bfd/
[binutils.git] / bfd / elf32-frv.c
blob3a3124347b5d4cdaeaac7f58e179866652529d78
1 /* FRV-specific support for 32-bit ELF.
2 Copyright 2002, 2003, 2004, 2005, 2006 Free Software Foundation, Inc.
4 This file is part of BFD, the Binary File Descriptor library.
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 2 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
20 #include "bfd.h"
21 #include "sysdep.h"
22 #include "libbfd.h"
23 #include "elf-bfd.h"
24 #include "elf/frv.h"
25 #include "elf/dwarf2.h"
26 #include "hashtab.h"
28 /* Forward declarations. */
29 static bfd_reloc_status_type elf32_frv_relocate_lo16
30 PARAMS ((bfd *, Elf_Internal_Rela *, bfd_byte *, bfd_vma));
31 static bfd_reloc_status_type elf32_frv_relocate_hi16
32 PARAMS ((bfd *, Elf_Internal_Rela *, bfd_byte *, bfd_vma));
33 static bfd_reloc_status_type elf32_frv_relocate_label24
34 PARAMS ((bfd *, asection *, Elf_Internal_Rela *, bfd_byte *, bfd_vma));
35 static bfd_reloc_status_type elf32_frv_relocate_gprel12
36 PARAMS ((struct bfd_link_info *, bfd *, asection *, Elf_Internal_Rela *,
37 bfd_byte *, bfd_vma));
38 static bfd_reloc_status_type elf32_frv_relocate_gprelu12
39 PARAMS ((struct bfd_link_info *, bfd *, asection *, Elf_Internal_Rela *,
40 bfd_byte *, bfd_vma));
41 static bfd_reloc_status_type elf32_frv_relocate_gprello
42 PARAMS ((struct bfd_link_info *, bfd *, asection *, Elf_Internal_Rela *,
43 bfd_byte *, bfd_vma));
44 static bfd_reloc_status_type elf32_frv_relocate_gprelhi
45 PARAMS ((struct bfd_link_info *, bfd *, asection *, Elf_Internal_Rela *,
46 bfd_byte *, bfd_vma));
47 static reloc_howto_type *frv_reloc_type_lookup
48 PARAMS ((bfd *, bfd_reloc_code_real_type));
49 static void frv_info_to_howto_rela
50 PARAMS ((bfd *, arelent *, Elf_Internal_Rela *));
51 static bfd_boolean elf32_frv_relocate_section
52 PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *, bfd_byte *,
53 Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
54 static bfd_boolean elf32_frv_add_symbol_hook
55 PARAMS (( bfd *, struct bfd_link_info *, Elf_Internal_Sym *,
56 const char **, flagword *, asection **, bfd_vma *));
57 static bfd_reloc_status_type frv_final_link_relocate
58 PARAMS ((reloc_howto_type *, bfd *, asection *, bfd_byte *,
59 Elf_Internal_Rela *, bfd_vma));
60 static bfd_boolean elf32_frv_check_relocs
61 PARAMS ((bfd *, struct bfd_link_info *, asection *,
62 const Elf_Internal_Rela *));
63 static int elf32_frv_machine
64 PARAMS ((bfd *));
65 static bfd_boolean elf32_frv_object_p
66 PARAMS ((bfd *));
67 static bfd_boolean frv_elf_set_private_flags
68 PARAMS ((bfd *, flagword));
69 static bfd_boolean frv_elf_copy_private_bfd_data
70 PARAMS ((bfd *, bfd *));
71 static bfd_boolean frv_elf_merge_private_bfd_data
72 PARAMS ((bfd *, bfd *));
73 static bfd_boolean frv_elf_print_private_bfd_data
74 PARAMS ((bfd *, PTR));
75 static bfd_boolean elf32_frv_grok_prstatus (bfd * abfd,
76 Elf_Internal_Note * note);
77 static bfd_boolean elf32_frv_grok_psinfo (bfd * abfd,
78 Elf_Internal_Note * note);
80 static reloc_howto_type elf32_frv_howto_table [] =
82 /* This reloc does nothing. */
83 HOWTO (R_FRV_NONE, /* type */
84 0, /* rightshift */
85 2, /* size (0 = byte, 1 = short, 2 = long) */
86 32, /* bitsize */
87 FALSE, /* pc_relative */
88 0, /* bitpos */
89 complain_overflow_bitfield, /* complain_on_overflow */
90 bfd_elf_generic_reloc, /* special_function */
91 "R_FRV_NONE", /* name */
92 FALSE, /* partial_inplace */
93 0, /* src_mask */
94 0, /* dst_mask */
95 FALSE), /* pcrel_offset */
97 /* A 32 bit absolute relocation. */
98 HOWTO (R_FRV_32, /* type */
99 0, /* rightshift */
100 2, /* size (0 = byte, 1 = short, 2 = long) */
101 32, /* bitsize */
102 FALSE, /* pc_relative */
103 0, /* bitpos */
104 complain_overflow_bitfield, /* complain_on_overflow */
105 bfd_elf_generic_reloc, /* special_function */
106 "R_FRV_32", /* name */
107 FALSE, /* partial_inplace */
108 0xffffffff, /* src_mask */
109 0xffffffff, /* dst_mask */
110 FALSE), /* pcrel_offset */
112 /* A 16 bit pc-relative relocation. */
113 HOWTO (R_FRV_LABEL16, /* type */
114 2, /* rightshift */
115 2, /* size (0 = byte, 1 = short, 2 = long) */
116 16, /* bitsize */
117 TRUE, /* pc_relative */
118 0, /* bitpos */
119 complain_overflow_signed, /* complain_on_overflow */
120 bfd_elf_generic_reloc, /* special_function */
121 "R_FRV_LABEL16", /* name */
122 FALSE, /* partial_inplace */
123 0xffff, /* src_mask */
124 0xffff, /* dst_mask */
125 TRUE), /* pcrel_offset */
127 /* A 24-bit pc-relative relocation. */
128 HOWTO (R_FRV_LABEL24, /* type */
129 2, /* rightshift */
130 2, /* size (0 = byte, 1 = short, 2 = long) */
131 26, /* bitsize */
132 TRUE, /* pc_relative */
133 0, /* bitpos */
134 complain_overflow_bitfield, /* complain_on_overflow */
135 bfd_elf_generic_reloc, /* special_function */
136 "R_FRV_LABEL24", /* name */
137 FALSE, /* partial_inplace */
138 0x7e03ffff, /* src_mask */
139 0x7e03ffff, /* dst_mask */
140 TRUE), /* pcrel_offset */
142 HOWTO (R_FRV_LO16, /* type */
143 0, /* rightshift */
144 2, /* size (0 = byte, 1 = short, 2 = long) */
145 16, /* bitsize */
146 FALSE, /* pc_relative */
147 0, /* bitpos */
148 complain_overflow_dont, /* complain_on_overflow */
149 bfd_elf_generic_reloc, /* special_function */
150 "R_FRV_LO16", /* name */
151 FALSE, /* partial_inplace */
152 0xffff, /* src_mask */
153 0xffff, /* dst_mask */
154 FALSE), /* pcrel_offset */
156 HOWTO (R_FRV_HI16, /* type */
157 0, /* rightshift */
158 2, /* size (0 = byte, 1 = short, 2 = long) */
159 16, /* bitsize */
160 FALSE, /* pc_relative */
161 0, /* bitpos */
162 complain_overflow_dont, /* complain_on_overflow */
163 bfd_elf_generic_reloc, /* special_function */
164 "R_FRV_HI16", /* name */
165 FALSE, /* partial_inplace */
166 0xffff, /* src_mask */
167 0xffff, /* dst_mask */
168 FALSE), /* pcrel_offset */
170 HOWTO (R_FRV_GPREL12, /* type */
171 0, /* rightshift */
172 2, /* size (0 = byte, 1 = short, 2 = long) */
173 12, /* bitsize */
174 FALSE, /* pc_relative */
175 0, /* bitpos */
176 complain_overflow_dont, /* complain_on_overflow */
177 bfd_elf_generic_reloc, /* special_function */
178 "R_FRV_GPREL12", /* name */
179 FALSE, /* partial_inplace */
180 0xfff, /* src_mask */
181 0xfff, /* dst_mask */
182 FALSE), /* pcrel_offset */
184 HOWTO (R_FRV_GPRELU12, /* type */
185 0, /* rightshift */
186 2, /* size (0 = byte, 1 = short, 2 = long) */
187 12, /* bitsize */
188 FALSE, /* pc_relative */
189 0, /* bitpos */
190 complain_overflow_dont, /* complain_on_overflow */
191 bfd_elf_generic_reloc, /* special_function */
192 "R_FRV_GPRELU12", /* name */
193 FALSE, /* partial_inplace */
194 0xfff, /* src_mask */
195 0x3f03f, /* dst_mask */
196 FALSE), /* pcrel_offset */
198 HOWTO (R_FRV_GPREL32, /* type */
199 0, /* rightshift */
200 2, /* size (0 = byte, 1 = short, 2 = long) */
201 32, /* bitsize */
202 FALSE, /* pc_relative */
203 0, /* bitpos */
204 complain_overflow_dont, /* complain_on_overflow */
205 bfd_elf_generic_reloc, /* special_function */
206 "R_FRV_GPREL32", /* name */
207 FALSE, /* partial_inplace */
208 0xffffffff, /* src_mask */
209 0xffffffff, /* dst_mask */
210 FALSE), /* pcrel_offset */
212 HOWTO (R_FRV_GPRELHI, /* type */
213 0, /* rightshift */
214 2, /* size (0 = byte, 1 = short, 2 = long) */
215 16, /* bitsize */
216 FALSE, /* pc_relative */
217 0, /* bitpos */
218 complain_overflow_dont, /* complain_on_overflow */
219 bfd_elf_generic_reloc, /* special_function */
220 "R_FRV_GPRELHI", /* name */
221 FALSE, /* partial_inplace */
222 0xffff, /* src_mask */
223 0xffff, /* dst_mask */
224 FALSE), /* pcrel_offset */
226 HOWTO (R_FRV_GPRELLO, /* type */
227 0, /* rightshift */
228 2, /* size (0 = byte, 1 = short, 2 = long) */
229 16, /* bitsize */
230 FALSE, /* pc_relative */
231 0, /* bitpos */
232 complain_overflow_dont, /* complain_on_overflow */
233 bfd_elf_generic_reloc, /* special_function */
234 "R_FRV_GPRELLO", /* name */
235 FALSE, /* partial_inplace */
236 0xffff, /* src_mask */
237 0xffff, /* dst_mask */
238 FALSE), /* pcrel_offset */
240 /* A 12-bit signed operand with the GOT offset for the address of
241 the symbol. */
242 HOWTO (R_FRV_GOT12, /* type */
243 0, /* rightshift */
244 2, /* size (0 = byte, 1 = short, 2 = long) */
245 12, /* bitsize */
246 FALSE, /* pc_relative */
247 0, /* bitpos */
248 complain_overflow_signed, /* complain_on_overflow */
249 bfd_elf_generic_reloc, /* special_function */
250 "R_FRV_GOT12", /* name */
251 FALSE, /* partial_inplace */
252 0xfff, /* src_mask */
253 0xfff, /* dst_mask */
254 FALSE), /* pcrel_offset */
256 /* The upper 16 bits of the GOT offset for the address of the
257 symbol. */
258 HOWTO (R_FRV_GOTHI, /* type */
259 0, /* rightshift */
260 2, /* size (0 = byte, 1 = short, 2 = long) */
261 16, /* bitsize */
262 FALSE, /* pc_relative */
263 0, /* bitpos */
264 complain_overflow_dont, /* complain_on_overflow */
265 bfd_elf_generic_reloc, /* special_function */
266 "R_FRV_GOTHI", /* name */
267 FALSE, /* partial_inplace */
268 0xffff, /* src_mask */
269 0xffff, /* dst_mask */
270 FALSE), /* pcrel_offset */
272 /* The lower 16 bits of the GOT offset for the address of the
273 symbol. */
274 HOWTO (R_FRV_GOTLO, /* type */
275 0, /* rightshift */
276 2, /* size (0 = byte, 1 = short, 2 = long) */
277 16, /* bitsize */
278 FALSE, /* pc_relative */
279 0, /* bitpos */
280 complain_overflow_dont, /* complain_on_overflow */
281 bfd_elf_generic_reloc, /* special_function */
282 "R_FRV_GOTLO", /* name */
283 FALSE, /* partial_inplace */
284 0xffff, /* src_mask */
285 0xffff, /* dst_mask */
286 FALSE), /* pcrel_offset */
288 /* The 32-bit address of the canonical descriptor of a function. */
289 HOWTO (R_FRV_FUNCDESC, /* type */
290 0, /* rightshift */
291 2, /* size (0 = byte, 1 = short, 2 = long) */
292 32, /* bitsize */
293 FALSE, /* pc_relative */
294 0, /* bitpos */
295 complain_overflow_bitfield, /* complain_on_overflow */
296 bfd_elf_generic_reloc, /* special_function */
297 "R_FRV_FUNCDESC", /* name */
298 FALSE, /* partial_inplace */
299 0xffffffff, /* src_mask */
300 0xffffffff, /* dst_mask */
301 FALSE), /* pcrel_offset */
303 /* A 12-bit signed operand with the GOT offset for the address of
304 canonical descriptor of a function. */
305 HOWTO (R_FRV_FUNCDESC_GOT12, /* type */
306 0, /* rightshift */
307 2, /* size (0 = byte, 1 = short, 2 = long) */
308 12, /* bitsize */
309 FALSE, /* pc_relative */
310 0, /* bitpos */
311 complain_overflow_signed, /* complain_on_overflow */
312 bfd_elf_generic_reloc, /* special_function */
313 "R_FRV_FUNCDESC_GOT12", /* name */
314 FALSE, /* partial_inplace */
315 0xfff, /* src_mask */
316 0xfff, /* dst_mask */
317 FALSE), /* pcrel_offset */
319 /* The upper 16 bits of the GOT offset for the address of the
320 canonical descriptor of a function. */
321 HOWTO (R_FRV_FUNCDESC_GOTHI, /* type */
322 0, /* rightshift */
323 2, /* size (0 = byte, 1 = short, 2 = long) */
324 16, /* bitsize */
325 FALSE, /* pc_relative */
326 0, /* bitpos */
327 complain_overflow_dont, /* complain_on_overflow */
328 bfd_elf_generic_reloc, /* special_function */
329 "R_FRV_FUNCDESC_GOTHI", /* name */
330 FALSE, /* partial_inplace */
331 0xffff, /* src_mask */
332 0xffff, /* dst_mask */
333 FALSE), /* pcrel_offset */
335 /* The lower 16 bits of the GOT offset for the address of the
336 canonical descriptor of a function. */
337 HOWTO (R_FRV_FUNCDESC_GOTLO, /* type */
338 0, /* rightshift */
339 2, /* size (0 = byte, 1 = short, 2 = long) */
340 16, /* bitsize */
341 FALSE, /* pc_relative */
342 0, /* bitpos */
343 complain_overflow_dont, /* complain_on_overflow */
344 bfd_elf_generic_reloc, /* special_function */
345 "R_FRV_FUNCDESC_GOTLO", /* name */
346 FALSE, /* partial_inplace */
347 0xffff, /* src_mask */
348 0xffff, /* dst_mask */
349 FALSE), /* pcrel_offset */
351 /* The 64-bit descriptor of a function. */
352 HOWTO (R_FRV_FUNCDESC_VALUE, /* type */
353 0, /* rightshift */
354 2, /* size (0 = byte, 1 = short, 2 = long) */
355 64, /* bitsize */
356 FALSE, /* pc_relative */
357 0, /* bitpos */
358 complain_overflow_bitfield, /* complain_on_overflow */
359 bfd_elf_generic_reloc, /* special_function */
360 "R_FRV_FUNCDESC_VALUE", /* name */
361 FALSE, /* partial_inplace */
362 0xffffffff, /* src_mask */
363 0xffffffff, /* dst_mask */
364 FALSE), /* pcrel_offset */
366 /* A 12-bit signed operand with the GOT offset for the address of
367 canonical descriptor of a function. */
368 HOWTO (R_FRV_FUNCDESC_GOTOFF12, /* type */
369 0, /* rightshift */
370 2, /* size (0 = byte, 1 = short, 2 = long) */
371 12, /* bitsize */
372 FALSE, /* pc_relative */
373 0, /* bitpos */
374 complain_overflow_signed, /* complain_on_overflow */
375 bfd_elf_generic_reloc, /* special_function */
376 "R_FRV_FUNCDESC_GOTOFF12", /* name */
377 FALSE, /* partial_inplace */
378 0xfff, /* src_mask */
379 0xfff, /* dst_mask */
380 FALSE), /* pcrel_offset */
382 /* The upper 16 bits of the GOT offset for the address of the
383 canonical descriptor of a function. */
384 HOWTO (R_FRV_FUNCDESC_GOTOFFHI, /* type */
385 0, /* rightshift */
386 2, /* size (0 = byte, 1 = short, 2 = long) */
387 16, /* bitsize */
388 FALSE, /* pc_relative */
389 0, /* bitpos */
390 complain_overflow_dont, /* complain_on_overflow */
391 bfd_elf_generic_reloc, /* special_function */
392 "R_FRV_FUNCDESC_GOTOFFHI", /* name */
393 FALSE, /* partial_inplace */
394 0xffff, /* src_mask */
395 0xffff, /* dst_mask */
396 FALSE), /* pcrel_offset */
398 /* The lower 16 bits of the GOT offset for the address of the
399 canonical descriptor of a function. */
400 HOWTO (R_FRV_FUNCDESC_GOTOFFLO, /* type */
401 0, /* rightshift */
402 2, /* size (0 = byte, 1 = short, 2 = long) */
403 16, /* bitsize */
404 FALSE, /* pc_relative */
405 0, /* bitpos */
406 complain_overflow_dont, /* complain_on_overflow */
407 bfd_elf_generic_reloc, /* special_function */
408 "R_FRV_FUNCDESC_GOTOFFLO", /* name */
409 FALSE, /* partial_inplace */
410 0xffff, /* src_mask */
411 0xffff, /* dst_mask */
412 FALSE), /* pcrel_offset */
414 /* A 12-bit signed operand with the GOT offset for the address of
415 the symbol. */
416 HOWTO (R_FRV_GOTOFF12, /* type */
417 0, /* rightshift */
418 2, /* size (0 = byte, 1 = short, 2 = long) */
419 12, /* bitsize */
420 FALSE, /* pc_relative */
421 0, /* bitpos */
422 complain_overflow_signed, /* complain_on_overflow */
423 bfd_elf_generic_reloc, /* special_function */
424 "R_FRV_GOTOFF12", /* name */
425 FALSE, /* partial_inplace */
426 0xfff, /* src_mask */
427 0xfff, /* dst_mask */
428 FALSE), /* pcrel_offset */
430 /* The upper 16 bits of the GOT offset for the address of the
431 symbol. */
432 HOWTO (R_FRV_GOTOFFHI, /* type */
433 0, /* rightshift */
434 2, /* size (0 = byte, 1 = short, 2 = long) */
435 16, /* bitsize */
436 FALSE, /* pc_relative */
437 0, /* bitpos */
438 complain_overflow_dont, /* complain_on_overflow */
439 bfd_elf_generic_reloc, /* special_function */
440 "R_FRV_GOTOFFHI", /* name */
441 FALSE, /* partial_inplace */
442 0xffff, /* src_mask */
443 0xffff, /* dst_mask */
444 FALSE), /* pcrel_offset */
446 /* The lower 16 bits of the GOT offset for the address of the
447 symbol. */
448 HOWTO (R_FRV_GOTOFFLO, /* type */
449 0, /* rightshift */
450 2, /* size (0 = byte, 1 = short, 2 = long) */
451 16, /* bitsize */
452 FALSE, /* pc_relative */
453 0, /* bitpos */
454 complain_overflow_dont, /* complain_on_overflow */
455 bfd_elf_generic_reloc, /* special_function */
456 "R_FRV_GOTOFFLO", /* name */
457 FALSE, /* partial_inplace */
458 0xffff, /* src_mask */
459 0xffff, /* dst_mask */
460 FALSE), /* pcrel_offset */
462 /* A 24-bit pc-relative relocation referencing the TLS PLT entry for
463 a thread-local symbol. If the symbol number is 0, it refers to
464 the module. */
465 HOWTO (R_FRV_GETTLSOFF, /* type */
466 2, /* rightshift */
467 2, /* size (0 = byte, 1 = short, 2 = long) */
468 26, /* bitsize */
469 TRUE, /* pc_relative */
470 0, /* bitpos */
471 complain_overflow_bitfield, /* complain_on_overflow */
472 bfd_elf_generic_reloc, /* special_function */
473 "R_FRV_GETTLSOFF", /* name */
474 FALSE, /* partial_inplace */
475 0x7e03ffff, /* src_mask */
476 0x7e03ffff, /* dst_mask */
477 TRUE), /* pcrel_offset */
479 /* A 64-bit TLS descriptor for a symbol. This relocation is only
480 valid as a REL, dynamic relocation. */
481 HOWTO (R_FRV_TLSDESC_VALUE, /* type */
482 0, /* rightshift */
483 2, /* size (0 = byte, 1 = short, 2 = long) */
484 64, /* bitsize */
485 FALSE, /* pc_relative */
486 0, /* bitpos */
487 complain_overflow_bitfield, /* complain_on_overflow */
488 bfd_elf_generic_reloc, /* special_function */
489 "R_FRV_TLSDESC_VALUE", /* name */
490 FALSE, /* partial_inplace */
491 0xffffffff, /* src_mask */
492 0xffffffff, /* dst_mask */
493 FALSE), /* pcrel_offset */
495 /* A 12-bit signed operand with the GOT offset for the TLS
496 descriptor of the symbol. */
497 HOWTO (R_FRV_GOTTLSDESC12, /* type */
498 0, /* rightshift */
499 2, /* size (0 = byte, 1 = short, 2 = long) */
500 12, /* bitsize */
501 FALSE, /* pc_relative */
502 0, /* bitpos */
503 complain_overflow_signed, /* complain_on_overflow */
504 bfd_elf_generic_reloc, /* special_function */
505 "R_FRV_GOTTLSDESC12", /* name */
506 FALSE, /* partial_inplace */
507 0xfff, /* src_mask */
508 0xfff, /* dst_mask */
509 FALSE), /* pcrel_offset */
511 /* The upper 16 bits of the GOT offset for the TLS descriptor of the
512 symbol. */
513 HOWTO (R_FRV_GOTTLSDESCHI, /* type */
514 0, /* rightshift */
515 2, /* size (0 = byte, 1 = short, 2 = long) */
516 16, /* bitsize */
517 FALSE, /* pc_relative */
518 0, /* bitpos */
519 complain_overflow_dont, /* complain_on_overflow */
520 bfd_elf_generic_reloc, /* special_function */
521 "R_FRV_GOTTLSDESCHI", /* name */
522 FALSE, /* partial_inplace */
523 0xffff, /* src_mask */
524 0xffff, /* dst_mask */
525 FALSE), /* pcrel_offset */
527 /* The lower 16 bits of the GOT offset for the TLS descriptor of the
528 symbol. */
529 HOWTO (R_FRV_GOTTLSDESCLO, /* type */
530 0, /* rightshift */
531 2, /* size (0 = byte, 1 = short, 2 = long) */
532 16, /* bitsize */
533 FALSE, /* pc_relative */
534 0, /* bitpos */
535 complain_overflow_dont, /* complain_on_overflow */
536 bfd_elf_generic_reloc, /* special_function */
537 "R_FRV_GOTTLSDESCLO", /* name */
538 FALSE, /* partial_inplace */
539 0xffff, /* src_mask */
540 0xffff, /* dst_mask */
541 FALSE), /* pcrel_offset */
543 /* A 12-bit signed operand with the offset from the module base
544 address to the thread-local symbol address. */
545 HOWTO (R_FRV_TLSMOFF12, /* type */
546 0, /* rightshift */
547 2, /* size (0 = byte, 1 = short, 2 = long) */
548 12, /* bitsize */
549 FALSE, /* pc_relative */
550 0, /* bitpos */
551 complain_overflow_signed, /* complain_on_overflow */
552 bfd_elf_generic_reloc, /* special_function */
553 "R_FRV_TLSMOFF12", /* name */
554 FALSE, /* partial_inplace */
555 0xfff, /* src_mask */
556 0xfff, /* dst_mask */
557 FALSE), /* pcrel_offset */
559 /* The upper 16 bits of the offset from the module base address to
560 the thread-local symbol address. */
561 HOWTO (R_FRV_TLSMOFFHI, /* type */
562 0, /* rightshift */
563 2, /* size (0 = byte, 1 = short, 2 = long) */
564 16, /* bitsize */
565 FALSE, /* pc_relative */
566 0, /* bitpos */
567 complain_overflow_dont, /* complain_on_overflow */
568 bfd_elf_generic_reloc, /* special_function */
569 "R_FRV_TLSMOFFHI", /* name */
570 FALSE, /* partial_inplace */
571 0xffff, /* src_mask */
572 0xffff, /* dst_mask */
573 FALSE), /* pcrel_offset */
575 /* The lower 16 bits of the offset from the module base address to
576 the thread-local symbol address. */
577 HOWTO (R_FRV_TLSMOFFLO, /* type */
578 0, /* rightshift */
579 2, /* size (0 = byte, 1 = short, 2 = long) */
580 16, /* bitsize */
581 FALSE, /* pc_relative */
582 0, /* bitpos */
583 complain_overflow_dont, /* complain_on_overflow */
584 bfd_elf_generic_reloc, /* special_function */
585 "R_FRV_TLSMOFFLO", /* name */
586 FALSE, /* partial_inplace */
587 0xffff, /* src_mask */
588 0xffff, /* dst_mask */
589 FALSE), /* pcrel_offset */
591 /* A 12-bit signed operand with the GOT offset for the TLSOFF entry
592 for a symbol. */
593 HOWTO (R_FRV_GOTTLSOFF12, /* type */
594 0, /* rightshift */
595 2, /* size (0 = byte, 1 = short, 2 = long) */
596 12, /* bitsize */
597 FALSE, /* pc_relative */
598 0, /* bitpos */
599 complain_overflow_signed, /* complain_on_overflow */
600 bfd_elf_generic_reloc, /* special_function */
601 "R_FRV_GOTTLSOFF12", /* name */
602 FALSE, /* partial_inplace */
603 0xfff, /* src_mask */
604 0xfff, /* dst_mask */
605 FALSE), /* pcrel_offset */
607 /* The upper 16 bits of the GOT offset for the TLSOFF entry for a
608 symbol. */
609 HOWTO (R_FRV_GOTTLSOFFHI, /* type */
610 0, /* rightshift */
611 2, /* size (0 = byte, 1 = short, 2 = long) */
612 16, /* bitsize */
613 FALSE, /* pc_relative */
614 0, /* bitpos */
615 complain_overflow_dont, /* complain_on_overflow */
616 bfd_elf_generic_reloc, /* special_function */
617 "R_FRV_GOTTLSOFFHI", /* name */
618 FALSE, /* partial_inplace */
619 0xffff, /* src_mask */
620 0xffff, /* dst_mask */
621 FALSE), /* pcrel_offset */
623 /* The lower 16 bits of the GOT offset for the TLSOFF entry for a
624 symbol. */
625 HOWTO (R_FRV_GOTTLSOFFLO, /* type */
626 0, /* rightshift */
627 2, /* size (0 = byte, 1 = short, 2 = long) */
628 16, /* bitsize */
629 FALSE, /* pc_relative */
630 0, /* bitpos */
631 complain_overflow_dont, /* complain_on_overflow */
632 bfd_elf_generic_reloc, /* special_function */
633 "R_FRV_GOTTLSOFFLO", /* name */
634 FALSE, /* partial_inplace */
635 0xffff, /* src_mask */
636 0xffff, /* dst_mask */
637 FALSE), /* pcrel_offset */
639 /* The 32-bit offset from the thread pointer (not the module base
640 address) to a thread-local symbol. */
641 HOWTO (R_FRV_TLSOFF, /* type */
642 0, /* rightshift */
643 2, /* size (0 = byte, 1 = short, 2 = long) */
644 32, /* bitsize */
645 FALSE, /* pc_relative */
646 0, /* bitpos */
647 complain_overflow_dont, /* complain_on_overflow */
648 bfd_elf_generic_reloc, /* special_function */
649 "R_FRV_TLSOFF", /* name */
650 FALSE, /* partial_inplace */
651 0xffffffff, /* src_mask */
652 0xffffffff, /* dst_mask */
653 FALSE), /* pcrel_offset */
655 /* An annotation for linker relaxation, that denotes the
656 symbol+addend whose TLS descriptor is referenced by the sum of
657 the two input registers of an ldd instruction. */
658 HOWTO (R_FRV_TLSDESC_RELAX, /* type */
659 0, /* rightshift */
660 2, /* size (0 = byte, 1 = short, 2 = long) */
661 0, /* bitsize */
662 FALSE, /* pc_relative */
663 0, /* bitpos */
664 complain_overflow_dont, /* complain_on_overflow */
665 bfd_elf_generic_reloc, /* special_function */
666 "R_FRV_TLSDESC_RELAX", /* name */
667 FALSE, /* partial_inplace */
668 0, /* src_mask */
669 0, /* dst_mask */
670 FALSE), /* pcrel_offset */
672 /* An annotation for linker relaxation, that denotes the
673 symbol+addend whose TLS resolver entry point is given by the sum
674 of the two register operands of an calll instruction. */
675 HOWTO (R_FRV_GETTLSOFF_RELAX, /* type */
676 0, /* rightshift */
677 2, /* size (0 = byte, 1 = short, 2 = long) */
678 0, /* bitsize */
679 FALSE, /* pc_relative */
680 0, /* bitpos */
681 complain_overflow_dont, /* complain_on_overflow */
682 bfd_elf_generic_reloc, /* special_function */
683 "R_FRV_GETTLSOFF_RELAX", /* name */
684 FALSE, /* partial_inplace */
685 0, /* src_mask */
686 0, /* dst_mask */
687 FALSE), /* pcrel_offset */
689 /* An annotation for linker relaxation, that denotes the
690 symbol+addend whose TLS offset GOT entry is given by the sum of
691 the two input registers of an ld instruction. */
692 HOWTO (R_FRV_TLSOFF_RELAX, /* type */
693 0, /* rightshift */
694 2, /* size (0 = byte, 1 = short, 2 = long) */
695 0, /* bitsize */
696 FALSE, /* pc_relative */
697 0, /* bitpos */
698 complain_overflow_bitfield, /* complain_on_overflow */
699 bfd_elf_generic_reloc, /* special_function */
700 "R_FRV_TLSOFF_RELAX", /* name */
701 FALSE, /* partial_inplace */
702 0, /* src_mask */
703 0, /* dst_mask */
704 FALSE), /* pcrel_offset */
706 /* A 32-bit offset from the module base address to
707 the thread-local symbol address. */
708 HOWTO (R_FRV_TLSMOFF, /* type */
709 0, /* rightshift */
710 2, /* size (0 = byte, 1 = short, 2 = long) */
711 32, /* bitsize */
712 FALSE, /* pc_relative */
713 0, /* bitpos */
714 complain_overflow_dont, /* complain_on_overflow */
715 bfd_elf_generic_reloc, /* special_function */
716 "R_FRV_TLSMOFF", /* name */
717 FALSE, /* partial_inplace */
718 0xffffffff, /* src_mask */
719 0xffffffff, /* dst_mask */
720 FALSE), /* pcrel_offset */
723 /* GNU extension to record C++ vtable hierarchy. */
724 static reloc_howto_type elf32_frv_vtinherit_howto =
725 HOWTO (R_FRV_GNU_VTINHERIT, /* type */
726 0, /* rightshift */
727 2, /* size (0 = byte, 1 = short, 2 = long) */
728 0, /* bitsize */
729 FALSE, /* pc_relative */
730 0, /* bitpos */
731 complain_overflow_dont, /* complain_on_overflow */
732 NULL, /* special_function */
733 "R_FRV_GNU_VTINHERIT", /* name */
734 FALSE, /* partial_inplace */
735 0, /* src_mask */
736 0, /* dst_mask */
737 FALSE); /* pcrel_offset */
739 /* GNU extension to record C++ vtable member usage. */
740 static reloc_howto_type elf32_frv_vtentry_howto =
741 HOWTO (R_FRV_GNU_VTENTRY, /* type */
742 0, /* rightshift */
743 2, /* size (0 = byte, 1 = short, 2 = long) */
744 0, /* bitsize */
745 FALSE, /* pc_relative */
746 0, /* bitpos */
747 complain_overflow_dont, /* complain_on_overflow */
748 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
749 "R_FRV_GNU_VTENTRY", /* name */
750 FALSE, /* partial_inplace */
751 0, /* src_mask */
752 0, /* dst_mask */
753 FALSE); /* pcrel_offset */
755 /* The following 3 relocations are REL. The only difference to the
756 entries in the table above are that partial_inplace is TRUE. */
757 static reloc_howto_type elf32_frv_rel_32_howto =
758 HOWTO (R_FRV_32, /* type */
759 0, /* rightshift */
760 2, /* size (0 = byte, 1 = short, 2 = long) */
761 32, /* bitsize */
762 FALSE, /* pc_relative */
763 0, /* bitpos */
764 complain_overflow_bitfield, /* complain_on_overflow */
765 bfd_elf_generic_reloc, /* special_function */
766 "R_FRV_32", /* name */
767 TRUE, /* partial_inplace */
768 0xffffffff, /* src_mask */
769 0xffffffff, /* dst_mask */
770 FALSE); /* pcrel_offset */
772 static reloc_howto_type elf32_frv_rel_funcdesc_howto =
773 HOWTO (R_FRV_FUNCDESC, /* type */
774 0, /* rightshift */
775 2, /* size (0 = byte, 1 = short, 2 = long) */
776 32, /* bitsize */
777 FALSE, /* pc_relative */
778 0, /* bitpos */
779 complain_overflow_bitfield, /* complain_on_overflow */
780 bfd_elf_generic_reloc, /* special_function */
781 "R_FRV_FUNCDESC", /* name */
782 TRUE, /* partial_inplace */
783 0xffffffff, /* src_mask */
784 0xffffffff, /* dst_mask */
785 FALSE); /* pcrel_offset */
787 static reloc_howto_type elf32_frv_rel_funcdesc_value_howto =
788 HOWTO (R_FRV_FUNCDESC_VALUE, /* type */
789 0, /* rightshift */
790 2, /* size (0 = byte, 1 = short, 2 = long) */
791 64, /* bitsize */
792 FALSE, /* pc_relative */
793 0, /* bitpos */
794 complain_overflow_bitfield, /* complain_on_overflow */
795 bfd_elf_generic_reloc, /* special_function */
796 "R_FRV_FUNCDESC_VALUE", /* name */
797 TRUE, /* partial_inplace */
798 0xffffffff, /* src_mask */
799 0xffffffff, /* dst_mask */
800 FALSE); /* pcrel_offset */
802 static reloc_howto_type elf32_frv_rel_tlsdesc_value_howto =
803 /* A 64-bit TLS descriptor for a symbol. The first word resolves to
804 an entry point, and the second resolves to a special argument.
