]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elfnn-riscv.c
RISC-V: Error and warning messages tidy.
[thirdparty/binutils-gdb.git] / bfd / elfnn-riscv.c
CommitLineData
e23eba97 1/* RISC-V-specific support for NN-bit ELF.
250d07de 2 Copyright (C) 2011-2021 Free Software Foundation, Inc.
e23eba97
NC
3
4 Contributed by Andrew Waterman (andrew@sifive.com).
5 Based on TILE-Gx and MIPS targets.
6
7 This file is part of BFD, the Binary File Descriptor library.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
20 along with this program; see the file COPYING3. If not,
21 see <http://www.gnu.org/licenses/>. */
22
23/* This file handles RISC-V ELF targets. */
24
25#include "sysdep.h"
26#include "bfd.h"
27#include "libbfd.h"
28#include "bfdlink.h"
29#include "genlink.h"
30#include "elf-bfd.h"
31#include "elfxx-riscv.h"
32#include "elf/riscv.h"
33#include "opcode/riscv.h"
02dd9d25 34#include "objalloc.h"
e23eba97 35
fbc09e7a
MC
36#ifdef HAVE_LIMITS_H
37#include <limits.h>
38#endif
39#ifndef CHAR_BIT
40#define CHAR_BIT 8
41#endif
42
ff6f4d9b
PD
43/* Internal relocations used exclusively by the relaxation pass. */
44#define R_RISCV_DELETE (R_RISCV_max + 1)
45
e23eba97
NC
46#define ARCH_SIZE NN
47
48#define MINUS_ONE ((bfd_vma)0 - 1)
49
50#define RISCV_ELF_LOG_WORD_BYTES (ARCH_SIZE == 32 ? 2 : 3)
51
52#define RISCV_ELF_WORD_BYTES (1 << RISCV_ELF_LOG_WORD_BYTES)
53
54/* The name of the dynamic interpreter. This is put in the .interp
55 section. */
56
57#define ELF64_DYNAMIC_INTERPRETER "/lib/ld.so.1"
58#define ELF32_DYNAMIC_INTERPRETER "/lib32/ld.so.1"
59
60#define ELF_ARCH bfd_arch_riscv
61#define ELF_TARGET_ID RISCV_ELF_DATA
62#define ELF_MACHINE_CODE EM_RISCV
63#define ELF_MAXPAGESIZE 0x1000
64#define ELF_COMMONPAGESIZE 0x1000
65
e23eba97
NC
66/* RISC-V ELF linker hash entry. */
67
68struct riscv_elf_link_hash_entry
69{
70 struct elf_link_hash_entry elf;
71
e23eba97
NC
72#define GOT_UNKNOWN 0
73#define GOT_NORMAL 1
74#define GOT_TLS_GD 2
75#define GOT_TLS_IE 4
76#define GOT_TLS_LE 8
77 char tls_type;
78};
79
80#define riscv_elf_hash_entry(ent) \
81 ((struct riscv_elf_link_hash_entry *)(ent))
82
83struct _bfd_riscv_elf_obj_tdata
84{
85 struct elf_obj_tdata root;
86
87 /* tls_type for each local got entry. */
88 char *local_got_tls_type;
89};
90
91#define _bfd_riscv_elf_tdata(abfd) \
92 ((struct _bfd_riscv_elf_obj_tdata *) (abfd)->tdata.any)
93
94#define _bfd_riscv_elf_local_got_tls_type(abfd) \
95 (_bfd_riscv_elf_tdata (abfd)->local_got_tls_type)
96
97#define _bfd_riscv_elf_tls_type(abfd, h, symndx) \
98 (*((h) != NULL ? &riscv_elf_hash_entry (h)->tls_type \
99 : &_bfd_riscv_elf_local_got_tls_type (abfd) [symndx]))
100
101#define is_riscv_elf(bfd) \
102 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
103 && elf_tdata (bfd) != NULL \
104 && elf_object_id (bfd) == RISCV_ELF_DATA)
105
fc46e8bd
NC
106static bfd_boolean
107elfNN_riscv_mkobject (bfd *abfd)
108{
109 return bfd_elf_allocate_object (abfd,
110 sizeof (struct _bfd_riscv_elf_obj_tdata),
111 RISCV_ELF_DATA);
112}
113
e23eba97
NC
114#include "elf/common.h"
115#include "elf/internal.h"
116
117struct riscv_elf_link_hash_table
118{
119 struct elf_link_hash_table elf;
120
121 /* Short-cuts to get to dynamic linker sections. */
e23eba97
NC
122 asection *sdyntdata;
123
fc3c5343
L
124 /* The max alignment of output sections. */
125 bfd_vma max_alignment;
02dd9d25
NC
126
127 /* Used by local STT_GNU_IFUNC symbols. */
128 htab_t loc_hash_table;
129 void * loc_hash_memory;
51a8a7c2
NC
130
131 /* The index of the last unused .rel.iplt slot. */
132 bfd_vma last_iplt_index;
e23eba97
NC
133};
134
fbc09e7a 135/* Instruction access functions. */
fbc09e7a
MC
136#define riscv_get_insn(bits, ptr) \
137 ((bits) == 16 ? bfd_getl16 (ptr) \
138 : (bits) == 32 ? bfd_getl32 (ptr) \
139 : (bits) == 64 ? bfd_getl64 (ptr) \
140 : (abort (), (bfd_vma) - 1))
141#define riscv_put_insn(bits, val, ptr) \
142 ((bits) == 16 ? bfd_putl16 (val, ptr) \
143 : (bits) == 32 ? bfd_putl32 (val, ptr) \
144 : (bits) == 64 ? bfd_putl64 (val, ptr) \
145 : (abort (), (void) 0))
e23eba97
NC
146
147/* Get the RISC-V ELF linker hash table from a link_info structure. */
148#define riscv_elf_hash_table(p) \
0f55320b
AM
149 ((is_elf_hash_table ((p)->hash) \
150 && elf_hash_table_id (elf_hash_table (p)) == RISCV_ELF_DATA) \
151 ? (struct riscv_elf_link_hash_table *) (p)->hash : NULL)
e23eba97 152
f3185997 153static bfd_boolean
0aa13fee 154riscv_info_to_howto_rela (bfd *abfd,
e23eba97
NC
155 arelent *cache_ptr,
156 Elf_Internal_Rela *dst)
157{
0aa13fee 158 cache_ptr->howto = riscv_elf_rtype_to_howto (abfd, ELFNN_R_TYPE (dst->r_info));
f3185997 159 return cache_ptr->howto != NULL;
e23eba97
NC
160}
161
162static void
163riscv_elf_append_rela (bfd *abfd, asection *s, Elf_Internal_Rela *rel)
164{
165 const struct elf_backend_data *bed;
166 bfd_byte *loc;
167
168 bed = get_elf_backend_data (abfd);
169 loc = s->contents + (s->reloc_count++ * bed->s->sizeof_rela);
170 bed->s->swap_reloca_out (abfd, rel, loc);
171}
172
fbc09e7a
MC
173/* Return true if a relocation is modifying an instruction. */
174
175static bfd_boolean
176riscv_is_insn_reloc (const reloc_howto_type *howto)
177{
178 /* Heuristic: A multibyte destination with a nontrivial mask
179 is an instruction */
180 return (howto->bitsize > 8
181 && howto->dst_mask != 0
182 && ~(howto->dst_mask | (howto->bitsize < sizeof(bfd_vma) * CHAR_BIT
183 ? (MINUS_ONE << howto->bitsize) : (bfd_vma)0)) != 0);
184}
185
e23eba97 186/* PLT/GOT stuff. */
e23eba97
NC
187#define PLT_HEADER_INSNS 8
188#define PLT_ENTRY_INSNS 4
189#define PLT_HEADER_SIZE (PLT_HEADER_INSNS * 4)
190#define PLT_ENTRY_SIZE (PLT_ENTRY_INSNS * 4)
e23eba97 191#define GOT_ENTRY_SIZE RISCV_ELF_WORD_BYTES
02dd9d25
NC
192/* Reserve two entries of GOTPLT for ld.so, one is used for PLT resolver,
193 the other is used for link map. Other targets also reserve one more
194 entry used for runtime profile? */
e23eba97
NC
195#define GOTPLT_HEADER_SIZE (2 * GOT_ENTRY_SIZE)
196
197#define sec_addr(sec) ((sec)->output_section->vma + (sec)->output_offset)
198
e23eba97
NC
199#if ARCH_SIZE == 32
200# define MATCH_LREG MATCH_LW
201#else
202# define MATCH_LREG MATCH_LD
203#endif
204
205/* Generate a PLT header. */
206
5ef23793
JW
207static bfd_boolean
208riscv_make_plt_header (bfd *output_bfd, bfd_vma gotplt_addr, bfd_vma addr,
209 uint32_t *entry)
e23eba97
NC
210{
211 bfd_vma gotplt_offset_high = RISCV_PCREL_HIGH_PART (gotplt_addr, addr);
212 bfd_vma gotplt_offset_low = RISCV_PCREL_LOW_PART (gotplt_addr, addr);
213
5ef23793
JW
214 /* RVE has no t3 register, so this won't work, and is not supported. */
215 if (elf_elfheader (output_bfd)->e_flags & EF_RISCV_RVE)
216 {
217 _bfd_error_handler (_("%pB: warning: RVE PLT generation not supported"),
218 output_bfd);
219 return FALSE;
220 }
221
e23eba97 222 /* auipc t2, %hi(.got.plt)
07d6d2b8 223 sub t1, t1, t3 # shifted .got.plt offset + hdr size + 12
e23eba97
NC
224 l[w|d] t3, %lo(.got.plt)(t2) # _dl_runtime_resolve
225 addi t1, t1, -(hdr size + 12) # shifted .got.plt offset
226 addi t0, t2, %lo(.got.plt) # &.got.plt
227 srli t1, t1, log2(16/PTRSIZE) # .got.plt offset
07d6d2b8 228 l[w|d] t0, PTRSIZE(t0) # link map
dcd709e0 229 jr t3 */
e23eba97
NC
230
231 entry[0] = RISCV_UTYPE (AUIPC, X_T2, gotplt_offset_high);
232 entry[1] = RISCV_RTYPE (SUB, X_T1, X_T1, X_T3);
233 entry[2] = RISCV_ITYPE (LREG, X_T3, X_T2, gotplt_offset_low);
1174d920 234 entry[3] = RISCV_ITYPE (ADDI, X_T1, X_T1, (uint32_t) -(PLT_HEADER_SIZE + 12));
e23eba97
NC
235 entry[4] = RISCV_ITYPE (ADDI, X_T0, X_T2, gotplt_offset_low);
236 entry[5] = RISCV_ITYPE (SRLI, X_T1, X_T1, 4 - RISCV_ELF_LOG_WORD_BYTES);
237 entry[6] = RISCV_ITYPE (LREG, X_T0, X_T0, RISCV_ELF_WORD_BYTES);
238 entry[7] = RISCV_ITYPE (JALR, 0, X_T3, 0);
5ef23793
JW
239
240 return TRUE;
e23eba97
NC
241}
242
243/* Generate a PLT entry. */
244
5ef23793
JW
245static bfd_boolean
246riscv_make_plt_entry (bfd *output_bfd, bfd_vma got, bfd_vma addr,
247 uint32_t *entry)
e23eba97 248{
5ef23793
JW
249 /* RVE has no t3 register, so this won't work, and is not supported. */
250 if (elf_elfheader (output_bfd)->e_flags & EF_RISCV_RVE)
251 {
252 _bfd_error_handler (_("%pB: warning: RVE PLT generation not supported"),
253 output_bfd);
254 return FALSE;
255 }
256
e23eba97
NC
257 /* auipc t3, %hi(.got.plt entry)
258 l[w|d] t3, %lo(.got.plt entry)(t3)
259 jalr t1, t3
dcd709e0 260 nop */
e23eba97
NC
261
262 entry[0] = RISCV_UTYPE (AUIPC, X_T3, RISCV_PCREL_HIGH_PART (got, addr));
1d65abb5 263 entry[1] = RISCV_ITYPE (LREG, X_T3, X_T3, RISCV_PCREL_LOW_PART (got, addr));
e23eba97
NC
264 entry[2] = RISCV_ITYPE (JALR, X_T1, X_T3, 0);
265 entry[3] = RISCV_NOP;
5ef23793
JW
266
267 return TRUE;
e23eba97
NC
268}
269
270/* Create an entry in an RISC-V ELF linker hash table. */
271
272static struct bfd_hash_entry *
273link_hash_newfunc (struct bfd_hash_entry *entry,
274 struct bfd_hash_table *table, const char *string)
275{
276 /* Allocate the structure if it has not already been allocated by a
277 subclass. */
278 if (entry == NULL)
279 {
280 entry =
281 bfd_hash_allocate (table,
282 sizeof (struct riscv_elf_link_hash_entry));
283 if (entry == NULL)
284 return entry;
285 }
286
287 /* Call the allocation method of the superclass. */
288 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
289 if (entry != NULL)
290 {
291 struct riscv_elf_link_hash_entry *eh;
292
293 eh = (struct riscv_elf_link_hash_entry *) entry;
e23eba97
NC
294 eh->tls_type = GOT_UNKNOWN;
295 }
296
297 return entry;
298}
299
02dd9d25 300/* Compute a hash of a local hash entry. We use elf_link_hash_entry
dcd709e0
NC
301 for local symbol so that we can handle local STT_GNU_IFUNC symbols
302 as global symbol. We reuse indx and dynstr_index for local symbol
303 hash since they aren't used by global symbols in this backend. */
02dd9d25
NC
304
305static hashval_t
306riscv_elf_local_htab_hash (const void *ptr)
307{
308 struct elf_link_hash_entry *h = (struct elf_link_hash_entry *) ptr;
309 return ELF_LOCAL_SYMBOL_HASH (h->indx, h->dynstr_index);
310}
311
312/* Compare local hash entries. */
313
314static int
315riscv_elf_local_htab_eq (const void *ptr1, const void *ptr2)
316{
317 struct elf_link_hash_entry *h1 = (struct elf_link_hash_entry *) ptr1;
318 struct elf_link_hash_entry *h2 = (struct elf_link_hash_entry *) ptr2;
319
320 return h1->indx == h2->indx && h1->dynstr_index == h2->dynstr_index;
321}
322
323/* Find and/or create a hash entry for local symbol. */
324
325static struct elf_link_hash_entry *
326riscv_elf_get_local_sym_hash (struct riscv_elf_link_hash_table *htab,
327 bfd *abfd, const Elf_Internal_Rela *rel,
328 bfd_boolean create)
329{
330 struct riscv_elf_link_hash_entry eh, *ret;
331 asection *sec = abfd->sections;
332 hashval_t h = ELF_LOCAL_SYMBOL_HASH (sec->id,
333 ELFNN_R_SYM (rel->r_info));
334 void **slot;
335
336 eh.elf.indx = sec->id;
337 eh.elf.dynstr_index = ELFNN_R_SYM (rel->r_info);
338 slot = htab_find_slot_with_hash (htab->loc_hash_table, &eh, h,
339 create ? INSERT : NO_INSERT);
340
341 if (!slot)
342 return NULL;
343
344 if (*slot)
345 {
346 ret = (struct riscv_elf_link_hash_entry *) *slot;
347 return &ret->elf;
348 }
349
350 ret = (struct riscv_elf_link_hash_entry *)
351 objalloc_alloc ((struct objalloc *) htab->loc_hash_memory,
352 sizeof (struct riscv_elf_link_hash_entry));
353 if (ret)
354 {
355 memset (ret, 0, sizeof (*ret));
356 ret->elf.indx = sec->id;
357 ret->elf.dynstr_index = ELFNN_R_SYM (rel->r_info);
358 ret->elf.dynindx = -1;
359 *slot = ret;
360 }
361 return &ret->elf;
362}
363
364/* Destroy a RISC-V elf linker hash table. */
365
366static void
367riscv_elf_link_hash_table_free (bfd *obfd)
368{
369 struct riscv_elf_link_hash_table *ret
370 = (struct riscv_elf_link_hash_table *) obfd->link.hash;
371
372 if (ret->loc_hash_table)
373 htab_delete (ret->loc_hash_table);
374 if (ret->loc_hash_memory)
375 objalloc_free ((struct objalloc *) ret->loc_hash_memory);
376
377 _bfd_elf_link_hash_table_free (obfd);
378}
379
e23eba97
NC
380/* Create a RISC-V ELF linker hash table. */
381
382static struct bfd_link_hash_table *
383riscv_elf_link_hash_table_create (bfd *abfd)
384{
385 struct riscv_elf_link_hash_table *ret;
986f0783 386 size_t amt = sizeof (struct riscv_elf_link_hash_table);
e23eba97
NC
387
388 ret = (struct riscv_elf_link_hash_table *) bfd_zmalloc (amt);
389 if (ret == NULL)
390 return NULL;
391
392 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, link_hash_newfunc,
393 sizeof (struct riscv_elf_link_hash_entry),
394 RISCV_ELF_DATA))
395 {
396 free (ret);
397 return NULL;
398 }
399
fc3c5343 400 ret->max_alignment = (bfd_vma) -1;
02dd9d25
NC
401
402 /* Create hash table for local ifunc. */
403 ret->loc_hash_table = htab_try_create (1024,
404 riscv_elf_local_htab_hash,
405 riscv_elf_local_htab_eq,
406 NULL);
407 ret->loc_hash_memory = objalloc_create ();
408 if (!ret->loc_hash_table || !ret->loc_hash_memory)
409 {
410 riscv_elf_link_hash_table_free (abfd);
411 return NULL;
412 }
413 ret->elf.root.hash_table_free = riscv_elf_link_hash_table_free;
414
e23eba97
NC
415 return &ret->elf.root;
416}
417
418/* Create the .got section. */
419
420static bfd_boolean
421riscv_elf_create_got_section (bfd *abfd, struct bfd_link_info *info)
422{
423 flagword flags;
424 asection *s, *s_got;
425 struct elf_link_hash_entry *h;
426 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
427 struct elf_link_hash_table *htab = elf_hash_table (info);
428
429 /* This function may be called more than once. */
ce558b89 430 if (htab->sgot != NULL)
e23eba97
NC
431 return TRUE;
432
433 flags = bed->dynamic_sec_flags;
434
435 s = bfd_make_section_anyway_with_flags (abfd,
436 (bed->rela_plts_and_copies_p
437 ? ".rela.got" : ".rel.got"),
438 (bed->dynamic_sec_flags
439 | SEC_READONLY));
440 if (s == NULL
fd361982 441 || !bfd_set_section_alignment (s, bed->s->log_file_align))
e23eba97
NC
442 return FALSE;
443 htab->srelgot = s;
444
445 s = s_got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
446 if (s == NULL
fd361982 447 || !bfd_set_section_alignment (s, bed->s->log_file_align))
e23eba97
NC
448 return FALSE;
449 htab->sgot = s;
450
451 /* The first bit of the global offset table is the header. */
452 s->size += bed->got_header_size;
453
454 if (bed->want_got_plt)
455 {
456 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
457 if (s == NULL
fd361982 458 || !bfd_set_section_alignment (s, bed->s->log_file_align))
e23eba97
NC
459 return FALSE;
460 htab->sgotplt = s;
461
462 /* Reserve room for the header. */
463 s->size += GOTPLT_HEADER_SIZE;
464 }
465
466 if (bed->want_got_sym)
467 {
468 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the .got
469 section. We don't do this in the linker script because we don't want
470 to define the symbol if we are not creating a global offset
471 table. */
472 h = _bfd_elf_define_linkage_sym (abfd, info, s_got,
473 "_GLOBAL_OFFSET_TABLE_");
474 elf_hash_table (info)->hgot = h;
475 if (h == NULL)
476 return FALSE;
477 }
478
479 return TRUE;
480}
481
482/* Create .plt, .rela.plt, .got, .got.plt, .rela.got, .dynbss, and
483 .rela.bss sections in DYNOBJ, and set up shortcuts to them in our
484 hash table. */
485
486static bfd_boolean
487riscv_elf_create_dynamic_sections (bfd *dynobj,
488 struct bfd_link_info *info)
489{
490 struct riscv_elf_link_hash_table *htab;
491
492 htab = riscv_elf_hash_table (info);
493 BFD_ASSERT (htab != NULL);
494
495 if (!riscv_elf_create_got_section (dynobj, info))
496 return FALSE;
497
498 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
499 return FALSE;
500
e23eba97
NC
501 if (!bfd_link_pic (info))
502 {
3e7bd7f2
JW
503 /* Technically, this section doesn't have contents. It is used as the
504 target of TLS copy relocs, to copy TLS data from shared libraries into
505 the executable. However, if we don't mark it as loadable, then it
506 matches the IS_TBSS test in ldlang.c, and there is no run-time address
507 space allocated for it even though it has SEC_ALLOC. That test is
508 correct for .tbss, but not correct for this section. There is also
509 a second problem that having a section with no contents can only work
510 if it comes after all sections with contents in the same segment,
511 but the linker script does not guarantee that. This is just mixed in
512 with other .tdata.* sections. We can fix both problems by lying and
513 saying that there are contents. This section is expected to be small
514 so this should not cause a significant extra program startup cost. */
e23eba97
NC
515 htab->sdyntdata =
516 bfd_make_section_anyway_with_flags (dynobj, ".tdata.dyn",
13755f40 517 (SEC_ALLOC | SEC_THREAD_LOCAL
3e7bd7f2
JW
518 | SEC_LOAD | SEC_DATA
519 | SEC_HAS_CONTENTS
13755f40 520 | SEC_LINKER_CREATED));
e23eba97
NC
521 }
522
9d19e4fd
AM
523 if (!htab->elf.splt || !htab->elf.srelplt || !htab->elf.sdynbss
524 || (!bfd_link_pic (info) && (!htab->elf.srelbss || !htab->sdyntdata)))
e23eba97
NC
525 abort ();
526
527 return TRUE;
528}
529
530/* Copy the extra info we tack onto an elf_link_hash_entry. */
531
532static void
533riscv_elf_copy_indirect_symbol (struct bfd_link_info *info,
534 struct elf_link_hash_entry *dir,
535 struct elf_link_hash_entry *ind)
536{
537 struct riscv_elf_link_hash_entry *edir, *eind;
538
539 edir = (struct riscv_elf_link_hash_entry *) dir;
540 eind = (struct riscv_elf_link_hash_entry *) ind;
541
e23eba97
NC
542 if (ind->root.type == bfd_link_hash_indirect
543 && dir->got.refcount <= 0)
544 {
545 edir->tls_type = eind->tls_type;
546 eind->tls_type = GOT_UNKNOWN;
547 }
548 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
549}
550
551static bfd_boolean
552riscv_elf_record_tls_type (bfd *abfd, struct elf_link_hash_entry *h,
553 unsigned long symndx, char tls_type)
554{
555 char *new_tls_type = &_bfd_riscv_elf_tls_type (abfd, h, symndx);
556
557 *new_tls_type |= tls_type;
558 if ((*new_tls_type & GOT_NORMAL) && (*new_tls_type & ~GOT_NORMAL))
559 {
560 (*_bfd_error_handler)
871b3ab2 561 (_("%pB: `%s' accessed both as normal and thread local symbol"),
e23eba97
NC
562 abfd, h ? h->root.root.string : "<local>");
563 return FALSE;
564 }
565 return TRUE;
566}
567
568static bfd_boolean
569riscv_elf_record_got_reference (bfd *abfd, struct bfd_link_info *info,
570 struct elf_link_hash_entry *h, long symndx)
571{
572 struct riscv_elf_link_hash_table *htab = riscv_elf_hash_table (info);
573 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
574
575 if (htab->elf.sgot == NULL)
576 {
577 if (!riscv_elf_create_got_section (htab->elf.dynobj, info))
578 return FALSE;
579 }
580
581 if (h != NULL)
582 {
583 h->got.refcount += 1;
584 return TRUE;
585 }
586
587 /* This is a global offset table entry for a local symbol. */
588 if (elf_local_got_refcounts (abfd) == NULL)
589 {
590 bfd_size_type size = symtab_hdr->sh_info * (sizeof (bfd_vma) + 1);
591 if (!(elf_local_got_refcounts (abfd) = bfd_zalloc (abfd, size)))
592 return FALSE;
593 _bfd_riscv_elf_local_got_tls_type (abfd)
594 = (char *) (elf_local_got_refcounts (abfd) + symtab_hdr->sh_info);
595 }
596 elf_local_got_refcounts (abfd) [symndx] += 1;
597
598 return TRUE;
599}
600
601static bfd_boolean
602bad_static_reloc (bfd *abfd, unsigned r_type, struct elf_link_hash_entry *h)
603{
f3185997
NC
604 reloc_howto_type * r = riscv_elf_rtype_to_howto (abfd, r_type);
605
02dd9d25
NC
606 /* We propably can improve the information to tell users that they
607 should be recompile the code with -fPIC or -fPIE, just like what
608 x86 does. */
e23eba97 609 (*_bfd_error_handler)
871b3ab2 610 (_("%pB: relocation %s against `%s' can not be used when making a shared "
e23eba97 611 "object; recompile with -fPIC"),
f3185997
NC
612 abfd, r ? r->name : _("<unknown>"),
613 h != NULL ? h->root.root.string : "a local symbol");
e23eba97
NC
614 bfd_set_error (bfd_error_bad_value);
615 return FALSE;
616}
dcd709e0 617
e23eba97
NC
618/* Look through the relocs for a section during the first phase, and
619 allocate space in the global offset table or procedure linkage
620 table. */
621
622static bfd_boolean
623riscv_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
624 asection *sec, const Elf_Internal_Rela *relocs)
625{
626 struct riscv_elf_link_hash_table *htab;
627 Elf_Internal_Shdr *symtab_hdr;
628 struct elf_link_hash_entry **sym_hashes;
629 const Elf_Internal_Rela *rel;
630 asection *sreloc = NULL;
631
632 if (bfd_link_relocatable (info))
633 return TRUE;
634
635 htab = riscv_elf_hash_table (info);
636 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
637 sym_hashes = elf_sym_hashes (abfd);
638
639 if (htab->elf.dynobj == NULL)
640 htab->elf.dynobj = abfd;
641
642 for (rel = relocs; rel < relocs + sec->reloc_count; rel++)
643 {
644 unsigned int r_type;
d42c267e 645 unsigned int r_symndx;
e23eba97
NC
646 struct elf_link_hash_entry *h;
647
648 r_symndx = ELFNN_R_SYM (rel->r_info);
649 r_type = ELFNN_R_TYPE (rel->r_info);
650
651 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
652 {
871b3ab2 653 (*_bfd_error_handler) (_("%pB: bad symbol index: %d"),
e23eba97
NC
654 abfd, r_symndx);
655 return FALSE;
656 }
657
658 if (r_symndx < symtab_hdr->sh_info)
02dd9d25
NC
659 {
660 /* A local symbol. */
661 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
662 abfd, r_symndx);
663 if (isym == NULL)
664 return FALSE;
665
666 /* Check relocation against local STT_GNU_IFUNC symbol. */
667 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
668 {
669 h = riscv_elf_get_local_sym_hash (htab, abfd, rel, TRUE);
670 if (h == NULL)
671 return FALSE;
672
673 /* Fake STT_GNU_IFUNC global symbol. */
674 h->root.root.string = bfd_elf_sym_name (abfd, symtab_hdr,
675 isym, NULL);
676 h->type = STT_GNU_IFUNC;
677 h->def_regular = 1;
678 h->ref_regular = 1;
679 h->forced_local = 1;
680 h->root.type = bfd_link_hash_defined;
681 }
682 else
683 h = NULL;
684 }
e23eba97
NC
685 else
686 {
687 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
688 while (h->root.type == bfd_link_hash_indirect
689 || h->root.type == bfd_link_hash_warning)
690 h = (struct elf_link_hash_entry *) h->root.u.i.link;
e23eba97
NC
691 }
692
02dd9d25
NC
693 if (h != NULL)
694 {
695 switch (r_type)
696 {
697 case R_RISCV_32:
698 case R_RISCV_64:
699 case R_RISCV_CALL:
700 case R_RISCV_CALL_PLT:
701 case R_RISCV_HI20:
702 case R_RISCV_GOT_HI20:
703 case R_RISCV_PCREL_HI20:
704 /* Create the ifunc sections, iplt and ipltgot, for static
705 executables. */
706 if (h->type == STT_GNU_IFUNC
707 && !_bfd_elf_create_ifunc_sections (htab->elf.dynobj, info))
708 return FALSE;
709 break;
710
711 default:
712 break;
713 }
714
715 /* It is referenced by a non-shared object. */
716 h->ref_regular = 1;
717 }
718
e23eba97
NC
719 switch (r_type)
720 {
721 case R_RISCV_TLS_GD_HI20:
722 if (!riscv_elf_record_got_reference (abfd, info, h, r_symndx)
723 || !riscv_elf_record_tls_type (abfd, h, r_symndx, GOT_TLS_GD))
724 return FALSE;
725 break;
726
727 case R_RISCV_TLS_GOT_HI20:
728 if (bfd_link_pic (info))
729 info->flags |= DF_STATIC_TLS;
730 if (!riscv_elf_record_got_reference (abfd, info, h, r_symndx)
731 || !riscv_elf_record_tls_type (abfd, h, r_symndx, GOT_TLS_IE))
732 return FALSE;
733 break;
734
735 case R_RISCV_GOT_HI20:
736 if (!riscv_elf_record_got_reference (abfd, info, h, r_symndx)
737 || !riscv_elf_record_tls_type (abfd, h, r_symndx, GOT_NORMAL))
738 return FALSE;
739 break;
740
3b1450b3 741 case R_RISCV_CALL:
e23eba97 742 case R_RISCV_CALL_PLT:
dcd709e0
NC
743 /* These symbol requires a procedure linkage table entry.
