca0228 1871 _bfd_error_handler
38f14ab8 1872 ("error: linker symbol __SDATA_BEGIN__ not found");
886a2506
NC
1873 bfd_set_error (bfd_error_bad_value);
1874 return FALSE;
1875 }
1876
1877 DEBUG_ARC_RELOC (reloc_data);
34e967a5 1878
2ab2f40d 1879 /* Make sure we have with a dynamic linker. In case of GOT and PLT
08759e0f 1880 the sym_section should point to .got or .plt respectively. */
815dc1bc
CZ
1881 if ((is_reloc_for_GOT (howto) || is_reloc_for_PLT (howto))
1882 && reloc_data.sym_section == NULL)
2ab2f40d 1883 {
4eca0228 1884 _bfd_error_handler
38f14ab8 1885 (_("GOT and PLT relocations cannot be fixed with a non dynamic linker"));
2ab2f40d
CM
1886 bfd_set_error (bfd_error_bad_value);
1887 return FALSE;
1888 }
1889
f7e8b360
NC
1890 msg = NULL;
1891 switch (arc_do_relocation (contents, reloc_data, info))
1892 {
1893 case bfd_reloc_ok:
1894 continue; /* The reloc processing loop. */
1895
1896 case bfd_reloc_overflow:
1897 (*info->callbacks->reloc_overflow)
1898 (info, (h ? &h->root : NULL), reloc_data.symbol_name, howto->name, (bfd_vma) 0,
1899 input_bfd, input_section, rel->r_offset);
1900 break;
1901
1902 case bfd_reloc_undefined:
1903 (*info->callbacks->undefined_symbol)
1904 (info, reloc_data.symbol_name, input_bfd, input_section, rel->r_offset, TRUE);
1905 break;
1906
1907 case bfd_reloc_other:
695344c0 1908 /* xgettext:c-format */
871b3ab2 1909 msg = _("%pB(%pA): warning: unaligned access to symbol '%s' in the small data area");
f7e8b360
NC
1910 break;
1911
1912 case bfd_reloc_outofrange:
695344c0 1913 /* xgettext:c-format */
871b3ab2 1914 msg = _("%pB(%pA): internal error: out of range error");
f7e8b360
NC
1915 break;
1916
1917 case bfd_reloc_notsupported:
695344c0 1918 /* xgettext:c-format */
871b3ab2 1919 msg = _("%pB(%pA): internal error: unsupported relocation error");
f7e8b360
NC
1920 break;
1921
1922 case bfd_reloc_dangerous:
695344c0 1923 /* xgettext:c-format */
871b3ab2 1924 msg = _("%pB(%pA): internal error: dangerous relocation");
f7e8b360
NC
1925 break;
1926
1927 default:
695344c0 1928 /* xgettext:c-format */
871b3ab2 1929 msg = _("%pB(%pA): internal error: unknown error");
f7e8b360
NC
1930 break;
1931 }
1932
1933 if (msg)
1934 _bfd_error_handler (msg, input_bfd, input_section, reloc_data.symbol_name);
1935 return FALSE;
886a2506
NC
1936 }
1937
1938 return TRUE;
1939}
1940
8a36df4d 1941#define elf_arc_hash_table(p) \
0f55320b
AM
1942 ((is_elf_hash_table ((p)->hash) \
1943 && elf_hash_table_id (elf_hash_table (p)) == ARC_ELF_DATA) \
1944 ? (struct elf_arc_link_hash_table *) (p)->hash : NULL)
8a36df4d 1945
886a2506 1946static bfd_boolean
08759e0f 1947elf_arc_check_relocs (bfd * abfd,
886a2506 1948 struct bfd_link_info * info,
34e967a5 1949 asection * sec,
886a2506
NC
1950 const Elf_Internal_Rela * relocs)
1951{
34e967a5
MC
1952 Elf_Internal_Shdr * symtab_hdr;
1953 struct elf_link_hash_entry ** sym_hashes;
34e967a5
MC
1954 const Elf_Internal_Rela * rel;
1955 const Elf_Internal_Rela * rel_end;
1956 bfd * dynobj;
1957 asection * sreloc = NULL;
e3d1d408 1958 struct elf_link_hash_table * htab = elf_hash_table (info);
34e967a5
MC
1959
1960 if (bfd_link_relocatable (info))
1961 return TRUE;
886a2506 1962
e3d1d408
CM
1963 if (htab->dynobj == NULL)
1964 htab->dynobj = abfd;
1965
886a2506
NC
1966 dynobj = (elf_hash_table (info))->dynobj;
1967 symtab_hdr = &((elf_tdata (abfd))->symtab_hdr);
1968 sym_hashes = elf_sym_hashes (abfd);
886a2506
NC
1969
1970 rel_end = relocs + sec->reloc_count;
1971 for (rel = relocs; rel < rel_end; rel++)
1972 {
1973 enum elf_arc_reloc_type r_type;
1974 reloc_howto_type *howto;
1975 unsigned long r_symndx;
1976 struct elf_link_hash_entry *h;
1977
1978 r_type = ELF32_R_TYPE (rel->r_info);
1979
1980 if (r_type >= (int) R_ARC_max)
1981 {
1982 bfd_set_error (bfd_error_bad_value);
1983 return FALSE;
1984 }
3c8adaca 1985 howto = arc_elf_howto (r_type);
34e967a5 1986
886a2506
NC
1987 /* Load symbol information. */
1988 r_symndx = ELF32_R_SYM (rel->r_info);
1989 if (r_symndx < symtab_hdr->sh_info) /* Is a local symbol. */
1990 h = NULL;
1991 else /* Global one. */
2936af90
CM
1992 {
1993 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1994 while (h->root.type == bfd_link_hash_indirect
1995 || h->root.type == bfd_link_hash_warning)
1996 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1997 }
886a2506 1998
854b8506 1999
34e967a5
MC
2000 switch (r_type)
2001 {
d07b621f
CM
2002 case R_ARC_32:
2003 case R_ARC_32_ME:
2004 /* During shared library creation, these relocs should not
2005 appear in a shared library (as memory will be read only
2006 and the dynamic linker can not resolve these. However
2007 the error should not occur for e.g. debugging or
2008 non-readonly sections. */
2009 if (h != NULL
2010 && (bfd_link_dll (info) && !bfd_link_pie (info))
2011 && (sec->flags & SEC_ALLOC) != 0
2012 && (sec->flags & SEC_READONLY) != 0
2013 && ((sec->flags & SEC_CODE) != 0
2014 || (sec->flags & SEC_DEBUGGING) != 0))
2015 {
2016 const char *name;
2017 if (h)
2018 name = h->root.root.string;
2019 else
2020 name = "UNKNOWN";
2021 _bfd_error_handler
2022 /* xgettext:c-format */
2023 (_("%pB: relocation %s against `%s' can not be used"
2024 " when making a shared object; recompile with -fPIC"),
2025 abfd,
2026 arc_elf_howto (r_type)->name,
2027 name);
2028 bfd_set_error (bfd_error_bad_value);
2029 return FALSE;
2030 }
34e967a5
MC
2031
2032 /* In some cases we are not setting the 'non_got_ref'
2033 flag, even though the relocations don't require a GOT
2034 access. We should extend the testing in this area to
