]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blob - bfd/elf32-cris.c
Pass ignored unresolved relocations to ld backend
[thirdparty/binutils-gdb.git] / bfd / elf32-cris.c
1 /* CRIS-specific support for 32-bit ELF.
2 Copyright 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009,
3 2010, 2011, 2012 Free Software Foundation, Inc.
4 Contributed by Axis Communications AB.
5 Written by Hans-Peter Nilsson, based on elf32-fr30.c
6 PIC and shlib bits based primarily on elf32-m68k.c and elf32-i386.c.
7
8 This file is part of BFD, the Binary File Descriptor library.
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
14
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
21 along with this program; if not, write to the Free Software
22 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
23 MA 02110-1301, USA. */
24
25 #include "sysdep.h"
26 #include "bfd.h"
27 #include "libbfd.h"
28 #include "elf-bfd.h"
29 #include "elf/cris.h"
30 #include <limits.h>
31
32 bfd_reloc_status_type
33 cris_elf_pcrel_reloc (bfd *, arelent *, asymbol *, void *,
34 asection *, bfd *, char **);
35 static bfd_boolean
36 cris_elf_set_mach_from_flags (bfd *, unsigned long);
37
38 /* Forward declarations. */
39 static reloc_howto_type cris_elf_howto_table [] =
40 {
41 /* This reloc does nothing. */
42 HOWTO (R_CRIS_NONE, /* type */
43 0, /* rightshift */
44 2, /* size (0 = byte, 1 = short, 2 = long) */
45 32, /* bitsize */
46 FALSE, /* pc_relative */
47 0, /* bitpos */
48 complain_overflow_bitfield, /* complain_on_overflow */
49 bfd_elf_generic_reloc, /* special_function */
50 "R_CRIS_NONE", /* name */
51 FALSE, /* partial_inplace */
52 0, /* src_mask */
53 0, /* dst_mask */
54 FALSE), /* pcrel_offset */
55
56 /* An 8 bit absolute relocation. */
57 HOWTO (R_CRIS_8, /* type */
58 0, /* rightshift */
59 0, /* size (0 = byte, 1 = short, 2 = long) */
60 8, /* bitsize */
61 FALSE, /* pc_relative */
62 0, /* bitpos */
63 complain_overflow_bitfield, /* complain_on_overflow */
64 bfd_elf_generic_reloc, /* special_function */
65 "R_CRIS_8", /* name */
66 FALSE, /* partial_inplace */
67 0x0000, /* src_mask */
68 0x00ff, /* dst_mask */
69 FALSE), /* pcrel_offset */
70
71 /* A 16 bit absolute relocation. */
72 HOWTO (R_CRIS_16, /* type */
73 0, /* rightshift */
74 1, /* size (0 = byte, 1 = short, 2 = long) */
75 16, /* bitsize */
76 FALSE, /* pc_relative */
77 0, /* bitpos */
78 complain_overflow_bitfield, /* complain_on_overflow */
79 bfd_elf_generic_reloc, /* special_function */
80 "R_CRIS_16", /* name */
81 FALSE, /* partial_inplace */
82 0x00000000, /* src_mask */
83 0x0000ffff, /* dst_mask */
84 FALSE), /* pcrel_offset */
85
86 /* A 32 bit absolute relocation. */
87 HOWTO (R_CRIS_32, /* type */
88 0, /* rightshift */
89 2, /* size (0 = byte, 1 = short, 2 = long) */
90 32, /* bitsize */
91 FALSE, /* pc_relative */
92 0, /* bitpos */
93 /* We don't want overflow complaints for 64-bit vma builds
94 for e.g. sym+0x40000000 (or actually sym-0xc0000000 in
95 32-bit ELF) where sym=0xc0001234.
96 Don't do this for the PIC relocs, as we don't expect to
97 see them with large offsets. */
98 complain_overflow_dont, /* complain_on_overflow */
99 bfd_elf_generic_reloc, /* special_function */
100 "R_CRIS_32", /* name */
101 FALSE, /* partial_inplace */
102 0x00000000, /* src_mask */
103 0xffffffff, /* dst_mask */
104 FALSE), /* pcrel_offset */
105
106 /* An 8 bit PC-relative relocation. */
107 HOWTO (R_CRIS_8_PCREL, /* type */
108 0, /* rightshift */
109 0, /* size (0 = byte, 1 = short, 2 = long) */
110 8, /* bitsize */
111 TRUE, /* pc_relative */
112 0, /* bitpos */
113 complain_overflow_bitfield, /* complain_on_overflow */
114 cris_elf_pcrel_reloc, /* special_function */
115 "R_CRIS_8_PCREL", /* name */
116 FALSE, /* partial_inplace */
117 0x0000, /* src_mask */
118 0x00ff, /* dst_mask */
119 TRUE), /* pcrel_offset */
120
121 /* A 16 bit PC-relative relocation. */
122 HOWTO (R_CRIS_16_PCREL, /* type */
123 0, /* rightshift */
124 1, /* size (0 = byte, 1 = short, 2 = long) */
125 16, /* bitsize */
126 TRUE, /* pc_relative */
127 0, /* bitpos */
128 complain_overflow_bitfield, /* complain_on_overflow */
129 cris_elf_pcrel_reloc, /* special_function */
130 "R_CRIS_16_PCREL", /* name */
131 FALSE, /* partial_inplace */
132 0x00000000, /* src_mask */
133 0x0000ffff, /* dst_mask */
134 TRUE), /* pcrel_offset */
135
136 /* A 32 bit PC-relative relocation. */
137 HOWTO (R_CRIS_32_PCREL, /* type */
138 0, /* rightshift */
139 2, /* size (0 = byte, 1 = short, 2 = long) */
140 32, /* bitsize */
141 TRUE, /* pc_relative */
142 0, /* bitpos */
143 complain_overflow_bitfield, /* complain_on_overflow */
144 cris_elf_pcrel_reloc, /* special_function */
145 "R_CRIS_32_PCREL", /* name */
146 FALSE, /* partial_inplace */
147 0x00000000, /* src_mask */
148 0xffffffff, /* dst_mask */
149 TRUE), /* pcrel_offset */
150
151 /* GNU extension to record C++ vtable hierarchy. */
152 HOWTO (R_CRIS_GNU_VTINHERIT, /* type */
153 0, /* rightshift */
154 2, /* size (0 = byte, 1 = short, 2 = long) */
155 0, /* bitsize */
156 FALSE, /* pc_relative */
157 0, /* bitpos */
158 complain_overflow_dont, /* complain_on_overflow */
159 NULL, /* special_function */
160 "R_CRIS_GNU_VTINHERIT", /* name */
161 FALSE, /* partial_inplace */
162 0, /* src_mask */
163 0, /* dst_mask */
164 FALSE), /* pcrel_offset */
165
166 /* GNU extension to record C++ vtable member usage. */
167 HOWTO (R_CRIS_GNU_VTENTRY, /* type */
168 0, /* rightshift */
169 2, /* size (0 = byte, 1 = short, 2 = long) */
170 0, /* bitsize */
171 FALSE, /* pc_relative */
172 0, /* bitpos */
173 complain_overflow_dont, /* complain_on_overflow */
174 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
175 "R_CRIS_GNU_VTENTRY", /* name */
176 FALSE, /* partial_inplace */
177 0, /* src_mask */
178 0, /* dst_mask */
179 FALSE), /* pcrel_offset */
180
181 /* This is used only by the dynamic linker. The symbol should exist
182 both in the object being run and in some shared library. The
183 dynamic linker copies the data addressed by the symbol from the
184 shared library into the object, because the object being
185 run has to have the data at some particular address. */
186 HOWTO (R_CRIS_COPY, /* type */
187 0, /* rightshift */
188 2, /* size (0 = byte, 1 = short, 2 = long) */
189 32, /* bitsize */
190 FALSE, /* pc_relative */
191 0, /* bitpos */
192 complain_overflow_bitfield, /* complain_on_overflow */
193 bfd_elf_generic_reloc, /* special_function */
194 "R_CRIS_COPY", /* name */
195 FALSE, /* partial_inplace */
196 0, /* src_mask */
197 0, /* dst_mask */
198 FALSE), /* pcrel_offset */
199
200 /* Like R_CRIS_32, but used when setting global offset table entries. */
201 HOWTO (R_CRIS_GLOB_DAT, /* type */
202 0, /* rightshift */
203 2, /* size (0 = byte, 1 = short, 2 = long) */
204 32, /* bitsize */
205 FALSE, /* pc_relative */
206 0, /* bitpos */
207 complain_overflow_bitfield, /* complain_on_overflow */
208 bfd_elf_generic_reloc, /* special_function */
209 "R_CRIS_GLOB_DAT", /* name */
210 FALSE, /* partial_inplace */
211 0, /* src_mask */
212 0xffffffff, /* dst_mask */
213 FALSE), /* pcrel_offset */
214
215 /* Marks a procedure linkage table entry for a symbol. */
216 HOWTO (R_CRIS_JUMP_SLOT, /* type */
217 0, /* rightshift */
218 2, /* size (0 = byte, 1 = short, 2 = long) */
219 32, /* bitsize */
220 FALSE, /* pc_relative */
221 0, /* bitpos */
222 complain_overflow_bitfield, /* complain_on_overflow */
223 bfd_elf_generic_reloc, /* special_function */
224 "R_CRIS_JUMP_SLOT", /* name */
225 FALSE, /* partial_inplace */
226 0, /* src_mask */
227 0, /* dst_mask */
228 FALSE), /* pcrel_offset */
229
230 /* Used only by the dynamic linker. When the object is run, this
231 longword is set to the load address of the object, plus the
232 addend. */
233 HOWTO (R_CRIS_RELATIVE, /* type */
234 0, /* rightshift */
235 2, /* size (0 = byte, 1 = short, 2 = long) */
236 32, /* bitsize */
237 FALSE, /* pc_relative */
238 0, /* bitpos */
239 complain_overflow_bitfield, /* complain_on_overflow */
240 bfd_elf_generic_reloc, /* special_function */
241 "R_CRIS_RELATIVE", /* name */
242 FALSE, /* partial_inplace */
243 0, /* src_mask */
244 0xffffffff, /* dst_mask */
245 FALSE), /* pcrel_offset */
246
247 /* Like R_CRIS_32, but referring to the GOT table entry for the symbol. */
248 HOWTO (R_CRIS_16_GOT, /* type */
249 0, /* rightshift */
250 1, /* size (0 = byte, 1 = short, 2 = long) */
251 16, /* bitsize */
252 FALSE, /* pc_relative */
253 0, /* bitpos */
254 complain_overflow_bitfield, /* complain_on_overflow */
255 bfd_elf_generic_reloc, /* special_function */
256 "R_CRIS_16_GOT", /* name */
257 FALSE, /* partial_inplace */
258 0, /* src_mask */
259 0xffff, /* dst_mask */
260 FALSE), /* pcrel_offset */
261
262 HOWTO (R_CRIS_32_GOT, /* type */
263 0, /* rightshift */
264 2, /* size (0 = byte, 1 = short, 2 = long) */
265 32, /* bitsize */
266 FALSE, /* pc_relative */
267 0, /* bitpos */
268 complain_overflow_bitfield, /* complain_on_overflow */
269 bfd_elf_generic_reloc, /* special_function */
270 "R_CRIS_32_GOT", /* name */
271 FALSE, /* partial_inplace */
272 0, /* src_mask */
273 0xffffffff, /* dst_mask */
274 FALSE), /* pcrel_offset */
275
276 /* Like R_CRIS_32_GOT, but referring to (and requesting a) PLT part of
277 the GOT table for the symbol. */
278 HOWTO (R_CRIS_16_GOTPLT, /* type */
279 0, /* rightshift */
280 1, /* size (0 = byte, 1 = short, 2 = long) */
281 16, /* bitsize */
282 FALSE, /* pc_relative */
283 0, /* bitpos */
284 complain_overflow_bitfield, /* complain_on_overflow */
285 bfd_elf_generic_reloc, /* special_function */
286 "R_CRIS_16_GOTPLT", /* name */
287 FALSE, /* partial_inplace */
288 0, /* src_mask */
289 0xffff, /* dst_mask */
290 FALSE), /* pcrel_offset */
291
292 HOWTO (R_CRIS_32_GOTPLT, /* type */
293 0, /* rightshift */
294 2, /* size (0 = byte, 1 = short, 2 = long) */
295 32, /* bitsize */
296 FALSE, /* pc_relative */
297 0, /* bitpos */
298 complain_overflow_bitfield, /* complain_on_overflow */
299 bfd_elf_generic_reloc, /* special_function */
300 "R_CRIS_32_GOTPLT", /* name */
301 FALSE, /* partial_inplace */
302 0, /* src_mask */
303 0xffffffff, /* dst_mask */
304 FALSE), /* pcrel_offset */
305
306 /* A 32-bit offset from GOT to (local const) symbol: no GOT entry should
307 be necessary. */
308 HOWTO (R_CRIS_32_GOTREL, /* type */
309 0, /* rightshift */
310 2, /* size (0 = byte, 1 = short, 2 = long) */
311 32, /* bitsize */
312 FALSE, /* pc_relative */
313 0, /* bitpos */
314 complain_overflow_bitfield, /* complain_on_overflow */
315 bfd_elf_generic_reloc, /* special_function */
316 "R_CRIS_32_GOTREL", /* name */
317 FALSE, /* partial_inplace */
318 0, /* src_mask */
319 0xffffffff, /* dst_mask */
320 FALSE), /* pcrel_offset */
321
322 /* A 32-bit offset from GOT to entry for this symbol in PLT and request
323 to create PLT entry for symbol. */
324 HOWTO (R_CRIS_32_PLT_GOTREL, /* type */
325 0, /* rightshift */
326 2, /* size (0 = byte, 1 = short, 2 = long) */
327 32, /* bitsize */
328 FALSE, /* pc_relative */
329 0, /* bitpos */
330 complain_overflow_bitfield, /* complain_on_overflow */
331 bfd_elf_generic_reloc, /* special_function */
332 "R_CRIS_32_PLT_GOTREL", /* name */
333 FALSE, /* partial_inplace */
334 0, /* src_mask */
335 0xffffffff, /* dst_mask */
336 FALSE), /* pcrel_offset */
337
338 /* A 32-bit offset from PC (location after the relocation) + addend to
339 entry for this symbol in PLT and request to create PLT entry for
340 symbol. */
341 HOWTO (R_CRIS_32_PLT_PCREL, /* type */
342 0, /* rightshift */
343 2, /* size (0 = byte, 1 = short, 2 = long) */
344 32, /* bitsize */
345 TRUE, /* pc_relative */
346 0, /* bitpos */
347 complain_overflow_bitfield, /* complain_on_overflow */
348 cris_elf_pcrel_reloc, /* special_function */
349 "R_CRIS_32_PLT_PCREL", /* name */
350 FALSE, /* partial_inplace */
351 0, /* src_mask */
352 0xffffffff, /* dst_mask */
353 TRUE), /* pcrel_offset */
354
355 /* We don't handle these in any special manner and cross-format
356 linking is not supported; just recognize them enough to pass them
357 around. FIXME: do the same for most PIC relocs and add sanity
358 tests to actually refuse gracefully to handle these and PIC
359 relocs for cross-format linking. */
360 #define TLSHOWTO32(name) \
361 HOWTO (name, 0, 2, 32, FALSE, 0, complain_overflow_bitfield, \
362 bfd_elf_generic_reloc, #name, FALSE, 0, 0xffffffff, FALSE)
363 #define TLSHOWTO16X(name, X) \
364 HOWTO (name, 0, 1, 16, FALSE, 0, complain_overflow_ ## X, \
365 bfd_elf_generic_reloc, #name, FALSE, 0, 0xffff, FALSE)
366 #define TLSHOWTO16(name) TLSHOWTO16X(name, unsigned)
367 #define TLSHOWTO16S(name) TLSHOWTO16X(name, signed)
368
369 TLSHOWTO32 (R_CRIS_32_GOT_GD),
370 TLSHOWTO16 (R_CRIS_16_GOT_GD),
371 TLSHOWTO32 (R_CRIS_32_GD),
372 TLSHOWTO32 (R_CRIS_DTP),
373 TLSHOWTO32 (R_CRIS_32_DTPREL),
374 TLSHOWTO16S (R_CRIS_16_DTPREL),
375 TLSHOWTO32 (R_CRIS_32_GOT_TPREL),
376 TLSHOWTO16S (R_CRIS_16_GOT_TPREL),
377 TLSHOWTO32 (R_CRIS_32_TPREL),
378 TLSHOWTO16S (R_CRIS_16_TPREL),
379 TLSHOWTO32 (R_CRIS_DTPMOD),
380 TLSHOWTO32 (R_CRIS_32_IE)
381 };
382 \f
383 /* Map BFD reloc types to CRIS ELF reloc types. */
384
385 struct cris_reloc_map
386 {
387 bfd_reloc_code_real_type bfd_reloc_val;
388 unsigned int cris_reloc_val;
389 };
390
391 static const struct cris_reloc_map cris_reloc_map [] =
392 {
393 { BFD_RELOC_NONE, R_CRIS_NONE },
394 { BFD_RELOC_8, R_CRIS_8 },
395 { BFD_RELOC_16, R_CRIS_16 },
396 { BFD_RELOC_32, R_CRIS_32 },
397 { BFD_RELOC_8_PCREL, R_CRIS_8_PCREL },
398 { BFD_RELOC_16_PCREL, R_CRIS_16_PCREL },
399 { BFD_RELOC_32_PCREL, R_CRIS_32_PCREL },
400 { BFD_RELOC_VTABLE_INHERIT, R_CRIS_GNU_VTINHERIT },
401 { BFD_RELOC_VTABLE_ENTRY, R_CRIS_GNU_VTENTRY },
402 { BFD_RELOC_CRIS_COPY, R_CRIS_COPY },
403 { BFD_RELOC_CRIS_GLOB_DAT, R_CRIS_GLOB_DAT },
404 { BFD_RELOC_CRIS_JUMP_SLOT, R_CRIS_JUMP_SLOT },
405 { BFD_RELOC_CRIS_RELATIVE, R_CRIS_RELATIVE },
406 { BFD_RELOC_CRIS_16_GOT, R_CRIS_16_GOT },
407 { BFD_RELOC_CRIS_32_GOT, R_CRIS_32_GOT },
408 { BFD_RELOC_CRIS_16_GOTPLT, R_CRIS_16_GOTPLT },
409 { BFD_RELOC_CRIS_32_GOTPLT, R_CRIS_32_GOTPLT },
410 { BFD_RELOC_CRIS_32_GOTREL, R_CRIS_32_GOTREL },
411 { BFD_RELOC_CRIS_32_PLT_GOTREL, R_CRIS_32_PLT_GOTREL },
412 { BFD_RELOC_CRIS_32_PLT_PCREL, R_CRIS_32_PLT_PCREL },
413 { BFD_RELOC_CRIS_32_GOT_GD, R_CRIS_32_GOT_GD },
414 { BFD_RELOC_CRIS_16_GOT_GD, R_CRIS_16_GOT_GD },
415 { BFD_RELOC_CRIS_32_GD, R_CRIS_32_GD },
416 { BFD_RELOC_CRIS_DTP, R_CRIS_DTP },
417 { BFD_RELOC_CRIS_32_DTPREL, R_CRIS_32_DTPREL },
418 { BFD_RELOC_CRIS_16_DTPREL, R_CRIS_16_DTPREL },
419 { BFD_RELOC_CRIS_32_GOT_TPREL, R_CRIS_32_GOT_TPREL },
420 { BFD_RELOC_CRIS_16_GOT_TPREL, R_CRIS_16_GOT_TPREL },
421 { BFD_RELOC_CRIS_32_TPREL, R_CRIS_32_TPREL },
422 { BFD_RELOC_CRIS_16_TPREL, R_CRIS_16_TPREL },
423 { BFD_RELOC_CRIS_DTPMOD, R_CRIS_DTPMOD },
424 { BFD_RELOC_CRIS_32_IE, R_CRIS_32_IE }
425 };
426
427 static reloc_howto_type *
428 cris_reloc_type_lookup (bfd * abfd ATTRIBUTE_UNUSED,
429 bfd_reloc_code_real_type code)
430 {
431 unsigned int i;
432
433 for (i = 0; i < sizeof (cris_reloc_map) / sizeof (cris_reloc_map[0]); i++)
434 if (cris_reloc_map [i].bfd_reloc_val == code)
435 return & cris_elf_howto_table [cris_reloc_map[i].cris_reloc_val];
436
437 return NULL;
438 }
439
440 static reloc_howto_type *
441 cris_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED, const char *r_name)
442 {
443 unsigned int i;
444
445 for (i = 0;
446 i < sizeof (cris_elf_howto_table) / sizeof (cris_elf_howto_table[0]);
447 i++)
448 if (cris_elf_howto_table[i].name != NULL
449 && strcasecmp (cris_elf_howto_table[i].name, r_name) == 0)
450 return &cris_elf_howto_table[i];
451
452 return NULL;
453 }
454
455 /* Set the howto pointer for an CRIS ELF reloc. */
456
457 static void
458 cris_info_to_howto_rela (bfd * abfd ATTRIBUTE_UNUSED,
459 arelent * cache_ptr,
460 Elf_Internal_Rela * dst)
461 {
462 enum elf_cris_reloc_type r_type;
463
464 r_type = ELF32_R_TYPE (dst->r_info);
465 BFD_ASSERT (r_type < (unsigned int) R_CRIS_max);
466 cache_ptr->howto = & cris_elf_howto_table [r_type];
467 }
468
469 bfd_reloc_status_type
470 cris_elf_pcrel_reloc (bfd *abfd ATTRIBUTE_UNUSED,
471 arelent *reloc_entry,
472 asymbol *symbol,
473 void * data ATTRIBUTE_UNUSED,
474 asection *input_section,
475 bfd *output_bfd,
476 char **error_message ATTRIBUTE_UNUSED)
477 {
478 /* By default (using only bfd_elf_generic_reloc when linking to
479 non-ELF formats) PC-relative relocs are relative to the beginning
480 of the reloc. CRIS PC-relative relocs are relative to the position
481 *after* the reloc because that's what pre-CRISv32 PC points to
482 after reading an insn field with that reloc. (For CRISv32, PC is
483 actually relative to the start of the insn, but we keep the old
484 definition.) Still, we use as much generic machinery as we can.