744 We actually build the entry in adjust_dynamic_symbol,
3b1450b3 745 because these might be a case of linking PIC code without
e23eba97
NC
746 linking in any dynamic objects, in which case we don't
747 need to generate a procedure linkage table after all. */
748
3b1450b3
NC
749 /* If it is a local symbol, then we resolve it directly
750 without creating a PLT entry. */
751 if (h == NULL)
752 continue;
753
754 h->needs_plt = 1;
755 h->plt.refcount += 1;
e23eba97
NC
756 break;
757
02dd9d25
NC
758 case R_RISCV_PCREL_HI20:
759 if (h != NULL
760 && h->type == STT_GNU_IFUNC)
761 {
762 h->non_got_ref = 1;
763 h->pointer_equality_needed = 1;
764
765 /* We don't use the PCREL_HI20 in the data section,
766 so we always need the plt when it refers to
767 ifunc symbol. */
768 h->plt.refcount += 1;
769 }
770 /* Fall through. */
771
e23eba97
NC
772 case R_RISCV_JAL:
773 case R_RISCV_BRANCH:
774 case R_RISCV_RVC_BRANCH:
775 case R_RISCV_RVC_JUMP:
02dd9d25
NC
776 /* In shared libraries and pie, these relocs are known
777 to bind locally. */
e23eba97
NC
778 if (bfd_link_pic (info))
779 break;
780 goto static_reloc;
781
782 case R_RISCV_TPREL_HI20:
783 if (!bfd_link_executable (info))
784 return bad_static_reloc (abfd, r_type, h);
785 if (h != NULL)
786 riscv_elf_record_tls_type (abfd, h, r_symndx, GOT_TLS_LE);
787 goto static_reloc;
788
789 case R_RISCV_HI20:
790 if (bfd_link_pic (info))
791 return bad_static_reloc (abfd, r_type, h);
792 /* Fall through. */
793
794 case R_RISCV_COPY:
795 case R_RISCV_JUMP_SLOT:
796 case R_RISCV_RELATIVE:
797 case R_RISCV_64:
798 case R_RISCV_32:
799 /* Fall through. */
800
801 static_reloc:
e23eba97 802
02dd9d25
NC
803 if (h != NULL
804 && (!bfd_link_pic (info)
805 || h->type == STT_GNU_IFUNC))
e23eba97 806 {
02dd9d25
NC
807 /* This reloc might not bind locally. */
808 h->non_got_ref = 1;
809 h->pointer_equality_needed = 1;
810
811 if (!h->def_regular
812 || (sec->flags & (SEC_CODE | SEC_READONLY)) != 0)
813 {
814 /* We may need a .plt entry if the symbol is a function
815 defined in a shared lib or is a function referenced
816 from the code or read-only section. */
817 h->plt.refcount += 1;
818 }
e23eba97
NC
819 }
820
821 /* If we are creating a shared library, and this is a reloc
822 against a global symbol, or a non PC relative reloc
823 against a local symbol, then we need to copy the reloc
824 into the shared library. However, if we are linking with
825 -Bsymbolic, we do not need to copy a reloc against a
826 global symbol which is defined in an object we are
827 including in the link (i.e., DEF_REGULAR is set). At
828 this point we have not seen all the input files, so it is
829 possible that DEF_REGULAR is not set now but will be set
830 later (it is never cleared). In case of a weak definition,
831 DEF_REGULAR may be cleared later by a strong definition in
832 a shared library. We account for that possibility below by
833 storing information in the relocs_copied field of the hash
834 table entry. A similar situation occurs when creating
835 shared libraries and symbol visibility changes render the
836 symbol local.
837
838 If on the other hand, we are creating an executable, we
839 may need to keep relocations for symbols satisfied by a
840 dynamic library if we manage to avoid copy relocs for the
02dd9d25
NC
841 symbol.
842
843 Generate dynamic pointer relocation against STT_GNU_IFUNC
844 symbol in the non-code section (R_RISCV_32/R_RISCV_64). */
f3185997
NC
845 reloc_howto_type * r = riscv_elf_rtype_to_howto (abfd, r_type);
846
e23eba97
NC
847 if ((bfd_link_pic (info)
848 && (sec->flags & SEC_ALLOC) != 0
02dd9d25 849 && ((r != NULL && !r->pc_relative)
e23eba97 850 || (h != NULL
02dd9d25 851 && (!info->symbolic
e23eba97
NC
852 || h->root.type == bfd_link_hash_defweak
853 || !h->def_regular))))
854 || (!bfd_link_pic (info)
855 && (sec->flags & SEC_ALLOC) != 0
856 && h != NULL
857 && (h->root.type == bfd_link_hash_defweak
02dd9d25
NC
858 || !h->def_regular))
859 || (!bfd_link_pic (info)
860 && h != NULL
861 && h->type == STT_GNU_IFUNC
862 && (sec->flags & SEC_CODE) == 0))
e23eba97 863 {
3bf083ed
AM
864 struct elf_dyn_relocs *p;
865 struct elf_dyn_relocs **head;
e23eba97
NC
866
867 /* When creating a shared object, we must copy these
868 relocs into the output file. We create a reloc
869 section in dynobj and make room for the reloc. */
870 if (sreloc == NULL)
871 {
872 sreloc = _bfd_elf_make_dynamic_reloc_section
873 (sec, htab->elf.dynobj, RISCV_ELF_LOG_WORD_BYTES,
874 abfd, /*rela?*/ TRUE);
875
876 if (sreloc == NULL)
877 return FALSE;
878 }
879
880 /* If this is a global symbol, we count the number of
881 relocations we need for this symbol. */
882 if (h != NULL)
190eb1dd 883 head = &h->dyn_relocs;
e23eba97
NC
884 else
885 {
886 /* Track dynamic relocs needed for local syms too.
887 We really need local syms available to do this
888 easily. Oh well. */
889
890 asection *s;
891 void *vpp;
892 Elf_Internal_Sym *isym;
893
f1dfbfdb 894 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
e23eba97
NC
895 abfd, r_symndx);
896 if (isym == NULL)
897 return FALSE;
898
899 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
900 if (s == NULL)
901 s = sec;
902
903 vpp = &elf_section_data (s)->local_dynrel;
3bf083ed 904 head = (struct elf_dyn_relocs **) vpp;
e23eba97
NC
905 }
906
907 p = *head;
908 if (p == NULL || p->sec != sec)
909 {
986f0783 910 size_t amt = sizeof *p;
3bf083ed 911 p = ((struct elf_dyn_relocs *)
e23eba97
NC
912 bfd_alloc (htab->elf.dynobj, amt));
913 if (p == NULL)
914 return FALSE;
915 p->next = *head;
916 *head = p;
917 p->sec = sec;
918 p->count = 0;
919 p->pc_count = 0;
920 }
921
922 p->count += 1;
f3185997 923 p->pc_count += r == NULL ? 0 : r->pc_relative;
e23eba97
NC
924 }
925
926 break;
927
928 case R_RISCV_GNU_VTINHERIT:
929 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
930 return FALSE;
931 break;
932
933 case R_RISCV_GNU_VTENTRY:
934 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
935 return FALSE;
936 break;
937
938 default:
939 break;
940 }
941 }
942
943 return TRUE;
944}
945
946static asection *
947riscv_elf_gc_mark_hook (asection *sec,
948 struct bfd_link_info *info,
949 Elf_Internal_Rela *rel,
950 struct elf_link_hash_entry *h,
951 Elf_Internal_Sym *sym)
952{
953 if (h != NULL)
954 switch (ELFNN_R_TYPE (rel->r_info))
955 {
956 case R_RISCV_GNU_VTINHERIT:
957 case R_RISCV_GNU_VTENTRY:
958 return NULL;
959 }
960
961 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
962}
963
e23eba97
NC
964/* Adjust a symbol defined by a dynamic object and referenced by a
965 regular object. The current definition is in some section of the
966 dynamic object, but we're not including those sections. We have to
967 change the definition to something the rest of the link can
968 understand. */
969
970static bfd_boolean
971riscv_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
972 struct elf_link_hash_entry *h)
973{
974 struct riscv_elf_link_hash_table *htab;
975 struct riscv_elf_link_hash_entry * eh;
e23eba97 976 bfd *dynobj;
5474d94f 977 asection *s, *srel;
e23eba97
NC
978
979 htab = riscv_elf_hash_table (info);
980 BFD_ASSERT (htab != NULL);
981
982 dynobj = htab->elf.dynobj;
983
984 /* Make sure we know what is going on here. */
985 BFD_ASSERT (dynobj != NULL
986 && (h->needs_plt
987 || h->type == STT_GNU_IFUNC
60d67dc8 988 || h->is_weakalias
e23eba97
NC
989 || (h->def_dynamic
990 && h->ref_regular
991 && !h->def_regular)));
992
993 /* If this is a function, put it in the procedure linkage table. We
994 will fill in the contents of the procedure linkage table later
995 (although we could actually do it here). */
996 if (h->type == STT_FUNC || h->type == STT_GNU_IFUNC || h->needs_plt)
997 {
998 if (h->plt.refcount <= 0
02dd9d25
NC
999 || (h->type != STT_GNU_IFUNC
1000 && (SYMBOL_CALLS_LOCAL (info, h)
1001 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1002 && h->root.type == bfd_link_hash_undefweak))))
e23eba97
NC
1003 {
1004 /* This case can occur if we saw a R_RISCV_CALL_PLT reloc in an
1005 input file, but the symbol was never referred to by a dynamic
1006 object, or if all references were garbage collected. In such
1007 a case, we don't actually need to build a PLT entry. */
1008 h->plt.offset = (bfd_vma) -1;
1009 h->needs_plt = 0;
1010 }
1011
1012 return TRUE;
1013 }
1014 else
1015 h->plt.offset = (bfd_vma) -1;
1016
1017 /* If this is a weak symbol, and there is a real definition, the
1018 processor independent code will have arranged for us to see the
1019 real definition first, and we can just use the same value. */
60d67dc8 1020 if (h->is_weakalias)
e23eba97 1021 {
60d67dc8
AM
1022 struct elf_link_hash_entry *def = weakdef (h);
1023 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
1024 h->root.u.def.section = def->root.u.def.section;
1025 h->root.u.def.value = def->root.u.def.value;
e23eba97
NC
1026 return TRUE;
1027 }
1028
1029 /* This is a reference to a symbol defined by a dynamic object which
1030 is not a function. */
1031
1032 /* If we are creating a shared library, we must presume that the
1033 only references to the symbol are via the global offset table.
1034 For such cases we need not do anything here; the relocations will
1035 be handled correctly by relocate_section. */
1036 if (bfd_link_pic (info))
1037 return TRUE;
1038
1039 /* If there are no references to this symbol that do not use the
1040 GOT, we don't need to generate a copy reloc. */
1041 if (!h->non_got_ref)
1042 return TRUE;
1043
1044 /* If -z nocopyreloc was given, we won't generate them either. */
1045 if (info->nocopyreloc)
1046 {
1047 h->non_got_ref = 0;
1048 return TRUE;
1049 }
1050
3bf083ed 1051 /* If we don't find any dynamic relocs in read-only sections, then
e23eba97 1052 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
5dbc8b37 1053 if (!_bfd_elf_readonly_dynrelocs (h))
e23eba97
NC
1054 {
1055 h->non_got_ref = 0;
1056 return TRUE;
1057 }
1058
1059 /* We must allocate the symbol in our .dynbss section, which will
1060 become part of the .bss section of the executable. There will be
1061 an entry for this symbol in the .dynsym section. The dynamic
1062 object will contain position independent code, so all references
1063 from the dynamic object to this symbol will go through the global
1064 offset table. The dynamic linker will use the .dynsym entry to
1065 determine the address it must put in the global offset table, so
1066 both the dynamic object and the regular object will refer to the
1067 same memory location for the variable. */
1068
1069 /* We must generate a R_RISCV_COPY reloc to tell the dynamic linker
1070 to copy the initial value out of the dynamic object and into the
1071 runtime process image. We need to remember the offset into the
1072 .rel.bss section we are going to use. */
3bf083ed 1073 eh = (struct riscv_elf_link_hash_entry *) h;
3df5cd13
AW
1074 if (eh->tls_type & ~GOT_NORMAL)
1075 {
1076 s = htab->sdyntdata;
1077 srel = htab->elf.srelbss;
1078 }
1079 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
5474d94f
AM
1080 {
1081 s = htab->elf.sdynrelro;
1082 srel = htab->elf.sreldynrelro;
1083 }
1084 else
1085 {
1086 s = htab->elf.sdynbss;
1087 srel = htab->elf.srelbss;
1088 }
e23eba97
NC
1089 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
1090 {
5474d94f 1091 srel->size += sizeof (ElfNN_External_Rela);
e23eba97
NC
1092 h->needs_copy = 1;
1093 }
1094
5474d94f 1095 return _bfd_elf_adjust_dynamic_copy (info, h, s);
e23eba97
NC
1096}
1097
1098/* Allocate space in .plt, .got and associated reloc sections for
1099 dynamic relocs. */
1100
1101static bfd_boolean
1102allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
1103{
1104 struct bfd_link_info *info;
1105 struct riscv_elf_link_hash_table *htab;
3bf083ed 1106 struct elf_dyn_relocs *p;
e23eba97
NC
1107
1108 if (h->root.type == bfd_link_hash_indirect)
1109 return TRUE;
1110
1111 info = (struct bfd_link_info *) inf;
1112 htab = riscv_elf_hash_table (info);
1113 BFD_ASSERT (htab != NULL);
1114
18b98722
NC
1115 /* When we are generating pde, make sure gp symbol is output as a
1116 dynamic symbol. Then ld.so can set the gp register earlier, before
1117 resolving the ifunc. */
1118 if (!bfd_link_pic (info)
1119 && htab->elf.dynamic_sections_created
1120 && strcmp (h->root.root.string, RISCV_GP_SYMBOL) == 0
1121 && !bfd_elf_link_record_dynamic_symbol (info, h))
1122 return FALSE;
1123
02dd9d25
NC
1124 /* Since STT_GNU_IFUNC symbols must go through PLT, we handle them
1125 in the allocate_ifunc_dynrelocs and allocate_local_ifunc_dynrelocs,
1126 if they are defined and referenced in a non-shared object. */
1127 if (h->type == STT_GNU_IFUNC
1128 && h->def_regular)
1129 return TRUE;
1130 else if (htab->elf.dynamic_sections_created
1131 && h->plt.refcount > 0)
e23eba97
NC
1132 {
1133 /* Make sure this symbol is output as a dynamic symbol.
1134 Undefined weak syms won't yet be marked as dynamic. */
1135 if (h->dynindx == -1
1136 && !h->forced_local)
1137 {
1138 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1139 return FALSE;
1140 }
1141
1142 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, bfd_link_pic (info), h))
1143 {
1144 asection *s = htab->elf.splt;
1145
1146 if (s->size == 0)
1147 s->size = PLT_HEADER_SIZE;
1148
1149 h->plt.offset = s->size;
1150
1151 /* Make room for this entry. */
1152 s->size += PLT_ENTRY_SIZE;
1153
1154 /* We also need to make an entry in the .got.plt section. */
1155 htab->elf.sgotplt->size += GOT_ENTRY_SIZE;
1156
1157 /* We also need to make an entry in the .rela.plt section. */
1158 htab->elf.srelplt->size += sizeof (ElfNN_External_Rela);
1159
1160 /* If this symbol is not defined in a regular file, and we are
1161 not generating a shared library, then set the symbol to this
1162 location in the .plt. This is required to make function
1163 pointers compare as equal between the normal executable and
1164 the shared library. */
1165 if (! bfd_link_pic (info)
1166 && !h->def_regular)
1167 {
1168 h->root.u.def.section = s;
1169 h->root.u.def.value = h->plt.offset;
1170 }
1171 }
1172 else
1173 {
1174 h->plt.offset = (bfd_vma) -1;
1175 h->needs_plt = 0;
1176 }
1177 }
1178 else
1179 {
1180 h->plt.offset = (bfd_vma) -1;
1181 h->needs_plt = 0;
1182 }
1183
1184 if (h->got.refcount > 0)
1185 {
1186 asection *s;
1187 bfd_boolean dyn;
1188 int tls_type = riscv_elf_hash_entry (h)->tls_type;
1189
1190 /* Make sure this symbol is output as a dynamic symbol.
1191 Undefined weak syms won't yet be marked as dynamic. */
1192 if (h->dynindx == -1
1193 && !h->forced_local)
1194 {
1195 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1196 return FALSE;
1197 }
1198
1199 s = htab->elf.sgot;
1200 h->got.offset = s->size;
1201 dyn = htab->elf.dynamic_sections_created;
1202 if (tls_type & (GOT_TLS_GD | GOT_TLS_IE))
1203 {
1204 /* TLS_GD needs two dynamic relocs and two GOT slots. */
1205 if (tls_type & GOT_TLS_GD)
1206 {
1207 s->size += 2 * RISCV_ELF_WORD_BYTES;
1208 htab->elf.srelgot->size += 2 * sizeof (ElfNN_External_Rela);
1209 }
1210
1211 /* TLS_IE needs one dynamic reloc and one GOT slot. */
1212 if (tls_type & GOT_TLS_IE)
1213 {
1214 s->size += RISCV_ELF_WORD_BYTES;
1215 htab->elf.srelgot->size += sizeof (ElfNN_External_Rela);
1216 }
1217 }
1218 else
1219 {
1220 s->size += RISCV_ELF_WORD_BYTES;
6487709f
JW
1221 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, bfd_link_pic (info), h)
1222 && ! UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
e23eba97
NC
1223 htab->elf.srelgot->size += sizeof (ElfNN_External_Rela);
1224 }
1225 }
1226 else
1227 h->got.offset = (bfd_vma) -1;
1228
190eb1dd 1229 if (h->dyn_relocs == NULL)
e23eba97
NC
1230 return TRUE;
1231
1232 /* In the shared -Bsymbolic case, discard space allocated for
1233 dynamic pc-relative relocs against symbols which turn out to be
1234 defined in regular objects. For the normal shared case, discard
1235 space for pc-relative relocs that have become local due to symbol
1236 visibility changes. */
1237
1238 if (bfd_link_pic (info))
1239 {
1240 if (SYMBOL_CALLS_LOCAL (info, h))
1241 {
3bf083ed 1242 struct elf_dyn_relocs **pp;
e23eba97 1243
190eb1dd 1244 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
e23eba97
NC
1245 {
1246 p->count -= p->pc_count;
1247 p->pc_count = 0;
1248 if (p->count == 0)
1249 *pp = p->next;
1250 else
1251 pp = &p->next;
1252 }
1253 }
1254
1255 /* Also discard relocs on undefined weak syms with non-default
1256 visibility. */
190eb1dd 1257 if (h->dyn_relocs != NULL
e23eba97
NC
1258 && h->root.type == bfd_link_hash_undefweak)
1259 {
6487709f
JW
1260 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1261 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
190eb1dd 1262 h->dyn_relocs = NULL;
e23eba97
NC
1263
1264 /* Make sure undefined weak symbols are output as a dynamic
1265 symbol in PIEs. */
1266 else if (h->dynindx == -1
1267 && !h->forced_local)
1268 {
1269 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1270 return FALSE;
1271 }
1272 }
1273 }
1274 else
1275 {
1276 /* For the non-shared case, discard space for relocs against
1277 symbols which turn out to need copy relocs or are not
1278 dynamic. */
1279
1280 if (!h->non_got_ref
1281 && ((h->def_dynamic
1282 && !h->def_regular)
1283 || (htab->elf.dynamic_sections_created
1284 && (h->root.type == bfd_link_hash_undefweak
1285 || h->root.type == bfd_link_hash_undefined))))
1286 {
1287 /* Make sure this symbol is output as a dynamic symbol.
