1 /* CRIS-specific support for 32-bit ELF.
2 Copyright 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009
3 Free Software Foundation, Inc.
4 Contributed by Axis Communications AB.
5 Written by Hans-Peter Nilsson, based on elf32-fr30.c
6 PIC and shlib bits based primarily on elf32-m68k.c and elf32-i386.c.
8 This file is part of BFD, the Binary File Descriptor library.
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
20 You should have received a copy of the GNU General Public License
21 along with this program; if not, write to the Free Software
22 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
23 MA 02110-1301, USA. */
32 /* Forward declarations. */
33 static reloc_howto_type * cris_reloc_type_lookup
34 PARAMS ((bfd *abfd, bfd_reloc_code_real_type code));
36 static void cris_info_to_howto_rela
37 PARAMS ((bfd *, arelent *, Elf_Internal_Rela *));
39 static bfd_reloc_status_type cris_elf_pcrel_reloc
40 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
42 static bfd_boolean cris_elf_grok_prstatus
43 PARAMS ((bfd *abfd, Elf_Internal_Note *note));
45 static bfd_boolean cris_elf_grok_psinfo
46 PARAMS ((bfd *abfd, Elf_Internal_Note *note));
48 static bfd_boolean cris_elf_relocate_section
49 PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *, bfd_byte *,
50 Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
52 static bfd_reloc_status_type cris_final_link_relocate
53 PARAMS ((reloc_howto_type *, bfd *, asection *, bfd_byte *,
54 Elf_Internal_Rela *, bfd_vma));
56 static bfd_boolean cris_elf_object_p PARAMS ((bfd *));
58 static void cris_elf_final_write_processing PARAMS ((bfd *, bfd_boolean));
60 static bfd_boolean cris_elf_set_mach_from_flags
61 PARAMS ((bfd *, unsigned long int));
63 static bfd_boolean cris_elf_print_private_bfd_data PARAMS ((bfd *, PTR));
65 static bfd_boolean cris_elf_merge_private_bfd_data PARAMS ((bfd *, bfd *));
66 static bfd_boolean cris_elf_copy_private_bfd_data PARAMS ((bfd *, bfd *));
68 struct elf_cris_link_hash_entry;
69 static bfd_boolean elf_cris_discard_excess_dso_dynamics
70 PARAMS ((struct elf_cris_link_hash_entry *, PTR));
71 static bfd_boolean elf_cris_discard_excess_program_dynamics
72 PARAMS ((struct elf_cris_link_hash_entry *, PTR));
73 static bfd_boolean elf_cris_adjust_gotplt_to_got
74 PARAMS ((struct elf_cris_link_hash_entry *, PTR));
75 static bfd_boolean elf_cris_try_fold_plt_to_got
76 PARAMS ((struct elf_cris_link_hash_entry *, PTR));
77 static struct bfd_hash_entry *elf_cris_link_hash_newfunc
78 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
79 static struct bfd_link_hash_table *elf_cris_link_hash_table_create
81 static bfd_boolean elf_cris_adjust_dynamic_symbol
82 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
83 static bfd_boolean cris_elf_check_relocs
84 PARAMS ((bfd *, struct bfd_link_info *, asection *,
85 const Elf_Internal_Rela *));
