]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blob - bfd/elf32-csky.c
3f4277b71db53ba7c4122e4dd6b0073beb1575c0
[thirdparty/binutils-gdb.git] / bfd / elf32-csky.c
1 /* 32-bit ELF support for C-SKY.
2 Copyright (C) 1998-2023 Free Software Foundation, Inc.
3 Contributed by C-SKY Microsystems and Mentor Graphics.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "bfdlink.h"
25 #include "libbfd.h"
26 #include "elf-bfd.h"
27 #include "elf/csky.h"
28 #include "opcode/csky.h"
29 #include <assert.h>
30 #include "libiberty.h"
31 #include "elf32-csky.h"
32
33 /* Data structures used for merging different arch variants.
34 V1 (510/610) and V2 (8xx) processors are incompatible, but
35 we can merge wthin each family. */
36
37 enum merge_class
38 {
39 CSKY_V1,
40 CSKY_V2
41 };
42
43 typedef const struct csky_arch_for_merge
44 {
45 const char *name;
46 const unsigned long arch_eflag;
47 /* The files can merge only if they are in same class. */
48 enum merge_class class;
49 /* When input files have different levels,
50 the target sets arch_eflag to the largest level file's arch_eflag. */
51 unsigned int class_level;
52 /* Control whether to print warning when merging with different arch. */
53 unsigned int do_warning;
54 } csky_arch_for_merge;
55
56 static csky_arch_for_merge csky_archs[] =
57 {
58 /* 510 and 610 merge to 610 without warning. */
59 { "ck510", CSKY_ARCH_510, CSKY_V1, 0, 0},
60 { "ck610", CSKY_ARCH_610, CSKY_V1, 1, 0},
61 /* 801, 802, 803, 807, 810 merge to largest one. */
62 { "ck801", CSKY_ARCH_801, CSKY_V2, 0, 1},
63 { "ck802", CSKY_ARCH_802, CSKY_V2, 1, 1},
64 { "ck803", CSKY_ARCH_803, CSKY_V2, 2, 1},
65 { "ck807", CSKY_ARCH_807, CSKY_V2, 3, 1},
66 { "ck810", CSKY_ARCH_810, CSKY_V2, 4, 1},
67 { "ck860", CSKY_ARCH_860, CSKY_V2, 5, 1},
68 { NULL, 0, 0, 0, 0}
69 };
70
71 /* Return the ARCH bits out of ABFD. */
72 #define bfd_csky_arch(abfd) \
73 (elf_elfheader (abfd)->e_flags & CSKY_ARCH_MASK)
74
75 /* Return the ABI bits out of ABFD. */
76 #define bfd_csky_abi(abfd) \
77 (elf_elfheader (abfd)->e_flags & CSKY_ABI_MASK)
78
79
80 /* The index of a howto-item is implicitly equal to
81 the corresponding Relocation Type Encoding. */
82 static reloc_howto_type csky_elf_howto_table[] =
83 {
84 /* 0 */
85 HOWTO (R_CKCORE_NONE, /* type */
86 0, /* rightshift */
87 0, /* size */
88 0, /* bitsize */
89 false, /* pc_relative */
90 0, /* bitpos */
91 complain_overflow_dont, /* complain_on_overflow */
92 NULL, /* special_function */
93 "R_CKCORE_NONE", /* name */
94 false, /* partial_inplace */
95 0, /* src_mask */
96 0, /* dst_mask */
97 false), /* pcrel_offset */
98
99 /* 1. */
100 HOWTO (R_CKCORE_ADDR32, /* type */
101 0, /* rightshift */
102 4, /* size */
103 32, /* bitsize */
104 false, /* pc_relative */
105 0, /* bitpos */
106 complain_overflow_dont, /* complain_on_overflow */
107 bfd_elf_generic_reloc, /* special_function */
108 "R_CKCORE_ADDR32", /* name */
109 false, /* partial_inplace */
110 0, /* src_mask */
111 0xffffffff, /* dst_mask */
112 false), /* pcrel_offset */
113
114 /* 2: Only for csky v1. */
115 HOWTO (R_CKCORE_PCREL_IMM8BY4, /* type */
116 2, /* rightshift */
117 2, /* size */
118 8, /* bitsize */
119 true, /* pc_relative */
120 0, /* bitpos */
121 complain_overflow_bitfield, /* complain_on_overflow */
122 NULL, /* special_function */
123 "R_CKCORE_PCREL_IMM8BY4", /* name */
124 false, /* partial_inplace */
125 0xff, /* src_mask */
126 0xff, /* dst_mask */
127 true), /* pcrel_offset */
128
129 /* 3: Only for csky v1. */
130 HOWTO (R_CKCORE_PCREL_IMM11BY2, /* type */
131 1, /* rightshift */
132 2, /* size */
133 11, /* bitsize */
134 true, /* pc_relative */
135 0, /* bitpos */
136 complain_overflow_signed, /* complain_on_overflow */
137 bfd_elf_generic_reloc, /* special_function */
138 "R_CKCORE_PCREL_IMM11BY2", /* name */
139 false, /* partial_inplace */
140 0x7ff, /* src_mask */
141 0x7ff, /* dst_mask */
142 true), /* pcrel_offset */
143
144 /* 4: DELETED. */
145 HOWTO (R_CKCORE_PCREL_IMM4BY2,0,0,0,0,0,0,0,"R_CKCORE_PCREL_IMM4BY2",0,0,0,0),
146
147 /* 5. */
148 HOWTO (R_CKCORE_PCREL32, /* type */
149 0, /* rightshift */
150 4, /* size */
151 32, /* bitsize */
152 true, /* pc_relative */
153 0, /* bitpos */
154 complain_overflow_dont, /* complain_on_overflow */
155 bfd_elf_generic_reloc, /* special_function */
156 "R_CKCORE_PCREL32", /* name */
157 false, /* partial_inplace */
158 0x0, /* src_mask */
159 0xffffffff, /* dst_mask */
160 true), /* pcrel_offset */
161
162 /* 6: Only for csky v1. */
163 HOWTO (R_CKCORE_PCREL_JSR_IMM11BY2, /* type */
164 1, /* rightshift */
165 2, /* size */
166 11, /* bitsize */
167 true, /* pc_relative */
168 0, /* bitpos */
169 complain_overflow_signed, /* complain_on_overflow */
170 bfd_elf_generic_reloc, /* special_function */
171 "R_CKCORE_PCREL_JSR_IMM11BY2", /* name */
172 false, /* partial_inplace */
173 0x7ff, /* src_mask */
174 0x7ff, /* dst_mask */
175 true), /* pcrel_offset */
176
177 /* 7: GNU extension to record C++ vtable member usage. */
178 HOWTO (R_CKCORE_GNU_VTENTRY, /* type */
179 0, /* rightshift */
180 4, /* size */
181 0, /* bitsize */
182 false, /* pc_relative */
183 0, /* bitpos */
184 complain_overflow_dont, /* complain_on_overflow */
185 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
186 "R_CKCORE_GNU_VTENTRY", /* name */
187 false, /* partial_inplace */
188 0x0, /* src_mask */
189 0x0, /* dst_mask */
190 false), /* pcrel_offset */
191
192 /* 8: GNU extension to record C++ vtable hierarchy. */
193 HOWTO (R_CKCORE_GNU_VTINHERIT, /* type */
194 0, /* rightshift */
195 4, /* size */
196 0, /* bitsize */
197 false, /* pc_relative */
198 0, /* bitpos */
199 complain_overflow_dont, /* complain_on_overflow */
200 NULL, /* special_function */
201 "R_CKCORE_GNU_VTINHERIT", /* name */
202 false, /* partial_inplace */
203 0x0, /* src_mask */
204 0x0, /* dst_mask */
205 false), /* pcrel_offset */
206
207 /* 9. */
208 HOWTO (R_CKCORE_RELATIVE, /* type */
209 0, /* rightshift */
210 4, /* size */
211 32, /* bitsize */
212 false, /* pc_relative */
213 0, /* bitpos */
214 complain_overflow_signed, /* complain_on_overflow */
215 bfd_elf_generic_reloc, /* special_function */
216 "R_CKCORE_RELATIVE", /* name */
217 true, /* partial_inplace */
218 0x0, /* src_mask */
219 0xffffffff, /* dst_mask */
220 false), /* pcrel_offset */
221
222 /* 10: None. */
223 /* FIXME: It is a bug that copy relocations are not implemented. */
224 HOWTO (R_CKCORE_COPY, /* type */
225 0, /* rightshift */
226 4, /* size */
227 32, /* bitsize */
228 false, /* pc_relative */
229 0, /* bitpos */
230 complain_overflow_bitfield, /* complain_on_overflow */
231 bfd_elf_generic_reloc, /* special_function */
232 "R_CKCORE_COPY", /* name */
233 true, /* partial_inplace */
234 0xffffffff, /* src_mask */
235 0xffffffff, /* dst_mask */
236 false), /* pcrel_offset */
237
238 /* 11: None. */
239 HOWTO (R_CKCORE_GLOB_DAT,0,0,0,0,0,0,0,"R_CKCORE_GLOB_DAT",0,0,0,0),
240
241 /* 12: None. */
242 HOWTO (R_CKCORE_JUMP_SLOT,0,0,0,0,0,0,0,"R_CKCORE_JUMP_SLOT",0,0,0,0),
243
244 /* 13. */
245 HOWTO (R_CKCORE_GOTOFF, /* type */
246 0, /* rightshift */
247 4, /* size */
248 32, /* bitsize */
249 false, /* pc_relative */
250 0, /* bitpos */
251 complain_overflow_dont, /* complain_on_overflow */
252 bfd_elf_generic_reloc, /* special_function */
253 "R_CKCORE_GOTOFF", /* name */
254 true, /* partial_inplace */
255 0x0, /* src_mask */
256 0xffffffffl, /* dst_mask */
257 false), /* pcrel_offset */
258
259 /* 14. */
260 HOWTO (R_CKCORE_GOTPC, /* type */
261 0, /* rightshift */
262 4, /* size */
263 32, /* bitsize */
264 true, /* pc_relative */
265 0, /* bitpos */
266 complain_overflow_dont, /* complain_on_overflow */
267 bfd_elf_generic_reloc, /* special_function */
268 "R_CKCORE_GOTPC", /* name */
269 true, /* partial_inplace */
270 0x0, /* src_mask */
271 0xffffffff, /* dst_mask */
272 false), /* pcrel_offset */
273
274 /* 15. */
275 HOWTO (R_CKCORE_GOT32, /* type */
276 0, /* rightshift */
277 4, /* size */
278 32, /* bitsize */
279 false, /* pc_relative */
280 0, /* bitpos */
281 complain_overflow_dont, /* complain_on_overflow */
282 bfd_elf_generic_reloc, /* special_function */
283 "R_CKCORE_GOT32", /* name */
284 true, /* partial_inplace */
285 0x0, /* src_mask */
286 0xffffffff, /* dst_mask */
287 true), /* pcrel_offset */
288
289 /* 16. */
290 HOWTO (R_CKCORE_PLT32, /* type */
291 0, /* rightshift */
292 4, /* size */
293 32, /* bitsize */
294 false, /* pc_relative */
295 0, /* bitpos */
296 complain_overflow_dont, /* complain_on_overflow */
297 bfd_elf_generic_reloc, /* special_function */
298 "R_CKCORE_PLT32", /* name */
299 true, /* partial_inplace */
300 0x0, /* src_mask */
301 0xffffffff, /* dst_mask */
302 true), /* pcrel_offset */
303
304 /* 17: None. */
305 HOWTO (R_CKCORE_ADDRGOT,0,0,0,0,0,0,0,"R_CKCORE_ADDRGOT",0,0,0,0),
306
307 /* 18: None. */
308 HOWTO (R_CKCORE_ADDRPLT,0,0,0,0,0,0,0,"R_CKCORE_ADDRPLT",0,0,0,0),
309
310 /* 19: Only for csky v2. */
311 HOWTO (R_CKCORE_PCREL_IMM26BY2, /* type */
312 1, /* rightshift */
313 4, /* size */
314 26, /* bitsize */
315 true, /* pc_relative */
316 0, /* bitpos */
317 complain_overflow_signed, /* complain_on_overflow */
318 bfd_elf_generic_reloc, /* special_function */
319 "R_CKCORE_PCREL_IMM26BY2", /* name */
320 false, /* partial_inplace */
321 0x0, /* src_mask */
322 0x3ffffff, /* dst_mask */
323 true), /* pcrel_offset */
324
325 /* 20: Only for csky v2. */
326 HOWTO (R_CKCORE_PCREL_IMM16BY2, /* type */
327 1, /* rightshift */
328 4, /* size */
329 16, /* bitsize */
330 true, /* pc_relative */
331 0, /* bitpos */
332 complain_overflow_signed, /* complain_on_overflow */
333 bfd_elf_generic_reloc, /* special_function */
334 "R_CKCORE_PCREL_IMM16BY2", /* name */
335 false, /* partial_inplace */
336 0x0, /* src_mask */
337 0xffff, /* dst_mask */
338 true), /* pcrel_offset */
339
340 /* 21: Only for csky v2. */
341 HOWTO (R_CKCORE_PCREL_IMM16BY4, /* type */
342 2, /* rightshift */
343 4, /* size */
344 16, /* bitsize */
345 true, /* pc_relative */
346 0, /* bitpos */
347 complain_overflow_bitfield, /* complain_on_overflow */
348 bfd_elf_generic_reloc, /* special_function */
349 "R_CKCORE_PCREL_IMM16BY4", /* name */
350 false, /* partial_inplace */
351 0xffff0000, /* src_mask */
352 0xffff, /* dst_mask */
353 true), /* pcrel_offset */
354
355 /* 22: Only for csky v2. */
356 HOWTO (R_CKCORE_PCREL_IMM10BY2, /* type */
357 1, /* rightshift */
358 2, /* size */
359 10, /* bitsize */
360 true, /* pc_relative */
361 0, /* bitpos */
362 complain_overflow_signed, /* complain_on_overflow */
363 bfd_elf_generic_reloc, /* special_function */
364 "R_CKCORE_PCREL_IMM10BY2", /* name */
365 false, /* partial_inplace */
366 0x0, /* src_mask */
367 0x3ff, /* dst_mask */
368 true), /* pcrel_offset */
369
370 /* 23: Only for csky v2. */
371 HOWTO (R_CKCORE_PCREL_IMM10BY4, /* type */
372 2, /* rightshift */
373 4, /* size */
374 10, /* bitsize */
375 true, /* pc_relative */
376 0, /* bitpos */
377 complain_overflow_bitfield, /* complain_on_overflow */
378 bfd_elf_generic_reloc, /* special_function */
379 "R_CKCORE_PCREL_IMM10BY4", /* name */
380 false, /* partial_inplace */
381 0x0, /* src_mask */
382 0x3ff, /* dst_mask */
383 true), /* pcrel_offset */
384
385 /* 24: Only for csky v2. */
386 HOWTO (R_CKCORE_ADDR_HI16, /* type */
387 16, /* rightshift */
388 4, /* size */
389 16, /* bitsize */
390 false, /* pc_relative */
391 0, /* bitpos */
392 complain_overflow_dont, /* complain_on_overflow */
393 bfd_elf_generic_reloc, /* special_function */
394 "R_CKCORE_ADDR_HI16", /* name */
395 false, /* partial_inplace */
396 0x0, /* src_mask */
397 0xffff, /* dst_mask */
398 false), /* pcrel_offset */
399
400 /* 25. */
401 HOWTO (R_CKCORE_ADDR_LO16, /* type */
402 0, /* rightshift */
403 4, /* size */
404 16, /* bitsize */
405 false, /* pc_relative */
406 0, /* bitpos */
407 complain_overflow_dont, /* complain_on_overflow */
408 bfd_elf_generic_reloc, /* special_function */
409 "R_CKCORE_ADDR_LO16", /* name */
410 false, /* partial_inplace */
411 0x0, /* src_mask */
412 0xffff, /* dst_mask */
413 false), /* pcrel_offset */
414
415 /* 26. */
416 HOWTO (R_CKCORE_GOTPC_HI16, /* type */
417 16, /* rightshift */
418 4, /* size */
419 16, /* bitsize */
420 true, /* pc_relative */
421 0, /* bitpos */
422 complain_overflow_dont, /* complain_on_overflow */
423 bfd_elf_generic_reloc, /* special_function */
424 "R_CKCORE_GOTPC_HI16", /* name */
425 false, /* partial_inplace */
426 0x0, /* src_mask */
427 0xffff, /* dst_mask */
428 false), /* pcrel_offset */
429
430 /* 27. */
431 HOWTO (R_CKCORE_GOTPC_LO16, /* type */
432 0, /* rightshift */
433 4, /* size */
434 16, /* bitsize */
435 true, /* pc_relative */
436 0, /* bitpos */
437 complain_overflow_dont, /* complain_on_overflow */
438 bfd_elf_generic_reloc, /* special_function */
439 "R_CKCORE_GOTPC_LO16", /* name */
440 false, /* partial_inplace */
441 0x0, /* src_mask */
442 0xffff, /* dst_mask */
443 false), /* pcrel_offset */
444
445 /* 28. */
446 HOWTO (R_CKCORE_GOTOFF_HI16, /* type */
447 16, /* rightshift */
448 4, /* size */
449 16, /* bitsize */
450 false, /* pc_relative */
451 0, /* bitpos */
452 complain_overflow_dont, /* complain_on_overflow */
453 bfd_elf_generic_reloc, /* special_function */
454 "R_CKCORE_GOTOFF_HI16", /* name */
455 false, /* partial_inplace */
456 0x0, /* src_mask */
457 0xffff, /* dst_mask */
458 false), /* pcrel_offset */
459
460 /* 29. */
461 HOWTO (R_CKCORE_GOTOFF_LO16, /* type */
462 0, /* rightshift */
463 4, /* size */
464 16, /* bitsize */
465 false, /* pc_relative */
466 0, /* bitpos */
467 complain_overflow_dont, /* complain_on_overflow */
468 bfd_elf_generic_reloc, /* special_function */
469 "R_CKCORE_GOTOFF_LO16", /* name */
470 false, /* partial_inplace */
471 0x0, /* src_mask */
472 0xffff, /* dst_mask */
473 false), /* pcrel_offset */
474
475 /* 30. */
476 HOWTO (R_CKCORE_GOT12, /* type */
477 2, /* rightshift */
478 4, /* size */
479 12, /* bitsize */
480 false, /* pc_relative */
481 0, /* bitpos */
482 complain_overflow_bitfield, /* complain_on_overflow */
483 bfd_elf_generic_reloc, /* special_function */
484 "R_CKCORE_GOT12", /* name */
485 true, /* partial_inplace */
486 0x0, /* src_mask */
487 0xfff, /* dst_mask */
488 false), /* pcrel_offset */
489
490 /* 31. */
491 HOWTO (R_CKCORE_GOT_HI16, /* type */
492 16, /* rightshift */
493 4, /* size */
494 16, /* bitsize */
495 false, /* pc_relative */
496 0, /* bitpos */
497 complain_overflow_dont, /* complain_on_overflow */
498 bfd_elf_generic_reloc, /* special_function */
499 "R_CKCORE_GOT_HI16", /* name */
500 true, /* partial_inplace */
501 0x0, /* src_mask */
502 0xffff, /* dst_mask */
503 false), /* pcrel_offset */
504
505 /* 32. */
506 HOWTO (R_CKCORE_GOT_LO16, /* type */
507 0, /* rightshift */
508 4, /* size */
509 16, /* bitsize */
510 false, /* pc_relative */
511 0, /* bitpos */
512 complain_overflow_dont, /* complain_on_overflow */
513 bfd_elf_generic_reloc, /* special_function */
514 "R_CKCORE_GOT_LO16", /* name */
515 true, /* partial_inplace */
516 0x0, /* src_mask */
517 0xffff, /* dst_mask */
518 false), /* pcrel_offset */
519
520 /* 33. */
521 HOWTO (R_CKCORE_PLT12, /* type */
522 2, /* rightshift */
523 4, /* size */
524 12, /* bitsize */
525 false, /* pc_relative */
526 0, /* bitpos */
527 complain_overflow_bitfield, /* complain_on_overflow */
528 bfd_elf_generic_reloc, /* special_function */
529 "R_CKCORE_PLT12", /* name */
530 true, /* partial_inplace */
531 0x0, /* src_mask */
532 0xfff, /* dst_mask */
533 false), /* pcrel_offset */
534
535 /* 34. */
536 HOWTO (R_CKCORE_PLT_HI16, /* type */
537 16, /* rightshift */
538 4, /* size */
539 16, /* bitsize */
540 false, /* pc_relative */
541 0, /* bitpos */
542 complain_overflow_dont, /* complain_on_overflow */
543 bfd_elf_generic_reloc, /* special_function */
544 "R_CKCORE_PLT_HI16", /* name */
545 true, /* partial_inplace */
546 0x0, /* src_mask */
547 0xffff, /* dst_mask */
548 false), /* pcrel_offset */
549
550 /* 35. */
551 HOWTO (R_CKCORE_PLT_LO16, /* type */
552 0, /* rightshift */
553 4, /* size */
554 16, /* bitsize */
555 false, /* pc_relative */
556 0, /* bitpos */
557 complain_overflow_dont, /* complain_on_overflow */
558 bfd_elf_generic_reloc, /* special_function */
559 "R_CKCORE_PLT_LO16", /* name */
560 true, /* partial_inplace */
561 0x0, /* src_mask */
562 0xffff, /* dst_mask */
563 false), /* pcrel_offset */
564
565 /* 36: None. */
566 HOWTO (R_CKCORE_ADDRGOT_HI16,0,0,0,0,0,0,0,"R_CKCORE_",0,0,0,0),
567
568 /* 37: None. */
569 HOWTO (R_CKCORE_ADDRGOT_LO16,0,0,0,0,0,0,0,"R_CKCORE_",0,0,0,0),
570
571 /* 38: None. */
572 HOWTO (R_CKCORE_ADDRPLT_HI16,0,0,0,0,0,0,0,"R_CKCORE_",0,0,0,0),
573
574 /* 39: None. */
575 HOWTO (R_CKCORE_ADDRPLT_LO16,0,0,0,0,0,0,0,"R_CKCORE_",0,0,0,0),
576
577 /* 40. */
578 HOWTO (R_CKCORE_PCREL_JSR_IMM26BY2, /* type */
579 1, /* rightshift */
580 4, /* size */
581 26, /* bitsize */
582 true, /* pc_relative */
583 0, /* bitpos */
584 complain_overflow_signed, /* complain_on_overflow */
585 bfd_elf_generic_reloc, /* special_function */
586 "R_CKCORE_PCREL_JSR_IMM26BY2", /* name */
587 false, /* partial_inplace */
588 0x0, /* src_mask */
589 0x3ffffff, /* dst_mask */
590 true), /* pcrel_offset */
591
592 /* 41. */
593 HOWTO (R_CKCORE_TOFFSET_LO16, /* type */
594 0, /* rightshift */
595 4, /* size */
596 16, /* bitsize */
597 false, /* pc_relative */
598 0, /* bitpos */
599 complain_overflow_unsigned, /* complain_on_overflow */
600 NULL, /* special_function */
601 "R_CKCORE_TOFFSET_LO16", /* name */
602 false, /* partial_inplace */
603 0x0, /* src_mask */
604 0xffff, /* dst_mask */
605 false), /* pcrel_offset */
606
607 /* 42. */
608 HOWTO (R_CKCORE_DOFFSET_LO16, /* type */
609 0, /* rightshift */
610 4, /* size */
611 16, /* bitsize */
612 false, /* pc_relative */
613 0, /* bitpos */
614 complain_overflow_unsigned, /* complain_on_overflow */
615 NULL, /* special_function */
616 "R_CKCORE_DOFFSET_LO16", /* name */
617 false, /* partial_inplace */
618 0x0, /* src_mask */
619 0xffff, /* dst_mask */
620 false), /* pcrel_offset */
621
622 /* 43. */
623 HOWTO (R_CKCORE_PCREL_IMM18BY2, /* type */
624 1, /* rightshift */
625 4, /* size */
626 18, /* bitsize */
627 true, /* pc_relative */
628 0, /* bitpos */
629 complain_overflow_signed, /* complain_on_overflow */
630 bfd_elf_generic_reloc, /* special_function */
631 "R_CKCORE_PCREL_IMM18BY2", /* name */
632 false, /* partial_inplace */
633 0x0, /* src_mask */
634 0x3ffff, /* dst_mask */
635 true), /* pcrel_offset */
636
637 /* 44. */
638 HOWTO (R_CKCORE_DOFFSET_IMM18, /* type */
639 0, /* rightshift */