1288 Undefined weak syms won't yet be marked as dynamic. */
1289 if (h->dynindx == -1
1290 && !h->forced_local)
1291 {
1292 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1293 return FALSE;
1294 }
1295
1296 /* If that succeeded, we know we'll be keeping all the
1297 relocs. */
1298 if (h->dynindx != -1)
1299 goto keep;
1300 }
1301
190eb1dd 1302 h->dyn_relocs = NULL;
e23eba97
NC
1303
1304 keep: ;
1305 }
1306
1307 /* Finally, allocate space. */
190eb1dd 1308 for (p = h->dyn_relocs; p != NULL; p = p->next)
e23eba97
NC
1309 {
1310 asection *sreloc = elf_section_data (p->sec)->sreloc;
1311 sreloc->size += p->count * sizeof (ElfNN_External_Rela);
1312 }
1313
1314 return TRUE;
1315}
1316
02dd9d25
NC
1317/* Allocate space in .plt, .got and associated reloc sections for
1318 ifunc dynamic relocs. */
1319
1320static bfd_boolean
1321allocate_ifunc_dynrelocs (struct elf_link_hash_entry *h,
1322 void *inf)
1323{
1324 struct bfd_link_info *info;
1325
1326 if (h->root.type == bfd_link_hash_indirect)
1327 return TRUE;
1328
1329 if (h->root.type == bfd_link_hash_warning)
1330 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1331
1332 info = (struct bfd_link_info *) inf;
1333
1334 /* Since STT_GNU_IFUNC symbol must go through PLT, we handle it
1335 here if it is defined and referenced in a non-shared object. */
1336 if (h->type == STT_GNU_IFUNC
1337 && h->def_regular)
1338 return _bfd_elf_allocate_ifunc_dyn_relocs (info, h,
1339 &h->dyn_relocs,
1340 PLT_ENTRY_SIZE,
1341 PLT_HEADER_SIZE,
1342 GOT_ENTRY_SIZE,
1343 TRUE);
1344 return TRUE;
1345}
1346
1347/* Allocate space in .plt, .got and associated reloc sections for
1348 local ifunc dynamic relocs. */
1349
1350static bfd_boolean
1351allocate_local_ifunc_dynrelocs (void **slot, void *inf)
1352{
1353 struct elf_link_hash_entry *h
1354 = (struct elf_link_hash_entry *) *slot;
1355
1356 if (h->type != STT_GNU_IFUNC
1357 || !h->def_regular
1358 || !h->ref_regular
1359 || !h->forced_local
1360 || h->root.type != bfd_link_hash_defined)
1361 abort ();
1362
1363 return allocate_ifunc_dynrelocs (h, inf);
1364}
1365
e23eba97
NC
1366static bfd_boolean
1367riscv_elf_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
1368{
1369 struct riscv_elf_link_hash_table *htab;
1370 bfd *dynobj;
1371 asection *s;
1372 bfd *ibfd;
1373
1374 htab = riscv_elf_hash_table (info);
1375 BFD_ASSERT (htab != NULL);
1376 dynobj = htab->elf.dynobj;
1377 BFD_ASSERT (dynobj != NULL);
1378
1379 if (elf_hash_table (info)->dynamic_sections_created)
1380 {
1381 /* Set the contents of the .interp section to the interpreter. */
1382 if (bfd_link_executable (info) && !info->nointerp)
1383 {
1384 s = bfd_get_linker_section (dynobj, ".interp");
1385 BFD_ASSERT (s != NULL);
1386 s->size = strlen (ELFNN_DYNAMIC_INTERPRETER) + 1;
1387 s->contents = (unsigned char *) ELFNN_DYNAMIC_INTERPRETER;
1388 }
1389 }
1390
1391 /* Set up .got offsets for local syms, and space for local dynamic
1392 relocs. */
1393 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1394 {
1395 bfd_signed_vma *local_got;
1396 bfd_signed_vma *end_local_got;
1397 char *local_tls_type;
1398 bfd_size_type locsymcount;
1399 Elf_Internal_Shdr *symtab_hdr;
1400 asection *srel;
1401
1402 if (! is_riscv_elf (ibfd))
1403 continue;
1404
1405 for (s = ibfd->sections; s != NULL; s = s->next)
1406 {
3bf083ed 1407 struct elf_dyn_relocs *p;
e23eba97
NC
1408
1409 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
1410 {
1411 if (!bfd_is_abs_section (p->sec)
1412 && bfd_is_abs_section (p->sec->output_section))
1413 {
1414 /* Input section has been discarded, either because
1415 it is a copy of a linkonce section or due to
1416 linker script /DISCARD/, so we'll be discarding
1417 the relocs too. */
1418 }
1419 else if (p->count != 0)
1420 {
1421 srel = elf_section_data (p->sec)->sreloc;
1422 srel->size += p->count * sizeof (ElfNN_External_Rela);
1423 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
1424 info->flags |= DF_TEXTREL;
1425 }
1426 }
1427 }
1428
1429 local_got = elf_local_got_refcounts (ibfd);
1430 if (!local_got)
1431 continue;
1432
1433 symtab_hdr = &elf_symtab_hdr (ibfd);
1434 locsymcount = symtab_hdr->sh_info;
1435 end_local_got = local_got + locsymcount;
1436 local_tls_type = _bfd_riscv_elf_local_got_tls_type (ibfd);
1437 s = htab->elf.sgot;
1438 srel = htab->elf.srelgot;
1439 for (; local_got < end_local_got; ++local_got, ++local_tls_type)
1440 {
1441 if (*local_got > 0)
1442 {
1443 *local_got = s->size;
1444 s->size += RISCV_ELF_WORD_BYTES;
1445 if (*local_tls_type & GOT_TLS_GD)
1446 s->size += RISCV_ELF_WORD_BYTES;
1447 if (bfd_link_pic (info)
1448 || (*local_tls_type & (GOT_TLS_GD | GOT_TLS_IE)))
1449 srel->size += sizeof (ElfNN_External_Rela);
1450 }
1451 else
1452 *local_got = (bfd_vma) -1;
1453 }
1454 }
1455
02dd9d25
NC
1456 /* Allocate .plt and .got entries and space dynamic relocs for
1457 global symbols. */
e23eba97
NC
1458 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
1459
02dd9d25
NC
1460 /* Allocate .plt and .got entries and space dynamic relocs for
1461 global ifunc symbols. */
1462 elf_link_hash_traverse (&htab->elf, allocate_ifunc_dynrelocs, info);
1463
1464 /* Allocate .plt and .got entries and space dynamic relocs for
1465 local ifunc symbols. */
1466 htab_traverse (htab->loc_hash_table, allocate_local_ifunc_dynrelocs, info);
1467
51a8a7c2
NC
1468 /* Used to resolve the dynamic relocs overwite problems when
1469 generating static executable. */
1470 if (htab->elf.irelplt)
1471 htab->last_iplt_index = htab->elf.irelplt->reloc_count - 1;
1472
e23eba97
NC
1473 if (htab->elf.sgotplt)
1474 {
1475 struct elf_link_hash_entry *got;
1476 got = elf_link_hash_lookup (elf_hash_table (info),
1477 "_GLOBAL_OFFSET_TABLE_",
1478 FALSE, FALSE, FALSE);
1479
1480 /* Don't allocate .got.plt section if there are no GOT nor PLT
1481 entries and there is no refeence to _GLOBAL_OFFSET_TABLE_. */
1482 if ((got == NULL
1483 || !got->ref_regular_nonweak)
1484 && (htab->elf.sgotplt->size == GOTPLT_HEADER_SIZE)
1485 && (htab->elf.splt == NULL
1486 || htab->elf.splt->size == 0)
1487 && (htab->elf.sgot == NULL
1488 || (htab->elf.sgot->size
1489 == get_elf_backend_data (output_bfd)->got_header_size)))
1490 htab->elf.sgotplt->size = 0;
1491 }
1492
1493 /* The check_relocs and adjust_dynamic_symbol entry points have
1494 determined the sizes of the various dynamic sections. Allocate
1495 memory for them. */
1496 for (s = dynobj->sections; s != NULL; s = s->next)
1497 {
1498 if ((s->flags & SEC_LINKER_CREATED) == 0)
1499 continue;
1500
1501 if (s == htab->elf.splt
1502 || s == htab->elf.sgot
1503 || s == htab->elf.sgotplt
02dd9d25
NC
1504 || s == htab->elf.iplt
1505 || s == htab->elf.igotplt
5474d94f 1506 || s == htab->elf.sdynbss
3e1b4df8
JW
1507 || s == htab->elf.sdynrelro
1508 || s == htab->sdyntdata)
e23eba97
NC
1509 {
1510 /* Strip this section if we don't need it; see the
1511 comment below. */
1512 }
1513 else if (strncmp (s->name, ".rela", 5) == 0)
1514 {
1515 if (s->size != 0)
1516 {
1517 /* We use the reloc_count field as a counter if we need
1518 to copy relocs into the output file. */
1519 s->reloc_count = 0;
1520 }
1521 }
1522 else
1523 {
1524 /* It's not one of our sections. */
1525 continue;
1526 }
1527
1528 if (s->size == 0)
1529 {
1530 /* If we don't need this section, strip it from the
1531 output file. This is mostly to handle .rela.bss and
1532 .rela.plt. We must create both sections in
1533 create_dynamic_sections, because they must be created
1534 before the linker maps input sections to output
1535 sections. The linker does that before
1536 adjust_dynamic_symbol is called, and it is that
1537 function which decides whether anything needs to go
1538 into these sections. */
1539 s->flags |= SEC_EXCLUDE;
1540 continue;
1541 }
1542
1543 if ((s->flags & SEC_HAS_CONTENTS) == 0)
1544 continue;
1545
1546 /* Allocate memory for the section contents. Zero the memory
1547 for the benefit of .rela.plt, which has 4 unused entries
1548 at the beginning, and we don't want garbage. */
1549 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
1550 if (s->contents == NULL)
1551 return FALSE;
1552 }
1553
3084d7a2 1554 return _bfd_elf_add_dynamic_tags (output_bfd, info, TRUE);
e23eba97
NC
1555}
1556
1557#define TP_OFFSET 0
1558#define DTP_OFFSET 0x800
1559
1560/* Return the relocation value for a TLS dtp-relative reloc. */
1561
1562static bfd_vma
1563dtpoff (struct bfd_link_info *info, bfd_vma address)
1564{
1565 /* If tls_sec is NULL, we should have signalled an error already. */
1566 if (elf_hash_table (info)->tls_sec == NULL)
1567 return 0;
1568 return address - elf_hash_table (info)->tls_sec->vma - DTP_OFFSET;
1569}
1570
1571/* Return the relocation value for a static TLS tp-relative relocation. */
1572
1573static bfd_vma
1574tpoff (struct bfd_link_info *info, bfd_vma address)
1575{
1576 /* If tls_sec is NULL, we should have signalled an error already. */
1577 if (elf_hash_table (info)->tls_sec == NULL)
1578 return 0;
1579 return address - elf_hash_table (info)->tls_sec->vma - TP_OFFSET;
1580}
1581
1582/* Return the global pointer's value, or 0 if it is not in use. */
1583
1584static bfd_vma
1585riscv_global_pointer_value (struct bfd_link_info *info)
1586{
1587 struct bfd_link_hash_entry *h;
1588
b5292032 1589 h = bfd_link_hash_lookup (info->hash, RISCV_GP_SYMBOL, FALSE, FALSE, TRUE);
e23eba97
NC
1590 if (h == NULL || h->type != bfd_link_hash_defined)
1591 return 0;
1592
1593 return h->u.def.value + sec_addr (h->u.def.section);
1594}
1595
1596/* Emplace a static relocation. */
1597
1598static bfd_reloc_status_type
1599perform_relocation (const reloc_howto_type *howto,
1600 const Elf_Internal_Rela *rel,
1601 bfd_vma value,
1602 asection *input_section,
1603 bfd *input_bfd,
1604 bfd_byte *contents)
1605{
1606 if (howto->pc_relative)
1607 value -= sec_addr (input_section) + rel->r_offset;
1608 value += rel->r_addend;
1609
1610 switch (ELFNN_R_TYPE (rel->r_info))
1611 {
1612 case R_RISCV_HI20:
1613 case R_RISCV_TPREL_HI20:
1614 case R_RISCV_PCREL_HI20:
1615 case R_RISCV_GOT_HI20:
1616 case R_RISCV_TLS_GOT_HI20:
1617 case R_RISCV_TLS_GD_HI20:
1618 if (ARCH_SIZE > 32 && !VALID_UTYPE_IMM (RISCV_CONST_HIGH_PART (value)))
1619 return bfd_reloc_overflow;
1620 value = ENCODE_UTYPE_IMM (RISCV_CONST_HIGH_PART (value));
1621 break;
1622
1623 case R_RISCV_LO12_I:
1624 case R_RISCV_GPREL_I:
1625 case R_RISCV_TPREL_LO12_I:
45f76423 1626 case R_RISCV_TPREL_I:
e23eba97
NC
1627 case R_RISCV_PCREL_LO12_I:
1628 value = ENCODE_ITYPE_IMM (value);
1629 break;
1630
1631 case R_RISCV_LO12_S:
1632 case R_RISCV_GPREL_S:
1633 case R_RISCV_TPREL_LO12_S:
45f76423 1634 case R_RISCV_TPREL_S:
e23eba97
NC
1635 case R_RISCV_PCREL_LO12_S:
1636 value = ENCODE_STYPE_IMM (value);
1637 break;
1638
1639 case R_RISCV_CALL:
1640 case R_RISCV_CALL_PLT:
1641 if (ARCH_SIZE > 32 && !VALID_UTYPE_IMM (RISCV_CONST_HIGH_PART (value)))
1642 return bfd_reloc_overflow;
1643 value = ENCODE_UTYPE_IMM (RISCV_CONST_HIGH_PART (value))
1644 | (ENCODE_ITYPE_IMM (value) << 32);
1645 break;
1646
1647 case R_RISCV_JAL:
1648 if (!VALID_UJTYPE_IMM (value))
1649 return bfd_reloc_overflow;
1650 value = ENCODE_UJTYPE_IMM (value);
1651 break;
1652
1653 case R_RISCV_BRANCH:
1654 if (!VALID_SBTYPE_IMM (value))
1655 return bfd_reloc_overflow;
1656 value = ENCODE_SBTYPE_IMM (value);
1657 break;
1658
1659 case R_RISCV_RVC_BRANCH:
1660 if (!VALID_RVC_B_IMM (value))
1661 return bfd_reloc_overflow;
1662 value = ENCODE_RVC_B_IMM (value);
1663 break;
1664
1665 case R_RISCV_RVC_JUMP:
1666 if (!VALID_RVC_J_IMM (value))
1667 return bfd_reloc_overflow;
1668 value = ENCODE_RVC_J_IMM (value);
1669 break;
1670
1671 case R_RISCV_RVC_LUI:
080a4883
JW
1672 if (RISCV_CONST_HIGH_PART (value) == 0)
1673 {
1674 /* Linker relaxation can convert an address equal to or greater than
1675 0x800 to slightly below 0x800. C.LUI does not accept zero as a
1676 valid immediate. We can fix this by converting it to a C.LI. */
fbc09e7a
MC
1677 bfd_vma insn = riscv_get_insn (howto->bitsize,
1678 contents + rel->r_offset);
080a4883 1679 insn = (insn & ~MATCH_C_LUI) | MATCH_C_LI;
fbc09e7a 1680 riscv_put_insn (howto->bitsize, insn, contents + rel->r_offset);
080a4883
JW
1681 value = ENCODE_RVC_IMM (0);
1682 }
1683 else if (!VALID_RVC_LUI_IMM (RISCV_CONST_HIGH_PART (value)))
e23eba97 1684 return bfd_reloc_overflow;
080a4883
JW
1685 else
1686 value = ENCODE_RVC_LUI_IMM (RISCV_CONST_HIGH_PART (value));
e23eba97
NC
1687 break;
1688
1689 case R_RISCV_32:
1690 case R_RISCV_64:
1691 case R_RISCV_ADD8:
1692 case R_RISCV_ADD16:
1693 case R_RISCV_ADD32:
1694 case R_RISCV_ADD64:
45f76423 1695 case R_RISCV_SUB6:
e23eba97
NC
1696 case R_RISCV_SUB8:
1697 case R_RISCV_SUB16:
1698 case R_RISCV_SUB32:
1699 case R_RISCV_SUB64:
45f76423
AW
1700 case R_RISCV_SET6:
1701 case R_RISCV_SET8:
1702 case R_RISCV_SET16:
1703 case R_RISCV_SET32:
a6cbf936 1704 case R_RISCV_32_PCREL:
e23eba97
NC
1705 case R_RISCV_TLS_DTPREL32:
1706 case R_RISCV_TLS_DTPREL64:
1707 break;
1708
ff6f4d9b
PD
1709 case R_RISCV_DELETE:
1710 return bfd_reloc_ok;
1711
e23eba97
NC
1712 default:
1713 return bfd_reloc_notsupported;
1714 }
1715
fbc09e7a
MC
1716 bfd_vma word;
1717 if (riscv_is_insn_reloc (howto))
1718 word = riscv_get_insn (howto->bitsize, contents + rel->r_offset);
1719 else
1720 word = bfd_get (howto->bitsize, input_bfd, contents + rel->r_offset);
e23eba97 1721 word = (word & ~howto->dst_mask) | (value & howto->dst_mask);
fbc09e7a
MC
1722 if (riscv_is_insn_reloc (howto))
1723 riscv_put_insn (howto->bitsize, word, contents + rel->r_offset);
1724 else
1725 bfd_put (howto->bitsize, input_bfd, word, contents + rel->r_offset);
e23eba97
NC
1726
1727 return bfd_reloc_ok;
1728}
1729
1730/* Remember all PC-relative high-part relocs we've encountered to help us
1731 later resolve the corresponding low-part relocs. */
1732
1733typedef struct
1734{
1735 bfd_vma address;
1736 bfd_vma value;
1737} riscv_pcrel_hi_reloc;
1738
1739typedef struct riscv_pcrel_lo_reloc
1740{
07d6d2b8
AM
1741 asection * input_section;
1742 struct bfd_link_info * info;
1743 reloc_howto_type * howto;
1744 const Elf_Internal_Rela * reloc;
1745 bfd_vma addr;
1746 const char * name;
1747 bfd_byte * contents;
1748 struct riscv_pcrel_lo_reloc * next;
e23eba97
NC
1749} riscv_pcrel_lo_reloc;
1750
1751typedef struct
1752{
1753 htab_t hi_relocs;
1754 riscv_pcrel_lo_reloc *lo_relocs;
1755} riscv_pcrel_relocs;
1756
1757static hashval_t
1758riscv_pcrel_reloc_hash (const void *entry)
1759{
1760 const riscv_pcrel_hi_reloc *e = entry;
1761 return (hashval_t)(e->address >> 2);
1762}
1763
1764static bfd_boolean
1765riscv_pcrel_reloc_eq (const void *entry1, const void *entry2)
1766{
1767 const riscv_pcrel_hi_reloc *e1 = entry1, *e2 = entry2;
1768 return e1->address == e2->address;
1769}
1770
1771static bfd_boolean
1772riscv_init_pcrel_relocs (riscv_pcrel_relocs *p)
1773{
1774
1775 p->lo_relocs = NULL;
1776 p->hi_relocs = htab_create (1024, riscv_pcrel_reloc_hash,
1777 riscv_pcrel_reloc_eq, free);
1778 return p->hi_relocs != NULL;
1779}
1780
1781static void
1782riscv_free_pcrel_relocs (riscv_pcrel_relocs *p)
1783{
1784 riscv_pcrel_lo_reloc *cur = p->lo_relocs;
1785
1786 while (cur != NULL)
1787 {
1788 riscv_pcrel_lo_reloc *next = cur->next;
1789 free (cur);
1790 cur = next;
1791 }
1792
1793 htab_delete (p->hi_relocs);
1794}
1795
1796static bfd_boolean
b1308d2c
PD
1797riscv_zero_pcrel_hi_reloc (Elf_Internal_Rela *rel,
1798 struct bfd_link_info *info,
1799 bfd_vma pc,
1800 bfd_vma addr,
1801 bfd_byte *contents,
1802 const reloc_howto_type *howto,
fbc09e7a 1803 bfd *input_bfd ATTRIBUTE_UNUSED)
e23eba97 1804{
b1308d2c 1805 /* We may need to reference low addreses in PC-relative modes even when the
dcd709e0
NC
1806 PC is far away from these addresses. For example, undefweak references
1807 need to produce the address 0 when linked. As 0 is far from the arbitrary
1808 addresses that we can link PC-relative programs at, the linker can't
1809 actually relocate references to those symbols. In order to allow these
1810 programs to work we simply convert the PC-relative auipc sequences to
1811 0-relative lui sequences. */
b1308d2c
PD
1812 if (bfd_link_pic (info))
1813 return FALSE;
1814
1815 /* If it's possible to reference the symbol using auipc we do so, as that's
dcd709e0 1816 more in the spirit of the PC-relative relocations we're processing. */
b1308d2c
PD
1817 bfd_vma offset = addr - pc;
1818 if (ARCH_SIZE == 32 || VALID_UTYPE_IMM (RISCV_CONST_HIGH_PART (offset)))
1819 return FALSE;
1820
1821 /* If it's impossible to reference this with a LUI-based offset then don't
dcd709e0
NC
1822 bother to convert it at all so users still see the PC-relative relocation
1823 in the truncation message. */
b1308d2c
PD
1824 if (ARCH_SIZE > 32 && !VALID_UTYPE_IMM (RISCV_CONST_HIGH_PART (addr)))
1825 return FALSE;
1826
1827 rel->r_info = ELFNN_R_INFO(addr, R_RISCV_HI20);
1828
fbc09e7a 1829 bfd_vma insn = riscv_get_insn(howto->bitsize, contents + rel->r_offset);
b1308d2c 1830 insn = (insn & ~MASK_AUIPC) | MATCH_LUI;
fbc09e7a 1831 riscv_put_insn(howto->bitsize, insn, contents + rel->r_offset);
b1308d2c
PD
1832 return TRUE;
1833}
1834
1835static bfd_boolean
1836riscv_record_pcrel_hi_reloc (riscv_pcrel_relocs *p, bfd_vma addr,
1837 bfd_vma value, bfd_boolean absolute)
1838{
1839 bfd_vma offset = absolute ? value : value - addr;
1840 riscv_pcrel_hi_reloc entry = {addr, offset};
e23eba97
NC
1841 riscv_pcrel_hi_reloc **slot =
1842 (riscv_pcrel_hi_reloc **) htab_find_slot (p->hi_relocs, &entry, INSERT);
1843
1844 BFD_ASSERT (*slot == NULL);
1845 *slot = (riscv_pcrel_hi_reloc *) bfd_malloc (sizeof (riscv_pcrel_hi_reloc));
1846 if (*slot == NULL)
1847 return FALSE;
1848 **slot = entry;
1849 return TRUE;
1850}
1851
1852static bfd_boolean
1853riscv_record_pcrel_lo_reloc (riscv_pcrel_relocs *p,
1854 asection *input_section,
1855 struct bfd_link_info *info,
1856 reloc_howto_type *howto,
1857 const Elf_Internal_Rela *reloc,
1858 bfd_vma addr,
1859 const char *name,
1860 bfd_byte *contents)
1861{
1862 riscv_pcrel_lo_reloc *entry;
1863 entry = (riscv_pcrel_lo_reloc *) bfd_malloc (sizeof (riscv_pcrel_lo_reloc));
1864 if (entry == NULL)
1865 return FALSE;
1866 *entry = (riscv_pcrel_lo_reloc) {input_section, info, howto, reloc, addr,
1867 name, contents, p->lo_relocs};
1868 p->lo_relocs = entry;
1869 return TRUE;
1870}
1871
1872static bfd_boolean
1873riscv_resolve_pcrel_lo_relocs (riscv_pcrel_relocs *p)
1874{
1875 riscv_pcrel_lo_reloc *r;
1876
1877 for (r = p->lo_relocs; r != NULL; r = r->next)
1878 {
1879 bfd *input_bfd = r->input_section->owner;
1880
1881 riscv_pcrel_hi_reloc search = {r->addr, 0};
1882 riscv_pcrel_hi_reloc *entry = htab_find (p->hi_relocs, &search);
551703cf
JW
1883 if (entry == NULL
1884 /* Check for overflow into bit 11 when adding reloc addend. */
1885 || (! (entry->value & 0x800)
1886 && ((entry->value + r->reloc->r_addend) & 0x800)))
07d6d2b8 1887 {
551703cf
JW
1888 char *string = (entry == NULL
1889 ? "%pcrel_lo missing matching %pcrel_hi"
1890 : "%pcrel_lo overflow with an addend");
1891 (*r->info->callbacks->reloc_dangerous)
1892 (r->info, string, input_bfd, r->input_section, r->reloc->r_offset);
e23eba97 1893 return TRUE;
07d6d2b8 1894 }
e23eba97
NC
1895
1896 perform_relocation (r->howto, r->reloc, entry->value, r->input_section,
1897 input_bfd, r->contents);
1898 }
1899
1900 return TRUE;
1901}
1902
1903/* Relocate a RISC-V ELF section.
1904
1905 The RELOCATE_SECTION function is called by the new ELF backend linker
1906 to handle the relocations for a section.
1907
1908 The relocs are always passed as Rela structures.
1909
1910 This function is responsible for adjusting the section contents as
1911 necessary, and (if generating a relocatable output file) adjusting
1912 the reloc addend as necessary.
1913
1914 This function does not have to worry about setting the reloc
1915 address or the reloc symbol index.
1916
1917 LOCAL_SYMS is a pointer to the swapped in local symbols.
1918
1919 LOCAL_SECTIONS is an array giving the section in the input file
1920 corresponding to the st_shndx field of each local symbol.
1921
1922 The global hash table entry for the global symbols can be found
1923 via elf_sym_hashes (input_bfd).
