]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-sh.c
PR threads/10729
[thirdparty/binutils-gdb.git] / bfd / elf32-sh.c
CommitLineData
ef230218 1/* Renesas / SuperH SH specific support for 32-bit ELF
22d606e9 2 Copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005,
4dfe6ac6 3 2006, 2007, 2008, 2009, 2010 Free Software Foundation, Inc.
252b5132
RH
4 Contributed by Ian Lance Taylor, Cygnus Support.
5
571fe01f 6 This file is part of BFD, the Binary File Descriptor library.
252b5132 7
571fe01f
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
cd123cb7 10 the Free Software Foundation; either version 3 of the License, or
571fe01f 11 (at your option) any later version.
252b5132 12
571fe01f
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
252b5132 17
571fe01f
NC
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
cd123cb7
NC
20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
21 MA 02110-1301, USA. */
252b5132 22
252b5132 23#include "sysdep.h"
3db64b00 24#include "bfd.h"
252b5132
RH
25#include "bfdlink.h"
26#include "libbfd.h"
27#include "elf-bfd.h"
55e6e397 28#include "elf-vxworks.h"
252b5132 29#include "elf/sh.h"
8e45593f 30#include "dwarf2.h"
f6f9408f 31#include "libiberty.h"
871ec896 32#include "../opcodes/sh-opc.h"
252b5132
RH
33
34static bfd_reloc_status_type sh_elf_reloc
09fd220b 35 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
252b5132 36static bfd_reloc_status_type sh_elf_ignore_reloc
09fd220b 37 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
b34976b6 38static bfd_boolean sh_elf_relax_delete_bytes
09fd220b 39 (bfd *, asection *, bfd_vma, int);
b34976b6 40static bfd_boolean sh_elf_align_loads
09fd220b 41 (bfd *, asection *, Elf_Internal_Rela *, bfd_byte *, bfd_boolean *);
85fbca6a 42#ifndef SH64_ELF
b34976b6 43static bfd_boolean sh_elf_swap_insns
09fd220b 44 (bfd *, asection *, void *, bfd_byte *, bfd_vma);
85fbca6a 45#endif
3376eaf5 46static int sh_elf_optimized_tls_reloc
09fd220b 47 (struct bfd_link_info *, int, int);
3376eaf5 48static bfd_vma dtpoff_base
09fd220b 49 (struct bfd_link_info *);
267fb3c1 50static bfd_vma tpoff
09fd220b 51 (struct bfd_link_info *, bfd_vma);
37c644f2
AO
52
53/* The name of the dynamic interpreter. This is put in the .interp
54 section. */
55
56#define ELF_DYNAMIC_INTERPRETER "/usr/lib/libc.so.1"
252b5132 57
8e45593f
NC
58/* FDPIC binaries have a default 128K stack. */
59#define DEFAULT_STACK_SIZE 0x20000
60
55e6e397 61#define MINUS_ONE ((bfd_vma) 0 - 1)
8e45593f
NC
62
63/* Decide whether a reference to a symbol can be resolved locally or
64 not. If the symbol is protected, we want the local address, but
65 its function descriptor must be assigned by the dynamic linker. */
66#define SYMBOL_FUNCDESC_LOCAL(INFO, H) \
67 (SYMBOL_REFERENCES_LOCAL (INFO, H) \
68 || ! elf_hash_table (INFO)->dynamic_sections_created)
55e6e397
RS
69\f
70#define SH_PARTIAL32 TRUE
71#define SH_SRC_MASK32 0xffffffff
72#define SH_ELF_RELOC sh_elf_reloc
38b1a46c
NC
73static reloc_howto_type sh_elf_howto_table[] =
74{
55e6e397
RS
75#include "elf32-sh-relocs.h"
76};
fbca6ad9 77
55e6e397
RS
78#define SH_PARTIAL32 FALSE
79#define SH_SRC_MASK32 0
80#define SH_ELF_RELOC bfd_elf_generic_reloc
81static reloc_howto_type sh_vxworks_howto_table[] =
82{
83#include "elf32-sh-relocs.h"
84};
85\f
86/* Return true if OUTPUT_BFD is a VxWorks object. */
fbca6ad9 87
55e6e397 88static bfd_boolean
527a23b8 89vxworks_object_p (bfd *abfd ATTRIBUTE_UNUSED)
55e6e397 90{
527a23b8 91#if !defined INCLUDE_SHMEDIA && !defined SH_TARGET_ALREADY_DEFINED
55e6e397
RS
92 extern const bfd_target bfd_elf32_shlvxworks_vec;
93 extern const bfd_target bfd_elf32_shvxworks_vec;
fbca6ad9 94
55e6e397
RS
95 return (abfd->xvec == &bfd_elf32_shlvxworks_vec
96 || abfd->xvec == &bfd_elf32_shvxworks_vec);
527a23b8
NC
97#else
98 return FALSE;
99#endif
55e6e397 100}
fbca6ad9 101
8e45593f
NC
102/* Return true if OUTPUT_BFD is an FDPIC object. */
103
104static bfd_boolean
105fdpic_object_p (bfd *abfd ATTRIBUTE_UNUSED)
106{
107#if !defined INCLUDE_SHMEDIA && !defined SH_TARGET_ALREADY_DEFINED
108 extern const bfd_target bfd_elf32_shfd_vec;
109 extern const bfd_target bfd_elf32_shbfd_vec;
110
111 return (abfd->xvec == &bfd_elf32_shfd_vec
112 || abfd->xvec == &bfd_elf32_shbfd_vec);
113#else
114 return FALSE;
115#endif
116}
117
55e6e397 118/* Return the howto table for ABFD. */
fbca6ad9 119
55e6e397
RS
120static reloc_howto_type *
121get_howto_table (bfd *abfd)
122{
123 if (vxworks_object_p (abfd))
124 return sh_vxworks_howto_table;
125 return sh_elf_howto_table;
126}
252b5132 127
015551fc 128static bfd_reloc_status_type
09fd220b
KK
129sh_elf_reloc_loop (int r_type ATTRIBUTE_UNUSED, bfd *input_bfd,
130 asection *input_section, bfd_byte *contents,
131 bfd_vma addr, asection *symbol_section,
132 bfd_vma start, bfd_vma end)
015551fc
JR
133{
134 static bfd_vma last_addr;
00fdaf47 135 static asection *last_symbol_section;
015551fc
JR
136 bfd_byte *start_ptr, *ptr, *last_ptr;
137 int diff, cum_diff;
138 bfd_signed_vma x;
139 int insn;
140
141 /* Sanity check the address. */
07515404 142 if (addr > bfd_get_section_limit (input_bfd, input_section))
015551fc
JR
143 return bfd_reloc_outofrange;
144
145 /* We require the start and end relocations to be processed consecutively -
146 although we allow then to be processed forwards or backwards. */
147 if (! last_addr)
148 {
149 last_addr = addr;
150 last_symbol_section = symbol_section;
151 return bfd_reloc_ok;
152 }
153 if (last_addr != addr)
154 abort ();
155 last_addr = 0;
156
157 if (! symbol_section || last_symbol_section != symbol_section || end < start)
158 return bfd_reloc_outofrange;
159
160 /* Get the symbol_section contents. */
161 if (symbol_section != input_section)
162 {
163 if (elf_section_data (symbol_section)->this_hdr.contents != NULL)
164 contents = elf_section_data (symbol_section)->this_hdr.contents;
165 else
166 {
eea6121a
AM
167 if (!bfd_malloc_and_get_section (input_bfd, symbol_section,
168 &contents))
015551fc 169 {
eea6121a
AM
170 if (contents != NULL)
171 free (contents);
015551fc
JR
172 return bfd_reloc_outofrange;
173 }
174 }
175 }
176#define IS_PPI(PTR) ((bfd_get_16 (input_bfd, (PTR)) & 0xfc00) == 0xf800)
177 start_ptr = contents + start;
178 for (cum_diff = -6, ptr = contents + end; cum_diff < 0 && ptr > start_ptr;)
179 {
180 for (last_ptr = ptr, ptr -= 4; ptr >= start_ptr && IS_PPI (ptr);)
181 ptr -= 2;
182 ptr += 2;
61ff1804 183 diff = (last_ptr - ptr) >> 1;
015551fc
JR
184 cum_diff += diff & 1;
185 cum_diff += diff;
186 }
187 /* Calculate the start / end values to load into rs / re minus four -
188 so that will cancel out the four we would otherwise have to add to
189 addr to get the value to subtract in order to get relative addressing. */
190 if (cum_diff >= 0)
191 {
192 start -= 4;
193 end = (ptr + cum_diff * 2) - contents;
194 }
195 else
196 {
197 bfd_vma start0 = start - 4;
198
a0fc8ba1 199 while (start0 && IS_PPI (contents + start0))
015551fc
JR
200 start0 -= 2;
201 start0 = start - 2 - ((start - start0) & 2);
202 start = start0 - cum_diff - 2;
203 end = start0;
204 }
205
6cdc0ccc
AM
206 if (contents != NULL
207 && elf_section_data (symbol_section)->this_hdr.contents != contents)
208 free (contents);
015551fc
JR
209
210 insn = bfd_get_16 (input_bfd, contents + addr);
211
212 x = (insn & 0x200 ? end : start) - addr;
213 if (input_section != symbol_section)
214 x += ((symbol_section->output_section->vma + symbol_section->output_offset)
215 - (input_section->output_section->vma
216 + input_section->output_offset));
217 x >>= 1;
218 if (x < -128 || x > 127)
219 return bfd_reloc_overflow;
220
61ff1804 221 x = (insn & ~0xff) | (x & 0xff);
dc810e39 222 bfd_put_16 (input_bfd, (bfd_vma) x, contents + addr);
015551fc
JR
223
224 return bfd_reloc_ok;
225}
226
227/* This function is used for normal relocs. This used to be like the COFF
252b5132
RH
228 function, and is almost certainly incorrect for other ELF targets. */
229
230static bfd_reloc_status_type
09fd220b
KK
231sh_elf_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol_in,
232 void *data, asection *input_section, bfd *output_bfd,
233 char **error_message ATTRIBUTE_UNUSED)
252b5132
RH
234{
235 unsigned long insn;
236 bfd_vma sym_value;
237 enum elf_sh_reloc_type r_type;
238 bfd_vma addr = reloc_entry->address;
239 bfd_byte *hit_data = addr + (bfd_byte *) data;
240
241 r_type = (enum elf_sh_reloc_type) reloc_entry->howto->type;
242
243 if (output_bfd != NULL)
244 {
245 /* Partial linking--do nothing. */
246 reloc_entry->address += input_section->output_offset;
247 return bfd_reloc_ok;
248 }
249
250 /* Almost all relocs have to do with relaxing. If any work must be
251 done for them, it has been done in sh_relax_section. */
015551fc 252 if (r_type == R_SH_IND12W && (symbol_in->flags & BSF_LOCAL) != 0)
252b5132
RH
253 return bfd_reloc_ok;
254
255 if (symbol_in != NULL
256 && bfd_is_und_section (symbol_in->section))
257 return bfd_reloc_undefined;
258
259 if (bfd_is_com_section (symbol_in->section))
435b1e90
KH
260 sym_value = 0;
261 else
252b5132
RH
262 sym_value = (symbol_in->value +
263 symbol_in->section->output_section->vma +
264 symbol_in->section->output_offset);
265
266 switch (r_type)
267 {
268 case R_SH_DIR32:
269 insn = bfd_get_32 (abfd, hit_data);
270 insn += sym_value + reloc_entry->addend;
dc810e39 271 bfd_put_32 (abfd, (bfd_vma) insn, hit_data);
252b5132
RH
272 break;
273 case R_SH_IND12W:
274 insn = bfd_get_16 (abfd, hit_data);
275 sym_value += reloc_entry->addend;
276 sym_value -= (input_section->output_section->vma
277 + input_section->output_offset
278 + addr
279 + 4);
280 sym_value += (insn & 0xfff) << 1;
281 if (insn & 0x800)
282 sym_value -= 0x1000;
283 insn = (insn & 0xf000) | (sym_value & 0xfff);
dc810e39 284 bfd_put_16 (abfd, (bfd_vma) insn, hit_data);
252b5132
RH
285 if (sym_value < (bfd_vma) -0x1000 || sym_value >= 0x1000)
286 return bfd_reloc_overflow;
287 break;
288 default:
289 abort ();
290 break;
291 }
292
293 return bfd_reloc_ok;
294}
295
296/* This function is used for relocs which are only used for relaxing,
297 which the linker should otherwise ignore. */
298
299static bfd_reloc_status_type
09fd220b
KK
300sh_elf_ignore_reloc (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc_entry,
301 asymbol *symbol ATTRIBUTE_UNUSED,
302 void *data ATTRIBUTE_UNUSED, asection *input_section,
303 bfd *output_bfd,
304 char **error_message ATTRIBUTE_UNUSED)
252b5132
RH
305{
306 if (output_bfd != NULL)
307 reloc_entry->address += input_section->output_offset;
308 return bfd_reloc_ok;
309}
310
311/* This structure is used to map BFD reloc codes to SH ELF relocs. */
312
38b1a46c
NC
313struct elf_reloc_map
314{
252b5132
RH
315 bfd_reloc_code_real_type bfd_reloc_val;
316 unsigned char elf_reloc_val;
317};
318
319/* An array mapping BFD reloc codes to SH ELF relocs. */
320
38b1a46c
NC
321static const struct elf_reloc_map sh_reloc_map[] =
322{
252b5132
RH
323 { BFD_RELOC_NONE, R_SH_NONE },
324 { BFD_RELOC_32, R_SH_DIR32 },
d38eb334
DD
325 { BFD_RELOC_16, R_SH_DIR16 },
326 { BFD_RELOC_8, R_SH_DIR8 },
252b5132
RH
327 { BFD_RELOC_CTOR, R_SH_DIR32 },
328 { BFD_RELOC_32_PCREL, R_SH_REL32 },
329 { BFD_RELOC_SH_PCDISP8BY2, R_SH_DIR8WPN },
330 { BFD_RELOC_SH_PCDISP12BY2, R_SH_IND12W },
331 { BFD_RELOC_SH_PCRELIMM8BY2, R_SH_DIR8WPZ },
332 { BFD_RELOC_SH_PCRELIMM8BY4, R_SH_DIR8WPL },
333 { BFD_RELOC_8_PCREL, R_SH_SWITCH8 },
334 { BFD_RELOC_SH_SWITCH16, R_SH_SWITCH16 },
335 { BFD_RELOC_SH_SWITCH32, R_SH_SWITCH32 },
336 { BFD_RELOC_SH_USES, R_SH_USES },
337 { BFD_RELOC_SH_COUNT, R_SH_COUNT },
338 { BFD_RELOC_SH_ALIGN, R_SH_ALIGN },
339 { BFD_RELOC_SH_CODE, R_SH_CODE },
340 { BFD_RELOC_SH_DATA, R_SH_DATA },
341 { BFD_RELOC_SH_LABEL, R_SH_LABEL },
342 { BFD_RELOC_VTABLE_INHERIT, R_SH_GNU_VTINHERIT },
343 { BFD_RELOC_VTABLE_ENTRY, R_SH_GNU_VTENTRY },
015551fc
JR
344 { BFD_RELOC_SH_LOOP_START, R_SH_LOOP_START },
345 { BFD_RELOC_SH_LOOP_END, R_SH_LOOP_END },
3376eaf5
KK
346 { BFD_RELOC_SH_TLS_GD_32, R_SH_TLS_GD_32 },
347 { BFD_RELOC_SH_TLS_LD_32, R_SH_TLS_LD_32 },
348 { BFD_RELOC_SH_TLS_LDO_32, R_SH_TLS_LDO_32 },
349 { BFD_RELOC_SH_TLS_IE_32, R_SH_TLS_IE_32 },
350 { BFD_RELOC_SH_TLS_LE_32, R_SH_TLS_LE_32 },
351 { BFD_RELOC_SH_TLS_DTPMOD32, R_SH_TLS_DTPMOD32 },
352 { BFD_RELOC_SH_TLS_DTPOFF32, R_SH_TLS_DTPOFF32 },
353 { BFD_RELOC_SH_TLS_TPOFF32, R_SH_TLS_TPOFF32 },
37c644f2
AO
354 { BFD_RELOC_32_GOT_PCREL, R_SH_GOT32 },
355 { BFD_RELOC_32_PLT_PCREL, R_SH_PLT32 },
356 { BFD_RELOC_SH_COPY, R_SH_COPY },
357 { BFD_RELOC_SH_GLOB_DAT, R_SH_GLOB_DAT },
358 { BFD_RELOC_SH_JMP_SLOT, R_SH_JMP_SLOT },
359 { BFD_RELOC_SH_RELATIVE, R_SH_RELATIVE },
360 { BFD_RELOC_32_GOTOFF, R_SH_GOTOFF },
361 { BFD_RELOC_SH_GOTPC, R_SH_GOTPC },
fbca6ad9 362 { BFD_RELOC_SH_GOTPLT32, R_SH_GOTPLT32 },
8e45593f
NC
363 { BFD_RELOC_SH_GOT20, R_SH_GOT20 },
364 { BFD_RELOC_SH_GOTOFF20, R_SH_GOTOFF20 },
365 { BFD_RELOC_SH_GOTFUNCDESC, R_SH_GOTFUNCDESC },
366 { BFD_RELOC_SH_GOTFUNCDESC20, R_SH_GOTFUNCDESC20 },
367 { BFD_RELOC_SH_GOTOFFFUNCDESC, R_SH_GOTOFFFUNCDESC },
368 { BFD_RELOC_SH_GOTOFFFUNCDESC20, R_SH_GOTOFFFUNCDESC20 },
369 { BFD_RELOC_SH_FUNCDESC, R_SH_FUNCDESC },
fbca6ad9
AO
370#ifdef INCLUDE_SHMEDIA
371 { BFD_RELOC_SH_GOT_LOW16, R_SH_GOT_LOW16 },
372 { BFD_RELOC_SH_GOT_MEDLOW16, R_SH_GOT_MEDLOW16 },
373 { BFD_RELOC_SH_GOT_MEDHI16, R_SH_GOT_MEDHI16 },
374 { BFD_RELOC_SH_GOT_HI16, R_SH_GOT_HI16 },
375 { BFD_RELOC_SH_GOTPLT_LOW16, R_SH_GOTPLT_LOW16 },
376 { BFD_RELOC_SH_GOTPLT_MEDLOW16, R_SH_GOTPLT_MEDLOW16 },
377 { BFD_RELOC_SH_GOTPLT_MEDHI16, R_SH_GOTPLT_MEDHI16 },
378 { BFD_RELOC_SH_GOTPLT_HI16, R_SH_GOTPLT_HI16 },
379 { BFD_RELOC_SH_PLT_LOW16, R_SH_PLT_LOW16 },
380 { BFD_RELOC_SH_PLT_MEDLOW16, R_SH_PLT_MEDLOW16 },
381 { BFD_RELOC_SH_PLT_MEDHI16, R_SH_PLT_MEDHI16 },
382 { BFD_RELOC_SH_PLT_HI16, R_SH_PLT_HI16 },
383 { BFD_RELOC_SH_GOTOFF_LOW16, R_SH_GOTOFF_LOW16 },
384 { BFD_RELOC_SH_GOTOFF_MEDLOW16, R_SH_GOTOFF_MEDLOW16 },
385 { BFD_RELOC_SH_GOTOFF_MEDHI16, R_SH_GOTOFF_MEDHI16 },
386 { BFD_RELOC_SH_GOTOFF_HI16, R_SH_GOTOFF_HI16 },
387 { BFD_RELOC_SH_GOTPC_LOW16, R_SH_GOTPC_LOW16 },
388 { BFD_RELOC_SH_GOTPC_MEDLOW16, R_SH_GOTPC_MEDLOW16 },
389 { BFD_RELOC_SH_GOTPC_MEDHI16, R_SH_GOTPC_MEDHI16 },
390 { BFD_RELOC_SH_GOTPC_HI16, R_SH_GOTPC_HI16 },
391 { BFD_RELOC_SH_COPY64, R_SH_COPY64 },
392 { BFD_RELOC_SH_GLOB_DAT64, R_SH_GLOB_DAT64 },
393 { BFD_RELOC_SH_JMP_SLOT64, R_SH_JMP_SLOT64 },
394 { BFD_RELOC_SH_RELATIVE64, R_SH_RELATIVE64 },
395 { BFD_RELOC_SH_GOT10BY4, R_SH_GOT10BY4 },
396 { BFD_RELOC_SH_GOT10BY8, R_SH_GOT10BY8 },
397 { BFD_RELOC_SH_GOTPLT10BY4, R_SH_GOTPLT10BY4 },
398 { BFD_RELOC_SH_GOTPLT10BY8, R_SH_GOTPLT10BY8 },
399 { BFD_RELOC_SH_PT_16, R_SH_PT_16 },
400 { BFD_RELOC_SH_SHMEDIA_CODE, R_SH_SHMEDIA_CODE },
401 { BFD_RELOC_SH_IMMU5, R_SH_DIR5U },
402 { BFD_RELOC_SH_IMMS6, R_SH_DIR6S },
403 { BFD_RELOC_SH_IMMU6, R_SH_DIR6U },
404 { BFD_RELOC_SH_IMMS10, R_SH_DIR10S },
405 { BFD_RELOC_SH_IMMS10BY2, R_SH_DIR10SW },
406 { BFD_RELOC_SH_IMMS10BY4, R_SH_DIR10SL },
407 { BFD_RELOC_SH_IMMS10BY8, R_SH_DIR10SQ },
408 { BFD_RELOC_SH_IMMS16, R_SH_IMMS16 },
409 { BFD_RELOC_SH_IMMU16, R_SH_IMMU16 },
410 { BFD_RELOC_SH_IMM_LOW16, R_SH_IMM_LOW16 },
411 { BFD_RELOC_SH_IMM_LOW16_PCREL, R_SH_IMM_LOW16_PCREL },
412 { BFD_RELOC_SH_IMM_MEDLOW16, R_SH_IMM_MEDLOW16 },
413 { BFD_RELOC_SH_IMM_MEDLOW16_PCREL, R_SH_IMM_MEDLOW16_PCREL },
414 { BFD_RELOC_SH_IMM_MEDHI16, R_SH_IMM_MEDHI16 },
415 { BFD_RELOC_SH_IMM_MEDHI16_PCREL, R_SH_IMM_MEDHI16_PCREL },
416 { BFD_RELOC_SH_IMM_HI16, R_SH_IMM_HI16 },
417 { BFD_RELOC_SH_IMM_HI16_PCREL, R_SH_IMM_HI16_PCREL },
418 { BFD_RELOC_64, R_SH_64 },
419 { BFD_RELOC_64_PCREL, R_SH_64_PCREL },
420#endif /* not INCLUDE_SHMEDIA */
252b5132
RH
421};
422
423/* Given a BFD reloc code, return the howto structure for the
55e6e397 424 corresponding SH ELF reloc. */
252b5132
RH
425
426static reloc_howto_type *
55e6e397 427sh_elf_reloc_type_lookup (bfd *abfd, bfd_reloc_code_real_type code)
252b5132
RH
428{
429 unsigned int i;
430
431 for (i = 0; i < sizeof (sh_reloc_map) / sizeof (struct elf_reloc_map); i++)
432 {
433 if (sh_reloc_map[i].bfd_reloc_val == code)
55e6e397 434 return get_howto_table (abfd) + (int) sh_reloc_map[i].elf_reloc_val;
252b5132
RH
435 }
436
437 return NULL;
438}
439
157090f7
AM
440static reloc_howto_type *
441sh_elf_reloc_name_lookup (bfd *abfd, const char *r_name)
442{
443 unsigned int i;
444
445 if (vxworks_object_p (abfd))
446 {
447 for (i = 0;
448 i < (sizeof (sh_vxworks_howto_table)
449 / sizeof (sh_vxworks_howto_table[0]));
450 i++)
451 if (sh_vxworks_howto_table[i].name != NULL
452 && strcasecmp (sh_vxworks_howto_table[i].name, r_name) == 0)
453 return &sh_vxworks_howto_table[i];
454 }
455 else
456 {
457 for (i = 0;
458 i < (sizeof (sh_elf_howto_table)
459 / sizeof (sh_elf_howto_table[0]));
460 i++)
461 if (sh_elf_howto_table[i].name != NULL
462 && strcasecmp (sh_elf_howto_table[i].name, r_name) == 0)
463 return &sh_elf_howto_table[i];
464 }
465
466 return NULL;
467}
468
252b5132
RH
469/* Given an ELF reloc, fill in the howto field of a relent. */
470
471static void
55e6e397 472sh_elf_info_to_howto (bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst)
252b5132
RH
473{
474 unsigned int r;
475
476 r = ELF32_R_TYPE (dst->r_info);
477
478 BFD_ASSERT (r < (unsigned int) R_SH_max);
479 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC || r > R_SH_LAST_INVALID_RELOC);
06bb75c1 480 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC_2 || r > R_SH_LAST_INVALID_RELOC_2);
fbca6ad9
AO
481 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC_3 || r > R_SH_LAST_INVALID_RELOC_3);
482 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC_4 || r > R_SH_LAST_INVALID_RELOC_4);
3376eaf5 483 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC_5 || r > R_SH_LAST_INVALID_RELOC_5);
8e45593f 484 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC_6 || r > R_SH_LAST_INVALID_RELOC_6);
252b5132 485
55e6e397 486 cache_ptr->howto = get_howto_table (abfd) + r;
252b5132
RH
487}
488\f
489/* This function handles relaxing for SH ELF. See the corresponding
490 function in coff-sh.c for a description of what this does. FIXME:
491 There is a lot of duplication here between this code and the COFF
492 specific code. The format of relocs and symbols is wound deeply
493 into this code, but it would still be better if the duplication
494 could be eliminated somehow. Note in particular that although both
495 functions use symbols like R_SH_CODE, those symbols have different
496 values; in coff-sh.c they come from include/coff/sh.h, whereas here
497 they come from enum elf_sh_reloc_type in include/elf/sh.h. */
498
b34976b6 499static bfd_boolean
09fd220b
KK
500sh_elf_relax_section (bfd *abfd, asection *sec,
501 struct bfd_link_info *link_info, bfd_boolean *again)
252b5132
RH
502{
503 Elf_Internal_Shdr *symtab_hdr;
504 Elf_Internal_Rela *internal_relocs;
b34976b6 505 bfd_boolean have_code;
252b5132
RH
506 Elf_Internal_Rela *irel, *irelend;
507 bfd_byte *contents = NULL;
6cdc0ccc 508 Elf_Internal_Sym *isymbuf = NULL;
252b5132 509
b34976b6 510 *again = FALSE;
252b5132 511
1049f94e 512 if (link_info->relocatable
252b5132
RH
513 || (sec->flags & SEC_RELOC) == 0
514 || sec->reloc_count == 0)
b34976b6 515 return TRUE;
252b5132 516
fbca6ad9
AO
517#ifdef INCLUDE_SHMEDIA
518 if (elf_section_data (sec)->this_hdr.sh_flags
519 & (SHF_SH5_ISA32 | SHF_SH5_ISA32_MIXED))
520 {
b34976b6 521 return TRUE;
fbca6ad9
AO
522 }
523#endif
524
0ffa91dd 525 symtab_hdr = &elf_symtab_hdr (abfd);
252b5132 526
45d6a902 527 internal_relocs = (_bfd_elf_link_read_relocs
09fd220b 528 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
252b5132
RH
529 link_info->keep_memory));
530 if (internal_relocs == NULL)
531 goto error_return;
252b5132 532
b34976b6 533 have_code = FALSE;
252b5132
RH
534
535 irelend = internal_relocs + sec->reloc_count;
536 for (irel = internal_relocs; irel < irelend; irel++)
537 {
538 bfd_vma laddr, paddr, symval;
539 unsigned short insn;
540 Elf_Internal_Rela *irelfn, *irelscan, *irelcount;
541 bfd_signed_vma foff;
542
543 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_CODE)
b34976b6 544 have_code = TRUE;
252b5132
RH
545
546 if (ELF32_R_TYPE (irel->r_info) != (int) R_SH_USES)
547 continue;
548
549 /* Get the section contents. */
550 if (contents == NULL)
551 {
552 if (elf_section_data (sec)->this_hdr.contents != NULL)
553 contents = elf_section_data (sec)->this_hdr.contents;
554 else
555 {
eea6121a 556 if (!bfd_malloc_and_get_section (abfd, sec, &contents))
252b5132
RH
557 goto error_return;
558 }
559 }
560
561 /* The r_addend field of the R_SH_USES reloc will point us to
067653c5
AM
562 the register load. The 4 is because the r_addend field is
563 computed as though it were a jump offset, which are based
564 from 4 bytes after the jump instruction. */
252b5132 565 laddr = irel->r_offset + 4 + irel->r_addend;
eea6121a 566 if (laddr >= sec->size)
252b5132 567 {
d003868e
AM
568 (*_bfd_error_handler) (_("%B: 0x%lx: warning: bad R_SH_USES offset"),
569 abfd,
252b5132
RH
570 (unsigned long) irel->r_offset);
571 continue;
572 }
573 insn = bfd_get_16 (abfd, contents + laddr);
574
575 /* If the instruction is not mov.l NN,rN, we don't know what to
067653c5 576 do. */
252b5132
RH
577 if ((insn & 0xf000) != 0xd000)
578 {
579 ((*_bfd_error_handler)
d003868e
AM
580 (_("%B: 0x%lx: warning: R_SH_USES points to unrecognized insn 0x%x"),
581 abfd, (unsigned long) irel->r_offset, insn));
252b5132
RH
582 continue;
583 }
584
585 /* Get the address from which the register is being loaded. The
99e4ae17
AJ
586 displacement in the mov.l instruction is quadrupled. It is a
587 displacement from four bytes after the movl instruction, but,
588 before adding in the PC address, two least significant bits
589 of the PC are cleared. We assume that the section is aligned
590 on a four byte boundary. */
252b5132
RH
591 paddr = insn & 0xff;
592 paddr *= 4;
dc810e39 593 paddr += (laddr + 4) &~ (bfd_vma) 3;
eea6121a 594 if (paddr >= sec->size)
252b5132
RH
595 {
596 ((*_bfd_error_handler)
d003868e
AM
597 (_("%B: 0x%lx: warning: bad R_SH_USES load offset"),
598 abfd, (unsigned long) irel->r_offset));
252b5132
RH
599 continue;
600 }
601
602 /* Get the reloc for the address from which the register is
067653c5
AM
603 being loaded. This reloc will tell us which function is
604 actually being called. */
252b5132
RH
605 for (irelfn = internal_relocs; irelfn < irelend; irelfn++)
606 if (irelfn->r_offset == paddr
607 && ELF32_R_TYPE (irelfn->r_info) == (int) R_SH_DIR32)
608 break;
609 if (irelfn >= irelend)
610 {
611 ((*_bfd_error_handler)
d003868e
AM
612 (_("%B: 0x%lx: warning: could not find expected reloc"),
613 abfd, (unsigned long) paddr));
252b5132
RH
614 continue;
615 }
616
617 /* Read this BFD's symbols if we haven't done so already. */
6cdc0ccc 618 if (isymbuf == NULL && symtab_hdr->sh_info != 0)
252b5132 619 {
6cdc0ccc
AM
620 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
621 if (isymbuf == NULL)
622 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
623 symtab_hdr->sh_info, 0,
624 NULL, NULL, NULL);
625 if (isymbuf == NULL)
626 goto error_return;
252b5132
RH
627 }
628
629 /* Get the value of the symbol referred to by the reloc. */
630 if (ELF32_R_SYM (irelfn->r_info) < symtab_hdr->sh_info)
631 {
9ad5cbcf 632 /* A local symbol. */
6cdc0ccc 633 Elf_Internal_Sym *isym;
252b5132 634
6cdc0ccc
AM
635 isym = isymbuf + ELF32_R_SYM (irelfn->r_info);
636 if (isym->st_shndx
d426c6b0 637 != (unsigned int) _bfd_elf_section_from_bfd_section (abfd, sec))
252b5132
RH
638 {
639 ((*_bfd_error_handler)
d003868e
AM
640 (_("%B: 0x%lx: warning: symbol in unexpected section"),
641 abfd, (unsigned long) paddr));
252b5132
RH
642 continue;
643 }
644
6cdc0ccc 645 symval = (isym->st_value
252b5132
RH
646 + sec->output_section->vma
647 + sec->output_offset);
648 }
649 else
650 {
651 unsigned long indx;
652 struct elf_link_hash_entry *h;
653
654 indx = ELF32_R_SYM (irelfn->r_info) - symtab_hdr->sh_info;
655 h = elf_sym_hashes (abfd)[indx];
656 BFD_ASSERT (h != NULL);
657 if (h->root.type != bfd_link_hash_defined
658 && h->root.type != bfd_link_hash_defweak)
659 {
660 /* This appears to be a reference to an undefined
067653c5
AM
661 symbol. Just ignore it--it will be caught by the
662 regular reloc processing. */
252b5132
RH
663 continue;
664 }
665
666 symval = (h->root.u.def.value
667 + h->root.u.def.section->output_section->vma
668 + h->root.u.def.section->output_offset);
669 }
670
55e6e397
RS
671 if (get_howto_table (abfd)[R_SH_DIR32].partial_inplace)
672 symval += bfd_get_32 (abfd, contents + paddr);
673 else
674 symval += irelfn->r_addend;
252b5132
RH
675
676 /* See if this function call can be shortened. */
677 foff = (symval
678 - (irel->r_offset
679 + sec->output_section->vma
680 + sec->output_offset
681 + 4));
f725025b
DD
682 /* A branch to an address beyond ours might be increased by an
683 .align that doesn't move when bytes behind us are deleted.
684 So, we add some slop in this calculation to allow for
685 that. */
686 if (foff < -0x1000 || foff >= 0x1000 - 8)
252b5132
RH
687 {
688 /* After all that work, we can't shorten this function call. */
689 continue;
690 }
691
692 /* Shorten the function call. */
693
694 /* For simplicity of coding, we are going to modify the section
695 contents, the section relocs, and the BFD symbol table. We
696 must tell the rest of the code not to free up this
697 information. It would be possible to instead create a table
698 of changes which have to be made, as is done in coff-mips.c;
699 that would be more work, but would require less memory when
700 the linker is run. */
701
702 elf_section_data (sec)->relocs = internal_relocs;
252b5132 703 elf_section_data (sec)->this_hdr.contents = contents;
6cdc0ccc 704 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132
RH
705
706 /* Replace the jsr with a bsr. */
707
708 /* Change the R_SH_USES reloc into an R_SH_IND12W reloc, and
067653c5 709 replace the jsr with a bsr. */
252b5132 710 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irelfn->r_info), R_SH_IND12W);
bdfaef52
JR
711 /* We used to test (ELF32_R_SYM (irelfn->r_info) < symtab_hdr->sh_info)
712 here, but that only checks if the symbol is an external symbol,
713 not if the symbol is in a different section. Besides, we need
714 a consistent meaning for the relocation, so we just assume here that
715 the value of the symbol is not available. */
0e71e495
BE
716
717 /* We can't fully resolve this yet, because the external
718 symbol value may be changed by future relaxing. We let
719 the final link phase handle it. */
720 bfd_put_16 (abfd, (bfd_vma) 0xb000, contents + irel->r_offset);
721
bdfaef52 722 irel->r_addend = -4;
252b5132 723
f725025b
DD
724 /* When we calculated the symbol "value" we had an offset in the
725 DIR32's word in memory (we read and add it above). However,
726 the jsr we create does NOT have this offset encoded, so we
727 have to add it to the addend to preserve it. */
728 irel->r_addend += bfd_get_32 (abfd, contents + paddr);
729
252b5132 730 /* See if there is another R_SH_USES reloc referring to the same
067653c5 731 register load. */
252b5132
RH
732 for (irelscan = internal_relocs; irelscan < irelend; irelscan++)
733 if (ELF32_R_TYPE (irelscan->r_info) == (int) R_SH_USES
734 && laddr == irelscan->r_offset + 4 + irelscan->r_addend)
735 break;
736 if (irelscan < irelend)
737 {
738 /* Some other function call depends upon this register load,
739 and we have not yet converted that function call.
