1 /* ADI Blackfin BFD support for 32-bit ELF.
2 Copyright (C) 2005-2017 Free Software Foundation, Inc.
4 This file is part of BFD, the Binary File Descriptor library.
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
19 MA 02110-1301, USA. */
29 /* FUNCTION : bfin_pltpc_reloc
30 ABSTRACT : TODO : figure out how to handle pltpc relocs. */
31 static bfd_reloc_status_type
33 bfd
*abfd ATTRIBUTE_UNUSED
,
34 arelent
*reloc_entry ATTRIBUTE_UNUSED
,
35 asymbol
*symbol ATTRIBUTE_UNUSED
,
36 void * data ATTRIBUTE_UNUSED
,
37 asection
*input_section ATTRIBUTE_UNUSED
,
38 bfd
*output_bfd ATTRIBUTE_UNUSED
,
39 char **error_message ATTRIBUTE_UNUSED
)
41 bfd_reloc_status_type flag
= bfd_reloc_ok
;
46 static bfd_reloc_status_type
47 bfin_pcrel24_reloc (bfd
*abfd
,
51 asection
*input_section
,
53 char **error_message ATTRIBUTE_UNUSED
)
56 bfd_size_type addr
= reloc_entry
->address
;
57 bfd_vma output_base
= 0;
58 reloc_howto_type
*howto
= reloc_entry
->howto
;
59 asection
*output_section
;
60 bfd_boolean relocatable
= (output_bfd
!= NULL
);
62 if (reloc_entry
->address
> bfd_get_section_limit (abfd
, input_section
))
63 return bfd_reloc_outofrange
;
65 if (bfd_is_und_section (symbol
->section
)
66 && (symbol
->flags
& BSF_WEAK
) == 0
68 return bfd_reloc_undefined
;
70 if (bfd_is_com_section (symbol
->section
))
73 relocation
= symbol
->value
;
75 output_section
= symbol
->section
->output_section
;
80 output_base
= output_section
->vma
;
82 if (!relocatable
|| !strcmp (symbol
->name
, symbol
->section
->name
))
83 relocation
+= output_base
+ symbol
->section
->output_offset
;
85 if (!relocatable
&& !strcmp (symbol
->name
, symbol
->section
->name
))
86 relocation
+= reloc_entry
->addend
;
88 relocation
-= input_section
->output_section
->vma
+ input_section
->output_offset
;
89 relocation
-= reloc_entry
->address
;
91 if (howto
->complain_on_overflow
!= complain_overflow_dont
)
93 bfd_reloc_status_type status
;
94 status
= bfd_check_overflow (howto
->complain_on_overflow
,
97 bfd_arch_bits_per_address(abfd
),
99 if (status
!= bfd_reloc_ok
)
103 /* if rightshift is 1 and the number odd, return error. */
104 if (howto
->rightshift
&& (relocation
& 0x01))
106 _bfd_error_handler (_("relocation should be even number"));
107 return bfd_reloc_overflow
;
110 relocation
>>= (bfd_vma
) howto
->rightshift
;
111 /* Shift everything up to where it's going to be used. */
113 relocation
<<= (bfd_vma
) howto
->bitpos
;
117 reloc_entry
->address
+= input_section
->output_offset
;
118 reloc_entry
->addend
+= symbol
->section
->output_offset
;
124 /* We are getting reloc_entry->address 2 byte off from
125 the start of instruction. Assuming absolute postion
126 of the reloc data. But, following code had been written assuming
127 reloc address is starting at begining of instruction.
128 To compensate that I have increased the value of
129 relocation by 1 (effectively 2) and used the addr -2 instead of addr. */
132 x
= bfd_get_16 (abfd
, (bfd_byte
*) data
+ addr
- 2);
133 x
= (x
& 0xff00) | ((relocation
>> 16) & 0xff);
134 bfd_put_16 (abfd
, x
, (unsigned char *) data
+ addr
- 2);
136 x
= bfd_get_16 (abfd
, (bfd_byte
*) data
+ addr
);
137 x
= relocation
& 0xFFFF;
138 bfd_put_16 (abfd
, x
, (unsigned char *) data
+ addr
);
143 static bfd_reloc_status_type
144 bfin_imm16_reloc (bfd
*abfd
,
145 arelent
*reloc_entry
,
148 asection
*input_section
,
150 char **error_message ATTRIBUTE_UNUSED
)
152 bfd_vma relocation
, x
;
153 bfd_size_type reloc_addr
= reloc_entry
->address
;
154 bfd_vma output_base
= 0;
155 reloc_howto_type
*howto
= reloc_entry
->howto
;
156 asection
*output_section
;
157 bfd_boolean relocatable
= (output_bfd
!= NULL
);
159 /* Is the address of the relocation really within the section? */
160 if (reloc_entry
->address
> bfd_get_section_limit (abfd
, input_section
))
161 return bfd_reloc_outofrange
;
163 if (bfd_is_und_section (symbol
->section
)
164 && (symbol
->flags
& BSF_WEAK
) == 0
166 return bfd_reloc_undefined
;
168 output_section
= symbol
->section
->output_section
;
169 relocation
= symbol
->value
;
171 /* Convert input-section-relative symbol value to absolute. */
175 output_base
= output_section
->vma
;
177 if (!relocatable
|| !strcmp (symbol
->name
, symbol
->section
->name
))
178 relocation
+= output_base
+ symbol
->section
->output_offset
;
180 /* Add in supplied addend. */
181 relocation
+= reloc_entry
->addend
;
185 reloc_entry
->address
+= input_section
->output_offset
;
186 reloc_entry
->addend
+= symbol
->section
->output_offset
;
190 reloc_entry
->addend
= 0;
193 if (howto
->complain_on_overflow
!= complain_overflow_dont
)
195 bfd_reloc_status_type flag
;
196 flag
= bfd_check_overflow (howto
->complain_on_overflow
,
199 bfd_arch_bits_per_address(abfd
),
201 if (flag
!= bfd_reloc_ok
)
205 /* Here the variable relocation holds the final address of the
206 symbol we are relocating against, plus any addend. */
208 relocation
>>= (bfd_vma
) howto
->rightshift
;
210 bfd_put_16 (abfd
, x
, (unsigned char *) data
+ reloc_addr
);
215 static bfd_reloc_status_type
216 bfin_byte4_reloc (bfd
*abfd
,
217 arelent
*reloc_entry
,
220 asection
*input_section
,
222 char **error_message ATTRIBUTE_UNUSED
)
224 bfd_vma relocation
, x
;
225 bfd_size_type addr
= reloc_entry
->address
;
226 bfd_vma output_base
= 0;
227 asection
*output_section
;
228 bfd_boolean relocatable
= (output_bfd
!= NULL
);
230 /* Is the address of the relocation really within the section? */
231 if (reloc_entry
->address
> bfd_get_section_limit (abfd
, input_section
))
232 return bfd_reloc_outofrange
;
234 if (bfd_is_und_section (symbol
->section
)
235 && (symbol
->flags
& BSF_WEAK
) == 0
237 return bfd_reloc_undefined
;
239 output_section
= symbol
->section
->output_section
;
240 relocation
= symbol
->value
;
241 /* Convert input-section-relative symbol value to absolute. */
245 output_base
= output_section
->vma
;
248 && symbol
->section
->name
249 && !strcmp (symbol
->name
, symbol
->section
->name
))
252 relocation
+= output_base
+ symbol
->section
->output_offset
;
255 relocation
+= reloc_entry
->addend
;
259 /* This output will be relocatable ... like ld -r. */
260 reloc_entry
->address
+= input_section
->output_offset
;
261 reloc_entry
->addend
+= symbol
->section
->output_offset
;
265 reloc_entry
->addend
= 0;
268 /* Here the variable relocation holds the final address of the
269 symbol we are relocating against, plus any addend. */
270 x
= relocation
& 0xFFFF0000;
272 bfd_put_16 (abfd
, x
, (unsigned char *) data
+ addr
+ 2);
274 x
= relocation
& 0x0000FFFF;
275 bfd_put_16 (abfd
, x
, (unsigned char *) data
+ addr
);
279 /* bfin_bfd_reloc handles the blackfin arithmetic relocations.
280 Use this instead of bfd_perform_relocation. */
281 static bfd_reloc_status_type
282 bfin_bfd_reloc (bfd
*abfd
,
283 arelent
*reloc_entry
,
286 asection
*input_section
,
288 char **error_message ATTRIBUTE_UNUSED
)
291 bfd_size_type addr
= reloc_entry
->address
;
292 bfd_vma output_base
= 0;
293 reloc_howto_type
*howto
= reloc_entry
->howto
;
294 asection
*output_section
;
295 bfd_boolean relocatable
= (output_bfd
!= NULL
);
297 /* Is the address of the relocation really within the section? */
298 if (reloc_entry
->address
> bfd_get_section_limit (abfd
, input_section
))
299 return bfd_reloc_outofrange
;
301 if (bfd_is_und_section (symbol
->section
)
302 && (symbol
->flags
& BSF_WEAK
) == 0
304 return bfd_reloc_undefined
;
306 /* Get symbol value. (Common symbols are special.) */
307 if (bfd_is_com_section (symbol
->section
))
310 relocation
= symbol
->value
;
312 output_section
= symbol
->section
->output_section
;
314 /* Convert input-section-relative symbol value to absolute. */
318 output_base
= output_section
->vma
;
320 if (!relocatable
|| !strcmp (symbol
->name
, symbol
->section
->name
))
321 relocation
+= output_base
+ symbol
->section
->output_offset
;
323 if (!relocatable
&& !strcmp (symbol
->name
, symbol
->section
->name
))
325 /* Add in supplied addend. */
326 relocation
+= reloc_entry
->addend
;
329 /* Here the variable relocation holds the final address of the
330 symbol we are relocating against, plus any addend. */
332 if (howto
->pc_relative
)
334 relocation
-= input_section
->output_section
->vma
+ input_section
->output_offset
;
336 if (howto
->pcrel_offset
)
337 relocation
-= reloc_entry
->address
;
342 reloc_entry
->address
+= input_section
->output_offset
;
343 reloc_entry
->addend
+= symbol
->section
->output_offset
;
346 if (howto
->complain_on_overflow
!= complain_overflow_dont
)
348 bfd_reloc_status_type status
;
350 status
= bfd_check_overflow (howto
->complain_on_overflow
,
353 bfd_arch_bits_per_address(abfd
),
355 if (status
!= bfd_reloc_ok
)
359 /* If rightshift is 1 and the number odd, return error. */
360 if (howto
->rightshift
&& (relocation
& 0x01))
362 _bfd_error_handler (_("relocation should be even number"));
363 return bfd_reloc_overflow
;
366 relocation
>>= (bfd_vma
) howto
->rightshift
;
368 /* Shift everything up to where it's going to be used. */
370 relocation
<<= (bfd_vma
) howto
->bitpos
;
373 x = ( (x & ~howto->dst_mask) | (relocation & howto->dst_mask))
375 /* handle 8 and 16 bit relocations here. */
380 char x
= bfd_get_8 (abfd
, (char *) data
+ addr
);
382 bfd_put_8 (abfd
, x
, (unsigned char *) data
+ addr
);
388 unsigned short x
= bfd_get_16 (abfd
, (bfd_byte
*) data
+ addr
);
390 bfd_put_16 (abfd
, (bfd_vma
) x
, (unsigned char *) data
+ addr
);
395 return bfd_reloc_other
;
401 /* HOWTO Table for blackfin.
402 Blackfin relocations are fairly complicated.
403 Some of the salient features are
404 a. Even numbered offsets. A number of (not all) relocations are
405 even numbered. This means that the rightmost bit is not stored.
406 Needs to right shift by 1 and check to see if value is not odd
407 b. A relocation can be an expression. An expression takes on
408 a variety of relocations arranged in a stack.
409 As a result, we cannot use the standard generic function as special
410 function. We will have our own, which is very similar to the standard
411 generic function except that it understands how to get the value from
412 the relocation stack. . */
414 #define BFIN_RELOC_MIN 0
415 #define BFIN_RELOC_MAX 0x21
416 #define BFIN_GNUEXT_RELOC_MIN 0x40
417 #define BFIN_GNUEXT_RELOC_MAX 0x43
418 #define BFIN_ARELOC_MIN 0xE0
419 #define BFIN_ARELOC_MAX 0xF3
421 static reloc_howto_type bfin_howto_table
[] =
423 /* This reloc does nothing. . */
424 HOWTO (R_BFIN_UNUSED0
, /* type. */
426 3, /* size (0 = byte, 1 = short, 2 = long). */
428 FALSE
, /* pc_relative. */
430 complain_overflow_dont
, /* complain_on_overflow. */
431 bfd_elf_generic_reloc
, /* special_function. */
432 "R_BFIN_UNUSED0", /* name. */
433 FALSE
, /* partial_inplace. */
436 FALSE
), /* pcrel_offset. */
438 HOWTO (R_BFIN_PCREL5M2
, /* type. */
440 1, /* size (0 = byte, 1 = short, 2 = long).. */
442 TRUE
, /* pc_relative. */
444 complain_overflow_unsigned
, /* complain_on_overflow. */
445 bfin_bfd_reloc
, /* special_function. */
446 "R_BFIN_PCREL5M2", /* name. */
447 FALSE
, /* partial_inplace. */
449 0x0000000F, /* dst_mask. */
450 FALSE
), /* pcrel_offset. */
452 HOWTO (R_BFIN_UNUSED1
, /* type. */
454 3, /* size (0 = byte, 1 = short, 2 = long). */
456 FALSE
, /* pc_relative. */
458 complain_overflow_dont
, /* complain_on_overflow. */
459 bfd_elf_generic_reloc
, /* special_function. */
460 "R_BFIN_UNUSED1", /* name. */
461 FALSE
, /* partial_inplace. */
464 FALSE
), /* pcrel_offset. */
466 HOWTO (R_BFIN_PCREL10
, /* type. */
468 1, /* size (0 = byte, 1 = short, 2 = long). */
470 TRUE
, /* pc_relative. */
472 complain_overflow_signed
, /* complain_on_overflow. */
473 bfin_bfd_reloc
, /* special_function. */
474 "R_BFIN_PCREL10", /* name. */
475 FALSE
, /* partial_inplace. */
477 0x000003FF, /* dst_mask. */
478 TRUE
), /* pcrel_offset. */
480 HOWTO (R_BFIN_PCREL12_JUMP
, /* type. */
482 /* the offset is actually 13 bit
483 aligned on a word boundary so
484 only 12 bits have to be used.
485 Right shift the rightmost bit.. */
486 1, /* size (0 = byte, 1 = short, 2 = long). */
488 TRUE
, /* pc_relative. */
490 complain_overflow_signed
, /* complain_on_overflow. */
491 bfin_bfd_reloc
, /* special_function. */
492 "R_BFIN_PCREL12_JUMP", /* name. */
493 FALSE
, /* partial_inplace. */
495 0x0FFF, /* dst_mask. */
496 TRUE
), /* pcrel_offset. */
498 HOWTO (R_BFIN_RIMM16
, /* type. */
500 1, /* size (0 = byte, 1 = short, 2 = long). */
502 FALSE
, /* pc_relative. */
504 complain_overflow_signed
, /* complain_on_overflow. */
505 bfin_imm16_reloc
, /* special_function. */
506 "R_BFIN_RIMM16", /* name. */
507 FALSE
, /* partial_inplace. */
509 0x0000FFFF, /* dst_mask. */
510 TRUE
), /* pcrel_offset. */
512 HOWTO (R_BFIN_LUIMM16
, /* type. */
514 1, /* size (0 = byte, 1 = short, 2 = long). */
516 FALSE
, /* pc_relative. */
518 complain_overflow_dont
, /* complain_on_overflow. */
519 bfin_imm16_reloc
, /* special_function. */
520 "R_BFIN_LUIMM16", /* name. */
521 FALSE
, /* partial_inplace. */
523 0x0000FFFF, /* dst_mask. */
524 TRUE
), /* pcrel_offset. */
526 HOWTO (R_BFIN_HUIMM16
, /* type. */
527 16, /* rightshift. */
528 1, /* size (0 = byte, 1 = short, 2 = long). */
530 FALSE
, /* pc_relative. */
532 complain_overflow_unsigned
, /* complain_on_overflow. */
533 bfin_imm16_reloc
, /* special_function. */
534 "R_BFIN_HUIMM16", /* name. */
535 FALSE
, /* partial_inplace. */
537 0x0000FFFF, /* dst_mask. */
538 TRUE
), /* pcrel_offset. */
540 HOWTO (R_BFIN_PCREL12_JUMP_S
, /* type. */
542 1, /* size (0 = byte, 1 = short, 2 = long). */
544 TRUE
, /* pc_relative. */
546 complain_overflow_signed
, /* complain_on_overflow. */
547 bfin_bfd_reloc
, /* special_function. */
548 "R_BFIN_PCREL12_JUMP_S", /* name. */
549 FALSE
, /* partial_inplace. */
551 0x00000FFF, /* dst_mask. */
552 TRUE
), /* pcrel_offset. */
554 HOWTO (R_BFIN_PCREL24_JUMP_X
, /* type. */
556 2, /* size (0 = byte, 1 = short, 2 = long). */
558 TRUE
, /* pc_relative. */
560 complain_overflow_signed
, /* complain_on_overflow. */
561 bfin_pcrel24_reloc
, /* special_function. */
562 "R_BFIN_PCREL24_JUMP_X", /* name. */
563 FALSE
, /* partial_inplace. */
565 0x00FFFFFF, /* dst_mask. */
566 TRUE
), /* pcrel_offset. */
568 HOWTO (R_BFIN_PCREL24
, /* type. */
570 2, /* size (0 = byte, 1 = short, 2 = long). */
572 TRUE
, /* pc_relative. */
574 complain_overflow_signed
, /* complain_on_overflow. */
575 bfin_pcrel24_reloc
, /* special_function. */
576 "R_BFIN_PCREL24", /* name. */
577 FALSE
, /* partial_inplace. */
579 0x00FFFFFF, /* dst_mask. */
580 TRUE
), /* pcrel_offset. */
582 HOWTO (R_BFIN_UNUSEDB
, /* type. */
584 3, /* size (0 = byte, 1 = short, 2 = long). */
586 FALSE
, /* pc_relative. */
588 complain_overflow_dont
, /* complain_on_overflow. */
589 bfd_elf_generic_reloc
, /* special_function. */
590 "R_BFIN_UNUSEDB", /* name. */
591 FALSE
, /* partial_inplace. */
594 FALSE
), /* pcrel_offset. */
596 HOWTO (R_BFIN_UNUSEDC
, /* type. */
598 3, /* size (0 = byte, 1 = short, 2 = long). */
600 FALSE
, /* pc_relative. */
602 complain_overflow_dont
, /* complain_on_overflow. */
603 bfd_elf_generic_reloc
, /* special_function. */
604 "R_BFIN_UNUSEDC", /* name. */
605 FALSE
, /* partial_inplace. */
608 FALSE
), /* pcrel_offset. */
610 HOWTO (R_BFIN_PCREL24_JUMP_L
, /* type. */
612 2, /* size (0 = byte, 1 = short, 2 = long). */
614 TRUE
, /* pc_relative. */
616 complain_overflow_signed
, /* complain_on_overflow. */
617 bfin_pcrel24_reloc
, /* special_function. */
618 "R_BFIN_PCREL24_JUMP_L", /* name. */
619 FALSE
, /* partial_inplace. */
621 0x00FFFFFF, /* dst_mask. */
622 TRUE
), /* pcrel_offset. */
624 HOWTO (R_BFIN_PCREL24_CALL_X
, /* type. */
626 2, /* size (0 = byte, 1 = short, 2 = long). */
628 TRUE
, /* pc_relative. */
630 complain_overflow_signed
, /* complain_on_overflow. */
631 bfin_pcrel24_reloc
, /* special_function. */
632 "R_BFIN_PCREL24_CALL_X", /* name. */
633 FALSE
, /* partial_inplace. */
635 0x00FFFFFF, /* dst_mask. */
636 TRUE
), /* pcrel_offset. */
638 HOWTO (R_BFIN_VAR_EQ_SYMB
, /* type. */
640 2, /* size (0 = byte, 1 = short, 2 = long). */
642 FALSE
, /* pc_relative. */
644 complain_overflow_bitfield
, /* complain_on_overflow. */
645 bfin_bfd_reloc
, /* special_function. */
646 "R_BFIN_VAR_EQ_SYMB", /* name. */
647 FALSE
, /* partial_inplace. */
650 FALSE
), /* pcrel_offset. */
652 HOWTO (R_BFIN_BYTE_DATA
, /* type. */
654 0, /* size (0 = byte, 1 = short, 2 = long). */
656 FALSE
, /* pc_relative. */
658 complain_overflow_unsigned
, /* complain_on_overflow. */
659 bfin_bfd_reloc
, /* special_function. */
660 "R_BFIN_BYTE_DATA", /* name. */
661 FALSE
, /* partial_inplace. */
663 0xFF, /* dst_mask. */
664 TRUE
), /* pcrel_offset. */
666 HOWTO (R_BFIN_BYTE2_DATA
, /* type. */
668 1, /* size (0 = byte, 1 = short, 2 = long). */
670 FALSE
, /* pc_relative. */
672 complain_overflow_signed
, /* complain_on_overflow. */
673 bfin_bfd_reloc
, /* special_function. */
674 "R_BFIN_BYTE2_DATA", /* name. */
675 FALSE
, /* partial_inplace. */
677 0xFFFF, /* dst_mask. */
678 TRUE
), /* pcrel_offset. */
680 HOWTO (R_BFIN_BYTE4_DATA
, /* type. */
682 2, /* size (0 = byte, 1 = short, 2 = long). */
684 FALSE
, /* pc_relative. */
686 complain_overflow_unsigned
, /* complain_on_overflow. */
687 bfin_byte4_reloc
, /* special_function. */
688 "R_BFIN_BYTE4_DATA", /* name. */
689 FALSE
, /* partial_inplace. */
691 0xFFFFFFFF, /* dst_mask. */
692 TRUE
), /* pcrel_offset. */
694 HOWTO (R_BFIN_PCREL11
, /* type. */
696 1, /* size (0 = byte, 1 = short, 2 = long). */
698 TRUE
, /* pc_relative. */
700 complain_overflow_unsigned
, /* complain_on_overflow. */
701 bfin_bfd_reloc
, /* special_function. */
702 "R_BFIN_PCREL11", /* name. */