805 If the symbol turns out to be in static TLS, the entry point is a
806 return instruction, and the special argument is the TLS offset
807 for the symbol. If it's in dynamic TLS, the entry point is a TLS
808 offset resolver, and the special argument is a pointer to a data
809 structure allocated by the dynamic loader, containing the GOT
810 address for the offset resolver, the module id, the offset within
811 the module, and anything else the TLS offset resolver might need
812 to determine the TLS offset for the symbol in the running
813 thread. */
814 HOWTO (R_FRV_TLSDESC_VALUE, /* type */
815 0, /* rightshift */
816 2, /* size (0 = byte, 1 = short, 2 = long) */
817 64, /* bitsize */
818 FALSE, /* pc_relative */
819 0, /* bitpos */
820 complain_overflow_bitfield, /* complain_on_overflow */
821 bfd_elf_generic_reloc, /* special_function */
822 "R_FRV_TLSDESC_VALUE", /* name */
823 TRUE, /* partial_inplace */
824 0xffffffff, /* src_mask */
825 0xffffffff, /* dst_mask */
826 FALSE); /* pcrel_offset */
828 static reloc_howto_type elf32_frv_rel_tlsoff_howto =
829 /* The 32-bit offset from the thread pointer (not the module base
830 address) to a thread-local symbol. */
831 HOWTO (R_FRV_TLSOFF, /* type */
832 0, /* rightshift */
833 2, /* size (0 = byte, 1 = short, 2 = long) */
834 32, /* bitsize */
835 FALSE, /* pc_relative */
836 0, /* bitpos */
837 complain_overflow_bitfield, /* complain_on_overflow */
838 bfd_elf_generic_reloc, /* special_function */
839 "R_FRV_TLSOFF", /* name */
840 TRUE, /* partial_inplace */
841 0xffffffff, /* src_mask */
842 0xffffffff, /* dst_mask */
843 FALSE); /* pcrel_offset */
847 extern const bfd_target bfd_elf32_frvfdpic_vec;
848 #define IS_FDPIC(bfd) ((bfd)->xvec == &bfd_elf32_frvfdpic_vec)
850 /* An extension of the elf hash table data structure, containing some
851 additional FRV-specific data. */
852 struct frvfdpic_elf_link_hash_table
854 struct elf_link_hash_table elf;
856 /* A pointer to the .got section. */
857 asection *sgot;
858 /* A pointer to the .rel.got section. */
859 asection *sgotrel;
860 /* A pointer to the .rofixup section. */
861 asection *sgotfixup;
862 /* A pointer to the .plt section. */
863 asection *splt;
864 /* A pointer to the .rel.plt section. */
865 asection *spltrel;
866 /* GOT base offset. */
867 bfd_vma got0;
868 /* Location of the first non-lazy PLT entry, i.e., the number of
869 bytes taken by lazy PLT entries. If locally-bound TLS
870 descriptors require a ret instruction, it will be placed at this
871 offset. */
872 bfd_vma plt0;
873 /* A hash table holding information about which symbols were
874 referenced with which PIC-related relocations. */
875 struct htab *relocs_info;
876 /* Summary reloc information collected by
877 _frvfdpic_count_got_plt_entries. */
878 struct _frvfdpic_dynamic_got_info *g;
881 /* Get the FRV ELF linker hash table from a link_info structure. */
883 #define frvfdpic_hash_table(info) \
884 ((struct frvfdpic_elf_link_hash_table *) ((info)->hash))
886 #define frvfdpic_got_section(info) \
887 (frvfdpic_hash_table (info)->sgot)
888 #define frvfdpic_gotrel_section(info) \
889 (frvfdpic_hash_table (info)->sgotrel)
890 #define frvfdpic_gotfixup_section(info) \
891 (frvfdpic_hash_table (info)->sgotfixup)
892 #define frvfdpic_plt_section(info) \
893 (frvfdpic_hash_table (info)->splt)
894 #define frvfdpic_pltrel_section(info) \
895 (frvfdpic_hash_table (info)->spltrel)
896 #define frvfdpic_relocs_info(info) \
897 (frvfdpic_hash_table (info)->relocs_info)
898 #define frvfdpic_got_initial_offset(info) \
899 (frvfdpic_hash_table (info)->got0)
900 #define frvfdpic_plt_initial_offset(info) \
901 (frvfdpic_hash_table (info)->plt0)
902 #define frvfdpic_dynamic_got_plt_info(info) \
903 (frvfdpic_hash_table (info)->g)
905 /* Currently it's the same, but if some day we have a reason to change
906 it, we'd better be using a different macro.
908 FIXME: if there's any TLS PLT entry that uses local-exec or
909 initial-exec models, we could use the ret at the end of any of them
910 instead of adding one more. */
911 #define frvfdpic_plt_tls_ret_offset(info) \
912 (frvfdpic_plt_initial_offset (info))
914 /* The name of the dynamic interpreter. This is put in the .interp
915 section. */
917 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
919 #define DEFAULT_STACK_SIZE 0x20000
921 /* This structure is used to collect the number of entries present in
922 each addressable range of the got. */
923 struct _frvfdpic_dynamic_got_info
925 /* Several bits of information about the current link. */
926 struct bfd_link_info *info;
927 /* Total GOT size needed for GOT entries within the 12-, 16- or 32-bit
928 ranges. */
929 bfd_vma got12, gotlos, gothilo;
930 /* Total GOT size needed for function descriptor entries within the 12-,
931 16- or 32-bit ranges. */
932 bfd_vma fd12, fdlos, fdhilo;
933 /* Total GOT size needed by function descriptor entries referenced
934 in PLT entries, that would be profitable to place in offsets
935 close to the PIC register. */
936 bfd_vma fdplt;
937 /* Total PLT size needed by lazy PLT entries. */
938 bfd_vma lzplt;
939 /* Total GOT size needed for TLS descriptor entries within the 12-,
940 16- or 32-bit ranges. */
941 bfd_vma tlsd12, tlsdlos, tlsdhilo;
942 /* Total GOT size needed by TLS descriptors referenced in PLT
943 entries, that would be profitable to place in offers close to the
944 PIC register. */
945 bfd_vma tlsdplt;
946 /* Total PLT size needed by TLS lazy PLT entries. */
947 bfd_vma tlslzplt;
948 /* Number of relocations carried over from input object files. */
949 unsigned long relocs;
950 /* Number of fixups introduced by relocations in input object files. */
951 unsigned long fixups;
952 /* The number of fixups that reference the ret instruction added to
953 the PLT for locally-resolved TLS descriptors. */
954 unsigned long tls_ret_refs;
957 /* This structure is used to assign offsets to got entries, function
958 descriptors, plt entries and lazy plt entries. */
960 struct _frvfdpic_dynamic_got_plt_info
962 /* Summary information collected with _frvfdpic_count_got_plt_entries. */
963 struct _frvfdpic_dynamic_got_info g;
965 /* For each addressable range, we record a MAX (positive) and MIN
966 (negative) value. CUR is used to assign got entries, and it's
967 incremented from an initial positive value to MAX, then from MIN
968 to FDCUR (unless FDCUR wraps around first). FDCUR is used to
969 assign function descriptors, and it's decreased from an initial
970 non-positive value to MIN, then from MAX down to CUR (unless CUR
971 wraps around first). All of MIN, MAX, CUR and FDCUR always point
972 to even words. ODD, if non-zero, indicates an odd word to be
973 used for the next got entry, otherwise CUR is used and
974 incremented by a pair of words, wrapping around when it reaches
975 MAX. FDCUR is decremented (and wrapped) before the next function
976 descriptor is chosen. FDPLT indicates the number of remaining
977 slots that can be used for function descriptors used only by PLT
978 entries.
980 TMAX, TMIN and TCUR are used to assign TLS descriptors. TCUR
981 starts as MAX, and grows up to TMAX, then wraps around to TMIN
982 and grows up to MIN. TLSDPLT indicates the number of remaining
983 slots that can be used for TLS descriptors used only by TLS PLT
984 entries. */
985 struct _frvfdpic_dynamic_got_alloc_data
987 bfd_signed_vma max, cur, odd, fdcur, min;
988 bfd_signed_vma tmax, tcur, tmin;
989 bfd_vma fdplt, tlsdplt;
990 } got12, gotlos, gothilo;
993 /* Create an FRV ELF linker hash table. */
995 static struct bfd_link_hash_table *
996 frvfdpic_elf_link_hash_table_create (bfd *abfd)
998 struct frvfdpic_elf_link_hash_table *ret;
999 bfd_size_type amt = sizeof (struct frvfdpic_elf_link_hash_table);
1001 ret = bfd_zalloc (abfd, amt);
1002 if (ret == NULL)
1003 return NULL;
1005 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
1006 _bfd_elf_link_hash_newfunc,
1007 sizeof (struct elf_link_hash_entry)))
1009 free (ret);
1010 return NULL;
1013 return &ret->elf.root;
1016 /* Decide whether a reference to a symbol can be resolved locally or
1017 not. If the symbol is protected, we want the local address, but
1018 its function descriptor must be assigned by the dynamic linker. */
1019 #define FRVFDPIC_SYM_LOCAL(INFO, H) \
1020 (_bfd_elf_symbol_refs_local_p ((H), (INFO), 1) \
1021 || ! elf_hash_table (INFO)->dynamic_sections_created)
1022 #define FRVFDPIC_FUNCDESC_LOCAL(INFO, H) \
1023 ((H)->dynindx == -1 || ! elf_hash_table (INFO)->dynamic_sections_created)
1025 /* This structure collects information on what kind of GOT, PLT or
1026 function descriptors are required by relocations that reference a
1027 certain symbol. */
1028 struct frvfdpic_relocs_info
1030 /* The index of the symbol, as stored in the relocation r_info, if
1031 we have a local symbol; -1 otherwise. */
1032 long symndx;
1033 union
1035 /* The input bfd in which the symbol is defined, if it's a local
1036 symbol. */
1037 bfd *abfd;
1038 /* If symndx == -1, the hash table entry corresponding to a global
1039 symbol (even if it turns out to bind locally, in which case it
1040 should ideally be replaced with section's symndx + addend). */
1041 struct elf_link_hash_entry *h;
1042 } d;
1043 /* The addend of the relocation that references the symbol. */
1044 bfd_vma addend;
1046 /* The fields above are used to identify an entry. The fields below
1047 contain information on how an entry is used and, later on, which
1048 locations it was assigned. */
1049 /* The following 3 fields record whether the symbol+addend above was
1050 ever referenced with a GOT relocation. The 12 suffix indicates a
1051 GOT12 relocation; los is used for GOTLO relocations that are not
1052 matched by a GOTHI relocation; hilo is used for GOTLO/GOTHI
1053 pairs. */
1054 unsigned got12:1;
1055 unsigned gotlos:1;
1056 unsigned gothilo:1;
1057 /* Whether a FUNCDESC relocation references symbol+addend. */
1058 unsigned fd:1;
1059 /* Whether a FUNCDESC_GOT relocation references symbol+addend. */
1060 unsigned fdgot12:1;
1061 unsigned fdgotlos:1;
1062 unsigned fdgothilo:1;
1063 /* Whether a FUNCDESC_GOTOFF relocation references symbol+addend. */
1064 unsigned fdgoff12:1;
1065 unsigned fdgofflos:1;
1066 unsigned fdgoffhilo:1;
1067 /* Whether a GETTLSOFF relocation references symbol+addend. */
1068 unsigned tlsplt:1;
1069 /* FIXME: we should probably add tlspltdesc, tlspltoff and
1070 tlspltimm, to tell what kind of TLS PLT entry we're generating.
1071 We might instead just pre-compute flags telling whether the
1072 object is suitable for local exec, initial exec or general
1073 dynamic addressing, and use that all over the place. We could
1074 also try to do a better job of merging TLSOFF and TLSDESC entries
1075 in main executables, but perhaps we can get rid of TLSDESC
1076 entirely in them instead. */
1077 /* Whether a GOTTLSDESC relocation references symbol+addend. */
1078 unsigned tlsdesc12:1;
1079 unsigned tlsdesclos:1;
1080 unsigned tlsdeschilo:1;
1081 /* Whether a GOTTLSOFF relocation references symbol+addend. */
1082 unsigned tlsoff12:1;
1083 unsigned tlsofflos:1;
1084 unsigned tlsoffhilo:1;
1085 /* Whether symbol+addend is referenced with GOTOFF12, GOTOFFLO or
1086 GOTOFFHI relocations. The addend doesn't really matter, since we
1087 envision that this will only be used to check whether the symbol
1088 is mapped to the same segment as the got. */
1089 unsigned gotoff:1;
1090 /* Whether symbol+addend is referenced by a LABEL24 relocation. */
1091 unsigned call:1;
1092 /* Whether symbol+addend is referenced by a 32 or FUNCDESC_VALUE
1093 relocation. */
1094 unsigned sym:1;
1095 /* Whether we need a PLT entry for a symbol. Should be implied by
1096 something like:
1097 (call && symndx == -1 && ! FRVFDPIC_SYM_LOCAL (info, d.h)) */
1098 unsigned plt:1;
1099 /* Whether a function descriptor should be created in this link unit
1100 for symbol+addend. Should be implied by something like:
1101 (plt || fdgotoff12 || fdgotofflos || fdgotofflohi
1102 || ((fd || fdgot12 || fdgotlos || fdgothilo)
1103 && (symndx != -1 || FRVFDPIC_FUNCDESC_LOCAL (info, d.h)))) */
1104 unsigned privfd:1;
1105 /* Whether a lazy PLT entry is needed for this symbol+addend.
1106 Should be implied by something like:
1107 (privfd && symndx == -1 && ! FRVFDPIC_SYM_LOCAL (info, d.h)
1108 && ! (info->flags & DF_BIND_NOW)) */
1109 unsigned lazyplt:1;
1110 /* Whether we've already emitted GOT relocations and PLT entries as
1111 needed for this symbol. */
1112 unsigned done:1;
1114 /* The number of R_FRV_32, R_FRV_FUNCDESC, R_FRV_FUNCDESC_VALUE and
1115 R_FRV_TLSDESC_VALUE, R_FRV_TLSOFF relocations referencing
1116 symbol+addend. */
1117 unsigned relocs32, relocsfd, relocsfdv, relocstlsd, relocstlsoff;
1119 /* The number of .rofixups entries and dynamic relocations allocated
1120 for this symbol, minus any that might have already been used. */
1121 unsigned fixups, dynrelocs;
1123 /* The offsets of the GOT entries assigned to symbol+addend, to the
1124 function descriptor's address, and to a function descriptor,
1125 respectively. Should be zero if unassigned. The offsets are
1126 counted from the value that will be assigned to the PIC register,
1127 not from the beginning of the .got section. */
1128 bfd_signed_vma got_entry, fdgot_entry, fd_entry;
1129 /* The offsets of the PLT entries assigned to symbol+addend,
1130 non-lazy and lazy, respectively. If unassigned, should be
1131 (bfd_vma)-1. */
1132 bfd_vma plt_entry, lzplt_entry;
1133 /* The offsets of the GOT entries for TLS offset and TLS descriptor. */
1134 bfd_signed_vma tlsoff_entry, tlsdesc_entry;
1135 /* The offset of the TLS offset PLT entry. */
1136 bfd_vma tlsplt_entry;
1139 /* Compute a hash with the key fields of an frvfdpic_relocs_info entry. */
1140 static hashval_t
1141 frvfdpic_relocs_info_hash (const void *entry_)
1143 const struct frvfdpic_relocs_info *entry = entry_;
1145 return (entry->symndx == -1
1146 ? (long) entry->d.h->root.root.hash
1147 : entry->symndx + (long) entry->d.abfd->id * 257) + entry->addend;
1150 /* Test whether the key fields of two frvfdpic_relocs_info entries are
1151 identical. */
1152 static int
1153 frvfdpic_relocs_info_eq (const void *entry1, const void *entry2)
1155 const struct frvfdpic_relocs_info *e1 = entry1;
1156 const struct frvfdpic_relocs_info *e2 = entry2;
1158 return e1->symndx == e2->symndx && e1->addend == e2->addend
1159 && (e1->symndx == -1 ? e1->d.h == e2->d.h : e1->d.abfd == e2->d.abfd);
1162 /* Find or create an entry in a hash table HT that matches the key
1163 fields of the given ENTRY. If it's not found, memory for a new
1164 entry is allocated in ABFD's obstack. */
1165 static struct frvfdpic_relocs_info *
1166 frvfdpic_relocs_info_find (struct htab *ht,
1167 bfd *abfd,
1168 const struct frvfdpic_relocs_info *entry,
1169 enum insert_option insert)
1171 struct frvfdpic_relocs_info **loc =
1172 (struct frvfdpic_relocs_info **) htab_find_slot (ht, entry, insert);
1174 if (! loc)
1175 return NULL;
1177 if (*loc)
1178 return *loc;
1180 *loc = bfd_zalloc (abfd, sizeof (**loc));
1182 if (! *loc)
1183 return *loc;
1185 (*loc)->symndx = entry->symndx;
1186 (*loc)->d = entry->d;
1187 (*loc)->addend = entry->addend;
1188 (*loc)->plt_entry = (bfd_vma)-1;
1189 (*loc)->lzplt_entry = (bfd_vma)-1;
1190 (*loc)->tlsplt_entry = (bfd_vma)-1;
1192 return *loc;
1195 /* Obtain the address of the entry in HT associated with H's symbol +
1196 addend, creating a new entry if none existed. ABFD is only used
1197 for memory allocation purposes. */
1198 inline static struct frvfdpic_relocs_info *
1199 frvfdpic_relocs_info_for_global (struct htab *ht,
1200 bfd *abfd,
1201 struct elf_link_hash_entry *h,
1202 bfd_vma addend,
1203 enum insert_option insert)
1205 struct frvfdpic_relocs_info entry;
1207 entry.symndx = -1;
1208 entry.d.h = h;
1209 entry.addend = addend;
1211 return frvfdpic_relocs_info_find (ht, abfd, &entry, insert);
1214 /* Obtain the address of the entry in HT associated with the SYMNDXth
1215 local symbol of the input bfd ABFD, plus the addend, creating a new
1216 entry if none existed. */
1217 inline static struct frvfdpic_relocs_info *
1218 frvfdpic_relocs_info_for_local (struct htab *ht,
1219 bfd *abfd,
1220 long symndx,
1221 bfd_vma addend,
1222 enum insert_option insert)
1224 struct frvfdpic_relocs_info entry;
1226 entry.symndx = symndx;
1227 entry.d.abfd = abfd;
1228 entry.addend = addend;
1230 return frvfdpic_relocs_info_find (ht, abfd, &entry, insert);
1233 /* Merge fields set by check_relocs() of two entries that end up being
1234 mapped to the same (presumably global) symbol. */
1236 inline static void
1237 frvfdpic_pic_merge_early_relocs_info (struct frvfdpic_relocs_info *e2,
1238 struct frvfdpic_relocs_info const *e1)
1240 e2->got12 |= e1->got12;
1241 e2->gotlos |= e1->gotlos;
1242 e2->gothilo |= e1->gothilo;
1243 e2->fd |= e1->fd;
1244 e2->fdgot12 |= e1->fdgot12;
1245 e2->fdgotlos |= e1->fdgotlos;
1246 e2->fdgothilo |= e1->fdgothilo;
1247 e2->fdgoff12 |= e1->fdgoff12;
1248 e2->fdgofflos |= e1->fdgofflos;
1249 e2->fdgoffhilo |= e1->fdgoffhilo;
1250 e2->tlsplt |= e1->tlsplt;
1251 e2->tlsdesc12 |= e1->tlsdesc12;
1252 e2->tlsdesclos |= e1->tlsdesclos;
1253 e2->tlsdeschilo |= e1->tlsdeschilo;
1254 e2->tlsoff12 |= e1->tlsoff12;
1255 e2->tlsofflos |= e1->tlsofflos;
1256 e2->tlsoffhilo |= e1->tlsoffhilo;
1257 e2->gotoff |= e1->gotoff;
1258 e2->call |= e1->call;
1259 e2->sym |= e1->sym;
1262 /* Every block of 65535 lazy PLT entries shares a single call to the
1263 resolver, inserted in the 32768th lazy PLT entry (i.e., entry #
1264 32767, counting from 0). All other lazy PLT entries branch to it
1265 in a single instruction. */
1267 #define FRVFDPIC_LZPLT_BLOCK_SIZE ((bfd_vma) 8 * 65535 + 4)
1268 #define FRVFDPIC_LZPLT_RESOLV_LOC (8 * 32767)
1270 /* Add a dynamic relocation to the SRELOC section. */
1272 inline static bfd_vma
1273 _frvfdpic_add_dyn_reloc (bfd *output_bfd, asection *sreloc, bfd_vma offset,
1274 int reloc_type, long dynindx, bfd_vma addend,
1275 struct frvfdpic_relocs_info *entry)
1277 Elf_Internal_Rela outrel;
1278 bfd_vma reloc_offset;
1280 outrel.r_offset = offset;
1281 outrel.r_info = ELF32_R_INFO (dynindx, reloc_type);
1282 outrel.r_addend = addend;
1284 reloc_offset = sreloc->reloc_count * sizeof (Elf32_External_Rel);
1285 BFD_ASSERT (reloc_offset < sreloc->size);
1286 bfd_elf32_swap_reloc_out (output_bfd, &outrel,
1287 sreloc->contents + reloc_offset);
1288 sreloc->reloc_count++;
1290 /* If the entry's index is zero, this relocation was probably to a
1291 linkonce section that got discarded. We reserved a dynamic
1292 relocation, but it was for another entry than the one we got at
1293 the time of emitting the relocation. Unfortunately there's no
1294 simple way for us to catch this situation, since the relocation
1295 is cleared right before calling relocate_section, at which point
1296 we no longer know what the relocation used to point to. */
1297 if (entry->symndx)
1299 BFD_ASSERT (entry->dynrelocs > 0);
1300 entry->dynrelocs--;
1303 return reloc_offset;
1306 /* Add a fixup to the ROFIXUP section. */
1308 static bfd_vma
1309 _frvfdpic_add_rofixup (bfd *output_bfd, asection *rofixup, bfd_vma offset,
1310 struct frvfdpic_relocs_info *entry)
1312 bfd_vma fixup_offset;
1314 if (rofixup->flags & SEC_EXCLUDE)
1315 return -1;
1317 fixup_offset = rofixup->reloc_count * 4;
1318 if (rofixup->contents)
1320 BFD_ASSERT (fixup_offset < rofixup->size);
1321 bfd_put_32 (output_bfd, offset, rofixup->contents + fixup_offset);
1323 rofixup->reloc_count++;
1325 if (entry && entry->symndx)
1327 /* See discussion about symndx == 0 in _frvfdpic_add_dyn_reloc
1328 above. */
1329 BFD_ASSERT (entry->fixups > 0);
1330 entry->fixups--;
1333 return fixup_offset;
1336 /* Find the segment number in which OSEC, and output section, is
1337 located. */
1339 static unsigned
1340 _frvfdpic_osec_to_segment (bfd *output_bfd, asection *osec)
1342 struct elf_segment_map *m;
1343 Elf_Internal_Phdr *p;
1345 /* Find the segment that contains the output_section. */
1346 for (m = elf_tdata (output_bfd)->segment_map,
1347 p = elf_tdata (output_bfd)->phdr;
1348 m != NULL;
1349 m = m->next, p++)
1351 int i;
1353 for (i = m->count - 1; i >= 0; i--)
1354 if (m->sections[i] == osec)
1355 break;
1357 if (i >= 0)
1358 break;
1361 return p - elf_tdata (output_bfd)->phdr;
1364 inline static bfd_boolean
1365 _frvfdpic_osec_readonly_p (bfd *output_bfd, asection *osec)
1367 unsigned seg = _frvfdpic_osec_to_segment (output_bfd, osec);
1369 return ! (elf_tdata (output_bfd)->phdr[seg].p_flags & PF_W);
1372 #define FRVFDPIC_TLS_BIAS (2048 - 16)
1374 /* Return the base VMA address which should be subtracted from real addresses
1375 when resolving TLSMOFF relocation.
