]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-arm.c
* configure.in: Clear gcc_version_trigger if the file doesn't exist.
[thirdparty/binutils-gdb.git] / bfd / elf32-arm.c
CommitLineData
252b5132 1/* 32-bit ELF support for ARM
d1f161ea
NC
2 Copyright 1998, 1999, 2000, 2001, 2002, 2003, 2004
3 Free Software Foundation, Inc.
252b5132
RH
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
20
7f266840
DJ
21#include "elf/arm.h"
22#include "bfd.h"
23#include "sysdep.h"
24#include "libbfd.h"
25#include "elf-bfd.h"
26
27#ifndef NUM_ELEM
28#define NUM_ELEM(a) (sizeof (a) / (sizeof (a)[0]))
29#endif
30
31#define USE_REL 1
32
33#define elf_info_to_howto 0
34#define elf_info_to_howto_rel elf32_arm_info_to_howto
35
36#define ARM_ELF_ABI_VERSION 0
37#define ARM_ELF_OS_ABI_VERSION ELFOSABI_ARM
38
39static reloc_howto_type * elf32_arm_reloc_type_lookup
40 PARAMS ((bfd * abfd, bfd_reloc_code_real_type code));
41static bfd_boolean elf32_arm_nabi_grok_prstatus
42 PARAMS ((bfd *abfd, Elf_Internal_Note *note));
43static bfd_boolean elf32_arm_nabi_grok_psinfo
44 PARAMS ((bfd *abfd, Elf_Internal_Note *note));
45
46/* Note: code such as elf32_arm_reloc_type_lookup expect to use e.g.
47 R_ARM_PC24 as an index into this, and find the R_ARM_PC24 HOWTO
48 in that slot. */
49
50static reloc_howto_type elf32_arm_howto_table[] =
51{
52 /* No relocation */
53 HOWTO (R_ARM_NONE, /* type */
54 0, /* rightshift */
55 0, /* size (0 = byte, 1 = short, 2 = long) */
56 0, /* bitsize */
57 FALSE, /* pc_relative */
58 0, /* bitpos */
59 complain_overflow_dont,/* complain_on_overflow */
60 bfd_elf_generic_reloc, /* special_function */
61 "R_ARM_NONE", /* name */
62 FALSE, /* partial_inplace */
63 0, /* src_mask */
64 0, /* dst_mask */
65 FALSE), /* pcrel_offset */
66
67 HOWTO (R_ARM_PC24, /* type */
68 2, /* rightshift */
69 2, /* size (0 = byte, 1 = short, 2 = long) */
70 24, /* bitsize */
71 TRUE, /* pc_relative */
72 0, /* bitpos */
73 complain_overflow_signed,/* complain_on_overflow */
74 bfd_elf_generic_reloc, /* special_function */
75 "R_ARM_PC24", /* name */
76 FALSE, /* partial_inplace */
77 0x00ffffff, /* src_mask */
78 0x00ffffff, /* dst_mask */
79 TRUE), /* pcrel_offset */
80
81 /* 32 bit absolute */
82 HOWTO (R_ARM_ABS32, /* type */
83 0, /* rightshift */
84 2, /* size (0 = byte, 1 = short, 2 = long) */
85 32, /* bitsize */
86 FALSE, /* pc_relative */
87 0, /* bitpos */
88 complain_overflow_bitfield,/* complain_on_overflow */
89 bfd_elf_generic_reloc, /* special_function */
90 "R_ARM_ABS32", /* name */
91 FALSE, /* partial_inplace */
92 0xffffffff, /* src_mask */
93 0xffffffff, /* dst_mask */
94 FALSE), /* pcrel_offset */
95
96 /* standard 32bit pc-relative reloc */
97 HOWTO (R_ARM_REL32, /* type */
98 0, /* rightshift */
99 2, /* size (0 = byte, 1 = short, 2 = long) */
100 32, /* bitsize */
101 TRUE, /* pc_relative */
102 0, /* bitpos */
103 complain_overflow_bitfield,/* complain_on_overflow */
104 bfd_elf_generic_reloc, /* special_function */
105 "R_ARM_REL32", /* name */
106 FALSE, /* partial_inplace */
107 0xffffffff, /* src_mask */
108 0xffffffff, /* dst_mask */
109 TRUE), /* pcrel_offset */
110
111 /* 8 bit absolute */
112 HOWTO (R_ARM_PC13, /* type */
113 0, /* rightshift */
114 0, /* size (0 = byte, 1 = short, 2 = long) */
115 8, /* bitsize */
116 FALSE, /* pc_relative */
117 0, /* bitpos */
118 complain_overflow_bitfield,/* complain_on_overflow */
119 bfd_elf_generic_reloc, /* special_function */
120 "R_ARM_PC13", /* name */
121 FALSE, /* partial_inplace */
122 0x000000ff, /* src_mask */
123 0x000000ff, /* dst_mask */
124 FALSE), /* pcrel_offset */
125
126 /* 16 bit absolute */
127 HOWTO (R_ARM_ABS16, /* type */
128 0, /* rightshift */
129 1, /* size (0 = byte, 1 = short, 2 = long) */
130 16, /* bitsize */
131 FALSE, /* pc_relative */
132 0, /* bitpos */
133 complain_overflow_bitfield,/* complain_on_overflow */
134 bfd_elf_generic_reloc, /* special_function */
135 "R_ARM_ABS16", /* name */
136 FALSE, /* partial_inplace */
137 0x0000ffff, /* src_mask */
138 0x0000ffff, /* dst_mask */
139 FALSE), /* pcrel_offset */
140
141 /* 12 bit absolute */
142 HOWTO (R_ARM_ABS12, /* type */
143 0, /* rightshift */
144 2, /* size (0 = byte, 1 = short, 2 = long) */
145 12, /* bitsize */
146 FALSE, /* pc_relative */
147 0, /* bitpos */
148 complain_overflow_bitfield,/* complain_on_overflow */
149 bfd_elf_generic_reloc, /* special_function */
150 "R_ARM_ABS12", /* name */
151 FALSE, /* partial_inplace */
152 0x000008ff, /* src_mask */
153 0x000008ff, /* dst_mask */
154 FALSE), /* pcrel_offset */
155
156 HOWTO (R_ARM_THM_ABS5, /* type */
157 6, /* rightshift */
158 1, /* size (0 = byte, 1 = short, 2 = long) */
159 5, /* bitsize */
160 FALSE, /* pc_relative */
161 0, /* bitpos */
162 complain_overflow_bitfield,/* complain_on_overflow */
163 bfd_elf_generic_reloc, /* special_function */
164 "R_ARM_THM_ABS5", /* name */
165 FALSE, /* partial_inplace */
166 0x000007e0, /* src_mask */
167 0x000007e0, /* dst_mask */
168 FALSE), /* pcrel_offset */
169
170 /* 8 bit absolute */
171 HOWTO (R_ARM_ABS8, /* type */
172 0, /* rightshift */
173 0, /* size (0 = byte, 1 = short, 2 = long) */
174 8, /* bitsize */
175 FALSE, /* pc_relative */
176 0, /* bitpos */
177 complain_overflow_bitfield,/* complain_on_overflow */
178 bfd_elf_generic_reloc, /* special_function */
179 "R_ARM_ABS8", /* name */
180 FALSE, /* partial_inplace */
181 0x000000ff, /* src_mask */
182 0x000000ff, /* dst_mask */
183 FALSE), /* pcrel_offset */
184
185 HOWTO (R_ARM_SBREL32, /* type */
186 0, /* rightshift */
187 2, /* size (0 = byte, 1 = short, 2 = long) */
188 32, /* bitsize */
189 FALSE, /* pc_relative */
190 0, /* bitpos */
191 complain_overflow_dont,/* complain_on_overflow */
192 bfd_elf_generic_reloc, /* special_function */
193 "R_ARM_SBREL32", /* name */
194 FALSE, /* partial_inplace */
195 0xffffffff, /* src_mask */
196 0xffffffff, /* dst_mask */
197 FALSE), /* pcrel_offset */
198
199 HOWTO (R_ARM_THM_PC22, /* type */
200 1, /* rightshift */
201 2, /* size (0 = byte, 1 = short, 2 = long) */
202 23, /* bitsize */
203 TRUE, /* pc_relative */
204 0, /* bitpos */
205 complain_overflow_signed,/* complain_on_overflow */
206 bfd_elf_generic_reloc, /* special_function */
207 "R_ARM_THM_PC22", /* name */
208 FALSE, /* partial_inplace */
209 0x07ff07ff, /* src_mask */
210 0x07ff07ff, /* dst_mask */
211 TRUE), /* pcrel_offset */
212
213 HOWTO (R_ARM_THM_PC8, /* type */
214 1, /* rightshift */
215 1, /* size (0 = byte, 1 = short, 2 = long) */
216 8, /* bitsize */
217 TRUE, /* pc_relative */
218 0, /* bitpos */
219 complain_overflow_signed,/* complain_on_overflow */
220 bfd_elf_generic_reloc, /* special_function */
221 "R_ARM_THM_PC8", /* name */
222 FALSE, /* partial_inplace */
223 0x000000ff, /* src_mask */
224 0x000000ff, /* dst_mask */
225 TRUE), /* pcrel_offset */
226
227 HOWTO (R_ARM_AMP_VCALL9, /* type */
228 1, /* rightshift */
229 1, /* size (0 = byte, 1 = short, 2 = long) */
230 8, /* bitsize */
231 TRUE, /* pc_relative */
232 0, /* bitpos */
233 complain_overflow_signed,/* complain_on_overflow */
234 bfd_elf_generic_reloc, /* special_function */
235 "R_ARM_AMP_VCALL9", /* name */
236 FALSE, /* partial_inplace */
237 0x000000ff, /* src_mask */
238 0x000000ff, /* dst_mask */
239 TRUE), /* pcrel_offset */
240
241 HOWTO (R_ARM_SWI24, /* type */
242 0, /* rightshift */
243 0, /* size (0 = byte, 1 = short, 2 = long) */
244 0, /* bitsize */
245 FALSE, /* pc_relative */
246 0, /* bitpos */
247 complain_overflow_signed,/* complain_on_overflow */
248 bfd_elf_generic_reloc, /* special_function */
249 "R_ARM_SWI24", /* name */
250 FALSE, /* partial_inplace */
251 0x00000000, /* src_mask */
252 0x00000000, /* dst_mask */
253 FALSE), /* pcrel_offset */
254
255 HOWTO (R_ARM_THM_SWI8, /* type */
256 0, /* rightshift */
257 0, /* size (0 = byte, 1 = short, 2 = long) */
258 0, /* bitsize */
259 FALSE, /* pc_relative */
260 0, /* bitpos */
261 complain_overflow_signed,/* complain_on_overflow */
262 bfd_elf_generic_reloc, /* special_function */
263 "R_ARM_SWI8", /* name */
264 FALSE, /* partial_inplace */
265 0x00000000, /* src_mask */
266 0x00000000, /* dst_mask */
267 FALSE), /* pcrel_offset */
268
269 /* BLX instruction for the ARM. */
270 HOWTO (R_ARM_XPC25, /* type */
271 2, /* rightshift */
272 2, /* size (0 = byte, 1 = short, 2 = long) */
273 25, /* bitsize */
274 TRUE, /* pc_relative */
275 0, /* bitpos */
276 complain_overflow_signed,/* complain_on_overflow */
277 bfd_elf_generic_reloc, /* special_function */
278 "R_ARM_XPC25", /* name */
279 FALSE, /* partial_inplace */
280 0x00ffffff, /* src_mask */
281 0x00ffffff, /* dst_mask */
282 TRUE), /* pcrel_offset */
283
284 /* BLX instruction for the Thumb. */
285 HOWTO (R_ARM_THM_XPC22, /* type */
286 2, /* rightshift */
287 2, /* size (0 = byte, 1 = short, 2 = long) */
288 22, /* bitsize */
289 TRUE, /* pc_relative */
290 0, /* bitpos */
291 complain_overflow_signed,/* complain_on_overflow */
292 bfd_elf_generic_reloc, /* special_function */
293 "R_ARM_THM_XPC22", /* name */
294 FALSE, /* partial_inplace */
295 0x07ff07ff, /* src_mask */
296 0x07ff07ff, /* dst_mask */
297 TRUE), /* pcrel_offset */
298
299 /* These next three relocs are not defined, but we need to fill the space. */
300
301 HOWTO (R_ARM_NONE, /* type */
302 0, /* rightshift */
303 0, /* size (0 = byte, 1 = short, 2 = long) */
304 0, /* bitsize */
305 FALSE, /* pc_relative */
306 0, /* bitpos */
307 complain_overflow_dont,/* complain_on_overflow */
308 bfd_elf_generic_reloc, /* special_function */
309 "R_ARM_unknown_17", /* name */
310 FALSE, /* partial_inplace */
311 0, /* src_mask */
312 0, /* dst_mask */
313 FALSE), /* pcrel_offset */
314
315 HOWTO (R_ARM_NONE, /* type */
316 0, /* rightshift */
317 0, /* size (0 = byte, 1 = short, 2 = long) */
318 0, /* bitsize */
319 FALSE, /* pc_relative */
320 0, /* bitpos */
321 complain_overflow_dont,/* complain_on_overflow */
322 bfd_elf_generic_reloc, /* special_function */
323 "R_ARM_unknown_18", /* name */
324 FALSE, /* partial_inplace */
325 0, /* src_mask */
326 0, /* dst_mask */
327 FALSE), /* pcrel_offset */
328
329 HOWTO (R_ARM_NONE, /* type */
330 0, /* rightshift */
331 0, /* size (0 = byte, 1 = short, 2 = long) */
332 0, /* bitsize */
333 FALSE, /* pc_relative */
334 0, /* bitpos */
335 complain_overflow_dont,/* complain_on_overflow */
336 bfd_elf_generic_reloc, /* special_function */
337 "R_ARM_unknown_19", /* name */
338 FALSE, /* partial_inplace */
339 0, /* src_mask */
340 0, /* dst_mask */
341 FALSE), /* pcrel_offset */
342
343 /* Relocs used in ARM Linux */
344
345 HOWTO (R_ARM_COPY, /* type */
346 0, /* rightshift */
347 2, /* size (0 = byte, 1 = short, 2 = long) */
348 32, /* bitsize */
349 FALSE, /* pc_relative */
350 0, /* bitpos */
351 complain_overflow_bitfield,/* complain_on_overflow */
352 bfd_elf_generic_reloc, /* special_function */
353 "R_ARM_COPY", /* name */
354 TRUE, /* partial_inplace */
355 0xffffffff, /* src_mask */
356 0xffffffff, /* dst_mask */
357 FALSE), /* pcrel_offset */
358
359 HOWTO (R_ARM_GLOB_DAT, /* type */
360 0, /* rightshift */
361 2, /* size (0 = byte, 1 = short, 2 = long) */
362 32, /* bitsize */
363 FALSE, /* pc_relative */
364 0, /* bitpos */
365 complain_overflow_bitfield,/* complain_on_overflow */
366 bfd_elf_generic_reloc, /* special_function */
367 "R_ARM_GLOB_DAT", /* name */
368 TRUE, /* partial_inplace */
369 0xffffffff, /* src_mask */
370 0xffffffff, /* dst_mask */
371 FALSE), /* pcrel_offset */
372
373 HOWTO (R_ARM_JUMP_SLOT, /* type */
374 0, /* rightshift */
375 2, /* size (0 = byte, 1 = short, 2 = long) */
376 32, /* bitsize */
377 FALSE, /* pc_relative */
378 0, /* bitpos */
379 complain_overflow_bitfield,/* complain_on_overflow */
380 bfd_elf_generic_reloc, /* special_function */
381 "R_ARM_JUMP_SLOT", /* name */
382 TRUE, /* partial_inplace */
383 0xffffffff, /* src_mask */
384 0xffffffff, /* dst_mask */
385 FALSE), /* pcrel_offset */
386
387 HOWTO (R_ARM_RELATIVE, /* type */
388 0, /* rightshift */
389 2, /* size (0 = byte, 1 = short, 2 = long) */
390 32, /* bitsize */
391 FALSE, /* pc_relative */
392 0, /* bitpos */
393 complain_overflow_bitfield,/* complain_on_overflow */
394 bfd_elf_generic_reloc, /* special_function */
395 "R_ARM_RELATIVE", /* name */
396 TRUE, /* partial_inplace */
397 0xffffffff, /* src_mask */
398 0xffffffff, /* dst_mask */
399 FALSE), /* pcrel_offset */
400
401 HOWTO (R_ARM_GOTOFF, /* type */
402 0, /* rightshift */
403 2, /* size (0 = byte, 1 = short, 2 = long) */
404 32, /* bitsize */
405 FALSE, /* pc_relative */
406 0, /* bitpos */
407 complain_overflow_bitfield,/* complain_on_overflow */
408 bfd_elf_generic_reloc, /* special_function */
409 "R_ARM_GOTOFF", /* name */
410 TRUE, /* partial_inplace */
411 0xffffffff, /* src_mask */
412 0xffffffff, /* dst_mask */
413 FALSE), /* pcrel_offset */
414
415 HOWTO (R_ARM_GOTPC, /* type */
416 0, /* rightshift */
417 2, /* size (0 = byte, 1 = short, 2 = long) */
418 32, /* bitsize */
419 TRUE, /* pc_relative */
420 0, /* bitpos */
421 complain_overflow_bitfield,/* complain_on_overflow */
422 bfd_elf_generic_reloc, /* special_function */
423 "R_ARM_GOTPC", /* name */
424 TRUE, /* partial_inplace */
425 0xffffffff, /* src_mask */
426 0xffffffff, /* dst_mask */
427 TRUE), /* pcrel_offset */
428
429 HOWTO (R_ARM_GOT32, /* type */
430 0, /* rightshift */
431 2, /* size (0 = byte, 1 = short, 2 = long) */
432 32, /* bitsize */
433 FALSE, /* pc_relative */
434 0, /* bitpos */
435 complain_overflow_bitfield,/* complain_on_overflow */
436 bfd_elf_generic_reloc, /* special_function */
437 "R_ARM_GOT32", /* name */
438 TRUE, /* partial_inplace */
439 0xffffffff, /* src_mask */
440 0xffffffff, /* dst_mask */
441 FALSE), /* pcrel_offset */
442
443 HOWTO (R_ARM_PLT32, /* type */
444 2, /* rightshift */
445 2, /* size (0 = byte, 1 = short, 2 = long) */
446 26, /* bitsize */
447 TRUE, /* pc_relative */
448 0, /* bitpos */
449 complain_overflow_bitfield,/* complain_on_overflow */
450 bfd_elf_generic_reloc, /* special_function */
451 "R_ARM_PLT32", /* name */
452 TRUE, /* partial_inplace */
453 0x00ffffff, /* src_mask */
454 0x00ffffff, /* dst_mask */
455 TRUE), /* pcrel_offset */
456
457 HOWTO (R_ARM_CALL, /* type */
458 2, /* rightshift */
459 2, /* size (0 = byte, 1 = short, 2 = long) */
460 24, /* bitsize */
461 TRUE, /* pc_relative */
462 0, /* bitpos */
463 complain_overflow_signed,/* complain_on_overflow */
464 bfd_elf_generic_reloc, /* special_function */
465 "R_ARM_CALL", /* name */
466 FALSE, /* partial_inplace */
467 0x00ffffff, /* src_mask */
468 0x00ffffff, /* dst_mask */
469 TRUE), /* pcrel_offset */
470
471 HOWTO (R_ARM_JUMP24, /* type */
472 2, /* rightshift */
473 2, /* size (0 = byte, 1 = short, 2 = long) */
474 24, /* bitsize */
475 TRUE, /* pc_relative */
476 0, /* bitpos */
477 complain_overflow_signed,/* complain_on_overflow */
478 bfd_elf_generic_reloc, /* special_function */
479 "R_ARM_JUMP24", /* name */
480 FALSE, /* partial_inplace */
481 0x00ffffff, /* src_mask */
482 0x00ffffff, /* dst_mask */
483 TRUE), /* pcrel_offset */
484
485 HOWTO (R_ARM_NONE, /* type */
486 0, /* rightshift */
487 0, /* size (0 = byte, 1 = short, 2 = long) */
488 0, /* bitsize */
489 FALSE, /* pc_relative */
490 0, /* bitpos */
491 complain_overflow_dont,/* complain_on_overflow */
492 bfd_elf_generic_reloc, /* special_function */
493 "R_ARM_unknown_30", /* name */
494 FALSE, /* partial_inplace */
495 0, /* src_mask */
496 0, /* dst_mask */
497 FALSE), /* pcrel_offset */
498
499 HOWTO (R_ARM_NONE, /* type */
500 0, /* rightshift */
501 0, /* size (0 = byte, 1 = short, 2 = long) */
502 0, /* bitsize */
503 FALSE, /* pc_relative */
504 0, /* bitpos */
505 complain_overflow_dont,/* complain_on_overflow */
506 bfd_elf_generic_reloc, /* special_function */
507 "R_ARM_unknown_31", /* name */
508 FALSE, /* partial_inplace */
509 0, /* src_mask */
510 0, /* dst_mask */
511 FALSE), /* pcrel_offset */
512
513 HOWTO (R_ARM_ALU_PCREL7_0, /* type */
514 0, /* rightshift */
515 2, /* size (0 = byte, 1 = short, 2 = long) */
516 12, /* bitsize */
517 TRUE, /* pc_relative */
518 0, /* bitpos */
519 complain_overflow_dont,/* complain_on_overflow */
520 bfd_elf_generic_reloc, /* special_function */
521 "R_ARM_ALU_PCREL_7_0", /* name */
522 FALSE, /* partial_inplace */
523 0x00000fff, /* src_mask */
524 0x00000fff, /* dst_mask */
525 TRUE), /* pcrel_offset */
526
527 HOWTO (R_ARM_ALU_PCREL15_8, /* type */
528 0, /* rightshift */
529 2, /* size (0 = byte, 1 = short, 2 = long) */
530 12, /* bitsize */
531 TRUE, /* pc_relative */
532 8, /* bitpos */
533 complain_overflow_dont,/* complain_on_overflow */
534 bfd_elf_generic_reloc, /* special_function */
535 "R_ARM_ALU_PCREL_15_8",/* name */
536 FALSE, /* partial_inplace */
537 0x00000fff, /* src_mask */
538 0x00000fff, /* dst_mask */
539 TRUE), /* pcrel_offset */
540
541 HOWTO (R_ARM_ALU_PCREL23_15, /* type */
542 0, /* rightshift */
543 2, /* size (0 = byte, 1 = short, 2 = long) */
544 12, /* bitsize */
545 TRUE, /* pc_relative */
546 16, /* bitpos */
547 complain_overflow_dont,/* complain_on_overflow */
548 bfd_elf_generic_reloc, /* special_function */
549 "R_ARM_ALU_PCREL_23_15",/* name */
550 FALSE, /* partial_inplace */
551 0x00000fff, /* src_mask */
552 0x00000fff, /* dst_mask */
553 TRUE), /* pcrel_offset */
554
555 HOWTO (R_ARM_LDR_SBREL_11_0, /* type */
556 0, /* rightshift */
557 2, /* size (0 = byte, 1 = short, 2 = long) */
558 12, /* bitsize */
559 FALSE, /* pc_relative */
560 0, /* bitpos */
561 complain_overflow_dont,/* complain_on_overflow */
562 bfd_elf_generic_reloc, /* special_function */
563 "R_ARM_LDR_SBREL_11_0",/* name */
564 FALSE, /* partial_inplace */
565 0x00000fff, /* src_mask */
566 0x00000fff, /* dst_mask */
567 FALSE), /* pcrel_offset */
568
569 HOWTO (R_ARM_ALU_SBREL_19_12, /* type */
570 0, /* rightshift */
571 2, /* size (0 = byte, 1 = short, 2 = long) */
572 8, /* bitsize */
573 FALSE, /* pc_relative */
574 12, /* bitpos */
575 complain_overflow_dont,/* complain_on_overflow */
576 bfd_elf_generic_reloc, /* special_function */
577 "R_ARM_ALU_SBREL_19_12",/* name */
578 FALSE, /* partial_inplace */
579 0x000ff000, /* src_mask */
580 0x000ff000, /* dst_mask */
581 FALSE), /* pcrel_offset */
582
583 HOWTO (R_ARM_ALU_SBREL_27_20, /* type */
584 0, /* rightshift */
585 2, /* size (0 = byte, 1 = short, 2 = long) */
586 8, /* bitsize */
587 FALSE, /* pc_relative */
588 20, /* bitpos */
589 complain_overflow_dont,/* complain_on_overflow */
590 bfd_elf_generic_reloc, /* special_function */
591 "R_ARM_ALU_SBREL_27_20",/* name */
592 FALSE, /* partial_inplace */
593 0x0ff00000, /* src_mask */
594 0x0ff00000, /* dst_mask */
595 FALSE), /* pcrel_offset */
596
597 HOWTO (R_ARM_TARGET1, /* type */
598 0, /* rightshift */
599 2, /* size (0 = byte, 1 = short, 2 = long) */
600 32, /* bitsize */
601 FALSE, /* pc_relative */
602 0, /* bitpos */
603 complain_overflow_dont,/* complain_on_overflow */
604 bfd_elf_generic_reloc, /* special_function */
605 "R_ARM_TARGET1", /* name */
606 FALSE, /* partial_inplace */
607 0xffffffff, /* src_mask */
608 0xffffffff, /* dst_mask */
609 FALSE), /* pcrel_offset */
610
611 HOWTO (R_ARM_ROSEGREL32, /* type */
612 0, /* rightshift */
613 2, /* size (0 = byte, 1 = short, 2 = long) */
614 32, /* bitsize */
615 FALSE, /* pc_relative */
616 0, /* bitpos */
617 complain_overflow_dont,/* complain_on_overflow */
618 bfd_elf_generic_reloc, /* special_function */
619 "R_ARM_ROSEGREL32", /* name */
620 FALSE, /* partial_inplace */
621 0xffffffff, /* src_mask */
622 0xffffffff, /* dst_mask */
623 FALSE), /* pcrel_offset */
624
625 HOWTO (R_ARM_V4BX, /* type */
626 0, /* rightshift */
627 2, /* size (0 = byte, 1 = short, 2 = long) */
628 32, /* bitsize */
629 FALSE, /* pc_relative */
630 0, /* bitpos */
631 complain_overflow_dont,/* complain_on_overflow */
632 bfd_elf_generic_reloc, /* special_function */
633 "R_ARM_V4BX", /* name */
634 FALSE, /* partial_inplace */
635 0xffffffff, /* src_mask */
636 0xffffffff, /* dst_mask */
637 FALSE), /* pcrel_offset */
638
639 HOWTO (R_ARM_TARGET2, /* type */
640 0, /* rightshift */
641 2, /* size (0 = byte, 1 = short, 2 = long) */
642 32, /* bitsize */
643 FALSE, /* pc_relative */
644 0, /* bitpos */
645 complain_overflow_signed,/* complain_on_overflow */
646 bfd_elf_generic_reloc, /* special_function */
647 "R_ARM_TARGET2", /* name */
648 FALSE, /* partial_inplace */
649 0xffffffff, /* src_mask */
650 0xffffffff, /* dst_mask */
651 TRUE), /* pcrel_offset */
652
653 HOWTO (R_ARM_PREL31, /* type */
654 0, /* rightshift */
655 2, /* size (0 = byte, 1 = short, 2 = long) */
656 31, /* bitsize */
657 TRUE, /* pc_relative */
658 0, /* bitpos */
659 complain_overflow_signed,/* complain_on_overflow */
660 bfd_elf_generic_reloc, /* special_function */
661 "R_ARM_PREL31", /* name */
662 FALSE, /* partial_inplace */
663 0x7fffffff, /* src_mask */
664 0x7fffffff, /* dst_mask */
665 TRUE), /* pcrel_offset */
666};
667
668 /* GNU extension to record C++ vtable hierarchy */
669static reloc_howto_type elf32_arm_vtinherit_howto =
670 HOWTO (R_ARM_GNU_VTINHERIT, /* type */
671 0, /* rightshift */
672 2, /* size (0 = byte, 1 = short, 2 = long) */
673 0, /* bitsize */
674 FALSE, /* pc_relative */
675 0, /* bitpos */
676 complain_overflow_dont, /* complain_on_overflow */
677 NULL, /* special_function */
678 "R_ARM_GNU_VTINHERIT", /* name */
679 FALSE, /* partial_inplace */
680 0, /* src_mask */
681 0, /* dst_mask */
682 FALSE); /* pcrel_offset */
683
684 /* GNU extension to record C++ vtable member usage */
685static reloc_howto_type elf32_arm_vtentry_howto =
686 HOWTO (R_ARM_GNU_VTENTRY, /* type */
687 0, /* rightshift */
688 2, /* size (0 = byte, 1 = short, 2 = long) */
689 0, /* bitsize */
690 FALSE, /* pc_relative */
691 0, /* bitpos */
692 complain_overflow_dont, /* complain_on_overflow */
693 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
694 "R_ARM_GNU_VTENTRY", /* name */
695 FALSE, /* partial_inplace */
696 0, /* src_mask */
697 0, /* dst_mask */
698 FALSE); /* pcrel_offset */
699
700 /* 12 bit pc relative */
701static reloc_howto_type elf32_arm_thm_pc11_howto =
702 HOWTO (R_ARM_THM_PC11, /* type */
703 1, /* rightshift */
704 1, /* size (0 = byte, 1 = short, 2 = long) */
705 11, /* bitsize */
706 TRUE, /* pc_relative */
707 0, /* bitpos */
708 complain_overflow_signed, /* complain_on_overflow */
709 bfd_elf_generic_reloc, /* special_function */
710 "R_ARM_THM_PC11", /* name */
711 FALSE, /* partial_inplace */
712 0x000007ff, /* src_mask */
713 0x000007ff, /* dst_mask */
714 TRUE); /* pcrel_offset */
715
716 /* 12 bit pc relative */
717static reloc_howto_type elf32_arm_thm_pc9_howto =
718 HOWTO (R_ARM_THM_PC9, /* type */
719 1, /* rightshift */
720 1, /* size (0 = byte, 1 = short, 2 = long) */
721 8, /* bitsize */
722 TRUE, /* pc_relative */
723 0, /* bitpos */
724 complain_overflow_signed, /* complain_on_overflow */
725 bfd_elf_generic_reloc, /* special_function */
726 "R_ARM_THM_PC9", /* name */
727 FALSE, /* partial_inplace */
728 0x000000ff, /* src_mask */
729 0x000000ff, /* dst_mask */
730 TRUE); /* pcrel_offset */
731
732/* Place relative GOT-indirect. */
733static reloc_howto_type elf32_arm_got_prel =
734 HOWTO (R_ARM_GOT_PREL, /* type */
735 0, /* rightshift */
736 2, /* size (0 = byte, 1 = short, 2 = long) */
737 32, /* bitsize */
738 TRUE, /* pc_relative */
739 0, /* bitpos */
740 complain_overflow_dont, /* complain_on_overflow */
741 bfd_elf_generic_reloc, /* special_function */
742 "R_ARM_GOT_PREL", /* name */
743 FALSE, /* partial_inplace */
744 0xffffffff, /* src_mask */
745 0xffffffff, /* dst_mask */
746 TRUE); /* pcrel_offset */
747
748/* Currently unused relocations. */
749static reloc_howto_type elf32_arm_r_howto[4] =
750{
751 HOWTO (R_ARM_RREL32, /* type */
752 0, /* rightshift */
753 0, /* size (0 = byte, 1 = short, 2 = long) */
754 0, /* bitsize */
755 FALSE, /* pc_relative */
756 0, /* bitpos */
757 complain_overflow_dont,/* complain_on_overflow */
758 bfd_elf_generic_reloc, /* special_function */
759 "R_ARM_RREL32", /* name */
760 FALSE, /* partial_inplace */
761 0, /* src_mask */
762 0, /* dst_mask */
763 FALSE), /* pcrel_offset */
764
765 HOWTO (R_ARM_RABS32, /* type */
766 0, /* rightshift */
767 0, /* size (0 = byte, 1 = short, 2 = long) */
768 0, /* bitsize */
769 FALSE, /* pc_relative */
770 0, /* bitpos */
771 complain_overflow_dont,/* complain_on_overflow */
772 bfd_elf_generic_reloc, /* special_function */
773 "R_ARM_RABS32", /* name */
774 FALSE, /* partial_inplace */
775 0, /* src_mask */
776 0, /* dst_mask */
777 FALSE), /* pcrel_offset */
778
779 HOWTO (R_ARM_RPC24, /* type */
780 0, /* rightshift */
781 0, /* size (0 = byte, 1 = short, 2 = long) */
782 0, /* bitsize */
783 FALSE, /* pc_relative */
784 0, /* bitpos */
785 complain_overflow_dont,/* complain_on_overflow */
786 bfd_elf_generic_reloc, /* special_function */
787 "R_ARM_RPC24", /* name */
788 FALSE, /* partial_inplace */
789 0, /* src_mask */
790 0, /* dst_mask */
791 FALSE), /* pcrel_offset */
792
793 HOWTO (R_ARM_RBASE, /* type */
794 0, /* rightshift */