1924
1925 When generating relocatable output, this function must handle
1926 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
1927 going to be the section symbol corresponding to the output
1928 section, which means that the addend must be adjusted
1929 accordingly. */
1930
1931static bfd_boolean
1932riscv_elf_relocate_section (bfd *output_bfd,
1933 struct bfd_link_info *info,
1934 bfd *input_bfd,
1935 asection *input_section,
1936 bfd_byte *contents,
1937 Elf_Internal_Rela *relocs,
1938 Elf_Internal_Sym *local_syms,
1939 asection **local_sections)
1940{
1941 Elf_Internal_Rela *rel;
1942 Elf_Internal_Rela *relend;
1943 riscv_pcrel_relocs pcrel_relocs;
1944 bfd_boolean ret = FALSE;
e23eba97
NC
1945 struct riscv_elf_link_hash_table *htab = riscv_elf_hash_table (info);
1946 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_bfd);
1947 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
1948 bfd_vma *local_got_offsets = elf_local_got_offsets (input_bfd);
b1308d2c 1949 bfd_boolean absolute;
e23eba97
NC
1950
1951 if (!riscv_init_pcrel_relocs (&pcrel_relocs))
1952 return FALSE;
1953
1954 relend = relocs + input_section->reloc_count;
1955 for (rel = relocs; rel < relend; rel++)
1956 {
1957 unsigned long r_symndx;
1958 struct elf_link_hash_entry *h;
1959 Elf_Internal_Sym *sym;
1960 asection *sec;
1961 bfd_vma relocation;
1962 bfd_reloc_status_type r = bfd_reloc_ok;
02dd9d25 1963 const char *name = NULL;
e23eba97
NC
1964 bfd_vma off, ie_off;
1965 bfd_boolean unresolved_reloc, is_ie = FALSE;
1966 bfd_vma pc = sec_addr (input_section) + rel->r_offset;
1967 int r_type = ELFNN_R_TYPE (rel->r_info), tls_type;
0aa13fee 1968 reloc_howto_type *howto = riscv_elf_rtype_to_howto (input_bfd, r_type);
e23eba97 1969 const char *msg = NULL;
330a6637 1970 char *msg_buf = NULL;
6487709f 1971 bfd_boolean resolved_to_zero;
e23eba97 1972
f3185997
NC
1973 if (howto == NULL
1974 || r_type == R_RISCV_GNU_VTINHERIT || r_type == R_RISCV_GNU_VTENTRY)
e23eba97
NC
1975 continue;
1976
1977 /* This is a final link. */
1978 r_symndx = ELFNN_R_SYM (rel->r_info);
1979 h = NULL;
1980 sym = NULL;
1981 sec = NULL;
1982 unresolved_reloc = FALSE;
1983 if (r_symndx < symtab_hdr->sh_info)
1984 {
1985 sym = local_syms + r_symndx;
1986 sec = local_sections[r_symndx];
1987 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
02dd9d25
NC
1988
1989 /* Relocate against local STT_GNU_IFUNC symbol. */
1990 if (!bfd_link_relocatable (info)
1991 && ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
1992 {
1993 h = riscv_elf_get_local_sym_hash (htab, input_bfd, rel, FALSE);
1994 if (h == NULL)
1995 abort ();
1996
1997 /* Set STT_GNU_IFUNC symbol value. */
1998 h->root.u.def.value = sym->st_value;
1999 h->root.u.def.section = sec;
2000 }
e23eba97
NC
2001 }
2002 else
2003 {
2004 bfd_boolean warned, ignored;
2005
2006 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2007 r_symndx, symtab_hdr, sym_hashes,
2008 h, sec, relocation,
2009 unresolved_reloc, warned, ignored);
2010 if (warned)
2011 {
2012 /* To avoid generating warning messages about truncated
2013 relocations, set the relocation's address to be the same as
2014 the start of this section. */
2015 if (input_section->output_section != NULL)
2016 relocation = input_section->output_section->vma;
2017 else
2018 relocation = 0;
2019 }
2020 }
2021
2022 if (sec != NULL && discarded_section (sec))
2023 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
2024 rel, 1, relend, howto, 0, contents);
2025
2026 if (bfd_link_relocatable (info))
2027 continue;
2028
02dd9d25
NC
2029 /* Since STT_GNU_IFUNC symbol must go through PLT, we handle
2030 it here if it is defined in a non-shared object. */
2031 if (h != NULL
2032 && h->type == STT_GNU_IFUNC
2033 && h->def_regular)
2034 {
2035 asection *plt, *base_got;
2036
2037 if ((input_section->flags & SEC_ALLOC) == 0)
2038 {
2039 /* If this is a SHT_NOTE section without SHF_ALLOC, treat
2040 STT_GNU_IFUNC symbol as STT_FUNC. */
2041 if (elf_section_type (input_section) == SHT_NOTE)
2042 goto skip_ifunc;
2043
2044 /* Dynamic relocs are not propagated for SEC_DEBUGGING
2045 sections because such sections are not SEC_ALLOC and
2046 thus ld.so will not process them. */
2047 if ((input_section->flags & SEC_DEBUGGING) != 0)
2048 continue;
2049
2050 abort ();
2051 }
2052 else if (h->plt.offset == (bfd_vma) -1
2053 /* The following relocation may not need the .plt entries
2054 when all references to a STT_GNU_IFUNC symbols are done
2055 via GOT or static function pointers. */
2056 && r_type != R_RISCV_32
2057 && r_type != R_RISCV_64
2058 && r_type != R_RISCV_HI20
2059 && r_type != R_RISCV_GOT_HI20
2060 && r_type != R_RISCV_LO12_I
2061 && r_type != R_RISCV_LO12_S)
2062 goto bad_ifunc_reloc;
2063
2064 /* STT_GNU_IFUNC symbol must go through PLT. */
2065 plt = htab->elf.splt ? htab->elf.splt : htab->elf.iplt;
2066 relocation = plt->output_section->vma
2067 + plt->output_offset
2068 + h->plt.offset;
2069
2070 switch (r_type)
2071 {
2072 case R_RISCV_32:
2073 case R_RISCV_64:
2074 if (rel->r_addend != 0)
2075 {
2076 if (h->root.root.string)
2077 name = h->root.root.string;
2078 else
2079 name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, NULL);
2080
2081 _bfd_error_handler
2082 /* xgettext:c-format */
2083 (_("%pB: relocation %s against STT_GNU_IFUNC "
2084 "symbol `%s' has non-zero addend: %" PRId64),
2085 input_bfd, howto->name, name, (int64_t) rel->r_addend);
2086 bfd_set_error (bfd_error_bad_value);
2087 return FALSE;
2088 }
2089
2090 /* Generate dynamic relocation only when there is a non-GOT
2091 reference in a shared object or there is no PLT. */
2092 if ((bfd_link_pic (info) && h->non_got_ref)
2093 || h->plt.offset == (bfd_vma) -1)
2094 {
2095 Elf_Internal_Rela outrel;
2096 asection *sreloc;
2097
2098 /* Need a dynamic relocation to get the real function
2099 address. */
2100 outrel.r_offset = _bfd_elf_section_offset (output_bfd,
2101 info,
2102 input_section,
2103 rel->r_offset);
2104 if (outrel.r_offset == (bfd_vma) -1
2105 || outrel.r_offset == (bfd_vma) -2)
2106 abort ();
2107
2108 outrel.r_offset += input_section->output_section->vma
2109 + input_section->output_offset;
2110
2111 if (h->dynindx == -1
2112 || h->forced_local
2113 || bfd_link_executable (info))
2114 {
2115 info->callbacks->minfo
2116 (_("Local IFUNC function `%s' in %pB\n"),
2117 h->root.root.string,
2118 h->root.u.def.section->owner);
2119
2120 /* This symbol is resolved locally. */
2121 outrel.r_info = ELFNN_R_INFO (0, R_RISCV_IRELATIVE);
2122 outrel.r_addend = h->root.u.def.value
2123 + h->root.u.def.section->output_section->vma
2124 + h->root.u.def.section->output_offset;
2125 }
2126 else
2127 {
2128 outrel.r_info = ELFNN_R_INFO (h->dynindx, r_type);
2129 outrel.r_addend = 0;
2130 }
2131
2132 /* Dynamic relocations are stored in
2133 1. .rela.ifunc section in PIC object.
2134 2. .rela.got section in dynamic executable.
2135 3. .rela.iplt section in static executable. */
2136 if (bfd_link_pic (info))
2137 sreloc = htab->elf.irelifunc;
2138 else if (htab->elf.splt != NULL)
2139 sreloc = htab->elf.srelgot;
2140 else
2141 sreloc = htab->elf.irelplt;
2142
2143 riscv_elf_append_rela (output_bfd, sreloc, &outrel);
2144
2145 /* If this reloc is against an external symbol, we
2146 do not want to fiddle with the addend. Otherwise,
2147 we need to include the symbol value so that it
2148 becomes an addend for the dynamic reloc. For an
2149 internal symbol, we have updated addend. */
2150 continue;
2151 }
2152 goto do_relocation;
2153
2154 case R_RISCV_GOT_HI20:
2155 base_got = htab->elf.sgot;
2156 off = h->got.offset;
2157
2158 if (base_got == NULL)
2159 abort ();
2160
2161 if (off == (bfd_vma) -1)
2162 {
2163 bfd_vma plt_idx;
2164
2165 /* We can't use h->got.offset here to save state, or
2166 even just remember the offset, as finish_dynamic_symbol
2167 would use that as offset into .got. */
2168
2169 if (htab->elf.splt != NULL)
2170 {
2171 plt_idx = (h->plt.offset - PLT_HEADER_SIZE)
2172 / PLT_ENTRY_SIZE;
2173 off = GOTPLT_HEADER_SIZE + (plt_idx * GOT_ENTRY_SIZE);
2174 base_got = htab->elf.sgotplt;
2175 }
2176 else
2177 {
2178 plt_idx = h->plt.offset / PLT_ENTRY_SIZE;
2179 off = plt_idx * GOT_ENTRY_SIZE;
2180 base_got = htab->elf.igotplt;
2181 }
2182
2183 if (h->dynindx == -1
2184 || h->forced_local
2185 || info->symbolic)
2186 {
2187 /* This references the local definition. We must
2188 initialize this entry in the global offset table.
2189 Since the offset must always be a multiple of 8,
2190 we use the least significant bit to record
2191 whether we have initialized it already.
2192
2193 When doing a dynamic link, we create a .rela.got
2194 relocation entry to initialize the value. This
2195 is done in the finish_dynamic_symbol routine. */
2196 if ((off & 1) != 0)
2197 off &= ~1;
2198 else
2199 {
2200 bfd_put_NN (output_bfd, relocation,
2201 base_got->contents + off);
2202 /* Note that this is harmless for the case,
2203 as -1 | 1 still is -1. */
2204 h->got.offset |= 1;
2205 }
2206 }
2207 }
2208
2209 relocation = base_got->output_section->vma
2210 + base_got->output_offset + off;
2211
2212 r_type = ELFNN_R_TYPE (rel->r_info);
2213 howto = riscv_elf_rtype_to_howto (input_bfd, r_type);
2214 if (howto == NULL)
2215 r = bfd_reloc_notsupported;
2216 else if (!riscv_record_pcrel_hi_reloc (&pcrel_relocs, pc,
2217 relocation, FALSE))
2218 r = bfd_reloc_overflow;
2219 goto do_relocation;
2220
2221 case R_RISCV_CALL:
2222 case R_RISCV_CALL_PLT:
2223 case R_RISCV_HI20:
2224 case R_RISCV_LO12_I:
2225 case R_RISCV_LO12_S:
2226 goto do_relocation;
2227
2228 case R_RISCV_PCREL_HI20:
2229 r_type = ELFNN_R_TYPE (rel->r_info);
2230 howto = riscv_elf_rtype_to_howto (input_bfd, r_type);
2231 if (howto == NULL)
2232 r = bfd_reloc_notsupported;
2233 else if (!riscv_record_pcrel_hi_reloc (&pcrel_relocs, pc,
2234 relocation, FALSE))
2235 r = bfd_reloc_overflow;
2236 goto do_relocation;
2237
2238 default:
2239 bad_ifunc_reloc:
2240 if (h->root.root.string)
2241 name = h->root.root.string;
2242 else
2243 /* The entry of local ifunc is fake in global hash table,
2244 we should find the name by the original local symbol. */
2245 name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, NULL);
2246
2247 _bfd_error_handler
2248 /* xgettext:c-format */
2249 (_("%pB: relocation %s against STT_GNU_IFUNC "
2250 "symbol `%s' isn't supported"), input_bfd,
2251 howto->name, name);
2252 bfd_set_error (bfd_error_bad_value);
2253 return FALSE;
2254 }
2255 }
2256
2257 skip_ifunc:
e23eba97
NC
2258 if (h != NULL)
2259 name = h->root.root.string;
2260 else
2261 {
2262 name = (bfd_elf_string_from_elf_section
2263 (input_bfd, symtab_hdr->sh_link, sym->st_name));
2264 if (name == NULL || *name == '\0')
fd361982 2265 name = bfd_section_name (sec);
e23eba97
NC
2266 }
2267
6487709f
JW
2268 resolved_to_zero = (h != NULL
2269 && UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
2270
e23eba97
NC
2271 switch (r_type)
2272 {
2273 case R_RISCV_NONE:
45f76423 2274 case R_RISCV_RELAX:
e23eba97
NC
2275 case R_RISCV_TPREL_ADD:
2276 case R_RISCV_COPY:
2277 case R_RISCV_JUMP_SLOT:
2278 case R_RISCV_RELATIVE:
2279 /* These require nothing of us at all. */
2280 continue;
2281
2282 case R_RISCV_HI20:
2283 case R_RISCV_BRANCH:
2284 case R_RISCV_RVC_BRANCH:
2285 case R_RISCV_RVC_LUI:
2286 case R_RISCV_LO12_I:
2287 case R_RISCV_LO12_S:
45f76423
AW
2288 case R_RISCV_SET6:
2289 case R_RISCV_SET8:
2290 case R_RISCV_SET16:
2291 case R_RISCV_SET32:
a6cbf936 2292 case R_RISCV_32_PCREL:
ff6f4d9b 2293 case R_RISCV_DELETE:
e23eba97
NC
2294 /* These require no special handling beyond perform_relocation. */
2295 break;
2296
2297 case R_RISCV_GOT_HI20:
2298 if (h != NULL)
2299 {
2300 bfd_boolean dyn, pic;
2301
2302 off = h->got.offset;
2303 BFD_ASSERT (off != (bfd_vma) -1);
2304 dyn = elf_hash_table (info)->dynamic_sections_created;
2305 pic = bfd_link_pic (info);
2306
2307 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, pic, h)
2308 || (pic && SYMBOL_REFERENCES_LOCAL (info, h)))
2309 {
2310 /* This is actually a static link, or it is a
2311 -Bsymbolic link and the symbol is defined
2312 locally, or the symbol was forced to be local
2313 because of a version file. We must initialize
2314 this entry in the global offset table. Since the
2315 offset must always be a multiple of the word size,
2316 we use the least significant bit to record whether
2317 we have initialized it already.
2318
2319 When doing a dynamic link, we create a .rela.got
2320 relocation entry to initialize the value. This
2321 is done in the finish_dynamic_symbol routine. */
2322 if ((off & 1) != 0)
2323 off &= ~1;
2324 else
2325 {
2326 bfd_put_NN (output_bfd, relocation,
2327 htab->elf.sgot->contents + off);
2328 h->got.offset |= 1;
2329 }
2330 }
2331 else
2332 unresolved_reloc = FALSE;
2333 }
2334 else
2335 {
2336 BFD_ASSERT (local_got_offsets != NULL
2337 && local_got_offsets[r_symndx] != (bfd_vma) -1);
2338
2339 off = local_got_offsets[r_symndx];
2340
2341 /* The offset must always be a multiple of the word size.
2342 So, we can use the least significant bit to record
2343 whether we have already processed this entry. */
2344 if ((off & 1) != 0)
2345 off &= ~1;
2346 else
2347 {
2348 if (bfd_link_pic (info))
2349 {
2350 asection *s;
2351 Elf_Internal_Rela outrel;
2352
2353 /* We need to generate a R_RISCV_RELATIVE reloc
2354 for the dynamic linker. */
2355 s = htab->elf.srelgot;
2356 BFD_ASSERT (s != NULL);
2357
2358 outrel.r_offset = sec_addr (htab->elf.sgot) + off;
2359 outrel.r_info =
2360 ELFNN_R_INFO (0, R_RISCV_RELATIVE);
2361 outrel.r_addend = relocation;
2362 relocation = 0;
2363 riscv_elf_append_rela (output_bfd, s, &outrel);
2364 }
2365
2366 bfd_put_NN (output_bfd, relocation,
2367 htab->elf.sgot->contents + off);
2368 local_got_offsets[r_symndx] |= 1;
2369 }
2370 }
2371 relocation = sec_addr (htab->elf.sgot) + off;
b1308d2c
PD
2372 absolute = riscv_zero_pcrel_hi_reloc (rel,
2373 info,
2374 pc,
2375 relocation,
2376 contents,
2377 howto,
2378 input_bfd);
2379 r_type = ELFNN_R_TYPE (rel->r_info);
0aa13fee 2380 howto = riscv_elf_rtype_to_howto (input_bfd, r_type);
f3185997
NC
2381 if (howto == NULL)
2382 r = bfd_reloc_notsupported;
2383 else if (!riscv_record_pcrel_hi_reloc (&pcrel_relocs, pc,
2384 relocation, absolute))
e23eba97
NC
2385 r = bfd_reloc_overflow;
2386 break;
2387
2388 case R_RISCV_ADD8:
2389 case R_RISCV_ADD16:
2390 case R_RISCV_ADD32:
2391 case R_RISCV_ADD64:
2392 {
2393 bfd_vma old_value = bfd_get (howto->bitsize, input_bfd,
2394 contents + rel->r_offset);
2395 relocation = old_value + relocation;
2396 }
2397 break;
2398
45f76423 2399 case R_RISCV_SUB6:
e23eba97
NC
2400 case R_RISCV_SUB8:
2401 case R_RISCV_SUB16:
2402 case R_RISCV_SUB32:
2403 case R_RISCV_SUB64:
2404 {
2405 bfd_vma old_value = bfd_get (howto->bitsize, input_bfd,
2406 contents + rel->r_offset);
2407 relocation = old_value - relocation;
2408 }
2409 break;
2410
e23eba97 2411 case R_RISCV_CALL:
85f78364 2412 case R_RISCV_CALL_PLT:
cf7a5066
JW
2413 /* Handle a call to an undefined weak function. This won't be
2414 relaxed, so we have to handle it here. */
2415 if (h != NULL && h->root.type == bfd_link_hash_undefweak
85f78364 2416 && (!bfd_link_pic (info) || h->plt.offset == MINUS_ONE))
cf7a5066
JW
2417 {
2418 /* We can use x0 as the base register. */
fbc09e7a 2419 bfd_vma insn = bfd_getl32 (contents + rel->r_offset + 4);
cf7a5066 2420 insn &= ~(OP_MASK_RS1 << OP_SH_RS1);
fbc09e7a 2421 bfd_putl32 (insn, contents + rel->r_offset + 4);
cf7a5066
JW
2422 /* Set the relocation value so that we get 0 after the pc
2423 relative adjustment. */
2424 relocation = sec_addr (input_section) + rel->r_offset;
2425 }
2426 /* Fall through. */
2427
e23eba97
NC
2428 case R_RISCV_JAL:
2429 case R_RISCV_RVC_JUMP:
85f78364 2430 /* This line has to match the check in _bfd_riscv_relax_section. */
e23eba97
NC
2431 if (bfd_link_pic (info) && h != NULL && h->plt.offset != MINUS_ONE)
2432 {
2433 /* Refer to the PLT entry. */
2434 relocation = sec_addr (htab->elf.splt) + h->plt.offset;
2435 unresolved_reloc = FALSE;
2436 }
2437 break;
2438
2439 case R_RISCV_TPREL_HI20:
2440 relocation = tpoff (info, relocation);
2441 break;
2442
2443 case R_RISCV_TPREL_LO12_I:
2444 case R_RISCV_TPREL_LO12_S:
45f76423
AW
2445 relocation = tpoff (info, relocation);
2446 break;
2447
2448 case R_RISCV_TPREL_I:
2449 case R_RISCV_TPREL_S:
e23eba97
NC
2450 relocation = tpoff (info, relocation);
2451 if (VALID_ITYPE_IMM (relocation + rel->r_addend))
2452 {
2453 /* We can use tp as the base register. */
fbc09e7a 2454 bfd_vma insn = bfd_getl32 (contents + rel->r_offset);
e23eba97
NC
2455 insn &= ~(OP_MASK_RS1 << OP_SH_RS1);
2456 insn |= X_TP << OP_SH_RS1;
fbc09e7a 2457 bfd_putl32 (insn, contents + rel->r_offset);
e23eba97 2458 }
45f76423
AW
2459 else
2460 r = bfd_reloc_overflow;
e23eba97
NC
2461 break;
2462
2463 case R_RISCV_GPREL_I:
2464 case R_RISCV_GPREL_S:
2465 {
2466 bfd_vma gp = riscv_global_pointer_value (info);
2467 bfd_boolean x0_base = VALID_ITYPE_IMM (relocation + rel->r_addend);
2468 if (x0_base || VALID_ITYPE_IMM (relocation + rel->r_addend - gp))
2469 {
2470 /* We can use x0 or gp as the base register. */
fbc09e7a 2471 bfd_vma insn = bfd_getl32 (contents + rel->r_offset);
e23eba97
NC
2472 insn &= ~(OP_MASK_RS1 << OP_SH_RS1);
2473 if (!x0_base)
2474 {
2475 rel->r_addend -= gp;
2476 insn |= X_GP << OP_SH_RS1;
2477 }
fbc09e7a 2478 bfd_putl32 (insn, contents + rel->r_offset);
e23eba97
NC
2479 }
2480 else
2481 r = bfd_reloc_overflow;
2482 break;
2483 }
2484
2485 case R_RISCV_PCREL_HI20:
b1308d2c
PD
2486 absolute = riscv_zero_pcrel_hi_reloc (rel,
2487 info,
2488 pc,
2489 relocation,
2490 contents,
2491 howto,
2492 input_bfd);
2493 r_type = ELFNN_R_TYPE (rel->r_info);
0aa13fee 2494 howto = riscv_elf_rtype_to_howto (input_bfd, r_type);
f3185997
NC
2495 if (howto == NULL)
2496 r = bfd_reloc_notsupported;
2497 else if (!riscv_record_pcrel_hi_reloc (&pcrel_relocs, pc,
2498 relocation + rel->r_addend,
2499 absolute))
e23eba97
NC
2500 r = bfd_reloc_overflow;
2501 break;
2502
2503 case R_RISCV_PCREL_LO12_I:
2504 case R_RISCV_PCREL_LO12_S:
551703cf
JW
2505 /* We don't allow section symbols plus addends as the auipc address,
2506 because then riscv_relax_delete_bytes would have to search through
2507 all relocs to update these addends. This is also ambiguous, as
2508 we do allow offsets to be added to the target address, which are
2509 not to be used to find the auipc address. */
a9f5a551
JW
2510 if (((sym != NULL && (ELF_ST_TYPE (sym->st_info) == STT_SECTION))
2511 || (h != NULL && h->type == STT_SECTION))
2512 && rel->r_addend)
2a0d9853 2513 {
330a6637 2514 msg = _("%pcrel_lo section symbol with an addend");
2a0d9853
JW
2515 r = bfd_reloc_dangerous;
2516 break;
2517 }
2518
e23eba97
NC
2519 if (riscv_record_pcrel_lo_reloc (&pcrel_relocs, input_section, info,
2520 howto, rel, relocation, name,
2521 contents))
2522 continue;
2523 r = bfd_reloc_overflow;
2524 break;
2525
2526 case R_RISCV_TLS_DTPREL32:
2527 case R_RISCV_TLS_DTPREL64:
2528 relocation = dtpoff (info, relocation);
2529 break;
2530
2531 case R_RISCV_32:
2532 case R_RISCV_64:
2533 if ((input_section->flags & SEC_ALLOC) == 0)
2534 break;
2535
2536 if ((bfd_link_pic (info)
2537 && (h == NULL
6487709f
JW
2538 || (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2539 && !resolved_to_zero)
e23eba97
NC
2540 || h->root.type != bfd_link_hash_undefweak)
2541 && (! howto->pc_relative
2542 || !SYMBOL_CALLS_LOCAL (info, h)))
2543 || (!bfd_link_pic (info)
2544 && h != NULL
2545 && h->dynindx != -1
2546 && !h->non_got_ref
2547 && ((h->def_dynamic
2548 && !h->def_regular)
2549 || h->root.type == bfd_link_hash_undefweak
2550 || h->root.type == bfd_link_hash_undefined)))
2551 {
2552 Elf_Internal_Rela outrel;
02dd9d25 2553 asection *sreloc;
e23eba97
NC
2554 bfd_boolean skip_static_relocation, skip_dynamic_relocation;
2555
2556 /* When generating a shared object, these relocations
2557 are copied into the output file to be resolved at run
2558 time. */
2559
2560 outrel.r_offset =
2561 _bfd_elf_section_offset (output_bfd, info, input_section,
2562 rel->r_offset);
2563 skip_static_relocation = outrel.r_offset != (bfd_vma) -2;
2564 skip_dynamic_relocation = outrel.r_offset >= (bfd_vma) -2;
2565 outrel.r_offset += sec_addr (input_section);
2566
2567 if (skip_dynamic_relocation)
2568 memset (&outrel, 0, sizeof outrel);
2569 else if (h != NULL && h->dynindx != -1
2570 && !(bfd_link_pic (info)
2571 && SYMBOLIC_BIND (info, h)
2572 && h->def_regular))
2573 {
2574 outrel.r_info = ELFNN_R_INFO (h->dynindx, r_type);
2575 outrel.r_addend = rel->r_addend;
2576 }
2577 else
2578 {
2579 outrel.r_info = ELFNN_R_INFO (0, R_RISCV_RELATIVE);
2580 outrel.r_addend = relocation + rel->r_addend;
2581 }
2582
02dd9d25 2583 sreloc = elf_section_data (input_section)->sreloc;
e23eba97
NC
2584 riscv_elf_append_rela (output_bfd, sreloc, &outrel);
2585 if (skip_static_relocation)
2586 continue;
2587 }
2588 break;
2589
2590 case R_RISCV_TLS_GOT_HI20:
2591 is_ie = TRUE;
2592 /* Fall through. */
2593
2594 case R_RISCV_TLS_GD_HI20:
2595 if (h != NULL)
2596 {
2597 off = h->got.offset;
2598 h->got.offset |= 1;
2599 }
2600 else
2601 {
2602 off = local_got_offsets[r_symndx];
2603 local_got_offsets[r_symndx] |= 1;
2604 }
2605
2606 tls_type = _bfd_riscv_elf_tls_type (input_bfd, h, r_symndx);
2607 BFD_ASSERT (tls_type & (GOT_TLS_IE | GOT_TLS_GD));
2608 /* If this symbol is referenced by both GD and IE TLS, the IE
2609 reference's GOT slot follows the GD reference's slots. */
2610 ie_off = 0;
2611 if ((tls_type & GOT_TLS_GD) && (tls_type & GOT_TLS_IE))
2612 ie_off = 2 * GOT_ENTRY_SIZE;
2613
2614 if ((off & 1) != 0)
2615 off &= ~1;
2616 else
2617 {
2618 Elf_Internal_Rela outrel;
2619 int indx = 0;
2620 bfd_boolean need_relocs = FALSE;
2621
2622 if (htab->elf.srelgot == NULL)
2623 abort ();
2624
2625 if (h != NULL)
2626 {
2627 bfd_boolean dyn, pic;
2628 dyn = htab->elf.dynamic_sections_created;
2629 pic = bfd_link_pic (info);
2630
2631 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, pic, h)
2632 && (!pic || !SYMBOL_REFERENCES_LOCAL (info, h)))
2633 indx = h->dynindx;
2634 }
2635
2636 /* The GOT entries have not been initialized yet. Do it
07d6d2b8 2637 now, and emit any relocations. */
e23eba97
NC
2638 if ((bfd_link_pic (info) || indx != 0)
2639 && (h == NULL
2640 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2641 || h->root.type != bfd_link_hash_undefweak))
2642 need_relocs = TRUE;
2643
2644 if (tls_type & GOT_TLS_GD)
2645 {
2646 if (need_relocs)
2647 {
2648 outrel.r_offset = sec_addr (htab->elf.sgot) + off;
2649 outrel.r_addend = 0;
2650 outrel.r_info = ELFNN_R_INFO (indx, R_RISCV_TLS_DTPMODNN);
2651 bfd_put_NN (output_bfd, 0,
2652 htab->elf.sgot->contents + off);
2653 riscv_elf_append_rela (output_bfd, htab->elf.srelgot, &outrel);
2654 if (indx == 0)
2655 {
2656 BFD_ASSERT (! unresolved_reloc);
2657 bfd_put_NN (output_bfd,
2658 dtpoff (info, relocation),
2659 (htab->elf.sgot->contents + off +
2660 RISCV_ELF_WORD_BYTES));
2661 }
2662 else
2663 {
2664 bfd_put_NN (output_bfd, 0,
2665 (htab->elf.sgot->contents + off +
2666 RISCV_ELF_WORD_BYTES));
2667 outrel.r_info = ELFNN_R_INFO (indx, R_RISCV_TLS_DTPRELNN);
2668 outrel.r_offset += RISCV_ELF_WORD_BYTES;
2669 riscv_elf_append_rela (output_bfd, htab->elf.srelgot, &outrel);
2670 }
2671 }
2672 else
2673 {
2674 /* If we are not emitting relocations for a
2675 general dynamic reference, then we must be in a
2676 static link or an executable link with the
2677 symbol binding locally. Mark it as belonging
2678 to module 1, the executable. */
2679 bfd_put_NN (output_bfd, 1,
2680 htab->elf.sgot->contents + off);
2681 bfd_put_NN (output_bfd,
2682 dtpoff (info, relocation),
2683 (htab->elf.sgot->contents + off +
2684 RISCV_ELF_WORD_BYTES));
2685 }
2686 }
2687
2688 if (tls_type & GOT_TLS_IE)
2689 {
2690 if (need_relocs)
2691 {
2692 bfd_put_NN (output_bfd, 0,
2693 htab->elf.sgot->contents + off + ie_off);
2694 outrel.r_offset = sec_addr (htab->elf.sgot)
2695 + off + ie_off;
2696 outrel.r_addend = 0;
2697 if (indx == 0)
2698 outrel.r_addend = tpoff (info, relocation);
2699 outrel.r_info = ELFNN_R_INFO (indx, R_RISCV_TLS_TPRELNN);
2700 riscv_elf_append_rela (output_bfd, htab->elf.srelgot, &outrel);
2701 }
2702 else
2703 {
2704 bfd_put_NN (output_bfd, tpoff (info, relocation),
2705 htab->elf.sgot->contents + off + ie_off);
2706 }
2707 }
2708 }
2709
2710 BFD_ASSERT (off < (bfd_vma) -2);
2711 relocation = sec_addr (htab->elf.sgot) + off + (is_ie ? ie_off : 0);
b1308d2c
PD
2712 if (!riscv_record_pcrel_hi_reloc (&pcrel_relocs, pc,
2713 relocation, FALSE))
e23eba97
NC
2714 r = bfd_reloc_overflow;
2715 unresolved_reloc = FALSE;
2716 break;
2717
2718 default:
2719 r = bfd_reloc_notsupported;
2720 }
2721
2722 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
2723 because such sections are not SEC_ALLOC and thus ld.so will
2724 not process them. */
2725 if (unresolved_reloc
2726 && !((input_section->flags & SEC_DEBUGGING) != 0
2727 && h->def_dynamic)
2728 && _bfd_elf_section_offset (output_bfd, info, input_section,
2729 rel->r_offset) != (bfd_vma) -1)
2730 {
330a6637
JW
2731 switch (r_type)
2732 {
330a6637
JW
2733 case R_RISCV_JAL:
2734 case R_RISCV_RVC_JUMP:
2735 if (asprintf (&msg_buf,
2736 _("%%X%%P: relocation %s against `%s' can "
2737 "not be used when making a shared object; "
2738 "recompile with -fPIC\n"),
2739 howto->name,
2740 h->root.root.string) == -1)
2741 msg_buf = NULL;
2742 break;
2743
2744 default:
2745 if (asprintf (&msg_buf,
2746 _("%%X%%P: unresolvable %s relocation against "
2747 "symbol `%s'\n"),
2748 howto->name,
2749 h->root.root.string) == -1)
2750 msg_buf = NULL;
2751 break;
2752 }
2753
2754 msg = msg_buf;
2755 r = bfd_reloc_notsupported;
e23eba97
NC
2756 }
2757
02dd9d25 2758 do_relocation:
e23eba97
NC
2759 if (r == bfd_reloc_ok)
2760 r = perform_relocation (howto, rel, relocation, input_section,
2761 input_bfd, contents);
2762
330a6637
JW
2763 /* We should have already detected the error and set message before.