640 4, /* size */
641 18, /* bitsize */
642 false, /* pc_relative */
643 0, /* bitpos */
644 complain_overflow_unsigned, /* complain_on_overflow */
645 NULL, /* special_function */
646 "R_CKCORE_DOFFSET_IMM18", /* name */
647 false, /* partial_inplace */
648 0x0, /* src_mask */
649 0x3ffff, /* dst_mask */
650 false), /* pcrel_offset */
651
652 /* 45. */
653 HOWTO (R_CKCORE_DOFFSET_IMM18BY2, /* type */
654 1, /* rightshift */
655 4, /* size */
656 18, /* bitsize */
657 false, /* pc_relative */
658 0, /* bitpos */
659 complain_overflow_unsigned, /* complain_on_overflow */
660 NULL, /* special_function */
661 "R_CKCORE_DOFFSET_IMM18BY2", /* name */
662 false, /* partial_inplace */
663 0x0, /* src_mask */
664 0x3ffff, /* dst_mask */
665 false), /* pcrel_offset */
666
667 /* 46. */
668 HOWTO (R_CKCORE_DOFFSET_IMM18BY4, /* type */
669 2, /* rightshift */
670 4, /* size */
671 18, /* bitsize */
672 false, /* pc_relative */
673 0, /* bitpos */
674 complain_overflow_unsigned, /* complain_on_overflow */
675 NULL, /* special_function */
676 "R_CKCORE_DOFFSET_IMM18BY4", /* name */
677 false, /* partial_inplace */
678 0x0, /* src_mask */
679 0x3ffff, /* dst_mask */
680 false), /* pcrel_offset */
681
682 /* 47. */
683 HOWTO (R_CKCORE_GOTOFF_IMM18, /* type */
684 0, /* rightshift */
685 4, /* size */
686 18, /* bitsize */
687 false, /* pc_relative */
688 0, /* bitpos */
689 complain_overflow_bitfield, /* complain_on_overflow */
690 bfd_elf_generic_reloc, /* special_function */
691 "R_CKCORE_GOTOFF_IMM18", /* name */
692 true, /* partial_inplace */
693 0xfffc, /* src_mask */
694 0x3ffff, /* dst_mask */
695 false), /* pcrel_offset */
696
697 /* 48. */
698 HOWTO (R_CKCORE_GOT_IMM18BY4, /* type */
699 2, /* rightshift */
700 4, /* size */
701 18, /* bitsize */
702 false, /* pc_relative */
703 0, /* bitpos */
704 complain_overflow_bitfield, /* complain_on_overflow */
705 bfd_elf_generic_reloc, /* special_function */
706 "R_CKCORE_GOT_IMM18BY4", /* name */
707 true, /* partial_inplace */
708 0xfffc, /* src_mask */
709 0x3ffff, /* dst_mask */
710 false), /* pcrel_offset */
711
712 /* 49. */
713 HOWTO (R_CKCORE_PLT_IMM18BY4, /* type */
714 2, /* rightshift */
715 4, /* size */
716 18, /* bitsize */
717 false, /* pc_relative */
718 0, /* bitpos */
719 complain_overflow_bitfield, /* complain_on_overflow */
720 bfd_elf_generic_reloc, /* special_function */
721 "R_CKCORE_PLT_IMM18BY4", /* name */
722 true, /* partial_inplace */
723 0xfffc, /* src_mask */
724 0x3ffff, /* dst_mask */
725 true), /* pcrel_offset */
726
727 /* 50: for lrw16. */
728 HOWTO (R_CKCORE_PCREL_IMM7BY4, /* type */
729 2, /* rightshift */
730 2, /* size */
731 7, /* bitsize */
732 true, /* pc_relative */
733 0, /* bitpos */
734 complain_overflow_bitfield, /* complain_on_overflow */
735 bfd_elf_generic_reloc, /* special_function */
736 "R_CKCORE_PCREL_IMM7BY4", /* name */
737 false, /* partial_inplace */
738 0xec1f, /* src_mask */
739 0x31f, /* dst_mask */
740 true), /* pcrel_offset */
741
742 /* 51: for static nptl. */
743 HOWTO (R_CKCORE_TLS_LE32, /* type */
744 0, /* rightshift */
745 4, /* size */
746 32, /* bitsize */
747 false, /* pc_relative */
748 0, /* bitpos */
749 complain_overflow_dont, /* complain_on_overflow */
750 bfd_elf_generic_reloc, /* special_function */
751 "R_CKCORE_TLS_LE32", /* name */
752 false, /* partial_inplace */
753 0x0, /* src_mask */
754 0xffffffff, /* dst_mask */
755 true), /* pcrel_offset */
756
757 /* 52: for static nptl. */
758 HOWTO (R_CKCORE_TLS_IE32, /* type */
759 0, /* rightshift */
760 4, /* size */
761 32, /* bitsize */
762 false, /* pc_relative */
763 0, /* bitpos */
764 complain_overflow_dont, /* complain_on_overflow */
765 bfd_elf_generic_reloc, /* special_function */
766 "R_CKCORE_TLS_IE32", /* name */
767 false, /* partial_inplace */
768 0x0, /* src_mask */
769 0xffffffff, /* dst_mask */
770 true), /* pcrel_offset */
771
772 /* 53: for pic nptl. */
773 HOWTO (R_CKCORE_TLS_GD32, /* type */
774 0, /* rightshift */
775 4, /* size */
776 32, /* bitsize */
777 false, /* pc_relative */
778 0, /* bitpos */
779 complain_overflow_dont, /* complain_on_overflow */
780 bfd_elf_generic_reloc, /* special_function */
781 "R_CKCORE_TLS_GD32", /* name */
782 false, /* partial_inplace */
783 0x0, /* src_mask */
784 0xffffffff, /* dst_mask */
785 true), /* pcrel_offset */
786
787 /* 54: for pic nptl. */
788 HOWTO (R_CKCORE_TLS_LDM32, /* type */
789 0, /* rightshift */
790 4, /* size */
791 32, /* bitsize */
792 false, /* pc_relative */
793 0, /* bitpos */
794 complain_overflow_dont, /* complain_on_overflow */
795 bfd_elf_generic_reloc, /* special_function */
796 "R_CKCORE_TLS_LDM32", /* name */
797 false, /* partial_inplace */
798 0x0, /* src_mask */
799 0xffffffff, /* dst_mask */
800 true), /* pcrel_offset */
801
802 /* 55: for pic nptl. */
803 HOWTO (R_CKCORE_TLS_LDO32, /* type */
804 0, /* rightshift */
805 4, /* size */
806 32, /* bitsize */
807 false, /* pc_relative */
808 0, /* bitpos */
809 complain_overflow_dont, /* complain_on_overflow */
810 bfd_elf_generic_reloc, /* special_function */
811 "R_CKCORE_TLS_LDO32", /* name */
812 false, /* partial_inplace */
813 0x0, /* src_mask */
814 0xffffffff, /* dst_mask */
815 true), /* pcrel_offset */
816
817 /* 56: for linker. */
818 HOWTO (R_CKCORE_TLS_DTPMOD32,0,0,0,0,0,0,0,"R_CKCORE_TLS_DTPMOD32",0,0,0,0),
819
820 /* 57: for linker. */
821 HOWTO (R_CKCORE_TLS_DTPOFF32,0,0,0,0,0,0,0,"R_CKCORE_TLS_DTPOFF32",0,0,0,0),
822
823 /* 58: for linker. */
824 HOWTO (R_CKCORE_TLS_TPOFF32,0,0,0,0,0,0,0,"R_CKCORE_TLS_TPOFF32",0,0,0,0),
825
826 /* 59: for ck807f. */
827 HOWTO (R_CKCORE_PCREL_FLRW_IMM8BY4, /* type */
828 2, /* rightshift */
829 4, /* size */
830 8, /* bitsize */
831 true, /* pc_relative */
832 0, /* bitpos */
833 complain_overflow_bitfield, /* complain_on_overflow */
834 bfd_elf_generic_reloc, /* special_function */
835 "R_CKCORE_PCREL_FLRW_IMM8BY4",/* name */
836 false, /* partial_inplace */
837 0xfe1fff0f, /* src_mask */
838 0x1e000f0, /* dst_mask */
839 true), /* pcrel_offset */
840
841 /* 60: for 810 not to generate jsri. */
842 HOWTO (R_CKCORE_NOJSRI, /* type */
843 0, /* rightshift */
844 4, /* size */
845 32, /* bitsize */
846 false, /* pc_relative */
847 0, /* bitpos */
848 complain_overflow_dont, /* complain_on_overflow */
849 bfd_elf_generic_reloc, /* special_function */
850 "R_CKCORE_NOJSRI", /* name */
851 false, /* partial_inplace */
852 0xffff, /* src_mask */
853 0xffff, /* dst_mask */
854 false), /* pcrel_offset */
855
856 /* 61: for callgraph. */
857 HOWTO (R_CKCORE_CALLGRAPH, /* type */
858 0, /* rightshift */
859 0, /* size */
860 0, /* bitsize */
861 false, /* pc_relative */
862 0, /* bitpos */
863 complain_overflow_dont, /* complain_on_overflow */
864 NULL, /* special_function */
865 "R_CKCORE_CALLGRAPH", /* name */
866 false, /* partial_inplace */
867 0x0, /* src_mask */
868 0x0, /* dst_mask */
869 true), /* pcrel_offset */
870
871 /* 62: IRELATIVE*/
872 HOWTO (R_CKCORE_IRELATIVE,0,0,0,0,0,0,0,"R_CKCORE_IRELATIVE",0,0,0,0),
873
874 /* 63: for bloop instruction */
875 HOWTO (R_CKCORE_PCREL_BLOOP_IMM4BY4, /* type */
876 1, /* rightshift */
877 4, /* size */
878 4, /* bitsize */
879 1, /* pc_relative */
880 0, /* bitpos */
881 complain_overflow_signed, /* complain_on_overflow */
882 bfd_elf_generic_reloc, /* special_function */
883 "R_CKCORE_PCREL_BLOOP_IMM4BY4", /* name */
884 false, /* partial_inplace */
885 0x0, /* src_mask */
886 0xf, /* dst_mask */
887 true), /* pcrel_offset */
888 /* 64: for bloop instruction */
889 HOWTO (R_CKCORE_PCREL_BLOOP_IMM12BY4, /* type */
890 1, /* rightshift */
891 4, /* size */
892 12, /* bitsize */
893 1, /* pc_relative */
894 0, /* bitpos */
895 complain_overflow_signed, /* complain_on_overflow */
896 bfd_elf_generic_reloc, /* special_function */
897 "R_CKCORE_PCREL_BLOOP_IMM12BY4", /* name */
898 false, /* partial_inplace */
899 0x0, /* src_mask */
900 0xfff, /* dst_mask */
901 true), /* pcrel_offset */
902
903
904 };
905
906
907 /* Whether GOT overflow checking is needed. */
908 static int check_got_overflow = 0;
909
910 /* Whether the target 32 bits is forced so that the high
911 16 bits is at the low address. */
912 static int need_reverse_bits;
913
914 /* Used for relaxation. See csky_relocate_contents. */
915 static bfd_vma read_content_substitute;
916
917 /* NOTICE!
918 The way the following two look-up functions work demands
919 that BFD_RELOC_CKCORE_xxx are defined contiguously. */
920
921 static reloc_howto_type *
922 csky_elf_reloc_type_lookup (bfd * abfd ATTRIBUTE_UNUSED,
923 bfd_reloc_code_real_type code)
924 {
925 int csky_code = code - BFD_RELOC_CKCORE_NONE;
926
927 if (csky_code < 0 || csky_code >= R_CKCORE_MAX)
928 {
929 switch (code)
930 {
931 case BFD_RELOC_NONE:
932 csky_code = R_CKCORE_NONE;
933 break;
934 case BFD_RELOC_32:
935 csky_code = R_CKCORE_ADDR32;
936 break;
937 case BFD_RELOC_32_PCREL:
938 csky_code = R_CKCORE_PCREL32;
939 break;
940 case BFD_RELOC_VTABLE_INHERIT:
941 csky_code = R_CKCORE_GNU_VTINHERIT;
942 break;
943 case BFD_RELOC_VTABLE_ENTRY:
944 csky_code = R_CKCORE_GNU_VTENTRY;
945 break;
946 case BFD_RELOC_RVA:
947 csky_code = R_CKCORE_RELATIVE;
948 break;
949 default:
950 return (reloc_howto_type *)NULL;
951 }
952 }
953 /* Note: when adding csky bfd reloc types in bfd-in2.h
954 and csky elf reloc types in elf/csky.h,
955 the order of the two reloc type tables should be consistent. */
956 return &csky_elf_howto_table[csky_code];
957 }
958
959 static reloc_howto_type *
960 csky_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
961 const char *r_name)
962 {
963 unsigned int i;
964 for (i = 0; i < R_CKCORE_MAX; i++)
965 if (strcasecmp (csky_elf_howto_table[i].name, r_name) == 0)
966 return &csky_elf_howto_table[i];
967 return NULL;
968 }
969
970 static reloc_howto_type *
971 elf32_csky_howto_from_type (unsigned int r_type)
972 {
973 if (r_type < R_CKCORE_MAX)
974 return &csky_elf_howto_table[r_type];
975 else
976 return NULL;
977 }
978
979 static bool
980 csky_elf_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
981 arelent *cache_ptr,
982 Elf_Internal_Rela *dst)
983 {
984 unsigned int r_type;
985
986 r_type = ELF32_R_TYPE (dst->r_info);
987 cache_ptr->howto = elf32_csky_howto_from_type (r_type);
988 if (cache_ptr->howto == NULL)
989 {
990 /* xgettext:c-format */
991 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
992 abfd, r_type);
993 bfd_set_error (bfd_error_bad_value);
994 return false;
995 }
996 return true;
997 }
998
999 /* The Global Offset Table max size. */
1000 #define GOT_MAX_SIZE 0xFFFF8
1001
1002 /* The name of the dynamic interpreter. This is put in the .interp
1003 section. */
1004 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
1005
1006 /* The size in bytes of an entry in the procedure linkage table. */
1007 #define PLT_ENTRY_SIZE 12
1008 #define PLT_ENTRY_SIZE_P 16
1009
1010 /* The first entry in a procedure linkage table looks like
1011 this. It is set up so that any shared library function that is
1012 called before the relocation has been set up calls the dynamic
1013 linker first. */
1014 static const bfd_vma csky_elf_plt_entry_v2[PLT_ENTRY_SIZE / 4] =
1015 {
1016 0xd99c2002, /* ldw r12, (gb, 8) */
1017 0xea0d0000, /* movi r13,offset */
1018 0xe8cc0000 /* jmp r12 */
1019 };
1020
1021 static const bfd_vma csky_elf_plt_entry_v1[PLT_ENTRY_SIZE / 2 ] =
1022 {
1023 0x25f0, /* subi r0, 32 */
1024 0x9200, /* stw r2, (r0, 0) */
1025 0x9310, /* stw r3, (r0, 4) */
1026 0x822e, /* ldw r2, (gb, 8) */
1027 0x7301, /* lrw r3, #offset */
1028 0x00c2, /* jmp r2 */
1029 };
1030
1031 /* Branch stub support. */
1032
1033 enum stub_insn_type
1034 {
1035 INSN16,
1036 INSN32,
1037 DATA_TYPE
1038 };
1039
1040 bool use_branch_stub = true;
1041 typedef struct
1042 {
1043 bfd_vma data;
1044 enum stub_insn_type type;
1045 unsigned int r_type;
1046 int reloc_addend;
1047 } insn_sequence;
1048
1049 static const insn_sequence elf32_csky_stub_long_branch[] =
1050 {
1051 {0xea8d0002, INSN32, R_CKCORE_NONE, 0x0}, /* lrw t1,[pc+8] */
1052 {0x7834, INSN16, R_CKCORE_NONE, 0x0}, /* jmp t1 */
1053 {0x6c03, INSN16, R_CKCORE_NONE, 0x0}, /* nop */
1054 {0x0, DATA_TYPE, R_CKCORE_ADDR32, 0x0} /* .long addr */
1055 };
1056
1057 static const insn_sequence elf32_csky_stub_long_branch_jmpi[] =
1058 {
1059 {0xeac00001, INSN32, R_CKCORE_NONE, 0x0}, /* jmpi [pc+4] */
1060 {0x0, DATA_TYPE, R_CKCORE_ADDR32, 0x0} /* .long addr */
1061 };
1062
1063 /* The bsr instruction offset limit. */
1064 #define BSR_MAX_FWD_BRANCH_OFFSET (((1 << 25) - 1) << 1)
1065 #define BSR_MAX_BWD_BRANCH_OFFSET (-(1 << 26))
1066
1067 #define STUB_SUFFIX ".stub"
1068 #define STUB_ENTRY_NAME "__%s_veneer"
1069
1070 /* One entry per long/short branch stub defined above. */
1071 #define DEF_STUBS \
1072 DEF_STUB(long_branch) \
1073 DEF_STUB(long_branch_jmpi)
1074
1075 #define DEF_STUB(x) csky_stub_##x,
1076 enum elf32_csky_stub_type
1077 {
1078 csky_stub_none,
1079 DEF_STUBS
1080 };
1081 #undef DEF_STUB
1082
1083 typedef struct
1084 {
1085 const insn_sequence* template_sequence;
1086 int template_size;
1087 } stub_def;
1088
1089 #define DEF_STUB(x) {elf32_csky_stub_##x, ARRAY_SIZE(elf32_csky_stub_##x)},
1090 static const stub_def stub_definitions[] = {
1091 {NULL, 0},
1092 DEF_STUBS
1093 };
1094
1095 /* The size of the thread control block. */
1096 #define TCB_SIZE 8
1097
1098 struct csky_elf_obj_tdata
1099 {
1100 struct elf_obj_tdata root;
1101
1102 /* tls_type for each local got entry. */
1103 char *local_got_tls_type;
1104 };
1105
1106 #define csky_elf_local_got_tls_type(bfd) \
1107 (csky_elf_tdata (bfd)->local_got_tls_type)
1108
1109 #define csky_elf_tdata(bfd) \
1110 ((struct csky_elf_obj_tdata *) (bfd)->tdata.any)
1111
1112 struct elf32_csky_stub_hash_entry
1113 {
1114 /* Base hash table entry structure. */
1115 struct bfd_hash_entry root;
1116
1117 /* The stub section. */
1118 asection *stub_sec;
1119
1120 /* Offset within stub_sec of the beginning of this stub. */
1121 bfd_vma stub_offset;
1122
1123 /* Given the symbol's value and its section we can determine its final
1124 value when building the stubs (so the stub knows where to jump). */
1125 bfd_vma target_value;
1126 asection *target_section;
1127
1128 /* Offset to apply to relocation referencing target_value. */
1129 bfd_vma target_addend;
1130
1131 /* The stub type. */
1132 enum elf32_csky_stub_type stub_type;
1133 /* Its encoding size in bytes. */
1134 int stub_size;
1135 /* Its template. */
1136 const insn_sequence *stub_template;
1137 /* The size of the template (number of entries). */
1138 int stub_template_size;
1139
1140 /* The symbol table entry, if any, that this was derived from. */
1141 struct csky_elf_link_hash_entry *h;
1142
1143 /* Destination symbol type. */
1144 unsigned char st_type;
1145
1146 /* Where this stub is being called from, or, in the case of combined
1147 stub sections, the first input section in the group. */
1148 asection *id_sec;
1149
1150 /* The name for the local symbol at the start of this stub. The
1151 stub name in the hash table has to be unique; this does not, so
1152 it can be friendlier. */
1153 char *output_name;
1154 };
1155
1156 #define csky_stub_hash_lookup(table, string, create, copy) \
1157 ((struct elf32_csky_stub_hash_entry *) \
1158 bfd_hash_lookup ((table), (string), (create), (copy)))
1159
1160 /* C-SKY ELF linker hash entry. */
1161 struct csky_elf_link_hash_entry
1162 {
1163 struct elf_link_hash_entry elf;
1164 int plt_refcount;
1165 /* For sub jsri2bsr relocs count. */
1166 int jsri2bsr_refcount;
1167
1168 #define GOT_UNKNOWN 0
1169 #define GOT_NORMAL 1
1170 #define GOT_TLS_GD 2
1171 #define GOT_TLS_IE 4
1172
1173 unsigned char tls_type;
1174
1175 /* A pointer to the most recently used stub hash entry against this
1176 symbol. */
1177 struct elf32_csky_stub_hash_entry *stub_cache;
1178 };
1179
1180 /* Traverse an C-SKY ELF linker hash table. */
1181 #define csky_elf_link_hash_traverse(table, func, info) \
1182 (elf_link_hash_traverse \
1183 (&(table)->root, \
1184 (bool (*) (struct elf_link_hash_entry *, void *)) (func), \
1185 (info)))
1186
1187 /* Get the C-SKY ELF linker hash table from a link_info structure. */
1188 #define csky_elf_hash_table(p) \
1189 ((is_elf_hash_table ((p)->hash) \
1190 && elf_hash_table_id (elf_hash_table (p)) == CSKY_ELF_DATA) \
1191 ? (struct csky_elf_link_hash_table *) (p)->hash : NULL)
1192
1193 #define csky_elf_hash_entry(ent) ((struct csky_elf_link_hash_entry*)(ent))
1194
1195 /* Array to keep track of which stub sections have been created, and
1196 information on stub grouping. */
1197 struct map_stub
1198 {
1199 /* This is the section to which stubs in the group will be
1200 attached. */
1201 asection *link_sec;
1202 /* The stub section. */
1203 asection *stub_sec;
1204 };
1205
1206 /* C-SKY ELF linker hash table. */
1207 struct csky_elf_link_hash_table
1208 {
1209 struct elf_link_hash_table elf;
1210
1211 /* Data for R_CKCORE_TLS_LDM32 relocations. */
1212 union
1213 {
1214 bfd_signed_vma refcount;
1215 bfd_vma offset;
1216 } tls_ldm_got;
1217
1218 /* The stub hash table. */
1219 struct bfd_hash_table stub_hash_table;
1220
1221 /* Linker stub bfd. */
1222 bfd *stub_bfd;
1223
1224 /* Linker call-backs. */
1225 asection * (*add_stub_section) (const char *, asection *);
1226 void (*layout_sections_again) (void);
1227
1228 /* Array to keep track of which stub sections have been created, and
1229 * information on stub grouping. */
1230 struct map_stub *stub_group;
1231
1232 /* Number of elements in stub_group. */
1233 unsigned int top_id;
1234
1235 /* Assorted information used by elf32_csky_size_stubs. */
1236 unsigned int bfd_count;
1237 unsigned int top_index;
1238 asection **input_list;
1239 };
1240
1241 /* We can't change vectors in the bfd target which will apply to
1242 data sections, however we only do this to the text sections. */
1243
1244 static bfd_vma
1245 csky_get_insn_32 (bfd *input_bfd,
1246 bfd_byte *location)
1247 {
1248 if (bfd_big_endian (input_bfd))
1249 return bfd_get_32 (input_bfd, location);
1250 else
1251 return (bfd_get_16 (input_bfd, location) << 16
1252 | bfd_get_16 (input_bfd, location + 2));
1253 }
1254
1255 static void
1256 csky_put_insn_32 (bfd *input_bfd,
1257 bfd_vma x,
1258 bfd_byte *location)
1259 {
1260 if (bfd_big_endian (input_bfd))
1261 bfd_put_32 (input_bfd, x, location);
1262 else
1263 {
1264 bfd_put_16 (input_bfd, x >> 16, location);
1265 bfd_put_16 (input_bfd, x & 0xffff, location + 2);
1266 }
1267 }
1268
1269 /* Find or create a stub section. Returns a pointer to the stub section, and
1270 the section to which the stub section will be attached (in *LINK_SEC_P).