795 0, /* size (0 = byte, 1 = short, 2 = long) */
796 0, /* bitsize */
797 FALSE, /* pc_relative */
798 0, /* bitpos */
799 complain_overflow_dont,/* complain_on_overflow */
800 bfd_elf_generic_reloc, /* special_function */
801 "R_ARM_RBASE", /* name */
802 FALSE, /* partial_inplace */
803 0, /* src_mask */
804 0, /* dst_mask */
805 FALSE) /* pcrel_offset */
806};
807
808static reloc_howto_type *
809elf32_arm_howto_from_type (unsigned int r_type)
810{
811 if (r_type < NUM_ELEM (elf32_arm_howto_table))
812 return &elf32_arm_howto_table[r_type];
813
814 switch (r_type)
815 {
816 case R_ARM_GOT_PREL:
817 return &elf32_arm_got_prel;
818
819 case R_ARM_GNU_VTINHERIT:
820 return &elf32_arm_vtinherit_howto;
821
822 case R_ARM_GNU_VTENTRY:
823 return &elf32_arm_vtentry_howto;
824
825 case R_ARM_THM_PC11:
826 return &elf32_arm_thm_pc11_howto;
827
828 case R_ARM_THM_PC9:
829 return &elf32_arm_thm_pc9_howto;
830
831 case R_ARM_RREL32:
832 case R_ARM_RABS32:
833 case R_ARM_RPC24:
834 case R_ARM_RBASE:
835 return &elf32_arm_r_howto[r_type - R_ARM_RREL32];
836
837 default:
838 return NULL;
839 }
840}
841
842static void
843elf32_arm_info_to_howto (bfd * abfd ATTRIBUTE_UNUSED, arelent * bfd_reloc,
844 Elf_Internal_Rela * elf_reloc)
845{
846 unsigned int r_type;
847
848 r_type = ELF32_R_TYPE (elf_reloc->r_info);
849 bfd_reloc->howto = elf32_arm_howto_from_type (r_type);
850}
851
852struct elf32_arm_reloc_map
853 {
854 bfd_reloc_code_real_type bfd_reloc_val;
855 unsigned char elf_reloc_val;
856 };
857
858/* All entries in this list must also be present in elf32_arm_howto_table. */
859static const struct elf32_arm_reloc_map elf32_arm_reloc_map[] =
860 {
861 {BFD_RELOC_NONE, R_ARM_NONE},
862 {BFD_RELOC_ARM_PCREL_BRANCH, R_ARM_PC24},
863 {BFD_RELOC_ARM_PCREL_BLX, R_ARM_XPC25},
864 {BFD_RELOC_THUMB_PCREL_BLX, R_ARM_THM_XPC22},
865 {BFD_RELOC_32, R_ARM_ABS32},
866 {BFD_RELOC_32_PCREL, R_ARM_REL32},
867 {BFD_RELOC_8, R_ARM_ABS8},
868 {BFD_RELOC_16, R_ARM_ABS16},
869 {BFD_RELOC_ARM_OFFSET_IMM, R_ARM_ABS12},
870 {BFD_RELOC_ARM_THUMB_OFFSET, R_ARM_THM_ABS5},
871 {BFD_RELOC_THUMB_PCREL_BRANCH23, R_ARM_THM_PC22},
872 {BFD_RELOC_ARM_COPY, R_ARM_COPY},
873 {BFD_RELOC_ARM_GLOB_DAT, R_ARM_GLOB_DAT},
874 {BFD_RELOC_ARM_JUMP_SLOT, R_ARM_JUMP_SLOT},
875 {BFD_RELOC_ARM_RELATIVE, R_ARM_RELATIVE},
876 {BFD_RELOC_ARM_GOTOFF, R_ARM_GOTOFF},
877 {BFD_RELOC_ARM_GOTPC, R_ARM_GOTPC},
878 {BFD_RELOC_ARM_GOT32, R_ARM_GOT32},
879 {BFD_RELOC_ARM_PLT32, R_ARM_PLT32},
880 {BFD_RELOC_ARM_TARGET1, R_ARM_TARGET1},
881 {BFD_RELOC_ARM_ROSEGREL32, R_ARM_ROSEGREL32},
882 {BFD_RELOC_ARM_SBREL32, R_ARM_SBREL32},
883 {BFD_RELOC_ARM_PREL31, R_ARM_PREL31},
884 {BFD_RELOC_ARM_TARGET2, R_ARM_TARGET2}
885 };
886
887static reloc_howto_type *
888elf32_arm_reloc_type_lookup (abfd, code)
889 bfd *abfd ATTRIBUTE_UNUSED;
890 bfd_reloc_code_real_type code;
891{
892 unsigned int i;
893
894 switch (code)
895 {
896 case BFD_RELOC_VTABLE_INHERIT:
897 return & elf32_arm_vtinherit_howto;
898
899 case BFD_RELOC_VTABLE_ENTRY:
900 return & elf32_arm_vtentry_howto;
901
902 case BFD_RELOC_THUMB_PCREL_BRANCH12:
903 return & elf32_arm_thm_pc11_howto;
904
905 case BFD_RELOC_THUMB_PCREL_BRANCH9:
906 return & elf32_arm_thm_pc9_howto;
907
908 default:
909 for (i = 0; i < NUM_ELEM (elf32_arm_reloc_map); i ++)
910 if (elf32_arm_reloc_map[i].bfd_reloc_val == code)
911 return & elf32_arm_howto_table[elf32_arm_reloc_map[i].elf_reloc_val];
912
913 return NULL;
914 }
915}
916
917/* Support for core dump NOTE sections */
918static bfd_boolean
919elf32_arm_nabi_grok_prstatus (abfd, note)
920 bfd *abfd;
921 Elf_Internal_Note *note;
922{
923 int offset;
924 size_t size;
925
926 switch (note->descsz)
927 {
928 default:
929 return FALSE;
930
931 case 148: /* Linux/ARM 32-bit*/
932 /* pr_cursig */
933 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
934
935 /* pr_pid */
936 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 24);
937
938 /* pr_reg */
939 offset = 72;
940 size = 72;
941
942 break;
943 }
944
945 /* Make a ".reg/999" section. */
946 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
947 size, note->descpos + offset);
948}
949
950static bfd_boolean
951elf32_arm_nabi_grok_psinfo (abfd, note)
952 bfd *abfd;
953 Elf_Internal_Note *note;
954{
955 switch (note->descsz)
956 {
957 default:
958 return FALSE;
959
960 case 124: /* Linux/ARM elf_prpsinfo */
961 elf_tdata (abfd)->core_program
962 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
963 elf_tdata (abfd)->core_command
964 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
965 }
966
967 /* Note that for some reason, a spurious space is tacked
968 onto the end of the args in some (at least one anyway)
969 implementations, so strip it off if it exists. */
970
971 {
972 char *command = elf_tdata (abfd)->core_command;
973 int n = strlen (command);
974
975 if (0 < n && command[n - 1] == ' ')
976 command[n - 1] = '\0';
977 }
978
979 return TRUE;
980}
981
982#define TARGET_LITTLE_SYM bfd_elf32_littlearm_vec
983#define TARGET_LITTLE_NAME "elf32-littlearm"
984#define TARGET_BIG_SYM bfd_elf32_bigarm_vec
985#define TARGET_BIG_NAME "elf32-bigarm"
986
987#define elf_backend_grok_prstatus elf32_arm_nabi_grok_prstatus
988#define elf_backend_grok_psinfo elf32_arm_nabi_grok_psinfo
989
acf8aed4
AM
990#ifndef USE_REL
991#define USE_REL 0
992#endif
993
252b5132
RH
994typedef unsigned long int insn32;
995typedef unsigned short int insn16;
996
8cb51566 997/* In lieu of proper flags, assume all EABIv4 objects are interworkable. */
57e8b36a 998#define INTERWORK_FLAG(abfd) \
8cb51566 999 (EF_ARM_EABI_VERSION (elf_elfheader (abfd)->e_flags) == EF_ARM_EABI_VER4 \
85a84e7a 1000 || (elf_elfheader (abfd)->e_flags & EF_ARM_INTERWORK))
9b485d32 1001
252b5132
RH
1002/* The linker script knows the section names for placement.
1003 The entry_names are used to do simple name mangling on the stubs.
1004 Given a function name, and its type, the stub can be found. The
9b485d32 1005 name can be changed. The only requirement is the %s be present. */
252b5132
RH
1006#define THUMB2ARM_GLUE_SECTION_NAME ".glue_7t"
1007#define THUMB2ARM_GLUE_ENTRY_NAME "__%s_from_thumb"
1008
1009#define ARM2THUMB_GLUE_SECTION_NAME ".glue_7"
1010#define ARM2THUMB_GLUE_ENTRY_NAME "__%s_from_arm"
1011
1012/* The name of the dynamic interpreter. This is put in the .interp
1013 section. */
1014#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
1015
5e681ec4
PB
1016#ifdef FOUR_WORD_PLT
1017
252b5132
RH
1018/* The first entry in a procedure linkage table looks like
1019 this. It is set up so that any shared library function that is
59f2c4e7 1020 called before the relocation has been set up calls the dynamic
9b485d32 1021 linker first. */
e5a52504 1022static const bfd_vma elf32_arm_plt0_entry [] =
5e681ec4
PB
1023 {
1024 0xe52de004, /* str lr, [sp, #-4]! */
1025 0xe59fe010, /* ldr lr, [pc, #16] */
1026 0xe08fe00e, /* add lr, pc, lr */
1027 0xe5bef008, /* ldr pc, [lr, #8]! */
1028 };
1029
1030/* Subsequent entries in a procedure linkage table look like
1031 this. */
e5a52504 1032static const bfd_vma elf32_arm_plt_entry [] =
5e681ec4
PB
1033 {
1034 0xe28fc600, /* add ip, pc, #NN */
1035 0xe28cca00, /* add ip, ip, #NN */
1036 0xe5bcf000, /* ldr pc, [ip, #NN]! */
1037 0x00000000, /* unused */
1038 };
1039
1040#else
1041
5e681ec4
PB
1042/* The first entry in a procedure linkage table looks like
1043 this. It is set up so that any shared library function that is
1044 called before the relocation has been set up calls the dynamic
1045 linker first. */
e5a52504 1046static const bfd_vma elf32_arm_plt0_entry [] =
917583ad 1047 {
5e681ec4
PB
1048 0xe52de004, /* str lr, [sp, #-4]! */
1049 0xe59fe004, /* ldr lr, [pc, #4] */
1050 0xe08fe00e, /* add lr, pc, lr */
1051 0xe5bef008, /* ldr pc, [lr, #8]! */
1052 0x00000000, /* &GOT[0] - . */
917583ad 1053 };
252b5132
RH
1054
1055/* Subsequent entries in a procedure linkage table look like
1056 this. */
e5a52504 1057static const bfd_vma elf32_arm_plt_entry [] =
5e681ec4
PB
1058 {
1059 0xe28fc600, /* add ip, pc, #0xNN00000 */
1060 0xe28cca00, /* add ip, ip, #0xNN000 */
1061 0xe5bcf000, /* ldr pc, [ip, #0xNNN]! */
1062 };
1063
1064#endif
252b5132 1065
b7693d02
DJ
1066/* An initial stub used if the PLT entry is referenced from Thumb code. */
1067#define PLT_THUMB_STUB_SIZE 4
1068static const bfd_vma elf32_arm_plt_thumb_stub [] =
1069 {
1070 0x4778, /* bx pc */
1071 0x46c0 /* nop */
1072 };
1073
e5a52504
MM
1074/* The entries in a PLT when using a DLL-based target with multiple
1075 address spaces. */
1076static const bfd_vma elf32_arm_symbian_plt_entry [] =
1077 {
1078 0xe51ff004, /* ldr pr, [pc, #-4] */
1079 0x00000000, /* dcd R_ARM_GLOB_DAT(X) */
1080 };
1081
e489d0ae
PB
1082/* Used to build a map of a section. This is required for mixed-endian
1083 code/data. */
1084
1085typedef struct elf32_elf_section_map
1086{
1087 bfd_vma vma;
1088 char type;
1089}
1090elf32_arm_section_map;
1091
1092struct _arm_elf_section_data
1093{
1094 struct bfd_elf_section_data elf;
1095 int mapcount;
1096 elf32_arm_section_map *map;
1097};
1098
1099#define elf32_arm_section_data(sec) \
1100 ((struct _arm_elf_section_data *) elf_section_data (sec))
1101
252b5132
RH
1102/* The ARM linker needs to keep track of the number of relocs that it
1103 decides to copy in check_relocs for each symbol. This is so that
1104 it can discard PC relative relocs if it doesn't need them when
1105 linking with -Bsymbolic. We store the information in a field
1106 extending the regular ELF linker hash table. */
1107
1108/* This structure keeps track of the number of PC relative relocs we
1109 have copied for a given symbol. */
5e681ec4 1110struct elf32_arm_relocs_copied
917583ad
NC
1111 {
1112 /* Next section. */
5e681ec4 1113 struct elf32_arm_relocs_copied * next;
917583ad
NC
1114 /* A section in dynobj. */
1115 asection * section;
1116 /* Number of relocs copied in this section. */
1117 bfd_size_type count;
1118 };
252b5132 1119
ba96a88f 1120/* Arm ELF linker hash entry. */
252b5132 1121struct elf32_arm_link_hash_entry
917583ad
NC
1122 {
1123 struct elf_link_hash_entry root;
252b5132 1124
917583ad 1125 /* Number of PC relative relocs copied for this symbol. */
5e681ec4 1126 struct elf32_arm_relocs_copied * relocs_copied;
b7693d02
DJ
1127
1128 /* We reference count Thumb references to a PLT entry separately,
1129 so that we can emit the Thumb trampoline only if needed. */
1130 bfd_signed_vma plt_thumb_refcount;
1131
1132 /* Since PLT entries have variable size if the Thumb prologue is
1133 used, we need to record the index into .got.plt instead of
1134 recomputing it from the PLT offset. */
1135 bfd_signed_vma plt_got_offset;
917583ad 1136 };
252b5132 1137
252b5132 1138/* Traverse an arm ELF linker hash table. */
252b5132
RH
1139#define elf32_arm_link_hash_traverse(table, func, info) \
1140 (elf_link_hash_traverse \
1141 (&(table)->root, \
b7693d02 1142 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
252b5132
RH
1143 (info)))
1144
1145/* Get the ARM elf linker hash table from a link_info structure. */
1146#define elf32_arm_hash_table(info) \
1147 ((struct elf32_arm_link_hash_table *) ((info)->hash))
1148
9b485d32 1149/* ARM ELF linker hash table. */
252b5132 1150struct elf32_arm_link_hash_table
917583ad
NC
1151 {
1152 /* The main hash table. */
1153 struct elf_link_hash_table root;
252b5132 1154
4cc11e76 1155 /* The size in bytes of the section containing the Thumb-to-ARM glue. */
dc810e39 1156 bfd_size_type thumb_glue_size;
252b5132 1157
4cc11e76 1158 /* The size in bytes of the section containing the ARM-to-Thumb glue. */
dc810e39 1159 bfd_size_type arm_glue_size;
252b5132 1160
4cc11e76 1161 /* An arbitrary input BFD chosen to hold the glue sections. */
917583ad 1162 bfd * bfd_of_glue_owner;
ba96a88f 1163
e489d0ae
PB
1164 /* Nonzero to output a BE8 image. */
1165 int byteswap_code;
1166
9c504268
PB
1167 /* Zero if R_ARM_TARGET1 means R_ARM_ABS32.
1168 Nonzero if R_ARM_TARGET1 means R_ARM_ABS32. */
1169 int target1_is_rel;
1170
eb043451
PB
1171 /* The relocation to use for R_ARM_TARGET2 relocations. */
1172 int target2_reloc;
1173
e5a52504
MM
1174 /* The number of bytes in the initial entry in the PLT. */
1175 bfd_size_type plt_header_size;
1176
1177 /* The number of bytes in the subsequent PLT etries. */
1178 bfd_size_type plt_entry_size;
1179
1180 /* True if the target system is Symbian OS. */
1181 int symbian_p;
1182
5e681ec4
PB
1183 /* Short-cuts to get to dynamic linker sections. */
1184 asection *sgot;
1185 asection *sgotplt;
1186 asection *srelgot;
1187 asection *splt;
1188 asection *srelplt;
1189 asection *sdynbss;
1190 asection *srelbss;
1191
1192 /* Small local sym to section mapping cache. */
1193 struct sym_sec_cache sym_sec;
b7693d02
DJ
1194
1195 /* For convenience in allocate_dynrelocs. */
1196 bfd * obfd;
917583ad 1197 };
252b5132 1198
780a67af
NC
1199/* Create an entry in an ARM ELF linker hash table. */
1200
1201static struct bfd_hash_entry *
57e8b36a
NC
1202elf32_arm_link_hash_newfunc (struct bfd_hash_entry * entry,
1203 struct bfd_hash_table * table,
1204 const char * string)
780a67af
NC
1205{
1206 struct elf32_arm_link_hash_entry * ret =
1207 (struct elf32_arm_link_hash_entry *) entry;
1208
1209 /* Allocate the structure if it has not already been allocated by a
1210 subclass. */
1211 if (ret == (struct elf32_arm_link_hash_entry *) NULL)
57e8b36a
NC
1212 ret = bfd_hash_allocate (table, sizeof (struct elf32_arm_link_hash_entry));
1213 if (ret == NULL)
780a67af
NC
1214 return (struct bfd_hash_entry *) ret;
1215
1216 /* Call the allocation method of the superclass. */
1217 ret = ((struct elf32_arm_link_hash_entry *)
1218 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
1219 table, string));
57e8b36a 1220 if (ret != NULL)
b7693d02
DJ
1221 {
1222 ret->relocs_copied = NULL;
1223 ret->plt_thumb_refcount = 0;
1224 ret->plt_got_offset = -1;
1225 }
780a67af
NC
1226
1227 return (struct bfd_hash_entry *) ret;
1228}
1229
5e681ec4
PB
1230/* Create .got, .gotplt, and .rel.got sections in DYNOBJ, and set up
1231 shortcuts to them in our hash table. */
1232
1233static bfd_boolean
57e8b36a 1234create_got_section (bfd *dynobj, struct bfd_link_info *info)
5e681ec4
PB
1235{
1236 struct elf32_arm_link_hash_table *htab;
1237
e5a52504
MM
1238 htab = elf32_arm_hash_table (info);
1239 /* BPABI objects never have a GOT, or associated sections. */
1240 if (htab->symbian_p)
1241 return TRUE;
1242
5e681ec4
PB
1243 if (! _bfd_elf_create_got_section (dynobj, info))
1244 return FALSE;
1245
5e681ec4
PB
1246 htab->sgot = bfd_get_section_by_name (dynobj, ".got");
1247 htab->sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
1248 if (!htab->sgot || !htab->sgotplt)
1249 abort ();
1250
1251 htab->srelgot = bfd_make_section (dynobj, ".rel.got");
1252 if (htab->srelgot == NULL
1253 || ! bfd_set_section_flags (dynobj, htab->srelgot,
1254 (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
1255 | SEC_IN_MEMORY | SEC_LINKER_CREATED
1256 | SEC_READONLY))
1257 || ! bfd_set_section_alignment (dynobj, htab->srelgot, 2))
1258 return FALSE;
1259 return TRUE;
1260}
1261
1262/* Create .plt, .rel.plt, .got, .got.plt, .rel.got, .dynbss, and
1263 .rel.bss sections in DYNOBJ, and set up shortcuts to them in our
1264 hash table. */
1265
1266static bfd_boolean
57e8b36a 1267elf32_arm_create_dynamic_sections (bfd *dynobj, struct bfd_link_info *info)
5e681ec4
PB
1268{
1269 struct elf32_arm_link_hash_table *htab;
1270
1271 htab = elf32_arm_hash_table (info);
1272 if (!htab->sgot && !create_got_section (dynobj, info))
1273 return FALSE;
1274
1275 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
1276 return FALSE;
1277
1278 htab->splt = bfd_get_section_by_name (dynobj, ".plt");
1279 htab->srelplt = bfd_get_section_by_name (dynobj, ".rel.plt");
1280 htab->sdynbss = bfd_get_section_by_name (dynobj, ".dynbss");
1281 if (!info->shared)
1282 htab->srelbss = bfd_get_section_by_name (dynobj, ".rel.bss");
1283
e5a52504
MM
1284 if (!htab->splt
1285 || !htab->srelplt
1286 || !htab->sdynbss
5e681ec4
PB
1287 || (!info->shared && !htab->srelbss))
1288 abort ();
1289
1290 return TRUE;
1291}
1292
1293/* Copy the extra info we tack onto an elf_link_hash_entry. */
1294
1295static void
1296elf32_arm_copy_indirect_symbol (const struct elf_backend_data *bed,
1297 struct elf_link_hash_entry *dir,
1298 struct elf_link_hash_entry *ind)
1299{
1300 struct elf32_arm_link_hash_entry *edir, *eind;
1301
1302 edir = (struct elf32_arm_link_hash_entry *) dir;
1303 eind = (struct elf32_arm_link_hash_entry *) ind;
1304
1305 if (eind->relocs_copied != NULL)
1306 {
1307 if (edir->relocs_copied != NULL)
1308 {
1309 struct elf32_arm_relocs_copied **pp;
1310 struct elf32_arm_relocs_copied *p;
1311
1312 if (ind->root.type == bfd_link_hash_indirect)
1313 abort ();
1314
1315 /* Add reloc counts against the weak sym to the strong sym
1316 list. Merge any entries against the same section. */
1317 for (pp = &eind->relocs_copied; (p = *pp) != NULL; )
1318 {
1319 struct elf32_arm_relocs_copied *q;
1320
1321 for (q = edir->relocs_copied; q != NULL; q = q->next)
1322 if (q->section == p->section)
1323 {
5e681ec4
PB
1324 q->count += p->count;
1325 *pp = p->next;
1326 break;
1327 }
1328 if (q == NULL)
1329 pp = &p->next;
1330 }
1331 *pp = edir->relocs_copied;
1332 }
1333
1334 edir->relocs_copied = eind->relocs_copied;
1335 eind->relocs_copied = NULL;
1336 }
1337
b7693d02
DJ
1338 /* If the direct symbol already has an associated PLT entry, the
1339 indirect symbol should not. If it doesn't, swap refcount information
1340 from the indirect symbol. */
1341 if (edir->plt_thumb_refcount == 0)
1342 {
1343 edir->plt_thumb_refcount = eind->plt_thumb_refcount;
1344 eind->plt_thumb_refcount = 0;
1345 }
1346 else
1347 BFD_ASSERT (eind->plt_thumb_refcount == 0);
1348
5e681ec4
PB
1349 _bfd_elf_link_hash_copy_indirect (bed, dir, ind);
1350}
1351
9b485d32 1352/* Create an ARM elf linker hash table. */
252b5132
RH
1353
1354static struct bfd_link_hash_table *
57e8b36a 1355elf32_arm_link_hash_table_create (bfd *abfd)
252b5132
RH
1356{
1357 struct elf32_arm_link_hash_table *ret;
dc810e39 1358 bfd_size_type amt = sizeof (struct elf32_arm_link_hash_table);
252b5132 1359
57e8b36a
NC
1360 ret = bfd_malloc (amt);
1361 if (ret == NULL)
252b5132
RH
1362 return NULL;
1363
57e8b36a 1364 if (!_bfd_elf_link_hash_table_init (& ret->root, abfd,
780a67af 1365 elf32_arm_link_hash_newfunc))
252b5132 1366 {
e2d34d7d 1367 free (ret);
252b5132
RH
1368 return NULL;
1369 }
1370
5e681ec4
PB
1371 ret->sgot = NULL;
1372 ret->sgotplt = NULL;
1373 ret->srelgot = NULL;
1374 ret->splt = NULL;
1375 ret->srelplt = NULL;
1376 ret->sdynbss = NULL;
1377 ret->srelbss = NULL;
252b5132
RH
1378 ret->thumb_glue_size = 0;
1379 ret->arm_glue_size = 0;
1380 ret->bfd_of_glue_owner = NULL;
e489d0ae 1381 ret->byteswap_code = 0;
9c504268 1382 ret->target1_is_rel = 0;
eb043451 1383 ret->target2_reloc = R_ARM_NONE;
e5a52504
MM
1384#ifdef FOUR_WORD_PLT
1385 ret->plt_header_size = 16;
1386 ret->plt_entry_size = 16;
1387#else
1388 ret->plt_header_size = 20;
1389 ret->plt_entry_size = 12;
1390#endif
1391 ret->symbian_p = 0;
5e681ec4 1392 ret->sym_sec.abfd = NULL;
b7693d02 1393 ret->obfd = abfd;
252b5132
RH
1394
1395 return &ret->root.root;
1396}
1397
9b485d32
NC
1398/* Locate the Thumb encoded calling stub for NAME. */
1399
252b5132 1400static struct elf_link_hash_entry *
57e8b36a
NC
1401find_thumb_glue (struct bfd_link_info *link_info,
1402 const char *name,
1403 bfd *input_bfd)
252b5132
RH
1404{
1405 char *tmp_name;
1406 struct elf_link_hash_entry *hash;
1407 struct elf32_arm_link_hash_table *hash_table;
1408
1409 /* We need a pointer to the armelf specific hash table. */
1410 hash_table = elf32_arm_hash_table (link_info);
1411
57e8b36a
NC
1412 tmp_name = bfd_malloc ((bfd_size_type) strlen (name)
1413 + strlen (THUMB2ARM_GLUE_ENTRY_NAME) + 1);
252b5132
RH
1414
1415 BFD_ASSERT (tmp_name);
1416
1417 sprintf (tmp_name, THUMB2ARM_GLUE_ENTRY_NAME, name);
1418
1419 hash = elf_link_hash_lookup
b34976b6 1420 (&(hash_table)->root, tmp_name, FALSE, FALSE, TRUE);
252b5132
RH
1421
1422 if (hash == NULL)
1423 /* xgettext:c-format */
d003868e
AM
1424 (*_bfd_error_handler) (_("%B: unable to find THUMB glue '%s' for `%s'"),
1425 input_bfd, tmp_name, name);
252b5132
RH
1426
1427 free (tmp_name);
1428
1429 return hash;
1430}
1431
9b485d32
NC
1432/* Locate the ARM encoded calling stub for NAME. */
1433
252b5132 1434static struct elf_link_hash_entry *
57e8b36a
NC
1435find_arm_glue (struct bfd_link_info *link_info,
1436 const char *name,
1437 bfd *input_bfd)
252b5132
RH
1438{
1439 char *tmp_name;
1440 struct elf_link_hash_entry *myh;
1441 struct elf32_arm_link_hash_table *hash_table;
1442
1443 /* We need a pointer to the elfarm specific hash table. */
1444 hash_table = elf32_arm_hash_table (link_info);
1445
57e8b36a
NC
1446 tmp_name = bfd_malloc ((bfd_size_type) strlen (name)
1447 + strlen (ARM2THUMB_GLUE_ENTRY_NAME) + 1);
252b5132
RH
1448
1449 BFD_ASSERT (tmp_name);
1450
1451 sprintf (tmp_name, ARM2THUMB_GLUE_ENTRY_NAME, name);
1452
1453 myh = elf_link_hash_lookup
b34976b6 1454 (&(hash_table)->root, tmp_name, FALSE, FALSE, TRUE);
252b5132
RH
1455
1456 if (myh == NULL)
1457 /* xgettext:c-format */
d003868e
AM
1458 (*_bfd_error_handler) (_("%B: unable to find ARM glue '%s' for `%s'"),
1459 input_bfd, tmp_name, name);
252b5132
RH
1460
1461 free (tmp_name);
1462
1463 return myh;
1464}
1465
9b485d32 1466/* ARM->Thumb glue:
252b5132
RH
1467
1468 .arm
1469 __func_from_arm:
1470 ldr r12, __func_addr
1471 bx r12
1472 __func_addr:
9b485d32 1473 .word func @ behave as if you saw a ARM_32 reloc. */
252b5132
RH
1474
1475#define ARM2THUMB_GLUE_SIZE 12
1476static const insn32 a2t1_ldr_insn = 0xe59fc000;
1477static const insn32 a2t2_bx_r12_insn = 0xe12fff1c;
1478static const insn32 a2t3_func_addr_insn = 0x00000001;
1479
9b485d32 1480/* Thumb->ARM: Thumb->(non-interworking aware) ARM
252b5132
RH
1481
1482 .thumb .thumb
1483 .align 2 .align 2
1484 __func_from_thumb: __func_from_thumb:
1485 bx pc push {r6, lr}
1486 nop ldr r6, __func_addr
1487 .arm mov lr, pc
1488 __func_change_to_arm: bx r6
1489 b func .arm
1490 __func_back_to_thumb:
1491 ldmia r13! {r6, lr}
1492 bx lr
1493 __func_addr:
9b485d32 1494 .word func */
252b5132
RH
1495
1496#define THUMB2ARM_GLUE_SIZE 8
1497static const insn16 t2a1_bx_pc_insn = 0x4778;
1498static const insn16 t2a2_noop_insn = 0x46c0;
1499static const insn32 t2a3_b_insn = 0xea000000;
1500
7e392df6 1501#ifndef ELFARM_NABI_C_INCLUDED
b34976b6 1502bfd_boolean
57e8b36a 1503bfd_elf32_arm_allocate_interworking_sections (struct bfd_link_info * info)
252b5132
RH
1504{
1505 asection * s;
1506 bfd_byte * foo;
1507 struct elf32_arm_link_hash_table * globals;
1508
1509 globals = elf32_arm_hash_table (info);
1510
1511 BFD_ASSERT (globals != NULL);
1512
1513 if (globals->arm_glue_size != 0)
1514 {
1515 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
1516
dc810e39
AM
1517 s = bfd_get_section_by_name (globals->bfd_of_glue_owner,
1518 ARM2THUMB_GLUE_SECTION_NAME);
252b5132
RH
1519
1520 BFD_ASSERT (s != NULL);
1521
57e8b36a 1522 foo = bfd_alloc (globals->bfd_of_glue_owner, globals->arm_glue_size);
252b5132 1523
eea6121a 1524 s->size = globals->arm_glue_size;
252b5132
RH
1525 s->contents = foo;
1526 }
1527
1528 if (globals->thumb_glue_size != 0)
1529 {
1530 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
1531
1532 s = bfd_get_section_by_name
1533 (globals->bfd_of_glue_owner, THUMB2ARM_GLUE_SECTION_NAME);
1534
1535 BFD_ASSERT (s != NULL);
1536
57e8b36a 1537 foo = bfd_alloc (globals->bfd_of_glue_owner, globals->thumb_glue_size);
252b5132 1538
eea6121a 1539 s->size = globals->thumb_glue_size;
252b5132
RH
1540 s->contents = foo;
1541 }
1542
b34976b6 1543 return TRUE;
252b5132
RH
1544}
1545
1546static void
57e8b36a
NC
1547record_arm_to_thumb_glue (struct bfd_link_info * link_info,
1548 struct elf_link_hash_entry * h)
252b5132
RH
1549{
1550 const char * name = h->root.root.string;
63b0f745 1551 asection * s;
252b5132
RH
1552 char * tmp_name;
1553 struct elf_link_hash_entry * myh;
14a793b2 1554 struct bfd_link_hash_entry * bh;
252b5132 1555 struct elf32_arm_link_hash_table * globals;
dc810e39 1556 bfd_vma val;
252b5132
RH
1557
1558 globals = elf32_arm_hash_table (link_info);
1559
1560 BFD_ASSERT (globals != NULL);
1561 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
1562
1563 s = bfd_get_section_by_name
1564 (globals->bfd_of_glue_owner, ARM2THUMB_GLUE_SECTION_NAME);
1565
252b5132
RH
1566 BFD_ASSERT (s != NULL);
1567
57e8b36a 1568 tmp_name = bfd_malloc ((bfd_size_type) strlen (name) + strlen (ARM2THUMB_GLUE_ENTRY_NAME) + 1);
252b5132
RH
1569
1570 BFD_ASSERT (tmp_name);
1571
1572 sprintf (tmp_name, ARM2THUMB_GLUE_ENTRY_NAME, name);
1573
1574 myh = elf_link_hash_lookup
b34976b6 1575 (&(globals)->root, tmp_name, FALSE, FALSE, TRUE);
252b5132
RH
1576
1577 if (myh != NULL)
1578 {
9b485d32 1579 /* We've already seen this guy. */
252b5132 1580 free (tmp_name);
9b485d32 1581 return;
252b5132
RH
1582 }
1583
57e8b36a
NC
1584 /* The only trick here is using hash_table->arm_glue_size as the value.