2764 If the error message isn't set since the linker runs out of memory
2765 or we don't set it before, then we should set the default message
2766 with the "internal error" string here. */
e23eba97
NC
2767 switch (r)
2768 {
2769 case bfd_reloc_ok:
2770 continue;
2771
2772 case bfd_reloc_overflow:
2773 info->callbacks->reloc_overflow
2774 (info, (h ? &h->root : NULL), name, howto->name,
2775 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
2776 break;
2777
2778 case bfd_reloc_undefined:
2779 info->callbacks->undefined_symbol
2780 (info, name, input_bfd, input_section, rel->r_offset,
2781 TRUE);
2782 break;
2783
2784 case bfd_reloc_outofrange:
330a6637
JW
2785 if (msg == NULL)
2786 msg = _("%X%P: internal error: out of range error\n");
e23eba97
NC
2787 break;
2788
2789 case bfd_reloc_notsupported:
330a6637
JW
2790 if (msg == NULL)
2791 msg = _("%X%P: internal error: unsupported relocation error\n");
e23eba97
NC
2792 break;
2793
2794 case bfd_reloc_dangerous:
330a6637
JW
2795 /* The error message should already be set. */
2796 if (msg == NULL)
2797 msg = _("dangerous relocation error");
2a0d9853 2798 info->callbacks->reloc_dangerous
330a6637 2799 (info, msg, input_bfd, input_section, rel->r_offset);
e23eba97
NC
2800 break;
2801
2802 default:
2a0d9853 2803 msg = _("%X%P: internal error: unknown error\n");
e23eba97
NC
2804 break;
2805 }
2806
330a6637
JW
2807 /* Do not report error message for the dangerous relocation again. */
2808 if (msg && r != bfd_reloc_dangerous)
2a0d9853
JW
2809 info->callbacks->einfo (msg);
2810
c9594989
AM
2811 /* Free the unused `msg_buf`. */
2812 free (msg_buf);
330a6637 2813
3f48fe4a
JW
2814 /* We already reported the error via a callback, so don't try to report
2815 it again by returning false. That leads to spurious errors. */
ed01220c 2816 ret = TRUE;
e23eba97
NC
2817 goto out;
2818 }
2819
2820 ret = riscv_resolve_pcrel_lo_relocs (&pcrel_relocs);
dc1e8a47 2821 out:
e23eba97
NC
2822 riscv_free_pcrel_relocs (&pcrel_relocs);
2823 return ret;
2824}
2825
2826/* Finish up dynamic symbol handling. We set the contents of various
2827 dynamic sections here. */
2828
2829static bfd_boolean
2830riscv_elf_finish_dynamic_symbol (bfd *output_bfd,
2831 struct bfd_link_info *info,
2832 struct elf_link_hash_entry *h,
2833 Elf_Internal_Sym *sym)
2834{
2835 struct riscv_elf_link_hash_table *htab = riscv_elf_hash_table (info);
2836 const struct elf_backend_data *bed = get_elf_backend_data (output_bfd);
2837
2838 if (h->plt.offset != (bfd_vma) -1)
2839 {
2840 /* We've decided to create a PLT entry for this symbol. */
2841 bfd_byte *loc;
02dd9d25 2842 bfd_vma i, header_address, plt_idx, got_offset, got_address;
e23eba97
NC
2843 uint32_t plt_entry[PLT_ENTRY_INSNS];
2844 Elf_Internal_Rela rela;
02dd9d25
NC
2845 asection *plt, *gotplt, *relplt;
2846
2847 /* When building a static executable, use .iplt, .igot.plt and
2848 .rela.iplt sections for STT_GNU_IFUNC symbols. */
2849 if (htab->elf.splt != NULL)
2850 {
2851 plt = htab->elf.splt;
2852 gotplt = htab->elf.sgotplt;
2853 relplt = htab->elf.srelplt;
2854 }
2855 else
2856 {
2857 plt = htab->elf.iplt;
2858 gotplt = htab->elf.igotplt;
2859 relplt = htab->elf.irelplt;
2860 }
2861
2862 /* This symbol has an entry in the procedure linkage table. Set
2863 it up. */
2864 if ((h->dynindx == -1
2865 && !((h->forced_local || bfd_link_executable (info))
2866 && h->def_regular
2867 && h->type == STT_GNU_IFUNC))
2868 || plt == NULL
2869 || gotplt == NULL
2870 || relplt == NULL)
2871 return FALSE;
e23eba97
NC
2872
2873 /* Calculate the address of the PLT header. */
02dd9d25 2874 header_address = sec_addr (plt);
e23eba97 2875
02dd9d25
NC
2876 /* Calculate the index of the entry and the offset of .got.plt entry.
2877 For static executables, we don't reserve anything. */
2878 if (plt == htab->elf.splt)
2879 {
2880 plt_idx = (h->plt.offset - PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
2881 got_offset = GOTPLT_HEADER_SIZE + (plt_idx * GOT_ENTRY_SIZE);
2882 }
2883 else
2884 {
2885 plt_idx = h->plt.offset / PLT_ENTRY_SIZE;
2886 got_offset = plt_idx * GOT_ENTRY_SIZE;
2887 }
e23eba97
NC
2888
2889 /* Calculate the address of the .got.plt entry. */
02dd9d25 2890 got_address = sec_addr (gotplt) + got_offset;
e23eba97
NC
2891
2892 /* Find out where the .plt entry should go. */
02dd9d25 2893 loc = plt->contents + h->plt.offset;
e23eba97
NC
2894
2895 /* Fill in the PLT entry itself. */
5ef23793
JW
2896 if (! riscv_make_plt_entry (output_bfd, got_address,
2897 header_address + h->plt.offset,
2898 plt_entry))
2899 return FALSE;
2900
e23eba97 2901 for (i = 0; i < PLT_ENTRY_INSNS; i++)
fbc09e7a 2902 bfd_putl32 (plt_entry[i], loc + 4*i);
e23eba97
NC
2903
2904 /* Fill in the initial value of the .got.plt entry. */
02dd9d25
NC
2905 loc = gotplt->contents + (got_address - sec_addr (gotplt));
2906 bfd_put_NN (output_bfd, sec_addr (plt), loc);
e23eba97 2907
e23eba97 2908 rela.r_offset = got_address;
e23eba97 2909
02dd9d25
NC
2910 if (h->dynindx == -1
2911 || ((bfd_link_executable (info)
2912 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
2913 && h->def_regular
2914 && h->type == STT_GNU_IFUNC))
2915 {
2916 info->callbacks->minfo (_("Local IFUNC function `%s' in %pB\n"),
2917 h->root.root.string,
2918 h->root.u.def.section->owner);
2919
2920 /* If an STT_GNU_IFUNC symbol is locally defined, generate
2921 R_RISCV_IRELATIVE instead of R_RISCV_JUMP_SLOT. */
2922 asection *sec = h->root.u.def.section;
2923 rela.r_info = ELFNN_R_INFO (0, R_RISCV_IRELATIVE);
2924 rela.r_addend = h->root.u.def.value
2925 + sec->output_section->vma
2926 + sec->output_offset;
2927 }
2928 else
2929 {
2930 /* Fill in the entry in the .rela.plt section. */
2931 rela.r_info = ELFNN_R_INFO (h->dynindx, R_RISCV_JUMP_SLOT);
2932 rela.r_addend = 0;
2933 }
2934
2935 loc = relplt->contents + plt_idx * sizeof (ElfNN_External_Rela);
e23eba97
NC
2936 bed->s->swap_reloca_out (output_bfd, &rela, loc);
2937
2938 if (!h->def_regular)
2939 {
2940 /* Mark the symbol as undefined, rather than as defined in
2941 the .plt section. Leave the value alone. */
2942 sym->st_shndx = SHN_UNDEF;
2943 /* If the symbol is weak, we do need to clear the value.
2944 Otherwise, the PLT entry would provide a definition for
2945 the symbol even if the symbol wasn't defined anywhere,
2946 and so the symbol would never be NULL. */
2947 if (!h->ref_regular_nonweak)
2948 sym->st_value = 0;
2949 }
2950 }
2951
2952 if (h->got.offset != (bfd_vma) -1
6487709f
JW
2953 && !(riscv_elf_hash_entry (h)->tls_type & (GOT_TLS_GD | GOT_TLS_IE))
2954 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
e23eba97
NC
2955 {
2956 asection *sgot;
2957 asection *srela;
2958 Elf_Internal_Rela rela;
51a8a7c2 2959 bfd_boolean use_elf_append_rela = TRUE;
e23eba97
NC
2960
2961 /* This symbol has an entry in the GOT. Set it up. */
2962
2963 sgot = htab->elf.sgot;
2964 srela = htab->elf.srelgot;
2965 BFD_ASSERT (sgot != NULL && srela != NULL);
2966
2967 rela.r_offset = sec_addr (sgot) + (h->got.offset &~ (bfd_vma) 1);
2968
02dd9d25
NC
2969 /* Handle the ifunc symbol in GOT entry. */
2970 if (h->def_regular
2971 && h->type == STT_GNU_IFUNC)
2972 {
2973 if (h->plt.offset == (bfd_vma) -1)
2974 {
2975 /* STT_GNU_IFUNC is referenced without PLT. */
51a8a7c2 2976
02dd9d25
NC
2977 if (htab->elf.splt == NULL)
2978 {
51a8a7c2 2979 /* Use .rela.iplt section to store .got relocations
02dd9d25
NC
2980 in static executable. */
2981 srela = htab->elf.irelplt;
51a8a7c2
NC
2982
2983 /* Do not use riscv_elf_append_rela to add dynamic
2984 relocs. */
2985 use_elf_append_rela = FALSE;
02dd9d25 2986 }
51a8a7c2 2987
02dd9d25
NC
2988 if (SYMBOL_REFERENCES_LOCAL (info, h))
2989 {
2990 info->callbacks->minfo (_("Local IFUNC function `%s' in %pB\n"),
2991 h->root.root.string,
2992 h->root.u.def.section->owner);
2993
2994 rela.r_info = ELFNN_R_INFO (0, R_RISCV_IRELATIVE);
2995 rela.r_addend = (h->root.u.def.value
2996 + h->root.u.def.section->output_section->vma
2997 + h->root.u.def.section->output_offset);
2998 }
2999 else
3000 {
3001 /* Generate R_RISCV_NN. */
3002 BFD_ASSERT((h->got.offset & 1) == 0);
3003 BFD_ASSERT (h->dynindx != -1);
3004 rela.r_info = ELFNN_R_INFO (h->dynindx, R_RISCV_NN);
3005 rela.r_addend = 0;
3006 }
3007 }
3008 else if (bfd_link_pic (info))
3009 {
3010 /* Generate R_RISCV_NN. */
3011 BFD_ASSERT((h->got.offset & 1) == 0);
3012 BFD_ASSERT (h->dynindx != -1);
3013 rela.r_info = ELFNN_R_INFO (h->dynindx, R_RISCV_NN);
3014 rela.r_addend = 0;
3015 }
3016 else
3017 {
3018 asection *plt;
3019
3020 if (!h->pointer_equality_needed)
3021 abort ();
3022
3023 /* For non-shared object, we can't use .got.plt, which
3024 contains the real function address if we need pointer
3025 equality. We load the GOT entry with the PLT entry. */
3026 plt = htab->elf.splt ? htab->elf.splt : htab->elf.iplt;
3027 bfd_put_NN (output_bfd, (plt->output_section->vma
3028 + plt->output_offset
3029 + h->plt.offset),
3030 htab->elf.sgot->contents
3031 + (h->got.offset & ~(bfd_vma) 1));
3032 return TRUE;
3033 }
3034 }
02dd9d25
NC
3035 else if (bfd_link_pic (info)
3036 && SYMBOL_REFERENCES_LOCAL (info, h))
e23eba97 3037 {
51a8a7c2
NC
3038 /* If this is a local symbol reference, we just want to emit
3039 a RELATIVE reloc. This can happen if it is a -Bsymbolic link,
3040 or a pie link, or the symbol was forced to be local because
3041 of a version file. The entry in the global offset table will
3042 already have been initialized in the relocate_section function. */
25eb8346 3043 BFD_ASSERT((h->got.offset & 1) != 0);
e23eba97
NC
3044 asection *sec = h->root.u.def.section;
3045 rela.r_info = ELFNN_R_INFO (0, R_RISCV_RELATIVE);
3046 rela.r_addend = (h->root.u.def.value
3047 + sec->output_section->vma
3048 + sec->output_offset);
3049 }
3050 else
3051 {
25eb8346 3052 BFD_ASSERT((h->got.offset & 1) == 0);
e23eba97
NC
3053 BFD_ASSERT (h->dynindx != -1);
3054 rela.r_info = ELFNN_R_INFO (h->dynindx, R_RISCV_NN);
3055 rela.r_addend = 0;
3056 }
3057
3058 bfd_put_NN (output_bfd, 0,
3059 sgot->contents + (h->got.offset & ~(bfd_vma) 1));
51a8a7c2
NC
3060
3061 if (use_elf_append_rela)
3062 riscv_elf_append_rela (output_bfd, srela, &rela);
3063 else
3064 {
3065 /* Use riscv_elf_append_rela to add the dynamic relocs into
3066 .rela.iplt may cause the overwrite problems. Since we insert
3067 the relocs for PLT didn't handle the reloc_index of .rela.iplt,
3068 but the riscv_elf_append_rela adds the relocs to the place
3069 that are calculated from the reloc_index (in seqential).
3070
3071 One solution is that add these dynamic relocs (GOT IFUNC)
3072 from the last of .rela.iplt section. */
3073 bfd_vma iplt_idx = htab->last_iplt_index--;
3074 bfd_byte *loc = srela->contents
3075 + iplt_idx * sizeof (ElfNN_External_Rela);
3076 bed->s->swap_reloca_out (output_bfd, &rela, loc);
3077 }
e23eba97
NC
3078 }
3079
3080 if (h->needs_copy)
3081 {
3082 Elf_Internal_Rela rela;
5474d94f 3083 asection *s;
e23eba97
NC
3084
3085 /* This symbols needs a copy reloc. Set it up. */
3086 BFD_ASSERT (h->dynindx != -1);
3087
3088 rela.r_offset = sec_addr (h->root.u.def.section) + h->root.u.def.value;
3089 rela.r_info = ELFNN_R_INFO (h->dynindx, R_RISCV_COPY);
3090 rela.r_addend = 0;
afbf7e8e 3091 if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f
AM
3092 s = htab->elf.sreldynrelro;
3093 else
3094 s = htab->elf.srelbss;
3095 riscv_elf_append_rela (output_bfd, s, &rela);
e23eba97
NC
3096 }
3097
3098 /* Mark some specially defined symbols as absolute. */
3099 if (h == htab->elf.hdynamic
3100 || (h == htab->elf.hgot || h == htab->elf.hplt))
3101 sym->st_shndx = SHN_ABS;
3102
3103 return TRUE;
3104}
3105
02dd9d25
NC
3106/* Finish up local dynamic symbol handling. We set the contents of
3107 various dynamic sections here. */
3108
3109static bfd_boolean
3110riscv_elf_finish_local_dynamic_symbol (void **slot, void *inf)
3111{
3112 struct elf_link_hash_entry *h = (struct elf_link_hash_entry *) *slot;
3113 struct bfd_link_info *info = (struct bfd_link_info *) inf;
3114
3115 return riscv_elf_finish_dynamic_symbol (info->output_bfd, info, h, NULL);
3116}
3117
e23eba97
NC
3118/* Finish up the dynamic sections. */
3119
3120static bfd_boolean
3121riscv_finish_dyn (bfd *output_bfd, struct bfd_link_info *info,
3122 bfd *dynobj, asection *sdyn)
3123{
3124 struct riscv_elf_link_hash_table *htab = riscv_elf_hash_table (info);
3125 const struct elf_backend_data *bed = get_elf_backend_data (output_bfd);
3126 size_t dynsize = bed->s->sizeof_dyn;
3127 bfd_byte *dyncon, *dynconend;
3128
3129 dynconend = sdyn->contents + sdyn->size;
3130 for (dyncon = sdyn->contents; dyncon < dynconend; dyncon += dynsize)
3131 {
3132 Elf_Internal_Dyn dyn;
3133 asection *s;
3134
3135 bed->s->swap_dyn_in (dynobj, dyncon, &dyn);
3136
3137 switch (dyn.d_tag)
3138 {
3139 case DT_PLTGOT:
3140 s = htab->elf.sgotplt;
3141 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3142 break;
3143 case DT_JMPREL:
3144 s = htab->elf.srelplt;
3145 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3146 break;
3147 case DT_PLTRELSZ:
3148 s = htab->elf.srelplt;
3149 dyn.d_un.d_val = s->size;
3150 break;
3151 default:
3152 continue;
3153 }
3154
3155 bed->s->swap_dyn_out (output_bfd, &dyn, dyncon);
3156 }
3157 return TRUE;
3158}
3159
3160static bfd_boolean
3161riscv_elf_finish_dynamic_sections (bfd *output_bfd,
3162 struct bfd_link_info *info)
3163{
3164 bfd *dynobj;
3165 asection *sdyn;
3166 struct riscv_elf_link_hash_table *htab;
3167
3168 htab = riscv_elf_hash_table (info);
3169 BFD_ASSERT (htab != NULL);
3170 dynobj = htab->elf.dynobj;
3171
3172 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
3173
3174 if (elf_hash_table (info)->dynamic_sections_created)
3175 {
3176 asection *splt;
3177 bfd_boolean ret;
3178
3179 splt = htab->elf.splt;
3180 BFD_ASSERT (splt != NULL && sdyn != NULL);
3181
3182 ret = riscv_finish_dyn (output_bfd, info, dynobj, sdyn);
3183
535b785f 3184 if (!ret)
e23eba97
NC
3185 return ret;
3186
3187 /* Fill in the head and tail entries in the procedure linkage table. */
3188 if (splt->size > 0)
3189 {
3190 int i;
3191 uint32_t plt_header[PLT_HEADER_INSNS];
5ef23793
JW
3192 ret = riscv_make_plt_header (output_bfd,
3193 sec_addr (htab->elf.sgotplt),
3194 sec_addr (splt), plt_header);
3195 if (!ret)
3196 return ret;
e23eba97
NC
3197
3198 for (i = 0; i < PLT_HEADER_INSNS; i++)
fbc09e7a 3199 bfd_putl32 (plt_header[i], splt->contents + 4*i);
e23eba97 3200
cc162427
AW
3201 elf_section_data (splt->output_section)->this_hdr.sh_entsize
3202 = PLT_ENTRY_SIZE;
3203 }
e23eba97
NC
3204 }
3205
3206 if (htab->elf.sgotplt)
3207 {
3208 asection *output_section = htab->elf.sgotplt->output_section;
3209
3210 if (bfd_is_abs_section (output_section))
3211 {
3212 (*_bfd_error_handler)
871b3ab2 3213 (_("discarded output section: `%pA'"), htab->elf.sgotplt);
e23eba97
NC
3214 return FALSE;
3215 }
3216
3217 if (htab->elf.sgotplt->size > 0)
3218 {
3219 /* Write the first two entries in .got.plt, needed for the dynamic
3220 linker. */
3221 bfd_put_NN (output_bfd, (bfd_vma) -1, htab->elf.sgotplt->contents);
3222 bfd_put_NN (output_bfd, (bfd_vma) 0,
3223 htab->elf.sgotplt->contents + GOT_ENTRY_SIZE);
3224 }
3225
3226 elf_section_data (output_section)->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
3227 }
3228
3229 if (htab->elf.sgot)
3230 {
3231 asection *output_section = htab->elf.sgot->output_section;
3232
3233 if (htab->elf.sgot->size > 0)
3234 {
3235 /* Set the first entry in the global offset table to the address of
3236 the dynamic section. */
3237 bfd_vma val = sdyn ? sec_addr (sdyn) : 0;
3238 bfd_put_NN (output_bfd, val, htab->elf.sgot->contents);
3239 }
3240
3241 elf_section_data (output_section)->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
3242 }
3243
02dd9d25
NC
3244 /* Fill PLT and GOT entries for local STT_GNU_IFUNC symbols. */
3245 htab_traverse (htab->loc_hash_table,
3246 riscv_elf_finish_local_dynamic_symbol,
3247 info);
3248
e23eba97
NC
3249 return TRUE;
3250}
3251
3252/* Return address for Ith PLT stub in section PLT, for relocation REL
3253 or (bfd_vma) -1 if it should not be included. */
3254
3255static bfd_vma
3256riscv_elf_plt_sym_val (bfd_vma i, const asection *plt,
3257 const arelent *rel ATTRIBUTE_UNUSED)
3258{
3259 return plt->vma + PLT_HEADER_SIZE + i * PLT_ENTRY_SIZE;
3260}
3261
3262static enum elf_reloc_type_class
3263riscv_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
3264 const asection *rel_sec ATTRIBUTE_UNUSED,
3265 const Elf_Internal_Rela *rela)
3266{
3267 switch (ELFNN_R_TYPE (rela->r_info))
3268 {
3269 case R_RISCV_RELATIVE:
3270 return reloc_class_relative;
3271 case R_RISCV_JUMP_SLOT:
3272 return reloc_class_plt;
3273 case R_RISCV_COPY:
3274 return reloc_class_copy;
3275 default:
3276 return reloc_class_normal;
3277 }
3278}
3279
0242af40
JW
3280/* Given the ELF header flags in FLAGS, it returns a string that describes the
3281 float ABI. */
3282
3283static const char *
3284riscv_float_abi_string (flagword flags)
3285{
3286 switch (flags & EF_RISCV_FLOAT_ABI)
3287 {
3288 case EF_RISCV_FLOAT_ABI_SOFT:
3289 return "soft-float";
3290 break;
3291 case EF_RISCV_FLOAT_ABI_SINGLE:
3292 return "single-float";
3293 break;
3294 case EF_RISCV_FLOAT_ABI_DOUBLE:
3295 return "double-float";
3296 break;
3297 case EF_RISCV_FLOAT_ABI_QUAD:
3298 return "quad-float";
3299 break;
3300 default:
3301 abort ();
3302 }
3303}
3304
dcd709e0 3305/* The information of architecture elf attributes. */
7d7a7d7c
JW
3306static riscv_subset_list_t in_subsets;
3307static riscv_subset_list_t out_subsets;
3308static riscv_subset_list_t merged_subsets;
3309
3310/* Predicator for standard extension. */
3311
3312static bfd_boolean
3313riscv_std_ext_p (const char *name)
3314{
3315 return (strlen (name) == 1) && (name[0] != 'x') && (name[0] != 's');
3316}
3317
32f0ce4d 3318/* Check if the versions are compatible. */
7d7a7d7c 3319
32f0ce4d 3320static bfd_boolean
7d7a7d7c
JW
3321riscv_version_mismatch (bfd *ibfd,
3322 struct riscv_subset_t *in,
3323 struct riscv_subset_t *out)
3324{
32f0ce4d
NC
3325 if (in == NULL || out == NULL)
3326 return TRUE;
3327
3328 /* Since there are no version conflicts for now, we just report
3329 warning when the versions are mis-matched. */
3330 if (in->major_version != out->major_version
3331 || in->minor_version != out->minor_version)
3332 {
3333 _bfd_error_handler
3334 (_("warning: %pB: mis-matched ISA version %d.%d for '%s' "
3335 "extension, the output version is %d.%d"),
3336 ibfd,
3337 in->major_version,
3338 in->minor_version,
3339 in->name,
3340 out->major_version,
3341 out->minor_version);
3342
3343 /* Update the output ISA versions to the newest ones. */
3344 if ((in->major_version > out->major_version)
3345 || (in->major_version == out->major_version
3346 && in->minor_version > out->minor_version))
3347 {
3348 out->major_version = in->major_version;
3349 out->minor_version = in->minor_version;
3350 }
3351 }
3352
3353 return TRUE;
7d7a7d7c
JW
3354}
3355
3356/* Return true if subset is 'i' or 'e'. */
3357
3358static bfd_boolean
3359riscv_i_or_e_p (bfd *ibfd,
3360 const char *arch,
3361 struct riscv_subset_t *subset)
3362{
3363 if ((strcasecmp (subset->name, "e") != 0)
3364 && (strcasecmp (subset->name, "i") != 0))
3365 {
3366 _bfd_error_handler
9184ef8a
NC
3367 (_("error: %pB: corrupted ISA string '%s'. "
3368 "First letter should be 'i' or 'e' but got '%s'"),
7d7a7d7c
JW
3369 ibfd, arch, subset->name);
3370 return FALSE;
3371 }
3372 return TRUE;
3373}
3374
3375/* Merge standard extensions.