87 static bfd_boolean elf_cris_size_dynamic_sections
88 PARAMS ((bfd *, struct bfd_link_info *));
89 static bfd_boolean elf_cris_finish_dynamic_symbol
90 PARAMS ((bfd *, struct bfd_link_info *, struct elf_link_hash_entry *,
92 static bfd_boolean elf_cris_finish_dynamic_sections
93 PARAMS ((bfd *, struct bfd_link_info *));
94 static void elf_cris_hide_symbol
95 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *, bfd_boolean));
96 static enum elf_reloc_type_class elf_cris_reloc_type_class
97 PARAMS ((const Elf_Internal_Rela *));
99 static reloc_howto_type cris_elf_howto_table [] =
101 /* This reloc does nothing. */
102 HOWTO (R_CRIS_NONE, /* type */
104 2, /* size (0 = byte, 1 = short, 2 = long) */
106 FALSE, /* pc_relative */
108 complain_overflow_bitfield, /* complain_on_overflow */
109 bfd_elf_generic_reloc, /* special_function */
110 "R_CRIS_NONE", /* name */
111 FALSE, /* partial_inplace */
114 FALSE), /* pcrel_offset */
116 /* An 8 bit absolute relocation. */
117 HOWTO (R_CRIS_8, /* type */
119 0, /* size (0 = byte, 1 = short, 2 = long) */
121 FALSE, /* pc_relative */
123 complain_overflow_bitfield, /* complain_on_overflow */
124 bfd_elf_generic_reloc, /* special_function */
125 "R_CRIS_8", /* name */
126 FALSE, /* partial_inplace */
127 0x0000, /* src_mask */
128 0x00ff, /* dst_mask */
129 FALSE), /* pcrel_offset */
131 /* A 16 bit absolute relocation. */
132 HOWTO (R_CRIS_16, /* type */
134 1, /* size (0 = byte, 1 = short, 2 = long) */
136 FALSE, /* pc_relative */
138 complain_overflow_bitfield, /* complain_on_overflow */
139 bfd_elf_generic_reloc, /* special_function */
140 "R_CRIS_16", /* name */
141 FALSE, /* partial_inplace */
142 0x00000000, /* src_mask */
143 0x0000ffff, /* dst_mask */
144 FALSE), /* pcrel_offset */
146 /* A 32 bit absolute relocation. */
147 HOWTO (R_CRIS_32, /* type */
149 2, /* size (0 = byte, 1 = short, 2 = long) */
151 FALSE, /* pc_relative */
153 /* We don't want overflow complaints for 64-bit vma builds
154 for e.g. sym+0x40000000 (or actually sym-0xc0000000 in
155 32-bit ELF) where sym=0xc0001234.
156 Don't do this for the PIC relocs, as we don't expect to
157 see them with large offsets. */
158 complain_overflow_dont, /* complain_on_overflow */
159 bfd_elf_generic_reloc, /* special_function */
160 "R_CRIS_32", /* name */
161 FALSE, /* partial_inplace */
162 0x00000000, /* src_mask */
163 0xffffffff, /* dst_mask */
164 FALSE), /* pcrel_offset */
166 /* An 8 bit PC-relative relocation. */
167 HOWTO (R_CRIS_8_PCREL, /* type */
169 0, /* size (0 = byte, 1 = short, 2 = long) */
171 TRUE, /* pc_relative */
173 complain_overflow_bitfield, /* complain_on_overflow */
174 cris_elf_pcrel_reloc, /* special_function */
175 "R_CRIS_8_PCREL", /* name */
176 FALSE, /* partial_inplace */
177 0x0000, /* src_mask */
178 0x00ff, /* dst_mask */
179 TRUE), /* pcrel_offset */
181 /* A 16 bit PC-relative relocation. */
