]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-m68k.c
bfd:
[thirdparty/binutils-gdb.git] / bfd / elf32-m68k.c
CommitLineData
252b5132 1/* Motorola 68k series support for 32-bit ELF
7898deda
NC
2 Copyright 1993, 1995, 1996, 1997, 1998, 1999, 2000, 2001
3 Free Software Foundation, Inc.
252b5132
RH
4
5This file is part of BFD, the Binary File Descriptor library.
6
7This program is free software; you can redistribute it and/or modify
8it under the terms of the GNU General Public License as published by
9the Free Software Foundation; either version 2 of the License, or
10(at your option) any later version.
11
12This program is distributed in the hope that it will be useful,
13but WITHOUT ANY WARRANTY; without even the implied warranty of
14MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15GNU General Public License for more details.
16
17You should have received a copy of the GNU General Public License
18along with this program; if not, write to the Free Software
19Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
20
21#include "bfd.h"
22#include "sysdep.h"
23#include "bfdlink.h"
24#include "libbfd.h"
25#include "elf-bfd.h"
26#include "elf/m68k.h"
27
28static reloc_howto_type *reloc_type_lookup
29 PARAMS ((bfd *, bfd_reloc_code_real_type));
30static void rtype_to_howto
31 PARAMS ((bfd *, arelent *, Elf32_Internal_Rela *));
32static struct bfd_hash_entry *elf_m68k_link_hash_newfunc
33 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
34static struct bfd_link_hash_table *elf_m68k_link_hash_table_create
35 PARAMS ((bfd *));
36static boolean elf_m68k_check_relocs
37 PARAMS ((bfd *, struct bfd_link_info *, asection *,
38 const Elf_Internal_Rela *));
39static asection *elf_m68k_gc_mark_hook
40 PARAMS ((bfd *, struct bfd_link_info *, Elf_Internal_Rela *,
41 struct elf_link_hash_entry *, Elf_Internal_Sym *));
42static boolean elf_m68k_gc_sweep_hook
43 PARAMS ((bfd *, struct bfd_link_info *, asection *,
44 const Elf_Internal_Rela *));
45static boolean elf_m68k_adjust_dynamic_symbol
46 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
252b5132
RH
47static boolean elf_m68k_size_dynamic_sections
48 PARAMS ((bfd *, struct bfd_link_info *));
49static boolean elf_m68k_relocate_section
50 PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *, bfd_byte *,
51 Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
52static boolean elf_m68k_finish_dynamic_symbol
53 PARAMS ((bfd *, struct bfd_link_info *, struct elf_link_hash_entry *,
54 Elf_Internal_Sym *));
55static boolean elf_m68k_finish_dynamic_sections
56 PARAMS ((bfd *, struct bfd_link_info *));
57
9e1281c7
CM
58static boolean elf32_m68k_set_private_flags
59 PARAMS ((bfd *, flagword));
9e1281c7
CM
60static boolean elf32_m68k_merge_private_bfd_data
61 PARAMS ((bfd *, bfd *));
62static boolean elf32_m68k_print_private_bfd_data
63 PARAMS ((bfd *, PTR));
aa91b392 64static enum elf_reloc_type_class elf32_m68k_reloc_type_class
f51e552e 65 PARAMS ((const Elf_Internal_Rela *));
9e1281c7 66
252b5132
RH
67static reloc_howto_type howto_table[] = {
68 HOWTO(R_68K_NONE, 0, 0, 0, false,0, complain_overflow_dont, bfd_elf_generic_reloc, "R_68K_NONE", false, 0, 0x00000000,false),
69 HOWTO(R_68K_32, 0, 2,32, false,0, complain_overflow_bitfield, bfd_elf_generic_reloc, "R_68K_32", false, 0, 0xffffffff,false),
70 HOWTO(R_68K_16, 0, 1,16, false,0, complain_overflow_bitfield, bfd_elf_generic_reloc, "R_68K_16", false, 0, 0x0000ffff,false),
71 HOWTO(R_68K_8, 0, 0, 8, false,0, complain_overflow_bitfield, bfd_elf_generic_reloc, "R_68K_8", false, 0, 0x000000ff,false),
72 HOWTO(R_68K_PC32, 0, 2,32, true, 0, complain_overflow_bitfield, bfd_elf_generic_reloc, "R_68K_PC32", false, 0, 0xffffffff,true),
73 HOWTO(R_68K_PC16, 0, 1,16, true, 0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_PC16", false, 0, 0x0000ffff,true),
74 HOWTO(R_68K_PC8, 0, 0, 8, true, 0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_PC8", false, 0, 0x000000ff,true),
75 HOWTO(R_68K_GOT32, 0, 2,32, true, 0, complain_overflow_bitfield, bfd_elf_generic_reloc, "R_68K_GOT32", false, 0, 0xffffffff,true),
76 HOWTO(R_68K_GOT16, 0, 1,16, true, 0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_GOT16", false, 0, 0x0000ffff,true),
77 HOWTO(R_68K_GOT8, 0, 0, 8, true, 0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_GOT8", false, 0, 0x000000ff,true),
78 HOWTO(R_68K_GOT32O, 0, 2,32, false,0, complain_overflow_bitfield, bfd_elf_generic_reloc, "R_68K_GOT32O", false, 0, 0xffffffff,false),
79 HOWTO(R_68K_GOT16O, 0, 1,16, false,0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_GOT16O", false, 0, 0x0000ffff,false),
80 HOWTO(R_68K_GOT8O, 0, 0, 8, false,0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_GOT8O", false, 0, 0x000000ff,false),
81 HOWTO(R_68K_PLT32, 0, 2,32, true, 0, complain_overflow_bitfield, bfd_elf_generic_reloc, "R_68K_PLT32", false, 0, 0xffffffff,true),
82 HOWTO(R_68K_PLT16, 0, 1,16, true, 0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_PLT16", false, 0, 0x0000ffff,true),
83 HOWTO(R_68K_PLT8, 0, 0, 8, true, 0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_PLT8", false, 0, 0x000000ff,true),
84 HOWTO(R_68K_PLT32O, 0, 2,32, false,0, complain_overflow_bitfield, bfd_elf_generic_reloc, "R_68K_PLT32O", false, 0, 0xffffffff,false),
85 HOWTO(R_68K_PLT16O, 0, 1,16, false,0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_PLT16O", false, 0, 0x0000ffff,false),
86 HOWTO(R_68K_PLT8O, 0, 0, 8, false,0, complain_overflow_signed, bfd_elf_generic_reloc, "R_68K_PLT8O", false, 0, 0x000000ff,false),
87 HOWTO(R_68K_COPY, 0, 0, 0, false,0, complain_overflow_dont, bfd_elf_generic_reloc, "R_68K_COPY", false, 0, 0xffffffff,false),
88 HOWTO(R_68K_GLOB_DAT, 0, 2,32, false,0, complain_overflow_dont, bfd_elf_generic_reloc, "R_68K_GLOB_DAT", false, 0, 0xffffffff,false),
89 HOWTO(R_68K_JMP_SLOT, 0, 2,32, false,0, complain_overflow_dont, bfd_elf_generic_reloc, "R_68K_JMP_SLOT", false, 0, 0xffffffff,false),
90 HOWTO(R_68K_RELATIVE, 0, 2,32, false,0, complain_overflow_dont, bfd_elf_generic_reloc, "R_68K_RELATIVE", false, 0, 0xffffffff,false),
91 /* GNU extension to record C++ vtable hierarchy */
92 HOWTO (R_68K_GNU_VTINHERIT, /* type */
93 0, /* rightshift */
94 2, /* size (0 = byte, 1 = short, 2 = long) */
95 0, /* bitsize */
96 false, /* pc_relative */
97 0, /* bitpos */
98 complain_overflow_dont, /* complain_on_overflow */
99 NULL, /* special_function */
100 "R_68K_GNU_VTINHERIT", /* name */
101 false, /* partial_inplace */
102 0, /* src_mask */
103 0, /* dst_mask */
104 false),
105 /* GNU extension to record C++ vtable member usage */
106 HOWTO (R_68K_GNU_VTENTRY, /* type */
107 0, /* rightshift */
108 2, /* size (0 = byte, 1 = short, 2 = long) */
109 0, /* bitsize */
110 false, /* pc_relative */
111 0, /* bitpos */
112 complain_overflow_dont, /* complain_on_overflow */
113 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
114 "R_68K_GNU_VTENTRY", /* name */
115 false, /* partial_inplace */
116 0, /* src_mask */
117 0, /* dst_mask */
118 false),
119};
120
121static void
122rtype_to_howto (abfd, cache_ptr, dst)
121089cb 123 bfd *abfd ATTRIBUTE_UNUSED;
252b5132
RH
124 arelent *cache_ptr;
125 Elf_Internal_Rela *dst;
126{
127 BFD_ASSERT (ELF32_R_TYPE(dst->r_info) < (unsigned int) R_68K_max);
128 cache_ptr->howto = &howto_table[ELF32_R_TYPE(dst->r_info)];
129}
130
131#define elf_info_to_howto rtype_to_howto
132
133static const struct
134{
135 bfd_reloc_code_real_type bfd_val;
136 int elf_val;
137} reloc_map[] = {
138 { BFD_RELOC_NONE, R_68K_NONE },
139 { BFD_RELOC_32, R_68K_32 },
140 { BFD_RELOC_16, R_68K_16 },
141 { BFD_RELOC_8, R_68K_8 },
142 { BFD_RELOC_32_PCREL, R_68K_PC32 },
143 { BFD_RELOC_16_PCREL, R_68K_PC16 },
144 { BFD_RELOC_8_PCREL, R_68K_PC8 },
145 { BFD_RELOC_32_GOT_PCREL, R_68K_GOT32 },
146 { BFD_RELOC_16_GOT_PCREL, R_68K_GOT16 },
147 { BFD_RELOC_8_GOT_PCREL, R_68K_GOT8 },
148 { BFD_RELOC_32_GOTOFF, R_68K_GOT32O },
149 { BFD_RELOC_16_GOTOFF, R_68K_GOT16O },
150 { BFD_RELOC_8_GOTOFF, R_68K_GOT8O },
151 { BFD_RELOC_32_PLT_PCREL, R_68K_PLT32 },
152 { BFD_RELOC_16_PLT_PCREL, R_68K_PLT16 },
153 { BFD_RELOC_8_PLT_PCREL, R_68K_PLT8 },
154 { BFD_RELOC_32_PLTOFF, R_68K_PLT32O },
155 { BFD_RELOC_16_PLTOFF, R_68K_PLT16O },
156 { BFD_RELOC_8_PLTOFF, R_68K_PLT8O },
157 { BFD_RELOC_NONE, R_68K_COPY },
158 { BFD_RELOC_68K_GLOB_DAT, R_68K_GLOB_DAT },
159 { BFD_RELOC_68K_JMP_SLOT, R_68K_JMP_SLOT },
160 { BFD_RELOC_68K_RELATIVE, R_68K_RELATIVE },
161 { BFD_RELOC_CTOR, R_68K_32 },
162 { BFD_RELOC_VTABLE_INHERIT, R_68K_GNU_VTINHERIT },
163 { BFD_RELOC_VTABLE_ENTRY, R_68K_GNU_VTENTRY },