485
486 Only adjust when doing a final link. */
487 if (output_bfd == (bfd *) NULL)
488 reloc_entry->addend -= 1 << reloc_entry->howto->size;
489
490 return
491 bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
492 input_section, output_bfd, error_message);
493 }
494 \f
495 /* Support for core dump NOTE sections.
496 The slightly unintuitive code layout is an attempt to keep at least
497 some similarities with other ports, hoping to simplify general
498 changes, while still keeping Linux/CRIS and Linux/CRISv32 code apart. */
499
500 static bfd_boolean
501 cris_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
502 {
503 int offset;
504 size_t size;
505
506 if (bfd_get_mach (abfd) == bfd_mach_cris_v32)
507 switch (note->descsz)
508 {
509 default:
510 return FALSE;
511
512 case 202: /* Linux/CRISv32 */
513 /* pr_cursig */
514 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
515
516 /* pr_pid */
517 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 22);
518
519 /* pr_reg */
520 offset = 70;
521 size = 128;
522
523 break;
524 }
525 else
526 switch (note->descsz)
527 {
528 default:
529 return FALSE;
530
531 case 214: /* Linux/CRIS */
532 /* pr_cursig */
533 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
534
535 /* pr_pid */
536 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 22);
537
538 /* pr_reg */
539 offset = 70;
540 size = 140;
541
542 break;
543 }
544
545 /* Make a ".reg/999" section. */
546 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
547 size, note->descpos + offset);
548 }
549
550 static bfd_boolean
551 cris_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
552 {
553 if (bfd_get_mach (abfd) == bfd_mach_cris_v32)
554 switch (note->descsz)
555 {
556 default:
557 return FALSE;
558
559 case 124: /* Linux/CRISv32 elf_prpsinfo */
560 elf_tdata (abfd)->core->program
561 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
562 elf_tdata (abfd)->core->command
563 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
564 }
565 else
566 switch (note->descsz)
567 {
568 default:
569 return FALSE;
570
571 case 124: /* Linux/CRIS elf_prpsinfo */
572 elf_tdata (abfd)->core->program
573 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
574 elf_tdata (abfd)->core->command
575 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
576 }
577
578 /* Note that for some reason, a spurious space is tacked
579 onto the end of the args in some (at least one anyway)
580 implementations, so strip it off if it exists. */
581
582 {
583 char *command = elf_tdata (abfd)->core->command;
584 int n = strlen (command);
585
586 if (0 < n && command[n - 1] == ' ')
587 command[n - 1] = '\0';
588 }
589
590 return TRUE;
591 }
592 \f
593 /* The name of the dynamic interpreter. This is put in the .interp
594 section. */
595
596 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
597
598 /* The size in bytes of an entry in the procedure linkage table. */
599
600 #define PLT_ENTRY_SIZE 20
601 #define PLT_ENTRY_SIZE_V32 26
602
603 /* The first entry in an absolute procedure linkage table looks like this. */
604
605 static const bfd_byte elf_cris_plt0_entry[PLT_ENTRY_SIZE] =
606 {
607 0xfc, 0xe1,
608 0x7e, 0x7e, /* push mof. */
609 0x7f, 0x0d, /* (dip [pc+]) */
610 0, 0, 0, 0, /* Replaced with address of .got + 4. */
611 0x30, 0x7a, /* move [...],mof */
612 0x7f, 0x0d, /* (dip [pc+]) */
613 0, 0, 0, 0, /* Replaced with address of .got + 8. */
614 0x30, 0x09 /* jump [...] */
615 };
616
617 static const bfd_byte elf_cris_plt0_entry_v32[PLT_ENTRY_SIZE_V32] =
618 {
619 0x84, 0xe2, /* subq 4,$sp */
620 0x6f, 0xfe, /* move.d 0,$acr */
621 0, 0, 0, 0, /* Replaced by address of .got + 4. */
622 0x7e, 0x7a, /* move $mof,[$sp] */
623 0x3f, 0x7a, /* move [$acr],$mof */
624 0x04, 0xf2, /* addq 4,acr */
625 0x6f, 0xfa, /* move.d [$acr],$acr */
626 0xbf, 0x09, /* jump $acr */
627 0xb0, 0x05, /* nop */
628 0, 0 /* Pad out to 26 bytes. */
629 };
630
631 /* Subsequent entries in an absolute procedure linkage table look like
632 this. */
633
634 static const bfd_byte elf_cris_plt_entry[PLT_ENTRY_SIZE] =
635 {
636 0x7f, 0x0d, /* (dip [pc+]) */
637 0, 0, 0, 0, /* Replaced with address of this symbol in .got. */
638 0x30, 0x09, /* jump [...] */
639 0x3f, 0x7e, /* move [pc+],mof */
640 0, 0, 0, 0, /* Replaced with offset into relocation table. */
641 0x2f, 0xfe, /* add.d [pc+],pc */
642 0xec, 0xff,
643 0xff, 0xff /* Replaced with offset to start of .plt. */
644 };
645
646 static const bfd_byte elf_cris_plt_entry_v32[PLT_ENTRY_SIZE_V32] =
647 {
648 0x6f, 0xfe, /* move.d 0,$acr */
649 0, 0, 0, 0, /* Replaced with address of this symbol in .got. */
650 0x6f, 0xfa, /* move.d [$acr],$acr */
651 0xbf, 0x09, /* jump $acr */
652 0xb0, 0x05, /* nop */
653 0x3f, 0x7e, /* move 0,mof */
654 0, 0, 0, 0, /* Replaced with offset into relocation table. */
655 0xbf, 0x0e, /* ba start_of_plt0_entry */
656 0, 0, 0, 0, /* Replaced with offset to plt0 entry. */
657 0xb0, 0x05 /* nop */
658 };
659
660 /* The first entry in a PIC procedure linkage table looks like this. */
661
662 static const bfd_byte elf_cris_pic_plt0_entry[PLT_ENTRY_SIZE] =
663 {
664 0xfc, 0xe1, 0x7e, 0x7e, /* push mof */
665 0x04, 0x01, 0x30, 0x7a, /* move [r0+4],mof */
666 0x08, 0x01, 0x30, 0x09, /* jump [r0+8] */
667 0, 0, 0, 0, 0, 0, 0, 0, /* Pad out to 20 bytes. */
668 };
669
670 static const bfd_byte elf_cris_pic_plt0_entry_v32[PLT_ENTRY_SIZE_V32] =
671 {
672 0x84, 0xe2, /* subq 4,$sp */
673 0x04, 0x01, /* addoq 4,$r0,$acr */
674 0x7e, 0x7a, /* move $mof,[$sp] */
675 0x3f, 0x7a, /* move [$acr],$mof */
676 0x04, 0xf2, /* addq 4,$acr */
677 0x6f, 0xfa, /* move.d [$acr],$acr */
678 0xbf, 0x09, /* jump $acr */
679 0xb0, 0x05, /* nop */
680 0, 0, /* Pad out to 26 bytes. */
681 0, 0, 0, 0,
682 0, 0, 0, 0
683 };
684
685 /* Subsequent entries in a PIC procedure linkage table look like this. */
686
687 static const bfd_byte elf_cris_pic_plt_entry[PLT_ENTRY_SIZE] =
688 {
689 0x6f, 0x0d, /* (bdap [pc+].d,r0) */
690 0, 0, 0, 0, /* Replaced with offset of this symbol in .got. */
691 0x30, 0x09, /* jump [...] */
692 0x3f, 0x7e, /* move [pc+],mof */
693 0, 0, 0, 0, /* Replaced with offset into relocation table. */
694 0x2f, 0xfe, /* add.d [pc+],pc */
695 0xec, 0xff, /* Replaced with offset to start of .plt. */
696 0xff, 0xff
697 };
698
699 static const bfd_byte elf_cris_pic_plt_entry_v32[PLT_ENTRY_SIZE_V32] =
700 {
701 0x6f, 0x0d, /* addo.d 0,$r0,$acr */
702 0, 0, 0, 0, /* Replaced with offset of this symbol in .got. */
703 0x6f, 0xfa, /* move.d [$acr],$acr */
704 0xbf, 0x09, /* jump $acr */
705 0xb0, 0x05, /* nop */
706 0x3f, 0x7e, /* move relocoffs,$mof */
707 0, 0, 0, 0, /* Replaced with offset into relocation table. */
708 0xbf, 0x0e, /* ba start_of_plt */
709 0, 0, 0, 0, /* Replaced with offset to start of .plt. */
710 0xb0, 0x05 /* nop */
711 };
712 \f
713 /* We copy elf32-m68k.c and elf32-i386.c for the basic linker hash bits
714 (and most other PIC/shlib stuff). Check that we don't drift away
715 without reason.
716
717 The CRIS linker, like the m68k and i386 linkers (and probably the rest
718 too) needs to keep track of the number of relocs that it decides to
719 copy in check_relocs for each symbol. This is so that it can discard
720 PC relative relocs if it doesn't need them when linking with
721 -Bsymbolic. We store the information in a field extending the regular
722 ELF linker hash table. */
723
724 /* This structure keeps track of the number of PC relative relocs we have
725 copied for a given symbol. */
726
727 struct elf_cris_pcrel_relocs_copied
728 {
729 /* Next section. */
730 struct elf_cris_pcrel_relocs_copied *next;
731
732 /* A section in dynobj. */
733 asection *section;
734
735 /* Number of relocs copied in this section. */
736 bfd_size_type count;
737
738 /* Example of reloc being copied, for message. */
739 enum elf_cris_reloc_type r_type;
740 };
741
742 /* CRIS ELF linker hash entry. */
743
744 struct elf_cris_link_hash_entry
745 {
746 struct elf_link_hash_entry root;
747
748 /* Number of PC relative relocs copied for this symbol. */
749 struct elf_cris_pcrel_relocs_copied *pcrel_relocs_copied;
750
751 /* The GOTPLT references are CRIS-specific; the goal is to avoid having
752 both a general GOT and a PLT-specific GOT entry for the same symbol,
753 when it is referenced both as a function and as a function pointer.
754
755 Number of GOTPLT references for a function. */
756 bfd_signed_vma gotplt_refcount;
757
758 /* Actual GOTPLT index for this symbol, if applicable, or zero if not
759 (zero is never used as an index). FIXME: We should be able to fold
760 this with gotplt_refcount in a union, like the got and plt unions in
761 elf_link_hash_entry. */
762 bfd_size_type gotplt_offset;
763
764 /* The root.got.refcount is the sum of the regular reference counts
765 (this) and those members below. We have to keep a separate count
766 to track when we've found the first (or last) reference to a
767 regular got entry. The offset is in root.got.offset. */
768 bfd_signed_vma reg_got_refcount;
769
770 /* Similar to the above, the number of reloc references to this
771 symbols that need a R_CRIS_32_TPREL slot. The offset is in
772 root.got.offset, because this and .dtp_refcount can't validly
773 happen when there's also a regular GOT entry; that's invalid
774 input for which an error is emitted. */
775 bfd_signed_vma tprel_refcount;
776
777 /* Similar to the above, the number of reloc references to this
778 symbols that need a R_CRIS_DTP slot. The offset is in
779 root.got.offset; plus 4 if .tprel_refcount > 0. */
780 bfd_signed_vma dtp_refcount;
781 };
782
783 static bfd_boolean
784 elf_cris_discard_excess_dso_dynamics (struct elf_cris_link_hash_entry *,
785 void * );
786 static bfd_boolean
787 elf_cris_discard_excess_program_dynamics (struct elf_cris_link_hash_entry *,
788 void *);
789
790 /* The local_got_refcounts and local_got_offsets are a multiple of
791 LSNUM in size, namely LGOT_ALLOC_NELTS_FOR(LSNUM) (plus one for the
792 refcount for GOT itself, see code), with the summary / group offset
793 for local symbols located at offset N, reference counts for
794 ordinary (address) relocs at offset N + LSNUM, for R_CRIS_DTP
795 relocs at offset N + 2*LSNUM, and for R_CRIS_32_TPREL relocs at N +
796 3*LSNUM. */
797
798 #define LGOT_REG_NDX(x) ((x) + symtab_hdr->sh_info)
799 #define LGOT_DTP_NDX(x) ((x) + 2 * symtab_hdr->sh_info)
800 #define LGOT_TPREL_NDX(x) ((x) + 3 * symtab_hdr->sh_info)
801 #define LGOT_ALLOC_NELTS_FOR(x) ((x) * 4)
802
803 /* CRIS ELF linker hash table. */
804
805 struct elf_cris_link_hash_table
806 {
807 struct elf_link_hash_table root;
808
809 /* We can't use the PLT offset and calculate to get the GOTPLT offset,
810 since we try and avoid creating GOTPLT:s when there's already a GOT.
811 Instead, we keep and update the next available index here. */
812 bfd_size_type next_gotplt_entry;
813
814 /* The number of R_CRIS_32_DTPREL and R_CRIS_16_DTPREL that have
815 been seen for any input; if != 0, then the constant-offset
816 R_CRIS_DTPMOD is needed for this DSO/executable. This turns
817 negative at relocation, so that we don't need an extra flag for
818 when the reloc is output. */
819 bfd_signed_vma dtpmod_refcount;
820 };
821
822 /* Traverse a CRIS ELF linker hash table. */
823
824 #define elf_cris_link_hash_traverse(table, func, info) \
825 (elf_link_hash_traverse \
826 (&(table)->root, \
827 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
828 (info)))
829
830 /* Get the CRIS ELF linker hash table from a link_info structure. */
831
832 #define elf_cris_hash_table(p) \
833 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
834 == CRIS_ELF_DATA ? ((struct elf_cris_link_hash_table *) ((p)->hash)) : NULL)
835
836 /* Get the CRIS ELF linker hash entry from a regular hash entry (the
837 "parent class"). The .root reference is just a simple type
838 check on the argument. */
839
840 #define elf_cris_hash_entry(p) \
841 ((struct elf_cris_link_hash_entry *) (&(p)->root))
842
843 /* Create an entry in a CRIS ELF linker hash table. */
844
845 static struct bfd_hash_entry *
846 elf_cris_link_hash_newfunc (struct bfd_hash_entry *entry,
847 struct bfd_hash_table *table,
848 const char *string)
849 {
850 struct elf_cris_link_hash_entry *ret =
851 (struct elf_cris_link_hash_entry *) entry;
852
853 /* Allocate the structure if it has not already been allocated by a
854 subclass. */
855 if (ret == (struct elf_cris_link_hash_entry *) NULL)
856 ret = ((struct elf_cris_link_hash_entry *)
857 bfd_hash_allocate (table,
858 sizeof (struct elf_cris_link_hash_entry)));
859 if (ret == (struct elf_cris_link_hash_entry *) NULL)
860 return (struct bfd_hash_entry *) ret;
861
862 /* Call the allocation method of the superclass. */
863 ret = ((struct elf_cris_link_hash_entry *)
864 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
865 table, string));
866 if (ret != (struct elf_cris_link_hash_entry *) NULL)
867 {
868 ret->pcrel_relocs_copied = NULL;
869 ret->gotplt_refcount = 0;
870 ret->gotplt_offset = 0;
871 ret->dtp_refcount = 0;
872 ret->tprel_refcount = 0;
873 ret->reg_got_refcount = 0;
874 }
875
876 return (struct bfd_hash_entry *) ret;
877 }
878
879 /* Create a CRIS ELF linker hash table. */
880
881 static struct bfd_link_hash_table *
882 elf_cris_link_hash_table_create (bfd *abfd)
883 {
884 struct elf_cris_link_hash_table *ret;
885 bfd_size_type amt = sizeof (struct elf_cris_link_hash_table);
886
887 ret = ((struct elf_cris_link_hash_table *) bfd_zmalloc (amt));
888 if (ret == (struct elf_cris_link_hash_table *) NULL)
889 return NULL;
890
891 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
892 elf_cris_link_hash_newfunc,
893 sizeof (struct elf_cris_link_hash_entry),
894 CRIS_ELF_DATA))
895 {
896 free (ret);
897 return NULL;
898 }
899
900 /* Initialize to skip over the first three entries in the gotplt; they
901 are used for run-time symbol evaluation. */
902 ret->next_gotplt_entry = 12;
903
904 return &ret->root.root;
905 }
906 \f
907 /* Perform a single relocation. By default we use the standard BFD
908 routines, with a few tweaks. */
909
910 static bfd_reloc_status_type
911 cris_final_link_relocate (reloc_howto_type * howto,
912 bfd * input_bfd,
913 asection * input_section,
914 bfd_byte * contents,
915 Elf_Internal_Rela * rel,
916 bfd_vma relocation)
917 {
918 bfd_reloc_status_type r;
919 enum elf_cris_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
920
921 /* PC-relative relocations are relative to the position *after*
922 the reloc. Note that for R_CRIS_8_PCREL the adjustment is
923 not a single byte, since PC must be 16-bit-aligned. */
924 switch (r_type)
925 {
926 /* Check that the 16-bit GOT relocs are positive. */
927 case R_CRIS_16_GOTPLT:
928 case R_CRIS_16_GOT:
929 if ((bfd_signed_vma) relocation < 0)
930 return bfd_reloc_overflow;
931 break;
932
933 case R_CRIS_32_PLT_PCREL:
934 case R_CRIS_32_PCREL:
935 relocation -= 2;
936 /* Fall through. */
937 case R_CRIS_8_PCREL:
938 case R_CRIS_16_PCREL:
939 relocation -= 2;
940 break;
941
942 default:
943 break;
944 }
945
946 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
947 contents, rel->r_offset,
948 relocation, rel->r_addend);
949 return r;
950 }
951 \f
952
953 /* The number of errors left before we stop outputting reloc-specific
954 explanatory messages. By coincidence, this works nicely together
955 with the default number of messages you'll get from LD about
956 "relocation truncated to fit" messages before you get an
957 "additional relocation overflows omitted from the output". */
958 static int additional_relocation_error_msg_count = 10;
959
960 /* Relocate an CRIS ELF section. See elf32-fr30.c, from where this was
961 copied, for further comments. */
962
963 static bfd_boolean
964 cris_elf_relocate_section (bfd *output_bfd ATTRIBUTE_UNUSED,
965 struct bfd_link_info *info,
966 bfd *input_bfd,
967 asection *input_section,
968 bfd_byte *contents,
969 Elf_Internal_Rela *relocs,
970 Elf_Internal_Sym *local_syms,
971 asection **local_sections)
972 {
973 struct elf_cris_link_hash_table * htab;
974 bfd *dynobj;
975 Elf_Internal_Shdr *symtab_hdr;
976 struct elf_link_hash_entry **sym_hashes;
977 bfd_vma *local_got_offsets;
978 asection *sgot;
979 asection *splt;
980 asection *sreloc;
981 Elf_Internal_Rela *rel;
982 Elf_Internal_Rela *relend;
983 asection *srelgot;
984
985 htab = elf_cris_hash_table (info);
986 if (htab == NULL)
987 return FALSE;
988
989 dynobj = elf_hash_table (info)->dynobj;
990 local_got_offsets = elf_local_got_offsets (input_bfd);
991 symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr;
992 sym_hashes = elf_sym_hashes (input_bfd);
993 relend = relocs + input_section->reloc_count;
994
995 sgot = NULL;
996 splt = NULL;
997 sreloc = NULL;
998 srelgot = NULL;
999
1000 if (dynobj != NULL)
1001 {
1002 splt = bfd_get_linker_section (dynobj, ".plt");
1003 sgot = bfd_get_linker_section (dynobj, ".got");
1004 }
1005
1006 for (rel = relocs; rel < relend; rel ++)
1007 {
1008 reloc_howto_type *howto;
1009 unsigned long r_symndx;
1010 Elf_Internal_Sym *sym;
1011 asection *sec;
1012 struct elf_link_hash_entry *h;
1013 bfd_vma relocation;
1014 bfd_reloc_status_type r;
1015 const char *symname = NULL;
1016 enum elf_cris_reloc_type r_type;
1017
1018 r_type = ELF32_R_TYPE (rel->r_info);
1019
1020 if ( r_type == R_CRIS_GNU_VTINHERIT
1021 || r_type == R_CRIS_GNU_VTENTRY)
1022 continue;
1023
1024 r_symndx = ELF32_R_SYM (rel->r_info);
1025 howto = cris_elf_howto_table + r_type;
1026 h = NULL;
1027 sym = NULL;
1028 sec = NULL;
1029
1030 if (r_symndx < symtab_hdr->sh_info)
1031 {
1032 sym = local_syms + r_symndx;
1033 sec = local_sections [r_symndx];
1034 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
1035
1036 symname = (bfd_elf_string_from_elf_section
1037 (input_bfd, symtab_hdr->sh_link, sym->st_name));
1038 if (symname == NULL)
1039 symname = bfd_section_name (input_bfd, sec);
1040 }
1041 else
1042 {
1043 bfd_boolean warned, ignored;
1044 bfd_boolean unresolved_reloc;
1045
1046 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1047 r_symndx, symtab_hdr, sym_hashes,
1048 h, sec, relocation,
1049 unresolved_reloc, warned, ignored);
1050
1051 symname = h->root.root.string;
1052
1053 if (unresolved_reloc
1054 /* Perhaps we should detect the cases that
1055 sec->output_section is expected to be NULL like i386 and
1056 m68k, but apparently (and according to elfxx-ia64.c) all
1057 valid cases are where the symbol is defined in a shared
1058 object which we link dynamically against. This includes
1059 PLT relocs for which we've created a PLT entry and other
1060 relocs for which we're prepared to create dynamic
1061 relocations.