182 HOWTO (R_CRIS_16_PCREL, /* type */
184 1, /* size (0 = byte, 1 = short, 2 = long) */
186 TRUE, /* pc_relative */
188 complain_overflow_bitfield, /* complain_on_overflow */
189 cris_elf_pcrel_reloc, /* special_function */
190 "R_CRIS_16_PCREL", /* name */
191 FALSE, /* partial_inplace */
192 0x00000000, /* src_mask */
193 0x0000ffff, /* dst_mask */
194 TRUE), /* pcrel_offset */
196 /* A 32 bit PC-relative relocation. */
197 HOWTO (R_CRIS_32_PCREL, /* type */
199 2, /* size (0 = byte, 1 = short, 2 = long) */
201 TRUE, /* pc_relative */
203 complain_overflow_bitfield, /* complain_on_overflow */
204 cris_elf_pcrel_reloc, /* special_function */
205 "R_CRIS_32_PCREL", /* name */
206 FALSE, /* partial_inplace */
207 0x00000000, /* src_mask */
208 0xffffffff, /* dst_mask */
209 TRUE), /* pcrel_offset */
211 /* GNU extension to record C++ vtable hierarchy. */
212 HOWTO (R_CRIS_GNU_VTINHERIT, /* type */
214 2, /* size (0 = byte, 1 = short, 2 = long) */
216 FALSE, /* pc_relative */
218 complain_overflow_dont, /* complain_on_overflow */
219 NULL, /* special_function */
220 "R_CRIS_GNU_VTINHERIT", /* name */
221 FALSE, /* partial_inplace */
224 FALSE), /* pcrel_offset */
226 /* GNU extension to record C++ vtable member usage. */
227 HOWTO (R_CRIS_GNU_VTENTRY, /* type */
229 2, /* size (0 = byte, 1 = short, 2 = long) */
231 FALSE, /* pc_relative */
233 complain_overflow_dont, /* complain_on_overflow */
234 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
235 "R_CRIS_GNU_VTENTRY", /* name */
236 FALSE, /* partial_inplace */
239 FALSE), /* pcrel_offset */
241 /* This is used only by the dynamic linker. The symbol should exist
242 both in the object being run and in some shared library. The
243 dynamic linker copies the data addressed by the symbol from the
244 shared library into the object, because the object being
245 run has to have the data at some particular address. */
246 HOWTO (R_CRIS_COPY, /* type */
248 2, /* size (0 = byte, 1 = short, 2 = long) */
250 FALSE, /* pc_relative */
252 complain_overflow_bitfield, /* complain_on_overflow */
253 bfd_elf_generic_reloc, /* special_function */
254 "R_CRIS_COPY", /* name */
255 FALSE, /* partial_inplace */
258 FALSE), /* pcrel_offset */
260 /* Like R_CRIS_32, but used when setting global offset table entries. */
261 HOWTO (R_CRIS_GLOB_DAT, /* type */
263 2, /* size (0 = byte, 1 = short, 2 = long) */
265 FALSE, /* pc_relative */
267 complain_overflow_bitfield, /* complain_on_overflow */
268 bfd_elf_generic_reloc, /* special_function */
269 "R_CRIS_GLOB_DAT", /* name */
270 FALSE, /* partial_inplace */
272 0xffffffff, /* dst_mask */
273 FALSE), /* pcrel_offset */
275 /* Marks a procedure linkage table entry for a symbol. */
276 HOWTO (R_CRIS_JUMP_SLOT, /* type */
278 2, /* size (0 = byte, 1 = short, 2 = long) */
280 FALSE, /* pc_relative */
282 complain_overflow_bitfield, /* complain_on_overflow */