164};
165
166static reloc_howto_type *
167reloc_type_lookup (abfd, code)
121089cb 168 bfd *abfd ATTRIBUTE_UNUSED;
252b5132
RH
169 bfd_reloc_code_real_type code;
170{
171 unsigned int i;
172 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
173 {
174 if (reloc_map[i].bfd_val == code)
175 return &howto_table[reloc_map[i].elf_val];
176 }
177 return 0;
178}
179
180#define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
181#define ELF_ARCH bfd_arch_m68k
182/* end code generated by elf.el */
183
184#define USE_RELA
252b5132
RH
185\f
186/* Functions for the m68k ELF linker. */
187
188/* The name of the dynamic interpreter. This is put in the .interp
189 section. */
190
191#define ELF_DYNAMIC_INTERPRETER "/usr/lib/libc.so.1"
192
193/* The size in bytes of an entry in the procedure linkage table. */
194
195#define PLT_ENTRY_SIZE 20
196
197/* The first entry in a procedure linkage table looks like this. See
198 the SVR4 ABI m68k supplement to see how this works. */
199
200static const bfd_byte elf_m68k_plt0_entry[PLT_ENTRY_SIZE] =
201{
202 0x2f, 0x3b, 0x01, 0x70, /* move.l (%pc,addr),-(%sp) */
203 0, 0, 0, 0, /* replaced with offset to .got + 4. */
204 0x4e, 0xfb, 0x01, 0x71, /* jmp ([%pc,addr]) */
205 0, 0, 0, 0, /* replaced with offset to .got + 8. */
206 0, 0, 0, 0 /* pad out to 20 bytes. */
207};
208
209/* Subsequent entries in a procedure linkage table look like this. */
210
211static const bfd_byte elf_m68k_plt_entry[PLT_ENTRY_SIZE] =
212{
213 0x4e, 0xfb, 0x01, 0x71, /* jmp ([%pc,symbol@GOTPC]) */
214 0, 0, 0, 0, /* replaced with offset to symbol's .got entry. */
215 0x2f, 0x3c, /* move.l #offset,-(%sp) */
216 0, 0, 0, 0, /* replaced with offset into relocation table. */
217 0x60, 0xff, /* bra.l .plt */
218 0, 0, 0, 0 /* replaced with offset to start of .plt. */
219};
220
9e1281c7
CM
221#define CPU32_FLAG(abfd) (elf_elfheader (abfd)->e_flags & EF_CPU32)
222
223#define PLT_CPU32_ENTRY_SIZE 24
224/* Procedure linkage table entries for the cpu32 */
225static const bfd_byte elf_cpu32_plt0_entry[PLT_CPU32_ENTRY_SIZE] =
226{
6091b433 227 0x2f, 0x3b, 0x01, 0x70, /* move.l (%pc,addr),-(%sp) */
9e1281c7 228 0, 0, 0, 0, /* replaced with offset to .got + 4. */
6091b433 229 0x22, 0x7b, 0x01, 0x70, /* moveal %pc@(0xc), %a1 */
c3668558 230 0, 0, 0, 0, /* replace with offset to .got +8. */
6091b433 231 0x4e, 0xd1, /* jmp %a1@ */
9e1281c7
CM
232 0, 0, 0, 0, /* pad out to 24 bytes. */
233 0, 0
234};
235
236static const bfd_byte elf_cpu32_plt_entry[PLT_CPU32_ENTRY_SIZE] =
237{
1ca42bad 238 0x22, 0x7b, 0x01, 0x70, /* moveal %pc@(0xc), %a1 */
9e1281c7 239 0, 0, 0, 0, /* replaced with offset to symbol's .got entry. */
1ca42bad 240 0x4e, 0xd1, /* jmp %a1@ */
9e1281c7
CM
241 0x2f, 0x3c, /* move.l #offset,-(%sp) */
242 0, 0, 0, 0, /* replaced with offset into relocation table. */
243 0x60, 0xff, /* bra.l .plt */
244 0, 0, 0, 0, /* replaced with offset to start of .plt. */
245 0, 0
246};
247
252b5132
RH
248/* The m68k linker needs to keep track of the number of relocs that it
249 decides to copy in check_relocs for each symbol. This is so that it
250 can discard PC relative relocs if it doesn't need them when linking
251 with -Bsymbolic. We store the information in a field extending the
252 regular ELF linker hash table. */
253
254/* This structure keeps track of the number of PC relative relocs we have
255 copied for a given symbol. */
256
257struct elf_m68k_pcrel_relocs_copied
258{
259 /* Next section. */
260 struct elf_m68k_pcrel_relocs_copied *next;
261 /* A section in dynobj. */
262 asection *section;
263 /* Number of relocs copied in this section. */
264 bfd_size_type count;
265};
266
267/* m68k ELF linker hash entry. */
268
269struct elf_m68k_link_hash_entry
270{
271 struct elf_link_hash_entry root;
272
273 /* Number of PC relative relocs copied for this symbol. */
274 struct elf_m68k_pcrel_relocs_copied *pcrel_relocs_copied;
275};
276
277/* m68k ELF linker hash table. */
278
279struct elf_m68k_link_hash_table
280{
281 struct elf_link_hash_table root;
282};
283
284/* Declare this now that the above structures are defined. */
285
286static boolean elf_m68k_discard_copies
287 PARAMS ((struct elf_m68k_link_hash_entry *, PTR));
288
289/* Traverse an m68k ELF linker hash table. */
290
291#define elf_m68k_link_hash_traverse(table, func, info) \
292 (elf_link_hash_traverse \
293 (&(table)->root, \
294 (boolean (*) PARAMS ((struct elf_link_hash_entry *, PTR))) (func), \
295 (info)))
296
297/* Get the m68k ELF linker hash table from a link_info structure. */
298
299#define elf_m68k_hash_table(p) \
300 ((struct elf_m68k_link_hash_table *) (p)->hash)
301
302/* Create an entry in an m68k ELF linker hash table. */
303
304static struct bfd_hash_entry *
305elf_m68k_link_hash_newfunc (entry, table, string)
306 struct bfd_hash_entry *entry;
307 struct bfd_hash_table *table;
308 const char *string;
309{
310 struct elf_m68k_link_hash_entry *ret =
311 (struct elf_m68k_link_hash_entry *) entry;
312
313 /* Allocate the structure if it has not already been allocated by a
314 subclass. */
315 if (ret == (struct elf_m68k_link_hash_entry *) NULL)
316 ret = ((struct elf_m68k_link_hash_entry *)
317 bfd_hash_allocate (table,
318 sizeof (struct elf_m68k_link_hash_entry)));
319 if (ret == (struct elf_m68k_link_hash_entry *) NULL)
320 return (struct bfd_hash_entry *) ret;
321
322 /* Call the allocation method of the superclass. */
323 ret = ((struct elf_m68k_link_hash_entry *)
324 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
325 table, string));
326 if (ret != (struct elf_m68k_link_hash_entry *) NULL)
327 {
328 ret->pcrel_relocs_copied = NULL;
329 }
330
331 return (struct bfd_hash_entry *) ret;
332}
333
334/* Create an m68k ELF linker hash table. */
335
336static struct bfd_link_hash_table *
337elf_m68k_link_hash_table_create (abfd)
338 bfd *abfd;
339{
340 struct elf_m68k_link_hash_table *ret;
dc810e39 341 bfd_size_type amt = sizeof (struct elf_m68k_link_hash_table);
252b5132 342
dc810e39 343 ret = (struct elf_m68k_link_hash_table *) bfd_alloc (abfd, amt);
252b5132
RH
344 if (ret == (struct elf_m68k_link_hash_table *) NULL)
345 return NULL;
346
347 if (! _bfd_elf_link_hash_table_init (&ret->root, abfd,
348 elf_m68k_link_hash_newfunc))
349 {
350 bfd_release (abfd, ret);
351 return NULL;
352 }
353
354 return &ret->root.root;
355}
356
9e1281c7
CM
357/* Keep m68k-specific flags in the ELF header */
358static boolean
359elf32_m68k_set_private_flags (abfd, flags)
360 bfd *abfd;
361 flagword flags;
362{
363 elf_elfheader (abfd)->e_flags = flags;
364 elf_flags_init (abfd) = true;
365 return true;
366}
367
9e1281c7
CM
368/* Merge backend specific data from an object file to the output
369 object file when linking. */
370static boolean
371elf32_m68k_merge_private_bfd_data (ibfd, obfd)
372 bfd *ibfd;
373 bfd *obfd;
374{
375 flagword out_flags;
376 flagword in_flags;
377
378 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
379 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
380 return true;
381
382 in_flags = elf_elfheader (ibfd)->e_flags;
383 out_flags = elf_elfheader (obfd)->e_flags;
384
385 if (!elf_flags_init (obfd))
386 {
387 elf_flags_init (obfd) = true;
388 elf_elfheader (obfd)->e_flags = in_flags;
389 }
390
391 return true;
392}
393
394/* Display the flags field */
395static boolean
396elf32_m68k_print_private_bfd_data (abfd, ptr)
397 bfd *abfd;
398 PTR ptr;
399{
400 FILE *file = (FILE *) ptr;
401
402 BFD_ASSERT (abfd != NULL && ptr != NULL);
403
404 /* Print normal ELF private data. */
405 _bfd_elf_print_private_bfd_data (abfd, ptr);
406
407 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
408
409 /* xgettext:c-format */
517662d4 410 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
9e1281c7
CM
411
412 if (elf_elfheader (abfd)->e_flags & EF_CPU32)
517662d4 413 fprintf (file, _(" [cpu32]"));
9e1281c7 414
76f57f3a
JT
415 if (elf_elfheader (abfd)->e_flags & EF_M68000)
416 fprintf (file, _ (" [m68000]"));
417
9e1281c7
CM
418 fputc ('\n', file);
419
420 return true;
421}
252b5132
RH
422/* Look through the relocs for a section during the first phase, and
423 allocate space in the global offset table or procedure linkage
424 table. */
425
426static boolean
427elf_m68k_check_relocs (abfd, info, sec, relocs)
428 bfd *abfd;
429 struct bfd_link_info *info;
430 asection *sec;
431 const Elf_Internal_Rela *relocs;
432{
433 bfd *dynobj;
434 Elf_Internal_Shdr *symtab_hdr;
435 struct elf_link_hash_entry **sym_hashes;
436 bfd_signed_vma *local_got_refcounts;
437 const Elf_Internal_Rela *rel;