1271 LINK_SEC_P may be NULL. */
1272
1273 static asection *
1274 elf32_csky_create_or_find_stub_sec (asection **link_sec_p, asection *section,
1275 struct csky_elf_link_hash_table *htab)
1276 {
1277 asection *link_sec;
1278 asection *stub_sec;
1279
1280 link_sec = htab->stub_group[section->id].link_sec;
1281 stub_sec = htab->stub_group[section->id].stub_sec;
1282 if (stub_sec == NULL)
1283 {
1284 stub_sec = htab->stub_group[link_sec->id].stub_sec;
1285 if (stub_sec == NULL)
1286 {
1287 size_t namelen;
1288 bfd_size_type len;
1289 char *s_name;
1290
1291 namelen = strlen (link_sec->name);
1292 len = namelen + sizeof (STUB_SUFFIX);
1293 s_name = bfd_alloc (htab->stub_bfd, len);
1294 if (s_name == NULL)
1295 return NULL;
1296
1297 memcpy (s_name, link_sec->name, namelen);
1298 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
1299 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
1300 if (stub_sec == NULL)
1301 return NULL;
1302 htab->stub_group[link_sec->id].stub_sec = stub_sec;
1303 }
1304 htab->stub_group[section->id].stub_sec = stub_sec;
1305 }
1306
1307 if (link_sec_p)
1308 *link_sec_p = link_sec;
1309
1310 return stub_sec;
1311 }
1312
1313 /* Build a name for an entry in the stub hash table. */
1314
1315 static char *
1316 elf32_csky_stub_name (const asection *input_section,
1317 const asection *sym_sec,
1318 const struct csky_elf_link_hash_entry *hash,
1319 const Elf_Internal_Rela *rel)
1320 {
1321 char *stub_name;
1322 bfd_size_type len;
1323
1324 if (hash)
1325 {
1326 len = 8 + 1 + strlen (hash->elf.root.root.string) + 1 + 8 + 1;
1327 stub_name = bfd_malloc (len);
1328 if (stub_name != NULL)
1329 sprintf (stub_name, "%08x_%s+%x",
1330 input_section->id & 0xffffffff,
1331 hash->elf.root.root.string,
1332 (int) rel->r_addend & 0xffffffff);
1333 }
1334 else
1335 {
1336 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
1337 stub_name = bfd_malloc (len);
1338 if (stub_name != NULL)
1339 sprintf (stub_name, "%08x_%x:%x+%x",
1340 input_section->id & 0xffffffff,
1341 sym_sec->id & 0xffffffff,
1342 (int) ELF32_R_SYM (rel->r_info) & 0xffffffff,
1343 (int) rel->r_addend & 0xffffffff);
1344 }
1345
1346 return stub_name;
1347 }
1348
1349 /* Determine the type of stub needed, if any, for a call. */
1350
1351 static enum elf32_csky_stub_type
1352 csky_type_of_stub (struct bfd_link_info *info,
1353 asection *input_sec,
1354 const Elf_Internal_Rela *rel,
1355 unsigned char st_type,
1356 struct csky_elf_link_hash_entry *hash,
1357 bfd_vma destination,
1358 asection *sym_sec ATTRIBUTE_UNUSED,
1359 bfd *input_bfd ATTRIBUTE_UNUSED,
1360 const char *name ATTRIBUTE_UNUSED)
1361 {
1362 bfd_vma location;
1363 bfd_signed_vma branch_offset;
1364 unsigned int r_type;
1365 enum elf32_csky_stub_type stub_type = csky_stub_none;
1366 struct elf_link_hash_entry * h = &hash->elf;
1367
1368 /* We don't know the actual type of destination in case it is of
1369 type STT_SECTION: give up. */
1370 if (st_type == STT_SECTION)
1371 return stub_type;
1372
1373 location = (input_sec->output_offset
1374 + input_sec->output_section->vma
1375 + rel->r_offset);
1376
1377 branch_offset = (bfd_signed_vma)(destination - location);
1378 r_type = ELF32_R_TYPE (rel->r_info);
1379 if (r_type == R_CKCORE_PCREL_IMM26BY2
1380 && ((h != NULL
1381 && ((h->def_dynamic && !h->def_regular)
1382 || (bfd_link_pic (info)
1383 && h->root.type == bfd_link_hash_defweak)))
1384 || branch_offset > BSR_MAX_FWD_BRANCH_OFFSET
1385 || branch_offset < BSR_MAX_BWD_BRANCH_OFFSET))
1386 {
1387 if (bfd_csky_arch (info->output_bfd) == CSKY_ARCH_810
1388 || bfd_csky_arch (info->output_bfd) == CSKY_ARCH_807)
1389 stub_type = csky_stub_long_branch_jmpi;
1390 else
1391 stub_type = csky_stub_long_branch;
1392 }
1393
1394 return stub_type;
1395 }
1396
1397 /* Create an entry in an C-SKY ELF linker hash table. */
1398
1399 static struct bfd_hash_entry *
1400 csky_elf_link_hash_newfunc (struct bfd_hash_entry * entry,
1401 struct bfd_hash_table * table,
1402 const char * string)
1403 {
1404 struct csky_elf_link_hash_entry * ret =
1405 (struct csky_elf_link_hash_entry *) entry;
1406
1407 /* Allocate the structure if it has not already been allocated by a
1408 subclass. */
1409 if (ret == NULL)
1410 {
1411 ret = (struct csky_elf_link_hash_entry *)
1412 bfd_hash_allocate (table,
1413 sizeof (struct csky_elf_link_hash_entry));
1414 if (ret == NULL)
1415 return (struct bfd_hash_entry *) ret;
1416 }
1417
1418 /* Call the allocation method of the superclass. */
1419 ret = ((struct csky_elf_link_hash_entry *)
1420 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *)ret,
1421 table, string));
1422 if (ret != NULL)
1423 {
1424 struct csky_elf_link_hash_entry *eh;
1425
1426 eh = (struct csky_elf_link_hash_entry *) ret;
1427 eh->plt_refcount = 0;
1428 eh->jsri2bsr_refcount = 0;
1429 eh->tls_type = GOT_NORMAL;
1430 ret->stub_cache = NULL;
1431 }
1432
1433 return (struct bfd_hash_entry *) ret;
1434 }
1435
1436 /* Initialize an entry in the stub hash table. */
1437
1438 static struct bfd_hash_entry *
1439 stub_hash_newfunc (struct bfd_hash_entry *entry,
1440 struct bfd_hash_table *table,
1441 const char *string)
1442 {
1443 /* Allocate the structure if it has not already been allocated by a
1444 subclass. */
1445 if (entry == NULL)
1446 {
1447 entry = ((struct bfd_hash_entry *)
1448 bfd_hash_allocate (table,
1449 sizeof (struct elf32_csky_stub_hash_entry)));
1450 if (entry == NULL)
1451 return entry;
1452 }
1453
1454 /* Call the allocation method of the superclass. */
1455 entry = bfd_hash_newfunc (entry, table, string);
1456 if (entry != NULL)
1457 {
1458 struct elf32_csky_stub_hash_entry *eh;
1459
1460 /* Initialize the local fields. */
1461 eh = (struct elf32_csky_stub_hash_entry *) entry;
1462 eh->stub_sec = NULL;
1463 eh->stub_offset = 0;
1464 eh->target_value = 0;
1465 eh->target_section = NULL;
1466 eh->target_addend = 0;
1467 eh->stub_type = csky_stub_none;
1468 eh->stub_size = 0;
1469 eh->stub_template = NULL;
1470 eh->stub_template_size = -1;
1471 eh->h = NULL;
1472 eh->id_sec = NULL;
1473 eh->output_name = NULL;
1474 }
1475
1476 return entry;
1477 }
1478
1479 /* Free the derived linker hash table. */
1480
1481 static void
1482 csky_elf_link_hash_table_free (bfd *obfd)
1483 {
1484 struct csky_elf_link_hash_table *ret
1485 = (struct csky_elf_link_hash_table *) obfd->link.hash;
1486
1487 bfd_hash_table_free (&ret->stub_hash_table);
1488 _bfd_elf_link_hash_table_free (obfd);
1489 }
1490
1491 /* Create an CSKY elf linker hash table. */
1492
1493 static struct bfd_link_hash_table *
1494 csky_elf_link_hash_table_create (bfd *abfd)
1495 {
1496 struct csky_elf_link_hash_table *ret;
1497 size_t amt = sizeof (struct csky_elf_link_hash_table);
1498
1499 ret = (struct csky_elf_link_hash_table*) bfd_zmalloc (amt);
1500 if (ret == NULL)
1501 return NULL;
1502
1503 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
1504 csky_elf_link_hash_newfunc,
1505 sizeof (struct csky_elf_link_hash_entry),
1506 CSKY_ELF_DATA))
1507 {
1508 free (ret);
1509 return NULL;
1510 }
1511
1512 if (!bfd_hash_table_init (&ret->stub_hash_table, stub_hash_newfunc,
1513 sizeof (struct elf32_csky_stub_hash_entry)))
1514 {
1515 free (ret);
1516 return NULL;
1517 }
1518 ret->elf.root.hash_table_free = csky_elf_link_hash_table_free;
1519 return &ret->elf.root;
1520 }
1521
1522 static bool
1523 csky_elf_mkobject (bfd *abfd)
1524 {
1525 return bfd_elf_allocate_object (abfd, sizeof (struct csky_elf_obj_tdata),
1526 CSKY_ELF_DATA);
1527 }
1528
1529 /* Adjust a symbol defined by a dynamic object and referenced by a
1530 regular object. The current definition is in some section of the
1531 dynamic object, but we're not including those sections. We have to
1532 change the definition to something the rest of the link can
1533 understand. */
1534
1535 static bool
1536 csky_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
1537 struct elf_link_hash_entry *h)
1538 {
1539 struct csky_elf_link_hash_entry *eh;
1540 struct csky_elf_link_hash_table *htab;
1541 asection *srel;
1542 asection *s;
1543 eh = (struct csky_elf_link_hash_entry *)h;
1544 if (eh == NULL)
1545 return false;
1546
1547 htab = csky_elf_hash_table (info);
1548 if (htab == NULL)
1549 return false;
1550
1551 /* Clear jsri2bsr_refcount, if creating shared library files. */
1552 if (bfd_link_pic (info) && eh->jsri2bsr_refcount > 0)
1553 eh->jsri2bsr_refcount = 0;
1554
1555 /* If there is a function, put it in the procedure linkage table. We
1556 will fill in the contents of the procedure linkage table later. */
1557 if (h->needs_plt)
1558 {
1559 /* Calls to STT_GNU_IFUNC symbols always use a PLT, even if the
1560 symbol binds locally. */
1561 if (h->plt.refcount <= 0
1562 || (h->type != STT_GNU_IFUNC
1563 && (SYMBOL_CALLS_LOCAL (info, h)
1564 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1565 && h->root.type == bfd_link_hash_undefweak))))
1566
1567 {
1568 /* This case can occur if we saw a PLT32 reloc in an input
1569 file, but the symbol was never referred to by a dynamic
1570 object, or if all references were garbage collected. In
1571 such a case, we don't actually need to build a procedure
1572 linkage table, and we can just do a PC32 reloc instead. */
1573 h->plt.offset = (bfd_vma) -1;
1574 h->needs_plt = 0;
1575 if (h->got.refcount == 0)
1576 h->got.refcount += 1;
1577 }
1578 else if (h->got.refcount != 0)
1579 {
1580 h->got.refcount -= eh->plt_refcount;
1581 eh->plt_refcount = 0;
1582 }
1583 return true;
1584 }
1585 else
1586 /* It's possible that we incorrectly decided a .plt reloc was
1587 needed for an R_CKCORE_PC32 or similar reloc to a non-function
1588 sym in check_relocs. We can't decide accurately between function
1589 and non-function syms in check_relocs; objects loaded later in
1590 the link may change h->type. So fix it now. */
1591 h->plt.offset = (bfd_vma) -1;
1592
1593 /* If this is a weak symbol, and there is a real definition, the
1594 processor independent code will have arranged for us to see the
1595 real definition first, and we can just use the same value. */
1596 if (h->is_weakalias)
1597 {
1598 struct elf_link_hash_entry *def = weakdef (h);
1599 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
1600 h->root.u.def.section = def->root.u.def.section;
1601 h->root.u.def.value = def->root.u.def.value;
1602 return true;
1603 }
1604
1605 /* If there are no non-GOT references, we do not need a copy
1606 relocation. */
1607 if (!h->non_got_ref)
1608 return true;
1609
1610 /* This is a reference to a symbol defined by a dynamic object which
1611 is not a function. */
1612
1613 /* If we are creating a shared library, we must presume that the
1614 only references to the symbol are via the global offset table.
1615 For such cases we need not do anything here; the relocations will
1616 be handled correctly by relocate_section. */
1617 if (bfd_link_pic (info) || htab->elf.is_relocatable_executable)
1618 return true;
1619
1620 /* We must allocate the symbol in our .dynbss section, which will
1621 become part of the .bss section of the executable. There will be
1622 an entry for this symbol in the .dynsym section. The dynamic
1623 object will contain position independent code, so all references
1624 from the dynamic object to this symbol will go through the global
1625 offset table. The dynamic linker will use the .dynsym entry to
1626 determine the address it must put in the global offset table, so
1627 both the dynamic object and the regular object will refer to the
1628 same memory location for the variable. */
1629 /* We must generate a R_CKCORE_COPY reloc to tell the dynamic linker to
1630 copy the initial value out of the dynamic object and into the
1631 runtime process image. We need to remember the offset into the
1632 .rela.bss section we are going to use. */
1633 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
1634 {
1635 s = htab->elf.sdynrelro;
1636 srel = htab->elf.sreldynrelro;
1637 }
1638 else
1639 {
1640 s = htab->elf.sdynbss;
1641 srel = htab->elf.srelbss;
1642 }
1643 if (info->nocopyreloc == 0
1644 && (h->root.u.def.section->flags & SEC_ALLOC) != 0
1645 && h->size != 0
1646 && srel != NULL
1647 && s != NULL)
1648 {
1649 srel->size += sizeof (Elf32_External_Rela);
1650 h->needs_copy = 1;
1651 return _bfd_elf_adjust_dynamic_copy (info, h, s);
1652 }
1653
1654 h->non_got_ref = 0;
1655 return true;
1656 }
1657
1658 /* Allocate space in .plt, .got and associated reloc sections for
1659 dynamic relocs. */
1660
1661 static bool
1662 csky_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
1663 {
1664 struct bfd_link_info *info;
1665 struct csky_elf_link_hash_table *htab;
1666 struct csky_elf_link_hash_entry *eh;
1667 struct elf_dyn_relocs *p;
1668
1669 /* For indirect case, such as _ZdlPv to _ZdlPv@@GLIBCXX_3.4. */
1670 if (h->root.type == bfd_link_hash_indirect)
1671 return true;
1672
1673 if (h->root.type == bfd_link_hash_warning)
1674 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1675
1676
1677 info = (struct bfd_link_info *) inf;
1678 htab = csky_elf_hash_table (info);
1679 if (htab == NULL)
1680 return false;
1681 /*TODO: how to deal with weak symbol relocs. */
1682 if ((htab->elf.dynamic_sections_created || h->type == STT_GNU_IFUNC)
1683 && h->plt.refcount > 0)
1684 {
1685 /* Make sure this symbol is output as a dynamic symbol.
1686 Undefined weak syms won't yet be marked as dynamic. */
1687 if (h->dynindx == -1 && !h->forced_local
1688 && h->root.type == bfd_link_hash_undefweak
1689 && ! bfd_elf_link_record_dynamic_symbol (info, h))
1690 return false;
1691 if (bfd_link_pic (info) || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
1692 {
1693 asection *splt = htab->elf.splt;
1694
1695 /* If this is the first .plt entry, make room for the special
1696 first entry. */
1697 if (splt->size == 0)
1698 {
1699 if (bfd_csky_abi (info->output_bfd) == CSKY_ABI_V1)
1700 splt->size += PLT_ENTRY_SIZE_P;
1701 else
1702 splt->size += PLT_ENTRY_SIZE;
1703 }
1704 h->plt.offset = splt->size;
1705
1706 /* If this symbol is not defined in a regular file, and we are
1707 not generating a shared library, then set the symbol to this
1708 location in the .plt. This is required to make function
1709 pointers compare as equal between the normal executable and
1710 the shared library. */
1711 if (!bfd_link_pic (info) && !h->def_regular)
1712 {
1713 h->root.u.def.section = splt;
1714 h->root.u.def.value = h->plt.offset;
1715 }
1716
1717 /* Make room for this entry. */
1718 if (bfd_csky_abi (info->output_bfd) == CSKY_ABI_V1)
1719 splt->size += PLT_ENTRY_SIZE_P;
1720 else
1721 splt->size += PLT_ENTRY_SIZE;
1722 /* We also need to make an entry in the .rela.plt section. */
1723 htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
1724
1725 /* We also need to make an entry in the .got.plt section, which
1726 will be placed in the .got section by the linker script. */
1727 htab->elf.sgotplt->size += 4;
1728 }
1729 else
1730 {
1731 h->plt.offset = (bfd_vma) -1;
1732 h->needs_plt = 0;
1733 }
1734 }
1735 else
1736 {
1737 h->plt.offset = (bfd_vma) -1;
1738 h->needs_plt = 0;
1739 }
1740
1741 if (h->got.refcount > 0)
1742 {
1743 asection *sgot;
1744 bool dyn;
1745 int indx;
1746
1747 int tls_type = csky_elf_hash_entry (h)->tls_type;
1748 /* Make sure this symbol is output as a dynamic symbol.
1749 Undefined weak syms won't yet be marked as dynamic. */
1750 if (h->dynindx == -1 && !h->forced_local
1751 && h->root.type == bfd_link_hash_undefweak
1752 && ! bfd_elf_link_record_dynamic_symbol (info, h))
1753 return false;
1754
1755 sgot = htab->elf.sgot;
1756 h->got.offset = sgot->size;
1757 BFD_ASSERT (tls_type != GOT_UNKNOWN);
1758 if (tls_type == GOT_NORMAL)
1759 /* Non-TLS symbols need one GOT slot. */
1760 sgot->size += 4;
1761 else
1762 {
1763 if (tls_type & GOT_TLS_GD)
1764 /* R_CKCORE_TLS_GD32 needs 2 consecutive GOT slots. */
1765 sgot->size += 8;
1766 if (tls_type & GOT_TLS_IE)
1767 /* R_CKCORE_TLS_IE32 needs one GOT slot. */
1768 sgot->size += 4;
1769 }
1770 dyn = htab->elf.dynamic_sections_created;
1771 indx = 0;
1772 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, bfd_link_pic (info), h)
1773 && (! bfd_link_pic (info) || !SYMBOL_REFERENCES_LOCAL (info, h)))
1774 indx = h->dynindx;
1775
1776 if (tls_type != GOT_NORMAL
1777 && (bfd_link_pic (info) || indx != 0)
1778 && ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1779 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
1780 || h->root.type != bfd_link_hash_undefweak))
1781 {
1782 if (tls_type & GOT_TLS_IE)
1783 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1784 if (tls_type & GOT_TLS_GD)
1785 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1786 if ((tls_type & GOT_TLS_GD) && indx != 0)
1787 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1788 }
1789 else if (((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1790 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
1791 || h->root.type != bfd_link_hash_undefweak)
1792 && (bfd_link_pic (info)
1793 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)
1794 || h->plt.offset == (bfd_vma) -1))
1795 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1796 }
1797 else
1798 h->got.offset = (bfd_vma) -1;
1799
1800 eh = (struct csky_elf_link_hash_entry *) h;
1801 if (h->dyn_relocs == NULL)
1802 return true;
1803
1804 /* In the shared -Bsymbolic case, discard space allocated for
1805 dynamic pc-relative relocs against symbols which turn out to be
1806 defined in regular objects. For the normal shared case, discard
1807 space for pc-relative relocs that have become local due to symbol
1808 visibility changes. */
1809
1810 if (bfd_link_pic (info))
1811 {
1812 if (SYMBOL_CALLS_LOCAL (info, h))
1813 {
1814 struct elf_dyn_relocs **pp;
1815
1816 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
1817 {
1818 p->count -= p->pc_count;
1819 p->pc_count = 0;
1820 if (p->count == 0)
1821 *pp = p->next;
1822 else
1823 pp = &p->next;
1824 }
1825 }
1826
1827 if (eh->jsri2bsr_refcount
1828 && h->root.type == bfd_link_hash_defined
1829 && h->dyn_relocs != NULL)
1830 h->dyn_relocs->count -= eh->jsri2bsr_refcount;
1831
1832 /* Also discard relocs on undefined weak syms with non-default
1833 visibility. */
1834 if (h->dyn_relocs != NULL
1835 && h->root.type == bfd_link_hash_undefweak)
1836 {
1837 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1838 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
1839 h->dyn_relocs = NULL;
1840
1841 /* Make sure undefined weak symbols are output as a dynamic
1842 symbol in PIEs. */
1843 else if (h->dynindx == -1
1844 && !h->forced_local
1845 && !bfd_elf_link_record_dynamic_symbol (info, h))
1846 return false;
1847 }
1848
1849 }
1850 else
1851 {
1852 /* For the non-shared case, discard space for relocs against
1853 symbols which turn out to need copy relocs or are not
1854 dynamic. */
1855
1856 if (!h->non_got_ref
1857 && ((h->def_dynamic && !h->def_regular)
1858 || (htab->elf.dynamic_sections_created
1859 && (h->root.type == bfd_link_hash_undefweak
1860 || h->root.type == bfd_link_hash_indirect
1861 || h->root.type == bfd_link_hash_undefined))))
1862 {
1863 /* Make sure this symbol is output as a dynamic symbol.
1864 Undefined weak syms won't yet be marked as dynamic. */
1865 if (h->dynindx == -1 && !h->forced_local
1866 && h->root.type == bfd_link_hash_undefweak)
1867 {
1868 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1869 return false;
1870 }
1871
1872 /* If that succeeded, we know we'll be keeping all the
1873 relocs. */
1874 if (h->dynindx != -1)
1875 goto keep;
1876 }
1877
1878 h->dyn_relocs = NULL;
1879
1880 keep: ;
1881 }
1882
1883 /* Finally, allocate space. */
1884 for (p = h->dyn_relocs; p != NULL; p = p->next)
1885 {
1886 asection *srelgot = htab->elf.srelgot;
1887 srelgot->size += p->count * sizeof (Elf32_External_Rela);
1888 }
1889
1890 return true;
1891 }
1892
1893 /* Set the sizes of the dynamic sections. */
1894
1895 static bool
1896 csky_elf_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
1897 struct bfd_link_info *info)
1898 {
1899 struct csky_elf_link_hash_table *htab;
1900 bfd *dynobj;
1901 asection *s;
1902 bool relocs;
1903 bfd *ibfd;
1904
1905 htab = csky_elf_hash_table (info);
1906 if (htab == NULL)
1907 return false;
1908 dynobj = htab->elf.dynobj;
1909 if (dynobj == NULL)
1910 return false;
1911
1912 if (htab->elf.dynamic_sections_created)
1913 {
1914 /* Set the contents of the .interp section to the interpreter. */
1915 if (!bfd_link_pic (info) && !info->nointerp)
1916 {
1917 s = bfd_get_section_by_name (dynobj, ".interp");
1918 BFD_ASSERT (s != NULL);
1919 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
1920 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1921 }
1922 }
1923
1924 /* Set up .got offsets for local syms, and space for local dynamic
1925 relocs. */
1926 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1927 {
1928 bfd_signed_vma *local_got_refcounts;
1929 bfd_signed_vma *end_local_got;
1930 bfd_size_type locsymcount;
1931 Elf_Internal_Shdr *symtab_hdr;
1932 asection *srelgot, *sgot;
1933 char *local_tls_type;
1934
1935 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
1936 continue;
1937
1938 sgot = htab->elf.sgot;
1939 srelgot = htab->elf.srelgot;
1940
1941 for (s = ibfd->sections; s != NULL; s = s->next)
1942 {
1943 struct elf_dyn_relocs *p;
1944
1945 for (p = *((struct elf_dyn_relocs **)
1946 &elf_section_data (s)->local_dynrel);
1947 p != NULL;
1948 p = p->next)
1949 {
1950 if (!bfd_is_abs_section (p->sec)
1951 && bfd_is_abs_section (p->sec->output_section))
1952 /* Input section has been discarded, either because
1953 it is a copy of a linkonce section or due to
1954 linker script /DISCARD/, so we'll be discarding
1955 the relocs too. */
1956 ;
1957 else if (p->count != 0)
1958 {
1959 srelgot->size += p->count * sizeof (Elf32_External_Rela);
1960 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
1961 info->flags |= DF_TEXTREL;
1962 }
1963 }
1964 }
1965
1966 local_got_refcounts = elf_local_got_refcounts (ibfd);
1967 if (!local_got_refcounts)
1968 continue;
1969
1970 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
1971 locsymcount = symtab_hdr->sh_info;
1972 end_local_got = local_got_refcounts + locsymcount;
1973 local_tls_type = csky_elf_local_got_tls_type (ibfd);
1974
1975 for (; local_got_refcounts < end_local_got;
1976 ++local_got_refcounts, ++local_tls_type)
1977 {
1978 if (*local_got_refcounts > 0)
1979 {
1980 /* GOT_TLS_GD and GOT_TLS_IE type for TLS, GOT_NORMAL type
1981 for GOT. If output file is shared library, we should output
1982 GOT_TLS_GD type relocation in .rel.got. */
1983 *local_got_refcounts = sgot->size;
1984 if (*local_tls_type & GOT_TLS_GD)
1985 /* TLS_GD relocs need an 8-byte structure in the GOT. */
1986 sgot->size += 8;
1987 if (*local_tls_type & GOT_TLS_IE)
1988 sgot->size += 4;
1989 if (*local_tls_type == GOT_NORMAL)
1990 sgot->size += 4;
1991 if (bfd_link_pic (info) || *local_tls_type == GOT_TLS_GD)
1992 srelgot->size += sizeof (Elf32_External_Rela);
1993 }
1994 else
1995 *local_got_refcounts = (bfd_vma) -1;
1996 }
1997 }
1998
1999 if (htab->tls_ldm_got.refcount > 0)
2000 {
2001 /* Allocate two GOT entries and one dynamic relocation (if necessary)
2002 for R_CSKY_TLS_LDM32 relocations. */
2003 htab->tls_ldm_got.offset = htab->elf.sgot->size;
2004 htab->elf.sgot->size += 8;
2005 if (bfd_link_pic (info))
2006 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
2007 }
2008 else
2009 htab->tls_ldm_got.offset = -1;
2010
2011 /* Allocate global sym .plt and .got entries, and space for global
2012 sym dynamic relocs. */
2013 elf_link_hash_traverse (&htab->elf, csky_allocate_dynrelocs, info);
2014
2015 /* Check for GOT overflow. */
2016 if (check_got_overflow == 1
2017 && htab->elf.sgot->size + htab->elf.sgotplt->size > GOT_MAX_SIZE)
2018 {
2019 _bfd_error_handler (_("GOT table size out of range")); /* */
2020 return false;
2021 }
2022
2023 /* We now have determined the sizes of the various dynamic sections.