1062
1063 For now, new situations cause us to just err when
1064 sec->output_offset is NULL but the object with the symbol
1065 is *not* dynamically linked against. Thus this will
1066 automatically remind us so we can see if there are other
1067 valid cases we need to revisit. */
1068 && (sec->owner->flags & DYNAMIC) != 0)
1069 relocation = 0;
1070
1071 else if (h->root.type == bfd_link_hash_defined
1072 || h->root.type == bfd_link_hash_defweak)
1073 {
1074 /* Here follow the cases where the relocation value must
1075 be zero (or when further handling is simplified when
1076 zero). I can't claim to understand the various
1077 conditions and they weren't described in the files
1078 where I copied them from (elf32-m68k.c and
1079 elf32-i386.c), but let's mention examples of where
1080 they happen. FIXME: Perhaps define and use a
1081 dynamic_symbol_p function like ia64.
1082
1083 - When creating a shared library, we can have an
1084 ordinary relocation for a symbol defined in a shared
1085 library (perhaps the one we create). We then make
1086 the relocation value zero, as the value seen now will
1087 be added into the relocation addend in this shared
1088 library, but must be handled only at dynamic-link
1089 time. FIXME: Not sure this example covers the
1090 h->elf_link_hash_flags test, though it's there in
1091 other targets. */
1092 if (info->shared
1093 && ((! info->symbolic && h->dynindx != -1)
1094 || !h->def_regular)
1095 && (input_section->flags & SEC_ALLOC) != 0
1096 && (r_type == R_CRIS_8
1097 || r_type == R_CRIS_16
1098 || r_type == R_CRIS_32
1099 || r_type == R_CRIS_8_PCREL
1100 || r_type == R_CRIS_16_PCREL
1101 || r_type == R_CRIS_32_PCREL))
1102 relocation = 0;
1103 else if (!info->relocatable && unresolved_reloc
1104 && (_bfd_elf_section_offset (output_bfd, info,
1105 input_section,
1106 rel->r_offset)
1107 != (bfd_vma) -1))
1108 {
1109 _bfd_error_handler
1110 (_("%B, section %A: unresolvable relocation %s against symbol `%s'"),
1111 input_bfd,
1112 input_section,
1113 cris_elf_howto_table[r_type].name,
1114 symname);
1115 bfd_set_error (bfd_error_bad_value);
1116 return FALSE;
1117 }
1118 }
1119 }
1120
1121 if (sec != NULL && discarded_section (sec))
1122 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
1123 rel, 1, relend, howto, 0, contents);
1124
1125 if (info->relocatable)
1126 continue;
1127
1128 switch (r_type)
1129 {
1130 case R_CRIS_16_GOTPLT:
1131 case R_CRIS_32_GOTPLT:
1132 /* This is like the case for R_CRIS_32_GOT and R_CRIS_16_GOT,
1133 but we require a PLT, and the PLT handling will take care of
1134 filling in the PLT-specific GOT entry. For the GOT offset,
1135 calculate it as we do when filling it in for the .got.plt
1136 section. If we don't have a PLT, punt to GOT handling. */
1137 if (h != NULL
1138 && ((struct elf_cris_link_hash_entry *) h)->gotplt_offset != 0)
1139 {
1140 asection *sgotplt
1141 = bfd_get_linker_section (dynobj, ".got.plt");
1142 bfd_vma got_offset;
1143
1144 BFD_ASSERT (h->dynindx != -1);
1145 BFD_ASSERT (sgotplt != NULL);
1146
1147 got_offset
1148 = ((struct elf_cris_link_hash_entry *) h)->gotplt_offset;
1149
1150 relocation = got_offset;
1151 break;
1152 }
1153
1154 /* We didn't make a PLT entry for this symbol. Maybe everything is
1155 folded into the GOT. Other than folding, this happens when
1156 statically linking PIC code, or when using -Bsymbolic. Check
1157 that we instead have a GOT entry as done for us by
1158 elf_cris_adjust_dynamic_symbol, and drop through into the
1159 ordinary GOT cases. This must not happen for the
1160 executable, because any reference it does to a function
1161 that is satisfied by a DSO must generate a PLT. We assume
1162 these call-specific relocs don't address non-functions. */
1163 if (h != NULL
1164 && (h->got.offset == (bfd_vma) -1
1165 || (!info->shared
1166 && !(h->def_regular
1167 || (!h->def_dynamic
1168 && h->root.type == bfd_link_hash_undefweak)))))
1169 {
1170 (*_bfd_error_handler)
1171 ((h->got.offset == (bfd_vma) -1)
1172 ? _("%B, section %A: No PLT nor GOT for relocation %s"
1173 " against symbol `%s'")
1174 : _("%B, section %A: No PLT for relocation %s"
1175 " against symbol `%s'"),
1176 input_bfd,
1177 input_section,
1178 cris_elf_howto_table[r_type].name,
1179 (symname != NULL && symname[0] != '\0'
1180 ? symname : _("[whose name is lost]")));
1181
1182 /* FIXME: Perhaps blaming input is not the right thing to
1183 do; this is probably an internal error. But it is true
1184 that we didn't like that particular input. */
1185 bfd_set_error (bfd_error_bad_value);
1186 return FALSE;
1187 }
1188 /* Fall through. */
1189
1190 /* The size of the actual relocation is not used here; we only
1191 fill in the GOT table here. */
1192 case R_CRIS_16_GOT:
1193 case R_CRIS_32_GOT:
1194 {
1195 bfd_vma off;
1196
1197 /* Note that despite using RELA relocations, the .got contents
1198 is always filled in with the link-relative relocation
1199 value; the addend. */
1200
1201 if (h != NULL)
1202 {
1203 off = h->got.offset;
1204 BFD_ASSERT (off != (bfd_vma) -1);
1205
1206 if (!elf_hash_table (info)->dynamic_sections_created
1207 || (! info->shared
1208 && (h->def_regular
1209 || h->type == STT_FUNC
1210 || h->needs_plt))
1211 || (info->shared
1212 && (info->symbolic || h->dynindx == -1)
1213 && h->def_regular))
1214 {
1215 /* This wasn't checked above for ! info->shared, but
1216 must hold there if we get here; the symbol must
1217 be defined in the regular program or be undefweak
1218 or be a function or otherwise need a PLT. */
1219 BFD_ASSERT (!elf_hash_table (info)->dynamic_sections_created
1220 || info->shared
1221 || h->def_regular
1222 || h->type == STT_FUNC
1223 || h->needs_plt
1224 || h->root.type == bfd_link_hash_undefweak);
1225
1226 /* This is actually a static link, or it is a
1227 -Bsymbolic link and the symbol is defined locally,
1228 or is undefweak, or the symbol was forced to be
1229 local because of a version file, or we're not
1230 creating a dynamic object. We must initialize this
1231 entry in the global offset table. Since the offset
1232 must always be a multiple of 4, we use the least
1233 significant bit to record whether we have
1234 initialized it already.
1235
1236 If this GOT entry should be runtime-initialized, we
1237 will create a .rela.got relocation entry to
1238 initialize the value. This is done in the
1239 finish_dynamic_symbol routine. */
1240 if ((off & 1) != 0)
1241 off &= ~1;
1242 else
1243 {
1244 bfd_put_32 (output_bfd, relocation,
1245 sgot->contents + off);
1246 h->got.offset |= 1;
1247 }
1248 }
1249 }
1250 else
1251 {
1252 BFD_ASSERT (local_got_offsets != NULL
1253 && local_got_offsets[r_symndx] != (bfd_vma) -1);
1254
1255 off = local_got_offsets[r_symndx];
1256
1257 /* The offset must always be a multiple of 4. We use
1258 the least significant bit to record whether we have
1259 already generated the necessary reloc. */
1260 if ((off & 1) != 0)
1261 off &= ~1;
1262 else
1263 {
1264 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
1265
1266 if (info->shared)
1267 {
1268 Elf_Internal_Rela outrel;
1269 bfd_byte *loc;
1270
1271 if (srelgot == NULL)
1272 srelgot
1273 = bfd_get_linker_section (dynobj, ".rela.got");
1274 BFD_ASSERT (srelgot != NULL);
1275
1276 outrel.r_offset = (sgot->output_section->vma
1277 + sgot->output_offset
1278 + off);
1279 outrel.r_info = ELF32_R_INFO (0, R_CRIS_RELATIVE);
1280 outrel.r_addend = relocation;
1281 loc = srelgot->contents;
1282 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
1283 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1284 }
1285
1286 local_got_offsets[r_symndx] |= 1;
1287 }
1288 }
1289
1290 relocation = sgot->output_offset + off;
1291 if (rel->r_addend != 0)
1292 {
1293 /* We can't do anything for a relocation which is against
1294 a symbol *plus offset*. GOT holds relocations for
1295 symbols. Make this an error; the compiler isn't
1296 allowed to pass us these kinds of things. */
1297 if (h == NULL)
1298 (*_bfd_error_handler)
1299 (_("%B, section %A: relocation %s with non-zero addend %d"
1300 " against local symbol"),
1301 input_bfd,
1302 input_section,
1303 cris_elf_howto_table[r_type].name,
1304 rel->r_addend);
1305 else
1306 (*_bfd_error_handler)
1307 (_("%B, section %A: relocation %s with non-zero addend %d"
1308 " against symbol `%s'"),
1309 input_bfd,
1310 input_section,
1311 cris_elf_howto_table[r_type].name,
1312 rel->r_addend,
1313 symname[0] != '\0' ? symname : _("[whose name is lost]"));
1314
1315 bfd_set_error (bfd_error_bad_value);
1316 return FALSE;
1317 }
1318 }
1319 break;
1320
1321 case R_CRIS_32_GOTREL:
1322 /* This relocation must only be performed against local symbols.
1323 It's also ok when we link a program and the symbol is either
1324 defined in an ordinary (non-DSO) object or is undefined weak. */
1325 if (h != NULL
1326 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1327 && !(!info->shared
1328 && (h->def_regular
1329 || (!h->def_dynamic
1330 && h->root.type == bfd_link_hash_undefweak))))
1331 {
1332 (*_bfd_error_handler)
1333 (_("%B, section %A: relocation %s is"
1334 " not allowed for global symbol: `%s'"),
1335 input_bfd,
1336 input_section,
1337 cris_elf_howto_table[r_type].name,
1338 symname);
1339 bfd_set_error (bfd_error_bad_value);
1340 return FALSE;
1341 }
1342
1343 /* This can happen if we get a link error with the input ELF
1344 variant mismatching the output variant. Emit an error so
1345 it's noticed if it happens elsewhere. */
1346 if (sgot == NULL)
1347 {
1348 (*_bfd_error_handler)
1349 (_("%B, section %A: relocation %s with no GOT created"),
1350 input_bfd,
1351 input_section,
1352 cris_elf_howto_table[r_type].name);
1353 bfd_set_error (bfd_error_bad_value);
1354 return FALSE;
1355 }
1356
1357 /* This relocation is like a PC-relative one, except the
1358 reference point is the location of GOT. Note that
1359 sgot->output_offset is not involved in this calculation. We
1360 always want the start of entire .got section, not the
1361 position after the reserved header. */
1362 relocation -= sgot->output_section->vma;
1363 break;
1364
1365 case R_CRIS_32_PLT_PCREL:
1366 /* Relocation is to the entry for this symbol in the
1367 procedure linkage table. */
1368
1369 /* Resolve a PLT_PCREL reloc against a local symbol directly,
1370 without using the procedure linkage table. */
1371 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
1372 break;
1373
1374 if (h->plt.offset == (bfd_vma) -1
1375 || splt == NULL)
1376 {
1377 /* We didn't make a PLT entry for this symbol. This
1378 happens when statically linking PIC code, or when
1379 using -Bsymbolic. */
1380 break;
1381 }
1382
1383 relocation = (splt->output_section->vma
1384 + splt->output_offset
1385 + h->plt.offset);
1386 break;
1387
1388 case R_CRIS_32_PLT_GOTREL:
1389 /* Like R_CRIS_32_PLT_PCREL, but the reference point is the
1390 start of the .got section. See also comment at
1391 R_CRIS_32_GOT. */
1392 relocation -= sgot->output_section->vma;
1393
1394 /* Resolve a PLT_GOTREL reloc against a local symbol directly,
1395 without using the procedure linkage table. */
1396 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
1397 break;
1398
1399 if (h->plt.offset == (bfd_vma) -1
1400 || splt == NULL)
1401 {
1402 /* We didn't make a PLT entry for this symbol. This
1403 happens when statically linking PIC code, or when
1404 using -Bsymbolic. */
1405 break;
1406 }
1407
1408 relocation = (splt->output_section->vma
1409 + splt->output_offset
1410 + h->plt.offset
1411 - sgot->output_section->vma);
1412 break;
1413
1414 case R_CRIS_8_PCREL:
1415 case R_CRIS_16_PCREL:
1416 case R_CRIS_32_PCREL:
1417 /* If the symbol was local, we need no shlib-specific handling. */
1418 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1419 || h->dynindx == -1)
1420 break;
1421
1422 /* Fall through. */
1423 case R_CRIS_8:
1424 case R_CRIS_16:
1425 case R_CRIS_32:
1426 if (info->shared
1427 && r_symndx != STN_UNDEF
1428 && (input_section->flags & SEC_ALLOC) != 0
1429 && ((r_type != R_CRIS_8_PCREL
1430 && r_type != R_CRIS_16_PCREL
1431 && r_type != R_CRIS_32_PCREL)
1432 || (!info->symbolic
1433 || (h != NULL && !h->def_regular))))
1434 {
1435 Elf_Internal_Rela outrel;
1436 bfd_byte *loc;
1437 bfd_boolean skip, relocate;
1438
1439 /* When generating a shared object, these relocations
1440 are copied into the output file to be resolved at run
1441 time. */
1442
1443 if (sreloc == NULL)
1444 {
1445 sreloc = _bfd_elf_get_dynamic_reloc_section
1446 (dynobj, input_section, /*rela?*/ TRUE);
1447 /* The section should have been created in cris_elf_check_relocs,
1448 but that function will not be called for objects which fail in
1449 cris_elf_merge_private_bfd_data. */
1450 if (sreloc == NULL)
1451 {
1452 bfd_set_error (bfd_error_bad_value);
1453 return FALSE;
1454 }
1455 }
1456
1457 skip = FALSE;
1458 relocate = FALSE;
1459
1460 outrel.r_offset =
1461 _bfd_elf_section_offset (output_bfd, info, input_section,
1462 rel->r_offset);
1463 if (outrel.r_offset == (bfd_vma) -1)
1464 skip = TRUE;
1465 else if (outrel.r_offset == (bfd_vma) -2
1466 /* For now, undefined weak symbols with non-default
1467 visibility (yielding 0), like exception info for
1468 discarded sections, will get a R_CRIS_NONE
1469 relocation rather than no relocation, because we
1470 notice too late that the symbol doesn't need a
1471 relocation. */
1472 || (h != NULL
1473 && h->root.type == bfd_link_hash_undefweak
1474 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT))
1475 skip = TRUE, relocate = TRUE;
1476 outrel.r_offset += (input_section->output_section->vma
1477 + input_section->output_offset);
1478
1479 if (skip)
1480 memset (&outrel, 0, sizeof outrel);
1481 /* h->dynindx may be -1 if the symbol was marked to
1482 become local. */
1483 else if (h != NULL
1484 && ((! info->symbolic && h->dynindx != -1)
1485 || !h->def_regular))
1486 {
1487 BFD_ASSERT (h->dynindx != -1);
1488 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1489 outrel.r_addend = relocation + rel->r_addend;
1490 }
1491 else
1492 {
1493 outrel.r_addend = relocation + rel->r_addend;
1494
1495 if (r_type == R_CRIS_32)
1496 {
1497 relocate = TRUE;
1498 outrel.r_info = ELF32_R_INFO (0, R_CRIS_RELATIVE);
1499 }
1500 else
1501 {
1502 long indx;
1503
1504 if (bfd_is_abs_section (sec))
1505 indx = 0;
1506 else if (sec == NULL || sec->owner == NULL)
1507 {
1508 bfd_set_error (bfd_error_bad_value);
1509 return FALSE;
1510 }
1511 else
1512 {
1513 asection *osec;
1514
1515 /* We are turning this relocation into one
1516 against a section symbol. It would be
1517 proper to subtract the symbol's value,
1518 osec->vma, from the emitted reloc addend,
1519 but ld.so expects buggy relocs. */
1520 osec = sec->output_section;
1521 indx = elf_section_data (osec)->dynindx;
1522 if (indx == 0)
1523 {
1524 osec = htab->root.text_index_section;
1525 indx = elf_section_data (osec)->dynindx;
1526 }
1527 BFD_ASSERT (indx != 0);
1528 }
1529
1530 outrel.r_info = ELF32_R_INFO (indx, r_type);
1531 }
1532 }
1533
1534 loc = sreloc->contents;
1535 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1536 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1537
1538 /* This reloc will be computed at runtime, so there's no
1539 need to do anything now, except for R_CRIS_32 relocations
1540 that have been turned into R_CRIS_RELATIVE. */
1541 if (!relocate)
1542 continue;
1543 }
1544
1545 break;
1546
1547 case R_CRIS_16_DTPREL:
1548 case R_CRIS_32_DTPREL:
1549 /* This relocation must only be performed against local
1550 symbols, or to sections that are not loadable. It's also
1551 ok when we link a program and the symbol is defined in an
1552 ordinary (non-DSO) object (if it's undefined there, we've
1553 already seen an error). */
1554 if (h != NULL
1555 && (input_section->flags & SEC_ALLOC) != 0
1556 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1557 && (info->shared
1558 || (!h->def_regular
1559 && h->root.type != bfd_link_hash_undefined)))
1560 {
1561 (*_bfd_error_handler)
1562 ((h->root.type == bfd_link_hash_undefined)
1563 /* We shouldn't get here for GCC-emitted code. */
1564 ? _("%B, section %A: relocation %s has an undefined"
1565 " reference to `%s', perhaps a declaration mixup?")