703 FALSE
, /* partial_inplace. */
705 0x000003FF, /* dst_mask. */
706 FALSE
), /* pcrel_offset. */
709 /* A 18-bit signed operand with the GOT offset for the address of
711 HOWTO (R_BFIN_GOT17M4
, /* type */
713 1, /* size (0 = byte, 1 = short, 2 = long) */
715 FALSE
, /* pc_relative */
717 complain_overflow_signed
, /* complain_on_overflow */
718 bfd_elf_generic_reloc
, /* special_function */
719 "R_BFIN_GOT17M4", /* name */
720 FALSE
, /* partial_inplace */
721 0xffff, /* src_mask */
722 0xffff, /* dst_mask */
723 FALSE
), /* pcrel_offset */
725 /* The upper 16 bits of the GOT offset for the address of the
727 HOWTO (R_BFIN_GOTHI
, /* type */
729 1, /* size (0 = byte, 1 = short, 2 = long) */
731 FALSE
, /* pc_relative */
733 complain_overflow_dont
, /* complain_on_overflow */
734 bfd_elf_generic_reloc
, /* special_function */
735 "R_BFIN_GOTHI", /* name */
736 FALSE
, /* partial_inplace */
737 0xffff, /* src_mask */
738 0xffff, /* dst_mask */
739 FALSE
), /* pcrel_offset */
741 /* The lower 16 bits of the GOT offset for the address of the
743 HOWTO (R_BFIN_GOTLO
, /* type */
745 1, /* size (0 = byte, 1 = short, 2 = long) */
747 FALSE
, /* pc_relative */
749 complain_overflow_dont
, /* complain_on_overflow */
750 bfd_elf_generic_reloc
, /* special_function */
751 "R_BFIN_GOTLO", /* name */
752 FALSE
, /* partial_inplace */
753 0xffff, /* src_mask */
754 0xffff, /* dst_mask */
755 FALSE
), /* pcrel_offset */
757 /* The 32-bit address of the canonical descriptor of a function. */
758 HOWTO (R_BFIN_FUNCDESC
, /* type */
760 2, /* size (0 = byte, 1 = short, 2 = long) */
762 FALSE
, /* pc_relative */
764 complain_overflow_bitfield
, /* complain_on_overflow */
765 bfd_elf_generic_reloc
, /* special_function */
766 "R_BFIN_FUNCDESC", /* name */
767 FALSE
, /* partial_inplace */
768 0xffffffff, /* src_mask */
769 0xffffffff, /* dst_mask */
770 FALSE
), /* pcrel_offset */
772 /* A 12-bit signed operand with the GOT offset for the address of
773 canonical descriptor of a function. */
774 HOWTO (R_BFIN_FUNCDESC_GOT17M4
, /* type */
776 1, /* size (0 = byte, 1 = short, 2 = long) */
778 FALSE
, /* pc_relative */
780 complain_overflow_signed
, /* complain_on_overflow */
781 bfd_elf_generic_reloc
, /* special_function */
782 "R_BFIN_FUNCDESC_GOT17M4", /* name */
783 FALSE
, /* partial_inplace */
784 0xffff, /* src_mask */
785 0xffff, /* dst_mask */
786 FALSE
), /* pcrel_offset */
788 /* The upper 16 bits of the GOT offset for the address of the
789 canonical descriptor of a function. */
790 HOWTO (R_BFIN_FUNCDESC_GOTHI
, /* type */
792 1, /* size (0 = byte, 1 = short, 2 = long) */
794 FALSE
, /* pc_relative */
796 complain_overflow_dont
, /* complain_on_overflow */
797 bfd_elf_generic_reloc
, /* special_function */
798 "R_BFIN_FUNCDESC_GOTHI", /* name */
799 FALSE
, /* partial_inplace */
800 0xffff, /* src_mask */
801 0xffff, /* dst_mask */
802 FALSE
), /* pcrel_offset */
804 /* The lower 16 bits of the GOT offset for the address of the
805 canonical descriptor of a function. */
806 HOWTO (R_BFIN_FUNCDESC_GOTLO
, /* type */
808 1, /* size (0 = byte, 1 = short, 2 = long) */
810 FALSE
, /* pc_relative */
812 complain_overflow_dont
, /* complain_on_overflow */
813 bfd_elf_generic_reloc
, /* special_function */
814 "R_BFIN_FUNCDESC_GOTLO", /* name */
815 FALSE
, /* partial_inplace */
816 0xffff, /* src_mask */
817 0xffff, /* dst_mask */
818 FALSE
), /* pcrel_offset */
820 /* The 32-bit address of the canonical descriptor of a function. */
821 HOWTO (R_BFIN_FUNCDESC_VALUE
, /* type */
823 2, /* size (0 = byte, 1 = short, 2 = long) */
825 FALSE
, /* pc_relative */
827 complain_overflow_bitfield
, /* complain_on_overflow */
828 bfd_elf_generic_reloc
, /* special_function */
829 "R_BFIN_FUNCDESC_VALUE", /* name */
830 FALSE
, /* partial_inplace */
831 0xffffffff, /* src_mask */
832 0xffffffff, /* dst_mask */
833 FALSE
), /* pcrel_offset */
835 /* A 12-bit signed operand with the GOT offset for the address of
836 canonical descriptor of a function. */
837 HOWTO (R_BFIN_FUNCDESC_GOTOFF17M4
, /* type */
839 1, /* size (0 = byte, 1 = short, 2 = long) */
841 FALSE
, /* pc_relative */
843 complain_overflow_signed
, /* complain_on_overflow */
844 bfd_elf_generic_reloc
, /* special_function */
845 "R_BFIN_FUNCDESC_GOTOFF17M4", /* name */
846 FALSE
, /* partial_inplace */
847 0xffff, /* src_mask */
848 0xffff, /* dst_mask */
849 FALSE
), /* pcrel_offset */
851 /* The upper 16 bits of the GOT offset for the address of the
852 canonical descriptor of a function. */
853 HOWTO (R_BFIN_FUNCDESC_GOTOFFHI
, /* type */
855 1, /* size (0 = byte, 1 = short, 2 = long) */
857 FALSE
, /* pc_relative */
859 complain_overflow_dont
, /* complain_on_overflow */
860 bfd_elf_generic_reloc
, /* special_function */
861 "R_BFIN_FUNCDESC_GOTOFFHI", /* name */
862 FALSE
, /* partial_inplace */
863 0xffff, /* src_mask */
864 0xffff, /* dst_mask */
865 FALSE
), /* pcrel_offset */
867 /* The lower 16 bits of the GOT offset for the address of the
868 canonical descriptor of a function. */
869 HOWTO (R_BFIN_FUNCDESC_GOTOFFLO
, /* type */
871 1, /* size (0 = byte, 1 = short, 2 = long) */
873 FALSE
, /* pc_relative */
875 complain_overflow_dont
, /* complain_on_overflow */
876 bfd_elf_generic_reloc
, /* special_function */
877 "R_BFIN_FUNCDESC_GOTOFFLO", /* name */
878 FALSE
, /* partial_inplace */
879 0xffff, /* src_mask */
880 0xffff, /* dst_mask */
881 FALSE
), /* pcrel_offset */
883 /* A 12-bit signed operand with the GOT offset for the address of
885 HOWTO (R_BFIN_GOTOFF17M4
, /* type */
887 1, /* size (0 = byte, 1 = short, 2 = long) */
889 FALSE
, /* pc_relative */
891 complain_overflow_signed
, /* complain_on_overflow */
892 bfd_elf_generic_reloc
, /* special_function */
893 "R_BFIN_GOTOFF17M4", /* name */
894 FALSE
, /* partial_inplace */
895 0xffff, /* src_mask */
896 0xffff, /* dst_mask */
897 FALSE
), /* pcrel_offset */
899 /* The upper 16 bits of the GOT offset for the address of the
901 HOWTO (R_BFIN_GOTOFFHI
, /* type */
903 1, /* size (0 = byte, 1 = short, 2 = long) */
905 FALSE
, /* pc_relative */
907 complain_overflow_dont
, /* complain_on_overflow */
908 bfd_elf_generic_reloc
, /* special_function */
909 "R_BFIN_GOTOFFHI", /* name */
910 FALSE
, /* partial_inplace */
911 0xffff, /* src_mask */
912 0xffff, /* dst_mask */
913 FALSE
), /* pcrel_offset */
915 /* The lower 16 bits of the GOT offset for the address of the
917 HOWTO (R_BFIN_GOTOFFLO
, /* type */
919 1, /* size (0 = byte, 1 = short, 2 = long) */
921 FALSE
, /* pc_relative */
923 complain_overflow_dont
, /* complain_on_overflow */
924 bfd_elf_generic_reloc
, /* special_function */
925 "R_BFIN_GOTOFFLO", /* name */
926 FALSE
, /* partial_inplace */
927 0xffff, /* src_mask */
928 0xffff, /* dst_mask */
929 FALSE
), /* pcrel_offset */
932 static reloc_howto_type bfin_gnuext_howto_table
[] =
934 HOWTO (R_BFIN_PLTPC
, /* type. */
936 1, /* size (0 = byte, 1 = short, 2 = long). */
938 FALSE
, /* pc_relative. */
940 complain_overflow_bitfield
, /* complain_on_overflow. */
941 bfin_pltpc_reloc
, /* special_function. */
942 "R_BFIN_PLTPC", /* name. */
943 FALSE
, /* partial_inplace. */
944 0xffff, /* src_mask. */
945 0xffff, /* dst_mask. */
946 FALSE
), /* pcrel_offset. */
948 HOWTO (R_BFIN_GOT
, /* type. */
950 1, /* size (0 = byte, 1 = short, 2 = long). */
952 FALSE
, /* pc_relative. */
954 complain_overflow_bitfield
, /* complain_on_overflow. */
955 bfd_elf_generic_reloc
, /* special_function. */
956 "R_BFIN_GOT", /* name. */
957 FALSE
, /* partial_inplace. */
958 0x7fff, /* src_mask. */
959 0x7fff, /* dst_mask. */
960 FALSE
), /* pcrel_offset. */
962 /* GNU extension to record C++ vtable hierarchy. */
963 HOWTO (R_BFIN_GNU_VTINHERIT
, /* type. */
965 2, /* size (0 = byte, 1 = short, 2 = long). */
967 FALSE
, /* pc_relative. */
969 complain_overflow_dont
, /* complain_on_overflow. */
970 NULL
, /* special_function. */
971 "R_BFIN_GNU_VTINHERIT", /* name. */
972 FALSE
, /* partial_inplace. */
975 FALSE
), /* pcrel_offset. */
977 /* GNU extension to record C++ vtable member usage. */
978 HOWTO (R_BFIN_GNU_VTENTRY
, /* type. */
980 2, /* size (0 = byte, 1 = short, 2 = long). */
982 FALSE
, /* pc_relative. */
984 complain_overflow_dont
, /* complain_on_overflow. */
985 _bfd_elf_rel_vtable_reloc_fn
, /* special_function. */
986 "R_BFIN_GNU_VTENTRY", /* name. */
987 FALSE
, /* partial_inplace. */
990 FALSE
) /* pcrel_offset. */
993 struct bfin_reloc_map
995 bfd_reloc_code_real_type bfd_reloc_val
;
996 unsigned int bfin_reloc_val
;
999 static const struct bfin_reloc_map bfin_reloc_map
[] =
1001 { BFD_RELOC_NONE
, R_BFIN_UNUSED0
},
1002 { BFD_RELOC_BFIN_5_PCREL
, R_BFIN_PCREL5M2
},
1003 { BFD_RELOC_NONE
, R_BFIN_UNUSED1
},
1004 { BFD_RELOC_BFIN_10_PCREL
, R_BFIN_PCREL10
},
1005 { BFD_RELOC_BFIN_12_PCREL_JUMP
, R_BFIN_PCREL12_JUMP
},
1006 { BFD_RELOC_BFIN_16_IMM
, R_BFIN_RIMM16
},
1007 { BFD_RELOC_BFIN_16_LOW
, R_BFIN_LUIMM16
},
1008 { BFD_RELOC_BFIN_16_HIGH
, R_BFIN_HUIMM16
},
1009 { BFD_RELOC_BFIN_12_PCREL_JUMP_S
, R_BFIN_PCREL12_JUMP_S
},
1010 { BFD_RELOC_24_PCREL
, R_BFIN_PCREL24
},
1011 { BFD_RELOC_24_PCREL
, R_BFIN_PCREL24
},
1012 { BFD_RELOC_BFIN_24_PCREL_JUMP_L
, R_BFIN_PCREL24_JUMP_L
},
1013 { BFD_RELOC_NONE
, R_BFIN_UNUSEDB
},
1014 { BFD_RELOC_NONE
, R_BFIN_UNUSEDC
},
1015 { BFD_RELOC_BFIN_24_PCREL_CALL_X
, R_BFIN_PCREL24_CALL_X
},
1016 { BFD_RELOC_8
, R_BFIN_BYTE_DATA
},
1017 { BFD_RELOC_16
, R_BFIN_BYTE2_DATA
},
1018 { BFD_RELOC_32
, R_BFIN_BYTE4_DATA
},
1019 { BFD_RELOC_BFIN_11_PCREL
, R_BFIN_PCREL11
},
1020 { BFD_RELOC_BFIN_GOT
, R_BFIN_GOT
},
1021 { BFD_RELOC_BFIN_PLTPC
, R_BFIN_PLTPC
},
1023 { BFD_RELOC_BFIN_GOT17M4
, R_BFIN_GOT17M4
},
1024 { BFD_RELOC_BFIN_GOTHI
, R_BFIN_GOTHI
},
1025 { BFD_RELOC_BFIN_GOTLO
, R_BFIN_GOTLO
},
1026 { BFD_RELOC_BFIN_FUNCDESC
, R_BFIN_FUNCDESC
},
1027 { BFD_RELOC_BFIN_FUNCDESC_GOT17M4
, R_BFIN_FUNCDESC_GOT17M4
},
1028 { BFD_RELOC_BFIN_FUNCDESC_GOTHI
, R_BFIN_FUNCDESC_GOTHI
},
1029 { BFD_RELOC_BFIN_FUNCDESC_GOTLO
, R_BFIN_FUNCDESC_GOTLO
},
1030 { BFD_RELOC_BFIN_FUNCDESC_VALUE
, R_BFIN_FUNCDESC_VALUE
},
1031 { BFD_RELOC_BFIN_FUNCDESC_GOTOFF17M4
, R_BFIN_FUNCDESC_GOTOFF17M4
},
1032 { BFD_RELOC_BFIN_FUNCDESC_GOTOFFHI
, R_BFIN_FUNCDESC_GOTOFFHI
},
1033 { BFD_RELOC_BFIN_FUNCDESC_GOTOFFLO
, R_BFIN_FUNCDESC_GOTOFFLO
},
1034 { BFD_RELOC_BFIN_GOTOFF17M4
, R_BFIN_GOTOFF17M4
},
1035 { BFD_RELOC_BFIN_GOTOFFHI
, R_BFIN_GOTOFFHI
},
1036 { BFD_RELOC_BFIN_GOTOFFLO
, R_BFIN_GOTOFFLO
},
1038 { BFD_RELOC_VTABLE_INHERIT
, R_BFIN_GNU_VTINHERIT
},
1039 { BFD_RELOC_VTABLE_ENTRY
, R_BFIN_GNU_VTENTRY
},
1044 bfin_info_to_howto (bfd
*abfd ATTRIBUTE_UNUSED
,
1046 Elf_Internal_Rela
*dst
)
1048 unsigned int r_type
;
1050 r_type
= ELF32_R_TYPE (dst
->r_info
);
1052 if (r_type
<= BFIN_RELOC_MAX
)
1053 cache_ptr
->howto
= &bfin_howto_table
[r_type
];
1055 else if (r_type
>= BFIN_GNUEXT_RELOC_MIN
&& r_type
<= BFIN_GNUEXT_RELOC_MAX
)
1056 cache_ptr
->howto
= &bfin_gnuext_howto_table
[r_type
- BFIN_GNUEXT_RELOC_MIN
];
1059 cache_ptr
->howto
= (reloc_howto_type
*) NULL
;
1062 /* Given a BFD reloc type, return the howto. */
1063 static reloc_howto_type
*
1064 bfin_bfd_reloc_type_lookup (bfd
* abfd ATTRIBUTE_UNUSED
,
1065 bfd_reloc_code_real_type code
)
1068 unsigned int r_type
= (unsigned int) -1;
1070 for (i
= sizeof (bfin_reloc_map
) / sizeof (bfin_reloc_map
[0]); i
--;)
1071 if (bfin_reloc_map
[i
].bfd_reloc_val
== code
)
1072 r_type
= bfin_reloc_map
[i
].bfin_reloc_val
;
1074 if (r_type
<= BFIN_RELOC_MAX
)
1075 return &bfin_howto_table
[r_type
];
1077 else if (r_type
>= BFIN_GNUEXT_RELOC_MIN
&& r_type
<= BFIN_GNUEXT_RELOC_MAX
)
1078 return &bfin_gnuext_howto_table
[r_type
- BFIN_GNUEXT_RELOC_MIN
];
1080 return (reloc_howto_type
*) NULL
;
1083 static reloc_howto_type
*
1084 bfin_bfd_reloc_name_lookup (bfd
*abfd ATTRIBUTE_UNUSED
,
1090 i
< (sizeof (bfin_howto_table
)
1091 / sizeof (bfin_howto_table
[0]));
1093 if (bfin_howto_table
[i
].name
!= NULL
1094 && strcasecmp (bfin_howto_table
[i
].name
, r_name
) == 0)
1095 return &bfin_howto_table
[i
];
1098 i
< (sizeof (bfin_gnuext_howto_table
)
1099 / sizeof (bfin_gnuext_howto_table
[0]));
1101 if (bfin_gnuext_howto_table
[i
].name
!= NULL
1102 && strcasecmp (bfin_gnuext_howto_table
[i
].name
, r_name
) == 0)
1103 return &bfin_gnuext_howto_table
[i
];
1108 /* Given a bfin relocation type, return the howto. */
1109 static reloc_howto_type
*
1110 bfin_reloc_type_lookup (bfd
* abfd ATTRIBUTE_UNUSED
,
1111 unsigned int r_type
)
1113 if (r_type
<= BFIN_RELOC_MAX
)
1114 return &bfin_howto_table
[r_type
];
1116 else if (r_type
>= BFIN_GNUEXT_RELOC_MIN
&& r_type
<= BFIN_GNUEXT_RELOC_MAX
)
1117 return &bfin_gnuext_howto_table
[r_type
- BFIN_GNUEXT_RELOC_MIN
];
1119 return (reloc_howto_type
*) NULL
;
1122 /* Set by ld emulation if --code-in-l1. */
1123 bfd_boolean elf32_bfin_code_in_l1
= 0;
1125 /* Set by ld emulation if --data-in-l1. */
1126 bfd_boolean elf32_bfin_data_in_l1
= 0;
1129 elf32_bfin_final_write_processing (bfd
*abfd
,
1130 bfd_boolean linker ATTRIBUTE_UNUSED
)
1132 if (elf32_bfin_code_in_l1
)
1133 elf_elfheader (abfd
)->e_flags
|= EF_BFIN_CODE_IN_L1
;
1134 if (elf32_bfin_data_in_l1
)
1135 elf_elfheader (abfd
)->e_flags
|= EF_BFIN_DATA_IN_L1
;
1138 /* Return TRUE if the name is a local label.
1139 bfin local labels begin with L$. */
1141 bfin_is_local_label_name (bfd
*abfd
, const char *label
)
1143 if (label
[0] == 'L' && label
[1] == '$' )
1146 return _bfd_elf_is_local_label_name (abfd
, label
);
1149 /* Look through the relocs for a section during the first phase, and
1150 allocate space in the global offset table or procedure linkage
1154 bfin_check_relocs (bfd
* abfd
,
1155 struct bfd_link_info
*info
,
1157 const Elf_Internal_Rela
*relocs
)
1160 Elf_Internal_Shdr
*symtab_hdr
;
1161 struct elf_link_hash_entry
**sym_hashes
;
1162 bfd_signed_vma
*local_got_refcounts
;
1163 const Elf_Internal_Rela
*rel
;
1164 const Elf_Internal_Rela
*rel_end
;
1168 if (bfd_link_relocatable (info
))
1171 dynobj
= elf_hash_table (info
)->dynobj
;
1172 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
1173 sym_hashes
= elf_sym_hashes (abfd
);
1174 local_got_refcounts
= elf_local_got_refcounts (abfd
);
1179 rel_end
= relocs
+ sec
->reloc_count
;
1180 for (rel
= relocs
; rel
< rel_end
; rel
++)
1182 unsigned long r_symndx
;
1183 struct elf_link_hash_entry
*h
;
1185 r_symndx
= ELF32_R_SYM (rel
->r_info
);
1186 if (r_symndx
< symtab_hdr
->sh_info
)
1190 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
1192 /* PR15323, ref flags aren't set for references in the same
1194 h
->root
.non_ir_ref_regular
= 1;
1197 switch (ELF32_R_TYPE (rel
->r_info
))
1199 /* This relocation describes the C++ object vtable hierarchy.
1200 Reconstruct it for later use during GC. */
1201 case R_BFIN_GNU_VTINHERIT
:
1202 if (!bfd_elf_gc_record_vtinherit (abfd
, sec
, h
, rel
->r_offset
))
1206 /* This relocation describes which C++ vtable entries
1207 are actually used. Record for later use during GC. */
1208 case R_BFIN_GNU_VTENTRY
:
1209 BFD_ASSERT (h
!= NULL
);
1211 && !bfd_elf_gc_record_vtentry (abfd
, sec
, h
, rel
->r_addend
))
1217 && strcmp (h
->root
.root
.string
, "__GLOBAL_OFFSET_TABLE_") == 0)
1223 /* Create the .got section. */
1224 elf_hash_table (info
)->dynobj
= dynobj
= abfd
;
1225 if (!_bfd_elf_create_got_section (dynobj
, info
))
1229 sgot
= elf_hash_table (info
)->sgot
;
1230 srelgot
= elf_hash_table (info
)->srelgot
;
1231 BFD_ASSERT (sgot
!= NULL
);
1235 if (h
->got
.refcount
== 0)
1237 /* Make sure this symbol is output as a dynamic symbol. */
1238 if (h
->dynindx
== -1 && !h
->forced_local
)
1240 if (!bfd_elf_link_record_dynamic_symbol (info
, h
))
1244 /* Allocate space in the .got section. */
1246 /* Allocate relocation space. */
1247 srelgot
->size
+= sizeof (Elf32_External_Rela
);
1253 /* This is a global offset table entry for a local symbol. */
1254 if (local_got_refcounts
== NULL
)
1258 size
= symtab_hdr
->sh_info
;
1259 size
*= sizeof (bfd_signed_vma
);
1260 local_got_refcounts
= ((bfd_signed_vma
*)
1261 bfd_zalloc (abfd
, size
));
1262 if (local_got_refcounts
== NULL
)
1264 elf_local_got_refcounts (abfd
) = local_got_refcounts
;
1266 if (local_got_refcounts
[r_symndx
] == 0)
1269 if (bfd_link_pic (info
))
1271 /* If we are generating a shared object, we need to
1272 output a R_68K_RELATIVE reloc so that the dynamic
1273 linker can adjust this GOT entry. */
1274 srelgot
->size
+= sizeof (Elf32_External_Rela
);
1277 local_got_refcounts
[r_symndx
]++;
1289 static enum elf_reloc_type_class
1290 elf32_bfin_reloc_type_class (const struct bfd_link_info
*info ATTRIBUTE_UNUSED
,
1291 const asection
*rel_sec ATTRIBUTE_UNUSED
,
1292 const Elf_Internal_Rela
* rela
)
1294 switch ((int) ELF32_R_TYPE (rela
->r_info
))
1297 return reloc_class_normal
;
1301 static bfd_reloc_status_type
1302 bfin_final_link_relocate (Elf_Internal_Rela
*rel
, reloc_howto_type
*howto
,
1303 bfd
*input_bfd
, asection
*input_section
,
1304 bfd_byte
*contents
, bfd_vma address
,
1305 bfd_vma value
, bfd_vma addend
)
1307 int r_type
= ELF32_R_TYPE (rel
->r_info
);
1309 if (r_type
== R_BFIN_PCREL24
|| r_type
== R_BFIN_PCREL24_JUMP_L
)
1311 bfd_reloc_status_type r
= bfd_reloc_ok
;
1314 if (address
> bfd_get_section_limit (input_bfd
, input_section
))
1315 return bfd_reloc_outofrange
;
1319 /* Perform usual pc-relative correction. */
1320 value
-= input_section
->output_section
->vma
+ input_section
->output_offset
;
1323 /* We are getting reloc_entry->address 2 byte off from
1324 the start of instruction. Assuming absolute postion
1325 of the reloc data. But, following code had been written assuming
1326 reloc address is starting at begining of instruction.