283 bfd_elf_generic_reloc, /* special_function */
284 "R_CRIS_JUMP_SLOT", /* name */
285 FALSE, /* partial_inplace */
288 FALSE), /* pcrel_offset */
290 /* Used only by the dynamic linker. When the object is run, this
291 longword is set to the load address of the object, plus the
293 HOWTO (R_CRIS_RELATIVE, /* type */
295 2, /* size (0 = byte, 1 = short, 2 = long) */
297 FALSE, /* pc_relative */
299 complain_overflow_bitfield, /* complain_on_overflow */
300 bfd_elf_generic_reloc, /* special_function */
301 "R_CRIS_RELATIVE", /* name */
302 FALSE, /* partial_inplace */
304 0xffffffff, /* dst_mask */
305 FALSE), /* pcrel_offset */
307 /* Like R_CRIS_32, but referring to the GOT table entry for the symbol. */
308 HOWTO (R_CRIS_16_GOT, /* type */
310 1, /* size (0 = byte, 1 = short, 2 = long) */
312 FALSE, /* pc_relative */
314 complain_overflow_bitfield, /* complain_on_overflow */
315 bfd_elf_generic_reloc, /* special_function */
316 "R_CRIS_16_GOT", /* name */
317 FALSE, /* partial_inplace */
319 0xffff, /* dst_mask */
320 FALSE), /* pcrel_offset */
322 HOWTO (R_CRIS_32_GOT, /* type */
324 2, /* size (0 = byte, 1 = short, 2 = long) */
326 FALSE, /* pc_relative */
328 complain_overflow_bitfield, /* complain_on_overflow */
329 bfd_elf_generic_reloc, /* special_function */
330 "R_CRIS_32_GOT", /* name */
331 FALSE, /* partial_inplace */
333 0xffffffff, /* dst_mask */
334 FALSE), /* pcrel_offset */
336 /* Like R_CRIS_32_GOT, but referring to (and requesting a) PLT part of
337 the GOT table for the symbol. */
338 HOWTO (R_CRIS_16_GOTPLT, /* type */
340 1, /* size (0 = byte, 1 = short, 2 = long) */
342 FALSE, /* pc_relative */
344 complain_overflow_bitfield, /* complain_on_overflow */
345 bfd_elf_generic_reloc, /* special_function */
346 "R_CRIS_16_GOTPLT", /* name */
347 FALSE, /* partial_inplace */
349 0xffff, /* dst_mask */
350 FALSE), /* pcrel_offset */
352 HOWTO (R_CRIS_32_GOTPLT, /* type */
354 2, /* size (0 = byte, 1 = short, 2 = long) */
356 FALSE, /* pc_relative */
358 complain_overflow_bitfield, /* complain_on_overflow */
359 bfd_elf_generic_reloc, /* special_function */
360 "R_CRIS_32_GOTPLT", /* name */
361 FALSE, /* partial_inplace */
363 0xffffffff, /* dst_mask */
364 FALSE), /* pcrel_offset */
366 /* A 32-bit offset from GOT to (local const) symbol: no GOT entry should
368 HOWTO (R_CRIS_32_GOTREL, /* type */
370 2, /* size (0 = byte, 1 = short, 2 = long) */
372 FALSE, /* pc_relative */
374 complain_overflow_bitfield, /* complain_on_overflow */
375 bfd_elf_generic_reloc, /* special_function */
376 "R_CRIS_32_GOTREL", /* name */
377 FALSE, /* partial_inplace */
379 0xffffffff, /* dst_mask */
380 FALSE), /* pcrel_offset */
382 /* A 32-bit offset from GOT to entry for this symbol in PLT and request
383 to create PLT entry for symbol. */
384 HOWTO (R_CRIS_32_PLT_GOTREL, /* type */
386 2, /* size (0 = byte, 1 = short, 2 = long) */