1566 : ("%B, section %A: relocation %s is"
1567 " not allowed for `%s', a global symbol with default"
1568 " visibility, perhaps a declaration mixup?"),
1569 input_bfd,
1570 input_section,
1571 cris_elf_howto_table[r_type].name,
1572 symname != NULL && symname[0] != '\0'
1573 ? symname : _("[whose name is lost]"));
1574 bfd_set_error (bfd_error_bad_value);
1575 return FALSE;
1576 }
1577
1578 BFD_ASSERT ((input_section->flags & SEC_ALLOC) == 0
1579 || htab->dtpmod_refcount != 0);
1580
1581 /* Fill in a R_CRIS_DTPMOD reloc at offset 3 if we haven't
1582 already done so. Note that we do this in .got.plt, not
1583 in .got, as .got.plt contains the first part, still the
1584 reloc is against .got, because the linker script directs
1585 (is required to direct) them both into .got. */
1586 if (htab->dtpmod_refcount > 0
1587 && (input_section->flags & SEC_ALLOC) != 0)
1588 {
1589 asection *sgotplt = bfd_get_linker_section (dynobj, ".got.plt");
1590 BFD_ASSERT (sgotplt != NULL);
1591
1592 if (info->shared)
1593 {
1594 Elf_Internal_Rela outrel;
1595 bfd_byte *loc;
1596
1597 if (srelgot == NULL)
1598 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
1599 BFD_ASSERT (srelgot != NULL);
1600 loc = srelgot->contents;
1601 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
1602
1603 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 12);
1604 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 16);
1605 outrel.r_offset = (sgotplt->output_section->vma
1606 + sgotplt->output_offset
1607 + 12);
1608 outrel.r_info = ELF32_R_INFO (0, R_CRIS_DTPMOD);
1609 outrel.r_addend = 0;
1610 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1611 }
1612 else
1613 {
1614 /* For an executable, the GOT entry contents is known. */
1615 bfd_put_32 (output_bfd, (bfd_vma) 1, sgotplt->contents + 12);
1616 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 16);
1617 }
1618
1619 /* Reverse the sign to mark that we've emitted the
1620 required GOT entry. */
1621 htab->dtpmod_refcount = - htab->dtpmod_refcount;
1622 }
1623
1624 /* The relocation is the offset from the start of the module
1625 TLS block to the (local) symbol. */
1626 relocation -= elf_hash_table (info)->tls_sec == NULL
1627 ? 0 : elf_hash_table (info)->tls_sec->vma;
1628 break;
1629
1630 case R_CRIS_32_GD:
1631 if (info->shared)
1632 {
1633 bfd_set_error (bfd_error_invalid_operation);
1634
1635 /* We've already informed in cris_elf_check_relocs that
1636 this is an error. */
1637 return FALSE;
1638 }
1639 /* Fall through. */
1640
1641 case R_CRIS_16_GOT_GD:
1642 case R_CRIS_32_GOT_GD:
1643 if (rel->r_addend != 0)
1644 {
1645 /* We can't do anything for a relocation which is against a
1646 symbol *plus offset*. The GOT holds relocations for
1647 symbols. Make this an error; the compiler isn't allowed
1648 to pass us these kinds of things. */
1649 (*_bfd_error_handler)
1650 (_("%B, section %A: relocation %s with non-zero addend %d"
1651 " against symbol `%s'"),
1652 input_bfd,
1653 input_section,
1654 cris_elf_howto_table[r_type].name,
1655 rel->r_addend,
1656 symname[0] != '\0' ? symname : _("[whose name is lost]"));
1657
1658 bfd_set_error (bfd_error_bad_value);
1659 return FALSE;
1660 }
1661
1662 if (!info->shared
1663 && (h == NULL || h->def_regular || ELF_COMMON_DEF_P (h)))
1664 {
1665 /* Known contents of the GOT. */
1666 bfd_vma off;
1667
1668 /* The symbol is defined in the program, so just write
1669 (1, known_tpoffset) into the GOT. */
1670 relocation -= elf_hash_table (info)->tls_sec->vma;
1671
1672 if (h != NULL)
1673 {
1674 off = elf_cris_hash_entry (h)->tprel_refcount > 0
1675 ? h->got.offset + 4 : h->got.offset;
1676 }
1677 else
1678 {
1679 off = local_got_offsets[r_symndx];
1680 if (local_got_offsets[LGOT_TPREL_NDX (r_symndx)])
1681 off += 4;
1682 }
1683
1684 /* We use bit 1 of the offset as a flag for GOT entry with
1685 the R_CRIS_DTP reloc, setting it when we've emitted the
1686 GOT entry and reloc. Bit 0 is used for R_CRIS_32_TPREL
1687 relocs. */
1688 if ((off & 2) == 0)
1689 {
1690 off &= ~3;
1691
1692 if (h != NULL)
1693 h->got.offset |= 2;
1694 else
1695 local_got_offsets[r_symndx] |= 2;
1696
1697 bfd_put_32 (output_bfd, 1, sgot->contents + off);
1698 bfd_put_32 (output_bfd, relocation, sgot->contents + off + 4);
1699 }
1700 else
1701 off &= ~3;
1702
1703 relocation = sgot->output_offset + off
1704 + (r_type == R_CRIS_32_GD ? sgot->output_section->vma : 0);
1705 }
1706 else
1707 {
1708 /* Not all parts of the GOT entry are known; emit a real
1709 relocation. */
1710 bfd_vma off;
1711
1712 if (h != NULL)
1713 off = elf_cris_hash_entry (h)->tprel_refcount > 0
1714 ? h->got.offset + 4 : h->got.offset;
1715 else
1716 {
1717 off = local_got_offsets[r_symndx];
1718 if (local_got_offsets[LGOT_TPREL_NDX (r_symndx)])
1719 off += 4;
1720 }
1721
1722 /* See above re bit 1 and bit 0 usage. */
1723 if ((off & 2) == 0)
1724 {
1725 Elf_Internal_Rela outrel;
1726 bfd_byte *loc;
1727
1728 off &= ~3;
1729
1730 if (h != NULL)
1731 h->got.offset |= 2;
1732 else
1733 local_got_offsets[r_symndx] |= 2;
1734
1735 /* Clear the target contents of the GOT (just as a
1736 gesture; it's already cleared on allocation): this
1737 relocation is not like the other dynrelocs. */
1738 bfd_put_32 (output_bfd, 0, sgot->contents + off);
1739 bfd_put_32 (output_bfd, 0, sgot->contents + off + 4);
1740
1741 if (srelgot == NULL)
1742 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
1743 BFD_ASSERT (srelgot != NULL);
1744
1745 if (h != NULL && h->dynindx != -1)
1746 {
1747 outrel.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_DTP);
1748 relocation = 0;
1749 }
1750 else
1751 {
1752 outrel.r_info = ELF32_R_INFO (0, R_CRIS_DTP);
1753
1754 /* NULL if we had an error. */
1755 relocation -= elf_hash_table (info)->tls_sec == NULL
1756 ? 0 : elf_hash_table (info)->tls_sec->vma;
1757 }
1758
1759 outrel.r_offset = (sgot->output_section->vma
1760 + sgot->output_offset
1761 + off);
1762 outrel.r_addend = relocation;
1763 loc = srelgot->contents;
1764 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
1765
1766 /* NULL if we had an error. */
1767 if (srelgot->contents != NULL)
1768 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1769 }
1770 else
1771 off &= ~3;
1772
1773 relocation = sgot->output_offset + off
1774 + (r_type == R_CRIS_32_GD ? sgot->output_section->vma : 0);
1775 }
1776
1777 /* The GOT-relative offset to the GOT entry is the
1778 relocation, or for R_CRIS_32_GD, the actual address of
1779 the GOT entry. */
1780 break;
1781
1782 case R_CRIS_32_IE:
1783 if (info->shared)
1784 {
1785 bfd_set_error (bfd_error_invalid_operation);
1786
1787 /* We've already informed in cris_elf_check_relocs that
1788 this is an error. */
1789 return FALSE;
1790 }
1791 /* Fall through. */
1792
1793 case R_CRIS_32_GOT_TPREL:
1794 case R_CRIS_16_GOT_TPREL:
1795 if (rel->r_addend != 0)
1796 {
1797 /* We can't do anything for a relocation which is
1798 against a symbol *plus offset*. GOT holds
1799 relocations for symbols. Make this an error; the
1800 compiler isn't allowed to pass us these kinds of
1801 things. */
1802 (*_bfd_error_handler)
1803 (_("%B, section %A: relocation %s with non-zero addend %d"
1804 " against symbol `%s'"),
1805 input_bfd,
1806 input_section,
1807 cris_elf_howto_table[r_type].name,
1808 rel->r_addend,
1809 symname[0] != '\0' ? symname : _("[whose name is lost]"));
1810 bfd_set_error (bfd_error_bad_value);
1811 return FALSE;
1812 }
1813
1814 if (!info->shared
1815 && (h == NULL || h->def_regular || ELF_COMMON_DEF_P (h)))
1816 {
1817 /* Known contents of the GOT. */
1818 bfd_vma off;
1819
1820 /* The symbol is defined in the program, so just write
1821 the -prog_tls_size+known_tpoffset into the GOT. */
1822 relocation -= elf_hash_table (info)->tls_sec->vma;
1823 relocation -= elf_hash_table (info)->tls_size;
1824
1825 if (h != NULL)
1826 off = h->got.offset;
1827 else
1828 off = local_got_offsets[r_symndx];
1829
1830 /* Bit 0 is used to mark whether we've emitted the required
1831 entry (and if needed R_CRIS_32_TPREL reloc). Bit 1
1832 is used similarly for R_CRIS_DTP, see above. */
1833 if ((off & 1) == 0)
1834 {
1835 off &= ~3;
1836
1837 if (h != NULL)
1838 h->got.offset |= 1;
1839 else
1840 local_got_offsets[r_symndx] |= 1;
1841
1842 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
1843 }
1844 else
1845 off &= ~3;
1846
1847 relocation = sgot->output_offset + off
1848 + (r_type == R_CRIS_32_IE ? sgot->output_section->vma : 0);
1849 }
1850 else
1851 {
1852 /* Emit a real relocation. */
1853 bfd_vma off;
1854
1855 if (h != NULL)
1856 off = h->got.offset;
1857 else
1858 off = local_got_offsets[r_symndx];
1859
1860 /* See above re usage of bit 0 and 1. */
1861 if ((off & 1) == 0)
1862 {
1863 Elf_Internal_Rela outrel;
1864 bfd_byte *loc;
1865
1866 off &= ~3;
1867
1868 if (h != NULL)
1869 h->got.offset |= 1;
1870 else
1871 local_got_offsets[r_symndx] |= 1;
1872
1873 if (srelgot == NULL)
1874 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
1875 BFD_ASSERT (srelgot != NULL);
1876
1877 if (h != NULL && h->dynindx != -1)
1878 {
1879 outrel.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_32_TPREL);
1880 relocation = 0;
1881 }
1882 else
1883 {
1884 outrel.r_info = ELF32_R_INFO (0, R_CRIS_32_TPREL);
1885
1886 /* NULL if we had an error. */
1887 relocation -= elf_hash_table (info)->tls_sec == NULL
1888 ? 0 : elf_hash_table (info)->tls_sec->vma;
1889 }
1890
1891 /* Just "define" the initial contents in some
1892 semi-logical way. */
1893 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
1894
1895 outrel.r_offset = (sgot->output_section->vma
1896 + sgot->output_offset
1897 + off);
1898 outrel.r_addend = relocation;
1899 loc = srelgot->contents;
1900 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
1901 /* NULL if we had an error. */
1902 if (srelgot->contents != NULL)
1903 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1904 }
1905 else
1906 off &= ~3;
1907
1908 relocation = sgot->output_offset + off
1909 + (r_type == R_CRIS_32_IE ? sgot->output_section->vma : 0);
1910 }
1911
1912 /* The GOT-relative offset to the GOT entry is the relocation,
1913 or for R_CRIS_32_GD, the actual address of the GOT entry. */
1914 break;
1915
1916 case R_CRIS_16_TPREL:
1917 case R_CRIS_32_TPREL:
1918 /* This relocation must only be performed against symbols
1919 defined in an ordinary (non-DSO) object. */
1920 if (info->shared)
1921 {
1922 bfd_set_error (bfd_error_invalid_operation);
1923
1924 /* We've already informed in cris_elf_check_relocs that
1925 this is an error. */
1926 return FALSE;
1927 }
1928
1929 if (h != NULL
1930 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1931 && !(h->def_regular || ELF_COMMON_DEF_P (h))
1932 /* If it's undefined, then an error message has already
1933 been emitted. */
1934 && h->root.type != bfd_link_hash_undefined)
1935 {
1936 (*_bfd_error_handler)
1937 (_("%B, section %A: relocation %s is"
1938 " not allowed for symbol: `%s'"
1939 " which is defined outside the program,"
1940 " perhaps a declaration mixup?"),
1941 input_bfd,
1942 input_section,
1943 cris_elf_howto_table[r_type].name,
1944 symname);
1945 bfd_set_error (bfd_error_bad_value);
1946 return FALSE;
1947 }
1948
1949 /* NULL if we had an error. */
1950 relocation -= elf_hash_table (info)->tls_sec == NULL
1951 ? 0
1952 : (elf_hash_table (info)->tls_sec->vma
1953 + elf_hash_table (info)->tls_size);
1954
1955 /* The TLS-relative offset is the relocation. */
1956 break;
1957
1958 default:
1959 BFD_FAIL ();
1960 return FALSE;
1961 }
1962
1963 r = cris_final_link_relocate (howto, input_bfd, input_section,
1964 contents, rel, relocation);
1965
1966 if (r != bfd_reloc_ok)
1967 {
1968 const char * msg = (const char *) NULL;
1969
1970 switch (r)
1971 {
1972 case bfd_reloc_overflow:
1973 r = info->callbacks->reloc_overflow
1974 (info, (h ? &h->root : NULL), symname, howto->name,
1975 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
1976 if (additional_relocation_error_msg_count > 0)
1977 {
1978 additional_relocation_error_msg_count--;
1979 switch (r_type)
1980 {
1981 case R_CRIS_16_GOTPLT:
1982 case R_CRIS_16_GOT:
1983
1984 /* Not just TLS is involved here, so we make
1985 generation and message depend on -fPIC/-fpic
1986 only. */
1987 case R_CRIS_16_GOT_TPREL:
1988 case R_CRIS_16_GOT_GD:
1989 (*_bfd_error_handler)
1990 (_("(too many global variables for -fpic:"
1991 " recompile with -fPIC)"));
1992 break;
1993
1994 case R_CRIS_16_TPREL:
1995 case R_CRIS_16_DTPREL:
1996 (*_bfd_error_handler)
1997 (_("(thread-local data too big for -fpic or"
1998 " -msmall-tls: recompile with -fPIC or"
1999 " -mno-small-tls)"));
2000 break;
2001
2002 /* No known cause for overflow for other relocs. */
2003 default:
2004 break;
2005 }
2006 }
2007 break;
2008
2009 case bfd_reloc_undefined:
2010 r = info->callbacks->undefined_symbol
2011 (info, symname, input_bfd, input_section, rel->r_offset,
2012 TRUE);
2013 break;
2014
2015 case bfd_reloc_outofrange:
2016 msg = _("internal error: out of range error");
2017 break;
2018
2019 case bfd_reloc_notsupported:
2020 msg = _("internal error: unsupported relocation error");
2021 break;
2022
2023 case bfd_reloc_dangerous:
2024 msg = _("internal error: dangerous relocation");
2025 break;
2026
2027 default:
2028 msg = _("internal error: unknown error");
2029 break;
2030 }
2031
2032 if (msg)
2033 r = info->callbacks->warning
2034 (info, msg, symname, input_bfd, input_section, rel->r_offset);
2035
2036 if (! r)
2037 return FALSE;
2038 }
2039 }
2040
2041 return TRUE;
2042 }
2043 \f
2044 /* Finish up dynamic symbol handling. We set the contents of various
2045 dynamic sections here. */
2046
2047 static bfd_boolean
2048 elf_cris_finish_dynamic_symbol (bfd *output_bfd,
2049 struct bfd_link_info *info,
2050 struct elf_link_hash_entry *h,
2051 Elf_Internal_Sym *sym)
2052 {
2053 struct elf_cris_link_hash_table * htab;
2054 bfd *dynobj;
2055
2056 /* Where in the plt entry to put values. */
2057 int plt_off1 = 2, plt_off2 = 10, plt_off3 = 16;
2058
2059 /* What offset to add to the distance to the first PLT entry for the
2060 value at plt_off3. */
2061 int plt_off3_value_bias = 4;
2062
2063 /* Where in the PLT entry the call-dynlink-stub is (happens to be same
2064 for PIC and non-PIC for v32 and pre-v32). */
2065 int plt_stub_offset = 8;
2066 int plt_entry_size = PLT_ENTRY_SIZE;
2067 const bfd_byte *plt_entry = elf_cris_plt_entry;
2068 const bfd_byte *plt_pic_entry = elf_cris_pic_plt_entry;
2069
2070 htab = elf_cris_hash_table (info);
2071 if (htab == NULL)
2072 return FALSE;
2073
2074 /* Adjust the various PLT entry offsets. */
2075 if (bfd_get_mach (output_bfd) == bfd_mach_cris_v32)
2076 {
2077 plt_off2 = 14;
2078 plt_off3 = 20;
2079 plt_off3_value_bias = -2;
2080 plt_stub_offset = 12;
2081 plt_entry_size = PLT_ENTRY_SIZE_V32;
2082 plt_entry = elf_cris_plt_entry_v32;
2083 plt_pic_entry = elf_cris_pic_plt_entry_v32;
2084 }
2085
2086 dynobj = elf_hash_table (info)->dynobj;
2087
2088 if (h->plt.offset != (bfd_vma) -1)
2089 {
2090 asection *splt;
2091 asection *sgotplt;
2092 asection *srela;
2093 bfd_vma got_base;
2094
2095 bfd_vma gotplt_offset
2096 = elf_cris_hash_entry (h)->gotplt_offset;
2097 Elf_Internal_Rela rela;
2098 bfd_byte *loc;
2099 bfd_boolean has_gotplt = gotplt_offset != 0;
2100
2101 /* Get the index in the .rela.plt relocations for the .got.plt
2102 entry that corresponds to this symbol.
2103 We have to count backwards here, and the result is only valid
2104 as an index into .rela.plt. We also have to undo the effect
2105 of the R_CRIS_DTPMOD entry at .got index 3 (offset 12 into
2106 .got.plt) for which gotplt_offset is adjusted, because while
2107 that entry goes into .got.plt, its relocation goes into
2108 .rela.got, not .rela.plt. (It's not PLT-specific; not to be
2109 processed as part of the runtime lazy .rela.plt relocation).
2110 FIXME: There be literal constants here... */
2111 bfd_vma rela_plt_index
2112 = (htab->dtpmod_refcount != 0
2113 ? gotplt_offset/4 - 2 - 3 : gotplt_offset/4 - 3);
2114
2115 /* Get the offset into the .got table of the entry that corresponds
2116 to this function. Note that we embed knowledge that "incoming"
2117 .got goes after .got.plt in the output without padding (pointer
2118 aligned). However, that knowledge is present in several other
2119 places too. */
2120 bfd_vma got_offset
2121 = (has_gotplt
2122 ? gotplt_offset
2123 : h->got.offset + htab->next_gotplt_entry);
2124
2125 /* This symbol has an entry in the procedure linkage table. Set it
2126 up. */
2127
2128 BFD_ASSERT (h->dynindx != -1);
2129
2130 splt = bfd_get_linker_section (dynobj, ".plt");
2131 sgotplt = bfd_get_linker_section (dynobj, ".got.plt");
2132 srela = bfd_get_linker_section (dynobj, ".rela.plt");
2133 BFD_ASSERT (splt != NULL && sgotplt != NULL
2134 && (! has_gotplt || srela != NULL));
2135
2136 got_base = sgotplt->output_section->vma + sgotplt->output_offset;
2137
2138 /* Fill in the entry in the procedure linkage table. */
2139 if (! info->shared)
2140 {
2141 memcpy (splt->contents + h->plt.offset, plt_entry,
2142 plt_entry_size);
2143
2144 /* We need to enter the absolute address of the GOT entry here. */
2145 bfd_put_32 (output_bfd, got_base + got_offset,
2146 splt->contents + h->plt.offset + plt_off1);
2147 }
2148 else
2149 {
2150 memcpy (splt->contents + h->plt.offset, plt_pic_entry,
2151 plt_entry_size);
2152 bfd_put_32 (output_bfd, got_offset,
2153 splt->contents + h->plt.offset + plt_off1);
2154 }
2155
2156 /* Fill in the plt entry and make a relocation, if this is a "real"
2157 PLT entry. */
2158 if (has_gotplt)
2159 {
2160 /* Fill in the offset to the reloc table. */
2161 bfd_put_32 (output_bfd,
2162 rela_plt_index * sizeof (Elf32_External_Rela),
2163 splt->contents + h->plt.offset + plt_off2);
2164
2165 /* Fill in the offset to the first PLT entry, where to "jump". */
2166 bfd_put_32 (output_bfd,
2167 - (h->plt.offset + plt_off3 + plt_off3_value_bias),
2168 splt->contents + h->plt.offset + plt_off3);
2169
2170 /* Fill in the entry in the global offset table with the address of
2171 the relocating stub. */
2172 bfd_put_32 (output_bfd,
2173 (splt->output_section->vma
2174 + splt->output_offset
2175 + h->plt.offset
2176 + plt_stub_offset),
2177 sgotplt->contents + got_offset);
2178
2179 /* Fill in the entry in the .rela.plt section. */
2180 rela.r_offset = (sgotplt->output_section->vma
2181 + sgotplt->output_offset
2182 + got_offset);
2183 rela.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_JUMP_SLOT);
2184 rela.r_addend = 0;
2185 loc = srela->contents + rela_plt_index * sizeof (Elf32_External_Rela);
2186 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
2187 }
2188
2189 if (!h->def_regular)
2190 {
2191 /* Mark the symbol as undefined, rather than as defined in
2192 the .plt section. Leave the value alone. */
2193 sym->st_shndx = SHN_UNDEF;
2194
2195 /* FIXME: From elf32-sparc.c 2001-02-19 (1.18). I still don't
2196 know whether resetting the value is significant; if it really
2197 is, rather than a quirk or bug in the sparc port, then I
2198 believe we'd see this elsewhere. */
2199 /* If the symbol is weak, we do need to clear the value.