1585 Even though the section isn't allocated yet, this is where we will be
1586 putting it. */
14a793b2 1587 bh = NULL;
dc810e39
AM
1588 val = globals->arm_glue_size + 1;
1589 _bfd_generic_link_add_one_symbol (link_info, globals->bfd_of_glue_owner,
1590 tmp_name, BSF_GLOBAL, s, val,
b34976b6 1591 NULL, TRUE, FALSE, &bh);
252b5132 1592
b7693d02
DJ
1593 myh = (struct elf_link_hash_entry *) bh;
1594 myh->type = ELF_ST_INFO (STB_LOCAL, STT_FUNC);
1595 myh->forced_local = 1;
1596
252b5132
RH
1597 free (tmp_name);
1598
1599 globals->arm_glue_size += ARM2THUMB_GLUE_SIZE;
1600
1601 return;
1602}
1603
1604static void
57e8b36a
NC
1605record_thumb_to_arm_glue (struct bfd_link_info *link_info,
1606 struct elf_link_hash_entry *h)
252b5132
RH
1607{
1608 const char *name = h->root.root.string;
63b0f745 1609 asection *s;
252b5132
RH
1610 char *tmp_name;
1611 struct elf_link_hash_entry *myh;
14a793b2 1612 struct bfd_link_hash_entry *bh;
252b5132 1613 struct elf32_arm_link_hash_table *hash_table;
dc810e39 1614 bfd_vma val;
252b5132
RH
1615
1616 hash_table = elf32_arm_hash_table (link_info);
1617
1618 BFD_ASSERT (hash_table != NULL);
1619 BFD_ASSERT (hash_table->bfd_of_glue_owner != NULL);
1620
1621 s = bfd_get_section_by_name
1622 (hash_table->bfd_of_glue_owner, THUMB2ARM_GLUE_SECTION_NAME);
1623
1624 BFD_ASSERT (s != NULL);
1625
57e8b36a
NC
1626 tmp_name = bfd_malloc ((bfd_size_type) strlen (name)
1627 + strlen (THUMB2ARM_GLUE_ENTRY_NAME) + 1);
252b5132
RH
1628
1629 BFD_ASSERT (tmp_name);
1630
1631 sprintf (tmp_name, THUMB2ARM_GLUE_ENTRY_NAME, name);
1632
1633 myh = elf_link_hash_lookup
b34976b6 1634 (&(hash_table)->root, tmp_name, FALSE, FALSE, TRUE);
252b5132
RH
1635
1636 if (myh != NULL)
1637 {
9b485d32 1638 /* We've already seen this guy. */
252b5132 1639 free (tmp_name);
9b485d32 1640 return;
252b5132
RH
1641 }
1642
14a793b2 1643 bh = NULL;
dc810e39
AM
1644 val = hash_table->thumb_glue_size + 1;
1645 _bfd_generic_link_add_one_symbol (link_info, hash_table->bfd_of_glue_owner,
1646 tmp_name, BSF_GLOBAL, s, val,
b34976b6 1647 NULL, TRUE, FALSE, &bh);
252b5132 1648
9b485d32 1649 /* If we mark it 'Thumb', the disassembler will do a better job. */
14a793b2 1650 myh = (struct elf_link_hash_entry *) bh;
b7693d02
DJ
1651 myh->type = ELF_ST_INFO (STB_LOCAL, STT_ARM_TFUNC);
1652 myh->forced_local = 1;
252b5132
RH
1653
1654 free (tmp_name);
1655
252b5132
RH
1656#define CHANGE_TO_ARM "__%s_change_to_arm"
1657#define BACK_FROM_ARM "__%s_back_from_arm"
1658
9b485d32 1659 /* Allocate another symbol to mark where we switch to Arm mode. */
57e8b36a
NC
1660 tmp_name = bfd_malloc ((bfd_size_type) strlen (name)
1661 + strlen (CHANGE_TO_ARM) + 1);
252b5132
RH
1662
1663 BFD_ASSERT (tmp_name);
1664
1665 sprintf (tmp_name, CHANGE_TO_ARM, name);
1666
14a793b2 1667 bh = NULL;
dc810e39
AM
1668 val = hash_table->thumb_glue_size + 4,
1669 _bfd_generic_link_add_one_symbol (link_info, hash_table->bfd_of_glue_owner,
1670 tmp_name, BSF_LOCAL, s, val,
b34976b6 1671 NULL, TRUE, FALSE, &bh);
252b5132
RH
1672
1673 free (tmp_name);
1674
1675 hash_table->thumb_glue_size += THUMB2ARM_GLUE_SIZE;
1676
1677 return;
1678}
1679
8afb0e02
NC
1680/* Add the glue sections to ABFD. This function is called from the
1681 linker scripts in ld/emultempl/{armelf}.em. */
9b485d32 1682
b34976b6 1683bfd_boolean
57e8b36a
NC
1684bfd_elf32_arm_add_glue_sections_to_bfd (bfd *abfd,
1685 struct bfd_link_info *info)
252b5132 1686{
252b5132
RH
1687 flagword flags;
1688 asection *sec;
1689
8afb0e02
NC
1690 /* If we are only performing a partial
1691 link do not bother adding the glue. */
1049f94e 1692 if (info->relocatable)
b34976b6 1693 return TRUE;
252b5132 1694
252b5132
RH
1695 sec = bfd_get_section_by_name (abfd, ARM2THUMB_GLUE_SECTION_NAME);
1696
1697 if (sec == NULL)
1698 {
57db232e
NC
1699 /* Note: we do not include the flag SEC_LINKER_CREATED, as this
1700 will prevent elf_link_input_bfd() from processing the contents
1701 of this section. */
811b4bf6 1702 flags = SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_CODE | SEC_READONLY;
252b5132
RH
1703
1704 sec = bfd_make_section (abfd, ARM2THUMB_GLUE_SECTION_NAME);
1705
1706 if (sec == NULL
1707 || !bfd_set_section_flags (abfd, sec, flags)
1708 || !bfd_set_section_alignment (abfd, sec, 2))
b34976b6 1709 return FALSE;
9a5aca8c 1710
57db232e
NC
1711 /* Set the gc mark to prevent the section from being removed by garbage
1712 collection, despite the fact that no relocs refer to this section. */
1713 sec->gc_mark = 1;
252b5132
RH
1714 }
1715
1716 sec = bfd_get_section_by_name (abfd, THUMB2ARM_GLUE_SECTION_NAME);
1717
1718 if (sec == NULL)
1719 {
57e8b36a
NC
1720 flags = SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1721 | SEC_CODE | SEC_READONLY;
252b5132
RH
1722
1723 sec = bfd_make_section (abfd, THUMB2ARM_GLUE_SECTION_NAME);
1724
1725 if (sec == NULL
1726 || !bfd_set_section_flags (abfd, sec, flags)
1727 || !bfd_set_section_alignment (abfd, sec, 2))
b34976b6 1728 return FALSE;
9a5aca8c 1729
57db232e 1730 sec->gc_mark = 1;
252b5132
RH
1731 }
1732
b34976b6 1733 return TRUE;
8afb0e02
NC
1734}
1735
1736/* Select a BFD to be used to hold the sections used by the glue code.
1737 This function is called from the linker scripts in ld/emultempl/
1738 {armelf/pe}.em */
1739
b34976b6 1740bfd_boolean
57e8b36a 1741bfd_elf32_arm_get_bfd_for_interworking (bfd *abfd, struct bfd_link_info *info)
8afb0e02
NC
1742{
1743 struct elf32_arm_link_hash_table *globals;
1744
1745 /* If we are only performing a partial link
1746 do not bother getting a bfd to hold the glue. */
1049f94e 1747 if (info->relocatable)
b34976b6 1748 return TRUE;
8afb0e02 1749
b7693d02
DJ
1750 /* Make sure we don't attach the glue sections to a dynamic object. */
1751 BFD_ASSERT (!(abfd->flags & DYNAMIC));
1752
8afb0e02
NC
1753 globals = elf32_arm_hash_table (info);
1754
1755 BFD_ASSERT (globals != NULL);
1756
1757 if (globals->bfd_of_glue_owner != NULL)
b34976b6 1758 return TRUE;
8afb0e02 1759
252b5132
RH
1760 /* Save the bfd for later use. */
1761 globals->bfd_of_glue_owner = abfd;
cedb70c5 1762
b34976b6 1763 return TRUE;
252b5132
RH
1764}
1765
b34976b6 1766bfd_boolean
57e8b36a
NC
1767bfd_elf32_arm_process_before_allocation (bfd *abfd,
1768 struct bfd_link_info *link_info,
eb043451 1769 int byteswap_code)
252b5132
RH
1770{
1771 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 1772 Elf_Internal_Rela *internal_relocs = NULL;
252b5132
RH
1773 Elf_Internal_Rela *irel, *irelend;
1774 bfd_byte *contents = NULL;
252b5132
RH
1775
1776 asection *sec;
1777 struct elf32_arm_link_hash_table *globals;
1778
1779 /* If we are only performing a partial link do not bother
1780 to construct any glue. */
1049f94e 1781 if (link_info->relocatable)
b34976b6 1782 return TRUE;
252b5132
RH
1783
1784 /* Here we have a bfd that is to be included on the link. We have a hook
1785 to do reloc rummaging, before section sizes are nailed down. */
252b5132
RH
1786 globals = elf32_arm_hash_table (link_info);
1787
1788 BFD_ASSERT (globals != NULL);
1789 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
1790
e489d0ae
PB
1791 if (byteswap_code && !bfd_big_endian (abfd))
1792 {
d003868e
AM
1793 _bfd_error_handler (_("%B: BE8 images only valid in big-endian mode."),
1794 abfd);
e489d0ae
PB
1795 return FALSE;
1796 }
1797 globals->byteswap_code = byteswap_code;
f21f3fe0 1798
252b5132
RH
1799 /* Rummage around all the relocs and map the glue vectors. */
1800 sec = abfd->sections;
1801
1802 if (sec == NULL)
b34976b6 1803 return TRUE;
252b5132
RH
1804
1805 for (; sec != NULL; sec = sec->next)
1806 {
1807 if (sec->reloc_count == 0)
1808 continue;
1809
1810 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
252b5132 1811
9b485d32 1812 /* Load the relocs. */
6cdc0ccc 1813 internal_relocs
57e8b36a 1814 = _bfd_elf_link_read_relocs (abfd, sec, (void *) NULL,
45d6a902 1815 (Elf_Internal_Rela *) NULL, FALSE);
252b5132 1816
6cdc0ccc
AM
1817 if (internal_relocs == NULL)
1818 goto error_return;
252b5132 1819
6cdc0ccc
AM
1820 irelend = internal_relocs + sec->reloc_count;
1821 for (irel = internal_relocs; irel < irelend; irel++)
252b5132
RH
1822 {
1823 long r_type;
1824 unsigned long r_index;
252b5132
RH
1825
1826 struct elf_link_hash_entry *h;
1827
1828 r_type = ELF32_R_TYPE (irel->r_info);
1829 r_index = ELF32_R_SYM (irel->r_info);
1830
9b485d32 1831 /* These are the only relocation types we care about. */
ba96a88f 1832 if ( r_type != R_ARM_PC24
b7693d02 1833 && r_type != R_ARM_PLT32
5b5bb741
PB
1834#ifndef OLD_ARM_ABI
1835 && r_type != R_ARM_CALL
1836 && r_type != R_ARM_JUMP24
1837#endif
252b5132
RH
1838 && r_type != R_ARM_THM_PC22)
1839 continue;
1840
1841 /* Get the section contents if we haven't done so already. */
1842 if (contents == NULL)
1843 {
1844 /* Get cached copy if it exists. */
1845 if (elf_section_data (sec)->this_hdr.contents != NULL)
1846 contents = elf_section_data (sec)->this_hdr.contents;
1847 else
1848 {
1849 /* Go get them off disk. */
57e8b36a 1850 if (! bfd_malloc_and_get_section (abfd, sec, &contents))
252b5132
RH
1851 goto error_return;
1852 }
1853 }
1854
a7c10850 1855 /* If the relocation is not against a symbol it cannot concern us. */
252b5132
RH
1856 h = NULL;
1857
9b485d32 1858 /* We don't care about local symbols. */
252b5132
RH
1859 if (r_index < symtab_hdr->sh_info)
1860 continue;
1861
9b485d32 1862 /* This is an external symbol. */
252b5132
RH
1863 r_index -= symtab_hdr->sh_info;
1864 h = (struct elf_link_hash_entry *)
1865 elf_sym_hashes (abfd)[r_index];
1866
1867 /* If the relocation is against a static symbol it must be within
1868 the current section and so cannot be a cross ARM/Thumb relocation. */
1869 if (h == NULL)
1870 continue;
1871
b7693d02
DJ
1872 /* If the call will go through a PLT entry then we do not need
1873 glue. */
1874 if (globals->splt != NULL && h->plt.offset != (bfd_vma) -1)
1875 continue;
1876
252b5132
RH
1877 switch (r_type)
1878 {
1879 case R_ARM_PC24:
5b5bb741
PB
1880#ifndef OLD_ARM_ABI
1881 case R_ARM_CALL:
1882 case R_ARM_JUMP24:
1883#endif
252b5132 1884 /* This one is a call from arm code. We need to look up
2f0ca46a 1885 the target of the call. If it is a thumb target, we
252b5132 1886 insert glue. */
252b5132
RH
1887 if (ELF_ST_TYPE(h->type) == STT_ARM_TFUNC)
1888 record_arm_to_thumb_glue (link_info, h);
1889 break;
1890
1891 case R_ARM_THM_PC22:
f21f3fe0 1892 /* This one is a call from thumb code. We look
2f0ca46a 1893 up the target of the call. If it is not a thumb
bcbdc74c 1894 target, we insert glue. */
252b5132
RH
1895 if (ELF_ST_TYPE (h->type) != STT_ARM_TFUNC)
1896 record_thumb_to_arm_glue (link_info, h);
1897 break;
1898
1899 default:
1900 break;
1901 }
1902 }
6cdc0ccc
AM
1903
1904 if (contents != NULL
1905 && elf_section_data (sec)->this_hdr.contents != contents)
1906 free (contents);
1907 contents = NULL;
1908
1909 if (internal_relocs != NULL
1910 && elf_section_data (sec)->relocs != internal_relocs)
1911 free (internal_relocs);
1912 internal_relocs = NULL;
252b5132
RH
1913 }
1914
b34976b6 1915 return TRUE;
9a5aca8c 1916
252b5132 1917error_return:
6cdc0ccc
AM
1918 if (contents != NULL
1919 && elf_section_data (sec)->this_hdr.contents != contents)
1920 free (contents);
1921 if (internal_relocs != NULL
1922 && elf_section_data (sec)->relocs != internal_relocs)
1923 free (internal_relocs);
9a5aca8c 1924
b34976b6 1925 return FALSE;
252b5132 1926}
7e392df6 1927#endif
252b5132 1928
eb043451
PB
1929
1930#ifndef OLD_ARM_ABI
1931/* Set target relocation values needed during linking. */
1932
1933void
1934bfd_elf32_arm_set_target_relocs (struct bfd_link_info *link_info,
1935 int target1_is_rel,
1936 char * target2_type)
1937{
1938 struct elf32_arm_link_hash_table *globals;
1939
1940 globals = elf32_arm_hash_table (link_info);
1941
1942 globals->target1_is_rel = target1_is_rel;
1943 if (strcmp (target2_type, "rel") == 0)
1944 globals->target2_reloc = R_ARM_REL32;
eeac373a
PB
1945 else if (strcmp (target2_type, "abs") == 0)
1946 globals->target2_reloc = R_ARM_ABS32;
eb043451
PB
1947 else if (strcmp (target2_type, "got-rel") == 0)
1948 globals->target2_reloc = R_ARM_GOT_PREL;
1949 else
1950 {
1951 _bfd_error_handler (_("Invalid TARGET2 relocation type '%s'."),
1952 target2_type);
1953 }
1954}
1955#endif
1956
252b5132
RH
1957/* The thumb form of a long branch is a bit finicky, because the offset
1958 encoding is split over two fields, each in it's own instruction. They
f21f3fe0 1959 can occur in any order. So given a thumb form of long branch, and an
252b5132 1960 offset, insert the offset into the thumb branch and return finished
f21f3fe0 1961 instruction.
252b5132 1962
f21f3fe0 1963 It takes two thumb instructions to encode the target address. Each has
4cc11e76 1964 11 bits to invest. The upper 11 bits are stored in one (identified by
f21f3fe0
UD
1965 H-0.. see below), the lower 11 bits are stored in the other (identified
1966 by H-1).
252b5132 1967
f21f3fe0 1968 Combine together and shifted left by 1 (it's a half word address) and
252b5132
RH
1969 there you have it.
1970
1971 Op: 1111 = F,
1972 H-0, upper address-0 = 000
1973 Op: 1111 = F,
1974 H-1, lower address-0 = 800
1975
f21f3fe0 1976 They can be ordered either way, but the arm tools I've seen always put
252b5132
RH
1977 the lower one first. It probably doesn't matter. krk@cygnus.com
1978
1979 XXX: Actually the order does matter. The second instruction (H-1)
1980 moves the computed address into the PC, so it must be the second one
1981 in the sequence. The problem, however is that whilst little endian code
1982 stores the instructions in HI then LOW order, big endian code does the
dfc5f959 1983 reverse. nickc@cygnus.com. */
252b5132 1984
dfc5f959
NC
1985#define LOW_HI_ORDER 0xF800F000
1986#define HI_LOW_ORDER 0xF000F800
252b5132
RH
1987
1988static insn32
57e8b36a 1989insert_thumb_branch (insn32 br_insn, int rel_off)
252b5132
RH
1990{
1991 unsigned int low_bits;
1992 unsigned int high_bits;
1993
252b5132
RH
1994 BFD_ASSERT ((rel_off & 1) != 1);
1995
dfc5f959
NC
1996 rel_off >>= 1; /* Half word aligned address. */
1997 low_bits = rel_off & 0x000007FF; /* The bottom 11 bits. */
1998 high_bits = (rel_off >> 11) & 0x000007FF; /* The top 11 bits. */
252b5132
RH
1999
2000 if ((br_insn & LOW_HI_ORDER) == LOW_HI_ORDER)
2001 br_insn = LOW_HI_ORDER | (low_bits << 16) | high_bits;
2002 else if ((br_insn & HI_LOW_ORDER) == HI_LOW_ORDER)
2003 br_insn = HI_LOW_ORDER | (high_bits << 16) | low_bits;
2004 else
9b485d32 2005 /* FIXME: abort is probably not the right call. krk@cygnus.com */
57e8b36a 2006 abort (); /* Error - not a valid branch instruction form. */
252b5132 2007
252b5132
RH
2008 return br_insn;
2009}
2010
9b485d32
NC
2011/* Thumb code calling an ARM function. */
2012
252b5132 2013static int
57e8b36a
NC
2014elf32_thumb_to_arm_stub (struct bfd_link_info * info,
2015 const char * name,
2016 bfd * input_bfd,
2017 bfd * output_bfd,
2018 asection * input_section,
2019 bfd_byte * hit_data,
2020 asection * sym_sec,
2021 bfd_vma offset,
2022 bfd_signed_vma addend,
2023 bfd_vma val)
252b5132 2024{
bcbdc74c 2025 asection * s = 0;
dc810e39 2026 bfd_vma my_offset;
252b5132
RH
2027 unsigned long int tmp;
2028 long int ret_offset;
bcbdc74c
NC
2029 struct elf_link_hash_entry * myh;
2030 struct elf32_arm_link_hash_table * globals;
252b5132
RH
2031
2032 myh = find_thumb_glue (info, name, input_bfd);
2033 if (myh == NULL)
b34976b6 2034 return FALSE;
252b5132
RH
2035
2036 globals = elf32_arm_hash_table (info);
2037
2038 BFD_ASSERT (globals != NULL);
2039 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
2040
2041 my_offset = myh->root.u.def.value;
2042
2043 s = bfd_get_section_by_name (globals->bfd_of_glue_owner,
2044 THUMB2ARM_GLUE_SECTION_NAME);
2045
2046 BFD_ASSERT (s != NULL);
2047 BFD_ASSERT (s->contents != NULL);
2048 BFD_ASSERT (s->output_section != NULL);
2049
2050 if ((my_offset & 0x01) == 0x01)
2051 {
2052 if (sym_sec != NULL
2053 && sym_sec->owner != NULL
2054 && !INTERWORK_FLAG (sym_sec->owner))
2055 {
8f615d07 2056 (*_bfd_error_handler)
d003868e
AM
2057 (_("%B(%s): warning: interworking not enabled.\n"
2058 " first occurrence: %B: thumb call to arm"),
2059 sym_sec->owner, input_bfd, name);
252b5132 2060
b34976b6 2061 return FALSE;
252b5132
RH
2062 }
2063
2064 --my_offset;
2065 myh->root.u.def.value = my_offset;
2066
dc810e39 2067 bfd_put_16 (output_bfd, (bfd_vma) t2a1_bx_pc_insn,
252b5132
RH
2068 s->contents + my_offset);
2069
dc810e39 2070 bfd_put_16 (output_bfd, (bfd_vma) t2a2_noop_insn,
252b5132
RH
2071 s->contents + my_offset + 2);
2072
2073 ret_offset =
9b485d32
NC
2074 /* Address of destination of the stub. */
2075 ((bfd_signed_vma) val)
252b5132 2076 - ((bfd_signed_vma)
57e8b36a
NC
2077 /* Offset from the start of the current section
2078 to the start of the stubs. */
9b485d32
NC
2079 (s->output_offset
2080 /* Offset of the start of this stub from the start of the stubs. */
2081 + my_offset
2082 /* Address of the start of the current section. */
2083 + s->output_section->vma)
2084 /* The branch instruction is 4 bytes into the stub. */
2085 + 4
2086 /* ARM branches work from the pc of the instruction + 8. */
2087 + 8);
252b5132
RH
2088
2089 bfd_put_32 (output_bfd,
dc810e39 2090 (bfd_vma) t2a3_b_insn | ((ret_offset >> 2) & 0x00FFFFFF),
252b5132
RH
2091 s->contents + my_offset + 4);
2092 }
2093
2094 BFD_ASSERT (my_offset <= globals->thumb_glue_size);
2095
427bfd90
NC
2096 /* Now go back and fix up the original BL insn to point to here. */
2097 ret_offset =
2098 /* Address of where the stub is located. */
2099 (s->output_section->vma + s->output_offset + my_offset)
2100 /* Address of where the BL is located. */
57e8b36a
NC
2101 - (input_section->output_section->vma + input_section->output_offset
2102 + offset)
427bfd90
NC
2103 /* Addend in the relocation. */
2104 - addend
2105 /* Biassing for PC-relative addressing. */
2106 - 8;
252b5132
RH
2107
2108 tmp = bfd_get_32 (input_bfd, hit_data
2109 - input_section->vma);
2110
2111 bfd_put_32 (output_bfd,
dc810e39 2112 (bfd_vma) insert_thumb_branch (tmp, ret_offset),
252b5132
RH
2113 hit_data - input_section->vma);
2114
b34976b6 2115 return TRUE;
252b5132
RH
2116}
2117
9b485d32
NC
2118/* Arm code calling a Thumb function. */
2119
252b5132 2120static int
57e8b36a
NC
2121elf32_arm_to_thumb_stub (struct bfd_link_info * info,
2122 const char * name,
2123 bfd * input_bfd,
2124 bfd * output_bfd,
2125 asection * input_section,
2126 bfd_byte * hit_data,
2127 asection * sym_sec,
2128 bfd_vma offset,
2129 bfd_signed_vma addend,
2130 bfd_vma val)
252b5132
RH
2131{
2132 unsigned long int tmp;
dc810e39 2133 bfd_vma my_offset;
bcbdc74c 2134 asection * s;
252b5132 2135 long int ret_offset;
bcbdc74c
NC
2136 struct elf_link_hash_entry * myh;
2137 struct elf32_arm_link_hash_table * globals;
252b5132
RH
2138
2139 myh = find_arm_glue (info, name, input_bfd);
2140 if (myh == NULL)
b34976b6 2141 return FALSE;
252b5132
RH
2142
2143 globals = elf32_arm_hash_table (info);
2144
2145 BFD_ASSERT (globals != NULL);
2146 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
2147
2148 my_offset = myh->root.u.def.value;
2149 s = bfd_get_section_by_name (globals->bfd_of_glue_owner,
2150 ARM2THUMB_GLUE_SECTION_NAME);
2151 BFD_ASSERT (s != NULL);
2152 BFD_ASSERT (s->contents != NULL);
2153 BFD_ASSERT (s->output_section != NULL);
2154
2155 if ((my_offset & 0x01) == 0x01)
2156 {
2157 if (sym_sec != NULL
2158 && sym_sec->owner != NULL
2159 && !INTERWORK_FLAG (sym_sec->owner))
2160 {
8f615d07 2161 (*_bfd_error_handler)
d003868e
AM
2162 (_("%B(%s): warning: interworking not enabled.\n"
2163 " first occurrence: %B: arm call to thumb"),
2164 sym_sec->owner, input_bfd, name);
252b5132 2165 }
9b485d32 2166
252b5132
RH
2167 --my_offset;
2168 myh->root.u.def.value = my_offset;
2169
dc810e39 2170 bfd_put_32 (output_bfd, (bfd_vma) a2t1_ldr_insn,
252b5132
RH
2171 s->contents + my_offset);
2172
dc810e39 2173 bfd_put_32 (output_bfd, (bfd_vma) a2t2_bx_r12_insn,
252b5132
RH
2174 s->contents + my_offset + 4);
2175
2176 /* It's a thumb address. Add the low order bit. */
2177 bfd_put_32 (output_bfd, val | a2t3_func_addr_insn,
2178 s->contents + my_offset + 8);
2179 }
2180
2181 BFD_ASSERT (my_offset <= globals->arm_glue_size);
2182
2183 tmp = bfd_get_32 (input_bfd, hit_data);
2184 tmp = tmp & 0xFF000000;
2185
9b485d32 2186 /* Somehow these are both 4 too far, so subtract 8. */
dc810e39
AM
2187 ret_offset = (s->output_offset
2188 + my_offset
2189 + s->output_section->vma
2190 - (input_section->output_offset
2191 + input_section->output_section->vma
2192 + offset + addend)
2193 - 8);
9a5aca8c 2194
252b5132
RH
2195 tmp = tmp | ((ret_offset >> 2) & 0x00FFFFFF);
2196
dc810e39 2197 bfd_put_32 (output_bfd, (bfd_vma) tmp, hit_data - input_section->vma);
252b5132 2198
b34976b6 2199 return TRUE;
252b5132
RH
2200}
2201
eb043451
PB
2202
2203#ifndef OLD_ARM_ABI
2204/* Some relocations map to different relocations depending on the
2205 target. Return the real relocation. */
2206static int
2207arm_real_reloc_type (struct elf32_arm_link_hash_table * globals,
2208 int r_type)
2209{
2210 switch (r_type)
2211 {
2212 case R_ARM_TARGET1:
2213 if (globals->target1_is_rel)
2214 return R_ARM_REL32;
2215 else
2216 return R_ARM_ABS32;
2217
2218 case R_ARM_TARGET2:
2219 return globals->target2_reloc;
2220
2221 default:
2222 return r_type;
2223 }
2224}
2225#endif /* OLD_ARM_ABI */
2226
2227
252b5132 2228/* Perform a relocation as part of a final link. */
9b485d32 2229
252b5132 2230static bfd_reloc_status_type
57e8b36a
NC
2231elf32_arm_final_link_relocate (reloc_howto_type * howto,
2232 bfd * input_bfd,
2233 bfd * output_bfd,
2234 asection * input_section,
2235 bfd_byte * contents,
2236 Elf_Internal_Rela * rel,
2237 bfd_vma value,
2238 struct bfd_link_info * info,
2239 asection * sym_sec,
2240 const char * sym_name,
2241 int sym_flags,
2242 struct elf_link_hash_entry * h)
252b5132
RH
2243{
2244 unsigned long r_type = howto->type;
2245 unsigned long r_symndx;
2246 bfd_byte * hit_data = contents + rel->r_offset;
2247 bfd * dynobj = NULL;
2248 Elf_Internal_Shdr * symtab_hdr;
2249 struct elf_link_hash_entry ** sym_hashes;
2250 bfd_vma * local_got_offsets;
2251 asection * sgot = NULL;
2252 asection * splt = NULL;
2253 asection * sreloc = NULL;
252b5132 2254 bfd_vma addend;
ba96a88f
NC
2255 bfd_signed_vma signed_addend;
2256 struct elf32_arm_link_hash_table * globals;
f21f3fe0 2257
9c504268
PB
2258 globals = elf32_arm_hash_table (info);
2259
2260#ifndef OLD_ARM_ABI
2261 /* Some relocation type map to different relocations depending on the
2262 target. We pick the right one here. */
eb043451
PB
2263 r_type = arm_real_reloc_type (globals, r_type);
2264 if (r_type != howto->type)
2265 howto = elf32_arm_howto_from_type (r_type);
9c504268
PB
2266#endif /* OLD_ARM_ABI */
2267
cac15327
NC
2268 /* If the start address has been set, then set the EF_ARM_HASENTRY
2269 flag. Setting this more than once is redundant, but the cost is
2270 not too high, and it keeps the code simple.