3376
3377 Return Value:
3378 Return FALSE if failed to merge.
3379
3380 Arguments:
3381 `bfd`: bfd handler.
dcd709e0
NC
3382 `in_arch`: Raw ISA string for input object.
3383 `out_arch`: Raw ISA string for output object.
3384 `pin`: Subset list for input object.
3385 `pout`: Subset list for output object. */
7d7a7d7c
JW
3386
3387static bfd_boolean
3388riscv_merge_std_ext (bfd *ibfd,
3389 const char *in_arch,
3390 const char *out_arch,
3391 struct riscv_subset_t **pin,
3392 struct riscv_subset_t **pout)
3393{
3394 const char *standard_exts = riscv_supported_std_ext ();
3395 const char *p;
3396 struct riscv_subset_t *in = *pin;
3397 struct riscv_subset_t *out = *pout;
3398
3399 /* First letter should be 'i' or 'e'. */
3400 if (!riscv_i_or_e_p (ibfd, in_arch, in))
3401 return FALSE;
3402
3403 if (!riscv_i_or_e_p (ibfd, out_arch, out))
3404 return FALSE;
3405
8f595e9b 3406 if (strcasecmp (in->name, out->name) != 0)
7d7a7d7c
JW
3407 {
3408 /* TODO: We might allow merge 'i' with 'e'. */
3409 _bfd_error_handler
9184ef8a 3410 (_("error: %pB: mis-matched ISA string to merge '%s' and '%s'"),
7d7a7d7c
JW
3411 ibfd, in->name, out->name);
3412 return FALSE;
3413 }
32f0ce4d
NC
3414 else if (!riscv_version_mismatch (ibfd, in, out))
3415 return FALSE;
7d7a7d7c
JW
3416 else
3417 riscv_add_subset (&merged_subsets,
32f0ce4d 3418 out->name, out->major_version, out->minor_version);
7d7a7d7c
JW
3419
3420 in = in->next;
3421 out = out->next;
3422
3423 /* Handle standard extension first. */
3424 for (p = standard_exts; *p; ++p)
3425 {
dfe92496 3426 struct riscv_subset_t *ext_in, *ext_out, *ext_merged;
7d7a7d7c 3427 char find_ext[2] = {*p, '\0'};
dfe92496 3428 bfd_boolean find_in, find_out;
7d7a7d7c 3429
dfe92496
NC
3430 find_in = riscv_lookup_subset (&in_subsets, find_ext, &ext_in);
3431 find_out = riscv_lookup_subset (&out_subsets, find_ext, &ext_out);
3432
3433 if (!find_in && !find_out)
7d7a7d7c
JW
3434 continue;
3435
dfe92496
NC
3436 if (find_in
3437 && find_out
3438 && !riscv_version_mismatch (ibfd, ext_in, ext_out))
32f0ce4d 3439 return FALSE;
7d7a7d7c 3440
dfe92496
NC
3441 ext_merged = find_out ? ext_out : ext_in;
3442 riscv_add_subset (&merged_subsets, ext_merged->name,
3443 ext_merged->major_version, ext_merged->minor_version);
7d7a7d7c
JW
3444 }
3445
3446 /* Skip all standard extensions. */
3447 while ((in != NULL) && riscv_std_ext_p (in->name)) in = in->next;
3448 while ((out != NULL) && riscv_std_ext_p (out->name)) out = out->next;
3449
3450 *pin = in;
3451 *pout = out;
3452
3453 return TRUE;
3454}
3455
403d1bd9
JW
3456/* Merge multi letter extensions. PIN is a pointer to the head of the input
3457 object subset list. Likewise for POUT and the output object. Return TRUE
3458 on success and FALSE when a conflict is found. */
7d7a7d7c
JW
3459
3460static bfd_boolean
403d1bd9
JW
3461riscv_merge_multi_letter_ext (bfd *ibfd,
3462 riscv_subset_t **pin,
3463 riscv_subset_t **pout)
7d7a7d7c
JW
3464{
3465 riscv_subset_t *in = *pin;
3466 riscv_subset_t *out = *pout;
403d1bd9 3467 riscv_subset_t *tail;
7d7a7d7c 3468
403d1bd9 3469 int cmp;
7d7a7d7c 3470
403d1bd9 3471 while (in && out)
7d7a7d7c 3472 {
4c0e540e 3473 cmp = riscv_compare_subsets (in->name, out->name);
403d1bd9
JW
3474
3475 if (cmp < 0)
3476 {
3477 /* `in' comes before `out', append `in' and increment. */
3478 riscv_add_subset (&merged_subsets, in->name, in->major_version,
3479 in->minor_version);
3480 in = in->next;
3481 }
3482 else if (cmp > 0)
3483 {
3484 /* `out' comes before `in', append `out' and increment. */
3485 riscv_add_subset (&merged_subsets, out->name, out->major_version,
3486 out->minor_version);
3487 out = out->next;
3488 }
3489 else
7d7a7d7c 3490 {
403d1bd9 3491 /* Both present, check version and increment both. */
32f0ce4d
NC
3492 if (!riscv_version_mismatch (ibfd, in, out))
3493 return FALSE;
403d1bd9
JW
3494
3495 riscv_add_subset (&merged_subsets, out->name, out->major_version,
3496 out->minor_version);
3497 out = out->next;
3498 in = in->next;
7d7a7d7c 3499 }
7d7a7d7c
JW
3500 }
3501
403d1bd9
JW
3502 if (in || out) {
3503 /* If we're here, either `in' or `out' is running longer than
3504 the other. So, we need to append the corresponding tail. */
3505 tail = in ? in : out;
3506
3507 while (tail)
3508 {
3509 riscv_add_subset (&merged_subsets, tail->name, tail->major_version,
3510 tail->minor_version);
3511 tail = tail->next;
3512 }
3513 }
3514
7d7a7d7c
JW
3515 return TRUE;
3516}
3517
3518/* Merge Tag_RISCV_arch attribute. */
3519
3520static char *
3521riscv_merge_arch_attr_info (bfd *ibfd, char *in_arch, char *out_arch)
3522{
3523 riscv_subset_t *in, *out;
3524 char *merged_arch_str;
3525
3526 unsigned xlen_in, xlen_out;
3527 merged_subsets.head = NULL;
3528 merged_subsets.tail = NULL;
3529
3530 riscv_parse_subset_t rpe_in;
3531 riscv_parse_subset_t rpe_out;
3532
8f595e9b
NC
3533 /* Only assembler needs to check the default version of ISA, so just set
3534 the rpe_in.get_default_version and rpe_out.get_default_version to NULL. */
7d7a7d7c
JW
3535 rpe_in.subset_list = &in_subsets;
3536 rpe_in.error_handler = _bfd_error_handler;
3537 rpe_in.xlen = &xlen_in;
8f595e9b 3538 rpe_in.get_default_version = NULL;
7d7a7d7c
JW
3539
3540 rpe_out.subset_list = &out_subsets;
3541 rpe_out.error_handler = _bfd_error_handler;
3542 rpe_out.xlen = &xlen_out;
8f595e9b 3543 rpe_out.get_default_version = NULL;
7d7a7d7c
JW
3544
3545 if (in_arch == NULL && out_arch == NULL)
3546 return NULL;
3547
3548 if (in_arch == NULL && out_arch != NULL)
3549 return out_arch;
3550
3551 if (in_arch != NULL && out_arch == NULL)
3552 return in_arch;
3553
dcd709e0 3554 /* Parse subset from ISA string. */
7d7a7d7c
JW
3555 if (!riscv_parse_subset (&rpe_in, in_arch))
3556 return NULL;
3557
3558 if (!riscv_parse_subset (&rpe_out, out_arch))
3559 return NULL;
3560
3561 /* Checking XLEN. */
3562 if (xlen_out != xlen_in)
3563 {
3564 _bfd_error_handler
3565 (_("error: %pB: ISA string of input (%s) doesn't match "
9184ef8a 3566 "output (%s)"), ibfd, in_arch, out_arch);
7d7a7d7c
JW
3567 return NULL;
3568 }
3569
3570 /* Merge subset list. */
3571 in = in_subsets.head;
3572 out = out_subsets.head;
3573
3574 /* Merge standard extension. */
3575 if (!riscv_merge_std_ext (ibfd, in_arch, out_arch, &in, &out))
3576 return NULL;
403d1bd9
JW
3577
3578 /* Merge all non-single letter extensions with single call. */
3579 if (!riscv_merge_multi_letter_ext (ibfd, &in, &out))
7d7a7d7c
JW
3580 return NULL;
3581
3582 if (xlen_in != xlen_out)
3583 {
3584 _bfd_error_handler
3585 (_("error: %pB: XLEN of input (%u) doesn't match "
9184ef8a 3586 "output (%u)"), ibfd, xlen_in, xlen_out);
7d7a7d7c
JW
3587 return NULL;
3588 }
3589
3590 if (xlen_in != ARCH_SIZE)
3591 {
3592 _bfd_error_handler
9184ef8a
NC
3593 (_("error: %pB: unsupported XLEN (%u), you might be "
3594 "using wrong emulation"), ibfd, xlen_in);
7d7a7d7c
JW
3595 return NULL;
3596 }
3597
3598 merged_arch_str = riscv_arch_str (ARCH_SIZE, &merged_subsets);
3599
3600 /* Release the subset lists. */
3601 riscv_release_subset_list (&in_subsets);
3602 riscv_release_subset_list (&out_subsets);
3603 riscv_release_subset_list (&merged_subsets);
3604
3605 return merged_arch_str;
3606}
3607
3608/* Merge object attributes from IBFD into output_bfd of INFO.
3609 Raise an error if there are conflicting attributes. */
3610
3611static bfd_boolean
3612riscv_merge_attributes (bfd *ibfd, struct bfd_link_info *info)
3613{
3614 bfd *obfd = info->output_bfd;
3615 obj_attribute *in_attr;
3616 obj_attribute *out_attr;
3617 bfd_boolean result = TRUE;
cbd7581f 3618 bfd_boolean priv_attrs_merged = FALSE;
7d7a7d7c
JW
3619 const char *sec_name = get_elf_backend_data (ibfd)->obj_attrs_section;
3620 unsigned int i;
3621
3622 /* Skip linker created files. */
3623 if (ibfd->flags & BFD_LINKER_CREATED)
3624 return TRUE;
3625
3626 /* Skip any input that doesn't have an attribute section.
3627 This enables to link object files without attribute section with
3628 any others. */
3629 if (bfd_get_section_by_name (ibfd, sec_name) == NULL)
3630 return TRUE;
3631
3632 if (!elf_known_obj_attributes_proc (obfd)[0].i)
3633 {
3634 /* This is the first object. Copy the attributes. */
3635 _bfd_elf_copy_obj_attributes (ibfd, obfd);
3636
3637 out_attr = elf_known_obj_attributes_proc (obfd);
3638
3639 /* Use the Tag_null value to indicate the attributes have been
3640 initialized. */
3641 out_attr[0].i = 1;
3642
3643 return TRUE;
3644 }
3645
3646 in_attr = elf_known_obj_attributes_proc (ibfd);
3647 out_attr = elf_known_obj_attributes_proc (obfd);
3648
3649 for (i = LEAST_KNOWN_OBJ_ATTRIBUTE; i < NUM_KNOWN_OBJ_ATTRIBUTES; i++)
3650 {
3651 switch (i)
3652 {
3653 case Tag_RISCV_arch:
3654 if (!out_attr[Tag_RISCV_arch].s)
3655 out_attr[Tag_RISCV_arch].s = in_attr[Tag_RISCV_arch].s;
3656 else if (in_attr[Tag_RISCV_arch].s
3657 && out_attr[Tag_RISCV_arch].s)
3658 {
dcd709e0 3659 /* Check compatible. */
7d7a7d7c
JW
3660 char *merged_arch =
3661 riscv_merge_arch_attr_info (ibfd,
3662 in_attr[Tag_RISCV_arch].s,
3663 out_attr[Tag_RISCV_arch].s);
3664 if (merged_arch == NULL)
3665 {
3666 result = FALSE;
3667 out_attr[Tag_RISCV_arch].s = "";
3668 }
3669 else
3670 out_attr[Tag_RISCV_arch].s = merged_arch;
3671 }
3672 break;
41285764 3673
7d7a7d7c
JW
3674 case Tag_RISCV_priv_spec:
3675 case Tag_RISCV_priv_spec_minor:
3676 case Tag_RISCV_priv_spec_revision:
dcd709e0 3677 /* If we have handled the privileged elf attributes, then skip it. */
cbd7581f 3678 if (!priv_attrs_merged)
41285764 3679 {
cbd7581f
NC
3680 unsigned int Tag_a = Tag_RISCV_priv_spec;
3681 unsigned int Tag_b = Tag_RISCV_priv_spec_minor;
3682 unsigned int Tag_c = Tag_RISCV_priv_spec_revision;
39ff0b81
NC
3683 enum riscv_priv_spec_class in_priv_spec;
3684 enum riscv_priv_spec_class out_priv_spec;
3685
dcd709e0 3686 /* Get the privileged spec class from elf attributes. */
39ff0b81
NC
3687 riscv_get_priv_spec_class_from_numbers (in_attr[Tag_a].i,
3688 in_attr[Tag_b].i,
3689 in_attr[Tag_c].i,
3690 &in_priv_spec);
3691 riscv_get_priv_spec_class_from_numbers (out_attr[Tag_a].i,
3692 out_attr[Tag_b].i,
3693 out_attr[Tag_c].i,
3694 &out_priv_spec);
cbd7581f 3695
dcd709e0 3696 /* Allow to link the object without the privileged specs. */
39ff0b81 3697 if (out_priv_spec == PRIV_SPEC_CLASS_NONE)
cbd7581f
NC
3698 {
3699 out_attr[Tag_a].i = in_attr[Tag_a].i;
3700 out_attr[Tag_b].i = in_attr[Tag_b].i;
3701 out_attr[Tag_c].i = in_attr[Tag_c].i;
3702 }
39ff0b81
NC
3703 else if (in_priv_spec != PRIV_SPEC_CLASS_NONE
3704 && in_priv_spec != out_priv_spec)
cbd7581f
NC
3705 {
3706 _bfd_error_handler
b800637e 3707 (_("warning: %pB use privileged spec version %u.%u.%u but "
9184ef8a 3708 "the output use version %u.%u.%u"),
cbd7581f
NC
3709 ibfd,
3710 in_attr[Tag_a].i,
3711 in_attr[Tag_b].i,
3712 in_attr[Tag_c].i,
3713 out_attr[Tag_a].i,
3714 out_attr[Tag_b].i,
3715 out_attr[Tag_c].i);
39ff0b81 3716
dcd709e0
NC
3717 /* The privileged spec v1.9.1 can not be linked with others
3718 since the conflicts, so we plan to drop it in a year or
3719 two. */
39ff0b81
NC
3720 if (in_priv_spec == PRIV_SPEC_CLASS_1P9P1
3721 || out_priv_spec == PRIV_SPEC_CLASS_1P9P1)
3722 {
3723 _bfd_error_handler
b800637e 3724 (_("warning: privileged spec version 1.9.1 can not be "
9184ef8a 3725 "linked with other spec versions"));
39ff0b81
NC
3726 }
3727
dcd709e0 3728 /* Update the output privileged spec to the newest one. */
39ff0b81
NC
3729 if (in_priv_spec > out_priv_spec)
3730 {
3731 out_attr[Tag_a].i = in_attr[Tag_a].i;
3732 out_attr[Tag_b].i = in_attr[Tag_b].i;
3733 out_attr[Tag_c].i = in_attr[Tag_c].i;
3734 }
cbd7581f
NC
3735 }
3736 priv_attrs_merged = TRUE;
7d7a7d7c
JW
3737 }
3738 break;
41285764 3739
7d7a7d7c
JW
3740 case Tag_RISCV_unaligned_access:
3741 out_attr[i].i |= in_attr[i].i;
3742 break;
41285764 3743
7d7a7d7c
JW
3744 case Tag_RISCV_stack_align:
3745 if (out_attr[i].i == 0)
3746 out_attr[i].i = in_attr[i].i;
3747 else if (in_attr[i].i != 0
3748 && out_attr[i].i != 0
3749 && out_attr[i].i != in_attr[i].i)
3750 {
3751 _bfd_error_handler
3752 (_("error: %pB use %u-byte stack aligned but the output "
9184ef8a 3753 "use %u-byte stack aligned"),
7d7a7d7c
JW
3754 ibfd, in_attr[i].i, out_attr[i].i);
3755 result = FALSE;
3756 }
3757 break;
41285764 3758
7d7a7d7c
JW
3759 default:
3760 result &= _bfd_elf_merge_unknown_attribute_low (ibfd, obfd, i);
3761 }
3762
3763 /* If out_attr was copied from in_attr then it won't have a type yet. */
3764 if (in_attr[i].type && !out_attr[i].type)
3765 out_attr[i].type = in_attr[i].type;
3766 }
3767
3768 /* Merge Tag_compatibility attributes and any common GNU ones. */
3769 if (!_bfd_elf_merge_object_attributes (ibfd, info))
3770 return FALSE;
3771
3772 /* Check for any attributes not known on RISC-V. */
3773 result &= _bfd_elf_merge_unknown_attribute_list (ibfd, obfd);
3774
3775 return result;
3776}
3777
e23eba97
NC
3778/* Merge backend specific data from an object file to the output
3779 object file when linking. */
3780
3781static bfd_boolean
3782_bfd_riscv_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
3783{
3784 bfd *obfd = info->output_bfd;
87f98bac 3785 flagword new_flags, old_flags;
e23eba97
NC
3786
3787 if (!is_riscv_elf (ibfd) || !is_riscv_elf (obfd))
3788 return TRUE;
3789
3790 if (strcmp (bfd_get_target (ibfd), bfd_get_target (obfd)) != 0)
3791 {
3792 (*_bfd_error_handler)
871b3ab2 3793 (_("%pB: ABI is incompatible with that of the selected emulation:\n"
96b0927d
PD
3794 " target emulation `%s' does not match `%s'"),
3795 ibfd, bfd_get_target (ibfd), bfd_get_target (obfd));
e23eba97
NC
3796 return FALSE;
3797 }
3798
3799 if (!_bfd_elf_merge_object_attributes (ibfd, info))
3800 return FALSE;
3801
7d7a7d7c
JW
3802 if (!riscv_merge_attributes (ibfd, info))
3803 return FALSE;
3804
87f98bac
JW
3805 new_flags = elf_elfheader (ibfd)->e_flags;
3806 old_flags = elf_elfheader (obfd)->e_flags;
3807
e23eba97
NC
3808 if (! elf_flags_init (obfd))
3809 {
3810 elf_flags_init (obfd) = TRUE;
3811 elf_elfheader (obfd)->e_flags = new_flags;
3812 return TRUE;
3813 }
3814
87f98bac
JW
3815 /* Check to see if the input BFD actually contains any sections. If not,
3816 its flags may not have been initialized either, but it cannot actually
3817 cause any incompatibility. Do not short-circuit dynamic objects; their
3818 section list may be emptied by elf_link_add_object_symbols.
3819
3820 Also check to see if there are no code sections in the input. In this
3821 case, there is no need to check for code specific flags. */
3822 if (!(ibfd->flags & DYNAMIC))
3823 {
3824 bfd_boolean null_input_bfd = TRUE;
3825 bfd_boolean only_data_sections = TRUE;
3826 asection *sec;
3827
3828 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
3829 {
fd361982 3830 if ((bfd_section_flags (sec)
87f98bac
JW
3831 & (SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS))
3832 == (SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS))
3833 only_data_sections = FALSE;
3834
3835 null_input_bfd = FALSE;
3836 break;
3837 }
3838
3839 if (null_input_bfd || only_data_sections)
3840 return TRUE;
3841 }
3842
2922d21d
AW
3843 /* Disallow linking different float ABIs. */
3844 if ((old_flags ^ new_flags) & EF_RISCV_FLOAT_ABI)
e23eba97
NC
3845 {
3846 (*_bfd_error_handler)
0242af40
JW
3847 (_("%pB: can't link %s modules with %s modules"), ibfd,
3848 riscv_float_abi_string (new_flags),
3849 riscv_float_abi_string (old_flags));
e23eba97
NC
3850 goto fail;
3851 }
3852
7f999549
JW
3853 /* Disallow linking RVE and non-RVE. */
3854 if ((old_flags ^ new_flags) & EF_RISCV_RVE)
3855 {
3856 (*_bfd_error_handler)
3857 (_("%pB: can't link RVE with other target"), ibfd);
3858 goto fail;
3859 }
3860
e23eba97
NC
3861 /* Allow linking RVC and non-RVC, and keep the RVC flag. */
3862 elf_elfheader (obfd)->e_flags |= new_flags & EF_RISCV_RVC;
3863
3864 return TRUE;
3865
dc1e8a47 3866 fail:
e23eba97
NC
3867 bfd_set_error (bfd_error_bad_value);
3868 return FALSE;
3869}
3870
3871/* Delete some bytes from a section while relaxing. */
3872
3873static bfd_boolean
7f02625e
JW
3874riscv_relax_delete_bytes (bfd *abfd, asection *sec, bfd_vma addr, size_t count,
3875 struct bfd_link_info *link_info)
e23eba97
NC
3876{
3877 unsigned int i, symcount;
3878 bfd_vma toaddr = sec->size;
3879 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (abfd);
3880 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3881 unsigned int sec_shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
3882 struct bfd_elf_section_data *data = elf_section_data (sec);
3883 bfd_byte *contents = data->this_hdr.contents;
3884
3885 /* Actually delete the bytes. */
3886 sec->size -= count;
3887 memmove (contents + addr, contents + addr + count, toaddr - addr - count);
3888
3889 /* Adjust the location of all of the relocs. Note that we need not
3890 adjust the addends, since all PC-relative references must be against
3891 symbols, which we will adjust below. */
3892 for (i = 0; i < sec->reloc_count; i++)
3893 if (data->relocs[i].r_offset > addr && data->relocs[i].r_offset < toaddr)
3894 data->relocs[i].r_offset -= count;
3895
3896 /* Adjust the local symbols defined in this section. */
3897 for (i = 0; i < symtab_hdr->sh_info; i++)
3898 {
3899 Elf_Internal_Sym *sym = (Elf_Internal_Sym *) symtab_hdr->contents + i;
3900 if (sym->st_shndx == sec_shndx)
3901 {
3902 /* If the symbol is in the range of memory we just moved, we
3903 have to adjust its value. */
3904 if (sym->st_value > addr && sym->st_value <= toaddr)
3905 sym->st_value -= count;
3906
3907 /* If the symbol *spans* the bytes we just deleted (i.e. its
3908 *end* is in the moved bytes but its *start* isn't), then we
788af978
JW
3909 must adjust its size.
3910
3911 This test needs to use the original value of st_value, otherwise
3912 we might accidentally decrease size when deleting bytes right
3913 before the symbol. But since deleted relocs can't span across
3914 symbols, we can't have both a st_value and a st_size decrease,
3915 so it is simpler to just use an else. */
3916 else if (sym->st_value <= addr
3917 && sym->st_value + sym->st_size > addr
3918 && sym->st_value + sym->st_size <= toaddr)
e23eba97
NC
3919 sym->st_size -= count;
3920 }
3921 }
3922
3923 /* Now adjust the global symbols defined in this section. */
3924 symcount = ((symtab_hdr->sh_size / sizeof (ElfNN_External_Sym))
3925 - symtab_hdr->sh_info);
3926
3927 for (i = 0; i < symcount; i++)
3928 {
3929 struct elf_link_hash_entry *sym_hash = sym_hashes[i];
3930
7f02625e
JW
3931 /* The '--wrap SYMBOL' option is causing a pain when the object file,
3932 containing the definition of __wrap_SYMBOL, includes a direct
3933 call to SYMBOL as well. Since both __wrap_SYMBOL and SYMBOL reference
3934 the same symbol (which is __wrap_SYMBOL), but still exist as two
3935 different symbols in 'sym_hashes', we don't want to adjust
dcd709e0
NC
3936 the global symbol __wrap_SYMBOL twice.