2035 ensure that no significant cases are being missed. */
2036 if (h)
2037 h->non_got_ref = 1;
2038 /* FALLTHROUGH */
2039 case R_ARC_PC32:
2040 case R_ARC_32_PCREL:
8a36df4d 2041 if ((bfd_link_pic (info))
34e967a5
MC
2042 && ((r_type != R_ARC_PC32 && r_type != R_ARC_32_PCREL)
2043 || (h != NULL
34e967a5
MC
2044 && (!info->symbolic || !h->def_regular))))
2045 {
2046 if (sreloc == NULL)
2047 {
e3d1d408
CM
2048 if (info->dynamic
2049 && ! htab->dynamic_sections_created
2050 && ! _bfd_elf_link_create_dynamic_sections (abfd, info))
2051 return FALSE;
34e967a5
MC
2052 sreloc = _bfd_elf_make_dynamic_reloc_section (sec, dynobj,
2053 2, abfd,
2054 /*rela*/
2055 TRUE);
2056
2057 if (sreloc == NULL)
2058 return FALSE;
2059 }
2060 sreloc->size += sizeof (Elf32_External_Rela);
2061
2062 }
2063 default:
2064 break;
2065 }
2066
535b785f 2067 if (is_reloc_for_PLT (howto))
886a2506
NC
2068 {
2069 if (h == NULL)
2070 continue;
2071 else
ab16fcd7
CM
2072 if (h->forced_local == 0)
2073 h->needs_plt = 1;
886a2506
NC
2074 }
2075
08759e0f 2076 /* Add info to the symbol got_entry_list. */
535b785f
AM
2077 if (is_reloc_for_GOT (howto)
2078 || is_reloc_for_TLS (howto))
34e967a5 2079 {
d07b621f
CM
2080 if (bfd_link_dll (info) && !bfd_link_pie (info)
2081 && (r_type == R_ARC_TLS_LE_32 || r_type == R_ARC_TLS_LE_S9))
2082 {
2083 const char *name;
2084 if (h)
2085 name = h->root.root.string;
2086 else
2087 /* bfd_elf_sym_name (abfd, symtab_hdr, isym, NULL); */
2088 name = "UNKNOWN";
2089 _bfd_error_handler
2090 /* xgettext:c-format */
2091 (_("%pB: relocation %s against `%s' can not be used"
2092 " when making a shared object; recompile with -fPIC"),
2093 abfd,
2094 arc_elf_howto (r_type)->name,
2095 name);
2096 bfd_set_error (bfd_error_bad_value);
2097 return FALSE;
2098 }
e3d1d408
CM
2099 if (! _bfd_elf_create_got_section (dynobj, info))
2100 return FALSE;
2101
08759e0f
CM
2102 arc_fill_got_info_for_reloc (
2103 arc_got_entry_type_for_reloc (howto),
2104 get_got_entry_list_for_symbol (abfd, r_symndx, h),
2105 info,
2106 h);
34e967a5
MC
2107 }
2108 }
886a2506 2109
34e967a5
MC
2110 return TRUE;
2111}
886a2506 2112
34e967a5 2113#define ELF_DYNAMIC_INTERPRETER "/sbin/ld-uClibc.so"
886a2506 2114
14aa7c52 2115static const struct plt_version_t *
34e967a5 2116arc_get_plt_version (struct bfd_link_info *info)
886a2506 2117{
34e967a5 2118 int i;
886a2506 2119
34e967a5
MC
2120 for (i = 0; i < 1; i++)
2121 {
2122 ARC_DEBUG ("%d: size1 = %d, size2 = %d\n", i,
f7e8b360
NC
2123 (int) plt_versions[i].entry_size,
2124 (int) plt_versions[i].elem_size);
34e967a5 2125 }
886a2506 2126
34e967a5 2127 if (bfd_get_mach (info->output_bfd) == bfd_mach_arc_arcv2)
886a2506 2128 {
34e967a5
MC
2129 if (bfd_link_pic (info))
2130 return &(plt_versions[ELF_ARCV2_PIC]);
2131 else
2132 return &(plt_versions[ELF_ARCV2_ABS]);
2133 }
2134 else
886a2506 2135 {
34e967a5
MC
2136 if (bfd_link_pic (info))
2137 return &(plt_versions[ELF_ARC_PIC]);
2138 else
2139 return &(plt_versions[ELF_ARC_ABS]);
886a2506 2140 }
886a2506
NC
2141}
2142
2143static bfd_vma
2144add_symbol_to_plt (struct bfd_link_info *info)
2145{
34e967a5 2146 struct elf_link_hash_table *htab = elf_hash_table (info);
886a2506
NC
2147 bfd_vma ret;
2148
14aa7c52 2149 const struct plt_version_t *plt_data = arc_get_plt_version (info);
886a2506 2150
34e967a5
MC
2151 /* If this is the first .plt entry, make room for the special first
2152 entry. */
2153 if (htab->splt->size == 0)
2154 htab->splt->size += plt_data->entry_size;
886a2506 2155
34e967a5
MC
2156 ret = htab->splt->size;
2157
2158 htab->splt->size += plt_data->elem_size;
f7e8b360 2159 ARC_DEBUG ("PLT_SIZE = %d\n", (int) htab->splt->size);
34e967a5
MC
2160
2161 htab->sgotplt->size += 4;
2162 htab->srelplt->size += sizeof (Elf32_External_Rela);
886a2506
NC
2163
2164 return ret;
2165}
2166
34e967a5
MC
2167#define PLT_DO_RELOCS_FOR_ENTRY(ABFD, DS, RELOCS) \
2168 plt_do_relocs_for_symbol (ABFD, DS, RELOCS, 0, 0)
886a2506
NC
2169
2170static void
34e967a5
MC
2171plt_do_relocs_for_symbol (bfd *abfd,
2172 struct elf_link_hash_table *htab,
2173 const struct plt_reloc *reloc,
886a2506
NC
2174 bfd_vma plt_offset,
2175 bfd_vma symbol_got_offset)
2176{
2177 while (SYM_ONLY (reloc->symbol) != LAST_RELOC)
2178 {
2179 bfd_vma relocation = 0;
2180
2181 switch (SYM_ONLY (reloc->symbol))
2182 {
2183 case SGOT:
08759e0f
CM
2184 relocation
2185 = htab->sgotplt->output_section->vma
2186 + htab->sgotplt->output_offset + symbol_got_offset;
886a2506
NC
2187 break;
2188 }
2189 relocation += reloc->addend;
2190
34e967a5
MC
2191 if (IS_RELATIVE (reloc->symbol))
2192 {
2193 bfd_vma reloc_offset = reloc->offset;
2194 reloc_offset -= (IS_INSN_32 (reloc->symbol)) ? 4 : 0;
2195 reloc_offset -= (IS_INSN_24 (reloc->symbol)) ? 2 : 0;
886a2506 2196
34e967a5
MC
2197 relocation -= htab->splt->output_section->vma
2198 + htab->splt->output_offset
2199 + plt_offset + reloc_offset;
2200 }
2201
2202 /* TODO: being ME is not a property of the relocation but of the
2203 section of which is applying the relocation. */
1e5885b7 2204 if (IS_MIDDLE_ENDIAN (reloc->symbol) && !bfd_big_endian (abfd))
886a2506 2205 {
08759e0f
CM
2206 relocation
2207 = ((relocation & 0xffff0000) >> 16)
2208 | ((relocation & 0xffff) << 16);
886a2506
NC
2209 }
2210
2211 switch (reloc->size)
2212 {
2213 case 32:
34e967a5 2214 bfd_put_32 (htab->splt->output_section->owner,
886a2506 2215 relocation,
34e967a5 2216 htab->splt->contents + plt_offset + reloc->offset);
886a2506
NC
2217 break;
2218 }
2219
34e967a5 2220 reloc = &(reloc[1]); /* Jump to next relocation. */
886a2506
NC
2221 }
2222}
2223