2200 Otherwise, the PLT entry would provide a definition for
2201 the symbol even if the symbol wasn't defined anywhere,
2202 and so the symbol would never be NULL. */
2203 if (!h->ref_regular_nonweak)
2204 sym->st_value = 0;
2205 }
2206 }
2207
2208 /* For an ordinary program, we emit .got relocs only for symbols that
2209 are in the dynamic-symbols table and are either defined by the
2210 program or are undefined weak symbols, or are function symbols
2211 where we do not output a PLT: the PLT reloc was output above and all
2212 references to the function symbol are redirected to the PLT. */
2213 if (h->got.offset != (bfd_vma) -1
2214 && (elf_cris_hash_entry (h)->reg_got_refcount > 0)
2215 && (info->shared
2216 || (h->dynindx != -1
2217 && h->plt.offset == (bfd_vma) -1
2218 && !h->def_regular
2219 && h->root.type != bfd_link_hash_undefweak)))
2220 {
2221 asection *sgot;
2222 asection *srela;
2223 Elf_Internal_Rela rela;
2224 bfd_byte *loc;
2225 bfd_byte *where;
2226
2227 /* This symbol has an entry in the global offset table. Set it up. */
2228
2229 sgot = bfd_get_linker_section (dynobj, ".got");
2230 srela = bfd_get_linker_section (dynobj, ".rela.got");
2231 BFD_ASSERT (sgot != NULL && srela != NULL);
2232
2233 rela.r_offset = (sgot->output_section->vma
2234 + sgot->output_offset
2235 + (h->got.offset &~ (bfd_vma) 1));
2236
2237 /* If this is a static link, or it is a -Bsymbolic link and the
2238 symbol is defined locally or was forced to be local because
2239 of a version file, we just want to emit a RELATIVE reloc.
2240 The entry in the global offset table will already have been
2241 initialized in the relocate_section function. */
2242 where = sgot->contents + (h->got.offset &~ (bfd_vma) 1);
2243 if (! elf_hash_table (info)->dynamic_sections_created
2244 || (info->shared
2245 && (info->symbolic || h->dynindx == -1)
2246 && h->def_regular))
2247 {
2248 rela.r_info = ELF32_R_INFO (0, R_CRIS_RELATIVE);
2249 rela.r_addend = bfd_get_signed_32 (output_bfd, where);
2250 }
2251 else
2252 {
2253 bfd_put_32 (output_bfd, (bfd_vma) 0, where);
2254 rela.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_GLOB_DAT);
2255 rela.r_addend = 0;
2256 }
2257
2258 loc = srela->contents;
2259 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
2260 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
2261 }
2262
2263 if (h->needs_copy)
2264 {
2265 asection *s;
2266 Elf_Internal_Rela rela;
2267 bfd_byte *loc;
2268
2269 /* This symbol needs a copy reloc. Set it up. */
2270
2271 BFD_ASSERT (h->dynindx != -1
2272 && (h->root.type == bfd_link_hash_defined
2273 || h->root.type == bfd_link_hash_defweak));
2274
2275 s = bfd_get_linker_section (dynobj, ".rela.bss");
2276 BFD_ASSERT (s != NULL);
2277
2278 rela.r_offset = (h->root.u.def.value
2279 + h->root.u.def.section->output_section->vma
2280 + h->root.u.def.section->output_offset);
2281 rela.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_COPY);
2282 rela.r_addend = 0;
2283 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
2284 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
2285 }
2286
2287 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
2288 if (h == elf_hash_table (info)->hdynamic
2289 || h == elf_hash_table (info)->hgot)
2290 sym->st_shndx = SHN_ABS;
2291
2292 return TRUE;
2293 }
2294 \f
2295 /* Finish up the dynamic sections. Do *not* emit relocs here, as their
2296 offsets were changed, as part of -z combreloc handling, from those we
2297 computed. */
2298
2299 static bfd_boolean
2300 elf_cris_finish_dynamic_sections (bfd *output_bfd,
2301 struct bfd_link_info *info)
2302 {
2303 bfd *dynobj;
2304 asection *sgot;
2305 asection *sdyn;
2306
2307 dynobj = elf_hash_table (info)->dynobj;
2308
2309 sgot = bfd_get_linker_section (dynobj, ".got.plt");
2310 BFD_ASSERT (sgot != NULL);
2311 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
2312
2313 if (elf_hash_table (info)->dynamic_sections_created)
2314 {
2315 asection *splt;
2316 Elf32_External_Dyn *dyncon, *dynconend;
2317
2318 splt = bfd_get_linker_section (dynobj, ".plt");
2319 BFD_ASSERT (splt != NULL && sdyn != NULL);
2320
2321 dyncon = (Elf32_External_Dyn *) sdyn->contents;
2322 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
2323 for (; dyncon < dynconend; dyncon++)
2324 {
2325 Elf_Internal_Dyn dyn;
2326 asection *s;
2327
2328 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
2329
2330 switch (dyn.d_tag)
2331 {
2332 default:
2333 break;
2334
2335 case DT_PLTGOT:
2336 s = bfd_get_section_by_name (output_bfd, ".got");
2337 BFD_ASSERT (s != NULL);
2338 dyn.d_un.d_ptr = s->vma;
2339 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2340 break;
2341
2342 case DT_JMPREL:
2343 /* Yes, we *can* have a .plt and no .plt.rela, for instance
2344 if all symbols are found in the .got (not .got.plt). */
2345 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2346 dyn.d_un.d_ptr = s != NULL ? s->vma : 0;
2347 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2348 break;
2349
2350 case DT_PLTRELSZ:
2351 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2352 if (s == NULL)
2353 dyn.d_un.d_val = 0;
2354 else
2355 dyn.d_un.d_val = s->size;
2356 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2357 break;
2358
2359 case DT_RELASZ:
2360 /* The procedure linkage table relocs (DT_JMPREL) should
2361 not be included in the overall relocs (DT_RELA).
2362 Therefore, we override the DT_RELASZ entry here to
2363 make it not include the JMPREL relocs. Since the
2364 linker script arranges for .rela.plt to follow all
2365 other relocation sections, we don't have to worry
2366 about changing the DT_RELA entry. */
2367 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2368 if (s != NULL)
2369 dyn.d_un.d_val -= s->size;
2370 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2371 break;
2372 }
2373 }
2374
2375 /* Fill in the first entry in the procedure linkage table. */
2376 if (splt->size > 0)
2377 {
2378 if (bfd_get_mach (output_bfd) == bfd_mach_cris_v32)
2379 {
2380 if (info->shared)
2381 memcpy (splt->contents, elf_cris_pic_plt0_entry_v32,
2382 PLT_ENTRY_SIZE_V32);
2383 else
2384 {
2385 memcpy (splt->contents, elf_cris_plt0_entry_v32,
2386 PLT_ENTRY_SIZE_V32);
2387 bfd_put_32 (output_bfd,
2388 sgot->output_section->vma
2389 + sgot->output_offset + 4,
2390 splt->contents + 4);
2391
2392 elf_section_data (splt->output_section)->this_hdr.sh_entsize
2393 = PLT_ENTRY_SIZE_V32;
2394 }
2395 }
2396 else
2397 {
2398 if (info->shared)
2399 memcpy (splt->contents, elf_cris_pic_plt0_entry,
2400 PLT_ENTRY_SIZE);
2401 else
2402 {
2403 memcpy (splt->contents, elf_cris_plt0_entry,
2404 PLT_ENTRY_SIZE);
2405 bfd_put_32 (output_bfd,
2406 sgot->output_section->vma
2407 + sgot->output_offset + 4,
2408 splt->contents + 6);
2409 bfd_put_32 (output_bfd,
2410 sgot->output_section->vma
2411 + sgot->output_offset + 8,
2412 splt->contents + 14);
2413
2414 elf_section_data (splt->output_section)->this_hdr.sh_entsize
2415 = PLT_ENTRY_SIZE;
2416 }
2417 }
2418 }
2419 }
2420
2421 /* Fill in the first three entries in the global offset table. */
2422 if (sgot->size > 0)
2423 {
2424 if (sdyn == NULL)
2425 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
2426 else
2427 bfd_put_32 (output_bfd,
2428 sdyn->output_section->vma + sdyn->output_offset,
2429 sgot->contents);
2430 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
2431 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
2432 }
2433
2434 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
2435
2436 return TRUE;
2437 }
2438 \f
2439 /* Return the section that should be marked against GC for a given
2440 relocation. */
2441
2442 static asection *
2443 cris_elf_gc_mark_hook (asection *sec,
2444 struct bfd_link_info *info,
2445 Elf_Internal_Rela *rel,
2446 struct elf_link_hash_entry *h,
2447 Elf_Internal_Sym *sym)
2448 {
2449 enum elf_cris_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
2450 if (h != NULL)
2451 switch (r_type)
2452 {
2453 case R_CRIS_GNU_VTINHERIT:
2454 case R_CRIS_GNU_VTENTRY:
2455 return NULL;
2456
2457 default:
2458 break;
2459 }
2460
2461 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2462 }
2463
2464 /* Update the got entry reference counts for the section being removed. */
2465
2466 static bfd_boolean
2467 cris_elf_gc_sweep_hook (bfd *abfd,
2468 struct bfd_link_info *info,
2469 asection *sec,
2470 const Elf_Internal_Rela *relocs)
2471 {
2472 struct elf_cris_link_hash_table * htab;
2473 Elf_Internal_Shdr *symtab_hdr;
2474 struct elf_link_hash_entry **sym_hashes;
2475 bfd_signed_vma *local_got_refcounts;
2476 const Elf_Internal_Rela *rel, *relend;
2477 bfd *dynobj;
2478 asection *sgot;
2479 asection *srelgot;
2480
2481 if (info->relocatable)
2482 return TRUE;
2483
2484 dynobj = elf_hash_table (info)->dynobj;
2485 if (dynobj == NULL)
2486 return TRUE;
2487
2488 htab = elf_cris_hash_table (info);
2489 if (htab == NULL)
2490 return FALSE;
2491
2492 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2493 sym_hashes = elf_sym_hashes (abfd);
2494 local_got_refcounts = elf_local_got_refcounts (abfd);
2495
2496 sgot = bfd_get_linker_section (dynobj, ".got");
2497 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
2498
2499 relend = relocs + sec->reloc_count;
2500 for (rel = relocs; rel < relend; rel++)
2501 {
2502 unsigned long r_symndx;
2503 struct elf_link_hash_entry *h = NULL;
2504 bfd_signed_vma got_element_size = 4;
2505 bfd_signed_vma *specific_refcount = NULL;
2506 enum elf_cris_reloc_type r_type;
2507
2508 r_symndx = ELF32_R_SYM (rel->r_info);
2509 if (r_symndx >= symtab_hdr->sh_info)
2510 {
2511 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2512 while (h->root.type == bfd_link_hash_indirect
2513 || h->root.type == bfd_link_hash_warning)
2514 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2515 }
2516
2517 r_type = ELF32_R_TYPE (rel->r_info);
2518 switch (r_type)
2519 {
2520 case R_CRIS_32_GOT:
2521 case R_CRIS_16_GOT:
2522 case R_CRIS_16_GOTPLT:
2523 case R_CRIS_32_GOTPLT:
2524 specific_refcount = h != NULL
2525 ? &((struct elf_cris_link_hash_entry *) h)->reg_got_refcount
2526 : &local_got_refcounts[LGOT_REG_NDX (r_symndx)];
2527 break;
2528
2529 case R_CRIS_32_GD:
2530 case R_CRIS_32_GOT_GD:
2531 case R_CRIS_16_GOT_GD:
2532 got_element_size = 8;
2533 specific_refcount = h != NULL
2534 ? &((struct elf_cris_link_hash_entry *) h)->dtp_refcount
2535 : &local_got_refcounts[LGOT_DTP_NDX (r_symndx)];
2536 break;
2537
2538 case R_CRIS_32_IE:
2539 case R_CRIS_16_GOT_TPREL:
2540 case R_CRIS_32_GOT_TPREL:
2541 specific_refcount = h != NULL
2542 ? &((struct elf_cris_link_hash_entry *) h)->tprel_refcount
2543 : &local_got_refcounts[LGOT_TPREL_NDX (r_symndx)];
2544 break;
2545
2546 default:
2547 break;
2548 }
2549
2550 switch (r_type)
2551 {
2552 case R_CRIS_32_IE:
2553 case R_CRIS_32_GD:
2554 case R_CRIS_16_GOT_TPREL:
2555 case R_CRIS_32_GOT_TPREL:
2556 case R_CRIS_32_GOT_GD:
2557 case R_CRIS_16_GOT_GD:
2558 case R_CRIS_16_GOT:
2559 case R_CRIS_32_GOT:
2560 if (h != NULL)
2561 {
2562 /* If the counters are 0 when we got here, we've
2563 miscounted somehow somewhere, an internal error. */
2564 BFD_ASSERT (h->got.refcount > 0);
2565 --h->got.refcount;
2566
2567 BFD_ASSERT (*specific_refcount > 0);
2568 --*specific_refcount;
2569 if (*specific_refcount == 0)
2570 {
2571 /* We don't need the .got entry any more. */
2572 sgot->size -= got_element_size;
2573 srelgot->size -= sizeof (Elf32_External_Rela);
2574 }
2575 break;
2576 }
2577
2578 local_got_reloc:
2579 if (local_got_refcounts != NULL)
2580 {
2581 /* If the counters are 0 when we got here, we've
2582 miscounted somehow somewhere, an internal error. */
2583 BFD_ASSERT (local_got_refcounts[r_symndx] > 0);
2584 --local_got_refcounts[r_symndx];
2585
2586 BFD_ASSERT (*specific_refcount > 0);
2587 --*specific_refcount;
2588 if (*specific_refcount == 0)
2589 {
2590 /* We don't need the .got entry any more. */
2591 sgot->size -= got_element_size;
2592 if (info->shared)
2593 srelgot->size -= sizeof (Elf32_External_Rela);
2594 }
2595 }
2596 break;
2597
2598 case R_CRIS_16_GOTPLT:
2599 case R_CRIS_32_GOTPLT:
2600 /* For local symbols, treat these like GOT relocs. */
2601 if (h == NULL)
2602 goto local_got_reloc;
2603 else
2604 /* For global symbols, adjust the reloc-specific refcount. */
2605 elf_cris_hash_entry (h)->gotplt_refcount--;
2606 /* Fall through. */
2607
2608 case R_CRIS_32_PLT_GOTREL:
2609 /* FIXME: We don't garbage-collect away the .got section. */
2610 if (local_got_refcounts != NULL)
2611 local_got_refcounts[-1]--;
2612 /* Fall through. */
2613
2614 case R_CRIS_8:
2615 case R_CRIS_16:
2616 case R_CRIS_32:
2617 case R_CRIS_8_PCREL:
2618 case R_CRIS_16_PCREL:
2619 case R_CRIS_32_PCREL:
2620 case R_CRIS_32_PLT_PCREL:
2621 /* Negate the increment we did in cris_elf_check_relocs. */
2622 if (h != NULL)
2623 {
2624 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2625 && h->plt.refcount > 0)
2626 --h->plt.refcount;
2627 }
2628 break;
2629
2630 case R_CRIS_32_DTPREL:
2631 /* This'd be a .dtpreld entry in e.g. debug info. */
2632 if ((sec->flags & SEC_ALLOC) == 0)
2633 break;
2634 /* Fall through. */
2635 case R_CRIS_16_DTPREL:
2636 htab->dtpmod_refcount--;
2637 if (htab->dtpmod_refcount == 0)
2638 htab->next_gotplt_entry -= 8;
2639 BFD_ASSERT (local_got_refcounts != NULL);
2640 local_got_refcounts[-1]--;
2641 break;
2642
2643 default:
2644 break;
2645 }
2646 }
2647
2648 return TRUE;
2649 }
2650
2651 /* The elf_backend_plt_sym_val hook function. */
2652
2653 static bfd_vma
2654 cris_elf_plt_sym_val (bfd_vma i ATTRIBUTE_UNUSED, const asection *plt,
2655 const arelent *rel)
2656 {
2657 bfd_size_type plt_entry_size;
2658 bfd_size_type pltoffs;
2659 bfd *abfd = plt->owner;
2660
2661 /* Same for CRIS and CRIS v32; see elf_cris_(|pic_)plt_entry(|_v32)[]. */
2662 bfd_size_type plt_entry_got_offset = 2;
2663 bfd_size_type plt_sec_size;
2664 bfd_size_type got_vma_for_dyn;
2665 asection *got;
2666
2667 /* FIXME: the .got section should be readily available also when
2668 we're not linking. */
2669 if ((got = bfd_get_section_by_name (abfd, ".got")) == NULL)
2670 return (bfd_vma) -1;
2671
2672 plt_sec_size = bfd_section_size (plt->owner, plt);
2673 plt_entry_size
2674 = (bfd_get_mach (abfd) == bfd_mach_cris_v32
2675 ? PLT_ENTRY_SIZE_V32 : PLT_ENTRY_SIZE);
2676
2677 /* Data in PLT is GOT-relative for DYN, but absolute for EXE. */
2678 got_vma_for_dyn = (abfd->flags & EXEC_P) ? 0 : got->vma;
2679
2680 /* Because we can have merged GOT entries; a single .got entry for
2681 both GOT and the PLT part of the GOT (.got.plt), the index of the
2682 reloc in .rela.plt is not the same as the index in the PLT.
2683 Instead, we have to hunt down the GOT offset in the PLT that
2684 corresponds to that of this reloc. Unfortunately, we will only
2685 be called for the .rela.plt relocs, so we'll miss synthetic
2686 symbols for .plt entries with merged GOT entries. (FIXME:
2687 fixable by providing our own bfd_elf32_get_synthetic_symtab.
2688 Doesn't seem worthwile at time of this writing.) FIXME: we've
2689 gone from O(1) to O(N) (N number of PLT entries) for finding each
2690 PLT address. Shouldn't matter in practice though. */
2691
2692 for (pltoffs = plt_entry_size;
2693 pltoffs < plt_sec_size;
2694 pltoffs += plt_entry_size)
2695 {
2696 bfd_size_type got_offset;
2697 bfd_byte gotoffs_raw[4];
2698
2699 if (!bfd_get_section_contents (abfd, (asection *) plt, gotoffs_raw,
2700 pltoffs + plt_entry_got_offset,
2701 sizeof (gotoffs_raw)))
2702 return (bfd_vma) -1;
2703
2704 got_offset = bfd_get_32 (abfd, gotoffs_raw);
2705 if (got_offset + got_vma_for_dyn == rel->address)
2706 return plt->vma + pltoffs;
2707 }
2708
2709 /* While it's tempting to BFD_ASSERT that we shouldn't get here,
2710 that'd not be graceful behavior for invalid input. */
2711 return (bfd_vma) -1;
2712 }
2713
2714 /* Make sure we emit a GOT entry if the symbol was supposed to have a PLT
2715 entry but we found we will not create any. Called when we find we will
2716 not have any PLT for this symbol, by for example
2717 elf_cris_adjust_dynamic_symbol when we're doing a proper dynamic link,
2718 or elf_cris_size_dynamic_sections if no dynamic sections will be
2719 created (we're only linking static objects). */
2720
2721 static bfd_boolean
2722 elf_cris_adjust_gotplt_to_got (struct elf_cris_link_hash_entry *h, void * p)
2723 {
2724 struct bfd_link_info *info = (struct bfd_link_info *) p;
2725
2726 /* A GOTPLT reloc, when activated, is supposed to be included into
2727 the PLT refcount. */
2728 BFD_ASSERT (h->gotplt_refcount == 0
2729 || h->gotplt_refcount <= h->root.plt.refcount);
2730
2731 /* If nobody wanted a GOTPLT with this symbol, we're done. */
2732 if (h->gotplt_refcount <= 0)
2733 return TRUE;
2734
2735 if (h->reg_got_refcount > 0)
2736 {
2737 /* There's a GOT entry for this symbol. Just adjust the refcounts.