2024 Allocate memory for them. */
2025 relocs = false;
2026 for (s = dynobj->sections; s != NULL; s = s->next)
2027 {
2028 bool strip_section = true;
2029
2030 if ((s->flags & SEC_LINKER_CREATED) == 0)
2031 continue;
2032
2033 if (s == htab->elf.splt
2034 || s == htab->elf.sgot
2035 || s == htab->elf.sgotplt
2036 || s == htab->elf.sdynrelro
2037 || s == htab->elf.sreldynrelro)
2038 {
2039 /* Strip this section if we don't need it;
2040 see the comment below. */
2041 /* We'd like to strip these sections if they aren't needed, but if
2042 we've exported dynamic symbols from them we must leave them.
2043 It's too late to tell BFD to get rid of the symbols. */
2044
2045 if (htab->elf.hplt != NULL)
2046 strip_section = false;
2047 }
2048 else if (startswith (bfd_section_name (s), ".rel") )
2049 {
2050 if (s->size != 0 )
2051 relocs = true;
2052
2053 /* We use the reloc_count field as a counter if we need
2054 to copy relocs into the output file. */
2055 s->reloc_count = 0;
2056 }
2057 else
2058 /* It's not one of our sections, so don't allocate space. */
2059 continue;
2060
2061 /* Strip this section if we don't need it; see the
2062 comment below. */
2063 if (s->size == 0)
2064 {
2065 /* If we don't need this section, strip it from the
2066 output file. This is mostly to handle .rel.bss and
2067 .rel.plt. We must create both sections in
2068 create_dynamic_sections, because they must be created
2069 before the linker maps input sections to output
2070 sections. The linker does that before
2071 adjust_dynamic_symbol is called, and it is that
2072 function which decides whether anything needs to go
2073 into these sections. */
2074 if (strip_section)
2075 s->flags |= SEC_EXCLUDE;
2076 continue;
2077 }
2078
2079 if ((s->flags & SEC_HAS_CONTENTS) == 0)
2080 continue;
2081
2082 /* Allocate memory for the section contents. We use bfd_zalloc
2083 here in case unused entries are not reclaimed before the
2084 section's contents are written out. This should not happen,
2085 but this way if it does, we get a R_CKCORE_NONE reloc instead
2086 of garbage. */
2087 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
2088 if (s->contents == NULL)
2089 return false;
2090 }
2091
2092 if (htab->elf.dynamic_sections_created)
2093 htab->elf.dt_pltgot_required = htab->elf.sgot->size != 0;
2094 return _bfd_elf_add_dynamic_tags (output_bfd, info, relocs);
2095 }
2096
2097 /* Finish up dynamic symbol handling. We set the contents of various
2098 dynamic sections here. */
2099
2100 static bool
2101 csky_elf_finish_dynamic_symbol (bfd *output_bfd,
2102 struct bfd_link_info *info,
2103 struct elf_link_hash_entry *h,
2104 Elf_Internal_Sym *sym)
2105 {
2106 struct csky_elf_link_hash_table *htab;
2107
2108 htab = csky_elf_hash_table (info);
2109 if (htab == NULL)
2110 return false;
2111
2112 /* Sanity check to make sure no unexpected symbol reaches here.
2113 This matches the test in csky_elf_relocate_section handling
2114 of GOT/PLT entries. */
2115 BFD_ASSERT (! (h->dynindx == -1
2116 && !h->forced_local
2117 && h->root.type != bfd_link_hash_undefweak
2118 && bfd_link_pic (info)));
2119
2120 if (h->plt.offset != (bfd_vma) -1)
2121 {
2122 bfd_vma plt_index;
2123 bfd_vma got_offset;
2124 Elf_Internal_Rela rel;
2125 bfd_byte *loc;
2126 asection *plt, *relplt, *gotplt;
2127
2128 plt = htab->elf.splt;
2129 relplt = htab->elf.srelplt;
2130 gotplt = htab->elf.sgotplt;
2131
2132 /* This symbol has an entry in the procedure linkage table. Set
2133 it up. */
2134 BFD_ASSERT (h->dynindx != -1
2135 || ((h->forced_local || bfd_link_executable (info))
2136 && h->def_regular));
2137 BFD_ASSERT (plt != NULL && gotplt != NULL && relplt != NULL);
2138 if (bfd_csky_abi (output_bfd) == CSKY_ABI_V2)
2139 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
2140 else
2141 plt_index = h->plt.offset / PLT_ENTRY_SIZE_P - 1;
2142 got_offset = (plt_index + 3) * 4;
2143
2144 /* Fill in the entry in the procedure linkage table. */
2145 if (bfd_csky_abi (output_bfd) == CSKY_ABI_V2)
2146 {
2147 csky_put_insn_32 (output_bfd, csky_elf_plt_entry_v2[0],
2148 plt->contents + h->plt.offset);
2149 csky_put_insn_32 (output_bfd,
2150 (csky_elf_plt_entry_v2[1] | plt_index),
2151 plt->contents + h->plt.offset + 4);
2152 csky_put_insn_32 (output_bfd, csky_elf_plt_entry_v2[2],
2153 plt->contents + h->plt.offset + 8);
2154 }
2155 else
2156 {
2157 int i;
2158 for (i = 0; i < 6; i++)
2159 bfd_put_16 (output_bfd, csky_elf_plt_entry_v1[i],
2160 plt->contents + h->plt.offset + i * 2);
2161 bfd_put_32 (output_bfd, plt_index,
2162 plt->contents + h->plt.offset + i * 2);
2163 }
2164
2165 /* Fill in the entry in the .rel.plt section. */
2166 rel.r_offset = (htab->elf.sgotplt->output_section->vma
2167 + htab->elf.sgotplt->output_offset
2168 + got_offset);
2169 rel.r_info = ELF32_R_INFO (h->dynindx, R_CKCORE_JUMP_SLOT);
2170 rel.r_addend = (plt->output_section->vma
2171 + plt->output_offset
2172 + h->plt.offset);
2173 loc = (htab->elf.srelplt->contents
2174 + plt_index * sizeof (Elf32_External_Rela));
2175
2176 if (loc != NULL)
2177 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
2178 if (! h->def_regular)
2179 {
2180 /* Mark the symbol as undefined, rather than as defined in
2181 the .plt section. Leave the value alone. */
2182 sym->st_shndx = SHN_UNDEF;
2183 /* If the symbol is weak, we do need to clear the value.
2184 Otherwise, the PLT entry would provide a definition for
2185 the symbol even if the symbol wasn't defined anywhere,
2186 and so the symbol would never be NULL. Leave the value if
2187 there were any relocations where pointer equality matters
2188 (this is a clue for the dynamic linker, to make function
2189 pointer comparisons work between an application and shared
2190 library). */
2191 if (!h->ref_regular_nonweak || !h->pointer_equality_needed)
2192 sym->st_value = 0;
2193 }
2194 }
2195
2196 /* Fill in the entry in the .got section. */
2197 if (h->got.offset != (bfd_vma) -1
2198 && ((csky_elf_hash_entry (h)->tls_type & GOT_TLS_GD) == 0)
2199 && ((csky_elf_hash_entry (h)->tls_type & GOT_TLS_IE) == 0))
2200 {
2201 Elf_Internal_Rela rel;
2202 bfd_byte *loc;
2203
2204 /* This symbol has an entry in the global offset table.
2205 Set it up. */
2206 BFD_ASSERT (htab->elf.sgot != NULL && htab->elf.srelgot != NULL);
2207
2208 rel.r_offset = (htab->elf.sgot->output_section->vma
2209 + htab->elf.sgot->output_offset
2210 + (h->got.offset & ~(bfd_vma) 1));
2211
2212 /* If this is a static link, or it is a -Bsymbolic link and the
2213 symbol is defined locally or was forced to be local because
2214 of a version file, we just want to emit a RELATIVE reloc.
2215 The entry in the global offset table will already have been
2216 initialized in the relocate_section function. */
2217 if (bfd_link_pic (info) && SYMBOL_REFERENCES_LOCAL (info, h))
2218 {
2219 BFD_ASSERT ((h->got.offset & 1) != 0);
2220 rel.r_info = ELF32_R_INFO (0, R_CKCORE_RELATIVE);
2221 rel.r_addend = (h->root.u.def.value
2222 + h->root.u.def.section->output_offset
2223 + h->root.u.def.section->output_section->vma);
2224 }
2225 else
2226 {
2227 BFD_ASSERT ((h->got.offset & 1) == 0);
2228 bfd_put_32 (output_bfd, (bfd_vma) 0,
2229 htab->elf.sgot->contents + h->got.offset);
2230 rel.r_info = ELF32_R_INFO (h->dynindx, R_CKCORE_GLOB_DAT);
2231 rel.r_addend = 0;
2232 }
2233
2234 loc = htab->elf.srelgot->contents;
2235 loc += htab->elf.srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
2236
2237 if (loc != NULL)
2238 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
2239 }
2240
2241 if (h->needs_copy)
2242 {
2243 asection *s;
2244 Elf_Internal_Rela rela;
2245 bfd_byte *loc;
2246
2247 /* This symbol needs a copy reloc. Set it up. */
2248 BFD_ASSERT (h->dynindx != -1
2249 && (h->root.type == bfd_link_hash_defined
2250 || h->root.type == bfd_link_hash_defweak));
2251
2252 rela.r_offset = (h->root.u.def.value
2253 + h->root.u.def.section->output_section->vma
2254 + h->root.u.def.section->output_offset);
2255 rela.r_info = ELF32_R_INFO (h->dynindx, R_CKCORE_COPY);
2256 rela.r_addend = 0;
2257 if (h->root.u.def.section == htab->elf.sdynrelro)
2258 s = htab->elf.sreldynrelro;
2259 else
2260 s = htab->elf.srelbss;
2261 BFD_ASSERT (s != NULL);
2262 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
2263 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
2264 }
2265
2266 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
2267 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
2268 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
2269 sym->st_shndx = SHN_ABS;
2270
2271 return true;
2272 }
2273
2274 /* Finish up the dynamic sections. */
2275
2276 static bool
2277 csky_elf_finish_dynamic_sections (bfd *output_bfd,
2278 struct bfd_link_info *info)
2279 {
2280 struct csky_elf_link_hash_table *htab;
2281 bfd *dynobj;
2282 asection *sdyn;
2283 asection *got_sec;
2284
2285 htab = csky_elf_hash_table (info);
2286 if (htab == NULL)
2287 return false;
2288
2289 dynobj = htab->elf.dynobj;
2290 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
2291
2292 if (htab->elf.dynamic_sections_created)
2293 {
2294 Elf32_External_Dyn *dyncon, *dynconend;
2295
2296 BFD_ASSERT (sdyn != NULL && htab->elf.sgot != NULL);
2297
2298 dyncon = (Elf32_External_Dyn *) sdyn->contents;
2299 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
2300 for (; dyncon < dynconend; dyncon++)
2301 {
2302 Elf_Internal_Dyn dyn;
2303 bool size = false;
2304 const char *name = NULL;
2305
2306 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
2307 switch (dyn.d_tag)
2308 {
2309 default:
2310 continue;
2311 case DT_RELA:
2312 name = ".rela.dyn";
2313 size = false;
2314 break;
2315 case DT_RELASZ:
2316 name = ".rela.dyn";
2317 size = true;
2318 break;
2319 case DT_PLTRELSZ:
2320 name = ".rela.plt";
2321 size = true;
2322 break;
2323 case DT_PLTGOT:
2324 dyn.d_un.d_ptr = htab->elf.sgot->output_section->vma;
2325 break;
2326 case DT_JMPREL:
2327 dyn.d_un.d_ptr = htab->elf.srelplt->output_section->vma
2328 + htab->elf.srelplt->output_offset;
2329 break;
2330 }
2331
2332 if (name != NULL)
2333 {
2334 asection *s = bfd_get_section_by_name (output_bfd, name);
2335
2336 if (s == NULL)
2337 dyn.d_un.d_val = 0;
2338 else if (!size)
2339 dyn.d_un.d_ptr = s->vma;
2340 else
2341 dyn.d_un.d_val = s->size;
2342 }
2343 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2344 }
2345 }
2346
2347 /* Fill in the first three entries in the global offset table. */
2348 if (htab->elf.sgotplt)
2349 got_sec = htab->elf.sgotplt;
2350 else
2351 got_sec = htab->elf.sgot;
2352 if (got_sec != NULL)
2353 {
2354 if (got_sec->size > 0)
2355 {
2356 bfd_put_32 (output_bfd,
2357 (sdyn == NULL ? (bfd_vma) 0
2358 : sdyn->output_section->vma + sdyn->output_offset),
2359 got_sec->contents);
2360 bfd_put_32 (output_bfd, (bfd_vma) 0, got_sec->contents + 4);
2361 bfd_put_32 (output_bfd, (bfd_vma) 0, got_sec->contents + 8);
2362 }
2363 elf_section_data (got_sec->output_section)->this_hdr.sh_entsize = 4;
2364 }
2365 return true;
2366 }
2367
2368 /* Copy the extra info we tack onto an elf_link_hash_entry. */
2369
2370 static void
2371 csky_elf_copy_indirect_symbol (struct bfd_link_info *info,
2372 struct elf_link_hash_entry *dir,
2373 struct elf_link_hash_entry *ind)
2374 {
2375 struct csky_elf_link_hash_entry *edir, *eind;
2376
2377 edir = (struct csky_elf_link_hash_entry *) dir;
2378 eind = (struct csky_elf_link_hash_entry *) ind;
2379
2380 if (ind->root.type == bfd_link_hash_indirect
2381 && dir->got.refcount <= 0)
2382 {
2383 edir->tls_type = eind->tls_type;
2384 eind->tls_type = GOT_UNKNOWN;
2385 }
2386 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
2387 }
2388
2389 /* Used to decide how to sort relocs in an optimal manner for the
2390 dynamic linker, before writing them out. */
2391
2392 static enum elf_reloc_type_class
2393 csky_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
2394 const asection *rel_sec ATTRIBUTE_UNUSED,
2395 const Elf_Internal_Rela *rela)
2396 {
2397 switch ((int) ELF32_R_TYPE (rela->r_info))
2398 {
2399 case R_CKCORE_RELATIVE:
2400 return reloc_class_relative;
2401 case R_CKCORE_JUMP_SLOT:
2402 return reloc_class_plt;
2403 case R_CKCORE_COPY:
2404 return reloc_class_copy;
2405 case R_CKCORE_IRELATIVE:
2406 return reloc_class_ifunc;
2407 default:
2408 return reloc_class_normal;
2409 }
2410 }
2411
2412 /* Return the section that should be marked against GC for a given
2413 relocation. */
2414
2415 static asection *
2416 csky_elf_gc_mark_hook (asection *sec,
2417 struct bfd_link_info *info,
2418 Elf_Internal_Rela *rel,
2419 struct elf_link_hash_entry *h,
2420 Elf_Internal_Sym *sym)
2421 {
2422 if (h != NULL)
2423 {
2424 switch (ELF32_R_TYPE (rel->r_info))
2425 {
2426 case R_CKCORE_GNU_VTINHERIT:
2427 case R_CKCORE_GNU_VTENTRY:
2428 return NULL;
2429 }
2430 }
2431
2432 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2433 }
2434
2435 /* Match symbol names created by tc-csky.c:make_mapping_symbol. */
2436
2437 static bool
2438 is_mapping_symbol_name (const char *name)
2439 {
2440 return (name && name[0] == '$'
2441 && (name[1] == 't' || name[1] == 'd')
2442 && name[2] == 0);
2443 }
2444
2445 /* Treat mapping symbols as special target symbols. */
2446
2447 static bool
2448 csky_elf_is_target_special_symbol (bfd *abfd ATTRIBUTE_UNUSED, asymbol *sym)
2449 {
2450 return is_mapping_symbol_name (sym->name);
2451 }
2452
2453 /* Exclude mapping symbols from being treated as function symbols by
2454 objdump and nm. */
2455
2456 static bfd_size_type
2457 csky_elf_maybe_function_sym (const asymbol *sym, asection *sec,
2458 bfd_vma *code_off)
2459 {
2460 if ((sym->flags & BSF_LOCAL) != 0
2461 && is_mapping_symbol_name (sym->name))
2462 return 0;
2463
2464 return _bfd_elf_maybe_function_sym (sym, sec, code_off);
2465 }
2466
2467 /* Look through the relocs for a section during the first phase.
2468 Since we don't do .gots or .plts, we just need to consider the
2469 virtual table relocs for gc. */
2470
2471 static bool
2472 csky_elf_check_relocs (bfd * abfd,
2473 struct bfd_link_info * info,
2474 asection * sec,
2475 const Elf_Internal_Rela * relocs)
2476 {
2477 Elf_Internal_Shdr * symtab_hdr;
2478 struct elf_link_hash_entry ** sym_hashes;
2479 const Elf_Internal_Rela * rel;
2480 const Elf_Internal_Rela * rel_end;
2481 struct csky_elf_link_hash_table *htab;
2482 asection *sreloc;
2483
2484 /* if output type is relocatable, return. */
2485 if (bfd_link_relocatable (info))
2486 return true;
2487
2488 htab = csky_elf_hash_table (info);
2489 if (htab == NULL)
2490 return false;
2491
2492 symtab_hdr = & elf_tdata (abfd)->symtab_hdr;
2493 sym_hashes = elf_sym_hashes (abfd);
2494
2495 rel_end = relocs + sec->reloc_count;
2496 sreloc = NULL;
2497 for (rel = relocs; rel < rel_end; rel++)
2498 {
2499 struct elf_link_hash_entry *h;
2500 unsigned long r_symndx;
2501 Elf_Internal_Sym *isym;
2502 int r_type;
2503
2504 r_symndx = ELF32_R_SYM (rel->r_info);
2505 r_type = ELF32_R_TYPE (rel->r_info);
2506 if (r_symndx < symtab_hdr->sh_info)
2507 {
2508 /* A local symbol. */
2509 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
2510 abfd, r_symndx);
2511 if (isym == NULL)
2512 return false;
2513 h = NULL;
2514 }
2515 else
2516 {
2517 isym = NULL;
2518 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2519 while (h->root.type == bfd_link_hash_indirect
2520 || h->root.type == bfd_link_hash_warning)
2521 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2522 }
2523
2524 switch (r_type)
2525 {
2526 case R_CKCORE_PCREL_IMM26BY2:
2527 case R_CKCORE_PCREL_IMM11BY2:
2528 case R_CKCORE_PCREL_JSR_IMM11BY2:
2529 case R_CKCORE_PCREL_JSR_IMM26BY2:
2530 /* If the symbol is '*UND*', means this reloc is used for
2531 * callgraph, don't need to leave to shared object. */
2532 if (r_symndx == 0)
2533 break;
2534 /* Else fall through. */
2535 case R_CKCORE_ADDR32:
2536 case R_CKCORE_ADDR_HI16:
2537 case R_CKCORE_ADDR_LO16:
2538 if (h != NULL
2539 && bfd_link_executable (info)
2540 && r_type == R_CKCORE_ADDR32
2541 && h->type == STT_OBJECT
2542 && (sec->flags & SEC_ALLOC) != 0
2543 && (sec->flags & SEC_READONLY))
2544 /* If this reloc is in a read-only section, we might
2545 need a copy reloc. We can't check reliably at this
2546 stage whether the section is read-only, as input
2547 sections have not yet been mapped to output sections.
2548 Tentatively set the flag for now, and correct in
2549 adjust_dynamic_symbol. */
2550 h->non_got_ref = 1;
2551
2552 /* If we are creating a shared library or relocatable executable,
2553 and this is a reloc against a global symbol, then we need to
2554 copy the reloc into the shared library. However, if we are
2555 linking with -Bsymbolic, we do not need to copy a reloc
2556 against a global symbol which is defined in an object we are
2557 including in the link (i.e., DEF_REGULAR is set). At
2558 this point we have not seen all the input files, so it is
2559 possible that DEF_REGULAR is not set now but will be set
2560 later (it is never cleared). We account for that possibility
2561 below by storing information in the relocs_copied field of
2562 the hash table entry. */
2563 if ((bfd_link_pic (info) && (sec->flags & SEC_ALLOC) != 0)
2564 || (!bfd_link_pic (info)
2565 && (sec->flags & SEC_ALLOC) != 0
2566 && h != NULL
2567 && (h->root.type == bfd_link_hash_defweak
2568 || !h->def_regular)))
2569 {
2570 struct elf_dyn_relocs *p;
2571 struct elf_dyn_relocs **head;
2572 /* We must copy these reloc types into the output file.
2573 Create a reloc section in dynobj and make room for
2574 this reloc. */
2575 if (sreloc == NULL)
2576 {
2577 if (htab->elf.dynobj == NULL)
2578 htab->elf.dynobj = abfd;
2579
2580 sreloc = _bfd_elf_make_dynamic_reloc_section
2581 (sec, htab->elf.dynobj, 2, abfd, true);
2582
2583 if (sreloc == NULL)
2584 return false;
2585 }
2586
2587 if (h == NULL && !use_branch_stub
2588 && ((ELF32_R_TYPE (rel->r_info)
2589 == R_CKCORE_PCREL_IMM26BY2)
2590 || (ELF32_R_TYPE (rel->r_info)
2591 == R_CKCORE_PCREL_IMM11BY2)))
2592 break;
2593
2594 /* If this is a global symbol, we count the number of
2595 relocations we need for this symbol. */
2596 if (h != NULL)
2597 {
2598 struct csky_elf_link_hash_entry *eh;
2599 eh = (struct csky_elf_link_hash_entry *)h;
2600 if ((ELF32_R_TYPE (rel->r_info)
2601 == R_CKCORE_PCREL_JSR_IMM26BY2)
2602 || (ELF32_R_TYPE (rel->r_info)
2603 == R_CKCORE_PCREL_JSR_IMM11BY2))
2604 eh->jsri2bsr_refcount += 1;
2605 head = &h->dyn_relocs;
2606 }
2607 else
2608 {
2609 /* Track dynamic relocs needed for local syms too.
2610 We really need local syms available to do this
2611 easily. Oh well. */
2612 void **vpp;
2613 asection *s;
2614 Elf_Internal_Sym *loc_isym;
2615
2616 loc_isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
2617 abfd, r_symndx);
2618 if (loc_isym == NULL)
2619 return false;
2620 s = bfd_section_from_elf_index (abfd, loc_isym->st_shndx);
2621 if (s == NULL)
2622 s = sec;
2623 vpp = &elf_section_data (s)->local_dynrel;
2624 head = (struct elf_dyn_relocs **)vpp;
2625 }
2626
2627 p = *head;
2628 if (p == NULL || p->sec != sec)
2629 {
2630 size_t amt = sizeof *p;
2631 p = ((struct elf_dyn_relocs *)
2632 bfd_alloc (htab->elf.dynobj, amt));
2633 if (p == NULL)
2634 return false;
2635 p->next = *head;
2636 *head = p;
2637 p->sec = sec;
2638 p->count = 0;
2639 p->pc_count = 0;
2640 }
2641
2642 if (ELF32_R_TYPE (rel->r_info) == R_CKCORE_PCREL_IMM26BY2
2643 || ELF32_R_TYPE (rel->r_info) == R_CKCORE_PCREL_IMM11BY2)
2644 p->pc_count += 1;
2645 p->count += 1;
2646 }
2647 break;
2648
2649 case R_CKCORE_PLT_IMM18BY4:
2650 case R_CKCORE_PLT32:
2651 /* This symbol requires a procedure linkage table entry. We
2652 actually build the entry in adjust_dynamic_symbol,
2653 because this might be a case of linking PIC code which is
2654 never referenced by a dynamic object, in which case we
2655 don't need to generate a procedure linkage table entry
2656 after all. */
2657
2658 /* If this is a local symbol, we resolve it directly without
2659 creating a procedure linkage table entry. */
2660 if (h == NULL)
2661 continue;
2662 if (ELF32_R_TYPE (rel->r_info) == R_CKCORE_PLT_IMM18BY4)
2663 check_got_overflow = 1;
2664
2665 h->needs_plt = 1;
2666 h->plt.refcount += 1;
2667 h->got.refcount += 1;
2668 ((struct csky_elf_link_hash_entry *)h)->plt_refcount += 1;
2669 break;
2670
2671 case R_CKCORE_GOT12:
2672 case R_CKCORE_PLT12:
2673 case R_CKCORE_GOT32:
2674 case R_CKCORE_GOT_HI16:
2675 case R_CKCORE_GOT_LO16:
2676 case R_CKCORE_PLT_HI16:
2677 case R_CKCORE_PLT_LO16:
2678 case R_CKCORE_GOT_IMM18BY4:
2679 case R_CKCORE_TLS_IE32:
2680 case R_CKCORE_TLS_GD32:
2681 {
2682 int tls_type, old_tls_type;
2683
2684 if (h != NULL
2685 && bfd_link_executable (info)
2686 && r_type == R_CKCORE_GOT_IMM18BY4
2687 && (sec->flags & SEC_ALLOC) != 0
2688 && (sec->flags & SEC_READONLY))
2689 /* If this reloc is in a read-only section, we might
2690 need a copy reloc. We can't check reliably at this
2691 stage whether the section is read-only, as input
2692 sections have not yet been mapped to output sections.