1376 This is PT_TLS segment p_vaddr, plus the 2048-16 bias. */
1378 static bfd_vma
1379 tls_biased_base (struct bfd_link_info *info)
1381 /* If tls_sec is NULL, we should have signalled an error already. */
1382 if (elf_hash_table (info)->tls_sec == NULL)
1383 return FRVFDPIC_TLS_BIAS;
1384 return elf_hash_table (info)->tls_sec->vma + FRVFDPIC_TLS_BIAS;
1387 /* Generate relocations for GOT entries, function descriptors, and
1388 code for PLT and lazy PLT entries. */
1390 inline static bfd_boolean
1391 _frvfdpic_emit_got_relocs_plt_entries (struct frvfdpic_relocs_info *entry,
1392 bfd *output_bfd,
1393 struct bfd_link_info *info,
1394 asection *sec,
1395 Elf_Internal_Sym *sym,
1396 bfd_vma addend)
1399 bfd_vma fd_lazy_rel_offset = (bfd_vma)-1;
1400 int dynindx = -1;
1402 if (entry->done)
1403 return TRUE;
1404 entry->done = 1;
1406 if (entry->got_entry || entry->fdgot_entry || entry->fd_entry
1407 || entry->tlsoff_entry || entry->tlsdesc_entry)
1409 /* If the symbol is dynamic, consider it for dynamic
1410 relocations, otherwise decay to section + offset. */
1411 if (entry->symndx == -1 && entry->d.h->dynindx != -1)
1412 dynindx = entry->d.h->dynindx;
1413 else
1415 if (sec->output_section
1416 && ! bfd_is_abs_section (sec->output_section)
1417 && ! bfd_is_und_section (sec->output_section))
1418 dynindx = elf_section_data (sec->output_section)->dynindx;
1419 else
1420 dynindx = 0;
1424 /* Generate relocation for GOT entry pointing to the symbol. */
1425 if (entry->got_entry)
1427 int idx = dynindx;
1428 bfd_vma ad = addend;
1430 /* If the symbol is dynamic but binds locally, use
1431 section+offset. */
1432 if (sec && (entry->symndx != -1
1433 || FRVFDPIC_SYM_LOCAL (info, entry->d.h)))
1435 if (entry->symndx == -1)
1436 ad += entry->d.h->root.u.def.value;
1437 else
1438 ad += sym->st_value;
1439 ad += sec->output_offset;
1440 if (sec->output_section && elf_section_data (sec->output_section))
1441 idx = elf_section_data (sec->output_section)->dynindx;
1442 else
1443 idx = 0;
1446 /* If we're linking an executable at a fixed address, we can
1447 omit the dynamic relocation as long as the symbol is local to
1448 this module. */
1449 if (info->executable && !info->pie
1450 && (entry->symndx != -1
1451 || FRVFDPIC_SYM_LOCAL (info, entry->d.h)))
1453 if (sec)
1454 ad += sec->output_section->vma;
1455 if (entry->symndx != -1
1456 || entry->d.h->root.type != bfd_link_hash_undefweak)
1457 _frvfdpic_add_rofixup (output_bfd,
1458 frvfdpic_gotfixup_section (info),
1459 frvfdpic_got_section (info)->output_section
1460 ->vma
1461 + frvfdpic_got_section (info)->output_offset
1462 + frvfdpic_got_initial_offset (info)
1463 + entry->got_entry, entry);
1465 else
1466 _frvfdpic_add_dyn_reloc (output_bfd, frvfdpic_gotrel_section (info),
1467 _bfd_elf_section_offset
1468 (output_bfd, info,
1469 frvfdpic_got_section (info),
1470 frvfdpic_got_initial_offset (info)
1471 + entry->got_entry)
1472 + frvfdpic_got_section (info)
1473 ->output_section->vma
1474 + frvfdpic_got_section (info)->output_offset,
1475 R_FRV_32, idx, ad, entry);
1477 bfd_put_32 (output_bfd, ad,
1478 frvfdpic_got_section (info)->contents
1479 + frvfdpic_got_initial_offset (info)
1480 + entry->got_entry);
1483 /* Generate relocation for GOT entry pointing to a canonical
1484 function descriptor. */
1485 if (entry->fdgot_entry)
1487 int reloc, idx;
1488 bfd_vma ad = 0;
1490 if (! (entry->symndx == -1
1491 && entry->d.h->root.type == bfd_link_hash_undefweak
1492 && FRVFDPIC_SYM_LOCAL (info, entry->d.h)))
1494 /* If the symbol is dynamic and there may be dynamic symbol
1495 resolution because we are, or are linked with, a shared
1496 library, emit a FUNCDESC relocation such that the dynamic
1497 linker will allocate the function descriptor. If the
1498 symbol needs a non-local function descriptor but binds
1499 locally (e.g., its visibility is protected, emit a
1500 dynamic relocation decayed to section+offset. */
1501 if (entry->symndx == -1
1502 && ! FRVFDPIC_FUNCDESC_LOCAL (info, entry->d.h)
1503 && FRVFDPIC_SYM_LOCAL (info, entry->d.h)
1504 && !(info->executable && !info->pie))
1506 reloc = R_FRV_FUNCDESC;
1507 idx = elf_section_data (entry->d.h->root.u.def.section
1508 ->output_section)->dynindx;
1509 ad = entry->d.h->root.u.def.section->output_offset
1510 + entry->d.h->root.u.def.value;
1512 else if (entry->symndx == -1
1513 && ! FRVFDPIC_FUNCDESC_LOCAL (info, entry->d.h))
1515 reloc = R_FRV_FUNCDESC;
1516 idx = dynindx;
1517 ad = addend;
1518 if (ad)
1520 (*info->callbacks->reloc_dangerous)
1521 (info, _("relocation requires zero addend"),
1522 elf_hash_table (info)->dynobj,
1523 frvfdpic_got_section (info),
1524 entry->fdgot_entry);
1525 return FALSE;
1528 else
1530 /* Otherwise, we know we have a private function descriptor,
1531 so reference it directly. */
1532 if (elf_hash_table (info)->dynamic_sections_created)
1533 BFD_ASSERT (entry->privfd);
1534 reloc = R_FRV_32;
1535 idx = elf_section_data (frvfdpic_got_section (info)
1536 ->output_section)->dynindx;
1537 ad = frvfdpic_got_section (info)->output_offset
1538 + frvfdpic_got_initial_offset (info) + entry->fd_entry;
1541 /* If there is room for dynamic symbol resolution, emit the
1542 dynamic relocation. However, if we're linking an
1543 executable at a fixed location, we won't have emitted a
1544 dynamic symbol entry for the got section, so idx will be
1545 zero, which means we can and should compute the address
1546 of the private descriptor ourselves. */
1547 if (info->executable && !info->pie
1548 && (entry->symndx != -1
1549 || FRVFDPIC_FUNCDESC_LOCAL (info, entry->d.h)))
1551 ad += frvfdpic_got_section (info)->output_section->vma;
1552 _frvfdpic_add_rofixup (output_bfd,
1553 frvfdpic_gotfixup_section (info),
1554 frvfdpic_got_section (info)
1555 ->output_section->vma
1556 + frvfdpic_got_section (info)
1557 ->output_offset
1558 + frvfdpic_got_initial_offset (info)
1559 + entry->fdgot_entry, entry);
1561 else
1562 _frvfdpic_add_dyn_reloc (output_bfd,
1563 frvfdpic_gotrel_section (info),
1564 _bfd_elf_section_offset
1565 (output_bfd, info,
1566 frvfdpic_got_section (info),
1567 frvfdpic_got_initial_offset (info)
1568 + entry->fdgot_entry)
1569 + frvfdpic_got_section (info)
1570 ->output_section->vma
1571 + frvfdpic_got_section (info)
1572 ->output_offset,
1573 reloc, idx, ad, entry);
1576 bfd_put_32 (output_bfd, ad,
1577 frvfdpic_got_section (info)->contents
1578 + frvfdpic_got_initial_offset (info)
1579 + entry->fdgot_entry);
1582 /* Generate relocation to fill in a private function descriptor in
1583 the GOT. */
1584 if (entry->fd_entry)
1586 int idx = dynindx;
1587 bfd_vma ad = addend;
1588 bfd_vma ofst;
1589 long lowword, highword;
1591 /* If the symbol is dynamic but binds locally, use
1592 section+offset. */
1593 if (sec && (entry->symndx != -1
1594 || FRVFDPIC_SYM_LOCAL (info, entry->d.h)))
1596 if (entry->symndx == -1)
1597 ad += entry->d.h->root.u.def.value;
1598 else
1599 ad += sym->st_value;
1600 ad += sec->output_offset;
1601 if (sec->output_section && elf_section_data (sec->output_section))
1602 idx = elf_section_data (sec->output_section)->dynindx;
1603 else
1604 idx = 0;
1607 /* If we're linking an executable at a fixed address, we can
1608 omit the dynamic relocation as long as the symbol is local to
1609 this module. */
1610 if (info->executable && !info->pie
1611 && (entry->symndx != -1 || FRVFDPIC_SYM_LOCAL (info, entry->d.h)))
1613 if (sec)
1614 ad += sec->output_section->vma;
1615 ofst = 0;
1616 if (entry->symndx != -1
1617 || entry->d.h->root.type != bfd_link_hash_undefweak)
1619 _frvfdpic_add_rofixup (output_bfd,
1620 frvfdpic_gotfixup_section (info),
1621 frvfdpic_got_section (info)
1622 ->output_section->vma
1623 + frvfdpic_got_section (info)
1624 ->output_offset
1625 + frvfdpic_got_initial_offset (info)
1626 + entry->fd_entry, entry);
1627 _frvfdpic_add_rofixup (output_bfd,
1628 frvfdpic_gotfixup_section (info),
1629 frvfdpic_got_section (info)
1630 ->output_section->vma
1631 + frvfdpic_got_section (info)
1632 ->output_offset
1633 + frvfdpic_got_initial_offset (info)
1634 + entry->fd_entry + 4, entry);
1637 else
1639 ofst =
1640 _frvfdpic_add_dyn_reloc (output_bfd,
1641 entry->lazyplt
1642 ? frvfdpic_pltrel_section (info)
1643 : frvfdpic_gotrel_section (info),
1644 _bfd_elf_section_offset
1645 (output_bfd, info,
1646 frvfdpic_got_section (info),
1647 frvfdpic_got_initial_offset (info)
1648 + entry->fd_entry)
1649 + frvfdpic_got_section (info)
1650 ->output_section->vma
1651 + frvfdpic_got_section (info)
1652 ->output_offset,
1653 R_FRV_FUNCDESC_VALUE, idx, ad, entry);
1656 /* If we've omitted the dynamic relocation, just emit the fixed
1657 addresses of the symbol and of the local GOT base offset. */
1658 if (info->executable && !info->pie && sec && sec->output_section)
1660 lowword = ad;
1661 highword = frvfdpic_got_section (info)->output_section->vma
1662 + frvfdpic_got_section (info)->output_offset
1663 + frvfdpic_got_initial_offset (info);
1665 else if (entry->lazyplt)
1667 if (ad)
1669 (*info->callbacks->reloc_dangerous)
1670 (info, _("relocation requires zero addend"),
1671 elf_hash_table (info)->dynobj,
1672 frvfdpic_got_section (info),
1673 entry->fd_entry);
1674 return FALSE;
1677 fd_lazy_rel_offset = ofst;
1679 /* A function descriptor used for lazy or local resolving is
1680 initialized such that its high word contains the output
1681 section index in which the PLT entries are located, and
1682 the low word contains the address of the lazy PLT entry
1683 entry point, that must be within the memory region
1684 assigned to that section. */
1685 lowword = entry->lzplt_entry + 4
1686 + frvfdpic_plt_section (info)->output_offset
1687 + frvfdpic_plt_section (info)->output_section->vma;
1688 highword = _frvfdpic_osec_to_segment
1689 (output_bfd, frvfdpic_plt_section (info)->output_section);
1691 else
1693 /* A function descriptor for a local function gets the index
1694 of the section. For a non-local function, it's
1695 disregarded. */
1696 lowword = ad;
1697 if (entry->symndx == -1 && entry->d.h->dynindx != -1
1698 && entry->d.h->dynindx == idx)
1699 highword = 0;
1700 else
1701 highword = _frvfdpic_osec_to_segment
1702 (output_bfd, sec->output_section);
1705 bfd_put_32 (output_bfd, lowword,
1706 frvfdpic_got_section (info)->contents
1707 + frvfdpic_got_initial_offset (info)
1708 + entry->fd_entry);
1709 bfd_put_32 (output_bfd, highword,
1710 frvfdpic_got_section (info)->contents
1711 + frvfdpic_got_initial_offset (info)
1712 + entry->fd_entry + 4);
1715 /* Generate code for the PLT entry. */
1716 if (entry->plt_entry != (bfd_vma) -1)
1718 bfd_byte *plt_code = frvfdpic_plt_section (info)->contents
1719 + entry->plt_entry;
1721 BFD_ASSERT (entry->fd_entry);
1723 /* Figure out what kind of PLT entry we need, depending on the
1724 location of the function descriptor within the GOT. */
1725 if (entry->fd_entry >= -(1 << (12 - 1))
1726 && entry->fd_entry < (1 << (12 - 1)))
1728 /* lddi @(gr15, fd_entry), gr14 */
1729 bfd_put_32 (output_bfd,
1730 0x9cccf000 | (entry->fd_entry & ((1 << 12) - 1)),
1731 plt_code);
1732 plt_code += 4;
1734 else
1736 if (entry->fd_entry >= -(1 << (16 - 1))
1737 && entry->fd_entry < (1 << (16 - 1)))
1739 /* setlos lo(fd_entry), gr14 */
1740 bfd_put_32 (output_bfd,
1741 0x9cfc0000
1742 | (entry->fd_entry & (((bfd_vma)1 << 16) - 1)),
1743 plt_code);
1744 plt_code += 4;
1746 else
1748 /* sethi.p hi(fd_entry), gr14
1749 setlo lo(fd_entry), gr14 */
1750 bfd_put_32 (output_bfd,
1751 0x1cf80000
1752 | ((entry->fd_entry >> 16)
1753 & (((bfd_vma)1 << 16) - 1)),
1754 plt_code);
1755 plt_code += 4;
1756 bfd_put_32 (output_bfd,
1757 0x9cf40000
1758 | (entry->fd_entry & (((bfd_vma)1 << 16) - 1)),
1759 plt_code);
1760 plt_code += 4;
1762 /* ldd @(gr14,gr15),gr14 */
1763 bfd_put_32 (output_bfd, 0x9c08e14f, plt_code);
1764 plt_code += 4;
1766 /* jmpl @(gr14,gr0) */
1767 bfd_put_32 (output_bfd, 0x8030e000, plt_code);
1770 /* Generate code for the lazy PLT entry. */
1771 if (entry->lzplt_entry != (bfd_vma) -1)
1773 bfd_byte *lzplt_code = frvfdpic_plt_section (info)->contents
1774 + entry->lzplt_entry;
1775 bfd_vma resolverStub_addr;
1777 bfd_put_32 (output_bfd, fd_lazy_rel_offset, lzplt_code);
1778 lzplt_code += 4;
1780 resolverStub_addr = entry->lzplt_entry / FRVFDPIC_LZPLT_BLOCK_SIZE
1781 * FRVFDPIC_LZPLT_BLOCK_SIZE + FRVFDPIC_LZPLT_RESOLV_LOC;
1782 if (resolverStub_addr >= frvfdpic_plt_initial_offset (info))
1783 resolverStub_addr = frvfdpic_plt_initial_offset (info) - 12;
1785 if (entry->lzplt_entry == resolverStub_addr)
1787 /* This is a lazy PLT entry that includes a resolver call. */
1788 /* ldd @(gr15,gr0), gr4
1789 jmpl @(gr4,gr0) */
1790 bfd_put_32 (output_bfd, 0x8808f140, lzplt_code);
1791 bfd_put_32 (output_bfd, 0x80304000, lzplt_code + 4);
1793 else
1795 /* bra resolverStub */
1796 bfd_put_32 (output_bfd,
1797 0xc01a0000
1798 | (((resolverStub_addr - entry->lzplt_entry)
1799 / 4) & (((bfd_vma)1 << 16) - 1)),
1800 lzplt_code);
1804 /* Generate relocation for GOT entry holding the TLS offset. */
1805 if (entry->tlsoff_entry)
1807 int idx = dynindx;
1808 bfd_vma ad = addend;
1810 if (entry->symndx != -1
1811 || FRVFDPIC_SYM_LOCAL (info, entry->d.h))
1813 /* If the symbol is dynamic but binds locally, use
1814 section+offset. */
1815 if (sec)
1817 if (entry->symndx == -1)
1818 ad += entry->d.h->root.u.def.value;
1819 else
1820 ad += sym->st_value;
1821 ad += sec->output_offset;
1822 if (sec->output_section
1823 && elf_section_data (sec->output_section))
1824 idx = elf_section_data (sec->output_section)->dynindx;
1825 else
1826 idx = 0;
1830 /* *ABS*+addend is special for TLS relocations, use only the
1831 addend. */
1832 if (info->executable
1833 && idx == 0
1834 && (bfd_is_abs_section (sec)
1835 || bfd_is_und_section (sec)))
1837 /* If we're linking an executable, we can entirely omit the
1838 dynamic relocation if the symbol is local to this module. */
1839 else if (info->executable
1840 && (entry->symndx != -1
1841 || FRVFDPIC_SYM_LOCAL (info, entry->d.h)))
1843 if (sec)
1844 ad += sec->output_section->vma - tls_biased_base (info);
1846 else
1848 if (idx == 0
1849 && (bfd_is_abs_section (sec)
1850 || bfd_is_und_section (sec)))
1852 if (! elf_hash_table (info)->tls_sec)
1854 (*info->callbacks->undefined_symbol)
1855 (info, "TLS section", elf_hash_table (info)->dynobj,
1856 frvfdpic_got_section (info), entry->tlsoff_entry, TRUE);
1857 return FALSE;
1859 idx = elf_section_data (elf_hash_table (info)->tls_sec)->dynindx;
1860 ad += FRVFDPIC_TLS_BIAS;
1862 _frvfdpic_add_dyn_reloc (output_bfd, frvfdpic_gotrel_section (info),
1863 _bfd_elf_section_offset
1864 (output_bfd, info,
1865 frvfdpic_got_section (info),
1866 frvfdpic_got_initial_offset (info)
1867 + entry->tlsoff_entry)
1868 + frvfdpic_got_section (info)
1869 ->output_section->vma
1870 + frvfdpic_got_section (info)
1871 ->output_offset,
1872 R_FRV_TLSOFF, idx, ad, entry);
1875 bfd_put_32 (output_bfd, ad,
1876 frvfdpic_got_section (info)->contents
1877 + frvfdpic_got_initial_offset (info)
1878 + entry->tlsoff_entry);
1881 if (entry->tlsdesc_entry)
1883 int idx = dynindx;
1884 bfd_vma ad = addend;
1886 /* If the symbol is dynamic but binds locally, use
1887 section+offset. */
1888 if (sec && (entry->symndx != -1
1889 || FRVFDPIC_SYM_LOCAL (info, entry->d.h)))
1891 if (entry->symndx == -1)
1892 ad += entry->d.h->root.u.def.value;
1893 else
1894 ad += sym->st_value;
1895 ad += sec->output_offset;
1896 if (sec->output_section && elf_section_data (sec->output_section))
1897 idx = elf_section_data (sec->output_section)->dynindx;
1898 else
1899 idx = 0;
1902 /* If we didn't set up a TLS offset entry, but we're linking an
1903 executable and the symbol binds locally, we can use the
1904 module offset in the TLS descriptor in relaxations. */
1905 if (info->executable && ! entry->tlsoff_entry)
1906 entry->tlsoff_entry = entry->tlsdesc_entry + 4;
1908 if (info->executable && !info->pie
1909 && ((idx == 0
1910 && (bfd_is_abs_section (sec)
1911 || bfd_is_und_section (sec)))
1912 || entry->symndx != -1
1913 || FRVFDPIC_SYM_LOCAL (info, entry->d.h)))
1915 /* *ABS*+addend is special for TLS relocations, use only the
1916 addend for the TLS offset, and take the module id as
1917 0. */
1918 if (idx == 0
1919 && (bfd_is_abs_section (sec)
1920 || bfd_is_und_section (sec)))
1922 /* For other TLS symbols that bind locally, add the section
1923 TLS offset to the addend. */
1924 else if (sec)
1925 ad += sec->output_section->vma - tls_biased_base (info);
1927 bfd_put_32 (output_bfd,
1928 frvfdpic_plt_section (info)->output_section->vma
1929 + frvfdpic_plt_section (info)->output_offset
1930 + frvfdpic_plt_tls_ret_offset (info),
1931 frvfdpic_got_section (info)->contents
1932 + frvfdpic_got_initial_offset (info)
1933 + entry->tlsdesc_entry);
1935 _frvfdpic_add_rofixup (output_bfd,
1936 frvfdpic_gotfixup_section (info),
1937 frvfdpic_got_section (info)
1938 ->output_section->vma
1939 + frvfdpic_got_section (info)
1940 ->output_offset
1941 + frvfdpic_got_initial_offset (info)
1942 + entry->tlsdesc_entry, entry);
1944 BFD_ASSERT (frvfdpic_dynamic_got_plt_info (info)->tls_ret_refs);
1946 /* We've used one of the reserved fixups, so discount it so
1947 that we can check at the end that we've used them
1948 all. */
1949 frvfdpic_dynamic_got_plt_info (info)->tls_ret_refs--;
1951 /* While at that, make sure the ret instruction makes to the
1952 right location in the PLT. We could do it only when we
1953 got to 0, but since the check at the end will only print
1954 a warning, make sure we have the ret in place in case the
1955 warning is missed. */
1956 bfd_put_32 (output_bfd, 0xc03a4000,
1957 frvfdpic_plt_section (info)->contents
1958 + frvfdpic_plt_tls_ret_offset (info));
1960 else
1962 if (idx == 0
1963 && (bfd_is_abs_section (sec)
1964 || bfd_is_und_section (sec)))
1966 if (! elf_hash_table (info)->tls_sec)
1968 (*info->callbacks->undefined_symbol)
1969 (info, "TLS section", elf_hash_table (info)->dynobj,
1970 frvfdpic_got_section (info), entry->tlsdesc_entry, TRUE);
1971 return FALSE;
1973 idx = elf_section_data (elf_hash_table (info)->tls_sec)->dynindx;
1974 ad += FRVFDPIC_TLS_BIAS;
1977 _frvfdpic_add_dyn_reloc (output_bfd, frvfdpic_gotrel_section (info),
1978 _bfd_elf_section_offset
1979 (output_bfd, info,
1980 frvfdpic_got_section (info),
1981 frvfdpic_got_initial_offset (info)
1982 + entry->tlsdesc_entry)
1983 + frvfdpic_got_section (info)
1984 ->output_section->vma
1985 + frvfdpic_got_section (info)
1986 ->output_offset,
1987 R_FRV_TLSDESC_VALUE, idx, ad, entry);
1989 bfd_put_32 (output_bfd, 0,
1990 frvfdpic_got_section (info)->contents
1991 + frvfdpic_got_initial_offset (info)
1992 + entry->tlsdesc_entry);
1995 bfd_put_32 (output_bfd, ad,
1996 frvfdpic_got_section (info)->contents
1997 + frvfdpic_got_initial_offset (info)
1998 + entry->tlsdesc_entry + 4);
2001 /* Generate code for the get-TLS-offset PLT entry. */
2002 if (entry->tlsplt_entry != (bfd_vma) -1)
2004 bfd_byte *plt_code = frvfdpic_plt_section (info)->contents
2005 + entry->tlsplt_entry;
2007 if (info->executable
2008 && (entry->symndx != -1
2009 || FRVFDPIC_SYM_LOCAL (info, entry->d.h)))
2011 int idx = dynindx;
2012 bfd_vma ad = addend;
2014 /* sec may be NULL when referencing an undefweak symbol
2015 while linking a static executable. */
2016 if (!sec)
2018 BFD_ASSERT (entry->symndx == -1
2019 && entry->d.h->root.type == bfd_link_hash_undefweak);
2021 else
2023 if (entry->symndx == -1)
2024 ad += entry->d.h->root.u.def.value;
2025 else
2026 ad += sym->st_value;
2027 ad += sec->output_offset;
2028 if (sec->output_section
2029 && elf_section_data (sec->output_section))
2030 idx = elf_section_data (sec->output_section)->dynindx;
2031 else
2032 idx = 0;
2035 /* *ABS*+addend is special for TLS relocations, use only the
2036 addend for the TLS offset, and take the module id as
2037 0. */
2038 if (idx == 0
2039 && (bfd_is_abs_section (sec)
2040 || bfd_is_und_section (sec)))
2042 /* For other TLS symbols that bind locally, add the section
2043 TLS offset to the addend. */
2044 else if (sec)
2045 ad += sec->output_section->vma - tls_biased_base (info);
2047 if ((bfd_signed_vma)ad >= -(1 << (16 - 1))
2048 && (bfd_signed_vma)ad < (1 << (16 - 1)))
2050 /* setlos lo(ad), gr9 */
2051 bfd_put_32 (output_bfd,
2052 0x92fc0000
2053 | (ad
2054 & (((bfd_vma)1 << 16) - 1)),
2055 plt_code);
2056 plt_code += 4;
2058 else
2060 /* sethi.p hi(ad), gr9
2061 setlo lo(ad), gr9 */
2062 bfd_put_32 (output_bfd,
2063 0x12f80000
2064 | ((ad >> 16)
2065 & (((bfd_vma)1 << 16) - 1)),
2066 plt_code);
2067 plt_code += 4;
2068 bfd_put_32 (output_bfd,
2069 0x92f40000
2070 | (ad
2071 & (((bfd_vma)1 << 16) - 1)),
2072 plt_code);
2073 plt_code += 4;
2075 /* ret */
2076 bfd_put_32 (output_bfd, 0xc03a4000, plt_code);
2078 else if (entry->tlsoff_entry)
2080 /* Figure out what kind of PLT entry we need, depending on the
2081 location of the TLS descriptor within the GOT. */
2082 if (entry->tlsoff_entry >= -(1 << (12 - 1))
2083 && entry->tlsoff_entry < (1 << (12 - 1)))
2085 /* ldi @(gr15, tlsoff_entry), gr9 */
2086 bfd_put_32 (output_bfd,
2087 0x92c8f000 | (entry->tlsoff_entry
2088 & ((1 << 12) - 1)),
2089 plt_code);
2090 plt_code += 4;
2092 else
2094 if (entry->tlsoff_entry >= -(1 << (16 - 1))
2095 && entry->tlsoff_entry < (1 << (16 - 1)))
2097 /* setlos lo(tlsoff_entry), gr8 */
2098 bfd_put_32 (output_bfd,
2099 0x90fc0000
2100 | (entry->tlsoff_entry
2101 & (((bfd_vma)1 << 16) - 1)),
2102 plt_code);
2103 plt_code += 4;
2105 else
2107 /* sethi.p hi(tlsoff_entry), gr8
2108 setlo lo(tlsoff_entry), gr8 */
2109 bfd_put_32 (output_bfd,
2110 0x10f80000
2111 | ((entry->tlsoff_entry >> 16)
2112 & (((bfd_vma)1 << 16) - 1)),
2113 plt_code);
2114 plt_code += 4;
2115 bfd_put_32 (output_bfd,
2116 0x90f40000
2117 | (entry->tlsoff_entry
2118 & (((bfd_vma)1 << 16) - 1)),
2119 plt_code);
2120 plt_code += 4;
2122 /* ld @(gr15,gr8),gr9 */
2123 bfd_put_32 (output_bfd, 0x9008f108, plt_code);
2124 plt_code += 4;
2126 /* ret */
2127 bfd_put_32 (output_bfd, 0xc03a4000, plt_code);
2129 else
2131 BFD_ASSERT (entry->tlsdesc_entry);
2133 /* Figure out what kind of PLT entry we need, depending on the
2134 location of the TLS descriptor within the GOT. */
2135 if (entry->tlsdesc_entry >= -(1 << (12 - 1))
2136 && entry->tlsdesc_entry < (1 << (12 - 1)))
2138 /* lddi @(gr15, tlsdesc_entry), gr8 */
2139 bfd_put_32 (output_bfd,
2140 0x90ccf000 | (entry->tlsdesc_entry
2141 & ((1 << 12) - 1)),
2142 plt_code);
2143 plt_code += 4;
2145 else
2147 if (entry->tlsdesc_entry >= -(1 << (16 - 1))
2148 && entry->tlsdesc_entry < (1 << (16 - 1)))
2150 /* setlos lo(tlsdesc_entry), gr8 */
2151 bfd_put_32 (output_bfd,
2152 0x90fc0000
2153 | (entry->tlsdesc_entry
2154 & (((bfd_vma)1 << 16) - 1)),
2155 plt_code);
2156 plt_code += 4;
2158 else
2160 /* sethi.p hi(tlsdesc_entry), gr8
2161 setlo lo(tlsdesc_entry), gr8 */
2162 bfd_put_32 (output_bfd,
2163 0x10f80000
2164 | ((entry->tlsdesc_entry >> 16)
2165 & (((bfd_vma)1 << 16) - 1)),
2166 plt_code);
2167 plt_code += 4;
2168 bfd_put_32 (output_bfd,
2169 0x90f40000
2170 | (entry->tlsdesc_entry
2171 & (((bfd_vma)1 << 16) - 1)),
2172 plt_code);
2173 plt_code += 4;
2175 /* ldd @(gr15,gr8),gr8 */
2176 bfd_put_32 (output_bfd, 0x9008f148, plt_code);
2177 plt_code += 4;
2179 /* jmpl @(gr8,gr0) */
2180 bfd_put_32 (output_bfd, 0x80308000, plt_code);
2184 return TRUE;
2187 /* Handle an FRV small data reloc. */
2189 static bfd_reloc_status_type
2190 elf32_frv_relocate_gprel12 (info, input_bfd, input_section, relocation,
2191 contents, value)
2192 struct bfd_link_info *info;
2193 bfd *input_bfd;
2194 asection *input_section;
2195 Elf_Internal_Rela *relocation;
2196 bfd_byte *contents;
2197 bfd_vma value;
2199 bfd_vma insn;
2200 bfd_vma gp;
2201 struct bfd_link_hash_entry *h;
2203 h = bfd_link_hash_lookup (info->hash, "_gp", FALSE, FALSE, TRUE);
2205 gp = (h->u.def.value
2206 + h->u.def.section->output_section->vma
2207 + h->u.def.section->output_offset);
2209 value -= input_section->output_section->vma;
2210 value -= (gp - input_section->output_section->vma);
2212 insn = bfd_get_32 (input_bfd, contents + relocation->r_offset);
2214 value += relocation->r_addend;
2216 if ((long) value > 0x7ff || (long) value < -0x800)
2217 return bfd_reloc_overflow;
2219 bfd_put_32 (input_bfd,
2220 (insn & 0xfffff000) | (value & 0xfff),
2221 contents + relocation->r_offset);
2223 return bfd_reloc_ok;
2226 /* Handle an FRV small data reloc. for the u12 field. */
2228 static bfd_reloc_status_type
2229 elf32_frv_relocate_gprelu12 (info, input_bfd, input_section, relocation,
2230 contents, value)
2231 struct bfd_link_info *info;
2232 bfd *input_bfd;
2233 asection *input_section;
2234 Elf_Internal_Rela *relocation;
2235 bfd_byte *contents;
2236 bfd_vma value;
2238 bfd_vma insn;
2239 bfd_vma gp;
2240 struct bfd_link_hash_entry *h;
2241 bfd_vma mask;
2243 h = bfd_link_hash_lookup (info->hash, "_gp", FALSE, FALSE, TRUE);
2245 gp = (h->u.def.value
2246 + h->u.def.section->output_section->vma
2247 + h->u.def.section->output_offset);
2249 value -= input_section->output_section->vma;
2250 value -= (gp - input_section->output_section->vma);
2252 insn = bfd_get_32 (input_bfd, contents + relocation->r_offset);
2254 value += relocation->r_addend;
2256 if ((long) value > 0x7ff || (long) value < -0x800)
2257 return bfd_reloc_overflow;
2259 /* The high 6 bits go into bits 17-12. The low 6 bits go into bits 5-0. */
2260 mask = 0x3f03f;
2261 insn = (insn & ~mask) | ((value & 0xfc0) << 12) | (value & 0x3f);
2263 bfd_put_32 (input_bfd, insn, contents + relocation->r_offset);
2265 return bfd_reloc_ok;
2268 /* Handle an FRV ELF HI16 reloc. */
2270 static bfd_reloc_status_type
2271 elf32_frv_relocate_hi16 (input_bfd, relhi, contents, value)
2272 bfd *input_bfd;
2273 Elf_Internal_Rela *relhi;
2274 bfd_byte *contents;
2275 bfd_vma value;
2277 bfd_vma insn;
2279 insn = bfd_get_32 (input_bfd, contents + relhi->r_offset);
2281 value += relhi->r_addend;
2282 value = ((value >> 16) & 0xffff);
2284 insn = (insn & 0xffff0000) | value;
2286 if ((long) value > 0xffff || (long) value < -0x10000)
2287 return bfd_reloc_overflow;
2289 bfd_put_32 (input_bfd, insn, contents + relhi->r_offset);
2290 return bfd_reloc_ok;
2293 static bfd_reloc_status_type
2294 elf32_frv_relocate_lo16 (input_bfd, rello, contents, value)
2295 bfd *input_bfd;
2296 Elf_Internal_Rela *rello;
2297 bfd_byte *contents;
2298 bfd_vma value;
2300 bfd_vma insn;
2302 insn = bfd_get_32 (input_bfd, contents + rello->r_offset);
2304 value += rello->r_addend;
2305 value = value & 0xffff;
2307 insn = (insn & 0xffff0000) | value;
2309 if ((long) value > 0xffff || (long) value < -0x10000)
2310 return bfd_reloc_overflow;
2312 bfd_put_32 (input_bfd, insn, contents + rello->r_offset);
2313 return bfd_reloc_ok;
2316 /* Perform the relocation for the CALL label24 instruction. */
2318 static bfd_reloc_status_type
2319 elf32_frv_relocate_label24 (input_bfd, input_section, rello, contents, value)
2320 bfd *input_bfd;
2321 asection *input_section;
2322 Elf_Internal_Rela *rello;
2323 bfd_byte *contents;
2324 bfd_vma value;
2326 bfd_vma insn;
2327 bfd_vma label6;
2328 bfd_vma label18;
2330 /* The format for the call instruction is:
2332 0 000000 0001111 000000000000000000
2333 label6 opcode label18
2335 The branch calculation is: pc + (4*label24)
2336 where label24 is the concatenation of label6 and label18. */
2338 /* Grab the instruction. */
2339 insn = bfd_get_32 (input_bfd, contents + rello->r_offset);
2341 value -= input_section->output_section->vma + input_section->output_offset;
2342 value -= rello->r_offset;
2343 value += rello->r_addend;
2345 value = value >> 2;
2347 label6 = value & 0xfc0000;
2348 label6 = label6 << 7;
2350 label18 = value & 0x3ffff;
2352 insn = insn & 0x803c0000;
2353 insn = insn | label6;
2354 insn = insn | label18;
2356 bfd_put_32 (input_bfd, insn, contents + rello->r_offset);
2358 return bfd_reloc_ok;
2361 static bfd_reloc_status_type
2362 elf32_frv_relocate_gprelhi (info, input_bfd, input_section, relocation,
2363 contents, value)
2364 struct bfd_link_info *info;
2365 bfd *input_bfd;
2366 asection *input_section;
2367 Elf_Internal_Rela *relocation;
2368 bfd_byte *contents;
2369 bfd_vma value;
2371 bfd_vma insn;
2372 bfd_vma gp;
2373 struct bfd_link_hash_entry *h;
2375 h = bfd_link_hash_lookup (info->hash, "_gp", FALSE, FALSE, TRUE);
2377 gp = (h->u.def.value
2378 + h->u.def.section->output_section->vma
2379 + h->u.def.section->output_offset);
2381 value -= input_section->output_section->vma;
2382 value -= (gp - input_section->output_section->vma);
2383 value += relocation->r_addend;
2384 value = ((value >> 16) & 0xffff);
2386 if ((long) value > 0xffff || (long) value < -0x10000)
2387 return bfd_reloc_overflow;
2389 insn = bfd_get_32 (input_bfd, contents + relocation->r_offset);
2390 insn = (insn & 0xffff0000) | value;
2392 bfd_put_32 (input_bfd, insn, contents + relocation->r_offset);
2393 return bfd_reloc_ok;
2396 static bfd_reloc_status_type
2397 elf32_frv_relocate_gprello (info, input_bfd, input_section, relocation,
2398 contents, value)
2399 struct bfd_link_info *info;
2400 bfd *input_bfd;
2401 asection *input_section;
2402 Elf_Internal_Rela *relocation;
2403 bfd_byte *contents;
2404 bfd_vma value;
2406 bfd_vma insn;
2407 bfd_vma gp;
2408 struct bfd_link_hash_entry *h;
2410 h = bfd_link_hash_lookup (info->hash, "_gp", FALSE, FALSE, TRUE);
2412 gp = (h->u.def.value
2413 + h->u.def.section->output_section->vma
2414 + h->u.def.section->output_offset);
2416 value -= input_section->output_section->vma;
2417 value -= (gp - input_section->output_section->vma);
2418 value += relocation->r_addend;
2419 value = value & 0xffff;
2421 if ((long) value > 0xffff || (long) value < -0x10000)
2422 return bfd_reloc_overflow;
2424 insn = bfd_get_32 (input_bfd, contents + relocation->r_offset);
2425 insn = (insn & 0xffff0000) | value;
2427 bfd_put_32 (input_bfd, insn, contents + relocation->r_offset);
2429 return bfd_reloc_ok;
2432 static reloc_howto_type *
2433 frv_reloc_type_lookup (abfd, code)
2434 bfd *abfd ATTRIBUTE_UNUSED;
2435 bfd_reloc_code_real_type code;
2437 switch (code)
2439 default:
2440 break;
2442 case BFD_RELOC_NONE:
2443 return &elf32_frv_howto_table[ (int) R_FRV_NONE];
2445 case BFD_RELOC_32:
2446 if (elf_elfheader (abfd)->e_type == ET_EXEC
2447 || elf_elfheader (abfd)->e_type == ET_DYN)
2448 return &elf32_frv_rel_32_howto;
2449 /* Fall through. */
2450 case BFD_RELOC_CTOR:
2451 return &elf32_frv_howto_table[ (int) R_FRV_32];
2453 case BFD_RELOC_FRV_LABEL16:
2454 return &elf32_frv_howto_table[ (int) R_FRV_LABEL16];
2456 case BFD_RELOC_FRV_LABEL24:
2457 return &elf32_frv_howto_table[ (int) R_FRV_LABEL24];
2459 case BFD_RELOC_FRV_LO16:
2460 return &elf32_frv_howto_table[ (int) R_FRV_LO16];
2462 case BFD_RELOC_FRV_HI16:
2463 return &elf32_frv_howto_table[ (int) R_FRV_HI16];
2465 case BFD_RELOC_FRV_GPREL12:
2466 return &elf32_frv_howto_table[ (int) R_FRV_GPREL12];
2468 case BFD_RELOC_FRV_GPRELU12:
2469 return &elf32_frv_howto_table[ (int) R_FRV_GPRELU12];
2471 case BFD_RELOC_FRV_GPREL32:
2472 return &elf32_frv_howto_table[ (int) R_FRV_GPREL32];
2474 case BFD_RELOC_FRV_GPRELHI:
2475 return &elf32_frv_howto_table[ (int) R_FRV_GPRELHI];
2477 case BFD_RELOC_FRV_GPRELLO:
2478 return &elf32_frv_howto_table[ (int) R_FRV_GPRELLO];
2480 case BFD_RELOC_FRV_GOT12:
2481 return &elf32_frv_howto_table[ (int) R_FRV_GOT12];
2483 case BFD_RELOC_FRV_GOTHI:
2484 return &elf32_frv_howto_table[ (int) R_FRV_GOTHI];
2486 case BFD_RELOC_FRV_GOTLO:
2487 return &elf32_frv_howto_table[ (int) R_FRV_GOTLO];
2489 case BFD_RELOC_FRV_FUNCDESC:
2490 if (elf_elfheader (abfd)->e_type == ET_EXEC
2491 || elf_elfheader (abfd)->e_type == ET_DYN)
2492 return &elf32_frv_rel_funcdesc_howto;
2493 return &elf32_frv_howto_table[ (int) R_FRV_FUNCDESC];
2495 case BFD_RELOC_FRV_FUNCDESC_GOT12:
2496 return &elf32_frv_howto_table[ (int) R_FRV_FUNCDESC_GOT12];
2498 case BFD_RELOC_FRV_FUNCDESC_GOTHI:
2499 return &elf32_frv_howto_table[ (int) R_FRV_FUNCDESC_GOTHI];
2501 case BFD_RELOC_FRV_FUNCDESC_GOTLO:
2502 return &elf32_frv_howto_table[ (int) R_FRV_FUNCDESC_GOTLO];
2504 case BFD_RELOC_FRV_FUNCDESC_VALUE:
2505 if (elf_elfheader (abfd)->e_type == ET_EXEC
2506 || elf_elfheader (abfd)->e_type == ET_DYN)
2507 return &elf32_frv_rel_funcdesc_value_howto;
2508 return &elf32_frv_howto_table[ (int) R_FRV_FUNCDESC_VALUE];
2510 case BFD_RELOC_FRV_FUNCDESC_GOTOFF12:
2511 return &elf32_frv_howto_table[ (int) R_FRV_FUNCDESC_GOTOFF12];
2513 case BFD_RELOC_FRV_FUNCDESC_GOTOFFHI:
2514 return &elf32_frv_howto_table[ (int) R_FRV_FUNCDESC_GOTOFFHI];
2516 case BFD_RELOC_FRV_FUNCDESC_GOTOFFLO:
2517 return &elf32_frv_howto_table[ (int) R_FRV_FUNCDESC_GOTOFFLO];
2519 case BFD_RELOC_FRV_GOTOFF12:
2520 return &elf32_frv_howto_table[ (int) R_FRV_GOTOFF12];
2522 case BFD_RELOC_FRV_GOTOFFHI:
2523 return &elf32_frv_howto_table[ (int) R_FRV_GOTOFFHI];
2525 case BFD_RELOC_FRV_GOTOFFLO:
2526 return &elf32_frv_howto_table[ (int) R_FRV_GOTOFFLO];
2528 case BFD_RELOC_FRV_GETTLSOFF:
2529 return &elf32_frv_howto_table[ (int) R_FRV_GETTLSOFF];
2531 case BFD_RELOC_FRV_TLSDESC_VALUE:
2532 if (elf_elfheader (abfd)->e_type == ET_EXEC
2533 || elf_elfheader (abfd)->e_type == ET_DYN)
2534 return &elf32_frv_rel_tlsdesc_value_howto;
2535 return &elf32_frv_howto_table[ (int) R_FRV_TLSDESC_VALUE];
2537 case BFD_RELOC_FRV_GOTTLSDESC12:
2538 return &elf32_frv_howto_table[ (int) R_FRV_GOTTLSDESC12];
2540 case BFD_RELOC_FRV_GOTTLSDESCHI:
2541 return &elf32_frv_howto_table[ (int) R_FRV_GOTTLSDESCHI];
2543 case BFD_RELOC_FRV_GOTTLSDESCLO:
2544 return &elf32_frv_howto_table[ (int) R_FRV_GOTTLSDESCLO];
2546 case BFD_RELOC_FRV_TLSMOFF12:
2547 return &elf32_frv_howto_table[ (int) R_FRV_TLSMOFF12];
2549 case BFD_RELOC_FRV_TLSMOFFHI:
2550 return &elf32_frv_howto_table[ (int) R_FRV_TLSMOFFHI];
2552 case BFD_RELOC_FRV_TLSMOFFLO:
2553 return &elf32_frv_howto_table[ (int) R_FRV_TLSMOFFLO];
2555 case BFD_RELOC_FRV_GOTTLSOFF12:
2556 return &elf32_frv_howto_table[ (int) R_FRV_GOTTLSOFF12];
2558 case BFD_RELOC_FRV_GOTTLSOFFHI:
2559 return &elf32_frv_howto_table[ (int) R_FRV_GOTTLSOFFHI];
2561 case BFD_RELOC_FRV_GOTTLSOFFLO:
2562 return &elf32_frv_howto_table[ (int) R_FRV_GOTTLSOFFLO];
2564 case BFD_RELOC_FRV_TLSOFF:
2565 if (elf_elfheader (abfd)->e_type == ET_EXEC
2566 || elf_elfheader (abfd)->e_type == ET_DYN)
2567 return &elf32_frv_rel_tlsoff_howto;
2568 return &elf32_frv_howto_table[ (int) R_FRV_TLSOFF];
2570 case BFD_RELOC_FRV_TLSDESC_RELAX:
2571 return &elf32_frv_howto_table[ (int) R_FRV_TLSDESC_RELAX];
2573 case BFD_RELOC_FRV_GETTLSOFF_RELAX:
2574 return &elf32_frv_howto_table[ (int) R_FRV_GETTLSOFF_RELAX];
2576 case BFD_RELOC_FRV_TLSOFF_RELAX:
2577 return &elf32_frv_howto_table[ (int) R_FRV_TLSOFF_RELAX];
2579 case BFD_RELOC_FRV_TLSMOFF:
2580 return &elf32_frv_howto_table[ (int) R_FRV_TLSMOFF];
2582 case BFD_RELOC_VTABLE_INHERIT:
2583 return &elf32_frv_vtinherit_howto;
2585 case BFD_RELOC_VTABLE_ENTRY:
2586 return &elf32_frv_vtentry_howto;
2589 return NULL;
2592 /* Set the howto pointer for an FRV ELF reloc. */
2594 static void
2595 frv_info_to_howto_rela (abfd, cache_ptr, dst)
2596 bfd *abfd ATTRIBUTE_UNUSED;
2597 arelent *cache_ptr;
2598 Elf_Internal_Rela *dst;
2600 unsigned int r_type;
2602 r_type = ELF32_R_TYPE (dst->r_info);
2603 switch (r_type)
2605 case R_FRV_GNU_VTINHERIT:
2606 cache_ptr->howto = &elf32_frv_vtinherit_howto;
2607 break;
2609 case R_FRV_GNU_VTENTRY:
2610 cache_ptr->howto = &elf32_frv_vtentry_howto;
2611 break;
2613 default:
2614 cache_ptr->howto = & elf32_frv_howto_table [r_type];
2615 break;
2619 /* Set the howto pointer for an FRV ELF REL reloc. */
2620 static void
2621 frvfdpic_info_to_howto_rel (bfd *abfd ATTRIBUTE_UNUSED,
2622 arelent *cache_ptr, Elf_Internal_Rela *dst)
2624 unsigned int r_type;
2626 r_type = ELF32_R_TYPE (dst->r_info);
2627 switch (r_type)
2629 case R_FRV_32:
2630 cache_ptr->howto = &elf32_frv_rel_32_howto;
2631 break;
2633 case R_FRV_FUNCDESC:
2634 cache_ptr->howto = &elf32_frv_rel_funcdesc_howto;
2635 break;
2637 case R_FRV_FUNCDESC_VALUE:
2638 cache_ptr->howto = &elf32_frv_rel_funcdesc_value_howto;
2639 break;
2641 case R_FRV_TLSDESC_VALUE:
2642 cache_ptr->howto = &elf32_frv_rel_tlsdesc_value_howto;
2643 break;
2645 case R_FRV_TLSOFF:
2646 cache_ptr->howto = &elf32_frv_rel_tlsoff_howto;
2647 break;
2649 default:
2650 cache_ptr->howto = NULL;
2651 break;
2655 /* Perform a single relocation. By default we use the standard BFD
2656 routines, but a few relocs, we have to do them ourselves. */
2658 static bfd_reloc_status_type
2659 frv_final_link_relocate (howto, input_bfd, input_section, contents, rel,
2660 relocation)
2661 reloc_howto_type *howto;
2662 bfd *input_bfd;
2663 asection *input_section;
2664 bfd_byte *contents;
2665 Elf_Internal_Rela *rel;
2666 bfd_vma relocation;
2668 return _bfd_final_link_relocate (howto, input_bfd, input_section,
2669 contents, rel->r_offset, relocation,
2670 rel->r_addend);
2674 /* Relocate an FRV ELF section.