1327 To compensate that I have increased the value of
1328 relocation by 1 (effectively 2) and used the addr -2 instead of addr. */
1333 if ((value
& 0xFF000000) != 0
1334 && (value
& 0xFF000000) != 0xFF000000)
1335 r
= bfd_reloc_overflow
;
1339 x
= bfd_get_16 (input_bfd
, contents
+ address
);
1340 x
= (x
& 0xff00) | ((value
>> 16) & 0xff);
1341 bfd_put_16 (input_bfd
, x
, contents
+ address
);
1343 x
= bfd_get_16 (input_bfd
, contents
+ address
+ 2);
1345 bfd_put_16 (input_bfd
, x
, contents
+ address
+ 2);
1349 return _bfd_final_link_relocate (howto
, input_bfd
, input_section
, contents
,
1350 rel
->r_offset
, value
, addend
);
1355 bfin_relocate_section (bfd
* output_bfd
,
1356 struct bfd_link_info
*info
,
1358 asection
* input_section
,
1359 bfd_byte
* contents
,
1360 Elf_Internal_Rela
* relocs
,
1361 Elf_Internal_Sym
* local_syms
,
1362 asection
** local_sections
)
1365 Elf_Internal_Shdr
*symtab_hdr
;
1366 struct elf_link_hash_entry
**sym_hashes
;
1367 bfd_vma
*local_got_offsets
;
1369 Elf_Internal_Rela
*rel
;
1370 Elf_Internal_Rela
*relend
;
1373 dynobj
= elf_hash_table (info
)->dynobj
;
1374 symtab_hdr
= &elf_tdata (input_bfd
)->symtab_hdr
;
1375 sym_hashes
= elf_sym_hashes (input_bfd
);
1376 local_got_offsets
= elf_local_got_offsets (input_bfd
);
1381 relend
= relocs
+ input_section
->reloc_count
;
1382 for (; rel
< relend
; rel
++, i
++)
1385 reloc_howto_type
*howto
;
1386 unsigned long r_symndx
;
1387 struct elf_link_hash_entry
*h
;
1388 Elf_Internal_Sym
*sym
;
1390 bfd_vma relocation
= 0;
1391 bfd_boolean unresolved_reloc
;
1392 bfd_reloc_status_type r
;
1395 r_type
= ELF32_R_TYPE (rel
->r_info
);
1396 if (r_type
< 0 || r_type
>= 243)
1398 bfd_set_error (bfd_error_bad_value
);
1402 if (r_type
== R_BFIN_GNU_VTENTRY
1403 || r_type
== R_BFIN_GNU_VTINHERIT
)
1406 howto
= bfin_reloc_type_lookup (input_bfd
, r_type
);
1409 bfd_set_error (bfd_error_bad_value
);
1412 r_symndx
= ELF32_R_SYM (rel
->r_info
);
1417 unresolved_reloc
= FALSE
;
1419 if (r_symndx
< symtab_hdr
->sh_info
)
1421 sym
= local_syms
+ r_symndx
;
1422 sec
= local_sections
[r_symndx
];
1423 relocation
= _bfd_elf_rela_local_sym (output_bfd
, sym
, &sec
, rel
);
1427 bfd_boolean warned
, ignored
;
1429 RELOC_FOR_GLOBAL_SYMBOL (info
, input_bfd
, input_section
, rel
,
1430 r_symndx
, symtab_hdr
, sym_hashes
,
1432 unresolved_reloc
, warned
, ignored
);
1435 if (sec
!= NULL
&& discarded_section (sec
))
1436 RELOC_AGAINST_DISCARDED_SECTION (info
, input_bfd
, input_section
,
1437 rel
, 1, relend
, howto
, 0, contents
);
1439 if (bfd_link_relocatable (info
))
1442 address
= rel
->r_offset
;
1444 /* Then, process normally. */
1447 case R_BFIN_GNU_VTINHERIT
:
1448 case R_BFIN_GNU_VTENTRY
:
1449 return bfd_reloc_ok
;
1452 /* Relocation is to the address of the entry for this symbol
1453 in the global offset table. */
1455 && strcmp (h
->root
.root
.string
, "__GLOBAL_OFFSET_TABLE_") == 0)
1458 /* Relocation is the offset of the entry for this symbol in
1459 the global offset table. */
1466 /* Create the .got section. */
1467 elf_hash_table (info
)->dynobj
= dynobj
= output_bfd
;
1468 if (!_bfd_elf_create_got_section (dynobj
, info
))
1472 sgot
= elf_hash_table (info
)->sgot
;
1473 BFD_ASSERT (sgot
!= NULL
);
1479 off
= h
->got
.offset
;
1480 BFD_ASSERT (off
!= (bfd_vma
) - 1);
1481 dyn
= elf_hash_table (info
)->dynamic_sections_created
;
1483 if (!WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn
,
1484 bfd_link_pic (info
),
1486 || (bfd_link_pic (info
)
1492 /* This is actually a static link, or it is a
1493 -Bsymbolic link and the symbol is defined
1494 locally, or the symbol was forced to be local
1495 because of a version file.. We must initialize
1496 this entry in the global offset table. Since
1497 the offset must always be a multiple of 4, we
1498 use the least significant bit to record whether
1499 we have initialized it already.
1501 When doing a dynamic link, we create a .rela.got
1502 relocation entry to initialize the value. This
1503 is done in the finish_dynamic_symbol routine. */
1508 bfd_put_32 (output_bfd
, relocation
,
1509 sgot
->contents
+ off
);
1514 unresolved_reloc
= FALSE
;
1518 BFD_ASSERT (local_got_offsets
!= NULL
);
1519 off
= local_got_offsets
[r_symndx
];
1520 BFD_ASSERT (off
!= (bfd_vma
) - 1);
1522 /* The offset must always be a multiple of 4. We use
1523 the least significant bit to record whether we have
1524 already generated the necessary reloc. */
1529 bfd_put_32 (output_bfd
, relocation
, sgot
->contents
+ off
);
1531 if (bfd_link_pic (info
))
1534 Elf_Internal_Rela outrel
;
1537 s
= elf_hash_table (info
)->srelgot
;
1538 BFD_ASSERT (s
!= NULL
);
1540 outrel
.r_offset
= (sgot
->output_section
->vma
1541 + sgot
->output_offset
+ off
);
1543 ELF32_R_INFO (0, R_BFIN_PCREL24
);
1544 outrel
.r_addend
= relocation
;
1547 s
->reloc_count
++ * sizeof (Elf32_External_Rela
);
1548 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
1551 local_got_offsets
[r_symndx
] |= 1;
1555 relocation
= sgot
->output_offset
+ off
;
1557 /* bfin : preg = [preg + 17bitdiv4offset] relocation is div by 4. */
1564 r
= bfin_final_link_relocate (rel
, howto
, input_bfd
, input_section
,
1566 relocation
, rel
->r_addend
);
1571 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
1572 because such sections are not SEC_ALLOC and thus ld.so will
1573 not process them. */
1574 if (unresolved_reloc
1575 && !((input_section
->flags
& SEC_DEBUGGING
) != 0 && h
->def_dynamic
)
1576 && _bfd_elf_section_offset (output_bfd
, info
, input_section
,
1577 rel
->r_offset
) != (bfd_vma
) -1)
1580 /* xgettext:c-format */
1581 (_("%B(%A+%#Lx): unresolvable relocation against symbol `%s'"),
1583 input_section
, rel
->r_offset
, h
->root
.root
.string
);
1587 if (r
!= bfd_reloc_ok
)
1592 name
= h
->root
.root
.string
;
1595 name
= bfd_elf_string_from_elf_section (input_bfd
,
1596 symtab_hdr
->sh_link
,
1601 name
= bfd_section_name (input_bfd
, sec
);
1604 if (r
== bfd_reloc_overflow
)
1605 (*info
->callbacks
->reloc_overflow
)
1606 (info
, (h
? &h
->root
: NULL
), name
, howto
->name
,
1607 (bfd_vma
) 0, input_bfd
, input_section
, rel
->r_offset
);
1611 /* xgettext:c-format */
1612 (_("%B(%A+%#Lx): reloc against `%s': error %d"),
1613 input_bfd
, input_section
, rel
->r_offset
, name
, (int) r
);
1623 bfin_gc_mark_hook (asection
* sec
,
1624 struct bfd_link_info
*info
,
1625 Elf_Internal_Rela
* rel
,
1626 struct elf_link_hash_entry
*h
,
1627 Elf_Internal_Sym
* sym
)
1630 switch (ELF32_R_TYPE (rel
->r_info
))
1632 case R_BFIN_GNU_VTINHERIT
:
1633 case R_BFIN_GNU_VTENTRY
:
1637 return _bfd_elf_gc_mark_hook (sec
, info
, rel
, h
, sym
);
1640 extern const bfd_target bfin_elf32_fdpic_vec
;
1641 #define IS_FDPIC(bfd) ((bfd)->xvec == &bfin_elf32_fdpic_vec)
1643 /* An extension of the elf hash table data structure,
1644 containing some additional Blackfin-specific data. */
1645 struct bfinfdpic_elf_link_hash_table
1647 struct elf_link_hash_table elf
;
1649 /* A pointer to the .rofixup section. */
1650 asection
*sgotfixup
;
1651 /* GOT base offset. */
1653 /* Location of the first non-lazy PLT entry, i.e., the number of
1654 bytes taken by lazy PLT entries. */
1656 /* A hash table holding information about which symbols were
1657 referenced with which PIC-related relocations. */
1658 struct htab
*relocs_info
;
1659 /* Summary reloc information collected by
1660 _bfinfdpic_count_got_plt_entries. */
1661 struct _bfinfdpic_dynamic_got_info
*g
;
1664 /* Get the Blackfin ELF linker hash table from a link_info structure. */
1666 #define bfinfdpic_hash_table(info) \
1667 (elf_hash_table_id ((struct elf_link_hash_table *) ((info)->hash)) \
1668 == BFIN_ELF_DATA ? ((struct bfinfdpic_elf_link_hash_table *) ((info)->hash)) : NULL)
1670 #define bfinfdpic_got_section(info) \
1671 (bfinfdpic_hash_table (info)->elf.sgot)
1672 #define bfinfdpic_gotrel_section(info) \
1673 (bfinfdpic_hash_table (info)->elf.srelgot)
1674 #define bfinfdpic_gotfixup_section(info) \
1675 (bfinfdpic_hash_table (info)->sgotfixup)
1676 #define bfinfdpic_plt_section(info) \
1677 (bfinfdpic_hash_table (info)->elf.splt)
1678 #define bfinfdpic_pltrel_section(info) \
1679 (bfinfdpic_hash_table (info)->elf.srelplt)
1680 #define bfinfdpic_relocs_info(info) \
1681 (bfinfdpic_hash_table (info)->relocs_info)
1682 #define bfinfdpic_got_initial_offset(info) \
1683 (bfinfdpic_hash_table (info)->got0)
1684 #define bfinfdpic_plt_initial_offset(info) \
1685 (bfinfdpic_hash_table (info)->plt0)
1686 #define bfinfdpic_dynamic_got_plt_info(info) \
1687 (bfinfdpic_hash_table (info)->g)
1689 /* The name of the dynamic interpreter. This is put in the .interp
1692 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
1694 #define DEFAULT_STACK_SIZE 0x20000
1696 /* This structure is used to collect the number of entries present in
1697 each addressable range of the got. */
1698 struct _bfinfdpic_dynamic_got_info
1700 /* Several bits of information about the current link. */
1701 struct bfd_link_info
*info
;
1702 /* Total size needed for GOT entries within the 18- or 32-bit
1704 bfd_vma got17m4
, gothilo
;
1705 /* Total size needed for function descriptor entries within the 18-
1706 or 32-bit ranges. */
1707 bfd_vma fd17m4
, fdhilo
;
1708 /* Total size needed function descriptor entries referenced in PLT
1709 entries, that would be profitable to place in offsets close to
1710 the PIC register. */
1712 /* Total size needed by lazy PLT entries. */
1714 /* Number of relocations carried over from input object files. */
1715 unsigned long relocs
;
1716 /* Number of fixups introduced by relocations in input object files. */
1717 unsigned long fixups
;
1720 /* Create a Blackfin ELF linker hash table. */
1722 static struct bfd_link_hash_table
*
1723 bfinfdpic_elf_link_hash_table_create (bfd
*abfd
)
1725 struct bfinfdpic_elf_link_hash_table
*ret
;
1726 bfd_size_type amt
= sizeof (struct bfinfdpic_elf_link_hash_table
);
1728 ret
= bfd_zmalloc (amt
);
1732 if (!_bfd_elf_link_hash_table_init (&ret
->elf
, abfd
,
1733 _bfd_elf_link_hash_newfunc
,
1734 sizeof (struct elf_link_hash_entry
),
1741 return &ret
->elf
.root
;
1744 /* Decide whether a reference to a symbol can be resolved locally or
1745 not. If the symbol is protected, we want the local address, but
1746 its function descriptor must be assigned by the dynamic linker. */
1747 #define BFINFDPIC_SYM_LOCAL(INFO, H) \
1748 (_bfd_elf_symbol_refs_local_p ((H), (INFO), 1) \
1749 || ! elf_hash_table (INFO)->dynamic_sections_created)
1750 #define BFINFDPIC_FUNCDESC_LOCAL(INFO, H) \
1751 ((H)->dynindx == -1 || ! elf_hash_table (INFO)->dynamic_sections_created)
1753 /* This structure collects information on what kind of GOT, PLT or
1754 function descriptors are required by relocations that reference a
1756 struct bfinfdpic_relocs_info
1758 /* The index of the symbol, as stored in the relocation r_info, if
1759 we have a local symbol; -1 otherwise. */
1763 /* The input bfd in which the symbol is defined, if it's a local
1766 /* If symndx == -1, the hash table entry corresponding to a global
1767 symbol (even if it turns out to bind locally, in which case it
1768 should ideally be replaced with section's symndx + addend). */
1769 struct elf_link_hash_entry
*h
;
1771 /* The addend of the relocation that references the symbol. */
1774 /* The fields above are used to identify an entry. The fields below
1775 contain information on how an entry is used and, later on, which
1776 locations it was assigned. */
1777 /* The following 2 fields record whether the symbol+addend above was
1778 ever referenced with a GOT relocation. The 17M4 suffix indicates a
1779 GOT17M4 relocation; hilo is used for GOTLO/GOTHI pairs. */
1782 /* Whether a FUNCDESC relocation references symbol+addend. */
1784 /* Whether a FUNCDESC_GOT relocation references symbol+addend. */
1787 /* Whether a FUNCDESC_GOTOFF relocation references symbol+addend. */
1788 unsigned fdgoff17m4
;
1789 unsigned fdgoffhilo
;
1790 /* Whether symbol+addend is referenced with GOTOFF17M4, GOTOFFLO or
1791 GOTOFFHI relocations. The addend doesn't really matter, since we
1792 envision that this will only be used to check whether the symbol
1793 is mapped to the same segment as the got. */
1795 /* Whether symbol+addend is referenced by a LABEL24 relocation. */
1797 /* Whether symbol+addend is referenced by a 32 or FUNCDESC_VALUE
1800 /* Whether we need a PLT entry for a symbol. Should be implied by
1802 (call && symndx == -1 && ! BFINFDPIC_SYM_LOCAL (info, d.h)) */
1804 /* Whether a function descriptor should be created in this link unit
1805 for symbol+addend. Should be implied by something like:
1806 (plt || fdgotoff17m4 || fdgotofflohi
1807 || ((fd || fdgot17m4 || fdgothilo)
1808 && (symndx != -1 || BFINFDPIC_FUNCDESC_LOCAL (info, d.h)))) */
1810 /* Whether a lazy PLT entry is needed for this symbol+addend.
1811 Should be implied by something like:
1812 (privfd && symndx == -1 && ! BFINFDPIC_SYM_LOCAL (info, d.h)
1813 && ! (info->flags & DF_BIND_NOW)) */
1815 /* Whether we've already emitted GOT relocations and PLT entries as
1816 needed for this symbol. */
1819 /* The number of R_BFIN_BYTE4_DATA, R_BFIN_FUNCDESC and R_BFIN_FUNCDESC_VALUE
1820 relocations referencing the symbol. */
1821 unsigned relocs32
, relocsfd
, relocsfdv
;
1823 /* The number of .rofixups entries and dynamic relocations allocated
1824 for this symbol, minus any that might have already been used. */
1825 unsigned fixups
, dynrelocs
;
1827 /* The offsets of the GOT entries assigned to symbol+addend, to the
1828 function descriptor's address, and to a function descriptor,
1829 respectively. Should be zero if unassigned. The offsets are
1830 counted from the value that will be assigned to the PIC register,
1831 not from the beginning of the .got section. */
1832 bfd_signed_vma got_entry
, fdgot_entry
, fd_entry
;
1833 /* The offsets of the PLT entries assigned to symbol+addend,
1834 non-lazy and lazy, respectively. If unassigned, should be
1836 bfd_vma plt_entry
, lzplt_entry
;
1839 /* Compute a hash with the key fields of an bfinfdpic_relocs_info entry. */
1841 bfinfdpic_relocs_info_hash (const void *entry_
)
1843 const struct bfinfdpic_relocs_info
*entry
= entry_
;
1845 return (entry
->symndx
== -1
1846 ? (long) entry
->d
.h
->root
.root
.hash
1847 : entry
->symndx
+ (long) entry
->d
.abfd
->id
* 257) + entry
->addend
;
1850 /* Test whether the key fields of two bfinfdpic_relocs_info entries are
1853 bfinfdpic_relocs_info_eq (const void *entry1
, const void *entry2
)
1855 const struct bfinfdpic_relocs_info
*e1
= entry1
;
1856 const struct bfinfdpic_relocs_info
*e2
= entry2
;
1858 return e1
->symndx
== e2
->symndx
&& e1
->addend
== e2
->addend
1859 && (e1
->symndx
== -1 ? e1
->d
.h
== e2
->d
.h
: e1
->d
.abfd
== e2
->d
.abfd
);
1862 /* Find or create an entry in a hash table HT that matches the key
1863 fields of the given ENTRY. If it's not found, memory for a new
1864 entry is allocated in ABFD's obstack. */
1865 static struct bfinfdpic_relocs_info
*
1866 bfinfdpic_relocs_info_find (struct htab
*ht
,
1868 const struct bfinfdpic_relocs_info
*entry
,
1869 enum insert_option insert
)
1871 struct bfinfdpic_relocs_info
**loc
;
1876 loc
= (struct bfinfdpic_relocs_info
**) htab_find_slot (ht
, entry
, insert
);
1884 *loc
= bfd_zalloc (abfd
, sizeof (**loc
));
1889 (*loc
)->symndx
= entry
->symndx
;
1890 (*loc
)->d
= entry
->d
;
1891 (*loc
)->addend
= entry
->addend
;
1892 (*loc
)->plt_entry
= (bfd_vma
)-1;
1893 (*loc
)->lzplt_entry
= (bfd_vma
)-1;
1898 /* Obtain the address of the entry in HT associated with H's symbol +
1899 addend, creating a new entry if none existed. ABFD is only used
1900 for memory allocation purposes. */
1901 inline static struct bfinfdpic_relocs_info
*
1902 bfinfdpic_relocs_info_for_global (struct htab
*ht
,
1904 struct elf_link_hash_entry
*h
,
1906 enum insert_option insert
)
1908 struct bfinfdpic_relocs_info entry
;
1912 entry
.addend
= addend
;
1914 return bfinfdpic_relocs_info_find (ht
, abfd
, &entry
, insert
);
1917 /* Obtain the address of the entry in HT associated with the SYMNDXth
1918 local symbol of the input bfd ABFD, plus the addend, creating a new
1919 entry if none existed. */
1920 inline static struct bfinfdpic_relocs_info
*
1921 bfinfdpic_relocs_info_for_local (struct htab
*ht
,
1925 enum insert_option insert
)
1927 struct bfinfdpic_relocs_info entry
;
1929 entry
.symndx
= symndx
;
1930 entry
.d
.abfd
= abfd
;
1931 entry
.addend
= addend
;
1933 return bfinfdpic_relocs_info_find (ht
, abfd
, &entry
, insert
);
1936 /* Merge fields set by check_relocs() of two entries that end up being
1937 mapped to the same (presumably global) symbol. */
1940 bfinfdpic_pic_merge_early_relocs_info (struct bfinfdpic_relocs_info
*e2
,
1941 struct bfinfdpic_relocs_info
const *e1
)
1943 e2
->got17m4
|= e1
->got17m4
;
1944 e2
->gothilo
|= e1
->gothilo
;
1946 e2
->fdgot17m4
|= e1
->fdgot17m4
;
1947 e2
->fdgothilo
|= e1
->fdgothilo
;
1948 e2
->fdgoff17m4
|= e1
->fdgoff17m4
;
1949 e2
->fdgoffhilo
|= e1
->fdgoffhilo
;
1950 e2
->gotoff
|= e1
->gotoff
;
1951 e2
->call
|= e1
->call
;
1955 /* Every block of 65535 lazy PLT entries shares a single call to the
1956 resolver, inserted in the 32768th lazy PLT entry (i.e., entry #
1957 32767, counting from 0). All other lazy PLT entries branch to it
1958 in a single instruction. */
1960 #define LZPLT_RESOLVER_EXTRA 10
1961 #define LZPLT_NORMAL_SIZE 6
1962 #define LZPLT_ENTRIES 1362
1964 #define BFINFDPIC_LZPLT_BLOCK_SIZE ((bfd_vma) LZPLT_NORMAL_SIZE * LZPLT_ENTRIES + LZPLT_RESOLVER_EXTRA)
1965 #define BFINFDPIC_LZPLT_RESOLV_LOC (LZPLT_NORMAL_SIZE * LZPLT_ENTRIES / 2)
1967 /* Add a dynamic relocation to the SRELOC section. */
1969 inline static bfd_vma
1970 _bfinfdpic_add_dyn_reloc (bfd
*output_bfd
, asection
*sreloc
, bfd_vma offset
,
1971 int reloc_type
, long dynindx
, bfd_vma addend
,
1972 struct bfinfdpic_relocs_info
*entry
)
1974 Elf_Internal_Rela outrel
;
1975 bfd_vma reloc_offset
;
1977 outrel
.r_offset
= offset
;
1978 outrel
.r_info
= ELF32_R_INFO (dynindx
, reloc_type
);
1979 outrel
.r_addend
= addend
;
1981 reloc_offset
= sreloc
->reloc_count
* sizeof (Elf32_External_Rel
);
1982 BFD_ASSERT (reloc_offset
< sreloc
->size
);
1983 bfd_elf32_swap_reloc_out (output_bfd
, &outrel
,
1984 sreloc
->contents
+ reloc_offset
);
1985 sreloc
->reloc_count
++;
1987 /* If the entry's index is zero, this relocation was probably to a
1988 linkonce section that got discarded. We reserved a dynamic
1989 relocation, but it was for another entry than the one we got at
1990 the time of emitting the relocation. Unfortunately there's no
1991 simple way for us to catch this situation, since the relocation
1992 is cleared right before calling relocate_section, at which point
1993 we no longer know what the relocation used to point to. */
1996 BFD_ASSERT (entry
->dynrelocs
> 0);
2000 return reloc_offset
;
2003 /* Add a fixup to the ROFIXUP section. */
2006 _bfinfdpic_add_rofixup (bfd
*output_bfd
, asection
*rofixup
, bfd_vma offset
,
2007 struct bfinfdpic_relocs_info
*entry
)
2009 bfd_vma fixup_offset
;
2011 if (rofixup
->flags
& SEC_EXCLUDE
)
2014 fixup_offset
= rofixup
->reloc_count
* 4;
2015 if (rofixup
->contents
)
2017 BFD_ASSERT (fixup_offset
< rofixup
->size
);
2018 bfd_put_32 (output_bfd
, offset
, rofixup
->contents
+ fixup_offset
);
2020 rofixup
->reloc_count
++;
2022 if (entry
&& entry
->symndx
)
2024 /* See discussion about symndx == 0 in _bfinfdpic_add_dyn_reloc
2026 BFD_ASSERT (entry
->fixups
> 0);
2030 return fixup_offset
;
2033 /* Find the segment number in which OSEC, and output section, is
2037 _bfinfdpic_osec_to_segment (bfd
*output_bfd
, asection
*osec
)
2039 Elf_Internal_Phdr
*p
= _bfd_elf_find_segment_containing_section (output_bfd
, osec
);
2041 return (p
!= NULL
) ? p
- elf_tdata (output_bfd
)->phdr
: -1;
2044 inline static bfd_boolean
2045 _bfinfdpic_osec_readonly_p (bfd
*output_bfd
, asection
*osec
)
2047 unsigned seg
= _bfinfdpic_osec_to_segment (output_bfd
, osec
);
2049 return ! (elf_tdata (output_bfd
)->phdr
[seg
].p_flags
& PF_W
);
2052 /* Generate relocations for GOT entries, function descriptors, and
2053 code for PLT and lazy PLT entries. */
2055 inline static bfd_boolean
2056 _bfinfdpic_emit_got_relocs_plt_entries (struct bfinfdpic_relocs_info
*entry
,
2058 struct bfd_link_info
*info
,
2060 Elf_Internal_Sym
*sym
,
2063 bfd_vma fd_lazy_rel_offset
= (bfd_vma
) -1;
2070 if (entry
->got_entry
|| entry
->fdgot_entry
|| entry
->fd_entry
)
2072 /* If the symbol is dynamic, consider it for dynamic
2073 relocations, otherwise decay to section + offset. */
2074 if (entry
->symndx
== -1 && entry
->d
.h
->dynindx
!= -1)
2075 dynindx
= entry
->d
.h
->dynindx
;
2079 && sec
->output_section
2080 && ! bfd_is_abs_section (sec
->output_section
)
2081 && ! bfd_is_und_section (sec
->output_section
))
2082 dynindx
= elf_section_data (sec
->output_section
)->dynindx
;