99e4ae17 2271
cac15327
NC
2272 The test is done here, rather than somewhere else, because the
2273 start address is only set just before the final link commences.
2274
2275 Note - if the user deliberately sets a start address of 0, the
2276 flag will not be set. */
2277 if (bfd_get_start_address (output_bfd) != 0)
2278 elf_elfheader (output_bfd)->e_flags |= EF_ARM_HASENTRY;
99e4ae17 2279
252b5132
RH
2280 dynobj = elf_hash_table (info)->dynobj;
2281 if (dynobj)
2282 {
2283 sgot = bfd_get_section_by_name (dynobj, ".got");
2284 splt = bfd_get_section_by_name (dynobj, ".plt");
2285 }
2286 symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr;
2287 sym_hashes = elf_sym_hashes (input_bfd);
2288 local_got_offsets = elf_local_got_offsets (input_bfd);
2289 r_symndx = ELF32_R_SYM (rel->r_info);
2290
acf8aed4 2291#if USE_REL
ba96a88f
NC
2292 addend = bfd_get_32 (input_bfd, hit_data) & howto->src_mask;
2293
2294 if (addend & ((howto->src_mask + 1) >> 1))
2295 {
2296 signed_addend = -1;
2297 signed_addend &= ~ howto->src_mask;
2298 signed_addend |= addend;
2299 }
2300 else
2301 signed_addend = addend;
252b5132 2302#else
ba96a88f 2303 addend = signed_addend = rel->r_addend;
252b5132 2304#endif
f21f3fe0 2305
252b5132
RH
2306 switch (r_type)
2307 {
2308 case R_ARM_NONE:
2309 return bfd_reloc_ok;
2310
2311 case R_ARM_PC24:
2312 case R_ARM_ABS32:
2313 case R_ARM_REL32:
dfc5f959 2314#ifndef OLD_ARM_ABI
5b5bb741
PB
2315 case R_ARM_CALL:
2316 case R_ARM_JUMP24:
dfc5f959 2317 case R_ARM_XPC25:
eb043451 2318 case R_ARM_PREL31:
dfc5f959 2319#endif
7359ea65 2320 case R_ARM_PLT32:
5e681ec4
PB
2321 /* r_symndx will be zero only for relocs against symbols
2322 from removed linkonce sections, or sections discarded by
2323 a linker script. */
2324 if (r_symndx == 0)
2325 return bfd_reloc_ok;
2326
7359ea65
DJ
2327 /* Handle relocations which should use the PLT entry. ABS32/REL32
2328 will use the symbol's value, which may point to a PLT entry, but we
2329 don't need to handle that here. If we created a PLT entry, all
2330 branches in this object should go to it. */
ee06dc07 2331 if ((r_type != R_ARM_ABS32 && r_type != R_ARM_REL32)
7359ea65 2332 && h != NULL
c84cd8ee 2333 && splt != NULL
7359ea65
DJ
2334 && h->plt.offset != (bfd_vma) -1)
2335 {
c84cd8ee
DJ
2336 /* If we've created a .plt section, and assigned a PLT entry to
2337 this function, it should not be known to bind locally. If
2338 it were, we would have cleared the PLT entry. */
7359ea65
DJ
2339 BFD_ASSERT (!SYMBOL_CALLS_LOCAL (info, h));
2340
2341 value = (splt->output_section->vma
2342 + splt->output_offset
2343 + h->plt.offset);
2344 return _bfd_final_link_relocate (howto, input_bfd, input_section,
2345 contents, rel->r_offset, value,
2346 (bfd_vma) 0);
2347 }
2348
252b5132 2349 /* When generating a shared object, these relocations are copied
9b485d32 2350 into the output file to be resolved at run time. */
7359ea65
DJ
2351 if (info->shared
2352 && (input_section->flags & SEC_ALLOC)
ee06dc07
PB
2353 && (r_type != R_ARM_REL32
2354 || !SYMBOL_CALLS_LOCAL (info, h))
7359ea65
DJ
2355 && (h == NULL
2356 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2357 || h->root.type != bfd_link_hash_undefweak)
2358 && r_type != R_ARM_PC24
5b5bb741
PB
2359#ifndef OLD_ARM_ABI
2360 && r_type != R_ARM_CALL
2361 && r_type != R_ARM_JUMP24
ee06dc07 2362 && r_type != R_ARM_PREL31
5b5bb741 2363#endif
7359ea65 2364 && r_type != R_ARM_PLT32)
252b5132 2365 {
947216bf
AM
2366 Elf_Internal_Rela outrel;
2367 bfd_byte *loc;
b34976b6 2368 bfd_boolean skip, relocate;
f21f3fe0 2369
252b5132
RH
2370 if (sreloc == NULL)
2371 {
2372 const char * name;
f21f3fe0 2373
252b5132
RH
2374 name = (bfd_elf_string_from_elf_section
2375 (input_bfd,
2376 elf_elfheader (input_bfd)->e_shstrndx,
2377 elf_section_data (input_section)->rel_hdr.sh_name));
2378 if (name == NULL)
2379 return bfd_reloc_notsupported;
f21f3fe0 2380
252b5132
RH
2381 BFD_ASSERT (strncmp (name, ".rel", 4) == 0
2382 && strcmp (bfd_get_section_name (input_bfd,
2383 input_section),
2384 name + 4) == 0);
f21f3fe0 2385
252b5132
RH
2386 sreloc = bfd_get_section_by_name (dynobj, name);
2387 BFD_ASSERT (sreloc != NULL);
2388 }
f21f3fe0 2389
b34976b6
AM
2390 skip = FALSE;
2391 relocate = FALSE;
f21f3fe0 2392
c629eae0
JJ
2393 outrel.r_offset =
2394 _bfd_elf_section_offset (output_bfd, info, input_section,
2395 rel->r_offset);
2396 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 2397 skip = TRUE;
0bb2d96a 2398 else if (outrel.r_offset == (bfd_vma) -2)
b34976b6 2399 skip = TRUE, relocate = TRUE;
252b5132
RH
2400 outrel.r_offset += (input_section->output_section->vma
2401 + input_section->output_offset);
f21f3fe0 2402
252b5132 2403 if (skip)
0bb2d96a 2404 memset (&outrel, 0, sizeof outrel);
5e681ec4
PB
2405 else if (h != NULL
2406 && h->dynindx != -1
7359ea65 2407 && (!info->shared
5e681ec4 2408 || !info->symbolic
f5385ebf 2409 || !h->def_regular))
5e681ec4 2410 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
252b5132
RH
2411 else
2412 {
a16385dc
MM
2413 int symbol;
2414
5e681ec4
PB
2415 /* This symbol is local, or marked to become local. */
2416 relocate = TRUE;
b7693d02
DJ
2417 if (sym_flags == STT_ARM_TFUNC)
2418 value |= 1;
a16385dc 2419 if (globals->symbian_p)
6366ff1e
MM
2420 {
2421 /* On Symbian OS, the data segment and text segement
2422 can be relocated independently. Therefore, we
2423 must indicate the segment to which this
2424 relocation is relative. The BPABI allows us to
2425 use any symbol in the right segment; we just use
2426 the section symbol as it is convenient. (We
2427 cannot use the symbol given by "h" directly as it
2428 will not appear in the dynamic symbol table.) */
2429 symbol = elf_section_data (sym_sec->output_section)->dynindx;
2430 BFD_ASSERT (symbol != 0);
2431 }
a16385dc
MM
2432 else
2433 /* On SVR4-ish systems, the dynamic loader cannot
2434 relocate the text and data segments independently,
2435 so the symbol does not matter. */
2436 symbol = 0;
2437 outrel.r_info = ELF32_R_INFO (symbol, R_ARM_RELATIVE);
252b5132 2438 }
f21f3fe0 2439
947216bf
AM
2440 loc = sreloc->contents;
2441 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rel);
2442 bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
9a5aca8c 2443
f21f3fe0 2444 /* If this reloc is against an external symbol, we do not want to
252b5132 2445 fiddle with the addend. Otherwise, we need to include the symbol
9b485d32 2446 value so that it becomes an addend for the dynamic reloc. */
252b5132
RH
2447 if (! relocate)
2448 return bfd_reloc_ok;
9a5aca8c 2449
f21f3fe0 2450 return _bfd_final_link_relocate (howto, input_bfd, input_section,
252b5132
RH
2451 contents, rel->r_offset, value,
2452 (bfd_vma) 0);
2453 }
2454 else switch (r_type)
2455 {
dfc5f959
NC
2456#ifndef OLD_ARM_ABI
2457 case R_ARM_XPC25: /* Arm BLX instruction. */
5b5bb741
PB
2458 case R_ARM_CALL:
2459 case R_ARM_JUMP24:
dfc5f959
NC
2460#endif
2461 case R_ARM_PC24: /* Arm B/BL instruction */
7359ea65 2462 case R_ARM_PLT32:
dfc5f959
NC
2463#ifndef OLD_ARM_ABI
2464 if (r_type == R_ARM_XPC25)
252b5132 2465 {
dfc5f959
NC
2466 /* Check for Arm calling Arm function. */
2467 /* FIXME: Should we translate the instruction into a BL
2468 instruction instead ? */
2469 if (sym_flags != STT_ARM_TFUNC)
d003868e
AM
2470 (*_bfd_error_handler)
2471 (_("\%B: Warning: Arm BLX instruction targets Arm function '%s'."),
2472 input_bfd,
2473 h ? h->root.root.string : "(local)");
dfc5f959
NC
2474 }
2475 else
2476#endif
2477 {
2478 /* Check for Arm calling Thumb function. */
2479 if (sym_flags == STT_ARM_TFUNC)
2480 {
57e8b36a
NC
2481 elf32_arm_to_thumb_stub (info, sym_name, input_bfd,
2482 output_bfd, input_section,
2483 hit_data, sym_sec, rel->r_offset,
dfc5f959
NC
2484 signed_addend, value);
2485 return bfd_reloc_ok;
2486 }
252b5132 2487 }
ba96a88f 2488
dea514f5
PB
2489 /* The ARM ELF ABI says that this reloc is computed as: S - P + A
2490 where:
2491 S is the address of the symbol in the relocation.
2492 P is address of the instruction being relocated.
2493 A is the addend (extracted from the instruction) in bytes.
2494
2495 S is held in 'value'.
2496 P is the base address of the section containing the
2497 instruction plus the offset of the reloc into that
2498 section, ie:
2499 (input_section->output_section->vma +
2500 input_section->output_offset +
2501 rel->r_offset).
2502 A is the addend, converted into bytes, ie:
2503 (signed_addend * 4)
2504
2505 Note: None of these operations have knowledge of the pipeline
2506 size of the processor, thus it is up to the assembler to
2507 encode this information into the addend. */
2508 value -= (input_section->output_section->vma
2509 + input_section->output_offset);
2510 value -= rel->r_offset;
2511 value += (signed_addend << howto->size);
23080146 2512
dcb5e6e6
NC
2513 signed_addend = value;
2514 signed_addend >>= howto->rightshift;
9a5aca8c 2515
59f2c4e7
NC
2516 /* It is not an error for an undefined weak reference to be
2517 out of range. Any program that branches to such a symbol
9a5aca8c
AM
2518 is going to crash anyway, so there is no point worrying
2519 about getting the destination exactly right. */
59f2c4e7
NC
2520 if (! h || h->root.type != bfd_link_hash_undefweak)
2521 {
9b485d32 2522 /* Perform a signed range check. */
dcb5e6e6 2523 if ( signed_addend > ((bfd_signed_vma) (howto->dst_mask >> 1))
59f2c4e7
NC
2524 || signed_addend < - ((bfd_signed_vma) ((howto->dst_mask + 1) >> 1)))
2525 return bfd_reloc_overflow;
2526 }
9a5aca8c 2527
dcb5e6e6
NC
2528#ifndef OLD_ARM_ABI
2529 /* If necessary set the H bit in the BLX instruction. */
2530 if (r_type == R_ARM_XPC25 && ((value & 2) == 2))
2531 value = (signed_addend & howto->dst_mask)
2532 | (bfd_get_32 (input_bfd, hit_data) & (~ howto->dst_mask))
2533 | (1 << 24);
2534 else
2535#endif
2536 value = (signed_addend & howto->dst_mask)
2537 | (bfd_get_32 (input_bfd, hit_data) & (~ howto->dst_mask));
252b5132 2538 break;
f21f3fe0 2539
252b5132
RH
2540 case R_ARM_ABS32:
2541 value += addend;
2542 if (sym_flags == STT_ARM_TFUNC)
2543 value |= 1;
2544 break;
f21f3fe0 2545
252b5132
RH
2546 case R_ARM_REL32:
2547 value -= (input_section->output_section->vma
62efb346 2548 + input_section->output_offset + rel->r_offset);
252b5132
RH
2549 value += addend;
2550 break;
eb043451
PB
2551
2552#ifndef OLD_ARM_ABI
2553 case R_ARM_PREL31:
2554 value -= (input_section->output_section->vma
2555 + input_section->output_offset + rel->r_offset);
2556 value += signed_addend;
2557 if (! h || h->root.type != bfd_link_hash_undefweak)
2558 {
2559 /* Check for overflow */
2560 if ((value ^ (value >> 1)) & (1 << 30))
2561 return bfd_reloc_overflow;
2562 }
2563 value &= 0x7fffffff;
2564 value |= (bfd_get_32 (input_bfd, hit_data) & 0x80000000);
2565 if (sym_flags == STT_ARM_TFUNC)
2566 value |= 1;
2567 break;
2568#endif
252b5132 2569 }
f21f3fe0 2570
252b5132
RH
2571 bfd_put_32 (input_bfd, value, hit_data);
2572 return bfd_reloc_ok;
2573
2574 case R_ARM_ABS8:
2575 value += addend;
2576 if ((long) value > 0x7f || (long) value < -0x80)
2577 return bfd_reloc_overflow;
2578
2579 bfd_put_8 (input_bfd, value, hit_data);
2580 return bfd_reloc_ok;
2581
2582 case R_ARM_ABS16:
2583 value += addend;
2584
2585 if ((long) value > 0x7fff || (long) value < -0x8000)
2586 return bfd_reloc_overflow;
2587
2588 bfd_put_16 (input_bfd, value, hit_data);
2589 return bfd_reloc_ok;
2590
2591 case R_ARM_ABS12:
2592 /* Support ldr and str instruction for the arm */
2593 /* Also thumb b (unconditional branch). ??? Really? */
2594 value += addend;
2595
2596 if ((long) value > 0x7ff || (long) value < -0x800)
2597 return bfd_reloc_overflow;
2598
2599 value |= (bfd_get_32 (input_bfd, hit_data) & 0xfffff000);
2600 bfd_put_32 (input_bfd, value, hit_data);
2601 return bfd_reloc_ok;
2602
2603 case R_ARM_THM_ABS5:
9b485d32 2604 /* Support ldr and str instructions for the thumb. */
acf8aed4 2605#if USE_REL
252b5132
RH
2606 /* Need to refetch addend. */
2607 addend = bfd_get_16 (input_bfd, hit_data) & howto->src_mask;
2608 /* ??? Need to determine shift amount from operand size. */
2609 addend >>= howto->rightshift;
2610#endif
2611 value += addend;
2612
2613 /* ??? Isn't value unsigned? */
2614 if ((long) value > 0x1f || (long) value < -0x10)
2615 return bfd_reloc_overflow;
2616
2617 /* ??? Value needs to be properly shifted into place first. */
2618 value |= bfd_get_16 (input_bfd, hit_data) & 0xf83f;
2619 bfd_put_16 (input_bfd, value, hit_data);
2620 return bfd_reloc_ok;
2621
dfc5f959
NC
2622#ifndef OLD_ARM_ABI
2623 case R_ARM_THM_XPC22:
2624#endif
252b5132 2625 case R_ARM_THM_PC22:
dfc5f959 2626 /* Thumb BL (branch long instruction). */
252b5132 2627 {
b34976b6
AM
2628 bfd_vma relocation;
2629 bfd_boolean overflow = FALSE;
2630 bfd_vma upper_insn = bfd_get_16 (input_bfd, hit_data);
2631 bfd_vma lower_insn = bfd_get_16 (input_bfd, hit_data + 2);
df212a7e 2632 bfd_signed_vma reloc_signed_max = ((1 << (howto->bitsize - 1)) - 1) >> howto->rightshift;
ba96a88f 2633 bfd_signed_vma reloc_signed_min = ~ reloc_signed_max;
b34976b6 2634 bfd_vma check;
252b5132 2635 bfd_signed_vma signed_check;
252b5132 2636
acf8aed4 2637#if USE_REL
252b5132
RH
2638 /* Need to refetch the addend and squish the two 11 bit pieces
2639 together. */
2640 {
ba96a88f
NC
2641 bfd_vma upper = upper_insn & 0x7ff;
2642 bfd_vma lower = lower_insn & 0x7ff;
9b485d32 2643 upper = (upper ^ 0x400) - 0x400; /* Sign extend. */
252b5132 2644 addend = (upper << 12) | (lower << 1);
ba96a88f 2645 signed_addend = addend;
252b5132
RH
2646 }
2647#endif
dfc5f959
NC
2648#ifndef OLD_ARM_ABI
2649 if (r_type == R_ARM_THM_XPC22)
2650 {
2651 /* Check for Thumb to Thumb call. */
2652 /* FIXME: Should we translate the instruction into a BL
2653 instruction instead ? */
2654 if (sym_flags == STT_ARM_TFUNC)
d003868e
AM
2655 (*_bfd_error_handler)
2656 (_("%B: Warning: Thumb BLX instruction targets thumb function '%s'."),
2657 input_bfd,
2658 h ? h->root.root.string : "(local)");
dfc5f959
NC
2659 }
2660 else
2661#endif
252b5132 2662 {
dfc5f959
NC
2663 /* If it is not a call to Thumb, assume call to Arm.
2664 If it is a call relative to a section name, then it is not a
b7693d02
DJ
2665 function call at all, but rather a long jump. Calls through
2666 the PLT do not require stubs. */
2667 if (sym_flags != STT_ARM_TFUNC && sym_flags != STT_SECTION
2668 && (h == NULL || splt == NULL
2669 || h->plt.offset == (bfd_vma) -1))
dfc5f959
NC
2670 {
2671 if (elf32_thumb_to_arm_stub
2672 (info, sym_name, input_bfd, output_bfd, input_section,
2673 hit_data, sym_sec, rel->r_offset, signed_addend, value))
2674 return bfd_reloc_ok;
2675 else
2676 return bfd_reloc_dangerous;
2677 }
252b5132 2678 }
f21f3fe0 2679
b7693d02
DJ
2680 /* Handle calls via the PLT. */
2681 if (h != NULL && splt != NULL && h->plt.offset != (bfd_vma) -1)
2682 {
2683 value = (splt->output_section->vma
2684 + splt->output_offset
2685 + h->plt.offset);
2686 /* Target the Thumb stub before the ARM PLT entry. */
2687 value -= 4;
2688 }
2689
ba96a88f 2690 relocation = value + signed_addend;
f21f3fe0 2691
252b5132 2692 relocation -= (input_section->output_section->vma
ba96a88f
NC
2693 + input_section->output_offset
2694 + rel->r_offset);
9a5aca8c 2695
252b5132
RH
2696 check = relocation >> howto->rightshift;
2697
2698 /* If this is a signed value, the rightshift just dropped
2699 leading 1 bits (assuming twos complement). */
2700 if ((bfd_signed_vma) relocation >= 0)
2701 signed_check = check;
2702 else
2703 signed_check = check | ~((bfd_vma) -1 >> howto->rightshift);
2704
252b5132 2705 /* Assumes two's complement. */
ba96a88f 2706 if (signed_check > reloc_signed_max || signed_check < reloc_signed_min)
b34976b6 2707 overflow = TRUE;
252b5132 2708
df425bc0 2709#ifndef OLD_ARM_ABI
4f3c3dbb
NC
2710 if (r_type == R_ARM_THM_XPC22
2711 && ((lower_insn & 0x1800) == 0x0800))
c62e1cc3
NC
2712 /* For a BLX instruction, make sure that the relocation is rounded up
2713 to a word boundary. This follows the semantics of the instruction
2714 which specifies that bit 1 of the target address will come from bit
2715 1 of the base address. */
2716 relocation = (relocation + 2) & ~ 3;
99e4ae17 2717#endif
c62e1cc3
NC
2718 /* Put RELOCATION back into the insn. */
2719 upper_insn = (upper_insn & ~(bfd_vma) 0x7ff) | ((relocation >> 12) & 0x7ff);
2720 lower_insn = (lower_insn & ~(bfd_vma) 0x7ff) | ((relocation >> 1) & 0x7ff);
2721
252b5132
RH
2722 /* Put the relocated value back in the object file: */
2723 bfd_put_16 (input_bfd, upper_insn, hit_data);
2724 bfd_put_16 (input_bfd, lower_insn, hit_data + 2);
2725
2726 return (overflow ? bfd_reloc_overflow : bfd_reloc_ok);
2727 }
2728 break;
2729
51c5503b
NC
2730 case R_ARM_THM_PC11:
2731 /* Thumb B (branch) instruction). */
2732 {
6cf9e9fe 2733 bfd_signed_vma relocation;
51c5503b
NC
2734 bfd_signed_vma reloc_signed_max = (1 << (howto->bitsize - 1)) - 1;
2735 bfd_signed_vma reloc_signed_min = ~ reloc_signed_max;
51c5503b
NC
2736 bfd_signed_vma signed_check;
2737
acf8aed4 2738#if USE_REL
51c5503b
NC
2739 /* Need to refetch addend. */
2740 addend = bfd_get_16 (input_bfd, hit_data) & howto->src_mask;
6cf9e9fe
NC
2741 if (addend & ((howto->src_mask + 1) >> 1))
2742 {
2743 signed_addend = -1;
2744 signed_addend &= ~ howto->src_mask;
2745 signed_addend |= addend;
2746 }
2747 else
2748 signed_addend = addend;
2749 /* The value in the insn has been right shifted. We need to
2750 undo this, so that we can perform the address calculation
2751 in terms of bytes. */
2752 signed_addend <<= howto->rightshift;
51c5503b 2753#endif
6cf9e9fe 2754 relocation = value + signed_addend;
51c5503b
NC
2755
2756 relocation -= (input_section->output_section->vma
2757 + input_section->output_offset
2758 + rel->r_offset);
2759
6cf9e9fe
NC
2760 relocation >>= howto->rightshift;
2761 signed_check = relocation;
2762 relocation &= howto->dst_mask;
51c5503b 2763 relocation |= (bfd_get_16 (input_bfd, hit_data) & (~ howto->dst_mask));
cedb70c5 2764
51c5503b
NC
2765 bfd_put_16 (input_bfd, relocation, hit_data);
2766
2767 /* Assumes two's complement. */
2768 if (signed_check > reloc_signed_max || signed_check < reloc_signed_min)
2769 return bfd_reloc_overflow;
2770
2771 return bfd_reloc_ok;
2772 }
cedb70c5 2773
1f433d93 2774#ifndef OLD_ARM_ABI
8375c36b
PB
2775 case R_ARM_ALU_PCREL7_0:
2776 case R_ARM_ALU_PCREL15_8:
2777 case R_ARM_ALU_PCREL23_15:
2778 {
2779 bfd_vma insn;
2780 bfd_vma relocation;
2781
2782 insn = bfd_get_32 (input_bfd, hit_data);
2783#if USE_REL
2784 /* Extract the addend. */
2785 addend = (insn & 0xff) << ((insn & 0xf00) >> 7);
2786 signed_addend = addend;
2787#endif
2788 relocation = value + signed_addend;
2789
2790 relocation -= (input_section->output_section->vma
2791 + input_section->output_offset
2792 + rel->r_offset);
2793 insn = (insn & ~0xfff)
2794 | ((howto->bitpos << 7) & 0xf00)
2795 | ((relocation >> howto->bitpos) & 0xff);
2796 bfd_put_32 (input_bfd, value, hit_data);
2797 }
2798 return bfd_reloc_ok;
1f433d93 2799#endif
8375c36b 2800
252b5132
RH
2801 case R_ARM_GNU_VTINHERIT:
2802 case R_ARM_GNU_VTENTRY:
2803 return bfd_reloc_ok;
2804
2805 case R_ARM_COPY:
2806 return bfd_reloc_notsupported;
2807
2808 case R_ARM_GLOB_DAT:
2809 return bfd_reloc_notsupported;
2810
2811 case R_ARM_JUMP_SLOT:
2812 return bfd_reloc_notsupported;
2813
2814 case R_ARM_RELATIVE:
2815 return bfd_reloc_notsupported;
2816
2817 case R_ARM_GOTOFF:
2818 /* Relocation is relative to the start of the
2819 global offset table. */
2820
2821 BFD_ASSERT (sgot != NULL);
2822 if (sgot == NULL)
2823 return bfd_reloc_notsupported;
9a5aca8c 2824
cedb70c5 2825 /* If we are addressing a Thumb function, we need to adjust the
ee29b9fb
RE
2826 address by one, so that attempts to call the function pointer will
2827 correctly interpret it as Thumb code. */
2828 if (sym_flags == STT_ARM_TFUNC)
2829 value += 1;
2830
252b5132
RH
2831 /* Note that sgot->output_offset is not involved in this
2832 calculation. We always want the start of .got. If we
2833 define _GLOBAL_OFFSET_TABLE in a different way, as is
2834 permitted by the ABI, we might have to change this
9b485d32 2835 calculation. */
252b5132 2836 value -= sgot->output_section->vma;
f21f3fe0 2837 return _bfd_final_link_relocate (howto, input_bfd, input_section,
99e4ae17
AJ
2838 contents, rel->r_offset, value,
2839 (bfd_vma) 0);
252b5132
RH
2840
2841 case R_ARM_GOTPC:
a7c10850 2842 /* Use global offset table as symbol value. */
252b5132 2843 BFD_ASSERT (sgot != NULL);
f21f3fe0 2844
252b5132
RH
2845 if (sgot == NULL)
2846 return bfd_reloc_notsupported;
2847
2848 value = sgot->output_section->vma;
f21f3fe0 2849 return _bfd_final_link_relocate (howto, input_bfd, input_section,
99e4ae17
AJ
2850 contents, rel->r_offset, value,
2851 (bfd_vma) 0);
f21f3fe0 2852
252b5132 2853 case R_ARM_GOT32:
eb043451
PB
2854#ifndef OLD_ARM_ABI
2855 case R_ARM_GOT_PREL:
2856#endif
252b5132 2857 /* Relocation is to the entry for this symbol in the
9b485d32 2858 global offset table. */
252b5132
RH
2859 if (sgot == NULL)
2860 return bfd_reloc_notsupported;
f21f3fe0 2861
252b5132
RH
2862 if (h != NULL)
2863 {
2864 bfd_vma off;
5e681ec4 2865 bfd_boolean dyn;
f21f3fe0 2866
252b5132
RH
2867 off = h->got.offset;
2868 BFD_ASSERT (off != (bfd_vma) -1);
5e681ec4 2869 dyn = globals->root.dynamic_sections_created;
f21f3fe0 2870
5e681ec4 2871 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
50d6c878 2872 || (info->shared
5e681ec4
PB
2873 && SYMBOL_REFERENCES_LOCAL (info, h))
2874 || (ELF_ST_VISIBILITY (h->other)
2875 && h->root.type == bfd_link_hash_undefweak))
252b5132
RH
2876 {
2877 /* This is actually a static link, or it is a -Bsymbolic link
2878 and the symbol is defined locally. We must initialize this
2879 entry in the global offset table. Since the offset must
2880 always be a multiple of 4, we use the least significant bit
2881 to record whether we have initialized it already.