2676 The RELOCATE_SECTION function is called by the new ELF backend linker
2677 to handle the relocations for a section.
2679 The relocs are always passed as Rela structures; if the section
2680 actually uses Rel structures, the r_addend field will always be
2681 zero.
2683 This function is responsible for adjusting the section contents as
2684 necessary, and (if using Rela relocs and generating a relocatable
2685 output file) adjusting the reloc addend as necessary.
2687 This function does not have to worry about setting the reloc
2688 address or the reloc symbol index.
2690 LOCAL_SYMS is a pointer to the swapped in local symbols.
2692 LOCAL_SECTIONS is an array giving the section in the input file
2693 corresponding to the st_shndx field of each local symbol.
2695 The global hash table entry for the global symbols can be found
2696 via elf_sym_hashes (input_bfd).
2698 When generating relocatable output, this function must handle
2699 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
2700 going to be the section symbol corresponding to the output
2701 section, which means that the addend must be adjusted
2702 accordingly. */
2704 static bfd_boolean
2705 elf32_frv_relocate_section (output_bfd, info, input_bfd, input_section,
2706 contents, relocs, local_syms, local_sections)
2707 bfd *output_bfd ATTRIBUTE_UNUSED;
2708 struct bfd_link_info *info;
2709 bfd *input_bfd;
2710 asection *input_section;
2711 bfd_byte *contents;
2712 Elf_Internal_Rela *relocs;
2713 Elf_Internal_Sym *local_syms;
2714 asection **local_sections;
2716 Elf_Internal_Shdr *symtab_hdr;
2717 struct elf_link_hash_entry **sym_hashes;
2718 Elf_Internal_Rela *rel;
2719 Elf_Internal_Rela *relend;
2720 unsigned isec_segment, got_segment, plt_segment, gprel_segment, tls_segment,
2721 check_segment[2];
2722 int silence_segment_error = !(info->shared || info->pie);
2723 unsigned long insn;
2725 if (info->relocatable)
2726 return TRUE;
2728 symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr;
2729 sym_hashes = elf_sym_hashes (input_bfd);
2730 relend = relocs + input_section->reloc_count;
2732 isec_segment = _frvfdpic_osec_to_segment (output_bfd,
2733 input_section->output_section);
2734 if (IS_FDPIC (output_bfd) && frvfdpic_got_section (info))
2735 got_segment = _frvfdpic_osec_to_segment (output_bfd,
2736 frvfdpic_got_section (info)
2737 ->output_section);
2738 else
2739 got_segment = -1;
2740 if (IS_FDPIC (output_bfd) && frvfdpic_gotfixup_section (info))
2741 gprel_segment = _frvfdpic_osec_to_segment (output_bfd,
2742 frvfdpic_gotfixup_section (info)
2743 ->output_section);
2744 else
2745 gprel_segment = -1;
2746 if (IS_FDPIC (output_bfd) && frvfdpic_plt_section (info))
2747 plt_segment = _frvfdpic_osec_to_segment (output_bfd,
2748 frvfdpic_plt_section (info)
2749 ->output_section);
2750 else
2751 plt_segment = -1;
2752 if (elf_hash_table (info)->tls_sec)
2753 tls_segment = _frvfdpic_osec_to_segment (output_bfd,
2754 elf_hash_table (info)->tls_sec);
2755 else
2756 tls_segment = -1;
2758 for (rel = relocs; rel < relend; rel ++)
2760 reloc_howto_type *howto;
2761 unsigned long r_symndx;
2762 Elf_Internal_Sym *sym;
2763 asection *sec;
2764 struct elf_link_hash_entry *h;
2765 bfd_vma relocation;
2766 bfd_reloc_status_type r;
2767 const char * name = NULL;
2768 int r_type;
2769 asection *osec;
2770 struct frvfdpic_relocs_info *picrel;
2771 bfd_vma orig_addend = rel->r_addend;
2773 r_type = ELF32_R_TYPE (rel->r_info);
2775 if ( r_type == R_FRV_GNU_VTINHERIT
2776 || r_type == R_FRV_GNU_VTENTRY)
2777 continue;
2779 /* This is a final link. */
2780 r_symndx = ELF32_R_SYM (rel->r_info);
2781 howto = elf32_frv_howto_table + ELF32_R_TYPE (rel->r_info);
2782 h = NULL;
2783 sym = NULL;
2784 sec = NULL;
2786 if (r_symndx < symtab_hdr->sh_info)
2788 sym = local_syms + r_symndx;
2789 osec = sec = local_sections [r_symndx];
2790 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
2792 name = bfd_elf_string_from_elf_section
2793 (input_bfd, symtab_hdr->sh_link, sym->st_name);
2794 name = (name == NULL) ? bfd_section_name (input_bfd, sec) : name;
2796 else
2798 h = sym_hashes [r_symndx - symtab_hdr->sh_info];
2800 while (h->root.type == bfd_link_hash_indirect
2801 || h->root.type == bfd_link_hash_warning)
2802 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2804 name = h->root.root.string;
2806 if ((h->root.type == bfd_link_hash_defined
2807 || h->root.type == bfd_link_hash_defweak))
2809 if (/* TLSMOFF forces local binding. */
2810 r_type != R_FRV_TLSMOFF
2811 && ! FRVFDPIC_SYM_LOCAL (info, h))
2813 sec = NULL;
2814 relocation = 0;
2816 else
2818 sec = h->root.u.def.section;
2819 relocation = (h->root.u.def.value
2820 + sec->output_section->vma
2821 + sec->output_offset);
2824 else if (h->root.type == bfd_link_hash_undefweak)
2826 relocation = 0;
2828 else if (info->unresolved_syms_in_objects == RM_IGNORE
2829 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
2830 relocation = 0;
2831 else
2833 if (! ((*info->callbacks->undefined_symbol)
2834 (info, h->root.root.string, input_bfd,
2835 input_section, rel->r_offset,
2836 (info->unresolved_syms_in_objects == RM_GENERATE_ERROR
2837 || ELF_ST_VISIBILITY (h->other)))))
2838 return FALSE;
2839 relocation = 0;
2841 osec = sec;
2844 switch (r_type)
2846 case R_FRV_LABEL24:
2847 case R_FRV_32:
2848 if (! IS_FDPIC (output_bfd))
2849 goto non_fdpic;
2851 case R_FRV_GOT12:
2852 case R_FRV_GOTHI:
2853 case R_FRV_GOTLO:
2854 case R_FRV_FUNCDESC_GOT12:
2855 case R_FRV_FUNCDESC_GOTHI:
2856 case R_FRV_FUNCDESC_GOTLO:
2857 case R_FRV_GOTOFF12:
2858 case R_FRV_GOTOFFHI:
2859 case R_FRV_GOTOFFLO:
2860 case R_FRV_FUNCDESC_GOTOFF12:
2861 case R_FRV_FUNCDESC_GOTOFFHI:
2862 case R_FRV_FUNCDESC_GOTOFFLO:
2863 case R_FRV_FUNCDESC:
2864 case R_FRV_FUNCDESC_VALUE:
2865 case R_FRV_GETTLSOFF:
2866 case R_FRV_TLSDESC_VALUE:
2867 case R_FRV_GOTTLSDESC12:
2868 case R_FRV_GOTTLSDESCHI:
2869 case R_FRV_GOTTLSDESCLO:
2870 case R_FRV_TLSMOFF12:
2871 case R_FRV_TLSMOFFHI:
2872 case R_FRV_TLSMOFFLO:
2873 case R_FRV_GOTTLSOFF12:
2874 case R_FRV_GOTTLSOFFHI:
2875 case R_FRV_GOTTLSOFFLO:
2876 case R_FRV_TLSOFF:
2877 case R_FRV_TLSDESC_RELAX:
2878 case R_FRV_GETTLSOFF_RELAX:
2879 case R_FRV_TLSOFF_RELAX:
2880 case R_FRV_TLSMOFF:
2881 if (h != NULL)
2882 picrel = frvfdpic_relocs_info_for_global (frvfdpic_relocs_info
2883 (info), input_bfd, h,
2884 orig_addend, INSERT);
2885 else
2886 /* In order to find the entry we created before, we must
2887 use the original addend, not the one that may have been
2888 modified by _bfd_elf_rela_local_sym(). */
2889 picrel = frvfdpic_relocs_info_for_local (frvfdpic_relocs_info
2890 (info), input_bfd, r_symndx,
2891 orig_addend, INSERT);
2892 if (! picrel)
2893 return FALSE;
2895 if (!_frvfdpic_emit_got_relocs_plt_entries (picrel, output_bfd, info,
2896 osec, sym,
2897 rel->r_addend))
2899 (*_bfd_error_handler)
2900 (_("%B(%A+0x%x): relocation to `%s+%x' may have caused the error above"),
2901 input_bfd, input_section, rel->r_offset, name, rel->r_addend);
2902 return FALSE;
2905 break;
2907 default:
2908 non_fdpic:
2909 picrel = NULL;
2910 if (h && ! FRVFDPIC_SYM_LOCAL (info, h))
2912 info->callbacks->warning
2913 (info, _("relocation references symbol not defined in the module"),
2914 name, input_bfd, input_section, rel->r_offset);
2915 return FALSE;
2917 break;
2920 switch (r_type)
2922 case R_FRV_GETTLSOFF:
2923 case R_FRV_TLSDESC_VALUE:
2924 case R_FRV_GOTTLSDESC12:
2925 case R_FRV_GOTTLSDESCHI:
2926 case R_FRV_GOTTLSDESCLO:
2927 case R_FRV_TLSMOFF12:
2928 case R_FRV_TLSMOFFHI:
2929 case R_FRV_TLSMOFFLO:
2930 case R_FRV_GOTTLSOFF12:
2931 case R_FRV_GOTTLSOFFHI:
2932 case R_FRV_GOTTLSOFFLO:
2933 case R_FRV_TLSOFF:
2934 case R_FRV_TLSDESC_RELAX:
2935 case R_FRV_GETTLSOFF_RELAX:
2936 case R_FRV_TLSOFF_RELAX:
2937 case R_FRV_TLSMOFF:
2938 if (sec && (bfd_is_abs_section (sec) || bfd_is_und_section (sec)))
2939 relocation += tls_biased_base (info);
2940 break;
2942 default:
2943 break;
2946 /* Try to apply TLS relaxations. */
2947 if (1)
2948 switch (r_type)
2951 #define LOCAL_EXEC_P(info, picrel) \
2952 ((info)->executable \
2953 && (picrel->symndx != -1 || FRVFDPIC_SYM_LOCAL ((info), (picrel)->d.h)))
2954 #define INITIAL_EXEC_P(info, picrel) \
2955 (((info)->executable || (info)->flags & DF_STATIC_TLS) \
2956 && (picrel)->tlsoff_entry)
2958 #define IN_RANGE_FOR_OFST12_P(value) \
2959 ((bfd_vma)((value) + 2048) < (bfd_vma)4096)
2960 #define IN_RANGE_FOR_SETLOS_P(value) \
2961 ((bfd_vma)((value) + 32768) < (bfd_vma)65536)
2962 #define TLSMOFF_IN_RANGE_FOR_SETLOS_P(value, info) \
2963 (IN_RANGE_FOR_SETLOS_P ((value) - tls_biased_base (info)))
2965 #define RELAX_GETTLSOFF_LOCAL_EXEC_P(info, picrel, value) \
2966 (LOCAL_EXEC_P ((info), (picrel)) \
2967 && TLSMOFF_IN_RANGE_FOR_SETLOS_P((value), (info)))
2968 #define RELAX_GETTLSOFF_INITIAL_EXEC_P(info, picrel) \
2969 (INITIAL_EXEC_P ((info), (picrel)) \
2970 && IN_RANGE_FOR_OFST12_P ((picrel)->tlsoff_entry))
2972 #define RELAX_TLSDESC_LOCAL_EXEC_P(info, picrel, value) \
2973 (LOCAL_EXEC_P ((info), (picrel)))
2974 #define RELAX_TLSDESC_INITIAL_EXEC_P(info, picrel) \
2975 (INITIAL_EXEC_P ((info), (picrel)))
2977 #define RELAX_GOTTLSOFF_LOCAL_EXEC_P(info, picrel, value) \
2978 (LOCAL_EXEC_P ((info), (picrel)) \
2979 && TLSMOFF_IN_RANGE_FOR_SETLOS_P((value), (info)))
2981 case R_FRV_GETTLSOFF:
2982 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2984 /* Is this a call instruction? */
2985 if ((insn & (unsigned long)0x01fc0000) != 0x003c0000)
2987 r = info->callbacks->warning
2988 (info,
2989 _("R_FRV_GETTLSOFF not applied to a call instruction"),
2990 name, input_bfd, input_section, rel->r_offset);
2991 return FALSE;
2994 if (RELAX_GETTLSOFF_LOCAL_EXEC_P (info, picrel,
2995 relocation + rel->r_addend))
2997 /* Replace the call instruction (except the packing bit)
2998 with setlos #tlsmofflo(symbol+offset), gr9. */
2999 insn &= (unsigned long)0x80000000;
3000 insn |= (unsigned long)0x12fc0000;
3001 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3003 r_type = R_FRV_TLSMOFFLO;
3004 howto = elf32_frv_howto_table + r_type;
3005 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3008 else if (RELAX_GETTLSOFF_INITIAL_EXEC_P (info, picrel))
3010 /* Replace the call instruction (except the packing bit)
3011 with ldi @(gr15, #gottlsoff12(symbol+addend)), gr9. */
3012 insn &= (unsigned long)0x80000000;
3013 insn |= (unsigned long)0x12c8f000;
3014 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3016 r_type = R_FRV_GOTTLSOFF12;
3017 howto = elf32_frv_howto_table + r_type;
3018 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3021 break;
3023 case R_FRV_GOTTLSDESC12:
3024 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3026 /* Is this an lddi instruction? */
3027 if ((insn & (unsigned long)0x01fc0000) != 0x00cc0000)
3029 r = info->callbacks->warning
3030 (info,
3031 _("R_FRV_GOTTLSDESC12 not applied to an lddi instruction"),
3032 name, input_bfd, input_section, rel->r_offset);
3033 return FALSE;
3036 if (RELAX_TLSDESC_LOCAL_EXEC_P (info, picrel,
3037 relocation + rel->r_addend)
3038 && TLSMOFF_IN_RANGE_FOR_SETLOS_P (relocation + rel->r_addend,
3039 info))
3041 /* Replace lddi @(grB, #gottlsdesc12(symbol+offset), grC
3042 with setlos #tlsmofflo(symbol+offset), gr<C+1>.
3043 Preserve the packing bit. */
3044 insn = (insn & (unsigned long)0x80000000)
3045 | ((insn + (unsigned long)0x02000000)
3046 & (unsigned long)0x7e000000);
3047 insn |= (unsigned long)0x00fc0000;
3048 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3050 r_type = R_FRV_TLSMOFFLO;
3051 howto = elf32_frv_howto_table + r_type;
3052 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3055 else if (RELAX_TLSDESC_LOCAL_EXEC_P (info, picrel,
3056 relocation + rel->r_addend))
3058 /* Replace lddi @(grB, #gottlsdesc12(symbol+offset), grC
3059 with sethi #tlsmoffhi(symbol+offset), gr<C+1>.
3060 Preserve the packing bit. */
3061 insn = (insn & (unsigned long)0x80000000)
3062 | ((insn + (unsigned long)0x02000000)
3063 & (unsigned long)0x7e000000);
3064 insn |= (unsigned long)0x00f80000;
3065 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3067 r_type = R_FRV_TLSMOFFHI;
3068 howto = elf32_frv_howto_table + r_type;
3069 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3072 else if (RELAX_TLSDESC_INITIAL_EXEC_P (info, picrel))
3074 /* Replace lddi @(grB, #gottlsdesc12(symbol+offset), grC
3075 with ldi @(grB, #gottlsoff12(symbol+offset),
3076 gr<C+1>. Preserve the packing bit. If gottlsoff12
3077 overflows, we'll error out, but that's sort-of ok,
3078 since we'd started with gottlsdesc12, that's actually
3079 more demanding. Compiling with -fPIE instead of
3080 -fpie would fix it; linking with --relax should fix
3081 it as well. */
3082 insn = (insn & (unsigned long)0x80cbf000)
3083 | ((insn + (unsigned long)0x02000000)
3084 & (unsigned long)0x7e000000);
3085 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3087 r_type = R_FRV_GOTTLSOFF12;
3088 howto = elf32_frv_howto_table + r_type;
3089 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3092 break;
3094 case R_FRV_GOTTLSDESCHI:
3095 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3097 /* Is this a sethi instruction? */
3098 if ((insn & (unsigned long)0x01ff0000) != 0x00f80000)
3100 r = info->callbacks->warning
3101 (info,
3102 _("R_FRV_GOTTLSDESCHI not applied to a sethi instruction"),
3103 name, input_bfd, input_section, rel->r_offset);
3104 return FALSE;
3107 if (RELAX_TLSDESC_LOCAL_EXEC_P (info, picrel,
3108 relocation + rel->r_addend)
3109 || (RELAX_TLSDESC_INITIAL_EXEC_P (info, picrel)
3110 && IN_RANGE_FOR_SETLOS_P (picrel->tlsoff_entry)))
3112 /* Replace sethi with a nop. Preserve the packing bit. */
3113 insn &= (unsigned long)0x80000000;
3114 insn |= (unsigned long)0x00880000;
3115 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3117 /* Nothing to relocate. */
3118 continue;
3121 else if (RELAX_TLSDESC_INITIAL_EXEC_P (info, picrel))
3123 /* Simply decay GOTTLSDESC to GOTTLSOFF. */
3124 r_type = R_FRV_GOTTLSOFFHI;
3125 howto = elf32_frv_howto_table + r_type;
3126 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3129 break;
3131 case R_FRV_GOTTLSDESCLO:
3132 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3134 /* Is this a setlo or setlos instruction? */
3135 if ((insn & (unsigned long)0x01f70000) != 0x00f40000)
3137 r = info->callbacks->warning
3138 (info,
3139 _("R_FRV_GOTTLSDESCLO"
3140 " not applied to a setlo or setlos instruction"),
3141 name, input_bfd, input_section, rel->r_offset);
3142 return FALSE;
3145 if (RELAX_TLSDESC_LOCAL_EXEC_P (info, picrel,
3146 relocation + rel->r_addend)
3147 || (RELAX_TLSDESC_INITIAL_EXEC_P (info, picrel)
3148 && IN_RANGE_FOR_OFST12_P (picrel->tlsoff_entry)))
3150 /* Replace setlo/setlos with a nop. Preserve the
3151 packing bit. */
3152 insn &= (unsigned long)0x80000000;
3153 insn |= (unsigned long)0x00880000;
3154 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3156 /* Nothing to relocate. */
3157 continue;
3160 else if (RELAX_TLSDESC_INITIAL_EXEC_P (info, picrel))
3162 /* If the corresponding sethi (if it exists) decayed
3163 to a nop, make sure this becomes (or already is) a
3164 setlos, not setlo. */
3165 if (IN_RANGE_FOR_SETLOS_P (picrel->tlsoff_entry))
3167 insn |= (unsigned long)0x00080000;
3168 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3171 /* Simply decay GOTTLSDESC to GOTTLSOFF. */
3172 r_type = R_FRV_GOTTLSOFFLO;
3173 howto = elf32_frv_howto_table + r_type;
3174 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3177 break;
3179 case R_FRV_TLSDESC_RELAX:
3180 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3182 /* Is this an ldd instruction? */
3183 if ((insn & (unsigned long)0x01fc0fc0) != 0x00080140)
3185 r = info->callbacks->warning
3186 (info,
3187 _("R_FRV_TLSDESC_RELAX not applied to an ldd instruction"),
3188 name, input_bfd, input_section, rel->r_offset);
3189 return FALSE;
3192 if (RELAX_TLSDESC_LOCAL_EXEC_P (info, picrel,
3193 relocation + rel->r_addend)
3194 && TLSMOFF_IN_RANGE_FOR_SETLOS_P (relocation + rel->r_addend,
3195 info))
3197 /* Replace ldd #tlsdesc(symbol+offset)@(grB, grA), grC
3198 with setlos #tlsmofflo(symbol+offset), gr<C+1>.
3199 Preserve the packing bit. */
3200 insn = (insn & (unsigned long)0x80000000)
3201 | ((insn + (unsigned long)0x02000000)
3202 & (unsigned long)0x7e000000);
3203 insn |= (unsigned long)0x00fc0000;
3204 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3206 r_type = R_FRV_TLSMOFFLO;
3207 howto = elf32_frv_howto_table + r_type;
3208 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3211 else if (RELAX_TLSDESC_LOCAL_EXEC_P (info, picrel,
3212 relocation + rel->r_addend))
3214 /* Replace ldd #tlsdesc(symbol+offset)@(grB, grA), grC
3215 with sethi #tlsmoffhi(symbol+offset), gr<C+1>.
3216 Preserve the packing bit. */
3217 insn = (insn & (unsigned long)0x80000000)
3218 | ((insn + (unsigned long)0x02000000)
3219 & (unsigned long)0x7e000000);
3220 insn |= (unsigned long)0x00f80000;
3221 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3223 r_type = R_FRV_TLSMOFFHI;
3224 howto = elf32_frv_howto_table + r_type;
3225 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3228 else if (RELAX_TLSDESC_INITIAL_EXEC_P (info, picrel)
3229 && IN_RANGE_FOR_OFST12_P (picrel->tlsoff_entry))
3231 /* Replace ldd #tlsdesc(symbol+offset)@(grB, grA), grC
3232 with ldi @(grB, #gottlsoff12(symbol+offset), gr<C+1>.
3233 Preserve the packing bit. */
3234 insn = (insn & (unsigned long)0x8003f000)
3235 | (unsigned long)0x00c80000
3236 | ((insn + (unsigned long)0x02000000)
3237 & (unsigned long)0x7e000000);
3238 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3240 r_type = R_FRV_GOTTLSOFF12;
3241 howto = elf32_frv_howto_table + r_type;
3242 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3245 else if (RELAX_TLSDESC_INITIAL_EXEC_P (info, picrel))
3247 /* Replace ldd #tlsdesc(symbol+offset)@(grB, grA), grC
3248 with ld #tlsoff(symbol+offset)@(grB, grA), gr<C+1>.
3249 Preserve the packing bit. */
3250 insn = (insn & (unsigned long)0x81ffffbf)
3251 | ((insn + (unsigned long)0x02000000)
3252 & (unsigned long)0x7e000000);
3253 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3255 /* #tlsoff(symbol+offset) is just a relaxation
3256 annotation, so there's nothing left to
3257 relocate. */
3258 continue;
3261 break;
3263 case R_FRV_GETTLSOFF_RELAX:
3264 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3266 /* Is this a calll or callil instruction? */
3267 if ((insn & (unsigned long)0x7ff80fc0) != 0x02300000)
3269 r = info->callbacks->warning
3270 (info,
3271 _("R_FRV_GETTLSOFF_RELAX"
3272 " not applied to a calll instruction"),
3273 name, input_bfd, input_section, rel->r_offset);
3274 return FALSE;
3277 if (RELAX_TLSDESC_LOCAL_EXEC_P (info, picrel,
3278 relocation + rel->r_addend)
3279 && TLSMOFF_IN_RANGE_FOR_SETLOS_P (relocation + rel->r_addend,
3280 info))
3282 /* Replace calll with a nop. Preserve the packing bit. */
3283 insn &= (unsigned long)0x80000000;
3284 insn |= (unsigned long)0x00880000;
3285 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3287 /* Nothing to relocate. */
3288 continue;
3291 else if (RELAX_TLSDESC_LOCAL_EXEC_P (info, picrel,
3292 relocation + rel->r_addend))
3294 /* Replace calll with setlo #tlsmofflo(symbol+offset), gr9.
3295 Preserve the packing bit. */
3296 insn &= (unsigned long)0x80000000;
3297 insn |= (unsigned long)0x12f40000;
3298 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3300 r_type = R_FRV_TLSMOFFLO;
3301 howto = elf32_frv_howto_table + r_type;
3302 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3305 else if (RELAX_TLSDESC_INITIAL_EXEC_P (info, picrel))
3307 /* Replace calll with a nop. Preserve the packing bit. */
3308 insn &= (unsigned long)0x80000000;
3309 insn |= (unsigned long)0x00880000;
3310 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3312 /* Nothing to relocate. */
3313 continue;
3316 break;
3318 case R_FRV_GOTTLSOFF12:
3319 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3321 /* Is this an ldi instruction? */
3322 if ((insn & (unsigned long)0x01fc0000) != 0x00c80000)
3324 r = info->callbacks->warning
3325 (info,
3326 _("R_FRV_GOTTLSOFF12 not applied to an ldi instruction"),
3327 name, input_bfd, input_section, rel->r_offset);
3328 return FALSE;
3331 if (RELAX_GOTTLSOFF_LOCAL_EXEC_P (info, picrel,
3332 relocation + rel->r_addend))
3334 /* Replace ldi @(grB, #gottlsoff12(symbol+offset), grC
3335 with setlos #tlsmofflo(symbol+offset), grC.
3336 Preserve the packing bit. */
3337 insn &= (unsigned long)0xfe000000;
3338 insn |= (unsigned long)0x00fc0000;
3339 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3341 r_type = R_FRV_TLSMOFFLO;
3342 howto = elf32_frv_howto_table + r_type;
3343 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3346 break;
3348 case R_FRV_GOTTLSOFFHI:
3349 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3351 /* Is this a sethi instruction? */
3352 if ((insn & (unsigned long)0x01ff0000) != 0x00f80000)
3354 r = info->callbacks->warning
3355 (info,
3356 _("R_FRV_GOTTLSOFFHI not applied to a sethi instruction"),
3357 name, input_bfd, input_section, rel->r_offset);
3358 return FALSE;
3361 if (RELAX_GOTTLSOFF_LOCAL_EXEC_P (info, picrel,
3362 relocation + rel->r_addend)
3363 || (RELAX_TLSDESC_INITIAL_EXEC_P (info, picrel)
3364 && IN_RANGE_FOR_OFST12_P (picrel->tlsoff_entry)))
3366 /* Replace sethi with a nop. Preserve the packing bit. */
3367 insn &= (unsigned long)0x80000000;
3368 insn |= (unsigned long)0x00880000;
3369 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3371 /* Nothing to relocate. */
3372 continue;
3375 break;
3377 case R_FRV_GOTTLSOFFLO:
3378 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3380 /* Is this a setlo or setlos instruction? */
3381 if ((insn & (unsigned long)0x01f70000) != 0x00f40000)
3383 r = info->callbacks->warning
3384 (info,
3385 _("R_FRV_GOTTLSOFFLO"
3386 " not applied to a setlo or setlos instruction"),
3387 name, input_bfd, input_section, rel->r_offset);
3388 return FALSE;
3391 if (RELAX_GOTTLSOFF_LOCAL_EXEC_P (info, picrel,
3392 relocation + rel->r_addend)
3393 || (RELAX_TLSDESC_INITIAL_EXEC_P (info, picrel)
3394 && IN_RANGE_FOR_OFST12_P (picrel->tlsoff_entry)))
3396 /* Replace setlo/setlos with a nop. Preserve the
3397 packing bit. */
3398 insn &= (unsigned long)0x80000000;
3399 insn |= (unsigned long)0x00880000;
3400 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3402 /* Nothing to relocate. */
3403 continue;
3406 break;
3408 case R_FRV_TLSOFF_RELAX:
3409 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3411 /* Is this an ld instruction? */
3412 if ((insn & (unsigned long)0x01fc0fc0) != 0x00080100)
3414 r = info->callbacks->warning
3415 (info,
3416 _("R_FRV_TLSOFF_RELAX not applied to an ld instruction"),
3417 name, input_bfd, input_section, rel->r_offset);
3418 return FALSE;
3421 if (RELAX_GOTTLSOFF_LOCAL_EXEC_P (info, picrel,
3422 relocation + rel->r_addend))
3424 /* Replace ld #gottlsoff(symbol+offset)@(grB, grA), grC
3425 with setlos #tlsmofflo(symbol+offset), grC.