2088 /* Generate relocation for GOT entry pointing to the symbol. */
2089 if (entry
->got_entry
)
2092 bfd_vma ad
= addend
;
2094 /* If the symbol is dynamic but binds locally, use
2096 if (sec
&& (entry
->symndx
!= -1
2097 || BFINFDPIC_SYM_LOCAL (info
, entry
->d
.h
)))
2099 if (entry
->symndx
== -1)
2100 ad
+= entry
->d
.h
->root
.u
.def
.value
;
2102 ad
+= sym
->st_value
;
2103 ad
+= sec
->output_offset
;
2104 if (sec
->output_section
&& elf_section_data (sec
->output_section
))
2105 idx
= elf_section_data (sec
->output_section
)->dynindx
;
2110 /* If we're linking an executable at a fixed address, we can
2111 omit the dynamic relocation as long as the symbol is local to
2113 if (bfd_link_pde (info
)
2114 && (entry
->symndx
!= -1
2115 || BFINFDPIC_SYM_LOCAL (info
, entry
->d
.h
)))
2118 ad
+= sec
->output_section
->vma
;
2119 if (entry
->symndx
!= -1
2120 || entry
->d
.h
->root
.type
!= bfd_link_hash_undefweak
)
2121 _bfinfdpic_add_rofixup (output_bfd
,
2122 bfinfdpic_gotfixup_section (info
),
2123 bfinfdpic_got_section (info
)->output_section
2125 + bfinfdpic_got_section (info
)->output_offset
2126 + bfinfdpic_got_initial_offset (info
)
2127 + entry
->got_entry
, entry
);
2130 _bfinfdpic_add_dyn_reloc (output_bfd
, bfinfdpic_gotrel_section (info
),
2131 _bfd_elf_section_offset
2133 bfinfdpic_got_section (info
),
2134 bfinfdpic_got_initial_offset (info
)
2136 + bfinfdpic_got_section (info
)
2137 ->output_section
->vma
2138 + bfinfdpic_got_section (info
)->output_offset
,
2139 R_BFIN_BYTE4_DATA
, idx
, ad
, entry
);
2141 bfd_put_32 (output_bfd
, ad
,
2142 bfinfdpic_got_section (info
)->contents
2143 + bfinfdpic_got_initial_offset (info
)
2144 + entry
->got_entry
);
2147 /* Generate relocation for GOT entry pointing to a canonical
2148 function descriptor. */
2149 if (entry
->fdgot_entry
)
2154 if (! (entry
->symndx
== -1
2155 && entry
->d
.h
->root
.type
== bfd_link_hash_undefweak
2156 && BFINFDPIC_SYM_LOCAL (info
, entry
->d
.h
)))
2158 /* If the symbol is dynamic and there may be dynamic symbol
2159 resolution because we are, or are linked with, a shared
2160 library, emit a FUNCDESC relocation such that the dynamic
2161 linker will allocate the function descriptor. If the
2162 symbol needs a non-local function descriptor but binds
2163 locally (e.g., its visibility is protected, emit a
2164 dynamic relocation decayed to section+offset. */
2165 if (entry
->symndx
== -1
2166 && ! BFINFDPIC_FUNCDESC_LOCAL (info
, entry
->d
.h
)
2167 && BFINFDPIC_SYM_LOCAL (info
, entry
->d
.h
)
2168 && !bfd_link_pde (info
))
2170 reloc
= R_BFIN_FUNCDESC
;
2171 idx
= elf_section_data (entry
->d
.h
->root
.u
.def
.section
2172 ->output_section
)->dynindx
;
2173 ad
= entry
->d
.h
->root
.u
.def
.section
->output_offset
2174 + entry
->d
.h
->root
.u
.def
.value
;
2176 else if (entry
->symndx
== -1
2177 && ! BFINFDPIC_FUNCDESC_LOCAL (info
, entry
->d
.h
))
2179 reloc
= R_BFIN_FUNCDESC
;
2187 /* Otherwise, we know we have a private function descriptor,
2188 so reference it directly. */
2189 if (elf_hash_table (info
)->dynamic_sections_created
)
2190 BFD_ASSERT (entry
->privfd
);
2191 reloc
= R_BFIN_BYTE4_DATA
;
2192 idx
= elf_section_data (bfinfdpic_got_section (info
)
2193 ->output_section
)->dynindx
;
2194 ad
= bfinfdpic_got_section (info
)->output_offset
2195 + bfinfdpic_got_initial_offset (info
) + entry
->fd_entry
;
2198 /* If there is room for dynamic symbol resolution, emit the
2199 dynamic relocation. However, if we're linking an
2200 executable at a fixed location, we won't have emitted a
2201 dynamic symbol entry for the got section, so idx will be
2202 zero, which means we can and should compute the address
2203 of the private descriptor ourselves. */
2204 if (bfd_link_pde (info
)
2205 && (entry
->symndx
!= -1
2206 || BFINFDPIC_FUNCDESC_LOCAL (info
, entry
->d
.h
)))
2208 ad
+= bfinfdpic_got_section (info
)->output_section
->vma
;
2209 _bfinfdpic_add_rofixup (output_bfd
,
2210 bfinfdpic_gotfixup_section (info
),
2211 bfinfdpic_got_section (info
)
2212 ->output_section
->vma
2213 + bfinfdpic_got_section (info
)
2215 + bfinfdpic_got_initial_offset (info
)
2216 + entry
->fdgot_entry
, entry
);
2219 _bfinfdpic_add_dyn_reloc (output_bfd
,
2220 bfinfdpic_gotrel_section (info
),
2221 _bfd_elf_section_offset
2223 bfinfdpic_got_section (info
),
2224 bfinfdpic_got_initial_offset (info
)
2225 + entry
->fdgot_entry
)
2226 + bfinfdpic_got_section (info
)
2227 ->output_section
->vma
2228 + bfinfdpic_got_section (info
)
2230 reloc
, idx
, ad
, entry
);
2233 bfd_put_32 (output_bfd
, ad
,
2234 bfinfdpic_got_section (info
)->contents
2235 + bfinfdpic_got_initial_offset (info
)
2236 + entry
->fdgot_entry
);
2239 /* Generate relocation to fill in a private function descriptor in
2241 if (entry
->fd_entry
)
2244 bfd_vma ad
= addend
;
2246 long lowword
, highword
;
2248 /* If the symbol is dynamic but binds locally, use
2250 if (sec
&& (entry
->symndx
!= -1
2251 || BFINFDPIC_SYM_LOCAL (info
, entry
->d
.h
)))
2253 if (entry
->symndx
== -1)
2254 ad
+= entry
->d
.h
->root
.u
.def
.value
;
2256 ad
+= sym
->st_value
;
2257 ad
+= sec
->output_offset
;
2258 if (sec
->output_section
&& elf_section_data (sec
->output_section
))
2259 idx
= elf_section_data (sec
->output_section
)->dynindx
;
2264 /* If we're linking an executable at a fixed address, we can
2265 omit the dynamic relocation as long as the symbol is local to
2267 if (bfd_link_pde (info
)
2268 && (entry
->symndx
!= -1 || BFINFDPIC_SYM_LOCAL (info
, entry
->d
.h
)))
2271 ad
+= sec
->output_section
->vma
;
2273 if (entry
->symndx
!= -1
2274 || entry
->d
.h
->root
.type
!= bfd_link_hash_undefweak
)
2276 _bfinfdpic_add_rofixup (output_bfd
,
2277 bfinfdpic_gotfixup_section (info
),
2278 bfinfdpic_got_section (info
)
2279 ->output_section
->vma
2280 + bfinfdpic_got_section (info
)
2282 + bfinfdpic_got_initial_offset (info
)
2283 + entry
->fd_entry
, entry
);
2284 _bfinfdpic_add_rofixup (output_bfd
,
2285 bfinfdpic_gotfixup_section (info
),
2286 bfinfdpic_got_section (info
)
2287 ->output_section
->vma
2288 + bfinfdpic_got_section (info
)
2290 + bfinfdpic_got_initial_offset (info
)
2291 + entry
->fd_entry
+ 4, entry
);
2297 = _bfinfdpic_add_dyn_reloc (output_bfd
,
2299 ? bfinfdpic_pltrel_section (info
)
2300 : bfinfdpic_gotrel_section (info
),
2301 _bfd_elf_section_offset
2303 bfinfdpic_got_section (info
),
2304 bfinfdpic_got_initial_offset (info
)
2306 + bfinfdpic_got_section (info
)
2307 ->output_section
->vma
2308 + bfinfdpic_got_section (info
)
2310 R_BFIN_FUNCDESC_VALUE
, idx
, ad
, entry
);
2313 /* If we've omitted the dynamic relocation, just emit the fixed
2314 addresses of the symbol and of the local GOT base offset. */
2315 if (bfd_link_pde (info
)
2317 && sec
->output_section
)
2320 highword
= bfinfdpic_got_section (info
)->output_section
->vma
2321 + bfinfdpic_got_section (info
)->output_offset
2322 + bfinfdpic_got_initial_offset (info
);
2324 else if (entry
->lazyplt
)
2329 fd_lazy_rel_offset
= ofst
;
2331 /* A function descriptor used for lazy or local resolving is
2332 initialized such that its high word contains the output
2333 section index in which the PLT entries are located, and
2334 the low word contains the address of the lazy PLT entry
2335 entry point, that must be within the memory region
2336 assigned to that section. */
2337 lowword
= entry
->lzplt_entry
+ 4
2338 + bfinfdpic_plt_section (info
)->output_offset
2339 + bfinfdpic_plt_section (info
)->output_section
->vma
;
2340 highword
= _bfinfdpic_osec_to_segment
2341 (output_bfd
, bfinfdpic_plt_section (info
)->output_section
);
2345 /* A function descriptor for a local function gets the index
2346 of the section. For a non-local function, it's
2350 || (entry
->symndx
== -1 && entry
->d
.h
->dynindx
!= -1
2351 && entry
->d
.h
->dynindx
== idx
))
2354 highword
= _bfinfdpic_osec_to_segment
2355 (output_bfd
, sec
->output_section
);
2358 bfd_put_32 (output_bfd
, lowword
,
2359 bfinfdpic_got_section (info
)->contents
2360 + bfinfdpic_got_initial_offset (info
)
2362 bfd_put_32 (output_bfd
, highword
,
2363 bfinfdpic_got_section (info
)->contents
2364 + bfinfdpic_got_initial_offset (info
)
2365 + entry
->fd_entry
+ 4);
2368 /* Generate code for the PLT entry. */
2369 if (entry
->plt_entry
!= (bfd_vma
) -1)
2371 bfd_byte
*plt_code
= bfinfdpic_plt_section (info
)->contents
2374 BFD_ASSERT (entry
->fd_entry
);
2376 /* Figure out what kind of PLT entry we need, depending on the
2377 location of the function descriptor within the GOT. */
2378 if (entry
->fd_entry
>= -(1 << (18 - 1))
2379 && entry
->fd_entry
+ 4 < (1 << (18 - 1)))
2381 /* P1 = [P3 + fd_entry]; P3 = [P3 + fd_entry + 4] */
2382 bfd_put_32 (output_bfd
,
2383 0xe519 | ((entry
->fd_entry
<< 14) & 0xFFFF0000),
2385 bfd_put_32 (output_bfd
,
2386 0xe51b | (((entry
->fd_entry
+ 4) << 14) & 0xFFFF0000),
2392 /* P1.L = fd_entry; P1.H = fd_entry;
2396 bfd_put_32 (output_bfd
,
2397 0xe109 | (entry
->fd_entry
<< 16),
2399 bfd_put_32 (output_bfd
,
2400 0xe149 | (entry
->fd_entry
& 0xFFFF0000),
2402 bfd_put_16 (output_bfd
, 0x5ad9, plt_code
+ 8);
2403 bfd_put_16 (output_bfd
, 0x9159, plt_code
+ 10);
2404 bfd_put_16 (output_bfd
, 0xac5b, plt_code
+ 12);
2408 bfd_put_16 (output_bfd
, 0x0051, plt_code
);
2411 /* Generate code for the lazy PLT entry. */
2412 if (entry
->lzplt_entry
!= (bfd_vma
) -1)
2414 bfd_byte
*lzplt_code
= bfinfdpic_plt_section (info
)->contents
2415 + entry
->lzplt_entry
;
2416 bfd_vma resolverStub_addr
;
2418 bfd_put_32 (output_bfd
, fd_lazy_rel_offset
, lzplt_code
);
2421 resolverStub_addr
= entry
->lzplt_entry
/ BFINFDPIC_LZPLT_BLOCK_SIZE
2422 * BFINFDPIC_LZPLT_BLOCK_SIZE
+ BFINFDPIC_LZPLT_RESOLV_LOC
;
2423 if (resolverStub_addr
>= bfinfdpic_plt_initial_offset (info
))
2424 resolverStub_addr
= bfinfdpic_plt_initial_offset (info
) - LZPLT_NORMAL_SIZE
- LZPLT_RESOLVER_EXTRA
;
2426 if (entry
->lzplt_entry
== resolverStub_addr
)
2428 /* This is a lazy PLT entry that includes a resolver call.
2432 bfd_put_32 (output_bfd
,
2435 bfd_put_16 (output_bfd
, 0x0052, lzplt_code
+ 4);
2439 /* JUMP.S resolverStub */
2440 bfd_put_16 (output_bfd
,
2442 | (((resolverStub_addr
- entry
->lzplt_entry
)
2443 / 2) & (((bfd_vma
)1 << 12) - 1)),
2451 /* Relocate an Blackfin ELF section.
2453 The RELOCATE_SECTION function is called by the new ELF backend linker
2454 to handle the relocations for a section.
2456 The relocs are always passed as Rela structures; if the section
2457 actually uses Rel structures, the r_addend field will always be
2460 This function is responsible for adjusting the section contents as
2461 necessary, and (if using Rela relocs and generating a relocatable
2462 output file) adjusting the reloc addend as necessary.
2464 This function does not have to worry about setting the reloc
2465 address or the reloc symbol index.
2467 LOCAL_SYMS is a pointer to the swapped in local symbols.
2469 LOCAL_SECTIONS is an array giving the section in the input file
2470 corresponding to the st_shndx field of each local symbol.
2472 The global hash table entry for the global symbols can be found
2473 via elf_sym_hashes (input_bfd).
2475 When generating relocatable output, this function must handle
2476 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
2477 going to be the section symbol corresponding to the output
2478 section, which means that the addend must be adjusted
2482 bfinfdpic_relocate_section (bfd
* output_bfd
,
2483 struct bfd_link_info
*info
,
2485 asection
* input_section
,
2486 bfd_byte
* contents
,
2487 Elf_Internal_Rela
* relocs
,
2488 Elf_Internal_Sym
* local_syms
,
2489 asection
** local_sections
)
2491 Elf_Internal_Shdr
*symtab_hdr
;
2492 struct elf_link_hash_entry
**sym_hashes
;
2493 Elf_Internal_Rela
*rel
;
2494 Elf_Internal_Rela
*relend
;
2495 unsigned isec_segment
, got_segment
, plt_segment
,
2497 int silence_segment_error
= !bfd_link_pic (info
);
2499 symtab_hdr
= & elf_tdata (input_bfd
)->symtab_hdr
;
2500 sym_hashes
= elf_sym_hashes (input_bfd
);
2501 relend
= relocs
+ input_section
->reloc_count
;
2503 isec_segment
= _bfinfdpic_osec_to_segment (output_bfd
,
2504 input_section
->output_section
);
2505 if (IS_FDPIC (output_bfd
) && bfinfdpic_got_section (info
))
2506 got_segment
= _bfinfdpic_osec_to_segment (output_bfd
,
2507 bfinfdpic_got_section (info
)
2511 if (IS_FDPIC (output_bfd
) && elf_hash_table (info
)->dynamic_sections_created
)
2512 plt_segment
= _bfinfdpic_osec_to_segment (output_bfd
,
2513 bfinfdpic_plt_section (info
)
2518 for (rel
= relocs
; rel
< relend
; rel
++)
2520 reloc_howto_type
*howto
;
2521 unsigned long r_symndx
;
2522 Elf_Internal_Sym
*sym
;
2524 struct elf_link_hash_entry
*h
;
2526 bfd_reloc_status_type r
;
2527 const char * name
= NULL
;
2530 struct bfinfdpic_relocs_info
*picrel
;
2531 bfd_vma orig_addend
= rel
->r_addend
;
2533 r_type
= ELF32_R_TYPE (rel
->r_info
);
2535 if (r_type
== R_BFIN_GNU_VTINHERIT
2536 || r_type
== R_BFIN_GNU_VTENTRY
)
2539 r_symndx
= ELF32_R_SYM (rel
->r_info
);
2540 howto
= bfin_reloc_type_lookup (input_bfd
, r_type
);
2543 bfd_set_error (bfd_error_bad_value
);
2551 if (r_symndx
< symtab_hdr
->sh_info
)
2553 sym
= local_syms
+ r_symndx
;
2554 osec
= sec
= local_sections
[r_symndx
];
2555 relocation
= _bfd_elf_rela_local_sym (output_bfd
, sym
, &sec
, rel
);
2557 name
= bfd_elf_string_from_elf_section
2558 (input_bfd
, symtab_hdr
->sh_link
, sym
->st_name
);
2559 name
= (name
== NULL
) ? bfd_section_name (input_bfd
, sec
) : name
;
2563 bfd_boolean warned
, ignored
;
2564 bfd_boolean unresolved_reloc
;
2566 RELOC_FOR_GLOBAL_SYMBOL (info
, input_bfd
, input_section
, rel
,
2567 r_symndx
, symtab_hdr
, sym_hashes
,
2569 unresolved_reloc
, warned
, ignored
);
2573 if (sec
!= NULL
&& discarded_section (sec
))
2574 RELOC_AGAINST_DISCARDED_SECTION (info
, input_bfd
, input_section
,
2575 rel
, 1, relend
, howto
, 0, contents
);
2577 if (bfd_link_relocatable (info
))
2581 && (h
->root
.type
== bfd_link_hash_defined
2582 || h
->root
.type
== bfd_link_hash_defweak
)
2583 && !BFINFDPIC_SYM_LOCAL (info
, h
))
2591 case R_BFIN_PCREL24
:
2592 case R_BFIN_PCREL24_JUMP_L
:
2593 case R_BFIN_BYTE4_DATA
:
2594 if (! IS_FDPIC (output_bfd
))
2598 case R_BFIN_GOT17M4
:
2601 case R_BFIN_FUNCDESC_GOT17M4
:
2602 case R_BFIN_FUNCDESC_GOTHI
:
2603 case R_BFIN_FUNCDESC_GOTLO
:
2604 case R_BFIN_GOTOFF17M4
:
2605 case R_BFIN_GOTOFFHI
:
2606 case R_BFIN_GOTOFFLO
:
2607 case R_BFIN_FUNCDESC_GOTOFF17M4
:
2608 case R_BFIN_FUNCDESC_GOTOFFHI
:
2609 case R_BFIN_FUNCDESC_GOTOFFLO
:
2610 case R_BFIN_FUNCDESC
:
2611 case R_BFIN_FUNCDESC_VALUE
:
2613 picrel
= bfinfdpic_relocs_info_for_global (bfinfdpic_relocs_info
2614 (info
), input_bfd
, h
,
2615 orig_addend
, INSERT
);
2617 /* In order to find the entry we created before, we must
2618 use the original addend, not the one that may have been
2619 modified by _bfd_elf_rela_local_sym(). */
2620 picrel
= bfinfdpic_relocs_info_for_local (bfinfdpic_relocs_info
2621 (info
), input_bfd
, r_symndx
,
2622 orig_addend
, INSERT
);
2626 if (!_bfinfdpic_emit_got_relocs_plt_entries (picrel
, output_bfd
, info
,
2631 /* xgettext:c-format */
2632 (_("%B: relocation at `%A+%#Lx' references symbol `%s' with nonzero addend"),
2633 input_bfd
, input_section
, rel
->r_offset
, name
);
2643 if (h
&& ! BFINFDPIC_SYM_LOCAL (info
, h
)
2644 && _bfd_elf_section_offset (output_bfd
, info
, input_section
,
2645 rel
->r_offset
) != (bfd_vma
) -1)
2647 info
->callbacks
->warning
2648 (info
, _("relocation references symbol not defined in the module"),
2649 name
, input_bfd
, input_section
, rel
->r_offset
);
2657 case R_BFIN_PCREL24
:
2658 case R_BFIN_PCREL24_JUMP_L
:
2659 check_segment
[0] = isec_segment
;
2660 if (! IS_FDPIC (output_bfd
))
2661 check_segment
[1] = isec_segment
;
2662 else if (picrel
->plt
)
2664 relocation
= bfinfdpic_plt_section (info
)->output_section
->vma
2665 + bfinfdpic_plt_section (info
)->output_offset
2666 + picrel
->plt_entry
;
2667 check_segment
[1] = plt_segment
;
2669 /* We don't want to warn on calls to undefined weak symbols,
2670 as calls to them must be protected by non-NULL tests
2671 anyway, and unprotected calls would invoke undefined
2673 else if (picrel
->symndx
== -1
2674 && picrel
->d
.h
->root
.type
== bfd_link_hash_undefweak
)
2675 check_segment
[1] = check_segment
[0];
2677 check_segment
[1] = sec
2678 ? _bfinfdpic_osec_to_segment (output_bfd
, sec
->output_section
)
2682 case R_BFIN_GOT17M4
:
2685 relocation
= picrel
->got_entry
;
2686 check_segment
[0] = check_segment
[1] = got_segment
;
2689 case R_BFIN_FUNCDESC_GOT17M4
:
2690 case R_BFIN_FUNCDESC_GOTHI
:
2691 case R_BFIN_FUNCDESC_GOTLO
:
2692 relocation
= picrel
->fdgot_entry
;
2693 check_segment
[0] = check_segment
[1] = got_segment
;
2696 case R_BFIN_GOTOFFHI
:
2697 case R_BFIN_GOTOFF17M4
:
2698 case R_BFIN_GOTOFFLO
:
2699 relocation
-= bfinfdpic_got_section (info
)->output_section
->vma
2700 + bfinfdpic_got_section (info
)->output_offset
2701 + bfinfdpic_got_initial_offset (info
);
2702 check_segment
[0] = got_segment
;
2703 check_segment
[1] = sec
2704 ? _bfinfdpic_osec_to_segment (output_bfd
, sec
->output_section
)
2708 case R_BFIN_FUNCDESC_GOTOFF17M4
:
2709 case R_BFIN_FUNCDESC_GOTOFFHI
:
2710 case R_BFIN_FUNCDESC_GOTOFFLO
:
2711 relocation
= picrel
->fd_entry
;
2712 check_segment
[0] = check_segment
[1] = got_segment
;
2715 case R_BFIN_FUNCDESC
:
2718 bfd_vma addend
= rel
->r_addend
;
2720 if (! (h
&& h
->root
.type
== bfd_link_hash_undefweak
2721 && BFINFDPIC_SYM_LOCAL (info
, h
)))
2723 /* If the symbol is dynamic and there may be dynamic
2724 symbol resolution because we are or are linked with a
2725 shared library, emit a FUNCDESC relocation such that
2726 the dynamic linker will allocate the function
2727 descriptor. If the symbol needs a non-local function
2728 descriptor but binds locally (e.g., its visibility is
2729 protected, emit a dynamic relocation decayed to
2731 if (h
&& ! BFINFDPIC_FUNCDESC_LOCAL (info
, h
)
2732 && BFINFDPIC_SYM_LOCAL (info
, h
)
2733 && !bfd_link_pde (info
))
2735 dynindx
= elf_section_data (h
->root
.u
.def
.section
2736 ->output_section
)->dynindx
;
2737 addend
+= h
->root
.u
.def
.section
->output_offset
2738 + h
->root
.u
.def
.value
;
2740 else if (h
&& ! BFINFDPIC_FUNCDESC_LOCAL (info
, h
))
2744 info
->callbacks
->warning
2745 (info
, _("R_BFIN_FUNCDESC references dynamic symbol with nonzero addend"),
2746 name
, input_bfd
, input_section
, rel
->r_offset
);
2749 dynindx
= h
->dynindx
;
2753 /* Otherwise, we know we have a private function
2754 descriptor, so reference it directly. */
2755 BFD_ASSERT (picrel
->privfd
);
2756 r_type
= R_BFIN_BYTE4_DATA
;
2757 dynindx
= elf_section_data (bfinfdpic_got_section (info
)
2758 ->output_section
)->dynindx
;
2759 addend
= bfinfdpic_got_section (info
)->output_offset
2760 + bfinfdpic_got_initial_offset (info
)
2764 /* If there is room for dynamic symbol resolution, emit
2765 the dynamic relocation. However, if we're linking an
2766 executable at a fixed location, we won't have emitted a
2767 dynamic symbol entry for the got section, so idx will
2768 be zero, which means we can and should compute the
2769 address of the private descriptor ourselves. */
2770 if (bfd_link_pde (info
)
2771 && (!h
|| BFINFDPIC_FUNCDESC_LOCAL (info
, h
)))
2775 addend
+= bfinfdpic_got_section (info
)->output_section
->vma
;
2776 if ((bfd_get_section_flags (output_bfd
,
2777 input_section
->output_section
)
2778 & (SEC_ALLOC
| SEC_LOAD
)) == (SEC_ALLOC
| SEC_LOAD
))
2780 if (_bfinfdpic_osec_readonly_p (output_bfd
,
2784 info
->callbacks
->warning
2786 _("cannot emit fixups in read-only section"),
2787 name
, input_bfd
, input_section
, rel
->r_offset
);
2791 offset
= _bfd_elf_section_offset
2793 input_section
, rel
->r_offset
);
2795 if (offset
!= (bfd_vma
)-1)
2796 _bfinfdpic_add_rofixup (output_bfd
,
2797 bfinfdpic_gotfixup_section
2799 offset
+ input_section
2800 ->output_section
->vma
2801 + input_section
->output_offset
,
2805 else if ((bfd_get_section_flags (output_bfd
,
2806 input_section
->output_section
)
2807 & (SEC_ALLOC
| SEC_LOAD
)) == (SEC_ALLOC
| SEC_LOAD
))
2811 if (_bfinfdpic_osec_readonly_p (output_bfd
,
2815 info
->callbacks
->warning
2817 _("cannot emit dynamic relocations in read-only section"),
2818 name
, input_bfd
, input_section
, rel
->r_offset
);
2821 offset
= _bfd_elf_section_offset (output_bfd
, info
,
2822 input_section
, rel
->r_offset
);
2824 if (offset
!= (bfd_vma
)-1)
2825 _bfinfdpic_add_dyn_reloc (output_bfd
,
2826 bfinfdpic_gotrel_section (info
),
2827 offset
+ input_section
2828 ->output_section
->vma
2829 + input_section
->output_offset
,
2831 dynindx
, addend
, picrel
);
2834 addend
+= bfinfdpic_got_section (info
)->output_section
->vma
;
2837 /* We want the addend in-place because dynamic
2838 relocations are REL. Setting relocation to it should
2839 arrange for it to be installed. */
2840 relocation
= addend
- rel
->r_addend
;
2842 check_segment
[0] = check_segment