2693 Tentatively set the flag for now, and correct in
2694 adjust_dynamic_symbol. */
2695 h->non_got_ref = 1;
2696
2697 switch (ELF32_R_TYPE (rel->r_info))
2698 {
2699 case R_CKCORE_TLS_IE32:
2700 tls_type = GOT_TLS_IE;
2701 break;
2702 case R_CKCORE_TLS_GD32:
2703 tls_type = GOT_TLS_GD;
2704 break;
2705 default:
2706 tls_type = GOT_NORMAL;
2707 break;
2708 }
2709 if (h != NULL)
2710 {
2711 if (ELF32_R_TYPE (rel->r_info) == R_CKCORE_GOT_IMM18BY4)
2712 check_got_overflow = 1;
2713 h->got.refcount += 1;
2714 old_tls_type = csky_elf_hash_entry (h)->tls_type;
2715 }
2716 else
2717 {
2718 bfd_signed_vma *local_got_refcounts;
2719
2720 /* This is a global offset table entry for a local symbol. */
2721 /* we can write a new function named
2722 elf32_csky_allocate_local_sym_info() to replace
2723 following code. */
2724 local_got_refcounts = elf_local_got_refcounts (abfd);
2725 if (local_got_refcounts == NULL)
2726 {
2727 bfd_size_type size;
2728
2729 size = symtab_hdr->sh_info;
2730 size *= (sizeof (bfd_signed_vma) + sizeof (char));
2731 local_got_refcounts = ((bfd_signed_vma *)
2732 bfd_zalloc (abfd, size));
2733 if (local_got_refcounts == NULL)
2734 return false;
2735 elf_local_got_refcounts (abfd) = local_got_refcounts;
2736 csky_elf_local_got_tls_type (abfd)
2737 = (char *) (local_got_refcounts + symtab_hdr->sh_info);
2738 }
2739 local_got_refcounts[r_symndx] += 1;
2740 old_tls_type = csky_elf_local_got_tls_type (abfd)[r_symndx];
2741 }
2742
2743 /* We will already have issued an error message if there is a
2744 TLS / non-TLS mismatch, based on the symbol type. We don't
2745 support any linker relaxations. So just combine any TLS
2746 types needed. */
2747 if (old_tls_type != GOT_UNKNOWN && old_tls_type != GOT_NORMAL
2748 && tls_type != GOT_NORMAL)
2749 tls_type |= old_tls_type;
2750
2751 if (old_tls_type != tls_type)
2752 {
2753 if (h != NULL)
2754 csky_elf_hash_entry (h)->tls_type = tls_type;
2755 else
2756 csky_elf_local_got_tls_type (abfd)[r_symndx] = tls_type;
2757 }
2758 }
2759 /* Fall through. */
2760
2761 case R_CKCORE_TLS_LDM32:
2762 if (ELF32_R_TYPE (rel->r_info) == R_CKCORE_TLS_LDM32)
2763 htab->tls_ldm_got.refcount++;
2764 /* Fall through. */
2765
2766 case R_CKCORE_GOTOFF:
2767 case R_CKCORE_GOTPC:
2768 case R_CKCORE_GOTOFF_HI16:
2769 case R_CKCORE_GOTOFF_LO16:
2770 case R_CKCORE_GOTPC_HI16:
2771 case R_CKCORE_GOTPC_LO16:
2772 case R_CKCORE_GOTOFF_IMM18:
2773 if (htab->elf.sgot == NULL)
2774 {
2775 if (htab->elf.dynobj == NULL)
2776 htab->elf.dynobj = abfd;
2777 if (!_bfd_elf_create_got_section (htab->elf.dynobj, info))
2778 return false;
2779 }
2780 break;
2781
2782 /* This relocation describes the C++ object vtable hierarchy.
2783 Reconstruct it for later use during GC. */
2784 case R_CKCORE_GNU_VTINHERIT:
2785 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
2786 return false;
2787 break;
2788
2789 /* This relocation describes which C++ vtable entries are actually
2790 used. Record for later use during GC. */
2791 case R_CKCORE_GNU_VTENTRY:
2792 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
2793 return false;
2794 break;
2795 }
2796 }
2797
2798 return true;
2799 }
2800
2801 static const struct bfd_elf_special_section csky_elf_special_sections[]=
2802 {
2803 { STRING_COMMA_LEN (".ctors"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2804 { STRING_COMMA_LEN (".dtors"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2805 { NULL, 0, 0, 0, 0 }
2806 };
2807
2808 /* Function to keep CSKY specific flags in the ELF header. */
2809
2810 static bool
2811 csky_elf_set_private_flags (bfd * abfd, flagword flags)
2812 {
2813 BFD_ASSERT (! elf_flags_init (abfd)
2814 || elf_elfheader (abfd)->e_flags == flags);
2815
2816 elf_elfheader (abfd)->e_flags = flags;
2817 elf_flags_init (abfd) = true;
2818 return true;
2819 }
2820
2821 static csky_arch_for_merge *
2822 csky_find_arch_with_eflag (const unsigned long arch_eflag)
2823 {
2824 csky_arch_for_merge *csky_arch = NULL;
2825
2826 for (csky_arch = csky_archs; csky_arch->name != NULL; csky_arch++)
2827 if (csky_arch->arch_eflag == arch_eflag)
2828 break;
2829 if (csky_arch == NULL)
2830 {
2831 _bfd_error_handler (_("warning: unrecognized arch eflag '%#lx'"),
2832 arch_eflag);
2833 bfd_set_error (bfd_error_wrong_format);
2834 }
2835 return csky_arch;
2836 }
2837
2838 static csky_arch_for_merge *
2839 csky_find_arch_with_name (const char *name)
2840 {
2841 csky_arch_for_merge *csky_arch = NULL;
2842 const char *msg;
2843
2844 if (name == NULL)
2845 return NULL;
2846
2847 for (csky_arch = csky_archs; csky_arch->name != NULL; csky_arch++)
2848 {
2849 if (strncmp (csky_arch->name, name, strlen (csky_arch->name)) == 0)
2850 break;
2851 }
2852 if (csky_arch == NULL)
2853 {
2854 msg = _("warning: unrecognised arch name '%#x'");
2855 (*_bfd_error_handler) (msg, name);
2856 bfd_set_error (bfd_error_wrong_format);
2857 }
2858 return csky_arch;
2859 }
2860
2861 static bool
2862 elf32_csky_merge_attributes (bfd *ibfd, struct bfd_link_info *info)
2863 {
2864 bfd *obfd = info->output_bfd;
2865 obj_attribute *in_attr;
2866 obj_attribute *out_attr;
2867 obj_attribute tattr;
2868 csky_arch_for_merge *old_arch = NULL;
2869 csky_arch_for_merge *new_arch = NULL;
2870 int i;
2871 bool result = true;
2872 const char *msg = NULL;
2873
2874 const char *sec_name = get_elf_backend_data (ibfd)->obj_attrs_section;
2875
2876 /* Skip the linker stubs file. This preserves previous behavior
2877 of accepting unknown attributes in the first input file - but
2878 is that a bug? */
2879 if (ibfd->flags & BFD_LINKER_CREATED)
2880 return true;
2881
2882 /* Skip any input that hasn't attribute section.
2883 This enables to link object files without attribute section with
2884 any others. */
2885 if (bfd_get_section_by_name (ibfd, sec_name) == NULL)
2886 {
2887 return true;
2888 }
2889
2890 if (!elf_known_obj_attributes_proc (obfd)[0].i)
2891 {
2892 /* This is the first object. Copy the attributes. */
2893 out_attr = elf_known_obj_attributes_proc (obfd);
2894
2895 _bfd_elf_copy_obj_attributes (ibfd, obfd);
2896
2897 /* Use the Tag_null value to indicate the attributes have been
2898 initialized. */
2899 out_attr[0].i = 1;
2900 }
2901
2902 in_attr = elf_known_obj_attributes_proc (ibfd);
2903 out_attr = elf_known_obj_attributes_proc (obfd);
2904
2905 for (i = LEAST_KNOWN_OBJ_ATTRIBUTE; i < NUM_KNOWN_OBJ_ATTRIBUTES; i++)
2906 {
2907 /* Merge this attribute with existing attributes. */
2908 switch (i)
2909 {
2910 case Tag_CSKY_CPU_NAME:
2911 case Tag_CSKY_ARCH_NAME:
2912 /* Do arch merge. */
2913 new_arch = csky_find_arch_with_name (in_attr[Tag_CSKY_ARCH_NAME].s);
2914 old_arch = csky_find_arch_with_name (out_attr[Tag_CSKY_ARCH_NAME].s);
2915
2916 if (new_arch != NULL && old_arch != NULL)
2917 {
2918 if (new_arch->class != old_arch->class)
2919 {
2920 msg = _("%pB: machine flag conflict with target");
2921 (*_bfd_error_handler) (msg, ibfd);
2922 bfd_set_error (bfd_error_wrong_format);
2923 return false;
2924 }
2925 else if (new_arch->class_level != old_arch->class_level)
2926 {
2927 csky_arch_for_merge *newest_arch =
2928 ((new_arch->class_level > old_arch->class_level) ?
2929 new_arch : old_arch);
2930
2931 if (new_arch->do_warning || old_arch->do_warning)
2932 {
2933 msg = _("warning: file %pB's arch flag %s conflict "
2934 "with target %s,set target arch flag to %s");
2935 (*_bfd_error_handler) (msg, ibfd, new_arch->name,
2936 old_arch->name,
2937 (newest_arch->name));
2938 bfd_set_error (bfd_error_wrong_format);
2939 }
2940
2941 if (out_attr[Tag_CSKY_ARCH_NAME].s != NULL)
2942 bfd_release (obfd, out_attr[Tag_CSKY_ARCH_NAME].s);
2943
2944 out_attr[Tag_CSKY_ARCH_NAME].s =
2945 _bfd_elf_attr_strdup (obfd, newest_arch->name);
2946 }
2947 }
2948
2949 break;
2950
2951 case Tag_CSKY_ISA_FLAGS:
2952 case Tag_CSKY_ISA_EXT_FLAGS:
2953 /* Do ISA merge. */
2954 break;
2955
2956 case Tag_CSKY_VDSP_VERSION:
2957 if (out_attr[i].i == 0)
2958 out_attr[i].i = in_attr[i].i;
2959 else if (out_attr[i].i != in_attr[i].i)
2960 {
2961 _bfd_error_handler
2962 (_("Error: %pB and %pB has different VDSP version"), ibfd, obfd);
2963 result = false;
2964 }
2965 break;
2966
2967 case Tag_CSKY_FPU_VERSION:
2968 if (out_attr[i].i <= in_attr[i].i
2969 && out_attr[i].i == 0)
2970 out_attr[i].i = in_attr[i].i;
2971 break;
2972
2973 case Tag_CSKY_DSP_VERSION:
2974 if (out_attr[i].i == 0)
2975 out_attr[i].i = in_attr[i].i;
2976 else if (out_attr[i].i != in_attr[i].i)
2977 {
2978 _bfd_error_handler
2979 (_("Error: %pB and %pB has different DSP version"), ibfd, obfd);
2980 result = false;
2981 }
2982 break;
2983
2984 case Tag_CSKY_FPU_ABI:
2985 if (out_attr[i].i != in_attr[i].i
2986 && (out_attr[i].i == 0
2987 || (out_attr[i].i == VAL_CSKY_FPU_ABI_SOFT
2988 && in_attr[i].i == VAL_CSKY_FPU_ABI_SOFTFP)))
2989 {
2990 out_attr[i].i = in_attr[i].i;
2991 }
2992 else if (out_attr[i].i == VAL_CSKY_FPU_ABI_HARD
2993 && (out_attr[i].i != in_attr[i].i
2994 && in_attr[i].i != 0))
2995 {
2996 _bfd_error_handler
2997 (_("Error: %pB and %pB has different FPU ABI"), ibfd, obfd);
2998 result = false;
2999 }
3000 break;
3001
3002 default:
3003 result =
3004 result && _bfd_elf_merge_unknown_attribute_low (ibfd, obfd, i);
3005 break;
3006 }
3007
3008 /* If out_attr was copied from in_attr then it won't have a type yet. */
3009 if (in_attr[i].type && !out_attr[i].type)
3010 out_attr[i].type = in_attr[i].type;
3011 }
3012
3013 /* Merge Tag_compatibility attributes and any common GNU ones. */
3014 if (!_bfd_elf_merge_object_attributes (ibfd, info))
3015 return false;
3016
3017 /* Check for any attributes not known on CSKY. */
3018 result &= _bfd_elf_merge_unknown_attribute_list (ibfd, obfd);
3019
3020 return result;
3021 }
3022
3023 /* Merge backend specific data from an object file to the output
3024 object file when linking. */
3025
3026 static bool
3027 csky_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
3028 {
3029 bfd *obfd = info->output_bfd;
3030 flagword old_flags;
3031 flagword new_flags;
3032 csky_arch_for_merge *old_arch = NULL;
3033 csky_arch_for_merge *new_arch = NULL;
3034 flagword newest_flag = 0;
3035 const char *sec_name;
3036 obj_attribute *out_attr;
3037
3038 /* Check if we have the same endianness. */
3039 if (! _bfd_generic_verify_endian_match (ibfd, info))
3040 return false;
3041
3042 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
3043 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
3044 return true;
3045
3046 /* Merge ".csky.attribute" section. */
3047 if (!elf32_csky_merge_attributes (ibfd, info))
3048 return false;
3049
3050 if (! elf_flags_init (obfd))
3051 {
3052 /* First call, no flags set. */
3053 elf_flags_init (obfd) = true;
3054 }
3055
3056 /* Try to merge e_flag. */
3057 new_flags = elf_elfheader (ibfd)->e_flags;
3058 old_flags = elf_elfheader (obfd)->e_flags;
3059 out_attr = elf_known_obj_attributes_proc (obfd);
3060
3061 /* The flags like "e , f ,g ..." , we take collection. */
3062 newest_flag = old_flags | new_flags;
3063
3064 sec_name = get_elf_backend_data (ibfd)->obj_attrs_section;
3065
3066 if (bfd_get_section_by_name (ibfd, sec_name) == NULL
3067 || (new_flags & (CSKY_ARCH_MASK | CSKY_ABI_MASK) !=
3068 old_flags & (CSKY_ARCH_MASK | CSKY_ABI_MASK)))
3069 {
3070 /* Input BFDs have no ".csky.attribute" section. */
3071 new_arch = csky_find_arch_with_eflag (new_flags & CSKY_ARCH_MASK);
3072 old_arch = csky_find_arch_with_name (out_attr[Tag_CSKY_ARCH_NAME].s);
3073
3074 if (new_arch != NULL && old_arch != NULL)
3075 {
3076 if (new_arch->class != old_arch->class)
3077 {
3078 _bfd_error_handler
3079 /* xgettext:c-format */
3080 (_("%pB: machine flag conflict with target"), ibfd);
3081 bfd_set_error (bfd_error_wrong_format);
3082 return false;
3083 }
3084 else if (new_arch->class_level != old_arch->class_level)
3085 {
3086 csky_arch_for_merge *newest_arch =
3087 (new_arch->class_level > old_arch->class_level
3088 ? new_arch : old_arch);
3089
3090 if (new_arch->do_warning || old_arch->do_warning)
3091 {
3092 _bfd_error_handler
3093 /* xgettext:c-format */
3094 (_("warning: file %pB's arch flag %s conflicts with "
3095 "target ck%s, using %s"),
3096 ibfd, new_arch->name, old_arch->name,
3097 newest_arch->name);
3098 bfd_set_error (bfd_error_wrong_format);
3099 }
3100
3101 if (out_attr[Tag_CSKY_ARCH_NAME].s != NULL)
3102 bfd_release (obfd, out_attr[Tag_CSKY_ARCH_NAME].s);
3103
3104 out_attr[Tag_CSKY_ARCH_NAME].s =
3105 _bfd_elf_attr_strdup (obfd, newest_arch->name);
3106 }
3107 }
3108 else
3109 {
3110 if (new_arch && new_arch->name != NULL)
3111 out_attr[Tag_CSKY_ARCH_NAME].s =
3112 _bfd_elf_attr_strdup (obfd, new_arch->name);
3113 }
3114 }
3115
3116 elf_elfheader (obfd)->e_flags = newest_flag;
3117
3118 return true;
3119 }
3120
3121 /* Ignore the discarded relocs in special sections in link time. */
3122
3123 static bool
3124 csky_elf_ignore_discarded_relocs (asection *sec)
3125 {
3126 if (strcmp (sec->name, ".csky_stack_size") == 0)
3127 return true;
3128 return false;
3129 }
3130
3131 /* .csky_stack_size are not referenced directly. This pass marks all of
3132 them as required. */
3133
3134 static bool
3135 elf32_csky_gc_mark_extra_sections (struct bfd_link_info *info,
3136 elf_gc_mark_hook_fn gc_mark_hook ATTRIBUTE_UNUSED)
3137 {
3138 bfd *sub;
3139
3140 _bfd_elf_gc_mark_extra_sections (info, gc_mark_hook);
3141
3142 for (sub = info->input_bfds; sub != NULL; sub = sub->link.next)
3143 {
3144 asection *o;
3145
3146 for (o = sub->sections; o != NULL; o = o->next)
3147 if (strcmp (o->name, ".csky_stack_size") == 0)
3148 o->gc_mark = 1;
3149 }
3150
3151 return true;
3152 }
3153
3154 /* The linker repeatedly calls this function for each input section,
3155 in the order that input sections are linked into output sections.
3156 Build lists of input sections to determine groupings between which
3157 we may insert linker stubs. */
3158
3159 void
3160 elf32_csky_next_input_section (struct bfd_link_info *info,
3161 asection *isec)
3162 {
3163 struct csky_elf_link_hash_table *htab = csky_elf_hash_table (info);
3164 if (htab == NULL)
3165 return;
3166 if (isec->output_section->index <= htab->top_index)
3167 {
3168 asection **list = htab->input_list + isec->output_section->index;
3169
3170 if (*list != bfd_abs_section_ptr)
3171 {
3172 /* Steal the link_sec pointer for our list. */
3173 #define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
3174 /* This happens to make the list in reverse order,
3175 which we reverse later in group_sections. */
3176 PREV_SEC (isec) = *list;
3177 *list = isec;
3178 }
3179 }
3180 }
3181
3182 /* See whether we can group stub sections together. Grouping stub
3183 sections may result in fewer stubs. More importantly, we need to
3184 put all .init* and .fini* stubs at the end of the .init or
3185 .fini output sections respectively, because glibc splits the
3186 _init and _fini functions into multiple parts. Putting a stub in
3187 the middle of a function is not a good idea. */
3188
3189 static void
3190 group_sections (struct csky_elf_link_hash_table *htab,
3191 bfd_size_type stub_group_size,
3192 bool stubs_always_after_branch)
3193 {
3194 asection **list = htab->input_list;
3195
3196 do
3197 {
3198 asection *tail = *list;
3199 asection *head;
3200
3201 if (tail == bfd_abs_section_ptr)
3202 continue;
3203
3204 /* Reverse the list: we must avoid placing stubs at the
3205 beginning of the section because the beginning of the text
3206 section may be required for an interrupt vector in bare metal
3207 code. */
3208 #define NEXT_SEC PREV_SEC
3209 head = NULL;
3210 while (tail != NULL)
3211 {
3212 /* Pop from tail. */
3213 asection *item = tail;
3214 tail = PREV_SEC (item);
3215
3216 /* Push on head. */
3217 NEXT_SEC (item) = head;
3218 head = item;
3219 }
3220
3221 while (head != NULL)
3222 {
3223 asection *curr;
3224 asection *next;
3225 bfd_vma stub_group_start = head->output_offset;
3226 bfd_vma end_of_next;
3227
3228 curr = head;
3229 while (NEXT_SEC (curr) != NULL)
3230 {
3231 next = NEXT_SEC (curr);
3232 end_of_next = next->output_offset + next->size;
3233 if (end_of_next - stub_group_start >= stub_group_size)
3234 /* End of NEXT is too far from start, so stop. */
3235 break;
3236 curr = next;
3237 }
3238
3239 /* OK, the size from the start to the start of CURR is less
3240 * than stub_group_size and thus can be handled by one stub
3241 * section. (Or the head section is itself larger than
3242 * stub_group_size, in which case we may be toast.)
3243 * We should really be keeping track of the total size of
3244 * stubs added here, as stubs contribute to the final output
3245 * section size. */
3246 do
3247 {
3248 next = NEXT_SEC (head);
3249 /* Set up this stub group. */
3250 htab->stub_group[head->id].link_sec = curr;
3251 }
3252 while (head != curr && (head = next) != NULL);
3253
3254 /* But wait, there's more! Input sections up to stub_group_size
3255 * bytes after the stub section can be handled by it too. */
3256 if (!stubs_always_after_branch)
3257 {
3258 stub_group_start = curr->output_offset + curr->size;
3259
3260 while (next != NULL)
3261 {
3262 end_of_next = next->output_offset + next->size;
3263 if (end_of_next - stub_group_start >= stub_group_size)
3264 /* End of NEXT is too far from stubs, so stop. */
3265 break;
3266 /* Add NEXT to the stub group. */
3267 head = next;
3268 next = NEXT_SEC (head);
3269 htab->stub_group[head->id].link_sec = curr;
3270 }
3271 }
3272 head = next;
3273 }
3274 }
3275 while (list++ != htab->input_list + htab->top_index);
3276
3277 free (htab->input_list);
3278 #undef PREV_SEC
3279 #undef NEXT_SEC
3280 }
3281
3282 /* If the symbol referenced by bsr is defined in shared object file,
3283 or it is a weak symbol and we aim to create shared object file,
3284 we must create a stub for this bsr. */
3285
3286 static bool
3287 sym_must_create_stub (struct elf_link_hash_entry *h,
3288 struct bfd_link_info *info)
3289 {
3290 if (h != NULL
3291 && ((h->def_dynamic && !h->def_regular)
3292 || (bfd_link_pic (info) && h->root.type == bfd_link_hash_defweak)))
3293 return true;
3294 else
3295 return false;
3296 }
3297
3298 /* Calculate the template, template size and instruction size for a stub.
3299 Return value is the instruction size. */
3300
3301 static unsigned int
3302 find_stub_size_and_template (enum elf32_csky_stub_type stub_type,
3303 const insn_sequence **stub_template,
3304 int *stub_template_size)
3305 {
3306 const insn_sequence *template_sequence = NULL;
3307 int template_size = 0;
3308 int i;
3309 unsigned int size;
3310
3311 template_sequence = stub_definitions[stub_type].template_sequence;
3312 template_size = stub_definitions[stub_type].template_size;
3313
3314 size = 0;
3315 for (i = 0; i < template_size; i++)
3316 {
3317 switch (template_sequence[i].type)
3318 {
3319 case INSN16:
3320 size += 2;
3321 break;
3322
3323 case INSN32:
3324 case DATA_TYPE:
3325 size += 4;
3326 break;
3327
3328 default:
3329 BFD_FAIL ();
3330 return false;
3331 }
3332 }
3333
3334 if (stub_template)
3335 *stub_template = template_sequence;
3336 if (stub_template_size)
3337 *stub_template_size = template_size;
3338
3339 return size;
3340 }
3341
3342 /* As above, but don't actually build the stub. Just bump offset so
3343 we know stub section sizes. */
3344
3345 static bool
3346 csky_size_one_stub (struct bfd_hash_entry *gen_entry,
3347 void * in_arg ATTRIBUTE_UNUSED)
3348 {
3349 struct elf32_csky_stub_hash_entry *stub_entry;
3350 const insn_sequence *template_sequence = NULL;
3351 int template_size = 0;
3352 int size = 0;
3353
3354 /* Massage our args to the form they really have. */
3355 stub_entry = (struct elf32_csky_stub_hash_entry *) gen_entry;
3356
3357 BFD_ASSERT (stub_entry->stub_type > csky_stub_none
3358 && stub_entry->stub_type < ARRAY_SIZE (stub_definitions));
3359 size = find_stub_size_and_template (stub_entry->stub_type,
3360 &template_sequence, &template_size);
3361 stub_entry->stub_size = size;
3362 stub_entry->stub_template = template_sequence;
3363 stub_entry->stub_template_size = template_size;
3364
3365 size = (size + 7) & ~7;
3366 stub_entry->stub_sec->size += size;
3367 return true;
3368 }
3369
3370 /* Add a new stub entry to the stub hash. Not all fields of the new
3371 stub entry are initialised. */
3372
3373 static struct elf32_csky_stub_hash_entry *
3374 elf32_csky_add_stub (const char *stub_name,
3375 asection *section,
3376 struct csky_elf_link_hash_table *htab)
3377 {
3378 asection *link_sec;
3379 asection *stub_sec;
3380 struct elf32_csky_stub_hash_entry *stub_entry;
3381
3382 stub_sec = elf32_csky_create_or_find_stub_sec (&link_sec, section, htab);
3383 if (stub_sec == NULL)
3384 return NULL;
3385
3386 /* Enter this entry into the linker stub hash table. */
3387 stub_entry = csky_stub_hash_lookup (&htab->stub_hash_table, stub_name,
3388 true, false);
3389 if (stub_entry == NULL)
3390 {
3391 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
3392 section->owner, stub_name);
3393 return NULL;
3394 }
3395
3396 stub_entry->stub_sec = stub_sec;
3397 stub_entry->stub_offset = 0;
3398 stub_entry->id_sec = link_sec;
3399
3400 return stub_entry;
3401 }
3402
3403 /* Determine and set the size of the stub section for a final link.