2738 Probably not necessary at this stage, but keeping them accurate
2739 helps avoiding surprises later. */
2740 h->root.got.refcount += h->gotplt_refcount;
2741 h->reg_got_refcount += h->gotplt_refcount;
2742 h->gotplt_refcount = 0;
2743 }
2744 else
2745 {
2746 /* No GOT entry for this symbol. We need to create one. */
2747 bfd *dynobj = elf_hash_table (info)->dynobj;
2748 asection *sgot;
2749 asection *srelgot;
2750
2751 BFD_ASSERT (dynobj != NULL);
2752 sgot = bfd_get_linker_section (dynobj, ".got");
2753 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
2754
2755 /* Put accurate refcounts there. */
2756 h->root.got.refcount += h->gotplt_refcount;
2757 h->reg_got_refcount = h->gotplt_refcount;
2758
2759 h->gotplt_refcount = 0;
2760
2761 /* We always have a .got and a .rela.got section if there were
2762 GOTPLT relocs in input. */
2763 BFD_ASSERT (sgot != NULL && srelgot != NULL);
2764
2765 /* Allocate space in the .got section. */
2766 sgot->size += 4;
2767
2768 /* Allocate relocation space. */
2769 srelgot->size += sizeof (Elf32_External_Rela);
2770 }
2771
2772 return TRUE;
2773 }
2774
2775 /* Try to fold PLT entries with GOT entries. There are two cases when we
2776 want to do this:
2777
2778 - When all PLT references are GOTPLT references, and there are GOT
2779 references, and this is not the executable. We don't have to
2780 generate a PLT at all.
2781
2782 - When there are both (ordinary) PLT references and GOT references,
2783 and this isn't the executable.
2784 We want to make the PLT reference use the ordinary GOT entry rather
2785 than R_CRIS_JUMP_SLOT, a run-time dynamically resolved GOTPLT entry,
2786 since the GOT entry will have to be resolved at startup anyway.
2787
2788 Though the latter case is handled when room for the PLT is allocated,
2789 not here.
2790
2791 By folding into the GOT, we may need a round-trip to a PLT in the
2792 executable for calls, a loss in performance. Still, losing a
2793 reloc is a win in size and at least in start-up time.
2794
2795 Note that this function is called before symbols are forced local by
2796 version scripts. The differing cases are handled by
2797 elf_cris_hide_symbol. */
2798
2799 static bfd_boolean
2800 elf_cris_try_fold_plt_to_got (struct elf_cris_link_hash_entry *h, void * p)
2801 {
2802 struct bfd_link_info *info = (struct bfd_link_info *) p;
2803
2804 /* If there are no GOT references for this symbol, we can't fold any
2805 other reference so there's nothing to do. Likewise if there are no
2806 PLT references; GOTPLT references included. */
2807 if (h->root.got.refcount <= 0 || h->root.plt.refcount <= 0)
2808 return TRUE;
2809
2810 /* GOTPLT relocs are supposed to be included into the PLT refcount. */
2811 BFD_ASSERT (h->gotplt_refcount <= h->root.plt.refcount);
2812
2813 if (h->gotplt_refcount == h->root.plt.refcount)
2814 {
2815 /* The only PLT references are GOTPLT references, and there are GOT
2816 references. Convert PLT to GOT references. */
2817 if (! elf_cris_adjust_gotplt_to_got (h, info))
2818 return FALSE;
2819
2820 /* Clear the PLT references, so no PLT will be created. */
2821 h->root.plt.offset = (bfd_vma) -1;
2822 }
2823
2824 return TRUE;
2825 }
2826
2827 /* Our own version of hide_symbol, so that we can adjust a GOTPLT reloc
2828 to use a GOT entry (and create one) rather than requiring a GOTPLT
2829 entry. */
2830
2831 static void
2832 elf_cris_hide_symbol (struct bfd_link_info *info,
2833 struct elf_link_hash_entry *h,
2834 bfd_boolean force_local)
2835 {
2836 elf_cris_adjust_gotplt_to_got ((struct elf_cris_link_hash_entry *) h, info);
2837
2838 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
2839 }
2840
2841 /* Adjust a symbol defined by a dynamic object and referenced by a
2842 regular object. The current definition is in some section of the
2843 dynamic object, but we're not including those sections. We have to
2844 change the definition to something the rest of the link can
2845 understand. */
2846
2847 static bfd_boolean
2848 elf_cris_adjust_dynamic_symbol (struct bfd_link_info *info,
2849 struct elf_link_hash_entry *h)
2850 {
2851 struct elf_cris_link_hash_table * htab;
2852 bfd *dynobj;
2853 asection *s;
2854 bfd_size_type plt_entry_size;
2855
2856 htab = elf_cris_hash_table (info);
2857 if (htab == NULL)
2858 return FALSE;
2859
2860 dynobj = elf_hash_table (info)->dynobj;
2861
2862 /* Make sure we know what is going on here. */
2863 BFD_ASSERT (dynobj != NULL
2864 && (h->needs_plt
2865 || h->u.weakdef != NULL
2866 || (h->def_dynamic
2867 && h->ref_regular
2868 && !h->def_regular)));
2869
2870 plt_entry_size
2871 = (bfd_get_mach (dynobj) == bfd_mach_cris_v32
2872 ? PLT_ENTRY_SIZE_V32 : PLT_ENTRY_SIZE);
2873
2874 /* If this is a function, put it in the procedure linkage table. We
2875 will fill in the contents of the procedure linkage table later,
2876 when we know the address of the .got section. */
2877 if (h->type == STT_FUNC
2878 || h->needs_plt)
2879 {
2880 /* If we link a program (not a DSO), we'll get rid of unnecessary
2881 PLT entries; we point to the actual symbols -- even for pic
2882 relocs, because a program built with -fpic should have the same
2883 result as one built without -fpic, specifically considering weak
2884 symbols.
2885 FIXME: m68k and i386 differ here, for unclear reasons. */
2886 if (! info->shared
2887 && !h->def_dynamic)
2888 {
2889 /* This case can occur if we saw a PLT reloc in an input file,
2890 but the symbol was not defined by a dynamic object. In such
2891 a case, we don't actually need to build a procedure linkage
2892 table, and we can just do an absolute or PC reloc instead, or
2893 change a .got.plt index to a .got index for GOTPLT relocs. */
2894 BFD_ASSERT (h->needs_plt);
2895 h->needs_plt = 0;
2896 h->plt.offset = (bfd_vma) -1;
2897 return
2898 elf_cris_adjust_gotplt_to_got ((struct
2899 elf_cris_link_hash_entry *) h,
2900 info);
2901 }
2902
2903 /* If we had a R_CRIS_GLOB_DAT that didn't have to point to a PLT;
2904 where a pointer-equivalent symbol was unimportant (i.e. more
2905 like R_CRIS_JUMP_SLOT after symbol evaluation) we could get rid
2906 of the PLT. We can't for the executable, because the GOT
2907 entries will point to the PLT there (and be constant). */
2908 if (info->shared
2909 && !elf_cris_try_fold_plt_to_got ((struct elf_cris_link_hash_entry*)
2910 h, info))
2911 return FALSE;
2912
2913 /* GC or folding may have rendered this entry unused. */
2914 if (h->plt.refcount <= 0)
2915 {
2916 h->needs_plt = 0;
2917 h->plt.offset = (bfd_vma) -1;
2918 return TRUE;
2919 }
2920
2921 /* Make sure this symbol is output as a dynamic symbol. */
2922 if (h->dynindx == -1)
2923 {
2924 if (! bfd_elf_link_record_dynamic_symbol (info, h))
2925 return FALSE;
2926 }
2927
2928 s = bfd_get_linker_section (dynobj, ".plt");
2929 BFD_ASSERT (s != NULL);
2930
2931 /* If this is the first .plt entry, make room for the special
2932 first entry. */
2933 if (s->size == 0)
2934 s->size += plt_entry_size;
2935
2936 /* If this symbol is not defined in a regular file, and we are
2937 not generating a shared library, then set the symbol to this
2938 location in the .plt. */
2939 if (!info->shared
2940 && !h->def_regular)
2941 {
2942 h->root.u.def.section = s;
2943 h->root.u.def.value = s->size;
2944 }
2945
2946 /* If there's already a GOT entry, use that, not a .got.plt. A
2947 GOT field still has a reference count when we get here; it's
2948 not yet changed to an offset. We can't do this for an
2949 executable, because then the reloc associated with the PLT
2950 would get a non-PLT reloc pointing to the PLT. FIXME: Move
2951 this to elf_cris_try_fold_plt_to_got. */
2952 if (info->shared && h->got.refcount > 0)
2953 {
2954 h->got.refcount += h->plt.refcount;
2955
2956 /* Mark the PLT offset to use the GOT entry by setting the low
2957 bit in the plt offset; it is always a multiple of
2958 plt_entry_size (which is at least a multiple of 2). */
2959 BFD_ASSERT ((s->size % plt_entry_size) == 0);
2960
2961 /* Change the PLT refcount to an offset. */
2962 h->plt.offset = s->size;
2963
2964 /* By not setting gotplt_offset (i.e. it remains at 0), we signal
2965 that the got entry should be used instead. */
2966 BFD_ASSERT (((struct elf_cris_link_hash_entry *)
2967 h)->gotplt_offset == 0);
2968
2969 /* Make room for this entry. */
2970 s->size += plt_entry_size;
2971
2972 return TRUE;
2973 }
2974
2975 /* No GOT reference for this symbol; prepare for an ordinary PLT. */
2976 h->plt.offset = s->size;
2977
2978 /* Make room for this entry. */
2979 s->size += plt_entry_size;
2980
2981 /* We also need to make an entry in the .got.plt section, which
2982 will be placed in the .got section by the linker script. */
2983 ((struct elf_cris_link_hash_entry *) h)->gotplt_offset
2984 = htab->next_gotplt_entry;
2985 htab->next_gotplt_entry += 4;
2986
2987 s = bfd_get_linker_section (dynobj, ".got.plt");
2988 BFD_ASSERT (s != NULL);
2989 s->size += 4;
2990
2991 /* We also need to make an entry in the .rela.plt section. */
2992
2993 s = bfd_get_linker_section (dynobj, ".rela.plt");
2994 BFD_ASSERT (s != NULL);
2995 s->size += sizeof (Elf32_External_Rela);
2996
2997 return TRUE;
2998 }
2999
3000 /* Reinitialize the plt offset now that it is not used as a reference
3001 count any more. */
3002 h->plt.offset = (bfd_vma) -1;
3003
3004 /* If this is a weak symbol, and there is a real definition, the
3005 processor independent code will have arranged for us to see the
3006 real definition first, and we can just use the same value. */
3007 if (h->u.weakdef != NULL)
3008 {
3009 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
3010 || h->u.weakdef->root.type == bfd_link_hash_defweak);
3011 h->root.u.def.section = h->u.weakdef->root.u.def.section;
3012 h->root.u.def.value = h->u.weakdef->root.u.def.value;
3013 return TRUE;
3014 }
3015
3016 /* This is a reference to a symbol defined by a dynamic object which
3017 is not a function. */
3018
3019 /* If we are creating a shared library, we must presume that the
3020 only references to the symbol are via the global offset table.
3021 For such cases we need not do anything here; the relocations will
3022 be handled correctly by relocate_section. */
3023 if (info->shared)
3024 return TRUE;
3025
3026 /* If there are no references to this symbol that do not use the
3027 GOT, we don't need to generate a copy reloc. */
3028 if (!h->non_got_ref)
3029 return TRUE;
3030
3031 /* We must allocate the symbol in our .dynbss section, which will
3032 become part of the .bss section of the executable. There will be
3033 an entry for this symbol in the .dynsym section. The dynamic
3034 object will contain position independent code, so all references
3035 from the dynamic object to this symbol will go through the global
3036 offset table. The dynamic linker will use the .dynsym entry to
3037 determine the address it must put in the global offset table, so
3038 both the dynamic object and the regular object will refer to the
3039 same memory location for the variable. */
3040
3041 s = bfd_get_linker_section (dynobj, ".dynbss");
3042 BFD_ASSERT (s != NULL);
3043
3044 /* We must generate a R_CRIS_COPY reloc to tell the dynamic linker to
3045 copy the initial value out of the dynamic object and into the
3046 runtime process image. We need to remember the offset into the
3047 .rela.bss section we are going to use. */
3048 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
3049 {
3050 asection *srel;
3051
3052 srel = bfd_get_linker_section (dynobj, ".rela.bss");
3053 BFD_ASSERT (srel != NULL);
3054 srel->size += sizeof (Elf32_External_Rela);
3055 h->needs_copy = 1;
3056 }
3057
3058 return _bfd_elf_adjust_dynamic_copy (h, s);
3059 }
3060
3061 /* Adjust our "subclass" elements for an indirect symbol. */
3062
3063 static void
3064 elf_cris_copy_indirect_symbol (struct bfd_link_info *info,
3065 struct elf_link_hash_entry *dir,
3066 struct elf_link_hash_entry *ind)
3067 {
3068 struct elf_cris_link_hash_entry *edir, *eind;
3069
3070 edir = (struct elf_cris_link_hash_entry *) dir;
3071 eind = (struct elf_cris_link_hash_entry *) ind;
3072
3073 /* Only indirect symbols are replaced; we're not interested in
3074 updating any of EIND's fields for other symbols. */
3075 if (eind->root.root.type != bfd_link_hash_indirect)
3076 {
3077 /* Still, we need to copy flags for e.g. weak definitions. */
3078 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
3079 return;
3080 }
3081
3082 BFD_ASSERT (edir->gotplt_offset == 0 || eind->gotplt_offset == 0);
3083
3084 #define XMOVOPZ(F, OP, Z) edir->F OP eind->F; eind->F = Z
3085 #define XMOVE(F) XMOVOPZ (F, +=, 0)
3086 if (eind->pcrel_relocs_copied != NULL)
3087 {
3088 if (edir->pcrel_relocs_copied != NULL)
3089 {
3090 struct elf_cris_pcrel_relocs_copied **pp;
3091 struct elf_cris_pcrel_relocs_copied *p;
3092
3093 /* Add reloc counts against the indirect sym to the direct sym
3094 list. Merge any entries against the same section. */
3095 for (pp = &eind->pcrel_relocs_copied; *pp != NULL;)
3096 {
3097 struct elf_cris_pcrel_relocs_copied *q;
3098 p = *pp;
3099 for (q = edir->pcrel_relocs_copied; q != NULL; q = q->next)
3100 if (q->section == p->section)
3101 {
3102 q->count += p->count;
3103 *pp = p->next;
3104 break;
3105 }
3106 if (q == NULL)
3107 pp = &p->next;
3108 }
3109 *pp = edir->pcrel_relocs_copied;
3110 }
3111 XMOVOPZ (pcrel_relocs_copied, =, NULL);
3112 }
3113 XMOVE (gotplt_refcount);
3114 XMOVE (gotplt_offset);
3115 XMOVE (reg_got_refcount);
3116 XMOVE (tprel_refcount);
3117 XMOVE (dtp_refcount);
3118 #undef XMOVE
3119 #undef XMOVOPZ
3120
3121 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
3122 }
3123
3124 /* Look through the relocs for a section during the first phase. */
3125
3126 static bfd_boolean
3127 cris_elf_check_relocs (bfd *abfd,
3128 struct bfd_link_info *info,
3129 asection *sec,
3130 const Elf_Internal_Rela *relocs)
3131 {
3132 struct elf_cris_link_hash_table * htab;
3133 bfd *dynobj;
3134 Elf_Internal_Shdr *symtab_hdr;
3135 struct elf_link_hash_entry **sym_hashes;
3136 bfd_signed_vma *local_got_refcounts;
3137 const Elf_Internal_Rela *rel;
3138 const Elf_Internal_Rela *rel_end;
3139 asection *sgot;
3140 asection *srelgot;
3141 asection *sreloc;
3142
3143 if (info->relocatable)
3144 return TRUE;
3145
3146 htab = elf_cris_hash_table (info);
3147 if (htab == NULL)
3148 return FALSE;
3149
3150 dynobj = elf_hash_table (info)->dynobj;
3151 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3152 sym_hashes = elf_sym_hashes (abfd);
3153 local_got_refcounts = elf_local_got_refcounts (abfd);
3154
3155 sgot = NULL;
3156 srelgot = NULL;
3157 sreloc = NULL;
3158
3159 rel_end = relocs + sec->reloc_count;
3160 for (rel = relocs; rel < rel_end; rel++)
3161 {
3162 struct elf_link_hash_entry *h;
3163 unsigned long r_symndx;
3164 enum elf_cris_reloc_type r_type;
3165 bfd_signed_vma got_element_size = 4;
3166 unsigned long r_symndx_lgot = INT_MAX;
3167
3168 r_symndx = ELF32_R_SYM (rel->r_info);
3169 if (r_symndx < symtab_hdr->sh_info)
3170 {
3171 h = NULL;
3172 r_symndx_lgot = LGOT_REG_NDX (r_symndx);
3173 }
3174 else
3175 {
3176 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3177 while (h->root.type == bfd_link_hash_indirect
3178 || h->root.type == bfd_link_hash_warning)
3179 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3180
3181 /* PR15323, ref flags aren't set for references in the same
3182 object. */
3183 h->root.non_ir_ref = 1;
3184 }
3185
3186 r_type = ELF32_R_TYPE (rel->r_info);
3187
3188 /* Some relocs require linker-created sections; we need to hang them
3189 on the first input bfd we found that contained dynamic relocs. */
3190 switch (r_type)
3191 {
3192 case R_CRIS_32_DTPREL:
3193 if ((sec->flags & SEC_ALLOC) == 0)
3194 /* This'd be a .dtpreld entry in e.g. debug info. We have
3195 several different switch statements below, but none of
3196 that is needed; we need no preparations for resolving
3197 R_CRIS_32_DTPREL into a non-allocated section (debug
3198 info), so let's just move on to the next
3199 relocation. */
3200 continue;
3201 /* Fall through. */
3202 case R_CRIS_16_DTPREL:
3203 /* The first .got.plt entry is right after the R_CRIS_DTPMOD
3204 entry at index 3. */
3205 if (htab->dtpmod_refcount == 0)
3206 htab->next_gotplt_entry += 8;
3207
3208 htab->dtpmod_refcount++;
3209 /* Fall through. */
3210
3211 case R_CRIS_32_IE:
3212 case R_CRIS_32_GD:
3213 case R_CRIS_16_GOT_GD:
3214 case R_CRIS_32_GOT_GD:
3215 case R_CRIS_32_GOT_TPREL:
3216 case R_CRIS_16_GOT_TPREL:
3217 case R_CRIS_16_GOT:
3218 case R_CRIS_32_GOT:
3219 case R_CRIS_32_GOTREL:
3220 case R_CRIS_32_PLT_GOTREL:
3221 case R_CRIS_32_PLT_PCREL:
3222 case R_CRIS_16_GOTPLT:
3223 case R_CRIS_32_GOTPLT:
3224 if (dynobj == NULL)
3225 {
3226 elf_hash_table (info)->dynobj = dynobj = abfd;
3227
3228 /* We could handle this if we can get a handle on the
3229 output bfd in elf_cris_adjust_dynamic_symbol. Failing
3230 that, we must insist on dynobj being a specific mach. */
3231 if (bfd_get_mach (dynobj) == bfd_mach_cris_v10_v32)
3232 {
3233 (*_bfd_error_handler)
3234 (_("%B, section %A:\n v10/v32 compatible object %s"
3235 " must not contain a PIC relocation"),
3236 abfd, sec);
3237 return FALSE;
3238 }
3239 }
3240
3241 if (sgot == NULL)
3242 {
3243 /* We may have a dynobj but no .got section, if machine-
3244 independent parts of the linker found a reason to create
3245 a dynobj. We want to create the .got section now, so we
3246 can assume it's always present whenever there's a dynobj.