[1] = got_segment
;
2845 case R_BFIN_BYTE4_DATA
:
2846 if (! IS_FDPIC (output_bfd
))
2848 check_segment
[0] = check_segment
[1] = -1;
2852 case R_BFIN_FUNCDESC_VALUE
:
2855 bfd_vma addend
= rel
->r_addend
;
2857 offset
= _bfd_elf_section_offset (output_bfd
, info
,
2858 input_section
, rel
->r_offset
);
2860 /* If the symbol is dynamic but binds locally, use
2862 if (h
&& ! BFINFDPIC_SYM_LOCAL (info
, h
))
2864 if (addend
&& r_type
== R_BFIN_FUNCDESC_VALUE
)
2866 info
->callbacks
->warning
2867 (info
, _("R_BFIN_FUNCDESC_VALUE references dynamic symbol with nonzero addend"),
2868 name
, input_bfd
, input_section
, rel
->r_offset
);
2871 dynindx
= h
->dynindx
;
2876 addend
+= h
->root
.u
.def
.value
;
2878 addend
+= sym
->st_value
;
2880 addend
+= osec
->output_offset
;
2881 if (osec
&& osec
->output_section
2882 && ! bfd_is_abs_section (osec
->output_section
)
2883 && ! bfd_is_und_section (osec
->output_section
))
2884 dynindx
= elf_section_data (osec
->output_section
)->dynindx
;
2889 /* If we're linking an executable at a fixed address, we
2890 can omit the dynamic relocation as long as the symbol
2891 is defined in the current link unit (which is implied
2892 by its output section not being NULL). */
2893 if (bfd_link_pde (info
)
2894 && (!h
|| BFINFDPIC_SYM_LOCAL (info
, h
)))
2897 addend
+= osec
->output_section
->vma
;
2898 if (IS_FDPIC (input_bfd
)
2899 && (bfd_get_section_flags (output_bfd
,
2900 input_section
->output_section
)
2901 & (SEC_ALLOC
| SEC_LOAD
)) == (SEC_ALLOC
| SEC_LOAD
))
2903 if (_bfinfdpic_osec_readonly_p (output_bfd
,
2907 info
->callbacks
->warning
2909 _("cannot emit fixups in read-only section"),
2910 name
, input_bfd
, input_section
, rel
->r_offset
);
2913 if (!h
|| h
->root
.type
!= bfd_link_hash_undefweak
)
2915 if (offset
!= (bfd_vma
)-1)
2917 _bfinfdpic_add_rofixup (output_bfd
,
2918 bfinfdpic_gotfixup_section
2920 offset
+ input_section
2921 ->output_section
->vma
2922 + input_section
->output_offset
,
2925 if (r_type
== R_BFIN_FUNCDESC_VALUE
)
2926 _bfinfdpic_add_rofixup
2928 bfinfdpic_gotfixup_section (info
),
2929 offset
+ input_section
->output_section
->vma
2930 + input_section
->output_offset
+ 4, picrel
);
2937 if ((bfd_get_section_flags (output_bfd
,
2938 input_section
->output_section
)
2939 & (SEC_ALLOC
| SEC_LOAD
)) == (SEC_ALLOC
| SEC_LOAD
))
2941 if (_bfinfdpic_osec_readonly_p (output_bfd
,
2945 info
->callbacks
->warning
2947 _("cannot emit dynamic relocations in read-only section"),
2948 name
, input_bfd
, input_section
, rel
->r_offset
);
2952 if (offset
!= (bfd_vma
)-1)
2953 _bfinfdpic_add_dyn_reloc (output_bfd
,
2954 bfinfdpic_gotrel_section (info
),
2956 + input_section
->output_section
->vma
2957 + input_section
->output_offset
,
2958 r_type
, dynindx
, addend
, picrel
);
2961 addend
+= osec
->output_section
->vma
;
2962 /* We want the addend in-place because dynamic
2963 relocations are REL. Setting relocation to it
2964 should arrange for it to be installed. */
2965 relocation
= addend
- rel
->r_addend
;
2968 if (r_type
== R_BFIN_FUNCDESC_VALUE
)
2970 /* If we've omitted the dynamic relocation, just emit
2971 the fixed addresses of the symbol and of the local
2973 if (bfd_link_pde (info
)
2974 && (!h
|| BFINFDPIC_SYM_LOCAL (info
, h
)))
2975 bfd_put_32 (output_bfd
,
2976 bfinfdpic_got_section (info
)->output_section
->vma
2977 + bfinfdpic_got_section (info
)->output_offset
2978 + bfinfdpic_got_initial_offset (info
),
2979 contents
+ rel
->r_offset
+ 4);
2981 /* A function descriptor used for lazy or local
2982 resolving is initialized such that its high word
2983 contains the output section index in which the
2984 PLT entries are located, and the low word
2985 contains the offset of the lazy PLT entry entry
2986 point into that section. */
2987 bfd_put_32 (output_bfd
,
2988 h
&& ! BFINFDPIC_SYM_LOCAL (info
, h
)
2990 : _bfinfdpic_osec_to_segment (output_bfd
,
2993 contents
+ rel
->r_offset
+ 4);
2996 check_segment
[0] = check_segment
[1] = got_segment
;
3000 check_segment
[0] = isec_segment
;
3001 check_segment
[1] = sec
3002 ? _bfinfdpic_osec_to_segment (output_bfd
, sec
->output_section
)
3007 if (check_segment
[0] != check_segment
[1] && IS_FDPIC (output_bfd
))
3009 #if 1 /* If you take this out, remove the #error from fdpic-static-6.d
3010 in the ld testsuite. */
3011 /* This helps catch problems in GCC while we can't do more
3012 than static linking. The idea is to test whether the
3013 input file basename is crt0.o only once. */
3014 if (silence_segment_error
== 1)
3015 silence_segment_error
=
3016 (strlen (input_bfd
->filename
) == 6
3017 && filename_cmp (input_bfd
->filename
, "crt0.o") == 0)
3018 || (strlen (input_bfd
->filename
) > 6
3019 && filename_cmp (input_bfd
->filename
3020 + strlen (input_bfd
->filename
) - 7,
3024 if (!silence_segment_error
3025 /* We don't want duplicate errors for undefined
3027 && !(picrel
&& picrel
->symndx
== -1
3028 && picrel
->d
.h
->root
.type
== bfd_link_hash_undefined
))
3029 info
->callbacks
->warning
3032 ? _("relocations between different segments are not supported")
3033 : _("warning: relocation references a different segment"),
3034 name
, input_bfd
, input_section
, rel
->r_offset
);
3035 if (!silence_segment_error
&& bfd_link_pic (info
))
3037 elf_elfheader (output_bfd
)->e_flags
|= EF_BFIN_PIC
;
3042 case R_BFIN_GOTOFFHI
:
3043 /* We need the addend to be applied before we shift the
3045 relocation
+= rel
->r_addend
;
3048 case R_BFIN_FUNCDESC_GOTHI
:
3049 case R_BFIN_FUNCDESC_GOTOFFHI
:
3054 case R_BFIN_FUNCDESC_GOTLO
:
3055 case R_BFIN_GOTOFFLO
:
3056 case R_BFIN_FUNCDESC_GOTOFFLO
:
3057 relocation
&= 0xffff;
3066 case R_BFIN_PCREL24
:
3067 case R_BFIN_PCREL24_JUMP_L
:
3068 if (! IS_FDPIC (output_bfd
) || ! picrel
->plt
)
3072 /* When referencing a GOT entry, a function descriptor or a
3073 PLT, we don't want the addend to apply to the reference,
3074 but rather to the referenced symbol. The actual entry
3075 will have already been created taking the addend into
3076 account, so cancel it out here. */
3077 case R_BFIN_GOT17M4
:
3080 case R_BFIN_FUNCDESC_GOT17M4
:
3081 case R_BFIN_FUNCDESC_GOTHI
:
3082 case R_BFIN_FUNCDESC_GOTLO
:
3083 case R_BFIN_FUNCDESC_GOTOFF17M4
:
3084 case R_BFIN_FUNCDESC_GOTOFFHI
:
3085 case R_BFIN_FUNCDESC_GOTOFFLO
:
3086 /* Note that we only want GOTOFFHI, not GOTOFFLO or GOTOFF17M4
3087 here, since we do want to apply the addend to the others.
3088 Note that we've applied the addend to GOTOFFHI before we
3089 shifted it right. */
3090 case R_BFIN_GOTOFFHI
:
3091 relocation
-= rel
->r_addend
;
3098 r
= bfin_final_link_relocate (rel
, howto
, input_bfd
, input_section
,
3099 contents
, rel
->r_offset
,
3100 relocation
, rel
->r_addend
);
3102 if (r
!= bfd_reloc_ok
)
3104 const char * msg
= (const char *) NULL
;
3108 case bfd_reloc_overflow
:
3109 (*info
->callbacks
->reloc_overflow
)
3110 (info
, (h
? &h
->root
: NULL
), name
, howto
->name
,
3111 (bfd_vma
) 0, input_bfd
, input_section
, rel
->r_offset
);
3114 case bfd_reloc_undefined
:
3115 (*info
->callbacks
->undefined_symbol
)
3116 (info
, name
, input_bfd
, input_section
, rel
->r_offset
, TRUE
);
3119 case bfd_reloc_outofrange
:
3120 msg
= _("internal error: out of range error");
3123 case bfd_reloc_notsupported
:
3124 msg
= _("internal error: unsupported relocation error");
3127 case bfd_reloc_dangerous
:
3128 msg
= _("internal error: dangerous relocation");
3132 msg
= _("internal error: unknown error");
3137 (*info
->callbacks
->warning
) (info
, msg
, name
, input_bfd
,
3138 input_section
, rel
->r_offset
);
3145 /* We need dynamic symbols for every section, since segments can
3146 relocate independently. */
3148 _bfinfdpic_link_omit_section_dynsym (bfd
*output_bfd ATTRIBUTE_UNUSED
,
3149 struct bfd_link_info
*info ATTRIBUTE_UNUSED
,
3152 switch (elf_section_data (p
)->this_hdr
.sh_type
)
3156 /* If sh_type is yet undecided, assume it could be
3157 SHT_PROGBITS/SHT_NOBITS. */
3161 /* There shouldn't be section relative relocations
3162 against any other section. */
3168 /* Create a .got section, as well as its additional info field. This
3169 is almost entirely copied from
3170 elflink.c:_bfd_elf_create_got_section(). */
3173 _bfin_create_got_section (bfd
*abfd
, struct bfd_link_info
*info
)
3175 flagword flags
, pltflags
;
3177 struct elf_link_hash_entry
*h
;
3178 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
3181 /* This function may be called more than once. */
3182 s
= elf_hash_table (info
)->sgot
;
3186 /* Machine specific: although pointers are 32-bits wide, we want the
3187 GOT to be aligned to a 64-bit boundary, such that function
3188 descriptors in it can be accessed with 64-bit loads and
3192 flags
= (SEC_ALLOC
| SEC_LOAD
| SEC_HAS_CONTENTS
| SEC_IN_MEMORY
3193 | SEC_LINKER_CREATED
);
3196 s
= bfd_make_section_anyway_with_flags (abfd
, ".got", flags
);
3197 elf_hash_table (info
)->sgot
= s
;
3199 || !bfd_set_section_alignment (abfd
, s
, ptralign
))
3202 if (bed
->want_got_sym
)
3204 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the .got
3205 (or .got.plt) section. We don't do this in the linker script
3206 because we don't want to define the symbol if we are not creating
3207 a global offset table. */
3208 h
= _bfd_elf_define_linkage_sym (abfd
, info
, s
, "__GLOBAL_OFFSET_TABLE_");
3209 elf_hash_table (info
)->hgot
= h
;
3213 /* Machine-specific: we want the symbol for executables as
3215 if (! bfd_elf_link_record_dynamic_symbol (info
, h
))
3219 /* The first bit of the global offset table is the header. */
3220 s
->size
+= bed
->got_header_size
;
3222 /* This is the machine-specific part. Create and initialize section
3223 data for the got. */
3224 if (IS_FDPIC (abfd
))
3226 bfinfdpic_relocs_info (info
) = htab_try_create (1,
3227 bfinfdpic_relocs_info_hash
,
3228 bfinfdpic_relocs_info_eq
,
3230 if (! bfinfdpic_relocs_info (info
))
3233 s
= bfd_make_section_anyway_with_flags (abfd
, ".rel.got",
3234 (flags
| SEC_READONLY
));
3236 || ! bfd_set_section_alignment (abfd
, s
, 2))
3239 bfinfdpic_gotrel_section (info
) = s
;
3241 /* Machine-specific. */
3242 s
= bfd_make_section_anyway_with_flags (abfd
, ".rofixup",
3243 (flags
| SEC_READONLY
));
3245 || ! bfd_set_section_alignment (abfd
, s
, 2))
3248 bfinfdpic_gotfixup_section (info
) = s
;
3251 pltflags
|= SEC_CODE
;
3252 if (bed
->plt_not_loaded
)
3253 pltflags
&= ~ (SEC_CODE
| SEC_LOAD
| SEC_HAS_CONTENTS
);
3254 if (bed
->plt_readonly
)
3255 pltflags
|= SEC_READONLY
;
3257 s
= bfd_make_section_anyway_with_flags (abfd
, ".plt", pltflags
);
3259 || ! bfd_set_section_alignment (abfd
, s
, bed
->plt_alignment
))
3261 /* Blackfin-specific: remember it. */
3262 bfinfdpic_plt_section (info
) = s
;
3264 if (bed
->want_plt_sym
)
3266 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
3268 struct bfd_link_hash_entry
*bh
= NULL
;
3270 if (! (_bfd_generic_link_add_one_symbol
3271 (info
, abfd
, "__PROCEDURE_LINKAGE_TABLE_", BSF_GLOBAL
, s
, 0, NULL
,
3272 FALSE
, get_elf_backend_data (abfd
)->collect
, &bh
)))
3274 h
= (struct elf_link_hash_entry
*) bh
;
3276 h
->type
= STT_OBJECT
;
3278 if (! bfd_link_executable (info
)
3279 && ! bfd_elf_link_record_dynamic_symbol (info
, h
))
3283 /* Blackfin-specific: we want rel relocations for the plt. */
3284 s
= bfd_make_section_anyway_with_flags (abfd
, ".rel.plt",
3285 flags
| SEC_READONLY
);
3287 || ! bfd_set_section_alignment (abfd
, s
, bed
->s
->log_file_align
))
3289 /* Blackfin-specific: remember it. */
3290 bfinfdpic_pltrel_section (info
) = s
;
3295 /* Make sure the got and plt sections exist, and that our pointers in
3296 the link hash table point to them. */
3299 elf32_bfinfdpic_create_dynamic_sections (bfd
*abfd
, struct bfd_link_info
*info
)
3301 /* This is mostly copied from
3302 elflink.c:_bfd_elf_create_dynamic_sections(). */
3305 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
3307 flags
= (SEC_ALLOC
| SEC_LOAD
| SEC_HAS_CONTENTS
| SEC_IN_MEMORY
3308 | SEC_LINKER_CREATED
);
3310 /* We need to create .plt, .rel[a].plt, .got, .got.plt, .dynbss, and
3311 .rel[a].bss sections. */
3313 /* Blackfin-specific: we want to create the GOT in the Blackfin way. */
3314 if (! _bfin_create_got_section (abfd
, info
))
3317 /* Blackfin-specific: make sure we created everything we wanted. */
3318 BFD_ASSERT (bfinfdpic_got_section (info
) && bfinfdpic_gotrel_section (info
)
3319 /* && bfinfdpic_gotfixup_section (info) */
3320 && bfinfdpic_plt_section (info
)
3321 && bfinfdpic_pltrel_section (info
));
3323 if (bed
->want_dynbss
)
3325 /* The .dynbss section is a place to put symbols which are defined
3326 by dynamic objects, are referenced by regular objects, and are
3327 not functions. We must allocate space for them in the process
3328 image and use a R_*_COPY reloc to tell the dynamic linker to
3329 initialize them at run time. The linker script puts the .dynbss
3330 section into the .bss section of the final image. */
3331 s
= bfd_make_section_anyway_with_flags (abfd
, ".dynbss",
3332 SEC_ALLOC
| SEC_LINKER_CREATED
);
3336 /* The .rel[a].bss section holds copy relocs. This section is not
3337 normally needed. We need to create it here, though, so that the
3338 linker will map it to an output section. We can't just create it
3339 only if we need it, because we will not know whether we need it
3340 until we have seen all the input files, and the first time the
3341 main linker code calls BFD after examining all the input files
3342 (size_dynamic_sections) the input sections have already been
3343 mapped to the output sections. If the section turns out not to
3344 be needed, we can discard it later. We will never need this
3345 section when generating a shared object, since they do not use
3347 if (! bfd_link_pic (info
))
3349 s
= bfd_make_section_anyway_with_flags (abfd
,
3351 flags
| SEC_READONLY
);
3353 || ! bfd_set_section_alignment (abfd
, s
, bed
->s
->log_file_align
))
3361 /* Compute the total GOT size required by each symbol in each range.
3362 Symbols may require up to 4 words in the GOT: an entry pointing to
3363 the symbol, an entry pointing to its function descriptor, and a
3364 private function descriptors taking two words. */
3367 _bfinfdpic_count_nontls_entries (struct bfinfdpic_relocs_info
*entry
,
3368 struct _bfinfdpic_dynamic_got_info
*dinfo
)
3370 /* Allocate space for a GOT entry pointing to the symbol. */
3372 dinfo
->got17m4
+= 4;
3373 else if (entry
->gothilo
)
3374 dinfo
->gothilo
+= 4;
3379 /* Allocate space for a GOT entry pointing to the function
3381 if (entry
->fdgot17m4
)
3382 dinfo
->got17m4
+= 4;
3383 else if (entry
->fdgothilo
)
3384 dinfo
->gothilo
+= 4;
3389 /* Decide whether we need a PLT entry, a function descriptor in the
3390 GOT, and a lazy PLT entry for this symbol. */
3391 entry
->plt
= entry
->call
3392 && entry
->symndx
== -1 && ! BFINFDPIC_SYM_LOCAL (dinfo
->info
, entry
->d
.h
)
3393 && elf_hash_table (dinfo
->info
)->dynamic_sections_created
;
3394 entry
->privfd
= entry
->plt
3395 || entry
->fdgoff17m4
|| entry
->fdgoffhilo
3396 || ((entry
->fd
|| entry
->fdgot17m4
|| entry
->fdgothilo
)
3397 && (entry
->symndx
!= -1
3398 || BFINFDPIC_FUNCDESC_LOCAL (dinfo
->info
, entry
->d
.h
)));
3399 entry
->lazyplt
= entry
->privfd
3400 && entry
->symndx
== -1 && ! BFINFDPIC_SYM_LOCAL (dinfo
->info
, entry
->d
.h
)
3401 && ! (dinfo
->info
->flags
& DF_BIND_NOW
)
3402 && elf_hash_table (dinfo
->info
)->dynamic_sections_created
;
3404 /* Allocate space for a function descriptor. */
3405 if (entry
->fdgoff17m4
)
3407 else if (entry
->privfd
&& entry
->plt
)
3409 else if (entry
->privfd
)
3416 dinfo
->lzplt
+= LZPLT_NORMAL_SIZE
;
3419 /* Compute the number of dynamic relocations and fixups that a symbol
3420 requires, and add (or subtract) from the grand and per-symbol
3424 _bfinfdpic_count_relocs_fixups (struct bfinfdpic_relocs_info
*entry
,
3425 struct _bfinfdpic_dynamic_got_info
*dinfo
,
3426 bfd_boolean subtract
)
3428 bfd_vma relocs
= 0, fixups
= 0;
3430 if (!bfd_link_pde (dinfo
->info
))
3431 relocs
= entry
->relocs32
+ entry
->relocsfd
+ entry
->relocsfdv
;
3434 if (entry
->symndx
!= -1 || BFINFDPIC_SYM_LOCAL (dinfo
->info
, entry
->d
.h
))
3436 if (entry
->symndx
!= -1
3437 || entry
->d
.h
->root
.type
!= bfd_link_hash_undefweak
)
3438 fixups
+= entry
->relocs32
+ 2 * entry
->relocsfdv
;
3441 relocs
+= entry
->relocs32
+ entry
->relocsfdv
;
3443 if (entry
->symndx
!= -1
3444 || BFINFDPIC_FUNCDESC_LOCAL (dinfo
->info
, entry
->d
.h
))
3446 if (entry
->symndx
!= -1
3447 || entry
->d
.h
->root
.type
!= bfd_link_hash_undefweak
)
3448 fixups
+= entry
->relocsfd
;
3451 relocs
+= entry
->relocsfd
;
3460 entry
->dynrelocs
+= relocs
;
3461 entry
->fixups
+= fixups
;
3462 dinfo
->relocs
+= relocs
;
3463 dinfo
->fixups
+= fixups
;
3466 /* Compute the total GOT and PLT size required by each symbol in each range. *
3467 Symbols may require up to 4 words in the GOT: an entry pointing to
3468 the symbol, an entry pointing to its function descriptor, and a
3469 private function descriptors taking two words. */
3472 _bfinfdpic_count_got_plt_entries (void **entryp
, void *dinfo_
)
3474 struct bfinfdpic_relocs_info
*entry
= *entryp
;
3475 struct _bfinfdpic_dynamic_got_info
*dinfo
= dinfo_
;
3477 _bfinfdpic_count_nontls_entries (entry
, dinfo
);
3479 _bfinfdpic_count_relocs_fixups (entry
, dinfo
, FALSE
);
3484 /* This structure is used to assign offsets to got entries, function
3485 descriptors, plt entries and lazy plt entries. */
3487 struct _bfinfdpic_dynamic_got_plt_info
3489 /* Summary information collected with _bfinfdpic_count_got_plt_entries. */
3490 struct _bfinfdpic_dynamic_got_info g
;
3492 /* For each addressable range, we record a MAX (positive) and MIN
3493 (negative) value. CUR is used to assign got entries, and it's
3494 incremented from an initial positive value to MAX, then from MIN
3495 to FDCUR (unless FDCUR wraps around first). FDCUR is used to
3496 assign function descriptors, and it's decreased from an initial
3497 non-positive value to MIN, then from MAX down to CUR (unless CUR
3498 wraps around first). All of MIN, MAX, CUR and FDCUR always point
3499 to even words. ODD, if non-zero, indicates an odd word to be
3500 used for the next got entry, otherwise CUR is used and
3501 incremented by a pair of words, wrapping around when it reaches
3502 MAX. FDCUR is decremented (and wrapped) before the next function
3503 descriptor is chosen. FDPLT indicates the number of remaining
3504 slots that can be used for function descriptors used only by PLT
3506 struct _bfinfdpic_dynamic_got_alloc_data
3508 bfd_signed_vma max
, cur
, odd
, fdcur
, min
;
3513 /* Determine the positive and negative ranges to be used by each
3514 offset range in the GOT. FDCUR and CUR, that must be aligned to a
3515 double-word boundary, are the minimum (negative) and maximum
3516 (positive) GOT offsets already used by previous ranges, except for
3517 an ODD entry that may have been left behind. GOT and FD indicate
3518 the size of GOT entries and function descriptors that must be
3519 placed within the range from -WRAP to WRAP. If there's room left,
3520 up to FDPLT bytes should be reserved for additional function
3523 inline static bfd_signed_vma
3524 _bfinfdpic_compute_got_alloc_data (struct _bfinfdpic_dynamic_got_alloc_data
*gad
,
3525 bfd_signed_vma fdcur
,
3533 bfd_signed_vma wrapmin
= -wrap
;
3535 /* Start at the given initial points. */
3539 /* If we had an incoming odd word and we have any got entries that
3540 are going to use it, consume it, otherwise leave gad->odd at
3541 zero. We might force gad->odd to zero and return the incoming
3542 odd such that it is used by the next range, but then GOT entries
3543 might appear to be out of order and we wouldn't be able to
3544 shorten the GOT by one word if it turns out to end with an
3545 unpaired GOT entry. */
3555 /* If we're left with an unpaired GOT entry, compute its location
3556 such that we can return it. Otherwise, if got doesn't require an
3557 odd number of words here, either odd was already zero in the
3558 block above, or it was set to zero because got was non-zero, or
3559 got was already zero. In the latter case, we want the value of
3560 odd to carry over to the return statement, so we don't want to
3561 reset odd unless the condition below is true. */
3568 /* Compute the tentative boundaries of this range. */
3569 gad
->max
= cur
+ got
;
3570 gad
->min
= fdcur
- fd
;
3573 /* If function descriptors took too much space, wrap some of them
3575 if (gad
->min
< wrapmin
)
3577 gad
->max
+= wrapmin
- gad
->min
;
3580 /* If there is space left and we have function descriptors
3581 referenced in PLT entries that could take advantage of shorter
3582 offsets, place them here. */
3583 else if (fdplt
&& gad
->min
> wrapmin
)
3586 if ((bfd_vma
) (gad
->min
- wrapmin
) < fdplt
)
3587 fds
= gad
->min
- wrapmin
;
3596 /* If GOT entries took too much space, wrap some of them around.