3404 The basic idea here is to examine all the relocations looking for
3405 PC-relative calls to a target that is unreachable with a "bsr"
3406 instruction. */
3407
3408 bool
3409 elf32_csky_size_stubs (bfd *output_bfd,
3410 bfd *stub_bfd,
3411 struct bfd_link_info *info,
3412 bfd_signed_vma group_size,
3413 asection *(*add_stub_section) (const char*, asection*),
3414 void (*layout_sections_again) (void))
3415 {
3416 bfd_size_type stub_group_size;
3417 bool stubs_always_after_branch;
3418 struct csky_elf_link_hash_table *htab = csky_elf_hash_table (info);
3419
3420 if (htab == NULL)
3421 return false;
3422
3423 /* Propagate mach to stub bfd, because it may not have been
3424 finalized when we created stub_bfd. */
3425 bfd_set_arch_mach (stub_bfd, bfd_get_arch (output_bfd),
3426 bfd_get_mach (output_bfd));
3427
3428 /* Stash our params away. */
3429 htab->stub_bfd = stub_bfd;
3430 htab->add_stub_section = add_stub_section;
3431 htab->layout_sections_again = layout_sections_again;
3432 stubs_always_after_branch = group_size < 0;
3433
3434 if (group_size < 0)
3435 stub_group_size = -group_size;
3436 else
3437 stub_group_size = group_size;
3438
3439 if (stub_group_size == 1)
3440 /* The 'bsr' range in abiv2 is +-64MB has to be used as the
3441 default maximum size.
3442 This value is 128K less than that, which allows for 131072
3443 byte stubs. If we exceed that, then we will fail to link.
3444 The user will have to relink with an explicit group size
3445 option. */
3446 stub_group_size = 66977792;
3447
3448 group_sections (htab, stub_group_size, stubs_always_after_branch);
3449
3450 while (1)
3451 {
3452 bfd *input_bfd;
3453 unsigned int bfd_indx;
3454 asection *stub_sec;
3455 bool stub_changed = false;
3456
3457 for (input_bfd = info->input_bfds, bfd_indx = 0;
3458 input_bfd != NULL;
3459 input_bfd = input_bfd->link.next, bfd_indx++)
3460 {
3461 Elf_Internal_Shdr *symtab_hdr;
3462 asection *section;
3463 Elf_Internal_Sym *local_syms = NULL;
3464
3465 /* We'll need the symbol table in a second. */
3466 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3467 if (symtab_hdr->sh_info == 0)
3468 continue;
3469
3470 /* Walk over each section attached to the input bfd. */
3471 for (section = input_bfd->sections;
3472 section != NULL;
3473 section = section->next)
3474 {
3475 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
3476
3477 /* If there aren't any relocs, then there's nothing more
3478 * to do. */
3479 if ((section->flags & SEC_RELOC) == 0
3480 || section->reloc_count == 0
3481 || (section->flags & SEC_CODE) == 0)
3482 continue;
3483
3484 /* If this section is a link-once section that will be
3485 discarded, then don't create any stubs. */
3486 if (section->output_section == NULL
3487 || section->output_section->owner != output_bfd)
3488 continue;
3489
3490 /* Get the relocs. */
3491 internal_relocs = _bfd_elf_link_read_relocs (input_bfd,
3492 section,
3493 NULL, NULL,
3494 info->keep_memory);
3495
3496 if (internal_relocs == NULL)
3497 goto error_ret_free_local;
3498
3499 /* Now examine each relocation. */
3500 irela = internal_relocs;
3501 irelaend = irela + section->reloc_count;
3502 for (; irela < irelaend; irela++)
3503 {
3504 unsigned int r_type, r_indx;
3505 enum elf32_csky_stub_type stub_type;
3506 struct elf32_csky_stub_hash_entry *stub_entry;
3507 asection *sym_sec;
3508 bfd_vma sym_value;
3509 bfd_vma destination;
3510 struct csky_elf_link_hash_entry *hash;
3511 const char *sym_name;
3512 char *stub_name;
3513 const asection *id_sec;
3514 unsigned char st_type;
3515
3516 r_type = ELF32_R_TYPE (irela->r_info);
3517 r_indx = ELF32_R_SYM (irela->r_info);
3518 if (r_type >= (unsigned int) R_CKCORE_MAX)
3519 {
3520 bfd_set_error (bfd_error_bad_value);
3521 error_ret_free_internal:
3522 if (elf_section_data (section)->relocs == NULL)
3523 free (internal_relocs);
3524 goto error_ret_free_local;
3525 }
3526
3527 /* Only look for stubs on branch instructions. */
3528 if (r_type != (unsigned int) R_CKCORE_PCREL_IMM26BY2)
3529 continue;
3530 /* Now determine the call target, its name, value,
3531 section. */
3532 sym_sec = NULL;
3533 sym_value = 0;
3534 destination = 0;
3535 hash = NULL;
3536 sym_name = NULL;
3537 if (r_indx < symtab_hdr->sh_info)
3538 {
3539 /* It's a local symbol. */
3540 Elf_Internal_Sym *sym;
3541 Elf_Internal_Shdr *hdr;
3542 if (local_syms == NULL)
3543 local_syms =
3544 (Elf_Internal_Sym *) symtab_hdr->contents;
3545 if (local_syms == NULL)
3546 {
3547 local_syms =
3548 bfd_elf_get_elf_syms (input_bfd,
3549 symtab_hdr,
3550 symtab_hdr->sh_info,
3551 0, NULL, NULL, NULL);
3552 if (local_syms == NULL)
3553 goto error_ret_free_internal;
3554 }
3555 sym = local_syms + r_indx;
3556 hdr = elf_elfsections (input_bfd)[sym->st_shndx];
3557 sym_sec = hdr->bfd_section;
3558 if (!sym_sec)
3559 /* This is an undefined symbol. It can never
3560 be resolved. */
3561 continue;
3562 if (ELF_ST_TYPE (sym->st_info) != STT_SECTION)
3563 sym_value = sym->st_value;
3564 destination = (sym_value + irela->r_addend
3565 + sym_sec->output_offset
3566 + sym_sec->output_section->vma);
3567 st_type = ELF_ST_TYPE (sym->st_info);
3568 sym_name =
3569 bfd_elf_string_from_elf_section (input_bfd,
3570 symtab_hdr->sh_link,
3571 sym->st_name);
3572 }
3573 else
3574 {
3575 /* It's an external symbol. */
3576 int e_indx;
3577 e_indx = r_indx - symtab_hdr->sh_info;
3578 hash = ((struct csky_elf_link_hash_entry *)
3579 elf_sym_hashes (input_bfd)[e_indx]);
3580
3581 while (hash->elf.root.type == bfd_link_hash_indirect
3582 || hash->elf.root.type == bfd_link_hash_warning)
3583 hash = ((struct csky_elf_link_hash_entry *)
3584 hash->elf.root.u.i.link);
3585 if (hash->elf.root.type == bfd_link_hash_defined
3586 || hash->elf.root.type == bfd_link_hash_defweak)
3587 {
3588 sym_sec = hash->elf.root.u.def.section;
3589 sym_value = hash->elf.root.u.def.value;
3590
3591 struct csky_elf_link_hash_table *globals =
3592 csky_elf_hash_table (info);
3593 /* FIXME For a destination in a shared library. */
3594 if (globals->elf.splt != NULL && hash != NULL
3595 && hash->elf.plt.offset != (bfd_vma) -1)
3596 continue;
3597 else if (sym_sec->output_section != NULL)
3598 destination = (sym_value + irela->r_addend
3599 + sym_sec->output_offset
3600 + sym_sec->output_section->vma);
3601 }
3602 else if (hash->elf.root.type == bfd_link_hash_undefined
3603 || (hash->elf.root.type
3604 == bfd_link_hash_undefweak))
3605 /* FIXME For a destination in a shared library. */
3606 continue;
3607 else
3608 {
3609 bfd_set_error (bfd_error_bad_value);
3610 goto error_ret_free_internal;
3611 }
3612 st_type = ELF_ST_TYPE (hash->elf.type);
3613 sym_name = hash->elf.root.root.string;
3614 }
3615 do
3616 {
3617 /* Determine what (if any) linker stub is needed. */
3618 stub_type = csky_type_of_stub (info, section, irela,
3619 st_type, hash,
3620 destination, sym_sec,
3621 input_bfd, sym_name);
3622 if (stub_type == csky_stub_none)
3623 break;
3624
3625 /* Support for grouping stub sections. */
3626 id_sec = htab->stub_group[section->id].link_sec;
3627
3628 /* Get the name of this stub. */
3629 stub_name = elf32_csky_stub_name (id_sec, sym_sec, hash,
3630 irela);
3631 if (!stub_name)
3632 goto error_ret_free_internal;
3633 /* We've either created a stub for this reloc already,
3634 or we are about to. */
3635 stub_entry
3636 = csky_stub_hash_lookup (&htab->stub_hash_table,
3637 stub_name,
3638 false, false);
3639 if (stub_entry != NULL)
3640 {
3641 /* The proper stub has already been created. */
3642 free (stub_name);
3643 stub_entry->target_value = sym_value;
3644 break;
3645 }
3646 stub_entry = elf32_csky_add_stub (stub_name, section,
3647 htab);
3648 if (stub_entry == NULL)
3649 {
3650 free (stub_name);
3651 goto error_ret_free_internal;
3652 }
3653 stub_entry->target_value = sym_value;
3654 stub_entry->target_section = sym_sec;
3655 stub_entry->stub_type = stub_type;
3656 stub_entry->h = hash;
3657 stub_entry->st_type = st_type;
3658
3659 if (sym_name == NULL)
3660 sym_name = "unnamed";
3661 stub_entry->output_name =
3662 bfd_alloc (htab->stub_bfd,
3663 (sizeof (STUB_ENTRY_NAME)
3664 + strlen (sym_name)));
3665 if (stub_entry->output_name == NULL)
3666 {
3667 free (stub_name);
3668 goto error_ret_free_internal;
3669 }
3670 sprintf (stub_entry->output_name, STUB_ENTRY_NAME,
3671 sym_name);
3672 stub_changed = true;
3673 }
3674 while (0);
3675 }
3676 /* We're done with the internal relocs, free them. */
3677 if (elf_section_data (section)->relocs == NULL)
3678 free (internal_relocs);
3679 }
3680 }
3681 if (!stub_changed)
3682 break;
3683 /* OK, we've added some stubs. Find out the new size of the
3684 stub sections. */
3685 for (stub_sec = htab->stub_bfd->sections;
3686 stub_sec != NULL;
3687 stub_sec = stub_sec->next)
3688 {
3689 /* Ignore non-stub sections. */
3690 if (!strstr (stub_sec->name, STUB_SUFFIX))
3691 continue;
3692 stub_sec->size = 0;
3693 }
3694 bfd_hash_traverse (&htab->stub_hash_table, csky_size_one_stub, htab);
3695 /* Ask the linker to do its stuff. */
3696 (*htab->layout_sections_again) ();
3697 }
3698
3699 return true;
3700 error_ret_free_local:
3701 return false;
3702 }
3703
3704 static bool
3705 csky_build_one_stub (struct bfd_hash_entry *gen_entry,
3706 void * in_arg)
3707 {
3708 #define MAXRELOCS 2
3709 struct elf32_csky_stub_hash_entry *stub_entry;
3710 struct bfd_link_info *info;
3711 asection *stub_sec;
3712 bfd *stub_bfd;
3713 bfd_byte *loc;
3714 bfd_vma sym_value;
3715 int template_size;
3716 int size;
3717 const insn_sequence *template_sequence;
3718 int i;
3719 struct csky_elf_link_hash_table * globals;
3720 int stub_reloc_idx[MAXRELOCS] = {-1, -1};
3721 int stub_reloc_offset[MAXRELOCS] = {0, 0};
3722 int nrelocs = 0;
3723 struct elf_link_hash_entry *h = NULL;
3724
3725 /* Massage our args to the form they really have. */
3726 stub_entry = (struct elf32_csky_stub_hash_entry *)gen_entry;
3727 info = (struct bfd_link_info *) in_arg;
3728
3729 /* Fail if the target section could not be assigned to an output
3730 section. The user should fix his linker script. */
3731 if (stub_entry->target_section->output_section == NULL
3732 && info->non_contiguous_regions)
3733 info->callbacks->einfo (_("%F%P: Could not assign `%pA' to an output section. "
3734 "Retry without --enable-non-contiguous-regions.\n"),
3735 stub_entry->target_section);
3736
3737 globals = csky_elf_hash_table (info);
3738 if (globals == NULL)
3739 return false;
3740 stub_sec = stub_entry->stub_sec;
3741
3742 /* Make a note of the offset within the stubs for this entry. */
3743 stub_entry->stub_offset = stub_sec->size;
3744 loc = stub_sec->contents + stub_entry->stub_offset;
3745
3746 stub_bfd = stub_sec->owner;
3747
3748 /* This is the address of the stub destination. */
3749 h = &stub_entry->h->elf;
3750 if (sym_must_create_stub (h, info)
3751 && !(bfd_link_pic (info)
3752 && h->root.type == bfd_link_hash_defweak
3753 && h->def_regular
3754 && !h->def_dynamic))
3755 sym_value = 0;
3756 else
3757 sym_value = (stub_entry->target_value
3758 + stub_entry->target_section->output_offset
3759 + stub_entry->target_section->output_section->vma);
3760
3761 template_sequence = stub_entry->stub_template;
3762 template_size = stub_entry->stub_template_size;
3763
3764 size = 0;
3765 for (i = 0; i < template_size; i++)
3766 switch (template_sequence[i].type)
3767 {
3768 case INSN16:
3769 bfd_put_16 (stub_bfd, (bfd_vma) template_sequence[i].data,
3770 loc + size);
3771 size += 2;
3772 break;
3773 case INSN32:
3774 csky_put_insn_32 (stub_bfd, (bfd_vma) template_sequence[i].data,
3775 loc + size);
3776 size += 4;
3777 break;
3778 case DATA_TYPE:
3779 bfd_put_32 (stub_bfd, (bfd_vma) template_sequence[i].data,
3780 loc + size);
3781 stub_reloc_idx[nrelocs] = i;
3782 stub_reloc_offset[nrelocs++] = size;
3783 size += 4;
3784 break;
3785 default:
3786 BFD_FAIL ();
3787 return false;
3788 }
3789 stub_sec->size += size;
3790
3791 /* Stub size has already been computed in csky_size_one_stub. Check
3792 consistency. */
3793 BFD_ASSERT (size == stub_entry->stub_size);
3794
3795 /* Assume there is at least one and at most MAXRELOCS entries to relocate
3796 in each stub. */
3797 BFD_ASSERT (nrelocs != 0 && nrelocs <= MAXRELOCS);
3798
3799 for (i = 0; i < nrelocs; i++)
3800 {
3801 if (sym_must_create_stub (h, info))
3802 {
3803 Elf_Internal_Rela outrel;
3804 asection * sreloc = globals->elf.srelgot;
3805
3806 outrel.r_offset = stub_entry->stub_offset + stub_reloc_offset[i];
3807 outrel.r_info =
3808 ELF32_R_INFO (h->dynindx,
3809 template_sequence[stub_reloc_idx[i]].r_type);
3810 outrel.r_addend = template_sequence[stub_reloc_idx[i]].reloc_addend;
3811
3812 loc = sreloc->contents;
3813 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
3814
3815 if (loc != NULL)
3816 bfd_elf32_swap_reloca_out (info->output_bfd, &outrel, loc);
3817 }
3818 _bfd_final_link_relocate (elf32_csky_howto_from_type
3819 (template_sequence[stub_reloc_idx[i]].r_type),
3820 stub_bfd, stub_sec, stub_sec->contents,
3821 stub_entry->stub_offset + stub_reloc_offset[i],
3822 sym_value + stub_entry->target_addend,
3823 template_sequence[stub_reloc_idx[i]].reloc_addend);
3824 }
3825
3826 return true;
3827 #undef MAXRELOCS
3828 }
3829
3830 /* Build all the stubs associated with the current output file. The
3831 stubs are kept in a hash table attached to the main linker hash
3832 table. We also set up the .plt entries for statically linked PIC
3833 functions here. This function is called via arm_elf_finish in the
3834 linker. */
3835
3836 bool
3837 elf32_csky_build_stubs (struct bfd_link_info *info)
3838 {
3839 asection *stub_sec;
3840 struct bfd_hash_table *table;
3841 struct csky_elf_link_hash_table *htab;
3842
3843 htab = csky_elf_hash_table (info);
3844
3845 if (htab == NULL)
3846 return false;
3847
3848 for (stub_sec = htab->stub_bfd->sections;
3849 stub_sec != NULL;
3850 stub_sec = stub_sec->next)
3851 {
3852 bfd_size_type size;
3853
3854 /* Ignore non-stub sections. */
3855 if (!strstr (stub_sec->name, STUB_SUFFIX))
3856 continue;
3857
3858 /* Allocate memory to hold the linker stubs. */
3859 size = stub_sec->size;
3860 stub_sec->contents = bfd_zalloc (htab->stub_bfd, size);
3861 if (stub_sec->contents == NULL && size != 0)
3862 return false;
3863 stub_sec->size = 0;
3864 }
3865
3866 /* Build the stubs as directed by the stub hash table. */
3867 table = &htab->stub_hash_table;
3868 bfd_hash_traverse (table, csky_build_one_stub, info);
3869
3870 return true;
3871 }
3872
3873 /* Set up various things so that we can make a list of input sections
3874 for each output section included in the link. Returns -1 on error,
3875 0 when no stubs will be needed, and 1 on success. */
3876
3877 int
3878 elf32_csky_setup_section_lists (bfd *output_bfd,
3879 struct bfd_link_info *info)
3880 {
3881 bfd *input_bfd;
3882 unsigned int bfd_count;
3883 unsigned int top_id, top_index;
3884 asection *section;
3885 asection **input_list, **list;
3886 size_t amt;
3887 struct csky_elf_link_hash_table *htab = csky_elf_hash_table (info);
3888
3889 if (!htab)
3890 return 0;
3891
3892 /* Count the number of input BFDs and find the top input section id. */
3893 for (input_bfd = info->input_bfds, bfd_count = 0, top_id = 0;
3894 input_bfd != NULL;
3895 input_bfd = input_bfd->link.next)
3896 {
3897 bfd_count += 1;
3898 for (section = input_bfd->sections;
3899 section != NULL;
3900 section = section->next)
3901 if (top_id < section->id)
3902 top_id = section->id;
3903 }
3904 htab->bfd_count = bfd_count;
3905 amt = sizeof (struct map_stub) * (top_id + 1);
3906 htab->stub_group = bfd_zmalloc (amt);
3907 if (htab->stub_group == NULL)
3908 return -1;
3909
3910 /* We can't use output_bfd->section_count here to find the top output
3911 section index as some sections may have been removed, and
3912 _bfd_strip_section_from_output doesn't renumber the indices. */
3913 for (section = output_bfd->sections, top_index = 0;
3914 section != NULL;
3915 section = section->next)
3916 if (top_index < section->index)
3917 top_index = section->index;
3918 htab->top_index = top_index;
3919 amt = sizeof (asection *) * (top_index + 1);
3920 input_list = bfd_malloc (amt);
3921 htab->input_list = input_list;
3922 if (input_list == NULL)
3923 return -1;
3924 /* For sections we aren't interested in, mark their entries with a
3925 value we can check later. */
3926 list = input_list + top_index;
3927 do
3928 *list = bfd_abs_section_ptr;
3929 while (list-- != input_list);
3930 for (section = output_bfd->sections;
3931 section != NULL;
3932 section = section->next)
3933 if ((section->flags & SEC_CODE) != 0)
3934 input_list[section->index] = NULL;
3935
3936 return 1;
3937 }
3938
3939 static bfd_reloc_status_type
3940 csky_relocate_contents (reloc_howto_type *howto,
3941 bfd *input_bfd,
3942 bfd_vma relocation,
3943 bfd_byte *location)
3944 {
3945 int size;
3946 bfd_vma x = 0;
3947 bfd_reloc_status_type flag;
3948 unsigned int rightshift = howto->rightshift;
3949 unsigned int bitpos = howto->bitpos;
3950
3951 if (howto->negate)
3952 relocation = -relocation;
3953
3954 /* FIXME: these macros should be defined at file head or head file head. */
3955 #define CSKY_INSN_ADDI_TO_SUBI 0x04000000
3956 #define CSKY_INSN_MOV_RTB 0xc41d4820 /* mov32 rx, r29, 0 */
3957 #define CSKY_INSN_MOV_RDB 0xc41c4820 /* mov32 rx, r28, 0 */
3958 #define CSKY_INSN_GET_ADDI_RZ(x) (((x) & 0x03e00000) >> 21)
3959 #define CSKY_INSN_SET_MOV_RZ(x) ((x) & 0x0000001f)
3960 #define CSKY_INSN_JSRI_TO_LRW 0xea9a0000
3961 #define CSKY_INSN_JSR_R26 0xe8fa0000
3962
3963 /* Get the value we are going to relocate. */
3964 size = bfd_get_reloc_size (howto);
3965 switch (size)
3966 {
3967 default:
3968 case 0:
3969 abort ();
3970 case 1:
3971 x = bfd_get_8 (input_bfd, location);
3972 break;
3973 case 2:
3974 x = bfd_get_16 (input_bfd, location);
3975 break;
3976 case 4:
3977 if (need_reverse_bits)
3978 {
3979 x = csky_get_insn_32 (input_bfd, location);
3980
3981 if (R_CKCORE_DOFFSET_LO16 == howto->type)
3982 {
3983 if ((bfd_signed_vma) relocation < 0)
3984 {
3985 x |= CSKY_INSN_ADDI_TO_SUBI;
3986 relocation = -relocation;
3987 }
3988 else if (0 == relocation)
3989 x = (CSKY_INSN_MOV_RDB |
3990 CSKY_INSN_SET_MOV_RZ (CSKY_INSN_GET_ADDI_RZ (x)));
3991 }
3992 else if (R_CKCORE_TOFFSET_LO16 == howto->type)
3993 {
3994 if ((bfd_signed_vma) relocation < 0)
3995 {
3996 x |= CSKY_INSN_ADDI_TO_SUBI;
3997 relocation = -relocation;
3998 }
3999 else if (0 == relocation)
4000 x = (CSKY_INSN_MOV_RTB |
4001 CSKY_INSN_SET_MOV_RZ (CSKY_INSN_GET_ADDI_RZ (x)));
4002 }
4003 }
4004 else
4005 x = bfd_get_32 (input_bfd, location);
4006 break;
4007 }
4008 /* Check for overflow. FIXME: We may drop bits during the addition
4009 which we don't check for. We must either check at every single
4010 operation, which would be tedious, or we must do the computations
4011 in a type larger than bfd_vma, which would be inefficient. */
4012 flag = bfd_reloc_ok;
4013 if (howto->complain_on_overflow != complain_overflow_dont)
4014 {
4015 bfd_vma addrmask;
4016 bfd_vma fieldmask;
4017 bfd_vma signmask;
4018 bfd_vma ss;
4019 bfd_vma a;
4020 bfd_vma b;
4021 bfd_vma sum;
4022 /* Get the values to be added together. For signed and unsigned
4023 relocations, we assume that all values should be truncated to
4024 the size of an address. For bitfields, all the bits matter.
4025 See also bfd_check_overflow. */
4026 #define N_ONES(n) (((((bfd_vma) 1 << ((n) - 1)) - 1) << 1) | 1)
4027 fieldmask = N_ONES (howto->bitsize);
4028 signmask = ~fieldmask;
4029 addrmask = N_ONES (bfd_arch_bits_per_address (input_bfd)) | fieldmask;
4030 a = (relocation & addrmask) >> rightshift;
4031 if (read_content_substitute)
4032 x = read_content_substitute;
4033 b = (x & howto->src_mask & addrmask) >> bitpos;
4034
4035 switch (howto->complain_on_overflow)
4036 {
4037 case complain_overflow_signed:
4038 /* If any sign bits are set, all sign bits must be set.
4039 That is, A must be a valid negative address after
4040 shifting. */
4041 signmask = ~(fieldmask >> 1);
4042 /* Fall through. */
4043
4044 case complain_overflow_bitfield:
4045 /* Much like the signed check, but for a field one bit
4046 wider. We allow a bitfield to represent numbers in the
4047 range -2**n to 2**n-1, where n is the number of bits in the
4048 field. Note that when bfd_vma is 32 bits, a 32-bit reloc
4049 can't overflow, which is exactly what we want. */
4050 ss = a & signmask;
4051 if (ss != 0 && ss != ((addrmask >> rightshift) & signmask))
4052 flag = bfd_reloc_overflow;
4053 /* We only need this next bit of code if the sign bit of B
4054 is below the sign bit of A. This would only happen if
4055 SRC_MASK had fewer bits than BITSIZE. Note that if
4056 SRC_MASK has more bits than BITSIZE, we can get into
4057 trouble; we would need to verify that B is in range, as
4058 we do for A above. */
4059 ss = ((~howto->src_mask) >> 1) & howto->src_mask;
4060 ss >>= bitpos;
4061
4062 /* Set all the bits above the sign bit. */
4063 b = (b ^ ss) - ss;
4064
4065 /* Now we can do the addition. */
4066 sum = a + b;
4067
4068 /* See if the result has the correct sign. Bits above the
4069 sign bit are junk now; ignore them. If the sum is
4070 positive, make sure we did not have all negative inputs;
4071 if the sum is negative, make sure we did not have all
4072 positive inputs. The test below looks only at the sign
4073 bits, and it really just
4074 SIGN (A) == SIGN (B) && SIGN (A) != SIGN (SUM)
4075
4076 We mask with addrmask here to explicitly allow an address
4077 wrap-around. The Linux kernel relies on it, and it is
4078 the only way to write assembler code which can run when
4079 loaded at a location 0x80000000 away from the location at
4080 which it is linked. */
4081
4082 if (((~(a ^ b)) & (a ^ sum)) & signmask & addrmask)
4083 flag = bfd_reloc_overflow;
4084 break;
4085 case complain_overflow_unsigned:
4086 /* Checking for an unsigned overflow is relatively easy:
4087 trim the addresses and add, and trim the result as well.