2224static void
34e967a5
MC
2225relocate_plt_for_symbol (bfd *output_bfd,
2226 struct bfd_link_info *info,
886a2506
NC
2227 struct elf_link_hash_entry *h)
2228{
14aa7c52 2229 const struct plt_version_t *plt_data = arc_get_plt_version (info);
34e967a5 2230 struct elf_link_hash_table *htab = elf_hash_table (info);
886a2506 2231
34e967a5
MC
2232 bfd_vma plt_index = (h->plt.offset - plt_data->entry_size)
2233 / plt_data->elem_size;
886a2506
NC
2234 bfd_vma got_offset = (plt_index + 3) * 4;
2235
f7e8b360
NC
2236 ARC_DEBUG ("arc_info: PLT_OFFSET = %#lx, PLT_ENTRY_VMA = %#lx, \
2237GOT_ENTRY_OFFSET = %#lx, GOT_ENTRY_VMA = %#lx, for symbol %s\n",
2238 (long) h->plt.offset,
2239 (long) (htab->splt->output_section->vma
2240 + htab->splt->output_offset
2241 + h->plt.offset),
2242 (long) got_offset,
2243 (long) (htab->sgotplt->output_section->vma
2244 + htab->sgotplt->output_offset
2245 + got_offset),
34e967a5
MC
2246 h->root.root.string);
2247
1e5885b7
CZ
2248 {
2249 bfd_vma i = 0;
2250 uint16_t *ptr = (uint16_t *) plt_data->elem;
f7e8b360 2251
1e5885b7
CZ
2252 for (i = 0; i < plt_data->elem_size/2; i++)
2253 {
2254 uint16_t data = ptr[i];
2255 bfd_put_16 (output_bfd,
2256 (bfd_vma) data,
2257 htab->splt->contents + h->plt.offset + (i*2));
2258 }
2259 }
2260
34e967a5
MC
2261 plt_do_relocs_for_symbol (output_bfd, htab,
2262 plt_data->elem_relocs,
2263 h->plt.offset,
886a2506 2264 got_offset);
34e967a5
MC
2265
2266 /* Fill in the entry in the global offset table. */
2267 bfd_put_32 (output_bfd,
2268 (bfd_vma) (htab->splt->output_section->vma
2269 + htab->splt->output_offset),
2270 htab->sgotplt->contents + got_offset);
2271
2272 /* TODO: Fill in the entry in the .rela.plt section. */
2273 {
2274 Elf_Internal_Rela rel;
2275 bfd_byte *loc;
2276
2277 rel.r_offset = (htab->sgotplt->output_section->vma
2278 + htab->sgotplt->output_offset
2279 + got_offset);
2280 rel.r_addend = 0;
94e5c971
CZ
2281
2282 BFD_ASSERT (h->dynindx != -1);
34e967a5
MC
2283 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARC_JMP_SLOT);
2284
2285 loc = htab->srelplt->contents;
2286 loc += plt_index * sizeof (Elf32_External_Rela); /* relA */
2287 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
2288 }
886a2506
NC
2289}
2290
2291static void
34e967a5
MC
2292relocate_plt_for_entry (bfd *abfd,
2293 struct bfd_link_info *info)
886a2506 2294{
14aa7c52 2295 const struct plt_version_t *plt_data = arc_get_plt_version (info);
34e967a5 2296 struct elf_link_hash_table *htab = elf_hash_table (info);
886a2506 2297
1e5885b7
CZ
2298 {
2299 bfd_vma i = 0;
2300 uint16_t *ptr = (uint16_t *) plt_data->entry;
2301 for (i = 0; i < plt_data->entry_size/2; i++)
2302 {
2303 uint16_t data = ptr[i];
2304 bfd_put_16 (abfd,
2305 (bfd_vma) data,
2306 htab->splt->contents + (i*2));
2307 }
2308 }
34e967a5 2309 PLT_DO_RELOCS_FOR_ENTRY (abfd, htab, plt_data->entry_relocs);
886a2506
NC
2310}
2311
34e967a5
MC
2312/* Desc : Adjust a symbol defined by a dynamic object and referenced
2313 by a regular object. The current definition is in some section of
2314 the dynamic object, but we're not including those sections. We
2315 have to change the definition to something the rest of the link can
886a2506
NC
2316 understand. */
2317
2318static bfd_boolean
2319elf_arc_adjust_dynamic_symbol (struct bfd_link_info *info,
2320 struct elf_link_hash_entry *h)
2321{
34e967a5 2322 asection *s;
886a2506 2323 bfd *dynobj = (elf_hash_table (info))->dynobj;
34e967a5 2324 struct elf_link_hash_table *htab = elf_hash_table (info);
886a2506 2325
34e967a5
MC
2326 if (h->type == STT_FUNC
2327 || h->type == STT_GNU_IFUNC
2328 || h->needs_plt == 1)
886a2506
NC
2329 {
2330 if (!bfd_link_pic (info) && !h->def_dynamic && !h->ref_dynamic)
2331 {
2332 /* This case can occur if we saw a PLT32 reloc in an input
2333 file, but the symbol was never referred to by a dynamic
2334 object. In such a case, we don't actually need to build
2335 a procedure linkage table, and we can just do a PC32
2336 reloc instead. */
2337 BFD_ASSERT (h->needs_plt);
2338 return TRUE;
2339 }
2340
2341 /* Make sure this symbol is output as a dynamic symbol. */
2342 if (h->dynindx == -1 && !h->forced_local
2343 && !bfd_elf_link_record_dynamic_symbol (info, h))
2344 return FALSE;
2345
34e967a5
MC
2346 if (bfd_link_pic (info)
2347 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
886a2506
NC
2348 {
2349 bfd_vma loc = add_symbol_to_plt (info);
2350
08759e0f 2351 if (bfd_link_executable (info) && !h->def_regular)
886a2506 2352 {
34e967a5 2353 h->root.u.def.section = htab->splt;
886a2506
NC
2354 h->root.u.def.value = loc;
2355 }
2356 h->plt.offset = loc;
2357 }
34e967a5
MC
2358 else
2359 {
2360 h->plt.offset = (bfd_vma) -1;
2361 h->needs_plt = 0;
2362 }
2363 return TRUE;
886a2506 2364 }
34e967a5
MC
2365
2366 /* If this is a weak symbol, and there is a real definition, the
2367 processor independent code will have arranged for us to see the
2368 real definition first, and we can just use the same value. */
60d67dc8 2369 if (h->is_weakalias)
886a2506 2370 {
60d67dc8
AM
2371 struct elf_link_hash_entry *def = weakdef (h);
2372 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
2373 h->root.u.def.section = def->root.u.def.section;
2374 h->root.u.def.value = def->root.u.def.value;
34e967a5 2375 return TRUE;
886a2506
NC
2376 }
2377
34e967a5
MC
2378 /* This is a reference to a symbol defined by a dynamic object which
2379 is not a function. */
2380
2381 /* If we are creating a shared library, we must presume that the
2382 only references to the symbol are via the global offset table.