388 FALSE, /* pc_relative */
390 complain_overflow_bitfield, /* complain_on_overflow */
391 bfd_elf_generic_reloc, /* special_function */
392 "R_CRIS_32_PLT_GOTREL", /* name */
393 FALSE, /* partial_inplace */
395 0xffffffff, /* dst_mask */
396 FALSE), /* pcrel_offset */
398 /* A 32-bit offset from PC (location after the relocation) + addend to
399 entry for this symbol in PLT and request to create PLT entry for
401 HOWTO (R_CRIS_32_PLT_PCREL, /* type */
403 2, /* size (0 = byte, 1 = short, 2 = long) */
405 TRUE, /* pc_relative */
407 complain_overflow_bitfield, /* complain_on_overflow */
408 cris_elf_pcrel_reloc, /* special_function */
409 "R_CRIS_32_PLT_PCREL", /* name */
410 FALSE, /* partial_inplace */
412 0xffffffff, /* dst_mask */
413 TRUE), /* pcrel_offset */
415 /* We don't handle these in any special manner and cross-format
416 linking is not supported; just recognize them enough to pass them
417 around. FIXME: do the same for most PIC relocs and add sanity
418 tests to actually refuse gracefully to handle these and PIC
419 relocs for cross-format linking. */
420 #define TLSHOWTO32(name) \
421 HOWTO (name, 0, 2, 32, FALSE, 0, complain_overflow_bitfield, \
422 bfd_elf_generic_reloc, #name, FALSE, 0, 0xffffffff, FALSE)
423 #define TLSHOWTO16X(name, X) \
424 HOWTO (name, 0, 1, 16, FALSE, 0, complain_overflow_ ## X, \
425 bfd_elf_generic_reloc, #name, FALSE, 0, 0xffff, FALSE)
426 #define TLSHOWTO16(name) TLSHOWTO16X(name, unsigned)
427 #define TLSHOWTO16S(name) TLSHOWTO16X(name, signed)
429 TLSHOWTO32 (R_CRIS_32_GOT_GD),
430 TLSHOWTO16 (R_CRIS_16_GOT_GD),
431 TLSHOWTO32 (R_CRIS_32_GD),
432 TLSHOWTO32 (R_CRIS_DTP),
433 TLSHOWTO32 (R_CRIS_32_DTPREL),
434 TLSHOWTO16S (R_CRIS_16_DTPREL),
435 TLSHOWTO32 (R_CRIS_32_GOT_TPREL),
436 TLSHOWTO16S (R_CRIS_16_GOT_TPREL),
437 TLSHOWTO32 (R_CRIS_32_TPREL),
438 TLSHOWTO16S (R_CRIS_16_TPREL),
439 TLSHOWTO32 (R_CRIS_DTPMOD),
440 TLSHOWTO32 (R_CRIS_32_IE)
443 /* Map BFD reloc types to CRIS ELF reloc types. */
445 struct cris_reloc_map
447 bfd_reloc_code_real_type bfd_reloc_val;
448 unsigned int cris_reloc_val;
451 static const struct cris_reloc_map cris_reloc_map [] =
453 { BFD_RELOC_NONE, R_CRIS_NONE },
454 { BFD_RELOC_8, R_CRIS_8 },
455 { BFD_RELOC_16, R_CRIS_16 },
456 { BFD_RELOC_32, R_CRIS_32 },
457 { BFD_RELOC_8_PCREL, R_CRIS_8_PCREL },
458 { BFD_RELOC_16_PCREL, R_CRIS_16_PCREL },
459 { BFD_RELOC_32_PCREL, R_CRIS_32_PCREL },
460 { BFD_RELOC_VTABLE_INHERIT, R_CRIS_GNU_VTINHERIT },
461 { BFD_RELOC_VTABLE_ENTRY, R_CRIS_GNU_VTENTRY },
462 { BFD_RELOC_CRIS_COPY, R_CRIS_COPY },
463 { BFD_RELOC_CRIS_GLOB_DAT, R_CRIS_GLOB_DAT },
464 { BFD_RELOC_CRIS_JUMP_SLOT, R_CRIS_JUMP_SLOT },
465 { BFD_RELOC_CRIS_RELATIVE, R_CRIS_RELATIVE },
466 { BFD_RELOC_CRIS_16_GOT, R_CRIS_16_GOT },
467 { BFD_RELOC_CRIS_32_GOT, R_CRIS_32_GOT },
468 { BFD_RELOC_CRIS_16_GOTPLT, R_CRIS_16_GOTPLT },