f21f3fe0 2882
252b5132 2883 When doing a dynamic link, we create a .rel.got relocation
f21f3fe0 2884 entry to initialize the value. This is done in the
9b485d32 2885 finish_dynamic_symbol routine. */
252b5132
RH
2886 if ((off & 1) != 0)
2887 off &= ~1;
2888 else
2889 {
ee29b9fb
RE
2890 /* If we are addressing a Thumb function, we need to
2891 adjust the address by one, so that attempts to
2892 call the function pointer will correctly
2893 interpret it as Thumb code. */
2894 if (sym_flags == STT_ARM_TFUNC)
2895 value |= 1;
2896
252b5132
RH
2897 bfd_put_32 (output_bfd, value, sgot->contents + off);
2898 h->got.offset |= 1;
2899 }
2900 }
f21f3fe0 2901
252b5132
RH
2902 value = sgot->output_offset + off;
2903 }
2904 else
2905 {
2906 bfd_vma off;
f21f3fe0 2907
252b5132
RH
2908 BFD_ASSERT (local_got_offsets != NULL &&
2909 local_got_offsets[r_symndx] != (bfd_vma) -1);
f21f3fe0 2910
252b5132 2911 off = local_got_offsets[r_symndx];
f21f3fe0 2912
252b5132
RH
2913 /* The offset must always be a multiple of 4. We use the
2914 least significant bit to record whether we have already
9b485d32 2915 generated the necessary reloc. */
252b5132
RH
2916 if ((off & 1) != 0)
2917 off &= ~1;
2918 else
2919 {
b7693d02
DJ
2920 /* If we are addressing a Thumb function, we need to
2921 adjust the address by one, so that attempts to
2922 call the function pointer will correctly
2923 interpret it as Thumb code. */
2924 if (sym_flags == STT_ARM_TFUNC)
2925 value |= 1;
2926
252b5132 2927 bfd_put_32 (output_bfd, value, sgot->contents + off);
f21f3fe0 2928
252b5132
RH
2929 if (info->shared)
2930 {
2931 asection * srelgot;
947216bf
AM
2932 Elf_Internal_Rela outrel;
2933 bfd_byte *loc;
f21f3fe0 2934
252b5132
RH
2935 srelgot = bfd_get_section_by_name (dynobj, ".rel.got");
2936 BFD_ASSERT (srelgot != NULL);
f21f3fe0 2937
252b5132 2938 outrel.r_offset = (sgot->output_section->vma
f21f3fe0 2939 + sgot->output_offset
252b5132
RH
2940 + off);
2941 outrel.r_info = ELF32_R_INFO (0, R_ARM_RELATIVE);
947216bf
AM
2942 loc = srelgot->contents;
2943 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rel);
2944 bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
252b5132 2945 }
f21f3fe0 2946
252b5132
RH
2947 local_got_offsets[r_symndx] |= 1;
2948 }
f21f3fe0 2949
252b5132
RH
2950 value = sgot->output_offset + off;
2951 }
eb043451
PB
2952 if (r_type != R_ARM_GOT32)
2953 value += sgot->output_section->vma;
9a5aca8c 2954
f21f3fe0 2955 return _bfd_final_link_relocate (howto, input_bfd, input_section,
99e4ae17
AJ
2956 contents, rel->r_offset, value,
2957 (bfd_vma) 0);
f21f3fe0 2958
252b5132
RH
2959 case R_ARM_SBREL32:
2960 return bfd_reloc_notsupported;
2961
2962 case R_ARM_AMP_VCALL9:
2963 return bfd_reloc_notsupported;
2964
2965 case R_ARM_RSBREL32:
2966 return bfd_reloc_notsupported;
2967
2968 case R_ARM_THM_RPC22:
2969 return bfd_reloc_notsupported;
2970
2971 case R_ARM_RREL32:
2972 return bfd_reloc_notsupported;
2973
2974 case R_ARM_RABS32:
2975 return bfd_reloc_notsupported;
2976
2977 case R_ARM_RPC24:
2978 return bfd_reloc_notsupported;
2979
2980 case R_ARM_RBASE:
2981 return bfd_reloc_notsupported;
2982
2983 default:
2984 return bfd_reloc_notsupported;
2985 }
2986}
2987
acf8aed4 2988#if USE_REL
98c1d4aa
NC
2989/* Add INCREMENT to the reloc (of type HOWTO) at ADDRESS. */
2990static void
57e8b36a
NC
2991arm_add_to_rel (bfd * abfd,
2992 bfd_byte * address,
2993 reloc_howto_type * howto,
2994 bfd_signed_vma increment)
98c1d4aa 2995{
98c1d4aa
NC
2996 bfd_signed_vma addend;
2997
9a5aca8c 2998 if (howto->type == R_ARM_THM_PC22)
98c1d4aa 2999 {
9a5aca8c
AM
3000 int upper_insn, lower_insn;
3001 int upper, lower;
98c1d4aa 3002
9a5aca8c
AM
3003 upper_insn = bfd_get_16 (abfd, address);
3004 lower_insn = bfd_get_16 (abfd, address + 2);
3005 upper = upper_insn & 0x7ff;
3006 lower = lower_insn & 0x7ff;
3007
3008 addend = (upper << 12) | (lower << 1);
ddda4409 3009 addend += increment;
9a5aca8c 3010 addend >>= 1;
98c1d4aa 3011
9a5aca8c
AM
3012 upper_insn = (upper_insn & 0xf800) | ((addend >> 11) & 0x7ff);
3013 lower_insn = (lower_insn & 0xf800) | (addend & 0x7ff);
3014
dc810e39
AM
3015 bfd_put_16 (abfd, (bfd_vma) upper_insn, address);
3016 bfd_put_16 (abfd, (bfd_vma) lower_insn, address + 2);
9a5aca8c
AM
3017 }
3018 else
3019 {
3020 bfd_vma contents;
3021
3022 contents = bfd_get_32 (abfd, address);
3023
3024 /* Get the (signed) value from the instruction. */
3025 addend = contents & howto->src_mask;
3026 if (addend & ((howto->src_mask + 1) >> 1))
3027 {
3028 bfd_signed_vma mask;
3029
3030 mask = -1;
3031 mask &= ~ howto->src_mask;
3032 addend |= mask;
3033 }
3034
3035 /* Add in the increment, (which is a byte value). */
3036 switch (howto->type)
3037 {
3038 default:
3039 addend += increment;
3040 break;
3041
3042 case R_ARM_PC24:
5b5bb741
PB
3043#ifndef OLD_ARM_ABI
3044 case R_ARM_CALL:
3045 case R_ARM_JUMP24:
3046#endif
9a5aca8c 3047 addend <<= howto->size;
dc810e39 3048 addend += increment;
9a5aca8c
AM
3049
3050 /* Should we check for overflow here ? */
3051
3052 /* Drop any undesired bits. */
3053 addend >>= howto->rightshift;
3054 break;
3055 }
3056
3057 contents = (contents & ~ howto->dst_mask) | (addend & howto->dst_mask);
3058
3059 bfd_put_32 (abfd, contents, address);
ddda4409 3060 }
98c1d4aa
NC
3061}
3062#endif /* USE_REL */
252b5132
RH
3063
3064/* Relocate an ARM ELF section. */
b34976b6 3065static bfd_boolean
57e8b36a
NC
3066elf32_arm_relocate_section (bfd * output_bfd,
3067 struct bfd_link_info * info,
3068 bfd * input_bfd,
3069 asection * input_section,
3070 bfd_byte * contents,
3071 Elf_Internal_Rela * relocs,
3072 Elf_Internal_Sym * local_syms,
3073 asection ** local_sections)
252b5132 3074{
b34976b6
AM
3075 Elf_Internal_Shdr *symtab_hdr;
3076 struct elf_link_hash_entry **sym_hashes;
3077 Elf_Internal_Rela *rel;
3078 Elf_Internal_Rela *relend;
3079 const char *name;
b32d3aa2 3080 struct elf32_arm_link_hash_table * globals;
252b5132 3081
acf8aed4 3082#if !USE_REL
1049f94e 3083 if (info->relocatable)
b34976b6 3084 return TRUE;
b491616a
AM
3085#endif
3086
b32d3aa2 3087 globals = elf32_arm_hash_table (info);
252b5132
RH
3088 symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr;
3089 sym_hashes = elf_sym_hashes (input_bfd);
3090
3091 rel = relocs;
3092 relend = relocs + input_section->reloc_count;
3093 for (; rel < relend; rel++)
3094 {
ba96a88f
NC
3095 int r_type;
3096 reloc_howto_type * howto;
3097 unsigned long r_symndx;
3098 Elf_Internal_Sym * sym;
3099 asection * sec;
252b5132 3100 struct elf_link_hash_entry * h;
ba96a88f
NC
3101 bfd_vma relocation;
3102 bfd_reloc_status_type r;
3103 arelent bfd_reloc;
f21f3fe0 3104
252b5132 3105 r_symndx = ELF32_R_SYM (rel->r_info);
ba96a88f 3106 r_type = ELF32_R_TYPE (rel->r_info);
b32d3aa2 3107 r_type = arm_real_reloc_type (globals, r_type);
252b5132 3108
ba96a88f
NC
3109 if ( r_type == R_ARM_GNU_VTENTRY
3110 || r_type == R_ARM_GNU_VTINHERIT)
252b5132
RH
3111 continue;
3112
b32d3aa2 3113 bfd_reloc.howto = elf32_arm_howto_from_type (r_type);
ba96a88f 3114 howto = bfd_reloc.howto;
252b5132 3115
acf8aed4 3116#if USE_REL
1049f94e 3117 if (info->relocatable)
252b5132 3118 {
1049f94e 3119 /* This is a relocatable link. We don't have to change
252b5132
RH
3120 anything, unless the reloc is against a section symbol,
3121 in which case we have to adjust according to where the
3122 section symbol winds up in the output section. */
3123 if (r_symndx < symtab_hdr->sh_info)
3124 {
3125 sym = local_syms + r_symndx;
3126 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
3127 {
3128 sec = local_sections[r_symndx];
98c1d4aa 3129 arm_add_to_rel (input_bfd, contents + rel->r_offset,
dc810e39
AM
3130 howto,
3131 (bfd_signed_vma) (sec->output_offset
3132 + sym->st_value));
252b5132
RH
3133 }
3134 }
3135
3136 continue;
3137 }
b491616a 3138#endif
252b5132
RH
3139
3140 /* This is a final link. */
3141 h = NULL;
3142 sym = NULL;
3143 sec = NULL;
9b485d32 3144
252b5132
RH
3145 if (r_symndx < symtab_hdr->sh_info)
3146 {
3147 sym = local_syms + r_symndx;
3148 sec = local_sections[r_symndx];
acf8aed4 3149#if USE_REL
252b5132
RH
3150 relocation = (sec->output_section->vma
3151 + sec->output_offset
3152 + sym->st_value);
f8df10f4
JJ
3153 if ((sec->flags & SEC_MERGE)
3154 && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
3155 {
3156 asection *msec;
3157 bfd_vma addend, value;
3158
3159 if (howto->rightshift)
3160 {
3161 (*_bfd_error_handler)
d003868e
AM
3162 (_("%B(%A+0x%lx): %s relocation against SEC_MERGE section"),
3163 input_bfd, input_section,
f8df10f4 3164 (long) rel->r_offset, howto->name);
b34976b6 3165 return FALSE;
f8df10f4
JJ
3166 }
3167
3168 value = bfd_get_32 (input_bfd, contents + rel->r_offset);
3169
3170 /* Get the (signed) value from the instruction. */
3171 addend = value & howto->src_mask;
3172 if (addend & ((howto->src_mask + 1) >> 1))
3173 {
3174 bfd_signed_vma mask;
3175
3176 mask = -1;
3177 mask &= ~ howto->src_mask;
3178 addend |= mask;
3179 }
3180 msec = sec;
3181 addend =
c629eae0 3182 _bfd_elf_rel_local_sym (output_bfd, sym, &msec, addend)
f8df10f4
JJ
3183 - relocation;
3184 addend += msec->output_section->vma + msec->output_offset;
3185 value = (value & ~ howto->dst_mask) | (addend & howto->dst_mask);
3186 bfd_put_32 (input_bfd, value, contents + rel->r_offset);
3187 }
3188#else
8517fae7 3189 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
f8df10f4 3190#endif
252b5132
RH
3191 }
3192 else
3193 {
560e09e9
NC
3194 bfd_boolean warned;
3195 bfd_boolean unresolved_reloc;
3196
b2a8e766
AM
3197 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
3198 r_symndx, symtab_hdr, sym_hashes,
3199 h, sec, relocation,
3200 unresolved_reloc, warned);
57e8b36a 3201
560e09e9 3202 if (unresolved_reloc || relocation != 0)
252b5132 3203 {
252b5132 3204 /* In these cases, we don't need the relocation value.
f21f3fe0 3205 We check specially because in some obscure cases
9b485d32 3206 sec->output_section will be NULL. */
252b5132
RH
3207 switch (r_type)
3208 {
3209 case R_ARM_PC24:
5b5bb741
PB
3210#ifndef OLD_ARM_ABI
3211 case R_ARM_CALL:
3212 case R_ARM_JUMP24:
ee06dc07 3213 case R_ARM_PREL31:
5b5bb741 3214#endif
252b5132 3215 case R_ARM_ABS32:
6a360bf4 3216 case R_ARM_THM_PC22:
ecb2d096
DJ
3217 case R_ARM_PLT32:
3218
252b5132 3219 if (info->shared
f5385ebf
AM
3220 && ((!info->symbolic && h->dynindx != -1)
3221 || !h->def_regular)
5e681ec4 3222 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
05924f36
PB
3223 && ((input_section->flags & SEC_ALLOC) != 0
3224 /* DWARF will emit R_ARM_ABS32 relocations in its
3225 sections against symbols defined externally
3226 in shared libraries. We can't do anything
3227 with them here. */
3228 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 3229 && h->def_dynamic))
252b5132 3230 )
560e09e9 3231 relocation = 0;
252b5132 3232 break;
f21f3fe0 3233
252b5132 3234 case R_ARM_GOTPC:
560e09e9 3235 relocation = 0;
252b5132 3236 break;
f21f3fe0 3237
252b5132 3238 case R_ARM_GOT32:
eb043451
PB
3239#ifndef OLD_ARM_ABI
3240 case R_ARM_GOT_PREL:
3241#endif
50d6c878 3242 if ((WILL_CALL_FINISH_DYNAMIC_SYMBOL
560e09e9 3243 (elf_hash_table (info)->dynamic_sections_created,
50d6c878
DJ
3244 info->shared, h))
3245 && (!info->shared
252b5132 3246 || (!info->symbolic && h->dynindx != -1)
f5385ebf 3247 || !h->def_regular))
560e09e9 3248 relocation = 0;
252b5132 3249 break;
f21f3fe0 3250
252b5132 3251 default:
560e09e9
NC
3252 if (unresolved_reloc)
3253 _bfd_error_handler
d003868e
AM
3254 (_("%B(%A): warning: unresolvable relocation %d against symbol `%s'"),
3255 input_bfd, input_section,
560e09e9 3256 r_type,
d003868e 3257 h->root.root.string);
560e09e9 3258 break;
252b5132 3259 }
252b5132
RH
3260 }
3261 }
3262
3263 if (h != NULL)
3264 name = h->root.root.string;
3265 else
3266 {
3267 name = (bfd_elf_string_from_elf_section
3268 (input_bfd, symtab_hdr->sh_link, sym->st_name));
3269 if (name == NULL || *name == '\0')
3270 name = bfd_section_name (input_bfd, sec);
3271 }
f21f3fe0 3272
252b5132
RH
3273 r = elf32_arm_final_link_relocate (howto, input_bfd, output_bfd,
3274 input_section, contents, rel,
3275 relocation, info, sec, name,
3276 (h ? ELF_ST_TYPE (h->type) :
780a67af 3277 ELF_ST_TYPE (sym->st_info)), h);
252b5132
RH
3278
3279 if (r != bfd_reloc_ok)
3280 {
3281 const char * msg = (const char *) 0;
3282
3283 switch (r)
3284 {
3285 case bfd_reloc_overflow:
cf919dfd
PB
3286 /* If the overflowing reloc was to an undefined symbol,
3287 we have already printed one error message and there
3288 is no point complaining again. */
3289 if ((! h ||
3290 h->root.type != bfd_link_hash_undefined)
3291 && (!((*info->callbacks->reloc_overflow)
dfeffb9f
L
3292 (info, (h ? &h->root : NULL), name, howto->name,
3293 (bfd_vma) 0, input_bfd, input_section,
3294 rel->r_offset))))
b34976b6 3295 return FALSE;
252b5132
RH
3296 break;
3297
3298 case bfd_reloc_undefined:
3299 if (!((*info->callbacks->undefined_symbol)
3300 (info, name, input_bfd, input_section,
b34976b6
AM
3301 rel->r_offset, TRUE)))
3302 return FALSE;
252b5132
RH
3303 break;
3304
3305 case bfd_reloc_outofrange:
9b485d32 3306 msg = _("internal error: out of range error");
252b5132
RH
3307 goto common_error;
3308
3309 case bfd_reloc_notsupported:
9b485d32 3310 msg = _("internal error: unsupported relocation error");
252b5132
RH
3311 goto common_error;
3312
3313 case bfd_reloc_dangerous:
9b485d32 3314 msg = _("internal error: dangerous error");
252b5132
RH
3315 goto common_error;
3316
3317 default:
9b485d32 3318 msg = _("internal error: unknown error");
252b5132
RH
3319 /* fall through */
3320
3321 common_error:
3322 if (!((*info->callbacks->warning)
3323 (info, msg, name, input_bfd, input_section,
3324 rel->r_offset)))
b34976b6 3325 return FALSE;
252b5132
RH
3326 break;
3327 }
3328 }
3329 }
3330
b34976b6 3331 return TRUE;
252b5132
RH
3332}
3333
c178919b
NC
3334/* Set the right machine number. */
3335
3336static bfd_boolean
57e8b36a 3337elf32_arm_object_p (bfd *abfd)
c178919b 3338{
5a6c6817 3339 unsigned int mach;
57e8b36a 3340
5a6c6817 3341 mach = bfd_arm_get_mach_from_notes (abfd, ARM_NOTE_SECTION);
c178919b 3342
5a6c6817
NC
3343 if (mach != bfd_mach_arm_unknown)
3344 bfd_default_set_arch_mach (abfd, bfd_arch_arm, mach);
3345
3346 else if (elf_elfheader (abfd)->e_flags & EF_ARM_MAVERICK_FLOAT)
3347 bfd_default_set_arch_mach (abfd, bfd_arch_arm, bfd_mach_arm_ep9312);
e16bb312 3348
e16bb312 3349 else
5a6c6817 3350 bfd_default_set_arch_mach (abfd, bfd_arch_arm, mach);
c178919b
NC
3351
3352 return TRUE;
3353}
3354
fc830a83 3355/* Function to keep ARM specific flags in the ELF header. */
3c9458e9 3356
b34976b6 3357static bfd_boolean
57e8b36a 3358elf32_arm_set_private_flags (bfd *abfd, flagword flags)
252b5132
RH
3359{
3360 if (elf_flags_init (abfd)
3361 && elf_elfheader (abfd)->e_flags != flags)
3362 {
fc830a83
NC
3363 if (EF_ARM_EABI_VERSION (flags) == EF_ARM_EABI_UNKNOWN)
3364 {
fd2ec330 3365 if (flags & EF_ARM_INTERWORK)
d003868e
AM
3366 (*_bfd_error_handler)
3367 (_("Warning: Not setting interworking flag of %B since it has already been specified as non-interworking"),
3368 abfd);
fc830a83 3369 else
d003868e
AM
3370 _bfd_error_handler
3371 (_("Warning: Clearing the interworking flag of %B due to outside request"),
3372 abfd);
fc830a83 3373 }
252b5132
RH
3374 }
3375 else
3376 {
3377 elf_elfheader (abfd)->e_flags = flags;
b34976b6 3378 elf_flags_init (abfd) = TRUE;
252b5132
RH
3379 }
3380
b34976b6 3381 return TRUE;
252b5132
RH
3382}
3383
fc830a83 3384/* Copy backend specific data from one object module to another. */
9b485d32 3385
b34976b6 3386static bfd_boolean
57e8b36a 3387elf32_arm_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
252b5132
RH
3388{
3389 flagword in_flags;
3390 flagword out_flags;
3391
fc830a83 3392 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
252b5132 3393 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 3394 return TRUE;
252b5132 3395
fc830a83 3396 in_flags = elf_elfheader (ibfd)->e_flags;
252b5132
RH
3397 out_flags = elf_elfheader (obfd)->e_flags;
3398
fc830a83
NC
3399 if (elf_flags_init (obfd)
3400 && EF_ARM_EABI_VERSION (out_flags) == EF_ARM_EABI_UNKNOWN
3401 && in_flags != out_flags)
252b5132 3402 {
252b5132 3403 /* Cannot mix APCS26 and APCS32 code. */
fd2ec330 3404 if ((in_flags & EF_ARM_APCS_26) != (out_flags & EF_ARM_APCS_26))
b34976b6 3405 return FALSE;
252b5132
RH
3406
3407 /* Cannot mix float APCS and non-float APCS code. */
fd2ec330 3408 if ((in_flags & EF_ARM_APCS_FLOAT) != (out_flags & EF_ARM_APCS_FLOAT))
b34976b6 3409 return FALSE;
252b5132
RH
3410
3411 /* If the src and dest have different interworking flags
3412 then turn off the interworking bit. */
fd2ec330 3413 if ((in_flags & EF_ARM_INTERWORK) != (out_flags & EF_ARM_INTERWORK))
252b5132 3414 {
fd2ec330 3415 if (out_flags & EF_ARM_INTERWORK)
d003868e
AM
3416 _bfd_error_handler
3417 (_("Warning: Clearing the interworking flag of %B because non-interworking code in %B has been linked with it"),
3418 obfd, ibfd);
252b5132 3419
fd2ec330 3420 in_flags &= ~EF_ARM_INTERWORK;
252b5132 3421 }
1006ba19
PB
3422
3423 /* Likewise for PIC, though don't warn for this case. */
fd2ec330
PB
3424 if ((in_flags & EF_ARM_PIC) != (out_flags & EF_ARM_PIC))
3425 in_flags &= ~EF_ARM_PIC;
252b5132
RH
3426 }
3427
3428 elf_elfheader (obfd)->e_flags = in_flags;
b34976b6 3429 elf_flags_init (obfd) = TRUE;
252b5132 3430
b34976b6 3431 return TRUE;
252b5132
RH
3432}
3433
3434/* Merge backend specific data from an object file to the output
3435 object file when linking. */
9b485d32 3436
b34976b6 3437static bfd_boolean
57e8b36a 3438elf32_arm_merge_private_bfd_data (bfd * ibfd, bfd * obfd)
252b5132
RH
3439{
3440 flagword out_flags;
3441 flagword in_flags;
b34976b6 3442 bfd_boolean flags_compatible = TRUE;
cf919dfd 3443 asection *sec;
252b5132 3444
9b485d32 3445 /* Check if we have the same endianess. */
82e51918 3446 if (! _bfd_generic_verify_endian_match (ibfd, obfd))
b34976b6 3447 return FALSE;
1fe494a5 3448
252b5132
RH
3449 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
3450 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 3451 return TRUE;
252b5132 3452
252b5132
RH
3453 /* The input BFD must have had its flags initialised. */
3454 /* The following seems bogus to me -- The flags are initialized in
3455 the assembler but I don't think an elf_flags_init field is
9b485d32 3456 written into the object. */
252b5132
RH
3457 /* BFD_ASSERT (elf_flags_init (ibfd)); */
3458
3459 in_flags = elf_elfheader (ibfd)->e_flags;
3460 out_flags = elf_elfheader (obfd)->e_flags;
3461
3462 if (!elf_flags_init (obfd))
3463 {
fe077fa6
NC
3464 /* If the input is the default architecture and had the default
3465 flags then do not bother setting the flags for the output
3466 architecture, instead allow future merges to do this. If no
3467 future merges ever set these flags then they will retain their
3468 uninitialised values, which surprise surprise, correspond
252b5132 3469 to the default values. */
fe077fa6
NC
3470 if (bfd_get_arch_info (ibfd)->the_default
3471 && elf_elfheader (ibfd)->e_flags == 0)
b34976b6 3472 return TRUE;
252b5132 3473
b34976b6 3474 elf_flags_init (obfd) = TRUE;
252b5132
RH
3475 elf_elfheader (obfd)->e_flags = in_flags;
3476
3477 if (bfd_get_arch (obfd) == bfd_get_arch (ibfd)
3478 && bfd_get_arch_info (obfd)->the_default)
3479 return bfd_set_arch_mach (obfd, bfd_get_arch (ibfd), bfd_get_mach (ibfd));
3480
b34976b6 3481 return TRUE;
252b5132
RH
3482 }
3483
5a6c6817
NC
3484 /* Determine what should happen if the input ARM architecture
3485 does not match the output ARM architecture. */
3486 if (! bfd_arm_merge_machines (ibfd, obfd))
3487 return FALSE;
e16bb312 3488
1006ba19 3489 /* Identical flags must be compatible. */
252b5132 3490 if (in_flags == out_flags)
b34976b6 3491 return TRUE;
252b5132 3492
35a0f415
DJ
3493 /* Check to see if the input BFD actually contains any sections. If
3494 not, its flags may not have been initialised either, but it
3495 cannot actually cause any incompatibility. Do not short-circuit
3496 dynamic objects; their section list may be emptied by
d1f161ea 3497 elf_link_add_object_symbols.