4088 Overflow is normally indicated when the result does not
4089 fit in the field. However, we also need to consider the
4090 case when, e.g., fieldmask is 0x7fffffff or smaller, an
4091 input is 0x80000000, and bfd_vma is only 32 bits; then we
4092 will get sum == 0, but there is an overflow, since the
4093 inputs did not fit in the field. Instead of doing a
4094 separate test, we can check for this by or-ing in the
4095 operands when testing for the sum overflowing its final
4096 field. */
4097 sum = (a + b) & addrmask;
4098 if ((a | b | sum) & signmask)
4099 flag = bfd_reloc_overflow;
4100 break;
4101 default:
4102 abort ();
4103 }
4104
4105 }
4106 /* Put RELOCATION in the right bits. */
4107 relocation >>= rightshift;
4108
4109 if ((howto->type == R_CKCORE_DOFFSET_LO16
4110 || howto->type == R_CKCORE_TOFFSET_LO16)
4111 && relocation == 0)
4112 /* Do nothing lsli32 rx, rz, 0. */
4113 ;
4114 else
4115 {
4116 /* Fir V1, all this relocation must be x -1. */
4117 if (howto->type == R_CKCORE_PCREL_IMM11BY2
4118 || howto->type == R_CKCORE_PCREL_JSR_IMM11BY2
4119 || howto->type == R_CKCORE_DOFFSET_LO16
4120 || howto->type == R_CKCORE_TOFFSET_LO16)
4121 relocation -= 1;
4122 else if (howto->type == R_CKCORE_PCREL_IMM7BY4)
4123 relocation = (relocation & 0x1f) + ((relocation << 3) & 0x300);
4124 else if (howto->type == R_CKCORE_PCREL_FLRW_IMM8BY4)
4125 relocation
4126 = ((relocation << 4) & 0xf0) + ((relocation << 17) & 0x1e00000);
4127 else if (howto->type == R_CKCORE_NOJSRI)
4128 {
4129 x = (x & howto->dst_mask) | CSKY_INSN_JSRI_TO_LRW;
4130 relocation = 0;
4131 csky_put_insn_32 (input_bfd, CSKY_INSN_JSR_R26, location + 4);
4132 }
4133
4134 relocation <<= bitpos;
4135 /* Add RELOCATION to the right bits of X. */
4136 x = ((x & ~howto->dst_mask)
4137 | (((x & howto->src_mask) + relocation) & howto->dst_mask));
4138 }
4139 /* Put the relocated value back in the object file. */
4140 switch (size)
4141 {
4142 default:
4143 abort ();
4144 case 1:
4145 bfd_put_8 (input_bfd, x, location);
4146 break;
4147 case 2:
4148 bfd_put_16 (input_bfd, x, location);
4149 break;
4150 case 4:
4151 if (need_reverse_bits)
4152 csky_put_insn_32 (input_bfd, x, location);
4153 else
4154 bfd_put_32 (input_bfd, x, location);
4155 break;
4156 }
4157 return flag;
4158 }
4159
4160 /* Look up an entry in the stub hash. Stub entries are cached because
4161 creating the stub name takes a bit of time. */
4162
4163 static struct elf32_csky_stub_hash_entry *
4164 elf32_csky_get_stub_entry (const asection *input_section,
4165 const asection *sym_sec,
4166 struct elf_link_hash_entry *hash,
4167 const Elf_Internal_Rela *rel,
4168 struct csky_elf_link_hash_table *htab)
4169 {
4170 struct elf32_csky_stub_hash_entry *stub_entry;
4171 struct csky_elf_link_hash_entry *h
4172 = (struct csky_elf_link_hash_entry *) hash;
4173 const asection *id_sec;
4174
4175 if ((input_section->flags & SEC_CODE) == 0)
4176 return NULL;
4177
4178 /* If this input section is part of a group of sections sharing one
4179 stub section, then use the id of the first section in the group.
4180 Stub names need to include a section id, as there may well be
4181 more than one stub used to reach say, printf, and we need to
4182 distinguish between them. */
4183 id_sec = htab->stub_group[input_section->id].link_sec;
4184 if (h != NULL && h->stub_cache != NULL
4185 && h->stub_cache->h == h && h->stub_cache->id_sec == id_sec)
4186 stub_entry = h->stub_cache;
4187 else
4188 {
4189 char *stub_name;
4190 stub_name = elf32_csky_stub_name (id_sec, sym_sec, h, rel);
4191 if (stub_name == NULL)
4192 return NULL;
4193 stub_entry = csky_stub_hash_lookup (&htab->stub_hash_table,
4194 stub_name, false, false);
4195 if (h != NULL)
4196 h->stub_cache = stub_entry;
4197 free (stub_name);
4198 }
4199
4200 return stub_entry;
4201 }
4202
4203 static bfd_reloc_status_type
4204 csky_final_link_relocate (reloc_howto_type *howto,
4205 bfd *input_bfd,
4206 asection *input_section,
4207 bfd_byte *contents,
4208 bfd_vma address,
4209 bfd_vma value,
4210 bfd_vma addend)
4211 {
4212 bfd_vma relocation;
4213
4214 /* Sanity check the address. */
4215 if (address > bfd_get_section_limit (input_bfd, input_section))
4216 return bfd_reloc_outofrange;
4217
4218 /* This function assumes that we are dealing with a basic relocation
4219 against a symbol. We want to compute the value of the symbol to
4220 relocate to. This is just VALUE, the value of the symbol,
4221 plus ADDEND, any addend associated with the reloc. */
4222 relocation = value + addend;
4223
4224 /* If the relocation is PC relative, we want to set RELOCATION to
4225 the distance between the symbol (currently in RELOCATION) and the
4226 location we are relocating. Some targets (e.g., i386-aout)
4227 arrange for the contents of the section to be the negative of the
4228 offset of the location within the section; for such targets
4229 pcrel_offset is FALSE. Other targets (e.g., m88kbcs or ELF)
4230 simply leave the contents of the section as zero; for such
4231 targets pcrel_offset is TRUE. If pcrel_offset is FALSE we do not
4232 need to subtract out the offset of the location within the
4233 section (which is just ADDRESS). */
4234 if (howto->pc_relative)
4235 {
4236 relocation -= (input_section->output_section->vma
4237 + input_section->output_offset);
4238 if (howto->pcrel_offset)
4239 relocation -= address;
4240 }
4241
4242 return csky_relocate_contents (howto, input_bfd, relocation,
4243 contents + address);
4244
4245 }
4246
4247 /* Return the base VMA address which should be subtracted from real addresses
4248 when resolving @dtpoff relocation.
4249 This is PT_TLS segment p_vaddr. */
4250
4251 static bfd_vma
4252 dtpoff_base (struct bfd_link_info *info)
4253 {
4254 /* If tls_sec is NULL, we should have signalled an error already. */
4255 if (elf_hash_table (info)->tls_sec == NULL)
4256 return 0;
4257 return elf_hash_table (info)->tls_sec->vma;
4258 }
4259
4260 /* Return the relocation value for @tpoff relocation
4261 if STT_TLS virtual address is ADDRESS. */
4262
4263 static bfd_vma
4264 tpoff (struct bfd_link_info *info, bfd_vma address)
4265 {
4266 struct elf_link_hash_table *htab = elf_hash_table (info);
4267 bfd_vma base;
4268
4269 /* If tls_sec is NULL, we should have signalled an error already. */
4270 if (htab->tls_sec == NULL)
4271 return 0;
4272 base = align_power ((bfd_vma) TCB_SIZE, htab->tls_sec->alignment_power);
4273 return address - htab->tls_sec->vma + base;
4274 }
4275
4276 /* Relocate a csky section. */
4277
4278 static int
4279 csky_elf_relocate_section (bfd * output_bfd,
4280 struct bfd_link_info * info,
4281 bfd * input_bfd,
4282 asection * input_section,
4283 bfd_byte * contents,
4284 Elf_Internal_Rela * relocs,
4285 Elf_Internal_Sym * local_syms,
4286 asection ** local_sections)
4287 {
4288 Elf_Internal_Shdr *symtab_hdr;
4289 struct elf_link_hash_entry **sym_hashes;
4290 Elf_Internal_Rela *rel;
4291 Elf_Internal_Rela *relend;
4292 const char *name;
4293 bool ret = true;
4294 struct csky_elf_link_hash_table * htab;
4295 bfd_vma *local_got_offsets = elf_local_got_offsets (input_bfd);
4296
4297 htab = csky_elf_hash_table (info);
4298 if (htab == NULL)
4299 return false;
4300
4301 symtab_hdr = & elf_symtab_hdr (input_bfd);
4302 sym_hashes = elf_sym_hashes (input_bfd);
4303
4304 rel = relocs;
4305 relend = relocs + input_section->reloc_count;
4306 for (; rel < relend; rel++)
4307 {
4308 enum elf_csky_reloc_type r_type
4309 = (enum elf_csky_reloc_type) ELF32_R_TYPE (rel->r_info);
4310 unsigned long r_symndx;
4311 reloc_howto_type *howto;
4312 Elf_Internal_Sym *sym;
4313 asection *sec;
4314 bfd_vma relocation;
4315 bfd_vma off;
4316 struct elf_link_hash_entry * h;
4317 bfd_vma addend = (bfd_vma)rel->r_addend;
4318 bfd_reloc_status_type r = bfd_reloc_ok;
4319 bool unresolved_reloc = false;
4320 int do_final_relocate = true;
4321 bool relative_reloc = false;
4322 bfd_signed_vma disp;
4323
4324 /* Ignore these relocation types:
4325 R_CKCORE_GNU_VTINHERIT, R_CKCORE_GNU_VTENTRY. */
4326 if (r_type == R_CKCORE_GNU_VTINHERIT || r_type == R_CKCORE_GNU_VTENTRY)
4327 continue;
4328
4329 if ((unsigned) r_type >= (unsigned) R_CKCORE_MAX)
4330 {
4331 /* The r_type is error, not support it. */
4332 /* xgettext:c-format */
4333 _bfd_error_handler (_("%pB: unsupported relocation type: %#x"),
4334 input_bfd, r_type);
4335 bfd_set_error (bfd_error_bad_value);
4336 ret = false;
4337 continue;
4338 }
4339
4340 howto = &csky_elf_howto_table[(int) r_type];
4341
4342 r_symndx = ELF32_R_SYM(rel->r_info);
4343 h = NULL;
4344 sym = NULL;
4345 sec = NULL;
4346 unresolved_reloc = false;
4347
4348 if (r_symndx < symtab_hdr->sh_info)
4349 {
4350 /* Get symbol table entry. */
4351 sym = local_syms + r_symndx;
4352 sec = local_sections[r_symndx];
4353 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
4354 addend = (bfd_vma)rel->r_addend;
4355 }
4356 else
4357 {
4358 bool warned, ignored;
4359
4360 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4361 r_symndx, symtab_hdr, sym_hashes,
4362 h, sec, relocation,
4363 unresolved_reloc, warned, ignored);
4364 }
4365
4366 if (sec != NULL && discarded_section (sec))
4367 {
4368 /* For relocs against symbols from removed linkonce sections,
4369 or sections discarded by a linker script, we just want the
4370 section contents zeroed. Avoid any special processing.
4371 And if the symbol is referenced in '.csky_stack_size' section,
4372 set the address to SEC_DISCARDED(0xffffffff). */
4373 #if 0
4374 /* The .csky_stack_size section is just for callgraph. */
4375 if (strcmp (input_section->name, ".csky_stack_size") == 0)
4376 {
4377 /* FIXME: it should define in head file. */
4378 #define SEC_DISCARDED 0xffffffff
4379 bfd_put_32 (input_bfd, SEC_DISCARDED, contents + rel->r_offset);
4380 rel->r_info = 0;
4381 rel->r_addend = 0;
4382 continue;
4383 }
4384 else
4385 #endif
4386 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
4387 rel, 1, relend, howto, 0,
4388 contents);
4389 }
4390
4391 if (bfd_link_relocatable (info))
4392 continue;
4393
4394 read_content_substitute = 0;
4395
4396 /* Final link. */
4397 disp = (relocation
4398 + (bfd_signed_vma) addend
4399 - input_section->output_section->vma
4400 - input_section->output_offset
4401 - rel->r_offset);
4402 /* It is for ck8xx. */
4403 #define CSKY_INSN_BSR32 0xe0000000
4404 /* It is for ck5xx/ck6xx. */
4405 #define CSKY_INSN_BSR16 0xf800
4406 #define within_range(x, L) (-(1 << (L - 1)) < (x) && (x) < (1 << (L -1)) - 2)
4407 switch (howto->type)
4408 {
4409 case R_CKCORE_PCREL_IMM18BY2:
4410 /* When h is NULL, means the instruction written as
4411 grs rx, imm32
4412 if the highest bit is set, prevent the high 32bits
4413 turn to 0xffffffff when signed extern in 64bit
4414 host machine. */
4415 if (h == NULL && (addend & 0x80000000))
4416 addend &= 0xffffffff;
4417 break;
4418
4419 case R_CKCORE_PCREL32:
4420 break;
4421
4422 case R_CKCORE_GOT12:
4423 case R_CKCORE_PLT12:
4424 case R_CKCORE_GOT_HI16:
4425 case R_CKCORE_GOT_LO16:
4426 case R_CKCORE_PLT_HI16:
4427 case R_CKCORE_PLT_LO16:
4428 case R_CKCORE_GOT32:
4429 case R_CKCORE_GOT_IMM18BY4:
4430 /* Relocation is to the entry for this symbol in the global
4431 offset table. */
4432 BFD_ASSERT (htab->elf.sgot != NULL);
4433 if (h != NULL)
4434 {
4435 /* Global symbol is defined by other modules. */
4436 bool dyn;
4437 off = h->got.offset;
4438 dyn = htab->elf.dynamic_sections_created;
4439 if (!WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
4440 bfd_link_pic (info), h)
4441 || (bfd_link_pic (info) && SYMBOL_REFERENCES_LOCAL (info,h))
4442 || (ELF_ST_VISIBILITY(h->other)
4443 && h->root.type == bfd_link_hash_undefweak))
4444 {
4445 /* This is actually a static link, or it is a
4446 -Bsymbolic link and the symbol is defined
4447 locally, or the symbol was forced to be local
4448 because of a version file. We must initialize
4449 this entry in the global offset table. Since the
4450 offset must always be a multiple of 4, we use the
4451 least significant bit to record whether we have
4452 initialized it already.
4453 When doing a dynamic link, we create a .rela.dyn
4454 relocation entry to initialize the value. This
4455 is done in the finish_dynamic_symbol routine. FIXME */
4456 if (off & 1)
4457 off &= ~1;
4458 else
4459 {
4460 bfd_put_32 (output_bfd, relocation,
4461 htab->elf.sgot->contents + off);
4462 h->got.offset |= 1;
4463
4464 /* TRUE if relative relocation should be generated. GOT reference to
4465 global symbol in PIC will lead to dynamic symbol. It becomes a
4466 problem when "time" or "times" is defined as a variable in an
4467 executable, clashing with functions of the same name in libc. If a
4468 symbol isn't undefined weak symbol, don't make it dynamic in PIC and
4469 generate relative relocation. */
4470 #define GENERATE_RELATIVE_RELOC_P(INFO, H) \
4471 ((H)->dynindx == -1 \
4472 && !(H)->forced_local \
4473 && (H)->root.type != bfd_link_hash_undefweak \
4474 && bfd_link_pic (INFO))
4475
4476 if (GENERATE_RELATIVE_RELOC_P (info, h))
4477 /* If this symbol isn't dynamic
4478 in PIC, generate R_CKCORE_RELATIVE here. */
4479 relative_reloc = true;
4480 }
4481 }
4482 else
4483 unresolved_reloc = false;
4484 } /* End if h != NULL. */
4485 else
4486 {
4487 BFD_ASSERT (local_got_offsets != NULL);
4488 off = local_got_offsets[r_symndx];
4489
4490 /* The offset must always be a multiple of 4. We use
4491 the least significant bit to record whether we have
4492 already generated the necessary reloc. */
4493 if (off & 1)
4494 off &= ~1;
4495 else
4496 {
4497 bfd_put_32 (output_bfd, relocation,
4498 htab->elf.sgot->contents + off);
4499 local_got_offsets[r_symndx] |= 1;
4500 if (bfd_link_pic (info))
4501 relative_reloc = true;
4502 }
4503 }
4504 if (relative_reloc)
4505 {
4506 asection *srelgot;
4507 Elf_Internal_Rela outrel;
4508 bfd_byte *loc;
4509
4510 srelgot = htab->elf.srelgot;
4511 BFD_ASSERT (srelgot != NULL);
4512
4513 outrel.r_offset
4514 = (htab->elf.sgot->output_section->vma
4515 + htab->elf.sgot->output_offset + off);
4516 outrel.r_info = ELF32_R_INFO (0, R_CKCORE_RELATIVE);
4517 outrel.r_addend = relocation;
4518 loc = srelgot->contents;
4519 loc += (srelgot->reloc_count++ * sizeof (Elf32_External_Rela));
4520 if (loc != NULL)
4521 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4522 }
4523 relocation = htab->elf.sgot->output_offset + off;
4524 break;
4525
4526 case R_CKCORE_GOTOFF_IMM18:
4527 case R_CKCORE_GOTOFF:
4528 case R_CKCORE_GOTOFF_HI16:
4529 case R_CKCORE_GOTOFF_LO16:
4530 /* Relocation is relative to the start of the global offset
4531 table. */
4532 /* Note that sgot->output_offset is not involved in this
4533 calculation. We always want the start of .got. If we
4534 defined _GLOBAL_OFFSET_TABLE in a different way, as is
4535 permitted by the ABI, we might have to change this
4536 calculation. */
4537 relocation -= htab->elf.sgot->output_section->vma;
4538 break;
4539
4540 case R_CKCORE_GOTPC:
4541 case R_CKCORE_GOTPC_HI16:
4542 case R_CKCORE_GOTPC_LO16:
4543 /* Use global offset table as symbol value. */
4544 relocation = htab->elf.sgot->output_section->vma;
4545 addend = -addend;
4546 unresolved_reloc = false;
4547 break;
4548
4549 case R_CKCORE_DOFFSET_IMM18:
4550 case R_CKCORE_DOFFSET_IMM18BY2:
4551 case R_CKCORE_DOFFSET_IMM18BY4:
4552 {
4553 asection *sdata = bfd_get_section_by_name (output_bfd, ".data");
4554 relocation -= sdata->output_section->vma;
4555 }
4556 break;
4557
4558 case R_CKCORE_DOFFSET_LO16:
4559 {
4560 asection *sdata = bfd_get_section_by_name (output_bfd, ".data");
4561 relocation -= sdata->output_section->vma;
4562 }
4563 break;
4564
4565 case R_CKCORE_TOFFSET_LO16:
4566 {
4567 asection *stext = bfd_get_section_by_name (output_bfd, ".text");
4568 if (stext)
4569 relocation -= stext->output_section->vma;
4570 }
4571 break;
4572
4573 case R_CKCORE_PLT_IMM18BY4:
4574 case R_CKCORE_PLT32:
4575 /* Relocation is to the entry for this symbol in the
4576 procedure linkage table. */
4577
4578 /* Resolve a PLT32 reloc against a local symbol directly,
4579 without using the procedure linkage table. */
4580 if (h == NULL)
4581 break;
4582
4583 if (h->plt.offset == (bfd_vma) -1 || htab->elf.splt == NULL)
4584 {
4585 /* We didn't make a PLT entry for this symbol. This
4586 happens when statically linking PIC code, or when
4587 using -Bsymbolic. */
4588 if (h->got.offset != (bfd_vma) -1)
4589 {
4590 bool dyn;
4591
4592 off = h->got.offset;
4593 dyn = htab->elf.dynamic_sections_created;
4594 if (!WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
4595 bfd_link_pic (info), h)
4596 || (bfd_link_pic (info)
4597 && SYMBOL_REFERENCES_LOCAL (info, h))
4598 || (ELF_ST_VISIBILITY (h->other)
4599 && h->root.type == bfd_link_hash_undefweak))
4600 {
4601 /* This is actually a static link, or it is a
4602 -Bsymbolic link and the symbol is defined
4603 locally, or the symbol was forced to be local
4604 because of a version file. We must initialize
4605 this entry in the global offset table. Since the
4606 offset must always be a multiple of 4, we use the
4607 least significant bit to record whether we have
4608 initialized it already.
4609
4610 When doing a dynamic link, we create a .rela.dyn
4611 relocation entry to initialize the value. This
4612 is done in the finish_dynamic_symbol routine.