2383 For such cases we need not do anything here; the relocations will
2384 be handled correctly by relocate_section. */
3c8adaca
CZ
2385 if (!bfd_link_executable (info))
2386 return TRUE;
2387
2388 /* If there are no non-GOT references, we do not need a copy
2389 relocation. */
2390 if (!h->non_got_ref)
34e967a5
MC
2391 return TRUE;
2392
3c8adaca
CZ
2393 /* If -z nocopyreloc was given, we won't generate them either. */
2394 if (info->nocopyreloc)
2395 {
2396 h->non_got_ref = 0;
2397 return TRUE;
2398 }
2399
34e967a5
MC
2400 /* We must allocate the symbol in our .dynbss section, which will
2401 become part of the .bss section of the executable. There will be
2402 an entry for this symbol in the .dynsym section. The dynamic
2403 object will contain position independent code, so all references
2404 from the dynamic object to this symbol will go through the global
2405 offset table. The dynamic linker will use the .dynsym entry to
2406 determine the address it must put in the global offset table, so
2407 both the dynamic object and the regular object will refer to the
2408 same memory location for the variable. */
2409
3c8adaca
CZ
2410 if (htab == NULL)
2411 return FALSE;
34e967a5
MC
2412
2413 /* We must generate a R_ARC_COPY reloc to tell the dynamic linker to
2414 copy the initial value out of the dynamic object and into the
2415 runtime process image. We need to remember the offset into the
2416 .rela.bss section we are going to use. */
2417 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
2418 {
8a36df4d 2419 struct elf_arc_link_hash_table *arc_htab = elf_arc_hash_table (info);
34e967a5 2420
9d19e4fd
AM
2421 BFD_ASSERT (arc_htab->elf.srelbss != NULL);
2422 arc_htab->elf.srelbss->size += sizeof (Elf32_External_Rela);
34e967a5
MC
2423 h->needs_copy = 1;
2424 }
2425
8a36df4d 2426 /* TODO: Move this also to arc_hash_table. */
3c8adaca
CZ
2427 s = bfd_get_section_by_name (dynobj, ".dynbss");
2428 BFD_ASSERT (s != NULL);
34e967a5 2429
3c8adaca 2430 return _bfd_elf_adjust_dynamic_copy (info, h, s);
886a2506
NC
2431}
2432
2433/* Function : elf_arc_finish_dynamic_symbol
2434 Brief : Finish up dynamic symbol handling. We set the
34e967a5 2435 contents of various dynamic sections here.
886a2506 2436 Args : output_bfd :
34e967a5
MC
2437 info :
2438 h :
2439 sym :
886a2506 2440 Returns : True/False as the return status. */
34e967a5 2441
886a2506
NC
2442static bfd_boolean
2443elf_arc_finish_dynamic_symbol (bfd * output_bfd,
2444 struct bfd_link_info *info,
2445 struct elf_link_hash_entry *h,
2446 Elf_Internal_Sym * sym)
2447{
34e967a5 2448 if (h->plt.offset != (bfd_vma) -1)
886a2506 2449 {
34e967a5
MC
2450 relocate_plt_for_symbol (output_bfd, info, h);
2451
2452 if (!h->def_regular)
886a2506 2453 {
34e967a5
MC
2454 /* Mark the symbol as undefined, rather than as defined in
2455 the .plt section. Leave the value alone. */
2456 sym->st_shndx = SHN_UNDEF;
886a2506 2457 }
34e967a5
MC
2458 }
2459
34e967a5 2460
08759e0f
CM
2461 /* This function traverses list of GOT entries and
2462 create respective dynamic relocs. */
2463 /* TODO: Make function to get list and not access the list directly. */
2464 /* TODO: Move function to relocate_section create this relocs eagerly. */
854b8506
CM
2465 struct elf_arc_link_hash_entry *ah =
2466 (struct elf_arc_link_hash_entry *) h;
2467 create_got_dynrelocs_for_got_info (&ah->got_ents,
08759e0f
CM
2468 output_bfd,
2469 info,
2470 h);
34e967a5
MC
2471
2472 if (h->needs_copy)
2473 {
8a36df4d
CM
2474 struct elf_arc_link_hash_table *arc_htab = elf_arc_hash_table (info);
2475
c834917f
CM
2476 if (arc_htab == NULL)
2477 return FALSE;
2478
8a36df4d
CM
2479 if (h->dynindx == -1
2480 || (h->root.type != bfd_link_hash_defined
2481 && h->root.type != bfd_link_hash_defweak)
9d19e4fd 2482 || arc_htab->elf.srelbss == NULL)
8a36df4d
CM
2483 abort ();
2484
34e967a5
MC
2485 bfd_vma rel_offset = (h->root.u.def.value
2486 + h->root.u.def.section->output_section->vma
2487 + h->root.u.def.section->output_offset);
2488
9d19e4fd
AM
2489 bfd_byte * loc = arc_htab->elf.srelbss->contents
2490 + (arc_htab->elf.srelbss->reloc_count * sizeof (Elf32_External_Rela));
2491 arc_htab->elf.srelbss->reloc_count++;
34e967a5
MC
2492
2493 Elf_Internal_Rela rel;
2494 rel.r_addend = 0;
2495 rel.r_offset = rel_offset;
94e5c971
CZ
2496
2497 BFD_ASSERT (h->dynindx != -1);
34e967a5
MC
2498 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARC_COPY);
2499
23a42089 2500 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
886a2506
NC
2501 }
2502
2503 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
2504 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
2505 || strcmp (h->root.root.string, "__DYNAMIC") == 0
2506 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
2507 sym->st_shndx = SHN_ABS;
2508
2509 return TRUE;
2510}
2511
4ade44b7 2512#define GET_SYMBOL_OR_SECTION(TAG, SYMBOL, SECTION) \
34e967a5
MC
2513 case TAG: \
2514 if (SYMBOL != NULL) \
4ade44b7
AM
2515 h = elf_link_hash_lookup (elf_hash_table (info), \
2516 SYMBOL, FALSE, FALSE, TRUE); \
34e967a5 2517 else if (SECTION != NULL) \
4ade44b7 2518 s = bfd_get_linker_section (dynobj, SECTION); \
34e967a5 2519 break;
886a2506 2520
d07b621f
CM
2521
2522struct obfd_info_group {
2523 bfd *output_bfd;
2524 struct bfd_link_info *info;
2525};
2526
2527static bfd_boolean
2528arc_create_forced_local_got_entries_for_tls (struct bfd_hash_entry *bh,
2529 void *data)
2530{
2531 struct elf_arc_link_hash_entry * h =
2532 (struct elf_arc_link_hash_entry *) bh;
2533 struct obfd_info_group *tmp = (struct obfd_info_group *) data;
2534
2535 if (h->got_ents != NULL)
2536 {
2537 BFD_ASSERT (h);
2538
2539 struct got_entry *list = h->got_ents;
2540
2541 while (list != NULL)
2542 {
2543 create_got_dynrelocs_for_single_entry (list, tmp->output_bfd,
20b233dc
CM
2544 tmp->info,
2545 (struct elf_link_hash_entry *) h);
d07b621f
CM
2546 list = list->next;
2547 }
2548 }
2549
2550 return TRUE;