35a0f415 3498
d1f161ea
NC
3499 Also check to see if there are no code sections in the input.
3500 In this case there is no need to check for code specific flags.
3501 XXX - do we need to worry about floating-point format compatability
3502 in data sections ? */
35a0f415 3503 if (!(ibfd->flags & DYNAMIC))
cf919dfd 3504 {
35a0f415 3505 bfd_boolean null_input_bfd = TRUE;
d1f161ea 3506 bfd_boolean only_data_sections = TRUE;
35a0f415
DJ
3507
3508 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
cf919dfd 3509 {
35a0f415
DJ
3510 /* Ignore synthetic glue sections. */
3511 if (strcmp (sec->name, ".glue_7")
3512 && strcmp (sec->name, ".glue_7t"))
3513 {
d1f161ea
NC
3514 if ((bfd_get_section_flags (ibfd, sec)
3515 & (SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS))
3516 == (SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS))
3517 only_data_sections = FALSE;
3518
35a0f415
DJ
3519 null_input_bfd = FALSE;
3520 break;
3521 }
cf919dfd 3522 }
d1f161ea
NC
3523
3524 if (null_input_bfd || only_data_sections)
35a0f415 3525 return TRUE;
cf919dfd 3526 }
cf919dfd 3527
252b5132 3528 /* Complain about various flag mismatches. */
fc830a83
NC
3529 if (EF_ARM_EABI_VERSION (in_flags) != EF_ARM_EABI_VERSION (out_flags))
3530 {
d003868e 3531 _bfd_error_handler
3656d5e3 3532 (_("ERROR: Source object %B has EABI version %d, but target %B has EABI version %d"),
d003868e
AM
3533 ibfd, obfd,
3534 (in_flags & EF_ARM_EABIMASK) >> 24,
3535 (out_flags & EF_ARM_EABIMASK) >> 24);
b34976b6 3536 return FALSE;
fc830a83 3537 }
252b5132 3538
1006ba19
PB
3539 /* Not sure what needs to be checked for EABI versions >= 1. */
3540 if (EF_ARM_EABI_VERSION (in_flags) == EF_ARM_EABI_UNKNOWN)
3541 {
fd2ec330 3542 if ((in_flags & EF_ARM_APCS_26) != (out_flags & EF_ARM_APCS_26))
1006ba19 3543 {
d003868e
AM
3544 _bfd_error_handler
3545 (_("ERROR: %B is compiled for APCS-%d, whereas target %B uses APCS-%d"),
3546 ibfd, obfd,
3547 in_flags & EF_ARM_APCS_26 ? 26 : 32,
3548 out_flags & EF_ARM_APCS_26 ? 26 : 32);
b34976b6 3549 flags_compatible = FALSE;
1006ba19 3550 }
252b5132 3551
fd2ec330 3552 if ((in_flags & EF_ARM_APCS_FLOAT) != (out_flags & EF_ARM_APCS_FLOAT))
1006ba19 3553 {
5eefb65f 3554 if (in_flags & EF_ARM_APCS_FLOAT)
d003868e
AM
3555 _bfd_error_handler
3556 (_("ERROR: %B passes floats in float registers, whereas %B passes them in integer registers"),
3557 ibfd, obfd);
5eefb65f 3558 else
d003868e
AM
3559 _bfd_error_handler
3560 (_("ERROR: %B passes floats in integer registers, whereas %B passes them in float registers"),
3561 ibfd, obfd);
63b0f745 3562
b34976b6 3563 flags_compatible = FALSE;
1006ba19 3564 }
252b5132 3565
96a846ea 3566 if ((in_flags & EF_ARM_VFP_FLOAT) != (out_flags & EF_ARM_VFP_FLOAT))
1006ba19 3567 {
96a846ea 3568 if (in_flags & EF_ARM_VFP_FLOAT)
d003868e
AM
3569 _bfd_error_handler
3570 (_("ERROR: %B uses VFP instructions, whereas %B does not"),
3571 ibfd, obfd);
5eefb65f 3572 else
d003868e
AM
3573 _bfd_error_handler
3574 (_("ERROR: %B uses FPA instructions, whereas %B does not"),
3575 ibfd, obfd);
fde78edd
NC
3576
3577 flags_compatible = FALSE;
3578 }
3579
3580 if ((in_flags & EF_ARM_MAVERICK_FLOAT) != (out_flags & EF_ARM_MAVERICK_FLOAT))
3581 {
3582 if (in_flags & EF_ARM_MAVERICK_FLOAT)
d003868e
AM
3583 _bfd_error_handler
3584 (_("ERROR: %B uses Maverick instructions, whereas %B does not"),
3585 ibfd, obfd);
fde78edd 3586 else
d003868e
AM
3587 _bfd_error_handler
3588 (_("ERROR: %B does not use Maverick instructions, whereas %B does"),
3589 ibfd, obfd);
63b0f745 3590
b34976b6 3591 flags_compatible = FALSE;
1006ba19 3592 }
96a846ea
RE
3593
3594#ifdef EF_ARM_SOFT_FLOAT
3595 if ((in_flags & EF_ARM_SOFT_FLOAT) != (out_flags & EF_ARM_SOFT_FLOAT))
3596 {
3597 /* We can allow interworking between code that is VFP format
3598 layout, and uses either soft float or integer regs for
3599 passing floating point arguments and results. We already
3600 know that the APCS_FLOAT flags match; similarly for VFP
3601 flags. */
3602 if ((in_flags & EF_ARM_APCS_FLOAT) != 0
3603 || (in_flags & EF_ARM_VFP_FLOAT) == 0)
3604 {
3605 if (in_flags & EF_ARM_SOFT_FLOAT)
d003868e
AM
3606 _bfd_error_handler
3607 (_("ERROR: %B uses software FP, whereas %B uses hardware FP"),
3608 ibfd, obfd);
96a846ea 3609 else
d003868e
AM
3610 _bfd_error_handler
3611 (_("ERROR: %B uses hardware FP, whereas %B uses software FP"),
3612 ibfd, obfd);
96a846ea 3613
b34976b6 3614 flags_compatible = FALSE;
96a846ea
RE
3615 }
3616 }
ee43f35e 3617#endif
252b5132 3618
1006ba19 3619 /* Interworking mismatch is only a warning. */
fd2ec330 3620 if ((in_flags & EF_ARM_INTERWORK) != (out_flags & EF_ARM_INTERWORK))
8f615d07 3621 {
e3c8793a
NC
3622 if (in_flags & EF_ARM_INTERWORK)
3623 {
d003868e
AM
3624 _bfd_error_handler
3625 (_("Warning: %B supports interworking, whereas %B does not"),
3626 ibfd, obfd);
e3c8793a
NC
3627 }
3628 else
3629 {
d003868e
AM
3630 _bfd_error_handler
3631 (_("Warning: %B does not support interworking, whereas %B does"),
3632 ibfd, obfd);
e3c8793a 3633 }
8f615d07 3634 }
252b5132 3635 }
63b0f745 3636
1006ba19 3637 return flags_compatible;
252b5132
RH
3638}
3639
9b485d32
NC
3640/* Display the flags field. */
3641
b34976b6 3642static bfd_boolean
57e8b36a 3643elf32_arm_print_private_bfd_data (bfd *abfd, void * ptr)
252b5132 3644{
fc830a83
NC
3645 FILE * file = (FILE *) ptr;
3646 unsigned long flags;
252b5132
RH
3647
3648 BFD_ASSERT (abfd != NULL && ptr != NULL);
3649
3650 /* Print normal ELF private data. */
3651 _bfd_elf_print_private_bfd_data (abfd, ptr);
3652
fc830a83 3653 flags = elf_elfheader (abfd)->e_flags;
9b485d32
NC
3654 /* Ignore init flag - it may not be set, despite the flags field
3655 containing valid data. */
252b5132
RH
3656
3657 /* xgettext:c-format */
9b485d32 3658 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
252b5132 3659
fc830a83
NC
3660 switch (EF_ARM_EABI_VERSION (flags))
3661 {
3662 case EF_ARM_EABI_UNKNOWN:
4cc11e76 3663 /* The following flag bits are GNU extensions and not part of the
fc830a83
NC
3664 official ARM ELF extended ABI. Hence they are only decoded if
3665 the EABI version is not set. */
fd2ec330 3666 if (flags & EF_ARM_INTERWORK)
9b485d32 3667 fprintf (file, _(" [interworking enabled]"));
9a5aca8c 3668
fd2ec330 3669 if (flags & EF_ARM_APCS_26)
6c571f00 3670 fprintf (file, " [APCS-26]");
fc830a83 3671 else
6c571f00 3672 fprintf (file, " [APCS-32]");
9a5aca8c 3673
96a846ea
RE
3674 if (flags & EF_ARM_VFP_FLOAT)
3675 fprintf (file, _(" [VFP float format]"));
fde78edd
NC
3676 else if (flags & EF_ARM_MAVERICK_FLOAT)
3677 fprintf (file, _(" [Maverick float format]"));
96a846ea
RE
3678 else
3679 fprintf (file, _(" [FPA float format]"));
3680
fd2ec330 3681 if (flags & EF_ARM_APCS_FLOAT)
9b485d32 3682 fprintf (file, _(" [floats passed in float registers]"));
9a5aca8c 3683
fd2ec330 3684 if (flags & EF_ARM_PIC)
9b485d32 3685 fprintf (file, _(" [position independent]"));
fc830a83 3686
fd2ec330 3687 if (flags & EF_ARM_NEW_ABI)
9b485d32 3688 fprintf (file, _(" [new ABI]"));
9a5aca8c 3689
fd2ec330 3690 if (flags & EF_ARM_OLD_ABI)
9b485d32 3691 fprintf (file, _(" [old ABI]"));
9a5aca8c 3692
fd2ec330 3693 if (flags & EF_ARM_SOFT_FLOAT)
9b485d32 3694 fprintf (file, _(" [software FP]"));
9a5aca8c 3695
96a846ea
RE
3696 flags &= ~(EF_ARM_INTERWORK | EF_ARM_APCS_26 | EF_ARM_APCS_FLOAT
3697 | EF_ARM_PIC | EF_ARM_NEW_ABI | EF_ARM_OLD_ABI
fde78edd
NC
3698 | EF_ARM_SOFT_FLOAT | EF_ARM_VFP_FLOAT
3699 | EF_ARM_MAVERICK_FLOAT);
fc830a83 3700 break;
9a5aca8c 3701
fc830a83 3702 case EF_ARM_EABI_VER1:
9b485d32 3703 fprintf (file, _(" [Version1 EABI]"));
9a5aca8c 3704
fc830a83 3705 if (flags & EF_ARM_SYMSARESORTED)
9b485d32 3706 fprintf (file, _(" [sorted symbol table]"));
fc830a83 3707 else
9b485d32 3708 fprintf (file, _(" [unsorted symbol table]"));
9a5aca8c 3709
fc830a83
NC
3710 flags &= ~ EF_ARM_SYMSARESORTED;
3711 break;
9a5aca8c 3712
fd2ec330
PB
3713 case EF_ARM_EABI_VER2:
3714 fprintf (file, _(" [Version2 EABI]"));
3715
3716 if (flags & EF_ARM_SYMSARESORTED)
3717 fprintf (file, _(" [sorted symbol table]"));
3718 else
3719 fprintf (file, _(" [unsorted symbol table]"));
3720
3721 if (flags & EF_ARM_DYNSYMSUSESEGIDX)
3722 fprintf (file, _(" [dynamic symbols use segment index]"));
3723
3724 if (flags & EF_ARM_MAPSYMSFIRST)
3725 fprintf (file, _(" [mapping symbols precede others]"));
3726
99e4ae17 3727 flags &= ~(EF_ARM_SYMSARESORTED | EF_ARM_DYNSYMSUSESEGIDX
fd2ec330
PB
3728 | EF_ARM_MAPSYMSFIRST);
3729 break;
3730
d507cf36
PB
3731 case EF_ARM_EABI_VER3:
3732 fprintf (file, _(" [Version3 EABI]"));
8cb51566
PB
3733 break;
3734
3735 case EF_ARM_EABI_VER4:
3736 fprintf (file, _(" [Version4 EABI]"));
d507cf36
PB
3737
3738 if (flags & EF_ARM_BE8)
3739 fprintf (file, _(" [BE8]"));
3740
3741 if (flags & EF_ARM_LE8)
3742 fprintf (file, _(" [LE8]"));
3743
3744 flags &= ~(EF_ARM_LE8 | EF_ARM_BE8);
3745 break;
3746
fc830a83 3747 default:
9b485d32 3748 fprintf (file, _(" <EABI version unrecognised>"));
fc830a83
NC
3749 break;
3750 }
252b5132 3751
fc830a83 3752 flags &= ~ EF_ARM_EABIMASK;
252b5132 3753
fc830a83 3754 if (flags & EF_ARM_RELEXEC)
9b485d32 3755 fprintf (file, _(" [relocatable executable]"));
252b5132 3756
fc830a83 3757 if (flags & EF_ARM_HASENTRY)
9b485d32 3758 fprintf (file, _(" [has entry point]"));
252b5132 3759
fc830a83
NC
3760 flags &= ~ (EF_ARM_RELEXEC | EF_ARM_HASENTRY);
3761
3762 if (flags)
9b485d32 3763 fprintf (file, _("<Unrecognised flag bits set>"));
9a5aca8c 3764
252b5132
RH
3765 fputc ('\n', file);
3766
b34976b6 3767 return TRUE;
252b5132
RH
3768}
3769
3770static int
57e8b36a 3771elf32_arm_get_symbol_type (Elf_Internal_Sym * elf_sym, int type)
252b5132 3772{
2f0ca46a
NC
3773 switch (ELF_ST_TYPE (elf_sym->st_info))
3774 {
3775 case STT_ARM_TFUNC:
3776 return ELF_ST_TYPE (elf_sym->st_info);
ce855c42 3777
2f0ca46a
NC
3778 case STT_ARM_16BIT:
3779 /* If the symbol is not an object, return the STT_ARM_16BIT flag.
3780 This allows us to distinguish between data used by Thumb instructions
3781 and non-data (which is probably code) inside Thumb regions of an
3782 executable. */
3783 if (type != STT_OBJECT)
3784 return ELF_ST_TYPE (elf_sym->st_info);
3785 break;
9a5aca8c 3786
ce855c42
NC
3787 default:
3788 break;
2f0ca46a
NC
3789 }
3790
3791 return type;
252b5132 3792}
f21f3fe0 3793
252b5132 3794static asection *
57e8b36a
NC
3795elf32_arm_gc_mark_hook (asection * sec,
3796 struct bfd_link_info * info ATTRIBUTE_UNUSED,
3797 Elf_Internal_Rela * rel,
3798 struct elf_link_hash_entry * h,
3799 Elf_Internal_Sym * sym)
252b5132
RH
3800{
3801 if (h != NULL)
3802 {
3803 switch (ELF32_R_TYPE (rel->r_info))
3804 {
3805 case R_ARM_GNU_VTINHERIT:
3806 case R_ARM_GNU_VTENTRY:
3807 break;
3808
3809 default:
3810 switch (h->root.type)
3811 {
3812 case bfd_link_hash_defined:
3813 case bfd_link_hash_defweak:
3814 return h->root.u.def.section;
3815
3816 case bfd_link_hash_common:
3817 return h->root.u.c.p->section;
e049a0de
ILT
3818
3819 default:
3820 break;
252b5132
RH
3821 }
3822 }
3823 }
3824 else
1e2f5b6e 3825 return bfd_section_from_elf_index (sec->owner, sym->st_shndx);
9ad5cbcf 3826
252b5132
RH
3827 return NULL;
3828}
3829
780a67af
NC
3830/* Update the got entry reference counts for the section being removed. */
3831
b34976b6 3832static bfd_boolean
57e8b36a
NC
3833elf32_arm_gc_sweep_hook (bfd * abfd ATTRIBUTE_UNUSED,
3834 struct bfd_link_info * info ATTRIBUTE_UNUSED,
3835 asection * sec ATTRIBUTE_UNUSED,
3836 const Elf_Internal_Rela * relocs ATTRIBUTE_UNUSED)
252b5132 3837{
5e681ec4
PB
3838 Elf_Internal_Shdr *symtab_hdr;
3839 struct elf_link_hash_entry **sym_hashes;
3840 bfd_signed_vma *local_got_refcounts;
3841 const Elf_Internal_Rela *rel, *relend;
3842 unsigned long r_symndx;
3843 struct elf_link_hash_entry *h;
eb043451
PB
3844 struct elf32_arm_link_hash_table * globals;
3845
3846 globals = elf32_arm_hash_table (info);
5e681ec4
PB
3847
3848 elf_section_data (sec)->local_dynrel = NULL;
3849
3850 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3851 sym_hashes = elf_sym_hashes (abfd);
3852 local_got_refcounts = elf_local_got_refcounts (abfd);
3853
3854 relend = relocs + sec->reloc_count;
3855 for (rel = relocs; rel < relend; rel++)
eb043451
PB
3856 {
3857 int r_type;
5e681ec4 3858
eb043451 3859 r_type = ELF32_R_TYPE (rel->r_info);
b6ee372a 3860#ifndef OLD_ARM_ABI
eb043451 3861 r_type = arm_real_reloc_type (globals, r_type);
b6ee372a 3862#endif
eb043451
PB
3863 switch (r_type)
3864 {
3865 case R_ARM_GOT32:
3866#ifndef OLD_ARM_ABI
3867 case R_ARM_GOT_PREL:
3868#endif
3869 r_symndx = ELF32_R_SYM (rel->r_info);
3870 if (r_symndx >= symtab_hdr->sh_info)
3871 {
3872 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3873 if (h->got.refcount > 0)
3874 h->got.refcount -= 1;
3875 }
3876 else if (local_got_refcounts != NULL)
3877 {
3878 if (local_got_refcounts[r_symndx] > 0)
3879 local_got_refcounts[r_symndx] -= 1;
3880 }
3881 break;
3882
3883 case R_ARM_ABS32:
3884 case R_ARM_REL32:
3885 case R_ARM_PC24:
3886 case R_ARM_PLT32:
3887#ifndef OLD_ARM_ABI
5b5bb741
PB
3888 case R_ARM_CALL:
3889 case R_ARM_JUMP24:
eb043451
PB
3890 case R_ARM_PREL31:
3891#endif
b7693d02
DJ
3892 case R_ARM_THM_PC22:
3893 /* Should the interworking branches be here also? */
3894
eb043451
PB
3895 r_symndx = ELF32_R_SYM (rel->r_info);
3896 if (r_symndx >= symtab_hdr->sh_info)
3897 {
3898 struct elf32_arm_link_hash_entry *eh;
3899 struct elf32_arm_relocs_copied **pp;
3900 struct elf32_arm_relocs_copied *p;
5e681ec4 3901
eb043451 3902 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b7693d02 3903 eh = (struct elf32_arm_link_hash_entry *) h;
5e681ec4 3904
eb043451 3905 if (h->plt.refcount > 0)
b7693d02
DJ
3906 {
3907 h->plt.refcount -= 1;
3908 if (ELF32_R_TYPE (rel->r_info) == R_ARM_THM_PC22)
3909 eh->plt_thumb_refcount--;
3910 }
5e681ec4 3911
eb043451 3912 if (r_type == R_ARM_ABS32
eb043451
PB
3913 || r_type == R_ARM_REL32)
3914 {
eb043451
PB
3915 for (pp = &eh->relocs_copied; (p = *pp) != NULL;
3916 pp = &p->next)
3917 if (p->section == sec)
3918 {
3919 p->count -= 1;
3920 if (p->count == 0)
3921 *pp = p->next;
3922 break;
3923 }
3924 }
3925 }
3926 break;
5e681ec4 3927
eb043451
PB
3928 default:
3929 break;
3930 }
3931 }
5e681ec4 3932
b34976b6 3933 return TRUE;
252b5132
RH
3934}
3935
780a67af
NC
3936/* Look through the relocs for a section during the first phase. */
3937
b34976b6 3938static bfd_boolean
57e8b36a
NC
3939elf32_arm_check_relocs (bfd *abfd, struct bfd_link_info *info,
3940 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 3941{
b34976b6
AM
3942 Elf_Internal_Shdr *symtab_hdr;
3943 struct elf_link_hash_entry **sym_hashes;
3944 struct elf_link_hash_entry **sym_hashes_end;
3945 const Elf_Internal_Rela *rel;
3946 const Elf_Internal_Rela *rel_end;
3947 bfd *dynobj;
5e681ec4 3948 asection *sreloc;
b34976b6 3949 bfd_vma *local_got_offsets;
5e681ec4 3950 struct elf32_arm_link_hash_table *htab;
9a5aca8c 3951
1049f94e 3952 if (info->relocatable)
b34976b6 3953 return TRUE;
9a5aca8c 3954
5e681ec4
PB
3955 htab = elf32_arm_hash_table (info);
3956 sreloc = NULL;
9a5aca8c 3957
252b5132
RH
3958 dynobj = elf_hash_table (info)->dynobj;
3959 local_got_offsets = elf_local_got_offsets (abfd);
f21f3fe0 3960
252b5132
RH
3961 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3962 sym_hashes = elf_sym_hashes (abfd);
9b485d32
NC
3963 sym_hashes_end = sym_hashes
3964 + symtab_hdr->sh_size / sizeof (Elf32_External_Sym);
3965
252b5132
RH
3966 if (!elf_bad_symtab (abfd))
3967 sym_hashes_end -= symtab_hdr->sh_info;
9b485d32 3968
252b5132
RH
3969 rel_end = relocs + sec->reloc_count;
3970 for (rel = relocs; rel < rel_end; rel++)
3971 {
3972 struct elf_link_hash_entry *h;
b7693d02 3973 struct elf32_arm_link_hash_entry *eh;
252b5132 3974 unsigned long r_symndx;
eb043451 3975 int r_type;
9a5aca8c 3976
252b5132 3977 r_symndx = ELF32_R_SYM (rel->r_info);
eb043451
PB
3978 r_type = ELF32_R_TYPE (rel->r_info);
3979#ifndef OLD_ARM_ABI
3980 r_type = arm_real_reloc_type (htab, r_type);
3981#endif
252b5132
RH
3982 if (r_symndx < symtab_hdr->sh_info)
3983 h = NULL;
3984 else
3985 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
9a5aca8c 3986
b7693d02
DJ
3987 eh = (struct elf32_arm_link_hash_entry *) h;
3988
eb043451 3989 switch (r_type)
252b5132 3990 {
5e681ec4 3991 case R_ARM_GOT32:
eb043451
PB
3992#ifndef OLD_ARM_ABI
3993 case R_ARM_GOT_PREL:
3994#endif
5e681ec4 3995 /* This symbol requires a global offset table entry. */
252b5132
RH
3996 if (h != NULL)
3997 {
5e681ec4 3998 h->got.refcount++;
252b5132
RH
3999 }
4000 else
4001 {
5e681ec4
PB
4002 bfd_signed_vma *local_got_refcounts;
4003
4004 /* This is a global offset table entry for a local symbol. */
4005 local_got_refcounts = elf_local_got_refcounts (abfd);
4006 if (local_got_refcounts == NULL)
252b5132 4007 {
dc810e39 4008 bfd_size_type size;
252b5132 4009
dc810e39 4010 size = symtab_hdr->sh_info;
57e8b36a
NC
4011 size *= (sizeof (bfd_signed_vma) + sizeof (char));
4012 local_got_refcounts = bfd_zalloc (abfd, size);
5e681ec4 4013 if (local_got_refcounts == NULL)
b34976b6 4014 return FALSE;
5e681ec4 4015 elf_local_got_refcounts (abfd) = local_got_refcounts;
252b5132 4016 }
5e681ec4 4017 local_got_refcounts[r_symndx] += 1;
252b5132 4018 }
eb043451
PB
4019 if (r_type == R_ARM_GOT32)
4020 break;
4021 /* Fall through. */
252b5132 4022
5e681ec4
PB
4023 case R_ARM_GOTOFF:
4024 case R_ARM_GOTPC:
4025 if (htab->sgot == NULL)
4026 {
4027 if (htab->root.dynobj == NULL)
4028 htab->root.dynobj = abfd;
4029 if (!create_got_section (htab->root.dynobj, info))
4030 return FALSE;
4031 }
252b5132
RH
4032 break;
4033
4034 case R_ARM_ABS32:
4035 case R_ARM_REL32:
4036 case R_ARM_PC24:
7359ea65 4037 case R_ARM_PLT32:
eb043451 4038#ifndef OLD_ARM_ABI
5b5bb741
PB
4039 case R_ARM_CALL:
4040 case R_ARM_JUMP24:
eb043451
PB
4041 case R_ARM_PREL31:
4042#endif
b7693d02
DJ
4043 case R_ARM_THM_PC22:
4044 /* Should the interworking branches be listed here? */
7359ea65 4045 if (h != NULL)
5e681ec4
PB
4046 {
4047 /* If this reloc is in a read-only section, we might
4048 need a copy reloc. We can't check reliably at this
4049 stage whether the section is read-only, as input
4050 sections have not yet been mapped to output sections.
4051 Tentatively set the flag for now, and correct in
4052 adjust_dynamic_symbol. */
7359ea65 4053 if (!info->shared)
f5385ebf 4054 h->non_got_ref = 1;
7359ea65 4055
5e681ec4 4056 /* We may need a .plt entry if the function this reloc
c84cd8ee
DJ
4057 refers to is in a different object. We can't tell for
4058 sure yet, because something later might force the
4059 symbol local. */
eb043451 4060 if (r_type == R_ARM_PC24
5b5bb741
PB
4061#ifndef OLD_ARM_ABI
4062 || r_type == R_ARM_CALL
4063 || r_type == R_ARM_JUMP24
ee06dc07 4064 || r_type == R_ARM_PREL31
5b5bb741 4065#endif
b7693d02
DJ
4066 || r_type == R_ARM_PLT32
4067 || r_type == R_ARM_THM_PC22)
f5385ebf 4068 h->needs_plt = 1;
4f199be3
DJ
4069
4070 /* If we create a PLT entry, this relocation will reference
4071 it, even if it's an ABS32 relocation. */
4072 h->plt.refcount += 1;
b7693d02
DJ
4073
4074 if (r_type == R_ARM_THM_PC22)
4075 eh->plt_thumb_refcount += 1;
5e681ec4
PB
4076 }
4077
252b5132
RH
4078 /* If we are creating a shared library, and this is a reloc
4079 against a global symbol, or a non PC relative reloc
4080 against a local symbol, then we need to copy the reloc
4081 into the shared library. However, if we are linking with
4082 -Bsymbolic, we do not need to copy a reloc against a
4083 global symbol which is defined in an object we are
4084 including in the link (i.e., DEF_REGULAR is set). At
4085 this point we have not seen all the input files, so it is
4086 possible that DEF_REGULAR is not set now but will be set
4087 later (it is never cleared). We account for that
4088 possibility below by storing information in the
5e681ec4 4089 relocs_copied field of the hash table entry. */
252b5132 4090 if (info->shared
5e681ec4 4091 && (sec->flags & SEC_ALLOC) != 0
eb043451
PB
4092 && ((r_type != R_ARM_PC24
4093 && r_type != R_ARM_PLT32
b6ee372a 4094#ifndef OLD_ARM_ABI
5b5bb741
PB
4095 && r_type != R_ARM_CALL
4096 && r_type != R_ARM_JUMP24
eb043451 4097 && r_type != R_ARM_PREL31
b6ee372a 4098#endif
b7693d02
DJ
4099 && r_type != R_ARM_REL32
4100 && r_type != R_ARM_THM_PC22)
5e681ec4
PB
4101 || (h != NULL
4102 && (! info->symbolic
f5385ebf 4103 || !h->def_regular))))
252b5132 4104 {
5e681ec4
PB
4105 struct elf32_arm_relocs_copied *p, **head;
4106
252b5132
RH
4107 /* When creating a shared object, we must copy these
4108 reloc types into the output file. We create a reloc
4109 section in dynobj and make room for this reloc. */
4110 if (sreloc == NULL)
4111 {
4112 const char * name;
4113
4114 name = (bfd_elf_string_from_elf_section
4115 (abfd,
4116 elf_elfheader (abfd)->e_shstrndx,
4117 elf_section_data (sec)->rel_hdr.sh_name));
4118 if (name == NULL)
b34976b6 4119 return FALSE;
252b5132
RH
4120
4121 BFD_ASSERT (strncmp (name, ".rel", 4) == 0
99e4ae17 4122 && strcmp (bfd_get_section_name (abfd, sec),
252b5132
RH
4123 name + 4) == 0);
4124
4125 sreloc = bfd_get_section_by_name (dynobj, name);
4126 if (sreloc == NULL)
4127 {
4128 flagword flags;
4129
4130 sreloc = bfd_make_section (dynobj, name);
4131 flags = (SEC_HAS_CONTENTS | SEC_READONLY
4132 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
e5a52504
MM
4133 if ((sec->flags & SEC_ALLOC) != 0
4134 /* BPABI objects never have dynamic
4135 relocations mapped. */
4136 && !htab->symbian_p)
252b5132
RH
4137 flags |= SEC_ALLOC | SEC_LOAD;
4138 if (sreloc == NULL
4139 || ! bfd_set_section_flags (dynobj, sreloc, flags)
4140 || ! bfd_set_section_alignment (dynobj, sreloc, 2))
b34976b6 4141 return FALSE;
252b5132 4142 }
5e681ec4
PB
4143
4144 elf_section_data (sec)->sreloc = sreloc;
252b5132
RH
4145 }
4146
5e681ec4
PB
4147 /* If this is a global symbol, we count the number of
4148 relocations we need for this symbol. */
4149 if (h != NULL)
252b5132 4150 {
5e681ec4
PB
4151 head = &((struct elf32_arm_link_hash_entry *) h)->relocs_copied;
4152 }
4153 else
4154 {
4155 /* Track dynamic relocs needed for local syms too.
4156 We really need local syms available to do this
4157 easily. Oh well. */
57e8b36a 4158
5e681ec4
PB
4159 asection *s;
4160 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
4161 sec, r_symndx);
4162 if (s == NULL)
4163 return FALSE;
57e8b36a 4164
5e681ec4
PB
4165 head = ((struct elf32_arm_relocs_copied **)
4166 &elf_section_data (s)->local_dynrel);
4167 }
57e8b36a 4168
5e681ec4
PB
4169 p = *head;
4170 if (p == NULL || p->section != sec)
4171 {
4172 bfd_size_type amt = sizeof *p;
57e8b36a 4173
5e681ec4 4174 p = bfd_alloc (htab->root.dynobj, amt);
252b5132 4175 if (p == NULL)
5e681ec4
PB
4176 return FALSE;
4177 p->next = *head;
4178 *head = p;
4179 p->section = sec;
4180 p->count = 0;
252b5132 4181 }
57e8b36a 4182
eb043451 4183 if (r_type == R_ARM_ABS32
eb043451 4184 || r_type == R_ARM_REL32)
7359ea65 4185 p->count += 1;
252b5132
RH
4186 }
4187 break;
4188
4189 /* This relocation describes the C++ object vtable hierarchy.
4190 Reconstruct it for later use during GC. */
4191 case R_ARM_GNU_VTINHERIT:
c152c796 4192 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 4193 return FALSE;
252b5132 4194 break;
9a5aca8c 4195
252b5132
RH
4196 /* This relocation describes which C++ vtable entries are actually
4197 used. Record for later use during GC. */
4198 case R_ARM_GNU_VTENTRY:
c152c796 4199 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_offset))
b34976b6 4200 return FALSE;
252b5132
RH
4201 break;
4202 }
4203 }
f21f3fe0 4204
b34976b6 4205 return TRUE;
252b5132
RH
4206}
4207
b34976b6 4208static bfd_boolean
0367ecfb 4209is_arm_mapping_symbol_name (const char * name)
252b5132 4210{
0367ecfb
NC
4211 return (name != NULL)
4212 && (name[0] == '$')
4213 && ((name[1] == 'a') || (name[1] == 't') || (name[1] == 'd'))
4214 && (name[2] == 0);
4215}
f21f3fe0 4216
3c9458e9
NC
4217/* Treat mapping symbols as special target symbols. */
4218
4219static bfd_boolean
4220elf32_arm_is_target_special_symbol (bfd * abfd ATTRIBUTE_UNUSED, asymbol * sym)
4221{
4222 return is_arm_mapping_symbol_name (sym->name);
4223}
4224
0367ecfb
NC
4225/* This is a copy of elf_find_function() from elf.c except that
4226 ARM mapping symbols are ignored when looking for function names
4227 and STT_ARM_TFUNC is considered to a function type. */
252b5132 4228
0367ecfb
NC
4229static bfd_boolean
4230arm_elf_find_function (bfd * abfd ATTRIBUTE_UNUSED,
4231 asection * section,
4232 asymbol ** symbols,
4233 bfd_vma offset,
4234 const char ** filename_ptr,
4235 const char ** functionname_ptr)
4236{
4237 const char * filename = NULL;
4238 asymbol * func = NULL;
4239 bfd_vma low_func = 0;
4240 asymbol ** p;
252b5132
RH
4241
4242 for (p = symbols; *p != NULL; p++)
4243 {
4244 elf_symbol_type *q;
4245
4246 q = (elf_symbol_type *) *p;
4247
252b5132
RH
4248 switch (ELF_ST_TYPE (q->internal_elf_sym.st_info))
4249 {
4250 default:
4251 break;
4252 case STT_FILE:
4253 filename = bfd_asymbol_name (&q->symbol);
4254 break;
252b5132
RH
4255 case STT_FUNC:
4256 case STT_ARM_TFUNC:
0367ecfb
NC
4257 /* Skip $a and $t symbols. */
4258 if ((q->symbol.flags & BSF_LOCAL)
4259 && is_arm_mapping_symbol_name (q->symbol.name))
4260 continue;
4261 /* Fall through. */
4262 case STT_NOTYPE:
6b40fcba 4263 if (bfd_get_section (&q->symbol) == section
252b5132
RH
4264 && q->symbol.value >= low_func
4265 && q->symbol.value <= offset)
4266 {
4267 func = (asymbol *) q;
4268 low_func = q->symbol.value;
4269 }
4270 break;
4271 }
4272 }
4273
4274 if (func == NULL)
b34976b6 4275 return FALSE;
252b5132 4276
0367ecfb
NC
4277 if (filename_ptr)
4278 *filename_ptr = filename;
4279 if (functionname_ptr)
4280 *functionname_ptr = bfd_asymbol_name (func);
4281
4282 return TRUE;
4283}
4284
4285
4286/* Find the nearest line to a particular section and offset, for error
4287 reporting. This code is a duplicate of the code in elf.c, except
4288 that it uses arm_elf_find_function. */
4289
4290static bfd_boolean
4291elf32_arm_find_nearest_line (bfd * abfd,
4292 asection * section,
4293 asymbol ** symbols,
4294 bfd_vma offset,
4295 const char ** filename_ptr,
4296 const char ** functionname_ptr,
4297 unsigned int * line_ptr)
4298{
4299 bfd_boolean found = FALSE;
4300
4301 /* We skip _bfd_dwarf1_find_nearest_line since no known ARM toolchain uses it. */
4302
4303 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4304 filename_ptr, functionname_ptr,
4305 line_ptr, 0,
4306 & elf_tdata (abfd)->dwarf2_find_line_info))
4307 {
4308 if (!*functionname_ptr)
4309 arm_elf_find_function (abfd, section, symbols, offset,
4310 *filename_ptr ? NULL : filename_ptr,
4311 functionname_ptr);
f21f3fe0 4312
0367ecfb
NC
4313 return TRUE;
4314 }
4315
4316 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4317 & found, filename_ptr,
4318 functionname_ptr, line_ptr,
4319 & elf_tdata (abfd)->line_info))
4320 return FALSE;
4321
4322 if (found && (*functionname_ptr || *line_ptr))
4323 return TRUE;
4324
4325 if (symbols == NULL)
4326 return FALSE;
4327
4328 if (! arm_elf_find_function (abfd, section, symbols, offset,
4329 filename_ptr, functionname_ptr))
4330 return FALSE;
4331
4332 *line_ptr = 0;
b34976b6 4333 return TRUE;
252b5132
RH
4334}
4335
4336/* Adjust a symbol defined by a dynamic object and referenced by a
4337 regular object. The current definition is in some section of the
4338 dynamic object, but we're not including those sections. We have to
4339 change the definition to something the rest of the link can
4340 understand. */
4341
b34976b6 4342static bfd_boolean
57e8b36a
NC
4343elf32_arm_adjust_dynamic_symbol (struct bfd_link_info * info,
4344 struct elf_link_hash_entry * h)
252b5132
RH
4345{
4346 bfd * dynobj;
4347 asection * s;
4348 unsigned int power_of_two;
b7693d02 4349 struct elf32_arm_link_hash_entry * eh;
252b5132
RH
4350
4351 dynobj = elf_hash_table (info)->dynobj;
4352
4353 /* Make sure we know what is going on here. */
4354 BFD_ASSERT (dynobj != NULL
f5385ebf 4355 && (h->needs_plt
f6e332e6 4356 || h->u.weakdef != NULL
f5385ebf
AM
4357 || (h->def_dynamic
4358 && h->ref_regular
4359 && !h->def_regular)));
252b5132 4360
b7693d02
DJ
4361 eh = (struct elf32_arm_link_hash_entry *) h;
4362
252b5132
RH
4363 /* If this is a function, put it in the procedure linkage table. We
4364 will fill in the contents of the procedure linkage table later,
4365 when we know the address of the .got section. */
b7693d02 4366 if (h->type == STT_FUNC || h->type == STT_ARM_TFUNC
f5385ebf 4367 || h->needs_plt)
252b5132 4368 {
5e681ec4
PB
4369 if (h->plt.refcount <= 0
4370 || SYMBOL_CALLS_LOCAL (info, h)
4371 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
4372 && h->root.type == bfd_link_hash_undefweak))
252b5132
RH
4373 {
4374 /* This case can occur if we saw a PLT32 reloc in an input
5e681ec4
PB
4375 file, but the symbol was never referred to by a dynamic
4376 object, or if all references were garbage collected. In
4377 such a case, we don't actually need to build a procedure
4378 linkage table, and we can just do a PC24 reloc instead. */
4379 h->plt.offset = (bfd_vma) -1;
b7693d02 4380 eh->plt_thumb_refcount = 0;
f5385ebf 4381 h->needs_plt = 0;
252b5132
RH
4382 }
4383
b34976b6 4384 return TRUE;
252b5132 4385 }
5e681ec4 4386 else
b7693d02
DJ
4387 {
4388 /* It's possible that we incorrectly decided a .plt reloc was
4389 needed for an R_ARM_PC24 or similar reloc to a non-function sym
4390 in check_relocs. We can't decide accurately between function
4391 and non-function syms in check-relocs; Objects loaded later in
4392 the link may change h->type. So fix it now. */
4393 h->plt.offset = (bfd_vma) -1;
4394 eh->plt_thumb_refcount = 0;
4395 }
252b5132
RH
4396
4397 /* If this is a weak symbol, and there is a real definition, the
4398 processor independent code will have arranged for us to see the
4399 real definition first, and we can just use the same value. */
f6e332e6 4400 if (h->u.weakdef != NULL)
252b5132 4401 {
f6e332e6
AM
4402 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
4403 || h->u.weakdef->root.type == bfd_link_hash_defweak);
4404 h->root.u.def.section = h->u.weakdef->root.u.def.section;
4405 h->root.u.def.value = h->u.weakdef->root.u.def.value;
b34976b6 4406 return TRUE;
252b5132
RH
4407 }
4408
4409 /* This is a reference to a symbol defined by a dynamic object which
4410 is not a function. */
4411
4412 /* If we are creating a shared library, we must presume that the
4413 only references to the symbol are via the global offset table.