438 const Elf_Internal_Rela *rel_end;
439 asection *sgot;
440 asection *srelgot;
441 asection *sreloc;
442
443 if (info->relocateable)
444 return true;
445
446 dynobj = elf_hash_table (info)->dynobj;
447 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
448 sym_hashes = elf_sym_hashes (abfd);
449 local_got_refcounts = elf_local_got_refcounts (abfd);
450
451 sgot = NULL;
452 srelgot = NULL;
453 sreloc = NULL;
454
455 rel_end = relocs + sec->reloc_count;
456 for (rel = relocs; rel < rel_end; rel++)
457 {
458 unsigned long r_symndx;
459 struct elf_link_hash_entry *h;
460
461 r_symndx = ELF32_R_SYM (rel->r_info);
462
463 if (r_symndx < symtab_hdr->sh_info)
464 h = NULL;
465 else
466 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
467
468 switch (ELF32_R_TYPE (rel->r_info))
469 {
470 case R_68K_GOT8:
471 case R_68K_GOT16:
472 case R_68K_GOT32:
473 if (h != NULL
474 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
475 break;
476 /* Fall through. */
477 case R_68K_GOT8O:
478 case R_68K_GOT16O:
479 case R_68K_GOT32O:
480 /* This symbol requires a global offset table entry. */
481
482 if (dynobj == NULL)
483 {
484 /* Create the .got section. */
485 elf_hash_table (info)->dynobj = dynobj = abfd;
486 if (!_bfd_elf_create_got_section (dynobj, info))
487 return false;
488 }
489
490 if (sgot == NULL)
491 {
492 sgot = bfd_get_section_by_name (dynobj, ".got");
493 BFD_ASSERT (sgot != NULL);
494 }
495
496 if (srelgot == NULL
497 && (h != NULL || info->shared))
498 {
499 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
500 if (srelgot == NULL)
501 {
502 srelgot = bfd_make_section (dynobj, ".rela.got");
503 if (srelgot == NULL
504 || !bfd_set_section_flags (dynobj, srelgot,
505 (SEC_ALLOC
506 | SEC_LOAD
507 | SEC_HAS_CONTENTS
508 | SEC_IN_MEMORY
509 | SEC_LINKER_CREATED
510 | SEC_READONLY))
511 || !bfd_set_section_alignment (dynobj, srelgot, 2))
512 return false;
513 }
514 }
515
516 if (h != NULL)
517 {
51b64d56 518 if (h->got.refcount == 0)
252b5132 519 {
252b5132
RH
520 /* Make sure this symbol is output as a dynamic symbol. */
521 if (h->dynindx == -1)
522 {
523 if (!bfd_elf32_link_record_dynamic_symbol (info, h))
524 return false;
525 }
526
527 /* Allocate space in the .got section. */
528 sgot->_raw_size += 4;
529 /* Allocate relocation space. */
530 srelgot->_raw_size += sizeof (Elf32_External_Rela);
531 }
51b64d56 532 h->got.refcount++;
252b5132
RH
533 }
534 else
535 {
536 /* This is a global offset table entry for a local symbol. */
537 if (local_got_refcounts == NULL)
538 {
dc810e39 539 bfd_size_type size;
252b5132 540
dc810e39
AM
541 size = symtab_hdr->sh_info;
542 size *= sizeof (bfd_signed_vma);
252b5132 543 local_got_refcounts = ((bfd_signed_vma *)
51b64d56 544 bfd_zalloc (abfd, size));
252b5132
RH
545 if (local_got_refcounts == NULL)
546 return false;
547 elf_local_got_refcounts (abfd) = local_got_refcounts;
252b5132 548 }
51b64d56 549 if (local_got_refcounts[r_symndx] == 0)
252b5132 550 {
252b5132
RH
551 sgot->_raw_size += 4;
552 if (info->shared)
553 {
554 /* If we are generating a shared object, we need to
555 output a R_68K_RELATIVE reloc so that the dynamic
556 linker can adjust this GOT entry. */
557 srelgot->_raw_size += sizeof (Elf32_External_Rela);
558 }
559 }
51b64d56 560 local_got_refcounts[r_symndx]++;
252b5132
RH
561 }
562 break;
563
564 case R_68K_PLT8:
565 case R_68K_PLT16:
566 case R_68K_PLT32:
567 /* This symbol requires a procedure linkage table entry. We
568 actually build the entry in adjust_dynamic_symbol,
569 because this might be a case of linking PIC code which is
570 never referenced by a dynamic object, in which case we
571 don't need to generate a procedure linkage table entry
572 after all. */
573
574 /* If this is a local symbol, we resolve it directly without
575 creating a procedure linkage table entry. */
576 if (h == NULL)
577 continue;
578
579 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
51b64d56 580 h->plt.refcount++;
252b5132
RH
581 break;
582
583 case R_68K_PLT8O:
584 case R_68K_PLT16O:
585 case R_68K_PLT32O:
586 /* This symbol requires a procedure linkage table entry. */
587
588 if (h == NULL)
589 {
590 /* It does not make sense to have this relocation for a
591 local symbol. FIXME: does it? How to handle it if
592 it does make sense? */
593 bfd_set_error (bfd_error_bad_value);
594 return false;
595 }
596
597 /* Make sure this symbol is output as a dynamic symbol. */
598 if (h->dynindx == -1)
599 {
600 if (!bfd_elf32_link_record_dynamic_symbol (info, h))
601 return false;
602 }
603
604 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
51b64d56 605 h->plt.refcount++;
252b5132
RH
606 break;
607
608 case R_68K_PC8:
609 case R_68K_PC16:
610 case R_68K_PC32:
611 /* If we are creating a shared library and this is not a local
612 symbol, we need to copy the reloc into the shared library.
613 However when linking with -Bsymbolic and this is a global
614 symbol which is defined in an object we are including in the
615 link (i.e., DEF_REGULAR is set), then we can resolve the
616 reloc directly. At this point we have not seen all the input
617 files, so it is possible that DEF_REGULAR is not set now but
618 will be set later (it is never cleared). We account for that
619 possibility below by storing information in the
620 pcrel_relocs_copied field of the hash table entry. */
621 if (!(info->shared
622 && (sec->flags & SEC_ALLOC) != 0
623 && h != NULL
624 && (!info->symbolic
625 || (h->elf_link_hash_flags
626 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
627 {
628 if (h != NULL)
629 {
630 /* Make sure a plt entry is created for this symbol if
631 it turns out to be a function defined by a dynamic
632 object. */
51b64d56 633 h->plt.refcount++;
252b5132
RH
634 }
635 break;
636 }
637 /* Fall through. */
638 case R_68K_8:
639 case R_68K_16:
640 case R_68K_32:
641 if (h != NULL)
642 {
643 /* Make sure a plt entry is created for this symbol if it
644 turns out to be a function defined by a dynamic object. */
51b64d56 645 h->plt.refcount++;
252b5132
RH
646 }
647
648 /* If we are creating a shared library, we need to copy the
649 reloc into the shared library. */
650 if (info->shared
651 && (sec->flags & SEC_ALLOC) != 0)
652 {
653 /* When creating a shared object, we must copy these
654 reloc types into the output file. We create a reloc
655 section in dynobj and make room for this reloc. */
656 if (sreloc == NULL)
657 {
658 const char *name;
659
660 name = (bfd_elf_string_from_elf_section
661 (abfd,
662 elf_elfheader (abfd)->e_shstrndx,
663 elf_section_data (sec)->rel_hdr.sh_name));
664 if (name == NULL)
665 return false;
666
667 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
668 && strcmp (bfd_get_section_name (abfd, sec),
669 name + 5) == 0);
670
671 sreloc = bfd_get_section_by_name (dynobj, name);
672 if (sreloc == NULL)
673 {
674 sreloc = bfd_make_section (dynobj, name);
675 if (sreloc == NULL
676 || !bfd_set_section_flags (dynobj, sreloc,
677 (SEC_ALLOC
678 | SEC_LOAD
679 | SEC_HAS_CONTENTS
680 | SEC_IN_MEMORY
681 | SEC_LINKER_CREATED
682 | SEC_READONLY))
683 || !bfd_set_section_alignment (dynobj, sreloc, 2))
684 return false;
685 }
aa91b392
AS
686 if (sec->flags & SEC_READONLY)
687 info->flags |= DF_TEXTREL;
252b5132
RH
688 }
689
690 sreloc->_raw_size += sizeof (Elf32_External_Rela);
691
692 /* If we are linking with -Bsymbolic, we count the number of
693 PC relative relocations we have entered for this symbol,
694 so that we can discard them again if the symbol is later
695 defined by a regular object. Note that this function is
696 only called if we are using an m68kelf linker hash table,
697 which means that h is really a pointer to an
698 elf_m68k_link_hash_entry. */
699 if ((ELF32_R_TYPE (rel->r_info) == R_68K_PC8
700 || ELF32_R_TYPE (rel->r_info) == R_68K_PC16
701 || ELF32_R_TYPE (rel->r_info) == R_68K_PC32)
702 && info->symbolic)
703 {
704 struct elf_m68k_link_hash_entry *eh;
705 struct elf_m68k_pcrel_relocs_copied *p;
706
707 eh = (struct elf_m68k_link_hash_entry *) h;
708
709 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
710 if (p->section == sreloc)
711 break;
712
713 if (p == NULL)
714 {
715 p = ((struct elf_m68k_pcrel_relocs_copied *)
dc810e39 716 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
252b5132
RH
717 if (p == NULL)
718 return false;
719 p->next = eh->pcrel_relocs_copied;
720 eh->pcrel_relocs_copied = p;
721 p->section = sreloc;
722 p->count = 0;
723 }
724
725 ++p->count;
726 }
727 }
728
729 break;
730
731 /* This relocation describes the C++ object vtable hierarchy.