2551}
2552
2553
886a2506
NC
2554/* Function : elf_arc_finish_dynamic_sections
2555 Brief : Finish up the dynamic sections handling.
2556 Args : output_bfd :
34e967a5
MC
2557 info :
2558 h :
2559 sym :
886a2506 2560 Returns : True/False as the return status. */
34e967a5 2561
886a2506 2562static bfd_boolean
34e967a5
MC
2563elf_arc_finish_dynamic_sections (bfd * output_bfd,
2564 struct bfd_link_info *info)
886a2506 2565{
34e967a5 2566 struct elf_link_hash_table *htab = elf_hash_table (info);
886a2506 2567 bfd *dynobj = (elf_hash_table (info))->dynobj;
034fed0b 2568 asection *sdyn = bfd_get_linker_section (dynobj, ".dynamic");
886a2506 2569
034fed0b 2570 if (sdyn)
886a2506
NC
2571 {
2572 Elf32_External_Dyn *dyncon, *dynconend;
2573
034fed0b 2574 dyncon = (Elf32_External_Dyn *) sdyn->contents;
08759e0f 2575 dynconend
034fed0b 2576 = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
886a2506
NC
2577 for (; dyncon < dynconend; dyncon++)
2578 {
2579 Elf_Internal_Dyn internal_dyn;
2580 bfd_boolean do_it = FALSE;
2581
2582 struct elf_link_hash_entry *h = NULL;
2583 asection *s = NULL;
2584
2585 bfd_elf32_swap_dyn_in (dynobj, dyncon, &internal_dyn);
2586
2587 switch (internal_dyn.d_tag)
2588 {
65b94e90
CM
2589 GET_SYMBOL_OR_SECTION (DT_INIT, info->init_function, NULL)
2590 GET_SYMBOL_OR_SECTION (DT_FINI, info->fini_function, NULL)
4ade44b7
AM
2591 GET_SYMBOL_OR_SECTION (DT_PLTGOT, NULL, ".plt")
2592 GET_SYMBOL_OR_SECTION (DT_JMPREL, NULL, ".rela.plt")
2593 GET_SYMBOL_OR_SECTION (DT_PLTRELSZ, NULL, ".rela.plt")
4ade44b7
AM
2594 GET_SYMBOL_OR_SECTION (DT_VERSYM, NULL, ".gnu.version")
2595 GET_SYMBOL_OR_SECTION (DT_VERDEF, NULL, ".gnu.version_d")
2596 GET_SYMBOL_OR_SECTION (DT_VERNEED, NULL, ".gnu.version_r")
886a2506
NC
2597 default:
2598 break;
2599 }
2600
34e967a5 2601 /* In case the dynamic symbols should be updated with a symbol. */
886a2506
NC
2602 if (h != NULL
2603 && (h->root.type == bfd_link_hash_defined
34e967a5 2604 || h->root.type == bfd_link_hash_defweak))
886a2506
NC
2605 {
2606 asection *asec_ptr;
2607
2608 internal_dyn.d_un.d_val = h->root.u.def.value;
2609 asec_ptr = h->root.u.def.section;
2610 if (asec_ptr->output_section != NULL)
2611 {
2612 internal_dyn.d_un.d_val +=
08759e0f
CM
2613 (asec_ptr->output_section->vma
2614 + asec_ptr->output_offset);
886a2506
NC
2615 }
2616 else
2617 {
34e967a5
MC
2618 /* The symbol is imported from another shared
2619 library and does not apply to this one. */
886a2506
NC
2620 internal_dyn.d_un.d_val = 0;
2621 }
2622 do_it = TRUE;
2623 }
2624 else if (s != NULL) /* With a section information. */
2625 {
2626 switch (internal_dyn.d_tag)
2627 {
2628 case DT_PLTGOT:
2629 case DT_JMPREL:
34e967a5
MC
2630 case DT_VERSYM:
2631 case DT_VERDEF:
2632 case DT_VERNEED:
4ade44b7
AM
2633 internal_dyn.d_un.d_ptr = (s->output_section->vma
2634 + s->output_offset);
886a2506
NC
2635 do_it = TRUE;
2636 break;
2637
2638 case DT_PLTRELSZ:
2639 internal_dyn.d_un.d_val = s->size;
2640 do_it = TRUE;
2641 break;
2642
886a2506
NC
2643 default:
2644 break;
2645 }
2646 }
2647
4ade44b7 2648 if (do_it)
886a2506
NC
2649 bfd_elf32_swap_dyn_out (output_bfd, &internal_dyn, dyncon);
2650 }
2651
34e967a5 2652 if (htab->splt->size > 0)
886a2506 2653 {
34e967a5 2654 relocate_plt_for_entry (output_bfd, info);
886a2506
NC
2655 }
2656
34e967a5 2657 /* TODO: Validate this. */
034fed0b
AM
2658 if (htab->srelplt->output_section != bfd_abs_section_ptr)
2659 elf_section_data (htab->srelplt->output_section)
2660 ->this_hdr.sh_entsize = 12;
886a2506
NC
2661 }
2662
2663 /* Fill in the first three entries in the global offset table. */
34e967a5 2664 if (htab->sgot)
886a2506 2665 {
3b63d2ce
CM
2666 struct elf_link_hash_entry *h;
2667 h = elf_link_hash_lookup (elf_hash_table (info), "_GLOBAL_OFFSET_TABLE_",
2668 FALSE, FALSE, TRUE);
2669
2670 if (h != NULL && h->root.type != bfd_link_hash_undefined
2671 && h->root.u.def.section != NULL)
886a2506 2672 {
3b63d2ce
CM
2673 asection *sec = h->root.u.def.section;
2674
034fed0b 2675 if (sdyn == NULL)
886a2506 2676 bfd_put_32 (output_bfd, (bfd_vma) 0,
3b63d2ce 2677 sec->contents);
886a2506
NC
2678 else
2679 bfd_put_32 (output_bfd,
034fed0b 2680 sdyn->output_section->vma + sdyn->output_offset,
3b63d2ce
CM
2681 sec->contents);
2682 bfd_put_32 (output_bfd, (bfd_vma) 0, sec->contents + 4);
2683 bfd_put_32 (output_bfd, (bfd_vma) 0, sec->contents + 8);
886a2506
NC
2684 }
2685 }
2686
d07b621f
CM
2687 struct obfd_info_group group;
2688 group.output_bfd = output_bfd;
2689 group.info = info;
2690 bfd_hash_traverse (&info->hash->table,
2691 arc_create_forced_local_got_entries_for_tls, &group);
2692
886a2506
NC
2693 return TRUE;
2694}
2695
34e967a5
MC
2696#define ADD_DYNAMIC_SYMBOL(NAME, TAG) \
2697 h = elf_link_hash_lookup (elf_hash_table (info), \
2698 NAME, FALSE, FALSE, FALSE); \
2699 if ((h != NULL && (h->ref_regular || h->def_regular))) \
2700 if (! _bfd_elf_add_dynamic_entry (info, TAG, 0)) \
886a2506
NC
2701 return FALSE;
2702
2703/* Set the sizes of the dynamic sections. */
2704static bfd_boolean
034fed0b 2705elf_arc_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
34e967a5 2706 struct bfd_link_info *info)
886a2506 2707{
034fed0b
AM
2708 bfd *dynobj;
2709 asection *s;
2710 bfd_boolean relocs_exist = FALSE;
34e967a5 2711 struct elf_link_hash_table *htab = elf_hash_table (info);