4414 For such cases we need not do anything here; the relocations will
4415 be handled correctly by relocate_section. */
4416 if (info->shared)
b34976b6 4417 return TRUE;
252b5132
RH
4418
4419 /* We must allocate the symbol in our .dynbss section, which will
4420 become part of the .bss section of the executable. There will be
4421 an entry for this symbol in the .dynsym section. The dynamic
4422 object will contain position independent code, so all references
4423 from the dynamic object to this symbol will go through the global
4424 offset table. The dynamic linker will use the .dynsym entry to
4425 determine the address it must put in the global offset table, so
4426 both the dynamic object and the regular object will refer to the
4427 same memory location for the variable. */
252b5132
RH
4428 s = bfd_get_section_by_name (dynobj, ".dynbss");
4429 BFD_ASSERT (s != NULL);
4430
4431 /* We must generate a R_ARM_COPY reloc to tell the dynamic linker to
4432 copy the initial value out of the dynamic object and into the
4433 runtime process image. We need to remember the offset into the
4434 .rel.bss section we are going to use. */
4435 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
4436 {
4437 asection *srel;
4438
4439 srel = bfd_get_section_by_name (dynobj, ".rel.bss");
4440 BFD_ASSERT (srel != NULL);
eea6121a 4441 srel->size += sizeof (Elf32_External_Rel);
f5385ebf 4442 h->needs_copy = 1;
252b5132
RH
4443 }
4444
4445 /* We need to figure out the alignment required for this symbol. I
4446 have no idea how ELF linkers handle this. */
4447 power_of_two = bfd_log2 (h->size);
4448 if (power_of_two > 3)
4449 power_of_two = 3;
4450
4451 /* Apply the required alignment. */
eea6121a 4452 s->size = BFD_ALIGN (s->size, (bfd_size_type) (1 << power_of_two));
252b5132
RH
4453 if (power_of_two > bfd_get_section_alignment (dynobj, s))
4454 {
4455 if (! bfd_set_section_alignment (dynobj, s, power_of_two))
b34976b6 4456 return FALSE;
252b5132
RH
4457 }
4458
4459 /* Define the symbol as being at this point in the section. */
4460 h->root.u.def.section = s;
eea6121a 4461 h->root.u.def.value = s->size;
252b5132
RH
4462
4463 /* Increment the section size to make room for the symbol. */
eea6121a 4464 s->size += h->size;
252b5132 4465
b34976b6 4466 return TRUE;
252b5132
RH
4467}
4468
5e681ec4
PB
4469/* Allocate space in .plt, .got and associated reloc sections for
4470 dynamic relocs. */
4471
4472static bfd_boolean
57e8b36a 4473allocate_dynrelocs (struct elf_link_hash_entry *h, void * inf)
5e681ec4
PB
4474{
4475 struct bfd_link_info *info;
4476 struct elf32_arm_link_hash_table *htab;
4477 struct elf32_arm_link_hash_entry *eh;
4478 struct elf32_arm_relocs_copied *p;
4479
b7693d02
DJ
4480 eh = (struct elf32_arm_link_hash_entry *) h;
4481
5e681ec4
PB
4482 if (h->root.type == bfd_link_hash_indirect)
4483 return TRUE;
4484
4485 if (h->root.type == bfd_link_hash_warning)
4486 /* When warning symbols are created, they **replace** the "real"
4487 entry in the hash table, thus we never get to see the real
4488 symbol in a hash traversal. So look at it now. */
4489 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4490
4491 info = (struct bfd_link_info *) inf;
4492 htab = elf32_arm_hash_table (info);
4493
4494 if (htab->root.dynamic_sections_created
4495 && h->plt.refcount > 0)
4496 {
4497 /* Make sure this symbol is output as a dynamic symbol.
4498 Undefined weak syms won't yet be marked as dynamic. */
4499 if (h->dynindx == -1
f5385ebf 4500 && !h->forced_local)
5e681ec4 4501 {
c152c796 4502 if (! bfd_elf_link_record_dynamic_symbol (info, h))
5e681ec4
PB
4503 return FALSE;
4504 }
4505
4506 if (info->shared
7359ea65 4507 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
5e681ec4
PB
4508 {
4509 asection *s = htab->splt;
4510
4511 /* If this is the first .plt entry, make room for the special
4512 first entry. */
eea6121a 4513 if (s->size == 0)
e5a52504 4514 s->size += htab->plt_header_size;
5e681ec4 4515
eea6121a 4516 h->plt.offset = s->size;
5e681ec4 4517
b7693d02
DJ
4518 /* If we will insert a Thumb trampoline before this PLT, leave room
4519 for it. */
4520 if (!htab->symbian_p && eh->plt_thumb_refcount > 0)
4521 {
4522 h->plt.offset += PLT_THUMB_STUB_SIZE;
4523 s->size += PLT_THUMB_STUB_SIZE;
4524 }
4525
5e681ec4
PB
4526 /* If this symbol is not defined in a regular file, and we are
4527 not generating a shared library, then set the symbol to this
4528 location in the .plt. This is required to make function
4529 pointers compare as equal between the normal executable and
4530 the shared library. */
4531 if (! info->shared
f5385ebf 4532 && !h->def_regular)
5e681ec4
PB
4533 {
4534 h->root.u.def.section = s;
4535 h->root.u.def.value = h->plt.offset;
b7693d02
DJ
4536
4537 /* Make sure the function is not marked as Thumb, in case
4538 it is the target of an ABS32 relocation, which will
4539 point to the PLT entry. */
4540 if (ELF_ST_TYPE (h->type) == STT_ARM_TFUNC)
4541 h->type = ELF_ST_INFO (ELF_ST_BIND (h->type), STT_FUNC);
5e681ec4
PB
4542 }
4543
4544 /* Make room for this entry. */
e5a52504 4545 s->size += htab->plt_entry_size;
5e681ec4 4546
e5a52504 4547 if (!htab->symbian_p)
b7693d02
DJ
4548 {
4549 /* We also need to make an entry in the .got.plt section, which
4550 will be placed in the .got section by the linker script. */
4551 eh->plt_got_offset = htab->sgotplt->size;
4552 htab->sgotplt->size += 4;
4553 }
5e681ec4
PB
4554
4555 /* We also need to make an entry in the .rel.plt section. */
eea6121a 4556 htab->srelplt->size += sizeof (Elf32_External_Rel);
5e681ec4
PB
4557 }
4558 else
4559 {
4560 h->plt.offset = (bfd_vma) -1;
f5385ebf 4561 h->needs_plt = 0;
5e681ec4
PB
4562 }
4563 }
4564 else
4565 {
4566 h->plt.offset = (bfd_vma) -1;
f5385ebf 4567 h->needs_plt = 0;
5e681ec4
PB
4568 }
4569
4570 if (h->got.refcount > 0)
4571 {
4572 asection *s;
4573 bfd_boolean dyn;
4574
4575 /* Make sure this symbol is output as a dynamic symbol.
4576 Undefined weak syms won't yet be marked as dynamic. */
4577 if (h->dynindx == -1
f5385ebf 4578 && !h->forced_local)
5e681ec4 4579 {
c152c796 4580 if (! bfd_elf_link_record_dynamic_symbol (info, h))
5e681ec4
PB
4581 return FALSE;
4582 }
4583
e5a52504
MM
4584 if (!htab->symbian_p)
4585 {
4586 s = htab->sgot;
4587 h->got.offset = s->size;
4588 s->size += 4;
4589 dyn = htab->root.dynamic_sections_created;
4590 if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
4591 || h->root.type != bfd_link_hash_undefweak)
4592 && (info->shared
4593 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
4594 htab->srelgot->size += sizeof (Elf32_External_Rel);
4595 }
5e681ec4
PB
4596 }
4597 else
4598 h->got.offset = (bfd_vma) -1;
4599
5e681ec4
PB
4600 if (eh->relocs_copied == NULL)
4601 return TRUE;
4602
4603 /* In the shared -Bsymbolic case, discard space allocated for
4604 dynamic pc-relative relocs against symbols which turn out to be
4605 defined in regular objects. For the normal shared case, discard
4606 space for pc-relative relocs that have become local due to symbol
4607 visibility changes. */
4608
4609 if (info->shared)
4610 {
7359ea65
DJ
4611 /* Discard relocs on undefined weak syms with non-default
4612 visibility. */
5e681ec4
PB
4613 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
4614 && h->root.type == bfd_link_hash_undefweak)
4615 eh->relocs_copied = NULL;
4616 }
4617 else
4618 {
4619 /* For the non-shared case, discard space for relocs against
4620 symbols which turn out to need copy relocs or are not
4621 dynamic. */
4622
f5385ebf
AM
4623 if (!h->non_got_ref
4624 && ((h->def_dynamic
4625 && !h->def_regular)
5e681ec4
PB
4626 || (htab->root.dynamic_sections_created
4627 && (h->root.type == bfd_link_hash_undefweak
4628 || h->root.type == bfd_link_hash_undefined))))
4629 {
4630 /* Make sure this symbol is output as a dynamic symbol.
4631 Undefined weak syms won't yet be marked as dynamic. */
4632 if (h->dynindx == -1
f5385ebf 4633 && !h->forced_local)
5e681ec4 4634 {
c152c796 4635 if (! bfd_elf_link_record_dynamic_symbol (info, h))
5e681ec4
PB
4636 return FALSE;
4637 }
4638
4639 /* If that succeeded, we know we'll be keeping all the
4640 relocs. */
4641 if (h->dynindx != -1)
4642 goto keep;
4643 }
4644
4645 eh->relocs_copied = NULL;
4646
4647 keep: ;
4648 }
4649
4650 /* Finally, allocate space. */
4651 for (p = eh->relocs_copied; p != NULL; p = p->next)
4652 {
4653 asection *sreloc = elf_section_data (p->section)->sreloc;
eea6121a 4654 sreloc->size += p->count * sizeof (Elf32_External_Rel);
5e681ec4
PB
4655 }
4656
4657 return TRUE;
4658}
4659
08d1f311
DJ
4660/* Find any dynamic relocs that apply to read-only sections. */
4661
4662static bfd_boolean
4663elf32_arm_readonly_dynrelocs (struct elf_link_hash_entry *h, PTR inf)
4664{
4665 struct elf32_arm_link_hash_entry *eh;
4666 struct elf32_arm_relocs_copied *p;
4667
4668 if (h->root.type == bfd_link_hash_warning)
4669 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4670
4671 eh = (struct elf32_arm_link_hash_entry *) h;
4672 for (p = eh->relocs_copied; p != NULL; p = p->next)
4673 {
4674 asection *s = p->section;
4675
4676 if (s != NULL && (s->flags & SEC_READONLY) != 0)
4677 {
4678 struct bfd_link_info *info = (struct bfd_link_info *) inf;
4679
4680 info->flags |= DF_TEXTREL;
4681
4682 /* Not an error, just cut short the traversal. */
4683 return FALSE;
4684 }
4685 }
4686 return TRUE;
4687}
4688
252b5132
RH
4689/* Set the sizes of the dynamic sections. */
4690
b34976b6 4691static bfd_boolean
57e8b36a
NC
4692elf32_arm_size_dynamic_sections (bfd * output_bfd ATTRIBUTE_UNUSED,
4693 struct bfd_link_info * info)
252b5132
RH
4694{
4695 bfd * dynobj;
4696 asection * s;
b34976b6
AM
4697 bfd_boolean plt;
4698 bfd_boolean relocs;
5e681ec4
PB
4699 bfd *ibfd;
4700 struct elf32_arm_link_hash_table *htab;
252b5132 4701
5e681ec4 4702 htab = elf32_arm_hash_table (info);
252b5132
RH
4703 dynobj = elf_hash_table (info)->dynobj;
4704 BFD_ASSERT (dynobj != NULL);
4705
4706 if (elf_hash_table (info)->dynamic_sections_created)
4707 {
4708 /* Set the contents of the .interp section to the interpreter. */
893c4fe2 4709 if (info->executable)
252b5132
RH
4710 {
4711 s = bfd_get_section_by_name (dynobj, ".interp");
4712 BFD_ASSERT (s != NULL);
eea6121a 4713 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
252b5132
RH
4714 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
4715 }
4716 }
5e681ec4
PB
4717
4718 /* Set up .got offsets for local syms, and space for local dynamic
4719 relocs. */
4720 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
252b5132 4721 {
5e681ec4
PB
4722 bfd_signed_vma *local_got;
4723 bfd_signed_vma *end_local_got;
4724 char *local_tls_type;
4725 bfd_size_type locsymcount;
4726 Elf_Internal_Shdr *symtab_hdr;
4727 asection *srel;
4728
4729 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
4730 continue;
4731
4732 for (s = ibfd->sections; s != NULL; s = s->next)
4733 {
4734 struct elf32_arm_relocs_copied *p;
4735
4736 for (p = *((struct elf32_arm_relocs_copied **)
4737 &elf_section_data (s)->local_dynrel);
4738 p != NULL;
4739 p = p->next)
4740 {
4741 if (!bfd_is_abs_section (p->section)
4742 && bfd_is_abs_section (p->section->output_section))
4743 {
4744 /* Input section has been discarded, either because
4745 it is a copy of a linkonce section or due to
4746 linker script /DISCARD/, so we'll be discarding
4747 the relocs too. */
4748 }
4749 else if (p->count != 0)
4750 {
4751 srel = elf_section_data (p->section)->sreloc;
eea6121a 4752 srel->size += p->count * sizeof (Elf32_External_Rel);
5e681ec4
PB
4753 if ((p->section->output_section->flags & SEC_READONLY) != 0)
4754 info->flags |= DF_TEXTREL;
4755 }
4756 }
4757 }
4758
4759 local_got = elf_local_got_refcounts (ibfd);
4760 if (!local_got)
4761 continue;
4762
4763 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
4764 locsymcount = symtab_hdr->sh_info;
4765 end_local_got = local_got + locsymcount;
4766 s = htab->sgot;
4767 srel = htab->srelgot;
4768 for (; local_got < end_local_got; ++local_got, ++local_tls_type)
4769 {
4770 if (*local_got > 0)
4771 {
eea6121a
AM
4772 *local_got = s->size;
4773 s->size += 4;
5e681ec4 4774 if (info->shared)
eea6121a 4775 srel->size += sizeof (Elf32_External_Rel);
5e681ec4
PB
4776 }
4777 else
4778 *local_got = (bfd_vma) -1;
4779 }
252b5132
RH
4780 }
4781
5e681ec4
PB
4782 /* Allocate global sym .plt and .got entries, and space for global
4783 sym dynamic relocs. */
57e8b36a 4784 elf_link_hash_traverse (& htab->root, allocate_dynrelocs, info);
252b5132
RH
4785
4786 /* The check_relocs and adjust_dynamic_symbol entry points have
4787 determined the sizes of the various dynamic sections. Allocate
4788 memory for them. */
b34976b6
AM
4789 plt = FALSE;
4790 relocs = FALSE;
252b5132
RH
4791 for (s = dynobj->sections; s != NULL; s = s->next)
4792 {
4793 const char * name;
b34976b6 4794 bfd_boolean strip;
252b5132
RH
4795
4796 if ((s->flags & SEC_LINKER_CREATED) == 0)
4797 continue;
4798
4799 /* It's OK to base decisions on the section name, because none
4800 of the dynobj section names depend upon the input files. */
4801 name = bfd_get_section_name (dynobj, s);
4802
b34976b6 4803 strip = FALSE;
252b5132 4804
24a1ba0f 4805 if (strcmp (name, ".plt") == 0)
252b5132 4806 {
eea6121a 4807 if (s->size == 0)
252b5132
RH
4808 {
4809 /* Strip this section if we don't need it; see the
4810 comment below. */
b34976b6 4811 strip = TRUE;
252b5132
RH
4812 }
4813 else
4814 {
4815 /* Remember whether there is a PLT. */
b34976b6 4816 plt = TRUE;
252b5132
RH
4817 }
4818 }
4819 else if (strncmp (name, ".rel", 4) == 0)
4820 {
eea6121a 4821 if (s->size == 0)
252b5132
RH
4822 {
4823 /* If we don't need this section, strip it from the
4824 output file. This is mostly to handle .rel.bss and
4825 .rel.plt. We must create both sections in
4826 create_dynamic_sections, because they must be created
4827 before the linker maps input sections to output
4828 sections. The linker does that before
4829 adjust_dynamic_symbol is called, and it is that
4830 function which decides whether anything needs to go
4831 into these sections. */
b34976b6 4832 strip = TRUE;
252b5132
RH
4833 }
4834 else
4835 {
252b5132
RH
4836 /* Remember whether there are any reloc sections other
4837 than .rel.plt. */
4838 if (strcmp (name, ".rel.plt") != 0)
b34976b6 4839 relocs = TRUE;
252b5132
RH
4840
4841 /* We use the reloc_count field as a counter if we need
4842 to copy relocs into the output file. */
4843 s->reloc_count = 0;
4844 }
4845 }
4846 else if (strncmp (name, ".got", 4) != 0)
4847 {
4848 /* It's not one of our sections, so don't allocate space. */
4849 continue;
4850 }
4851
4852 if (strip)
4853 {
52585bb8 4854 _bfd_strip_section_from_output (info, s);
252b5132
RH
4855 continue;
4856 }
4857
4858 /* Allocate memory for the section contents. */
eea6121a
AM
4859 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
4860 if (s->contents == NULL && s->size != 0)
b34976b6 4861 return FALSE;
252b5132
RH
4862 }
4863
4864 if (elf_hash_table (info)->dynamic_sections_created)
4865 {
4866 /* Add some entries to the .dynamic section. We fill in the
4867 values later, in elf32_arm_finish_dynamic_sections, but we
4868 must add the entries now so that we get the correct size for
4869 the .dynamic section. The DT_DEBUG entry is filled in by the
4870 dynamic linker and used by the debugger. */
dc810e39 4871#define add_dynamic_entry(TAG, VAL) \
5a580b3a 4872 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39
AM
4873
4874 if (!info->shared)
252b5132 4875 {
dc810e39 4876 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 4877 return FALSE;
252b5132
RH
4878 }
4879
4880 if (plt)
4881 {
dc810e39
AM
4882 if ( !add_dynamic_entry (DT_PLTGOT, 0)
4883 || !add_dynamic_entry (DT_PLTRELSZ, 0)
4884 || !add_dynamic_entry (DT_PLTREL, DT_REL)
4885 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 4886 return FALSE;
252b5132
RH
4887 }
4888
4889 if (relocs)
4890 {
dc810e39
AM
4891 if ( !add_dynamic_entry (DT_REL, 0)
4892 || !add_dynamic_entry (DT_RELSZ, 0)
4893 || !add_dynamic_entry (DT_RELENT, sizeof (Elf32_External_Rel)))
b34976b6 4894 return FALSE;
252b5132
RH
4895 }
4896
08d1f311
DJ
4897 /* If any dynamic relocs apply to a read-only section,
4898 then we need a DT_TEXTREL entry. */
4899 if ((info->flags & DF_TEXTREL) == 0)
4900 elf_link_hash_traverse (&htab->root, elf32_arm_readonly_dynrelocs,
4901 (PTR) info);
4902
99e4ae17 4903 if ((info->flags & DF_TEXTREL) != 0)
252b5132 4904 {
dc810e39 4905 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 4906 return FALSE;
d6cf2879 4907 info->flags |= DF_TEXTREL;
252b5132
RH
4908 }
4909 }
dc810e39 4910#undef add_synamic_entry
252b5132 4911
b34976b6 4912 return TRUE;
252b5132
RH
4913}
4914
252b5132
RH
4915/* Finish up dynamic symbol handling. We set the contents of various
4916 dynamic sections here. */
4917
b34976b6 4918static bfd_boolean
57e8b36a
NC
4919elf32_arm_finish_dynamic_symbol (bfd * output_bfd, struct bfd_link_info * info,
4920 struct elf_link_hash_entry * h, Elf_Internal_Sym * sym)
252b5132
RH
4921{
4922 bfd * dynobj;
e5a52504 4923 struct elf32_arm_link_hash_table *htab;
b7693d02 4924 struct elf32_arm_link_hash_entry *eh;
252b5132
RH
4925
4926 dynobj = elf_hash_table (info)->dynobj;
e5a52504 4927 htab = elf32_arm_hash_table (info);
b7693d02 4928 eh = (struct elf32_arm_link_hash_entry *) h;
252b5132
RH
4929
4930 if (h->plt.offset != (bfd_vma) -1)
4931 {
4932 asection * splt;
252b5132 4933 asection * srel;
e5a52504 4934 bfd_byte *loc;
24a1ba0f 4935 bfd_vma plt_index;
947216bf 4936 Elf_Internal_Rela rel;
252b5132
RH
4937
4938 /* This symbol has an entry in the procedure linkage table. Set
4939 it up. */
4940
4941 BFD_ASSERT (h->dynindx != -1);
4942
4943 splt = bfd_get_section_by_name (dynobj, ".plt");
252b5132 4944 srel = bfd_get_section_by_name (dynobj, ".rel.plt");
e5a52504 4945 BFD_ASSERT (splt != NULL && srel != NULL);
252b5132 4946
e5a52504
MM
4947 /* Fill in the entry in the procedure linkage table. */
4948 if (htab->symbian_p)
4949 {
4950 unsigned i;
4951 for (i = 0; i < htab->plt_entry_size / 4; ++i)
4952 bfd_put_32 (output_bfd,
4953 elf32_arm_symbian_plt_entry[i],
4954 splt->contents + h->plt.offset + 4 * i);
4955
4956 /* Fill in the entry in the .rel.plt section. */
2a1b9a48
MM
4957 rel.r_offset = (splt->output_section->vma
4958 + splt->output_offset
e5a52504
MM
4959 + h->plt.offset + 4 * (i - 1));
4960 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARM_GLOB_DAT);
b7693d02
DJ
4961
4962 /* Get the index in the procedure linkage table which
4963 corresponds to this symbol. This is the index of this symbol
4964 in all the symbols for which we are making plt entries. The
4965 first entry in the procedure linkage table is reserved. */
4966 plt_index = ((h->plt.offset - htab->plt_header_size)
4967 / htab->plt_entry_size);
e5a52504
MM
4968 }
4969 else
4970 {
4971 bfd_vma got_offset;
4972 bfd_vma got_displacement;
4973 asection * sgot;
4974
4975 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
4976 BFD_ASSERT (sgot != NULL);
4977
b7693d02
DJ
4978 /* Get the offset into the .got.plt table of the entry that
4979 corresponds to this function. */
4980 got_offset = eh->plt_got_offset;
4981
4982 /* Get the index in the procedure linkage table which
4983 corresponds to this symbol. This is the index of this symbol
4984 in all the symbols for which we are making plt entries. The
4985 first three entries in .got.plt are reserved; after that
4986 symbols appear in the same order as in .plt. */
4987 plt_index = (got_offset - 12) / 4;
e5a52504
MM
4988
4989 /* Calculate the displacement between the PLT slot and the
b7693d02
DJ
4990 entry in the GOT. The eight-byte offset accounts for the
4991 value produced by adding to pc in the first instruction
4992 of the PLT stub. */
e5a52504
MM
4993 got_displacement = (sgot->output_section->vma
4994 + sgot->output_offset
4995 + got_offset
4996 - splt->output_section->vma
4997 - splt->output_offset
4998 - h->plt.offset
4999 - 8);
5e681ec4 5000
e5a52504 5001 BFD_ASSERT ((got_displacement & 0xf0000000) == 0);
5e681ec4 5002
b7693d02
DJ
5003 if (eh->plt_thumb_refcount > 0)
5004 {
5005 bfd_put_16 (output_bfd, elf32_arm_plt_thumb_stub[0],
5006 splt->contents + h->plt.offset - 4);
5007 bfd_put_16 (output_bfd, elf32_arm_plt_thumb_stub[1],
5008 splt->contents + h->plt.offset - 2);
5009 }
5010
e5a52504
MM
5011 bfd_put_32 (output_bfd, elf32_arm_plt_entry[0] | ((got_displacement & 0x0ff00000) >> 20),
5012 splt->contents + h->plt.offset + 0);
5013 bfd_put_32 (output_bfd, elf32_arm_plt_entry[1] | ((got_displacement & 0x000ff000) >> 12),
5014 splt->contents + h->plt.offset + 4);
5015 bfd_put_32 (output_bfd, elf32_arm_plt_entry[2] | (got_displacement & 0x00000fff),
5016 splt->contents + h->plt.offset + 8);
5e681ec4 5017#ifdef FOUR_WORD_PLT
e5a52504
MM
5018 bfd_put_32 (output_bfd, elf32_arm_plt_entry[3],
5019 splt->contents + h->plt.offset + 12);
5e681ec4 5020#endif
252b5132 5021
e5a52504
MM
5022 /* Fill in the entry in the global offset table. */
5023 bfd_put_32 (output_bfd,
5024 (splt->output_section->vma
5025 + splt->output_offset),
5026 sgot->contents + got_offset);
5027
5028 /* Fill in the entry in the .rel.plt section. */
5029 rel.r_offset = (sgot->output_section->vma
5030 + sgot->output_offset
5031 + got_offset);
5032 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARM_JUMP_SLOT);
5033 }
57e8b36a 5034
947216bf
AM
5035 loc = srel->contents + plt_index * sizeof (Elf32_External_Rel);
5036 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
252b5132 5037
f5385ebf 5038 if (!h->def_regular)
252b5132
RH
5039 {
5040 /* Mark the symbol as undefined, rather than as defined in
5041 the .plt section. Leave the value alone. */
5042 sym->st_shndx = SHN_UNDEF;
d982ba73
PB
5043 /* If the symbol is weak, we do need to clear the value.
5044 Otherwise, the PLT entry would provide a definition for
5045 the symbol even if the symbol wasn't defined anywhere,
5046 and so the symbol would never be NULL. */
f5385ebf 5047 if (!h->ref_regular_nonweak)
d982ba73 5048 sym->st_value = 0;
252b5132
RH
5049 }
5050 }
5051
5052 if (h->got.offset != (bfd_vma) -1)
5053 {
5054 asection * sgot;
5055 asection * srel;
947216bf
AM
5056 Elf_Internal_Rela rel;
5057 bfd_byte *loc;
252b5132
RH
5058
5059 /* This symbol has an entry in the global offset table. Set it
5060 up. */
252b5132
RH
5061 sgot = bfd_get_section_by_name (dynobj, ".got");
5062 srel = bfd_get_section_by_name (dynobj, ".rel.got");
5063 BFD_ASSERT (sgot != NULL && srel != NULL);
5064
5065 rel.r_offset = (sgot->output_section->vma
5066 + sgot->output_offset
dc810e39 5067 + (h->got.offset &~ (bfd_vma) 1));
252b5132 5068
5e681ec4
PB
5069 /* If this is a static link, or it is a -Bsymbolic link and the
5070 symbol is defined locally or was forced to be local because
5071 of a version file, we just want to emit a RELATIVE reloc.