469 { BFD_RELOC_CRIS_32_GOTPLT, R_CRIS_32_GOTPLT },
470 { BFD_RELOC_CRIS_32_GOTREL, R_CRIS_32_GOTREL },
471 { BFD_RELOC_CRIS_32_PLT_GOTREL, R_CRIS_32_PLT_GOTREL },
472 { BFD_RELOC_CRIS_32_PLT_PCREL, R_CRIS_32_PLT_PCREL },
473 { BFD_RELOC_CRIS_32_GOT_GD, R_CRIS_32_GOT_GD },
474 { BFD_RELOC_CRIS_16_GOT_GD, R_CRIS_16_GOT_GD },
475 { BFD_RELOC_CRIS_32_GD, R_CRIS_32_GD },
476 { BFD_RELOC_CRIS_DTP, R_CRIS_DTP },
477 { BFD_RELOC_CRIS_32_DTPREL, R_CRIS_32_DTPREL },
478 { BFD_RELOC_CRIS_16_DTPREL, R_CRIS_16_DTPREL },
479 { BFD_RELOC_CRIS_32_GOT_TPREL, R_CRIS_32_GOT_TPREL },
480 { BFD_RELOC_CRIS_16_GOT_TPREL, R_CRIS_16_GOT_TPREL },
481 { BFD_RELOC_CRIS_32_TPREL, R_CRIS_32_TPREL },
482 { BFD_RELOC_CRIS_16_TPREL, R_CRIS_16_TPREL },
483 { BFD_RELOC_CRIS_DTPMOD, R_CRIS_DTPMOD },
484 { BFD_RELOC_CRIS_32_IE, R_CRIS_32_IE }
487 static reloc_howto_type *
488 cris_reloc_type_lookup (abfd, code)
489 bfd * abfd ATTRIBUTE_UNUSED;
490 bfd_reloc_code_real_type code;
494 for (i = 0; i < sizeof (cris_reloc_map) / sizeof (cris_reloc_map[0]); i++)
495 if (cris_reloc_map [i].bfd_reloc_val == code)
496 return & cris_elf_howto_table [cris_reloc_map[i].cris_reloc_val];
501 static reloc_howto_type *
502 cris_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED, const char *r_name)
507 i < sizeof (cris_elf_howto_table) / sizeof (cris_elf_howto_table[0]);
509 if (cris_elf_howto_table[i].name != NULL
510 && strcasecmp (cris_elf_howto_table[i].name, r_name) == 0)
511 return &cris_elf_howto_table[i];
516 /* Set the howto pointer for an CRIS ELF reloc. */
519 cris_info_to_howto_rela (abfd, cache_ptr, dst)
520 bfd * abfd ATTRIBUTE_UNUSED;
522 Elf_Internal_Rela * dst;
524 enum elf_cris_reloc_type r_type;
526 r_type = ELF32_R_TYPE (dst->r_info);
527 BFD_ASSERT (r_type < (unsigned int) R_CRIS_max);
528 cache_ptr->howto = & cris_elf_howto_table [r_type];
531 bfd_reloc_status_type
532 cris_elf_pcrel_reloc (abfd, reloc_entry, symbol, data, input_section,
533 output_bfd, error_message)
534 bfd *abfd ATTRIBUTE_UNUSED;
535 arelent *reloc_entry;
537 PTR data ATTRIBUTE_UNUSED;
538 asection *input_section;
540 char **error_message ATTRIBUTE_UNUSED;
542 /* By default (using only bfd_elf_generic_reloc when linking to
543 non-ELF formats) PC-relative relocs are relative to the beginning
544 of the reloc. CRIS PC-relative relocs are relative to the position
545 *after* the reloc because that's what pre-CRISv32 PC points to
546 after reading an insn field with that reloc. (For CRISv32, PC is
547 actually relative to the start of the insn, but we keep the old
548 definition.) Still, we use as much generic machinery as we can.
550 Only adjust when doing a final link. */
551 if (output_bfd == (bfd *) NULL)
552 reloc_entry->addend -= 1 << reloc_entry->howto->size;
555 bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
556 input_section, output_bfd, error_message);
559 /* Support for core dump NOTE sections.