886a2506 2712
034fed0b 2713 dynobj = htab->dynobj;
886a2506
NC
2714 BFD_ASSERT (dynobj != NULL);
2715
034fed0b 2716 if (htab->dynamic_sections_created)
886a2506
NC
2717 {
2718 struct elf_link_hash_entry *h;
2719
34e967a5
MC
2720 /* Set the contents of the .interp section to the
2721 interpreter. */
034fed0b 2722 if (bfd_link_executable (info) && !info->nointerp)
886a2506
NC
2723 {
2724 s = bfd_get_section_by_name (dynobj, ".interp");
2725 BFD_ASSERT (s != NULL);
34e967a5 2726 s->size = sizeof (ELF_DYNAMIC_INTERPRETER);
886a2506
NC
2727 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2728 }
2729
34e967a5
MC
2730 /* Add some entries to the .dynamic section. We fill in some of
2731 the values later, in elf_bfd_final_link, but we must add the
2732 entries now so that we know the final size of the .dynamic
2733 section. Checking if the .init section is present. We also
2734 create DT_INIT and DT_FINI entries if the init_str has been
2735 changed by the user. */
65b94e90
CM
2736 ADD_DYNAMIC_SYMBOL (info->init_function, DT_INIT);
2737 ADD_DYNAMIC_SYMBOL (info->fini_function, DT_FINI);
886a2506
NC
2738 }
2739 else
2740 {
34e967a5
MC
2741 /* We may have created entries in the .rela.got section.
2742 However, if we are not creating the dynamic sections, we will
2743 not actually use these entries. Reset the size of .rela.got,
2744 which will cause it to get stripped from the output file
2745 below. */
2746 if (htab->srelgot != NULL)
2747 htab->srelgot->size = 0;
886a2506
NC
2748 }
2749
2750 for (s = dynobj->sections; s != NULL; s = s->next)
2751 {
34e967a5 2752 if ((s->flags & SEC_LINKER_CREATED) == 0)
886a2506
NC
2753 continue;
2754
034fed0b
AM
2755 if (s == htab->splt
2756 || s == htab->sgot
2757 || s == htab->sgotplt
2758 || s == htab->sdynbss)
886a2506 2759 {
034fed0b
AM
2760 /* Strip this section if we don't need it. */
2761 }
2762 else if (strncmp (s->name, ".rela", 5) == 0)
2763 {
2764 if (s->size != 0 && s != htab->srelplt)
3084d7a2 2765 relocs_exist = TRUE;
886a2506 2766
34e967a5
MC
2767 /* We use the reloc_count field as a counter if we need to
2768 copy relocs into the output file. */
2769 s->reloc_count = 0;
886a2506 2770 }
034fed0b
AM
2771 else
2772 {
2773 /* It's not one of our sections, so don't allocate space. */
2774 continue;
2775 }
34e967a5 2776
034fed0b
AM
2777 if (s->size == 0)
2778 {
2779 s->flags |= SEC_EXCLUDE;
2780 continue;
2781 }
34e967a5 2782
034fed0b
AM
2783 if ((s->flags & SEC_HAS_CONTENTS) == 0)
2784 continue;
34e967a5 2785
034fed0b
AM
2786 /* Allocate memory for the section contents. */
2787 s->contents = bfd_zalloc (dynobj, s->size);
2788 if (s->contents == NULL)
34e967a5 2789 return FALSE;
886a2506
NC
2790 }
2791
3084d7a2 2792 return _bfd_elf_add_dynamic_tags (output_bfd, info, relocs_exist);
886a2506
NC
2793}
2794
0f7f3789
CM
2795
2796/* Classify dynamic relocs such that -z combreloc can reorder and combine
2797 them. */
2798static enum elf_reloc_type_class
2799elf32_arc_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
2800 const asection *rel_sec ATTRIBUTE_UNUSED,
2801 const Elf_Internal_Rela *rela)
2802{
2803 switch ((int) ELF32_R_TYPE (rela->r_info))
2804 {
2805 case R_ARC_RELATIVE:
2806 return reloc_class_relative;
2807 case R_ARC_JMP_SLOT:
2808 return reloc_class_plt;
2809 case R_ARC_COPY:
2810 return reloc_class_copy;
2811 /* TODO: Needed in future to support ifunc. */
2812 /*
2813 case R_ARC_IRELATIVE:
2814 return reloc_class_ifunc;
2815 */
2816 default:
2817 return reloc_class_normal;
2818 }
2819}
2820
34e967a5
MC
2821const struct elf_size_info arc_elf32_size_info =
2822{
2823 sizeof (Elf32_External_Ehdr),
2824 sizeof (Elf32_External_Phdr),
2825 sizeof (Elf32_External_Shdr),
2826 sizeof (Elf32_External_Rel),
2827 sizeof (Elf32_External_Rela),
2828 sizeof (Elf32_External_Sym),
2829 sizeof (Elf32_External_Dyn),
2830 sizeof (Elf_External_Note),
2831 4,
2832 1,
2833 32, 2,
2834 ELFCLASS32, EV_CURRENT,
2835 bfd_elf32_write_out_phdrs,
2836 bfd_elf32_write_shdrs_and_ehdr,
2837 bfd_elf32_checksum_contents,
2838 bfd_elf32_write_relocs,
2839 bfd_elf32_swap_symbol_in,
2840 bfd_elf32_swap_symbol_out,
2841 bfd_elf32_slurp_reloc_table,
2842 bfd_elf32_slurp_symbol_table,
2843 bfd_elf32_swap_dyn_in,
2844 bfd_elf32_swap_dyn_out,
2845 bfd_elf32_swap_reloc_in,
2846 bfd_elf32_swap_reloc_out,
2847 bfd_elf32_swap_reloca_in,
2848 bfd_elf32_swap_reloca_out
2849};
2850
2851#define elf_backend_size_info arc_elf32_size_info
2852
47f7f636
AK
2853/* GDB expects general purpose registers to be in section .reg. However Linux
2854 kernel doesn't create this section and instead writes registers to NOTE
2855 section. It is up to the binutils to create a pseudo-section .reg from the
2856 contents of NOTE. Also BFD will read pid and signal number from NOTE. This
2857 function relies on offsets inside elf_prstatus structure in Linux to be
2858 stable. */
2859
2860static bfd_boolean
2861elf32_arc_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
2862{
2863 int offset;
2864 size_t size;
2865
2866 switch (note->descsz)
2867 {
2868 default:
2869 return FALSE;
2870
2871 case 236: /* sizeof (struct elf_prstatus) on Linux/arc. */
2872 /* pr_cursig */
2873 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
2874 /* pr_pid */
2875 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