3937
3938 The same problem occurs with symbols that are versioned_hidden, as
137b5cbd
JW
3939 foo becomes an alias for foo@BAR, and hence they need the same
3940 treatment. */
3941 if (link_info->wrap_hash != NULL
3942 || sym_hash->versioned == versioned_hidden)
7f02625e
JW
3943 {
3944 struct elf_link_hash_entry **cur_sym_hashes;
3945
3946 /* Loop only over the symbols which have already been checked. */
3947 for (cur_sym_hashes = sym_hashes; cur_sym_hashes < &sym_hashes[i];
3948 cur_sym_hashes++)
3949 {
3950 /* If the current symbol is identical to 'sym_hash', that means
3951 the symbol was already adjusted (or at least checked). */
3952 if (*cur_sym_hashes == sym_hash)
3953 break;
3954 }
3955 /* Don't adjust the symbol again. */
3956 if (cur_sym_hashes < &sym_hashes[i])
3957 continue;
3958 }
3959
e23eba97
NC
3960 if ((sym_hash->root.type == bfd_link_hash_defined
3961 || sym_hash->root.type == bfd_link_hash_defweak)
3962 && sym_hash->root.u.def.section == sec)
3963 {
3964 /* As above, adjust the value if needed. */
3965 if (sym_hash->root.u.def.value > addr
3966 && sym_hash->root.u.def.value <= toaddr)
3967 sym_hash->root.u.def.value -= count;
3968
3969 /* As above, adjust the size if needed. */
788af978
JW
3970 else if (sym_hash->root.u.def.value <= addr
3971 && sym_hash->root.u.def.value + sym_hash->size > addr
3972 && sym_hash->root.u.def.value + sym_hash->size <= toaddr)
e23eba97
NC
3973 sym_hash->size -= count;
3974 }
3975 }
3976
3977 return TRUE;
3978}
3979
9d06997a
PD
3980/* A second format for recording PC-relative hi relocations. This stores the
3981 information required to relax them to GP-relative addresses. */
3982
3983typedef struct riscv_pcgp_hi_reloc riscv_pcgp_hi_reloc;
3984struct riscv_pcgp_hi_reloc
3985{
3986 bfd_vma hi_sec_off;
3987 bfd_vma hi_addend;
3988 bfd_vma hi_addr;
3989 unsigned hi_sym;
3990 asection *sym_sec;
9d1da81b 3991 bfd_boolean undefined_weak;
9d06997a
PD
3992 riscv_pcgp_hi_reloc *next;
3993};
3994
3995typedef struct riscv_pcgp_lo_reloc riscv_pcgp_lo_reloc;
3996struct riscv_pcgp_lo_reloc
3997{
3998 bfd_vma hi_sec_off;
3999 riscv_pcgp_lo_reloc *next;
4000};
4001
4002typedef struct
4003{
4004 riscv_pcgp_hi_reloc *hi;
4005 riscv_pcgp_lo_reloc *lo;
4006} riscv_pcgp_relocs;
4007
5f9aecea
JW
4008/* Initialize the pcgp reloc info in P. */
4009
9d06997a
PD
4010static bfd_boolean
4011riscv_init_pcgp_relocs (riscv_pcgp_relocs *p)
4012{
4013 p->hi = NULL;
4014 p->lo = NULL;
4015 return TRUE;
4016}
4017
5f9aecea
JW
4018/* Free the pcgp reloc info in P. */
4019
9d06997a
PD
4020static void
4021riscv_free_pcgp_relocs (riscv_pcgp_relocs *p,
4022 bfd *abfd ATTRIBUTE_UNUSED,
4023 asection *sec ATTRIBUTE_UNUSED)
4024{
4025 riscv_pcgp_hi_reloc *c;
4026 riscv_pcgp_lo_reloc *l;
4027
4028 for (c = p->hi; c != NULL;)
4029 {
4030 riscv_pcgp_hi_reloc *next = c->next;
4031 free (c);
4032 c = next;
4033 }
4034
4035 for (l = p->lo; l != NULL;)
4036 {
4037 riscv_pcgp_lo_reloc *next = l->next;
4038 free (l);
4039 l = next;
4040 }
4041}
4042
5f9aecea
JW
4043/* Record pcgp hi part reloc info in P, using HI_SEC_OFF as the lookup index.
4044 The HI_ADDEND, HI_ADDR, HI_SYM, and SYM_SEC args contain info required to
4045 relax the corresponding lo part reloc. */
4046
9d06997a
PD
4047static bfd_boolean
4048riscv_record_pcgp_hi_reloc (riscv_pcgp_relocs *p, bfd_vma hi_sec_off,
4049 bfd_vma hi_addend, bfd_vma hi_addr,
9d1da81b
JW
4050 unsigned hi_sym, asection *sym_sec,
4051 bfd_boolean undefined_weak)
9d06997a
PD
4052{
4053 riscv_pcgp_hi_reloc *new = bfd_malloc (sizeof(*new));
4054 if (!new)
4055 return FALSE;
4056 new->hi_sec_off = hi_sec_off;
4057 new->hi_addend = hi_addend;
4058 new->hi_addr = hi_addr;
4059 new->hi_sym = hi_sym;
4060 new->sym_sec = sym_sec;
9d1da81b 4061 new->undefined_weak = undefined_weak;
9d06997a
PD
4062 new->next = p->hi;
4063 p->hi = new;
4064 return TRUE;
4065}
4066
5f9aecea
JW
4067/* Look up hi part pcgp reloc info in P, using HI_SEC_OFF as the lookup index.
4068 This is used by a lo part reloc to find the corresponding hi part reloc. */
4069
9d06997a
PD
4070static riscv_pcgp_hi_reloc *
4071riscv_find_pcgp_hi_reloc(riscv_pcgp_relocs *p, bfd_vma hi_sec_off)
4072{
4073 riscv_pcgp_hi_reloc *c;
4074
4075 for (c = p->hi; c != NULL; c = c->next)
4076 if (c->hi_sec_off == hi_sec_off)
4077 return c;
4078 return NULL;
4079}
4080
5f9aecea
JW
4081/* Record pcgp lo part reloc info in P, using HI_SEC_OFF as the lookup info.
4082 This is used to record relocs that can't be relaxed. */
9d06997a
PD
4083
4084static bfd_boolean
4085riscv_record_pcgp_lo_reloc (riscv_pcgp_relocs *p, bfd_vma hi_sec_off)
4086{
4087 riscv_pcgp_lo_reloc *new = bfd_malloc (sizeof(*new));
4088 if (!new)
4089 return FALSE;
4090 new->hi_sec_off = hi_sec_off;
4091 new->next = p->lo;
4092 p->lo = new;
4093 return TRUE;
4094}
4095
5f9aecea
JW
4096/* Look up lo part pcgp reloc info in P, using HI_SEC_OFF as the lookup index.
4097 This is used by a hi part reloc to find the corresponding lo part reloc. */
4098
9d06997a
PD
4099static bfd_boolean
4100riscv_find_pcgp_lo_reloc (riscv_pcgp_relocs *p, bfd_vma hi_sec_off)
4101{
4102 riscv_pcgp_lo_reloc *c;
4103
4104 for (c = p->lo; c != NULL; c = c->next)
4105 if (c->hi_sec_off == hi_sec_off)
4106 return TRUE;
4107 return FALSE;
4108}
4109
45f76423
AW
4110typedef bfd_boolean (*relax_func_t) (bfd *, asection *, asection *,
4111 struct bfd_link_info *,
4112 Elf_Internal_Rela *,
9d06997a 4113 bfd_vma, bfd_vma, bfd_vma, bfd_boolean *,
9d1da81b
JW
4114 riscv_pcgp_relocs *,
4115 bfd_boolean undefined_weak);
45f76423 4116
e23eba97
NC
4117/* Relax AUIPC + JALR into JAL. */
4118
4119static bfd_boolean
4120_bfd_riscv_relax_call (bfd *abfd, asection *sec, asection *sym_sec,
4121 struct bfd_link_info *link_info,
4122 Elf_Internal_Rela *rel,
4123 bfd_vma symval,
45f76423
AW
4124 bfd_vma max_alignment,
4125 bfd_vma reserve_size ATTRIBUTE_UNUSED,
9d06997a 4126 bfd_boolean *again,
9d1da81b
JW
4127 riscv_pcgp_relocs *pcgp_relocs ATTRIBUTE_UNUSED,
4128 bfd_boolean undefined_weak ATTRIBUTE_UNUSED)
e23eba97
NC
4129{
4130 bfd_byte *contents = elf_section_data (sec)->this_hdr.contents;
1174d920 4131 bfd_vma foff = symval - (sec_addr (sec) + rel->r_offset);
e23eba97
NC
4132 bfd_boolean near_zero = (symval + RISCV_IMM_REACH/2) < RISCV_IMM_REACH;
4133 bfd_vma auipc, jalr;
4134 int rd, r_type, len = 4, rvc = elf_elfheader (abfd)->e_flags & EF_RISCV_RVC;
4135
4136 /* If the call crosses section boundaries, an alignment directive could
c6261a00
JW
4137 cause the PC-relative offset to later increase, so we need to add in the
4138 max alignment of any section inclusive from the call to the target.
4139 Otherwise, we only need to use the alignment of the current section. */
4140 if (VALID_UJTYPE_IMM (foff))
4141 {
4142 if (sym_sec->output_section == sec->output_section
4143 && sym_sec->output_section != bfd_abs_section_ptr)
4144 max_alignment = (bfd_vma) 1 << sym_sec->output_section->alignment_power;
1174d920 4145 foff += ((bfd_signed_vma) foff < 0 ? -max_alignment : max_alignment);
c6261a00 4146 }
e23eba97
NC
4147
4148 /* See if this function call can be shortened. */
4149 if (!VALID_UJTYPE_IMM (foff) && !(!bfd_link_pic (link_info) && near_zero))
4150 return TRUE;
4151
4152 /* Shorten the function call. */
4153 BFD_ASSERT (rel->r_offset + 8 <= sec->size);
4154
fbc09e7a
MC
4155 auipc = bfd_getl32 (contents + rel->r_offset);
4156 jalr = bfd_getl32 (contents + rel->r_offset + 4);
e23eba97 4157 rd = (jalr >> OP_SH_RD) & OP_MASK_RD;
ae2b14c7 4158 rvc = rvc && VALID_RVC_J_IMM (foff);
e23eba97 4159
ae2b14c7
JW
4160 /* C.J exists on RV32 and RV64, but C.JAL is RV32-only. */
4161 rvc = rvc && (rd == 0 || (rd == X_RA && ARCH_SIZE == 32));
4162
4163 if (rvc)
e23eba97
NC
4164 {
4165 /* Relax to C.J[AL] rd, addr. */
4166 r_type = R_RISCV_RVC_JUMP;
4167 auipc = rd == 0 ? MATCH_C_J : MATCH_C_JAL;
4168 len = 2;
4169 }
4170 else if (VALID_UJTYPE_IMM (foff))
4171 {
4172 /* Relax to JAL rd, addr. */
4173 r_type = R_RISCV_JAL;
4174 auipc = MATCH_JAL | (rd << OP_SH_RD);
4175 }
dcd709e0 4176 else
e23eba97 4177 {
dcd709e0 4178 /* Near zero, relax to JALR rd, x0, addr. */
e23eba97
NC
4179 r_type = R_RISCV_LO12_I;
4180 auipc = MATCH_JALR | (rd << OP_SH_RD);
4181 }
4182
4183 /* Replace the R_RISCV_CALL reloc. */
4184 rel->r_info = ELFNN_R_INFO (ELFNN_R_SYM (rel->r_info), r_type);
4185 /* Replace the AUIPC. */
fbc09e7a 4186 riscv_put_insn (8 * len, auipc, contents + rel->r_offset);
e23eba97
NC
4187
4188 /* Delete unnecessary JALR. */
4189 *again = TRUE;
7f02625e
JW
4190 return riscv_relax_delete_bytes (abfd, sec, rel->r_offset + len, 8 - len,
4191 link_info);
e23eba97
NC
4192}
4193
4194/* Traverse all output sections and return the max alignment. */
4195
1d61f794 4196static bfd_vma
e23eba97
NC
4197_bfd_riscv_get_max_alignment (asection *sec)
4198{
4199 unsigned int max_alignment_power = 0;
4200 asection *o;
4201
4202 for (o = sec->output_section->owner->sections; o != NULL; o = o->next)
4203 {
4204 if (o->alignment_power > max_alignment_power)
4205 max_alignment_power = o->alignment_power;
4206 }
4207
1d61f794 4208 return (bfd_vma) 1 << max_alignment_power;
e23eba97
NC
4209}
4210
dcd709e0 4211/* Relax non-PIC global variable references to GP-relative references. */
e23eba97
NC
4212
4213static bfd_boolean
4214_bfd_riscv_relax_lui (bfd *abfd,
4215 asection *sec,
4216 asection *sym_sec,
4217 struct bfd_link_info *link_info,
4218 Elf_Internal_Rela *rel,
4219 bfd_vma symval,
45f76423
AW
4220 bfd_vma max_alignment,
4221 bfd_vma reserve_size,
9d06997a 4222 bfd_boolean *again,
9d1da81b
JW
4223 riscv_pcgp_relocs *pcgp_relocs ATTRIBUTE_UNUSED,
4224 bfd_boolean undefined_weak)
e23eba97
NC
4225{
4226 bfd_byte *contents = elf_section_data (sec)->this_hdr.contents;
4227 bfd_vma gp = riscv_global_pointer_value (link_info);
4228 int use_rvc = elf_elfheader (abfd)->e_flags & EF_RISCV_RVC;
4229
e23eba97
NC
4230 BFD_ASSERT (rel->r_offset + 4 <= sec->size);
4231
d0f744f9
AW
4232 if (gp)
4233 {
507685a3
JW
4234 /* If gp and the symbol are in the same output section, which is not the
4235 abs section, then consider only that output section's alignment. */
d0f744f9 4236 struct bfd_link_hash_entry *h =
b5292032
PD
4237 bfd_link_hash_lookup (link_info->hash, RISCV_GP_SYMBOL, FALSE, FALSE,
4238 TRUE);
507685a3
JW
4239 if (h->u.def.section->output_section == sym_sec->output_section
4240 && sym_sec->output_section != bfd_abs_section_ptr)
d0f744f9
AW
4241 max_alignment = (bfd_vma) 1 << sym_sec->output_section->alignment_power;
4242 }
4243
e23eba97
NC
4244 /* Is the reference in range of x0 or gp?
4245 Valid gp range conservatively because of alignment issue. */
9d1da81b
JW
4246 if (undefined_weak
4247 || (VALID_ITYPE_IMM (symval)
4248 || (symval >= gp
4249 && VALID_ITYPE_IMM (symval - gp + max_alignment + reserve_size))
4250 || (symval < gp
4251 && VALID_ITYPE_IMM (symval - gp - max_alignment - reserve_size))))
e23eba97
NC
4252 {
4253 unsigned sym = ELFNN_R_SYM (rel->r_info);
4254 switch (ELFNN_R_TYPE (rel->r_info))
4255 {
4256 case R_RISCV_LO12_I:
9d1da81b
JW
4257 if (undefined_weak)
4258 {
4259 /* Change the RS1 to zero. */
fbc09e7a 4260 bfd_vma insn = bfd_getl32 (contents + rel->r_offset);
9d1da81b 4261 insn &= ~(OP_MASK_RS1 << OP_SH_RS1);
fbc09e7a 4262 bfd_putl32 (insn, contents + rel->r_offset);
9d1da81b
JW
4263 }
4264 else
4265 rel->r_info = ELFNN_R_INFO (sym, R_RISCV_GPREL_I);
e23eba97
NC
4266 return TRUE;
4267
4268 case R_RISCV_LO12_S:
9d1da81b
JW
4269 if (undefined_weak)
4270 {
4271 /* Change the RS1 to zero. */
fbc09e7a 4272 bfd_vma insn = bfd_getl32 (contents + rel->r_offset);
9d1da81b 4273 insn &= ~(OP_MASK_RS1 << OP_SH_RS1);
fbc09e7a 4274 bfd_putl32 (insn, contents + rel->r_offset);
9d1da81b
JW
4275 }
4276 else
4277 rel->r_info = ELFNN_R_INFO (sym, R_RISCV_GPREL_S);
e23eba97
NC
4278 return TRUE;
4279
4280 case R_RISCV_HI20:
4281 /* We can delete the unnecessary LUI and reloc. */
4282 rel->r_info = ELFNN_R_INFO (0, R_RISCV_NONE);
4283 *again = TRUE;
7f02625e
JW
4284 return riscv_relax_delete_bytes (abfd, sec, rel->r_offset, 4,
4285 link_info);
e23eba97
NC
4286
4287 default:
4288 abort ();
4289 }
4290 }
4291
4292 /* Can we relax LUI to C.LUI? Alignment might move the section forward;
0f52d45a
JW
4293 account for this assuming page alignment at worst. In the presence of
4294 RELRO segment the linker aligns it by one page size, therefore sections
4295 after the segment can be moved more than one page. */
4296
e23eba97
NC
4297 if (use_rvc
4298 && ELFNN_R_TYPE (rel->r_info) == R_RISCV_HI20
4299 && VALID_RVC_LUI_IMM (RISCV_CONST_HIGH_PART (symval))
0f52d45a
JW
4300 && VALID_RVC_LUI_IMM (RISCV_CONST_HIGH_PART (symval)
4301 + (link_info->relro ? 2 * ELF_MAXPAGESIZE
4302 : ELF_MAXPAGESIZE)))
e23eba97 4303 {
3342be5d 4304 /* Replace LUI with C.LUI if legal (i.e., rd != x0 and rd != x2/sp). */
fbc09e7a 4305 bfd_vma lui = bfd_getl32 (contents + rel->r_offset);
3342be5d
AW
4306 unsigned rd = ((unsigned)lui >> OP_SH_RD) & OP_MASK_RD;
4307 if (rd == 0 || rd == X_SP)
e23eba97
NC
4308 return TRUE;
4309
4310 lui = (lui & (OP_MASK_RD << OP_SH_RD)) | MATCH_C_LUI;
fbc09e7a 4311 bfd_putl32 (lui, contents + rel->r_offset);
e23eba97
NC
4312
4313 /* Replace the R_RISCV_HI20 reloc. */
4314 rel->r_info = ELFNN_R_INFO (ELFNN_R_SYM (rel->r_info), R_RISCV_RVC_LUI);
4315
4316 *again = TRUE;
7f02625e
JW
4317 return riscv_relax_delete_bytes (abfd, sec, rel->r_offset + 2, 2,
4318 link_info);
e23eba97
NC
4319 }
4320
4321 return TRUE;
4322}
4323
dcd709e0 4324/* Relax non-PIC TLS references to TP-relative references. */
e23eba97
NC
4325
4326static bfd_boolean
4327_bfd_riscv_relax_tls_le (bfd *abfd,
4328 asection *sec,
4329 asection *sym_sec ATTRIBUTE_UNUSED,
4330 struct bfd_link_info *link_info,
4331 Elf_Internal_Rela *rel,
4332 bfd_vma symval,
45f76423
AW
4333 bfd_vma max_alignment ATTRIBUTE_UNUSED,
4334 bfd_vma reserve_size ATTRIBUTE_UNUSED,
9d06997a 4335 bfd_boolean *again,
9d1da81b
JW
4336 riscv_pcgp_relocs *prcel_relocs ATTRIBUTE_UNUSED,
4337 bfd_boolean undefined_weak ATTRIBUTE_UNUSED)
e23eba97
NC
4338{
4339 /* See if this symbol is in range of tp. */
4340 if (RISCV_CONST_HIGH_PART (tpoff (link_info, symval)) != 0)
4341 return TRUE;
4342
e23eba97 4343 BFD_ASSERT (rel->r_offset + 4 <= sec->size);
45f76423
AW
4344 switch (ELFNN_R_TYPE (rel->r_info))
4345 {
4346 case R_RISCV_TPREL_LO12_I:
4347 rel->r_info = ELFNN_R_INFO (ELFNN_R_SYM (rel->r_info), R_RISCV_TPREL_I);
4348 return TRUE;
e23eba97 4349
45f76423
AW
4350 case R_RISCV_TPREL_LO12_S:
4351 rel->r_info = ELFNN_R_INFO (ELFNN_R_SYM (rel->r_info), R_RISCV_TPREL_S);
4352 return TRUE;
4353
4354 case R_RISCV_TPREL_HI20:
4355 case R_RISCV_TPREL_ADD:
4356 /* We can delete the unnecessary instruction and reloc. */
4357 rel->r_info = ELFNN_R_INFO (0, R_RISCV_NONE);
4358 *again = TRUE;
7f02625e 4359 return riscv_relax_delete_bytes (abfd, sec, rel->r_offset, 4, link_info);
45f76423
AW
4360
4361 default:
4362 abort ();
4363 }
e23eba97
NC
4364}
4365
4366/* Implement R_RISCV_ALIGN by deleting excess alignment NOPs. */
4367
4368static bfd_boolean
4369_bfd_riscv_relax_align (bfd *abfd, asection *sec,
9eb7b0ac 4370 asection *sym_sec,
7f02625e 4371 struct bfd_link_info *link_info,
e23eba97
NC
4372 Elf_Internal_Rela *rel,
4373 bfd_vma symval,
45f76423
AW
4374 bfd_vma max_alignment ATTRIBUTE_UNUSED,
4375 bfd_vma reserve_size ATTRIBUTE_UNUSED,
9d06997a 4376 bfd_boolean *again ATTRIBUTE_UNUSED,
9d1da81b
JW
4377 riscv_pcgp_relocs *pcrel_relocs ATTRIBUTE_UNUSED,
4378 bfd_boolean undefined_weak ATTRIBUTE_UNUSED)
e23eba97
NC
4379{
4380 bfd_byte *contents = elf_section_data (sec)->this_hdr.contents;
4381 bfd_vma alignment = 1, pos;
4382 while (alignment <= rel->r_addend)
4383 alignment *= 2;
4384
4385 symval -= rel->r_addend;
4386 bfd_vma aligned_addr = ((symval - 1) & ~(alignment - 1)) + alignment;
4387 bfd_vma nop_bytes = aligned_addr - symval;
4388
4389 /* Once we've handled an R_RISCV_ALIGN, we can't relax anything else. */
4390 sec->sec_flg0 = TRUE;
4391
4392 /* Make sure there are enough NOPs to actually achieve the alignment. */
4393 if (rel->r_addend < nop_bytes)
9eb7b0ac 4394 {
f2b740ac
AM
4395 _bfd_error_handler
4396 (_("%pB(%pA+%#" PRIx64 "): %" PRId64 " bytes required for alignment "
4397 "to %" PRId64 "-byte boundary, but only %" PRId64 " present"),
4398 abfd, sym_sec, (uint64_t) rel->r_offset,
4399 (int64_t) nop_bytes, (int64_t) alignment, (int64_t) rel->r_addend);
9eb7b0ac
PD
4400 bfd_set_error (bfd_error_bad_value);
4401 return FALSE;
4402 }
e23eba97
NC
4403
4404 /* Delete the reloc. */
4405 rel->r_info = ELFNN_R_INFO (0, R_RISCV_NONE);
4406
4407 /* If the number of NOPs is already correct, there's nothing to do. */
4408 if (nop_bytes == rel->r_addend)
4409 return TRUE;
4410
4411 /* Write as many RISC-V NOPs as we need. */
4412 for (pos = 0; pos < (nop_bytes & -4); pos += 4)
fbc09e7a 4413 bfd_putl32 (RISCV_NOP, contents + rel->r_offset + pos);
e23eba97
NC
4414
4415 /* Write a final RVC NOP if need be. */
4416 if (nop_bytes % 4 != 0)
fbc09e7a 4417 bfd_putl16 (RVC_NOP, contents + rel->r_offset + pos);
e23eba97
NC
4418
4419 /* Delete the excess bytes. */
4420 return riscv_relax_delete_bytes (abfd, sec, rel->r_offset + nop_bytes,
7f02625e 4421 rel->r_addend - nop_bytes, link_info);
e23eba97
NC
4422}
4423
ff6f4d9b
PD
4424/* Relax PC-relative references to GP-relative references. */
4425
9d06997a 4426static bfd_boolean
5f9aecea 4427_bfd_riscv_relax_pc (bfd *abfd ATTRIBUTE_UNUSED,
9d06997a
PD
4428 asection *sec,
4429 asection *sym_sec,
4430 struct bfd_link_info *link_info,
4431 Elf_Internal_Rela *rel,
4432 bfd_vma symval,
4433 bfd_vma max_alignment,
4434 bfd_vma reserve_size,
4435 bfd_boolean *again ATTRIBUTE_UNUSED,
9d1da81b
JW
4436 riscv_pcgp_relocs *pcgp_relocs,
4437 bfd_boolean undefined_weak)
9d06997a 4438{
9d1da81b 4439 bfd_byte *contents = elf_section_data (sec)->this_hdr.contents;
9d06997a
PD
4440 bfd_vma gp = riscv_global_pointer_value (link_info);
4441
4442 BFD_ASSERT (rel->r_offset + 4 <= sec->size);
4443
4444 /* Chain the _LO relocs to their cooresponding _HI reloc to compute the
dcd709e0 4445 actual target address. */
e65b1a78
MR
4446 riscv_pcgp_hi_reloc hi_reloc;
4447 memset (&hi_reloc, 0, sizeof (hi_reloc));
9d06997a
PD
4448 switch (ELFNN_R_TYPE (rel->r_info))
4449 {
4450 case R_RISCV_PCREL_LO12_I:
4451 case R_RISCV_PCREL_LO12_S:
4452 {
a05f27b6
JW
4453 /* If the %lo has an addend, it isn't for the label pointing at the
4454 hi part instruction, but rather for the symbol pointed at by the
4455 hi part instruction. So we must subtract it here for the lookup.