3597 This may well cause gad->min to become lower than wrapmin. This
3598 will cause a relocation overflow later on, so we don't have to
3600 if ((bfd_vma
) gad
->max
> wrap
)
3602 gad
->min
-= gad
->max
- wrap
;
3605 /* If there is more space left, try to place some more function
3606 descriptors for PLT entries. */
3607 else if (fdplt
&& (bfd_vma
) gad
->max
< wrap
)
3610 if ((bfd_vma
) (wrap
- gad
->max
) < fdplt
)
3611 fds
= wrap
- gad
->max
;
3620 /* If odd was initially computed as an offset past the wrap point,
3623 odd
= gad
->min
+ odd
- gad
->max
;
3625 /* _bfinfdpic_get_got_entry() below will always wrap gad->cur if needed
3626 before returning, so do it here too. This guarantees that,
3627 should cur and fdcur meet at the wrap point, they'll both be
3629 if (gad
->cur
== gad
->max
)
3630 gad
->cur
= gad
->min
;
3635 /* Compute the location of the next GOT entry, given the allocation
3636 data for a range. */
3638 inline static bfd_signed_vma
3639 _bfinfdpic_get_got_entry (struct _bfinfdpic_dynamic_got_alloc_data
*gad
)
3645 /* If there was an odd word left behind, use it. */
3651 /* Otherwise, use the word pointed to by cur, reserve the next
3652 as an odd word, and skip to the next pair of words, possibly
3655 gad
->odd
= gad
->cur
+ 4;
3657 if (gad
->cur
== gad
->max
)
3658 gad
->cur
= gad
->min
;
3664 /* Compute the location of the next function descriptor entry in the
3665 GOT, given the allocation data for a range. */
3667 inline static bfd_signed_vma
3668 _bfinfdpic_get_fd_entry (struct _bfinfdpic_dynamic_got_alloc_data
*gad
)
3670 /* If we're at the bottom, wrap around, and only then allocate the
3671 next pair of words. */
3672 if (gad
->fdcur
== gad
->min
)
3673 gad
->fdcur
= gad
->max
;
3674 return gad
->fdcur
-= 8;
3677 /* Assign GOT offsets for every GOT entry and function descriptor.
3678 Doing everything in a single pass is tricky. */
3681 _bfinfdpic_assign_got_entries (void **entryp
, void *info_
)
3683 struct bfinfdpic_relocs_info
*entry
= *entryp
;
3684 struct _bfinfdpic_dynamic_got_plt_info
*dinfo
= info_
;
3687 entry
->got_entry
= _bfinfdpic_get_got_entry (&dinfo
->got17m4
);
3688 else if (entry
->gothilo
)
3689 entry
->got_entry
= _bfinfdpic_get_got_entry (&dinfo
->gothilo
);
3691 if (entry
->fdgot17m4
)
3692 entry
->fdgot_entry
= _bfinfdpic_get_got_entry (&dinfo
->got17m4
);
3693 else if (entry
->fdgothilo
)
3694 entry
->fdgot_entry
= _bfinfdpic_get_got_entry (&dinfo
->gothilo
);
3696 if (entry
->fdgoff17m4
)
3697 entry
->fd_entry
= _bfinfdpic_get_fd_entry (&dinfo
->got17m4
);
3698 else if (entry
->plt
&& dinfo
->got17m4
.fdplt
)
3700 dinfo
->got17m4
.fdplt
-= 8;
3701 entry
->fd_entry
= _bfinfdpic_get_fd_entry (&dinfo
->got17m4
);
3703 else if (entry
->plt
)
3705 dinfo
->gothilo
.fdplt
-= 8;
3706 entry
->fd_entry
= _bfinfdpic_get_fd_entry (&dinfo
->gothilo
);
3708 else if (entry
->privfd
)
3709 entry
->fd_entry
= _bfinfdpic_get_fd_entry (&dinfo
->gothilo
);
3714 /* Assign GOT offsets to private function descriptors used by PLT
3715 entries (or referenced by 32-bit offsets), as well as PLT entries
3716 and lazy PLT entries. */
3719 _bfinfdpic_assign_plt_entries (void **entryp
, void *info_
)
3721 struct bfinfdpic_relocs_info
*entry
= *entryp
;
3722 struct _bfinfdpic_dynamic_got_plt_info
*dinfo
= info_
;
3724 /* If this symbol requires a local function descriptor, allocate
3726 if (entry
->privfd
&& entry
->fd_entry
== 0)
3728 if (dinfo
->got17m4
.fdplt
)
3730 entry
->fd_entry
= _bfinfdpic_get_fd_entry (&dinfo
->got17m4
);
3731 dinfo
->got17m4
.fdplt
-= 8;
3735 BFD_ASSERT (dinfo
->gothilo
.fdplt
);
3736 entry
->fd_entry
= _bfinfdpic_get_fd_entry (&dinfo
->gothilo
);
3737 dinfo
->gothilo
.fdplt
-= 8;
3745 /* We use the section's raw size to mark the location of the
3747 entry
->plt_entry
= bfinfdpic_plt_section (dinfo
->g
.info
)->size
;
3749 /* Figure out the length of this PLT entry based on the
3750 addressing mode we need to reach the function descriptor. */
3751 BFD_ASSERT (entry
->fd_entry
);
3752 if (entry
->fd_entry
>= -(1 << (18 - 1))
3753 && entry
->fd_entry
+ 4 < (1 << (18 - 1)))
3758 bfinfdpic_plt_section (dinfo
->g
.info
)->size
+= size
;
3763 entry
->lzplt_entry
= dinfo
->g
.lzplt
;
3764 dinfo
->g
.lzplt
+= LZPLT_NORMAL_SIZE
;
3765 /* If this entry is the one that gets the resolver stub, account
3766 for the additional instruction. */
3767 if (entry
->lzplt_entry
% BFINFDPIC_LZPLT_BLOCK_SIZE
3768 == BFINFDPIC_LZPLT_RESOLV_LOC
)
3769 dinfo
->g
.lzplt
+= LZPLT_RESOLVER_EXTRA
;
3775 /* Cancel out any effects of calling _bfinfdpic_assign_got_entries and
3776 _bfinfdpic_assign_plt_entries. */
3779 _bfinfdpic_reset_got_plt_entries (void **entryp
, void *ignore ATTRIBUTE_UNUSED
)
3781 struct bfinfdpic_relocs_info
*entry
= *entryp
;
3783 entry
->got_entry
= 0;
3784 entry
->fdgot_entry
= 0;
3785 entry
->fd_entry
= 0;
3786 entry
->plt_entry
= (bfd_vma
)-1;
3787 entry
->lzplt_entry
= (bfd_vma
)-1;
3792 /* Follow indirect and warning hash entries so that each got entry
3793 points to the final symbol definition. P must point to a pointer
3794 to the hash table we're traversing. Since this traversal may
3795 modify the hash table, we set this pointer to NULL to indicate
3796 we've made a potentially-destructive change to the hash table, so
3797 the traversal must be restarted. */
3799 _bfinfdpic_resolve_final_relocs_info (void **entryp
, void *p
)
3801 struct bfinfdpic_relocs_info
*entry
= *entryp
;
3804 if (entry
->symndx
== -1)
3806 struct elf_link_hash_entry
*h
= entry
->d
.h
;
3807 struct bfinfdpic_relocs_info
*oentry
;
3809 while (h
->root
.type
== bfd_link_hash_indirect
3810 || h
->root
.type
== bfd_link_hash_warning
)
3811 h
= (struct elf_link_hash_entry
*)h
->root
.u
.i
.link
;
3813 if (entry
->d
.h
== h
)
3816 oentry
= bfinfdpic_relocs_info_for_global (*htab
, 0, h
, entry
->addend
,
3821 /* Merge the two entries. */
3822 bfinfdpic_pic_merge_early_relocs_info (oentry
, entry
);
3823 htab_clear_slot (*htab
, entryp
);
3829 /* If we can't find this entry with the new bfd hash, re-insert
3830 it, and get the traversal restarted. */
3831 if (! htab_find (*htab
, entry
))
3833 htab_clear_slot (*htab
, entryp
);
3834 entryp
= htab_find_slot (*htab
, entry
, INSERT
);
3837 /* Abort the traversal, since the whole table may have
3838 moved, and leave it up to the parent to restart the
3840 *(htab_t
*)p
= NULL
;
3848 /* Compute the total size of the GOT, the PLT, the dynamic relocations
3849 section and the rofixup section. Assign locations for GOT and PLT
3853 _bfinfdpic_size_got_plt (bfd
*output_bfd
,
3854 struct _bfinfdpic_dynamic_got_plt_info
*gpinfop
)
3858 struct bfd_link_info
*info
= gpinfop
->g
.info
;
3859 bfd
*dynobj
= elf_hash_table (info
)->dynobj
;
3861 memcpy (bfinfdpic_dynamic_got_plt_info (info
), &gpinfop
->g
,
3862 sizeof (gpinfop
->g
));
3865 /* Compute the total size taken by entries in the 18-bit range,
3866 to tell how many PLT function descriptors we can bring into it
3867 without causing it to overflow. */
3868 limit
= odd
+ gpinfop
->g
.got17m4
+ gpinfop
->g
.fd17m4
;
3869 if (limit
< (bfd_vma
)1 << 18)
3870 limit
= ((bfd_vma
)1 << 18) - limit
;
3873 if (gpinfop
->g
.fdplt
< limit
)
3874 limit
= gpinfop
->g
.fdplt
;
3876 /* Determine the ranges of GOT offsets that we can use for each
3877 range of addressing modes. */
3878 odd
= _bfinfdpic_compute_got_alloc_data (&gpinfop
->got17m4
,
3885 (bfd_vma
)1 << (18-1));
3886 odd
= _bfinfdpic_compute_got_alloc_data (&gpinfop
->gothilo
,
3887 gpinfop
->got17m4
.min
,
3889 gpinfop
->got17m4
.max
,
3892 gpinfop
->g
.fdplt
- gpinfop
->got17m4
.fdplt
,
3893 (bfd_vma
)1 << (32-1));
3895 /* Now assign (most) GOT offsets. */
3896 htab_traverse (bfinfdpic_relocs_info (info
), _bfinfdpic_assign_got_entries
,
3899 bfinfdpic_got_section (info
)->size
= gpinfop
->gothilo
.max
3900 - gpinfop
->gothilo
.min
3901 /* If an odd word is the last word of the GOT, we don't need this
3902 word to be part of the GOT. */
3903 - (odd
+ 4 == gpinfop
->gothilo
.max
? 4 : 0);
3904 if (bfinfdpic_got_section (info
)->size
== 0)
3905 bfinfdpic_got_section (info
)->flags
|= SEC_EXCLUDE
;
3906 else if (bfinfdpic_got_section (info
)->size
== 12
3907 && ! elf_hash_table (info
)->dynamic_sections_created
)
3909 bfinfdpic_got_section (info
)->flags
|= SEC_EXCLUDE
;
3910 bfinfdpic_got_section (info
)->size
= 0;
3914 bfinfdpic_got_section (info
)->contents
=
3915 (bfd_byte
*) bfd_zalloc (dynobj
,
3916 bfinfdpic_got_section (info
)->size
);
3917 if (bfinfdpic_got_section (info
)->contents
== NULL
)
3921 if (elf_hash_table (info
)->dynamic_sections_created
)
3922 /* Subtract the number of lzplt entries, since those will generate
3923 relocations in the pltrel section. */
3924 bfinfdpic_gotrel_section (info
)->size
=
3925 (gpinfop
->g
.relocs
- gpinfop
->g
.lzplt
/ LZPLT_NORMAL_SIZE
)
3926 * get_elf_backend_data (output_bfd
)->s
->sizeof_rel
;
3928 BFD_ASSERT (gpinfop
->g
.relocs
== 0);
3929 if (bfinfdpic_gotrel_section (info
)->size
== 0)
3930 bfinfdpic_gotrel_section (info
)->flags
|= SEC_EXCLUDE
;
3933 bfinfdpic_gotrel_section (info
)->contents
=
3934 (bfd_byte
*) bfd_zalloc (dynobj
,
3935 bfinfdpic_gotrel_section (info
)->size
);
3936 if (bfinfdpic_gotrel_section (info
)->contents
== NULL
)
3940 bfinfdpic_gotfixup_section (info
)->size
= (gpinfop
->g
.fixups
+ 1) * 4;
3941 if (bfinfdpic_gotfixup_section (info
)->size
== 0)
3942 bfinfdpic_gotfixup_section (info
)->flags
|= SEC_EXCLUDE
;
3945 bfinfdpic_gotfixup_section (info
)->contents
=
3946 (bfd_byte
*) bfd_zalloc (dynobj
,
3947 bfinfdpic_gotfixup_section (info
)->size
);
3948 if (bfinfdpic_gotfixup_section (info
)->contents
== NULL
)
3952 if (elf_hash_table (info
)->dynamic_sections_created
)
3953 bfinfdpic_pltrel_section (info
)->size
=
3954 gpinfop
->g
.lzplt
/ LZPLT_NORMAL_SIZE
* get_elf_backend_data (output_bfd
)->s
->sizeof_rel
;
3955 if (bfinfdpic_pltrel_section (info
)->size
== 0)
3956 bfinfdpic_pltrel_section (info
)->flags
|= SEC_EXCLUDE
;
3959 bfinfdpic_pltrel_section (info
)->contents
=
3960 (bfd_byte
*) bfd_zalloc (dynobj
,
3961 bfinfdpic_pltrel_section (info
)->size
);
3962 if (bfinfdpic_pltrel_section (info
)->contents
== NULL
)
3966 /* Add 4 bytes for every block of at most 65535 lazy PLT entries,
3967 such that there's room for the additional instruction needed to
3968 call the resolver. Since _bfinfdpic_assign_got_entries didn't
3969 account for them, our block size is 4 bytes smaller than the real
3971 if (elf_hash_table (info
)->dynamic_sections_created
)
3973 bfinfdpic_plt_section (info
)->size
= gpinfop
->g
.lzplt
3974 + ((gpinfop
->g
.lzplt
+ (BFINFDPIC_LZPLT_BLOCK_SIZE
- 4) - LZPLT_NORMAL_SIZE
)
3975 / (BFINFDPIC_LZPLT_BLOCK_SIZE
- 4) * LZPLT_RESOLVER_EXTRA
);
3978 /* Reset it, such that _bfinfdpic_assign_plt_entries() can use it to
3979 actually assign lazy PLT entries addresses. */
3980 gpinfop
->g
.lzplt
= 0;
3982 /* Save information that we're going to need to generate GOT and PLT
3984 bfinfdpic_got_initial_offset (info
) = -gpinfop
->gothilo
.min
;
3986 if (get_elf_backend_data (output_bfd
)->want_got_sym
)
3987 elf_hash_table (info
)->hgot
->root
.u
.def
.value
3988 = bfinfdpic_got_initial_offset (info
);
3990 if (elf_hash_table (info
)->dynamic_sections_created
)
3991 bfinfdpic_plt_initial_offset (info
) =
3992 bfinfdpic_plt_section (info
)->size
;
3994 htab_traverse (bfinfdpic_relocs_info (info
), _bfinfdpic_assign_plt_entries
,
3997 /* Allocate the PLT section contents only after
3998 _bfinfdpic_assign_plt_entries has a chance to add the size of the
3999 non-lazy PLT entries. */
4000 if (bfinfdpic_plt_section (info
)->size
== 0)
4001 bfinfdpic_plt_section (info
)->flags
|= SEC_EXCLUDE
;
4004 bfinfdpic_plt_section (info
)->contents
=
4005 (bfd_byte
*) bfd_zalloc (dynobj
,
4006 bfinfdpic_plt_section (info
)->size
);
4007 if (bfinfdpic_plt_section (info
)->contents
== NULL
)
4014 /* Set the sizes of the dynamic sections. */
4017 elf32_bfinfdpic_size_dynamic_sections (bfd
*output_bfd
,
4018 struct bfd_link_info
*info
)
4020 struct elf_link_hash_table
*htab
;
4023 struct _bfinfdpic_dynamic_got_plt_info gpinfo
;
4025 htab
= elf_hash_table (info
);
4026 dynobj
= htab
->dynobj
;
4027 BFD_ASSERT (dynobj
!= NULL
);
4029 if (htab
->dynamic_sections_created
)
4031 /* Set the contents of the .interp section to the interpreter. */
4032 if (bfd_link_executable (info
) && !info
->nointerp
)
4034 s
= bfd_get_linker_section (dynobj
, ".interp");
4035 BFD_ASSERT (s
!= NULL
);
4036 s
->size
= sizeof ELF_DYNAMIC_INTERPRETER
;
4037 s
->contents
= (bfd_byte
*) ELF_DYNAMIC_INTERPRETER
;
4041 memset (&gpinfo
, 0, sizeof (gpinfo
));
4042 gpinfo
.g
.info
= info
;
4046 htab_t relocs
= bfinfdpic_relocs_info (info
);
4048 htab_traverse (relocs
, _bfinfdpic_resolve_final_relocs_info
, &relocs
);
4050 if (relocs
== bfinfdpic_relocs_info (info
))
4054 htab_traverse (bfinfdpic_relocs_info (info
), _bfinfdpic_count_got_plt_entries
,
4057 /* Allocate space to save the summary information, we're going to
4058 use it if we're doing relaxations. */
4059 bfinfdpic_dynamic_got_plt_info (info
) = bfd_alloc (dynobj
, sizeof (gpinfo
.g
));
4061 if (!_bfinfdpic_size_got_plt (output_bfd
, &gpinfo
))
4064 if (elf_hash_table (info
)->dynamic_sections_created
)
4066 if (bfinfdpic_got_section (info
)->size
)
4067 if (!_bfd_elf_add_dynamic_entry (info
, DT_PLTGOT
, 0))
4070 if (bfinfdpic_pltrel_section (info
)->size
)
4071 if (!_bfd_elf_add_dynamic_entry (info
, DT_PLTRELSZ
, 0)
4072 || !_bfd_elf_add_dynamic_entry (info
, DT_PLTREL
, DT_REL
)
4073 || !_bfd_elf_add_dynamic_entry (info
, DT_JMPREL
, 0))
4076 if (bfinfdpic_gotrel_section (info
)->size
)
4077 if (!_bfd_elf_add_dynamic_entry (info
, DT_REL
, 0)
4078 || !_bfd_elf_add_dynamic_entry (info
, DT_RELSZ
, 0)
4079 || !_bfd_elf_add_dynamic_entry (info
, DT_RELENT
,
4080 sizeof (Elf32_External_Rel
)))
4084 s
= bfd_get_linker_section (dynobj
, ".dynbss");
4085 if (s
&& s
->size
== 0)
4086 s
->flags
|= SEC_EXCLUDE
;
4088 s
= bfd_get_linker_section (dynobj
, ".rela.bss");
4089 if (s
&& s
->size
== 0)
4090 s
->flags
|= SEC_EXCLUDE
;
4096 elf32_bfinfdpic_always_size_sections (bfd
*output_bfd
,
4097 struct bfd_link_info
*info
)
4099 if (!bfd_link_relocatable (info
)
4100 && !bfd_elf_stack_segment_size (output_bfd
, info
,
4101 "__stacksize", DEFAULT_STACK_SIZE
))
4107 /* Check whether any of the relocations was optimized away, and
4108 subtract it from the relocation or fixup count. */
4110 _bfinfdpic_check_discarded_relocs (bfd
*abfd
, asection
*sec
,
4111 struct bfd_link_info
*info
,
4112 bfd_boolean
*changed
)
4114 Elf_Internal_Shdr
*symtab_hdr
;
4115 struct elf_link_hash_entry
**sym_hashes
, **sym_hashes_end
;
4116 Elf_Internal_Rela
*rel
, *erel
;
4118 if ((sec
->flags
& SEC_RELOC
) == 0
4119 || sec
->reloc_count
== 0)
4122 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
4123 sym_hashes
= elf_sym_hashes (abfd
);
4124 sym_hashes_end
= sym_hashes
+ symtab_hdr
->sh_size
/sizeof(Elf32_External_Sym
);
4125 if (!elf_bad_symtab (abfd
))
4126 sym_hashes_end
-= symtab_hdr
->sh_info
;
4128 rel
= elf_section_data (sec
)->relocs
;
4130 /* Now examine each relocation. */
4131 for (erel
= rel
+ sec
->reloc_count
; rel
< erel
; rel
++)
4133 struct elf_link_hash_entry
*h
;
4134 unsigned long r_symndx
;
4135 struct bfinfdpic_relocs_info
*picrel
;
4136 struct _bfinfdpic_dynamic_got_info
*dinfo
;
4138 if (ELF32_R_TYPE (rel
->r_info
) != R_BFIN_BYTE4_DATA
4139 && ELF32_R_TYPE (rel
->r_info
) != R_BFIN_FUNCDESC
)
4142 if (_bfd_elf_section_offset (sec
->output_section
->owner
,
4143 info
, sec
, rel
->r_offset
)
4147 r_symndx
= ELF32_R_SYM (rel
->r_info
);
4148 if (r_symndx
< symtab_hdr
->sh_info
)
4152 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
4153 while (h
->root
.type
== bfd_link_hash_indirect
4154 || h
->root
.type
== bfd_link_hash_warning
)
4155 h
= (struct elf_link_hash_entry
*)h
->root
.u
.i
.link
;
4159 picrel
= bfinfdpic_relocs_info_for_global (bfinfdpic_relocs_info (info
),
4161 rel
->r_addend
, NO_INSERT
);
4163 picrel
= bfinfdpic_relocs_info_for_local (bfinfdpic_relocs_info (info
),
4165 rel
->r_addend
, NO_INSERT
);
4171 dinfo
= bfinfdpic_dynamic_got_plt_info (info
);
4173 _bfinfdpic_count_relocs_fixups (picrel
, dinfo
, TRUE
);
4174 if (ELF32_R_TYPE (rel
->r_info
) == R_BFIN_BYTE4_DATA
)
4176 else /* we know (ELF32_R_TYPE (rel->r_info) == R_BFIN_FUNCDESC) */
4178 _bfinfdpic_count_relocs_fixups (picrel
, dinfo
, FALSE
);
4185 bfinfdpic_elf_discard_info (bfd
*ibfd
,
4186 struct elf_reloc_cookie
*cookie ATTRIBUTE_UNUSED
,
4187 struct bfd_link_info
*info
)
4189 bfd_boolean changed
= FALSE
;
4193 /* Account for relaxation of .eh_frame section. */
4194 for (s
= ibfd
->sections
; s
; s
= s
->next
)
4195 if (s
->sec_info_type
== SEC_INFO_TYPE_EH_FRAME
)
4197 if (!_bfinfdpic_check_discarded_relocs (ibfd
, s
, info
, &changed
))
4199 obfd
= s
->output_section
->owner
;
4204 struct _bfinfdpic_dynamic_got_plt_info gpinfo
;
4206 memset (&gpinfo
, 0, sizeof (gpinfo
));
4207 memcpy (&gpinfo
.g
, bfinfdpic_dynamic_got_plt_info (info
),
4210 /* Clear GOT and PLT assignments. */
4211 htab_traverse (bfinfdpic_relocs_info (info
),
4212 _bfinfdpic_reset_got_plt_entries
,
4215 if (!_bfinfdpic_size_got_plt (obfd
, &gpinfo
))
4223 elf32_bfinfdpic_finish_dynamic_sections (bfd
*output_bfd
,
4224 struct bfd_link_info
*info
)
4229 dynobj
= elf_hash_table (info
)->dynobj
;
4231 if (bfinfdpic_got_section (info
))
4233 BFD_ASSERT (bfinfdpic_gotrel_section (info
)->size
4234 /* PR 17334: It appears that the GOT section can end up
4235 being bigger than the number of relocs. Presumably
4236 because some relocs have been deleted. A test case has
4237 yet to be generated for verify this, but in the meantime
4238 the test below has been changed from == to >= so that
4239 applications can continue to be built. */
4240 >= (bfinfdpic_gotrel_section (info
)->reloc_count
4241 * sizeof (Elf32_External_Rel