740 Indeed, we may never be able to convert it. There is
741 nothing else we can do at this point. */
742 continue;
743 }
744
745 /* Look for a R_SH_COUNT reloc on the location where the
067653c5
AM
746 function address is stored. Do this before deleting any
747 bytes, to avoid confusion about the address. */
252b5132
RH
748 for (irelcount = internal_relocs; irelcount < irelend; irelcount++)
749 if (irelcount->r_offset == paddr
750 && ELF32_R_TYPE (irelcount->r_info) == (int) R_SH_COUNT)
751 break;
752
753 /* Delete the register load. */
754 if (! sh_elf_relax_delete_bytes (abfd, sec, laddr, 2))
755 goto error_return;
756
757 /* That will change things, so, just in case it permits some
067653c5
AM
758 other function call to come within range, we should relax
759 again. Note that this is not required, and it may be slow. */
b34976b6 760 *again = TRUE;
252b5132
RH
761
762 /* Now check whether we got a COUNT reloc. */
763 if (irelcount >= irelend)
764 {
765 ((*_bfd_error_handler)
d003868e
AM
766 (_("%B: 0x%lx: warning: could not find expected COUNT reloc"),
767 abfd, (unsigned long) paddr));
252b5132
RH
768 continue;
769 }
770
771 /* The number of uses is stored in the r_addend field. We've
067653c5 772 just deleted one. */
252b5132
RH
773 if (irelcount->r_addend == 0)
774 {
d003868e
AM
775 ((*_bfd_error_handler) (_("%B: 0x%lx: warning: bad count"),
776 abfd,
252b5132
RH
777 (unsigned long) paddr));
778 continue;
779 }
780
781 --irelcount->r_addend;
782
783 /* If there are no more uses, we can delete the address. Reload
067653c5
AM
784 the address from irelfn, in case it was changed by the
785 previous call to sh_elf_relax_delete_bytes. */
252b5132
RH
786 if (irelcount->r_addend == 0)
787 {
788 if (! sh_elf_relax_delete_bytes (abfd, sec, irelfn->r_offset, 4))
789 goto error_return;
790 }
791
792 /* We've done all we can with that function call. */
793 }
794
795 /* Look for load and store instructions that we can align on four
796 byte boundaries. */
bdfaef52
JR
797 if ((elf_elfheader (abfd)->e_flags & EF_SH_MACH_MASK) != EF_SH4
798 && have_code)
252b5132 799 {
b34976b6 800 bfd_boolean swapped;
252b5132
RH
801
802 /* Get the section contents. */
803 if (contents == NULL)
804 {
805 if (elf_section_data (sec)->this_hdr.contents != NULL)
806 contents = elf_section_data (sec)->this_hdr.contents;
807 else
808 {
eea6121a 809 if (!bfd_malloc_and_get_section (abfd, sec, &contents))
252b5132
RH
810 goto error_return;
811 }
812 }
813
814 if (! sh_elf_align_loads (abfd, sec, internal_relocs, contents,
815 &swapped))
816 goto error_return;
817
818 if (swapped)
819 {
820 elf_section_data (sec)->relocs = internal_relocs;
252b5132 821 elf_section_data (sec)->this_hdr.contents = contents;
6cdc0ccc 822 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132
RH
823 }
824 }
825
6cdc0ccc
AM
826 if (isymbuf != NULL
827 && symtab_hdr->contents != (unsigned char *) isymbuf)
252b5132
RH
828 {
829 if (! link_info->keep_memory)
6cdc0ccc 830 free (isymbuf);
252b5132
RH
831 else
832 {
6cdc0ccc
AM
833 /* Cache the symbols for elf_link_input_bfd. */
834 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 835 }
9ad5cbcf
AM
836 }
837
6cdc0ccc
AM
838 if (contents != NULL
839 && elf_section_data (sec)->this_hdr.contents != contents)
252b5132
RH
840 {
841 if (! link_info->keep_memory)
6cdc0ccc
AM
842 free (contents);
843 else
252b5132 844 {
6cdc0ccc
AM
845 /* Cache the section contents for elf_link_input_bfd. */
846 elf_section_data (sec)->this_hdr.contents = contents;
252b5132 847 }
252b5132
RH
848 }
849
6cdc0ccc
AM
850 if (internal_relocs != NULL
851 && elf_section_data (sec)->relocs != internal_relocs)
852 free (internal_relocs);
853
b34976b6 854 return TRUE;
252b5132
RH
855
856 error_return:
6cdc0ccc
AM
857 if (isymbuf != NULL
858 && symtab_hdr->contents != (unsigned char *) isymbuf)
859 free (isymbuf);
860 if (contents != NULL
861 && elf_section_data (sec)->this_hdr.contents != contents)
862 free (contents);
863 if (internal_relocs != NULL
864 && elf_section_data (sec)->relocs != internal_relocs)
865 free (internal_relocs);
9ad5cbcf 866
b34976b6 867 return FALSE;
252b5132
RH
868}
869
870/* Delete some bytes from a section while relaxing. FIXME: There is a
871 lot of duplication between this function and sh_relax_delete_bytes
872 in coff-sh.c. */
873
b34976b6 874static bfd_boolean
09fd220b
KK
875sh_elf_relax_delete_bytes (bfd *abfd, asection *sec, bfd_vma addr,
876 int count)
252b5132
RH
877{
878 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 879 unsigned int sec_shndx;
252b5132
RH
880 bfd_byte *contents;
881 Elf_Internal_Rela *irel, *irelend;
882 Elf_Internal_Rela *irelalign;
883 bfd_vma toaddr;
6cdc0ccc 884 Elf_Internal_Sym *isymbuf, *isym, *isymend;
9ad5cbcf
AM
885 struct elf_link_hash_entry **sym_hashes;
886 struct elf_link_hash_entry **end_hashes;
887 unsigned int symcount;
252b5132
RH
888 asection *o;
889
0ffa91dd 890 symtab_hdr = &elf_symtab_hdr (abfd);
6cdc0ccc 891 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
9ad5cbcf
AM
892
893 sec_shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132
RH
894
895 contents = elf_section_data (sec)->this_hdr.contents;
896
897 /* The deletion must stop at the next ALIGN reloc for an aligment
898 power larger than the number of bytes we are deleting. */
899
900 irelalign = NULL;
eea6121a 901 toaddr = sec->size;
252b5132
RH
902
903 irel = elf_section_data (sec)->relocs;
904 irelend = irel + sec->reloc_count;
905 for (; irel < irelend; irel++)
906 {
907 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_ALIGN
908 && irel->r_offset > addr
909 && count < (1 << irel->r_addend))
910 {
911 irelalign = irel;
912 toaddr = irel->r_offset;
913 break;
914 }
915 }
916
917 /* Actually delete the bytes. */
dc810e39
AM
918 memmove (contents + addr, contents + addr + count,
919 (size_t) (toaddr - addr - count));
252b5132 920 if (irelalign == NULL)
eea6121a 921 sec->size -= count;
252b5132
RH
922 else
923 {
924 int i;
925
926#define NOP_OPCODE (0x0009)
927
928 BFD_ASSERT ((count & 1) == 0);
929 for (i = 0; i < count; i += 2)
dc810e39 930 bfd_put_16 (abfd, (bfd_vma) NOP_OPCODE, contents + toaddr - count + i);
252b5132
RH
931 }
932
933 /* Adjust all the relocs. */
934 for (irel = elf_section_data (sec)->relocs; irel < irelend; irel++)
935 {
936 bfd_vma nraddr, stop;
937 bfd_vma start = 0;
938 int insn = 0;
252b5132
RH
939 int off, adjust, oinsn;
940 bfd_signed_vma voff = 0;
b34976b6 941 bfd_boolean overflow;
252b5132
RH
942
943 /* Get the new reloc address. */
944 nraddr = irel->r_offset;
945 if ((irel->r_offset > addr
946 && irel->r_offset < toaddr)
947 || (ELF32_R_TYPE (irel->r_info) == (int) R_SH_ALIGN
948 && irel->r_offset == toaddr))
949 nraddr -= count;
950
951 /* See if this reloc was for the bytes we have deleted, in which
952 case we no longer care about it. Don't delete relocs which
953 represent addresses, though. */
954 if (irel->r_offset >= addr
955 && irel->r_offset < addr + count
956 && ELF32_R_TYPE (irel->r_info) != (int) R_SH_ALIGN
957 && ELF32_R_TYPE (irel->r_info) != (int) R_SH_CODE
958 && ELF32_R_TYPE (irel->r_info) != (int) R_SH_DATA
959 && ELF32_R_TYPE (irel->r_info) != (int) R_SH_LABEL)
960 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
961 (int) R_SH_NONE);
962
963 /* If this is a PC relative reloc, see if the range it covers
067653c5 964 includes the bytes we have deleted. */
252b5132
RH
965 switch ((enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info))
966 {
967 default:
968 break;
969
970 case R_SH_DIR8WPN:
971 case R_SH_IND12W:
972 case R_SH_DIR8WPZ:
973 case R_SH_DIR8WPL:
974 start = irel->r_offset;
975 insn = bfd_get_16 (abfd, contents + nraddr);
976 break;
977 }
978
979 switch ((enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info))
980 {
981 default:
982 start = stop = addr;
983 break;
984
985 case R_SH_DIR32:
986 /* If this reloc is against a symbol defined in this
067653c5
AM
987 section, and the symbol will not be adjusted below, we
988 must check the addend to see it will put the value in
989 range to be adjusted, and hence must be changed. */
252b5132
RH
990 if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
991 {
6cdc0ccc
AM
992 isym = isymbuf + ELF32_R_SYM (irel->r_info);
993 if (isym->st_shndx == sec_shndx
994 && (isym->st_value <= addr
995 || isym->st_value >= toaddr))
252b5132
RH
996 {
997 bfd_vma val;
998
55e6e397
RS
999 if (get_howto_table (abfd)[R_SH_DIR32].partial_inplace)
1000 {
1001 val = bfd_get_32 (abfd, contents + nraddr);
1002 val += isym->st_value;
1003 if (val > addr && val < toaddr)
1004 bfd_put_32 (abfd, val - count, contents + nraddr);
1005 }
1006 else
1007 {
1008 val = isym->st_value + irel->r_addend;
1009 if (val > addr && val < toaddr)
1010 irel->r_addend -= count;
1011 }
252b5132
RH
1012 }
1013 }
1014 start = stop = addr;
1015 break;
1016
1017 case R_SH_DIR8WPN:
1018 off = insn & 0xff;
1019 if (off & 0x80)
1020 off -= 0x100;
1021 stop = (bfd_vma) ((bfd_signed_vma) start + 4 + off * 2);
1022 break;
1023
1024 case R_SH_IND12W:
bdfaef52
JR
1025 off = insn & 0xfff;
1026 if (! off)
1027 {
1028 /* This has been made by previous relaxation. Since the
1029 relocation will be against an external symbol, the
1030 final relocation will just do the right thing. */
1031 start = stop = addr;
1032 }
252b5132
RH
1033 else
1034 {
252b5132
RH
1035 if (off & 0x800)
1036 off -= 0x1000;
1037 stop = (bfd_vma) ((bfd_signed_vma) start + 4 + off * 2);
bdfaef52
JR
1038
1039 /* The addend will be against the section symbol, thus
1040 for adjusting the addend, the relevant start is the
1041 start of the section.
4cc11e76 1042 N.B. If we want to abandon in-place changes here and
bdfaef52
JR
1043 test directly using symbol + addend, we have to take into
1044 account that the addend has already been adjusted by -4. */
1045 if (stop > addr && stop < toaddr)
1046 irel->r_addend -= count;
252b5132
RH
1047 }
1048 break;
1049
1050 case R_SH_DIR8WPZ:
1051 off = insn & 0xff;
1052 stop = start + 4 + off * 2;
1053 break;
1054
1055 case R_SH_DIR8WPL:
1056 off = insn & 0xff;
435b1e90 1057 stop = (start & ~(bfd_vma) 3) + 4 + off * 4;
252b5132
RH
1058 break;
1059
1060 case R_SH_SWITCH8:
1061 case R_SH_SWITCH16:
1062 case R_SH_SWITCH32:
1063 /* These relocs types represent
1064 .word L2-L1
06e1ba78 1065 The r_addend field holds the difference between the reloc
252b5132
RH
1066 address and L1. That is the start of the reloc, and
1067 adding in the contents gives us the top. We must adjust
06e1ba78
JR
1068 both the r_offset field and the section contents.
1069 N.B. in gas / coff bfd, the elf bfd r_addend is called r_offset,
1070 and the elf bfd r_offset is called r_vaddr. */
252b5132 1071
06e1ba78
JR
1072 stop = irel->r_offset;
1073 start = (bfd_vma) ((bfd_signed_vma) stop - (long) irel->r_addend);
252b5132
RH
1074
1075 if (start > addr
1076 && start < toaddr
1077 && (stop <= addr || stop >= toaddr))
1078 irel->r_addend += count;
1079 else if (stop > addr
1080 && stop < toaddr
1081 && (start <= addr || start >= toaddr))
1082 irel->r_addend -= count;
1083
252b5132
RH
1084 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_SWITCH16)
1085 voff = bfd_get_signed_16 (abfd, contents + nraddr);
1086 else if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_SWITCH8)
1087 voff = bfd_get_8 (abfd, contents + nraddr);
1088 else
1089 voff = bfd_get_signed_32 (abfd, contents + nraddr);
1090 stop = (bfd_vma) ((bfd_signed_vma) start + voff);
1091
1092 break;
1093
1094 case R_SH_USES:
1095 start = irel->r_offset;
1096 stop = (bfd_vma) ((bfd_signed_vma) start
1097 + (long) irel->r_addend
1098 + 4);
1099 break;
1100 }
1101
1102 if (start > addr
1103 && start < toaddr
1104 && (stop <= addr || stop >= toaddr))
1105 adjust = count;
1106 else if (stop > addr
1107 && stop < toaddr
1108 && (start <= addr || start >= toaddr))
1109 adjust = - count;
1110 else
1111 adjust = 0;
1112
1113 if (adjust != 0)
1114 {
1115 oinsn = insn;
b34976b6 1116 overflow = FALSE;
252b5132
RH
1117 switch ((enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info))
1118 {
1119 default:
1120 abort ();
1121 break;
1122
1123 case R_SH_DIR8WPN:
1124 case R_SH_DIR8WPZ:
1125 insn += adjust / 2;
1126 if ((oinsn & 0xff00) != (insn & 0xff00))
b34976b6 1127 overflow = TRUE;
dc810e39 1128 bfd_put_16 (abfd, (bfd_vma) insn, contents + nraddr);
252b5132
RH
1129 break;
1130
1131 case R_SH_IND12W:
1132 insn += adjust / 2;
1133 if ((oinsn & 0xf000) != (insn & 0xf000))
b34976b6 1134 overflow = TRUE;
dc810e39 1135 bfd_put_16 (abfd, (bfd_vma) insn, contents + nraddr);
252b5132
RH
1136 break;
1137
1138 case R_SH_DIR8WPL:
1139 BFD_ASSERT (adjust == count || count >= 4);
1140 if (count >= 4)
1141 insn += adjust / 4;
1142 else
1143 {
1144 if ((irel->r_offset & 3) == 0)
1145 ++insn;
1146 }
1147 if ((oinsn & 0xff00) != (insn & 0xff00))
b34976b6 1148 overflow = TRUE;
dc810e39 1149 bfd_put_16 (abfd, (bfd_vma) insn, contents + nraddr);
252b5132
RH
1150 break;
1151
851cde10
JR
1152 case R_SH_SWITCH8:
1153 voff += adjust;
1154 if (voff < 0 || voff >= 0xff)
b34976b6 1155 overflow = TRUE;
851cde10
JR
1156 bfd_put_8 (abfd, voff, contents + nraddr);
1157 break;
1158
252b5132
RH
1159 case R_SH_SWITCH16:
1160 voff += adjust;
1161 if (voff < - 0x8000 || voff >= 0x8000)
b34976b6 1162 overflow = TRUE;
dc810e39 1163 bfd_put_signed_16 (abfd, (bfd_vma) voff, contents + nraddr);
252b5132
RH
1164 break;
1165
1166 case R_SH_SWITCH32:
1167 voff += adjust;
dc810e39 1168 bfd_put_signed_32 (abfd, (bfd_vma) voff, contents + nraddr);
252b5132
RH
1169 break;
1170
1171 case R_SH_USES:
1172 irel->r_addend += adjust;
1173 break;
1174 }
1175
1176 if (overflow)
1177 {
1178 ((*_bfd_error_handler)
d003868e
AM
1179 (_("%B: 0x%lx: fatal: reloc overflow while relaxing"),
1180 abfd, (unsigned long) irel->r_offset));
252b5132 1181 bfd_set_error (bfd_error_bad_value);
b34976b6 1182 return FALSE;
252b5132
RH
1183 }
1184 }
1185
1186 irel->r_offset = nraddr;
1187 }
1188
1189 /* Look through all the other sections. If there contain any IMM32
1190 relocs against internal symbols which we are not going to adjust
1191 below, we may need to adjust the addends. */
1192 for (o = abfd->sections; o != NULL; o = o->next)
1193 {
1194 Elf_Internal_Rela *internal_relocs;
1195 Elf_Internal_Rela *irelscan, *irelscanend;
1196 bfd_byte *ocontents;
1197
1198 if (o == sec
1199 || (o->flags & SEC_RELOC) == 0
1200 || o->reloc_count == 0)
1201 continue;
1202
1203 /* We always cache the relocs. Perhaps, if info->keep_memory is
b34976b6 1204 FALSE, we should free them, if we are permitted to, when we
067653c5 1205 leave sh_coff_relax_section. */
45d6a902 1206 internal_relocs = (_bfd_elf_link_read_relocs
09fd220b 1207 (abfd, o, NULL, (Elf_Internal_Rela *) NULL, TRUE));
252b5132 1208 if (internal_relocs == NULL)
b34976b6 1209 return FALSE;
252b5132
RH
1210
1211 ocontents = NULL;
1212 irelscanend = internal_relocs + o->reloc_count;
1213 for (irelscan = internal_relocs; irelscan < irelscanend; irelscan++)
1214 {
084aa3aa
JR
1215 /* Dwarf line numbers use R_SH_SWITCH32 relocs. */
1216 if (ELF32_R_TYPE (irelscan->r_info) == (int) R_SH_SWITCH32)
1217 {
1218 bfd_vma start, stop;
1219 bfd_signed_vma voff;
1220
1221 if (ocontents == NULL)
1222 {
1223 if (elf_section_data (o)->this_hdr.contents != NULL)
1224 ocontents = elf_section_data (o)->this_hdr.contents;
1225 else
1226 {
1227 /* We always cache the section contents.
b34976b6 1228 Perhaps, if info->keep_memory is FALSE, we
067653c5
AM
1229 should free them, if we are permitted to,
1230 when we leave sh_coff_relax_section. */
eea6121a
AM
1231 if (!bfd_malloc_and_get_section (abfd, o, &ocontents))
1232 {
1233 if (ocontents != NULL)
1234 free (ocontents);
1235 return FALSE;
1236 }
1237
084aa3aa
JR
1238 elf_section_data (o)->this_hdr.contents = ocontents;
1239 }
1240 }
1241
1242 stop = irelscan->r_offset;
1243 start
1244 = (bfd_vma) ((bfd_signed_vma) stop - (long) irelscan->r_addend);
1245
1246 /* STOP is in a different section, so it won't change. */
1247 if (start > addr && start < toaddr)
1248 irelscan->r_addend += count;
1249
1250 voff = bfd_get_signed_32 (abfd, ocontents + irelscan->r_offset);
1251 stop = (bfd_vma) ((bfd_signed_vma) start + voff);
1252
1253 if (start > addr
1254 && start < toaddr
1255 && (stop <= addr || stop >= toaddr))
dc810e39 1256 bfd_put_signed_32 (abfd, (bfd_vma) voff + count,
084aa3aa
JR
1257 ocontents + irelscan->r_offset);
1258 else if (stop > addr
1259 && stop < toaddr
1260 && (start <= addr || start >= toaddr))
dc810e39 1261 bfd_put_signed_32 (abfd, (bfd_vma) voff - count,
084aa3aa
JR
1262 ocontents + irelscan->r_offset);
1263 }
1264
252b5132
RH
1265 if (ELF32_R_TYPE (irelscan->r_info) != (int) R_SH_DIR32)
1266 continue;
1267
1268 if (ELF32_R_SYM (irelscan->r_info) >= symtab_hdr->sh_info)
1269 continue;
1270
252b5132 1271
6cdc0ccc
AM
1272 isym = isymbuf + ELF32_R_SYM (irelscan->r_info);
1273 if (isym->st_shndx == sec_shndx
1274 && (isym->st_value <= addr
1275 || isym->st_value >= toaddr))
252b5132
RH
1276 {
1277 bfd_vma val;
1278
1279 if (ocontents == NULL)
1280 {
1281 if (elf_section_data (o)->this_hdr.contents != NULL)
1282 ocontents = elf_section_data (o)->this_hdr.contents;
1283 else
1284 {
1285 /* We always cache the section contents.
b34976b6 1286 Perhaps, if info->keep_memory is FALSE, we
067653c5
AM
1287 should free them, if we are permitted to,
1288 when we leave sh_coff_relax_section. */
eea6121a
AM
1289 if (!bfd_malloc_and_get_section (abfd, o, &ocontents))
1290 {
1291 if (ocontents != NULL)
1292 free (ocontents);
1293 return FALSE;
1294 }
1295
252b5132
RH
1296 elf_section_data (o)->this_hdr.contents = ocontents;
1297 }
1298 }
1299
1300 val = bfd_get_32 (abfd, ocontents + irelscan->r_offset);
6cdc0ccc 1301 val += isym->st_value;
252b5132
RH
1302 if (val > addr && val < toaddr)
1303 bfd_put_32 (abfd, val - count,
1304 ocontents + irelscan->r_offset);
1305 }
1306 }
1307 }
1308
1309 /* Adjust the local symbols defined in this section. */
6cdc0ccc
AM
1310 isymend = isymbuf + symtab_hdr->sh_info;
1311 for (isym = isymbuf; isym < isymend; isym++)
252b5132 1312 {
6cdc0ccc
AM
1313 if (isym->st_shndx == sec_shndx
1314 && isym->st_value > addr
1315 && isym->st_value < toaddr)
1316 isym->st_value -= count;
252b5132
RH
1317 }
1318
1319 /* Now adjust the global symbols defined in this section. */
9ad5cbcf
AM
1320 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
1321 - symtab_hdr->sh_info);
1322 sym_hashes = elf_sym_hashes (abfd);
1323 end_hashes = sym_hashes + symcount;
1324 for (; sym_hashes < end_hashes; sym_hashes++)
252b5132 1325 {
9ad5cbcf
AM
1326 struct elf_link_hash_entry *sym_hash = *sym_hashes;
1327 if ((sym_hash->root.type == bfd_link_hash_defined
1328 || sym_hash->root.type == bfd_link_hash_defweak)
1329 && sym_hash->root.u.def.section == sec
1330 && sym_hash->root.u.def.value > addr
1331 && sym_hash->root.u.def.value < toaddr)
252b5132 1332 {
9ad5cbcf 1333 sym_hash->root.u.def.value -= count;
252b5132
RH
1334 }
1335 }
1336
1337 /* See if we can move the ALIGN reloc forward. We have adjusted
1338 r_offset for it already. */
1339 if (irelalign != NULL)
1340 {
1341 bfd_vma alignto, alignaddr;
1342
1343 alignto = BFD_ALIGN (toaddr, 1 << irelalign->r_addend);
1344 alignaddr = BFD_ALIGN (irelalign->r_offset,
1345 1 << irelalign->r_addend);
1346 if (alignto != alignaddr)
1347 {
1348 /* Tail recursion. */
1349 return sh_elf_relax_delete_bytes (abfd, sec, alignaddr,
dc810e39 1350 (int) (alignto - alignaddr));
252b5132
RH
1351 }
1352 }
1353
b34976b6 1354 return TRUE;
252b5132
RH
1355}
1356
1357/* Look for loads and stores which we can align to four byte
1358 boundaries. This is like sh_align_loads in coff-sh.c. */
1359
b34976b6 1360static bfd_boolean
09fd220b
KK
1361sh_elf_align_loads (bfd *abfd ATTRIBUTE_UNUSED, asection *sec,
1362 Elf_Internal_Rela *internal_relocs,
1363 bfd_byte *contents ATTRIBUTE_UNUSED,
1364 bfd_boolean *pswapped)
252b5132
RH
1365{
1366 Elf_Internal_Rela *irel, *irelend;
1367 bfd_vma *labels = NULL;
1368 bfd_vma *label, *label_end;
dc810e39 1369 bfd_size_type amt;
252b5132 1370
b34976b6 1371 *pswapped = FALSE;
252b5132
RH
1372
1373 irelend = internal_relocs + sec->reloc_count;
1374
1375 /* Get all the addresses with labels on them. */
dc810e39
AM
1376 amt = sec->reloc_count;
1377 amt *= sizeof (bfd_vma);
1378 labels = (bfd_vma *) bfd_malloc (amt);
252b5132
RH
1379 if (labels == NULL)
1380 goto error_return;
1381 label_end = labels;
1382 for (irel = internal_relocs; irel < irelend; irel++)
1383 {
1384 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_LABEL)
1385 {
1386 *label_end = irel->r_offset;
1387 ++label_end;
1388 }
1389 }
1390
1391 /* Note that the assembler currently always outputs relocs in
1392 address order. If that ever changes, this code will need to sort
1393 the label values and the relocs. */
1394
1395 label = labels;
1396
1397 for (irel = internal_relocs; irel < irelend; irel++)
1398 {
1399 bfd_vma start, stop;
1400
1401 if (ELF32_R_TYPE (irel->r_info) != (int) R_SH_CODE)
1402 continue;
1403
1404 start = irel->r_offset;
1405
1406 for (irel++; irel < irelend; irel++)
1407 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_DATA)
1408 break;
1409 if (irel < irelend)
1410 stop = irel->r_offset;
1411 else
eea6121a 1412 stop = sec->size;
252b5132
RH
1413
1414 if (! _bfd_sh_align_load_span (abfd, sec, contents, sh_elf_swap_insns,
09fd220b 1415 internal_relocs, &label,
252b5132
RH
1416 label_end, start, stop, pswapped))
1417 goto error_return;
1418 }
1419
1420 free (labels);
1421
b34976b6 1422 return TRUE;
252b5132
RH
1423
1424 error_return:
1425 if (labels != NULL)
1426 free (labels);
b34976b6 1427 return FALSE;
252b5132
RH
1428}
1429
85fbca6a 1430#ifndef SH64_ELF
252b5132
RH
1431/* Swap two SH instructions. This is like sh_swap_insns in coff-sh.c. */
1432
b34976b6 1433static bfd_boolean
09fd220b
KK
1434sh_elf_swap_insns (bfd *abfd, asection *sec, void *relocs,
1435 bfd_byte *contents, bfd_vma addr)
252b5132
RH
1436{
1437 Elf_Internal_Rela *internal_relocs = (Elf_Internal_Rela *) relocs;
1438 unsigned short i1, i2;
1439 Elf_Internal_Rela *irel, *irelend;
1440
1441 /* Swap the instructions themselves. */
1442 i1 = bfd_get_16 (abfd, contents + addr);
1443 i2 = bfd_get_16 (abfd, contents + addr + 2);
dc810e39
AM
1444 bfd_put_16 (abfd, (bfd_vma) i2, contents + addr);
1445 bfd_put_16 (abfd, (bfd_vma) i1, contents + addr + 2);
252b5132
RH
1446
1447 /* Adjust all reloc addresses. */
1448 irelend = internal_relocs + sec->reloc_count;
1449 for (irel = internal_relocs; irel < irelend; irel++)
1450 {
1451 enum elf_sh_reloc_type type;
1452 int add;
1453
1454 /* There are a few special types of relocs that we don't want to
067653c5
AM
1455 adjust. These relocs do not apply to the instruction itself,
1456 but are only associated with the address. */
252b5132
RH
1457 type = (enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info);
1458 if (type == R_SH_ALIGN
1459 || type == R_SH_CODE
1460 || type == R_SH_DATA
1461 || type == R_SH_LABEL)
1462 continue;
1463
1464 /* If an R_SH_USES reloc points to one of the addresses being
067653c5
AM
1465 swapped, we must adjust it. It would be incorrect to do this
1466 for a jump, though, since we want to execute both
1467 instructions after the jump. (We have avoided swapping
1468 around a label, so the jump will not wind up executing an
1469 instruction it shouldn't). */
252b5132
RH
1470 if (type == R_SH_USES)
1471 {
1472 bfd_vma off;
1473
1474 off = irel->r_offset + 4 + irel->r_addend;
1475 if (off == addr)
1476 irel->r_offset += 2;
1477 else if (off == addr + 2)
1478 irel->r_offset -= 2;
1479 }
1480
1481 if (irel->r_offset == addr)
1482 {
1483 irel->r_offset += 2;
1484 add = -2;
1485 }
1486 else if (irel->r_offset == addr + 2)
1487 {
1488 irel->r_offset -= 2;
1489 add = 2;
1490 }
1491 else
1492 add = 0;
1493
1494 if (add != 0)
1495 {
1496 bfd_byte *loc;
1497 unsigned short insn, oinsn;
b34976b6 1498 bfd_boolean overflow;
252b5132
RH
1499
1500 loc = contents + irel->r_offset;
b34976b6 1501 overflow = FALSE;
252b5132
RH
1502 switch (type)
1503 {
1504 default:
1505 break;
1506
1507 case R_SH_DIR8WPN:
1508 case R_SH_DIR8WPZ:
1509 insn = bfd_get_16 (abfd, loc);
1510 oinsn = insn;
1511 insn += add / 2;
1512 if ((oinsn & 0xff00) != (insn & 0xff00))
b34976b6 1513 overflow = TRUE;
dc810e39 1514 bfd_put_16 (abfd, (bfd_vma) insn, loc);
252b5132
RH
1515 break;
1516
1517 case R_SH_IND12W:
1518 insn = bfd_get_16 (abfd, loc);
1519 oinsn = insn;
1520 insn += add / 2;
1521 if ((oinsn & 0xf000) != (insn & 0xf000))
b34976b6 1522 overflow = TRUE;
dc810e39 1523 bfd_put_16 (abfd, (bfd_vma) insn, loc);
252b5132
RH
1524 break;
1525
1526 case R_SH_DIR8WPL:
1527 /* This reloc ignores the least significant 3 bits of
067653c5
AM
1528 the program counter before adding in the offset.
1529 This means that if ADDR is at an even address, the
1530 swap will not affect the offset. If ADDR is an at an
1531 odd address, then the instruction will be crossing a
1532 four byte boundary, and must be adjusted. */
252b5132
RH
1533 if ((addr & 3) != 0)
1534 {
1535 insn = bfd_get_16 (abfd, loc);
1536 oinsn = insn;
1537 insn += add / 2;
1538 if ((oinsn & 0xff00) != (insn & 0xff00))
b34976b6 1539 overflow = TRUE;
dc810e39 1540 bfd_put_16 (abfd, (bfd_vma) insn, loc);
252b5132
RH
1541 }
1542
1543 break;
1544 }
1545
1546 if (overflow)
1547 {
1548 ((*_bfd_error_handler)
d003868e
AM
1549 (_("%B: 0x%lx: fatal: reloc overflow while relaxing"),
1550 abfd, (unsigned long) irel->r_offset));
252b5132 1551 bfd_set_error (bfd_error_bad_value);
b34976b6 1552 return FALSE;
252b5132
RH
1553 }
1554 }
1555 }
1556
b34976b6 1557 return TRUE;
252b5132 1558}
85fbca6a 1559#endif /* defined SH64_ELF */
252b5132 1560\f
55e6e397
RS
1561/* Describes one of the various PLT styles. */
1562
1563struct elf_sh_plt_info
1564{
1565 /* The template for the first PLT entry, or NULL if there is no special
1566 first entry. */
1567 const bfd_byte *plt0_entry;
1568
1569 /* The size of PLT0_ENTRY in bytes, or 0 if PLT0_ENTRY is NULL. */
1570 bfd_vma plt0_entry_size;
1571
1572 /* Index I is the offset into PLT0_ENTRY of a pointer to
1573 _GLOBAL_OFFSET_TABLE_ + I * 4. The value is MINUS_ONE
1574 if there is no such pointer. */
1575 bfd_vma plt0_got_fields[3];
1576
1577 /* The template for a symbol's PLT entry. */
1578 const bfd_byte *symbol_entry;
1579
1580 /* The size of SYMBOL_ENTRY in bytes. */
1581 bfd_vma symbol_entry_size;
1582
1583 /* Byte offsets of fields in SYMBOL_ENTRY. Not all fields are used
1584 on all targets. The comments by each member indicate the value
1585 that the field must hold. */
1586 struct {
1587 bfd_vma got_entry; /* the address of the symbol's .got.plt entry */
1588 bfd_vma plt; /* .plt (or a branch to .plt on VxWorks) */
1589 bfd_vma reloc_offset; /* the offset of the symbol's JMP_SLOT reloc */
8e45593f
NC
1590 bfd_boolean got20; /* TRUE if got_entry points to a movi20
1591 instruction (instead of a constant pool
1592 entry). */
55e6e397
RS
1593 } symbol_fields;
1594
1595 /* The offset of the resolver stub from the start of SYMBOL_ENTRY. */
1596 bfd_vma symbol_resolve_offset;
8e45593f
NC
1597
1598 /* A different PLT layout which can be used for the first
1599 MAX_SHORT_PLT entries. It must share the same plt0. NULL in
1600 other cases. */
1601 const struct elf_sh_plt_info *short_plt;
55e6e397
RS
1602};
1603
fbca6ad9
AO
1604#ifdef INCLUDE_SHMEDIA
1605
1606/* The size in bytes of an entry in the procedure linkage table. */
1607
55e6e397 1608#define ELF_PLT_ENTRY_SIZE 64
fbca6ad9
AO
1609
1610/* First entry in an absolute procedure linkage table look like this. */
1611
55e6e397 1612static const bfd_byte elf_sh_plt0_entry_be[ELF_PLT_ENTRY_SIZE] =
fbca6ad9
AO
1613{
1614 0xcc, 0x00, 0x01, 0x10, /* movi .got.plt >> 16, r17 */
1615 0xc8, 0x00, 0x01, 0x10, /* shori .got.plt & 65535, r17 */
1616 0x89, 0x10, 0x09, 0x90, /* ld.l r17, 8, r25 */
c8614e8e 1617 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
fbca6ad9
AO
1618 0x89, 0x10, 0x05, 0x10, /* ld.l r17, 4, r17 */
1619 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
1620 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1621 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1622 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1623 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1624 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1625 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1626 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1627 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1628 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1629 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1630};
1631
55e6e397 1632static const bfd_byte elf_sh_plt0_entry_le[ELF_PLT_ENTRY_SIZE] =
fbca6ad9
AO
1633{
1634 0x10, 0x01, 0x00, 0xcc, /* movi .got.plt >> 16, r17 */
1635 0x10, 0x01, 0x00, 0xc8, /* shori .got.plt & 65535, r17 */
1636 0x90, 0x09, 0x10, 0x89, /* ld.l r17, 8, r25 */
c8614e8e 1637 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
fbca6ad9
AO
1638 0x10, 0x05, 0x10, 0x89, /* ld.l r17, 4, r17 */
1639 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
1640 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1641 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1642 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1643 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1644 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1645 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1646 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1647 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1648 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1649 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1650};
1651
1652/* Sebsequent entries in an absolute procedure linkage table look like
1653 this. */
1654
55e6e397 1655static const bfd_byte elf_sh_plt_entry_be[ELF_PLT_ENTRY_SIZE] =
fbca6ad9
AO
1656{
1657 0xcc, 0x00, 0x01, 0x90, /* movi nameN-in-GOT >> 16, r25 */
1658 0xc8, 0x00, 0x01, 0x90, /* shori nameN-in-GOT & 65535, r25 */
1659 0x89, 0x90, 0x01, 0x90, /* ld.l r25, 0, r25 */
1660 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
1661 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
1662 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1663 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1664 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1665 0xcc, 0x00, 0x01, 0x90, /* movi .PLT0 >> 16, r25 */
1666 0xc8, 0x00, 0x01, 0x90, /* shori .PLT0 & 65535, r25 */
1667 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
1668 0xcc, 0x00, 0x01, 0x50, /* movi reloc-offset >> 16, r21 */
1669 0xc8, 0x00, 0x01, 0x50, /* shori reloc-offset & 65535, r21 */
1670 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
1671 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1672 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1673};
1674
55e6e397 1675static const bfd_byte elf_sh_plt_entry_le[ELF_PLT_ENTRY_SIZE] =
fbca6ad9
AO
1676{
1677 0x90, 0x01, 0x00, 0xcc, /* movi nameN-in-GOT >> 16, r25 */
1678 0x90, 0x01, 0x00, 0xc8, /* shori nameN-in-GOT & 65535, r25 */
1679 0x90, 0x01, 0x90, 0x89, /* ld.l r25, 0, r25 */
1680 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
1681 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
1682 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1683 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1684 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1685 0x90, 0x01, 0x00, 0xcc, /* movi .PLT0 >> 16, r25 */
1686 0x90, 0x01, 0x00, 0xc8, /* shori .PLT0 & 65535, r25 */
1687 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
1688 0x50, 0x01, 0x00, 0xcc, /* movi reloc-offset >> 16, r21 */
1689 0x50, 0x01, 0x00, 0xc8, /* shori reloc-offset & 65535, r21 */
1690 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
1691 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1692 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1693};
1694
1695/* Entries in a PIC procedure linkage table look like this. */
1696
55e6e397 1697static const bfd_byte elf_sh_pic_plt_entry_be[ELF_PLT_ENTRY_SIZE] =
fbca6ad9
AO
1698{
1699 0xcc, 0x00, 0x01, 0x90, /* movi nameN@GOT >> 16, r25 */
1700 0xc8, 0x00, 0x01, 0x90, /* shori nameN@GOT & 65535, r25 */
1701 0x40, 0xc2, 0x65, 0x90, /* ldx.l r12, r25, r25 */
1702 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
1703 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
1704 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1705 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1706 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1707 0xce, 0x00, 0x01, 0x10, /* movi -GOT_BIAS, r17 */
0a4ef3f4 1708 0x00, 0xc8, 0x45, 0x10, /* add.l r12, r17, r17 */
fbca6ad9
AO
1709 0x89, 0x10, 0x09, 0x90, /* ld.l r17, 8, r25 */
1710 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
1711 0x89, 0x10, 0x05, 0x10, /* ld.l r17, 4, r17 */
1712 0xcc, 0x00, 0x01, 0x50, /* movi reloc-offset >> 16, r21 */
1713 0xc8, 0x00, 0x01, 0x50, /* shori reloc-offset & 65535, r21 */
1714 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
1715};
1716
55e6e397 1717static const bfd_byte elf_sh_pic_plt_entry_le[ELF_PLT_ENTRY_SIZE] =
fbca6ad9
AO
1718{
1719 0x90, 0x01, 0x00, 0xcc, /* movi nameN@GOT >> 16, r25 */
1720 0x90, 0x01, 0x00, 0xc8, /* shori nameN@GOT & 65535, r25 */
1721 0x90, 0x65, 0xc2, 0x40, /* ldx.l r12, r25, r25 */
1722 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
1723 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
1724 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1725 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1726 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1727 0x10, 0x01, 0x00, 0xce, /* movi -GOT_BIAS, r17 */
0a4ef3f4 1728 0x10, 0x45, 0xc8, 0x00, /* add.l r12, r17, r17 */
fbca6ad9
AO
1729 0x90, 0x09, 0x10, 0x89, /* ld.l r17, 8, r25 */
1730 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
1731 0x10, 0x05, 0x10, 0x89, /* ld.l r17, 4, r17 */
1732 0x50, 0x01, 0x00, 0xcc, /* movi reloc-offset >> 16, r21 */
1733 0x50, 0x01, 0x00, 0xc8, /* shori reloc-offset & 65535, r21 */
1734 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
1735};
1736
55e6e397
RS
1737static const struct elf_sh_plt_info elf_sh_plts[2][2] = {
1738 {
1739 {
1740 /* Big-endian non-PIC. */
1741 elf_sh_plt0_entry_be,
1742 ELF_PLT_ENTRY_SIZE,
1743 { 0, MINUS_ONE, MINUS_ONE },
1744 elf_sh_plt_entry_be,
1745 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1746 { 0, 32, 48, FALSE },
1747 33, /* includes ISA encoding */
1748 NULL
55e6e397
RS
1749 },
1750 {
1751 /* Little-endian non-PIC. */
1752 elf_sh_plt0_entry_le,
1753 ELF_PLT_ENTRY_SIZE,
1754 { 0, MINUS_ONE, MINUS_ONE },
1755 elf_sh_plt_entry_le,
1756 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1757 { 0, 32, 48, FALSE },
1758 33, /* includes ISA encoding */
1759 NULL
55e6e397
RS
1760 },
1761 },
1762 {
1763 {
1764 /* Big-endian PIC. */
1765 elf_sh_plt0_entry_be,
1766 ELF_PLT_ENTRY_SIZE,
1767 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1768 elf_sh_pic_plt_entry_be,
1769 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1770 { 0, MINUS_ONE, 52, FALSE },
1771 33, /* includes ISA encoding */
1772 NULL
55e6e397
RS
1773 },
1774 {
1775 /* Little-endian PIC. */
1776 elf_sh_plt0_entry_le,
1777 ELF_PLT_ENTRY_SIZE,
1778 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1779 elf_sh_pic_plt_entry_le,
1780 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1781 { 0, MINUS_ONE, 52, FALSE },
1782 33, /* includes ISA encoding */
1783 NULL
55e6e397
RS
1784 },
1785 }
1786};
fbca6ad9
AO
1787
1788/* Return offset of the linker in PLT0 entry. */
1789#define elf_sh_plt0_gotplt_offset(info) 0
1790
55e6e397
RS
1791/* Install a 32-bit PLT field starting at ADDR, which occurs in OUTPUT_BFD.