3426 Preserve the packing bit. */
3427 insn &= (unsigned long)0xfe000000;
3428 insn |= (unsigned long)0x00fc0000;
3429 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3431 r_type = R_FRV_TLSMOFFLO;
3432 howto = elf32_frv_howto_table + r_type;
3433 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3436 else if (RELAX_TLSDESC_INITIAL_EXEC_P (info, picrel)
3437 && IN_RANGE_FOR_OFST12_P (picrel->tlsoff_entry))
3439 /* Replace ld #tlsoff(symbol+offset)@(grB, grA), grC
3440 with ldi @(grB, #gottlsoff12(symbol+offset), grC.
3441 Preserve the packing bit. */
3442 insn = (insn & (unsigned long)0xfe03f000)
3443 | (unsigned long)0x00c80000;;
3444 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3446 r_type = R_FRV_GOTTLSOFF12;
3447 howto = elf32_frv_howto_table + r_type;
3448 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
3451 break;
3453 case R_FRV_TLSMOFFHI:
3454 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3456 /* Is this a sethi instruction? */
3457 if ((insn & (unsigned long)0x01ff0000) != 0x00f80000)
3459 r = info->callbacks->warning
3460 (info,
3461 _("R_FRV_TLSMOFFHI not applied to a sethi instruction"),
3462 name, input_bfd, input_section, rel->r_offset);
3463 return FALSE;
3466 if (TLSMOFF_IN_RANGE_FOR_SETLOS_P (relocation + rel->r_addend,
3467 info))
3469 /* Replace sethi with a nop. Preserve the packing bit. */
3470 insn &= (unsigned long)0x80000000;
3471 insn |= (unsigned long)0x00880000;
3472 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3474 /* Nothing to relocate. */
3475 continue;
3478 break;
3480 case R_FRV_TLSMOFFLO:
3481 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3483 /* Is this a setlo or setlos instruction? */
3484 if ((insn & (unsigned long)0x01f70000) != 0x00f40000)
3486 r = info->callbacks->warning
3487 (info,
3488 _("R_FRV_TLSMOFFLO"
3489 " not applied to a setlo or setlos instruction"),
3490 name, input_bfd, input_section, rel->r_offset);
3491 return FALSE;
3494 if (TLSMOFF_IN_RANGE_FOR_SETLOS_P (relocation + rel->r_addend,
3495 info))
3496 /* If the corresponding sethi (if it exists) decayed
3497 to a nop, make sure this becomes (or already is) a
3498 setlos, not setlo. */
3500 insn |= (unsigned long)0x00080000;
3501 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
3504 break;
3507 There's nothing to relax in these:
3508 R_FRV_TLSDESC_VALUE
3509 R_FRV_TLSOFF
3510 R_FRV_TLSMOFF12
3511 R_FRV_TLSMOFFHI
3512 R_FRV_TLSMOFFLO
3513 R_FRV_TLSMOFF
3516 default:
3517 break;
3520 switch (r_type)
3522 case R_FRV_LABEL24:
3523 check_segment[0] = isec_segment;
3524 if (! IS_FDPIC (output_bfd))
3525 check_segment[1] = isec_segment;
3526 else if (picrel->plt)
3528 relocation = frvfdpic_plt_section (info)->output_section->vma
3529 + frvfdpic_plt_section (info)->output_offset
3530 + picrel->plt_entry;
3531 check_segment[1] = plt_segment;
3533 /* We don't want to warn on calls to undefined weak symbols,
3534 as calls to them must be protected by non-NULL tests
3535 anyway, and unprotected calls would invoke undefined
3536 behavior. */
3537 else if (picrel->symndx == -1
3538 && picrel->d.h->root.type == bfd_link_hash_undefweak)
3539 check_segment[1] = check_segment[0];
3540 else
3541 check_segment[1] = sec
3542 ? _frvfdpic_osec_to_segment (output_bfd, sec->output_section)
3543 : (unsigned)-1;
3544 break;
3546 case R_FRV_GOT12:
3547 case R_FRV_GOTHI:
3548 case R_FRV_GOTLO:
3549 relocation = picrel->got_entry;
3550 check_segment[0] = check_segment[1] = got_segment;
3551 break;
3553 case R_FRV_FUNCDESC_GOT12:
3554 case R_FRV_FUNCDESC_GOTHI:
3555 case R_FRV_FUNCDESC_GOTLO:
3556 relocation = picrel->fdgot_entry;
3557 check_segment[0] = check_segment[1] = got_segment;
3558 break;
3560 case R_FRV_GOTOFFHI:
3561 case R_FRV_GOTOFF12:
3562 case R_FRV_GOTOFFLO:
3563 relocation -= frvfdpic_got_section (info)->output_section->vma
3564 + frvfdpic_got_section (info)->output_offset
3565 + frvfdpic_got_initial_offset (info);
3566 check_segment[0] = got_segment;
3567 check_segment[1] = sec
3568 ? _frvfdpic_osec_to_segment (output_bfd, sec->output_section)
3569 : (unsigned)-1;
3570 break;
3572 case R_FRV_FUNCDESC_GOTOFF12:
3573 case R_FRV_FUNCDESC_GOTOFFHI:
3574 case R_FRV_FUNCDESC_GOTOFFLO:
3575 relocation = picrel->fd_entry;
3576 check_segment[0] = check_segment[1] = got_segment;
3577 break;
3579 case R_FRV_FUNCDESC:
3581 int dynindx;
3582 bfd_vma addend = rel->r_addend;
3584 if (! (h && h->root.type == bfd_link_hash_undefweak
3585 && FRVFDPIC_SYM_LOCAL (info, h)))
3587 /* If the symbol is dynamic and there may be dynamic
3588 symbol resolution because we are or are linked with a
3589 shared library, emit a FUNCDESC relocation such that
3590 the dynamic linker will allocate the function
3591 descriptor. If the symbol needs a non-local function
3592 descriptor but binds locally (e.g., its visibility is
3593 protected, emit a dynamic relocation decayed to
3594 section+offset. */
3595 if (h && ! FRVFDPIC_FUNCDESC_LOCAL (info, h)
3596 && FRVFDPIC_SYM_LOCAL (info, h)
3597 && !(info->executable && !info->pie))
3599 dynindx = elf_section_data (h->root.u.def.section
3600 ->output_section)->dynindx;
3601 addend += h->root.u.def.section->output_offset
3602 + h->root.u.def.value;
3604 else if (h && ! FRVFDPIC_FUNCDESC_LOCAL (info, h))
3606 if (addend)
3608 info->callbacks->warning
3609 (info, _("R_FRV_FUNCDESC references dynamic symbol with nonzero addend"),
3610 name, input_bfd, input_section, rel->r_offset);
3611 return FALSE;
3613 dynindx = h->dynindx;
3615 else
3617 /* Otherwise, we know we have a private function
3618 descriptor, so reference it directly. */
3619 BFD_ASSERT (picrel->privfd);
3620 r_type = R_FRV_32;
3621 dynindx = elf_section_data (frvfdpic_got_section (info)
3622 ->output_section)->dynindx;
3623 addend = frvfdpic_got_section (info)->output_offset
3624 + frvfdpic_got_initial_offset (info)
3625 + picrel->fd_entry;
3628 /* If there is room for dynamic symbol resolution, emit
3629 the dynamic relocation. However, if we're linking an
3630 executable at a fixed location, we won't have emitted a
3631 dynamic symbol entry for the got section, so idx will
3632 be zero, which means we can and should compute the
3633 address of the private descriptor ourselves. */
3634 if (info->executable && !info->pie
3635 && (!h || FRVFDPIC_FUNCDESC_LOCAL (info, h)))
3637 addend += frvfdpic_got_section (info)->output_section->vma;
3638 if ((bfd_get_section_flags (output_bfd,
3639 input_section->output_section)
3640 & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3642 if (_frvfdpic_osec_readonly_p (output_bfd,
3643 input_section
3644 ->output_section))
3646 info->callbacks->warning
3647 (info,
3648 _("cannot emit fixups in read-only section"),
3649 name, input_bfd, input_section, rel->r_offset);
3650 return FALSE;
3652 _frvfdpic_add_rofixup (output_bfd,
3653 frvfdpic_gotfixup_section
3654 (info),
3655 _bfd_elf_section_offset
3656 (output_bfd, info,
3657 input_section, rel->r_offset)
3658 + input_section
3659 ->output_section->vma
3660 + input_section->output_offset,
3661 picrel);
3664 else if ((bfd_get_section_flags (output_bfd,
3665 input_section->output_section)
3666 & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3668 if (_frvfdpic_osec_readonly_p (output_bfd,
3669 input_section
3670 ->output_section))
3672 info->callbacks->warning
3673 (info,
3674 _("cannot emit dynamic relocations in read-only section"),
3675 name, input_bfd, input_section, rel->r_offset);
3676 return FALSE;
3678 _frvfdpic_add_dyn_reloc (output_bfd,
3679 frvfdpic_gotrel_section (info),
3680 _bfd_elf_section_offset
3681 (output_bfd, info,
3682 input_section, rel->r_offset)
3683 + input_section
3684 ->output_section->vma
3685 + input_section->output_offset,
3686 r_type, dynindx, addend, picrel);
3688 else
3689 addend += frvfdpic_got_section (info)->output_section->vma;
3692 /* We want the addend in-place because dynamic
3693 relocations are REL. Setting relocation to it should
3694 arrange for it to be installed. */
3695 relocation = addend - rel->r_addend;
3697 check_segment[0] = check_segment[1] = got_segment;
3698 break;
3700 case R_FRV_32:
3701 if (! IS_FDPIC (output_bfd))
3703 check_segment[0] = check_segment[1] = -1;
3704 break;
3706 /* Fall through. */
3707 case R_FRV_FUNCDESC_VALUE:
3709 int dynindx;
3710 bfd_vma addend = rel->r_addend;
3712 /* If the symbol is dynamic but binds locally, use
3713 section+offset. */
3714 if (h && ! FRVFDPIC_SYM_LOCAL (info, h))
3716 if (addend && r_type == R_FRV_FUNCDESC_VALUE)
3718 info->callbacks->warning
3719 (info, _("R_FRV_FUNCDESC_VALUE references dynamic symbol with nonzero addend"),
3720 name, input_bfd, input_section, rel->r_offset);
3721 return FALSE;
3723 dynindx = h->dynindx;
3725 else
3727 if (h)
3728 addend += h->root.u.def.value;
3729 else
3730 addend += sym->st_value;
3731 if (osec)
3732 addend += osec->output_offset;
3733 if (osec && osec->output_section
3734 && ! bfd_is_abs_section (osec->output_section)
3735 && ! bfd_is_und_section (osec->output_section))
3736 dynindx = elf_section_data (osec->output_section)->dynindx;
3737 else
3738 dynindx = 0;
3741 /* If we're linking an executable at a fixed address, we
3742 can omit the dynamic relocation as long as the symbol
3743 is defined in the current link unit (which is implied
3744 by its output section not being NULL). */
3745 if (info->executable && !info->pie
3746 && (!h || FRVFDPIC_SYM_LOCAL (info, h)))
3748 if (osec)
3749 addend += osec->output_section->vma;
3750 if (IS_FDPIC (input_bfd)
3751 && (bfd_get_section_flags (output_bfd,
3752 input_section->output_section)
3753 & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3755 if (_frvfdpic_osec_readonly_p (output_bfd,
3756 input_section
3757 ->output_section))
3759 info->callbacks->warning
3760 (info,
3761 _("cannot emit fixups in read-only section"),
3762 name, input_bfd, input_section, rel->r_offset);
3763 return FALSE;
3765 if (!h || h->root.type != bfd_link_hash_undefweak)
3767 _frvfdpic_add_rofixup (output_bfd,
3768 frvfdpic_gotfixup_section
3769 (info),
3770 _bfd_elf_section_offset
3771 (output_bfd, info,
3772 input_section, rel->r_offset)
3773 + input_section
3774 ->output_section->vma
3775 + input_section->output_offset,
3776 picrel);
3777 if (r_type == R_FRV_FUNCDESC_VALUE)
3778 _frvfdpic_add_rofixup
3779 (output_bfd,
3780 frvfdpic_gotfixup_section (info),
3781 _bfd_elf_section_offset
3782 (output_bfd, info,
3783 input_section, rel->r_offset)
3784 + input_section->output_section->vma
3785 + input_section->output_offset + 4, picrel);
3789 else
3791 if ((bfd_get_section_flags (output_bfd,
3792 input_section->output_section)
3793 & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3795 if (_frvfdpic_osec_readonly_p (output_bfd,
3796 input_section
3797 ->output_section))
3799 info->callbacks->warning
3800 (info,
3801 _("cannot emit dynamic relocations in read-only section"),
3802 name, input_bfd, input_section, rel->r_offset);
3803 return FALSE;
3805 _frvfdpic_add_dyn_reloc (output_bfd,
3806 frvfdpic_gotrel_section (info),
3807 _bfd_elf_section_offset
3808 (output_bfd, info,
3809 input_section, rel->r_offset)
3810 + input_section
3811 ->output_section->vma
3812 + input_section->output_offset,
3813 r_type, dynindx, addend, picrel);
3815 else if (osec)
3816 addend += osec->output_section->vma;
3817 /* We want the addend in-place because dynamic
3818 relocations are REL. Setting relocation to it
3819 should arrange for it to be installed. */
3820 relocation = addend - rel->r_addend;
3823 if (r_type == R_FRV_FUNCDESC_VALUE)
3825 /* If we've omitted the dynamic relocation, just emit
3826 the fixed addresses of the symbol and of the local
3827 GOT base offset. */
3828 if (info->executable && !info->pie
3829 && (!h || FRVFDPIC_SYM_LOCAL (info, h)))
3830 bfd_put_32 (output_bfd,
3831 frvfdpic_got_section (info)->output_section->vma
3832 + frvfdpic_got_section (info)->output_offset
3833 + frvfdpic_got_initial_offset (info),
3834 contents + rel->r_offset + 4);
3835 else
3836 /* A function descriptor used for lazy or local
3837 resolving is initialized such that its high word
3838 contains the output section index in which the
3839 PLT entries are located, and the low word
3840 contains the offset of the lazy PLT entry entry
3841 point into that section. */
3842 bfd_put_32 (output_bfd,
3843 h && ! FRVFDPIC_SYM_LOCAL (info, h)
3845 : _frvfdpic_osec_to_segment (output_bfd,
3847 ->output_section),
3848 contents + rel->r_offset + 4);
3851 check_segment[0] = check_segment[1] = got_segment;
3852 break;
3854 case R_FRV_GPREL12:
3855 case R_FRV_GPRELU12:
3856 case R_FRV_GPREL32:
3857 case R_FRV_GPRELHI:
3858 case R_FRV_GPRELLO:
3859 check_segment[0] = gprel_segment;
3860 check_segment[1] = sec
3861 ? _frvfdpic_osec_to_segment (output_bfd, sec->output_section)
3862 : (unsigned)-1;
3863 break;
3865 case R_FRV_GETTLSOFF:
3866 relocation = frvfdpic_plt_section (info)->output_section->vma
3867 + frvfdpic_plt_section (info)->output_offset
3868 + picrel->tlsplt_entry;
3869 BFD_ASSERT (picrel->tlsplt_entry != (bfd_vma)-1
3870 && picrel->tlsdesc_entry);
3871 check_segment[0] = isec_segment;
3872 check_segment[1] = plt_segment;
3873 break;
3875 case R_FRV_GOTTLSDESC12:
3876 case R_FRV_GOTTLSDESCHI:
3877 case R_FRV_GOTTLSDESCLO:
3878 BFD_ASSERT (picrel->tlsdesc_entry);
3879 relocation = picrel->tlsdesc_entry;
3880 check_segment[0] = tls_segment;
3881 check_segment[1] = sec
3882 && ! bfd_is_abs_section (sec)
3883 && ! bfd_is_und_section (sec)
3884 ? _frvfdpic_osec_to_segment (output_bfd, sec->output_section)
3885 : tls_segment;
3886 break;
3888 case R_FRV_TLSMOFF12:
3889 case R_FRV_TLSMOFFHI:
3890 case R_FRV_TLSMOFFLO:
3891 case R_FRV_TLSMOFF:
3892 check_segment[0] = tls_segment;
3893 if (! sec)
3894 check_segment[1] = -1;
3895 else if (bfd_is_abs_section (sec)
3896 || bfd_is_und_section (sec))
3898 relocation = 0;
3899 check_segment[1] = tls_segment;
3901 else if (sec->output_section)
3903 relocation -= tls_biased_base (info);
3904 check_segment[1] =
3905 _frvfdpic_osec_to_segment (output_bfd, sec->output_section);
3907 else
3908 check_segment[1] = -1;
3909 break;
3911 case R_FRV_GOTTLSOFF12:
3912 case R_FRV_GOTTLSOFFHI:
3913 case R_FRV_GOTTLSOFFLO:
3914 BFD_ASSERT (picrel->tlsoff_entry);
3915 relocation = picrel->tlsoff_entry;
3916 check_segment[0] = tls_segment;
3917 check_segment[1] = sec
3918 && ! bfd_is_abs_section (sec)
3919 && ! bfd_is_und_section (sec)
3920 ? _frvfdpic_osec_to_segment (output_bfd, sec->output_section)
3921 : tls_segment;
3922 break;
3924 case R_FRV_TLSDESC_VALUE:
3925 case R_FRV_TLSOFF:
3926 /* These shouldn't be present in input object files. */
3927 check_segment[0] = check_segment[1] = isec_segment;
3928 break;
3930 case R_FRV_TLSDESC_RELAX:
3931 case R_FRV_GETTLSOFF_RELAX:
3932 case R_FRV_TLSOFF_RELAX:
3933 /* These are just annotations for relaxation, nothing to do
3934 here. */
3935 continue;
3937 default:
3938 check_segment[0] = isec_segment;
3939 check_segment[1] = sec
3940 ? _frvfdpic_osec_to_segment (output_bfd, sec->output_section)
3941 : (unsigned)-1;
3942 break;
3945 if (check_segment[0] != check_segment[1] && IS_FDPIC (output_bfd))
3947 /* If you take this out, remove the #error from fdpic-static-6.d
3948 in the ld testsuite. */
3949 /* This helps catch problems in GCC while we can't do more
3950 than static linking. The idea is to test whether the
3951 input file basename is crt0.o only once. */
3952 if (silence_segment_error == 1)
3953 silence_segment_error =
3954 (strlen (input_bfd->filename) == 6
3955 && strcmp (input_bfd->filename, "crt0.o") == 0)
3956 || (strlen (input_bfd->filename) > 6
3957 && strcmp (input_bfd->filename
3958 + strlen (input_bfd->filename) - 7,
3959 "/crt0.o") == 0)
3960 ? -1 : 0;
3961 if (!silence_segment_error
3962 /* We don't want duplicate errors for undefined
3963 symbols. */
3964 && !(picrel && picrel->symndx == -1
3965 && picrel->d.h->root.type == bfd_link_hash_undefined))
3967 if (info->shared || info->pie)
3968 (*_bfd_error_handler)
3969 (_("%B(%A+0x%lx): reloc against `%s': %s"),
3970 input_bfd, input_section, (long)rel->r_offset, name,
3971 _("relocation references a different segment"));
3972 else
3973 info->callbacks->warning
3974 (info,
3975 _("relocation references a different segment"),
3976 name, input_bfd, input_section, rel->r_offset);
3978 if (!silence_segment_error && (info->shared || info->pie))
3979 return FALSE;
3980 elf_elfheader (output_bfd)->e_flags |= EF_FRV_PIC;
3983 switch (r_type)
3985 case R_FRV_GOTOFFHI:
3986 case R_FRV_TLSMOFFHI:
3987 /* We need the addend to be applied before we shift the
3988 value right. */
3989 relocation += rel->r_addend;
3990 /* Fall through. */
3991 case R_FRV_GOTHI:
3992 case R_FRV_FUNCDESC_GOTHI:
3993 case R_FRV_FUNCDESC_GOTOFFHI:
3994 case R_FRV_GOTTLSOFFHI:
3995 case R_FRV_GOTTLSDESCHI:
3996 relocation >>= 16;
3997 /* Fall through. */
3999 case R_FRV_GOTLO:
4000 case R_FRV_FUNCDESC_GOTLO:
4001 case R_FRV_GOTOFFLO:
4002 case R_FRV_FUNCDESC_GOTOFFLO:
4003 case R_FRV_GOTTLSOFFLO:
4004 case R_FRV_GOTTLSDESCLO:
4005 case R_FRV_TLSMOFFLO:
4006 relocation &= 0xffff;
4007 break;
4009 default:
4010 break;
4013 switch (r_type)
4015 case R_FRV_LABEL24:
4016 if (! IS_FDPIC (output_bfd) || ! picrel->plt)
4017 break;
4018 /* Fall through. */
4020 /* When referencing a GOT entry, a function descriptor or a
4021 PLT, we don't want the addend to apply to the reference,
4022 but rather to the referenced symbol. The actual entry
4023 will have already been created taking the addend into
4024 account, so cancel it out here. */
4025 case R_FRV_GOT12:
4026 case R_FRV_GOTHI:
4027 case R_FRV_GOTLO:
4028 case R_FRV_FUNCDESC_GOT12:
4029 case R_FRV_FUNCDESC_GOTHI:
4030 case R_FRV_FUNCDESC_GOTLO:
4031 case R_FRV_FUNCDESC_GOTOFF12:
4032 case R_FRV_FUNCDESC_GOTOFFHI:
4033 case R_FRV_FUNCDESC_GOTOFFLO:
4034 case R_FRV_GETTLSOFF:
4035 case R_FRV_GOTTLSDESC12:
4036 case R_FRV_GOTTLSDESCHI:
4037 case R_FRV_GOTTLSDESCLO:
4038 case R_FRV_GOTTLSOFF12:
4039 case R_FRV_GOTTLSOFFHI:
4040 case R_FRV_GOTTLSOFFLO:
4041 /* Note that we only want GOTOFFHI, not GOTOFFLO or GOTOFF12
4042 here, since we do want to apply the addend to the others.
4043 Note that we've applied the addend to GOTOFFHI before we
4044 shifted it right. */
4045 case R_FRV_GOTOFFHI:
4046 case R_FRV_TLSMOFFHI:
4047 relocation -= rel->r_addend;
4048 break;
4050 default:
4051 break;
4054 if (r_type == R_FRV_HI16)
4055 r = elf32_frv_relocate_hi16 (input_bfd, rel, contents, relocation);
4057 else if (r_type == R_FRV_LO16)
4058 r = elf32_frv_relocate_lo16 (input_bfd, rel, contents, relocation);
4060 else if (r_type == R_FRV_LABEL24 || r_type == R_FRV_GETTLSOFF)
4061 r = elf32_frv_relocate_label24 (input_bfd, input_section, rel,
4062 contents, relocation);
4064 else if (r_type == R_FRV_GPREL12)
4065 r = elf32_frv_relocate_gprel12 (info, input_bfd, input_section, rel,
4066 contents, relocation);
4068 else if (r_type == R_FRV_GPRELU12)
4069 r = elf32_frv_relocate_gprelu12 (info, input_bfd, input_section, rel,
4070 contents, relocation);
4072 else if (r_type == R_FRV_GPRELLO)
4073 r = elf32_frv_relocate_gprello (info, input_bfd, input_section, rel,
4074 contents, relocation);
4076 else if (r_type == R_FRV_GPRELHI)
4077 r = elf32_frv_relocate_gprelhi (info, input_bfd, input_section, rel,
4078 contents, relocation);
4080 else if (r_type == R_FRV_TLSOFF
4081 || r_type == R_FRV_TLSDESC_VALUE)
4082 r = bfd_reloc_notsupported;
4084 else
4085 r = frv_final_link_relocate (howto, input_bfd, input_section, contents,
4086 rel, relocation);
4088 if (r != bfd_reloc_ok)
4090 const char * msg = (const char *) NULL;
4092 switch (r)
4094 case bfd_reloc_overflow:
4095 r = info->callbacks->reloc_overflow
4096 (info, (h ? &h->root : NULL), name, howto->name,
4097 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
4098 break;
4100 case bfd_reloc_undefined:
4101 r = info->callbacks->undefined_symbol
4102 (info, name, input_bfd, input_section, rel->r_offset, TRUE);
4103 break;
4105 case bfd_reloc_outofrange:
4106 msg = _("internal error: out of range error");
4107 break;
4109 case bfd_reloc_notsupported:
4110 msg = _("internal error: unsupported relocation error");
4111 break;
4113 case bfd_reloc_dangerous:
4114 msg = _("internal error: dangerous relocation");
4115 break;
4117 default:
4118 msg = _("internal error: unknown error");
4119 break;
4122 if (msg)
4124 (*_bfd_error_handler)
4125 (_("%B(%A+0x%lx): reloc against `%s': %s"),
4126 input_bfd, input_section, (long)rel->r_offset, name, msg);
4127 return FALSE;
4130 if (! r)
4131 return FALSE;
4135 return TRUE;
4138 /* Return the section that should be marked against GC for a given
4139 relocation. */
4141 static asection *
4142 elf32_frv_gc_mark_hook (asection *sec,
4143 struct bfd_link_info *info,
4144 Elf_Internal_Rela *rel,
4145 struct elf_link_hash_entry *h,
4146 Elf_Internal_Sym *sym)
4148 if (h != NULL)
4149 switch (ELF32_R_TYPE (rel->r_info))
4151 case R_FRV_GNU_VTINHERIT:
4152 case R_FRV_GNU_VTENTRY:
4153 return NULL;
4156 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
4159 /* Hook called by the linker routine which adds symbols from an object
4160 file. We use it to put .comm items in .scomm, and not .comm. */
4162 static bfd_boolean
4163 elf32_frv_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp)
4164 bfd *abfd;
4165 struct bfd_link_info *info;
4166 Elf_Internal_Sym *sym;
4167 const char **namep ATTRIBUTE_UNUSED;
4168 flagword *flagsp ATTRIBUTE_UNUSED;
4169 asection **secp;
4170 bfd_vma *valp;
4172 if (sym->st_shndx == SHN_COMMON
4173 && !info->relocatable
4174 && (int)sym->st_size <= (int)bfd_get_gp_size (abfd))
4176 /* Common symbols less than or equal to -G nn bytes are
4177 automatically put into .sbss. */
4179 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
4181 if (scomm == NULL)
4183 scomm = bfd_make_section_with_flags (abfd, ".scommon",
4184 (SEC_ALLOC
4185 | SEC_IS_COMMON
4186 | SEC_LINKER_CREATED));
4187 if (scomm == NULL)
4188 return FALSE;
4191 *secp = scomm;
4192 *valp = sym->st_size;
4195 return TRUE;
4198 /* We need dynamic symbols for every section, since segments can
4199 relocate independently. */
4200 static bfd_boolean
4201 _frvfdpic_link_omit_section_dynsym (bfd *output_bfd ATTRIBUTE_UNUSED,
4202 struct bfd_link_info *info
4203 ATTRIBUTE_UNUSED,
4204 asection *p ATTRIBUTE_UNUSED)
4206 switch (elf_section_data (p)->this_hdr.sh_type)
4208 case SHT_PROGBITS:
4209 case SHT_NOBITS:
4210 /* If sh_type is yet undecided, assume it could be
4211 SHT_PROGBITS/SHT_NOBITS. */
4212 case SHT_NULL:
4213 return FALSE;
4215 /* There shouldn't be section relative relocations
4216 against any other section. */
4217 default:
4218 return TRUE;
4222 /* Create a .got section, as well as its additional info field. This
4223 is almost entirely copied from
4224 elflink.c:_bfd_elf_create_got_section(). */
4226 static bfd_boolean
4227 _frv_create_got_section (bfd *abfd, struct bfd_link_info *info)
4229 flagword flags, pltflags;
4230 asection *s;
4231 struct elf_link_hash_entry *h;
4232 struct bfd_link_hash_entry *bh;
4233 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4234 int ptralign;
4235 int offset;
4237 /* This function may be called more than once. */
4238 s = bfd_get_section_by_name (abfd, ".got");
4239 if (s != NULL && (s->flags & SEC_LINKER_CREATED) != 0)
4240 return TRUE;
4242 /* Machine specific: although pointers are 32-bits wide, we want the
4243 GOT to be aligned to a 64-bit boundary, such that function
4244 descriptors in it can be accessed with 64-bit loads and
4245 stores. */
4246 ptralign = 3;
4248 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
4249 | SEC_LINKER_CREATED);
4250 pltflags = flags;
4252 s = bfd_make_section_with_flags (abfd, ".got", flags);
4253 if (s == NULL
4254 || !bfd_set_section_alignment (abfd, s, ptralign))
4255 return FALSE;
4257 if (bed->want_got_plt)
4259 s = bfd_make_section_with_flags (abfd, ".got.plt", flags);
4260 if (s == NULL
4261 || !bfd_set_section_alignment (abfd, s, ptralign))
4262 return FALSE;