)));
4243 if (bfinfdpic_gotfixup_section (info
))
4245 struct elf_link_hash_entry
*hgot
= elf_hash_table (info
)->hgot
;
4246 bfd_vma got_value
= hgot
->root
.u
.def
.value
4247 + hgot
->root
.u
.def
.section
->output_section
->vma
4248 + hgot
->root
.u
.def
.section
->output_offset
;
4250 _bfinfdpic_add_rofixup (output_bfd
, bfinfdpic_gotfixup_section (info
),
4253 if (bfinfdpic_gotfixup_section (info
)->size
4254 != (bfinfdpic_gotfixup_section (info
)->reloc_count
* 4))
4257 ("LINKER BUG: .rofixup section size mismatch");
4262 if (elf_hash_table (info
)->dynamic_sections_created
)
4264 BFD_ASSERT (bfinfdpic_pltrel_section (info
)->size
4265 == (bfinfdpic_pltrel_section (info
)->reloc_count
4266 * sizeof (Elf32_External_Rel
)));
4269 sdyn
= bfd_get_linker_section (dynobj
, ".dynamic");
4271 if (elf_hash_table (info
)->dynamic_sections_created
)
4273 Elf32_External_Dyn
* dyncon
;
4274 Elf32_External_Dyn
* dynconend
;
4276 BFD_ASSERT (sdyn
!= NULL
);
4278 dyncon
= (Elf32_External_Dyn
*) sdyn
->contents
;
4279 dynconend
= (Elf32_External_Dyn
*) (sdyn
->contents
+ sdyn
->size
);
4281 for (; dyncon
< dynconend
; dyncon
++)
4283 Elf_Internal_Dyn dyn
;
4285 bfd_elf32_swap_dyn_in (dynobj
, dyncon
, &dyn
);
4293 dyn
.d_un
.d_ptr
= bfinfdpic_got_section (info
)->output_section
->vma
4294 + bfinfdpic_got_section (info
)->output_offset
4295 + bfinfdpic_got_initial_offset (info
);
4296 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
4300 dyn
.d_un
.d_ptr
= bfinfdpic_pltrel_section (info
)
4301 ->output_section
->vma
4302 + bfinfdpic_pltrel_section (info
)->output_offset
;
4303 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
4307 dyn
.d_un
.d_val
= bfinfdpic_pltrel_section (info
)->size
;
4308 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
4317 /* Adjust a symbol defined by a dynamic object and referenced by a
4321 elf32_bfinfdpic_adjust_dynamic_symbol (struct bfd_link_info
*info
,
4322 struct elf_link_hash_entry
*h
)
4326 dynobj
= elf_hash_table (info
)->dynobj
;
4328 /* Make sure we know what is going on here. */
4329 BFD_ASSERT (dynobj
!= NULL
4330 && (h
->u
.weakdef
!= NULL
4333 && !h
->def_regular
)));
4335 /* If this is a weak symbol, and there is a real definition, the
4336 processor independent code will have arranged for us to see the
4337 real definition first, and we can just use the same value. */
4338 if (h
->u
.weakdef
!= NULL
)
4340 BFD_ASSERT (h
->u
.weakdef
->root
.type
== bfd_link_hash_defined
4341 || h
->u
.weakdef
->root
.type
== bfd_link_hash_defweak
);
4342 h
->root
.u
.def
.section
= h
->u
.weakdef
->root
.u
.def
.section
;
4343 h
->root
.u
.def
.value
= h
->u
.weakdef
->root
.u
.def
.value
;
4349 /* Perform any actions needed for dynamic symbols. */
4352 elf32_bfinfdpic_finish_dynamic_symbol
4353 (bfd
*output_bfd ATTRIBUTE_UNUSED
,
4354 struct bfd_link_info
*info ATTRIBUTE_UNUSED
,
4355 struct elf_link_hash_entry
*h ATTRIBUTE_UNUSED
,
4356 Elf_Internal_Sym
*sym ATTRIBUTE_UNUSED
)
4361 /* Decide whether to attempt to turn absptr or lsda encodings in
4362 shared libraries into pcrel within the given input section. */
4365 bfinfdpic_elf_use_relative_eh_frame
4366 (bfd
*input_bfd ATTRIBUTE_UNUSED
,
4367 struct bfd_link_info
*info ATTRIBUTE_UNUSED
,
4368 asection
*eh_frame_section ATTRIBUTE_UNUSED
)
4370 /* We can't use PC-relative encodings in FDPIC binaries, in general. */
4374 /* Adjust the contents of an eh_frame_hdr section before they're output. */
4377 bfinfdpic_elf_encode_eh_address (bfd
*abfd
,
4378 struct bfd_link_info
*info
,
4379 asection
*osec
, bfd_vma offset
,
4380 asection
*loc_sec
, bfd_vma loc_offset
,
4383 struct elf_link_hash_entry
*h
;
4385 h
= elf_hash_table (info
)->hgot
;
4386 BFD_ASSERT (h
&& h
->root
.type
== bfd_link_hash_defined
);
4388 if (! h
|| (_bfinfdpic_osec_to_segment (abfd
, osec
)
4389 == _bfinfdpic_osec_to_segment (abfd
, loc_sec
->output_section
)))
4390 return _bfd_elf_encode_eh_address (abfd
, info
, osec
, offset
,
4391 loc_sec
, loc_offset
, encoded
);
4393 BFD_ASSERT (_bfinfdpic_osec_to_segment (abfd
, osec
)
4394 == (_bfinfdpic_osec_to_segment
4395 (abfd
, h
->root
.u
.def
.section
->output_section
)));
4397 *encoded
= osec
->vma
+ offset
4398 - (h
->root
.u
.def
.value
4399 + h
->root
.u
.def
.section
->output_section
->vma
4400 + h
->root
.u
.def
.section
->output_offset
);
4402 return DW_EH_PE_datarel
| DW_EH_PE_sdata4
;
4407 /* Look through the relocs for a section during the first phase.
4409 Besides handling virtual table relocs for gc, we have to deal with
4410 all sorts of PIC-related relocations. We describe below the
4411 general plan on how to handle such relocations, even though we only
4412 collect information at this point, storing them in hash tables for
4413 perusal of later passes.
4415 32 relocations are propagated to the linker output when creating
4416 position-independent output. LO16 and HI16 relocations are not
4417 supposed to be encountered in this case.
4419 LABEL16 should always be resolvable by the linker, since it's only
4422 LABEL24, on the other hand, is used by calls. If it turns out that
4423 the target of a call is a dynamic symbol, a PLT entry must be
4424 created for it, which triggers the creation of a private function
4425 descriptor and, unless lazy binding is disabled, a lazy PLT entry.
4427 GPREL relocations require the referenced symbol to be in the same
4428 segment as _gp, but this can only be checked later.
4430 All GOT, GOTOFF and FUNCDESC relocations require a .got section to
4431 exist. LABEL24 might as well, since it may require a PLT entry,
4432 that will require a got.
4434 Non-FUNCDESC GOT relocations require a GOT entry to be created
4435 regardless of whether the symbol is dynamic. However, since a
4436 global symbol that turns out to not be exported may have the same
4437 address of a non-dynamic symbol, we don't assign GOT entries at
4438 this point, such that we can share them in this case. A relocation
4439 for the GOT entry always has to be created, be it to offset a
4440 private symbol by the section load address, be it to get the symbol
4441 resolved dynamically.
4443 FUNCDESC GOT relocations require a GOT entry to be created, and
4444 handled as if a FUNCDESC relocation was applied to the GOT entry in
4447 FUNCDESC relocations referencing a symbol that turns out to NOT be
4448 dynamic cause a private function descriptor to be created. The
4449 FUNCDESC relocation then decays to a 32 relocation that points at
4450 the private descriptor. If the symbol is dynamic, the FUNCDESC
4451 relocation is propagated to the linker output, such that the
4452 dynamic linker creates the canonical descriptor, pointing to the
4453 dynamically-resolved definition of the function.
4455 Non-FUNCDESC GOTOFF relocations must always refer to non-dynamic
4456 symbols that are assigned to the same segment as the GOT, but we
4457 can only check this later, after we know the complete set of
4458 symbols defined and/or exported.
4460 FUNCDESC GOTOFF relocations require a function descriptor to be
4461 created and, unless lazy binding is disabled or the symbol is not
4462 dynamic, a lazy PLT entry. Since we can't tell at this point
4463 whether a symbol is going to be dynamic, we have to decide later
4464 whether to create a lazy PLT entry or bind the descriptor directly
4465 to the private function.
4467 FUNCDESC_VALUE relocations are not supposed to be present in object
4468 files, but they may very well be simply propagated to the linker
4469 output, since they have no side effect.
4472 A function descriptor always requires a FUNCDESC_VALUE relocation.
4473 Whether it's in .plt.rel or not depends on whether lazy binding is
4474 enabled and on whether the referenced symbol is dynamic.
4476 The existence of a lazy PLT requires the resolverStub lazy PLT
4477 entry to be present.
4480 As for assignment of GOT, PLT and lazy PLT entries, and private
4481 descriptors, we might do them all sequentially, but we can do
4482 better than that. For example, we can place GOT entries and
4483 private function descriptors referenced using 12-bit operands
4484 closer to the PIC register value, such that these relocations don't
4485 overflow. Those that are only referenced with LO16 relocations
4486 could come next, but we may as well place PLT-required function
4487 descriptors in the 12-bit range to make them shorter. Symbols
4488 referenced with LO16/HI16 may come next, but we may place
4489 additional function descriptors in the 16-bit range if we can
4490 reliably tell that we've already placed entries that are ever
4491 referenced with only LO16. PLT entries are therefore generated as
4492 small as possible, while not introducing relocation overflows in
4493 GOT or FUNCDESC_GOTOFF relocations. Lazy PLT entries could be
4494 generated before or after PLT entries, but not intermingled with
4495 them, such that we can have more lazy PLT entries in range for a
4496 branch to the resolverStub. The resolverStub should be emitted at
4497 the most distant location from the first lazy PLT entry such that
4498 it's still in range for a branch, or closer, if there isn't a need
4499 for so many lazy PLT entries. Additional lazy PLT entries may be
4500 emitted after the resolverStub, as long as branches are still in
4501 range. If the branch goes out of range, longer lazy PLT entries
4504 We could further optimize PLT and lazy PLT entries by giving them
4505 priority in assignment to closer-to-gr17 locations depending on the
4506 number of occurrences of references to them (assuming a function
4507 that's called more often is more important for performance, so its
4508 PLT entry should be faster), or taking hints from the compiler.
4509 Given infinite time and money... :-) */
4512 bfinfdpic_check_relocs (bfd
*abfd
, struct bfd_link_info
*info
,
4513 asection
*sec
, const Elf_Internal_Rela
*relocs
)
4515 Elf_Internal_Shdr
*symtab_hdr
;
4516 struct elf_link_hash_entry
**sym_hashes
;
4517 const Elf_Internal_Rela
*rel
;
4518 const Elf_Internal_Rela
*rel_end
;
4520 struct bfinfdpic_relocs_info
*picrel
;
4522 if (bfd_link_relocatable (info
))
4525 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
4526 sym_hashes
= elf_sym_hashes (abfd
);
4528 dynobj
= elf_hash_table (info
)->dynobj
;
4529 rel_end
= relocs
+ sec
->reloc_count
;
4530 for (rel
= relocs
; rel
< rel_end
; rel
++)
4532 struct elf_link_hash_entry
*h
;
4533 unsigned long r_symndx
;
4535 r_symndx
= ELF32_R_SYM (rel
->r_info
);
4536 if (r_symndx
< symtab_hdr
->sh_info
)
4539 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
4541 switch (ELF32_R_TYPE (rel
->r_info
))
4543 case R_BFIN_GOT17M4
:
4546 case R_BFIN_FUNCDESC_GOT17M4
:
4547 case R_BFIN_FUNCDESC_GOTHI
:
4548 case R_BFIN_FUNCDESC_GOTLO
:
4549 case R_BFIN_GOTOFF17M4
:
4550 case R_BFIN_GOTOFFHI
:
4551 case R_BFIN_GOTOFFLO
:
4552 case R_BFIN_FUNCDESC_GOTOFF17M4
:
4553 case R_BFIN_FUNCDESC_GOTOFFHI
:
4554 case R_BFIN_FUNCDESC_GOTOFFLO
:
4555 case R_BFIN_FUNCDESC
:
4556 case R_BFIN_FUNCDESC_VALUE
:
4557 if (! IS_FDPIC (abfd
))
4560 case R_BFIN_PCREL24
:
4561 case R_BFIN_PCREL24_JUMP_L
:
4562 case R_BFIN_BYTE4_DATA
:
4563 if (IS_FDPIC (abfd
) && ! dynobj
)
4565 elf_hash_table (info
)->dynobj
= dynobj
= abfd
;
4566 if (! _bfin_create_got_section (abfd
, info
))
4569 if (! IS_FDPIC (abfd
))
4576 if (h
->dynindx
== -1)
4577 switch (ELF_ST_VISIBILITY (h
->other
))
4583 bfd_elf_link_record_dynamic_symbol (info
, h
);
4587 = bfinfdpic_relocs_info_for_global (bfinfdpic_relocs_info (info
),
4589 rel
->r_addend
, INSERT
);
4592 picrel
= bfinfdpic_relocs_info_for_local (bfinfdpic_relocs_info
4593 (info
), abfd
, r_symndx
,
4594 rel
->r_addend
, INSERT
);
4604 switch (ELF32_R_TYPE (rel
->r_info
))
4606 case R_BFIN_PCREL24
:
4607 case R_BFIN_PCREL24_JUMP_L
:
4608 if (IS_FDPIC (abfd
))
4612 case R_BFIN_FUNCDESC_VALUE
:
4613 picrel
->relocsfdv
++;
4614 if (bfd_get_section_flags (abfd
, sec
) & SEC_ALLOC
)
4618 case R_BFIN_BYTE4_DATA
:
4619 if (! IS_FDPIC (abfd
))
4623 if (bfd_get_section_flags (abfd
, sec
) & SEC_ALLOC
)
4627 case R_BFIN_GOT17M4
:
4636 case R_BFIN_FUNCDESC_GOT17M4
:
4637 picrel
->fdgot17m4
++;
4640 case R_BFIN_FUNCDESC_GOTHI
:
4641 case R_BFIN_FUNCDESC_GOTLO
:
4642 picrel
->fdgothilo
++;
4645 case R_BFIN_GOTOFF17M4
:
4646 case R_BFIN_GOTOFFHI
:
4647 case R_BFIN_GOTOFFLO
:
4651 case R_BFIN_FUNCDESC_GOTOFF17M4
:
4652 picrel
->fdgoff17m4
++;
4655 case R_BFIN_FUNCDESC_GOTOFFHI
:
4656 case R_BFIN_FUNCDESC_GOTOFFLO
:
4657 picrel
->fdgoffhilo
++;
4660 case R_BFIN_FUNCDESC
:
4665 /* This relocation describes the C++ object vtable hierarchy.
4666 Reconstruct it for later use during GC. */
4667 case R_BFIN_GNU_VTINHERIT
:
4668 if (!bfd_elf_gc_record_vtinherit (abfd
, sec
, h
, rel
->r_offset
))
4672 /* This relocation describes which C++ vtable entries are actually
4673 used. Record for later use during GC. */
4674 case R_BFIN_GNU_VTENTRY
:
4675 BFD_ASSERT (h
!= NULL
);
4677 && !bfd_elf_gc_record_vtentry (abfd
, sec
, h
, rel
->r_addend
))
4681 case R_BFIN_HUIMM16
:
4682 case R_BFIN_LUIMM16
:
4683 case R_BFIN_PCREL12_JUMP_S
:
4684 case R_BFIN_PCREL10
:
4690 /* xgettext:c-format */
4691 (_("%B: unsupported relocation type %d"),
4692 abfd
, (int) ELF32_R_TYPE (rel
->r_info
));
4700 /* Set the right machine number for a Blackfin ELF file. */
4703 elf32_bfin_object_p (bfd
*abfd
)
4705 bfd_default_set_arch_mach (abfd
, bfd_arch_bfin
, 0);
4706 return (((elf_elfheader (abfd
)->e_flags
& EF_BFIN_FDPIC
) != 0)
4707 == (IS_FDPIC (abfd
)));
4711 elf32_bfin_set_private_flags (bfd
* abfd
, flagword flags
)
4713 elf_elfheader (abfd
)->e_flags
= flags
;
4714 elf_flags_init (abfd
) = TRUE
;
4718 /* Display the flags field. */
4720 elf32_bfin_print_private_bfd_data (bfd
* abfd
, void * ptr
)
4722 FILE *file
= (FILE *) ptr
;
4725 BFD_ASSERT (abfd
!= NULL
&& ptr
!= NULL
);
4727 /* Print normal ELF private data. */
4728 _bfd_elf_print_private_bfd_data (abfd
, ptr
);
4730 flags
= elf_elfheader (abfd
)->e_flags
;
4732 /* xgettext:c-format */
4733 fprintf (file
, _("private flags = %lx:"), elf_elfheader (abfd
)->e_flags
);
4735 if (flags
& EF_BFIN_PIC
)
4736 fprintf (file
, " -fpic");
4738 if (flags
& EF_BFIN_FDPIC
)
4739 fprintf (file
, " -mfdpic");
4746 /* Merge backend specific data from an object file to the output
4747 object file when linking. */
4750 elf32_bfin_merge_private_bfd_data (bfd
*ibfd
, struct bfd_link_info
*info
)
4752 bfd
*obfd
= info
->output_bfd
;
4753 flagword old_flags
, new_flags
;
4754 bfd_boolean error
= FALSE
;
4756 new_flags
= elf_elfheader (ibfd
)->e_flags
;
4757 old_flags
= elf_elfheader (obfd
)->e_flags
;
4759 if (new_flags
& EF_BFIN_FDPIC
)
4760 new_flags
&= ~EF_BFIN_PIC
;
4766 ("old_flags = 0x%.8x, new_flags = 0x%.8x, init = %s, filename = %B",
4767 old_flags
, new_flags
, elf_flags_init (obfd
) ? "yes" : "no", ibfd
);
4769 if (!elf_flags_init (obfd
)) /* First call, no flags set. */
4771 elf_flags_init (obfd
) = TRUE
;
4772 elf_elfheader (obfd
)->e_flags
= new_flags
;
4775 if (((new_flags
& EF_BFIN_FDPIC
) == 0) != (! IS_FDPIC (obfd
)))
4778 if (IS_FDPIC (obfd
))
4780 (_("%B: cannot link non-fdpic object file into fdpic executable"),
4784 (_("%B: cannot link fdpic object file into non-fdpic executable"),
4789 bfd_set_error (bfd_error_bad_value
);
4794 /* bfin ELF linker hash entry. */
4796 struct bfin_link_hash_entry
4798 struct elf_link_hash_entry root
;
4800 /* Number of PC relative relocs copied for this symbol. */
4801 struct bfin_pcrel_relocs_copied
*pcrel_relocs_copied
;
4804 /* bfin ELF linker hash table. */
4806 struct bfin_link_hash_table
4808 struct elf_link_hash_table root
;
4810 /* Small local sym cache. */
4811 struct sym_cache sym_cache
;
4814 #define bfin_hash_entry(ent) ((struct bfin_link_hash_entry *) (ent))
4816 static struct bfd_hash_entry
*
4817 bfin_link_hash_newfunc (struct bfd_hash_entry
*entry
,
4818 struct bfd_hash_table
*table
, const char *string
)
4820 struct bfd_hash_entry
*ret
= entry
;
4822 /* Allocate the structure if it has not already been allocated by a
4825 ret
= bfd_hash_allocate (table
, sizeof (struct bfin_link_hash_entry
));
4829 /* Call the allocation method of the superclass. */
4830 ret
= _bfd_elf_link_hash_newfunc (ret
, table
, string
);
4832 bfin_hash_entry (ret
)->pcrel_relocs_copied
= NULL
;
4837 /* Create an bfin ELF linker hash table. */
4839 static struct bfd_link_hash_table
*
4840 bfin_link_hash_table_create (bfd
* abfd
)
4842 struct bfin_link_hash_table
*ret
;
4843 bfd_size_type amt
= sizeof (struct bfin_link_hash_table
);
4845 ret
= bfd_zmalloc (amt
);
4849 if (!_bfd_elf_link_hash_table_init (&ret
->root
, abfd
,
4850 bfin_link_hash_newfunc
,
4851 sizeof (struct elf_link_hash_entry
),
4858 ret
->sym_cache
.abfd
= NULL
;
4860 return &ret
->root
.root
;
4863 /* The size in bytes of an entry in the procedure linkage table. */
4865 /* Finish up the dynamic sections. */
4868 bfin_finish_dynamic_sections (bfd
* output_bfd ATTRIBUTE_UNUSED
,
4869 struct bfd_link_info
*info
)
4874 dynobj
= elf_hash_table (info
)->dynobj
;
4876 sdyn
= bfd_get_linker_section (dynobj
, ".dynamic");
4878 if (elf_hash_table (info
)->dynamic_sections_created
)
4880 Elf32_External_Dyn
*dyncon
, *dynconend
;
4882 BFD_ASSERT (sdyn
!= NULL
);
4884 dyncon
= (Elf32_External_Dyn
*) sdyn
->contents
;
4885 dynconend
= (Elf32_External_Dyn
*) (sdyn
->contents
+ sdyn
->size
);
4886 for (; dyncon
< dynconend
; dyncon
++)
4888 Elf_Internal_Dyn dyn
;
4890 bfd_elf32_swap_dyn_in (dynobj
, dyncon
, &dyn
);
4898 /* Finish up dynamic symbol handling. We set the contents of various
4899 dynamic sections here. */
4902 bfin_finish_dynamic_symbol (bfd
* output_bfd
,
4903 struct bfd_link_info
*info
,
4904 struct elf_link_hash_entry
*h
,
4905 Elf_Internal_Sym
* sym
)
4907 if (h
->got
.offset
!= (bfd_vma
) - 1)
4911 Elf_Internal_Rela rela
;
4914 /* This symbol has an entry in the global offset table.