732 Reconstruct it for later use during GC. */
733 case R_68K_GNU_VTINHERIT:
734 if (!_bfd_elf32_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
735 return false;
736 break;
737
738 /* This relocation describes which C++ vtable entries are actually
739 used. Record for later use during GC. */
740 case R_68K_GNU_VTENTRY:
741 if (!_bfd_elf32_gc_record_vtentry (abfd, sec, h, rel->r_addend))
742 return false;
743 break;
744
745 default:
746 break;
747 }
748 }
749
750 return true;
751}
752
753/* Return the section that should be marked against GC for a given
754 relocation. */
755
756static asection *
757elf_m68k_gc_mark_hook (abfd, info, rel, h, sym)
758 bfd *abfd;
121089cb 759 struct bfd_link_info *info ATTRIBUTE_UNUSED;
252b5132
RH
760 Elf_Internal_Rela *rel;
761 struct elf_link_hash_entry *h;
762 Elf_Internal_Sym *sym;
763{
764 if (h != NULL)
765 {
766 switch (ELF32_R_TYPE (rel->r_info))
767 {
768 case R_68K_GNU_VTINHERIT:
769 case R_68K_GNU_VTENTRY:
770 break;
771
772 default:
773 switch (h->root.type)
774 {
775 default:
776 break;
777
778 case bfd_link_hash_defined:
779 case bfd_link_hash_defweak:
780 return h->root.u.def.section;
781
782 case bfd_link_hash_common:
783 return h->root.u.c.p->section;
784 }
785 }
786 }
787 else
788 {
9ad5cbcf 789 return bfd_section_from_elf_index (abfd, sym->st_shndx);
252b5132
RH
790 }
791
792 return NULL;
793}
794
795/* Update the got entry reference counts for the section being removed. */
796
797static boolean
798elf_m68k_gc_sweep_hook (abfd, info, sec, relocs)
799 bfd *abfd;
800 struct bfd_link_info *info;
801 asection *sec;
802 const Elf_Internal_Rela *relocs;
803{
804 Elf_Internal_Shdr *symtab_hdr;
805 struct elf_link_hash_entry **sym_hashes;
806 bfd_signed_vma *local_got_refcounts;
807 const Elf_Internal_Rela *rel, *relend;
808 unsigned long r_symndx;
809 struct elf_link_hash_entry *h;
810 bfd *dynobj;
dd5724d5
AM
811 asection *sgot;
812 asection *srelgot;
252b5132
RH
813
814 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
815 sym_hashes = elf_sym_hashes (abfd);
816 local_got_refcounts = elf_local_got_refcounts (abfd);
817
818 dynobj = elf_hash_table (info)->dynobj;
dd5724d5
AM
819 if (dynobj == NULL)
820 return true;
821
822 sgot = bfd_get_section_by_name (dynobj, ".got");
823 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
252b5132
RH
824
825 relend = relocs + sec->reloc_count;
826 for (rel = relocs; rel < relend; rel++)
827 {
828 switch (ELF32_R_TYPE (rel->r_info))
829 {
830 case R_68K_GOT8:
831 case R_68K_GOT16:
832 case R_68K_GOT32:
833 case R_68K_GOT8O:
834 case R_68K_GOT16O:
835 case R_68K_GOT32O:
836 r_symndx = ELF32_R_SYM (rel->r_info);
837 if (r_symndx >= symtab_hdr->sh_info)
838 {
839 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
840 if (h->got.refcount > 0)
841 {
842 --h->got.refcount;
843 if (h->got.refcount == 0)
844 {
845 /* We don't need the .got entry any more. */
846 sgot->_raw_size -= 4;
847 srelgot->_raw_size -= sizeof (Elf32_External_Rela);
848 }
849 }
850 }
dd5724d5 851 else if (local_got_refcounts != NULL)
252b5132
RH
852 {
853 if (local_got_refcounts[r_symndx] > 0)
854 {
855 --local_got_refcounts[r_symndx];
856 if (local_got_refcounts[r_symndx] == 0)
857 {
858 /* We don't need the .got entry any more. */
859 sgot->_raw_size -= 4;
860 if (info->shared)
861 srelgot->_raw_size -= sizeof (Elf32_External_Rela);
862 }
863 }
864 }
865 break;
866
867 case R_68K_PLT8:
868 case R_68K_PLT16:
869 case R_68K_PLT32:
870 case R_68K_PLT8O:
871 case R_68K_PLT16O:
872 case R_68K_PLT32O:
873 case R_68K_PC8:
874 case R_68K_PC16:
875 case R_68K_PC32:
876 case R_68K_8:
877 case R_68K_16:
878 case R_68K_32:
879 r_symndx = ELF32_R_SYM (rel->r_info);
880 if (r_symndx >= symtab_hdr->sh_info)
881 {
882 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
883 if (h->plt.refcount > 0)
884 --h->plt.refcount;
885 }
886 break;
887
888 default:
889 break;
890 }
891 }
892
893 return true;
894}
895
252b5132
RH
896/* Adjust a symbol defined by a dynamic object and referenced by a
897 regular object. The current definition is in some section of the
898 dynamic object, but we're not including those sections. We have to
899 change the definition to something the rest of the link can
900 understand. */
901
902static boolean
903elf_m68k_adjust_dynamic_symbol (info, h)
904 struct bfd_link_info *info;
905 struct elf_link_hash_entry *h;
906{
907 bfd *dynobj;
908 asection *s;
909 unsigned int power_of_two;
910
911 dynobj = elf_hash_table (info)->dynobj;
912
913 /* Make sure we know what is going on here. */
914 BFD_ASSERT (dynobj != NULL
915 && ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT)
916 || h->weakdef != NULL
917 || ((h->elf_link_hash_flags
918 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
919 && (h->elf_link_hash_flags
920 & ELF_LINK_HASH_REF_REGULAR) != 0
921 && (h->elf_link_hash_flags
922 & ELF_LINK_HASH_DEF_REGULAR) == 0)));
923
924 /* If this is a function, put it in the procedure linkage table. We
925 will fill in the contents of the procedure linkage table later,
926 when we know the address of the .got section. */
927 if (h->type == STT_FUNC
928 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
929 {
930 if (! info->shared
931 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
932 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) == 0
933 /* We must always create the plt entry if it was referenced
934 by a PLTxxO relocation. In this case we already recorded
935 it as a dynamic symbol. */
936 && h->dynindx == -1)
937 {
938 /* This case can occur if we saw a PLTxx reloc in an input
939 file, but the symbol was never referred to by a dynamic
940 object. In such a case, we don't actually need to build
941 a procedure linkage table, and we can just do a PCxx
942 reloc instead. */
943 BFD_ASSERT ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0);
944 h->plt.offset = (bfd_vma) -1;
945 return true;
946 }
947
948 /* GC may have rendered this entry unused. */
949 if (h->plt.refcount <= 0)
950 {
951 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
952 h->plt.offset = (bfd_vma) -1;
953 return true;
954 }
955
956 /* Make sure this symbol is output as a dynamic symbol. */
957 if (h->dynindx == -1)
958 {
959 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
960 return false;
961 }
962
963 s = bfd_get_section_by_name (dynobj, ".plt");
964 BFD_ASSERT (s != NULL);
965
966 /* If this is the first .plt entry, make room for the special
967 first entry. */
968 if (s->_raw_size == 0)
70f06c4a
AS
969 {
970 if (CPU32_FLAG (dynobj))
971 s->_raw_size += PLT_CPU32_ENTRY_SIZE;
972 else
973 s->_raw_size += PLT_ENTRY_SIZE;
974 }
252b5132
RH
975
976 /* If this symbol is not defined in a regular file, and we are
977 not generating a shared library, then set the symbol to this
978 location in the .plt. This is required to make function
979 pointers compare as equal between the normal executable and
980 the shared library. */
981 if (!info->shared
982 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
983 {
984 h->root.u.def.section = s;
985 h->root.u.def.value = s->_raw_size;
986 }
987
988 h->plt.offset = s->_raw_size;
989
990 /* Make room for this entry. */
9e1281c7
CM
991 if (CPU32_FLAG (dynobj))
992 s->_raw_size += PLT_CPU32_ENTRY_SIZE;
993 else
994 s->_raw_size += PLT_ENTRY_SIZE;
252b5132
RH
995
996 /* We also need to make an entry in the .got.plt section, which
997 will be placed in the .got section by the linker script. */
998
999 s = bfd_get_section_by_name (dynobj, ".got.plt");
1000 BFD_ASSERT (s != NULL);
1001 s->_raw_size += 4;
1002
1003 /* We also need to make an entry in the .rela.plt section. */
1004
1005 s = bfd_get_section_by_name (dynobj, ".rela.plt");
1006 BFD_ASSERT (s != NULL);
1007 s->_raw_size += sizeof (Elf32_External_Rela);
1008
1009 return true;
1010 }
1011
1012 /* Reinitialize the plt offset now that it is not used as a reference
1013 count any more. */
1014 h->plt.offset = (bfd_vma) -1;
1015
1016 /* If this is a weak symbol, and there is a real definition, the
1017 processor independent code will have arranged for us to see the
1018 real definition first, and we can just use the same value. */
1019 if (h->weakdef != NULL)
1020 {
1021 BFD_ASSERT (h->weakdef->root.type == bfd_link_hash_defined
1022 || h->weakdef->root.type == bfd_link_hash_defweak);
1023 h->root.u.def.section = h->weakdef->root.u.def.section;
1024 h->root.u.def.value = h->weakdef->root.u.def.value;
1025 return true;
1026 }
1027
1028 /* This is a reference to a symbol defined by a dynamic object which
1029 is not a function. */
1030
1031 /* If we are creating a shared library, we must presume that the
1032 only references to the symbol are via the global offset table.
1033 For such cases we need not do anything here; the relocations will
1034 be handled correctly by relocate_section. */
1035 if (info->shared)
1036 return true;
1037
1038 /* We must allocate the symbol in our .dynbss section, which will
1039 become part of the .bss section of the executable. There will be
1040 an entry for this symbol in the .dynsym section. The dynamic
1041 object will contain position independent code, so all references
1042 from the dynamic object to this symbol will go through the global
1043 offset table. The dynamic linker will use the .dynsym entry to
1044 determine the address it must put in the global offset table, so
1045 both the dynamic object and the regular object will refer to the
1046 same memory location for the variable. */
1047
1048 s = bfd_get_section_by_name (dynobj, ".dynbss");
1049 BFD_ASSERT (s != NULL);
1050
1051 /* We must generate a R_68K_COPY reloc to tell the dynamic linker to
1052 copy the initial value out of the dynamic object and into the
1053 runtime process image. We need to remember the offset into the
1054 .rela.bss section we are going to use. */
1055 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1056 {
1057 asection *srel;
1058
1059 srel = bfd_get_section_by_name (dynobj, ".rela.bss");
1060 BFD_ASSERT (srel != NULL);
1061 srel->_raw_size += sizeof (Elf32_External_Rela);
1062 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
1063 }
1064
1065 /* We need to figure out the alignment required for this symbol. I
1066 have no idea how ELF linkers handle this. */
1067 power_of_two = bfd_log2 (h->size);
1068 if (power_of_two > 3)
1069 power_of_two = 3;
1070
1071 /* Apply the required alignment. */
1072 s->_raw_size = BFD_ALIGN (s->_raw_size,
1073 (bfd_size_type) (1 << power_of_two));
1074 if (power_of_two > bfd_get_section_alignment (dynobj, s))
1075 {
1076 if (!bfd_set_section_alignment (dynobj, s, power_of_two))
1077 return false;
1078 }
1079
1080 /* Define the symbol as being at this point in the section. */
1081 h->root.u.def.section = s;
1082 h->root.u.def.value = s->_raw_size;
1083
1084 /* Increment the section size to make room for the symbol. */
1085 s->_raw_size += h->size;
1086
1087 return true;
1088}
1089
1090/* Set the sizes of the dynamic sections. */
1091
1092static boolean
1093elf_m68k_size_dynamic_sections (output_bfd, info)
aa91b392 1094 bfd *output_bfd ATTRIBUTE_UNUSED;
252b5132
RH
1095 struct bfd_link_info *info;
1096{
1097 bfd *dynobj;
1098 asection *s;
1099 boolean plt;
1100 boolean relocs;
252b5132
RH
1101
1102 dynobj = elf_hash_table (info)->dynobj;
1103 BFD_ASSERT (dynobj != NULL);
1104
1105 if (elf_hash_table (info)->dynamic_sections_created)
1106 {
1107 /* Set the contents of the .interp section to the interpreter. */
1108 if (!info->shared)
1109 {
1110 s = bfd_get_section_by_name (dynobj, ".interp");
1111 BFD_ASSERT (s != NULL);
1112 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
1113 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1114 }
1115 }
1116 else
1117 {
1118 /* We may have created entries in the .rela.got section.