3247 It's ok to call this function more than once. */
3248 if (!_bfd_elf_create_got_section (dynobj, info))
3249 return FALSE;
3250
3251 sgot = bfd_get_linker_section (dynobj, ".got");
3252 }
3253
3254 if (local_got_refcounts == NULL)
3255 {
3256 bfd_size_type amt;
3257
3258 /* We use index local_got_refcounts[-1] to count all
3259 GOT-relative relocations that do not have explicit
3260 GOT entries. */
3261 amt = LGOT_ALLOC_NELTS_FOR (symtab_hdr->sh_info) + 1;
3262 amt *= sizeof (bfd_signed_vma);
3263 local_got_refcounts = ((bfd_signed_vma *) bfd_zalloc (abfd, amt));
3264 if (local_got_refcounts == NULL)
3265 return FALSE;
3266
3267 local_got_refcounts++;
3268 elf_local_got_refcounts (abfd) = local_got_refcounts;
3269 }
3270 break;
3271
3272 default:
3273 break;
3274 }
3275
3276 /* Some relocs require a global offset table (but perhaps not a
3277 specific GOT entry). */
3278 switch (r_type)
3279 {
3280 case R_CRIS_16_DTPREL:
3281 case R_CRIS_32_DTPREL:
3282 /* Not requesting .got.rela for an executable: the contents
3283 of the first entry is constant there. For a shared
3284 library, we need .got.rela for the R_CRIS_DTPMOD
3285 relocation at index 3. */
3286 if (!info->shared)
3287 break;
3288 /* Fall through. */
3289
3290 case R_CRIS_32_IE:
3291 case R_CRIS_32_GD:
3292 case R_CRIS_16_GOT_GD:
3293 case R_CRIS_32_GOT_GD:
3294 case R_CRIS_32_GOT_TPREL:
3295 case R_CRIS_16_GOT_TPREL:
3296 /* Fall through. */
3297
3298 /* For R_CRIS_16_GOTPLT and R_CRIS_32_GOTPLT, we need a GOT
3299 entry only for local symbols. Unfortunately, we don't know
3300 until later on if there's a version script that forces the
3301 symbol local. We must have the .rela.got section in place
3302 before we know if the symbol looks global now, so we need
3303 to treat the reloc just like for R_CRIS_16_GOT and
3304 R_CRIS_32_GOT. */
3305 case R_CRIS_16_GOTPLT:
3306 case R_CRIS_32_GOTPLT:
3307 case R_CRIS_16_GOT:
3308 case R_CRIS_32_GOT:
3309 if (srelgot == NULL
3310 && (h != NULL || info->shared))
3311 {
3312 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
3313 if (srelgot == NULL)
3314 {
3315 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
3316 | SEC_IN_MEMORY | SEC_LINKER_CREATED
3317 | SEC_READONLY);
3318 srelgot = bfd_make_section_anyway_with_flags (dynobj,
3319 ".rela.got",
3320 flags);
3321 if (srelgot == NULL
3322 || !bfd_set_section_alignment (dynobj, srelgot, 2))
3323 return FALSE;
3324 }
3325 }
3326 break;
3327
3328 default:
3329 break;
3330 }
3331
3332 /* Warn and error for invalid input. */
3333 switch (r_type)
3334 {
3335 case R_CRIS_32_IE:
3336 case R_CRIS_32_TPREL:
3337 case R_CRIS_16_TPREL:
3338 case R_CRIS_32_GD:
3339 if (info->shared)
3340 {
3341 (*_bfd_error_handler)
3342 (_("%B, section %A:\n relocation %s not valid"
3343 " in a shared object;"
3344 " typically an option mixup, recompile with -fPIC"),
3345 abfd,
3346 sec,
3347 cris_elf_howto_table[r_type].name);
3348 /* Don't return FALSE here; we want messages for all of
3349 these and the error behavior is ungraceful
3350 anyway. */
3351 }
3352 default:
3353 break;
3354 }
3355
3356 switch (r_type)
3357 {
3358 case R_CRIS_32_GD:
3359 case R_CRIS_16_GOT_GD:
3360 case R_CRIS_32_GOT_GD:
3361 /* These are requests for tls_index entries, run-time R_CRIS_DTP. */
3362 got_element_size = 8;
3363 r_symndx_lgot = LGOT_DTP_NDX (r_symndx);
3364 break;
3365
3366 case R_CRIS_16_DTPREL:
3367 case R_CRIS_32_DTPREL:
3368 /* These two just request for the constant-index
3369 module-local tls_index-sized GOT entry, which we add
3370 elsewhere. */
3371 break;
3372
3373 case R_CRIS_32_IE:
3374 case R_CRIS_32_GOT_TPREL:
3375 case R_CRIS_16_GOT_TPREL:
3376 r_symndx_lgot = LGOT_TPREL_NDX (r_symndx);
3377
3378 /* Those relocs also require that a DSO is of type
3379 Initial Exec. Like other targets, we don't reset this
3380 flag even if the relocs are GC:ed away. */
3381 if (info->shared)
3382 info->flags |= DF_STATIC_TLS;
3383 break;
3384
3385 /* Let's list the other assembler-generated TLS-relocs too,
3386 just to show that they're not forgotten. */
3387 case R_CRIS_16_TPREL:
3388 case R_CRIS_32_TPREL:
3389 default:
3390 break;
3391 }
3392
3393 switch (r_type)
3394 {
3395 case R_CRIS_16_GOTPLT:
3396 case R_CRIS_32_GOTPLT:
3397 /* Mark that we need a GOT entry if the PLT entry (and its GOT
3398 entry) is eliminated. We can only do this for a non-local
3399 symbol. */
3400 if (h != NULL)
3401 {
3402 elf_cris_hash_entry (h)->gotplt_refcount++;
3403 goto handle_gotplt_reloc;
3404 }
3405 /* If h is NULL then this is a local symbol, and we must make a
3406 GOT entry for it, so handle it like a GOT reloc. */
3407 /* Fall through. */
3408
3409 case R_CRIS_32_IE:
3410 case R_CRIS_32_GD:
3411 case R_CRIS_16_GOT_GD:
3412 case R_CRIS_32_GOT_GD:
3413 case R_CRIS_32_GOT_TPREL:
3414 case R_CRIS_16_GOT_TPREL:
3415 case R_CRIS_16_GOT:
3416 case R_CRIS_32_GOT:
3417 /* This symbol requires a global offset table entry. */
3418 if (h != NULL)
3419 {
3420 if (h->got.refcount == 0)
3421 {
3422 /* Make sure this symbol is output as a dynamic symbol. */
3423 if (h->dynindx == -1)
3424 {
3425 if (!bfd_elf_link_record_dynamic_symbol (info, h))
3426 return FALSE;
3427 }
3428 }
3429
3430 /* Update the sum of reloc counts for this symbol. */
3431 h->got.refcount++;
3432
3433 switch (r_type)
3434 {
3435 case R_CRIS_16_GOT:
3436 case R_CRIS_32_GOT:
3437 if (elf_cris_hash_entry (h)->reg_got_refcount == 0)
3438 {
3439 /* Allocate space in the .got section. */
3440 sgot->size += got_element_size;
3441 /* Allocate relocation space. */
3442 srelgot->size += sizeof (Elf32_External_Rela);
3443 }
3444 elf_cris_hash_entry (h)->reg_got_refcount++;
3445 break;
3446
3447 case R_CRIS_32_GD:
3448 case R_CRIS_16_GOT_GD:
3449 case R_CRIS_32_GOT_GD:
3450 if (elf_cris_hash_entry (h)->dtp_refcount == 0)
3451 {
3452 /* Allocate space in the .got section. */
3453 sgot->size += got_element_size;
3454 /* Allocate relocation space. */
3455 srelgot->size += sizeof (Elf32_External_Rela);
3456 }
3457 elf_cris_hash_entry (h)->dtp_refcount++;
3458 break;
3459
3460 case R_CRIS_32_IE:
3461 case R_CRIS_32_GOT_TPREL:
3462 case R_CRIS_16_GOT_TPREL:
3463 if (elf_cris_hash_entry (h)->tprel_refcount == 0)
3464 {
3465 /* Allocate space in the .got section. */
3466 sgot->size += got_element_size;
3467 /* Allocate relocation space. */
3468 srelgot->size += sizeof (Elf32_External_Rela);
3469 }
3470 elf_cris_hash_entry (h)->tprel_refcount++;
3471 break;
3472
3473 default:
3474 BFD_FAIL ();
3475 break;
3476 }
3477 }
3478 else
3479 {
3480 /* This is a global offset table entry for a local symbol. */
3481 if (local_got_refcounts[r_symndx_lgot] == 0)
3482 {
3483 sgot->size += got_element_size;
3484 if (info->shared)
3485 {
3486 /* If we are generating a shared object, we need
3487 to output a R_CRIS_RELATIVE reloc so that the
3488 dynamic linker can adjust this GOT entry.
3489 Similarly for non-regular got entries. */
3490 srelgot->size += sizeof (Elf32_External_Rela);
3491 }
3492 }
3493 /* Update the reloc-specific count. */
3494 local_got_refcounts[r_symndx_lgot]++;
3495
3496 /* This one is the sum of all the others. */
3497 local_got_refcounts[r_symndx]++;
3498 }
3499 break;
3500
3501 case R_CRIS_16_DTPREL:
3502 case R_CRIS_32_DTPREL:
3503 case R_CRIS_32_GOTREL:
3504 /* This reference requires a global offset table.
3505 FIXME: The actual refcount isn't used currently; the .got
3506 section can't be removed if there were any references in the
3507 input. */
3508 local_got_refcounts[-1]++;
3509 break;
3510
3511 handle_gotplt_reloc:
3512
3513 case R_CRIS_32_PLT_GOTREL:
3514 /* This reference requires a global offset table. */
3515 local_got_refcounts[-1]++;
3516 /* Fall through. */
3517
3518 case R_CRIS_32_PLT_PCREL:
3519 /* This symbol requires a procedure linkage table entry. We
3520 actually build the entry in adjust_dynamic_symbol,
3521 because this might be a case of linking PIC code which is
3522 never referenced by a dynamic object, in which case we
3523 don't need to generate a procedure linkage table entry
3524 after all. */
3525
3526 /* Beware: if we'd check for visibility of the symbol here
3527 (and not marking the need for a PLT when non-visible), we'd
3528 get into trouble with keeping handling consistent with
3529 regards to relocs found before definition and GOTPLT
3530 handling. Eliminable PLT entries will be dealt with later
3531 anyway. */
3532 if (h == NULL)
3533 continue;
3534
3535 h->needs_plt = 1;
3536 h->plt.refcount++;
3537 break;
3538
3539 case R_CRIS_8:
3540 case R_CRIS_16:
3541 case R_CRIS_32:
3542 /* Let's help debug shared library creation. Any of these
3543 relocs *can* be used in shared libs, but pages containing
3544 them cannot be shared, so they're not appropriate for
3545 common use. Don't warn for sections we don't care about,
3546 such as debug sections or non-constant sections. We
3547 can't help tables of (global) function pointers, for
3548 example, though they must be emitted in a (writable) data
3549 section to avoid having impure text sections. */
3550 if (info->shared
3551 && (sec->flags & SEC_ALLOC) != 0
3552 && (sec->flags & SEC_READONLY) != 0)
3553 {
3554 /* FIXME: How do we make this optionally a warning only? */
3555 (*_bfd_error_handler)
3556 (_("%B, section %A:\n relocation %s should not"
3557 " be used in a shared object; recompile with -fPIC"),
3558 abfd,
3559 sec,
3560 cris_elf_howto_table[r_type].name);
3561 }
3562
3563 /* We don't need to handle relocs into sections not going into
3564 the "real" output. */
3565 if ((sec->flags & SEC_ALLOC) == 0)
3566 break;
3567
3568 if (h != NULL)
3569 {
3570 h->non_got_ref = 1;
3571
3572 /* Make sure a plt entry is created for this symbol if it
3573 turns out to be a function defined by a dynamic object. */
3574 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
3575 h->plt.refcount++;
3576 }
3577
3578 /* If we are creating a shared library and this is not a local
3579 symbol, we need to copy the reloc into the shared library.
3580 However when linking with -Bsymbolic and this is a global
3581 symbol which is defined in an object we are including in the
3582 link (i.e., DEF_REGULAR is set), then we can resolve the
3583 reloc directly. At this point we have not seen all the input
3584 files, so it is possible that DEF_REGULAR is not set now but
3585 will be set later (it is never cleared). In case of a weak
3586 definition, DEF_REGULAR may be cleared later by a strong
3587 definition in a shared library. We account for that
3588 possibility below by storing information in the relocs_copied
3589 field of the hash table entry. A similar situation occurs
3590 when creating shared libraries and symbol visibility changes
3591 render the symbol local. */
3592
3593 /* No need to do anything if we're not creating a shared object. */
3594 if (! info->shared)
3595 break;
3596
3597 /* We may need to create a reloc section in the dynobj and made room
3598 for this reloc. */
3599 if (sreloc == NULL)
3600 {
3601 sreloc = _bfd_elf_make_dynamic_reloc_section
3602 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
3603
3604 if (sreloc == NULL)
3605 return FALSE;
3606 }
3607
3608 if (sec->flags & SEC_READONLY)
3609 info->flags |= DF_TEXTREL;
3610
3611 sreloc->size += sizeof (Elf32_External_Rela);
3612 break;
3613
3614 case R_CRIS_8_PCREL:
3615 case R_CRIS_16_PCREL:
3616 case R_CRIS_32_PCREL:
3617 if (h != NULL)
3618 {
3619 h->non_got_ref = 1;
3620
3621 /* Make sure a plt entry is created for this symbol if it
3622 turns out to be a function defined by a dynamic object. */
3623 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
3624 h->plt.refcount++;
3625 }
3626
3627 /* If we are creating a shared library and this is not a local
3628 symbol, we need to copy the reloc into the shared library.
3629 However when linking with -Bsymbolic and this is a global
3630 symbol which is defined in an object we are including in the
3631 link (i.e., DEF_REGULAR is set), then we can resolve the
3632 reloc directly. At this point we have not seen all the input
3633 files, so it is possible that DEF_REGULAR is not set now but
3634 will be set later (it is never cleared). In case of a weak
3635 definition, DEF_REGULAR may be cleared later by a strong
3636 definition in a shared library. We account for that
3637 possibility below by storing information in the relocs_copied
3638 field of the hash table entry. A similar situation occurs
3639 when creating shared libraries and symbol visibility changes
3640 render the symbol local. */
3641
3642 /* No need to do anything if we're not creating a shared object. */
3643 if (! info->shared)
3644 break;
3645
3646 /* We don't need to handle relocs into sections not going into
3647 the "real" output. */
3648 if ((sec->flags & SEC_ALLOC) == 0)
3649 break;
3650
3651 /* If the symbol is local, then we know already we can
3652 eliminate the reloc. */
3653 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
3654 break;
3655
3656 /* If this is with -Bsymbolic and the symbol isn't weak, and
3657 is defined by an ordinary object (the ones we include in
3658 this shared library) then we can also eliminate the
3659 reloc. See comment above for more eliminable cases which
3660 we can't identify at this time. */
3661 if (info->symbolic
3662 && h->root.type != bfd_link_hash_defweak
3663 && h->def_regular)
3664 break;
3665
3666 /* We may need to create a reloc section in the dynobj and made room
3667 for this reloc. */
3668 if (sreloc == NULL)
3669 {
3670 sreloc = _bfd_elf_make_dynamic_reloc_section
3671 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
3672
3673 if (sreloc == NULL)
3674 return FALSE;
3675 }
3676
3677 sreloc->size += sizeof (Elf32_External_Rela);
3678
3679 /* We count the number of PC relative relocations we have
3680 entered for this symbol, so that we can discard them
3681 again if the symbol is later defined by a regular object.
3682 We know that h is really a pointer to an
3683 elf_cris_link_hash_entry. */
3684 {
3685 struct elf_cris_link_hash_entry *eh;
3686 struct elf_cris_pcrel_relocs_copied *p;
3687
3688 eh = elf_cris_hash_entry (h);
3689
3690 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
3691 if (p->section == sec)
3692 break;
3693
3694 if (p == NULL)
3695 {
3696 p = ((struct elf_cris_pcrel_relocs_copied *)
3697 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
3698 if (p == NULL)
3699 return FALSE;
3700 p->next = eh->pcrel_relocs_copied;
3701 eh->pcrel_relocs_copied = p;
3702 p->section = sec;
3703 p->count = 0;
3704 p->r_type = r_type;
3705 }
3706
3707 ++p->count;
3708 }
3709 break;
3710
3711 /* This relocation describes the C++ object vtable hierarchy.
3712 Reconstruct it for later use during GC. */
3713 case R_CRIS_GNU_VTINHERIT:
3714 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
3715 return FALSE;
3716 break;
3717
3718 /* This relocation describes which C++ vtable entries are actually
3719 used. Record for later use during GC. */
3720 case R_CRIS_GNU_VTENTRY:
3721 BFD_ASSERT (h != NULL);
3722 if (h != NULL
3723 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
3724 return FALSE;
3725 break;
3726
3727 case R_CRIS_16_TPREL:
3728 case R_CRIS_32_TPREL:
3729 /* Already warned above, when necessary. */
3730 break;
3731
3732 default:
3733 /* Other relocs do not appear here. */
3734 bfd_set_error (bfd_error_bad_value);
3735 return FALSE;
3736 }
3737 }
3738
3739 return TRUE;
3740 }
3741
3742 /* Set the sizes of the dynamic sections. */
3743
3744 static bfd_boolean
3745 elf_cris_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
3746 struct bfd_link_info *info)
3747 {
3748 struct elf_cris_link_hash_table * htab;
3749 bfd *dynobj;
3750 asection *s;
3751 bfd_boolean plt;
3752 bfd_boolean relocs;
3753
3754 htab = elf_cris_hash_table (info);
3755 if (htab == NULL)
3756 return FALSE;
3757
3758 dynobj = elf_hash_table (info)->dynobj;
3759 BFD_ASSERT (dynobj != NULL);
3760
3761 if (elf_hash_table (info)->dynamic_sections_created)
3762 {
3763 /* Set the contents of the .interp section to the interpreter. */
3764 if (info->executable)
3765 {
3766 s = bfd_get_linker_section (dynobj, ".interp");
3767 BFD_ASSERT (s != NULL);
3768 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
3769 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
3770 }
3771 }
3772 else
3773 {
3774 /* Adjust all expected GOTPLT uses to use a GOT entry instead. */
3775 elf_cris_link_hash_traverse (htab, elf_cris_adjust_gotplt_to_got,
3776 info);
3777
3778 /* We may have created entries in the .rela.got section.