4265 if (bed->want_got_sym)
4267 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the .got
4268 (or .got.plt) section. We don't do this in the linker script
4269 because we don't want to define the symbol if we are not creating
4270 a global offset table. */
4271 h = _bfd_elf_define_linkage_sym (abfd, info, s, "_GLOBAL_OFFSET_TABLE_");
4272 elf_hash_table (info)->hgot = h;
4273 if (h == NULL)
4274 return FALSE;
4276 /* Machine-specific: we want the symbol for executables as
4277 well. */
4278 if (! bfd_elf_link_record_dynamic_symbol (info, h))
4279 return FALSE;
4282 /* The first bit of the global offset table is the header. */
4283 s->size += bed->got_header_size;
4285 /* This is the machine-specific part. Create and initialize section
4286 data for the got. */
4287 if (IS_FDPIC (abfd))
4289 frvfdpic_got_section (info) = s;
4290 frvfdpic_relocs_info (info) = htab_try_create (1,
4291 frvfdpic_relocs_info_hash,
4292 frvfdpic_relocs_info_eq,
4293 (htab_del) NULL);
4294 if (! frvfdpic_relocs_info (info))
4295 return FALSE;
4297 s = bfd_make_section_with_flags (abfd, ".rel.got",
4298 (flags | SEC_READONLY));
4299 if (s == NULL
4300 || ! bfd_set_section_alignment (abfd, s, 2))
4301 return FALSE;
4303 frvfdpic_gotrel_section (info) = s;
4305 /* Machine-specific. */
4306 s = bfd_make_section_with_flags (abfd, ".rofixup",
4307 (flags | SEC_READONLY));
4308 if (s == NULL
4309 || ! bfd_set_section_alignment (abfd, s, 2))
4310 return FALSE;
4312 frvfdpic_gotfixup_section (info) = s;
4313 offset = -2048;
4314 flags = BSF_GLOBAL;
4316 else
4318 offset = 2048;
4319 flags = BSF_GLOBAL | BSF_WEAK;
4322 /* Define _gp in .rofixup, for FDPIC, or .got otherwise. If it
4323 turns out that we're linking with a different linker script, the
4324 linker script will override it. */
4325 bh = NULL;
4326 if (!(_bfd_generic_link_add_one_symbol
4327 (info, abfd, "_gp", flags, s, offset, (const char *) NULL, FALSE,
4328 bed->collect, &bh)))
4329 return FALSE;
4330 h = (struct elf_link_hash_entry *) bh;
4331 h->def_regular = 1;
4332 h->type = STT_OBJECT;
4333 /* h->other = STV_HIDDEN; */ /* Should we? */
4335 /* Machine-specific: we want the symbol for executables as well. */
4336 if (IS_FDPIC (abfd) && ! bfd_elf_link_record_dynamic_symbol (info, h))
4337 return FALSE;
4339 if (!IS_FDPIC (abfd))
4340 return TRUE;
4342 /* FDPIC supports Thread Local Storage, and this may require a
4343 procedure linkage table for TLS PLT entries. */
4345 /* This is mostly copied from
4346 elflink.c:_bfd_elf_create_dynamic_sections(). */
4348 flags = pltflags;
4349 pltflags |= SEC_CODE;
4350 if (bed->plt_not_loaded)
4351 pltflags &= ~ (SEC_CODE | SEC_LOAD | SEC_HAS_CONTENTS);
4352 if (bed->plt_readonly)
4353 pltflags |= SEC_READONLY;
4355 s = bfd_make_section_with_flags (abfd, ".plt", pltflags);
4356 if (s == NULL
4357 || ! bfd_set_section_alignment (abfd, s, bed->plt_alignment))
4358 return FALSE;
4359 /* FRV-specific: remember it. */
4360 frvfdpic_plt_section (info) = s;
4362 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
4363 .plt section. */
4364 if (bed->want_plt_sym)
4366 h = _bfd_elf_define_linkage_sym (abfd, info, s,
4367 "_PROCEDURE_LINKAGE_TABLE_");
4368 elf_hash_table (info)->hplt = h;
4369 if (h == NULL)
4370 return FALSE;
4373 /* FRV-specific: we want rel relocations for the plt. */
4374 s = bfd_make_section_with_flags (abfd, ".rel.plt",
4375 flags | SEC_READONLY);
4376 if (s == NULL
4377 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
4378 return FALSE;
4379 /* FRV-specific: remember it. */
4380 frvfdpic_pltrel_section (info) = s;
4382 return TRUE;
4385 /* Make sure the got and plt sections exist, and that our pointers in
4386 the link hash table point to them. */
4388 static bfd_boolean
4389 elf32_frvfdpic_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
4391 /* This is mostly copied from
4392 elflink.c:_bfd_elf_create_dynamic_sections(). */
4393 flagword flags;
4394 asection *s;
4395 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4397 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
4398 | SEC_LINKER_CREATED);
4400 /* We need to create .plt, .rel[a].plt, .got, .got.plt, .dynbss, and
4401 .rel[a].bss sections. */
4403 /* FRV-specific: we want to create the GOT and the PLT in the FRV
4404 way. */
4405 if (! _frv_create_got_section (abfd, info))
4406 return FALSE;
4408 /* FRV-specific: make sure we created everything we wanted. */
4409 BFD_ASSERT (frvfdpic_got_section (info) && frvfdpic_gotrel_section (info)
4410 && frvfdpic_gotfixup_section (info)
4411 && frvfdpic_plt_section (info)
4412 && frvfdpic_pltrel_section (info));
4414 if (bed->want_dynbss)
4416 /* The .dynbss section is a place to put symbols which are defined
4417 by dynamic objects, are referenced by regular objects, and are
4418 not functions. We must allocate space for them in the process
4419 image and use a R_*_COPY reloc to tell the dynamic linker to
4420 initialize them at run time. The linker script puts the .dynbss
4421 section into the .bss section of the final image. */
4422 s = bfd_make_section_with_flags (abfd, ".dynbss",
4423 SEC_ALLOC | SEC_LINKER_CREATED);
4424 if (s == NULL)
4425 return FALSE;
4427 /* The .rel[a].bss section holds copy relocs. This section is not
4428 normally needed. We need to create it here, though, so that the
4429 linker will map it to an output section. We can't just create it
4430 only if we need it, because we will not know whether we need it
4431 until we have seen all the input files, and the first time the
4432 main linker code calls BFD after examining all the input files
4433 (size_dynamic_sections) the input sections have already been
4434 mapped to the output sections. If the section turns out not to
4435 be needed, we can discard it later. We will never need this
4436 section when generating a shared object, since they do not use
4437 copy relocs. */
4438 if (! info->shared)
4440 s = bfd_make_section_with_flags (abfd,
4441 (bed->default_use_rela_p
4442 ? ".rela.bss" : ".rel.bss"),
4443 flags | SEC_READONLY);
4444 if (s == NULL
4445 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
4446 return FALSE;
4450 return TRUE;
4453 /* Compute the total GOT and PLT size required by each symbol in each
4454 range. Symbols may require up to 4 words in the GOT: an entry
4455 pointing to the symbol, an entry pointing to its function
4456 descriptor, and a private function descriptors taking two
4457 words. */
4459 static void
4460 _frvfdpic_count_nontls_entries (struct frvfdpic_relocs_info *entry,
4461 struct _frvfdpic_dynamic_got_info *dinfo)
4463 /* Allocate space for a GOT entry pointing to the symbol. */
4464 if (entry->got12)
4465 dinfo->got12 += 4;
4466 else if (entry->gotlos)
4467 dinfo->gotlos += 4;
4468 else if (entry->gothilo)
4469 dinfo->gothilo += 4;
4470 else
4471 entry->relocs32--;
4472 entry->relocs32++;
4474 /* Allocate space for a GOT entry pointing to the function
4475 descriptor. */
4476 if (entry->fdgot12)
4477 dinfo->got12 += 4;
4478 else if (entry->fdgotlos)
4479 dinfo->gotlos += 4;
4480 else if (entry->fdgothilo)
4481 dinfo->gothilo += 4;
4482 else
4483 entry->relocsfd--;
4484 entry->relocsfd++;
4486 /* Decide whether we need a PLT entry, a function descriptor in the
4487 GOT, and a lazy PLT entry for this symbol. */
4488 entry->plt = entry->call
4489 && entry->symndx == -1 && ! FRVFDPIC_SYM_LOCAL (dinfo->info, entry->d.h)
4490 && elf_hash_table (dinfo->info)->dynamic_sections_created;
4491 entry->privfd = entry->plt
4492 || entry->fdgoff12 || entry->fdgofflos || entry->fdgoffhilo
4493 || ((entry->fd || entry->fdgot12 || entry->fdgotlos || entry->fdgothilo)
4494 && (entry->symndx != -1
4495 || FRVFDPIC_FUNCDESC_LOCAL (dinfo->info, entry->d.h)));
4496 entry->lazyplt = entry->privfd
4497 && entry->symndx == -1 && ! FRVFDPIC_SYM_LOCAL (dinfo->info, entry->d.h)
4498 && ! (dinfo->info->flags & DF_BIND_NOW)
4499 && elf_hash_table (dinfo->info)->dynamic_sections_created;
4501 /* Allocate space for a function descriptor. */
4502 if (entry->fdgoff12)
4503 dinfo->fd12 += 8;
4504 else if (entry->fdgofflos)
4505 dinfo->fdlos += 8;
4506 else if (entry->privfd && entry->plt)
4507 dinfo->fdplt += 8;
4508 else if (entry->privfd)
4509 dinfo->fdhilo += 8;
4510 else
4511 entry->relocsfdv--;
4512 entry->relocsfdv++;
4514 if (entry->lazyplt)
4515 dinfo->lzplt += 8;
4518 /* Compute the total GOT size required by each TLS symbol in each
4519 range. Symbols may require up to 5 words in the GOT: an entry
4520 holding the TLS offset for the symbol, and an entry with a full TLS
4521 descriptor taking 4 words. */
4523 static void
4524 _frvfdpic_count_tls_entries (struct frvfdpic_relocs_info *entry,
4525 struct _frvfdpic_dynamic_got_info *dinfo,
4526 bfd_boolean subtract)
4528 const int l = subtract ? -1 : 1;
4530 /* Allocate space for a GOT entry with the TLS offset of the
4531 symbol. */
4532 if (entry->tlsoff12)
4533 dinfo->got12 += 4 * l;
4534 else if (entry->tlsofflos)
4535 dinfo->gotlos += 4 * l;
4536 else if (entry->tlsoffhilo)
4537 dinfo->gothilo += 4 * l;
4538 else
4539 entry->relocstlsoff -= l;
4540 entry->relocstlsoff += l;
4542 /* If there's any TLSOFF relocation, mark the output file as not
4543 suitable for dlopening. This mark will remain even if we relax
4544 all such relocations, but this is not a problem, since we'll only
4545 do so for executables, and we definitely don't want anyone
4546 dlopening executables. */
4547 if (entry->relocstlsoff)
4548 dinfo->info->flags |= DF_STATIC_TLS;
4550 /* Allocate space for a TLS descriptor. */
4551 if (entry->tlsdesc12)
4552 dinfo->tlsd12 += 8 * l;
4553 else if (entry->tlsdesclos)
4554 dinfo->tlsdlos += 8 * l;
4555 else if (entry->tlsplt)
4556 dinfo->tlsdplt += 8 * l;
4557 else if (entry->tlsdeschilo)
4558 dinfo->tlsdhilo += 8 * l;
4559 else
4560 entry->relocstlsd -= l;
4561 entry->relocstlsd += l;
4564 /* Compute the number of dynamic relocations and fixups that a symbol
4565 requires, and add (or subtract) from the grand and per-symbol
4566 totals. */
4568 static void
4569 _frvfdpic_count_relocs_fixups (struct frvfdpic_relocs_info *entry,
4570 struct _frvfdpic_dynamic_got_info *dinfo,
4571 bfd_boolean subtract)
4573 bfd_vma relocs = 0, fixups = 0, tlsrets = 0;
4575 if (!dinfo->info->executable || dinfo->info->pie)
4577 relocs = entry->relocs32 + entry->relocsfd + entry->relocsfdv
4578 + entry->relocstlsd;
4580 /* In the executable, TLS relocations to symbols that bind
4581 locally (including those that resolve to global TLS offsets)
4582 are resolved immediately, without any need for fixups or
4583 dynamic relocations. In shared libraries, however, we must
4584 emit dynamic relocations even for local symbols, because we
4585 don't know the module id the library is going to get at
4586 run-time, nor its TLS base offset. */
4587 if (!dinfo->info->executable
4588 || (entry->symndx == -1
4589 && ! FRVFDPIC_SYM_LOCAL (dinfo->info, entry->d.h)))
4590 relocs += entry->relocstlsoff;
4592 else
4594 if (entry->symndx != -1 || FRVFDPIC_SYM_LOCAL (dinfo->info, entry->d.h))
4596 if (entry->symndx != -1
4597 || entry->d.h->root.type != bfd_link_hash_undefweak)
4598 fixups += entry->relocs32 + 2 * entry->relocsfdv;
4599 fixups += entry->relocstlsd;
4600 tlsrets += entry->relocstlsd;
4602 else
4604 relocs += entry->relocs32 + entry->relocsfdv
4605 + entry->relocstlsoff + entry->relocstlsd;
4608 if (entry->symndx != -1
4609 || FRVFDPIC_FUNCDESC_LOCAL (dinfo->info, entry->d.h))
4611 if (entry->symndx != -1
4612 || entry->d.h->root.type != bfd_link_hash_undefweak)
4613 fixups += entry->relocsfd;
4615 else
4616 relocs += entry->relocsfd;
4619 if (subtract)
4621 relocs = - relocs;
4622 fixups = - fixups;
4623 tlsrets = - tlsrets;
4626 entry->dynrelocs += relocs;
4627 entry->fixups += fixups;
4628 dinfo->relocs += relocs;
4629 dinfo->fixups += fixups;
4630 dinfo->tls_ret_refs += tlsrets;
4633 /* Look for opportunities to relax TLS relocations. We can assume
4634 we're linking the main executable or a static-tls library, since
4635 otherwise we wouldn't have got here. When relaxing, we have to
4636 first undo any previous accounting of TLS uses of fixups, dynamic
4637 relocations, GOT and PLT entries. */
4639 static void
4640 _frvfdpic_relax_tls_entries (struct frvfdpic_relocs_info *entry,
4641 struct _frvfdpic_dynamic_got_info *dinfo,
4642 bfd_boolean relaxing)
4644 bfd_boolean changed = ! relaxing;
4646 BFD_ASSERT (dinfo->info->executable
4647 || (dinfo->info->flags & DF_STATIC_TLS));
4649 if (entry->tlsdesc12 || entry->tlsdesclos || entry->tlsdeschilo)
4651 if (! changed)
4653 _frvfdpic_count_relocs_fixups (entry, dinfo, TRUE);
4654 _frvfdpic_count_tls_entries (entry, dinfo, TRUE);
4655 changed = TRUE;
4658 /* When linking an executable, we can always decay GOTTLSDESC to
4659 TLSMOFF, if the symbol is local, or GOTTLSOFF, otherwise.
4660 When linking a static-tls shared library, using TLSMOFF is
4661 not an option, but we can still use GOTTLSOFF. When decaying
4662 to GOTTLSOFF, we must keep the GOT entry in range. We know
4663 it has to fit because we'll be trading the 4 words of hte TLS
4664 descriptor for a single word in the same range. */
4665 if (! dinfo->info->executable
4666 || (entry->symndx == -1
4667 && ! FRVFDPIC_SYM_LOCAL (dinfo->info, entry->d.h)))
4669 entry->tlsoff12 |= entry->tlsdesc12;
4670 entry->tlsofflos |= entry->tlsdesclos;
4671 entry->tlsoffhilo |= entry->tlsdeschilo;
4674 entry->tlsdesc12 = entry->tlsdesclos = entry->tlsdeschilo = 0;
4677 /* We can only decay TLSOFFs or call #gettlsoff to TLSMOFF in the
4678 main executable. We have to check whether the symbol's TLSOFF is
4679 in range for a setlos. For symbols with a hash entry, we can
4680 determine exactly what to do; for others locals, we don't have
4681 addresses handy, so we use the size of the TLS section as an
4682 approximation. If we get it wrong, we'll retain a GOT entry
4683 holding the TLS offset (without dynamic relocations or fixups),
4684 but we'll still optimize away the loads from it. Since TLS sizes
4685 are generally very small, it's probably not worth attempting to
4686 do better than this. */
4687 if ((entry->tlsplt
4688 || entry->tlsoff12 || entry->tlsofflos || entry->tlsoffhilo)
4689 && dinfo->info->executable && relaxing
4690 && ((entry->symndx == -1
4691 && FRVFDPIC_SYM_LOCAL (dinfo->info, entry->d.h)
4692 /* The above may hold for an undefweak TLS symbol, so make
4693 sure we don't have this case before accessing def.value
4694 and def.section. */
4695 && (entry->d.h->root.type == bfd_link_hash_undefweak
4696 || (bfd_vma)(entry->d.h->root.u.def.value
4697 + (entry->d.h->root.u.def.section
4698 ->output_section->vma)
4699 + entry->d.h->root.u.def.section->output_offset
4700 + entry->addend
4701 - tls_biased_base (dinfo->info)
4702 + 32768) < (bfd_vma)65536))
4703 || (entry->symndx != -1
4704 && (elf_hash_table (dinfo->info)->tls_sec->size
4705 + abs (entry->addend) < 32768 + FRVFDPIC_TLS_BIAS))))
4707 if (! changed)
4709 _frvfdpic_count_relocs_fixups (entry, dinfo, TRUE);
4710 _frvfdpic_count_tls_entries (entry, dinfo, TRUE);
4711 changed = TRUE;
4714 entry->tlsplt =
4715 entry->tlsoff12 = entry->tlsofflos = entry->tlsoffhilo = 0;
4718 /* We can decay `call #gettlsoff' to a ldi #tlsoff if we already
4719 have a #gottlsoff12 relocation for this entry, or if we can fit
4720 one more in the 12-bit (and 16-bit) ranges. */
4721 if (entry->tlsplt
4722 && (entry->tlsoff12
4723 || (relaxing
4724 && dinfo->got12 + dinfo->fd12 + dinfo->tlsd12 <= 4096 - 12 - 4
4725 && (dinfo->got12 + dinfo->fd12 + dinfo->tlsd12
4726 + dinfo->gotlos + dinfo->fdlos + dinfo->tlsdlos
4727 <= 65536 - 12 - 4))))
4729 if (! changed)
4731 _frvfdpic_count_relocs_fixups (entry, dinfo, TRUE);
4732 _frvfdpic_count_tls_entries (entry, dinfo, TRUE);
4733 changed = TRUE;
4736 entry->tlsoff12 = 1;
4737 entry->tlsplt = 0;
4740 if (changed)
4742 _frvfdpic_count_tls_entries (entry, dinfo, FALSE);
4743 _frvfdpic_count_relocs_fixups (entry, dinfo, FALSE);
4746 return;
4749 /* Compute the total GOT and PLT size required by each symbol in each range. *
4750 Symbols may require up to 4 words in the GOT: an entry pointing to
4751 the symbol, an entry pointing to its function descriptor, and a
4752 private function descriptors taking two words. */
4754 static int
4755 _frvfdpic_count_got_plt_entries (void **entryp, void *dinfo_)
4757 struct frvfdpic_relocs_info *entry = *entryp;
4758 struct _frvfdpic_dynamic_got_info *dinfo = dinfo_;
4760 _frvfdpic_count_nontls_entries (entry, dinfo);
4762 if (dinfo->info->executable || (dinfo->info->flags & DF_STATIC_TLS))
4763 _frvfdpic_relax_tls_entries (entry, dinfo, FALSE);
4764 else
4766 _frvfdpic_count_tls_entries (entry, dinfo, FALSE);
4767 _frvfdpic_count_relocs_fixups (entry, dinfo, FALSE);
4770 return 1;
4773 /* Determine the positive and negative ranges to be used by each
4774 offset range in the GOT. FDCUR and CUR, that must be aligned to a
4775 double-word boundary, are the minimum (negative) and maximum
4776 (positive) GOT offsets already used by previous ranges, except for
4777 an ODD entry that may have been left behind. GOT and FD indicate
4778 the size of GOT entries and function descriptors that must be
4779 placed within the range from -WRAP to WRAP. If there's room left,
4780 up to FDPLT bytes should be reserved for additional function
4781 descriptors. */
4783 inline static bfd_signed_vma
4784 _frvfdpic_compute_got_alloc_data (struct _frvfdpic_dynamic_got_alloc_data *gad,
4785 bfd_signed_vma fdcur,
4786 bfd_signed_vma odd,
4787 bfd_signed_vma cur,
4788 bfd_vma got,
4789 bfd_vma fd,
4790 bfd_vma fdplt,
4791 bfd_vma tlsd,
4792 bfd_vma tlsdplt,
4793 bfd_vma wrap)
4795 bfd_signed_vma wrapmin = -wrap;
4796 const bfd_vma tdescsz = 8;
4798 /* Start at the given initial points. */
4799 gad->fdcur = fdcur;
4800 gad->cur = cur;
4802 /* If we had an incoming odd word and we have any got entries that
4803 are going to use it, consume it, otherwise leave gad->odd at
4804 zero. We might force gad->odd to zero and return the incoming
4805 odd such that it is used by the next range, but then GOT entries
4806 might appear to be out of order and we wouldn't be able to
4807 shorten the GOT by one word if it turns out to end with an
4808 unpaired GOT entry. */
4809 if (odd && got)
4811 gad->odd = odd;
4812 got -= 4;
4813 odd = 0;
4815 else
4816 gad->odd = 0;
4818 /* If we're left with an unpaired GOT entry, compute its location
4819 such that we can return it. Otherwise, if got doesn't require an
4820 odd number of words here, either odd was already zero in the
4821 block above, or it was set to zero because got was non-zero, or
4822 got was already zero. In the latter case, we want the value of
4823 odd to carry over to the return statement, so we don't want to
4824 reset odd unless the condition below is true. */
4825 if (got & 4)
4827 odd = cur + got;
4828 got += 4;
4831 /* Compute the tentative boundaries of this range. */
4832 gad->max = cur + got;
4833 gad->min = fdcur - fd;
4834 gad->fdplt = 0;
4836 /* If function descriptors took too much space, wrap some of them
4837 around. */
4838 if (gad->min < wrapmin)
4840 gad->max += wrapmin - gad->min;
4841 gad->tmin = gad->min = wrapmin;
4844 /* If GOT entries took too much space, wrap some of them around.
4845 This may well cause gad->min to become lower than wrapmin. This
4846 will cause a relocation overflow later on, so we don't have to
4847 report it here . */
4848 if ((bfd_vma) gad->max > wrap)
4850 gad->min -= gad->max - wrap;
4851 gad->max = wrap;
4854 /* Add TLS descriptors. */
4855 gad->tmax = gad->max + tlsd;
4856 gad->tmin = gad->min;
4857 gad->tlsdplt = 0;
4859 /* If TLS descriptors took too much space, wrap an integral number
4860 of them around. */
4861 if ((bfd_vma) gad->tmax > wrap)
4863 bfd_vma wrapsize = gad->tmax - wrap;
4865 wrapsize += tdescsz / 2;
4866 wrapsize &= ~ tdescsz / 2;
4868 gad->tmin -= wrapsize;
4869 gad->tmax -= wrapsize;
4872 /* If there is space left and we have function descriptors
4873 referenced in PLT entries that could take advantage of shorter
4874 offsets, place them now. */
4875 if (fdplt && gad->tmin > wrapmin)
4877 bfd_vma fds;
4879 if ((bfd_vma) (gad->tmin - wrapmin) < fdplt)
4880 fds = gad->tmin - wrapmin;
4881 else
4882 fds = fdplt;
4884 fdplt -= fds;
4885 gad->min -= fds;
4886 gad->tmin -= fds;
4887 gad->fdplt += fds;
4890 /* If there is more space left, try to place some more function
4891 descriptors for PLT entries. */
4892 if (fdplt && (bfd_vma) gad->tmax < wrap)
4894 bfd_vma fds;
4896 if ((bfd_vma) (wrap - gad->tmax) < fdplt)
4897 fds = wrap - gad->tmax;
4898 else
4899 fds = fdplt;
4901 fdplt -= fds;
4902 gad->max += fds;
4903 gad->tmax += fds;
4904 gad->fdplt += fds;
4907 /* If there is space left and we have TLS descriptors referenced in
4908 PLT entries that could take advantage of shorter offsets, place
4909 them now. */
4910 if (tlsdplt && gad->tmin > wrapmin)
4912 bfd_vma tlsds;
4914 if ((bfd_vma) (gad->tmin - wrapmin) < tlsdplt)
4915 tlsds = (gad->tmin - wrapmin) & ~ (tdescsz / 2);
4916 else
4917 tlsds = tlsdplt;
4919 tlsdplt -= tlsds;
4920 gad->tmin -= tlsds;
4921 gad->tlsdplt += tlsds;
4924 /* If there is more space left, try to place some more TLS
4925 descriptors for PLT entries. Although we could try to fit an
4926 additional TLS descriptor with half of it just before before the
4927 wrap point and another right past the wrap point, this might
4928 cause us to run out of space for the next region, so don't do
4929 it. */
4930 if (tlsdplt && (bfd_vma) gad->tmax < wrap - tdescsz / 2)
4932 bfd_vma tlsds;
4934 if ((bfd_vma) (wrap - gad->tmax) < tlsdplt)
4935 tlsds = (wrap - gad->tmax) & ~ (tdescsz / 2);
4936 else
4937 tlsds = tlsdplt;
4939 tlsdplt -= tlsds;
4940 gad->tmax += tlsds;
4941 gad->tlsdplt += tlsds;
4944 /* If odd was initially computed as an offset past the wrap point,
4945 wrap it around. */
4946 if (odd > gad->max)
4947 odd = gad->min + odd - gad->max;
4949 /* _frvfdpic_get_got_entry() below will always wrap gad->cur if needed
4950 before returning, so do it here too. This guarantees that,
4951 should cur and fdcur meet at the wrap point, they'll both be
4952 equal to min. */
4953 if (gad->cur == gad->max)
4954 gad->cur = gad->min;
4956 /* Ditto for _frvfdpic_get_tlsdesc_entry(). */
4957 gad->tcur = gad->max;
4958 if (gad->tcur == gad->tmax)
4959 gad->tcur = gad->tmin;
4961 return odd;
4964 /* Compute the location of the next GOT entry, given the allocation
4965 data for a range. */
4967 inline static bfd_signed_vma
4968 _frvfdpic_get_got_entry (struct _frvfdpic_dynamic_got_alloc_data *gad)
4970 bfd_signed_vma ret;
4972 if (gad->odd)
4974 /* If there was an odd word left behind, use it. */
4975 ret = gad->odd;
4976 gad->odd = 0;
4978 else
4980 /* Otherwise, use the word pointed to by cur, reserve the next
4981 as an odd word, and skip to the next pair of words, possibly
4982 wrapping around. */
4983 ret = gad->cur;
4984 gad->odd = gad->cur + 4;
4985 gad->cur += 8;
4986 if (gad->cur == gad->max)
4987 gad->cur = gad->min;
4990 return ret;
4993 /* Compute the location of the next function descriptor entry in the
4994 GOT, given the allocation data for a range. */
4996 inline static bfd_signed_vma
4997 _frvfdpic_get_fd_entry (struct _frvfdpic_dynamic_got_alloc_data *gad)
4999 /* If we're at the bottom, wrap around, and only then allocate the
5000 next pair of words. */
5001 if (gad->fdcur == gad->min)
5002 gad->fdcur = gad->max;
5003 return gad->fdcur -= 8;
5006 /* Compute the location of the next TLS descriptor entry in the GOT,
5007 given the allocation data for a range. */
5008 inline static bfd_signed_vma
5009 _frvfdpic_get_tlsdesc_entry (struct _frvfdpic_dynamic_got_alloc_data *gad)
5011 bfd_signed_vma ret;
5013 ret = gad->tcur;
5015 gad->tcur += 8;
5017 /* If we're at the top of the region, wrap around to the bottom. */
5018 if (gad->tcur == gad->tmax)
5019 gad->tcur = gad->tmin;
5021 return ret;
5024 /* Assign GOT offsets for every GOT entry and function descriptor.