1792 VALUE is the field's value and CODE_P is true if VALUE refers to code,
1793 not data.
fbca6ad9 1794
55e6e397 1795 On SH64, each 32-bit field is loaded by a movi/shori pair. */
fbca6ad9
AO
1796
1797inline static void
55e6e397
RS
1798install_plt_field (bfd *output_bfd, bfd_boolean code_p,
1799 unsigned long value, bfd_byte *addr)
fbca6ad9 1800{
55e6e397 1801 value |= code_p;
fbca6ad9
AO
1802 bfd_put_32 (output_bfd,
1803 bfd_get_32 (output_bfd, addr)
1804 | ((value >> 6) & 0x3fffc00),
1805 addr);
1806 bfd_put_32 (output_bfd,
1807 bfd_get_32 (output_bfd, addr + 4)
1808 | ((value << 10) & 0x3fffc00),
1809 addr + 4);
1810}
1811
55e6e397
RS
1812/* Return the type of PLT associated with ABFD. PIC_P is true if
1813 the object is position-independent. */
1814
1815static const struct elf_sh_plt_info *
1816get_plt_info (bfd *abfd ATTRIBUTE_UNUSED, bfd_boolean pic_p)
1817{
1818 return &elf_sh_plts[pic_p][!bfd_big_endian (abfd)];
1819}
fbca6ad9 1820#else
37c644f2 1821/* The size in bytes of an entry in the procedure linkage table. */
252b5132 1822
55e6e397 1823#define ELF_PLT_ENTRY_SIZE 28
37c644f2
AO
1824
1825/* First entry in an absolute procedure linkage table look like this. */
1826
6c426cf3 1827/* Note - this code has been "optimised" not to use r2. r2 is used by
4cc11e76 1828 GCC to return the address of large structures, so it should not be
6c426cf3
NC
1829 corrupted here. This does mean however, that this PLT does not conform
1830 to the SH PIC ABI. That spec says that r0 contains the type of the PLT
1831 and r2 contains the GOT id. This version stores the GOT id in r0 and
1832 ignores the type. Loaders can easily detect this difference however,
1833 since the type will always be 0 or 8, and the GOT ids will always be
1834 greater than or equal to 12. */
55e6e397 1835static const bfd_byte elf_sh_plt0_entry_be[ELF_PLT_ENTRY_SIZE] =
6c426cf3
NC
1836{
1837 0xd0, 0x05, /* mov.l 2f,r0 */
1838 0x60, 0x02, /* mov.l @r0,r0 */
1839 0x2f, 0x06, /* mov.l r0,@-r15 */
1840 0xd0, 0x03, /* mov.l 1f,r0 */
1841 0x60, 0x02, /* mov.l @r0,r0 */
1842 0x40, 0x2b, /* jmp @r0 */
1843 0x60, 0xf6, /* mov.l @r15+,r0 */
1844 0x00, 0x09, /* nop */
1845 0x00, 0x09, /* nop */
1846 0x00, 0x09, /* nop */
1847 0, 0, 0, 0, /* 1: replaced with address of .got.plt + 8. */
1848 0, 0, 0, 0, /* 2: replaced with address of .got.plt + 4. */
1849};
1850
55e6e397 1851static const bfd_byte elf_sh_plt0_entry_le[ELF_PLT_ENTRY_SIZE] =
6c426cf3
NC
1852{
1853 0x05, 0xd0, /* mov.l 2f,r0 */
1854 0x02, 0x60, /* mov.l @r0,r0 */
1855 0x06, 0x2f, /* mov.l r0,@-r15 */
1856 0x03, 0xd0, /* mov.l 1f,r0 */
1857 0x02, 0x60, /* mov.l @r0,r0 */
1858 0x2b, 0x40, /* jmp @r0 */
1859 0xf6, 0x60, /* mov.l @r15+,r0 */
1860 0x09, 0x00, /* nop */
1861 0x09, 0x00, /* nop */
1862 0x09, 0x00, /* nop */
1863 0, 0, 0, 0, /* 1: replaced with address of .got.plt + 8. */
1864 0, 0, 0, 0, /* 2: replaced with address of .got.plt + 4. */
1865};
1866
1867/* Sebsequent entries in an absolute procedure linkage table look like
1868 this. */
1869
55e6e397 1870static const bfd_byte elf_sh_plt_entry_be[ELF_PLT_ENTRY_SIZE] =
6c426cf3
NC
1871{
1872 0xd0, 0x04, /* mov.l 1f,r0 */
55e6e397 1873 0x60, 0x02, /* mov.l @(r0,r12),r0 */
6c426cf3
NC
1874 0xd1, 0x02, /* mov.l 0f,r1 */
1875 0x40, 0x2b, /* jmp @r0 */
1876 0x60, 0x13, /* mov r1,r0 */
1877 0xd1, 0x03, /* mov.l 2f,r1 */
1878 0x40, 0x2b, /* jmp @r0 */
1879 0x00, 0x09, /* nop */
1880 0, 0, 0, 0, /* 0: replaced with address of .PLT0. */
1881 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
1882 0, 0, 0, 0, /* 2: replaced with offset into relocation table. */
1883};
1884
55e6e397 1885static const bfd_byte elf_sh_plt_entry_le[ELF_PLT_ENTRY_SIZE] =
6c426cf3
NC
1886{
1887 0x04, 0xd0, /* mov.l 1f,r0 */
1888 0x02, 0x60, /* mov.l @r0,r0 */
1889 0x02, 0xd1, /* mov.l 0f,r1 */
1890 0x2b, 0x40, /* jmp @r0 */
1891 0x13, 0x60, /* mov r1,r0 */
1892 0x03, 0xd1, /* mov.l 2f,r1 */
1893 0x2b, 0x40, /* jmp @r0 */
1894 0x09, 0x00, /* nop */
1895 0, 0, 0, 0, /* 0: replaced with address of .PLT0. */
1896 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
1897 0, 0, 0, 0, /* 2: replaced with offset into relocation table. */
1898};
1899
1900/* Entries in a PIC procedure linkage table look like this. */
1901
55e6e397 1902static const bfd_byte elf_sh_pic_plt_entry_be[ELF_PLT_ENTRY_SIZE] =
6c426cf3
NC
1903{
1904 0xd0, 0x04, /* mov.l 1f,r0 */
1905 0x00, 0xce, /* mov.l @(r0,r12),r0 */
1906 0x40, 0x2b, /* jmp @r0 */
1907 0x00, 0x09, /* nop */
1908 0x50, 0xc2, /* mov.l @(8,r12),r0 */
1909 0xd1, 0x03, /* mov.l 2f,r1 */
1910 0x40, 0x2b, /* jmp @r0 */
1911 0x50, 0xc1, /* mov.l @(4,r12),r0 */
1912 0x00, 0x09, /* nop */
1913 0x00, 0x09, /* nop */
1914 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
1915 0, 0, 0, 0 /* 2: replaced with offset into relocation table. */
1916};
1917
55e6e397 1918static const bfd_byte elf_sh_pic_plt_entry_le[ELF_PLT_ENTRY_SIZE] =
6c426cf3
NC
1919{
1920 0x04, 0xd0, /* mov.l 1f,r0 */
1921 0xce, 0x00, /* mov.l @(r0,r12),r0 */
1922 0x2b, 0x40, /* jmp @r0 */
1923 0x09, 0x00, /* nop */
1924 0xc2, 0x50, /* mov.l @(8,r12),r0 */
1925 0x03, 0xd1, /* mov.l 2f,r1 */
1926 0x2b, 0x40, /* jmp @r0 */
1927 0xc1, 0x50, /* mov.l @(4,r12),r0 */
1928 0x09, 0x00, /* nop */
1929 0x09, 0x00, /* nop */
1930 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
1931 0, 0, 0, 0 /* 2: replaced with offset into relocation table. */
1932};
1933
55e6e397
RS
1934static const struct elf_sh_plt_info elf_sh_plts[2][2] = {
1935 {
1936 {
1937 /* Big-endian non-PIC. */
1938 elf_sh_plt0_entry_be,
1939 ELF_PLT_ENTRY_SIZE,
1940 { MINUS_ONE, 24, 20 },
1941 elf_sh_plt_entry_be,
1942 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1943 { 20, 16, 24, FALSE },
1944 8,
1945 NULL
55e6e397
RS
1946 },
1947 {
1948 /* Little-endian non-PIC. */
1949 elf_sh_plt0_entry_le,
1950 ELF_PLT_ENTRY_SIZE,
1951 { MINUS_ONE, 24, 20 },
1952 elf_sh_plt_entry_le,
1953 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1954 { 20, 16, 24, FALSE },
1955 8,
1956 NULL
55e6e397
RS
1957 },
1958 },
1959 {
1960 {
1961 /* Big-endian PIC. */
1962 elf_sh_plt0_entry_be,
1963 ELF_PLT_ENTRY_SIZE,
1964 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1965 elf_sh_pic_plt_entry_be,
1966 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1967 { 20, MINUS_ONE, 24, FALSE },
1968 8,
1969 NULL
55e6e397
RS
1970 },
1971 {
1972 /* Little-endian PIC. */
1973 elf_sh_plt0_entry_le,
1974 ELF_PLT_ENTRY_SIZE,
1975 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1976 elf_sh_pic_plt_entry_le,
1977 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1978 { 20, MINUS_ONE, 24, FALSE },
1979 8,
1980 NULL
55e6e397
RS
1981 },
1982 }
1983};
252b5132 1984
55e6e397
RS
1985#define VXWORKS_PLT_HEADER_SIZE 12
1986#define VXWORKS_PLT_ENTRY_SIZE 24
252b5132 1987
55e6e397
RS
1988static const bfd_byte vxworks_sh_plt0_entry_be[VXWORKS_PLT_HEADER_SIZE] =
1989{
1990 0xd1, 0x01, /* mov.l @(8,pc),r1 */
1991 0x61, 0x12, /* mov.l @r1,r1 */
1992 0x41, 0x2b, /* jmp @r1 */
1993 0x00, 0x09, /* nop */
1994 0, 0, 0, 0 /* 0: replaced with _GLOBAL_OFFSET_TABLE+8. */
1995};
252b5132 1996
55e6e397
RS
1997static const bfd_byte vxworks_sh_plt0_entry_le[VXWORKS_PLT_HEADER_SIZE] =
1998{
1999 0x01, 0xd1, /* mov.l @(8,pc),r1 */
2000 0x12, 0x61, /* mov.l @r1,r1 */
2001 0x2b, 0x41, /* jmp @r1 */
2002 0x09, 0x00, /* nop */
2003 0, 0, 0, 0 /* 0: replaced with _GLOBAL_OFFSET_TABLE+8. */
2004};
2005
2006static const bfd_byte vxworks_sh_plt_entry_be[VXWORKS_PLT_ENTRY_SIZE] =
2007{
2008 0xd0, 0x01, /* mov.l @(8,pc),r0 */
2009 0x60, 0x02, /* mov.l @r0,r0 */
2010 0x40, 0x2b, /* jmp @r0 */
2011 0x00, 0x09, /* nop */
2012 0, 0, 0, 0, /* 0: replaced with address of this symbol in .got. */
2013 0xd0, 0x01, /* mov.l @(8,pc),r0 */
2014 0xa0, 0x00, /* bra PLT (We need to fix the offset.) */
2015 0x00, 0x09, /* nop */
2016 0x00, 0x09, /* nop */
2017 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2018};
2019
2020static const bfd_byte vxworks_sh_plt_entry_le[VXWORKS_PLT_ENTRY_SIZE] =
2021{
2022 0x01, 0xd0, /* mov.l @(8,pc),r0 */
2023 0x02, 0x60, /* mov.l @r0,r0 */
2024 0x2b, 0x40, /* jmp @r0 */
2025 0x09, 0x00, /* nop */
2026 0, 0, 0, 0, /* 0: replaced with address of this symbol in .got. */
2027 0x01, 0xd0, /* mov.l @(8,pc),r0 */
2028 0x00, 0xa0, /* bra PLT (We need to fix the offset.) */
2029 0x09, 0x00, /* nop */
2030 0x09, 0x00, /* nop */
2031 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2032};
2033
2034static const bfd_byte vxworks_sh_pic_plt_entry_be[VXWORKS_PLT_ENTRY_SIZE] =
2035{
2036 0xd0, 0x01, /* mov.l @(8,pc),r0 */
2037 0x00, 0xce, /* mov.l @(r0,r12),r0 */
2038 0x40, 0x2b, /* jmp @r0 */
2039 0x00, 0x09, /* nop */
2040 0, 0, 0, 0, /* 0: replaced with offset of this symbol in .got. */
2041 0xd0, 0x01, /* mov.l @(8,pc),r0 */
2042 0x51, 0xc2, /* mov.l @(8,r12),r1 */
2043 0x41, 0x2b, /* jmp @r1 */
2044 0x00, 0x09, /* nop */
2045 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2046};
2047
2048static const bfd_byte vxworks_sh_pic_plt_entry_le[VXWORKS_PLT_ENTRY_SIZE] =
2049{
2050 0x01, 0xd0, /* mov.l @(8,pc),r0 */
2051 0xce, 0x00, /* mov.l @(r0,r12),r0 */
2052 0x2b, 0x40, /* jmp @r0 */
2053 0x09, 0x00, /* nop */
2054 0, 0, 0, 0, /* 0: replaced with offset of this symbol in .got. */
2055 0x01, 0xd0, /* mov.l @(8,pc),r0 */
2056 0xc2, 0x51, /* mov.l @(8,r12),r1 */
2057 0x2b, 0x41, /* jmp @r1 */
2058 0x09, 0x00, /* nop */
2059 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2060};
2061
2062static const struct elf_sh_plt_info vxworks_sh_plts[2][2] = {
2063 {
2064 {
2065 /* Big-endian non-PIC. */
2066 vxworks_sh_plt0_entry_be,
2067 VXWORKS_PLT_HEADER_SIZE,
2068 { MINUS_ONE, MINUS_ONE, 8 },
2069 vxworks_sh_plt_entry_be,
2070 VXWORKS_PLT_ENTRY_SIZE,
8e45593f
NC
2071 { 8, 14, 20, FALSE },
2072 12,
2073 NULL
55e6e397
RS
2074 },
2075 {
2076 /* Little-endian non-PIC. */
2077 vxworks_sh_plt0_entry_le,
2078 VXWORKS_PLT_HEADER_SIZE,
2079 { MINUS_ONE, MINUS_ONE, 8 },
2080 vxworks_sh_plt_entry_le,
2081 VXWORKS_PLT_ENTRY_SIZE,
8e45593f
NC
2082 { 8, 14, 20, FALSE },
2083 12,
2084 NULL
55e6e397
RS
2085 },
2086 },
2087 {
2088 {
2089 /* Big-endian PIC. */
2090 NULL,
2091 0,
2092 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2093 vxworks_sh_pic_plt_entry_be,
2094 VXWORKS_PLT_ENTRY_SIZE,
8e45593f
NC
2095 { 8, MINUS_ONE, 20, FALSE },
2096 12,
2097 NULL
55e6e397
RS
2098 },
2099 {
2100 /* Little-endian PIC. */
2101 NULL,
2102 0,
2103 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2104 vxworks_sh_pic_plt_entry_le,
2105 VXWORKS_PLT_ENTRY_SIZE,
8e45593f
NC
2106 { 8, MINUS_ONE, 20, FALSE },
2107 12,
2108 NULL
55e6e397
RS
2109 },
2110 }
2111};
9bdafcce 2112
8e45593f
NC
2113/* FDPIC PLT entries. Two unimplemented optimizations for lazy
2114 binding are to omit the lazy binding stub when linking with -z now
2115 and to move lazy binding stubs into a separate region for better
2116 cache behavior. */
2117
2118#define FDPIC_PLT_ENTRY_SIZE 28
2119#define FDPIC_PLT_LAZY_OFFSET 20
2120
2121/* FIXME: The lazy binding stub requires a plt0 - which may need to be
2122 duplicated if it is out of range, or which can be inlined. So
2123 right now it is always inlined, which wastes a word per stub. It
2124 might be easier to handle the duplication if we put the lazy
2125 stubs separately. */
2126
2127static const bfd_byte fdpic_sh_plt_entry_be[FDPIC_PLT_ENTRY_SIZE] =
2128{
2129 0xd0, 0x02, /* mov.l @(12,pc),r0 */
2130 0x01, 0xce, /* mov.l @(r0,r12),r1 */
2131 0x70, 0x04, /* add #4, r0 */
2132 0x41, 0x2b, /* jmp @r1 */
2133 0x0c, 0xce, /* mov.l @(r0,r12),r12 */
2134 0x00, 0x09, /* nop */
2135 0, 0, 0, 0, /* 0: replaced with offset of this symbol's funcdesc */
2136 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2137 0x60, 0xc2, /* mov.l @r12,r0 */
2138 0x40, 0x2b, /* jmp @r0 */
2139 0x53, 0xc1, /* mov.l @(4,r12),r3 */
2140 0x00, 0x09, /* nop */
2141};
2142
2143static const bfd_byte fdpic_sh_plt_entry_le[FDPIC_PLT_ENTRY_SIZE] =
2144{
2145 0x02, 0xd0, /* mov.l @(12,pc),r0 */
2146 0xce, 0x01, /* mov.l @(r0,r12),r1 */
2147 0x04, 0x70, /* add #4, r0 */
2148 0x2b, 0x41, /* jmp @r1 */
2149 0xce, 0x0c, /* mov.l @(r0,r12),r12 */
2150 0x09, 0x00, /* nop */
2151 0, 0, 0, 0, /* 0: replaced with offset of this symbol's funcdesc */
2152 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2153 0xc2, 0x60, /* mov.l @r12,r0 */
2154 0x2b, 0x40, /* jmp @r0 */
2155 0xc1, 0x53, /* mov.l @(4,r12),r3 */
2156 0x09, 0x00, /* nop */
2157};
2158
2159static const struct elf_sh_plt_info fdpic_sh_plts[2] = {
2160 {
2161 /* Big-endian PIC. */
2162 NULL,
2163 0,
2164 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2165 fdpic_sh_plt_entry_be,
2166 FDPIC_PLT_ENTRY_SIZE,
2167 { 12, MINUS_ONE, 16, FALSE },
2168 FDPIC_PLT_LAZY_OFFSET,
2169 NULL
2170 },
2171 {
2172 /* Little-endian PIC. */
2173 NULL,
2174 0,
2175 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2176 fdpic_sh_plt_entry_le,
2177 FDPIC_PLT_ENTRY_SIZE,
2178 { 12, MINUS_ONE, 16, FALSE },
2179 FDPIC_PLT_LAZY_OFFSET,
2180 NULL
2181 },
2182};
2183
2184/* On SH2A, we can use the movi20 instruction to generate shorter PLT
2185 entries for the first 64K slots. We use the normal FDPIC PLT entry
2186 past that point; we could also use movi20s, which might be faster,
2187 but would not be any smaller. */
2188
2189#define FDPIC_SH2A_PLT_ENTRY_SIZE 24
2190#define FDPIC_SH2A_PLT_LAZY_OFFSET 16
2191
2192static const bfd_byte fdpic_sh2a_plt_entry_be[FDPIC_SH2A_PLT_ENTRY_SIZE] =
2193{
2194 0, 0, 0, 0, /* movi20 #gotofffuncdesc,r0 */
2195 0x01, 0xce, /* mov.l @(r0,r12),r1 */
2196 0x70, 0x04, /* add #4, r0 */
2197 0x41, 0x2b, /* jmp @r1 */
2198 0x0c, 0xce, /* mov.l @(r0,r12),r12 */
2199 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2200 0x60, 0xc2, /* mov.l @r12,r0 */
2201 0x40, 0x2b, /* jmp @r0 */
2202 0x53, 0xc1, /* mov.l @(4,r12),r3 */
2203 0x00, 0x09, /* nop */
2204};
2205
2206static const bfd_byte fdpic_sh2a_plt_entry_le[FDPIC_SH2A_PLT_ENTRY_SIZE] =
2207{
2208 0, 0, 0, 0, /* movi20 #gotofffuncdesc,r0 */
2209 0xce, 0x01, /* mov.l @(r0,r12),r1 */
2210 0x04, 0x70, /* add #4, r0 */
2211 0x2b, 0x41, /* jmp @r1 */
2212 0xce, 0x0c, /* mov.l @(r0,r12),r12 */
2213 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2214 0xc2, 0x60, /* mov.l @r12,r0 */
2215 0x2b, 0x40, /* jmp @r0 */
2216 0xc1, 0x53, /* mov.l @(4,r12),r3 */
2217 0x09, 0x00, /* nop */
2218};
2219
2220static const struct elf_sh_plt_info fdpic_sh2a_short_plt_be = {
2221 /* Big-endian FDPIC, max index 64K. */
2222 NULL,
2223 0,
2224 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2225 fdpic_sh2a_plt_entry_be,
2226 FDPIC_SH2A_PLT_ENTRY_SIZE,
2227 { 0, MINUS_ONE, 12, TRUE },
2228 FDPIC_SH2A_PLT_LAZY_OFFSET,
2229 NULL
2230};
2231
2232static const struct elf_sh_plt_info fdpic_sh2a_short_plt_le = {
2233 /* Little-endian FDPIC, max index 64K. */
2234 NULL,
2235 0,
2236 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2237 fdpic_sh2a_plt_entry_le,
2238 FDPIC_SH2A_PLT_ENTRY_SIZE,
2239 { 0, MINUS_ONE, 12, TRUE },
2240 FDPIC_SH2A_PLT_LAZY_OFFSET,
2241 NULL
2242};
2243
2244static const struct elf_sh_plt_info fdpic_sh2a_plts[2] = {
2245 {
2246 /* Big-endian PIC. */
2247 NULL,
2248 0,
2249 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2250 fdpic_sh_plt_entry_be,
2251 FDPIC_PLT_ENTRY_SIZE,
2252 { 12, MINUS_ONE, 16, FALSE },
2253 FDPIC_PLT_LAZY_OFFSET,
2254 &fdpic_sh2a_short_plt_be
2255 },
2256 {
2257 /* Little-endian PIC. */
2258 NULL,
2259 0,
2260 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2261 fdpic_sh_plt_entry_le,
2262 FDPIC_PLT_ENTRY_SIZE,
2263 { 12, MINUS_ONE, 16, FALSE },
2264 FDPIC_PLT_LAZY_OFFSET,
2265 &fdpic_sh2a_short_plt_le
2266 },
2267};
2268
55e6e397
RS
2269/* Return the type of PLT associated with ABFD. PIC_P is true if
2270 the object is position-independent. */
9bdafcce 2271
55e6e397 2272static const struct elf_sh_plt_info *
8e45593f 2273get_plt_info (bfd *abfd, bfd_boolean pic_p)
55e6e397 2274{
8e45593f
NC
2275 if (fdpic_object_p (abfd))
2276 {
2277 /* If any input file requires SH2A we can use a shorter PLT
2278 sequence. */
2279 if (sh_get_arch_from_bfd_mach (bfd_get_mach (abfd)) & arch_sh2a_base)
2280 return &fdpic_sh2a_plts[!bfd_big_endian (abfd)];
2281 else
2282 return &fdpic_sh_plts[!bfd_big_endian (abfd)];
2283 }
55e6e397
RS
2284 if (vxworks_object_p (abfd))
2285 return &vxworks_sh_plts[pic_p][!bfd_big_endian (abfd)];
2286 return &elf_sh_plts[pic_p][!bfd_big_endian (abfd)];
2287}
9bdafcce 2288
55e6e397
RS
2289/* Install a 32-bit PLT field starting at ADDR, which occurs in OUTPUT_BFD.
2290 VALUE is the field's value and CODE_P is true if VALUE refers to code,
2291 not data. */
9bdafcce 2292
55e6e397
RS
2293inline static void
2294install_plt_field (bfd *output_bfd, bfd_boolean code_p ATTRIBUTE_UNUSED,
2295 unsigned long value, bfd_byte *addr)
2296{
2297 bfd_put_32 (output_bfd, value, addr);
2298}
fbca6ad9 2299#endif
015551fc 2300
8e45593f
NC
2301/* The number of PLT entries which can use a shorter PLT, if any.
2302 Currently always 64K, since only SH-2A FDPIC uses this; a
2303 20-bit movi20 can address that many function descriptors below
2304 _GLOBAL_OFFSET_TABLE_. */
2305#define MAX_SHORT_PLT 65536
2306
55e6e397
RS
2307/* Return the index of the PLT entry at byte offset OFFSET. */
2308
2309static bfd_vma
2310get_plt_index (const struct elf_sh_plt_info *info, bfd_vma offset)
2311{
8e45593f
NC
2312 bfd_vma plt_index = 0;
2313
2314 offset -= info->plt0_entry_size;
2315 if (info->short_plt != NULL)
2316 {
2317 if (offset > MAX_SHORT_PLT * info->short_plt->symbol_entry_size)
2318 {
2319 plt_index = MAX_SHORT_PLT;
2320 offset -= MAX_SHORT_PLT * info->short_plt->symbol_entry_size;
2321 }
2322 else
2323 info = info->short_plt;
2324 }
2325 return plt_index + offset / info->symbol_entry_size;
55e6e397
RS
2326}
2327
2328/* Do the inverse operation. */
2329
2330static bfd_vma
91d6fa6a 2331get_plt_offset (const struct elf_sh_plt_info *info, bfd_vma plt_index)
55e6e397 2332{
8e45593f
NC
2333 bfd_vma offset = 0;
2334
2335 if (info->short_plt != NULL)
2336 {
2337 if (plt_index > MAX_SHORT_PLT)
2338 {
2339 offset = MAX_SHORT_PLT * info->short_plt->symbol_entry_size;
2340 plt_index -= MAX_SHORT_PLT;
2341 }
2342 else
2343 info = info->short_plt;
2344 }
2345 return (offset + info->plt0_entry_size
2346 + (plt_index * info->symbol_entry_size));
55e6e397
RS
2347}
2348
37c644f2 2349/* The sh linker needs to keep track of the number of relocs that it
067653c5
AM
2350 decides to copy as dynamic relocs in check_relocs for each symbol.
2351 This is so that it can later discard them if they are found to be
2352 unnecessary. We store the information in a field extending the
2353 regular ELF linker hash table. */
252b5132 2354
067653c5 2355struct elf_sh_dyn_relocs
38b1a46c 2356{
067653c5
AM
2357 struct elf_sh_dyn_relocs *next;
2358
2359 /* The input section of the reloc. */
2360 asection *sec;
2361
2362 /* Total number of relocs copied for the input section. */
37c644f2 2363 bfd_size_type count;
067653c5
AM
2364
2365 /* Number of pc-relative relocs copied for the input section. */
2366 bfd_size_type pc_count;
37c644f2 2367};
252b5132 2368
8e45593f
NC
2369union gotref
2370{
2371 bfd_signed_vma refcount;
2372 bfd_vma offset;
2373};
2374
37c644f2
AO
2375/* sh ELF linker hash entry. */
2376
38b1a46c
NC
2377struct elf_sh_link_hash_entry
2378{
37c644f2
AO
2379 struct elf_link_hash_entry root;
2380
fbca6ad9 2381#ifdef INCLUDE_SHMEDIA
396a6083
SC
2382 union
2383 {
2384 bfd_signed_vma refcount;
2385 bfd_vma offset;
2386 } datalabel_got;
fbca6ad9
AO
2387#endif
2388
067653c5
AM
2389 /* Track dynamic relocs copied for this symbol. */
2390 struct elf_sh_dyn_relocs *dyn_relocs;
4989d792
SC
2391
2392 bfd_signed_vma gotplt_refcount;
3376eaf5 2393
8e45593f
NC
2394 /* A local function descriptor, for FDPIC. The refcount counts
2395 R_SH_FUNCDESC, R_SH_GOTOFFFUNCDESC, and R_SH_GOTOFFFUNCDESC20
2396 relocations; the PLT and GOT entry are accounted
2397 for separately. After adjust_dynamic_symbol, the offset is
2398 MINUS_ONE if there is no local descriptor (dynamic linker
2399 managed and no PLT entry, or undefined weak non-dynamic).
2400 During check_relocs we do not yet know whether the local
2401 descriptor will be canonical. */
2402 union gotref funcdesc;
2403
2404 /* How many of the above refcounted relocations were R_SH_FUNCDESC,
2405 and thus require fixups or relocations. */
2406 bfd_signed_vma abs_funcdesc_refcount;
2407
3376eaf5 2408 enum {
8e45593f
NC
2409 GOT_UNKNOWN = 0, GOT_NORMAL, GOT_TLS_GD, GOT_TLS_IE, GOT_FUNCDESC
2410 } got_type;
3376eaf5
KK
2411};
2412
2413#define sh_elf_hash_entry(ent) ((struct elf_sh_link_hash_entry *)(ent))
2414
2415struct sh_elf_obj_tdata
2416{
2417 struct elf_obj_tdata root;
2418
8e45593f
NC
2419 /* got_type for each local got entry. */
2420 char *local_got_type;
2421
2422 /* Function descriptor refcount and offset for each local symbol. */
2423 union gotref *local_funcdesc;
37c644f2
AO
2424};
2425
3376eaf5
KK
2426#define sh_elf_tdata(abfd) \
2427 ((struct sh_elf_obj_tdata *) (abfd)->tdata.any)
2428
8e45593f
NC
2429#define sh_elf_local_got_type(abfd) \
2430 (sh_elf_tdata (abfd)->local_got_type)
2431
2432#define sh_elf_local_funcdesc(abfd) \
2433 (sh_elf_tdata (abfd)->local_funcdesc)
3376eaf5 2434
0ffa91dd
NC
2435#define is_sh_elf(bfd) \
2436 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
2437 && elf_tdata (bfd) != NULL \
4dfe6ac6 2438 && elf_object_id (bfd) == SH_ELF_DATA)
0ffa91dd 2439
3376eaf5
KK
2440/* Override the generic function because we need to store sh_elf_obj_tdata
2441 as the specific tdata. */
2442
b34976b6 2443static bfd_boolean
09fd220b 2444sh_elf_mkobject (bfd *abfd)
3376eaf5 2445{
0ffa91dd 2446 return bfd_elf_allocate_object (abfd, sizeof (struct sh_elf_obj_tdata),
4dfe6ac6 2447 SH_ELF_DATA);
3376eaf5 2448}
b34976b6 2449
37c644f2
AO
2450/* sh ELF linker hash table. */
2451
38b1a46c
NC
2452struct elf_sh_link_hash_table
2453{
37c644f2 2454 struct elf_link_hash_table root;
37c644f2 2455
067653c5
AM
2456 /* Short-cuts to get to dynamic linker sections. */
2457 asection *sgot;
2458 asection *sgotplt;
2459 asection *srelgot;
2460 asection *splt;
2461 asection *srelplt;
2462 asection *sdynbss;
2463 asection *srelbss;
8e45593f
NC
2464 asection *sfuncdesc;
2465 asection *srelfuncdesc;
2466 asection *srofixup;
37c644f2 2467
55e6e397
RS
2468 /* The (unloaded but important) VxWorks .rela.plt.unloaded section. */
2469 asection *srelplt2;
2470
87d72d41
AM
2471 /* Small local sym cache. */
2472 struct sym_cache sym_cache;
3376eaf5
KK
2473
2474 /* A counter or offset to track a TLS got entry. */
2475 union
2476 {
2477 bfd_signed_vma refcount;
2478 bfd_vma offset;
2479 } tls_ldm_got;
55e6e397
RS
2480
2481 /* The type of PLT to use. */
2482 const struct elf_sh_plt_info *plt_info;
2483
2484 /* True if the target system is VxWorks. */
2485 bfd_boolean vxworks_p;
8e45593f
NC
2486
2487 /* True if the target system uses FDPIC. */
2488 bfd_boolean fdpic_p;
067653c5 2489};
37c644f2
AO
2490
2491/* Traverse an sh ELF linker hash table. */
2492
2493#define sh_elf_link_hash_traverse(table, func, info) \
2494 (elf_link_hash_traverse \
2495 (&(table)->root, \
09fd220b 2496 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
37c644f2
AO
2497 (info)))
2498
2499/* Get the sh ELF linker hash table from a link_info structure. */
2500
2501#define sh_elf_hash_table(p) \
4dfe6ac6
NC
2502 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
2503 == SH_ELF_DATA ? ((struct elf_sh_link_hash_table *) ((p)->hash)) : NULL)
37c644f2
AO
2504
2505/* Create an entry in an sh ELF linker hash table. */
2506
2507static struct bfd_hash_entry *
09fd220b
KK
2508sh_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
2509 struct bfd_hash_table *table,
2510 const char *string)
37c644f2
AO
2511{
2512 struct elf_sh_link_hash_entry *ret =
2513 (struct elf_sh_link_hash_entry *) entry;
2514
2515 /* Allocate the structure if it has not already been allocated by a
2516 subclass. */
2517 if (ret == (struct elf_sh_link_hash_entry *) NULL)
2518 ret = ((struct elf_sh_link_hash_entry *)
2519 bfd_hash_allocate (table,
2520 sizeof (struct elf_sh_link_hash_entry)));
2521 if (ret == (struct elf_sh_link_hash_entry *) NULL)
2522 return (struct bfd_hash_entry *) ret;
2523
2524 /* Call the allocation method of the superclass. */
2525 ret = ((struct elf_sh_link_hash_entry *)
2526 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
2527 table, string));
2528 if (ret != (struct elf_sh_link_hash_entry *) NULL)
2529 {
396a6083
SC
2530 ret->dyn_relocs = NULL;
2531 ret->gotplt_refcount = 0;
fbca6ad9 2532#ifdef INCLUDE_SHMEDIA
396a6083 2533 ret->datalabel_got.refcount = ret->root.got.refcount;
fbca6ad9 2534#endif
8e45593f
NC
2535 ret->funcdesc.refcount = 0;
2536 ret->abs_funcdesc_refcount = 0;
2537 ret->got_type = GOT_UNKNOWN;
37c644f2
AO
2538 }
2539
2540 return (struct bfd_hash_entry *) ret;
2541}
2542
2543/* Create an sh ELF linker hash table. */
2544
2545static struct bfd_link_hash_table *
09fd220b 2546sh_elf_link_hash_table_create (bfd *abfd)
37c644f2
AO
2547{
2548 struct elf_sh_link_hash_table *ret;
dc810e39 2549 bfd_size_type amt = sizeof (struct elf_sh_link_hash_table);
37c644f2 2550
e2d34d7d 2551 ret = (struct elf_sh_link_hash_table *) bfd_malloc (amt);
37c644f2
AO
2552 if (ret == (struct elf_sh_link_hash_table *) NULL)
2553 return NULL;
2554
66eb6687
AM
2555 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
2556 sh_elf_link_hash_newfunc,
4dfe6ac6
NC
2557 sizeof (struct elf_sh_link_hash_entry),
2558 SH_ELF_DATA))
37c644f2 2559 {
e2d34d7d 2560 free (ret);
37c644f2
AO
2561 return NULL;
2562 }
2563
067653c5
AM
2564 ret->sgot = NULL;
2565 ret->sgotplt = NULL;
2566 ret->srelgot = NULL;
2567 ret->splt = NULL;
2568 ret->srelplt = NULL;
2569 ret->sdynbss = NULL;
2570 ret->srelbss = NULL;
55e6e397 2571 ret->srelplt2 = NULL;
87d72d41 2572 ret->sym_cache.abfd = NULL;
3376eaf5 2573 ret->tls_ldm_got.refcount = 0;
55e6e397
RS
2574 ret->plt_info = NULL;
2575 ret->vxworks_p = vxworks_object_p (abfd);
8e45593f 2576 ret->fdpic_p = fdpic_object_p (abfd);
067653c5 2577
37c644f2
AO
2578 return &ret->root.root;
2579}
2580
8e45593f
NC
2581static bfd_boolean
2582sh_elf_omit_section_dynsym (bfd *output_bfd ATTRIBUTE_UNUSED,
2583 struct bfd_link_info *info, asection *p)
2584{
2585 struct elf_sh_link_hash_table *htab = sh_elf_hash_table (info);
2586
2587 /* Non-FDPIC binaries do not need dynamic symbols for sections. */
2588 if (!htab->fdpic_p)
2589 return TRUE;
2590
2591 /* We need dynamic symbols for every section, since segments can
2592 relocate independently. */
2593 switch (elf_section_data (p)->this_hdr.sh_type)
2594 {
2595 case SHT_PROGBITS:
2596 case SHT_NOBITS:
2597 /* If sh_type is yet undecided, assume it could be
2598 SHT_PROGBITS/SHT_NOBITS. */
2599 case SHT_NULL:
2600 return FALSE;
2601
2602 /* There shouldn't be section relative relocations
2603 against any other section. */
2604 default:
2605 return TRUE;
2606 }
2607}
2608
067653c5
AM
2609/* Create .got, .gotplt, and .rela.got sections in DYNOBJ, and set up
2610 shortcuts to them in our hash table. */
2611
b34976b6 2612static bfd_boolean
09fd220b 2613create_got_section (bfd *dynobj, struct bfd_link_info *info)
067653c5
AM
2614{
2615 struct elf_sh_link_hash_table *htab;
2616
2617 if (! _bfd_elf_create_got_section (dynobj, info))
b34976b6 2618 return FALSE;
067653c5
AM
2619
2620 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
2621 if (htab == NULL)
2622 return FALSE;
2623
067653c5
AM
2624 htab->sgot = bfd_get_section_by_name (dynobj, ".got");
2625 htab->sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
64e77c6d
L
2626 htab->srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
2627 if (! htab->sgot || ! htab->sgotplt || ! htab->srelgot)
067653c5 2628 abort ();
8e45593f
NC
2629
2630 htab->sfuncdesc = bfd_make_section_with_flags (dynobj, ".got.funcdesc",
2631 (SEC_ALLOC | SEC_LOAD
2632 | SEC_HAS_CONTENTS
2633 | SEC_IN_MEMORY
2634 | SEC_LINKER_CREATED));
2635 if (htab->sfuncdesc == NULL
2636 || ! bfd_set_section_alignment (dynobj, htab->sfuncdesc, 2))
2637 return FALSE;
2638
2639 htab->srelfuncdesc = bfd_make_section_with_flags (dynobj,
2640 ".rela.got.funcdesc",
2641 (SEC_ALLOC | SEC_LOAD
2642 | SEC_HAS_CONTENTS
2643 | SEC_IN_MEMORY
2644 | SEC_LINKER_CREATED
2645 | SEC_READONLY));
2646 if (htab->srelfuncdesc == NULL
2647 || ! bfd_set_section_alignment (dynobj, htab->srelfuncdesc, 2))
2648 return FALSE;
2649
2650 /* Also create .rofixup. */
2651 htab->srofixup = bfd_make_section_with_flags (dynobj, ".rofixup",
2652 (SEC_ALLOC | SEC_LOAD
2653 | SEC_HAS_CONTENTS
2654 | SEC_IN_MEMORY
2655 | SEC_LINKER_CREATED
2656 | SEC_READONLY));
2657 if (htab->srofixup == NULL
2658 || ! bfd_set_section_alignment (dynobj, htab->srofixup, 2))
2659 return FALSE;
2660
b34976b6 2661 return TRUE;
067653c5
AM
2662}
2663
37c644f2
AO
2664/* Create dynamic sections when linking against a dynamic object. */
2665
b34976b6 2666static bfd_boolean
09fd220b 2667sh_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
37c644f2 2668{
067653c5 2669 struct elf_sh_link_hash_table *htab;
37c644f2 2670 flagword flags, pltflags;
91d6fa6a 2671 asection *s;
9c5bfbb7 2672 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
37c644f2
AO
2673 int ptralign = 0;
2674
2675 switch (bed->s->arch_size)
2676 {
2677 case 32:
2678 ptralign = 2;
2679 break;
2680
2681 case 64:
2682 ptralign = 3;
2683 break;
2684
2685 default:
2686 bfd_set_error (bfd_error_bad_value);
b34976b6 2687 return FALSE;
37c644f2
AO
2688 }
2689
067653c5 2690 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
2691 if (htab == NULL)
2692 return FALSE;
2693
35cad4c4
KK
2694 if (htab->root.dynamic_sections_created)
2695 return TRUE;
067653c5 2696
37c644f2
AO
2697 /* We need to create .plt, .rel[a].plt, .got, .got.plt, .dynbss, and
2698 .rel[a].bss sections. */
2699
2700 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
2701 | SEC_LINKER_CREATED);
2702
2703 pltflags = flags;
2704 pltflags |= SEC_CODE;
2705 if (bed->plt_not_loaded)
2706 pltflags &= ~ (SEC_LOAD | SEC_HAS_CONTENTS);
2707 if (bed->plt_readonly)
2708 pltflags |= SEC_READONLY;
2709
3496cb2a 2710 s = bfd_make_section_with_flags (abfd, ".plt", pltflags);
35cad4c4
KK
2711 htab->splt = s;
2712 if (s == NULL
35cad4c4
KK
2713 || ! bfd_set_section_alignment (abfd, s, bed->plt_alignment))
2714 return FALSE;
37c644f2
AO
2715
2716 if (bed->want_plt_sym)
2717 {
2718 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
2719 .plt section. */
14a793b2
AM
2720 struct elf_link_hash_entry *h;
2721 struct bfd_link_hash_entry *bh = NULL;
2722
37c644f2
AO
2723 if (! (_bfd_generic_link_add_one_symbol
2724 (info, abfd, "_PROCEDURE_LINKAGE_TABLE_", BSF_GLOBAL, s,
b34976b6 2725 (bfd_vma) 0, (const char *) NULL, FALSE,
14a793b2 2726 get_elf_backend_data (abfd)->collect, &bh)))
b34976b6 2727 return FALSE;
14a793b2
AM
2728
2729 h = (struct elf_link_hash_entry *) bh;
f5385ebf 2730 h->def_regular = 1;
37c644f2 2731 h->type = STT_OBJECT;
7325306f 2732 htab->root.hplt = h;
37c644f2
AO
2733
2734 if (info->shared
c152c796 2735 && ! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 2736 return FALSE;
37c644f2
AO
2737 }
2738
3496cb2a
L
2739 s = bfd_make_section_with_flags (abfd,
2740 bed->default_use_rela_p ? ".rela.plt" : ".rel.plt",
2741 flags | SEC_READONLY);
35cad4c4
KK
2742 htab->srelplt = s;
2743 if (s == NULL
35cad4c4
KK
2744 || ! bfd_set_section_alignment (abfd, s, ptralign))
2745 return FALSE;
37c644f2 2746
2293c499
AM
2747 if (htab->sgot == NULL
2748 && !create_got_section (abfd, info))
b34976b6 2749 return FALSE;
37c644f2
AO
2750
2751 {
2752 const char *secname;
2753 char *relname;
2754 flagword secflags;
2755 asection *sec;
2756
2757 for (sec = abfd->sections; sec; sec = sec->next)
2758 {
2759 secflags = bfd_get_section_flags (abfd, sec);
2760 if ((secflags & (SEC_DATA | SEC_LINKER_CREATED))
2761 || ((secflags & SEC_HAS_CONTENTS) != SEC_HAS_CONTENTS))
2762 continue;
2763 secname = bfd_get_section_name (abfd, sec);
dc810e39 2764 relname = (char *) bfd_malloc ((bfd_size_type) strlen (secname) + 6);
37c644f2
AO
2765 strcpy (relname, ".rela");
2766 strcat (relname, secname);
03151a5a
KK
2767 if (bfd_get_section_by_name (abfd, secname))
2768 continue;
3496cb2a
L
2769 s = bfd_make_section_with_flags (abfd, relname,
2770 flags | SEC_READONLY);
37c644f2 2771 if (s == NULL
37c644f2 2772 || ! bfd_set_section_alignment (abfd, s, ptralign))
b34976b6 2773 return FALSE;
37c644f2
AO
2774 }
2775 }
2776
2777 if (bed->want_dynbss)
2778 {
2779 /* The .dynbss section is a place to put symbols which are defined
2780 by dynamic objects, are referenced by regular objects, and are
2781 not functions. We must allocate space for them in the process
2782 image and use a R_*_COPY reloc to tell the dynamic linker to
2783 initialize them at run time. The linker script puts the .dynbss
2784 section into the .bss section of the final image. */
3496cb2a
L
2785 s = bfd_make_section_with_flags (abfd, ".dynbss",
2786 SEC_ALLOC | SEC_LINKER_CREATED);
35cad4c4 2787 htab->sdynbss = s;
3496cb2a 2788 if (s == NULL)
35cad4c4 2789 return FALSE;
37c644f2
AO
2790
2791 /* The .rel[a].bss section holds copy relocs. This section is not
2792 normally needed. We need to create it here, though, so that the
2793 linker will map it to an output section. We can't just create it
2794 only if we need it, because we will not know whether we need it
2795 until we have seen all the input files, and the first time the
2796 main linker code calls BFD after examining all the input files
2797 (size_dynamic_sections) the input sections have already been
2798 mapped to the output sections. If the section turns out not to
2799 be needed, we can discard it later. We will never need this
2800 section when generating a shared object, since they do not use
2801 copy relocs. */
35cad4c4 2802 if (! info->shared)
37c644f2 2803 {
3496cb2a
L
2804 s = bfd_make_section_with_flags (abfd,
2805 (bed->default_use_rela_p
2806 ? ".rela.bss" : ".rel.bss"),
2807 flags | SEC_READONLY);
067653c5 2808 htab->srelbss = s;
37c644f2 2809 if (s == NULL
37c644f2 2810 || ! bfd_set_section_alignment (abfd, s, ptralign))
b34976b6 2811 return FALSE;
37c644f2
AO
2812 }
2813 }
2814
55e6e397
RS
2815 if (htab->vxworks_p)
2816 {
2817 if (!elf_vxworks_create_dynamic_sections (abfd, info, &htab->srelplt2))
2818 return FALSE;
2819 }
2820
b34976b6 2821 return TRUE;
37c644f2
AO
2822}
2823\f
37c644f2
AO
2824/* Adjust a symbol defined by a dynamic object and referenced by a
2825 regular object. The current definition is in some section of the
2826 dynamic object, but we're not including those sections. We have to
2827 change the definition to something the rest of the link can
2828 understand. */
2829
b34976b6 2830static bfd_boolean
09fd220b
KK
2831sh_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
2832 struct elf_link_hash_entry *h)
37c644f2 2833{
067653c5
AM
2834 struct elf_sh_link_hash_table *htab;
2835 struct elf_sh_link_hash_entry *eh;
2836 struct elf_sh_dyn_relocs *p;
37c644f2 2837 asection *s;
37c644f2 2838
2293c499 2839 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
2840 if (htab == NULL)
2841 return FALSE;
37c644f2
AO
2842
2843 /* Make sure we know what is going on here. */
2293c499 2844 BFD_ASSERT (htab->root.dynobj != NULL
f5385ebf 2845 && (h->needs_plt
f6e332e6 2846 || h->u.weakdef != NULL
f5385ebf
AM
2847 || (h->def_dynamic
2848 && h->ref_regular
2849 && !h->def_regular)));
37c644f2
AO
2850
2851 /* If this is a function, put it in the procedure linkage table. We
2852 will fill in the contents of the procedure linkage table later,
2853 when we know the address of the .got section. */
2854 if (h->type == STT_FUNC
f5385ebf 2855 || h->needs_plt)
37c644f2 2856 {
067653c5 2857 if (h->plt.refcount <= 0
3d85aebe
KK
2858 || SYMBOL_CALLS_LOCAL (info, h)
2859 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
2860 && h->root.type == bfd_link_hash_undefweak))
37c644f2
AO
2861 {
2862 /* This case can occur if we saw a PLT reloc in an input
2863 file, but the symbol was never referred to by a dynamic
2864 object. In such a case, we don't actually need to build
2865 a procedure linkage table, and we can just do a REL32
2866 reloc instead. */
067653c5 2867 h->plt.offset = (bfd_vma) -1;
f5385ebf 2868 h->needs_plt = 0;
37c644f2
AO
2869 }
2870
b34976b6 2871 return TRUE;
37c644f2 2872 }
067653c5
AM
2873 else
2874 h->plt.offset = (bfd_vma) -1;
37c644f2
AO
2875
2876 /* If this is a weak symbol, and there is a real definition, the
2877 processor independent code will have arranged for us to see the
2878 real definition first, and we can just use the same value. */
f6e332e6 2879 if (h->u.weakdef != NULL)
37c644f2 2880 {
f6e332e6
AM
2881 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
2882 || h->u.weakdef->root.type == bfd_link_hash_defweak);
2883 h->root.u.def.section = h->u.weakdef->root.u.def.section;
2884 h->root.u.def.value = h->u.weakdef->root.u.def.value;
04e534c3 2885 if (info->nocopyreloc)
f6e332e6 2886 h->non_got_ref = h->u.weakdef->non_got_ref;
b34976b6 2887 return TRUE;
37c644f2
AO
2888 }
2889
2890 /* This is a reference to a symbol defined by a dynamic object which
2891 is not a function. */
2892
2893 /* If we are creating a shared library, we must presume that the
2894 only references to the symbol are via the global offset table.