2876 /* pr_regs */
2877 offset = 72;
2878 size = (40 * 4); /* There are 40 registers in user_regs_struct. */
2879 break;
2880 }
2881 /* Make a ".reg/999" section. */
2882 return _bfd_elfcore_make_pseudosection (abfd, ".reg", size,
2883 note->descpos + offset);
2884}
2885
53a346d8
CZ
2886/* Determine whether an object attribute tag takes an integer, a
2887 string or both. */
2888
2889static int
2890elf32_arc_obj_attrs_arg_type (int tag)
2891{
2892 if (tag == Tag_ARC_CPU_name
2893 || tag == Tag_ARC_ISA_config
2894 || tag == Tag_ARC_ISA_apex)
2895 return ATTR_TYPE_FLAG_STR_VAL;
2896 else if (tag < (Tag_ARC_ISA_mpy_option + 1))
2897 return ATTR_TYPE_FLAG_INT_VAL;
2898 else
2899 return (tag & 1) != 0 ? ATTR_TYPE_FLAG_STR_VAL : ATTR_TYPE_FLAG_INT_VAL;
2900}
2901
2902/* Attribute numbers >=14 can be safely ignored. */
2903
2904static bfd_boolean
2905elf32_arc_obj_attrs_handle_unknown (bfd *abfd, int tag)
2906{
2907 if ((tag & 127) < (Tag_ARC_ISA_mpy_option + 1))
2908 {
2909 _bfd_error_handler
38f14ab8 2910 (_("%pB: unknown mandatory ARC object attribute %d"),
53a346d8
CZ
2911 abfd, tag);
2912 bfd_set_error (bfd_error_bad_value);
2913 return FALSE;
2914 }
2915 else
2916 {
2917 _bfd_error_handler
38f14ab8 2918 (_("warning: %pB: unknown ARC object attribute %d"),
53a346d8
CZ
2919 abfd, tag);
2920 return TRUE;
2921 }
2922}
2923
2924/* Handle an ARC specific section when reading an object file. This is
2925 called when bfd_section_from_shdr finds a section with an unknown
2926 type. */
2927
2928static bfd_boolean
2929elf32_arc_section_from_shdr (bfd *abfd,
2930 Elf_Internal_Shdr * hdr,
2931 const char *name,
2932 int shindex)
2933{
2934 switch (hdr->sh_type)
2935 {
6af04484 2936 case 0x0c: /* MWDT specific section, don't complain about it. */
53a346d8
CZ
2937 case SHT_ARC_ATTRIBUTES:
2938 break;
2939
2940 default:
2941 return FALSE;
2942 }
2943
2944 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2945 return FALSE;
2946
2947 return TRUE;
2948}
2949
ef551643
CZ
2950/* Relaxation hook.
2951
2952 These are the current relaxing opportunities available:
2953
2954 * R_ARC_GOTPC32 => R_ARC_PCREL.
2955
2956*/
2957
2958static bfd_boolean
2959arc_elf_relax_section (bfd *abfd, asection *sec,
2960 struct bfd_link_info *link_info, bfd_boolean *again)
2961{
2962 Elf_Internal_Shdr *symtab_hdr;
2963 Elf_Internal_Rela *internal_relocs;
2964 Elf_Internal_Rela *irel, *irelend;
2965 bfd_byte *contents = NULL;
2966 Elf_Internal_Sym *isymbuf = NULL;
2967
2968 /* Assume nothing changes. */
2969 *again = FALSE;
2970
2971 /* We don't have to do anything for a relocatable link, if this
2972 section does not have relocs, or if this is not a code
2973 section. */
2974 if (bfd_link_relocatable (link_info)
2975 || (sec->flags & SEC_RELOC) == 0
2976 || sec->reloc_count == 0
2977 || (sec->flags & SEC_CODE) == 0)
2978 return TRUE;
2979
2980 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2981
2982 /* Get a copy of the native relocations. */
2983 internal_relocs = _bfd_elf_link_read_relocs (abfd, sec, NULL, NULL,
2984 link_info->keep_memory);
2985 if (internal_relocs == NULL)
2986 goto error_return;
2987
2988 /* Walk through them looking for relaxing opportunities. */
2989 irelend = internal_relocs + sec->reloc_count;
2990 for (irel = internal_relocs; irel < irelend; irel++)
2991 {
2992 /* If this isn't something that can be relaxed, then ignore
2993 this reloc. */
2994 if (ELF32_R_TYPE (irel->r_info) != (int) R_ARC_GOTPC32)
2995 continue;
2996
2997 /* Get the section contents if we haven't done so already. */
2998 if (contents == NULL)
2999 {
3000 /* Get cached copy if it exists. */
3001 if (elf_section_data (sec)->this_hdr.contents != NULL)
3002 contents = elf_section_data (sec)->this_hdr.contents;
3003 /* Go get them off disk. */
3004 else if (!bfd_malloc_and_get_section (abfd, sec, &contents))
3005 goto error_return;
3006 }
3007
3008 /* Read this BFD's local symbols if we haven't done so already. */
3009 if (isymbuf == NULL && symtab_hdr->sh_info != 0)
3010 {
3011 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3012 if (isymbuf == NULL)
3013 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3014 symtab_hdr->sh_info, 0,
3015 NULL, NULL, NULL);
3016 if (isymbuf == NULL)
3017 goto error_return;
3018 }
3019
3020 struct elf_link_hash_entry *htop = NULL;
3021
3022 if (ELF32_R_SYM (irel->r_info) >= symtab_hdr->sh_info)
3023 {
3024 /* An external symbol. */
3025 unsigned int indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
3026 htop = elf_sym_hashes (abfd)[indx];
3027 }
3028
3029 if (ELF32_R_TYPE (irel->r_info) == (int) R_ARC_GOTPC32
3030 && SYMBOL_REFERENCES_LOCAL (link_info, htop))
3031 {
3032 unsigned int code;
3033
3034 /* Get the opcode. */
3035 code = bfd_get_32_me (abfd, contents + irel->r_offset - 4);
3036
3037 /* Note that we've changed the relocs, section contents, etc. */
3038 elf_section_data (sec)->relocs = internal_relocs;
3039 elf_section_data (sec)->this_hdr.contents = contents;
3040 symtab_hdr->contents = (unsigned char *) isymbuf;
3041
3042 /* Fix the relocation's type. */
3043 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info), R_ARC_PC32);
3044
3045 /* ld rA,[pcl,symbol@tgot] -> add rA,pcl,symbol@pcl. */
3046 /* 0010 0bbb aa11 0ZZX DBBB 1111 10AA AAAA.