4917 sgot
= elf_hash_table (info
)->sgot
;
4918 srela
= elf_hash_table (info
)->srelgot
;
4919 BFD_ASSERT (sgot
!= NULL
&& srela
!= NULL
);
4921 rela
.r_offset
= (sgot
->output_section
->vma
4922 + sgot
->output_offset
4923 + (h
->got
.offset
& ~(bfd_vma
) 1));
4925 /* If this is a -Bsymbolic link, and the symbol is defined
4926 locally, we just want to emit a RELATIVE reloc. Likewise if
4927 the symbol was forced to be local because of a version file.
4928 The entry in the global offset table will already have been
4929 initialized in the relocate_section function. */
4930 if (bfd_link_pic (info
)
4932 || h
->dynindx
== -1 || h
->forced_local
) && h
->def_regular
)
4934 _bfd_error_handler (_("*** check this relocation %s"),
4936 rela
.r_info
= ELF32_R_INFO (0, R_BFIN_PCREL24
);
4937 rela
.r_addend
= bfd_get_signed_32 (output_bfd
,
4941 offset
& ~(bfd_vma
) 1)));
4945 bfd_put_32 (output_bfd
, (bfd_vma
) 0,
4946 sgot
->contents
+ (h
->got
.offset
& ~(bfd_vma
) 1));
4947 rela
.r_info
= ELF32_R_INFO (h
->dynindx
, R_BFIN_GOT
);
4951 loc
= srela
->contents
;
4952 loc
+= srela
->reloc_count
++ * sizeof (Elf32_External_Rela
);
4953 bfd_elf32_swap_reloca_out (output_bfd
, &rela
, loc
);
4960 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
4961 if (strcmp (h
->root
.root
.string
, "__DYNAMIC") == 0
4962 || h
== elf_hash_table (info
)->hgot
)
4963 sym
->st_shndx
= SHN_ABS
;
4968 /* Adjust a symbol defined by a dynamic object and referenced by a
4969 regular object. The current definition is in some section of the
4970 dynamic object, but we're not including those sections. We have to
4971 change the definition to something the rest of the link can
4975 bfin_adjust_dynamic_symbol (struct bfd_link_info
*info
,
4976 struct elf_link_hash_entry
*h
)
4980 unsigned int power_of_two
;
4982 dynobj
= elf_hash_table (info
)->dynobj
;
4984 /* Make sure we know what is going on here. */
4985 BFD_ASSERT (dynobj
!= NULL
4987 || h
->u
.weakdef
!= NULL
4988 || (h
->def_dynamic
&& h
->ref_regular
&& !h
->def_regular
)));
4990 /* If this is a function, put it in the procedure linkage table. We
4991 will fill in the contents of the procedure linkage table later,
4992 when we know the address of the .got section. */
4993 if (h
->type
== STT_FUNC
|| h
->needs_plt
)
4998 /* If this is a weak symbol, and there is a real definition, the
4999 processor independent code will have arranged for us to see the
5000 real definition first, and we can just use the same value. */
5001 if (h
->u
.weakdef
!= NULL
)
5003 BFD_ASSERT (h
->u
.weakdef
->root
.type
== bfd_link_hash_defined
5004 || h
->u
.weakdef
->root
.type
== bfd_link_hash_defweak
);
5005 h
->root
.u
.def
.section
= h
->u
.weakdef
->root
.u
.def
.section
;
5006 h
->root
.u
.def
.value
= h
->u
.weakdef
->root
.u
.def
.value
;
5010 /* This is a reference to a symbol defined by a dynamic object which
5011 is not a function. */
5013 /* If we are creating a shared library, we must presume that the
5014 only references to the symbol are via the global offset table.
5015 For such cases we need not do anything here; the relocations will
5016 be handled correctly by relocate_section. */
5017 if (bfd_link_pic (info
))
5020 /* We must allocate the symbol in our .dynbss section, which will
5021 become part of the .bss section of the executable. There will be
5022 an entry for this symbol in the .dynsym section. The dynamic
5023 object will contain position independent code, so all references
5024 from the dynamic object to this symbol will go through the global
5025 offset table. The dynamic linker will use the .dynsym entry to
5026 determine the address it must put in the global offset table, so
5027 both the dynamic object and the regular object will refer to the
5028 same memory location for the variable. */
5030 s
= bfd_get_linker_section (dynobj
, ".dynbss");
5031 BFD_ASSERT (s
!= NULL
);
5033 #if 0 /* Bfin does not currently have a COPY reloc. */
5034 /* We must generate a R_BFIN_COPY reloc to tell the dynamic linker to
5035 copy the initial value out of the dynamic object and into the
5036 runtime process image. We need to remember the offset into the
5037 .rela.bss section we are going to use. */
5038 if ((h
->root
.u
.def
.section
->flags
& SEC_ALLOC
) != 0)
5042 srel
= bfd_get_linker_section (dynobj
, ".rela.bss");
5043 BFD_ASSERT (srel
!= NULL
);
5044 srel
->size
+= sizeof (Elf32_External_Rela
);
5048 if ((h
->root
.u
.def
.section
->flags
& SEC_ALLOC
) != 0)
5050 _bfd_error_handler (_("the bfin target does not currently support the generation of copy relocations"));
5054 /* We need to figure out the alignment required for this symbol. I
5055 have no idea how ELF linkers handle this. */
5056 power_of_two
= bfd_log2 (h
->size
);
5057 if (power_of_two
> 3)
5060 /* Apply the required alignment. */
5061 s
->size
= BFD_ALIGN (s
->size
, (bfd_size_type
) (1 << power_of_two
));
5062 if (power_of_two
> bfd_get_section_alignment (dynobj
, s
))
5064 if (!bfd_set_section_alignment (dynobj
, s
, power_of_two
))
5068 /* Define the symbol as being at this point in the section. */
5069 h
->root
.u
.def
.section
= s
;
5070 h
->root
.u
.def
.value
= s
->size
;
5072 /* Increment the section size to make room for the symbol. */
5078 /* The bfin linker needs to keep track of the number of relocs that it
5079 decides to copy in check_relocs for each symbol. This is so that it
5080 can discard PC relative relocs if it doesn't need them when linking
5081 with -Bsymbolic. We store the information in a field extending the
5082 regular ELF linker hash table. */
5084 /* This structure keeps track of the number of PC relative relocs we have
5085 copied for a given symbol. */
5087 struct bfin_pcrel_relocs_copied
5090 struct bfin_pcrel_relocs_copied
*next
;
5091 /* A section in dynobj. */
5093 /* Number of relocs copied in this section. */
5094 bfd_size_type count
;
5097 /* This function is called via elf_link_hash_traverse if we are
5098 creating a shared object. In the -Bsymbolic case it discards the
5099 space allocated to copy PC relative relocs against symbols which
5100 are defined in regular objects. For the normal shared case, it
5101 discards space for pc-relative relocs that have become local due to
5102 symbol visibility changes. We allocated space for them in the
5103 check_relocs routine, but we won't fill them in in the
5104 relocate_section routine.
5106 We also check whether any of the remaining relocations apply
5107 against a readonly section, and set the DF_TEXTREL flag in this
5111 bfin_discard_copies (struct elf_link_hash_entry
*h
, void * inf
)
5113 struct bfd_link_info
*info
= (struct bfd_link_info
*) inf
;
5114 struct bfin_pcrel_relocs_copied
*s
;
5116 if (!h
->def_regular
|| (!info
->symbolic
&& !h
->forced_local
))
5118 if ((info
->flags
& DF_TEXTREL
) == 0)
5120 /* Look for relocations against read-only sections. */
5121 for (s
= bfin_hash_entry (h
)->pcrel_relocs_copied
;
5122 s
!= NULL
; s
= s
->next
)
5123 if ((s
->section
->flags
& SEC_READONLY
) != 0)
5125 info
->flags
|= DF_TEXTREL
;
5133 for (s
= bfin_hash_entry (h
)->pcrel_relocs_copied
;
5134 s
!= NULL
; s
= s
->next
)
5135 s
->section
->size
-= s
->count
* sizeof (Elf32_External_Rela
);
5141 bfin_size_dynamic_sections (bfd
* output_bfd ATTRIBUTE_UNUSED
,
5142 struct bfd_link_info
*info
)
5148 dynobj
= elf_hash_table (info
)->dynobj
;
5149 BFD_ASSERT (dynobj
!= NULL
);
5151 if (elf_hash_table (info
)->dynamic_sections_created
)
5153 /* Set the contents of the .interp section to the interpreter. */
5154 if (bfd_link_executable (info
) && !info
->nointerp
)
5156 s
= bfd_get_linker_section (dynobj
, ".interp");
5157 BFD_ASSERT (s
!= NULL
);
5158 s
->size
= sizeof ELF_DYNAMIC_INTERPRETER
;
5159 s
->contents
= (unsigned char *) ELF_DYNAMIC_INTERPRETER
;
5164 /* We may have created entries in the .rela.got section.
5165 However, if we are not creating the dynamic sections, we will
5166 not actually use these entries. Reset the size of .rela.got,
5167 which will cause it to get stripped from the output file
5169 s
= elf_hash_table (info
)->srelgot
;
5174 /* If this is a -Bsymbolic shared link, then we need to discard all
5175 PC relative relocs against symbols defined in a regular object.
5176 For the normal shared case we discard the PC relative relocs
5177 against symbols that have become local due to visibility changes.
5178 We allocated space for them in the check_relocs routine, but we
5179 will not fill them in in the relocate_section routine. */
5180 if (bfd_link_pic (info
))
5181 elf_link_hash_traverse (elf_hash_table (info
),
5182 bfin_discard_copies
, info
);
5184 /* The check_relocs and adjust_dynamic_symbol entry points have
5185 determined the sizes of the various dynamic sections. Allocate
5188 for (s
= dynobj
->sections
; s
!= NULL
; s
= s
->next
)
5193 if ((s
->flags
& SEC_LINKER_CREATED
) == 0)
5196 /* It's OK to base decisions on the section name, because none
5197 of the dynobj section names depend upon the input files. */
5198 name
= bfd_get_section_name (dynobj
, s
);
5202 if (CONST_STRNEQ (name
, ".rela"))
5206 /* If we don't need this section, strip it from the
5207 output file. This is mostly to handle .rela.bss and
5208 .rela.plt. We must create both sections in
5209 create_dynamic_sections, because they must be created
5210 before the linker maps input sections to output
5211 sections. The linker does that before
5212 adjust_dynamic_symbol is called, and it is that
5213 function which decides whether anything needs to go
5214 into these sections. */
5221 /* We use the reloc_count field as a counter if we need
5222 to copy relocs into the output file. */
5226 else if (! CONST_STRNEQ (name
, ".got"))
5228 /* It's not one of our sections, so don't allocate space. */
5234 s
->flags
|= SEC_EXCLUDE
;
5238 /* Allocate memory for the section contents. */
5239 /* FIXME: This should be a call to bfd_alloc not bfd_zalloc.
5240 Unused entries should be reclaimed before the section's contents
5241 are written out, but at the moment this does not happen. Thus in
5242 order to prevent writing out garbage, we initialise the section's
5243 contents to zero. */
5244 s
->contents
= (bfd_byte
*) bfd_zalloc (dynobj
, s
->size
);
5245 if (s
->contents
== NULL
&& s
->size
!= 0)
5249 if (elf_hash_table (info
)->dynamic_sections_created
)
5251 /* Add some entries to the .dynamic section. We fill in the
5252 values later, in bfin_finish_dynamic_sections, but we
5253 must add the entries now so that we get the correct size for
5254 the .dynamic section. The DT_DEBUG entry is filled in by the
5255 dynamic linker and used by the debugger. */
5256 #define add_dynamic_entry(TAG, VAL) \
5257 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
5259 if (!bfd_link_pic (info
))
5261 if (!add_dynamic_entry (DT_DEBUG
, 0))
5268 if (!add_dynamic_entry (DT_RELA
, 0)
5269 || !add_dynamic_entry (DT_RELASZ
, 0)
5270 || !add_dynamic_entry (DT_RELAENT
,
5271 sizeof (Elf32_External_Rela
)))
5275 if ((info
->flags
& DF_TEXTREL
) != 0)
5277 if (!add_dynamic_entry (DT_TEXTREL
, 0))
5281 #undef add_dynamic_entry
5286 /* Given a .data section and a .emreloc in-memory section, store
5287 relocation information into the .emreloc section which can be
5288 used at runtime to relocate the section. This is called by the
5289 linker when the --embedded-relocs switch is used. This is called
5290 after the add_symbols entry point has been called for all the
5291 objects, and before the final_link entry point is called. */
5294 bfd_bfin_elf32_create_embedded_relocs (bfd
*abfd
,
5295 struct bfd_link_info
*info
,
5300 Elf_Internal_Shdr
*symtab_hdr
;
5301 Elf_Internal_Sym
*isymbuf
= NULL
;
5302 Elf_Internal_Rela
*internal_relocs
= NULL
;
5303 Elf_Internal_Rela
*irel
, *irelend
;
5307 BFD_ASSERT (! bfd_link_relocatable (info
));
5311 if (datasec
->reloc_count
== 0)
5314 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
5316 /* Get a copy of the native relocations. */
5317 internal_relocs
= (_bfd_elf_link_read_relocs
5318 (abfd
, datasec
, NULL
, (Elf_Internal_Rela
*) NULL
,
5319 info
->keep_memory
));
5320 if (internal_relocs
== NULL
)
5323 amt
= (bfd_size_type
) datasec
->reloc_count
* 12;
5324 relsec
->contents
= (bfd_byte
*) bfd_alloc (abfd
, amt
);
5325 if (relsec
->contents
== NULL
)
5328 p
= relsec
->contents
;
5330 irelend
= internal_relocs
+ datasec
->reloc_count
;
5331 for (irel
= internal_relocs
; irel
< irelend
; irel
++, p
+= 12)
5333 asection
*targetsec
;
5335 /* We are going to write a four byte longword into the runtime
5336 reloc section. The longword will be the address in the data
5337 section which must be relocated. It is followed by the name
5338 of the target section NUL-padded or truncated to 8
5341 /* We can only relocate absolute longword relocs at run time. */
5342 if (ELF32_R_TYPE (irel
->r_info
) != (int) R_BFIN_BYTE4_DATA
)
5344 *errmsg
= _("unsupported reloc type");
5345 bfd_set_error (bfd_error_bad_value
);
5349 /* Get the target section referred to by the reloc. */
5350 if (ELF32_R_SYM (irel
->r_info
) < symtab_hdr
->sh_info
)
5352 /* A local symbol. */
5353 Elf_Internal_Sym
*isym
;
5355 /* Read this BFD's local symbols if we haven't done so already. */
5356 if (isymbuf
== NULL
)
5358 isymbuf
= (Elf_Internal_Sym
*) symtab_hdr
->contents
;
5359 if (isymbuf
== NULL
)
5360 isymbuf
= bfd_elf_get_elf_syms (abfd
, symtab_hdr
,
5361 symtab_hdr
->sh_info
, 0,
5363 if (isymbuf
== NULL
)
5367 isym
= isymbuf
+ ELF32_R_SYM (irel
->r_info
);
5368 targetsec
= bfd_section_from_elf_index (abfd
, isym
->st_shndx
);
5373 struct elf_link_hash_entry
*h
;
5375 /* An external symbol. */
5376 indx
= ELF32_R_SYM (irel
->r_info
) - symtab_hdr
->sh_info
;
5377 h
= elf_sym_hashes (abfd
)[indx
];
5378 BFD_ASSERT (h
!= NULL
);
5379 if (h
->root
.type
== bfd_link_hash_defined
5380 || h
->root
.type
== bfd_link_hash_defweak
)
5381 targetsec
= h
->root
.u
.def
.section
;
5386 bfd_put_32 (abfd
, irel
->r_offset
+ datasec
->output_offset
, p
);
5387 memset (p
+ 4, 0, 8);
5388 if (targetsec
!= NULL
)
5389 strncpy ((char *) p
+ 4, targetsec
->output_section
->name
, 8);
5392 if (isymbuf
!= NULL
&& symtab_hdr
->contents
!= (unsigned char *) isymbuf
)
5394 if (internal_relocs
!= NULL
5395 && elf_section_data (datasec
)->relocs
!= internal_relocs
)
5396 free (internal_relocs
);
5400 if (isymbuf
!= NULL
&& symtab_hdr
->contents
!= (unsigned char *) isymbuf
)
5402 if (internal_relocs
!= NULL
5403 && elf_section_data (datasec
)->relocs
!= internal_relocs
)
5404 free (internal_relocs
);
5408 struct bfd_elf_special_section
const elf32_bfin_special_sections
[] =
5410 { ".l1.text", 8, -2, SHT_PROGBITS
, SHF_ALLOC
+ SHF_EXECINSTR
},
5411 { ".l1.data", 8, -2, SHT_PROGBITS
, SHF_ALLOC
+ SHF_WRITE
},
5412 { NULL
, 0, 0, 0, 0 }
5416 #define TARGET_LITTLE_SYM bfin_elf32_vec
5417 #define TARGET_LITTLE_NAME "elf32-bfin"
5418 #define ELF_ARCH bfd_arch_bfin
5419 #define ELF_TARGET_ID BFIN_ELF_DATA
5420 #define ELF_MACHINE_CODE EM_BLACKFIN
5421 #define ELF_MAXPAGESIZE 0x1000
5422 #define elf_symbol_leading_char '_'
5424 #define bfd_elf32_bfd_reloc_type_lookup bfin_bfd_reloc_type_lookup
5425 #define bfd_elf32_bfd_reloc_name_lookup \
5426 bfin_bfd_reloc_name_lookup
5427 #define elf_info_to_howto bfin_info_to_howto
5428 #define elf_info_to_howto_rel 0
5429 #define elf_backend_object_p elf32_bfin_object_p
5431 #define bfd_elf32_bfd_is_local_label_name \
5432 bfin_is_local_label_name
5433 #define bfin_hash_table(p) \
5434 ((struct bfin_link_hash_table *) (p)->hash)
5438 #define elf_backend_create_dynamic_sections \
5439 _bfd_elf_create_dynamic_sections
5440 #define bfd_elf32_bfd_link_hash_table_create \
5441 bfin_link_hash_table_create
5442 #define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
5444 #define elf_backend_check_relocs bfin_check_relocs
5445 #define elf_backend_adjust_dynamic_symbol \
5446 bfin_adjust_dynamic_symbol
5447 #define elf_backend_size_dynamic_sections \
5448 bfin_size_dynamic_sections
5449 #define elf_backend_relocate_section bfin_relocate_section
5450 #define elf_backend_finish_dynamic_symbol \
5451 bfin_finish_dynamic_symbol
5452 #define elf_backend_finish_dynamic_sections \
5453 bfin_finish_dynamic_sections
5454 #define elf_backend_gc_mark_hook bfin_gc_mark_hook
5455 #define bfd_elf32_bfd_merge_private_bfd_data \
5456 elf32_bfin_merge_private_bfd_data
5457 #define bfd_elf32_bfd_set_private_flags \
5458 elf32_bfin_set_private_flags
5459 #define bfd_elf32_bfd_print_private_bfd_data \
5460 elf32_bfin_print_private_bfd_data
5461 #define elf_backend_final_write_processing \
5462 elf32_bfin_final_write_processing
5463 #define elf_backend_reloc_type_class elf32_bfin_reloc_type_class
5464 #define elf_backend_stack_align 8
5465 #define elf_backend_can_gc_sections 1
5466 #define elf_backend_special_sections elf32_bfin_special_sections
5467 #define elf_backend_can_refcount 1
5468 #define elf_backend_want_got_plt 0
5469 #define elf_backend_plt_readonly 1
5470 #define elf_backend_want_plt_sym 0
5471 #define elf_backend_got_header_size 12
5472 #define elf_backend_rela_normal 1
5474 #include "elf32-target.h"
5476 #undef TARGET_LITTLE_SYM
5477 #define TARGET_LITTLE_SYM bfin_elf32_fdpic_vec
5478 #undef TARGET_LITTLE_NAME
5479 #define TARGET_LITTLE_NAME "elf32-bfinfdpic"
5481 #define elf32_bed elf32_bfinfdpic_bed
5483 #undef elf_backend_got_header_size
5484 #define elf_backend_got_header_size 0
5486 #undef elf_backend_relocate_section
5487 #define elf_backend_relocate_section bfinfdpic_relocate_section
5488 #undef elf_backend_check_relocs
5489 #define elf_backend_check_relocs bfinfdpic_check_relocs
5491 #undef bfd_elf32_bfd_link_hash_table_create
5492 #define bfd_elf32_bfd_link_hash_table_create \
5493 bfinfdpic_elf_link_hash_table_create
5494 #undef elf_backend_always_size_sections
5495 #define elf_backend_always_size_sections \
5496 elf32_bfinfdpic_always_size_sections
5498 #undef elf_backend_create_dynamic_sections
5499 #define elf_backend_create_dynamic_sections \
5500 elf32_bfinfdpic_create_dynamic_sections
5501 #undef elf_backend_adjust_dynamic_symbol
5502 #define elf_backend_adjust_dynamic_symbol \
5503 elf32_bfinfdpic_adjust_dynamic_symbol
5504 #undef elf_backend_size_dynamic_sections
5505 #define elf_backend_size_dynamic_sections \
5506 elf32_bfinfdpic_size_dynamic_sections
5507 #undef elf_backend_finish_dynamic_symbol
5508 #define elf_backend_finish_dynamic_symbol \
5509 elf32_bfinfdpic_finish_dynamic_symbol
5510 #undef elf_backend_finish_dynamic_sections
5511 #define elf_backend_finish_dynamic_sections \
5512 elf32_bfinfdpic_finish_dynamic_sections
5514 #undef elf_backend_discard_info
5515 #define elf_backend_discard_info \
5516 bfinfdpic_elf_discard_info
5517 #undef elf_backend_can_make_relative_eh_frame
5518 #define elf_backend_can_make_relative_eh_frame \
5519 bfinfdpic_elf_use_relative_eh_frame
5520 #undef elf_backend_can_make_lsda_relative_eh_frame
5521 #define elf_backend_can_make_lsda_relative_eh_frame \
5522 bfinfdpic_elf_use_relative_eh_frame
5523 #undef elf_backend_encode_eh_address
5524 #define elf_backend_encode_eh_address \
5525 bfinfdpic_elf_encode_eh_address
5527 #undef elf_backend_may_use_rel_p
5528 #define elf_backend_may_use_rel_p 1
5529 #undef elf_backend_may_use_rela_p
5530 #define elf_backend_may_use_rela_p 1
5531 /* We use REL for dynamic relocations only. */
5532 #undef elf_backend_default_use_rela_p
5533 #define elf_backend_default_use_rela_p 1
5535 #undef elf_backend_omit_section_dynsym
5536 #define elf_backend_omit_section_dynsym _bfinfdpic_link_omit_section_dynsym
5538 #include "elf32-target.h"