2895 For such cases we need not do anything here; the relocations will
2896 be handled correctly by relocate_section. */
2897 if (info->shared)
b34976b6 2898 return TRUE;
37c644f2
AO
2899
2900 /* If there are no references to this symbol that do not use the
2901 GOT, we don't need to generate a copy reloc. */
f5385ebf 2902 if (!h->non_got_ref)
b34976b6 2903 return TRUE;
37c644f2 2904
067653c5
AM
2905 /* If -z nocopyreloc was given, we won't generate them either. */
2906 if (info->nocopyreloc)
2907 {
f5385ebf 2908 h->non_got_ref = 0;
b34976b6 2909 return TRUE;
067653c5
AM
2910 }
2911
2912 eh = (struct elf_sh_link_hash_entry *) h;
2913 for (p = eh->dyn_relocs; p != NULL; p = p->next)
2914 {
2915 s = p->sec->output_section;
2916 if (s != NULL && (s->flags & (SEC_READONLY | SEC_HAS_CONTENTS)) != 0)
2917 break;
2918 }
2919
2920 /* If we didn't find any dynamic relocs in sections which needs the
2921 copy reloc, then we'll be keeping the dynamic relocs and avoiding
2922 the copy reloc. */
2923 if (p == NULL)
2924 {
f5385ebf 2925 h->non_got_ref = 0;
b34976b6 2926 return TRUE;
067653c5
AM
2927 }
2928
909272ee
AM
2929 if (h->size == 0)
2930 {
2931 (*_bfd_error_handler) (_("dynamic variable `%s' is zero size"),
2932 h->root.root.string);
2933 return TRUE;
2934 }
2935
37c644f2
AO
2936 /* We must allocate the symbol in our .dynbss section, which will
2937 become part of the .bss section of the executable. There will be
2938 an entry for this symbol in the .dynsym section. The dynamic
2939 object will contain position independent code, so all references
2940 from the dynamic object to this symbol will go through the global
2941 offset table. The dynamic linker will use the .dynsym entry to
2942 determine the address it must put in the global offset table, so
2943 both the dynamic object and the regular object will refer to the
2944 same memory location for the variable. */
2945
067653c5 2946 s = htab->sdynbss;
37c644f2
AO
2947 BFD_ASSERT (s != NULL);
2948
2949 /* We must generate a R_SH_COPY reloc to tell the dynamic linker to
2950 copy the initial value out of the dynamic object and into the
2951 runtime process image. We need to remember the offset into the
2952 .rela.bss section we are going to use. */
2953 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
2954 {
2955 asection *srel;
2956
067653c5 2957 srel = htab->srelbss;
37c644f2 2958 BFD_ASSERT (srel != NULL);
eea6121a 2959 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 2960 h->needs_copy = 1;
37c644f2
AO
2961 }
2962
027297b7 2963 return _bfd_elf_adjust_dynamic_copy (h, s);
37c644f2
AO
2964}
2965
067653c5
AM
2966/* Allocate space in .plt, .got and associated reloc sections for
2967 dynamic relocs. */
2968
b34976b6 2969static bfd_boolean
09fd220b 2970allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
067653c5
AM
2971{
2972 struct bfd_link_info *info;
2973 struct elf_sh_link_hash_table *htab;
2974 struct elf_sh_link_hash_entry *eh;
2975 struct elf_sh_dyn_relocs *p;
2976
2977 if (h->root.type == bfd_link_hash_indirect)
b34976b6 2978 return TRUE;
067653c5
AM
2979
2980 if (h->root.type == bfd_link_hash_warning)
2981 /* When warning symbols are created, they **replace** the "real"
2982 entry in the hash table, thus we never get to see the real
2983 symbol in a hash traversal. So look at it now. */
2984 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2985
2986 info = (struct bfd_link_info *) inf;
2987 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
2988 if (htab == NULL)
2989 return FALSE;
067653c5 2990
4989d792
SC
2991 eh = (struct elf_sh_link_hash_entry *) h;
2992 if ((h->got.refcount > 0
f5385ebf 2993 || h->forced_local)
4989d792
SC
2994 && eh->gotplt_refcount > 0)
2995 {
2996 /* The symbol has been forced local, or we have some direct got refs,
26e41594 2997 so treat all the gotplt refs as got refs. */
4989d792
SC
2998 h->got.refcount += eh->gotplt_refcount;
2999 if (h->plt.refcount >= eh->gotplt_refcount)
3000 h->plt.refcount -= eh->gotplt_refcount;
3001 }
3002
067653c5 3003 if (htab->root.dynamic_sections_created
04e534c3
KK
3004 && h->plt.refcount > 0
3005 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
3006 || h->root.type != bfd_link_hash_undefweak))
067653c5
AM
3007 {
3008 /* Make sure this symbol is output as a dynamic symbol.
3009 Undefined weak syms won't yet be marked as dynamic. */
3010 if (h->dynindx == -1
f5385ebf 3011 && !h->forced_local)
067653c5 3012 {
c152c796 3013 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 3014 return FALSE;
067653c5
AM
3015 }
3016
267fb3c1
KK
3017 if (info->shared
3018 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
067653c5
AM
3019 {
3020 asection *s = htab->splt;
8e45593f 3021 const struct elf_sh_plt_info *plt_info;
067653c5
AM
3022
3023 /* If this is the first .plt entry, make room for the special
3024 first entry. */
eea6121a 3025 if (s->size == 0)
55e6e397 3026 s->size += htab->plt_info->plt0_entry_size;
067653c5 3027
eea6121a 3028 h->plt.offset = s->size;
067653c5
AM
3029
3030 /* If this symbol is not defined in a regular file, and we are
3031 not generating a shared library, then set the symbol to this
3032 location in the .plt. This is required to make function
3033 pointers compare as equal between the normal executable and
8e45593f
NC
3034 the shared library. Skip this for FDPIC, since the
3035 function's address will be the address of the canonical
3036 function descriptor. */
3037 if (!htab->fdpic_p && !info->shared && !h->def_regular)
067653c5
AM
3038 {
3039 h->root.u.def.section = s;
3040 h->root.u.def.value = h->plt.offset;
3041 }
3042
3043 /* Make room for this entry. */
8e45593f
NC
3044 plt_info = htab->plt_info;
3045 if (plt_info->short_plt != NULL
3046 && (get_plt_index (plt_info->short_plt, s->size) < MAX_SHORT_PLT))
3047 plt_info = plt_info->short_plt;
3048 s->size += plt_info->symbol_entry_size;
067653c5
AM
3049
3050 /* We also need to make an entry in the .got.plt section, which
3051 will be placed in the .got section by the linker script. */
8e45593f
NC
3052 if (!htab->fdpic_p)
3053 htab->sgotplt->size += 4;
3054 else
3055 htab->sgotplt->size += 8;
067653c5
AM
3056
3057 /* We also need to make an entry in the .rel.plt section. */
eea6121a 3058 htab->srelplt->size += sizeof (Elf32_External_Rela);
55e6e397
RS
3059
3060 if (htab->vxworks_p && !info->shared)
3061 {
3062 /* VxWorks executables have a second set of relocations
3063 for each PLT entry. They go in a separate relocation
3064 section, which is processed by the kernel loader. */
3065
3066 /* There is a relocation for the initial PLT entry:
3067 an R_SH_DIR32 relocation for _GLOBAL_OFFSET_TABLE_. */
3068 if (h->plt.offset == htab->plt_info->plt0_entry_size)
3069 htab->srelplt2->size += sizeof (Elf32_External_Rela);
3070
3071 /* There are two extra relocations for each subsequent
3072 PLT entry: an R_SH_DIR32 relocation for the GOT entry,
3073 and an R_SH_DIR32 relocation for the PLT entry. */
3074 htab->srelplt2->size += sizeof (Elf32_External_Rela) * 2;
3075 }
067653c5
AM
3076 }
3077 else
3078 {
3079 h->plt.offset = (bfd_vma) -1;
f5385ebf 3080 h->needs_plt = 0;
067653c5
AM
3081 }
3082 }
3083 else
3084 {
3085 h->plt.offset = (bfd_vma) -1;
f5385ebf 3086 h->needs_plt = 0;
067653c5
AM
3087 }
3088
3089 if (h->got.refcount > 0)
3090 {
3091 asection *s;
b34976b6 3092 bfd_boolean dyn;
8e45593f 3093 int got_type = sh_elf_hash_entry (h)->got_type;
067653c5
AM
3094
3095 /* Make sure this symbol is output as a dynamic symbol.
3096 Undefined weak syms won't yet be marked as dynamic. */
3097 if (h->dynindx == -1
f5385ebf 3098 && !h->forced_local)
067653c5 3099 {
c152c796 3100 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 3101 return FALSE;
067653c5
AM
3102 }
3103
3104 s = htab->sgot;
eea6121a
AM
3105 h->got.offset = s->size;
3106 s->size += 4;
3376eaf5 3107 /* R_SH_TLS_GD needs 2 consecutive GOT slots. */
8e45593f 3108 if (got_type == GOT_TLS_GD)
eea6121a 3109 s->size += 4;
067653c5 3110 dyn = htab->root.dynamic_sections_created;
8e45593f
NC
3111 if (!dyn)
3112 {
3113 /* No dynamic relocations required. */
3114 if (htab->fdpic_p && !info->shared
3115 && h->root.type != bfd_link_hash_undefweak
3116 && (got_type == GOT_NORMAL || got_type == GOT_FUNCDESC))
3117 htab->srofixup->size += 4;
3118 }
267fb3c1 3119 /* R_SH_TLS_IE_32 needs one dynamic relocation if dynamic,
3376eaf5 3120 R_SH_TLS_GD needs one if local symbol and two if global. */
8e45593f
NC
3121 else if ((got_type == GOT_TLS_GD && h->dynindx == -1)
3122 || got_type == GOT_TLS_IE)
eea6121a 3123 htab->srelgot->size += sizeof (Elf32_External_Rela);
8e45593f 3124 else if (got_type == GOT_TLS_GD)
eea6121a 3125 htab->srelgot->size += 2 * sizeof (Elf32_External_Rela);
8e45593f
NC
3126 else if (got_type == GOT_FUNCDESC)
3127 {
3128 if (!info->shared && SYMBOL_FUNCDESC_LOCAL (info, h))
3129 htab->srofixup->size += 4;
3130 else
3131 htab->srelgot->size += sizeof (Elf32_External_Rela);
3132 }
04e534c3
KK
3133 else if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
3134 || h->root.type != bfd_link_hash_undefweak)
3135 && (info->shared
3136 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
eea6121a 3137 htab->srelgot->size += sizeof (Elf32_External_Rela);
8e45593f
NC
3138 else if (htab->fdpic_p && !info->shared && got_type == GOT_NORMAL
3139 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
3140 || h->root.type != bfd_link_hash_undefweak))
3141 htab->srofixup->size += 4;
067653c5
AM
3142 }
3143 else
3144 h->got.offset = (bfd_vma) -1;
3145
396a6083
SC
3146#ifdef INCLUDE_SHMEDIA
3147 if (eh->datalabel_got.refcount > 0)
3148 {
3149 asection *s;
b34976b6 3150 bfd_boolean dyn;
396a6083
SC
3151
3152 /* Make sure this symbol is output as a dynamic symbol.
3153 Undefined weak syms won't yet be marked as dynamic. */
3154 if (h->dynindx == -1
f5385ebf 3155 && !h->forced_local)
396a6083 3156 {
c152c796 3157 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 3158 return FALSE;
396a6083
SC
3159 }
3160
3161 s = htab->sgot;
eea6121a
AM
3162 eh->datalabel_got.offset = s->size;
3163 s->size += 4;
396a6083 3164 dyn = htab->root.dynamic_sections_created;
267fb3c1 3165 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h))
eea6121a 3166 htab->srelgot->size += sizeof (Elf32_External_Rela);
396a6083
SC
3167 }
3168 else
3169 eh->datalabel_got.offset = (bfd_vma) -1;
3170#endif
3171
8e45593f
NC
3172 /* Allocate space for any dynamic relocations to function
3173 descriptors, canonical or otherwise. We need to relocate the
3174 reference unless it resolves to zero, which only happens for
3175 undefined weak symbols (either non-default visibility, or when
3176 static linking). Any GOT slot is accounted for elsewhere. */
3177 if (eh->abs_funcdesc_refcount > 0
3178 && (h->root.type != bfd_link_hash_undefweak
3179 || (htab->root.dynamic_sections_created
3180 && ! SYMBOL_CALLS_LOCAL (info, h))))
3181 {
3182 if (!info->shared && SYMBOL_FUNCDESC_LOCAL (info, h))
3183 htab->srofixup->size += eh->abs_funcdesc_refcount * 4;
3184 else
3185 htab->srelgot->size
3186 += eh->abs_funcdesc_refcount * sizeof (Elf32_External_Rela);
3187 }
3188
3189 /* We must allocate a function descriptor if there are references to
3190 a canonical descriptor (R_SH_GOTFUNCDESC or R_SH_FUNCDESC) and
3191 the dynamic linker isn't going to allocate it. None of this
3192 applies if we already created one in .got.plt, but if the
3193 canonical function descriptor can be in this object, there
3194 won't be a PLT entry at all. */
3195 if ((eh->funcdesc.refcount > 0
3196 || (h->got.offset != MINUS_ONE && eh->got_type == GOT_FUNCDESC))
3197 && h->root.type != bfd_link_hash_undefweak
3198 && SYMBOL_FUNCDESC_LOCAL (info, h))
3199 {
3200 /* Make room for this function descriptor. */
3201 eh->funcdesc.offset = htab->sfuncdesc->size;
3202 htab->sfuncdesc->size += 8;
3203
3204 /* We will need a relocation or two fixups to initialize the
3205 function descriptor, so allocate those too. */
3206 if (!info->shared && SYMBOL_CALLS_LOCAL (info, h))
3207 htab->srofixup->size += 8;
3208 else
3209 htab->srelfuncdesc->size += sizeof (Elf32_External_Rela);
3210 }
3211
067653c5 3212 if (eh->dyn_relocs == NULL)
b34976b6 3213 return TRUE;
067653c5
AM
3214
3215 /* In the shared -Bsymbolic case, discard space allocated for
3216 dynamic pc-relative relocs against symbols which turn out to be
3217 defined in regular objects. For the normal shared case, discard
3218 space for pc-relative relocs that have become local due to symbol
3219 visibility changes. */
3220
3221 if (info->shared)
3222 {
3d85aebe 3223 if (SYMBOL_CALLS_LOCAL (info, h))
067653c5
AM
3224 {
3225 struct elf_sh_dyn_relocs **pp;
3226
3227 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
3228 {
3229 p->count -= p->pc_count;
3230 p->pc_count = 0;
3231 if (p->count == 0)
3232 *pp = p->next;
3233 else
3234 pp = &p->next;
3235 }
3236 }
04e534c3 3237
3348747a
NS
3238 if (htab->vxworks_p)
3239 {
3240 struct elf_sh_dyn_relocs **pp;
3241
3242 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
3243 {
3244 if (strcmp (p->sec->output_section->name, ".tls_vars") == 0)
3245 *pp = p->next;
3246 else
3247 pp = &p->next;
3248 }
3249 }
3250
04e534c3
KK
3251 /* Also discard relocs on undefined weak syms with non-default
3252 visibility. */
22d606e9 3253 if (eh->dyn_relocs != NULL
04e534c3 3254 && h->root.type == bfd_link_hash_undefweak)
22d606e9
AM
3255 {
3256 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
3257 eh->dyn_relocs = NULL;
3258
3259 /* Make sure undefined weak symbols are output as a dynamic
3260 symbol in PIEs. */
3261 else if (h->dynindx == -1
3262 && !h->forced_local)
3263 {
3264 if (! bfd_elf_link_record_dynamic_symbol (info, h))
3265 return FALSE;
3266 }
3267 }
067653c5
AM
3268 }
3269 else
3270 {
3271 /* For the non-shared case, discard space for relocs against
3272 symbols which turn out to need copy relocs or are not
3273 dynamic. */
3274
f5385ebf
AM
3275 if (!h->non_got_ref
3276 && ((h->def_dynamic
3277 && !h->def_regular)
067653c5
AM
3278 || (htab->root.dynamic_sections_created
3279 && (h->root.type == bfd_link_hash_undefweak
3280 || h->root.type == bfd_link_hash_undefined))))
3281 {
3282 /* Make sure this symbol is output as a dynamic symbol.
3283 Undefined weak syms won't yet be marked as dynamic. */
3284 if (h->dynindx == -1
f5385ebf 3285 && !h->forced_local)
067653c5 3286 {
c152c796 3287 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 3288 return FALSE;
067653c5
AM
3289 }
3290
3291 /* If that succeeded, we know we'll be keeping all the
3292 relocs. */
3293 if (h->dynindx != -1)
3294 goto keep;
3295 }
3296
3297 eh->dyn_relocs = NULL;
3298
3299 keep: ;
3300 }
3301
3302 /* Finally, allocate space. */
3303 for (p = eh->dyn_relocs; p != NULL; p = p->next)
3304 {
3305 asection *sreloc = elf_section_data (p->sec)->sreloc;
eea6121a 3306 sreloc->size += p->count * sizeof (Elf32_External_Rela);
8e45593f
NC
3307
3308 /* If we need relocations, we do not need fixups. */
3309 if (htab->fdpic_p && !info->shared)
3310 htab->srofixup->size -= 4 * (p->count - p->pc_count);
067653c5
AM
3311 }
3312
b34976b6 3313 return TRUE;
067653c5
AM
3314}
3315
3316/* Find any dynamic relocs that apply to read-only sections. */
3317
b34976b6 3318static bfd_boolean
09fd220b 3319readonly_dynrelocs (struct elf_link_hash_entry *h, void *inf)
067653c5
AM
3320{
3321 struct elf_sh_link_hash_entry *eh;
3322 struct elf_sh_dyn_relocs *p;
3323
3324 if (h->root.type == bfd_link_hash_warning)
3325 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3326
3327 eh = (struct elf_sh_link_hash_entry *) h;
3328 for (p = eh->dyn_relocs; p != NULL; p = p->next)
3329 {
3330 asection *s = p->sec->output_section;
3331
3332 if (s != NULL && (s->flags & SEC_READONLY) != 0)
3333 {
3334 struct bfd_link_info *info = (struct bfd_link_info *) inf;
3335
3336 info->flags |= DF_TEXTREL;
3337
3338 /* Not an error, just cut short the traversal. */
b34976b6 3339 return FALSE;
067653c5
AM
3340 }
3341 }
b34976b6 3342 return TRUE;
067653c5
AM
3343}
3344
55e6e397
RS
3345/* This function is called after all the input files have been read,
3346 and the input sections have been assigned to output sections.
3347 It's a convenient place to determine the PLT style. */
3348
3349static bfd_boolean
3350sh_elf_always_size_sections (bfd *output_bfd, struct bfd_link_info *info)
3351{
3352 sh_elf_hash_table (info)->plt_info = get_plt_info (output_bfd, info->shared);
8e45593f
NC
3353
3354 if (sh_elf_hash_table (info)->fdpic_p && !info->relocatable)
3355 {
3356 struct elf_link_hash_entry *h;
3357
3358 /* Force a PT_GNU_STACK segment to be created. */
3359 if (! elf_tdata (output_bfd)->stack_flags)
3360 elf_tdata (output_bfd)->stack_flags = PF_R | PF_W | PF_X;
3361
3362 /* Define __stacksize if it's not defined yet. */
3363 h = elf_link_hash_lookup (elf_hash_table (info), "__stacksize",
3364 FALSE, FALSE, FALSE);
3365 if (! h || h->root.type != bfd_link_hash_defined
3366 || h->type != STT_OBJECT
3367 || !h->def_regular)
3368 {
3369 struct bfd_link_hash_entry *bh = NULL;
3370
3371 if (!(_bfd_generic_link_add_one_symbol
3372 (info, output_bfd, "__stacksize",
3373 BSF_GLOBAL, bfd_abs_section_ptr, DEFAULT_STACK_SIZE,
3374 (const char *) NULL, FALSE,
3375 get_elf_backend_data (output_bfd)->collect, &bh)))
3376 return FALSE;
3377
3378 h = (struct elf_link_hash_entry *) bh;
3379 h->def_regular = 1;
3380 h->type = STT_OBJECT;
3381 }
3382 }
3383 return TRUE;
3384}
3385
3386#if !defined INCLUDE_SHMEDIA && !defined SH_TARGET_ALREADY_DEFINED
3387
3388static bfd_boolean
3389sh_elf_modify_program_headers (bfd *output_bfd, struct bfd_link_info *info)
3390{
3391 struct elf_obj_tdata *tdata = elf_tdata (output_bfd);
3392 struct elf_segment_map *m;
3393 Elf_Internal_Phdr *p;
3394
3395 /* objcopy and strip preserve what's already there using
3396 sh_elf_copy_private_bfd_data (). */
3397 if (! info)
3398 return TRUE;
3399
3400 for (p = tdata->phdr, m = tdata->segment_map; m != NULL; m = m->next, p++)
3401 if (m->p_type == PT_GNU_STACK)
3402 break;
3403
3404 if (m)
3405 {
3406 struct elf_link_hash_entry *h;
3407
3408 /* Obtain the pointer to the __stacksize symbol. */
3409 h = elf_link_hash_lookup (elf_hash_table (info), "__stacksize",
3410 FALSE, FALSE, FALSE);
3411 if (h)
3412 {
3413 while (h->root.type == bfd_link_hash_indirect
3414 || h->root.type == bfd_link_hash_warning)
3415 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3416 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
3417 }
3418
3419 /* Set the header p_memsz from the symbol value. We
3420 intentionally ignore the symbol section. */
3421 if (h && h->root.type == bfd_link_hash_defined)
3422 p->p_memsz = h->root.u.def.value;
3423 else
3424 p->p_memsz = DEFAULT_STACK_SIZE;
3425
3426 p->p_align = 8;
3427 }
3428
55e6e397
RS
3429 return TRUE;
3430}
3431
8e45593f
NC
3432#endif
3433
37c644f2
AO
3434/* Set the sizes of the dynamic sections. */
3435
b34976b6 3436static bfd_boolean
09fd220b
KK
3437sh_elf_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
3438 struct bfd_link_info *info)
37c644f2 3439{
067653c5 3440 struct elf_sh_link_hash_table *htab;
37c644f2
AO
3441 bfd *dynobj;
3442 asection *s;
b34976b6 3443 bfd_boolean relocs;
067653c5 3444 bfd *ibfd;
37c644f2 3445
067653c5 3446 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
3447 if (htab == NULL)
3448 return FALSE;
3449
067653c5 3450 dynobj = htab->root.dynobj;
37c644f2
AO
3451 BFD_ASSERT (dynobj != NULL);
3452
067653c5 3453 if (htab->root.dynamic_sections_created)
37c644f2
AO
3454 {
3455 /* Set the contents of the .interp section to the interpreter. */
2558b9a9 3456 if (info->executable)
37c644f2
AO
3457 {
3458 s = bfd_get_section_by_name (dynobj, ".interp");
3459 BFD_ASSERT (s != NULL);
eea6121a 3460 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
37c644f2
AO
3461 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
3462 }
3463 }
37c644f2 3464
067653c5
AM
3465 /* Set up .got offsets for local syms, and space for local dynamic
3466 relocs. */
3467 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
37c644f2 3468 {
067653c5
AM
3469 bfd_signed_vma *local_got;
3470 bfd_signed_vma *end_local_got;
8e45593f
NC
3471 union gotref *local_funcdesc, *end_local_funcdesc;
3472 char *local_got_type;
067653c5
AM
3473 bfd_size_type locsymcount;
3474 Elf_Internal_Shdr *symtab_hdr;
3475 asection *srel;
37c644f2 3476
0ffa91dd 3477 if (! is_sh_elf (ibfd))
37c644f2
AO
3478 continue;
3479
067653c5 3480 for (s = ibfd->sections; s != NULL; s = s->next)
37c644f2 3481 {
067653c5
AM
3482 struct elf_sh_dyn_relocs *p;
3483
3484 for (p = ((struct elf_sh_dyn_relocs *)
3485 elf_section_data (s)->local_dynrel);
3486 p != NULL;
3487 p = p->next)
37c644f2 3488 {
067653c5
AM
3489 if (! bfd_is_abs_section (p->sec)
3490 && bfd_is_abs_section (p->sec->output_section))
3491 {
3492 /* Input section has been discarded, either because
3493 it is a copy of a linkonce section or due to
3494 linker script /DISCARD/, so we'll be discarding
3495 the relocs too. */
3496 }
3348747a
NS
3497 else if (htab->vxworks_p
3498 && strcmp (p->sec->output_section->name,
3499 ".tls_vars") == 0)
3500 {
3501 /* Relocations in vxworks .tls_vars sections are
3502 handled specially by the loader. */
3503 }
067653c5
AM
3504 else if (p->count != 0)
3505 {
3506 srel = elf_section_data (p->sec)->sreloc;
eea6121a 3507 srel->size += p->count * sizeof (Elf32_External_Rela);
067653c5
AM
3508 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
3509 info->flags |= DF_TEXTREL;
8e45593f
NC
3510
3511 /* If we need relocations, we do not need fixups. */
3512 if (htab->fdpic_p && !info->shared)
3513 htab->srofixup->size -= 4 * (p->count - p->pc_count);
067653c5 3514 }
37c644f2
AO
3515 }
3516 }
067653c5 3517
0ffa91dd 3518 symtab_hdr = &elf_symtab_hdr (ibfd);
067653c5
AM
3519 locsymcount = symtab_hdr->sh_info;
3520#ifdef INCLUDE_SHMEDIA
3521 /* Count datalabel local GOT. */
3522 locsymcount *= 2;
3523#endif
067653c5
AM
3524 s = htab->sgot;
3525 srel = htab->srelgot;
8e45593f
NC
3526
3527 local_got = elf_local_got_refcounts (ibfd);
3528 if (local_got)
37c644f2 3529 {
8e45593f
NC
3530 end_local_got = local_got + locsymcount;
3531 local_got_type = sh_elf_local_got_type (ibfd);
3532 local_funcdesc = sh_elf_local_funcdesc (ibfd);
3533 for (; local_got < end_local_got; ++local_got)
37c644f2 3534 {
8e45593f
NC
3535 if (*local_got > 0)
3536 {
3537 *local_got = s->size;
3538 s->size += 4;
3539 if (*local_got_type == GOT_TLS_GD)
3540 s->size += 4;
3541 if (info->shared)
3542 srel->size += sizeof (Elf32_External_Rela);
3543 else
3544 htab->srofixup->size += 4;
3545
3546 if (*local_got_type == GOT_FUNCDESC)
3547 {
3548 if (local_funcdesc == NULL)
3549 {
3550 bfd_size_type size;
3551
3552 size = locsymcount * sizeof (union gotref);
3553 local_funcdesc = (union gotref *) bfd_zalloc (ibfd,
3554 size);
3555 if (local_funcdesc == NULL)
3556 return FALSE;
3557 sh_elf_local_funcdesc (ibfd) = local_funcdesc;
3558 local_funcdesc += (local_got
3559 - elf_local_got_refcounts (ibfd));
3560 }
3561 local_funcdesc->refcount++;
3562 ++local_funcdesc;
3563 }
3564 }
3565 else
3566 *local_got = (bfd_vma) -1;
3567 ++local_got_type;
3568 }
3569 }
3570
3571 local_funcdesc = sh_elf_local_funcdesc (ibfd);
3572 if (local_funcdesc)
3573 {
3574 end_local_funcdesc = local_funcdesc + locsymcount;
3575
3576 for (; local_funcdesc < end_local_funcdesc; ++local_funcdesc)
3577 {
3578 if (local_funcdesc->refcount > 0)
3579 {
3580 local_funcdesc->offset = htab->sfuncdesc->size;
3581 htab->sfuncdesc->size += 8;
3582 if (!info->shared)
3583 htab->srofixup->size += 8;
3584 else
3585 htab->srelfuncdesc->size += sizeof (Elf32_External_Rela);
3586 }
3587 else
3588 local_funcdesc->offset = MINUS_ONE;
37c644f2 3589 }
37c644f2 3590 }
8e45593f 3591
067653c5
AM
3592 }
3593
3376eaf5
KK
3594 if (htab->tls_ldm_got.refcount > 0)
3595 {
3596 /* Allocate 2 got entries and 1 dynamic reloc for R_SH_TLS_LD_32
3597 relocs. */
eea6121a
AM
3598 htab->tls_ldm_got.offset = htab->sgot->size;
3599 htab->sgot->size += 8;
3600 htab->srelgot->size += sizeof (Elf32_External_Rela);
3376eaf5
KK
3601 }
3602 else
3603 htab->tls_ldm_got.offset = -1;
3604
8e45593f
NC
3605 /* Only the reserved entries should be present. For FDPIC, they go at
3606 the end of .got.plt. */
3607 if (htab->fdpic_p)
3608 {
3609 BFD_ASSERT (htab->sgotplt && htab->sgotplt->size == 12);
3610 htab->sgotplt->size = 0;
3611 }
3612
067653c5
AM
3613 /* Allocate global sym .plt and .got entries, and space for global
3614 sym dynamic relocs. */
09fd220b 3615 elf_link_hash_traverse (&htab->root, allocate_dynrelocs, info);
067653c5 3616
8e45593f
NC
3617 /* Move the reserved entries and the _GLOBAL_OFFSET_TABLE_ symbol to the
3618 end of the FDPIC .got.plt. */
3619 if (htab->fdpic_p)
3620 {
3621 htab->root.hgot->root.u.def.value = htab->sgotplt->size;
3622 htab->sgotplt->size += 12;
3623 }
3624
3625 /* At the very end of the .rofixup section is a pointer to the GOT. */
3626 if (htab->fdpic_p && htab->srofixup != NULL)
3627 htab->srofixup->size += 4;
3628
067653c5
AM
3629 /* We now have determined the sizes of the various dynamic sections.
3630 Allocate memory for them. */
b34976b6 3631 relocs = FALSE;
067653c5
AM
3632 for (s = dynobj->sections; s != NULL; s = s->next)
3633 {
3634 if ((s->flags & SEC_LINKER_CREATED) == 0)
3635 continue;
3636
3637 if (s == htab->splt
3638 || s == htab->sgot
c456f082 3639 || s == htab->sgotplt
8e45593f
NC
3640 || s == htab->sfuncdesc
3641 || s == htab->srofixup
c456f082 3642 || s == htab->sdynbss)
067653c5
AM
3643 {
3644 /* Strip this section if we don't need it; see the
3645 comment below. */
3646 }
0112cd26 3647 else if (CONST_STRNEQ (bfd_get_section_name (dynobj, s), ".rela"))
067653c5 3648 {
55e6e397 3649 if (s->size != 0 && s != htab->srelplt && s != htab->srelplt2)
b34976b6 3650 relocs = TRUE;
067653c5
AM
3651
3652 /* We use the reloc_count field as a counter if we need
3653 to copy relocs into the output file. */
3654 s->reloc_count = 0;
3655 }
3656 else
37c644f2
AO
3657 {
3658 /* It's not one of our sections, so don't allocate space. */
3659 continue;
3660 }
3661
eea6121a 3662 if (s->size == 0)
37c644f2 3663 {
067653c5
AM
3664 /* If we don't need this section, strip it from the
3665 output file. This is mostly to handle .rela.bss and
3666 .rela.plt. We must create both sections in
3667 create_dynamic_sections, because they must be created
3668 before the linker maps input sections to output
3669 sections. The linker does that before
3670 adjust_dynamic_symbol is called, and it is that
3671 function which decides whether anything needs to go
3672 into these sections. */
3673
8423293d 3674 s->flags |= SEC_EXCLUDE;
37c644f2
AO
3675 continue;
3676 }
3677
c456f082
AM
3678 if ((s->flags & SEC_HAS_CONTENTS) == 0)
3679 continue;
3680
067653c5
AM
3681 /* Allocate memory for the section contents. We use bfd_zalloc
3682 here in case unused entries are not reclaimed before the
3683 section's contents are written out. This should not happen,
3684 but this way if it does, we get a R_SH_NONE reloc instead
3685 of garbage. */
eea6121a 3686 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
067653c5 3687 if (s->contents == NULL)
b34976b6 3688 return FALSE;
37c644f2
AO
3689 }
3690
067653c5 3691 if (htab->root.dynamic_sections_created)
37c644f2
AO
3692 {
3693 /* Add some entries to the .dynamic section. We fill in the
3694 values later, in sh_elf_finish_dynamic_sections, but we
3695 must add the entries now so that we get the correct size for
3696 the .dynamic section. The DT_DEBUG entry is filled in by the
3697 dynamic linker and used by the debugger. */
dc810e39 3698#define add_dynamic_entry(TAG, VAL) \
5a580b3a 3699 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 3700
2558b9a9 3701 if (info->executable)
37c644f2 3702 {
067653c5 3703 if (! add_dynamic_entry (DT_DEBUG, 0))
b34976b6 3704 return FALSE;
37c644f2
AO
3705 }
3706
eea6121a 3707 if (htab->splt->size != 0)
37c644f2 3708 {
067653c5
AM
3709 if (! add_dynamic_entry (DT_PLTGOT, 0)
3710 || ! add_dynamic_entry (DT_PLTRELSZ, 0)
3711 || ! add_dynamic_entry (DT_PLTREL, DT_RELA)
3712 || ! add_dynamic_entry (DT_JMPREL, 0))
b34976b6 3713 return FALSE;
37c644f2 3714 }
8e45593f
NC
3715 else if ((elf_elfheader (output_bfd)->e_flags & EF_SH_FDPIC)
3716 && htab->sgot->size != 0)
3717 {
3718 if (! add_dynamic_entry (DT_PLTGOT, 0))
3719 return FALSE;
3720 }
37c644f2
AO
3721
3722 if (relocs)
3723 {
067653c5
AM
3724 if (! add_dynamic_entry (DT_RELA, 0)
3725 || ! add_dynamic_entry (DT_RELASZ, 0)
3726 || ! add_dynamic_entry (DT_RELAENT,
3727 sizeof (Elf32_External_Rela)))
b34976b6 3728 return FALSE;
37c644f2 3729
067653c5
AM
3730 /* If any dynamic relocs apply to a read-only section,
3731 then we need a DT_TEXTREL entry. */
3732 if ((info->flags & DF_TEXTREL) == 0)
09fd220b 3733 elf_link_hash_traverse (&htab->root, readonly_dynrelocs, info);
067653c5
AM
3734
3735 if ((info->flags & DF_TEXTREL) != 0)
3736 {
3737 if (! add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 3738 return FALSE;
067653c5 3739 }
37c644f2 3740 }
7a2b07ff
NS
3741 if (htab->vxworks_p
3742 && !elf_vxworks_add_dynamic_entries (output_bfd, info))
3743 return FALSE;
37c644f2 3744 }
dc810e39 3745#undef add_dynamic_entry
37c644f2 3746
b34976b6 3747 return TRUE;
37c644f2 3748}
37c644f2 3749\f
8e45593f 3750/* Add a dynamic relocation to the SRELOC section. */
37c644f2 3751
8e45593f
NC
3752inline static bfd_vma
3753sh_elf_add_dyn_reloc (bfd *output_bfd, asection *sreloc, bfd_vma offset,
3754 int reloc_type, long dynindx, bfd_vma addend)
37c644f2 3755{
8e45593f
NC
3756 Elf_Internal_Rela outrel;
3757 bfd_vma reloc_offset;
37c644f2 3758
8e45593f
NC
3759 outrel.r_offset = offset;
3760 outrel.r_info = ELF32_R_INFO (dynindx, reloc_type);
3761 outrel.r_addend = addend;
0ffa91dd 3762
8e45593f
NC
3763 reloc_offset = sreloc->reloc_count * sizeof (Elf32_External_Rela);
3764 BFD_ASSERT (reloc_offset < sreloc->size);
3765 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
3766 sreloc->contents + reloc_offset);
3767 sreloc->reloc_count++;
37c644f2 3768
8e45593f
NC
3769 return reloc_offset;
3770}
37c644f2 3771
8e45593f 3772/* Add an FDPIC read-only fixup. */
37c644f2 3773
8e45593f
NC
3774inline static void
3775sh_elf_add_rofixup (bfd *output_bfd, asection *srofixup, bfd_vma offset)
3776{
3777 bfd_vma fixup_offset;
3778
3779 fixup_offset = srofixup->reloc_count++ * 4;
3780 BFD_ASSERT (fixup_offset < srofixup->size);
3781 bfd_put_32 (output_bfd, offset, srofixup->contents + fixup_offset);
3782}
3783
3784/* Return the offset of the generated .got section from the
3785 _GLOBAL_OFFSET_TABLE_ symbol. */
3786
3787static bfd_signed_vma
3788sh_elf_got_offset (struct elf_sh_link_hash_table *htab)
3789{
3790 return (htab->sgot->output_offset - htab->sgotplt->output_offset
3791 - htab->root.hgot->root.u.def.value);
3792}
3793
3794/* Find the segment number in which OSEC, and output section, is
3795 located. */
3796
3797static unsigned
3798sh_elf_osec_to_segment (bfd *output_bfd, asection *osec)
3799{
3800 Elf_Internal_Phdr *p = _bfd_elf_find_segment_containing_section (output_bfd,
3801 osec);
3802
3803 /* FIXME: Nothing ever says what this index is relative to. The kernel
3804 supplies data in terms of the number of load segments but this is
3805 a phdr index and the first phdr may not be a load segment. */
3806 return (p != NULL) ? p - elf_tdata (output_bfd)->phdr : -1;
3807}
3808
3809static bfd_boolean
3810sh_elf_osec_readonly_p (bfd *output_bfd, asection *osec)
3811{
3812 unsigned seg = sh_elf_osec_to_segment (output_bfd, osec);
3813
3814 return ! (elf_tdata (output_bfd)->phdr[seg].p_flags & PF_W);
3815}
3816
3817/* Generate the initial contents of a local function descriptor, along
3818 with any relocations or fixups required. */
3819static bfd_boolean
3820sh_elf_initialize_funcdesc (bfd *output_bfd,
3821 struct bfd_link_info *info,
3822 struct elf_link_hash_entry *h,
3823 bfd_vma offset,
3824 asection *section,
3825 bfd_vma value)
3826{
3827 struct elf_sh_link_hash_table *htab;
3828 int dynindx;
3829 bfd_vma addr, seg;
3830
3831 htab = sh_elf_hash_table (info);
3832
3833 /* FIXME: The ABI says that the offset to the function goes in the
3834 descriptor, along with the segment index. We're RELA, so it could
3835 go in the reloc instead... */
3836
3837 if (h != NULL && SYMBOL_CALLS_LOCAL (info, h))
3838 {
3839 section = h->root.u.def.section;
3840 value = h->root.u.def.value;
3841 }
3842
3843 if (h == NULL || SYMBOL_CALLS_LOCAL (info, h))
3844 {
3845 dynindx = elf_section_data (section->output_section)->dynindx;
3846 addr = value + section->output_offset;
3847 seg = sh_elf_osec_to_segment (output_bfd, section->output_section);
3848 }
3849 else
3850 {
3851 BFD_ASSERT (h->dynindx != -1);
3852 dynindx = h->dynindx;
3853 addr = seg = 0;
3854 }
3855
3856 if (!info->shared && SYMBOL_CALLS_LOCAL (info, h))
3857 {
3858 if (h == NULL || h->root.type != bfd_link_hash_undefweak)
3859 {
3860 sh_elf_add_rofixup (output_bfd, htab->srofixup,
3861 offset
3862 + htab->sfuncdesc->output_section->vma
3863 + htab->sfuncdesc->output_offset);
3864 sh_elf_add_rofixup (output_bfd, htab->srofixup,
3865 offset + 4
3866 + htab->sfuncdesc->output_section->vma
3867 + htab->sfuncdesc->output_offset);
3868 }
3869
3870 /* There are no dynamic relocations so fill in the final
3871 address and gp value (barring fixups). */
3872 addr += section->output_section->vma;
3873 seg = htab->root.hgot->root.u.def.value
3874 + htab->root.hgot->root.u.def.section->output_section->vma
3875 + htab->root.hgot->root.u.def.section->output_offset;
3876 }
3877 else
3878 sh_elf_add_dyn_reloc (output_bfd, htab->srelfuncdesc,
3879 offset
3880 + htab->sfuncdesc->output_section->vma
3881 + htab->sfuncdesc->output_offset,
3882 R_SH_FUNCDESC_VALUE, dynindx, 0);
3883
3884 bfd_put_32 (output_bfd, addr, htab->sfuncdesc->contents + offset);
3885 bfd_put_32 (output_bfd, seg, htab->sfuncdesc->contents + offset + 4);
3886
3887 return TRUE;
3888}
3889
3890/* Install a 20-bit movi20 field starting at ADDR, which occurs in OUTPUT_BFD.