4456 It is still used below in the final symbol address. */
4457 bfd_vma hi_sec_off = symval - sec_addr (sym_sec) - rel->r_addend;
9d06997a 4458 riscv_pcgp_hi_reloc *hi = riscv_find_pcgp_hi_reloc (pcgp_relocs,
a05f27b6 4459 hi_sec_off);
9d06997a
PD
4460 if (hi == NULL)
4461 {
a05f27b6 4462 riscv_record_pcgp_lo_reloc (pcgp_relocs, hi_sec_off);
9d06997a
PD
4463 return TRUE;
4464 }
4465
4466 hi_reloc = *hi;
4467 symval = hi_reloc.hi_addr;
4468 sym_sec = hi_reloc.sym_sec;
9d1da81b
JW
4469
4470 /* We can not know whether the undefined weak symbol is referenced
4471 according to the information of R_RISCV_PCREL_LO12_I/S. Therefore,
4472 we have to record the 'undefined_weak' flag when handling the
4473 corresponding R_RISCV_HI20 reloc in riscv_record_pcgp_hi_reloc. */
4474 undefined_weak = hi_reloc.undefined_weak;
9d06997a
PD
4475 }
4476 break;
4477
4478 case R_RISCV_PCREL_HI20:
4479 /* Mergeable symbols and code might later move out of range. */
9d1da81b
JW
4480 if (! undefined_weak
4481 && sym_sec->flags & (SEC_MERGE | SEC_CODE))
9d06997a
PD
4482 return TRUE;
4483
4484 /* If the cooresponding lo relocation has already been seen then it's not
dcd709e0 4485 safe to relax this relocation. */
9d06997a 4486 if (riscv_find_pcgp_lo_reloc (pcgp_relocs, rel->r_offset))
07d6d2b8 4487 return TRUE;
9d06997a
PD
4488
4489 break;
4490
4491 default:
4492 abort ();
4493 }
4494
4495 if (gp)
4496 {
507685a3
JW
4497 /* If gp and the symbol are in the same output section, which is not the
4498 abs section, then consider only that output section's alignment. */
9d06997a 4499 struct bfd_link_hash_entry *h =
507685a3
JW
4500 bfd_link_hash_lookup (link_info->hash, RISCV_GP_SYMBOL, FALSE, FALSE,
4501 TRUE);
4502 if (h->u.def.section->output_section == sym_sec->output_section
4503 && sym_sec->output_section != bfd_abs_section_ptr)
9d06997a
PD
4504 max_alignment = (bfd_vma) 1 << sym_sec->output_section->alignment_power;
4505 }
4506
4507 /* Is the reference in range of x0 or gp?
4508 Valid gp range conservatively because of alignment issue. */
9d1da81b
JW
4509 if (undefined_weak
4510 || (VALID_ITYPE_IMM (symval)
4511 || (symval >= gp
4512 && VALID_ITYPE_IMM (symval - gp + max_alignment + reserve_size))
4513 || (symval < gp
4514 && VALID_ITYPE_IMM (symval - gp - max_alignment - reserve_size))))
9d06997a
PD
4515 {
4516 unsigned sym = hi_reloc.hi_sym;
4517 switch (ELFNN_R_TYPE (rel->r_info))
4518 {
4519 case R_RISCV_PCREL_LO12_I:
9d1da81b
JW
4520 if (undefined_weak)
4521 {
4522 /* Change the RS1 to zero, and then modify the relocation
4523 type to R_RISCV_LO12_I. */
fbc09e7a 4524 bfd_vma insn = bfd_getl32 (contents + rel->r_offset);
9d1da81b 4525 insn &= ~(OP_MASK_RS1 << OP_SH_RS1);
fbc09e7a 4526 bfd_putl32 (insn, contents + rel->r_offset);
9d1da81b
JW
4527 rel->r_info = ELFNN_R_INFO (sym, R_RISCV_LO12_I);
4528 rel->r_addend = hi_reloc.hi_addend;
4529 }
4530 else
4531 {
4532 rel->r_info = ELFNN_R_INFO (sym, R_RISCV_GPREL_I);
4533 rel->r_addend += hi_reloc.hi_addend;
4534 }
5f9aecea 4535 return TRUE;
9d06997a
PD
4536
4537 case R_RISCV_PCREL_LO12_S:
9d1da81b
JW
4538 if (undefined_weak)
4539 {
4540 /* Change the RS1 to zero, and then modify the relocation
4541 type to R_RISCV_LO12_S. */
fbc09e7a 4542 bfd_vma insn = bfd_getl32 (contents + rel->r_offset);
9d1da81b 4543 insn &= ~(OP_MASK_RS1 << OP_SH_RS1);
fbc09e7a 4544 bfd_putl32 (insn, contents + rel->r_offset);
9d1da81b
JW
4545 rel->r_info = ELFNN_R_INFO (sym, R_RISCV_LO12_S);
4546 rel->r_addend = hi_reloc.hi_addend;
4547 }
4548 else
4549 {
4550 rel->r_info = ELFNN_R_INFO (sym, R_RISCV_GPREL_S);
4551 rel->r_addend += hi_reloc.hi_addend;
4552 }
5f9aecea 4553 return TRUE;
9d06997a
PD
4554
4555 case R_RISCV_PCREL_HI20:
07d6d2b8 4556 riscv_record_pcgp_hi_reloc (pcgp_relocs,
9d06997a
PD
4557 rel->r_offset,
4558 rel->r_addend,
4559 symval,
4560 ELFNN_R_SYM(rel->r_info),
9d1da81b
JW
4561 sym_sec,
4562 undefined_weak);
9d06997a
PD
4563 /* We can delete the unnecessary AUIPC and reloc. */
4564 rel->r_info = ELFNN_R_INFO (0, R_RISCV_DELETE);
4565 rel->r_addend = 4;
5f9aecea 4566 return TRUE;
9d06997a
PD
4567
4568 default:
4569 abort ();
4570 }
4571 }
4572
4573 return TRUE;
4574}
4575
dcd709e0 4576/* Delete the bytes for R_RISCV_DELETE. */
9d06997a 4577
ff6f4d9b
PD
4578static bfd_boolean
4579_bfd_riscv_relax_delete (bfd *abfd,
4580 asection *sec,
4581 asection *sym_sec ATTRIBUTE_UNUSED,
7f02625e 4582 struct bfd_link_info *link_info,
ff6f4d9b
PD
4583 Elf_Internal_Rela *rel,
4584 bfd_vma symval ATTRIBUTE_UNUSED,
4585 bfd_vma max_alignment ATTRIBUTE_UNUSED,
4586 bfd_vma reserve_size ATTRIBUTE_UNUSED,
9d06997a 4587 bfd_boolean *again ATTRIBUTE_UNUSED,
9d1da81b
JW
4588 riscv_pcgp_relocs *pcgp_relocs ATTRIBUTE_UNUSED,
4589 bfd_boolean undefined_weak ATTRIBUTE_UNUSED)
ff6f4d9b 4590{
7f02625e
JW
4591 if (!riscv_relax_delete_bytes(abfd, sec, rel->r_offset, rel->r_addend,
4592 link_info))
ff6f4d9b
PD
4593 return FALSE;
4594 rel->r_info = ELFNN_R_INFO(0, R_RISCV_NONE);
4595 return TRUE;
4596}
4597
dcd709e0
NC
4598/* Relax a section.
4599
4600 Pass 0: Shortens code sequences for LUI/CALL/TPREL relocs.
4601 Pass 1: Shortens code sequences for PCREL relocs.
4602 Pass 2: Deletes the bytes that pass 1 made obselete.
4603 Pass 3: Which cannot be disabled, handles code alignment directives. */
e23eba97
NC
4604
4605static bfd_boolean
4606_bfd_riscv_relax_section (bfd *abfd, asection *sec,
4607 struct bfd_link_info *info,
4608 bfd_boolean *again)
4609{
4610 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (abfd);
4611 struct riscv_elf_link_hash_table *htab = riscv_elf_hash_table (info);
4612 struct bfd_elf_section_data *data = elf_section_data (sec);
4613 Elf_Internal_Rela *relocs;
4614 bfd_boolean ret = FALSE;
4615 unsigned int i;
45f76423 4616 bfd_vma max_alignment, reserve_size = 0;
9d06997a 4617 riscv_pcgp_relocs pcgp_relocs;
e23eba97
NC
4618
4619 *again = FALSE;
4620
4621 if (bfd_link_relocatable (info)
4622 || sec->sec_flg0
4623 || (sec->flags & SEC_RELOC) == 0
4624 || sec->reloc_count == 0
4625 || (info->disable_target_specific_optimizations
abd20cb6 4626 && info->relax_pass < 2))
e23eba97
NC
4627 return TRUE;
4628
9d06997a
PD
4629 riscv_init_pcgp_relocs (&pcgp_relocs);
4630
e23eba97
NC
4631 /* Read this BFD's relocs if we haven't done so already. */
4632 if (data->relocs)
4633 relocs = data->relocs;
4634 else if (!(relocs = _bfd_elf_link_read_relocs (abfd, sec, NULL, NULL,
4635 info->keep_memory)))
4636 goto fail;
4637
fc3c5343
L
4638 if (htab)
4639 {
4640 max_alignment = htab->max_alignment;
4641 if (max_alignment == (bfd_vma) -1)
4642 {
4643 max_alignment = _bfd_riscv_get_max_alignment (sec);
4644 htab->max_alignment = max_alignment;
4645 }
4646 }
4647 else
4648 max_alignment = _bfd_riscv_get_max_alignment (sec);
e23eba97
NC
4649
4650 /* Examine and consider relaxing each reloc. */
4651 for (i = 0; i < sec->reloc_count; i++)
4652 {
4653 asection *sym_sec;
4654 Elf_Internal_Rela *rel = relocs + i;
45f76423 4655 relax_func_t relax_func;
e23eba97
NC
4656 int type = ELFNN_R_TYPE (rel->r_info);
4657 bfd_vma symval;
04b865dc 4658 char symtype;
9d1da81b 4659 bfd_boolean undefined_weak = FALSE;
e23eba97 4660
ff6f4d9b 4661 relax_func = NULL;
e23eba97
NC
4662 if (info->relax_pass == 0)
4663 {
abd20cb6
NC
4664 if (type == R_RISCV_CALL
4665 || type == R_RISCV_CALL_PLT)
e23eba97
NC
4666 relax_func = _bfd_riscv_relax_call;
4667 else if (type == R_RISCV_HI20
4668 || type == R_RISCV_LO12_I
4669 || type == R_RISCV_LO12_S)
4670 relax_func = _bfd_riscv_relax_lui;
45f76423
AW
4671 else if (type == R_RISCV_TPREL_HI20
4672 || type == R_RISCV_TPREL_ADD
4673 || type == R_RISCV_TPREL_LO12_I
4674 || type == R_RISCV_TPREL_LO12_S)
e23eba97 4675 relax_func = _bfd_riscv_relax_tls_le;
45f76423
AW
4676 else
4677 continue;
abd20cb6
NC
4678 }
4679 else if (info->relax_pass == 1
4680 && !bfd_link_pic(info)
4681 && (type == R_RISCV_PCREL_HI20
4682 || type == R_RISCV_PCREL_LO12_I
4683 || type == R_RISCV_PCREL_LO12_S))
4684 relax_func = _bfd_riscv_relax_pc;
4685 else if (info->relax_pass == 2 && type == R_RISCV_DELETE)
4686 relax_func = _bfd_riscv_relax_delete;
4687 else if (info->relax_pass == 3 && type == R_RISCV_ALIGN)
4688 relax_func = _bfd_riscv_relax_align;
4689 else
4690 continue;
45f76423 4691
abd20cb6
NC
4692 if (info->relax_pass < 2)
4693 {
45f76423
AW
4694 /* Only relax this reloc if it is paired with R_RISCV_RELAX. */
4695 if (i == sec->reloc_count - 1
4696 || ELFNN_R_TYPE ((rel + 1)->r_info) != R_RISCV_RELAX
4697 || rel->r_offset != (rel + 1)->r_offset)
4698 continue;
4699
4700 /* Skip over the R_RISCV_RELAX. */
4701 i++;
e23eba97 4702 }
e23eba97
NC
4703
4704 data->relocs = relocs;
4705
4706 /* Read this BFD's contents if we haven't done so already. */
4707 if (!data->this_hdr.contents
4708 && !bfd_malloc_and_get_section (abfd, sec, &data->this_hdr.contents))
4709 goto fail;
4710
4711 /* Read this BFD's symbols if we haven't done so already. */
4712 if (symtab_hdr->sh_info != 0
4713 && !symtab_hdr->contents
4714 && !(symtab_hdr->contents =
4715 (unsigned char *) bfd_elf_get_elf_syms (abfd, symtab_hdr,
4716 symtab_hdr->sh_info,
4717 0, NULL, NULL, NULL)))
4718 goto fail;
4719
4720 /* Get the value of the symbol referred to by the reloc. */
4721 if (ELFNN_R_SYM (rel->r_info) < symtab_hdr->sh_info)
4722 {
4723 /* A local symbol. */
4724 Elf_Internal_Sym *isym = ((Elf_Internal_Sym *) symtab_hdr->contents
4725 + ELFNN_R_SYM (rel->r_info));
45f76423
AW
4726 reserve_size = (isym->st_size - rel->r_addend) > isym->st_size
4727 ? 0 : isym->st_size - rel->r_addend;
e23eba97 4728
02dd9d25
NC
4729 /* Relocate against local STT_GNU_IFUNC symbol. we have created
4730 a fake global symbol entry for this, so deal with the local ifunc
4731 as a global. */
4732 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
4733 continue;
4734
e23eba97 4735 if (isym->st_shndx == SHN_UNDEF)
04b865dc 4736 sym_sec = sec, symval = rel->r_offset;
e23eba97
NC
4737 else
4738 {
4739 BFD_ASSERT (isym->st_shndx < elf_numsections (abfd));
4740 sym_sec = elf_elfsections (abfd)[isym->st_shndx]->bfd_section;
09ca4b9d
JW
4741#if 0
4742 /* The purpose of this code is unknown. It breaks linker scripts
4743 for embedded development that place sections at address zero.
4744 This code is believed to be unnecessary. Disabling it but not
4745 yet removing it, in case something breaks. */
e23eba97
NC
4746 if (sec_addr (sym_sec) == 0)
4747 continue;
09ca4b9d 4748#endif
04b865dc 4749 symval = isym->st_value;
e23eba97 4750 }
04b865dc 4751 symtype = ELF_ST_TYPE (isym->st_info);
e23eba97
NC
4752 }
4753 else
4754 {
4755 unsigned long indx;
4756 struct elf_link_hash_entry *h;
4757
4758 indx = ELFNN_R_SYM (rel->r_info) - symtab_hdr->sh_info;
4759 h = elf_sym_hashes (abfd)[indx];
4760
4761 while (h->root.type == bfd_link_hash_indirect
4762 || h->root.type == bfd_link_hash_warning)
4763 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4764
02dd9d25
NC
4765 /* Disable the relaxation for ifunc. */
4766 if (h != NULL && h->type == STT_GNU_IFUNC)
4767 continue;
4768
9d1da81b
JW
4769 if (h->root.type == bfd_link_hash_undefweak
4770 && (relax_func == _bfd_riscv_relax_lui
4771 || relax_func == _bfd_riscv_relax_pc))
4772 {
4773 /* For the lui and auipc relaxations, since the symbol
4774 value of an undefined weak symbol is always be zero,
4775 we can optimize the patterns into a single LI/MV/ADDI
4776 instruction.
4777
4778 Note that, creating shared libraries and pie output may
4779 break the rule above. Fortunately, since we do not relax
4780 pc relocs when creating shared libraries and pie output,
4781 and the absolute address access for R_RISCV_HI20 isn't
4782 allowed when "-fPIC" is set, the problem of creating shared
4783 libraries can not happen currently. Once we support the
4784 auipc relaxations when creating shared libraries, then we will
4785 need the more rigorous checking for this optimization. */
4786 undefined_weak = TRUE;
4787 }
4788
85f78364
JW
4789 /* This line has to match the check in riscv_elf_relocate_section
4790 in the R_RISCV_CALL[_PLT] case. */
4791 if (bfd_link_pic (info) && h->plt.offset != MINUS_ONE)
04b865dc
JW
4792 {
4793 sym_sec = htab->elf.splt;
4794 symval = h->plt.offset;
4795 }
9d1da81b
JW
4796 else if (undefined_weak)
4797 {
4798 symval = 0;
4799 sym_sec = bfd_und_section_ptr;
4800 }
a2714d6c
AM
4801 else if ((h->root.type == bfd_link_hash_defined
4802 || h->root.type == bfd_link_hash_defweak)
4803 && h->root.u.def.section != NULL
4804 && h->root.u.def.section->output_section != NULL)
04b865dc
JW
4805 {
4806 symval = h->root.u.def.value;
4807 sym_sec = h->root.u.def.section;
4808 }
a2714d6c
AM
4809 else
4810 continue;
e23eba97 4811
45f76423
AW
4812 if (h->type != STT_FUNC)
4813 reserve_size =
4814 (h->size - rel->r_addend) > h->size ? 0 : h->size - rel->r_addend;
04b865dc 4815 symtype = h->type;
e23eba97
NC
4816 }
4817
04b865dc
JW
4818 if (sym_sec->sec_info_type == SEC_INFO_TYPE_MERGE
4819 && (sym_sec->flags & SEC_MERGE))
4820 {
4821 /* At this stage in linking, no SEC_MERGE symbol has been
4822 adjusted, so all references to such symbols need to be
4823 passed through _bfd_merged_section_offset. (Later, in
4824 relocate_section, all SEC_MERGE symbols *except* for
4825 section symbols have been adjusted.)
4826
4827 gas may reduce relocations against symbols in SEC_MERGE
4828 sections to a relocation against the section symbol when
4829 the original addend was zero. When the reloc is against
4830 a section symbol we should include the addend in the
4831 offset passed to _bfd_merged_section_offset, since the
4832 location of interest is the original symbol. On the
4833 other hand, an access to "sym+addend" where "sym" is not
4834 a section symbol should not include the addend; Such an
4835 access is presumed to be an offset from "sym"; The
4836 location of interest is just "sym". */
4837 if (symtype == STT_SECTION)
4838 symval += rel->r_addend;
4839
4840 symval = _bfd_merged_section_offset (abfd, &sym_sec,
4841 elf_section_data (sym_sec)->sec_info,
4842 symval);
4843
4844 if (symtype != STT_SECTION)
4845 symval += rel->r_addend;
4846 }
4847 else
4848 symval += rel->r_addend;
4849
4850 symval += sec_addr (sym_sec);
e23eba97
NC
4851
4852 if (!relax_func (abfd, sec, sym_sec, info, rel, symval,
9d06997a 4853 max_alignment, reserve_size, again,
9d1da81b 4854 &pcgp_relocs, undefined_weak))
e23eba97
NC
4855 goto fail;
4856 }
4857
4858 ret = TRUE;
4859
dc1e8a47 4860 fail:
e23eba97
NC
4861 if (relocs != data->relocs)
4862 free (relocs);
9d06997a 4863 riscv_free_pcgp_relocs(&pcgp_relocs, abfd, sec);
e23eba97
NC
4864
4865 return ret;
4866}
4867
4868#if ARCH_SIZE == 32
79b8e8ab 4869# define PRSTATUS_SIZE 204
e23eba97
NC
4870# define PRSTATUS_OFFSET_PR_CURSIG 12
4871# define PRSTATUS_OFFSET_PR_PID 24
4872# define PRSTATUS_OFFSET_PR_REG 72
4873# define ELF_GREGSET_T_SIZE 128
4874# define PRPSINFO_SIZE 128
4875# define PRPSINFO_OFFSET_PR_PID 16
4876# define PRPSINFO_OFFSET_PR_FNAME 32
4877# define PRPSINFO_OFFSET_PR_PSARGS 48
4878#else
4879# define PRSTATUS_SIZE 376
4880# define PRSTATUS_OFFSET_PR_CURSIG 12
4881# define PRSTATUS_OFFSET_PR_PID 32
4882# define PRSTATUS_OFFSET_PR_REG 112
4883# define ELF_GREGSET_T_SIZE 256
4884# define PRPSINFO_SIZE 136
4885# define PRPSINFO_OFFSET_PR_PID 24
4886# define PRPSINFO_OFFSET_PR_FNAME 40
4887# define PRPSINFO_OFFSET_PR_PSARGS 56
4888#endif
4889
4890/* Support for core dump NOTE sections. */
4891
4892static bfd_boolean
4893riscv_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
4894{
4895 switch (note->descsz)
4896 {
4897 default:
4898 return FALSE;
4899
dcd709e0 4900 case PRSTATUS_SIZE: /* sizeof(struct elf_prstatus) on Linux/RISC-V. */
e23eba97
NC
4901 /* pr_cursig */
4902 elf_tdata (abfd)->core->signal
4903 = bfd_get_16 (abfd, note->descdata + PRSTATUS_OFFSET_PR_CURSIG);
4904
4905 /* pr_pid */
4906 elf_tdata (abfd)->core->lwpid
4907 = bfd_get_32 (abfd, note->descdata + PRSTATUS_OFFSET_PR_PID);
4908 break;
4909 }
4910
4911 /* Make a ".reg/999" section. */
4912 return _bfd_elfcore_make_pseudosection (abfd, ".reg", ELF_GREGSET_T_SIZE,
4913 note->descpos + PRSTATUS_OFFSET_PR_REG);
4914}
4915
4916static bfd_boolean
4917riscv_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
4918{
4919 switch (note->descsz)
4920 {
4921 default:
4922 return FALSE;
4923
4924 case PRPSINFO_SIZE: /* sizeof(struct elf_prpsinfo) on Linux/RISC-V. */
4925 /* pr_pid */
4926 elf_tdata (abfd)->core->pid
4927 = bfd_get_32 (abfd, note->descdata + PRPSINFO_OFFSET_PR_PID);
4928
4929 /* pr_fname */
4930 elf_tdata (abfd)->core->program = _bfd_elfcore_strndup
4931 (abfd, note->descdata + PRPSINFO_OFFSET_PR_FNAME, 16);
4932
4933 /* pr_psargs */
4934 elf_tdata (abfd)->core->command = _bfd_elfcore_strndup
4935 (abfd, note->descdata + PRPSINFO_OFFSET_PR_PSARGS, 80);
4936 break;
4937 }
4938
4939 /* Note that for some reason, a spurious space is tacked
4940 onto the end of the args in some (at least one anyway)
4941 implementations, so strip it off if it exists. */
4942
4943 {
4944 char *command = elf_tdata (abfd)->core->command;
4945 int n = strlen (command);
4946
4947 if (0 < n && command[n - 1] == ' ')
4948 command[n - 1] = '\0';
4949 }
4950
4951 return TRUE;
4952}
4953
640d6bfd 4954/* Set the right mach type. */
dcd709e0 4955
640d6bfd
KLC
4956static bfd_boolean
4957riscv_elf_object_p (bfd *abfd)
4958{
4959 /* There are only two mach types in RISCV currently. */
fbc09e7a
MC
4960 if (strcmp (abfd->xvec->name, "elf32-littleriscv") == 0
4961 || strcmp (abfd->xvec->name, "elf32-bigriscv") == 0)
640d6bfd
KLC
4962 bfd_default_set_arch_mach (abfd, bfd_arch_riscv, bfd_mach_riscv32);
4963 else
4964 bfd_default_set_arch_mach (abfd, bfd_arch_riscv, bfd_mach_riscv64);
4965
4966 return TRUE;
4967}
4968
2dc8dd17
JW
4969/* Determine whether an object attribute tag takes an integer, a
4970 string or both. */
4971
4972static int
4973riscv_elf_obj_attrs_arg_type (int tag)
4974{
4975 return (tag & 1) != 0 ? ATTR_TYPE_FLAG_STR_VAL : ATTR_TYPE_FLAG_INT_VAL;
4976}
e23eba97
NC
4977
4978#define TARGET_LITTLE_SYM riscv_elfNN_vec
4979#define TARGET_LITTLE_NAME "elfNN-littleriscv"
fbc09e7a
MC
4980#define TARGET_BIG_SYM riscv_elfNN_be_vec
4981#define TARGET_BIG_NAME "elfNN-bigriscv"
e23eba97
NC
4982
4983#define elf_backend_reloc_type_class riscv_reloc_type_class
4984
4985#define bfd_elfNN_bfd_reloc_name_lookup riscv_reloc_name_lookup
4986#define bfd_elfNN_bfd_link_hash_table_create riscv_elf_link_hash_table_create
4987#define bfd_elfNN_bfd_reloc_type_lookup riscv_reloc_type_lookup
4988#define bfd_elfNN_bfd_merge_private_bfd_data \
4989 _bfd_riscv_elf_merge_private_bfd_data
4990
4991#define elf_backend_copy_indirect_symbol riscv_elf_copy_indirect_symbol
4992#define elf_backend_create_dynamic_sections riscv_elf_create_dynamic_sections
4993#define elf_backend_check_relocs riscv_elf_check_relocs
4994#define elf_backend_adjust_dynamic_symbol riscv_elf_adjust_dynamic_symbol
4995#define elf_backend_size_dynamic_sections riscv_elf_size_dynamic_sections
4996#define elf_backend_relocate_section riscv_elf_relocate_section
4997#define elf_backend_finish_dynamic_symbol riscv_elf_finish_dynamic_symbol
4998#define elf_backend_finish_dynamic_sections riscv_elf_finish_dynamic_sections
4999#define elf_backend_gc_mark_hook riscv_elf_gc_mark_hook
e23eba97 5000#define elf_backend_plt_sym_val riscv_elf_plt_sym_val
07d6d2b8
AM
5001#define elf_backend_grok_prstatus riscv_elf_grok_prstatus
5002#define elf_backend_grok_psinfo riscv_elf_grok_psinfo
5003#define elf_backend_object_p riscv_elf_object_p
e23eba97
NC
5004#define elf_info_to_howto_rel NULL
5005#define elf_info_to_howto riscv_info_to_howto_rela
5006#define bfd_elfNN_bfd_relax_section _bfd_riscv_relax_section
fc46e8bd 5007#define bfd_elfNN_mkobject elfNN_riscv_mkobject
e23eba97
NC
5008
5009#define elf_backend_init_index_section _bfd_elf_init_1_index_section
5010
5011#define elf_backend_can_gc_sections 1
5012#define elf_backend_can_refcount 1
5013#define elf_backend_want_got_plt 1
5014#define elf_backend_plt_readonly 1
5015#define elf_backend_plt_alignment 4
5016#define elf_backend_want_plt_sym 1
5017#define elf_backend_got_header_size (ARCH_SIZE / 8)
5474d94f 5018#define elf_backend_want_dynrelro 1
e23eba97
NC
5019#define elf_backend_rela_normal 1
5020#define elf_backend_default_execstack 0
5021
2dc8dd17
JW
5022#undef elf_backend_obj_attrs_vendor
5023#define elf_backend_obj_attrs_vendor "riscv"
5024#undef elf_backend_obj_attrs_arg_type
5025#define elf_backend_obj_attrs_arg_type riscv_elf_obj_attrs_arg_type
5026#undef elf_backend_obj_attrs_section_type
5027#define elf_backend_obj_attrs_section_type SHT_RISCV_ATTRIBUTES
5028#undef elf_backend_obj_attrs_section
5029#define elf_backend_obj_attrs_section ".riscv.attributes"
5030
e23eba97 5031#include "elfNN-target.h"