1119 However, if we are not creating the dynamic sections, we will
1120 not actually use these entries. Reset the size of .rela.got,
1121 which will cause it to get stripped from the output file
1122 below. */
1123 s = bfd_get_section_by_name (dynobj, ".rela.got");
1124 if (s != NULL)
1125 s->_raw_size = 0;
1126 }
1127
1128 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1129 relative relocs against symbols defined in a regular object. We
1130 allocated space for them in the check_relocs routine, but we will not
1131 fill them in in the relocate_section routine. */
1132 if (info->shared && info->symbolic)
1133 elf_m68k_link_hash_traverse (elf_m68k_hash_table (info),
1134 elf_m68k_discard_copies,
1135 (PTR) NULL);
1136
1137 /* The check_relocs and adjust_dynamic_symbol entry points have
1138 determined the sizes of the various dynamic sections. Allocate
1139 memory for them. */
1140 plt = false;
1141 relocs = false;
252b5132
RH
1142 for (s = dynobj->sections; s != NULL; s = s->next)
1143 {
1144 const char *name;
1145 boolean strip;
1146
1147 if ((s->flags & SEC_LINKER_CREATED) == 0)
1148 continue;
1149
1150 /* It's OK to base decisions on the section name, because none
1151 of the dynobj section names depend upon the input files. */
1152 name = bfd_get_section_name (dynobj, s);
1153
1154 strip = false;
1155
1156 if (strcmp (name, ".plt") == 0)
1157 {
1158 if (s->_raw_size == 0)
1159 {
1160 /* Strip this section if we don't need it; see the
1161 comment below. */
1162 strip = true;
1163 }
1164 else
1165 {
1166 /* Remember whether there is a PLT. */
1167 plt = true;
1168 }
1169 }
1170 else if (strncmp (name, ".rela", 5) == 0)
1171 {
1172 if (s->_raw_size == 0)
1173 {
1174 /* If we don't need this section, strip it from the
1175 output file. This is mostly to handle .rela.bss and
1176 .rela.plt. We must create both sections in
1177 create_dynamic_sections, because they must be created
1178 before the linker maps input sections to output
1179 sections. The linker does that before
1180 adjust_dynamic_symbol is called, and it is that
1181 function which decides whether anything needs to go
1182 into these sections. */
1183 strip = true;
1184 }
1185 else
1186 {
aa91b392 1187 relocs = true;
252b5132
RH
1188
1189 /* We use the reloc_count field as a counter if we need
1190 to copy relocs into the output file. */
1191 s->reloc_count = 0;
1192 }
1193 }
1194 else if (strncmp (name, ".got", 4) != 0)
1195 {
1196 /* It's not one of our sections, so don't allocate space. */
1197 continue;
1198 }
1199
1200 if (strip)
1201 {
7f8d5fc9 1202 _bfd_strip_section_from_output (info, s);
252b5132
RH
1203 continue;
1204 }
1205
1206 /* Allocate memory for the section contents. */
7a9af8c4
NC
1207 /* FIXME: This should be a call to bfd_alloc not bfd_zalloc.
1208 Unused entries should be reclaimed before the section's contents
1209 are written out, but at the moment this does not happen. Thus in
1210 order to prevent writing out garbage, we initialise the section's
1211 contents to zero. */
1212 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->_raw_size);
252b5132
RH
1213 if (s->contents == NULL && s->_raw_size != 0)
1214 return false;
1215 }
1216
1217 if (elf_hash_table (info)->dynamic_sections_created)
1218 {
1219 /* Add some entries to the .dynamic section. We fill in the
1220 values later, in elf_m68k_finish_dynamic_sections, but we
1221 must add the entries now so that we get the correct size for
1222 the .dynamic section. The DT_DEBUG entry is filled in by the
1223 dynamic linker and used by the debugger. */
dc810e39
AM
1224#define add_dynamic_entry(TAG, VAL) \
1225 bfd_elf32_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
1226
252b5132
RH
1227 if (!info->shared)
1228 {
dc810e39 1229 if (!add_dynamic_entry (DT_DEBUG, 0))
252b5132
RH
1230 return false;
1231 }
1232
1233 if (plt)
1234 {
dc810e39
AM
1235 if (!add_dynamic_entry (DT_PLTGOT, 0)
1236 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1237 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1238 || !add_dynamic_entry (DT_JMPREL, 0))
252b5132
RH
1239 return false;
1240 }
1241
1242 if (relocs)
1243 {
dc810e39
AM
1244 if (!add_dynamic_entry (DT_RELA, 0)
1245 || !add_dynamic_entry (DT_RELASZ, 0)
1246 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
252b5132
RH
1247 return false;
1248 }
1249
aa91b392 1250 if ((info->flags & DF_TEXTREL) != 0)
252b5132 1251 {
dc810e39 1252 if (!add_dynamic_entry (DT_TEXTREL, 0))
252b5132
RH
1253 return false;
1254 }
1255 }
dc810e39 1256#undef add_dynamic_entry
252b5132 1257
252b5132
RH
1258 return true;
1259}
1260
1261/* This function is called via elf_m68k_link_hash_traverse if we are
1262 creating a shared object with -Bsymbolic. It discards the space
1263 allocated to copy PC relative relocs against symbols which are defined
1264 in regular objects. We allocated space for them in the check_relocs
1265 routine, but we won't fill them in in the relocate_section routine. */
1266
252b5132
RH
1267static boolean
1268elf_m68k_discard_copies (h, ignore)
1269 struct elf_m68k_link_hash_entry *h;
121089cb 1270 PTR ignore ATTRIBUTE_UNUSED;
252b5132
RH
1271{
1272 struct elf_m68k_pcrel_relocs_copied *s;
1273
1274 /* We only discard relocs for symbols defined in a regular object. */
1275 if ((h->root.elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
1276 return true;
1277
1278 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
1279 s->section->_raw_size -= s->count * sizeof (Elf32_External_Rela);
1280
1281 return true;
1282}
1283
1284/* Relocate an M68K ELF section. */
1285
1286static boolean
1287elf_m68k_relocate_section (output_bfd, info, input_bfd, input_section,
1288 contents, relocs, local_syms, local_sections)
1289 bfd *output_bfd;
1290 struct bfd_link_info *info;
1291 bfd *input_bfd;
1292 asection *input_section;
1293 bfd_byte *contents;
1294 Elf_Internal_Rela *relocs;
1295 Elf_Internal_Sym *local_syms;
1296 asection **local_sections;
1297{
1298 bfd *dynobj;
1299 Elf_Internal_Shdr *symtab_hdr;
1300 struct elf_link_hash_entry **sym_hashes;
1301 bfd_vma *local_got_offsets;
1302 asection *sgot;
1303 asection *splt;
1304 asection *sreloc;
1305 Elf_Internal_Rela *rel;
1306 Elf_Internal_Rela *relend;
1307
1308 dynobj = elf_hash_table (info)->dynobj;
1309 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1310 sym_hashes = elf_sym_hashes (input_bfd);
1311 local_got_offsets = elf_local_got_offsets (input_bfd);
1312
1313 sgot = NULL;
1314 splt = NULL;
1315 sreloc = NULL;
1316
1317 rel = relocs;
1318 relend = relocs + input_section->reloc_count;
1319 for (; rel < relend; rel++)
1320 {
1321 int r_type;
1322 reloc_howto_type *howto;
1323 unsigned long r_symndx;
1324 struct elf_link_hash_entry *h;
1325 Elf_Internal_Sym *sym;
1326 asection *sec;
1327 bfd_vma relocation;
1328 bfd_reloc_status_type r;
1329
1330 r_type = ELF32_R_TYPE (rel->r_info);
1331 if (r_type < 0 || r_type >= (int) R_68K_max)
1332 {
1333 bfd_set_error (bfd_error_bad_value);
1334 return false;
1335 }
1336 howto = howto_table + r_type;
1337
1338 r_symndx = ELF32_R_SYM (rel->r_info);
1339
1340 if (info->relocateable)
1341 {
1342 /* This is a relocateable link. We don't have to change
1343 anything, unless the reloc is against a section symbol,
1344 in which case we have to adjust according to where the
1345 section symbol winds up in the output section. */
1346 if (r_symndx < symtab_hdr->sh_info)
1347 {
1348 sym = local_syms + r_symndx;
1349 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
1350 {
1351 sec = local_sections[r_symndx];
1352 rel->r_addend += sec->output_offset + sym->st_value;
1353 }
1354 }
1355
1356 continue;
1357 }
1358
1359 /* This is a final link. */
1360 h = NULL;
1361 sym = NULL;
1362 sec = NULL;
1363 if (r_symndx < symtab_hdr->sh_info)
1364 {
1365 sym = local_syms + r_symndx;
1366 sec = local_sections[r_symndx];
f8df10f4 1367 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, sec, rel);
252b5132
RH
1368 }
1369 else
1370 {
1371 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1372 while (h->root.type == bfd_link_hash_indirect
1373 || h->root.type == bfd_link_hash_warning)
1374 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1375 if (h->root.type == bfd_link_hash_defined
1376 || h->root.type == bfd_link_hash_defweak)
1377 {
1378 sec = h->root.u.def.section;
1379 if (((r_type == R_68K_PLT8
1380 || r_type == R_68K_PLT16
1381 || r_type == R_68K_PLT32
1382 || r_type == R_68K_PLT8O
1383 || r_type == R_68K_PLT16O
1384 || r_type == R_68K_PLT32O)
1385 && h->plt.offset != (bfd_vma) -1
1386 && elf_hash_table (info)->dynamic_sections_created)
1387 || ((r_type == R_68K_GOT8O
1388 || r_type == R_68K_GOT16O
1389 || r_type == R_68K_GOT32O
1390 || ((r_type == R_68K_GOT8
1391 || r_type == R_68K_GOT16
1392 || r_type == R_68K_GOT32)
1393 && strcmp (h->root.root.string,
1394 "_GLOBAL_OFFSET_TABLE_") != 0))
1395 && elf_hash_table (info)->dynamic_sections_created
1396 && (! info->shared
1397 || (! info->symbolic && h->dynindx != -1)
1398 || (h->elf_link_hash_flags
1399 & ELF_LINK_HASH_DEF_REGULAR) == 0))
1400 || (info->shared
1401 && ((! info->symbolic && h->dynindx != -1)
1402 || (h->elf_link_hash_flags
1403 & ELF_LINK_HASH_DEF_REGULAR) == 0)
95fc45e6
AS
1404 && ((input_section->flags & SEC_ALLOC) != 0
1405 /* DWARF will emit R_68K_32 relocations in its
1406 sections against symbols defined externally
1407 in shared libraries. We can't do anything
1408 with them here. */
1409 || ((input_section->flags & SEC_DEBUGGING) != 0
1410 && (h->elf_link_hash_flags
1411 & ELF_LINK_HASH_DEF_DYNAMIC) != 0))
252b5132
RH
1412 && (r_type == R_68K_8
1413 || r_type == R_68K_16
1414 || r_type == R_68K_32
1415 || r_type == R_68K_PC8
1416 || r_type == R_68K_PC16
1417 || r_type == R_68K_PC32)))
1418 {
1419 /* In these cases, we don't need the relocation
1420 value. We check specially because in some
1421 obscure cases sec->output_section will be NULL. */
1422 relocation = 0;
1423 }
1424 else
1425 relocation = (h->root.u.def.value
1426 + sec->output_section->vma
1427 + sec->output_offset);
1428 }
1429 else if (h->root.type == bfd_link_hash_undefweak)
1430 relocation = 0;
671bae9c
NC
1431 else if (info->shared
1432 && (!info->symbolic || info->allow_shlib_undefined)
3a27a730
L
1433 && !info->no_undefined
1434 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
252b5132
RH
1435 relocation = 0;
1436 else
1437 {
1438 if (!(info->callbacks->undefined_symbol
1439 (info, h->root.root.string, input_bfd,
5cc7c785 1440 input_section, rel->r_offset,
3a27a730
L
1441 (!info->shared || info->no_undefined
1442 || ELF_ST_VISIBILITY (h->other)))))
252b5132
RH
1443 return false;
1444 relocation = 0;
1445 }
1446 }
1447
1448 switch (r_type)
1449 {
1450 case R_68K_GOT8:
1451 case R_68K_GOT16:
1452 case R_68K_GOT32:
1453 /* Relocation is to the address of the entry for this symbol
1454 in the global offset table. */
1455 if (h != NULL
1456 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
1457 break;
1458 /* Fall through. */
1459 case R_68K_GOT8O:
1460 case R_68K_GOT16O:
1461 case R_68K_GOT32O:
1462 /* Relocation is the offset of the entry for this symbol in
1463 the global offset table. */
1464
1465 {
1466 bfd_vma off;
1467
1468 if (sgot == NULL)
1469 {
1470 sgot = bfd_get_section_by_name (dynobj, ".got");
1471 BFD_ASSERT (sgot != NULL);
1472 }
1473
1474 if (h != NULL)
1475 {
1476 off = h->got.offset;
1477 BFD_ASSERT (off != (bfd_vma) -1);
1478
1479 if (!elf_hash_table (info)->dynamic_sections_created
1480 || (info->shared
1481 && (info->symbolic || h->dynindx == -1)
1482 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)))
1483 {
1484 /* This is actually a static link, or it is a
1485 -Bsymbolic link and the symbol is defined
1486 locally, or the symbol was forced to be local
1487 because of a version file.. We must initialize
1488 this entry in the global offset table. Since
1489 the offset must always be a multiple of 4, we
1490 use the least significant bit to record whether
1491 we have initialized it already.