5025 Doing everything in a single pass is tricky. */
5027 static int
5028 _frvfdpic_assign_got_entries (void **entryp, void *info_)
5030 struct frvfdpic_relocs_info *entry = *entryp;
5031 struct _frvfdpic_dynamic_got_plt_info *dinfo = info_;
5033 if (entry->got12)
5034 entry->got_entry = _frvfdpic_get_got_entry (&dinfo->got12);
5035 else if (entry->gotlos)
5036 entry->got_entry = _frvfdpic_get_got_entry (&dinfo->gotlos);
5037 else if (entry->gothilo)
5038 entry->got_entry = _frvfdpic_get_got_entry (&dinfo->gothilo);
5040 if (entry->fdgot12)
5041 entry->fdgot_entry = _frvfdpic_get_got_entry (&dinfo->got12);
5042 else if (entry->fdgotlos)
5043 entry->fdgot_entry = _frvfdpic_get_got_entry (&dinfo->gotlos);
5044 else if (entry->fdgothilo)
5045 entry->fdgot_entry = _frvfdpic_get_got_entry (&dinfo->gothilo);
5047 if (entry->fdgoff12)
5048 entry->fd_entry = _frvfdpic_get_fd_entry (&dinfo->got12);
5049 else if (entry->plt && dinfo->got12.fdplt)
5051 dinfo->got12.fdplt -= 8;
5052 entry->fd_entry = _frvfdpic_get_fd_entry (&dinfo->got12);
5054 else if (entry->fdgofflos)
5055 entry->fd_entry = _frvfdpic_get_fd_entry (&dinfo->gotlos);
5056 else if (entry->plt && dinfo->gotlos.fdplt)
5058 dinfo->gotlos.fdplt -= 8;
5059 entry->fd_entry = _frvfdpic_get_fd_entry (&dinfo->gotlos);
5061 else if (entry->plt)
5063 dinfo->gothilo.fdplt -= 8;
5064 entry->fd_entry = _frvfdpic_get_fd_entry (&dinfo->gothilo);
5066 else if (entry->privfd)
5067 entry->fd_entry = _frvfdpic_get_fd_entry (&dinfo->gothilo);
5069 if (entry->tlsoff12)
5070 entry->tlsoff_entry = _frvfdpic_get_got_entry (&dinfo->got12);
5071 else if (entry->tlsofflos)
5072 entry->tlsoff_entry = _frvfdpic_get_got_entry (&dinfo->gotlos);
5073 else if (entry->tlsoffhilo)
5074 entry->tlsoff_entry = _frvfdpic_get_got_entry (&dinfo->gothilo);
5076 if (entry->tlsdesc12)
5077 entry->tlsdesc_entry = _frvfdpic_get_tlsdesc_entry (&dinfo->got12);
5078 else if (entry->tlsplt && dinfo->got12.tlsdplt)
5080 dinfo->got12.tlsdplt -= 8;
5081 entry->tlsdesc_entry = _frvfdpic_get_tlsdesc_entry (&dinfo->got12);
5083 else if (entry->tlsdesclos)
5084 entry->tlsdesc_entry = _frvfdpic_get_tlsdesc_entry (&dinfo->gotlos);
5085 else if (entry->tlsplt && dinfo->gotlos.tlsdplt)
5087 dinfo->gotlos.tlsdplt -= 8;
5088 entry->tlsdesc_entry = _frvfdpic_get_tlsdesc_entry (&dinfo->gotlos);
5090 else if (entry->tlsplt)
5092 dinfo->gothilo.tlsdplt -= 8;
5093 entry->tlsdesc_entry = _frvfdpic_get_tlsdesc_entry (&dinfo->gothilo);
5095 else if (entry->tlsdeschilo)
5096 entry->tlsdesc_entry = _frvfdpic_get_tlsdesc_entry (&dinfo->gothilo);
5098 return 1;
5101 /* Assign GOT offsets to private function descriptors used by PLT
5102 entries (or referenced by 32-bit offsets), as well as PLT entries
5103 and lazy PLT entries. */
5105 static int
5106 _frvfdpic_assign_plt_entries (void **entryp, void *info_)
5108 struct frvfdpic_relocs_info *entry = *entryp;
5109 struct _frvfdpic_dynamic_got_plt_info *dinfo = info_;
5111 if (entry->privfd)
5112 BFD_ASSERT (entry->fd_entry);
5114 if (entry->plt)
5116 int size;
5118 /* We use the section's raw size to mark the location of the
5119 next PLT entry. */
5120 entry->plt_entry = frvfdpic_plt_section (dinfo->g.info)->size;
5122 /* Figure out the length of this PLT entry based on the
5123 addressing mode we need to reach the function descriptor. */
5124 BFD_ASSERT (entry->fd_entry);
5125 if (entry->fd_entry >= -(1 << (12 - 1))
5126 && entry->fd_entry < (1 << (12 - 1)))
5127 size = 8;
5128 else if (entry->fd_entry >= -(1 << (16 - 1))
5129 && entry->fd_entry < (1 << (16 - 1)))
5130 size = 12;
5131 else
5132 size = 16;
5134 frvfdpic_plt_section (dinfo->g.info)->size += size;
5137 if (entry->lazyplt)
5139 entry->lzplt_entry = dinfo->g.lzplt;
5140 dinfo->g.lzplt += 8;
5141 /* If this entry is the one that gets the resolver stub, account
5142 for the additional instruction. */
5143 if (entry->lzplt_entry % FRVFDPIC_LZPLT_BLOCK_SIZE
5144 == FRVFDPIC_LZPLT_RESOLV_LOC)
5145 dinfo->g.lzplt += 4;
5148 if (entry->tlsplt)
5150 int size;
5152 entry->tlsplt_entry
5153 = frvfdpic_plt_section (dinfo->g.info)->size;
5155 if (dinfo->g.info->executable
5156 && (entry->symndx != -1
5157 || FRVFDPIC_SYM_LOCAL (dinfo->g.info, entry->d.h)))
5159 if ((bfd_signed_vma)entry->addend >= -(1 << (16 - 1))
5160 /* FIXME: here we use the size of the TLS section
5161 as an upper bound for the value of the TLS
5162 symbol, because we may not know the exact value
5163 yet. If we get it wrong, we'll just waste a
5164 word in the PLT, and we should never get even
5165 close to 32 KiB of TLS anyway. */
5166 && elf_hash_table (dinfo->g.info)->tls_sec
5167 && (elf_hash_table (dinfo->g.info)->tls_sec->size
5168 + (bfd_signed_vma)(entry->addend) <= (1 << (16 - 1))))
5169 size = 8;
5170 else
5171 size = 12;
5173 else if (entry->tlsoff_entry)
5175 if (entry->tlsoff_entry >= -(1 << (12 - 1))
5176 && entry->tlsoff_entry < (1 << (12 - 1)))
5177 size = 8;
5178 else if (entry->tlsoff_entry >= -(1 << (16 - 1))
5179 && entry->tlsoff_entry < (1 << (16 - 1)))
5180 size = 12;
5181 else
5182 size = 16;
5184 else
5186 BFD_ASSERT (entry->tlsdesc_entry);
5188 if (entry->tlsdesc_entry >= -(1 << (12 - 1))
5189 && entry->tlsdesc_entry < (1 << (12 - 1)))
5190 size = 8;
5191 else if (entry->tlsdesc_entry >= -(1 << (16 - 1))
5192 && entry->tlsdesc_entry < (1 << (16 - 1)))
5193 size = 12;
5194 else
5195 size = 16;
5198 frvfdpic_plt_section (dinfo->g.info)->size += size;
5201 return 1;
5204 /* Cancel out any effects of calling _frvfdpic_assign_got_entries and
5205 _frvfdpic_assign_plt_entries. */
5207 static int
5208 _frvfdpic_reset_got_plt_entries (void **entryp, void *ignore ATTRIBUTE_UNUSED)
5210 struct frvfdpic_relocs_info *entry = *entryp;
5212 entry->got_entry = 0;
5213 entry->fdgot_entry = 0;
5214 entry->fd_entry = 0;
5215 entry->plt_entry = (bfd_vma)-1;
5216 entry->lzplt_entry = (bfd_vma)-1;
5217 entry->tlsoff_entry = 0;
5218 entry->tlsdesc_entry = 0;
5219 entry->tlsplt_entry = (bfd_vma)-1;
5221 return 1;
5224 /* Follow indirect and warning hash entries so that each got entry
5225 points to the final symbol definition. P must point to a pointer
5226 to the hash table we're traversing. Since this traversal may
5227 modify the hash table, we set this pointer to NULL to indicate
5228 we've made a potentially-destructive change to the hash table, so
5229 the traversal must be restarted. */
5230 static int
5231 _frvfdpic_resolve_final_relocs_info (void **entryp, void *p)
5233 struct frvfdpic_relocs_info *entry = *entryp;
5234 htab_t *htab = p;
5236 if (entry->symndx == -1)
5238 struct elf_link_hash_entry *h = entry->d.h;
5239 struct frvfdpic_relocs_info *oentry;
5241 while (h->root.type == bfd_link_hash_indirect
5242 || h->root.type == bfd_link_hash_warning)
5243 h = (struct elf_link_hash_entry *)h->root.u.i.link;
5245 if (entry->d.h == h)
5246 return 1;
5248 oentry = frvfdpic_relocs_info_for_global (*htab, 0, h, entry->addend,
5249 NO_INSERT);
5251 if (oentry)
5253 /* Merge the two entries. */
5254 frvfdpic_pic_merge_early_relocs_info (oentry, entry);
5255 htab_clear_slot (*htab, entryp);
5256 return 1;
5259 entry->d.h = h;
5261 /* If we can't find this entry with the new bfd hash, re-insert
5262 it, and get the traversal restarted. */
5263 if (! htab_find (*htab, entry))
5265 htab_clear_slot (*htab, entryp);
5266 entryp = htab_find_slot (*htab, entry, INSERT);
5267 if (! *entryp)
5268 *entryp = entry;
5269 /* Abort the traversal, since the whole table may have
5270 moved, and leave it up to the parent to restart the
5271 process. */
5272 *(htab_t *)p = NULL;
5273 return 0;
5277 return 1;
5280 /* Compute the total size of the GOT, the PLT, the dynamic relocations
5281 section and the rofixup section. Assign locations for GOT and PLT
5282 entries. */
5284 static bfd_boolean
5285 _frvfdpic_size_got_plt (bfd *output_bfd,
5286 struct _frvfdpic_dynamic_got_plt_info *gpinfop)
5288 bfd_signed_vma odd;
5289 bfd_vma limit, tlslimit;
5290 struct bfd_link_info *info = gpinfop->g.info;
5291 bfd *dynobj = elf_hash_table (info)->dynobj;
5293 memcpy (frvfdpic_dynamic_got_plt_info (info), &gpinfop->g,
5294 sizeof (gpinfop->g));
5296 odd = 12;
5297 /* Compute the total size taken by entries in the 12-bit and 16-bit
5298 ranges, to tell how many PLT function descriptors we can bring
5299 into the 12-bit range without causing the 16-bit range to
5300 overflow. */
5301 limit = odd + gpinfop->g.got12 + gpinfop->g.gotlos
5302 + gpinfop->g.fd12 + gpinfop->g.fdlos
5303 + gpinfop->g.tlsd12 + gpinfop->g.tlsdlos;
5304 if (limit < (bfd_vma)1 << 16)
5305 limit = ((bfd_vma)1 << 16) - limit;
5306 else
5307 limit = 0;
5308 if (gpinfop->g.fdplt < limit)
5310 tlslimit = (limit - gpinfop->g.fdplt) & ~ (bfd_vma) 8;
5311 limit = gpinfop->g.fdplt;
5313 else
5314 tlslimit = 0;
5315 if (gpinfop->g.tlsdplt < tlslimit)
5316 tlslimit = gpinfop->g.tlsdplt;
5318 /* Determine the ranges of GOT offsets that we can use for each
5319 range of addressing modes. */
5320 odd = _frvfdpic_compute_got_alloc_data (&gpinfop->got12,
5322 odd,
5324 gpinfop->g.got12,
5325 gpinfop->g.fd12,
5326 limit,
5327 gpinfop->g.tlsd12,
5328 tlslimit,
5329 (bfd_vma)1 << (12-1));
5330 odd = _frvfdpic_compute_got_alloc_data (&gpinfop->gotlos,
5331 gpinfop->got12.tmin,
5332 odd,
5333 gpinfop->got12.tmax,
5334 gpinfop->g.gotlos,
5335 gpinfop->g.fdlos,
5336 gpinfop->g.fdplt
5337 - gpinfop->got12.fdplt,
5338 gpinfop->g.tlsdlos,
5339 gpinfop->g.tlsdplt
5340 - gpinfop->got12.tlsdplt,
5341 (bfd_vma)1 << (16-1));
5342 odd = _frvfdpic_compute_got_alloc_data (&gpinfop->gothilo,
5343 gpinfop->gotlos.tmin,
5344 odd,
5345 gpinfop->gotlos.tmax,
5346 gpinfop->g.gothilo,
5347 gpinfop->g.fdhilo,
5348 gpinfop->g.fdplt
5349 - gpinfop->got12.fdplt
5350 - gpinfop->gotlos.fdplt,
5351 gpinfop->g.tlsdhilo,
5352 gpinfop->g.tlsdplt
5353 - gpinfop->got12.tlsdplt
5354 - gpinfop->gotlos.tlsdplt,
5355 (bfd_vma)1 << (32-1));
5357 /* Now assign (most) GOT offsets. */
5358 htab_traverse (frvfdpic_relocs_info (info), _frvfdpic_assign_got_entries,
5359 gpinfop);
5361 frvfdpic_got_section (info)->size = gpinfop->gothilo.tmax
5362 - gpinfop->gothilo.tmin
5363 /* If an odd word is the last word of the GOT, we don't need this
5364 word to be part of the GOT. */
5365 - (odd + 4 == gpinfop->gothilo.tmax ? 4 : 0);
5366 if (frvfdpic_got_section (info)->size == 0)
5367 frvfdpic_got_section (info)->flags |= SEC_EXCLUDE;
5368 else if (frvfdpic_got_section (info)->size == 12
5369 && ! elf_hash_table (info)->dynamic_sections_created)
5371 frvfdpic_got_section (info)->flags |= SEC_EXCLUDE;
5372 frvfdpic_got_section (info)->size = 0;
5374 /* This will be non-NULL during relaxation. The assumption is that
5375 the size of one of these sections will never grow, only shrink,
5376 so we can use the larger buffer we allocated before. */
5377 else if (frvfdpic_got_section (info)->contents == NULL)
5379 frvfdpic_got_section (info)->contents =
5380 (bfd_byte *) bfd_zalloc (dynobj,
5381 frvfdpic_got_section (info)->size);
5382 if (frvfdpic_got_section (info)->contents == NULL)
5383 return FALSE;
5386 if (frvfdpic_gotrel_section (info))
5387 /* Subtract the number of lzplt entries, since those will generate
5388 relocations in the pltrel section. */
5389 frvfdpic_gotrel_section (info)->size =
5390 (gpinfop->g.relocs - gpinfop->g.lzplt / 8)
5391 * get_elf_backend_data (output_bfd)->s->sizeof_rel;
5392 else
5393 BFD_ASSERT (gpinfop->g.relocs == 0);
5394 if (frvfdpic_gotrel_section (info)->size == 0)
5395 frvfdpic_gotrel_section (info)->flags |= SEC_EXCLUDE;
5396 else if (frvfdpic_gotrel_section (info)->contents == NULL)
5398 frvfdpic_gotrel_section (info)->contents =
5399 (bfd_byte *) bfd_zalloc (dynobj,
5400 frvfdpic_gotrel_section (info)->size);
5401 if (frvfdpic_gotrel_section (info)->contents == NULL)
5402 return FALSE;
5405 frvfdpic_gotfixup_section (info)->size = (gpinfop->g.fixups + 1) * 4;
5406 if (frvfdpic_gotfixup_section (info)->size == 0)
5407 frvfdpic_gotfixup_section (info)->flags |= SEC_EXCLUDE;
5408 else if (frvfdpic_gotfixup_section (info)->contents == NULL)
5410 frvfdpic_gotfixup_section (info)->contents =
5411 (bfd_byte *) bfd_zalloc (dynobj,
5412 frvfdpic_gotfixup_section (info)->size);
5413 if (frvfdpic_gotfixup_section (info)->contents == NULL)
5414 return FALSE;
5417 if (frvfdpic_pltrel_section (info))
5419 frvfdpic_pltrel_section (info)->size =
5420 gpinfop->g.lzplt / 8
5421 * get_elf_backend_data (output_bfd)->s->sizeof_rel;
5422 if (frvfdpic_pltrel_section (info)->size == 0)
5423 frvfdpic_pltrel_section (info)->flags |= SEC_EXCLUDE;
5424 else if (frvfdpic_pltrel_section (info)->contents == NULL)
5426 frvfdpic_pltrel_section (info)->contents =
5427 (bfd_byte *) bfd_zalloc (dynobj,
5428 frvfdpic_pltrel_section (info)->size);
5429 if (frvfdpic_pltrel_section (info)->contents == NULL)
5430 return FALSE;
5434 /* Add 4 bytes for every block of at most 65535 lazy PLT entries,
5435 such that there's room for the additional instruction needed to
5436 call the resolver. Since _frvfdpic_assign_got_entries didn't
5437 account for them, our block size is 4 bytes smaller than the real
5438 block size. */
5439 if (frvfdpic_plt_section (info))
5441 frvfdpic_plt_section (info)->size = gpinfop->g.lzplt
5442 + ((gpinfop->g.lzplt + (FRVFDPIC_LZPLT_BLOCK_SIZE - 4) - 8)
5443 / (FRVFDPIC_LZPLT_BLOCK_SIZE - 4) * 4);
5446 /* Reset it, such that _frvfdpic_assign_plt_entries() can use it to
5447 actually assign lazy PLT entries addresses. */
5448 gpinfop->g.lzplt = 0;
5450 /* Save information that we're going to need to generate GOT and PLT
5451 entries. */
5452 frvfdpic_got_initial_offset (info) = -gpinfop->gothilo.tmin;
5454 if (get_elf_backend_data (output_bfd)->want_got_sym)
5455 elf_hash_table (info)->hgot->root.u.def.value
5456 = frvfdpic_got_initial_offset (info);
5458 if (frvfdpic_plt_section (info))
5459 frvfdpic_plt_initial_offset (info) =
5460 frvfdpic_plt_section (info)->size;
5462 /* Allocate a ret statement at plt_initial_offset, to be used by
5463 locally-resolved TLS descriptors. */
5464 if (gpinfop->g.tls_ret_refs)
5465 frvfdpic_plt_section (info)->size += 4;
5467 htab_traverse (frvfdpic_relocs_info (info), _frvfdpic_assign_plt_entries,
5468 gpinfop);
5470 /* Allocate the PLT section contents only after
5471 _frvfdpic_assign_plt_entries has a chance to add the size of the
5472 non-lazy PLT entries. */
5473 if (frvfdpic_plt_section (info))
5475 if (frvfdpic_plt_section (info)->size == 0)
5476 frvfdpic_plt_section (info)->flags |= SEC_EXCLUDE;
5477 else if (frvfdpic_plt_section (info)->contents == NULL)
5479 frvfdpic_plt_section (info)->contents =
5480 (bfd_byte *) bfd_zalloc (dynobj,
5481 frvfdpic_plt_section (info)->size);
5482 if (frvfdpic_plt_section (info)->contents == NULL)
5483 return FALSE;
5487 return TRUE;
5490 /* Set the sizes of the dynamic sections. */
5492 static bfd_boolean
5493 elf32_frvfdpic_size_dynamic_sections (bfd *output_bfd,
5494 struct bfd_link_info *info)
5496 bfd *dynobj;
5497 asection *s;
5498 struct _frvfdpic_dynamic_got_plt_info gpinfo;
5500 dynobj = elf_hash_table (info)->dynobj;
5501 BFD_ASSERT (dynobj != NULL);
5503 if (elf_hash_table (info)->dynamic_sections_created)
5505 /* Set the contents of the .interp section to the interpreter. */
5506 if (info->executable)
5508 s = bfd_get_section_by_name (dynobj, ".interp");
5509 BFD_ASSERT (s != NULL);
5510 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
5511 s->contents = (bfd_byte *) ELF_DYNAMIC_INTERPRETER;
5515 memset (&gpinfo, 0, sizeof (gpinfo));
5516 gpinfo.g.info = info;
5518 for (;;)
5520 htab_t relocs = frvfdpic_relocs_info (info);
5522 htab_traverse (relocs, _frvfdpic_resolve_final_relocs_info, &relocs);
5524 if (relocs == frvfdpic_relocs_info (info))
5525 break;
5528 htab_traverse (frvfdpic_relocs_info (info), _frvfdpic_count_got_plt_entries,
5529 &gpinfo.g);
5531 /* Allocate space to save the summary information, we're going to
5532 use it if we're doing relaxations. */
5533 frvfdpic_dynamic_got_plt_info (info) = bfd_alloc (dynobj, sizeof (gpinfo.g));
5535 if (!_frvfdpic_size_got_plt (output_bfd, &gpinfo))
5536 return FALSE;
5538 if (elf_hash_table (info)->dynamic_sections_created)
5540 if (frvfdpic_got_section (info)->size)
5541 if (!_bfd_elf_add_dynamic_entry (info, DT_PLTGOT, 0))
5542 return FALSE;
5544 if (frvfdpic_pltrel_section (info)->size)
5545 if (!_bfd_elf_add_dynamic_entry (info, DT_PLTRELSZ, 0)
5546 || !_bfd_elf_add_dynamic_entry (info, DT_PLTREL, DT_REL)
5547 || !_bfd_elf_add_dynamic_entry (info, DT_JMPREL, 0))
5548 return FALSE;
5550 if (frvfdpic_gotrel_section (info)->size)
5551 if (!_bfd_elf_add_dynamic_entry (info, DT_REL, 0)
5552 || !_bfd_elf_add_dynamic_entry (info, DT_RELSZ, 0)
5553 || !_bfd_elf_add_dynamic_entry (info, DT_RELENT,
5554 sizeof (Elf32_External_Rel)))
5555 return FALSE;
5558 return TRUE;
5561 static bfd_boolean
5562 elf32_frvfdpic_always_size_sections (bfd *output_bfd,
5563 struct bfd_link_info *info)
5565 if (!info->relocatable)
5567 struct elf_link_hash_entry *h;
5569 /* Force a PT_GNU_STACK segment to be created. */
5570 if (! elf_tdata (output_bfd)->stack_flags)
5571 elf_tdata (output_bfd)->stack_flags = PF_R | PF_W | PF_X;
5573 /* Define __stacksize if it's not defined yet. */
5574 h = elf_link_hash_lookup (elf_hash_table (info), "__stacksize",
5575 FALSE, FALSE, FALSE);
5576 if (! h || h->root.type != bfd_link_hash_defined
5577 || h->type != STT_OBJECT
5578 || !h->def_regular)
5580 struct bfd_link_hash_entry *bh = NULL;
5582 if (!(_bfd_generic_link_add_one_symbol
5583 (info, output_bfd, "__stacksize",
5584 BSF_GLOBAL, bfd_abs_section_ptr, DEFAULT_STACK_SIZE,
5585 (const char *) NULL, FALSE,
5586 get_elf_backend_data (output_bfd)->collect, &bh)))
5587 return FALSE;
5589 h = (struct elf_link_hash_entry *) bh;
5590 h->def_regular = 1;
5591 h->type = STT_OBJECT;
5592 /* This one must NOT be hidden. */
5596 return TRUE;
5599 /* Look for opportunities to relax TLS relocations. We can assume
5600 we're linking the main executable or a static-tls library, since
5601 otherwise we wouldn't have got here. */
5603 static int
5604 _frvfdpic_relax_got_plt_entries (void **entryp, void *dinfo_)
5606 struct frvfdpic_relocs_info *entry = *entryp;
5607 struct _frvfdpic_dynamic_got_info *dinfo = dinfo_;
5609 _frvfdpic_relax_tls_entries (entry, dinfo, TRUE);
5611 return 1;
5614 static bfd_boolean
5615 elf32_frvfdpic_relax_section (bfd *abfd ATTRIBUTE_UNUSED, asection *sec,
5616 struct bfd_link_info *info, bfd_boolean *again)
5618 struct _frvfdpic_dynamic_got_plt_info gpinfo;
5620 /* If we return early, we didn't change anything. */
5621 *again = FALSE;
5623 /* We'll do our thing when requested to relax the GOT section. */
5624 if (sec != frvfdpic_got_section (info))
5625 return TRUE;
5627 /* We can only relax when linking the main executable or a library
5628 that can't be dlopened. */
5629 if (! info->executable && ! (info->flags & DF_STATIC_TLS))
5630 return TRUE;
5632 /* If there isn't a TLS section for this binary, we can't do
5633 anything about its TLS relocations (it probably doesn't have
5634 any. */
5635 if (elf_hash_table (info)->tls_sec == NULL)
5636 return TRUE;
5638 memset (&gpinfo, 0, sizeof (gpinfo));
5639 memcpy (&gpinfo.g, frvfdpic_dynamic_got_plt_info (info), sizeof (gpinfo.g));
5641 /* Now look for opportunities to relax, adjusting the GOT usage
5642 as needed. */
5643 htab_traverse (frvfdpic_relocs_info (info),
5644 _frvfdpic_relax_got_plt_entries,
5645 &gpinfo.g);
5647 /* If we changed anything, reset and re-assign GOT and PLT entries. */
5648 if (memcmp (frvfdpic_dynamic_got_plt_info (info),
5649 &gpinfo.g, sizeof (gpinfo.g)) != 0)
5651 /* Clear GOT and PLT assignments. */
5652 htab_traverse (frvfdpic_relocs_info (info),
5653 _frvfdpic_reset_got_plt_entries,
5654 NULL);
5656 /* The owner of the TLS section is the output bfd. There should
5657 be a better way to get to it. */
5658 if (!_frvfdpic_size_got_plt (elf_hash_table (info)->tls_sec->owner,
5659 &gpinfo))
5660 return FALSE;
5662 /* Repeat until we don't make any further changes. We could fail to
5663 introduce changes in a round if, for example, the 12-bit range is
5664 full, but we later release some space by getting rid of TLS
5665 descriptors in it. We have to repeat the whole process because
5666 we might have changed the size of a section processed before this
5667 one. */
5668 *again = TRUE;
5671 return TRUE;
5674 static bfd_boolean
5675 elf32_frvfdpic_modify_program_headers (bfd *output_bfd,
5676 struct bfd_link_info *info)
5678 struct elf_obj_tdata *tdata = elf_tdata (output_bfd);
5679 struct elf_segment_map *m;
5680 Elf_Internal_Phdr *p;
5682 /* objcopy and strip preserve what's already there using
5683 elf32_frvfdpic_copy_private_bfd_data (). */
5684 if (! info)
5685 return TRUE;
5687 for (p = tdata->phdr, m = tdata->segment_map; m != NULL; m = m->next, p++)
5688 if (m->p_type == PT_GNU_STACK)
5689 break;
5691 if (m)
5693 struct elf_link_hash_entry *h;
5695 /* Obtain the pointer to the __stacksize symbol. */
5696 h = elf_link_hash_lookup (elf_hash_table (info), "__stacksize",
5697 FALSE, FALSE, FALSE);
5698 if (h)
5700 while (h->root.type == bfd_link_hash_indirect
5701 || h->root.type == bfd_link_hash_warning)
5702 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5703 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
5706 /* Set the header p_memsz from the symbol value. We
5707 intentionally ignore the symbol section. */
5708 if (h && h->root.type == bfd_link_hash_defined)
5709 p->p_memsz = h->root.u.def.value;
5710 else
5711 p->p_memsz = DEFAULT_STACK_SIZE;
5713 p->p_align = 8;
5716 return TRUE;
5719 /* Fill in code and data in dynamic sections. */
5721 static bfd_boolean
5722 elf32_frv_finish_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
5723 struct bfd_link_info *info ATTRIBUTE_UNUSED)
5725 /* Nothing to be done for non-FDPIC. */
5726 return TRUE;
5729 static bfd_boolean
5730 elf32_frvfdpic_finish_dynamic_sections (bfd *output_bfd,
5731 struct bfd_link_info *info)
5733 bfd *dynobj;
5734 asection *sdyn;
5736 dynobj = elf_hash_table (info)->dynobj;
5738 if (frvfdpic_dynamic_got_plt_info (info))
5740 BFD_ASSERT (frvfdpic_dynamic_got_plt_info (info)->tls_ret_refs == 0);
5742 if (frvfdpic_got_section (info))
5744 BFD_ASSERT (frvfdpic_gotrel_section (info)->size
5745 == (frvfdpic_gotrel_section (info)->reloc_count
5746 * sizeof (Elf32_External_Rel)));
5748 if (frvfdpic_gotfixup_section (info))
5750 struct elf_link_hash_entry *hgot = elf_hash_table (info)->hgot;
5751 bfd_vma got_value = hgot->root.u.def.value
5752 + hgot->root.u.def.section->output_section->vma
5753 + hgot->root.u.def.section->output_offset;
5754 struct bfd_link_hash_entry *hend;
5756 _frvfdpic_add_rofixup (output_bfd, frvfdpic_gotfixup_section (info),
5757 got_value, 0);
5759 if (frvfdpic_gotfixup_section (info)->size
5760 != (frvfdpic_gotfixup_section (info)->reloc_count * 4))
5762 error:
5763 (*_bfd_error_handler)
5764 ("LINKER BUG: .rofixup section size mismatch");
5765 return FALSE;
5768 hend = bfd_link_hash_lookup (info->hash, "__ROFIXUP_END__",
5769 FALSE, FALSE, TRUE);
5770 if (hend
5771 && (hend->type == bfd_link_hash_defined
5772 || hend->type == bfd_link_hash_defweak))
5774 bfd_vma value =
5775 frvfdpic_gotfixup_section (info)->output_section->vma
5776 + frvfdpic_gotfixup_section (info)->output_offset
5777 + frvfdpic_gotfixup_section (info)->size
5778 - hend->u.def.section->output_section->vma
5779 - hend->u.def.section->output_offset;
5780 BFD_ASSERT (hend->u.def.value == value);
5781 if (hend->u.def.value != value)
5782 goto error;
5786 if (frvfdpic_pltrel_section (info))
5788 BFD_ASSERT (frvfdpic_pltrel_section (info)->size
5789 == (frvfdpic_pltrel_section (info)->reloc_count
5790 * sizeof (Elf32_External_Rel)));
5794 if (elf_hash_table (info)->dynamic_sections_created)
5796 Elf32_External_Dyn * dyncon;
5797 Elf32_External_Dyn * dynconend;
5799 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
5801 BFD_ASSERT (sdyn != NULL);
5803 dyncon = (Elf32_External_Dyn *) sdyn->contents;
5804 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
5806 for (; dyncon < dynconend; dyncon++)
5808 Elf_Internal_Dyn dyn;
5810 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
5812 switch (dyn.d_tag)
5814 default:
5815 break;
5817 case DT_PLTGOT:
5818 dyn.d_un.d_ptr = frvfdpic_got_section (info)->output_section->vma
5819 + frvfdpic_got_section (info)->output_offset
5820 + frvfdpic_got_initial_offset (info);
5821 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5822 break;
5824 case DT_JMPREL:
5825 dyn.d_un.d_ptr = frvfdpic_pltrel_section (info)
5826 ->output_section->vma
5827 + frvfdpic_pltrel_section (info)->output_offset;
5828 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5829 break;
5831 case DT_PLTRELSZ:
5832 dyn.d_un.d_val = frvfdpic_pltrel_section (info)->size;
5833 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5834 break;
5839 return TRUE;
5842 /* Adjust a symbol defined by a dynamic object and referenced by a
5843 regular object. */
5845 static bfd_boolean
5846 elf32_frvfdpic_adjust_dynamic_symbol
5847 (struct bfd_link_info *info ATTRIBUTE_UNUSED,
5848 struct elf_link_hash_entry *h ATTRIBUTE_UNUSED)
5850 bfd * dynobj;
5852 dynobj = elf_hash_table (info)->dynobj;
5854 /* Make sure we know what is going on here. */
5855 BFD_ASSERT (dynobj != NULL
5856 && (h->u.weakdef != NULL
5857 || (h->def_dynamic
5858 && h->ref_regular
5859 && !h->def_regular)));
5861 /* If this is a weak symbol, and there is a real definition, the
5862 processor independent code will have arranged for us to see the
5863 real definition first, and we can just use the same value. */
5864 if (h->u.weakdef != NULL)
5866 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
5867 || h->u.weakdef->root.type == bfd_link_hash_defweak);
5868 h->root.u.def.section = h->u.weakdef->root.u.def.section;
5869 h->root.u.def.value = h->u.weakdef->root.u.def.value;
5872 return TRUE;
5875 /* Perform any actions needed for dynamic symbols. */
5877 static bfd_boolean
5878 elf32_frvfdpic_finish_dynamic_symbol
5879 (bfd *output_bfd ATTRIBUTE_UNUSED,
5880 struct bfd_link_info *info ATTRIBUTE_UNUSED,
5881 struct elf_link_hash_entry *h ATTRIBUTE_UNUSED,
5882 Elf_Internal_Sym *sym ATTRIBUTE_UNUSED)
5884 return TRUE;
5887 /* Decide whether to attempt to turn absptr or lsda encodings in
5888 shared libraries into pcrel within the given input section. */
5890 static bfd_boolean
5891 frvfdpic_elf_use_relative_eh_frame
5892 (bfd *input_bfd ATTRIBUTE_UNUSED,
5893 struct bfd_link_info *info ATTRIBUTE_UNUSED,
5894 asection *eh_frame_section ATTRIBUTE_UNUSED)
5896 /* We can't use PC-relative encodings in FDPIC binaries, in general. */
5897 return FALSE;
5900 /* Adjust the contents of an eh_frame_hdr section before they're output. */
5902 static bfd_byte
5903 frvfdpic_elf_encode_eh_address (bfd *abfd,
5904 struct bfd_link_info *info,
5905 asection *osec, bfd_vma offset,
5906 asection *loc_sec, bfd_vma loc_offset,
5907 bfd_vma *encoded)
5909 struct elf_link_hash_entry *h;
5911 h = elf_hash_table (info)->hgot;
5912 BFD_ASSERT (h && h->root.type == bfd_link_hash_defined);
5914 if (! h || (_frvfdpic_osec_to_segment (abfd, osec)
5915 == _frvfdpic_osec_to_segment (abfd, loc_sec->output_section)))
5916 return _bfd_elf_encode_eh_address (abfd, info, osec, offset,
5917 loc_sec, loc_offset, encoded);
5919 BFD_ASSERT (_frvfdpic_osec_to_segment (abfd, osec)
5920 == (_frvfdpic_osec_to_segment
5921 (abfd, h->root.u.def.section->output_section)));
5923 *encoded = osec->vma + offset
5924 - (h->root.u.def.value
5925 + h->root.u.def.section->output_section->vma
5926 + h->root.u.def.section->output_offset);
5928 return DW_EH_PE_datarel | DW_EH_PE_sdata4;
5931 /* Look through the relocs for a section during the first phase.
5933 Besides handling virtual table relocs for gc, we have to deal with
5934 all sorts of PIC-related relocations. We describe below the
5935 general plan on how to handle such relocations, even though we only
5936 collect information at this point, storing them in hash tables for
5937 perusal of later passes.
5939 32 relocations are propagated to the linker output when creating
5940 position-independent output. LO16 and HI16 relocations are not
5941 supposed to be encountered in this case.
5943 LABEL16 should always be resolvable by the linker, since it's only
5944 used by branches.
5946 LABEL24, on the other hand, is used by calls. If it turns out that
5947 the target of a call is a dynamic symbol, a PLT entry must be
5948 created for it, which triggers the creation of a private function
5949 descriptor and, unless lazy binding is disabled, a lazy PLT entry.
5951 GPREL relocations require the referenced symbol to be in the same
5952 segment as _gp, but this can only be checked later.
5954 All GOT, GOTOFF and FUNCDESC relocations require a .got section to
5955 exist. LABEL24 might as well, since it may require a PLT entry,
5956 that will require a got.
5958 Non-FUNCDESC GOT relocations require a GOT entry to be created
5959 regardless of whether the symbol is dynamic. However, since a
5960 global symbol that turns out to not be exported may have the same
5961 address of a non-dynamic symbol, we don't assign GOT entries at
5962 this point, such that we can share them in this case. A relocation
5963 for the GOT entry always has to be created, be it to offset a
5964 private symbol by the section load address, be it to get the symbol
5965 resolved dynamically.
5967 FUNCDESC GOT relocations require a GOT entry to be created, and
5968 handled as if a FUNCDESC relocation was applied to the GOT entry in
5969 an object file.
5971 FUNCDESC relocations referencing a symbol that turns out to NOT be
5972 dynamic cause a private function descriptor to be created. The
5973 FUNCDESC relocation then decays to a 32 relocation that points at
5974 the private descriptor. If the symbol is dynamic, the FUNCDESC
5975 relocation is propagated to the linker output, such that the
5976 dynamic linker creates the canonical descriptor, pointing to the
5977 dynamically-resolved definition of the function.
5979 Non-FUNCDESC GOTOFF relocations must always refer to non-dynamic
5980 symbols that are assigned to the same segment as the GOT, but we
5981 can only check this later, after we know the complete set of
5982 symbols defined and/or exported.
5984 FUNCDESC GOTOFF relocations require a function descriptor to be
5985 created and, unless lazy binding is disabled or the symbol is not
5986 dynamic, a lazy PLT entry. Since we can't tell at this point
5987 whether a symbol is going to be dynamic, we have to decide later
5988 whether to create a lazy PLT entry or bind the descriptor directly
5989 to the private function.
5991 FUNCDESC_VALUE relocations are not supposed to be present in object
5992 files, but they may very well be simply propagated to the linker
5993 output, since they have no side effect.
5996 A function descriptor always requires a FUNCDESC_VALUE relocation.
5997 Whether it's in .plt.rel or not depends on whether lazy binding is
5998 enabled and on whether the referenced symbol is dynamic.
6000 The existence of a lazy PLT requires the resolverStub lazy PLT
6001 entry to be present.
6004 As for assignment of GOT, PLT and lazy PLT entries, and private
6005 descriptors, we might do them all sequentially, but we can do
6006 better than that. For example, we can place GOT entries and
6007 private function descriptors referenced using 12-bit operands
6008 closer to the PIC register value, such that these relocations don't
6009 overflow. Those that are only referenced with LO16 relocations
6010 could come next, but we may as well place PLT-required function
6011 descriptors in the 12-bit range to make them shorter. Symbols
6012 referenced with LO16/HI16 may come next, but we may place
6013 additional function descriptors in the 16-bit range if we can
6014 reliably tell that we've already placed entries that are ever
6015 referenced with only LO16. PLT entries are therefore generated as
6016 small as possible, while not introducing relocation overflows in
6017 GOT or FUNCDESC_GOTOFF relocations. Lazy PLT entries could be
6018 generated before or after PLT entries, but not intermingled with
6019 them, such that we can have more lazy PLT entries in range for a
6020 branch to the resolverStub. The resolverStub should be emitted at
6021 the most distant location from the first lazy PLT entry such that
6022 it's still in range for a branch, or closer, if there isn't a need
6023 for so many lazy PLT entries. Additional lazy PLT entries may be
6024 emitted after the resolverStub, as long as branches are still in
6025 range. If the branch goes out of range, longer lazy PLT entries
6026 are emitted.