3779 However, if we are not creating the dynamic sections, we will
3780 not actually use these entries. Reset the size of .rela.got,
3781 which will cause it to get stripped from the output file
3782 below. */
3783 s = bfd_get_linker_section (dynobj, ".rela.got");
3784 if (s != NULL)
3785 s->size = 0;
3786 }
3787
3788 /* If this is a -Bsymbolic shared link, then we need to discard all PC
3789 relative relocs against symbols defined in a regular object. We
3790 allocated space for them in the check_relocs routine, but we will not
3791 fill them in in the relocate_section routine. We also discard space
3792 for relocs that have become for local symbols due to symbol
3793 visibility changes. For programs, we discard space for relocs for
3794 symbols not referenced by any dynamic object. */
3795 if (info->shared)
3796 elf_cris_link_hash_traverse (htab,
3797 elf_cris_discard_excess_dso_dynamics,
3798 info);
3799 else
3800 elf_cris_link_hash_traverse (htab,
3801 elf_cris_discard_excess_program_dynamics,
3802 info);
3803
3804 /* The check_relocs and adjust_dynamic_symbol entry points have
3805 determined the sizes of the various dynamic sections. Allocate
3806 memory for them. */
3807 plt = FALSE;
3808 relocs = FALSE;
3809 for (s = dynobj->sections; s != NULL; s = s->next)
3810 {
3811 const char *name;
3812
3813 if ((s->flags & SEC_LINKER_CREATED) == 0)
3814 continue;
3815
3816 /* It's OK to base decisions on the section name, because none
3817 of the dynobj section names depend upon the input files. */
3818 name = bfd_get_section_name (dynobj, s);
3819
3820 if (strcmp (name, ".plt") == 0)
3821 {
3822 /* Remember whether there is a PLT. */
3823 plt = s->size != 0;
3824 }
3825 else if (strcmp (name, ".got.plt") == 0)
3826 {
3827 /* The .got.plt contains the .got header as well as the
3828 actual .got.plt contents. The .got header may contain a
3829 R_CRIS_DTPMOD entry at index 3. */
3830 s->size += htab->dtpmod_refcount != 0
3831 ? 8 : 0;
3832 }
3833 else if (CONST_STRNEQ (name, ".rela"))
3834 {
3835 if (strcmp (name, ".rela.got") == 0
3836 && htab->dtpmod_refcount != 0
3837 && info->shared)
3838 s->size += sizeof (Elf32_External_Rela);
3839
3840 if (s->size != 0)
3841 {
3842 /* Remember whether there are any reloc sections other
3843 than .rela.plt. */
3844 if (strcmp (name, ".rela.plt") != 0)
3845 relocs = TRUE;
3846
3847 /* We use the reloc_count field as a counter if we need
3848 to copy relocs into the output file. */
3849 s->reloc_count = 0;
3850 }
3851 }
3852 else if (! CONST_STRNEQ (name, ".got")
3853 && strcmp (name, ".dynbss") != 0)
3854 {
3855 /* It's not one of our sections, so don't allocate space. */
3856 continue;
3857 }
3858
3859 if (s->size == 0)
3860 {
3861 /* If we don't need this section, strip it from the
3862 output file. This is mostly to handle .rela.bss and
3863 .rela.plt. We must create both sections in
3864 create_dynamic_sections, because they must be created
3865 before the linker maps input sections to output
3866 sections. The linker does that before
3867 adjust_dynamic_symbol is called, and it is that
3868 function which decides whether anything needs to go
3869 into these sections. */
3870 s->flags |= SEC_EXCLUDE;
3871 continue;
3872 }
3873
3874 if ((s->flags & SEC_HAS_CONTENTS) == 0)
3875 continue;
3876
3877 /* Allocate memory for the section contents. We use bfd_zalloc here
3878 in case unused entries are not reclaimed before the section's
3879 contents are written out. This should not happen, but this way
3880 if it does, we will not write out garbage. For reloc sections,
3881 this will make entries have the type R_CRIS_NONE. */
3882 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
3883 if (s->contents == NULL)
3884 return FALSE;
3885 }
3886
3887 if (elf_hash_table (info)->dynamic_sections_created)
3888 {
3889 /* Add some entries to the .dynamic section. We fill in the
3890 values later, in elf_cris_finish_dynamic_sections, but we
3891 must add the entries now so that we get the correct size for
3892 the .dynamic section. The DT_DEBUG entry is filled in by the
3893 dynamic linker and used by the debugger. */
3894 #define add_dynamic_entry(TAG, VAL) \
3895 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
3896
3897 if (!info->shared)
3898 {
3899 if (!add_dynamic_entry (DT_DEBUG, 0))
3900 return FALSE;
3901 }
3902
3903 if (plt)
3904 {
3905 if (!add_dynamic_entry (DT_PLTGOT, 0)
3906 || !add_dynamic_entry (DT_PLTRELSZ, 0)
3907 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
3908 || !add_dynamic_entry (DT_JMPREL, 0))
3909 return FALSE;
3910 }
3911
3912 if (relocs)
3913 {
3914 if (!add_dynamic_entry (DT_RELA, 0)
3915 || !add_dynamic_entry (DT_RELASZ, 0)
3916 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
3917 return FALSE;
3918 }
3919
3920 if ((info->flags & DF_TEXTREL) != 0)
3921 {
3922 if (!add_dynamic_entry (DT_TEXTREL, 0))
3923 return FALSE;
3924 info->flags |= DF_TEXTREL;
3925 }
3926 }
3927 #undef add_dynamic_entry
3928
3929 return TRUE;
3930 }
3931
3932 /* This function is called via elf_cris_link_hash_traverse if we are
3933 creating a shared object. In the -Bsymbolic case, it discards the
3934 space allocated to copy PC relative relocs against symbols which
3935 are defined in regular objects. For the normal non-symbolic case,
3936 we also discard space for relocs that have become local due to
3937 symbol visibility changes. We allocated space for them in the
3938 check_relocs routine, but we won't fill them in in the
3939 relocate_section routine. */
3940
3941 static bfd_boolean
3942 elf_cris_discard_excess_dso_dynamics (struct elf_cris_link_hash_entry *h,
3943 void * inf)
3944 {
3945 struct elf_cris_pcrel_relocs_copied *s;
3946 struct bfd_link_info *info = (struct bfd_link_info *) inf;
3947
3948 /* If a symbol has been forced local or we have found a regular
3949 definition for the symbolic link case, then we won't be needing
3950 any relocs. */
3951 if (h->root.def_regular
3952 && (h->root.forced_local
3953 || info->symbolic))
3954 {
3955 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
3956 {
3957 asection *sreloc
3958 = _bfd_elf_get_dynamic_reloc_section (elf_hash_table (info)
3959 ->dynobj,
3960 s->section,
3961 /*rela?*/ TRUE);
3962 sreloc->size -= s->count * sizeof (Elf32_External_Rela);
3963 }
3964 return TRUE;
3965 }
3966
3967 /* If we have accounted for PC-relative relocs for read-only
3968 sections, now is the time to warn for them. We can't do it in
3969 cris_elf_check_relocs, because we don't know the status of all
3970 symbols at that time (and it's common to force symbols local
3971 late). */
3972
3973 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
3974 if ((s->section->flags & SEC_READONLY) != 0)
3975 {
3976 /* FIXME: How do we make this optionally a warning only? */
3977 (*_bfd_error_handler)
3978 (_("%B, section `%A', to symbol `%s':\n"
3979 " relocation %s should not be used"
3980 " in a shared object; recompile with -fPIC"),
3981 s->section->owner,
3982 s->section,
3983 h->root.root.root.string,
3984 cris_elf_howto_table[s->r_type].name);
3985
3986 info->flags |= DF_TEXTREL;
3987 }
3988
3989 return TRUE;
3990 }
3991
3992 /* This function is called via elf_cris_link_hash_traverse if we are *not*
3993 creating a shared object. We discard space for relocs for symbols put
3994 in the .got, but which we found we do not have to resolve at run-time. */
3995
3996 static bfd_boolean
3997 elf_cris_discard_excess_program_dynamics (struct elf_cris_link_hash_entry *h,
3998 void * inf)
3999 {
4000 struct bfd_link_info *info = (struct bfd_link_info *) inf;
4001
4002 /* If we're not creating a shared library and have a symbol which is
4003 referred to by .got references, but the symbol is defined locally,
4004 (or rather, not defined by a DSO) then lose the reloc for the .got
4005 (don't allocate room for it). Likewise for relocs for something
4006 for which we create a PLT. */
4007 if (!h->root.def_dynamic
4008 || h->root.plt.refcount > 0)
4009 {
4010 if (h->reg_got_refcount > 0
4011 /* The size of this section is only valid and in sync with the
4012 various reference counts if we do dynamic; don't decrement it
4013 otherwise. */
4014 && elf_hash_table (info)->dynamic_sections_created)
4015 {
4016 bfd *dynobj = elf_hash_table (info)->dynobj;
4017 asection *srelgot;
4018
4019 BFD_ASSERT (dynobj != NULL);
4020
4021 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
4022
4023 BFD_ASSERT (srelgot != NULL);
4024
4025 srelgot->size -= sizeof (Elf32_External_Rela);
4026 }
4027
4028 /* If the locally-defined symbol isn't used by a DSO, then we don't
4029 have to export it as a dynamic symbol. This was already done for
4030 functions; doing this for all symbols would presumably not
4031 introduce new problems. Of course we don't do this if we're
4032 exporting all dynamic symbols. */
4033 if (! info->export_dynamic
4034 && h->root.dynindx != -1
4035 && !h->root.def_dynamic
4036 && !h->root.ref_dynamic)
4037 {
4038 h->root.dynindx = -1;
4039 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4040 h->root.dynstr_index);
4041 }
4042 }
4043
4044 return TRUE;
4045 }
4046
4047 /* Reject a file depending on presence and expectation of prefixed
4048 underscores on symbols. */
4049
4050 static bfd_boolean
4051 cris_elf_object_p (bfd *abfd)
4052 {
4053 if (! cris_elf_set_mach_from_flags (abfd, elf_elfheader (abfd)->e_flags))
4054 return FALSE;
4055
4056 if ((elf_elfheader (abfd)->e_flags & EF_CRIS_UNDERSCORE))
4057 return (bfd_get_symbol_leading_char (abfd) == '_');
4058 else
4059 return (bfd_get_symbol_leading_char (abfd) == 0);
4060 }
4061
4062 /* Mark presence or absence of leading underscore. Set machine type
4063 flags from mach type. */
4064
4065 static void
4066 cris_elf_final_write_processing (bfd *abfd,
4067 bfd_boolean linker ATTRIBUTE_UNUSED)
4068 {
4069 unsigned long e_flags = elf_elfheader (abfd)->e_flags;
4070
4071 e_flags &= ~EF_CRIS_UNDERSCORE;
4072 if (bfd_get_symbol_leading_char (abfd) == '_')
4073 e_flags |= EF_CRIS_UNDERSCORE;
4074
4075 switch (bfd_get_mach (abfd))
4076 {
4077 case bfd_mach_cris_v0_v10:
4078 e_flags |= EF_CRIS_VARIANT_ANY_V0_V10;
4079 break;
4080
4081 case bfd_mach_cris_v10_v32:
4082 e_flags |= EF_CRIS_VARIANT_COMMON_V10_V32;
4083 break;
4084
4085 case bfd_mach_cris_v32:
4086 e_flags |= EF_CRIS_VARIANT_V32;
4087 break;
4088
4089 default:
4090 _bfd_abort (__FILE__, __LINE__,
4091 _("Unexpected machine number"));
4092 }
4093
4094 elf_elfheader (abfd)->e_flags = e_flags;
4095 }
4096
4097 /* Set the mach type from e_flags value. */
4098
4099 static bfd_boolean
4100 cris_elf_set_mach_from_flags (bfd *abfd,
4101 unsigned long flags)
4102 {
4103 switch (flags & EF_CRIS_VARIANT_MASK)
4104 {
4105 case EF_CRIS_VARIANT_ANY_V0_V10:
4106 bfd_default_set_arch_mach (abfd, bfd_arch_cris, bfd_mach_cris_v0_v10);
4107 break;
4108
4109 case EF_CRIS_VARIANT_V32:
4110 bfd_default_set_arch_mach (abfd, bfd_arch_cris, bfd_mach_cris_v32);
4111 break;
4112
4113 case EF_CRIS_VARIANT_COMMON_V10_V32:
4114 bfd_default_set_arch_mach (abfd, bfd_arch_cris, bfd_mach_cris_v10_v32);
4115 break;
4116
4117 default:
4118 /* Since we don't recognize them, we obviously can't support them
4119 with this code; we'd have to require that all future handling
4120 would be optional. */
4121 bfd_set_error (bfd_error_wrong_format);
4122 return FALSE;
4123 }
4124
4125 return TRUE;
4126 }
4127
4128 /* Display the flags field. */
4129
4130 static bfd_boolean
4131 cris_elf_print_private_bfd_data (bfd *abfd, void * ptr)
4132 {
4133 FILE *file = (FILE *) ptr;
4134
4135 BFD_ASSERT (abfd != NULL && ptr != NULL);
4136
4137 _bfd_elf_print_private_bfd_data (abfd, ptr);
4138
4139 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
4140
4141 if (elf_elfheader (abfd)->e_flags & EF_CRIS_UNDERSCORE)
4142 fprintf (file, _(" [symbols have a _ prefix]"));
4143 if ((elf_elfheader (abfd)->e_flags & EF_CRIS_VARIANT_MASK)
4144 == EF_CRIS_VARIANT_COMMON_V10_V32)
4145 fprintf (file, _(" [v10 and v32]"));
4146 if ((elf_elfheader (abfd)->e_flags & EF_CRIS_VARIANT_MASK)
4147 == EF_CRIS_VARIANT_V32)
4148 fprintf (file, _(" [v32]"));
4149
4150 fputc ('\n', file);
4151 return TRUE;
4152 }
4153
4154 /* Don't mix files with and without a leading underscore. */
4155
4156 static bfd_boolean
4157 cris_elf_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
4158 {
4159 int imach, omach;
4160
4161 if (! _bfd_generic_verify_endian_match (ibfd, obfd))
4162 return FALSE;
4163
4164 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
4165 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
4166 return TRUE;
4167
4168 imach = bfd_get_mach (ibfd);
4169
4170 if (! elf_flags_init (obfd))
4171 {
4172 /* This happens when ld starts out with a 'blank' output file. */
4173 elf_flags_init (obfd) = TRUE;
4174
4175 /* We ignore the linker-set mach, and instead set it according to
4176 the first input file. This would also happen if we could
4177 somehow filter out the OUTPUT_ARCH () setting from elf.sc.
4178 This allows us to keep the same linker config across
4179 cris(v0..v10) and crisv32. The drawback is that we can't force
4180 the output type, which might be a sane thing to do for a
4181 v10+v32 compatibility object. */
4182 if (! bfd_set_arch_mach (obfd, bfd_arch_cris, imach))
4183 return FALSE;
4184 }
4185
4186 if (bfd_get_symbol_leading_char (ibfd)
4187 != bfd_get_symbol_leading_char (obfd))
4188 {
4189 (*_bfd_error_handler)
4190 (bfd_get_symbol_leading_char (ibfd) == '_'
4191 ? _("%B: uses _-prefixed symbols, but writing file with non-prefixed symbols")
4192 : _("%B: uses non-prefixed symbols, but writing file with _-prefixed symbols"),
4193 ibfd);
4194 bfd_set_error (bfd_error_bad_value);
4195 return FALSE;
4196 }
4197
4198 omach = bfd_get_mach (obfd);
4199
4200 if (imach != omach)
4201 {
4202 /* We can get an incompatible combination only if either is
4203 bfd_mach_cris_v32, and the other one isn't compatible. */
4204 if ((imach == bfd_mach_cris_v32
4205 && omach != bfd_mach_cris_v10_v32)
4206 || (omach == bfd_mach_cris_v32
4207 && imach != bfd_mach_cris_v10_v32))
4208 {
4209 (*_bfd_error_handler)
4210 ((imach == bfd_mach_cris_v32)
4211 ? _("%B contains CRIS v32 code, incompatible"
4212 " with previous objects")
4213 : _("%B contains non-CRIS-v32 code, incompatible"
4214 " with previous objects"),
4215 ibfd);
4216 bfd_set_error (bfd_error_bad_value);
4217 return FALSE;
4218 }
4219
4220 /* We don't have to check the case where the input is compatible
4221 with v10 and v32, because the output is already known to be set
4222 to the other (compatible) mach. */
4223 if (omach == bfd_mach_cris_v10_v32
4224 && ! bfd_set_arch_mach (obfd, bfd_arch_cris, imach))
4225 return FALSE;
4226 }
4227
4228 return TRUE;
4229 }
4230
4231 /* Do side-effects of e_flags copying to obfd. */
4232
4233 static bfd_boolean
4234 cris_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
4235 {
4236 /* Call the base function. */
4237 if (!_bfd_elf_copy_private_bfd_data (ibfd, obfd))
4238 return FALSE;
4239
4240 /* If output is big-endian for some obscure reason, stop here. */
4241 if (_bfd_generic_verify_endian_match (ibfd, obfd) == FALSE)
4242 return FALSE;
4243
4244 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
4245 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
4246 return TRUE;
4247
4248 /* Do what we really came here for. */
4249 return bfd_set_arch_mach (obfd, bfd_arch_cris, bfd_get_mach (ibfd));
4250 }
4251
4252 static enum elf_reloc_type_class
4253 elf_cris_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
4254 const asection *rel_sec ATTRIBUTE_UNUSED,
4255 const Elf_Internal_Rela *rela)
4256 {
4257 enum elf_cris_reloc_type r_type = ELF32_R_TYPE (rela->r_info);
4258 switch (r_type)
4259 {
4260 case R_CRIS_RELATIVE:
4261 return reloc_class_relative;
4262 case R_CRIS_JUMP_SLOT:
4263 return reloc_class_plt;
4264 case R_CRIS_COPY:
4265 return reloc_class_copy;
4266 default:
4267 return reloc_class_normal;
4268 }
4269 }
4270
4271 /* The elf_backend_got_elt_size worker. For one symbol, we can have up to
4272 two GOT entries from three types with two different sizes. We handle
4273 it as a single entry, so we can use the regular offset-calculation
4274 machinery. */
4275
4276 static bfd_vma
4277 elf_cris_got_elt_size (bfd *abfd ATTRIBUTE_UNUSED,
4278 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4279 struct elf_link_hash_entry *hr,
4280 bfd *ibfd,
4281 unsigned long symndx)
4282 {
4283 struct elf_link_hash_entry *h = (struct elf_link_hash_entry *) hr;
4284 bfd_vma eltsiz = 0;
4285
4286 /* We may have one regular GOT entry or up to two TLS GOT
4287 entries. */
4288 if (h == NULL)
4289 {
4290 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
4291 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (ibfd);
4292
4293 BFD_ASSERT (local_got_refcounts != NULL);
4294
4295 if (local_got_refcounts[LGOT_REG_NDX (symndx)] > 0)
4296 {
4297 /* We can't have a variable referred to both as a regular
4298 variable and through TLS relocs. */
4299 BFD_ASSERT (local_got_refcounts[LGOT_DTP_NDX (symndx)] == 0
4300 && local_got_refcounts[LGOT_TPREL_NDX (symndx)] == 0);
4301 return 4;
4302 }
4303
4304 if (local_got_refcounts[LGOT_DTP_NDX (symndx)] > 0)
4305 eltsiz += 8;
4306
4307 if (local_got_refcounts[LGOT_TPREL_NDX (symndx)] > 0)
4308 eltsiz += 4;
4309 }
4310 else
4311 {
4312 struct elf_cris_link_hash_entry *hh = elf_cris_hash_entry (h);
4313 if (hh->reg_got_refcount > 0)
4314 {
4315 /* The actual error-on-input is emitted elsewhere. */
4316 BFD_ASSERT (hh->dtp_refcount == 0 && hh->tprel_refcount == 0);
4317 return 4;
4318 }
4319
4320 if (hh->dtp_refcount > 0)
4321 eltsiz += 8;
4322
4323 if (hh->tprel_refcount > 0)
4324 eltsiz += 4;
4325 }
4326
4327 /* We're only called when h->got.refcount is non-zero, so we must
4328 have a non-zero size. */
4329 BFD_ASSERT (eltsiz != 0);
4330 return eltsiz;
4331 }
4332 \f
4333 #define ELF_ARCH bfd_arch_cris
4334 #define ELF_TARGET_ID CRIS_ELF_DATA
4335 #define ELF_MACHINE_CODE EM_CRIS
4336 #define ELF_MAXPAGESIZE 0x2000
4337
4338 #define TARGET_LITTLE_SYM bfd_elf32_cris_vec
4339 #define TARGET_LITTLE_NAME "elf32-cris"
4340 #define elf_symbol_leading_char 0
4341
4342 #define elf_info_to_howto_rel NULL
4343 #define elf_info_to_howto cris_info_to_howto_rela
4344 #define elf_backend_relocate_section cris_elf_relocate_section
4345 #define elf_backend_gc_mark_hook cris_elf_gc_mark_hook
4346 #define elf_backend_gc_sweep_hook cris_elf_gc_sweep_hook
4347 #define elf_backend_plt_sym_val cris_elf_plt_sym_val
4348 #define elf_backend_check_relocs cris_elf_check_relocs
4349 #define elf_backend_grok_prstatus cris_elf_grok_prstatus
4350 #define elf_backend_grok_psinfo cris_elf_grok_psinfo
4351
4352 #define elf_backend_can_gc_sections 1
4353 #define elf_backend_can_refcount 1
4354
4355 #define elf_backend_object_p cris_elf_object_p
4356 #define elf_backend_final_write_processing \
4357 cris_elf_final_write_processing
4358 #define bfd_elf32_bfd_print_private_bfd_data \
4359 cris_elf_print_private_bfd_data
4360 #define bfd_elf32_bfd_merge_private_bfd_data \
4361 cris_elf_merge_private_bfd_data
4362 #define bfd_elf32_bfd_copy_private_bfd_data \
4363 cris_elf_copy_private_bfd_data
4364
4365 #define bfd_elf32_bfd_reloc_type_lookup cris_reloc_type_lookup
4366 #define bfd_elf32_bfd_reloc_name_lookup cris_reloc_name_lookup
4367
4368 #define bfd_elf32_bfd_link_hash_table_create \
4369 elf_cris_link_hash_table_create
4370 #define elf_backend_adjust_dynamic_symbol \
4371 elf_cris_adjust_dynamic_symbol
4372 #define elf_backend_copy_indirect_symbol \
4373 elf_cris_copy_indirect_symbol
4374 #define elf_backend_size_dynamic_sections \
4375 elf_cris_size_dynamic_sections
4376 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
4377 #define elf_backend_finish_dynamic_symbol \
4378 elf_cris_finish_dynamic_symbol
4379 #define elf_backend_finish_dynamic_sections \
4380 elf_cris_finish_dynamic_sections
4381 #define elf_backend_create_dynamic_sections \
4382 _bfd_elf_create_dynamic_sections
4383 #define bfd_elf32_bfd_final_link \
4384 bfd_elf_gc_common_final_link
4385 #define elf_backend_hide_symbol elf_cris_hide_symbol
4386 #define elf_backend_reloc_type_class elf_cris_reloc_type_class
4387
4388 #define elf_backend_want_got_plt 1
4389 #define elf_backend_plt_readonly 1
4390 #define elf_backend_want_plt_sym 0
4391 #define elf_backend_got_header_size 12
4392 #define elf_backend_got_elt_size elf_cris_got_elt_size
4393
4394 /* Later, we my want to optimize RELA entries into REL entries for dynamic
4395 linking and libraries (if it's a win of any significance). Until then,
4396 take the easy route. */
4397 #define elf_backend_may_use_rel_p 0
4398 #define elf_backend_may_use_rela_p 1
4399 #define elf_backend_rela_normal 1
4400
4401 #include "elf32-target.h"
4402
4403 #undef TARGET_LITTLE_SYM
4404 #undef TARGET_LITTLE_NAME
4405 #undef elf_symbol_leading_char
4406
4407 #define TARGET_LITTLE_SYM bfd_elf32_us_cris_vec
4408 #define TARGET_LITTLE_NAME "elf32-us-cris"
4409 #define elf_symbol_leading_char '_'
4410 #undef elf32_bed
4411 #define elf32_bed elf32_us_cris_bed
4412
4413 #include "elf32-target.h"