1492
1493 When doing a dynamic link, we create a .rela.got
1494 relocation entry to initialize the value. This
1495 is done in the finish_dynamic_symbol routine. */
1496 if ((off & 1) != 0)
1497 off &= ~1;
1498 else
1499 {
1500 bfd_put_32 (output_bfd, relocation,
1501 sgot->contents + off);
1502 h->got.offset |= 1;
1503 }
1504 }
1505 }
1506 else
1507 {
1508 BFD_ASSERT (local_got_offsets != NULL
1509 && local_got_offsets[r_symndx] != (bfd_vma) -1);
1510
1511 off = local_got_offsets[r_symndx];
1512
1513 /* The offset must always be a multiple of 4. We use
1514 the least significant bit to record whether we have
1515 already generated the necessary reloc. */
1516 if ((off & 1) != 0)
1517 off &= ~1;
1518 else
1519 {
1520 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
1521
1522 if (info->shared)
1523 {
1524 asection *srelgot;
1525 Elf_Internal_Rela outrel;
1526
1527 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1528 BFD_ASSERT (srelgot != NULL);
1529
1530 outrel.r_offset = (sgot->output_section->vma
1531 + sgot->output_offset
1532 + off);
1533 outrel.r_info = ELF32_R_INFO (0, R_68K_RELATIVE);
1534 outrel.r_addend = relocation;
1535 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
1536 (((Elf32_External_Rela *)
1537 srelgot->contents)
1538 + srelgot->reloc_count));
1539 ++srelgot->reloc_count;
1540 }
1541
1542 local_got_offsets[r_symndx] |= 1;
1543 }
1544 }
1545
1546 relocation = sgot->output_offset + off;
1547 if (r_type == R_68K_GOT8O
1548 || r_type == R_68K_GOT16O
1549 || r_type == R_68K_GOT32O)
1550 {
1551 /* This relocation does not use the addend. */
1552 rel->r_addend = 0;
1553 }
1554 else
1555 relocation += sgot->output_section->vma;
1556 }
1557 break;
1558
1559 case R_68K_PLT8:
1560 case R_68K_PLT16:
1561 case R_68K_PLT32:
1562 /* Relocation is to the entry for this symbol in the
1563 procedure linkage table. */
1564
1565 /* Resolve a PLTxx reloc against a local symbol directly,
1566 without using the procedure linkage table. */
1567 if (h == NULL)
1568 break;
1569
1570 if (h->plt.offset == (bfd_vma) -1
1571 || !elf_hash_table (info)->dynamic_sections_created)
1572 {
1573 /* We didn't make a PLT entry for this symbol. This
1574 happens when statically linking PIC code, or when
1575 using -Bsymbolic. */
1576 break;
1577 }
1578
1579 if (splt == NULL)
1580 {
1581 splt = bfd_get_section_by_name (dynobj, ".plt");
1582 BFD_ASSERT (splt != NULL);
1583 }
1584
1585 relocation = (splt->output_section->vma
1586 + splt->output_offset
1587 + h->plt.offset);
1588 break;
1589
1590 case R_68K_PLT8O:
1591 case R_68K_PLT16O:
1592 case R_68K_PLT32O:
1593 /* Relocation is the offset of the entry for this symbol in
1594 the procedure linkage table. */
1595 BFD_ASSERT (h != NULL && h->plt.offset != (bfd_vma) -1);
1596
1597 if (splt == NULL)
1598 {
1599 splt = bfd_get_section_by_name (dynobj, ".plt");
1600 BFD_ASSERT (splt != NULL);
1601 }
1602
1603 relocation = h->plt.offset;
1604
1605 /* This relocation does not use the addend. */
1606 rel->r_addend = 0;
1607
1608 break;
1609
1610 case R_68K_PC8:
1611 case R_68K_PC16:
1612 case R_68K_PC32:
1613 if (h == NULL)
1614 break;
1615 /* Fall through. */
1616 case R_68K_8:
1617 case R_68K_16:
1618 case R_68K_32:
1619 if (info->shared
ec338859 1620 && r_symndx != 0
252b5132
RH
1621 && (input_section->flags & SEC_ALLOC) != 0
1622 && ((r_type != R_68K_PC8
1623 && r_type != R_68K_PC16
1624 && r_type != R_68K_PC32)
1625 || (!info->symbolic
1626 || (h->elf_link_hash_flags
1627 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
1628 {
1629 Elf_Internal_Rela outrel;
1630 boolean skip, relocate;
1631
1632 /* When generating a shared object, these relocations
1633 are copied into the output file to be resolved at run
1634 time. */
1635
1636 if (sreloc == NULL)
1637 {
1638 const char *name;
1639
1640 name = (bfd_elf_string_from_elf_section
1641 (input_bfd,
1642 elf_elfheader (input_bfd)->e_shstrndx,
1643 elf_section_data (input_section)->rel_hdr.sh_name));
1644 if (name == NULL)
1645 return false;
1646
1647 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
1648 && strcmp (bfd_get_section_name (input_bfd,
1649 input_section),
1650 name + 5) == 0);
1651
1652 sreloc = bfd_get_section_by_name (dynobj, name);
1653 BFD_ASSERT (sreloc != NULL);
1654 }
1655
1656 skip = false;
1657
c629eae0
JJ
1658 outrel.r_offset =
1659 _bfd_elf_section_offset (output_bfd, info, input_section,
1660 rel->r_offset);
1661 if (outrel.r_offset == (bfd_vma) -1)
1662 skip = true;
252b5132
RH
1663 outrel.r_offset += (input_section->output_section->vma
1664 + input_section->output_offset);
1665
1666 if (skip)
1667 {
1668 memset (&outrel, 0, sizeof outrel);
1669 relocate = false;
1670 }
1671 /* h->dynindx may be -1 if the symbol was marked to
1672 become local. */
1673 else if (h != NULL
1674 && ((! info->symbolic && h->dynindx != -1)
1675 || (h->elf_link_hash_flags
1676 & ELF_LINK_HASH_DEF_REGULAR) == 0))
1677 {
1678 BFD_ASSERT (h->dynindx != -1);
1679 relocate = false;
1680 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1681 outrel.r_addend = relocation + rel->r_addend;
1682 }
1683 else
1684 {
1685 if (r_type == R_68K_32)
1686 {
1687 relocate = true;
1688 outrel.r_info = ELF32_R_INFO (0, R_68K_RELATIVE);
1689 outrel.r_addend = relocation + rel->r_addend;
1690 }
1691 else
1692 {
1693 long indx;
1694
1695 if (h == NULL)
1696 sec = local_sections[r_symndx];
1697 else
1698 {
1699 BFD_ASSERT (h->root.type == bfd_link_hash_defined
1700 || (h->root.type
1701 == bfd_link_hash_defweak));
1702 sec = h->root.u.def.section;
1703 }
1704 if (sec != NULL && bfd_is_abs_section (sec))
1705 indx = 0;
1706 else if (sec == NULL || sec->owner == NULL)
1707 {
1708 bfd_set_error (bfd_error_bad_value);
1709 return false;
1710 }
1711 else
1712 {
1713 asection *osec;
1714
1715 osec = sec->output_section;
1716 indx = elf_section_data (osec)->dynindx;
1717 BFD_ASSERT (indx > 0);
1718 }
1719
1720 relocate = false;
1721 outrel.r_info = ELF32_R_INFO (indx, r_type);
1722 outrel.r_addend = relocation + rel->r_addend;
1723 }
1724 }
1725
1726 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
1727 (((Elf32_External_Rela *)
1728 sreloc->contents)
1729 + sreloc->reloc_count));
1730 ++sreloc->reloc_count;
1731
1732 /* This reloc will be computed at runtime, so there's no
1733 need to do anything now, except for R_68K_32
1734 relocations that have been turned into
1735 R_68K_RELATIVE. */
1736 if (!relocate)
1737 continue;
1738 }
1739
1740 break;
1741
1742 case R_68K_GNU_VTINHERIT:
1743 case R_68K_GNU_VTENTRY:
1744 /* These are no-ops in the end. */
1745 continue;
1746
1747 default:
1748 break;
1749 }
1750
1751 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1752 contents, rel->r_offset,
1753 relocation, rel->r_addend);
1754
1755 if (r != bfd_reloc_ok)
1756 {
1757 switch (r)
1758 {
1759 default:
1760 case bfd_reloc_outofrange:
1761 abort ();
1762 case bfd_reloc_overflow:
1763 {
1764 const char *name;
1765
1766 if (h != NULL)
1767 name = h->root.root.string;
1768 else
1769 {
1770 name = bfd_elf_string_from_elf_section (input_bfd,
1771 symtab_hdr->sh_link,
1772 sym->st_name);
1773 if (name == NULL)
1774 return false;
1775 if (*name == '\0')
1776 name = bfd_section_name (input_bfd, sec);
1777 }
1778 if (!(info->callbacks->reloc_overflow
1779 (info, name, howto->name, (bfd_vma) 0,
1780 input_bfd, input_section, rel->r_offset)))
1781 return false;
1782 }
1783 break;
1784 }
1785 }
1786 }
1787
1788 return true;
1789}
1790
1791/* Finish up dynamic symbol handling. We set the contents of various
1792 dynamic sections here. */
1793
1794static boolean
1795elf_m68k_finish_dynamic_symbol (output_bfd, info, h, sym)
1796 bfd *output_bfd;
1797 struct bfd_link_info *info;
1798 struct elf_link_hash_entry *h;
1799 Elf_Internal_Sym *sym;
1800{
1801 bfd *dynobj;
9e1281c7 1802 int plt_off1, plt_off2, plt_off3;
252b5132
RH
1803
1804 dynobj = elf_hash_table (info)->dynobj;
1805
1806 if (h->plt.offset != (bfd_vma) -1)
1807 {
1808 asection *splt;
1809 asection *sgot;
1810 asection *srela;
1811 bfd_vma plt_index;
1812 bfd_vma got_offset;
1813 Elf_Internal_Rela rela;
1814
1815 /* This symbol has an entry in the procedure linkage table. Set
1816 it up. */
1817
1818 BFD_ASSERT (h->dynindx != -1);
1819
1820 splt = bfd_get_section_by_name (dynobj, ".plt");
1821 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
1822 srela = bfd_get_section_by_name (dynobj, ".rela.plt");
1823 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1824
1825 /* Get the index in the procedure linkage table which
1826 corresponds to this symbol. This is the index of this symbol
1827 in all the symbols for which we are making plt entries. The
1828 first entry in the procedure linkage table is reserved. */
9e1281c7
CM
1829 if ( CPU32_FLAG (output_bfd))
1830 plt_index = h->plt.offset / PLT_CPU32_ENTRY_SIZE - 1;
1831 else
1832 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
252b5132
RH
1833
1834 /* Get the offset into the .got table of the entry that
1835 corresponds to this function. Each .got entry is 4 bytes.