6028 We could further optimize PLT and lazy PLT entries by giving them
6029 priority in assignment to closer-to-gr17 locations depending on the
6030 number of occurrences of references to them (assuming a function
6031 that's called more often is more important for performance, so its
6032 PLT entry should be faster), or taking hints from the compiler.
6033 Given infinite time and money... :-) */
6035 static bfd_boolean
6036 elf32_frv_check_relocs (abfd, info, sec, relocs)
6037 bfd *abfd;
6038 struct bfd_link_info *info;
6039 asection *sec;
6040 const Elf_Internal_Rela *relocs;
6042 Elf_Internal_Shdr *symtab_hdr;
6043 struct elf_link_hash_entry **sym_hashes, **sym_hashes_end;
6044 const Elf_Internal_Rela *rel;
6045 const Elf_Internal_Rela *rel_end;
6046 bfd *dynobj;
6047 struct frvfdpic_relocs_info *picrel;
6049 if (info->relocatable)
6050 return TRUE;
6052 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6053 sym_hashes = elf_sym_hashes (abfd);
6054 sym_hashes_end = sym_hashes + symtab_hdr->sh_size/sizeof(Elf32_External_Sym);
6055 if (!elf_bad_symtab (abfd))
6056 sym_hashes_end -= symtab_hdr->sh_info;
6058 dynobj = elf_hash_table (info)->dynobj;
6059 rel_end = relocs + sec->reloc_count;
6060 for (rel = relocs; rel < rel_end; rel++)
6062 struct elf_link_hash_entry *h;
6063 unsigned long r_symndx;
6065 r_symndx = ELF32_R_SYM (rel->r_info);
6066 if (r_symndx < symtab_hdr->sh_info)
6067 h = NULL;
6068 else
6070 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
6071 while (h->root.type == bfd_link_hash_indirect
6072 || h->root.type == bfd_link_hash_warning)
6073 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6076 switch (ELF32_R_TYPE (rel->r_info))
6078 case R_FRV_GETTLSOFF:
6079 case R_FRV_TLSDESC_VALUE:
6080 case R_FRV_GOTTLSDESC12:
6081 case R_FRV_GOTTLSDESCHI:
6082 case R_FRV_GOTTLSDESCLO:
6083 case R_FRV_GOTTLSOFF12:
6084 case R_FRV_GOTTLSOFFHI:
6085 case R_FRV_GOTTLSOFFLO:
6086 case R_FRV_TLSOFF:
6087 case R_FRV_GOT12:
6088 case R_FRV_GOTHI:
6089 case R_FRV_GOTLO:
6090 case R_FRV_FUNCDESC_GOT12:
6091 case R_FRV_FUNCDESC_GOTHI:
6092 case R_FRV_FUNCDESC_GOTLO:
6093 case R_FRV_GOTOFF12:
6094 case R_FRV_GOTOFFHI:
6095 case R_FRV_GOTOFFLO:
6096 case R_FRV_FUNCDESC_GOTOFF12:
6097 case R_FRV_FUNCDESC_GOTOFFHI:
6098 case R_FRV_FUNCDESC_GOTOFFLO:
6099 case R_FRV_FUNCDESC:
6100 case R_FRV_FUNCDESC_VALUE:
6101 case R_FRV_TLSMOFF12:
6102 case R_FRV_TLSMOFFHI:
6103 case R_FRV_TLSMOFFLO:
6104 case R_FRV_TLSMOFF:
6105 if (! IS_FDPIC (abfd))
6106 goto bad_reloc;
6107 /* Fall through. */
6108 case R_FRV_GPREL12:
6109 case R_FRV_GPRELU12:
6110 case R_FRV_GPRELHI:
6111 case R_FRV_GPRELLO:
6112 case R_FRV_LABEL24:
6113 case R_FRV_32:
6114 if (! dynobj)
6116 elf_hash_table (info)->dynobj = dynobj = abfd;
6117 if (! _frv_create_got_section (abfd, info))
6118 return FALSE;
6120 if (! IS_FDPIC (abfd))
6122 picrel = NULL;
6123 break;
6125 if (h != NULL)
6127 if (h->dynindx == -1)
6128 switch (ELF_ST_VISIBILITY (h->other))
6130 case STV_INTERNAL:
6131 case STV_HIDDEN:
6132 break;
6133 default:
6134 bfd_elf_link_record_dynamic_symbol (info, h);
6135 break;
6137 picrel
6138 = frvfdpic_relocs_info_for_global (frvfdpic_relocs_info (info),
6139 abfd, h,
6140 rel->r_addend, INSERT);
6142 else
6143 picrel = frvfdpic_relocs_info_for_local (frvfdpic_relocs_info
6144 (info), abfd, r_symndx,
6145 rel->r_addend, INSERT);
6146 if (! picrel)
6147 return FALSE;
6148 break;
6150 default:
6151 picrel = NULL;
6152 break;
6155 switch (ELF32_R_TYPE (rel->r_info))
6157 case R_FRV_LABEL24:
6158 if (IS_FDPIC (abfd))
6159 picrel->call = 1;
6160 break;
6162 case R_FRV_FUNCDESC_VALUE:
6163 picrel->relocsfdv++;
6164 if (bfd_get_section_flags (abfd, sec) & SEC_ALLOC)
6165 picrel->relocs32--;
6166 /* Fall through. */
6168 case R_FRV_32:
6169 if (! IS_FDPIC (abfd))
6170 break;
6172 picrel->sym = 1;
6173 if (bfd_get_section_flags (abfd, sec) & SEC_ALLOC)
6174 picrel->relocs32++;
6175 break;
6177 case R_FRV_GOT12:
6178 picrel->got12 = 1;
6179 break;
6181 case R_FRV_GOTHI:
6182 case R_FRV_GOTLO:
6183 picrel->gothilo = 1;
6184 break;
6186 case R_FRV_FUNCDESC_GOT12:
6187 picrel->fdgot12 = 1;
6188 break;
6190 case R_FRV_FUNCDESC_GOTHI:
6191 case R_FRV_FUNCDESC_GOTLO:
6192 picrel->fdgothilo = 1;
6193 break;
6195 case R_FRV_GOTOFF12:
6196 case R_FRV_GOTOFFHI:
6197 case R_FRV_GOTOFFLO:
6198 picrel->gotoff = 1;
6199 break;
6201 case R_FRV_FUNCDESC_GOTOFF12:
6202 picrel->fdgoff12 = 1;
6203 break;
6205 case R_FRV_FUNCDESC_GOTOFFHI:
6206 case R_FRV_FUNCDESC_GOTOFFLO:
6207 picrel->fdgoffhilo = 1;
6208 break;
6210 case R_FRV_FUNCDESC:
6211 picrel->fd = 1;
6212 picrel->relocsfd++;
6213 break;
6215 case R_FRV_GETTLSOFF:
6216 picrel->tlsplt = 1;
6217 break;
6219 case R_FRV_TLSDESC_VALUE:
6220 picrel->relocstlsd++;
6221 goto bad_reloc;
6223 case R_FRV_GOTTLSDESC12:
6224 picrel->tlsdesc12 = 1;
6225 break;
6227 case R_FRV_GOTTLSDESCHI:
6228 case R_FRV_GOTTLSDESCLO:
6229 picrel->tlsdeschilo = 1;
6230 break;
6232 case R_FRV_TLSMOFF12:
6233 case R_FRV_TLSMOFFHI:
6234 case R_FRV_TLSMOFFLO:
6235 case R_FRV_TLSMOFF:
6236 break;
6238 case R_FRV_GOTTLSOFF12:
6239 picrel->tlsoff12 = 1;
6240 info->flags |= DF_STATIC_TLS;
6241 break;
6243 case R_FRV_GOTTLSOFFHI:
6244 case R_FRV_GOTTLSOFFLO:
6245 picrel->tlsoffhilo = 1;
6246 info->flags |= DF_STATIC_TLS;
6247 break;
6249 case R_FRV_TLSOFF:
6250 picrel->relocstlsoff++;
6251 info->flags |= DF_STATIC_TLS;
6252 goto bad_reloc;
6254 /* This relocation describes the C++ object vtable hierarchy.
6255 Reconstruct it for later use during GC. */
6256 case R_FRV_GNU_VTINHERIT:
6257 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
6258 return FALSE;
6259 break;
6261 /* This relocation describes which C++ vtable entries are actually
6262 used. Record for later use during GC. */
6263 case R_FRV_GNU_VTENTRY:
6264 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
6265 return FALSE;
6266 break;
6268 case R_FRV_LABEL16:
6269 case R_FRV_LO16:
6270 case R_FRV_HI16:
6271 case R_FRV_GPREL12:
6272 case R_FRV_GPRELU12:
6273 case R_FRV_GPREL32:
6274 case R_FRV_GPRELHI:
6275 case R_FRV_GPRELLO:
6276 case R_FRV_TLSDESC_RELAX:
6277 case R_FRV_GETTLSOFF_RELAX:
6278 case R_FRV_TLSOFF_RELAX:
6279 break;
6281 default:
6282 bad_reloc:
6283 (*_bfd_error_handler)
6284 (_("%B: unsupported relocation type %i"),
6285 abfd, ELF32_R_TYPE (rel->r_info));
6286 return FALSE;
6290 return TRUE;
6294 /* Return the machine subcode from the ELF e_flags header. */
6296 static int
6297 elf32_frv_machine (abfd)
6298 bfd *abfd;
6300 switch (elf_elfheader (abfd)->e_flags & EF_FRV_CPU_MASK)
6302 default: break;
6303 case EF_FRV_CPU_FR550: return bfd_mach_fr550;
6304 case EF_FRV_CPU_FR500: return bfd_mach_fr500;
6305 case EF_FRV_CPU_FR450: return bfd_mach_fr450;
6306 case EF_FRV_CPU_FR405: return bfd_mach_fr400;
6307 case EF_FRV_CPU_FR400: return bfd_mach_fr400;
6308 case EF_FRV_CPU_FR300: return bfd_mach_fr300;
6309 case EF_FRV_CPU_SIMPLE: return bfd_mach_frvsimple;
6310 case EF_FRV_CPU_TOMCAT: return bfd_mach_frvtomcat;
6313 return bfd_mach_frv;
6316 /* Set the right machine number for a FRV ELF file. */
6318 static bfd_boolean
6319 elf32_frv_object_p (abfd)
6320 bfd *abfd;
6322 bfd_default_set_arch_mach (abfd, bfd_arch_frv, elf32_frv_machine (abfd));
6323 return (((elf_elfheader (abfd)->e_flags & EF_FRV_FDPIC) != 0)
6324 == (IS_FDPIC (abfd)));
6327 /* Function to set the ELF flag bits. */
6329 static bfd_boolean
6330 frv_elf_set_private_flags (abfd, flags)
6331 bfd *abfd;
6332 flagword flags;
6334 elf_elfheader (abfd)->e_flags = flags;
6335 elf_flags_init (abfd) = TRUE;
6336 return TRUE;
6339 /* Copy backend specific data from one object module to another. */
6341 static bfd_boolean
6342 frv_elf_copy_private_bfd_data (ibfd, obfd)
6343 bfd *ibfd;
6344 bfd *obfd;
6346 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6347 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6348 return TRUE;
6350 BFD_ASSERT (!elf_flags_init (obfd)
6351 || elf_elfheader (obfd)->e_flags == elf_elfheader (ibfd)->e_flags);
6353 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
6354 elf_flags_init (obfd) = TRUE;
6355 return TRUE;
6358 /* Return true if the architecture described by elf header flag
6359 EXTENSION is an extension of the architecture described by BASE. */
6361 static bfd_boolean
6362 frv_elf_arch_extension_p (flagword base, flagword extension)
6364 if (base == extension)
6365 return TRUE;
6367 /* CPU_GENERIC code can be merged with code for a specific
6368 architecture, in which case the result is marked as being
6369 for the specific architecture. Everything is therefore
6370 an extension of CPU_GENERIC. */
6371 if (base == EF_FRV_CPU_GENERIC)
6372 return TRUE;
6374 if (extension == EF_FRV_CPU_FR450)
6375 if (base == EF_FRV_CPU_FR400 || base == EF_FRV_CPU_FR405)
6376 return TRUE;
6378 if (extension == EF_FRV_CPU_FR405)
6379 if (base == EF_FRV_CPU_FR400)
6380 return TRUE;
6382 return FALSE;
6385 static bfd_boolean
6386 elf32_frvfdpic_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
6388 unsigned i;
6390 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6391 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6392 return TRUE;
6394 if (! frv_elf_copy_private_bfd_data (ibfd, obfd))
6395 return FALSE;
6397 if (! elf_tdata (ibfd) || ! elf_tdata (ibfd)->phdr
6398 || ! elf_tdata (obfd) || ! elf_tdata (obfd)->phdr)
6399 return TRUE;
6401 /* Copy the stack size. */
6402 for (i = 0; i < elf_elfheader (ibfd)->e_phnum; i++)
6403 if (elf_tdata (ibfd)->phdr[i].p_type == PT_GNU_STACK)
6405 Elf_Internal_Phdr *iphdr = &elf_tdata (ibfd)->phdr[i];
6407 for (i = 0; i < elf_elfheader (obfd)->e_phnum; i++)
6408 if (elf_tdata (obfd)->phdr[i].p_type == PT_GNU_STACK)
6410 memcpy (&elf_tdata (obfd)->phdr[i], iphdr, sizeof (*iphdr));
6412 /* Rewrite the phdrs, since we're only called after they
6413 were first written. */
6414 if (bfd_seek (obfd, (bfd_signed_vma) get_elf_backend_data (obfd)
6415 ->s->sizeof_ehdr, SEEK_SET) != 0
6416 || get_elf_backend_data (obfd)->s
6417 ->write_out_phdrs (obfd, elf_tdata (obfd)->phdr,
6418 elf_elfheader (obfd)->e_phnum) != 0)
6419 return FALSE;
6420 break;
6423 break;
6426 return TRUE;
6429 /* Merge backend specific data from an object file to the output
6430 object file when linking. */
6432 static bfd_boolean
6433 frv_elf_merge_private_bfd_data (ibfd, obfd)
6434 bfd *ibfd;
6435 bfd *obfd;
6437 flagword old_flags, old_partial;
6438 flagword new_flags, new_partial;
6439 bfd_boolean error = FALSE;
6440 char new_opt[80];
6441 char old_opt[80];
6443 new_opt[0] = old_opt[0] = '\0';
6444 new_flags = elf_elfheader (ibfd)->e_flags;
6445 old_flags = elf_elfheader (obfd)->e_flags;
6447 if (new_flags & EF_FRV_FDPIC)
6448 new_flags &= ~EF_FRV_PIC;
6450 #ifdef DEBUG
6451 (*_bfd_error_handler) ("old_flags = 0x%.8lx, new_flags = 0x%.8lx, init = %s, filename = %s",
6452 old_flags, new_flags, elf_flags_init (obfd) ? "yes" : "no",
6453 bfd_get_filename (ibfd));
6454 #endif
6456 if (!elf_flags_init (obfd)) /* First call, no flags set. */
6458 elf_flags_init (obfd) = TRUE;
6459 old_flags = new_flags;
6462 else if (new_flags == old_flags) /* Compatible flags are ok. */
6465 else /* Possibly incompatible flags. */
6467 /* Warn if different # of gprs are used. Note, 0 means nothing is
6468 said about the size of gprs. */
6469 new_partial = (new_flags & EF_FRV_GPR_MASK);
6470 old_partial = (old_flags & EF_FRV_GPR_MASK);
6471 if (new_partial == old_partial)
6474 else if (new_partial == 0)
6477 else if (old_partial == 0)
6478 old_flags |= new_partial;
6480 else
6482 switch (new_partial)
6484 default: strcat (new_opt, " -mgpr-??"); break;
6485 case EF_FRV_GPR_32: strcat (new_opt, " -mgpr-32"); break;
6486 case EF_FRV_GPR_64: strcat (new_opt, " -mgpr-64"); break;
6489 switch (old_partial)
6491 default: strcat (old_opt, " -mgpr-??"); break;
6492 case EF_FRV_GPR_32: strcat (old_opt, " -mgpr-32"); break;
6493 case EF_FRV_GPR_64: strcat (old_opt, " -mgpr-64"); break;
6497 /* Warn if different # of fprs are used. Note, 0 means nothing is
6498 said about the size of fprs. */
6499 new_partial = (new_flags & EF_FRV_FPR_MASK);
6500 old_partial = (old_flags & EF_FRV_FPR_MASK);
6501 if (new_partial == old_partial)
6504 else if (new_partial == 0)
6507 else if (old_partial == 0)
6508 old_flags |= new_partial;
6510 else
6512 switch (new_partial)
6514 default: strcat (new_opt, " -mfpr-?"); break;
6515 case EF_FRV_FPR_32: strcat (new_opt, " -mfpr-32"); break;
6516 case EF_FRV_FPR_64: strcat (new_opt, " -mfpr-64"); break;
6517 case EF_FRV_FPR_NONE: strcat (new_opt, " -msoft-float"); break;
6520 switch (old_partial)
6522 default: strcat (old_opt, " -mfpr-?"); break;
6523 case EF_FRV_FPR_32: strcat (old_opt, " -mfpr-32"); break;
6524 case EF_FRV_FPR_64: strcat (old_opt, " -mfpr-64"); break;
6525 case EF_FRV_FPR_NONE: strcat (old_opt, " -msoft-float"); break;
6529 /* Warn if different dword support was used. Note, 0 means nothing is
6530 said about the dword support. */
6531 new_partial = (new_flags & EF_FRV_DWORD_MASK);
6532 old_partial = (old_flags & EF_FRV_DWORD_MASK);
6533 if (new_partial == old_partial)
6536 else if (new_partial == 0)
6539 else if (old_partial == 0)
6540 old_flags |= new_partial;
6542 else
6544 switch (new_partial)
6546 default: strcat (new_opt, " -mdword-?"); break;
6547 case EF_FRV_DWORD_YES: strcat (new_opt, " -mdword"); break;
6548 case EF_FRV_DWORD_NO: strcat (new_opt, " -mno-dword"); break;
6551 switch (old_partial)
6553 default: strcat (old_opt, " -mdword-?"); break;
6554 case EF_FRV_DWORD_YES: strcat (old_opt, " -mdword"); break;
6555 case EF_FRV_DWORD_NO: strcat (old_opt, " -mno-dword"); break;
6559 /* Or in flags that accumulate (ie, if one module uses it, mark that the
6560 feature is used. */
6561 old_flags |= new_flags & (EF_FRV_DOUBLE
6562 | EF_FRV_MEDIA
6563 | EF_FRV_MULADD
6564 | EF_FRV_NON_PIC_RELOCS);
6566 /* If any module was compiled without -G0, clear the G0 bit. */
6567 old_flags = ((old_flags & ~ EF_FRV_G0)
6568 | (old_flags & new_flags & EF_FRV_G0));
6570 /* If any module was compiled without -mnopack, clear the mnopack bit. */
6571 old_flags = ((old_flags & ~ EF_FRV_NOPACK)
6572 | (old_flags & new_flags & EF_FRV_NOPACK));
6574 /* We don't have to do anything if the pic flags are the same, or the new
6575 module(s) were compiled with -mlibrary-pic. */
6576 new_partial = (new_flags & EF_FRV_PIC_FLAGS);
6577 old_partial = (old_flags & EF_FRV_PIC_FLAGS);
6578 if ((new_partial == old_partial) || ((new_partial & EF_FRV_LIBPIC) != 0))
6581 /* If the old module(s) were compiled with -mlibrary-pic, copy in the pic
6582 flags if any from the new module. */
6583 else if ((old_partial & EF_FRV_LIBPIC) != 0)
6584 old_flags = (old_flags & ~ EF_FRV_PIC_FLAGS) | new_partial;
6586 /* If we have mixtures of -fpic and -fPIC, or in both bits. */
6587 else if (new_partial != 0 && old_partial != 0)
6588 old_flags |= new_partial;
6590 /* One module was compiled for pic and the other was not, see if we have
6591 had any relocations that are not pic-safe. */
6592 else
6594 if ((old_flags & EF_FRV_NON_PIC_RELOCS) == 0)
6595 old_flags |= new_partial;
6596 else
6598 old_flags &= ~ EF_FRV_PIC_FLAGS;
6599 #ifndef FRV_NO_PIC_ERROR
6600 error = TRUE;
6601 (*_bfd_error_handler)
6602 (_("%s: compiled with %s and linked with modules that use non-pic relocations"),
6603 bfd_get_filename (ibfd),
6604 (new_flags & EF_FRV_BIGPIC) ? "-fPIC" : "-fpic");
6605 #endif
6609 /* Warn if different cpu is used (allow a specific cpu to override
6610 the generic cpu). */
6611 new_partial = (new_flags & EF_FRV_CPU_MASK);
6612 old_partial = (old_flags & EF_FRV_CPU_MASK);
6613 if (frv_elf_arch_extension_p (new_partial, old_partial))
6616 else if (frv_elf_arch_extension_p (old_partial, new_partial))
6617 old_flags = (old_flags & ~EF_FRV_CPU_MASK) | new_partial;
6619 else
6621 switch (new_partial)
6623 default: strcat (new_opt, " -mcpu=?"); break;
6624 case EF_FRV_CPU_GENERIC: strcat (new_opt, " -mcpu=frv"); break;
6625 case EF_FRV_CPU_SIMPLE: strcat (new_opt, " -mcpu=simple"); break;
6626 case EF_FRV_CPU_FR550: strcat (new_opt, " -mcpu=fr550"); break;
6627 case EF_FRV_CPU_FR500: strcat (new_opt, " -mcpu=fr500"); break;
6628 case EF_FRV_CPU_FR450: strcat (new_opt, " -mcpu=fr450"); break;
6629 case EF_FRV_CPU_FR405: strcat (new_opt, " -mcpu=fr405"); break;
6630 case EF_FRV_CPU_FR400: strcat (new_opt, " -mcpu=fr400"); break;
6631 case EF_FRV_CPU_FR300: strcat (new_opt, " -mcpu=fr300"); break;
6632 case EF_FRV_CPU_TOMCAT: strcat (new_opt, " -mcpu=tomcat"); break;
6635 switch (old_partial)
6637 default: strcat (old_opt, " -mcpu=?"); break;
6638 case EF_FRV_CPU_GENERIC: strcat (old_opt, " -mcpu=frv"); break;
6639 case EF_FRV_CPU_SIMPLE: strcat (old_opt, " -mcpu=simple"); break;
6640 case EF_FRV_CPU_FR550: strcat (old_opt, " -mcpu=fr550"); break;
6641 case EF_FRV_CPU_FR500: strcat (old_opt, " -mcpu=fr500"); break;
6642 case EF_FRV_CPU_FR450: strcat (old_opt, " -mcpu=fr450"); break;
6643 case EF_FRV_CPU_FR405: strcat (old_opt, " -mcpu=fr405"); break;
6644 case EF_FRV_CPU_FR400: strcat (old_opt, " -mcpu=fr400"); break;
6645 case EF_FRV_CPU_FR300: strcat (old_opt, " -mcpu=fr300"); break;
6646 case EF_FRV_CPU_TOMCAT: strcat (old_opt, " -mcpu=tomcat"); break;
6650 /* Print out any mismatches from above. */
6651 if (new_opt[0])
6653 error = TRUE;
6654 (*_bfd_error_handler)
6655 (_("%s: compiled with %s and linked with modules compiled with %s"),
6656 bfd_get_filename (ibfd), new_opt, old_opt);
6659 /* Warn about any other mismatches */
6660 new_partial = (new_flags & ~ EF_FRV_ALL_FLAGS);
6661 old_partial = (old_flags & ~ EF_FRV_ALL_FLAGS);
6662 if (new_partial != old_partial)
6664 old_flags |= new_partial;
6665 error = TRUE;
6666 (*_bfd_error_handler)
6667 (_("%s: uses different unknown e_flags (0x%lx) fields than previous modules (0x%lx)"),
6668 bfd_get_filename (ibfd), (long)new_partial, (long)old_partial);
6672 /* If the cpu is -mcpu=simple, then set the -mnopack bit. */
6673 if ((old_flags & EF_FRV_CPU_MASK) == EF_FRV_CPU_SIMPLE)
6674 old_flags |= EF_FRV_NOPACK;
6676 /* Update the old flags now with changes made above. */
6677 old_partial = elf_elfheader (obfd)->e_flags & EF_FRV_CPU_MASK;
6678 elf_elfheader (obfd)->e_flags = old_flags;
6679 if (old_partial != (old_flags & EF_FRV_CPU_MASK))
6680 bfd_default_set_arch_mach (obfd, bfd_arch_frv, elf32_frv_machine (obfd));
6682 if (((new_flags & EF_FRV_FDPIC) == 0)
6683 != (! IS_FDPIC (ibfd)))
6685 error = TRUE;
6686 if (IS_FDPIC (obfd))
6687 (*_bfd_error_handler)
6688 (_("%s: cannot link non-fdpic object file into fdpic executable"),
6689 bfd_get_filename (ibfd));
6690 else
6691 (*_bfd_error_handler)
6692 (_("%s: cannot link fdpic object file into non-fdpic executable"),
6693 bfd_get_filename (ibfd));
6696 if (error)
6697 bfd_set_error (bfd_error_bad_value);
6699 return !error;
6703 bfd_boolean
6704 frv_elf_print_private_bfd_data (abfd, ptr)
6705 bfd *abfd;
6706 PTR ptr;
6708 FILE *file = (FILE *) ptr;
6709 flagword flags;
6711 BFD_ASSERT (abfd != NULL && ptr != NULL);
6713 /* Print normal ELF private data. */
6714 _bfd_elf_print_private_bfd_data (abfd, ptr);
6716 flags = elf_elfheader (abfd)->e_flags;
6717 fprintf (file, _("private flags = 0x%lx:"), (long)flags);
6719 switch (flags & EF_FRV_CPU_MASK)
6721 default: break;
6722 case EF_FRV_CPU_SIMPLE: fprintf (file, " -mcpu=simple"); break;
6723 case EF_FRV_CPU_FR550: fprintf (file, " -mcpu=fr550"); break;
6724 case EF_FRV_CPU_FR500: fprintf (file, " -mcpu=fr500"); break;
6725 case EF_FRV_CPU_FR450: fprintf (file, " -mcpu=fr450"); break;
6726 case EF_FRV_CPU_FR405: fprintf (file, " -mcpu=fr405"); break;
6727 case EF_FRV_CPU_FR400: fprintf (file, " -mcpu=fr400"); break;
6728 case EF_FRV_CPU_FR300: fprintf (file, " -mcpu=fr300"); break;
6729 case EF_FRV_CPU_TOMCAT: fprintf (file, " -mcpu=tomcat"); break;
6732 switch (flags & EF_FRV_GPR_MASK)
6734 default: break;
6735 case EF_FRV_GPR_32: fprintf (file, " -mgpr-32"); break;
6736 case EF_FRV_GPR_64: fprintf (file, " -mgpr-64"); break;
6739 switch (flags & EF_FRV_FPR_MASK)
6741 default: break;
6742 case EF_FRV_FPR_32: fprintf (file, " -mfpr-32"); break;
6743 case EF_FRV_FPR_64: fprintf (file, " -mfpr-64"); break;
6744 case EF_FRV_FPR_NONE: fprintf (file, " -msoft-float"); break;
6747 switch (flags & EF_FRV_DWORD_MASK)
6749 default: break;
6750 case EF_FRV_DWORD_YES: fprintf (file, " -mdword"); break;
6751 case EF_FRV_DWORD_NO: fprintf (file, " -mno-dword"); break;
6754 if (flags & EF_FRV_DOUBLE)
6755 fprintf (file, " -mdouble");
6757 if (flags & EF_FRV_MEDIA)
6758 fprintf (file, " -mmedia");
6760 if (flags & EF_FRV_MULADD)
6761 fprintf (file, " -mmuladd");
6763 if (flags & EF_FRV_PIC)
6764 fprintf (file, " -fpic");
6766 if (flags & EF_FRV_BIGPIC)
6767 fprintf (file, " -fPIC");
6769 if (flags & EF_FRV_LIBPIC)
6770 fprintf (file, " -mlibrary-pic");
6772 if (flags & EF_FRV_FDPIC)
6773 fprintf (file, " -mfdpic");
6775 if (flags & EF_FRV_NON_PIC_RELOCS)
6776 fprintf (file, " non-pic relocations");
6778 if (flags & EF_FRV_G0)
6779 fprintf (file, " -G0");
6781 fputc ('\n', file);
6782 return TRUE;
6786 /* Support for core dump NOTE sections. */
6788 static bfd_boolean
6789 elf32_frv_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
6791 int offset;
6792 unsigned int raw_size;
6794 switch (note->descsz)
6796 default:
6797 return FALSE;
6799 /* The Linux/FRV elf_prstatus struct is 268 bytes long. The other
6800 hardcoded offsets and sizes listed below (and contained within
6801 this lexical block) refer to fields in the target's elf_prstatus
6802 struct. */
6803 case 268:
6804 /* `pr_cursig' is at offset 12. */
6805 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
6807 /* `pr_pid' is at offset 24. */
6808 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 24);
6810 /* `pr_reg' is at offset 72. */
6811 offset = 72;
6813 /* Most grok_prstatus implementations set `raw_size' to the size
6814 of the pr_reg field. For Linux/FRV, we set `raw_size' to be
6815 the size of `pr_reg' plus the size of `pr_exec_fdpic_loadmap'
6816 and `pr_interp_fdpic_loadmap', both of which (by design)
6817 immediately follow `pr_reg'. This will allow these fields to
6818 be viewed by GDB as registers.
6820 `pr_reg' is 184 bytes long. `pr_exec_fdpic_loadmap' and
6821 `pr_interp_fdpic_loadmap' are 4 bytes each. */
6822 raw_size = 184 + 4 + 4;
6824 break;
6827 /* Make a ".reg/999" section. */
6828 return _bfd_elfcore_make_pseudosection (abfd, ".reg", raw_size,
6829 note->descpos + offset);
6832 static bfd_boolean
6833 elf32_frv_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
6835 switch (note->descsz)
6837 default:
6838 return FALSE;
6840 /* The Linux/FRV elf_prpsinfo struct is 124 bytes long. */
6841 case 124:
6843 /* `pr_fname' is found at offset 28 and is 16 bytes long. */
6844 elf_tdata (abfd)->core_program
6845 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
6847 /* `pr_psargs' is found at offset 44 and is 80 bytes long. */
6848 elf_tdata (abfd)->core_command
6849 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
6852 /* Note that for some reason, a spurious space is tacked
6853 onto the end of the args in some (at least one anyway)
6854 implementations, so strip it off if it exists. */
6857 char *command = elf_tdata (abfd)->core_command;
6858 int n = strlen (command);
6860 if (0 < n && command[n - 1] == ' ')
6861 command[n - 1] = '\0';
6864 return TRUE;
6866 #define ELF_ARCH bfd_arch_frv
6867 #define ELF_MACHINE_CODE EM_CYGNUS_FRV
6868 #define ELF_MAXPAGESIZE 0x1000
6870 #define TARGET_BIG_SYM bfd_elf32_frv_vec
6871 #define TARGET_BIG_NAME "elf32-frv"
6873 #define elf_info_to_howto frv_info_to_howto_rela
6874 #define elf_backend_relocate_section elf32_frv_relocate_section
6875 #define elf_backend_gc_mark_hook elf32_frv_gc_mark_hook
6876 #define elf_backend_check_relocs elf32_frv_check_relocs
6877 #define elf_backend_object_p elf32_frv_object_p
6878 #define elf_backend_add_symbol_hook elf32_frv_add_symbol_hook
6880 #define elf_backend_can_gc_sections 1
6881 #define elf_backend_rela_normal 1
6883 #define bfd_elf32_bfd_reloc_type_lookup frv_reloc_type_lookup
6884 #define bfd_elf32_bfd_set_private_flags frv_elf_set_private_flags
6885 #define bfd_elf32_bfd_copy_private_bfd_data frv_elf_copy_private_bfd_data
6886 #define bfd_elf32_bfd_merge_private_bfd_data frv_elf_merge_private_bfd_data
6887 #define bfd_elf32_bfd_print_private_bfd_data frv_elf_print_private_bfd_data
6889 #define elf_backend_want_got_sym 1
6890 #define elf_backend_got_header_size 0
6891 #define elf_backend_want_got_plt 0
6892 #define elf_backend_plt_readonly 1
6893 #define elf_backend_want_plt_sym 0
6894 #define elf_backend_plt_header_size 0
6896 #define elf_backend_finish_dynamic_sections \
6897 elf32_frv_finish_dynamic_sections
6899 #define elf_backend_grok_prstatus elf32_frv_grok_prstatus
6900 #define elf_backend_grok_psinfo elf32_frv_grok_psinfo
6902 #include "elf32-target.h"
6904 #undef ELF_MAXPAGESIZE
6905 #define ELF_MAXPAGESIZE 0x4000
6907 #undef TARGET_BIG_SYM
6908 #define TARGET_BIG_SYM bfd_elf32_frvfdpic_vec
6909 #undef TARGET_BIG_NAME
6910 #define TARGET_BIG_NAME "elf32-frvfdpic"
6911 #undef elf32_bed
6912 #define elf32_bed elf32_frvfdpic_bed
6914 #undef elf_info_to_howto_rel
6915 #define elf_info_to_howto_rel frvfdpic_info_to_howto_rel
6917 #undef bfd_elf32_bfd_link_hash_table_create
6918 #define bfd_elf32_bfd_link_hash_table_create \
6919 frvfdpic_elf_link_hash_table_create
6920 #undef elf_backend_always_size_sections
6921 #define elf_backend_always_size_sections \
6922 elf32_frvfdpic_always_size_sections
6923 #undef elf_backend_modify_program_headers
6924 #define elf_backend_modify_program_headers \
6925 elf32_frvfdpic_modify_program_headers
6926 #undef bfd_elf32_bfd_copy_private_bfd_data
6927 #define bfd_elf32_bfd_copy_private_bfd_data \
6928 elf32_frvfdpic_copy_private_bfd_data
6930 #undef elf_backend_create_dynamic_sections
6931 #define elf_backend_create_dynamic_sections \
6932 elf32_frvfdpic_create_dynamic_sections
6933 #undef elf_backend_adjust_dynamic_symbol
6934 #define elf_backend_adjust_dynamic_symbol \
6935 elf32_frvfdpic_adjust_dynamic_symbol
6936 #undef elf_backend_size_dynamic_sections
6937 #define elf_backend_size_dynamic_sections \
6938 elf32_frvfdpic_size_dynamic_sections
6939 #undef bfd_elf32_bfd_relax_section
6940 #define bfd_elf32_bfd_relax_section \
6941 elf32_frvfdpic_relax_section
6942 #undef elf_backend_finish_dynamic_symbol
6943 #define elf_backend_finish_dynamic_symbol \
6944 elf32_frvfdpic_finish_dynamic_symbol
6945 #undef elf_backend_finish_dynamic_sections
6946 #define elf_backend_finish_dynamic_sections \
6947 elf32_frvfdpic_finish_dynamic_sections
6949 #undef elf_backend_can_make_relative_eh_frame
6950 #define elf_backend_can_make_relative_eh_frame \
6951 frvfdpic_elf_use_relative_eh_frame
6952 #undef elf_backend_can_make_lsda_relative_eh_frame
6953 #define elf_backend_can_make_lsda_relative_eh_frame \
6954 frvfdpic_elf_use_relative_eh_frame
6955 #undef elf_backend_encode_eh_address
6956 #define elf_backend_encode_eh_address \
6957 frvfdpic_elf_encode_eh_address
6959 #undef elf_backend_may_use_rel_p
6960 #define elf_backend_may_use_rel_p 1
6961 #undef elf_backend_may_use_rela_p
6962 #define elf_backend_may_use_rela_p 1
6963 /* We use REL for dynamic relocations only. */
6964 #undef elf_backend_default_use_rela_p
6965 #define elf_backend_default_use_rela_p 1
6967 #undef elf_backend_omit_section_dynsym
6968 #define elf_backend_omit_section_dynsym _frvfdpic_link_omit_section_dynsym
6970 #include "elf32-target.h"