5072 The entry in the global offset table will already have been
5073 initialized in the relocate_section function. */
252b5132 5074 if (info->shared
5e681ec4
PB
5075 && SYMBOL_REFERENCES_LOCAL (info, h))
5076 {
5077 BFD_ASSERT((h->got.offset & 1) != 0);
5078 rel.r_info = ELF32_R_INFO (0, R_ARM_RELATIVE);
5079 }
252b5132
RH
5080 else
5081 {
5e681ec4 5082 BFD_ASSERT((h->got.offset & 1) == 0);
252b5132
RH
5083 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset);
5084 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARM_GLOB_DAT);
5085 }
5086
947216bf
AM
5087 loc = srel->contents + srel->reloc_count++ * sizeof (Elf32_External_Rel);
5088 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
252b5132
RH
5089 }
5090
f5385ebf 5091 if (h->needs_copy)
252b5132
RH
5092 {
5093 asection * s;
947216bf
AM
5094 Elf_Internal_Rela rel;
5095 bfd_byte *loc;
252b5132
RH
5096
5097 /* This symbol needs a copy reloc. Set it up. */
252b5132
RH
5098 BFD_ASSERT (h->dynindx != -1
5099 && (h->root.type == bfd_link_hash_defined
5100 || h->root.type == bfd_link_hash_defweak));
5101
5102 s = bfd_get_section_by_name (h->root.u.def.section->owner,
5103 ".rel.bss");
5104 BFD_ASSERT (s != NULL);
5105
5106 rel.r_offset = (h->root.u.def.value
5107 + h->root.u.def.section->output_section->vma
5108 + h->root.u.def.section->output_offset);
5109 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARM_COPY);
947216bf
AM
5110 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rel);
5111 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
252b5132
RH
5112 }
5113
5114 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
5115 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
5116 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
5117 sym->st_shndx = SHN_ABS;
5118
b34976b6 5119 return TRUE;
252b5132
RH
5120}
5121
5122/* Finish up the dynamic sections. */
5123
b34976b6 5124static bfd_boolean
57e8b36a 5125elf32_arm_finish_dynamic_sections (bfd * output_bfd, struct bfd_link_info * info)
252b5132
RH
5126{
5127 bfd * dynobj;
5128 asection * sgot;
5129 asection * sdyn;
5130
5131 dynobj = elf_hash_table (info)->dynobj;
5132
5133 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
229fcec5 5134 BFD_ASSERT (elf32_arm_hash_table (info)->symbian_p || sgot != NULL);
252b5132
RH
5135 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
5136
5137 if (elf_hash_table (info)->dynamic_sections_created)
5138 {
5139 asection *splt;
5140 Elf32_External_Dyn *dyncon, *dynconend;
229fcec5 5141 struct elf32_arm_link_hash_table *htab;
252b5132 5142
229fcec5 5143 htab = elf32_arm_hash_table (info);
252b5132 5144 splt = bfd_get_section_by_name (dynobj, ".plt");
24a1ba0f 5145 BFD_ASSERT (splt != NULL && sdyn != NULL);
252b5132
RH
5146
5147 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 5148 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
9b485d32 5149
252b5132
RH
5150 for (; dyncon < dynconend; dyncon++)
5151 {
5152 Elf_Internal_Dyn dyn;
5153 const char * name;
5154 asection * s;
5155
5156 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
5157
5158 switch (dyn.d_tag)
5159 {
229fcec5
MM
5160 unsigned int type;
5161
252b5132
RH
5162 default:
5163 break;
5164
229fcec5
MM
5165 case DT_HASH:
5166 name = ".hash";
5167 goto get_vma_if_bpabi;
5168 case DT_STRTAB:
5169 name = ".dynstr";
5170 goto get_vma_if_bpabi;
5171 case DT_SYMTAB:
5172 name = ".dynsym";
5173 goto get_vma_if_bpabi;
c0042f5d
MM
5174 case DT_VERSYM:
5175 name = ".gnu.version";
5176 goto get_vma_if_bpabi;
5177 case DT_VERDEF:
5178 name = ".gnu.version_d";
5179 goto get_vma_if_bpabi;
5180 case DT_VERNEED:
5181 name = ".gnu.version_r";
5182 goto get_vma_if_bpabi;
5183
252b5132
RH
5184 case DT_PLTGOT:
5185 name = ".got";
5186 goto get_vma;
5187 case DT_JMPREL:
5188 name = ".rel.plt";
5189 get_vma:
5190 s = bfd_get_section_by_name (output_bfd, name);
5191 BFD_ASSERT (s != NULL);
229fcec5
MM
5192 if (!htab->symbian_p)
5193 dyn.d_un.d_ptr = s->vma;
5194 else
5195 /* In the BPABI, tags in the PT_DYNAMIC section point
5196 at the file offset, not the memory address, for the
5197 convenience of the post linker. */
5198 dyn.d_un.d_ptr = s->filepos;
252b5132
RH
5199 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5200 break;
5201
229fcec5
MM
5202 get_vma_if_bpabi:
5203 if (htab->symbian_p)
5204 goto get_vma;
5205 break;
5206
252b5132
RH
5207 case DT_PLTRELSZ:
5208 s = bfd_get_section_by_name (output_bfd, ".rel.plt");
5209 BFD_ASSERT (s != NULL);
eea6121a 5210 dyn.d_un.d_val = s->size;
252b5132
RH
5211 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5212 break;
229fcec5 5213
252b5132 5214 case DT_RELSZ:
229fcec5
MM
5215 if (!htab->symbian_p)
5216 {
5217 /* My reading of the SVR4 ABI indicates that the
5218 procedure linkage table relocs (DT_JMPREL) should be
5219 included in the overall relocs (DT_REL). This is
5220 what Solaris does. However, UnixWare can not handle
5221 that case. Therefore, we override the DT_RELSZ entry
5222 here to make it not include the JMPREL relocs. Since
5223 the linker script arranges for .rel.plt to follow all
5224 other relocation sections, we don't have to worry
5225 about changing the DT_REL entry. */
5226 s = bfd_get_section_by_name (output_bfd, ".rel.plt");
5227 if (s != NULL)
5228 dyn.d_un.d_val -= s->size;
5229 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5230 break;
5231 }
5232 /* Fall through */
5233
5234 case DT_REL:
5235 case DT_RELA:
5236 case DT_RELASZ:
5237 /* In the BPABI, the DT_REL tag must point at the file
5238 offset, not the VMA, of the first relocation
5239 section. So, we use code similar to that in
5240 elflink.c, but do not check for SHF_ALLOC on the
5241 relcoation section, since relocations sections are
5242 never allocated under the BPABI. The comments above
5243 about Unixware notwithstanding, we include all of the
5244 relocations here. */
5245 if (htab->symbian_p)
5246 {
5247 unsigned int i;
5248 type = ((dyn.d_tag == DT_REL || dyn.d_tag == DT_RELSZ)
5249 ? SHT_REL : SHT_RELA);
5250 dyn.d_un.d_val = 0;
5251 for (i = 1; i < elf_numsections (output_bfd); i++)
5252 {
5253 Elf_Internal_Shdr *hdr
5254 = elf_elfsections (output_bfd)[i];
5255 if (hdr->sh_type == type)
5256 {
5257 if (dyn.d_tag == DT_RELSZ
5258 || dyn.d_tag == DT_RELASZ)
5259 dyn.d_un.d_val += hdr->sh_size;
de52dba4
AM
5260 else if ((ufile_ptr) hdr->sh_offset
5261 <= dyn.d_un.d_val - 1)
229fcec5
MM
5262 dyn.d_un.d_val = hdr->sh_offset;
5263 }
5264 }
5265 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5266 }
252b5132 5267 break;
88f7bcd5
NC
5268
5269 /* Set the bottom bit of DT_INIT/FINI if the
5270 corresponding function is Thumb. */
5271 case DT_INIT:
5272 name = info->init_function;
5273 goto get_sym;
5274 case DT_FINI:
5275 name = info->fini_function;
5276 get_sym:
5277 /* If it wasn't set by elf_bfd_final_link
4cc11e76 5278 then there is nothing to adjust. */
88f7bcd5
NC
5279 if (dyn.d_un.d_val != 0)
5280 {
5281 struct elf_link_hash_entry * eh;
5282
5283 eh = elf_link_hash_lookup (elf_hash_table (info), name,
b34976b6 5284 FALSE, FALSE, TRUE);
88f7bcd5
NC
5285 if (eh != (struct elf_link_hash_entry *) NULL
5286 && ELF_ST_TYPE (eh->type) == STT_ARM_TFUNC)
5287 {
5288 dyn.d_un.d_val |= 1;
b34976b6 5289 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
88f7bcd5
NC
5290 }
5291 }
5292 break;
252b5132
RH
5293 }
5294 }
5295
24a1ba0f 5296 /* Fill in the first entry in the procedure linkage table. */
e5a52504 5297 if (splt->size > 0 && elf32_arm_hash_table (info)->plt_header_size)
f7a74f8c 5298 {
5e681ec4
PB
5299 bfd_vma got_displacement;
5300
5301 /* Calculate the displacement between the PLT slot and &GOT[0]. */
5302 got_displacement = (sgot->output_section->vma
5303 + sgot->output_offset
5304 - splt->output_section->vma
5305 - splt->output_offset
5306 - 16);
5307
f7a74f8c
NC
5308 bfd_put_32 (output_bfd, elf32_arm_plt0_entry[0], splt->contents + 0);
5309 bfd_put_32 (output_bfd, elf32_arm_plt0_entry[1], splt->contents + 4);
5310 bfd_put_32 (output_bfd, elf32_arm_plt0_entry[2], splt->contents + 8);
5311 bfd_put_32 (output_bfd, elf32_arm_plt0_entry[3], splt->contents + 12);
5e681ec4
PB
5312#ifdef FOUR_WORD_PLT
5313 /* The displacement value goes in the otherwise-unused last word of
5314 the second entry. */
5315 bfd_put_32 (output_bfd, got_displacement, splt->contents + 28);
5316#else
5317 bfd_put_32 (output_bfd, got_displacement, splt->contents + 16);
5318#endif
f7a74f8c 5319 }
252b5132
RH
5320
5321 /* UnixWare sets the entsize of .plt to 4, although that doesn't
5322 really seem like the right value. */
5323 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 4;
5324 }
5325
5326 /* Fill in the first three entries in the global offset table. */
229fcec5 5327 if (sgot)
252b5132 5328 {
229fcec5
MM
5329 if (sgot->size > 0)
5330 {
5331 if (sdyn == NULL)
5332 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
5333 else
5334 bfd_put_32 (output_bfd,
5335 sdyn->output_section->vma + sdyn->output_offset,
5336 sgot->contents);
5337 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
5338 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
5339 }
252b5132 5340
229fcec5
MM
5341 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
5342 }
252b5132 5343
b34976b6 5344 return TRUE;
252b5132
RH
5345}
5346
ba96a88f 5347static void
57e8b36a 5348elf32_arm_post_process_headers (bfd * abfd, struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
ba96a88f 5349{
9b485d32 5350 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
e489d0ae 5351 struct elf32_arm_link_hash_table *globals;
ba96a88f
NC
5352
5353 i_ehdrp = elf_elfheader (abfd);
5354
5355 i_ehdrp->e_ident[EI_OSABI] = ARM_ELF_OS_ABI_VERSION;
5356 i_ehdrp->e_ident[EI_ABIVERSION] = ARM_ELF_ABI_VERSION;
e489d0ae 5357
93204d3a
PB
5358 if (link_info)
5359 {
5360 globals = elf32_arm_hash_table (link_info);
5361 if (globals->byteswap_code)
5362 i_ehdrp->e_flags |= EF_ARM_BE8;
5363 }
ba96a88f
NC
5364}
5365
99e4ae17 5366static enum elf_reloc_type_class
57e8b36a 5367elf32_arm_reloc_type_class (const Elf_Internal_Rela *rela)
99e4ae17 5368{
f51e552e 5369 switch ((int) ELF32_R_TYPE (rela->r_info))
99e4ae17
AJ
5370 {
5371 case R_ARM_RELATIVE:
5372 return reloc_class_relative;
5373 case R_ARM_JUMP_SLOT:
5374 return reloc_class_plt;
5375 case R_ARM_COPY:
5376 return reloc_class_copy;
5377 default:
5378 return reloc_class_normal;
5379 }
5380}
5381
e16bb312
NC
5382/* Set the right machine number for an Arm ELF file. */
5383
5384static bfd_boolean
57e8b36a 5385elf32_arm_section_flags (flagword *flags, const Elf_Internal_Shdr *hdr)
e16bb312
NC
5386{
5387 if (hdr->sh_type == SHT_NOTE)
5388 *flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_SAME_CONTENTS;
5389
5390 return TRUE;
5391}
5392
e489d0ae 5393static void
57e8b36a 5394elf32_arm_final_write_processing (bfd *abfd, bfd_boolean linker ATTRIBUTE_UNUSED)
e16bb312 5395{
5a6c6817 5396 bfd_arm_update_notes (abfd, ARM_NOTE_SECTION);
e16bb312
NC
5397}
5398
40a18ebd
NC
5399/* Return TRUE if this is an unwinding table entry. */
5400
5401static bfd_boolean
5402is_arm_elf_unwind_section_name (bfd * abfd ATTRIBUTE_UNUSED, const char * name)
5403{
5404 size_t len1, len2;
5405
5406 len1 = sizeof (ELF_STRING_ARM_unwind) - 1;
5407 len2 = sizeof (ELF_STRING_ARM_unwind_once) - 1;
5408 return (strncmp (name, ELF_STRING_ARM_unwind, len1) == 0
5409 || strncmp (name, ELF_STRING_ARM_unwind_once, len2) == 0);
5410}
5411
5412
5413/* Set the type and flags for an ARM section. We do this by
5414 the section name, which is a hack, but ought to work. */
5415
5416static bfd_boolean
5417elf32_arm_fake_sections (bfd * abfd, Elf_Internal_Shdr * hdr, asection * sec)
5418{
5419 const char * name;
5420
5421 name = bfd_get_section_name (abfd, sec);
5422
5423 if (is_arm_elf_unwind_section_name (abfd, name))
5424 {
5425 hdr->sh_type = SHT_ARM_EXIDX;
5426 hdr->sh_flags |= SHF_LINK_ORDER;
5427 }
5428 return TRUE;
5429}
5430
5431/* Handle an ARM specific section when reading an object file.
5432 This is called when elf.c finds a section with an unknown type. */
5433
5434static bfd_boolean
5435elf32_arm_section_from_shdr (bfd *abfd,
5436 Elf_Internal_Shdr * hdr,
5437 const char *name)
5438{
5439 /* There ought to be a place to keep ELF backend specific flags, but
5440 at the moment there isn't one. We just keep track of the
5441 sections by their name, instead. Fortunately, the ABI gives
5442 names for all the ARM specific sections, so we will probably get
5443 away with this. */
5444 switch (hdr->sh_type)
5445 {
5446 case SHT_ARM_EXIDX:
5447 break;
5448
5449 default:
5450 return FALSE;
5451 }
5452
5453 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name))
5454 return FALSE;
5455
5456 return TRUE;
5457}
e489d0ae
PB
5458
5459/* Called for each symbol. Builds a section map based on mapping symbols.
5460 Does not alter any of the symbols. */
5461
5462static bfd_boolean
5463elf32_arm_output_symbol_hook (struct bfd_link_info *info,
5464 const char *name,
5465 Elf_Internal_Sym *elfsym,
5466 asection *input_sec,
5467 struct elf_link_hash_entry *h ATTRIBUTE_UNUSED)
5468{
5469 int mapcount;
5470 elf32_arm_section_map *map;
5471 struct elf32_arm_link_hash_table *globals;
5472
5473 /* Only do this on final link. */
5474 if (info->relocatable)
5475 return TRUE;
5476
5477 /* Only build a map if we need to byteswap code. */
5478 globals = elf32_arm_hash_table (info);
5479 if (!globals->byteswap_code)
5480 return TRUE;
5481
5482 /* We only want mapping symbols. */
0367ecfb 5483 if (! is_arm_mapping_symbol_name (name))
e489d0ae
PB
5484 return TRUE;
5485
5486 mapcount = ++(elf32_arm_section_data (input_sec)->mapcount);
5487 map = elf32_arm_section_data (input_sec)->map;
5488 /* TODO: This may be inefficient, but we probably don't usually have many
5489 mapping symbols per section. */
5490 map = bfd_realloc (map, mapcount * sizeof (elf32_arm_section_map));
5491 elf32_arm_section_data (input_sec)->map = map;
57e8b36a 5492
e489d0ae
PB
5493 map[mapcount - 1].vma = elfsym->st_value;
5494 map[mapcount - 1].type = name[1];
5495 return TRUE;
5496}
5497
5498
5499/* Allocate target specific section data. */
5500
5501static bfd_boolean
5502elf32_arm_new_section_hook (bfd *abfd, asection *sec)
5503{
5504 struct _arm_elf_section_data *sdata;
5505 bfd_size_type amt = sizeof (*sdata);
5506
5507 sdata = bfd_zalloc (abfd, amt);
5508 if (sdata == NULL)
5509 return FALSE;
5510 sec->used_by_bfd = sdata;
5511
5512 return _bfd_elf_new_section_hook (abfd, sec);
5513}
5514
5515
5516/* Used to order a list of mapping symbols by address. */
5517
5518static int
5519elf32_arm_compare_mapping (const void * a, const void * b)
5520{
5521 return ((const elf32_arm_section_map *) a)->vma
5522 > ((const elf32_arm_section_map *) b)->vma;
5523}
5524
5525
5526/* Do code byteswapping. Return FALSE afterwards so that the section is
5527 written out as normal. */
5528
5529static bfd_boolean
5530elf32_arm_write_section (bfd *output_bfd ATTRIBUTE_UNUSED, asection *sec,
5531 bfd_byte *contents)
5532{
5533 int mapcount;
5534 elf32_arm_section_map *map;
5535 bfd_vma ptr;
5536 bfd_vma end;
5537 bfd_vma offset;
5538 bfd_byte tmp;
5539 int i;
57e8b36a 5540
e489d0ae
PB
5541 mapcount = elf32_arm_section_data (sec)->mapcount;
5542 map = elf32_arm_section_data (sec)->map;
5543
5544 if (mapcount == 0)
5545 return FALSE;
5546
5547 qsort (map, mapcount, sizeof (elf32_arm_section_map),
5548 elf32_arm_compare_mapping);
5549
5550 offset = sec->output_section->vma + sec->output_offset;
5551 ptr = map[0].vma - offset;
5552 for (i = 0; i < mapcount; i++)
5553 {
5554 if (i == mapcount - 1)
eea6121a 5555 end = sec->size;
e489d0ae
PB
5556 else
5557 end = map[i + 1].vma - offset;
57e8b36a 5558
e489d0ae
PB
5559 switch (map[i].type)
5560 {
5561 case 'a':
5562 /* Byte swap code words. */
5563 while (ptr + 3 < end)
5564 {
5565 tmp = contents[ptr];
5566 contents[ptr] = contents[ptr + 3];
5567 contents[ptr + 3] = tmp;
5568 tmp = contents[ptr + 1];
5569 contents[ptr + 1] = contents[ptr + 2];
5570 contents[ptr + 2] = tmp;
5571 ptr += 4;
5572 }
5573 break;
5574
5575 case 't':
5576 /* Byte swap code halfwords. */
5577 while (ptr + 1 < end)
5578 {
5579 tmp = contents[ptr];
5580 contents[ptr] = contents[ptr + 1];
5581 contents[ptr + 1] = tmp;
5582 ptr += 2;
5583 }
5584 break;
5585
5586 case 'd':
5587 /* Leave data alone. */
5588 break;
5589 }
5590 ptr = end;
5591 }
93204d3a 5592 free (map);
e489d0ae
PB
5593 return FALSE;
5594}
5595
b7693d02
DJ
5596/* Display STT_ARM_TFUNC symbols as functions. */
5597
5598static void
5599elf32_arm_symbol_processing (bfd *abfd ATTRIBUTE_UNUSED,
5600 asymbol *asym)
5601{
5602 elf_symbol_type *elfsym = (elf_symbol_type *) asym;
5603
5604 if (ELF_ST_TYPE (elfsym->internal_elf_sym.st_info) == STT_ARM_TFUNC)
5605 elfsym->symbol.flags |= BSF_FUNCTION;
5606}
5607
0beaef2b
PB
5608
5609/* Mangle thumb function symbols as we read them in. */
5610
5611static void
5612elf32_arm_swap_symbol_in (bfd * abfd,
5613 const void *psrc,
5614 const void *pshn,
5615 Elf_Internal_Sym *dst)
5616{
5617 bfd_elf32_swap_symbol_in (abfd, psrc, pshn, dst);
5618
5619 /* New EABI objects mark thumb function symbols by setting the low bit of
5620 the address. Turn these into STT_ARM_TFUNC. */
5621 if (ELF_ST_TYPE (dst->st_info) == STT_FUNC
5622 && (dst->st_value & 1))
5623 {
5624 dst->st_info = ELF_ST_INFO (ELF_ST_BIND (dst->st_info), STT_ARM_TFUNC);
5625 dst->st_value &= ~(bfd_vma) 1;
5626 }
5627}
5628
5629
5630/* Mangle thumb function symbols as we write them out. */
5631
5632static void
5633elf32_arm_swap_symbol_out (bfd *abfd,
5634 const Elf_Internal_Sym *src,
5635 void *cdst,
5636 void *shndx)
5637{
5638 Elf_Internal_Sym newsym;
5639
5640 /* We convert STT_ARM_TFUNC symbols into STT_FUNC with the low bit
5641 of the address set, as per the new EABI. We do this unconditionally
5642 because objcopy does not set the elf header flags until after
5643 it writes out the symbol table. */
5644 if (ELF_ST_TYPE (src->st_info) == STT_ARM_TFUNC)
5645 {
5646 newsym = *src;
5647 newsym.st_info = ELF_ST_INFO (ELF_ST_BIND (src->st_info), STT_FUNC);
5648 newsym.st_value |= 1;
5649
5650 src = &newsym;
5651 }
5652 bfd_elf32_swap_symbol_out (abfd, src, cdst, shndx);
5653}
5654
5655/* We use this to override swap_symbol_in and swap_symbol_out. */
5656const struct elf_size_info elf32_arm_size_info = {
5657 sizeof (Elf32_External_Ehdr),
5658 sizeof (Elf32_External_Phdr),
5659 sizeof (Elf32_External_Shdr),
5660 sizeof (Elf32_External_Rel),
5661 sizeof (Elf32_External_Rela),
5662 sizeof (Elf32_External_Sym),
5663 sizeof (Elf32_External_Dyn),
5664 sizeof (Elf_External_Note),
5665 4,
5666 1,
5667 32, 2,
5668 ELFCLASS32, EV_CURRENT,
5669 bfd_elf32_write_out_phdrs,
5670 bfd_elf32_write_shdrs_and_ehdr,
5671 bfd_elf32_write_relocs,
5672 elf32_arm_swap_symbol_in,
5673 elf32_arm_swap_symbol_out,
5674 bfd_elf32_slurp_reloc_table,
5675 bfd_elf32_slurp_symbol_table,
5676 bfd_elf32_swap_dyn_in,
5677 bfd_elf32_swap_dyn_out,
5678 bfd_elf32_swap_reloc_in,
5679 bfd_elf32_swap_reloc_out,
5680 bfd_elf32_swap_reloca_in,
5681 bfd_elf32_swap_reloca_out
5682};
5683
252b5132
RH
5684#define ELF_ARCH bfd_arch_arm
5685#define ELF_MACHINE_CODE EM_ARM
d0facd1b
NC
5686#ifdef __QNXTARGET__
5687#define ELF_MAXPAGESIZE 0x1000
5688#else
f21f3fe0 5689#define ELF_MAXPAGESIZE 0x8000
d0facd1b 5690#endif
252b5132 5691
99e4ae17
AJ
5692#define bfd_elf32_bfd_copy_private_bfd_data elf32_arm_copy_private_bfd_data
5693#define bfd_elf32_bfd_merge_private_bfd_data elf32_arm_merge_private_bfd_data
252b5132
RH
5694#define bfd_elf32_bfd_set_private_flags elf32_arm_set_private_flags
5695#define bfd_elf32_bfd_print_private_bfd_data elf32_arm_print_private_bfd_data
5696#define bfd_elf32_bfd_link_hash_table_create elf32_arm_link_hash_table_create
dc810e39 5697#define bfd_elf32_bfd_reloc_type_lookup elf32_arm_reloc_type_lookup
252b5132 5698#define bfd_elf32_find_nearest_line elf32_arm_find_nearest_line
e489d0ae 5699#define bfd_elf32_new_section_hook elf32_arm_new_section_hook
3c9458e9 5700#define bfd_elf32_bfd_is_target_special_symbol elf32_arm_is_target_special_symbol
252b5132
RH
5701
5702#define elf_backend_get_symbol_type elf32_arm_get_symbol_type
5703#define elf_backend_gc_mark_hook elf32_arm_gc_mark_hook
5704#define elf_backend_gc_sweep_hook elf32_arm_gc_sweep_hook
5705#define elf_backend_check_relocs elf32_arm_check_relocs
dc810e39 5706#define elf_backend_relocate_section elf32_arm_relocate_section
e489d0ae 5707#define elf_backend_write_section elf32_arm_write_section
252b5132 5708#define elf_backend_adjust_dynamic_symbol elf32_arm_adjust_dynamic_symbol
5e681ec4 5709#define elf_backend_create_dynamic_sections elf32_arm_create_dynamic_sections
252b5132
RH
5710#define elf_backend_finish_dynamic_symbol elf32_arm_finish_dynamic_symbol
5711#define elf_backend_finish_dynamic_sections elf32_arm_finish_dynamic_sections
e489d0ae 5712#define elf_backend_link_output_symbol_hook elf32_arm_output_symbol_hook
252b5132 5713#define elf_backend_size_dynamic_sections elf32_arm_size_dynamic_sections
ba96a88f 5714#define elf_backend_post_process_headers elf32_arm_post_process_headers
99e4ae17 5715#define elf_backend_reloc_type_class elf32_arm_reloc_type_class
c178919b 5716#define elf_backend_object_p elf32_arm_object_p
e16bb312 5717#define elf_backend_section_flags elf32_arm_section_flags
40a18ebd
NC
5718#define elf_backend_fake_sections elf32_arm_fake_sections
5719#define elf_backend_section_from_shdr elf32_arm_section_from_shdr
e16bb312 5720#define elf_backend_final_write_processing elf32_arm_final_write_processing
5e681ec4 5721#define elf_backend_copy_indirect_symbol elf32_arm_copy_indirect_symbol
b7693d02 5722#define elf_backend_symbol_processing elf32_arm_symbol_processing
0beaef2b 5723#define elf_backend_size_info elf32_arm_size_info
252b5132 5724
5e681ec4 5725#define elf_backend_can_refcount 1
252b5132
RH
5726#define elf_backend_can_gc_sections 1
5727#define elf_backend_plt_readonly 1
5728#define elf_backend_want_got_plt 1
5729#define elf_backend_want_plt_sym 0
acf8aed4 5730#if !USE_REL
b491616a
AM
5731#define elf_backend_rela_normal 1
5732#endif
252b5132 5733
04f7c78d 5734#define elf_backend_got_header_size 12
04f7c78d 5735
252b5132 5736#include "elf32-target.h"
7f266840
DJ
5737
5738/* Symbian OS Targets */
5739
5740#undef TARGET_LITTLE_SYM
5741#define TARGET_LITTLE_SYM bfd_elf32_littlearm_symbian_vec
5742#undef TARGET_LITTLE_NAME
5743#define TARGET_LITTLE_NAME "elf32-littlearm-symbian"
5744#undef TARGET_BIG_SYM
5745#define TARGET_BIG_SYM bfd_elf32_bigarm_symbian_vec
5746#undef TARGET_BIG_NAME
5747#define TARGET_BIG_NAME "elf32-bigarm-symbian"
5748
5749/* Like elf32_arm_link_hash_table_create -- but overrides
5750 appropriately for Symbian OS. */
5751static struct bfd_link_hash_table *
5752elf32_arm_symbian_link_hash_table_create (bfd *abfd)
5753{
5754 struct bfd_link_hash_table *ret;
5755
5756 ret = elf32_arm_link_hash_table_create (abfd);
5757 if (ret)
5758 {
5759 struct elf32_arm_link_hash_table *htab
5760 = (struct elf32_arm_link_hash_table *)ret;
5761 /* There is no PLT header for Symbian OS. */
5762 htab->plt_header_size = 0;
5763 /* The PLT entries are each three instructions. */
5764 htab->plt_entry_size = 4 * NUM_ELEM (elf32_arm_symbian_plt_entry);
5765 htab->symbian_p = 1;
5766 }
5767 return ret;
5768}
5769
5770/* In a BPABI executable, the dynamic linking sections do not go in
5771 the loadable read-only segment. The post-linker may wish to refer
5772 to these sections, but they are not part of the final program
5773 image. */
5774static struct bfd_elf_special_section const
5775 elf32_arm_symbian_special_sections[]=
5776{
5777 { ".dynamic", 8, 0, SHT_DYNAMIC, 0 },
5778 { ".dynstr", 7, 0, SHT_STRTAB, 0 },
5779 { ".dynsym", 7, 0, SHT_DYNSYM, 0 },
5780 { ".got", 4, 0, SHT_PROGBITS, 0 },
5781 { ".hash", 5, 0, SHT_HASH, 0 },
5782 { NULL, 0, 0, 0, 0 }
5783};
5784
c3c76620 5785static void
b34af79c
MM
5786elf32_arm_symbian_begin_write_processing (bfd *abfd,
5787 struct bfd_link_info *link_info
5788 ATTRIBUTE_UNUSED)
c3c76620
MM
5789{
5790 /* BPABI objects are never loaded directly by an OS kernel; they are
5791 processed by a postlinker first, into an OS-specific format. If
5792 the D_PAGED bit is set on the file, BFD will align segments on
5793 page boundaries, so that an OS can directly map the file. With
5794 BPABI objects, that just results in wasted space. In addition,
5795 because we clear the D_PAGED bit, map_sections_to_segments will
5796 recognize that the program headers should not be mapped into any
5797 loadable segment. */
5798 abfd->flags &= ~D_PAGED;
5799}
7f266840
DJ
5800
5801static bfd_boolean
b34af79c
MM
5802elf32_arm_symbian_modify_segment_map (bfd *abfd,
5803 struct bfd_link_info *info
5804 ATTRIBUTE_UNUSED)
7f266840
DJ
5805{
5806 struct elf_segment_map *m;
5807 asection *dynsec;
5808
7f266840
DJ
5809 /* BPABI shared libraries and executables should have a PT_DYNAMIC
5810 segment. However, because the .dynamic section is not marked
5811 with SEC_LOAD, the generic ELF code will not create such a
5812 segment. */
5813 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
5814 if (dynsec)
5815 {
5816 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
5817 m->next = elf_tdata (abfd)->segment_map;
5818 elf_tdata (abfd)->segment_map = m;
5819 }
5820
5821 return TRUE;
5822}
5823
5824#undef elf32_bed
5825#define elf32_bed elf32_arm_symbian_bed
5826
5827/* The dynamic sections are not allocated on SymbianOS; the postlinker
5828 will process them and then discard them. */
5829#undef ELF_DYNAMIC_SEC_FLAGS
5830#define ELF_DYNAMIC_SEC_FLAGS \
5831 (SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED)
5832
5833#undef bfd_elf32_bfd_link_hash_table_create
5834#define bfd_elf32_bfd_link_hash_table_create \
5835 elf32_arm_symbian_link_hash_table_create
5836
5837#undef elf_backend_special_sections
5838#define elf_backend_special_sections elf32_arm_symbian_special_sections
5839
c3c76620
MM
5840#undef elf_backend_begin_write_processing
5841#define elf_backend_begin_write_processing \
5842 elf32_arm_symbian_begin_write_processing
5843
7f266840
DJ
5844#undef elf_backend_modify_segment_map
5845#define elf_backend_modify_segment_map elf32_arm_symbian_modify_segment_map
5846
5847/* There is no .got section for BPABI objects, and hence no header. */
5848#undef elf_backend_got_header_size
5849#define elf_backend_got_header_size 0
5850
5851/* Similarly, there is no .got.plt section. */
5852#undef elf_backend_want_got_plt
5853#define elf_backend_want_got_plt 0
5854
5855#include "elf32-target.h"