3891 VALUE is the field's value. Return bfd_reloc_ok if successful or an error
3892 otherwise. */
3893
3894static bfd_reloc_status_type
3895install_movi20_field (bfd *output_bfd, unsigned long relocation,
3896 bfd *input_bfd, asection *input_section,
3897 bfd_byte *contents, bfd_vma offset)
3898{
3899 unsigned long cur_val;
3900 bfd_byte *addr;
3901 bfd_reloc_status_type r;
3902
3903 if (offset > bfd_get_section_limit (input_bfd, input_section))
3904 return bfd_reloc_outofrange;
3905
3906 r = bfd_check_overflow (complain_overflow_signed, 20, 0,
3907 bfd_arch_bits_per_address (input_bfd), relocation);
3908 if (r != bfd_reloc_ok)
3909 return r;
3910
3911 addr = contents + offset;
3912 cur_val = bfd_get_16 (output_bfd, addr);
3913 bfd_put_16 (output_bfd, cur_val | ((relocation & 0xf0000) >> 12), addr);
3914 bfd_put_16 (output_bfd, relocation & 0xffff, addr + 2);
3915
3916 return bfd_reloc_ok;
3917}
3918
3919/* Relocate an SH ELF section. */
3920
3921static bfd_boolean
3922sh_elf_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
3923 bfd *input_bfd, asection *input_section,
3924 bfd_byte *contents, Elf_Internal_Rela *relocs,
3925 Elf_Internal_Sym *local_syms,
3926 asection **local_sections)
3927{
3928 struct elf_sh_link_hash_table *htab;
3929 Elf_Internal_Shdr *symtab_hdr;
3930 struct elf_link_hash_entry **sym_hashes;
3931 Elf_Internal_Rela *rel, *relend;
e0af1f53 3932 bfd *dynobj = NULL;
8e45593f 3933 bfd_vma *local_got_offsets;
e0af1f53
MR
3934 asection *sgot = NULL;
3935 asection *sgotplt = NULL;
3936 asection *splt = NULL;
3937 asection *sreloc = NULL;
3938 asection *srelgot = NULL;
8e45593f
NC
3939 bfd_boolean is_vxworks_tls;
3940 unsigned isec_segment, got_segment, plt_segment, check_segment[2];
e0af1f53 3941 bfd_boolean fdpic_p = FALSE;
8e45593f
NC
3942
3943 BFD_ASSERT (is_sh_elf (input_bfd));
3944
3945 htab = sh_elf_hash_table (info);
e0af1f53
MR
3946 if (htab != NULL)
3947 {
3948 dynobj = htab->root.dynobj;
3949 sgot = htab->sgot;
3950 sgotplt = htab->sgotplt;
3951 splt = htab->splt;
3952 fdpic_p = htab->fdpic_p;
3953 }
8e45593f
NC
3954 symtab_hdr = &elf_symtab_hdr (input_bfd);
3955 sym_hashes = elf_sym_hashes (input_bfd);
8e45593f
NC
3956 local_got_offsets = elf_local_got_offsets (input_bfd);
3957
3958 isec_segment = sh_elf_osec_to_segment (output_bfd,
3959 input_section->output_section);
e0af1f53 3960 if (fdpic_p && sgot)
8e45593f 3961 got_segment = sh_elf_osec_to_segment (output_bfd,
e0af1f53 3962 sgot->output_section);
8e45593f
NC
3963 else
3964 got_segment = -1;
e0af1f53 3965 if (fdpic_p && splt)
8e45593f 3966 plt_segment = sh_elf_osec_to_segment (output_bfd,
e0af1f53 3967 splt->output_section);
8e45593f
NC
3968 else
3969 plt_segment = -1;
3970
8e45593f
NC
3971 /* We have to handle relocations in vxworks .tls_vars sections
3972 specially, because the dynamic loader is 'weird'. */
e0af1f53 3973 is_vxworks_tls = (htab && htab->vxworks_p && info->shared
8e45593f
NC
3974 && !strcmp (input_section->output_section->name,
3975 ".tls_vars"));
3976
3977 rel = relocs;
3978 relend = relocs + input_section->reloc_count;
3979 for (; rel < relend; rel++)
3980 {
3981 int r_type;
3982 reloc_howto_type *howto;
3983 unsigned long r_symndx;
3984 Elf_Internal_Sym *sym;
3985 asection *sec;
3986 struct elf_link_hash_entry *h;
3987 bfd_vma relocation;
3988 bfd_vma addend = (bfd_vma) 0;
3989 bfd_reloc_status_type r;
3990 int seen_stt_datalabel = 0;
3991 bfd_vma off;
3992 int got_type;
3993 const char *symname = NULL;
3994
3995 r_symndx = ELF32_R_SYM (rel->r_info);
37c644f2 3996
37c644f2
AO
3997 r_type = ELF32_R_TYPE (rel->r_info);
3998
3999 /* Many of the relocs are only used for relaxing, and are
067653c5 4000 handled entirely by the relaxation code. */
d38eb334
DD
4001 if (r_type >= (int) R_SH_GNU_VTINHERIT
4002 && r_type <= (int) R_SH_LABEL)
37c644f2 4003 continue;
c5aeb40f
AO
4004 if (r_type == (int) R_SH_NONE)
4005 continue;
37c644f2
AO
4006
4007 if (r_type < 0
4008 || r_type >= R_SH_max
4009 || (r_type >= (int) R_SH_FIRST_INVALID_RELOC
06bb75c1 4010 && r_type <= (int) R_SH_LAST_INVALID_RELOC)
8e45593f
NC
4011 || (r_type >= (int) R_SH_FIRST_INVALID_RELOC_2
4012 && r_type <= (int) R_SH_LAST_INVALID_RELOC_2)
fbca6ad9
AO
4013 || ( r_type >= (int) R_SH_FIRST_INVALID_RELOC_3
4014 && r_type <= (int) R_SH_LAST_INVALID_RELOC_3)
4015 || ( r_type >= (int) R_SH_FIRST_INVALID_RELOC_4
4016 && r_type <= (int) R_SH_LAST_INVALID_RELOC_4)
3376eaf5
KK
4017 || ( r_type >= (int) R_SH_FIRST_INVALID_RELOC_5
4018 && r_type <= (int) R_SH_LAST_INVALID_RELOC_5)
8e45593f
NC
4019 || ( r_type >= (int) R_SH_FIRST_INVALID_RELOC_6
4020 && r_type <= (int) R_SH_LAST_INVALID_RELOC_6))
37c644f2
AO
4021 {
4022 bfd_set_error (bfd_error_bad_value);
b34976b6 4023 return FALSE;
37c644f2
AO
4024 }
4025
55e6e397 4026 howto = get_howto_table (output_bfd) + r_type;
37c644f2 4027
146be91a 4028 /* For relocs that aren't partial_inplace, we get the addend from
067653c5 4029 the relocation. */
146be91a
HPN
4030 if (! howto->partial_inplace)
4031 addend = rel->r_addend;
4032
37c644f2
AO
4033 h = NULL;
4034 sym = NULL;
4035 sec = NULL;
8e45593f
NC
4036 check_segment[0] = -1;
4037 check_segment[1] = -1;
37c644f2
AO
4038 if (r_symndx < symtab_hdr->sh_info)
4039 {
4040 sym = local_syms + r_symndx;
4041 sec = local_sections[r_symndx];
8e45593f
NC
4042
4043 symname = bfd_elf_string_from_elf_section
4044 (input_bfd, symtab_hdr->sh_link, sym->st_name);
4045 if (symname == NULL || *symname == '\0')
4046 symname = bfd_section_name (input_bfd, sec);
4047
37c644f2
AO
4048 relocation = (sec->output_section->vma
4049 + sec->output_offset
4050 + sym->st_value);
fbca6ad9
AO
4051 /* A local symbol never has STO_SH5_ISA32, so we don't need
4052 datalabel processing here. Make sure this does not change
4053 without notice. */
4054 if ((sym->st_other & STO_SH5_ISA32) != 0)
4055 ((*info->callbacks->reloc_dangerous)
4056 (info,
4057 _("Unexpected STO_SH5_ISA32 on local symbol is not handled"),
4058 input_bfd, input_section, rel->r_offset));
ab96bf03
AM
4059
4060 if (sec != NULL && elf_discarded_section (sec))
4061 /* Handled below. */
4062 ;
4063 else if (info->relocatable)
8a3975e6 4064 {
1049f94e 4065 /* This is a relocatable link. We don't have to change
8a3975e6
AO
4066 anything, unless the reloc is against a section symbol,
4067 in which case we have to adjust according to where the
4068 section symbol winds up in the output section. */
8a3975e6 4069 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
146be91a
HPN
4070 {
4071 if (! howto->partial_inplace)
4072 {
4073 /* For relocations with the addend in the
4074 relocation, we need just to update the addend.
4075 All real relocs are of type partial_inplace; this
4076 code is mostly for completeness. */
ab96bf03 4077 rel->r_addend += sec->output_offset;
146be91a
HPN
4078
4079 continue;
4080 }
4081
4082 /* Relocs of type partial_inplace need to pick up the
4083 contents in the contents and add the offset resulting
4084 from the changed location of the section symbol.
4085 Using _bfd_final_link_relocate (e.g. goto
4086 final_link_relocate) here would be wrong, because
4087 relocations marked pc_relative would get the current
4088 location subtracted, and we must only do that at the
4089 final link. */
4090 r = _bfd_relocate_contents (howto, input_bfd,
4091 sec->output_offset
4092 + sym->st_value,
4093 contents + rel->r_offset);
4094 goto relocation_done;
4095 }
8a3975e6
AO
4096
4097 continue;
4098 }
f8df10f4
JJ
4099 else if (! howto->partial_inplace)
4100 {
8517fae7 4101 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
f8df10f4
JJ
4102 addend = rel->r_addend;
4103 }
4104 else if ((sec->flags & SEC_MERGE)
4105 && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4106 {
4107 asection *msec;
4108
4109 if (howto->rightshift || howto->src_mask != 0xffffffff)
4110 {
4111 (*_bfd_error_handler)
d003868e
AM
4112 (_("%B(%A+0x%lx): %s relocation against SEC_MERGE section"),
4113 input_bfd, input_section,
f8df10f4 4114 (long) rel->r_offset, howto->name);
b34976b6 4115 return FALSE;
f8df10f4
JJ
4116 }
4117
067653c5
AM
4118 addend = bfd_get_32 (input_bfd, contents + rel->r_offset);
4119 msec = sec;
4120 addend =
c629eae0 4121 _bfd_elf_rel_local_sym (output_bfd, sym, &msec, addend)
f8df10f4
JJ
4122 - relocation;
4123 addend += msec->output_section->vma + msec->output_offset;
4124 bfd_put_32 (input_bfd, addend, contents + rel->r_offset);
4125 addend = 0;
4126 }
37c644f2
AO
4127 }
4128 else
4129 {
560e09e9
NC
4130 /* FIXME: Ought to make use of the RELOC_FOR_GLOBAL_SYMBOL macro. */
4131
ab96bf03 4132 relocation = 0;
37c644f2 4133 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
8e45593f 4134 symname = h->root.root.string;
37c644f2
AO
4135 while (h->root.type == bfd_link_hash_indirect
4136 || h->root.type == bfd_link_hash_warning)
fbca6ad9
AO
4137 {
4138#ifdef INCLUDE_SHMEDIA
4139 /* If the reference passes a symbol marked with
4140 STT_DATALABEL, then any STO_SH5_ISA32 on the final value
4141 doesn't count. */
4142 seen_stt_datalabel |= h->type == STT_DATALABEL;
4143#endif
4144 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4145 }
37c644f2
AO
4146 if (h->root.type == bfd_link_hash_defined
4147 || h->root.type == bfd_link_hash_defweak)
4148 {
b34976b6 4149 bfd_boolean dyn;
067653c5 4150
e0af1f53 4151 dyn = htab ? htab->root.dynamic_sections_created : FALSE;
37c644f2
AO
4152 sec = h->root.u.def.section;
4153 /* In these cases, we don't need the relocation value.
4154 We check specially because in some obscure cases
435b1e90 4155 sec->output_section will be NULL. */
37c644f2 4156 if (r_type == R_SH_GOTPC
fbca6ad9
AO
4157 || r_type == R_SH_GOTPC_LOW16
4158 || r_type == R_SH_GOTPC_MEDLOW16
4159 || r_type == R_SH_GOTPC_MEDHI16
4160 || r_type == R_SH_GOTPC_HI16
4161 || ((r_type == R_SH_PLT32
4162 || r_type == R_SH_PLT_LOW16
4163 || r_type == R_SH_PLT_MEDLOW16
4164 || r_type == R_SH_PLT_MEDHI16
4165 || r_type == R_SH_PLT_HI16)
37c644f2 4166 && h->plt.offset != (bfd_vma) -1)
fbca6ad9 4167 || ((r_type == R_SH_GOT32
8e45593f
NC
4168 || r_type == R_SH_GOT20
4169 || r_type == R_SH_GOTFUNCDESC
4170 || r_type == R_SH_GOTFUNCDESC20
4171 || r_type == R_SH_GOTOFFFUNCDESC
4172 || r_type == R_SH_GOTOFFFUNCDESC20
4173 || r_type == R_SH_FUNCDESC
fbca6ad9
AO
4174 || r_type == R_SH_GOT_LOW16
4175 || r_type == R_SH_GOT_MEDLOW16
4176 || r_type == R_SH_GOT_MEDHI16
4177 || r_type == R_SH_GOT_HI16)
267fb3c1 4178 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
37c644f2
AO
4179 && (! info->shared
4180 || (! info->symbolic && h->dynindx != -1)
f5385ebf 4181 || !h->def_regular))
37c644f2
AO
4182 /* The cases above are those in which relocation is
4183 overwritten in the switch block below. The cases
4184 below are those in which we must defer relocation
4185 to run-time, because we can't resolve absolute
4186 addresses when creating a shared library. */
4187 || (info->shared
4188 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 4189 || !h->def_regular)
37c644f2 4190 && ((r_type == R_SH_DIR32
f5385ebf 4191 && !h->forced_local)
f50ad433
KK
4192 || (r_type == R_SH_REL32
4193 && !SYMBOL_CALLS_LOCAL (info, h)))
37c644f2
AO
4194 && ((input_section->flags & SEC_ALLOC) != 0
4195 /* DWARF will emit R_SH_DIR32 relocations in its
4196 sections against symbols defined externally
4197 in shared libraries. We can't do anything
4198 with them here. */
067653c5 4199 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 4200 && h->def_dynamic)))
1448fa32
KK
4201 /* Dynamic relocs are not propagated for SEC_DEBUGGING
4202 sections because such sections are not SEC_ALLOC and
4203 thus ld.so will not process them. */
4204 || (sec->output_section == NULL
4205 && ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 4206 && h->def_dynamic))
3376eaf5 4207 || (sec->output_section == NULL
8e45593f
NC
4208 && (sh_elf_hash_entry (h)->got_type == GOT_TLS_IE
4209 || sh_elf_hash_entry (h)->got_type == GOT_TLS_GD)))
ab96bf03
AM
4210 ;
4211 else if (sec->output_section != NULL)
4212 relocation = ((h->root.u.def.value
4213 + sec->output_section->vma
4214 + sec->output_offset)
4215 /* A STO_SH5_ISA32 causes a "bitor 1" to the
4216 symbol value, unless we've seen
4217 STT_DATALABEL on the way to it. */
4218 | ((h->other & STO_SH5_ISA32) != 0
4219 && ! seen_stt_datalabel));
4220 else if (!info->relocatable)
37c644f2
AO
4221 {
4222 (*_bfd_error_handler)
843fe662
L
4223 (_("%B(%A+0x%lx): unresolvable %s relocation against symbol `%s'"),
4224 input_bfd,
4225 input_section,
4226 (long) rel->r_offset,
4227 howto->name,
4228 h->root.root.string);
b34976b6 4229 return FALSE;
37c644f2 4230 }
37c644f2
AO
4231 }
4232 else if (h->root.type == bfd_link_hash_undefweak)
ab96bf03 4233 ;
59c2e50f 4234 else if (info->unresolved_syms_in_objects == RM_IGNORE
067653c5 4235 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
ab96bf03
AM
4236 ;
4237 else if (!info->relocatable)
37c644f2 4238 {
560e09e9
NC
4239 if (! info->callbacks->undefined_symbol
4240 (info, h->root.root.string, input_bfd,
4241 input_section, rel->r_offset,
59c2e50f 4242 (info->unresolved_syms_in_objects == RM_GENERATE_ERROR
560e09e9 4243 || ELF_ST_VISIBILITY (h->other))))
b34976b6 4244 return FALSE;
37c644f2
AO
4245 }
4246 }
4247
ab96bf03
AM
4248 if (sec != NULL && elf_discarded_section (sec))
4249 {
4250 /* For relocs against symbols from removed linkonce sections,
4251 or sections discarded by a linker script, we just want the
4252 section contents zeroed. Avoid any special processing. */
4253 _bfd_clear_contents (howto, input_bfd, contents + rel->r_offset);
4254 rel->r_info = 0;
4255 rel->r_addend = 0;
4256 continue;
4257 }
4258
4259 if (info->relocatable)
4260 continue;
4261
8e45593f
NC
4262 /* Check for inter-segment relocations in FDPIC files. Most
4263 relocations connect the relocation site to the location of
4264 the target symbol, but there are some exceptions below. */
4265 check_segment[0] = isec_segment;
4266 if (sec != NULL)
4267 check_segment[1] = sh_elf_osec_to_segment (output_bfd,
4268 sec->output_section);
4269 else
4270 check_segment[1] = -1;
4271
435b1e90 4272 switch ((int) r_type)
37c644f2
AO
4273 {
4274 final_link_relocate:
4275 /* COFF relocs don't use the addend. The addend is used for
435b1e90 4276 R_SH_DIR32 to be compatible with other compilers. */
37c644f2
AO
4277 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
4278 contents, rel->r_offset,
4279 relocation, addend);
4280 break;
4281
4282 case R_SH_IND12W:
cd6ec716
DD
4283 goto final_link_relocate;
4284
37c644f2
AO
4285 case R_SH_DIR8WPN:
4286 case R_SH_DIR8WPZ:
4287 case R_SH_DIR8WPL:
cd6ec716
DD
4288 /* If the reloc is against the start of this section, then
4289 the assembler has already taken care of it and the reloc
4290 is here only to assist in relaxing. If the reloc is not
4291 against the start of this section, then it's against an
4292 external symbol and we must deal with it ourselves. */
4293 if (input_section->output_section->vma + input_section->output_offset
4294 != relocation)
4295 {
4296 int disp = (relocation
4297 - input_section->output_section->vma
4298 - input_section->output_offset
4299 - rel->r_offset);
4300 int mask = 0;
4301 switch (r_type)
4302 {
4303 case R_SH_DIR8WPN:
4304 case R_SH_DIR8WPZ: mask = 1; break;
4305 case R_SH_DIR8WPL: mask = 3; break;
4306 default: mask = 0; break;
4307 }
4308 if (disp & mask)
4309 {
4310 ((*_bfd_error_handler)
d003868e
AM
4311 (_("%B: 0x%lx: fatal: unaligned branch target for relax-support relocation"),
4312 input_section->owner,
cd6ec716
DD
4313 (unsigned long) rel->r_offset));
4314 bfd_set_error (bfd_error_bad_value);
b34976b6 4315 return FALSE;
cd6ec716
DD
4316 }
4317 relocation -= 4;
4318 goto final_link_relocate;
4319 }
4320 r = bfd_reloc_ok;
4321 break;
37c644f2
AO
4322
4323 default:
fbca6ad9
AO
4324#ifdef INCLUDE_SHMEDIA
4325 if (shmedia_prepare_reloc (info, input_bfd, input_section,
4326 contents, rel, &relocation))
4327 goto final_link_relocate;
4328#endif
37c644f2 4329 bfd_set_error (bfd_error_bad_value);
b34976b6 4330 return FALSE;
37c644f2 4331
d38eb334
DD
4332 case R_SH_DIR16:
4333 case R_SH_DIR8:
4334 case R_SH_DIR8U:
4335 case R_SH_DIR8S:
4336 case R_SH_DIR4U:
4337 goto final_link_relocate;
4338
4339 case R_SH_DIR8UL:
4340 case R_SH_DIR4UL:
4341 if (relocation & 3)
4342 {
4343 ((*_bfd_error_handler)
d003868e
AM
4344 (_("%B: 0x%lx: fatal: unaligned %s relocation 0x%lx"),
4345 input_section->owner,
d38eb334 4346 (unsigned long) rel->r_offset, howto->name,
d003868e 4347 (unsigned long) relocation));
d38eb334
DD
4348 bfd_set_error (bfd_error_bad_value);
4349 return FALSE;
4350 }
4351 goto final_link_relocate;
4352
4353 case R_SH_DIR8UW:
4354 case R_SH_DIR8SW:
4355 case R_SH_DIR4UW:
4356 if (relocation & 1)
4357 {
4358 ((*_bfd_error_handler)
d003868e
AM
4359 (_("%B: 0x%lx: fatal: unaligned %s relocation 0x%lx"),
4360 input_section->owner,
d38eb334 4361 (unsigned long) rel->r_offset, howto->name,
d003868e 4362 (unsigned long) relocation));
d38eb334
DD
4363 bfd_set_error (bfd_error_bad_value);
4364 return FALSE;
4365 }
4366 goto final_link_relocate;
4367
4368 case R_SH_PSHA:
4369 if ((signed int)relocation < -32
4370 || (signed int)relocation > 32)
4371 {
4372 ((*_bfd_error_handler)
d003868e
AM
4373 (_("%B: 0x%lx: fatal: R_SH_PSHA relocation %d not in range -32..32"),
4374 input_section->owner,
d38eb334 4375 (unsigned long) rel->r_offset,
d003868e 4376 (unsigned long) relocation));
d38eb334
DD
4377 bfd_set_error (bfd_error_bad_value);
4378 return FALSE;
4379 }
4380 goto final_link_relocate;
4381
4382 case R_SH_PSHL:
4383 if ((signed int)relocation < -16
4384 || (signed int)relocation > 16)
4385 {
4386 ((*_bfd_error_handler)
d003868e
AM
4387 (_("%B: 0x%lx: fatal: R_SH_PSHL relocation %d not in range -32..32"),
4388 input_section->owner,
d38eb334 4389 (unsigned long) rel->r_offset,
d003868e 4390 (unsigned long) relocation));
d38eb334
DD
4391 bfd_set_error (bfd_error_bad_value);
4392 return FALSE;
4393 }
4394 goto final_link_relocate;
4395
37c644f2
AO
4396 case R_SH_DIR32:
4397 case R_SH_REL32:
46e993b9
KK
4398#ifdef INCLUDE_SHMEDIA
4399 case R_SH_IMM_LOW16_PCREL:
4400 case R_SH_IMM_MEDLOW16_PCREL:
4401 case R_SH_IMM_MEDHI16_PCREL:
4402 case R_SH_IMM_HI16_PCREL:
4403#endif
37c644f2 4404 if (info->shared
04e534c3
KK
4405 && (h == NULL
4406 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
4407 || h->root.type != bfd_link_hash_undefweak)
ec338859 4408 && r_symndx != 0
37c644f2 4409 && (input_section->flags & SEC_ALLOC) != 0
3348747a 4410 && !is_vxworks_tls
46e993b9 4411 && (r_type == R_SH_DIR32
3d85aebe 4412 || !SYMBOL_CALLS_LOCAL (info, h)))
37c644f2
AO
4413 {
4414 Elf_Internal_Rela outrel;
947216bf 4415 bfd_byte *loc;
b34976b6 4416 bfd_boolean skip, relocate;
37c644f2
AO
4417
4418 /* When generating a shared object, these relocations
4419 are copied into the output file to be resolved at run
4420 time. */
4421
4422 if (sreloc == NULL)
4423 {
83bac4b0
NC
4424 sreloc = _bfd_elf_get_dynamic_reloc_section
4425 (input_bfd, input_section, /*rela?*/ TRUE);
4426 if (sreloc == NULL)
b34976b6 4427 return FALSE;
37c644f2
AO
4428 }
4429
b34976b6
AM
4430 skip = FALSE;
4431 relocate = FALSE;
37c644f2 4432
c629eae0
JJ
4433 outrel.r_offset =
4434 _bfd_elf_section_offset (output_bfd, info, input_section,
4435 rel->r_offset);
4436 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 4437 skip = TRUE;
0bb2d96a 4438 else if (outrel.r_offset == (bfd_vma) -2)
b34976b6 4439 skip = TRUE, relocate = TRUE;
37c644f2
AO
4440 outrel.r_offset += (input_section->output_section->vma
4441 + input_section->output_offset);
4442
4443 if (skip)
0bb2d96a 4444 memset (&outrel, 0, sizeof outrel);
37c644f2
AO
4445 else if (r_type == R_SH_REL32)
4446 {
4447 BFD_ASSERT (h != NULL && h->dynindx != -1);
37c644f2 4448 outrel.r_info = ELF32_R_INFO (h->dynindx, R_SH_REL32);
146be91a 4449 outrel.r_addend
55e6e397
RS
4450 = (howto->partial_inplace
4451 ? bfd_get_32 (input_bfd, contents + rel->r_offset)
4452 : addend);
37c644f2 4453 }
46e993b9
KK
4454#ifdef INCLUDE_SHMEDIA
4455 else if (r_type == R_SH_IMM_LOW16_PCREL
4456 || r_type == R_SH_IMM_MEDLOW16_PCREL
4457 || r_type == R_SH_IMM_MEDHI16_PCREL
4458 || r_type == R_SH_IMM_HI16_PCREL)
4459 {
4460 BFD_ASSERT (h != NULL && h->dynindx != -1);
4461 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
4462 outrel.r_addend = addend;
4463 }
4464#endif
e0af1f53 4465 else if (fdpic_p
8e45593f
NC
4466 && (h == NULL
4467 || ((info->symbolic || h->dynindx == -1)
4468 && h->def_regular)))
4469 {
4470 int dynindx;
4471
4472 BFD_ASSERT (sec != NULL);
4473 BFD_ASSERT (sec->output_section != NULL);
4474 dynindx = elf_section_data (sec->output_section)->dynindx;
4475 outrel.r_info = ELF32_R_INFO (dynindx, R_SH_DIR32);
4476 outrel.r_addend = relocation;
4477 outrel.r_addend
4478 += (howto->partial_inplace
4479 ? bfd_get_32 (input_bfd, contents + rel->r_offset)
4480 : addend);
4481 outrel.r_addend -= sec->output_section->vma;
4482 }
37c644f2
AO
4483 else
4484 {
4485 /* h->dynindx may be -1 if this symbol was marked to
4486 become local. */
4487 if (h == NULL
4488 || ((info->symbolic || h->dynindx == -1)
f5385ebf 4489 && h->def_regular))
37c644f2 4490 {
55e6e397 4491 relocate = howto->partial_inplace;
37c644f2 4492 outrel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
37c644f2
AO
4493 }
4494 else
4495 {
4496 BFD_ASSERT (h->dynindx != -1);
37c644f2 4497 outrel.r_info = ELF32_R_INFO (h->dynindx, R_SH_DIR32);
37c644f2 4498 }
55e6e397
RS
4499 outrel.r_addend = relocation;
4500 outrel.r_addend
4501 += (howto->partial_inplace
4502 ? bfd_get_32 (input_bfd, contents + rel->r_offset)
4503 : addend);
37c644f2
AO
4504 }
4505
947216bf
AM
4506 loc = sreloc->contents;
4507 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
4508 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
37c644f2 4509
8e45593f
NC
4510 check_segment[0] = check_segment[1] = -1;
4511
37c644f2
AO
4512 /* If this reloc is against an external symbol, we do
4513 not want to fiddle with the addend. Otherwise, we
4514 need to include the symbol value so that it becomes
4515 an addend for the dynamic reloc. */
4516 if (! relocate)
4517 continue;
4518 }
e0af1f53 4519 else if (fdpic_p && !info->shared
8e45593f
NC
4520 && r_type == R_SH_DIR32
4521 && (input_section->flags & SEC_ALLOC) != 0)
4522 {
4523 bfd_vma offset;
4524
e0af1f53
MR
4525 BFD_ASSERT (htab);
4526
8e45593f
NC
4527 if (sh_elf_osec_readonly_p (output_bfd,
4528 input_section->output_section))
4529 {
4530 (*_bfd_error_handler)
4531 (_("%B(%A+0x%lx): cannot emit fixup to `%s' in read-only section"),
4532 input_bfd,
4533 input_section,
4534 (long) rel->r_offset,
4535 symname);
4536 return FALSE;
4537 }
4538
4539 offset = _bfd_elf_section_offset (output_bfd, info,
4540 input_section, rel->r_offset);
4541 if (offset != (bfd_vma)-1)
4542 sh_elf_add_rofixup (output_bfd, htab->srofixup,
4543 input_section->output_section->vma
4544 + input_section->output_offset
4545 + rel->r_offset);
4546
4547 check_segment[0] = check_segment[1] = -1;
4548 }
37c644f2
AO
4549 goto final_link_relocate;
4550
fbca6ad9
AO
4551 case R_SH_GOTPLT32:
4552#ifdef INCLUDE_SHMEDIA
4553 case R_SH_GOTPLT_LOW16:
4554 case R_SH_GOTPLT_MEDLOW16:
4555 case R_SH_GOTPLT_MEDHI16:
4556 case R_SH_GOTPLT_HI16:
4557 case R_SH_GOTPLT10BY4:
4558 case R_SH_GOTPLT10BY8:
4559#endif
4560 /* Relocation is to the entry for this symbol in the
4561 procedure linkage table. */
4562
4563 if (h == NULL
f5385ebf 4564 || h->forced_local
fbca6ad9
AO
4565 || ! info->shared
4566 || info->symbolic
4567 || h->dynindx == -1
4568 || h->plt.offset == (bfd_vma) -1
4569 || h->got.offset != (bfd_vma) -1)
4570 goto force_got;
4571
4572 /* Relocation is to the entry for this symbol in the global
4573 offset table extension for the procedure linkage table. */
fbca6ad9 4574
e0af1f53 4575 BFD_ASSERT (htab);
067653c5 4576 BFD_ASSERT (sgotplt != NULL);
fbca6ad9 4577 relocation = (sgotplt->output_offset
55e6e397
RS
4578 + (get_plt_index (htab->plt_info, h->plt.offset)
4579 + 3) * 4);
fbca6ad9
AO
4580
4581#ifdef GOT_BIAS
4582 relocation -= GOT_BIAS;
4583#endif
4584
4585 goto final_link_relocate;
4586
4587 force_got:
37c644f2 4588 case R_SH_GOT32:
8e45593f 4589 case R_SH_GOT20:
fbca6ad9
AO
4590#ifdef INCLUDE_SHMEDIA
4591 case R_SH_GOT_LOW16:
4592 case R_SH_GOT_MEDLOW16:
4593 case R_SH_GOT_MEDHI16:
4594 case R_SH_GOT_HI16:
4595 case R_SH_GOT10BY4:
4596 case R_SH_GOT10BY8:
4597#endif
37c644f2
AO
4598 /* Relocation is to the entry for this symbol in the global
4599 offset table. */
067653c5 4600
e0af1f53 4601 BFD_ASSERT (htab);
067653c5 4602 BFD_ASSERT (sgot != NULL);
8e45593f 4603 check_segment[0] = check_segment[1] = -1;
37c644f2
AO
4604
4605 if (h != NULL)
4606 {
b34976b6 4607 bfd_boolean dyn;
37c644f2
AO
4608
4609 off = h->got.offset;
fbca6ad9
AO
4610#ifdef INCLUDE_SHMEDIA
4611 if (seen_stt_datalabel)
4612 {
4613 struct elf_sh_link_hash_entry *hsh;
4614
4615 hsh = (struct elf_sh_link_hash_entry *)h;
396a6083 4616 off = hsh->datalabel_got.offset;
fbca6ad9
AO
4617 }
4618#endif
37c644f2
AO
4619 BFD_ASSERT (off != (bfd_vma) -1);
4620
067653c5 4621 dyn = htab->root.dynamic_sections_created;
267fb3c1 4622 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
37c644f2 4623 || (info->shared
3d85aebe 4624 && SYMBOL_REFERENCES_LOCAL (info, h))
04e534c3
KK
4625 || (ELF_ST_VISIBILITY (h->other)
4626 && h->root.type == bfd_link_hash_undefweak))
37c644f2
AO
4627 {
4628 /* This is actually a static link, or it is a
4629 -Bsymbolic link and the symbol is defined
4630 locally, or the symbol was forced to be local
4631 because of a version file. We must initialize
4632 this entry in the global offset table. Since the
4633 offset must always be a multiple of 4, we use the
4634 least significant bit to record whether we have
4635 initialized it already.