4613 FIXME! */
4614 if (off & 1)
4615 off &= ~1;
4616 else
4617 {
4618 h->got.offset |= 1;
4619 if (GENERATE_RELATIVE_RELOC_P (info, h))
4620 relative_reloc = true;
4621 }
4622 }
4623 bfd_put_32 (output_bfd, relocation,
4624 htab->elf.sgot->contents + off);
4625
4626 if (relative_reloc)
4627 {
4628 asection *srelgot;
4629 Elf_Internal_Rela outrel;
4630 bfd_byte *loc;
4631
4632 srelgot = htab->elf.srelgot;
4633 BFD_ASSERT (srelgot != NULL);
4634
4635 outrel.r_offset
4636 = (htab->elf.sgot->output_section->vma
4637 + htab->elf.sgot->output_offset + off);
4638 outrel.r_info = ELF32_R_INFO (0, R_CKCORE_RELATIVE);
4639 outrel.r_addend = relocation;
4640 loc = srelgot->contents;
4641 loc += (srelgot->reloc_count++
4642 * sizeof (Elf32_External_Rela));
4643 if (loc != NULL)
4644 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4645 }
4646 relocation = off + htab->elf.sgot->output_offset;
4647 }
4648 break;
4649 }
4650 /* The relocation is the got offset. */
4651 if (bfd_csky_abi (output_bfd) == CSKY_ABI_V2)
4652 relocation = (h->plt.offset / PLT_ENTRY_SIZE + 2) * 4;
4653 else
4654 relocation = (h->plt.offset / PLT_ENTRY_SIZE_P + 2) * 4;
4655 unresolved_reloc = false;
4656 break;
4657
4658 case R_CKCORE_PCREL_IMM26BY2:
4659 case R_CKCORE_PCREL_JSR_IMM26BY2:
4660 case R_CKCORE_PCREL_JSR_IMM11BY2:
4661 case R_CKCORE_PCREL_IMM11BY2:
4662 case R_CKCORE_CALLGRAPH:
4663 /* Emit callgraph information first. */
4664 /* TODO: deal with callgraph. */
4665 if (ELF32_R_TYPE (rel->r_info) == R_CKCORE_CALLGRAPH)
4666 break;
4667 /* Some reloc need further handling. */
4668 /* h == NULL means the symbol is a local symbol,
4669 r_symndx == 0 means the symbol is 'ABS' and
4670 the relocation is already handled in assemble,
4671 here just use for callgraph. */
4672 /* TODO: deal with callgraph. */
4673 if (h == NULL && r_symndx == 0)
4674 {
4675 do_final_relocate = false;
4676 break;
4677 }
4678
4679 /* Ignore weak references to undefined symbols. */
4680 if (h != NULL && h->root.type == bfd_link_hash_undefweak)
4681 {
4682 do_final_relocate = false;
4683 break;
4684 }
4685
4686 /* Using branch stub. */
4687 if (use_branch_stub == true
4688 && ELF32_R_TYPE (rel->r_info) == R_CKCORE_PCREL_IMM26BY2)
4689 {
4690 struct elf32_csky_stub_hash_entry *stub_entry = NULL;
4691 if (sym_must_create_stub (h, info))
4692 stub_entry = elf32_csky_get_stub_entry (input_section,
4693 input_section,
4694 h, rel, htab);
4695 else if (disp > BSR_MAX_FWD_BRANCH_OFFSET
4696 || disp < BSR_MAX_BWD_BRANCH_OFFSET)
4697 stub_entry = elf32_csky_get_stub_entry (input_section,
4698 input_section,
4699 h, rel, htab);
4700 if (stub_entry != NULL)
4701 relocation
4702 = (stub_entry->stub_offset
4703 + stub_entry->stub_sec->output_offset
4704 + stub_entry->stub_sec->output_section->vma);
4705 break;
4706 }
4707
4708 else if (h == NULL
4709 || (h->root.type == bfd_link_hash_defined
4710 && h->dynindx == -1)
4711 || ((h->def_regular && !h->def_dynamic)
4712 && (h->root.type != bfd_link_hash_defweak
4713 || ! bfd_link_pic (info))))
4714 {
4715 if (ELF32_R_TYPE (rel->r_info) == R_CKCORE_PCREL_JSR_IMM26BY2)
4716 {
4717 if (within_range (disp, 26))
4718 {
4719 /* In range for BSR32. */
4720 howto = &csky_elf_howto_table[R_CKCORE_PCREL_IMM26BY2];
4721 read_content_substitute = CSKY_INSN_BSR32;
4722 }
4723 else if (bfd_csky_arch (output_bfd) == CSKY_ARCH_810)
4724 /* if bsr32 cannot reach, generate
4725 "lrw r25, label; jsr r25" instead of
4726 jsri label. */
4727 howto = &csky_elf_howto_table[R_CKCORE_NOJSRI];
4728 } /* if ELF32_R_TYPE (rel->r_info)... */
4729 else if (ELF32_R_TYPE (rel->r_info)
4730 == R_CKCORE_PCREL_JSR_IMM11BY2)
4731 {
4732 if (within_range (disp, 11))
4733 {
4734 /* In range for BSR16. */
4735 howto = &csky_elf_howto_table[R_CKCORE_PCREL_IMM11BY2];
4736 read_content_substitute = CSKY_INSN_BSR16;
4737 }
4738 }
4739 break;
4740 } /* else if h == NULL... */
4741
4742 else if (bfd_csky_arch (output_bfd) == CSKY_ARCH_810
4743 && (ELF32_R_TYPE (rel->r_info)
4744 == R_CKCORE_PCREL_JSR_IMM26BY2))
4745 {
4746 howto = &csky_elf_howto_table[R_CKCORE_NOJSRI];
4747 break;
4748 }
4749 /* Other situation, h->def_dynamic == 1,
4750 undefined_symbol when output file is shared object, etc. */
4751 /* Else fall through. */
4752
4753 case R_CKCORE_ADDR_HI16:
4754 case R_CKCORE_ADDR_LO16:
4755 if (bfd_link_pic (info)
4756 || (!bfd_link_pic (info)
4757 && h != NULL
4758 && h->dynindx != -1
4759 && !h->non_got_ref
4760 && ((h->def_dynamic && !h->def_regular)
4761 || (htab->elf.dynamic_sections_created
4762 && (h->root.type == bfd_link_hash_undefweak
4763 || h->root.type == bfd_link_hash_undefined
4764 || h->root.type == bfd_link_hash_indirect)))))
4765 {
4766 Elf_Internal_Rela outrel;
4767 bool skip, relocate;
4768 bfd_byte *loc;
4769
4770 /* When generating a shared object, these relocations
4771 are copied into the output file to be resolved at
4772 run time. */
4773 skip = false;
4774 relocate = false;
4775
4776 outrel.r_offset =
4777 _bfd_elf_section_offset (output_bfd, info, input_section,
4778 rel->r_offset);
4779 if (outrel.r_offset == (bfd_vma) -1)
4780 skip = true;
4781 else if (outrel.r_offset == (bfd_vma) -2)
4782 {
4783 skip = true;
4784 relocate = true;
4785 }
4786 outrel.r_offset += (input_section->output_section->vma
4787 + input_section->output_offset);
4788 if (skip)
4789 memset (&outrel, 0, sizeof (outrel));
4790 else if (h != NULL
4791 && h->dynindx != -1
4792 && (!bfd_link_pic (info)
4793 || (!SYMBOLIC_BIND (info, h)
4794 && h->root.type == bfd_link_hash_defweak)
4795 || !h->def_regular))
4796 {
4797 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
4798 outrel.r_addend = rel->r_addend;
4799 }
4800 else
4801 {
4802 /* This symbol is local, or marked to become local. */
4803 relocate = true;
4804 outrel.r_info = ELF32_R_INFO (0, r_type);
4805 outrel.r_addend = relocation + rel->r_addend;
4806 }
4807 loc = htab->elf.srelgot->contents;
4808 loc += (htab->elf.srelgot->reloc_count++
4809 * sizeof (Elf32_External_Rela));
4810
4811 if (loc != NULL)
4812 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4813
4814 /* If this reloc is against an external symbol, we do not
4815 want to diddle with the addend. Otherwise, we need to
4816 include the symbol value so that it becomes an addend
4817 for the dynamic reloc. */
4818 if (!relocate)
4819 continue;
4820 } /* if bfd_link_pic (info) ... */
4821 break;
4822
4823 case R_CKCORE_ADDR32:
4824 /* r_symndx will be zero only for relocs against symbols
4825 from removed linkonce sections, or sections discarded
4826 by a linker script.
4827 This relocation don't nedd to handle, the value will
4828 be set to SEC_DISCARDED(0xffffffff). */
4829 if (r_symndx == 0
4830 && strcmp (sec->name, ".csky_stack_size") == 0)
4831 {
4832 do_final_relocate = false;
4833 break;
4834 }
4835 if (r_symndx >= symtab_hdr->sh_info
4836 && h->non_got_ref
4837 && bfd_link_executable (info))
4838 break;
4839
4840 if (r_symndx == 0 || (input_section->flags & SEC_ALLOC) == 0)
4841 break;
4842
4843 if (bfd_link_pic (info)
4844 || (h != NULL
4845 && h->dynindx != -1
4846 && ((h->def_dynamic && !h->def_regular)
4847 || (htab->elf.dynamic_sections_created
4848 && (h->root.type == bfd_link_hash_undefweak
4849 || h->root.type == bfd_link_hash_undefined
4850 || h->root.type == bfd_link_hash_indirect)))))
4851 {
4852 Elf_Internal_Rela outrel;
4853 bool skip, relocate;
4854 bfd_byte *loc;
4855
4856 /* When generating a shared object, these relocations
4857 are copied into the output file to be resolved at
4858 run time. */
4859 skip = false;
4860 relocate = false;
4861
4862 outrel.r_offset =
4863 _bfd_elf_section_offset (output_bfd, info, input_section,
4864 rel->r_offset);
4865
4866 if (outrel.r_offset == (bfd_vma) -1)
4867 skip = true;
4868 else if (outrel.r_offset == (bfd_vma) -2)
4869 {
4870 skip = true;
4871 relocate = true;
4872 }
4873
4874 outrel.r_offset += (input_section->output_section->vma
4875 + input_section->output_offset);
4876
4877 if (skip)
4878 memset (&outrel, 0, sizeof (outrel));
4879 else if (h != NULL
4880 && h->dynindx != -1
4881 && (!bfd_link_pic (info)
4882 || (!SYMBOLIC_BIND (info, h)
4883 && h->root.type == bfd_link_hash_defweak)
4884 || !h->def_regular))
4885 {
4886 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
4887 outrel.r_addend = rel->r_addend;
4888 }
4889 else
4890 {
4891 /* This symbol is local, or marked to become local. */
4892 outrel.r_info = ELF32_R_INFO (0, R_CKCORE_RELATIVE);
4893 outrel.r_addend = relocation + rel->r_addend;
4894 }
4895
4896 loc = htab->elf.srelgot->contents;
4897 loc += (htab->elf.srelgot->reloc_count++
4898 * sizeof (Elf32_External_Rela));
4899
4900 if (loc != NULL)
4901 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4902
4903 /* If this reloc is against an external symbol, we do
4904 want to diddle with the addend. Otherwise, we need to
4905 include the symbol value so that it becomes an addend
4906 for the dynamic reloc. */
4907 if (! relocate)
4908 continue;
4909 }
4910 break;
4911
4912 case R_CKCORE_TLS_LDO32:
4913 relocation = relocation - dtpoff_base (info);
4914 break;
4915
4916 case R_CKCORE_TLS_LDM32:
4917 BFD_ASSERT (htab->elf.sgot != NULL);
4918 off = htab->tls_ldm_got.offset;
4919 if (off & 1)
4920 off &= ~1;
4921 else
4922 {
4923 /* If we don't know the module number,
4924 create a relocation for it. */
4925 if (!bfd_link_executable (info))
4926 {
4927 Elf_Internal_Rela outrel;
4928 bfd_byte *loc;
4929
4930 BFD_ASSERT (htab->elf.srelgot != NULL);
4931 outrel.r_addend = 0;
4932 outrel.r_offset
4933 = (htab->elf.sgot->output_section->vma
4934 + htab->elf.sgot->output_offset + off);
4935 outrel.r_info = ELF32_R_INFO (0, R_CKCORE_TLS_DTPMOD32);
4936 bfd_put_32 (output_bfd, outrel.r_addend,
4937 htab->elf.sgot->contents + off);
4938
4939 loc = htab->elf.srelgot->contents;
4940 loc += (htab->elf.srelgot->reloc_count++
4941 * sizeof (Elf32_External_Rela));
4942 if (loc)
4943 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4944 }
4945 else
4946 bfd_put_32 (output_bfd, 1,
4947 htab->elf.sgot->contents + off);
4948 htab->tls_ldm_got.offset |= 1;
4949 }
4950 relocation
4951 = (htab->elf.sgot->output_section->vma
4952 + htab->elf.sgot->output_offset + off
4953 - (input_section->output_section->vma
4954 + input_section->output_offset + rel->r_offset));
4955 break;
4956 case R_CKCORE_TLS_LE32:
4957 if (bfd_link_dll (info))
4958 {
4959 _bfd_error_handler
4960 /* xgettext:c-format */
4961 (_("%pB(%pA+%#" PRIx64 "): %s relocation not permitted "
4962 "in shared object"),
4963 input_bfd, input_section, (uint64_t)rel->r_offset,
4964 howto->name);
4965 return false;
4966 }
4967 else
4968 relocation = tpoff (info, relocation);
4969 break;
4970 case R_CKCORE_TLS_GD32:
4971 case R_CKCORE_TLS_IE32:
4972 {
4973 int indx;
4974 char tls_type;
4975
4976 BFD_ASSERT (htab->elf.sgot != NULL);
4977
4978 indx = 0;
4979 if (h != NULL)
4980 {
4981 bool dyn;
4982 dyn = htab->elf.dynamic_sections_created;
4983 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
4984 bfd_link_pic (info), h)
4985 && (!bfd_link_pic (info)
4986 || !SYMBOL_REFERENCES_LOCAL (info, h)))
4987 {
4988 unresolved_reloc = false;
4989 indx = h->dynindx;
4990 }
4991 off = h->got.offset;
4992 tls_type = ((struct csky_elf_link_hash_entry *)h)->tls_type;
4993 }
4994 else
4995 {
4996 BFD_ASSERT (local_got_offsets != NULL);
4997 off = local_got_offsets[r_symndx];
4998 tls_type = csky_elf_local_got_tls_type (input_bfd)[r_symndx];
4999 }
5000
5001 BFD_ASSERT (tls_type != GOT_UNKNOWN);
5002
5003 if (off & 1)
5004 off &= ~1;
5005 else
5006 {
5007 bool need_relocs = false;
5008 Elf_Internal_Rela outrel;
5009 bfd_byte *loc = NULL;
5010 int cur_off = off;
5011 /* The GOT entries have not been initialized yet. Do it
5012 now, and emit any relocations. If both an IE GOT and a
5013 GD GOT are necessary, we emit the GD first. */
5014 if ((!bfd_link_executable (info) || indx != 0)
5015 && (h == NULL
5016 || (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
5017 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
5018 || h->root.type != bfd_link_hash_undefined))
5019 {
5020 need_relocs = true;
5021 BFD_ASSERT (htab->elf.srelgot != NULL);
5022
5023 loc = htab->elf.srelgot->contents;
5024 loc += (htab->elf.srelgot->reloc_count
5025 * sizeof (Elf32_External_Rela));
5026 }
5027 if (tls_type & GOT_TLS_GD)
5028 {
5029 if (need_relocs)
5030 {
5031 outrel.r_addend = 0;
5032 outrel.r_offset
5033 = (htab->elf.sgot->output_section->vma
5034 + htab->elf.sgot->output_offset
5035 + cur_off);
5036 outrel.r_info
5037 = ELF32_R_INFO (indx, R_CKCORE_TLS_DTPMOD32);
5038 bfd_put_32 (output_bfd, outrel.r_addend,
5039 htab->elf.sgot->contents + cur_off);
5040 if (loc)
5041 bfd_elf32_swap_reloca_out (output_bfd,
5042 &outrel, loc);
5043 loc += sizeof (Elf32_External_Rela);
5044 htab->elf.srelgot->reloc_count++;
5045 if (indx == 0)
5046 bfd_put_32 (output_bfd,
5047 relocation - dtpoff_base (info),
5048 (htab->elf.sgot->contents
5049 + cur_off + 4));
5050 else
5051 {
5052 outrel.r_addend = 0;
5053 outrel.r_info
5054 = ELF32_R_INFO (indx, R_CKCORE_TLS_DTPOFF32);
5055 outrel.r_offset += 4;
5056 bfd_put_32 (output_bfd, outrel.r_addend,
5057 (htab->elf.sgot->contents
5058 + cur_off + 4));
5059 outrel.r_info =
5060 ELF32_R_INFO (indx,
5061 R_CKCORE_TLS_DTPOFF32);
5062 if (loc)
5063 bfd_elf32_swap_reloca_out (output_bfd,
5064 &outrel,
5065 loc);
5066 htab->elf.srelgot->reloc_count++;
5067 loc += sizeof (Elf32_External_Rela);
5068 }
5069
5070 }
5071 else
5072 {
5073 /* If are not emitting relocations for a
5074 general dynamic reference, then we must be in a
5075 static link or an executable link with the
5076 symbol binding locally. Mark it as belonging
5077 to module 1, the executable. */
5078 bfd_put_32 (output_bfd, 1,
5079 htab->elf.sgot->contents + cur_off);
5080 bfd_put_32 (output_bfd,
5081 relocation - dtpoff_base (info),
5082 htab->elf.sgot->contents
5083 + cur_off + 4);
5084 }
5085 cur_off += 8;
5086 }
5087 if (tls_type & GOT_TLS_IE)
5088 {
5089 if (need_relocs)
5090 {
5091 if (indx == 0)
5092 outrel.r_addend = relocation - dtpoff_base (info);
5093 else
5094 outrel.r_addend = 0;
5095 outrel.r_offset
5096 = (htab->elf.sgot->output_section->vma
5097 + htab->elf.sgot->output_offset + cur_off);
5098 outrel.r_info
5099 = ELF32_R_INFO (indx, R_CKCORE_TLS_TPOFF32);
5100
5101 bfd_put_32 (output_bfd, outrel.r_addend,
5102 htab->elf.sgot->contents + cur_off);
5103 if (loc)
5104 bfd_elf32_swap_reloca_out (output_bfd,
5105 &outrel, loc);
5106 htab->elf.srelgot->reloc_count++;
5107 loc += sizeof (Elf32_External_Rela);
5108 }
5109 else
5110 bfd_put_32 (output_bfd, tpoff (info, relocation),
5111 htab->elf.sgot->contents + cur_off);
5112 }
5113 if (h != NULL)
5114 h->got.offset |= 1;
5115 else
5116 local_got_offsets[r_symndx] |= 1;
5117 }
5118 if ((tls_type & GOT_TLS_GD) && howto->type != R_CKCORE_TLS_GD32)
5119 off += 8;
5120 relocation
5121 = (htab->elf.sgot->output_section->vma
5122 + htab->elf.sgot->output_offset + off
5123 - (input_section->output_section->vma
5124 + input_section->output_offset
5125 + rel->r_offset));
5126 break;
5127 }
5128 default:
5129 /* No substitution when final linking. */
5130 read_content_substitute = 0;
5131 break;
5132 } /* End switch (howto->type). */
5133
5134 /* Make sure 32-bit data in the text section will not be affected by
5135 our special endianness.
5136 However, this currently affects noting, since the ADDR32 howto type
5137 does no change with the data read. But we may need this mechanism in
5138 the future. */
5139
5140 if (bfd_get_reloc_size (howto) == 4
5141 && (howto->type == R_CKCORE_ADDR32
5142 || howto->type == R_CKCORE_PCREL32
5143 || howto->type == R_CKCORE_GOT32
5144 || howto->type == R_CKCORE_GOTOFF
5145 || howto->type == R_CKCORE_GOTPC
5146 || howto->type == R_CKCORE_PLT32
5147 || howto->type == R_CKCORE_TLS_LE32
5148 || howto->type == R_CKCORE_TLS_IE32
5149 || howto->type == R_CKCORE_TLS_LDM32
5150 || howto->type == R_CKCORE_TLS_GD32
5151 || howto->type == R_CKCORE_TLS_LDO32
5152 || howto->type == R_CKCORE_RELATIVE))
5153 need_reverse_bits = 0;
5154 else
5155 need_reverse_bits = 1;
5156 /* Do the final link. */
5157 if (howto->type != R_CKCORE_PCREL_JSR_IMM11BY2
5158 && howto->type != R_CKCORE_PCREL_JSR_IMM26BY2
5159 && howto->type != R_CKCORE_CALLGRAPH
5160 && do_final_relocate)
5161 r = csky_final_link_relocate (howto, input_bfd, input_section,
5162 contents, rel->r_offset,
5163 relocation, addend);
5164
5165 if (r != bfd_reloc_ok)
5166 {
5167 ret = false;
5168 switch (r)
5169 {
5170 default:
5171 break;
5172 case bfd_reloc_overflow:
5173 if (h != NULL)
5174 name = NULL;
5175 else
5176 {
5177 name = bfd_elf_string_from_elf_section (input_bfd,
5178 symtab_hdr->sh_link,
5179 sym->st_name);
5180 if (name == NULL)
5181 break;
5182 if (*name == '\0')
5183 name = bfd_section_name (sec);
5184 }
5185 (*info->callbacks->reloc_overflow)
5186 (info,
5187 (h ? &h->root : NULL),
5188 name, howto->name, (bfd_vma) 0,
5189 input_bfd, input_section, rel->r_offset);
5190 break;
5191 }
5192 }
5193 } /* End for (;rel < relend; rel++). */
5194 return ret;
5195 }
5196
5197 static bool
5198 csky_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
5199 {
5200 int offset;
5201 size_t size;
5202
5203 switch (note->descsz)
5204 {
5205 default:
5206 return false;
5207 /* Sizeof (struct elf_prstatus) on C-SKY V1 arch. */
5208 case 148:
5209 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
5210 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
5211 offset = 72;
5212 size = 72;
5213 break;
5214 /* Sizeof (struct elf_prstatus) on C-SKY V1 arch. */
5215 case 220:
5216 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
5217 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
5218 offset = 72;
5219 size = 34 * 4;
5220 break;
5221 }
5222 /* Make a ".reg/999" section. */
5223 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
5224 size, note->descpos + offset);
5225 }
5226
5227 static bool
5228 csky_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
5229 {
5230 switch (note->descsz)
5231 {
5232 default:
5233 return false;
5234
5235 /* Sizeof (struct elf_prpsinfo) on linux csky. */
5236 case 124:
5237 elf_tdata (abfd)->core->program
5238 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
5239 elf_tdata (abfd)->core->command
5240 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
5241 }
5242
5243 /* Note that for some reason, a spurious space is tacked
5244 onto the end of the args in some (at least one anyway)
5245 implementations, so strip it off if it exists. */
5246 {
5247 char *command = elf_tdata (abfd)->core->command;
5248 int n = strlen (command);
5249
5250 if (0 < n && command[n - 1] == ' ')
5251 command[n - 1] = '\0';
5252 }
5253
5254 return true;
5255 }
5256
5257 /* Determine whether an object attribute tag takes an integer, a
5258 string or both. */
5259
5260 static int
5261 elf32_csky_obj_attrs_arg_type (int tag)
5262 {
5263 switch (tag)
5264 {
5265 case Tag_compatibility:
5266 return ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_STR_VAL;
5267 case Tag_CSKY_ARCH_NAME:
5268 case Tag_CSKY_CPU_NAME:
5269 case Tag_CSKY_FPU_NUMBER_MODULE:
5270 return ATTR_TYPE_FLAG_STR_VAL;
5271 case Tag_CSKY_ISA_FLAGS:
5272 case Tag_CSKY_ISA_EXT_FLAGS:
5273 case Tag_CSKY_DSP_VERSION:
5274 case Tag_CSKY_VDSP_VERSION:
5275 case Tag_CSKY_FPU_VERSION:
5276 case Tag_CSKY_FPU_ABI:
5277 case Tag_CSKY_FPU_ROUNDING:
5278 case Tag_CSKY_FPU_HARDFP:
5279 case Tag_CSKY_FPU_Exception:
5280 case Tag_CSKY_FPU_DENORMAL:
5281 return ATTR_TYPE_FLAG_INT_VAL;
5282 default:
5283 break;
5284 }
5285
5286 return (tag & 1) != 0 ? ATTR_TYPE_FLAG_STR_VAL : ATTR_TYPE_FLAG_INT_VAL;
5287 }
5288
5289 /* Attribute numbers >=64 (mod 128) can be safely ignored. */
5290
5291 static bool
5292 elf32_csky_obj_attrs_handle_unknown (bfd *abfd ATTRIBUTE_UNUSED,
5293 int tag ATTRIBUTE_UNUSED)
5294 {
5295 return true;
5296 }
5297
5298 /* End of external entry points for sizing and building linker stubs. */
5299
5300 /* CPU-related basic API. */
5301 #define TARGET_BIG_SYM csky_elf32_be_vec
5302 #define TARGET_BIG_NAME "elf32-csky-big"
5303 #define TARGET_LITTLE_SYM csky_elf32_le_vec
5304 #define TARGET_LITTLE_NAME "elf32-csky-little"
5305 #define ELF_ARCH bfd_arch_csky
5306 #define ELF_MACHINE_CODE EM_CSKY
5307 #define ELF_MACHINE_ALT1 EM_CSKY_OLD
5308 #define ELF_MAXPAGESIZE 0x1000
5309 #define elf_info_to_howto csky_elf_info_to_howto
5310 #define elf_info_to_howto_rel NULL
5311 #define elf_backend_special_sections csky_elf_special_sections
5312 #define bfd_elf32_bfd_link_hash_table_create csky_elf_link_hash_table_create
5313
5314 /* Target related API. */
5315 #define bfd_elf32_mkobject csky_elf_mkobject
5316 #define bfd_elf32_bfd_merge_private_bfd_data csky_elf_merge_private_bfd_data
5317 #define bfd_elf32_bfd_set_private_flags csky_elf_set_private_flags
5318 #define elf_backend_copy_indirect_symbol csky_elf_copy_indirect_symbol
5319 #define bfd_elf32_bfd_is_target_special_symbol csky_elf_is_target_special_symbol
5320 #define elf_backend_maybe_function_sym csky_elf_maybe_function_sym
5321
5322 /* GC section related API. */
5323 #define elf_backend_can_gc_sections 1
5324 #define elf_backend_gc_mark_hook csky_elf_gc_mark_hook
5325 #define elf_backend_gc_mark_extra_sections elf32_csky_gc_mark_extra_sections
5326
5327 /* Relocation related API. */
5328 #define elf_backend_reloc_type_class csky_elf_reloc_type_class
5329 #define bfd_elf32_bfd_reloc_type_lookup csky_elf_reloc_type_lookup
5330 #define bfd_elf32_bfd_reloc_name_lookup csky_elf_reloc_name_lookup
5331 #define elf_backend_ignore_discarded_relocs csky_elf_ignore_discarded_relocs
5332 #define elf_backend_relocate_section csky_elf_relocate_section
5333 #define elf_backend_check_relocs csky_elf_check_relocs
5334
5335 /* Dynamic relocate related API. */
5336 #define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
5337 #define elf_backend_adjust_dynamic_symbol csky_elf_adjust_dynamic_symbol
5338 #define elf_backend_size_dynamic_sections csky_elf_size_dynamic_sections
5339 #define elf_backend_finish_dynamic_symbol csky_elf_finish_dynamic_symbol
5340 #define elf_backend_finish_dynamic_sections csky_elf_finish_dynamic_sections
5341 #define elf_backend_rela_normal 1
5342 #define elf_backend_can_refcount 1
5343 #define elf_backend_plt_readonly 1
5344 #define elf_backend_want_got_sym 1
5345 #define elf_backend_want_dynrelro 1
5346 #define elf_backend_got_header_size 12
5347 #define elf_backend_want_got_plt 1
5348
5349 /* C-SKY coredump support. */
5350 #define elf_backend_grok_prstatus csky_elf_grok_prstatus
5351 #define elf_backend_grok_psinfo csky_elf_grok_psinfo
5352
5353 /* Attribute sections. */
5354 #undef elf_backend_obj_attrs_vendor
5355 #define elf_backend_obj_attrs_vendor "csky"
5356 #undef elf_backend_obj_attrs_section
5357 #define elf_backend_obj_attrs_section ".csky.attributes"
5358 #undef elf_backend_obj_attrs_arg_type
5359 #define elf_backend_obj_attrs_arg_type elf32_csky_obj_attrs_arg_type
5360 #undef elf_backend_obj_attrs_section_type
5361 #define elf_backend_obj_attrs_section_type SHT_CSKY_ATTRIBUTES
5362 #define elf_backend_obj_attrs_handle_unknown elf32_csky_obj_attrs_handle_unknown
5363
5364 #include "elf32-target.h"