560 The slightly unintuitive code layout is an attempt to keep at least
561 some similarities with other ports, hoping to simplify general
562 changes, while still keeping Linux/CRIS and Linux/CRISv32 code apart. */
565 cris_elf_grok_prstatus (abfd, note)
567 Elf_Internal_Note *note;
572 if (bfd_get_mach (abfd) == bfd_mach_cris_v32)
573 switch (note->descsz)
578 case 202: /* Linux/CRISv32 */
580 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
583 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 22);
592 switch (note->descsz)
597 case 214: /* Linux/CRIS */
599 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
602 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 22);
611 /* Make a ".reg/999" section. */
612 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
613 size, note->descpos + offset);
617 cris_elf_grok_psinfo (abfd, note)
619 Elf_Internal_Note *note;
621 if (bfd_get_mach (abfd) == bfd_mach_cris_v32)
622 switch (note->descsz)
627 case 124: /* Linux/CRISv32 elf_prpsinfo */
628 elf_tdata (abfd)->core_program
629 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
630 elf_tdata (abfd)->core_command
631 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
634 switch (note->descsz)
639 case 124: /* Linux/CRIS elf_prpsinfo */
640 elf_tdata (abfd)->core_program
641 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
642 elf_tdata (abfd)->core_command
643 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
646 /* Note that for some reason, a spurious space is tacked
647 onto the end of the args in some (at least one anyway)
648 implementations, so strip it off if it exists. */
651 char *command = elf_tdata (abfd)->core_command;
652 int n = strlen (command);
654 if (0 < n && command[n - 1] == ' ')
655 command[n - 1] = '\0';
661 /* The name of the dynamic interpreter. This is put in the .interp
664 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
666 /* The size in bytes of an entry in the procedure linkage table. */
668 #define PLT_ENTRY_SIZE 20
669 #define PLT_ENTRY_SIZE_V32 26
671 /* The first entry in an absolute procedure linkage table looks like this. */
673 static const bfd_byte elf_cris_plt0_entry[PLT_ENTRY_SIZE] =
676 0x7e, 0x7e, /* push mof. */
677 0x7f, 0x0d, /* (dip [pc+]) */
678 0, 0, 0, 0, /* Replaced with address of .got + 4. */
679 0x30, 0x7a, /* move [...],mof */
680 0x7f, 0x0d, /* (dip [pc+]) */
681 0, 0, 0, 0, /* Replaced with address of .got + 8. */
682 0x30, 0x09 /* jump [...] */
685 static const bfd_byte elf_cris_plt0_entry_v32[PLT_ENTRY_SIZE_V32] =
687 0x84, 0xe2, /* subq 4,$sp */
688 0x6f, 0xfe, /* move.d 0,$acr */
689 0, 0, 0, 0, /* Replaced by address of .got + 4. */
690 0x7e, 0x7a, /* move $mof,[$sp] */
691 0x3f, 0x7a, /* move [$acr],$mof */
692 0x04, 0xf2, /* addq 4,acr */
693 0x6f, 0xfa, /* move.d [$acr],$acr */
694 0xbf, 0x09, /* jump $acr */
695 0xb0, 0x05, /* nop */
696 0, 0 /* Pad out to 26 bytes. */
699 /* Subsequent entries in an absolute procedure linkage table look like
702 static const bfd_byte elf_cris_plt_entry[PLT_ENTRY_SIZE] =
704 0x7f, 0x0d, /* (dip [pc+]) */
705 0, 0, 0, 0, /* Replaced with address of this symbol in .got. */
706 0x30, 0x09, /* jump [...] */
707 0x3f, 0x7e, /* move [pc+],mof */
708 0, 0, 0, 0, /* Replaced with offset into relocation table. */
709 0x2f, 0xfe, /* add.d [pc+],pc */
711 0xff, 0xff /* Replaced with offset to start of .plt. */
714 static const bfd_byte elf_cris_plt_entry_v32[PLT_ENTRY_SIZE_V32] =
716 0x6f, 0xfe, /* move.d 0,$acr */