4636
4637 When doing a dynamic link, we create a .rela.got
4638 relocation entry to initialize the value. This
4639 is done in the finish_dynamic_symbol routine. */
4640 if ((off & 1) != 0)
4641 off &= ~1;
4642 else
4643 {
4644 bfd_put_32 (output_bfd, relocation,
4645 sgot->contents + off);
fbca6ad9
AO
4646#ifdef INCLUDE_SHMEDIA
4647 if (seen_stt_datalabel)
4648 {
4649 struct elf_sh_link_hash_entry *hsh;
4650
4651 hsh = (struct elf_sh_link_hash_entry *)h;
396a6083 4652 hsh->datalabel_got.offset |= 1;
fbca6ad9
AO
4653 }
4654 else
4655#endif
4656 h->got.offset |= 1;
8e45593f
NC
4657
4658 /* If we initialize the GOT entry here with a valid
4659 symbol address, also add a fixup. */
e0af1f53 4660 if (fdpic_p && !info->shared
8e45593f
NC
4661 && sh_elf_hash_entry (h)->got_type == GOT_NORMAL
4662 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
4663 || h->root.type != bfd_link_hash_undefweak))
4664 sh_elf_add_rofixup (output_bfd, htab->srofixup,
4665 sgot->output_section->vma
4666 + sgot->output_offset
4667 + off);
37c644f2
AO
4668 }
4669 }
4670
8e45593f 4671 relocation = sh_elf_got_offset (htab) + off;
37c644f2
AO
4672 }
4673 else
4674 {
fbca6ad9
AO
4675#ifdef INCLUDE_SHMEDIA
4676 if (rel->r_addend)
4677 {
4678 BFD_ASSERT (local_got_offsets != NULL
4679 && (local_got_offsets[symtab_hdr->sh_info
4680 + r_symndx]
4681 != (bfd_vma) -1));
4682
4683 off = local_got_offsets[symtab_hdr->sh_info
4684 + r_symndx];
4685 }
4686 else
4687 {
4688#endif
37c644f2
AO
4689 BFD_ASSERT (local_got_offsets != NULL
4690 && local_got_offsets[r_symndx] != (bfd_vma) -1);
4691
4692 off = local_got_offsets[r_symndx];
fbca6ad9
AO
4693#ifdef INCLUDE_SHMEDIA
4694 }
4695#endif
37c644f2
AO
4696
4697 /* The offset must always be a multiple of 4. We use
4698 the least significant bit to record whether we have
4699 already generated the necessary reloc. */
4700 if ((off & 1) != 0)
4701 off &= ~1;
4702 else
4703 {
4704 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
4705
4706 if (info->shared)
4707 {
37c644f2 4708 Elf_Internal_Rela outrel;
947216bf 4709 bfd_byte *loc;
37c644f2 4710
3376eaf5
KK
4711 if (srelgot == NULL)
4712 {
4713 srelgot = bfd_get_section_by_name (dynobj,
4714 ".rela.got");
4715 BFD_ASSERT (srelgot != NULL);
4716 }
37c644f2
AO
4717
4718 outrel.r_offset = (sgot->output_section->vma
4719 + sgot->output_offset
4720 + off);
e0af1f53 4721 if (fdpic_p)
8e45593f
NC
4722 {
4723 int dynindx
4724 = elf_section_data (sec->output_section)->dynindx;
4725 outrel.r_info = ELF32_R_INFO (dynindx, R_SH_DIR32);
4726 outrel.r_addend = relocation;
4727 outrel.r_addend -= sec->output_section->vma;
4728 }
4729 else
4730 {
4731 outrel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
4732 outrel.r_addend = relocation;
4733 }
947216bf
AM
4734 loc = srelgot->contents;
4735 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
4736 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
37c644f2 4737 }
e0af1f53 4738 else if (fdpic_p
8e45593f
NC
4739 && (sh_elf_local_got_type (input_bfd) [r_symndx]
4740 == GOT_NORMAL))
4741 sh_elf_add_rofixup (output_bfd, htab->srofixup,
4742 sgot->output_section->vma
4743 + sgot->output_offset
4744 + off);
37c644f2 4745
fbca6ad9
AO
4746#ifdef INCLUDE_SHMEDIA
4747 if (rel->r_addend)
4748 local_got_offsets[symtab_hdr->sh_info + r_symndx] |= 1;
4749 else
4750#endif
4751 local_got_offsets[r_symndx] |= 1;
37c644f2
AO
4752 }
4753
8e45593f 4754 relocation = sh_elf_got_offset (htab) + off;
37c644f2
AO
4755 }
4756
fbca6ad9 4757#ifdef GOT_BIAS
067653c5 4758 relocation -= GOT_BIAS;
fbca6ad9
AO
4759#endif
4760
8e45593f
NC
4761 if (r_type == R_SH_GOT20)
4762 {
4763 r = install_movi20_field (output_bfd, relocation + addend,
4764 input_bfd, input_section, contents,
4765 rel->r_offset);
4766 break;
4767 }
4768 else
4769 goto final_link_relocate;
37c644f2
AO
4770
4771 case R_SH_GOTOFF:
8e45593f 4772 case R_SH_GOTOFF20:
fbca6ad9
AO
4773#ifdef INCLUDE_SHMEDIA
4774 case R_SH_GOTOFF_LOW16:
4775 case R_SH_GOTOFF_MEDLOW16:
4776 case R_SH_GOTOFF_MEDHI16:
4777 case R_SH_GOTOFF_HI16:
4778#endif
8e45593f
NC
4779 /* GOTOFF relocations are relative to _GLOBAL_OFFSET_TABLE_, which
4780 we place at the start of the .got.plt section. This is the same
4781 as the start of the output .got section, unless there are function
4782 descriptors in front of it. */
e0af1f53 4783 BFD_ASSERT (htab);
8e45593f
NC
4784 BFD_ASSERT (sgotplt != NULL);
4785 check_segment[0] = got_segment;
4786 relocation -= sgotplt->output_section->vma + sgotplt->output_offset
4787 + htab->root.hgot->root.u.def.value;
37c644f2 4788
fbca6ad9
AO
4789#ifdef GOT_BIAS
4790 relocation -= GOT_BIAS;
4791#endif
4792
4793 addend = rel->r_addend;
4794
8e45593f
NC
4795 if (r_type == R_SH_GOTOFF20)
4796 {
4797 r = install_movi20_field (output_bfd, relocation + addend,
4798 input_bfd, input_section, contents,
4799 rel->r_offset);
4800 break;
4801 }
4802 else
4803 goto final_link_relocate;
37c644f2
AO
4804
4805 case R_SH_GOTPC:
fbca6ad9
AO
4806#ifdef INCLUDE_SHMEDIA
4807 case R_SH_GOTPC_LOW16:
4808 case R_SH_GOTPC_MEDLOW16:
4809 case R_SH_GOTPC_MEDHI16:
4810 case R_SH_GOTPC_HI16:
4811#endif
37c644f2
AO
4812 /* Use global offset table as symbol value. */
4813
8e45593f
NC
4814 BFD_ASSERT (sgotplt != NULL);
4815 relocation = sgotplt->output_section->vma + sgotplt->output_offset;
37c644f2 4816
fbca6ad9
AO
4817#ifdef GOT_BIAS
4818 relocation += GOT_BIAS;
4819#endif
4820
4821 addend = rel->r_addend;
4822
37c644f2
AO
4823 goto final_link_relocate;
4824
4825 case R_SH_PLT32:
fbca6ad9
AO
4826#ifdef INCLUDE_SHMEDIA
4827 case R_SH_PLT_LOW16:
4828 case R_SH_PLT_MEDLOW16:
4829 case R_SH_PLT_MEDHI16:
4830 case R_SH_PLT_HI16:
4831#endif
37c644f2
AO
4832 /* Relocation is to the entry for this symbol in the
4833 procedure linkage table. */
4834
4835 /* Resolve a PLT reloc against a local symbol directly,
4836 without using the procedure linkage table. */
4837 if (h == NULL)
4838 goto final_link_relocate;
4839
8e45593f
NC
4840 /* We don't want to warn on calls to undefined weak symbols,
4841 as calls to them must be protected by non-NULL tests
4842 anyway, and unprotected calls would invoke undefined
4843 behavior. */
4844 if (h->root.type == bfd_link_hash_undefweak)
4845 check_segment[0] = check_segment[1] = -1;
4846
f5385ebf 4847 if (h->forced_local)
37c644f2
AO
4848 goto final_link_relocate;
4849
4850 if (h->plt.offset == (bfd_vma) -1)
4851 {
4852 /* We didn't make a PLT entry for this symbol. This
4853 happens when statically linking PIC code, or when
4854 using -Bsymbolic. */
4855 goto final_link_relocate;
4856 }
4857
067653c5 4858 BFD_ASSERT (splt != NULL);
8e45593f 4859 check_segment[1] = plt_segment;
37c644f2
AO
4860 relocation = (splt->output_section->vma
4861 + splt->output_offset
4862 + h->plt.offset);
4863
fbca6ad9
AO
4864#ifdef INCLUDE_SHMEDIA
4865 relocation++;
4866#endif
4867
4868 addend = rel->r_addend;
4869
37c644f2
AO
4870 goto final_link_relocate;
4871
8e45593f
NC
4872 /* Relocation is to the canonical function descriptor for this
4873 symbol, possibly via the GOT. Initialize the GOT
4874 entry and function descriptor if necessary. */
4875 case R_SH_GOTFUNCDESC:
4876 case R_SH_GOTFUNCDESC20:
4877 case R_SH_FUNCDESC:
4878 {
4879 int dynindx = -1;
4880 asection *reloc_section;
4881 bfd_vma reloc_offset;
4882 int reloc_type = R_SH_FUNCDESC;
4883
e0af1f53
MR
4884 BFD_ASSERT (htab);
4885
8e45593f
NC
4886 check_segment[0] = check_segment[1] = -1;
4887
4888 /* FIXME: See what FRV does for global symbols in the
4889 executable, with --export-dynamic. Do they need ld.so
4890 to allocate official descriptors? See what this code
4891 does. */
4892
4893 relocation = 0;
4894 addend = 0;
4895
4896 if (r_type == R_SH_FUNCDESC)
4897 {
4898 reloc_section = input_section;
4899 reloc_offset = rel->r_offset;
4900 }
4901 else
4902 {
e0af1f53 4903 reloc_section = sgot;
8e45593f
NC
4904
4905 if (h != NULL)
4906 reloc_offset = h->got.offset;
4907 else
4908 {
4909 BFD_ASSERT (local_got_offsets != NULL);
4910 reloc_offset = local_got_offsets[r_symndx];
4911 }
4912 BFD_ASSERT (reloc_offset != MINUS_ONE);
4913
4914 if (reloc_offset & 1)
4915 {
4916 reloc_offset &= ~1;
4917 goto funcdesc_done_got;
4918 }
4919 }
4920
4921 if (h && h->root.type == bfd_link_hash_undefweak
4922 && (SYMBOL_CALLS_LOCAL (info, h)
4923 || !htab->root.dynamic_sections_created))
4924 /* Undefined weak symbol which will not be dynamically
4925 resolved later; leave it at zero. */
4926 goto funcdesc_leave_zero;
4927 else if (SYMBOL_CALLS_LOCAL (info, h)
4928 && ! SYMBOL_FUNCDESC_LOCAL (info, h))
4929 {
4930 /* If the symbol needs a non-local function descriptor
4931 but binds locally (i.e., its visibility is
4932 protected), emit a dynamic relocation decayed to
4933 section+offset. This is an optimization; the dynamic
4934 linker would resolve our function descriptor request
4935 to our copy of the function anyway. */
4936 dynindx = elf_section_data (h->root.u.def.section
4937 ->output_section)->dynindx;
4938 relocation += h->root.u.def.section->output_offset
4939 + h->root.u.def.value;
4940 }
4941 else if (! SYMBOL_FUNCDESC_LOCAL (info, h))
4942 {
4943 /* If the symbol is dynamic and there will be dynamic
4944 symbol resolution because we are or are linked with a
4945 shared library, emit a FUNCDESC relocation such that
4946 the dynamic linker will allocate the function
4947 descriptor. */
4948 BFD_ASSERT (h->dynindx != -1);
4949 dynindx = h->dynindx;
4950 }
4951 else
4952 {
4953 bfd_vma offset;
4954
4955 /* Otherwise, we know we have a private function
4956 descriptor, so reference it directly. */
4957 reloc_type = R_SH_DIR32;
4958 dynindx = elf_section_data (htab->sfuncdesc
4959 ->output_section)->dynindx;
4960
4961 if (h)
4962 {
4963 offset = sh_elf_hash_entry (h)->funcdesc.offset;
4964 BFD_ASSERT (offset != MINUS_ONE);
4965 if ((offset & 1) == 0)
4966 {
4967 if (!sh_elf_initialize_funcdesc (output_bfd, info, h,
4968 offset, NULL, 0))
4969 return FALSE;
4970 sh_elf_hash_entry (h)->funcdesc.offset |= 1;
4971 }
4972 }
4973 else
4974 {
4975 union gotref *local_funcdesc;
4976
4977 local_funcdesc = sh_elf_local_funcdesc (input_bfd);
4978 offset = local_funcdesc[r_symndx].offset;
4979 BFD_ASSERT (offset != MINUS_ONE);
4980 if ((offset & 1) == 0)
4981 {
4982 if (!sh_elf_initialize_funcdesc (output_bfd, info, NULL,
4983 offset, sec,
4984 sym->st_value))
4985 return FALSE;
4986 local_funcdesc[r_symndx].offset |= 1;
4987 }
4988 }
4989
4990 relocation = htab->sfuncdesc->output_offset + (offset & ~1);
4991 }
4992
4993 if (!info->shared && SYMBOL_FUNCDESC_LOCAL (info, h))
4994 {
4995 bfd_vma offset;
4996
4997 if (sh_elf_osec_readonly_p (output_bfd,
4998 reloc_section->output_section))
4999 {
5000 (*_bfd_error_handler)
5001 (_("%B(%A+0x%lx): cannot emit fixup to `%s' in read-only section"),
5002 input_bfd,
5003 input_section,
5004 (long) rel->r_offset,
5005 symname);
5006 return FALSE;
5007 }
5008
5009 offset = _bfd_elf_section_offset (output_bfd, info,
5010 reloc_section, reloc_offset);
5011
5012 if (offset != (bfd_vma)-1)
5013 sh_elf_add_rofixup (output_bfd, htab->srofixup,
5014 offset
5015 + reloc_section->output_section->vma
5016 + reloc_section->output_offset);
5017 }
5018 else if ((reloc_section->output_section->flags
5019 & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
5020 {
5021 bfd_vma offset;
5022
5023 if (sh_elf_osec_readonly_p (output_bfd,
5024 reloc_section->output_section))
5025 {
5026 info->callbacks->warning
5027 (info,
5028 _("cannot emit dynamic relocations in read-only section"),
5029 symname, input_bfd, reloc_section, reloc_offset);
5030 return FALSE;
5031 }
5032
5033 if (srelgot == NULL)
5034 {
5035 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
5036 BFD_ASSERT (srelgot != NULL);
5037 }
5038
5039 offset = _bfd_elf_section_offset (output_bfd, info,
5040 reloc_section, reloc_offset);
5041
5042 if (offset != (bfd_vma)-1)
5043 sh_elf_add_dyn_reloc (output_bfd, srelgot,
5044 offset
5045 + reloc_section->output_section->vma
5046 + reloc_section->output_offset,
5047 reloc_type, dynindx, relocation);
5048
5049 if (r_type == R_SH_FUNCDESC)
5050 {
5051 r = bfd_reloc_ok;
5052 break;
5053 }
5054 else
5055 {
5056 relocation = 0;
5057 goto funcdesc_leave_zero;
5058 }
5059 }
5060
5061 if (SYMBOL_FUNCDESC_LOCAL (info, h))
5062 relocation += htab->sfuncdesc->output_section->vma;
5063 funcdesc_leave_zero:
5064 if (r_type != R_SH_FUNCDESC)
5065 {
5066 bfd_put_32 (output_bfd, relocation,
5067 reloc_section->contents + reloc_offset);
5068 if (h != NULL)
5069 h->got.offset |= 1;
5070 else
5071 local_got_offsets[r_symndx] |= 1;
5072
5073 funcdesc_done_got:
5074
5075 relocation = sh_elf_got_offset (htab) + reloc_offset;
5076#ifdef GOT_BIAS
5077 relocation -= GOT_BIAS;
5078#endif
5079 }
5080 if (r_type == R_SH_GOTFUNCDESC20)
5081 {
5082 r = install_movi20_field (output_bfd, relocation + addend,
5083 input_bfd, input_section, contents,
5084 rel->r_offset);
5085 break;
5086 }
5087 else
5088 goto final_link_relocate;
5089 }
5090 break;
5091
5092 case R_SH_GOTOFFFUNCDESC:
5093 case R_SH_GOTOFFFUNCDESC20:
5094 /* FIXME: See R_SH_FUNCDESC comment about global symbols in the
5095 executable and --export-dynamic. If such symbols get
5096 ld.so-allocated descriptors we can not use R_SH_GOTOFFFUNCDESC
5097 for them. */
e0af1f53 5098 BFD_ASSERT (htab);
8e45593f
NC
5099
5100 check_segment[0] = check_segment[1] = -1;
5101 relocation = 0;
5102 addend = rel->r_addend;
5103
5104 if (h && (h->root.type == bfd_link_hash_undefweak
5105 || !SYMBOL_FUNCDESC_LOCAL (info, h)))
5106 {
5107 _bfd_error_handler
5108 (_("%B(%A+0x%lx): %s relocation against external symbol \"%s\""),
5109 input_bfd, input_section, (long) rel->r_offset, howto->name,
5110 h->root.root.string);
5111 return FALSE;
5112 }
5113 else
5114 {
5115 bfd_vma offset;
5116
5117 /* Otherwise, we know we have a private function
5118 descriptor, so reference it directly. */
5119 if (h)
5120 {
5121 offset = sh_elf_hash_entry (h)->funcdesc.offset;
5122 BFD_ASSERT (offset != MINUS_ONE);
5123 if ((offset & 1) == 0)
5124 {
5125 if (!sh_elf_initialize_funcdesc (output_bfd, info, h,
5126 offset, NULL, 0))
5127 return FALSE;
5128 sh_elf_hash_entry (h)->funcdesc.offset |= 1;
5129 }
5130 }
5131 else
5132 {
5133 union gotref *local_funcdesc;
5134
5135 local_funcdesc = sh_elf_local_funcdesc (input_bfd);
5136 offset = local_funcdesc[r_symndx].offset;
5137 BFD_ASSERT (offset != MINUS_ONE);
5138 if ((offset & 1) == 0)
5139 {
5140 if (!sh_elf_initialize_funcdesc (output_bfd, info, NULL,
5141 offset, sec,
5142 sym->st_value))
5143 return FALSE;
5144 local_funcdesc[r_symndx].offset |= 1;
5145 }
5146 }
5147
5148 relocation = htab->sfuncdesc->output_offset + (offset & ~1);
5149 }
5150
e0af1f53
MR
5151 relocation -= (htab->root.hgot->root.u.def.value
5152 + sgotplt->output_offset);
8e45593f
NC
5153#ifdef GOT_BIAS
5154 relocation -= GOT_BIAS;
5155#endif
5156
5157 if (r_type == R_SH_GOTOFFFUNCDESC20)
5158 {
5159 r = install_movi20_field (output_bfd, relocation + addend,
5160 input_bfd, input_section, contents,
5161 rel->r_offset);
5162 break;
5163 }
5164 else
5165 goto final_link_relocate;
5166
37c644f2
AO
5167 case R_SH_LOOP_START:
5168 {
5169 static bfd_vma start, end;
5170
5171 start = (relocation + rel->r_addend
5172 - (sec->output_section->vma + sec->output_offset));
5173 r = sh_elf_reloc_loop (r_type, input_bfd, input_section, contents,
5174 rel->r_offset, sec, start, end);
5175 break;
5176
5177 case R_SH_LOOP_END:
5178 end = (relocation + rel->r_addend
5179 - (sec->output_section->vma + sec->output_offset));
5180 r = sh_elf_reloc_loop (r_type, input_bfd, input_section, contents,
5181 rel->r_offset, sec, start, end);
5182 break;
5183 }
3376eaf5
KK
5184
5185 case R_SH_TLS_GD_32:
5186 case R_SH_TLS_IE_32:
e0af1f53 5187 BFD_ASSERT (htab);
8e45593f 5188 check_segment[0] = check_segment[1] = -1;
3376eaf5 5189 r_type = sh_elf_optimized_tls_reloc (info, r_type, h == NULL);
8e45593f 5190 got_type = GOT_UNKNOWN;
3376eaf5 5191 if (h == NULL && local_got_offsets)
8e45593f 5192 got_type = sh_elf_local_got_type (input_bfd) [r_symndx];
3376eaf5
KK
5193 else if (h != NULL)
5194 {
8e45593f 5195 got_type = sh_elf_hash_entry (h)->got_type;
3376eaf5
KK
5196 if (! info->shared
5197 && (h->dynindx == -1
f5385ebf 5198 || h->def_regular))
267fb3c1 5199 r_type = R_SH_TLS_LE_32;
3376eaf5
KK
5200 }
5201
8e45593f 5202 if (r_type == R_SH_TLS_GD_32 && got_type == GOT_TLS_IE)
3376eaf5
KK
5203 r_type = R_SH_TLS_IE_32;
5204
5205 if (r_type == R_SH_TLS_LE_32)
5206 {
5207 bfd_vma offset;
5208 unsigned short insn;
3376eaf5
KK
5209
5210 if (ELF32_R_TYPE (rel->r_info) == R_SH_TLS_GD_32)
5211 {
5212 /* GD->LE transition:
5213 mov.l 1f,r4; mova 2f,r0; mov.l 2f,r1; add r0,r1;
b34976b6 5214 jsr @r1; add r12,r4; bra 3f; nop; .align 2;
3376eaf5
KK
5215 1: .long x$TLSGD; 2: .long __tls_get_addr@PLT; 3:
5216 We change it into:
5217 mov.l 1f,r4; stc gbr,r0; add r4,r0; nop;
5218 nop; nop; ...
5219 1: .long x@TPOFF; 2: .long __tls_get_addr@PLT; 3:. */
5220
5221 offset = rel->r_offset;
5222 BFD_ASSERT (offset >= 16);
5223 /* Size of GD instructions is 16 or 18. */
5224 offset -= 16;
5225 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5226 if ((insn & 0xff00) == 0xc700)
5227 {
5228 BFD_ASSERT (offset >= 2);
5229 offset -= 2;
5230 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5231 }
5232
5233 BFD_ASSERT ((insn & 0xff00) == 0xd400);
5234 insn = bfd_get_16 (input_bfd, contents + offset + 2);
5235 BFD_ASSERT ((insn & 0xff00) == 0xc700);
5236 insn = bfd_get_16 (input_bfd, contents + offset + 4);
5237 BFD_ASSERT ((insn & 0xff00) == 0xd100);
5238 insn = bfd_get_16 (input_bfd, contents + offset + 6);
5239 BFD_ASSERT (insn == 0x310c);
5240 insn = bfd_get_16 (input_bfd, contents + offset + 8);
5241 BFD_ASSERT (insn == 0x410b);
5242 insn = bfd_get_16 (input_bfd, contents + offset + 10);
5243 BFD_ASSERT (insn == 0x34cc);
5244
5245 bfd_put_16 (output_bfd, 0x0012, contents + offset + 2);
5246 bfd_put_16 (output_bfd, 0x304c, contents + offset + 4);
5247 bfd_put_16 (output_bfd, 0x0009, contents + offset + 6);
5248 bfd_put_16 (output_bfd, 0x0009, contents + offset + 8);
5249 bfd_put_16 (output_bfd, 0x0009, contents + offset + 10);
5250 }
5251 else
5252 {
91d6fa6a 5253 int target;
3376eaf5
KK
5254
5255 /* IE->LE transition:
5256 mov.l 1f,r0; stc gbr,rN; mov.l @(r0,r12),rM;
5257 bra 2f; add ...; .align 2; 1: x@GOTTPOFF; 2:
5258 We change it into:
5259 mov.l .Ln,rM; stc gbr,rN; nop; ...;
5260 1: x@TPOFF; 2:. */
5261
5262 offset = rel->r_offset;
5263 BFD_ASSERT (offset >= 16);
5264 /* Size of IE instructions is 10 or 12. */
5265 offset -= 10;
5266 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5267 if ((insn & 0xf0ff) == 0x0012)
5268 {
5269 BFD_ASSERT (offset >= 2);
5270 offset -= 2;
5271 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5272 }
5273
5274 BFD_ASSERT ((insn & 0xff00) == 0xd000);
91d6fa6a 5275 target = insn & 0x00ff;
3376eaf5
KK
5276 insn = bfd_get_16 (input_bfd, contents + offset + 2);
5277 BFD_ASSERT ((insn & 0xf0ff) == 0x0012);
5278 insn = bfd_get_16 (input_bfd, contents + offset + 4);
5279 BFD_ASSERT ((insn & 0xf0ff) == 0x00ce);
91d6fa6a 5280 insn = 0xd000 | (insn & 0x0f00) | target;
3376eaf5
KK
5281 bfd_put_16 (output_bfd, insn, contents + offset + 0);
5282 bfd_put_16 (output_bfd, 0x0009, contents + offset + 4);
5283 }
5284
267fb3c1
KK
5285 bfd_put_32 (output_bfd, tpoff (info, relocation),
5286 contents + rel->r_offset);
3376eaf5
KK
5287 continue;
5288 }
5289
8e45593f 5290 if (sgot == NULL || sgotplt == NULL)
3376eaf5
KK
5291 abort ();
5292
5293 if (h != NULL)
5294 off = h->got.offset;
5295 else
5296 {
5297 if (local_got_offsets == NULL)
5298 abort ();
5299
5300 off = local_got_offsets[r_symndx];
5301 }
5302
267fb3c1
KK
5303 /* Relocate R_SH_TLS_IE_32 directly when statically linking. */
5304 if (r_type == R_SH_TLS_IE_32
5305 && ! htab->root.dynamic_sections_created)
5306 {
5307 off &= ~1;
5308 bfd_put_32 (output_bfd, tpoff (info, relocation),
5309 sgot->contents + off);
8e45593f 5310 bfd_put_32 (output_bfd, sh_elf_got_offset (htab) + off,
267fb3c1
KK
5311 contents + rel->r_offset);
5312 continue;
5313 }
5314
3376eaf5
KK
5315 if ((off & 1) != 0)
5316 off &= ~1;
26e41594 5317 else
3376eaf5
KK
5318 {
5319 Elf_Internal_Rela outrel;
947216bf 5320 bfd_byte *loc;
3376eaf5
KK
5321 int dr_type, indx;
5322
5323 if (srelgot == NULL)
5324 {
5325 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
5326 BFD_ASSERT (srelgot != NULL);
5327 }
5328
5329 outrel.r_offset = (sgot->output_section->vma
5330 + sgot->output_offset + off);
5331
267fb3c1 5332 if (h == NULL || h->dynindx == -1)
c95b8a7a
KK
5333 indx = 0;
5334 else
5335 indx = h->dynindx;
267fb3c1 5336
3376eaf5
KK
5337 dr_type = (r_type == R_SH_TLS_GD_32 ? R_SH_TLS_DTPMOD32 :
5338 R_SH_TLS_TPOFF32);
5339 if (dr_type == R_SH_TLS_TPOFF32 && indx == 0)
5340 outrel.r_addend = relocation - dtpoff_base (info);
5341 else
5342 outrel.r_addend = 0;
5343 outrel.r_info = ELF32_R_INFO (indx, dr_type);
947216bf
AM
5344 loc = srelgot->contents;
5345 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
3376eaf5
KK
5346 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
5347
5348 if (r_type == R_SH_TLS_GD_32)
5349 {
5350 if (indx == 0)
5351 {
5352 bfd_put_32 (output_bfd,
5353 relocation - dtpoff_base (info),
5354 sgot->contents + off + 4);
5355 }
5356 else
5357 {
5358 outrel.r_info = ELF32_R_INFO (indx,
5359 R_SH_TLS_DTPOFF32);
5360 outrel.r_offset += 4;
5361 outrel.r_addend = 0;
5362 srelgot->reloc_count++;
947216bf
AM
5363 loc += sizeof (Elf32_External_Rela);
5364 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3376eaf5
KK
5365 }
5366 }
5367
5368 if (h != NULL)
5369 h->got.offset |= 1;
5370 else
5371 local_got_offsets[r_symndx] |= 1;
5372 }
5373
5374 if (off >= (bfd_vma) -2)
5375 abort ();
5376
5377 if (r_type == (int) ELF32_R_TYPE (rel->r_info))
8e45593f 5378 relocation = sh_elf_got_offset (htab) + off;
3376eaf5
KK
5379 else
5380 {
5381 bfd_vma offset;
5382 unsigned short insn;
5383
5384 /* GD->IE transition:
5385 mov.l 1f,r4; mova 2f,r0; mov.l 2f,r1; add r0,r1;
5386 jsr @r1; add r12,r4; bra 3f; nop; .align 2;
5387 1: .long x$TLSGD; 2: .long __tls_get_addr@PLT; 3:
5388 We change it into:
5389 mov.l 1f,r0; stc gbr,r4; mov.l @(r0,r12),r0; add r4,r0;
5390 nop; nop; bra 3f; nop; .align 2;
5391 1: .long x@TPOFF; 2:...; 3:. */
5392
5393 offset = rel->r_offset;
5394 BFD_ASSERT (offset >= 16);
5395 /* Size of GD instructions is 16 or 18. */
5396 offset -= 16;
5397 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5398 if ((insn & 0xff00) == 0xc700)
5399 {
5400 BFD_ASSERT (offset >= 2);
5401 offset -= 2;
5402 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5403 }
5404
5405 BFD_ASSERT ((insn & 0xff00) == 0xd400);
5406
5407 /* Replace mov.l 1f,R4 with mov.l 1f,r0. */
5408 bfd_put_16 (output_bfd, insn & 0xf0ff, contents + offset);
5409
5410 insn = bfd_get_16 (input_bfd, contents + offset + 2);
5411 BFD_ASSERT ((insn & 0xff00) == 0xc700);
5412 insn = bfd_get_16 (input_bfd, contents + offset + 4);
5413 BFD_ASSERT ((insn & 0xff00) == 0xd100);
5414 insn = bfd_get_16 (input_bfd, contents + offset + 6);
5415 BFD_ASSERT (insn == 0x310c);
5416 insn = bfd_get_16 (input_bfd, contents + offset + 8);
5417 BFD_ASSERT (insn == 0x410b);
5418 insn = bfd_get_16 (input_bfd, contents + offset + 10);
5419 BFD_ASSERT (insn == 0x34cc);
5420
5421 bfd_put_16 (output_bfd, 0x0412, contents + offset + 2);
5422 bfd_put_16 (output_bfd, 0x00ce, contents + offset + 4);
5423 bfd_put_16 (output_bfd, 0x304c, contents + offset + 6);
5424 bfd_put_16 (output_bfd, 0x0009, contents + offset + 8);
5425 bfd_put_16 (output_bfd, 0x0009, contents + offset + 10);
5426
8e45593f 5427 bfd_put_32 (output_bfd, sh_elf_got_offset (htab) + off,
3376eaf5
KK
5428 contents + rel->r_offset);
5429
5430 continue;
5431 }
5432
5433 addend = rel->r_addend;
5434
5435 goto final_link_relocate;
5436
5437 case R_SH_TLS_LD_32:
e0af1f53 5438 BFD_ASSERT (htab);
8e45593f 5439 check_segment[0] = check_segment[1] = -1;
3376eaf5
KK
5440 if (! info->shared)
5441 {
5442 bfd_vma offset;
5443 unsigned short insn;
5444
5445 /* LD->LE transition:
5446 mov.l 1f,r4; mova 2f,r0; mov.l 2f,r1; add r0,r1;
5447 jsr @r1; add r12,r4; bra 3f; nop; .align 2;
5448 1: .long x$TLSLD; 2: .long __tls_get_addr@PLT; 3:
5449 We change it into:
5450 stc gbr,r0; nop; nop; nop;
5451 nop; nop; bra 3f; ...; 3:. */
5452
5453 offset = rel->r_offset;
5454 BFD_ASSERT (offset >= 16);
5455 /* Size of LD instructions is 16 or 18. */
5456 offset -= 16;
5457 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5458 if ((insn & 0xff00) == 0xc700)
5459 {
5460 BFD_ASSERT (offset >= 2);
5461 offset -= 2;
5462 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5463 }
5464
5465 BFD_ASSERT ((insn & 0xff00) == 0xd400);
5466 insn = bfd_get_16 (input_bfd, contents + offset + 2);
5467 BFD_ASSERT ((insn & 0xff00) == 0xc700);
5468 insn = bfd_get_16 (input_bfd, contents + offset + 4);
5469 BFD_ASSERT ((insn & 0xff00) == 0xd100);
5470 insn = bfd_get_16 (input_bfd, contents + offset + 6);
5471 BFD_ASSERT (insn == 0x310c);
5472 insn = bfd_get_16 (input_bfd, contents + offset + 8);
5473 BFD_ASSERT (insn == 0x410b);
5474 insn = bfd_get_16 (input_bfd, contents + offset + 10);
5475 BFD_ASSERT (insn == 0x34cc);
5476
5477 bfd_put_16 (output_bfd, 0x0012, contents + offset + 0);
5478 bfd_put_16 (output_bfd, 0x0009, contents + offset + 2);
5479 bfd_put_16 (output_bfd, 0x0009, contents + offset + 4);
5480 bfd_put_16 (output_bfd, 0x0009, contents + offset + 6);
5481 bfd_put_16 (output_bfd, 0x0009, contents + offset + 8);
5482 bfd_put_16 (output_bfd, 0x0009, contents + offset + 10);
5483
5484 continue;
5485 }
5486
8e45593f 5487 if (sgot == NULL || sgotplt == NULL)
3376eaf5
KK
5488 abort ();
5489
5490 off = htab->tls_ldm_got.offset;
5491 if (off & 1)
5492 off &= ~1;
5493 else
5494 {
5495 Elf_Internal_Rela outrel;
947216bf 5496 bfd_byte *loc;
3376eaf5
KK
5497
5498 srelgot = htab->srelgot;
5499 if (srelgot == NULL)
5500 abort ();
5501
5502 outrel.r_offset = (sgot->output_section->vma
5503 + sgot->output_offset + off);
5504 outrel.r_addend = 0;
5505 outrel.r_info = ELF32_R_INFO (0, R_SH_TLS_DTPMOD32);
947216bf
AM
5506 loc = srelgot->contents;
5507 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
3376eaf5
KK
5508 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
5509 htab->tls_ldm_got.offset |= 1;
5510 }
5511
8e45593f 5512 relocation = sh_elf_got_offset (htab) + off;
3376eaf5
KK
5513 addend = rel->r_addend;
5514
5515 goto final_link_relocate;
5516
5517 case R_SH_TLS_LDO_32:
8e45593f 5518 check_segment[0] = check_segment[1] = -1;
3376eaf5 5519 if (! info->shared)
267fb3c1 5520 relocation = tpoff (info, relocation);
3376eaf5
KK
5521 else
5522 relocation -= dtpoff_base (info);
5523
5524 addend = rel->r_addend;
5525 goto final_link_relocate;
5526
5527 case R_SH_TLS_LE_32:
5528 {
5529 int indx;
5530 Elf_Internal_Rela outrel;
947216bf 5531 bfd_byte *loc;
3376eaf5 5532
8e45593f
NC
5533 check_segment[0] = check_segment[1] = -1;
5534
267fb3c1
KK
5535 if (! info->shared)
5536 {
5537 relocation = tpoff (info, relocation);
5538 addend = rel->r_addend;
5539 goto final_link_relocate;
5540 }
5541
3376eaf5
KK
5542 if (sreloc == NULL)
5543 {
83bac4b0
NC
5544 sreloc = _bfd_elf_get_dynamic_reloc_section
5545 (input_bfd, input_section, /*rela?*/ TRUE);
5546 if (sreloc == NULL)
b34976b6 5547 return FALSE;
3376eaf5
KK
5548 }
5549
267fb3c1
KK
5550 if (h == NULL || h->dynindx == -1)
5551 indx = 0;
5552 else
5553 indx = h->dynindx;
5554
3376eaf5
KK
5555 outrel.r_offset = (input_section->output_section->vma
5556 + input_section->output_offset
5557 + rel->r_offset);
5558 outrel.r_info = ELF32_R_INFO (indx, R_SH_TLS_TPOFF32);
5559 if (indx == 0)
5560 outrel.r_addend = relocation - dtpoff_base (info);
5561 else
5562 outrel.r_addend = 0;
3376eaf5 5563
947216bf
AM
5564 loc = sreloc->contents;
5565 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
5566 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3376eaf5
KK
5567 continue;
5568 }
37c644f2
AO
5569 }
5570
146be91a 5571 relocation_done:
e0af1f53 5572 if (fdpic_p && check_segment[0] != (unsigned) -1
8e45593f
NC
5573 && check_segment[0] != check_segment[1])
5574 {
5575 /* We don't want duplicate errors for undefined symbols. */
5576 if (!h || h->root.type != bfd_link_hash_undefined)
5577 {
5578 if (info->shared)
5579 {
5580 info->callbacks->einfo
5581 (_("%X%C: relocation to \"%s\" references a different segment\n"),
5582 input_bfd, input_section, rel->r_offset, symname);
5583 return FALSE;
5584 }
5585 else
5586 info->callbacks->einfo
5587 (_("%C: warning: relocation to \"%s\" references a different segment\n"),
5588 input_bfd, input_section, rel->r_offset, symname);
5589 }
5590
5591 elf_elfheader (output_bfd)->e_flags &= ~EF_SH_PIC;
5592 }
5593
37c644f2
AO
5594 if (r != bfd_reloc_ok)
5595 {
5596 switch (r)
5597 {
5598 default:
5599 case bfd_reloc_outofrange:
5600 abort ();
5601 case bfd_reloc_overflow:
5602 {
5603 const char *name;
5604
5605 if (h != NULL)
dfeffb9f 5606 name = NULL;
37c644f2
AO
5607 else
5608 {
252b5132
RH
5609 name = (bfd_elf_string_from_elf_section
5610 (input_bfd, symtab_hdr->sh_link, sym->st_name));
5611 if (name == NULL)
b34976b6 5612 return FALSE;
252b5132
RH
5613 if (*name == '\0')
5614 name = bfd_section_name (input_bfd, sec);
5615 }
5616 if (! ((*info->callbacks->reloc_overflow)
dfeffb9f
L
5617 (info, (h ? &h->root : NULL), name, howto->name,
5618 (bfd_vma) 0, input_bfd, input_section,
5619 rel->r_offset)))
b34976b6 5620 return FALSE;
252b5132
RH
5621 }
5622 break;
5623 }
5624 }
5625 }
5626
b34976b6 5627 return TRUE;
252b5132
RH
5628}
5629
5630/* This is a version of bfd_generic_get_relocated_section_contents
5631 which uses sh_elf_relocate_section. */
5632
5633static bfd_byte *
09fd220b
KK
5634sh_elf_get_relocated_section_contents (bfd *output_bfd,
5635 struct bfd_link_info *link_info,
5636 struct bfd_link_order *link_order,
5637 bfd_byte *data,
5638 bfd_boolean relocatable,
5639 asymbol **symbols)
252b5132
RH
5640{
5641 Elf_Internal_Shdr *symtab_hdr;
5642 asection *input_section = link_order->u.indirect.section;
5643 bfd *input_bfd = input_section->owner;
5644 asection **sections = NULL;
5645 Elf_Internal_Rela *internal_relocs = NULL;
6cdc0ccc 5646 Elf_Internal_Sym *isymbuf = NULL;
252b5132
RH
5647
5648 /* We only need to handle the case of relaxing, or of having a
5649 particular set of section contents, specially. */
1049f94e 5650 if (relocatable
252b5132
RH
5651 || elf_section_data (input_section)->this_hdr.contents == NULL)
5652 return bfd_generic_get_relocated_section_contents (output_bfd, link_info,
5653 link_order, data,
1049f94e 5654 relocatable,
252b5132
RH
5655 symbols);
5656
0ffa91dd 5657 symtab_hdr = &elf_symtab_hdr (input_bfd);
252b5132
RH
5658
5659 memcpy (data, elf_section_data (input_section)->this_hdr.contents,
eea6121a 5660 (size_t) input_section->size);
252b5132
RH
5661
5662 if ((input_section->flags & SEC_RELOC) != 0
5663 && input_section->reloc_count > 0)
5664 {
252b5132 5665 asection **secpp;
6cdc0ccc 5666 Elf_Internal_Sym *isym, *isymend;
9ad5cbcf 5667 bfd_size_type amt;
252b5132 5668
45d6a902 5669 internal_relocs = (_bfd_elf_link_read_relocs
09fd220b 5670 (input_bfd, input_section, NULL,
b34976b6 5671 (Elf_Internal_Rela *) NULL, FALSE));
252b5132
RH
5672 if (internal_relocs == NULL)
5673 goto error_return;
5674
6cdc0ccc
AM
5675 if (symtab_hdr->sh_info != 0)
5676 {
5677 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
5678 if (isymbuf == NULL)
5679 isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
5680 symtab_hdr->sh_info, 0,
5681 NULL, NULL, NULL);
5682 if (isymbuf == NULL)
5683 goto error_return;
5684 }
252b5132 5685
9ad5cbcf
AM
5686 amt = symtab_hdr->sh_info;
5687 amt *= sizeof (asection *);
5688 sections = (asection **) bfd_malloc (amt);
5689 if (sections == NULL && amt != 0)
252b5132
RH
5690 goto error_return;
5691
6cdc0ccc
AM
5692 isymend = isymbuf + symtab_hdr->sh_info;
5693 for (isym = isymbuf, secpp = sections; isym < isymend; ++isym, ++secpp)
252b5132
RH
5694 {
5695 asection *isec;
5696
6cdc0ccc 5697 if (isym->st_shndx == SHN_UNDEF)
252b5132 5698 isec = bfd_und_section_ptr;
6cdc0ccc 5699 else if (isym->st_shndx == SHN_ABS)
252b5132 5700 isec = bfd_abs_section_ptr;
6cdc0ccc 5701 else if (isym->st_shndx == SHN_COMMON)
252b5132
RH
5702 isec = bfd_com_section_ptr;
5703 else
6cdc0ccc 5704 isec = bfd_section_from_elf_index (input_bfd, isym->st_shndx);
252b5132
RH
5705
5706 *secpp = isec;
5707 }
5708
5709 if (! sh_elf_relocate_section (output_bfd, link_info, input_bfd,
5710 input_section, data, internal_relocs,
6cdc0ccc 5711 isymbuf, sections))
252b5132
RH
5712 goto error_return;
5713
5714 if (sections != NULL)
5715 free (sections);
6cdc0ccc
AM
5716 if (isymbuf != NULL
5717 && symtab_hdr->contents != (unsigned char *) isymbuf)
5718 free (isymbuf);
5719 if (elf_section_data (input_section)->relocs != internal_relocs)
252b5132 5720 free (internal_relocs);
252b5132
RH
5721 }
5722
5723 return data;
5724
5725 error_return:
252b5132
RH
5726 if (sections != NULL)
5727 free (sections);
6cdc0ccc
AM
5728 if (isymbuf != NULL
5729 && symtab_hdr->contents != (unsigned char *) isymbuf)
5730 free (isymbuf);
5731 if (internal_relocs != NULL
5732 && elf_section_data (input_section)->relocs != internal_relocs)
5733 free (internal_relocs);
252b5132
RH
5734 return NULL;
5735}
917583ad 5736
3376eaf5
KK
5737/* Return the base VMA address which should be subtracted from real addresses
5738 when resolving @dtpoff relocation.