1836 The first three are reserved. */
1837 got_offset = (plt_index + 3) * 4;
1838
9e1281c7
CM
1839 if ( CPU32_FLAG (output_bfd))
1840 {
1841 /* Fill in the entry in the procedure linkage table. */
1842 memcpy (splt->contents + h->plt.offset, elf_cpu32_plt_entry,
1843 PLT_CPU32_ENTRY_SIZE);
1844 plt_off1 = 4;
1845 plt_off2 = 12;
1846 plt_off3 = 18;
1847 }
1848 else
1849 {
1850 /* Fill in the entry in the procedure linkage table. */
1851 memcpy (splt->contents + h->plt.offset, elf_m68k_plt_entry,
1852 PLT_ENTRY_SIZE);
1853 plt_off1 = 4;
1854 plt_off2 = 10;
1855 plt_off3 = 16;
1856 }
1857
252b5132
RH
1858 /* The offset is relative to the first extension word. */
1859 bfd_put_32 (output_bfd,
1860 (sgot->output_section->vma
1861 + sgot->output_offset
1862 + got_offset
1863 - (splt->output_section->vma
1864 + h->plt.offset + 2)),
9e1281c7 1865 splt->contents + h->plt.offset + plt_off1);
252b5132
RH
1866
1867 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
9e1281c7
CM
1868 splt->contents + h->plt.offset + plt_off2);
1869 bfd_put_32 (output_bfd, - (h->plt.offset + plt_off3),
1870 splt->contents + h->plt.offset + plt_off3);
252b5132
RH
1871
1872 /* Fill in the entry in the global offset table. */
1873 bfd_put_32 (output_bfd,
1874 (splt->output_section->vma
1875 + splt->output_offset
1876 + h->plt.offset
1877 + 8),
1878 sgot->contents + got_offset);
1879
1880 /* Fill in the entry in the .rela.plt section. */
1881 rela.r_offset = (sgot->output_section->vma
1882 + sgot->output_offset
1883 + got_offset);
1884 rela.r_info = ELF32_R_INFO (h->dynindx, R_68K_JMP_SLOT);
1885 rela.r_addend = 0;
1886 bfd_elf32_swap_reloca_out (output_bfd, &rela,
1887 ((Elf32_External_Rela *) srela->contents
1888 + plt_index));
1889
1890 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
1891 {
1892 /* Mark the symbol as undefined, rather than as defined in
1893 the .plt section. Leave the value alone. */
1894 sym->st_shndx = SHN_UNDEF;
1895 }
1896 }
1897
1898 if (h->got.offset != (bfd_vma) -1)
1899 {
1900 asection *sgot;
1901 asection *srela;
1902 Elf_Internal_Rela rela;
1903
1904 /* This symbol has an entry in the global offset table. Set it
1905 up. */
1906
1907 sgot = bfd_get_section_by_name (dynobj, ".got");
1908 srela = bfd_get_section_by_name (dynobj, ".rela.got");
1909 BFD_ASSERT (sgot != NULL && srela != NULL);
1910
1911 rela.r_offset = (sgot->output_section->vma
1912 + sgot->output_offset
dc810e39 1913 + (h->got.offset &~ (bfd_vma) 1));
252b5132
RH
1914
1915 /* If this is a -Bsymbolic link, and the symbol is defined
1916 locally, we just want to emit a RELATIVE reloc. Likewise if
1917 the symbol was forced to be local because of a version file.
1918 The entry in the global offset table will already have been
1919 initialized in the relocate_section function. */
1920 if (info->shared
1921 && (info->symbolic || h->dynindx == -1)
1922 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR))
1923 {
1924 rela.r_info = ELF32_R_INFO (0, R_68K_RELATIVE);
1925 rela.r_addend = bfd_get_signed_32 (output_bfd,
1926 (sgot->contents
dc810e39 1927 + (h->got.offset &~ (bfd_vma) 1)));
252b5132
RH
1928 }
1929 else
1930 {
1931 bfd_put_32 (output_bfd, (bfd_vma) 0,
dc810e39 1932 sgot->contents + (h->got.offset &~ (bfd_vma) 1));
252b5132
RH
1933 rela.r_info = ELF32_R_INFO (h->dynindx, R_68K_GLOB_DAT);
1934 rela.r_addend = 0;
1935 }
1936
1937 bfd_elf32_swap_reloca_out (output_bfd, &rela,
1938 ((Elf32_External_Rela *) srela->contents
1939 + srela->reloc_count));
1940 ++srela->reloc_count;
1941 }
1942
1943 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
1944 {
1945 asection *s;
1946 Elf_Internal_Rela rela;
1947
1948 /* This symbol needs a copy reloc. Set it up. */
1949
1950 BFD_ASSERT (h->dynindx != -1
1951 && (h->root.type == bfd_link_hash_defined
1952 || h->root.type == bfd_link_hash_defweak));
1953
1954 s = bfd_get_section_by_name (h->root.u.def.section->owner,
1955 ".rela.bss");
1956 BFD_ASSERT (s != NULL);
1957
1958 rela.r_offset = (h->root.u.def.value
1959 + h->root.u.def.section->output_section->vma
1960 + h->root.u.def.section->output_offset);
1961 rela.r_info = ELF32_R_INFO (h->dynindx, R_68K_COPY);
1962 rela.r_addend = 0;
1963 bfd_elf32_swap_reloca_out (output_bfd, &rela,
1964 ((Elf32_External_Rela *) s->contents
1965 + s->reloc_count));
1966 ++s->reloc_count;
1967 }
1968
1969 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
1970 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
1971 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
1972 sym->st_shndx = SHN_ABS;
1973
1974 return true;
1975}
1976
1977/* Finish up the dynamic sections. */
1978
1979static boolean
1980elf_m68k_finish_dynamic_sections (output_bfd, info)
1981 bfd *output_bfd;
1982 struct bfd_link_info *info;
1983{
1984 bfd *dynobj;
1985 asection *sgot;
1986 asection *sdyn;
1987
1988 dynobj = elf_hash_table (info)->dynobj;
1989
1990 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
1991 BFD_ASSERT (sgot != NULL);
1992 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
1993
1994 if (elf_hash_table (info)->dynamic_sections_created)
1995 {
1996 asection *splt;
1997 Elf32_External_Dyn *dyncon, *dynconend;
1998
1999 splt = bfd_get_section_by_name (dynobj, ".plt");
2000 BFD_ASSERT (splt != NULL && sdyn != NULL);
2001
2002 dyncon = (Elf32_External_Dyn *) sdyn->contents;
2003 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
2004 for (; dyncon < dynconend; dyncon++)
2005 {
2006 Elf_Internal_Dyn dyn;
2007 const char *name;
2008 asection *s;
2009
2010 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
2011
2012 switch (dyn.d_tag)
2013 {
2014 default:
2015 break;
2016
2017 case DT_PLTGOT:
2018 name = ".got";
2019 goto get_vma;
2020 case DT_JMPREL:
2021 name = ".rela.plt";
2022 get_vma:
2023 s = bfd_get_section_by_name (output_bfd, name);
2024 BFD_ASSERT (s != NULL);
2025 dyn.d_un.d_ptr = s->vma;
2026 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2027 break;
2028
2029 case DT_PLTRELSZ:
2030 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2031 BFD_ASSERT (s != NULL);
2032 if (s->_cooked_size != 0)
2033 dyn.d_un.d_val = s->_cooked_size;
2034 else
2035 dyn.d_un.d_val = s->_raw_size;
2036 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2037 break;
2038
2039 case DT_RELASZ:
2040 /* The procedure linkage table relocs (DT_JMPREL) should
2041 not be included in the overall relocs (DT_RELA).