3047 111 00 000 0111 xx xxxx*/
3048 code &= ~0x27307F80;
3049 BFD_ASSERT (code <= 62UL);
3050 code |= 0x27007F80;
3051
3052 /* Write back the new instruction. */
3053 bfd_put_32_me (abfd, code, contents + irel->r_offset - 4);
3054
3055 /* The size isn't changed, don't redo. */
3056 *again = FALSE;
3057 }
3058 }
3059
3060 if (isymbuf != NULL
3061 && symtab_hdr->contents != (unsigned char *) isymbuf)
3062 {
3063 if (!link_info->keep_memory)
3064 free (isymbuf);
3065 else
3066 /* Cache the symbols for elf_link_input_bfd. */
3067 symtab_hdr->contents = (unsigned char *) isymbuf;
3068 }
3069
3070 if (contents != NULL
3071 && elf_section_data (sec)->this_hdr.contents != contents)
3072 {
3073 if (!link_info->keep_memory)
3074 free (contents);
3075 else
3076 /* Cache the section contents for elf_link_input_bfd. */
3077 elf_section_data (sec)->this_hdr.contents = contents;
3078 }
3079
c9594989 3080 if (elf_section_data (sec)->relocs != internal_relocs)
ef551643
CZ
3081 free (internal_relocs);
3082
3083 return TRUE;
3084
3085 error_return:
c9594989 3086 if (symtab_hdr->contents != (unsigned char *) isymbuf)
ef551643 3087 free (isymbuf);
c9594989 3088 if (elf_section_data (sec)->this_hdr.contents != contents)
ef551643 3089 free (contents);
c9594989 3090 if (elf_section_data (sec)->relocs != internal_relocs)
ef551643
CZ
3091 free (internal_relocs);
3092
3093 return FALSE;
3094}
3095
6d00b590 3096#define TARGET_LITTLE_SYM arc_elf32_le_vec
47b0e7ad 3097#define TARGET_LITTLE_NAME "elf32-littlearc"
886a2506
NC
3098#define TARGET_BIG_SYM arc_elf32_be_vec
3099#define TARGET_BIG_NAME "elf32-bigarc"
3100#define ELF_ARCH bfd_arch_arc
8a36df4d 3101#define ELF_TARGET_ID ARC_ELF_DATA
886a2506
NC
3102#define ELF_MACHINE_CODE EM_ARC_COMPACT
3103#define ELF_MACHINE_ALT1 EM_ARC_COMPACT2
3104#define ELF_MAXPAGESIZE 0x2000
3105
34e967a5
MC
3106#define bfd_elf32_bfd_link_hash_table_create arc_elf_link_hash_table_create
3107
3108#define bfd_elf32_bfd_merge_private_bfd_data arc_elf_merge_private_bfd_data
3109#define bfd_elf32_bfd_reloc_type_lookup arc_elf32_bfd_reloc_type_lookup
3110#define bfd_elf32_bfd_set_private_flags arc_elf_set_private_flags
3111#define bfd_elf32_bfd_print_private_bfd_data arc_elf_print_private_bfd_data
3112#define bfd_elf32_bfd_copy_private_bfd_data arc_elf_copy_private_bfd_data
ef551643 3113#define bfd_elf32_bfd_relax_section arc_elf_relax_section
34e967a5 3114
886a2506
NC
3115#define elf_info_to_howto_rel arc_info_to_howto_rel
3116#define elf_backend_object_p arc_elf_object_p
3117#define elf_backend_final_write_processing arc_elf_final_write_processing
3118
3119#define elf_backend_relocate_section elf_arc_relocate_section
3120#define elf_backend_check_relocs elf_arc_check_relocs
9d19e4fd 3121#define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
886a2506 3122
0f7f3789
CM
3123#define elf_backend_reloc_type_class elf32_arc_reloc_type_class
3124
886a2506
NC
3125#define elf_backend_adjust_dynamic_symbol elf_arc_adjust_dynamic_symbol
3126#define elf_backend_finish_dynamic_symbol elf_arc_finish_dynamic_symbol
3127
3128#define elf_backend_finish_dynamic_sections elf_arc_finish_dynamic_sections
3129#define elf_backend_size_dynamic_sections elf_arc_size_dynamic_sections
3130
3131#define elf_backend_can_gc_sections 1
3132#define elf_backend_want_got_plt 1
3133#define elf_backend_plt_readonly 1
34e967a5 3134#define elf_backend_rela_plts_and_copies_p 1
886a2506
NC
3135#define elf_backend_want_plt_sym 0
3136#define elf_backend_got_header_size 12
64f52338 3137#define elf_backend_dtrel_excludes_plt 1
886a2506
NC
3138
3139#define elf_backend_may_use_rel_p 0
3140#define elf_backend_may_use_rela_p 1
3141#define elf_backend_default_use_rela_p 1
252b5132 3142
47f7f636
AK
3143#define elf_backend_grok_prstatus elf32_arc_grok_prstatus
3144
3c8adaca
CZ
3145#define elf_backend_default_execstack 0
3146
53a346d8
CZ
3147#undef elf_backend_obj_attrs_vendor
3148#define elf_backend_obj_attrs_vendor "ARC"
3149#undef elf_backend_obj_attrs_section
3150#define elf_backend_obj_attrs_section ".ARC.attributes"
3151#undef elf_backend_obj_attrs_arg_type
3152#define elf_backend_obj_attrs_arg_type elf32_arc_obj_attrs_arg_type
3153#undef elf_backend_obj_attrs_section_type
3154#define elf_backend_obj_attrs_section_type SHT_ARC_ATTRIBUTES
07d6d2b8 3155#define elf_backend_obj_attrs_handle_unknown elf32_arc_obj_attrs_handle_unknown
53a346d8 3156
07d6d2b8 3157#define elf_backend_section_from_shdr elf32_arc_section_from_shdr
53a346d8 3158
252b5132 3159#include "elf32-target.h"