5739 This is PT_TLS segment p_vaddr. */
5740
5741static bfd_vma
09fd220b 5742dtpoff_base (struct bfd_link_info *info)
3376eaf5 5743{
e1918d23
AM
5744 /* If tls_sec is NULL, we should have signalled an error already. */
5745 if (elf_hash_table (info)->tls_sec == NULL)
267fb3c1 5746 return 0;
e1918d23 5747 return elf_hash_table (info)->tls_sec->vma;
3376eaf5
KK
5748}
5749
267fb3c1
KK
5750/* Return the relocation value for R_SH_TLS_TPOFF32.. */
5751
5752static bfd_vma
09fd220b 5753tpoff (struct bfd_link_info *info, bfd_vma address)
267fb3c1 5754{
e1918d23
AM
5755 /* If tls_sec is NULL, we should have signalled an error already. */
5756 if (elf_hash_table (info)->tls_sec == NULL)
267fb3c1
KK
5757 return 0;
5758 /* SH TLS ABI is variant I and static TLS block start just after tcbhead
5759 structure which has 2 pointer fields. */
044ad7e3
KK
5760 return (address - elf_hash_table (info)->tls_sec->vma
5761 + align_power ((bfd_vma) 8,
5762 elf_hash_table (info)->tls_sec->alignment_power));
267fb3c1
KK
5763}
5764
252b5132 5765static asection *
09fd220b 5766sh_elf_gc_mark_hook (asection *sec,
07adf181
AM
5767 struct bfd_link_info *info,
5768 Elf_Internal_Rela *rel,
5769 struct elf_link_hash_entry *h,
09fd220b 5770 Elf_Internal_Sym *sym)
252b5132
RH
5771{
5772 if (h != NULL)
07adf181
AM
5773 switch (ELF32_R_TYPE (rel->r_info))
5774 {
5775 case R_SH_GNU_VTINHERIT:
5776 case R_SH_GNU_VTENTRY:
5777 return NULL;
5778 }
9ad5cbcf 5779
07adf181 5780 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
252b5132
RH
5781}
5782
37c644f2
AO
5783/* Update the got entry reference counts for the section being removed. */
5784
b34976b6 5785static bfd_boolean
09fd220b
KK
5786sh_elf_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info,
5787 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 5788{
067653c5
AM
5789 Elf_Internal_Shdr *symtab_hdr;
5790 struct elf_link_hash_entry **sym_hashes;
5791 bfd_signed_vma *local_got_refcounts;
8e45593f 5792 union gotref *local_funcdesc;
067653c5 5793 const Elf_Internal_Rela *rel, *relend;
067653c5 5794
7dda2462
TG
5795 if (info->relocatable)
5796 return TRUE;
5797
067653c5
AM
5798 elf_section_data (sec)->local_dynrel = NULL;
5799
0ffa91dd 5800 symtab_hdr = &elf_symtab_hdr (abfd);
067653c5
AM
5801 sym_hashes = elf_sym_hashes (abfd);
5802 local_got_refcounts = elf_local_got_refcounts (abfd);
8e45593f 5803 local_funcdesc = sh_elf_local_funcdesc (abfd);
067653c5
AM
5804
5805 relend = relocs + sec->reloc_count;
5806 for (rel = relocs; rel < relend; rel++)
396a6083 5807 {
26e41594
AM
5808 unsigned long r_symndx;
5809 unsigned int r_type;
5810 struct elf_link_hash_entry *h = NULL;
396a6083
SC
5811#ifdef INCLUDE_SHMEDIA
5812 int seen_stt_datalabel = 0;
5813#endif
3376eaf5 5814
396a6083 5815 r_symndx = ELF32_R_SYM (rel->r_info);
26e41594 5816 if (r_symndx >= symtab_hdr->sh_info)
396a6083 5817 {
26e41594
AM
5818 struct elf_sh_link_hash_entry *eh;
5819 struct elf_sh_dyn_relocs **pp;
5820 struct elf_sh_dyn_relocs *p;
5821
396a6083 5822 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
396a6083
SC
5823 while (h->root.type == bfd_link_hash_indirect
5824 || h->root.type == bfd_link_hash_warning)
5825 {
3eb128b2 5826#ifdef INCLUDE_SHMEDIA
396a6083 5827 seen_stt_datalabel |= h->type == STT_DATALABEL;
3eb128b2 5828#endif
396a6083
SC
5829 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5830 }
26e41594
AM
5831 eh = (struct elf_sh_link_hash_entry *) h;
5832 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
5833 if (p->sec == sec)
5834 {
5835 /* Everything must go for SEC. */
5836 *pp = p->next;
5837 break;
5838 }
396a6083 5839 }
067653c5 5840
26e41594
AM
5841 r_type = ELF32_R_TYPE (rel->r_info);
5842 switch (sh_elf_optimized_tls_reloc (info, r_type, h != NULL))
396a6083
SC
5843 {
5844 case R_SH_TLS_LD_32:
5845 if (sh_elf_hash_table (info)->tls_ldm_got.refcount > 0)
5846 sh_elf_hash_table (info)->tls_ldm_got.refcount -= 1;
5847 break;
5848
5849 case R_SH_GOT32:
8e45593f 5850 case R_SH_GOT20:
396a6083 5851 case R_SH_GOTOFF:
8e45593f 5852 case R_SH_GOTOFF20:
396a6083
SC
5853 case R_SH_GOTPC:
5854#ifdef INCLUDE_SHMEDIA
5855 case R_SH_GOT_LOW16:
5856 case R_SH_GOT_MEDLOW16:
5857 case R_SH_GOT_MEDHI16:
5858 case R_SH_GOT_HI16:
5859 case R_SH_GOT10BY4:
5860 case R_SH_GOT10BY8:
5861 case R_SH_GOTOFF_LOW16:
5862 case R_SH_GOTOFF_MEDLOW16:
5863 case R_SH_GOTOFF_MEDHI16:
5864 case R_SH_GOTOFF_HI16:
5865 case R_SH_GOTPC_LOW16:
5866 case R_SH_GOTPC_MEDLOW16:
5867 case R_SH_GOTPC_MEDHI16:
5868 case R_SH_GOTPC_HI16:
5869#endif
5870 case R_SH_TLS_GD_32:
5871 case R_SH_TLS_IE_32:
8e45593f
NC
5872 case R_SH_GOTFUNCDESC:
5873 case R_SH_GOTFUNCDESC20:
396a6083
SC
5874 if (h != NULL)
5875 {
5876#ifdef INCLUDE_SHMEDIA
5877 if (seen_stt_datalabel)
5878 {
26e41594
AM
5879 struct elf_sh_link_hash_entry *eh;
5880 eh = (struct elf_sh_link_hash_entry *) h;
396a6083
SC
5881 if (eh->datalabel_got.refcount > 0)
5882 eh->datalabel_got.refcount -= 1;
5883 }
5884 else
5885#endif
5886 if (h->got.refcount > 0)
5887 h->got.refcount -= 1;
5888 }
5889 else if (local_got_refcounts != NULL)
5890 {
5891#ifdef INCLUDE_SHMEDIA
5892 if (rel->r_addend & 1)
5893 {
5894 if (local_got_refcounts[symtab_hdr->sh_info + r_symndx] > 0)
5895 local_got_refcounts[symtab_hdr->sh_info + r_symndx] -= 1;
5896 }
5897 else
5898#endif
5899 if (local_got_refcounts[r_symndx] > 0)
5900 local_got_refcounts[r_symndx] -= 1;
5901 }
5902 break;
5903
8e45593f
NC
5904 case R_SH_FUNCDESC:
5905 if (h != NULL)
5906 sh_elf_hash_entry (h)->abs_funcdesc_refcount -= 1;
5907 else if (sh_elf_hash_table (info)->fdpic_p && !info->shared)
5908 sh_elf_hash_table (info)->srofixup->size -= 4;
5909
5910 /* Fall through. */
5911
5912 case R_SH_GOTOFFFUNCDESC:
5913 case R_SH_GOTOFFFUNCDESC20:
5914 if (h != NULL)
5915 sh_elf_hash_entry (h)->funcdesc.refcount -= 1;
5916 else
5917 local_funcdesc[r_symndx].refcount -= 1;
5918 break;
5919
396a6083 5920 case R_SH_DIR32:
8e45593f
NC
5921 if (sh_elf_hash_table (info)->fdpic_p && !info->shared
5922 && (sec->flags & SEC_ALLOC) != 0)
5923 sh_elf_hash_table (info)->srofixup->size -= 4;
5924 /* Fall thru */
5925
396a6083 5926 case R_SH_REL32:
26e41594
AM
5927 if (info->shared)
5928 break;
5929 /* Fall thru */
396a6083
SC
5930
5931 case R_SH_PLT32:
5932#ifdef INCLUDE_SHMEDIA
5933 case R_SH_PLT_LOW16:
5934 case R_SH_PLT_MEDLOW16:
5935 case R_SH_PLT_MEDHI16:
5936 case R_SH_PLT_HI16:
5937#endif
5938 if (h != NULL)
5939 {
5940 if (h->plt.refcount > 0)
5941 h->plt.refcount -= 1;
5942 }
5943 break;
067653c5 5944
396a6083
SC
5945 case R_SH_GOTPLT32:
5946#ifdef INCLUDE_SHMEDIA
5947 case R_SH_GOTPLT_LOW16:
5948 case R_SH_GOTPLT_MEDLOW16:
5949 case R_SH_GOTPLT_MEDHI16:
5950 case R_SH_GOTPLT_HI16:
5951 case R_SH_GOTPLT10BY4:
5952 case R_SH_GOTPLT10BY8:
5953#endif
5954 if (h != NULL)
5955 {
26e41594
AM
5956 struct elf_sh_link_hash_entry *eh;
5957 eh = (struct elf_sh_link_hash_entry *) h;
396a6083 5958 if (eh->gotplt_refcount > 0)
067653c5 5959 {
396a6083
SC
5960 eh->gotplt_refcount -= 1;
5961 if (h->plt.refcount > 0)
5962 h->plt.refcount -= 1;
067653c5 5963 }
067653c5 5964#ifdef INCLUDE_SHMEDIA
396a6083
SC
5965 else if (seen_stt_datalabel)
5966 {
5967 if (eh->datalabel_got.refcount > 0)
5968 eh->datalabel_got.refcount -= 1;
5969 }
067653c5 5970#endif
396a6083
SC
5971 else if (h->got.refcount > 0)
5972 h->got.refcount -= 1;
5973 }
5974 else if (local_got_refcounts != NULL)
5975 {
067653c5 5976#ifdef INCLUDE_SHMEDIA
396a6083
SC
5977 if (rel->r_addend & 1)
5978 {
5979 if (local_got_refcounts[symtab_hdr->sh_info + r_symndx] > 0)
5980 local_got_refcounts[symtab_hdr->sh_info + r_symndx] -= 1;
5981 }
5982 else
067653c5 5983#endif
396a6083
SC
5984 if (local_got_refcounts[r_symndx] > 0)
5985 local_got_refcounts[r_symndx] -= 1;
5986 }
5987 break;
067653c5 5988
396a6083
SC
5989 default:
5990 break;
5991 }
5992 }
067653c5 5993
b34976b6 5994 return TRUE;
252b5132
RH
5995}
5996
067653c5
AM
5997/* Copy the extra info we tack onto an elf_link_hash_entry. */
5998
5999static void
fcfa13d2 6000sh_elf_copy_indirect_symbol (struct bfd_link_info *info,
09fd220b
KK
6001 struct elf_link_hash_entry *dir,
6002 struct elf_link_hash_entry *ind)
067653c5
AM
6003{
6004 struct elf_sh_link_hash_entry *edir, *eind;
6005
6006 edir = (struct elf_sh_link_hash_entry *) dir;
6007 eind = (struct elf_sh_link_hash_entry *) ind;
6008
6009 if (eind->dyn_relocs != NULL)
6010 {
6011 if (edir->dyn_relocs != NULL)
6012 {
6013 struct elf_sh_dyn_relocs **pp;
6014 struct elf_sh_dyn_relocs *p;
6015
fcfa13d2 6016 /* Add reloc counts against the indirect sym to the direct sym
067653c5
AM
6017 list. Merge any entries against the same section. */
6018 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
6019 {
6020 struct elf_sh_dyn_relocs *q;
6021
6022 for (q = edir->dyn_relocs; q != NULL; q = q->next)
6023 if (q->sec == p->sec)
6024 {
6025 q->pc_count += p->pc_count;
6026 q->count += p->count;
6027 *pp = p->next;
6028 break;
6029 }
6030 if (q == NULL)
6031 pp = &p->next;
6032 }
6033 *pp = edir->dyn_relocs;
6034 }
6035
6036 edir->dyn_relocs = eind->dyn_relocs;
6037 eind->dyn_relocs = NULL;
6038 }
4989d792
SC
6039 edir->gotplt_refcount = eind->gotplt_refcount;
6040 eind->gotplt_refcount = 0;
396a6083 6041#ifdef INCLUDE_SHMEDIA
fcfa13d2
AM
6042 edir->datalabel_got.refcount += eind->datalabel_got.refcount;
6043 eind->datalabel_got.refcount = 0;
396a6083 6044#endif
8e45593f
NC
6045 edir->funcdesc.refcount += eind->funcdesc.refcount;
6046 eind->funcdesc.refcount = 0;
6047 edir->abs_funcdesc_refcount += eind->abs_funcdesc_refcount;
6048 eind->abs_funcdesc_refcount = 0;
067653c5 6049
3376eaf5
KK
6050 if (ind->root.type == bfd_link_hash_indirect
6051 && dir->got.refcount <= 0)
6052 {
8e45593f
NC
6053 edir->got_type = eind->got_type;
6054 eind->got_type = GOT_UNKNOWN;
3376eaf5
KK
6055 }
6056
04e534c3 6057 if (ind->root.type != bfd_link_hash_indirect
f5385ebf
AM
6058 && dir->dynamic_adjusted)
6059 {
6060 /* If called to transfer flags for a weakdef during processing
6061 of elf_adjust_dynamic_symbol, don't copy non_got_ref.
6062 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
6063 dir->ref_dynamic |= ind->ref_dynamic;
6064 dir->ref_regular |= ind->ref_regular;
6065 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
6066 dir->needs_plt |= ind->needs_plt;
6067 }
04e534c3 6068 else
fcfa13d2 6069 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
067653c5
AM
6070}
6071
3376eaf5 6072static int
09fd220b
KK
6073sh_elf_optimized_tls_reloc (struct bfd_link_info *info, int r_type,
6074 int is_local)
3376eaf5
KK
6075{
6076 if (info->shared)
6077 return r_type;
6078
6079 switch (r_type)
6080 {
6081 case R_SH_TLS_GD_32:
6082 case R_SH_TLS_IE_32:
6083 if (is_local)
6084 return R_SH_TLS_LE_32;
6085 return R_SH_TLS_IE_32;
6086 case R_SH_TLS_LD_32:
6087 return R_SH_TLS_LE_32;
6088 }
6089
6090 return r_type;
6091}
6092
252b5132
RH
6093/* Look through the relocs for a section during the first phase.
6094 Since we don't do .gots or .plts, we just need to consider the
6095 virtual table relocs for gc. */
435b1e90 6096
b34976b6 6097static bfd_boolean
09fd220b
KK
6098sh_elf_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
6099 const Elf_Internal_Rela *relocs)
252b5132
RH
6100{
6101 Elf_Internal_Shdr *symtab_hdr;
5582a088 6102 struct elf_link_hash_entry **sym_hashes;
067653c5 6103 struct elf_sh_link_hash_table *htab;
252b5132
RH
6104 const Elf_Internal_Rela *rel;
6105 const Elf_Internal_Rela *rel_end;
37c644f2 6106 asection *sreloc;
3376eaf5 6107 unsigned int r_type;
8e45593f 6108 int got_type, old_got_type;
435b1e90 6109
37c644f2
AO
6110 sreloc = NULL;
6111
1049f94e 6112 if (info->relocatable)
b34976b6 6113 return TRUE;
435b1e90 6114
0ffa91dd
NC
6115 BFD_ASSERT (is_sh_elf (abfd));
6116
6117 symtab_hdr = &elf_symtab_hdr (abfd);
252b5132 6118 sym_hashes = elf_sym_hashes (abfd);
435b1e90 6119
067653c5 6120 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
6121 if (htab == NULL)
6122 return FALSE;
6123
252b5132
RH
6124 rel_end = relocs + sec->reloc_count;
6125 for (rel = relocs; rel < rel_end; rel++)
6126 {
6127 struct elf_link_hash_entry *h;
6128 unsigned long r_symndx;
396a6083
SC
6129#ifdef INCLUDE_SHMEDIA
6130 int seen_stt_datalabel = 0;
6131#endif
435b1e90 6132
252b5132 6133 r_symndx = ELF32_R_SYM (rel->r_info);
3376eaf5
KK
6134 r_type = ELF32_R_TYPE (rel->r_info);
6135
252b5132 6136 if (r_symndx < symtab_hdr->sh_info)
435b1e90 6137 h = NULL;
252b5132 6138 else
396a6083
SC
6139 {
6140 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
396a6083
SC
6141 while (h->root.type == bfd_link_hash_indirect
6142 || h->root.type == bfd_link_hash_warning)
6143 {
973a3492 6144#ifdef INCLUDE_SHMEDIA
396a6083 6145 seen_stt_datalabel |= h->type == STT_DATALABEL;
973a3492 6146#endif
396a6083
SC
6147 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6148 }
396a6083 6149 }
435b1e90 6150
3376eaf5
KK
6151 r_type = sh_elf_optimized_tls_reloc (info, r_type, h == NULL);
6152 if (! info->shared
6153 && r_type == R_SH_TLS_IE_32
6154 && h != NULL
6155 && h->root.type != bfd_link_hash_undefined
6156 && h->root.type != bfd_link_hash_undefweak
6157 && (h->dynindx == -1
f5385ebf 6158 || h->def_regular))
3376eaf5
KK
6159 r_type = R_SH_TLS_LE_32;
6160
8e45593f
NC
6161 if (htab->fdpic_p)
6162 switch (r_type)
6163 {
6164 case R_SH_GOTOFFFUNCDESC:
6165 case R_SH_GOTOFFFUNCDESC20:
6166 case R_SH_FUNCDESC:
6167 case R_SH_GOTFUNCDESC:
6168 case R_SH_GOTFUNCDESC20:
6169 if (h != NULL)
6170 {
6171 if (h->dynindx == -1)
6172 switch (ELF_ST_VISIBILITY (h->other))
6173 {
6174 case STV_INTERNAL:
6175 case STV_HIDDEN:
6176 break;
6177 default:
6178 bfd_elf_link_record_dynamic_symbol (info, h);
6179 break;
6180 }
6181 }
6182 break;
6183 }
6184
37c644f2 6185 /* Some relocs require a global offset table. */
067653c5 6186 if (htab->sgot == NULL)
37c644f2 6187 {
3376eaf5 6188 switch (r_type)
37c644f2 6189 {
8e45593f
NC
6190 case R_SH_DIR32:
6191 /* This may require an rofixup. */
6192 if (!htab->fdpic_p)
6193 break;
fbca6ad9 6194 case R_SH_GOTPLT32:
37c644f2 6195 case R_SH_GOT32:
8e45593f 6196 case R_SH_GOT20:
37c644f2 6197 case R_SH_GOTOFF:
8e45593f
NC
6198 case R_SH_GOTOFF20:
6199 case R_SH_FUNCDESC:
6200 case R_SH_GOTFUNCDESC:
6201 case R_SH_GOTFUNCDESC20:
6202 case R_SH_GOTOFFFUNCDESC:
6203 case R_SH_GOTOFFFUNCDESC20:
37c644f2 6204 case R_SH_GOTPC:
fbca6ad9
AO
6205#ifdef INCLUDE_SHMEDIA
6206 case R_SH_GOTPLT_LOW16:
6207 case R_SH_GOTPLT_MEDLOW16:
6208 case R_SH_GOTPLT_MEDHI16:
6209 case R_SH_GOTPLT_HI16:
6210 case R_SH_GOTPLT10BY4:
6211 case R_SH_GOTPLT10BY8:
6212 case R_SH_GOT_LOW16:
6213 case R_SH_GOT_MEDLOW16:
6214 case R_SH_GOT_MEDHI16:
6215 case R_SH_GOT_HI16:
6216 case R_SH_GOT10BY4:
6217 case R_SH_GOT10BY8:
6218 case R_SH_GOTOFF_LOW16:
6219 case R_SH_GOTOFF_MEDLOW16:
6220 case R_SH_GOTOFF_MEDHI16:
6221 case R_SH_GOTOFF_HI16:
6222 case R_SH_GOTPC_LOW16:
6223 case R_SH_GOTPC_MEDLOW16:
6224 case R_SH_GOTPC_MEDHI16:
6225 case R_SH_GOTPC_HI16:
6226#endif
3376eaf5
KK
6227 case R_SH_TLS_GD_32:
6228 case R_SH_TLS_LD_32:
6229 case R_SH_TLS_IE_32:
8e45593f
NC
6230 if (htab->root.dynobj == NULL)
6231 htab->root.dynobj = abfd;
6232 if (!create_got_section (htab->root.dynobj, info))
6233 return FALSE;
37c644f2
AO
6234 break;
6235
6236 default:
6237 break;
6238 }
6239 }
6240
3376eaf5 6241 switch (r_type)
067653c5
AM
6242 {
6243 /* This relocation describes the C++ object vtable hierarchy.
6244 Reconstruct it for later use during GC. */
435b1e90 6245 case R_SH_GNU_VTINHERIT:
c152c796 6246 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 6247 return FALSE;
435b1e90
KH
6248 break;
6249
067653c5
AM
6250 /* This relocation describes which C++ vtable entries are actually
6251 used. Record for later use during GC. */
435b1e90 6252 case R_SH_GNU_VTENTRY:
d17e0c6e
JB
6253 BFD_ASSERT (h != NULL);
6254 if (h != NULL
6255 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 6256 return FALSE;
435b1e90 6257 break;
37c644f2 6258
3376eaf5
KK
6259 case R_SH_TLS_IE_32:
6260 if (info->shared)
6261 info->flags |= DF_STATIC_TLS;
6262
6263 /* FALLTHROUGH */
267fb3c1 6264 force_got:
3376eaf5 6265 case R_SH_TLS_GD_32:
37c644f2 6266 case R_SH_GOT32:
8e45593f 6267 case R_SH_GOT20:
fbca6ad9
AO
6268#ifdef INCLUDE_SHMEDIA
6269 case R_SH_GOT_LOW16:
6270 case R_SH_GOT_MEDLOW16:
6271 case R_SH_GOT_MEDHI16:
6272 case R_SH_GOT_HI16:
6273 case R_SH_GOT10BY4:
6274 case R_SH_GOT10BY8:
6275#endif
8e45593f
NC
6276 case R_SH_GOTFUNCDESC:
6277 case R_SH_GOTFUNCDESC20:
3376eaf5
KK
6278 switch (r_type)
6279 {
6280 default:
8e45593f 6281 got_type = GOT_NORMAL;
3376eaf5
KK
6282 break;
6283 case R_SH_TLS_GD_32:
8e45593f 6284 got_type = GOT_TLS_GD;
3376eaf5
KK
6285 break;
6286 case R_SH_TLS_IE_32:
8e45593f
NC
6287 got_type = GOT_TLS_IE;
6288 break;
6289 case R_SH_GOTFUNCDESC:
6290 case R_SH_GOTFUNCDESC20:
6291 got_type = GOT_FUNCDESC;
3376eaf5
KK
6292 break;
6293 }
6294
37c644f2 6295 if (h != NULL)
3376eaf5 6296 {
396a6083
SC
6297#ifdef INCLUDE_SHMEDIA
6298 if (seen_stt_datalabel)
6299 {
b34976b6
AM
6300 struct elf_sh_link_hash_entry *eh
6301 = (struct elf_sh_link_hash_entry *) h;
396a6083
SC
6302
6303 eh->datalabel_got.refcount += 1;
6304 }
6305 else
6306#endif
6307 h->got.refcount += 1;
8e45593f 6308 old_got_type = sh_elf_hash_entry (h)->got_type;
3376eaf5 6309 }
37c644f2
AO
6310 else
6311 {
067653c5
AM
6312 bfd_signed_vma *local_got_refcounts;
6313
435b1e90 6314 /* This is a global offset table entry for a local
067653c5
AM
6315 symbol. */
6316 local_got_refcounts = elf_local_got_refcounts (abfd);
6317 if (local_got_refcounts == NULL)
37c644f2 6318 {
dc810e39 6319 bfd_size_type size;
37c644f2 6320
dc810e39 6321 size = symtab_hdr->sh_info;
067653c5 6322 size *= sizeof (bfd_signed_vma);
fbca6ad9
AO
6323#ifdef INCLUDE_SHMEDIA
6324 /* Reserve space for both the datalabel and
6325 codelabel local GOT offsets. */
6326 size *= 2;
6327#endif
3376eaf5 6328 size += symtab_hdr->sh_info;
067653c5
AM
6329 local_got_refcounts = ((bfd_signed_vma *)
6330 bfd_zalloc (abfd, size));
6331 if (local_got_refcounts == NULL)
b34976b6 6332 return FALSE;
067653c5 6333 elf_local_got_refcounts (abfd) = local_got_refcounts;
3376eaf5
KK
6334#ifdef INCLUDE_SHMEDIA
6335 /* Take care of both the datalabel and codelabel local
6336 GOT offsets. */
8e45593f 6337 sh_elf_local_got_type (abfd)
3376eaf5
KK
6338 = (char *) (local_got_refcounts + 2 * symtab_hdr->sh_info);
6339#else
8e45593f 6340 sh_elf_local_got_type (abfd)
3376eaf5
KK
6341 = (char *) (local_got_refcounts + symtab_hdr->sh_info);
6342#endif
37c644f2 6343 }
396a6083
SC
6344#ifdef INCLUDE_SHMEDIA
6345 if (rel->r_addend & 1)
6346 local_got_refcounts[symtab_hdr->sh_info + r_symndx] += 1;
6347 else
6348#endif
6349 local_got_refcounts[r_symndx] += 1;
8e45593f 6350 old_got_type = sh_elf_local_got_type (abfd) [r_symndx];
3376eaf5
KK
6351 }
6352
6353 /* If a TLS symbol is accessed using IE at least once,
6354 there is no point to use dynamic model for it. */
8e45593f
NC
6355 if (old_got_type != got_type && old_got_type != GOT_UNKNOWN
6356 && (old_got_type != GOT_TLS_GD || got_type != GOT_TLS_IE))
3376eaf5 6357 {
8e45593f
NC
6358 if (old_got_type == GOT_TLS_IE && got_type == GOT_TLS_GD)
6359 got_type = GOT_TLS_IE;
3376eaf5
KK
6360 else
6361 {
8e45593f
NC
6362 if ((old_got_type == GOT_FUNCDESC || got_type == GOT_FUNCDESC)
6363 && (old_got_type == GOT_NORMAL || got_type == GOT_NORMAL))
6364 (*_bfd_error_handler)
6365 (_("%B: `%s' accessed both as normal and FDPIC symbol"),
6366 abfd, h->root.root.string);
6367 else if (old_got_type == GOT_FUNCDESC
6368 || got_type == GOT_FUNCDESC)
6369 (*_bfd_error_handler)
6370 (_("%B: `%s' accessed both as FDPIC and thread local symbol"),
6371 abfd, h->root.root.string);
6372 else
6373 (*_bfd_error_handler)
d003868e
AM
6374 (_("%B: `%s' accessed both as normal and thread local symbol"),
6375 abfd, h->root.root.string);
b34976b6 6376 return FALSE;
3376eaf5
KK
6377 }
6378 }
6379
8e45593f 6380 if (old_got_type != got_type)
3376eaf5
KK
6381 {
6382 if (h != NULL)
8e45593f 6383 sh_elf_hash_entry (h)->got_type = got_type;
3376eaf5 6384 else
8e45593f 6385 sh_elf_local_got_type (abfd) [r_symndx] = got_type;
37c644f2 6386 }
3376eaf5
KK
6387
6388 break;
6389
6390 case R_SH_TLS_LD_32:
6391 sh_elf_hash_table(info)->tls_ldm_got.refcount += 1;
37c644f2
AO
6392 break;
6393
8e45593f
NC
6394 case R_SH_FUNCDESC:
6395 case R_SH_GOTOFFFUNCDESC:
6396 case R_SH_GOTOFFFUNCDESC20:
6397 if (rel->r_addend)
6398 {
6399 (*_bfd_error_handler)
6400 (_("%B: Function descriptor relocation with non-zero addend"),
6401 abfd);
6402 return FALSE;
6403 }
6404
6405 if (h == NULL)
6406 {
6407 union gotref *local_funcdesc;
6408
6409 /* We need a function descriptor for a local symbol. */
6410 local_funcdesc = sh_elf_local_funcdesc (abfd);
6411 if (local_funcdesc == NULL)
6412 {
6413 bfd_size_type size;
6414
6415 size = symtab_hdr->sh_info * sizeof (union gotref);
6416#ifdef INCLUDE_SHMEDIA
6417 /* Count datalabel local GOT. */
6418 size *= 2;
6419#endif
6420 local_funcdesc = (union gotref *) bfd_zalloc (abfd, size);
6421 if (local_funcdesc == NULL)
6422 return FALSE;
6423 sh_elf_local_funcdesc (abfd) = local_funcdesc;
6424 }
6425 local_funcdesc[r_symndx].refcount += 1;
6426
6427 if (r_type == R_SH_FUNCDESC)
6428 {
6429 if (!info->shared)
6430 htab->srofixup->size += 4;
6431 else
6432 htab->srelgot->size += sizeof (Elf32_External_Rela);
6433 }
6434 }
6435 else
6436 {
6437 sh_elf_hash_entry (h)->funcdesc.refcount++;
6438 if (r_type == R_SH_FUNCDESC)
6439 sh_elf_hash_entry (h)->abs_funcdesc_refcount++;
6440
6441 /* If there is a function descriptor reference, then
6442 there should not be any non-FDPIC references. */
6443 old_got_type = sh_elf_hash_entry (h)->got_type;
6444 if (old_got_type != GOT_FUNCDESC && old_got_type != GOT_UNKNOWN)
6445 {
6446 if (old_got_type == GOT_NORMAL)
6447 (*_bfd_error_handler)
6448 (_("%B: `%s' accessed both as normal and FDPIC symbol"),
6449 abfd, h->root.root.string);
6450 else
6451 (*_bfd_error_handler)
6452 (_("%B: `%s' accessed both as FDPIC and thread local symbol"),
6453 abfd, h->root.root.string);
6454 }
6455 }
6456 break;
6457
fbca6ad9
AO
6458 case R_SH_GOTPLT32:
6459#ifdef INCLUDE_SHMEDIA
6460 case R_SH_GOTPLT_LOW16:
6461 case R_SH_GOTPLT_MEDLOW16:
6462 case R_SH_GOTPLT_MEDHI16:
6463 case R_SH_GOTPLT_HI16:
6464 case R_SH_GOTPLT10BY4:
6465 case R_SH_GOTPLT10BY8:
6466#endif
6467 /* If this is a local symbol, we resolve it directly without
6468 creating a procedure linkage table entry. */
6469
6470 if (h == NULL
f5385ebf 6471 || h->forced_local
fbca6ad9
AO
6472 || ! info->shared
6473 || info->symbolic
067653c5 6474 || h->dynindx == -1)
fbca6ad9
AO
6475 goto force_got;
6476
f5385ebf 6477 h->needs_plt = 1;
067653c5 6478 h->plt.refcount += 1;
4989d792 6479 ((struct elf_sh_link_hash_entry *) h)->gotplt_refcount += 1;
fbca6ad9
AO
6480
6481 break;
6482
37c644f2 6483 case R_SH_PLT32:
fbca6ad9
AO
6484#ifdef INCLUDE_SHMEDIA
6485 case R_SH_PLT_LOW16:
6486 case R_SH_PLT_MEDLOW16:
6487 case R_SH_PLT_MEDHI16:
6488 case R_SH_PLT_HI16:
6489#endif
37c644f2
AO
6490 /* This symbol requires a procedure linkage table entry. We
6491 actually build the entry in adjust_dynamic_symbol,
6492 because this might be a case of linking PIC code which is
6493 never referenced by a dynamic object, in which case we
6494 don't need to generate a procedure linkage table entry
6495 after all. */
6496
6497 /* If this is a local symbol, we resolve it directly without
6498 creating a procedure linkage table entry. */
6499 if (h == NULL)
6500 continue;
6501
f5385ebf 6502 if (h->forced_local)
37c644f2
AO
6503 break;
6504
f5385ebf 6505 h->needs_plt = 1;
067653c5 6506 h->plt.refcount += 1;
37c644f2
AO
6507 break;
6508
6509 case R_SH_DIR32:
6510 case R_SH_REL32:
46e993b9
KK
6511#ifdef INCLUDE_SHMEDIA
6512 case R_SH_IMM_LOW16_PCREL:
6513 case R_SH_IMM_MEDLOW16_PCREL:
6514 case R_SH_IMM_MEDHI16_PCREL:
6515 case R_SH_IMM_HI16_PCREL:
6516#endif
067653c5
AM
6517 if (h != NULL && ! info->shared)
6518 {
f5385ebf 6519 h->non_got_ref = 1;
067653c5
AM
6520 h->plt.refcount += 1;
6521 }
37c644f2
AO
6522
6523 /* If we are creating a shared library, and this is a reloc
6524 against a global symbol, or a non PC relative reloc
6525 against a local symbol, then we need to copy the reloc
6526 into the shared library. However, if we are linking with
6527 -Bsymbolic, we do not need to copy a reloc against a
6528 global symbol which is defined in an object we are
6529 including in the link (i.e., DEF_REGULAR is set). At
6530 this point we have not seen all the input files, so it is
6531 possible that DEF_REGULAR is not set now but will be set
6532 later (it is never cleared). We account for that
6533 possibility below by storing information in the
067653c5
AM
6534 dyn_relocs field of the hash table entry. A similar
6535 situation occurs when creating shared libraries and symbol
6536 visibility changes render the symbol local.
6537
6538 If on the other hand, we are creating an executable, we
6539 may need to keep relocations for symbols satisfied by a
6540 dynamic library if we manage to avoid copy relocs for the
6541 symbol. */
6542 if ((info->shared
6543 && (sec->flags & SEC_ALLOC) != 0
3376eaf5 6544 && (r_type != R_SH_REL32
067653c5
AM
6545 || (h != NULL
6546 && (! info->symbolic
6547 || h->root.type == bfd_link_hash_defweak
f5385ebf 6548 || !h->def_regular))))
067653c5
AM
6549 || (! info->shared
6550 && (sec->flags & SEC_ALLOC) != 0
6551 && h != NULL
6552 && (h->root.type == bfd_link_hash_defweak
f5385ebf 6553 || !h->def_regular)))
37c644f2 6554 {
067653c5
AM
6555 struct elf_sh_dyn_relocs *p;
6556 struct elf_sh_dyn_relocs **head;
6557
2293c499
AM
6558 if (htab->root.dynobj == NULL)
6559 htab->root.dynobj = abfd;
067653c5 6560
37c644f2
AO
6561 /* When creating a shared object, we must copy these
6562 reloc types into the output file. We create a reloc
6563 section in dynobj and make room for this reloc. */
6564 if (sreloc == NULL)
6565 {
83bac4b0
NC
6566 sreloc = _bfd_elf_make_dynamic_reloc_section
6567 (sec, htab->root.dynobj, 2, abfd, /*rela?*/ TRUE);
37c644f2 6568
37c644f2 6569 if (sreloc == NULL)
83bac4b0 6570 return FALSE;
37c644f2
AO
6571 }
6572
067653c5
AM
6573 /* If this is a global symbol, we count the number of
6574 relocations we need for this symbol. */
6575 if (h != NULL)
6576 head = &((struct elf_sh_link_hash_entry *) h)->dyn_relocs;
6577 else
37c644f2 6578 {
87d72d41 6579 /* Track dynamic relocs needed for local syms too. */
067653c5 6580 asection *s;
6edfbbad 6581 void *vpp;
87d72d41 6582 Elf_Internal_Sym *isym;
37c644f2 6583
87d72d41
AM
6584 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
6585 abfd, r_symndx);
6586 if (isym == NULL)
b34976b6 6587 return FALSE;
37c644f2 6588
87d72d41
AM
6589 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
6590 if (s == NULL)
6591 s = sec;
6592
6edfbbad
DJ
6593 vpp = &elf_section_data (s)->local_dynrel;
6594 head = (struct elf_sh_dyn_relocs **) vpp;
067653c5 6595 }
37c644f2 6596
067653c5
AM
6597 p = *head;
6598 if (p == NULL || p->sec != sec)
6599 {
6600 bfd_size_type amt = sizeof (*p);
2293c499 6601 p = bfd_alloc (htab->root.dynobj, amt);
37c644f2 6602 if (p == NULL)
b34976b6 6603 return FALSE;
067653c5
AM
6604 p->next = *head;
6605 *head = p;
6606 p->sec = sec;
6607 p->count = 0;
6608 p->pc_count = 0;
37c644f2 6609 }
067653c5
AM
6610
6611 p->count += 1;
46e993b9
KK
6612 if (r_type == R_SH_REL32
6613#ifdef INCLUDE_SHMEDIA
6614 || r_type == R_SH_IMM_LOW16_PCREL
6615 || r_type == R_SH_IMM_MEDLOW16_PCREL
6616 || r_type == R_SH_IMM_MEDHI16_PCREL
6617 || r_type == R_SH_IMM_HI16_PCREL
6618#endif
6619 )
067653c5 6620 p->pc_count += 1;
37c644f2
AO
6621 }
6622
8e45593f
NC
6623 /* Allocate the fixup regardless of whether we need a relocation.
6624 If we end up generating the relocation, we'll unallocate the
6625 fixup. */
6626 if (htab->fdpic_p && !info->shared
6627 && r_type == R_SH_DIR32
6628 && (sec->flags & SEC_ALLOC) != 0)
6629 htab->srofixup->size += 4;
37c644f2 6630 break;
3376eaf5
KK
6631
6632 case R_SH_TLS_LE_32:
6633 if (info->shared)
6634 {
d003868e
AM
6635 (*_bfd_error_handler)
6636 (_("%B: TLS local exec code cannot be linked into shared objects"),
6637 abfd);
b34976b6 6638 return FALSE;
3376eaf5
KK
6639 }
6640
267fb3c1 6641 break;
3376eaf5 6642
3376eaf5 6643 case R_SH_TLS_LDO_32:
267fb3c1 6644 /* Nothing to do. */
3376eaf5
KK
6645 break;
6646
6647 default:
6648 break;
435b1e90 6649 }
252b5132 6650 }
435b1e90 6651
b34976b6 6652 return TRUE;
252b5132
RH
6653}
6654
fbca6ad9 6655#ifndef sh_elf_set_mach_from_flags
f6f9408f
JR
6656static unsigned int sh_ef_bfd_table[] = { EF_SH_BFD_TABLE };
6657
b34976b6 6658static bfd_boolean
09fd220b 6659sh_elf_set_mach_from_flags (bfd *abfd)
d4845d57 6660{
f6f9408f
JR
6661 flagword flags = elf_elfheader (abfd)->e_flags & EF_SH_MACH_MASK;
6662
6663 if (flags >= sizeof(sh_ef_bfd_table))
6664 return FALSE;
6665
6666 if (sh_ef_bfd_table[flags] == 0)
6667 return FALSE;
6668
6669 bfd_default_set_arch_mach (abfd, bfd_arch_sh, sh_ef_bfd_table[flags]);
d4845d57 6670
b34976b6 6671 return TRUE;
d4845d57 6672}
f6f9408f
JR
6673
6674
6675/* Reverse table lookup for sh_ef_bfd_table[].
6676 Given a bfd MACH value from archures.c
6677 return the equivalent ELF flags from the table.