2042 Therefore, we override the DT_RELASZ entry here to
2043 make it not include the JMPREL relocs. Since the
2044 linker script arranges for .rela.plt to follow all
2045 other relocation sections, we don't have to worry
2046 about changing the DT_RELA entry. */
2047 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2048 if (s != NULL)
2049 {
2050 if (s->_cooked_size != 0)
2051 dyn.d_un.d_val -= s->_cooked_size;
2052 else
2053 dyn.d_un.d_val -= s->_raw_size;
2054 }
2055 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2056 break;
2057 }
2058 }
2059
2060 /* Fill in the first entry in the procedure linkage table. */
2061 if (splt->_raw_size > 0)
2062 {
9e1281c7
CM
2063 if (!CPU32_FLAG (output_bfd))
2064 {
2065 memcpy (splt->contents, elf_m68k_plt0_entry, PLT_ENTRY_SIZE);
2066 bfd_put_32 (output_bfd,
2067 (sgot->output_section->vma
2068 + sgot->output_offset + 4
2069 - (splt->output_section->vma + 2)),
2070 splt->contents + 4);
2071 bfd_put_32 (output_bfd,
2072 (sgot->output_section->vma
2073 + sgot->output_offset + 8
2074 - (splt->output_section->vma + 10)),
2075 splt->contents + 12);
c3668558 2076 elf_section_data (splt->output_section)->this_hdr.sh_entsize
9e1281c7
CM
2077 = PLT_ENTRY_SIZE;
2078 }
2079 else /* cpu32 */
2080 {
2081 memcpy (splt->contents, elf_cpu32_plt0_entry, PLT_CPU32_ENTRY_SIZE);
2082 bfd_put_32 (output_bfd,
2083 (sgot->output_section->vma
2084 + sgot->output_offset + 4
2085 - (splt->output_section->vma + 2)),
2086 splt->contents + 4);
2087 bfd_put_32 (output_bfd,
2088 (sgot->output_section->vma
2089 + sgot->output_offset + 8
2090 - (splt->output_section->vma + 10)),
6091b433 2091 splt->contents + 12);
c3668558 2092 elf_section_data (splt->output_section)->this_hdr.sh_entsize
9e1281c7
CM
2093 = PLT_CPU32_ENTRY_SIZE;
2094 }
252b5132 2095 }
252b5132
RH
2096 }
2097
2098 /* Fill in the first three entries in the global offset table. */
2099 if (sgot->_raw_size > 0)
2100 {
2101 if (sdyn == NULL)
2102 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
2103 else
2104 bfd_put_32 (output_bfd,
2105 sdyn->output_section->vma + sdyn->output_offset,
2106 sgot->contents);
2107 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
2108 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
2109 }
2110
2111 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
2112
252b5132
RH
2113 return true;
2114}
2115
0752970e
NC
2116/* Given a .data section and a .emreloc in-memory section, store
2117 relocation information into the .emreloc section which can be
2118 used at runtime to relocate the section. This is called by the
2119 linker when the --embedded-relocs switch is used. This is called
2120 after the add_symbols entry point has been called for all the
2121 objects, and before the final_link entry point is called. */
2122
2123boolean
2124bfd_m68k_elf32_create_embedded_relocs (abfd, info, datasec, relsec, errmsg)
2125 bfd *abfd;
2126 struct bfd_link_info *info;
2127 asection *datasec;
2128 asection *relsec;
2129 char **errmsg;
2130{
2131 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 2132 Elf_Internal_Shdr *shndx_hdr;
0752970e
NC
2133 Elf32_External_Sym *extsyms;
2134 Elf32_External_Sym *free_extsyms = NULL;
9ad5cbcf 2135 Elf_External_Sym_Shndx *shndx_buf = NULL;
0752970e
NC
2136 Elf_Internal_Rela *internal_relocs;
2137 Elf_Internal_Rela *free_relocs = NULL;
2138 Elf_Internal_Rela *irel, *irelend;
2139 bfd_byte *p;
dc810e39 2140 bfd_size_type amt;
0752970e
NC
2141
2142 BFD_ASSERT (! info->relocateable);
2143
2144 *errmsg = NULL;
2145
2146 if (datasec->reloc_count == 0)
2147 return true;
2148
2149 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2150 /* Read this BFD's symbols if we haven't done so already, or get the cached
2151 copy if it exists. */
2152 if (symtab_hdr->contents != NULL)
2153 extsyms = (Elf32_External_Sym *) symtab_hdr->contents;
2154 else
2155 {
2156 /* Go get them off disk. */
9ad5cbcf 2157 amt = symtab_hdr->sh_info * sizeof (Elf32_External_Sym);
0752970e 2158 if (info->keep_memory)
9ad5cbcf 2159 extsyms = (Elf32_External_Sym *) bfd_alloc (abfd, amt);
0752970e 2160 else
9ad5cbcf 2161 extsyms = (Elf32_External_Sym *) bfd_malloc (amt);
0752970e
NC
2162 if (extsyms == NULL)
2163 goto error_return;
2164 if (! info->keep_memory)
2165 free_extsyms = extsyms;
2166 if (bfd_seek (abfd, symtab_hdr->sh_offset, SEEK_SET) != 0
9ad5cbcf 2167 || bfd_bread (extsyms, amt, abfd) != amt)
0752970e
NC
2168 goto error_return;
2169 if (info->keep_memory)
973ffd63 2170 symtab_hdr->contents = (unsigned char *) extsyms;
0752970e
NC
2171 }
2172
9ad5cbcf
AM
2173 shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
2174 if (shndx_hdr->sh_size != 0)
2175 {
2176 amt = symtab_hdr->sh_info * sizeof (Elf_External_Sym_Shndx);
2177 shndx_buf = (Elf_External_Sym_Shndx *) bfd_malloc (amt);
2178 if (shndx_buf == NULL)
2179 goto error_return;
2180 if (bfd_seek (abfd, shndx_hdr->sh_offset, SEEK_SET) != 0
2181 || bfd_bread ((PTR) shndx_buf, amt, abfd) != amt)
2182 goto error_return;
2183 }
2184
0752970e
NC
2185 /* Get a copy of the native relocations. */
2186 internal_relocs = (_bfd_elf32_link_read_relocs
2187 (abfd, datasec, (PTR) NULL, (Elf_Internal_Rela *) NULL,
2188 info->keep_memory));
2189 if (internal_relocs == NULL)
2190 goto error_return;
2191 if (! info->keep_memory)
2192 free_relocs = internal_relocs;
2193
dc810e39
AM
2194 amt = (bfd_size_type) datasec->reloc_count * 12;
2195 relsec->contents = (bfd_byte *) bfd_alloc (abfd, amt);
0752970e
NC
2196 if (relsec->contents == NULL)
2197 goto error_return;
2198
2199 p = relsec->contents;
2200
2201 irelend = internal_relocs + datasec->reloc_count;
2202 for (irel = internal_relocs; irel < irelend; irel++, p += 12)
2203 {
2204 asection *targetsec;
2205
2206 /* We are going to write a four byte longword into the runtime
2207 reloc section. The longword will be the address in the data
2208 section which must be relocated. It is followed by the name
2209 of the target section NUL-padded or truncated to 8
2210 characters. */
2211
2212 /* We can only relocate absolute longword relocs at run time. */
2213 if (ELF32_R_TYPE (irel->r_info) != (int) R_68K_32)
2214 {
2215 *errmsg = _("unsupported reloc type");
2216 bfd_set_error (bfd_error_bad_value);
2217 goto error_return;
2218 }
2219
2220 /* Get the target section referred to by the reloc. */
2221 if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
2222 {
9ad5cbcf
AM
2223 Elf32_External_Sym *esym;
2224 Elf_External_Sym_Shndx *shndx;
0752970e
NC
2225 Elf_Internal_Sym isym;
2226
2227 /* A local symbol. */
9ad5cbcf
AM
2228 esym = extsyms + ELF32_R_SYM (irel->r_info);
2229 shndx = shndx_buf + (shndx_buf ? ELF32_R_SYM (irel->r_info) : 0);
2230 bfd_elf32_swap_symbol_in (abfd, esym, shndx, &isym);
0752970e
NC
2231
2232 targetsec = bfd_section_from_elf_index (abfd, isym.st_shndx);
2233 }
2234 else
2235 {
2236 unsigned long indx;
2237 struct elf_link_hash_entry *h;
2238
2239 /* An external symbol. */
2240 indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
2241 h = elf_sym_hashes (abfd)[indx];
2242 BFD_ASSERT (h != NULL);
2243 if (h->root.type == bfd_link_hash_defined
2244 || h->root.type == bfd_link_hash_defweak)
2245 targetsec = h->root.u.def.section;
2246 else
2247 targetsec = NULL;
2248 }
2249
2250 bfd_put_32 (abfd, irel->r_offset + datasec->output_offset, p);
2251 memset (p + 4, 0, 8);
2252 if (targetsec != NULL)
2253 strncpy (p + 4, targetsec->output_section->name, 8);
2254 }
c3668558 2255
9ad5cbcf
AM
2256 if (shndx_buf != NULL)
2257 free (shndx_buf);
0752970e
NC
2258 if (free_extsyms != NULL)
2259 free (free_extsyms);
2260 if (free_relocs != NULL)
2261 free (free_relocs);
2262 return true;
2263
2264error_return:
9ad5cbcf
AM
2265 if (shndx_buf != NULL)
2266 free (shndx_buf);
0752970e
NC
2267 if (free_extsyms != NULL)
2268 free (free_extsyms);
2269 if (free_relocs != NULL)
2270 free (free_relocs);
2271 return false;
2272}
2273
aa91b392 2274static enum elf_reloc_type_class
f51e552e
AM
2275elf32_m68k_reloc_type_class (rela)
2276 const Elf_Internal_Rela *rela;
aa91b392 2277{
f51e552e 2278 switch ((int) ELF32_R_TYPE (rela->r_info))
aa91b392
AS
2279 {
2280 case R_68K_RELATIVE:
2281 return reloc_class_relative;
2282 case R_68K_JMP_SLOT:
2283 return reloc_class_plt;
2284 case R_68K_COPY:
2285 return reloc_class_copy;
2286 default:
2287 return reloc_class_normal;
2288 }
2289}
2290
252b5132
RH
2291#define TARGET_BIG_SYM bfd_elf32_m68k_vec
2292#define TARGET_BIG_NAME "elf32-m68k"
2293#define ELF_MACHINE_CODE EM_68K
2294#define ELF_MAXPAGESIZE 0x2000
2295#define elf_backend_create_dynamic_sections \
2296 _bfd_elf_create_dynamic_sections
2297#define bfd_elf32_bfd_link_hash_table_create \
2298 elf_m68k_link_hash_table_create
2299#define bfd_elf32_bfd_final_link _bfd_elf32_gc_common_final_link
2300
2301#define elf_backend_check_relocs elf_m68k_check_relocs
2302#define elf_backend_adjust_dynamic_symbol \
2303 elf_m68k_adjust_dynamic_symbol
2304#define elf_backend_size_dynamic_sections \
2305 elf_m68k_size_dynamic_sections
2306#define elf_backend_relocate_section elf_m68k_relocate_section
2307#define elf_backend_finish_dynamic_symbol \
2308 elf_m68k_finish_dynamic_symbol
2309#define elf_backend_finish_dynamic_sections \
2310 elf_m68k_finish_dynamic_sections
2311#define elf_backend_gc_mark_hook elf_m68k_gc_mark_hook
2312#define elf_backend_gc_sweep_hook elf_m68k_gc_sweep_hook
9e1281c7
CM
2313#define bfd_elf32_bfd_merge_private_bfd_data \
2314 elf32_m68k_merge_private_bfd_data
2315#define bfd_elf32_bfd_set_private_flags \
2316 elf32_m68k_set_private_flags
2317#define bfd_elf32_bfd_print_private_bfd_data \
2318 elf32_m68k_print_private_bfd_data
aa91b392 2319#define elf_backend_reloc_type_class elf32_m68k_reloc_type_class
9e1281c7 2320
252b5132 2321#define elf_backend_can_gc_sections 1
51b64d56 2322#define elf_backend_can_refcount 1
252b5132
RH
2323#define elf_backend_want_got_plt 1
2324#define elf_backend_plt_readonly 1
2325#define elf_backend_want_plt_sym 0
2326#define elf_backend_got_header_size 12
252b5132
RH
2327
2328#include "elf32-target.h"