6678 Return -1 if no match is found. */
6679
6680int
6681sh_elf_get_flags_from_mach (unsigned long mach)
6682{
4195f552 6683 int i = ARRAY_SIZE (sh_ef_bfd_table) - 1;
f6f9408f
JR
6684
6685 for (; i>0; i--)
6686 if (sh_ef_bfd_table[i] == mach)
6687 return i;
6688
6689 /* shouldn't get here */
6690 BFD_FAIL();
6691
6692 return -1;
6693}
fbca6ad9 6694#endif /* not sh_elf_set_mach_from_flags */
d4845d57 6695
fbca6ad9 6696#ifndef sh_elf_set_private_flags
435b1e90
KH
6697/* Function to keep SH specific file flags. */
6698
b34976b6 6699static bfd_boolean
09fd220b 6700sh_elf_set_private_flags (bfd *abfd, flagword flags)
d4845d57
JR
6701{
6702 BFD_ASSERT (! elf_flags_init (abfd)
6703 || elf_elfheader (abfd)->e_flags == flags);
6704
6705 elf_elfheader (abfd)->e_flags = flags;
b34976b6 6706 elf_flags_init (abfd) = TRUE;
d4845d57
JR
6707 return sh_elf_set_mach_from_flags (abfd);
6708}
fbca6ad9 6709#endif /* not sh_elf_set_private_flags */
d4845d57 6710
fbca6ad9 6711#ifndef sh_elf_copy_private_data
d4845d57 6712/* Copy backend specific data from one object module to another */
435b1e90 6713
b34976b6 6714static bfd_boolean
09fd220b 6715sh_elf_copy_private_data (bfd * ibfd, bfd * obfd)
d4845d57 6716{
104d59d1
JM
6717 /* Copy object attributes. */
6718 _bfd_elf_copy_obj_attributes (ibfd, obfd);
6719
0ffa91dd
NC
6720 if (! is_sh_elf (ibfd) || ! is_sh_elf (obfd))
6721 return TRUE;
6722
8e45593f
NC
6723 /* Copy the stack size. */
6724 if (elf_tdata (ibfd)->phdr && elf_tdata (obfd)->phdr
6725 && fdpic_object_p (ibfd) && fdpic_object_p (obfd))
6726 {
6727 unsigned i;
6728
6729 for (i = 0; i < elf_elfheader (ibfd)->e_phnum; i++)
6730 if (elf_tdata (ibfd)->phdr[i].p_type == PT_GNU_STACK)
6731 {
6732 Elf_Internal_Phdr *iphdr = &elf_tdata (ibfd)->phdr[i];
6733
6734 for (i = 0; i < elf_elfheader (obfd)->e_phnum; i++)
6735 if (elf_tdata (obfd)->phdr[i].p_type == PT_GNU_STACK)
6736 {
6737 memcpy (&elf_tdata (obfd)->phdr[i], iphdr, sizeof (*iphdr));
6738
6739 /* Rewrite the phdrs, since we're only called after they
6740 were first written. */
6741 if (bfd_seek (obfd,
6742 (bfd_signed_vma) get_elf_backend_data (obfd)
6743 ->s->sizeof_ehdr, SEEK_SET) != 0
6744 || get_elf_backend_data (obfd)->s
6745 ->write_out_phdrs (obfd, elf_tdata (obfd)->phdr,
6746 elf_elfheader (obfd)->e_phnum) != 0)
6747 return FALSE;
6748 break;
6749 }
6750
6751 break;
6752 }
6753 }
6754
d4845d57
JR
6755 return sh_elf_set_private_flags (obfd, elf_elfheader (ibfd)->e_flags);
6756}
fbca6ad9 6757#endif /* not sh_elf_copy_private_data */
d4845d57 6758
fbca6ad9 6759#ifndef sh_elf_merge_private_data
d4845d57 6760
f6f9408f
JR
6761/* This function returns the ELF architecture number that
6762 corresponds to the given arch_sh* flags. */
85fbca6a 6763
f6f9408f
JR
6764int
6765sh_find_elf_flags (unsigned int arch_set)
d4845d57 6766{
85fbca6a 6767 extern unsigned long sh_get_bfd_mach_from_arch_set (unsigned int);
f6f9408f 6768 unsigned long bfd_mach = sh_get_bfd_mach_from_arch_set (arch_set);
d4845d57 6769
f6f9408f
JR
6770 return sh_elf_get_flags_from_mach (bfd_mach);
6771}
f6f9408f
JR
6772
6773/* This routine initialises the elf flags when required and
6774 calls sh_merge_bfd_arch() to check dsp/fpu compatibility. */
d4845d57 6775
f6f9408f
JR
6776static bfd_boolean
6777sh_elf_merge_private_data (bfd *ibfd, bfd *obfd)
6778{
85fbca6a
NC
6779 extern bfd_boolean sh_merge_bfd_arch (bfd *, bfd *);
6780
0ffa91dd 6781 if (! is_sh_elf (ibfd) || ! is_sh_elf (obfd))
b34976b6 6782 return TRUE;
d4845d57
JR
6783
6784 if (! elf_flags_init (obfd))
6785 {
a39b79b9 6786 /* This happens when ld starts out with a 'blank' output file. */
b34976b6 6787 elf_flags_init (obfd) = TRUE;
8e45593f 6788 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
f6f9408f 6789 sh_elf_set_mach_from_flags (obfd);
8e45593f
NC
6790 if (elf_elfheader (obfd)->e_flags & EF_SH_FDPIC)
6791 elf_elfheader (obfd)->e_flags |= EF_SH_PIC;
d4845d57 6792 }
d4845d57 6793
85fbca6a 6794 if (! sh_merge_bfd_arch (ibfd, obfd))
1d70c7fb 6795 {
d003868e 6796 _bfd_error_handler ("%B: uses instructions which are incompatible "
1d70c7fb 6797 "with instructions used in previous modules",
d003868e 6798 ibfd);
1d70c7fb
AO
6799 bfd_set_error (bfd_error_bad_value);
6800 return FALSE;
6801 }
f6f9408f 6802
8e45593f
NC
6803 elf_elfheader (obfd)->e_flags &= ~EF_SH_MACH_MASK;
6804 elf_elfheader (obfd)->e_flags |=
f6f9408f 6805 sh_elf_get_flags_from_mach (bfd_get_mach (obfd));
8e45593f
NC
6806
6807 if (fdpic_object_p (ibfd) != fdpic_object_p (obfd))
6808 {
6809 _bfd_error_handler ("%B: attempt to mix FDPIC and non-FDPIC objects",
6810 ibfd);
6811 bfd_set_error (bfd_error_bad_value);
6812 return FALSE;
6813 }
6814
f6f9408f 6815 return TRUE;
d4845d57 6816}
fbca6ad9 6817#endif /* not sh_elf_merge_private_data */
d4845d57 6818
3376eaf5
KK
6819/* Override the generic function because we need to store sh_elf_obj_tdata
6820 as the specific tdata. We set also the machine architecture from flags
6821 here. */
6822
b34976b6 6823static bfd_boolean
09fd220b 6824sh_elf_object_p (bfd *abfd)
3376eaf5 6825{
8e45593f
NC
6826 if (! sh_elf_set_mach_from_flags (abfd))
6827 return FALSE;
6828
6829 return (((elf_elfheader (abfd)->e_flags & EF_SH_FDPIC) != 0)
6830 == fdpic_object_p (abfd));
3376eaf5
KK
6831}
6832
37c644f2
AO
6833/* Finish up dynamic symbol handling. We set the contents of various
6834 dynamic sections here. */
6835
b34976b6 6836static bfd_boolean
09fd220b
KK
6837sh_elf_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
6838 struct elf_link_hash_entry *h,
6839 Elf_Internal_Sym *sym)
37c644f2 6840{
067653c5 6841 struct elf_sh_link_hash_table *htab;
37c644f2 6842
067653c5 6843 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
6844 if (htab == NULL)
6845 return FALSE;
37c644f2
AO
6846
6847 if (h->plt.offset != (bfd_vma) -1)
6848 {
6849 asection *splt;
8e45593f
NC
6850 asection *sgotplt;
6851 asection *srelplt;
37c644f2
AO
6852
6853 bfd_vma plt_index;
6854 bfd_vma got_offset;
6855 Elf_Internal_Rela rel;
947216bf 6856 bfd_byte *loc;
8e45593f 6857 const struct elf_sh_plt_info *plt_info;
37c644f2
AO
6858
6859 /* This symbol has an entry in the procedure linkage table. Set
6860 it up. */
6861
6862 BFD_ASSERT (h->dynindx != -1);
6863
067653c5 6864 splt = htab->splt;
8e45593f
NC
6865 sgotplt = htab->sgotplt;
6866 srelplt = htab->srelplt;
6867 BFD_ASSERT (splt != NULL && sgotplt != NULL && srelplt != NULL);
37c644f2
AO
6868
6869 /* Get the index in the procedure linkage table which
6870 corresponds to this symbol. This is the index of this symbol
6871 in all the symbols for which we are making plt entries. The
6872 first entry in the procedure linkage table is reserved. */
55e6e397 6873 plt_index = get_plt_index (htab->plt_info, h->plt.offset);
37c644f2 6874
8e45593f
NC
6875 plt_info = htab->plt_info;
6876 if (plt_info->short_plt != NULL && plt_index <= MAX_SHORT_PLT)
6877 plt_info = plt_info->short_plt;
6878
37c644f2 6879 /* Get the offset into the .got table of the entry that
8e45593f
NC
6880 corresponds to this function. */
6881 if (htab->fdpic_p)
6882 /* The offset must be relative to the GOT symbol, twelve bytes
6883 before the end of .got.plt. Each descriptor is eight
6884 bytes. */
6885 got_offset = plt_index * 8 + 12 - sgotplt->size;
6886 else
6887 /* Each .got entry is 4 bytes. The first three are
6888 reserved. */
6889 got_offset = (plt_index + 3) * 4;
37c644f2 6890
fbca6ad9 6891#ifdef GOT_BIAS
c8614e8e
AM
6892 if (info->shared)
6893 got_offset -= GOT_BIAS;
fbca6ad9
AO
6894#endif
6895
37c644f2 6896 /* Fill in the entry in the procedure linkage table. */
55e6e397 6897 memcpy (splt->contents + h->plt.offset,
8e45593f
NC
6898 plt_info->symbol_entry,
6899 plt_info->symbol_entry_size);
55e6e397 6900
8e45593f
NC
6901 if (info->shared || htab->fdpic_p)
6902 {
6903 if (plt_info->symbol_fields.got20)
6904 {
6905 bfd_reloc_status_type r;
6906 r = install_movi20_field (output_bfd, got_offset,
6907 splt->owner, splt, splt->contents,
6908 h->plt.offset
6909 + plt_info->symbol_fields.got_entry);
6910 BFD_ASSERT (r == bfd_reloc_ok);
6911 }
6912 else
6913 install_plt_field (output_bfd, FALSE, got_offset,
6914 (splt->contents
6915 + h->plt.offset
6916 + plt_info->symbol_fields.got_entry));
6917 }
55e6e397 6918 else
37c644f2 6919 {
8e45593f
NC
6920 BFD_ASSERT (!plt_info->symbol_fields.got20);
6921
55e6e397 6922 install_plt_field (output_bfd, FALSE,
8e45593f
NC
6923 (sgotplt->output_section->vma
6924 + sgotplt->output_offset
fbca6ad9 6925 + got_offset),
55e6e397
RS
6926 (splt->contents
6927 + h->plt.offset
8e45593f 6928 + plt_info->symbol_fields.got_entry));
55e6e397 6929 if (htab->vxworks_p)
37c644f2 6930 {
55e6e397
RS
6931 unsigned int reachable_plts, plts_per_4k;
6932 int distance;
6933
6934 /* Divide the PLT into groups. The first group contains
6935 REACHABLE_PLTS entries and the other groups contain
6936 PLTS_PER_4K entries. Entries in the first group can
6937 branch directly to .plt; those in later groups branch
6938 to the last element of the previous group. */
6939 /* ??? It would be better to create multiple copies of
6940 the common resolver stub. */
6941 reachable_plts = ((4096
8e45593f
NC
6942 - plt_info->plt0_entry_size
6943 - (plt_info->symbol_fields.plt + 4))
6944 / plt_info->symbol_entry_size) + 1;
6945 plts_per_4k = (4096 / plt_info->symbol_entry_size);
55e6e397
RS
6946 if (plt_index < reachable_plts)
6947 distance = -(h->plt.offset
8e45593f 6948 + plt_info->symbol_fields.plt);
55e6e397
RS
6949 else
6950 distance = -(((plt_index - reachable_plts) % plts_per_4k + 1)
8e45593f 6951 * plt_info->symbol_entry_size);
55e6e397
RS
6952
6953 /* Install the 'bra' with this offset. */
6954 bfd_put_16 (output_bfd,
6955 0xa000 | (0x0fff & ((distance - 4) / 2)),
6956 (splt->contents
6957 + h->plt.offset
8e45593f 6958 + plt_info->symbol_fields.plt));
37c644f2 6959 }
55e6e397
RS
6960 else
6961 install_plt_field (output_bfd, TRUE,
6962 splt->output_section->vma + splt->output_offset,
6963 (splt->contents
6964 + h->plt.offset
8e45593f 6965 + plt_info->symbol_fields.plt));
37c644f2
AO
6966 }
6967
8e45593f 6968 /* Make got_offset relative to the start of .got.plt. */
fbca6ad9 6969#ifdef GOT_BIAS
c8614e8e
AM
6970 if (info->shared)
6971 got_offset += GOT_BIAS;
fbca6ad9 6972#endif
8e45593f
NC
6973 if (htab->fdpic_p)
6974 got_offset = plt_index * 8;
fbca6ad9 6975
8e45593f
NC
6976 if (plt_info->symbol_fields.reloc_offset != MINUS_ONE)
6977 install_plt_field (output_bfd, FALSE,
6978 plt_index * sizeof (Elf32_External_Rela),
6979 (splt->contents
6980 + h->plt.offset
6981 + plt_info->symbol_fields.reloc_offset));
37c644f2
AO
6982
6983 /* Fill in the entry in the global offset table. */
6984 bfd_put_32 (output_bfd,
6985 (splt->output_section->vma
6986 + splt->output_offset
6987 + h->plt.offset
8e45593f
NC
6988 + plt_info->symbol_resolve_offset),
6989 sgotplt->contents + got_offset);
6990 if (htab->fdpic_p)
6991 bfd_put_32 (output_bfd,
6992 sh_elf_osec_to_segment (output_bfd,
6993 htab->splt->output_section),
6994 sgotplt->contents + got_offset + 4);
37c644f2
AO
6995
6996 /* Fill in the entry in the .rela.plt section. */
8e45593f
NC
6997 rel.r_offset = (sgotplt->output_section->vma
6998 + sgotplt->output_offset
37c644f2 6999 + got_offset);
8e45593f
NC
7000 if (htab->fdpic_p)
7001 rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_FUNCDESC_VALUE);
7002 else
7003 rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_JMP_SLOT);
37c644f2 7004 rel.r_addend = 0;
fbca6ad9
AO
7005#ifdef GOT_BIAS
7006 rel.r_addend = GOT_BIAS;
7007#endif
8e45593f 7008 loc = srelplt->contents + plt_index * sizeof (Elf32_External_Rela);
947216bf 7009 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
37c644f2 7010
55e6e397
RS
7011 if (htab->vxworks_p && !info->shared)
7012 {
7013 /* Create the .rela.plt.unloaded relocations for this PLT entry.
7014 Begin by pointing LOC to the first such relocation. */
7015 loc = (htab->srelplt2->contents
7016 + (plt_index * 2 + 1) * sizeof (Elf32_External_Rela));
7017
7018 /* Create a .rela.plt.unloaded R_SH_DIR32 relocation
7019 for the PLT entry's pointer to the .got.plt entry. */
7020 rel.r_offset = (htab->splt->output_section->vma
7021 + htab->splt->output_offset
7022 + h->plt.offset
8e45593f 7023 + plt_info->symbol_fields.got_entry);
55e6e397
RS
7024 rel.r_info = ELF32_R_INFO (htab->root.hgot->indx, R_SH_DIR32);
7025 rel.r_addend = got_offset;
7026 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
7027 loc += sizeof (Elf32_External_Rela);
7028
7029 /* Create a .rela.plt.unloaded R_SH_DIR32 relocation for
7030 the .got.plt entry, which initially points to .plt. */
8e45593f
NC
7031 rel.r_offset = (sgotplt->output_section->vma
7032 + sgotplt->output_offset
55e6e397
RS
7033 + got_offset);
7034 rel.r_info = ELF32_R_INFO (htab->root.hplt->indx, R_SH_DIR32);
7035 rel.r_addend = 0;
7036 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
7037 }
7038
f5385ebf 7039 if (!h->def_regular)
37c644f2
AO
7040 {
7041 /* Mark the symbol as undefined, rather than as defined in
7042 the .plt section. Leave the value alone. */
7043 sym->st_shndx = SHN_UNDEF;
7044 }
7045 }
7046
3376eaf5 7047 if (h->got.offset != (bfd_vma) -1
8e45593f
NC
7048 && sh_elf_hash_entry (h)->got_type != GOT_TLS_GD
7049 && sh_elf_hash_entry (h)->got_type != GOT_TLS_IE
7050 && sh_elf_hash_entry (h)->got_type != GOT_FUNCDESC)
37c644f2
AO
7051 {
7052 asection *sgot;
8e45593f 7053 asection *srelgot;
37c644f2 7054 Elf_Internal_Rela rel;
947216bf 7055 bfd_byte *loc;
37c644f2
AO
7056
7057 /* This symbol has an entry in the global offset table. Set it
7058 up. */
7059
067653c5 7060 sgot = htab->sgot;
8e45593f
NC
7061 srelgot = htab->srelgot;
7062 BFD_ASSERT (sgot != NULL && srelgot != NULL);
37c644f2
AO
7063
7064 rel.r_offset = (sgot->output_section->vma
7065 + sgot->output_offset
dc810e39 7066 + (h->got.offset &~ (bfd_vma) 1));
37c644f2 7067
067653c5
AM
7068 /* If this is a static link, or it is a -Bsymbolic link and the
7069 symbol is defined locally or was forced to be local because
7070 of a version file, we just want to emit a RELATIVE reloc.
37c644f2
AO
7071 The entry in the global offset table will already have been
7072 initialized in the relocate_section function. */
7073 if (info->shared
3d85aebe 7074 && SYMBOL_REFERENCES_LOCAL (info, h))
37c644f2 7075 {
8e45593f
NC
7076 if (htab->fdpic_p)
7077 {
7078 asection *sec = h->root.u.def.section;
7079 int dynindx
7080 = elf_section_data (sec->output_section)->dynindx;
7081
7082 rel.r_info = ELF32_R_INFO (dynindx, R_SH_DIR32);
7083 rel.r_addend = (h->root.u.def.value
7084 + h->root.u.def.section->output_offset);
7085 }
7086 else
7087 {
7088 rel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
7089 rel.r_addend = (h->root.u.def.value
7090 + h->root.u.def.section->output_section->vma
7091 + h->root.u.def.section->output_offset);
7092 }
37c644f2
AO
7093 }
7094 else
7095 {
7096 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset);
7097 rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_GLOB_DAT);
7098 rel.r_addend = 0;
7099 }
7100
8e45593f
NC
7101 loc = srelgot->contents;
7102 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
947216bf 7103 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
37c644f2
AO
7104 }
7105
396a6083
SC
7106#ifdef INCLUDE_SHMEDIA
7107 {
7108 struct elf_sh_link_hash_entry *eh;
7109
7110 eh = (struct elf_sh_link_hash_entry *) h;
7111 if (eh->datalabel_got.offset != (bfd_vma) -1)
7112 {
7113 asection *sgot;
8e45593f 7114 asection *srelgot;
396a6083 7115 Elf_Internal_Rela rel;
947216bf 7116 bfd_byte *loc;
396a6083
SC
7117
7118 /* This symbol has a datalabel entry in the global offset table.
7119 Set it up. */
7120
7121 sgot = htab->sgot;
8e45593f
NC
7122 srelgot = htab->srelgot;
7123 BFD_ASSERT (sgot != NULL && srelgot != NULL);
396a6083
SC
7124
7125 rel.r_offset = (sgot->output_section->vma
7126 + sgot->output_offset
7127 + (eh->datalabel_got.offset &~ (bfd_vma) 1));
7128
7129 /* If this is a static link, or it is a -Bsymbolic link and the
7130 symbol is defined locally or was forced to be local because
7131 of a version file, we just want to emit a RELATIVE reloc.
7132 The entry in the global offset table will already have been
7133 initialized in the relocate_section function. */
7134 if (info->shared
3d85aebe 7135 && SYMBOL_REFERENCES_LOCAL (info, h))
396a6083 7136 {
8e45593f
NC
7137 if (htab->fdpic_p)
7138 {
7139 asection *sec = h->root.u.def.section;
7140 int dynindx
7141 = elf_section_data (sec->output_section)->dynindx;
7142
7143 rel.r_info = ELF32_R_INFO (dynindx, R_SH_DIR32);
7144 rel.r_addend = (h->root.u.def.value
7145 + h->root.u.def.section->output_offset);
7146 }
7147 else
7148 {
7149 rel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
7150 rel.r_addend = (h->root.u.def.value
7151 + h->root.u.def.section->output_section->vma
7152 + h->root.u.def.section->output_offset);
7153 }
396a6083
SC
7154 }
7155 else
7156 {
7157 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents
7158 + eh->datalabel_got.offset);
7159 rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_GLOB_DAT);
7160 rel.r_addend = 0;
7161 }
7162
8e45593f
NC
7163 loc = srelgot->contents;
7164 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
947216bf 7165 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
396a6083
SC
7166 }
7167 }
7168#endif
7169
f5385ebf 7170 if (h->needs_copy)
37c644f2
AO
7171 {
7172 asection *s;
7173 Elf_Internal_Rela rel;
947216bf 7174 bfd_byte *loc;
37c644f2
AO
7175
7176 /* This symbol needs a copy reloc. Set it up. */
7177
7178 BFD_ASSERT (h->dynindx != -1
7179 && (h->root.type == bfd_link_hash_defined
7180 || h->root.type == bfd_link_hash_defweak));
7181
7182 s = bfd_get_section_by_name (h->root.u.def.section->owner,
7183 ".rela.bss");
7184 BFD_ASSERT (s != NULL);
7185
7186 rel.r_offset = (h->root.u.def.value
7187 + h->root.u.def.section->output_section->vma
7188 + h->root.u.def.section->output_offset);
7189 rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_COPY);
7190 rel.r_addend = 0;
947216bf
AM
7191 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
7192 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
37c644f2
AO
7193 }
7194
55e6e397
RS
7195 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. On VxWorks,
7196 _GLOBAL_OFFSET_TABLE_ is not absolute: it is relative to the
7197 ".got" section. */
37c644f2 7198 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
55e6e397 7199 || (!htab->vxworks_p && h == htab->root.hgot))
37c644f2
AO
7200 sym->st_shndx = SHN_ABS;
7201
b34976b6 7202 return TRUE;
37c644f2
AO
7203}
7204
7205/* Finish up the dynamic sections. */
7206
b34976b6 7207static bfd_boolean
09fd220b 7208sh_elf_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
37c644f2 7209{
067653c5 7210 struct elf_sh_link_hash_table *htab;
8e45593f 7211 asection *sgotplt;
37c644f2
AO
7212 asection *sdyn;
7213
067653c5 7214 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
7215 if (htab == NULL)
7216 return FALSE;
7217
8e45593f 7218 sgotplt = htab->sgotplt;
2293c499 7219 sdyn = bfd_get_section_by_name (htab->root.dynobj, ".dynamic");
37c644f2 7220
067653c5 7221 if (htab->root.dynamic_sections_created)
37c644f2
AO
7222 {
7223 asection *splt;
7224 Elf32_External_Dyn *dyncon, *dynconend;
7225
8e45593f 7226 BFD_ASSERT (sgotplt != NULL && sdyn != NULL);
37c644f2
AO
7227
7228 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 7229 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
37c644f2
AO
7230 for (; dyncon < dynconend; dyncon++)
7231 {
7232 Elf_Internal_Dyn dyn;
37c644f2 7233 asection *s;
067653c5
AM
7234#ifdef INCLUDE_SHMEDIA
7235 const char *name;
7236#endif
37c644f2 7237
2293c499 7238 bfd_elf32_swap_dyn_in (htab->root.dynobj, dyncon, &dyn);
37c644f2
AO
7239
7240 switch (dyn.d_tag)
7241 {
7242 default:
7a2b07ff
NS
7243 if (htab->vxworks_p
7244 && elf_vxworks_finish_dynamic_entry (output_bfd, &dyn))
7245 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
37c644f2
AO
7246 break;
7247
3b587c71
AM
7248#ifdef INCLUDE_SHMEDIA
7249 case DT_INIT:
7250 name = info->init_function;
7251 goto get_sym;
7252
7253 case DT_FINI:
7254 name = info->fini_function;
7255 get_sym:
7256 if (dyn.d_un.d_val != 0)
7257 {
067653c5
AM
7258 struct elf_link_hash_entry *h;
7259
7260 h = elf_link_hash_lookup (&htab->root, name,
b34976b6 7261 FALSE, FALSE, TRUE);
3b587c71
AM
7262 if (h != NULL && (h->other & STO_SH5_ISA32))
7263 {
7264 dyn.d_un.d_val |= 1;
7265 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7266 }
7267 }
7268 break;
7269#endif
7270
37c644f2 7271 case DT_PLTGOT:
8e45593f
NC
7272 BFD_ASSERT (htab->root.hgot != NULL);
7273 s = htab->root.hgot->root.u.def.section;
7274 dyn.d_un.d_ptr = htab->root.hgot->root.u.def.value
7275 + s->output_section->vma + s->output_offset;
7276 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7277 break;
37c644f2
AO
7278
7279 case DT_JMPREL:
067653c5 7280 s = htab->srelplt->output_section;
37c644f2
AO
7281 BFD_ASSERT (s != NULL);
7282 dyn.d_un.d_ptr = s->vma;
7283 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7284 break;
7285
7286 case DT_PLTRELSZ:
067653c5 7287 s = htab->srelplt->output_section;
37c644f2 7288 BFD_ASSERT (s != NULL);
eea6121a 7289 dyn.d_un.d_val = s->size;
37c644f2
AO
7290 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7291 break;
7292
7293 case DT_RELASZ:
7294 /* My reading of the SVR4 ABI indicates that the
7295 procedure linkage table relocs (DT_JMPREL) should be
7296 included in the overall relocs (DT_RELA). This is
7297 what Solaris does. However, UnixWare can not handle
7298 that case. Therefore, we override the DT_RELASZ entry
7299 here to make it not include the JMPREL relocs. Since
7300 the linker script arranges for .rela.plt to follow all
7301 other relocation sections, we don't have to worry
7302 about changing the DT_RELA entry. */
067653c5 7303 if (htab->srelplt != NULL)
37c644f2 7304 {
067653c5 7305 s = htab->srelplt->output_section;
eea6121a 7306 dyn.d_un.d_val -= s->size;
37c644f2
AO
7307 }
7308 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7309 break;
7310 }
7311 }
7312
7313 /* Fill in the first entry in the procedure linkage table. */
067653c5 7314 splt = htab->splt;
55e6e397 7315 if (splt && splt->size > 0 && htab->plt_info->plt0_entry)
37c644f2 7316 {
55e6e397
RS
7317 unsigned int i;
7318
7319 memcpy (splt->contents,
7320 htab->plt_info->plt0_entry,
7321 htab->plt_info->plt0_entry_size);
7322 for (i = 0; i < ARRAY_SIZE (htab->plt_info->plt0_got_fields); i++)
7323 if (htab->plt_info->plt0_got_fields[i] != MINUS_ONE)
7324 install_plt_field (output_bfd, FALSE,
8e45593f
NC
7325 (sgotplt->output_section->vma
7326 + sgotplt->output_offset
55e6e397
RS
7327 + (i * 4)),
7328 (splt->contents
7329 + htab->plt_info->plt0_got_fields[i]));
7330
7331 if (htab->vxworks_p)
37c644f2 7332 {
55e6e397
RS
7333 /* Finalize the .rela.plt.unloaded contents. */
7334 Elf_Internal_Rela rel;
7335 bfd_byte *loc;
7336
7337 /* Create a .rela.plt.unloaded R_SH_DIR32 relocation for the
7338 first PLT entry's pointer to _GLOBAL_OFFSET_TABLE_ + 8. */
7339 loc = htab->srelplt2->contents;
7340 rel.r_offset = (splt->output_section->vma
7341 + splt->output_offset
7342 + htab->plt_info->plt0_got_fields[2]);
7343 rel.r_info = ELF32_R_INFO (htab->root.hgot->indx, R_SH_DIR32);
7344 rel.r_addend = 8;
7345 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
7346 loc += sizeof (Elf32_External_Rela);
7347
7348 /* Fix up the remaining .rela.plt.unloaded relocations.
7349 They may have the wrong symbol index for _G_O_T_ or
7350 _P_L_T_ depending on the order in which symbols were
7351 output. */
7352 while (loc < htab->srelplt2->contents + htab->srelplt2->size)
37c644f2 7353 {
55e6e397
RS
7354 /* The PLT entry's pointer to the .got.plt slot. */
7355 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7356 rel.r_info = ELF32_R_INFO (htab->root.hgot->indx,
7357 R_SH_DIR32);
7358 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
7359 loc += sizeof (Elf32_External_Rela);
7360
7361 /* The .got.plt slot's pointer to .plt. */
7362 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7363 rel.r_info = ELF32_R_INFO (htab->root.hplt->indx,
7364 R_SH_DIR32);
7365 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
7366 loc += sizeof (Elf32_External_Rela);
37c644f2 7367 }
37c644f2
AO
7368 }
7369
7370 /* UnixWare sets the entsize of .plt to 4, although that doesn't
7371 really seem like the right value. */
7372 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 4;
7373 }
7374 }
7375
7376 /* Fill in the first three entries in the global offset table. */
8e45593f 7377 if (sgotplt && sgotplt->size > 0 && !htab->fdpic_p)
37c644f2
AO
7378 {
7379 if (sdyn == NULL)
8e45593f 7380 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents);
37c644f2
AO
7381 else
7382 bfd_put_32 (output_bfd,
7383 sdyn->output_section->vma + sdyn->output_offset,
8e45593f
NC
7384 sgotplt->contents);
7385 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 4);
7386 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 8);
7387 }
37c644f2 7388
8e45593f
NC
7389 if (sgotplt && sgotplt->size > 0)
7390 elf_section_data (sgotplt->output_section)->this_hdr.sh_entsize = 4;
7391
7392 /* At the very end of the .rofixup section is a pointer to the GOT. */
7393 if (htab->fdpic_p && htab->srofixup != NULL)
7394 {
7395 struct elf_link_hash_entry *hgot = htab->root.hgot;
7396 bfd_vma got_value = hgot->root.u.def.value
7397 + hgot->root.u.def.section->output_section->vma
7398 + hgot->root.u.def.section->output_offset;
7399
7400 sh_elf_add_rofixup (output_bfd, htab->srofixup, got_value);
7401
7402 /* Make sure we allocated and generated the same number of fixups. */
7403 BFD_ASSERT (htab->srofixup->reloc_count * 4 == htab->srofixup->size);
067653c5 7404 }
37c644f2 7405
8e45593f
NC
7406 if (htab->srelfuncdesc)
7407 BFD_ASSERT (htab->srelfuncdesc->reloc_count * sizeof (Elf32_External_Rela)
7408 == htab->srelfuncdesc->size);
7409
7410 if (htab->srelgot)
7411 BFD_ASSERT (htab->srelgot->reloc_count * sizeof (Elf32_External_Rela)
7412 == htab->srelgot->size);
7413
b34976b6 7414 return TRUE;
37c644f2
AO
7415}
7416
99e4ae17 7417static enum elf_reloc_type_class
09fd220b 7418sh_elf_reloc_type_class (const Elf_Internal_Rela *rela)
99e4ae17 7419{
f51e552e 7420 switch ((int) ELF32_R_TYPE (rela->r_info))
99e4ae17
AJ
7421 {
7422 case R_SH_RELATIVE:
7423 return reloc_class_relative;
7424 case R_SH_JMP_SLOT:
7425 return reloc_class_plt;
7426 case R_SH_COPY:
7427 return reloc_class_copy;
7428 default:
7429 return reloc_class_normal;
7430 }
7431}
7432
85fbca6a 7433#if !defined SH_TARGET_ALREADY_DEFINED
571fe01f 7434/* Support for Linux core dump NOTE sections. */
85fbca6a 7435
b34976b6 7436static bfd_boolean
09fd220b 7437elf32_shlin_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
2bc3c89a
AM
7438{
7439 int offset;
eea6121a 7440 unsigned int size;
2bc3c89a
AM
7441
7442 switch (note->descsz)
7443 {
7444 default:
b34976b6 7445 return FALSE;
2bc3c89a
AM
7446
7447 case 168: /* Linux/SH */
7448 /* pr_cursig */
7449 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
7450
7451 /* pr_pid */
261b8d08 7452 elf_tdata (abfd)->core_lwpid = bfd_get_32 (abfd, note->descdata + 24);
2bc3c89a
AM
7453
7454 /* pr_reg */
7455 offset = 72;
eea6121a 7456 size = 92;
2bc3c89a
AM
7457
7458 break;
7459 }
7460
7461 /* Make a ".reg/999" section. */
7462 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 7463 size, note->descpos + offset);
2bc3c89a
AM
7464}
7465
b34976b6 7466static bfd_boolean
09fd220b 7467elf32_shlin_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2bc3c89a
AM
7468{
7469 switch (note->descsz)
7470 {
7471 default:
b34976b6 7472 return FALSE;
2bc3c89a
AM
7473
7474 case 124: /* Linux/SH elf_prpsinfo */
7475 elf_tdata (abfd)->core_program
7476 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
7477 elf_tdata (abfd)->core_command
7478 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
7479 }
7480
7481 /* Note that for some reason, a spurious space is tacked
7482 onto the end of the args in some (at least one anyway)
7483 implementations, so strip it off if it exists. */
7484
7485 {
7486 char *command = elf_tdata (abfd)->core_command;
7487 int n = strlen (command);
7488
7489 if (0 < n && command[n - 1] == ' ')
7490 command[n - 1] = '\0';
7491 }
7492
b34976b6 7493 return TRUE;
2bc3c89a 7494}
85fbca6a 7495#endif /* not SH_TARGET_ALREADY_DEFINED */
2bc3c89a 7496
1f1799d5
KK
7497
7498/* Return address for Ith PLT stub in section PLT, for relocation REL
7499 or (bfd_vma) -1 if it should not be included. */
7500
7501static bfd_vma
7502sh_elf_plt_sym_val (bfd_vma i, const asection *plt,
7503 const arelent *rel ATTRIBUTE_UNUSED)
7504{
55e6e397
RS
7505 const struct elf_sh_plt_info *plt_info;
7506
7507 plt_info = get_plt_info (plt->owner, (plt->owner->flags & DYNAMIC) != 0);
7508 return plt->vma + get_plt_offset (plt_info, i);
1f1799d5
KK
7509}
7510
8e45593f
NC
7511/* Decide whether to attempt to turn absptr or lsda encodings in
7512 shared libraries into pcrel within the given input section. */
7513
7514static bfd_boolean
7515sh_elf_use_relative_eh_frame (bfd *input_bfd ATTRIBUTE_UNUSED,
7516 struct bfd_link_info *info,
7517 asection *eh_frame_section ATTRIBUTE_UNUSED)
7518{
7519 struct elf_sh_link_hash_table *htab = sh_elf_hash_table (info);
7520
7521 /* We can't use PC-relative encodings in FDPIC binaries, in general. */
7522 if (htab->fdpic_p)
7523 return FALSE;
7524
7525 return TRUE;
7526}
7527
7528/* Adjust the contents of an eh_frame_hdr section before they're output. */
7529
7530static bfd_byte
7531sh_elf_encode_eh_address (bfd *abfd,
7532 struct bfd_link_info *info,
7533 asection *osec, bfd_vma offset,
7534 asection *loc_sec, bfd_vma loc_offset,
7535 bfd_vma *encoded)
7536{
7537 struct elf_sh_link_hash_table *htab = sh_elf_hash_table (info);
7538 struct elf_link_hash_entry *h;
7539
7540 if (!htab->fdpic_p)
7541 return _bfd_elf_encode_eh_address (abfd, info, osec, offset, loc_sec,
7542 loc_offset, encoded);
7543
7544 h = htab->root.hgot;
7545 BFD_ASSERT (h && h->root.type == bfd_link_hash_defined);
7546
7547 if (! h || (sh_elf_osec_to_segment (abfd, osec)
7548 == sh_elf_osec_to_segment (abfd, loc_sec->output_section)))
7549 return _bfd_elf_encode_eh_address (abfd, info, osec, offset,
7550 loc_sec, loc_offset, encoded);
7551
7552 BFD_ASSERT (sh_elf_osec_to_segment (abfd, osec)
7553 == (sh_elf_osec_to_segment
7554 (abfd, h->root.u.def.section->output_section)));
7555
7556 *encoded = osec->vma + offset
7557 - (h->root.u.def.value
7558 + h->root.u.def.section->output_section->vma
7559 + h->root.u.def.section->output_offset);
7560
7561 return DW_EH_PE_datarel | DW_EH_PE_sdata4;
7562}
7563
85fbca6a 7564#if !defined SH_TARGET_ALREADY_DEFINED
252b5132
RH
7565#define TARGET_BIG_SYM bfd_elf32_sh_vec
7566#define TARGET_BIG_NAME "elf32-sh"
7567#define TARGET_LITTLE_SYM bfd_elf32_shl_vec
7568#define TARGET_LITTLE_NAME "elf32-shl"
85fbca6a
NC
7569#endif
7570
252b5132
RH
7571#define ELF_ARCH bfd_arch_sh
7572#define ELF_MACHINE_CODE EM_SH
d0facd1b
NC
7573#ifdef __QNXTARGET__
7574#define ELF_MAXPAGESIZE 0x1000
7575#else
7576#define ELF_MAXPAGESIZE 0x80
7577#endif
252b5132
RH
7578
7579#define elf_symbol_leading_char '_'
7580
7581#define bfd_elf32_bfd_reloc_type_lookup sh_elf_reloc_type_lookup
157090f7
AM
7582#define bfd_elf32_bfd_reloc_name_lookup \
7583 sh_elf_reloc_name_lookup
252b5132
RH
7584#define elf_info_to_howto sh_elf_info_to_howto
7585#define bfd_elf32_bfd_relax_section sh_elf_relax_section
7586#define elf_backend_relocate_section sh_elf_relocate_section
7587#define bfd_elf32_bfd_get_relocated_section_contents \
7588 sh_elf_get_relocated_section_contents
3376eaf5
KK
7589#define bfd_elf32_mkobject sh_elf_mkobject
7590#define elf_backend_object_p sh_elf_object_p
d4845d57
JR
7591#define bfd_elf32_bfd_set_private_bfd_flags \
7592 sh_elf_set_private_flags
7593#define bfd_elf32_bfd_copy_private_bfd_data \
7594 sh_elf_copy_private_data
875f7f69 7595#define bfd_elf32_bfd_merge_private_bfd_data \
d4845d57 7596 sh_elf_merge_private_data
252b5132 7597
067653c5
AM
7598#define elf_backend_gc_mark_hook sh_elf_gc_mark_hook
7599#define elf_backend_gc_sweep_hook sh_elf_gc_sweep_hook
7600#define elf_backend_check_relocs sh_elf_check_relocs
7601#define elf_backend_copy_indirect_symbol \
7602 sh_elf_copy_indirect_symbol
37c644f2
AO
7603#define elf_backend_create_dynamic_sections \
7604 sh_elf_create_dynamic_sections
7605#define bfd_elf32_bfd_link_hash_table_create \
7606 sh_elf_link_hash_table_create
7607#define elf_backend_adjust_dynamic_symbol \
7608 sh_elf_adjust_dynamic_symbol
55e6e397
RS
7609#define elf_backend_always_size_sections \
7610 sh_elf_always_size_sections
37c644f2
AO
7611#define elf_backend_size_dynamic_sections \
7612 sh_elf_size_dynamic_sections
8e45593f 7613#define elf_backend_omit_section_dynsym sh_elf_omit_section_dynsym
37c644f2
AO
7614#define elf_backend_finish_dynamic_symbol \
7615 sh_elf_finish_dynamic_symbol
7616#define elf_backend_finish_dynamic_sections \
7617 sh_elf_finish_dynamic_sections
99e4ae17 7618#define elf_backend_reloc_type_class sh_elf_reloc_type_class
1f1799d5 7619#define elf_backend_plt_sym_val sh_elf_plt_sym_val
8e45593f
NC
7620#define elf_backend_can_make_relative_eh_frame \
7621 sh_elf_use_relative_eh_frame
7622#define elf_backend_can_make_lsda_relative_eh_frame \
7623 sh_elf_use_relative_eh_frame
7624#define elf_backend_encode_eh_address \
7625 sh_elf_encode_eh_address
37c644f2 7626
067653c5
AM
7627#define elf_backend_can_gc_sections 1
7628#define elf_backend_can_refcount 1
37c644f2
AO
7629#define elf_backend_want_got_plt 1
7630#define elf_backend_plt_readonly 1
7631#define elf_backend_want_plt_sym 0
7632#define elf_backend_got_header_size 12
ed71e111 7633
85fbca6a 7634#if !defined INCLUDE_SHMEDIA && !defined SH_TARGET_ALREADY_DEFINED
2bc3c89a 7635
252b5132 7636#include "elf32-target.h"
ed71e111 7637
2bc3c89a
AM
7638/* NetBSD support. */
7639#undef TARGET_BIG_SYM
7640#define TARGET_BIG_SYM bfd_elf32_shnbsd_vec
7641#undef TARGET_BIG_NAME
7642#define TARGET_BIG_NAME "elf32-sh-nbsd"
7643#undef TARGET_LITTLE_SYM
7644#define TARGET_LITTLE_SYM bfd_elf32_shlnbsd_vec
7645#undef TARGET_LITTLE_NAME
7646#define TARGET_LITTLE_NAME "elf32-shl-nbsd"
7647#undef ELF_MAXPAGESIZE
7648#define ELF_MAXPAGESIZE 0x10000
24718e3b 7649#undef ELF_COMMONPAGESIZE
2bc3c89a
AM
7650#undef elf_symbol_leading_char
7651#define elf_symbol_leading_char 0
571fe01f 7652#undef elf32_bed
2bc3c89a
AM
7653#define elf32_bed elf32_sh_nbsd_bed
7654
7655#include "elf32-target.h"
7656
2bc3c89a
AM
7657
7658/* Linux support. */
7659#undef TARGET_BIG_SYM
7660#define TARGET_BIG_SYM bfd_elf32_shblin_vec
7661#undef TARGET_BIG_NAME
7662#define TARGET_BIG_NAME "elf32-shbig-linux"
7663#undef TARGET_LITTLE_SYM
7664#define TARGET_LITTLE_SYM bfd_elf32_shlin_vec
7665#undef TARGET_LITTLE_NAME
7666#define TARGET_LITTLE_NAME "elf32-sh-linux"
24718e3b
L
7667#undef ELF_COMMONPAGESIZE
7668#define ELF_COMMONPAGESIZE 0x1000
2bc3c89a
AM
7669
7670#undef elf_backend_grok_prstatus
7671#define elf_backend_grok_prstatus elf32_shlin_grok_prstatus
7672#undef elf_backend_grok_psinfo
7673#define elf_backend_grok_psinfo elf32_shlin_grok_psinfo
571fe01f 7674#undef elf32_bed
2bc3c89a
AM
7675#define elf32_bed elf32_sh_lin_bed
7676
7677#include "elf32-target.h"
7678
8e45593f
NC
7679
7680/* FDPIC support. */
7681#undef TARGET_BIG_SYM
7682#define TARGET_BIG_SYM bfd_elf32_shbfd_vec
7683#undef TARGET_BIG_NAME
7684#define TARGET_BIG_NAME "elf32-shbig-fdpic"
7685#undef TARGET_LITTLE_SYM
7686#define TARGET_LITTLE_SYM bfd_elf32_shfd_vec
7687#undef TARGET_LITTLE_NAME
7688#define TARGET_LITTLE_NAME "elf32-sh-fdpic"
7689#undef elf_backend_modify_program_headers
7690#define elf_backend_modify_program_headers \
7691 sh_elf_modify_program_headers
7692
7693#undef elf32_bed
7694#define elf32_bed elf32_sh_fd_bed
7695
7696#include "elf32-target.h"
7697
7698#undef elf_backend_modify_program_headers
7699
7700/* VxWorks support. */
55e6e397
RS
7701#undef TARGET_BIG_SYM
7702#define TARGET_BIG_SYM bfd_elf32_shvxworks_vec
7703#undef TARGET_BIG_NAME
7704#define TARGET_BIG_NAME "elf32-sh-vxworks"
7705#undef TARGET_LITTLE_SYM
7706#define TARGET_LITTLE_SYM bfd_elf32_shlvxworks_vec
7707#undef TARGET_LITTLE_NAME
7708#define TARGET_LITTLE_NAME "elf32-shl-vxworks"
7709#undef elf32_bed
7710#define elf32_bed elf32_sh_vxworks_bed
7711
7712#undef elf_backend_want_plt_sym
7713#define elf_backend_want_plt_sym 1
7714#undef elf_symbol_leading_char
7715#define elf_symbol_leading_char '_'
7716#define elf_backend_want_got_underscore 1
7717#undef elf_backend_grok_prstatus
7718#undef elf_backend_grok_psinfo
7719#undef elf_backend_add_symbol_hook
7720#define elf_backend_add_symbol_hook elf_vxworks_add_symbol_hook
7721#undef elf_backend_link_output_symbol_hook
7722#define elf_backend_link_output_symbol_hook \
7723 elf_vxworks_link_output_symbol_hook
7724#undef elf_backend_emit_relocs
7725#define elf_backend_emit_relocs elf_vxworks_emit_relocs
7726#undef elf_backend_final_write_processing
7727#define elf_backend_final_write_processing \
7728 elf_vxworks_final_write_processing
7729#undef ELF_MAXPAGESIZE
7730#define ELF_MAXPAGESIZE 0x1000
7731#undef ELF_COMMONPAGESIZE
7732
7733#include "elf32-target.h"
7734
85fbca6a 7735#endif /* neither INCLUDE_SHMEDIA nor SH_TARGET_ALREADY_DEFINED */