717 0, 0, 0, 0, /* Replaced with address of this symbol in .got. */
718 0x6f, 0xfa, /* move.d [$acr],$acr */
719 0xbf, 0x09, /* jump $acr */
720 0xb0, 0x05, /* nop */
721 0x3f, 0x7e, /* move 0,mof */
722 0, 0, 0, 0, /* Replaced with offset into relocation table. */
723 0xbf, 0x0e, /* ba start_of_plt0_entry */
724 0, 0, 0, 0, /* Replaced with offset to plt0 entry. */
728 /* The first entry in a PIC procedure linkage table looks like this. */
730 static const bfd_byte elf_cris_pic_plt0_entry[PLT_ENTRY_SIZE] =
732 0xfc, 0xe1, 0x7e, 0x7e, /* push mof */
733 0x04, 0x01, 0x30, 0x7a, /* move [r0+4],mof */
734 0x08, 0x01, 0x30, 0x09, /* jump [r0+8] */
735 0, 0, 0, 0, 0, 0, 0, 0, /* Pad out to 20 bytes. */
738 static const bfd_byte elf_cris_pic_plt0_entry_v32[PLT_ENTRY_SIZE_V32] =
740 0x84, 0xe2, /* subq 4,$sp */
741 0x04, 0x01, /* addoq 4,$r0,$acr */
742 0x7e, 0x7a, /* move $mof,[$sp] */
743 0x3f, 0x7a, /* move [$acr],$mof */
744 0x04, 0xf2, /* addq 4,$acr */
745 0x6f, 0xfa, /* move.d [$acr],$acr */
746 0xbf, 0x09, /* jump $acr */
747 0xb0, 0x05, /* nop */
748 0, 0, /* Pad out to 26 bytes. */
753 /* Subsequent entries in a PIC procedure linkage table look like this. */
755 static const bfd_byte elf_cris_pic_plt_entry[PLT_ENTRY_SIZE] =
757 0x6f, 0x0d, /* (bdap [pc+].d,r0) */
758 0, 0, 0, 0, /* Replaced with offset of this symbol in .got. */
759 0x30, 0x09, /* jump [...] */
760 0x3f, 0x7e, /* move [pc+],mof */
761 0, 0, 0, 0, /* Replaced with offset into relocation table. */
762 0x2f, 0xfe, /* add.d [pc+],pc */
763 0xec, 0xff, /* Replaced with offset to start of .plt. */
767 static const bfd_byte elf_cris_pic_plt_entry_v32[PLT_ENTRY_SIZE_V32] =
769 0x6f, 0x0d, /* addo.d 0,$r0,$acr */
770 0, 0, 0, 0, /* Replaced with offset of this symbol in .got. */
771 0x6f, 0xfa, /* move.d [$acr],$acr */
772 0xbf, 0x09, /* jump $acr */
773 0xb0, 0x05, /* nop */
774 0x3f, 0x7e, /* move relocoffs,$mof */
775 0, 0, 0, 0, /* Replaced with offset into relocation table. */
776 0xbf, 0x0e, /* ba start_of_plt */
777 0, 0, 0, 0, /* Replaced with offset to start of .plt. */
781 /* We copy elf32-m68k.c and elf32-i386.c for the basic linker hash bits
782 (and most other PIC/shlib stuff). Check that we don't drift away
785 The CRIS linker, like the m68k and i386 linkers (and probably the rest
786 too) needs to keep track of the number of relocs that it decides to
787 copy in check_relocs for each symbol. This is so that it can discard
788 PC relative relocs if it doesn't need them when linking with
789 -Bsymbolic. We store the information in a field extending the regular
790 ELF linker hash table. */
792 /* This structure keeps track of the number of PC relative relocs we have
793 copied for a given symbol. */
795 struct elf_cris_pcrel_relocs_copied
798 struct elf_cris_pcrel_relocs_copied *next;
800 /* A section in dynobj. */
803 /* Number of relocs copied in this section. */
806 /* Example of reloc being copied, for message. */
807 enum elf_cris_reloc_type r_type;
810 /* CRIS ELF linker hash entry. */
812 struct elf_cris_link_hash_entry
814 struct elf_link_hash_entry root;
816 /* Number of PC relative relocs copied for this symbol. */
817 struct elf_cris_pcrel_relocs_copied *pcrel_relocs_copied;
819 /* The GOTPLT references are CRIS-specific; the goal is to avoid having
820 both a general GOT and a PLT-specific GOT entry for the same symbol,
821 when it is referenced both as a function and as a function pointer.
823 Number of GOTPLT references for a function. */
824 bfd_signed_vma gotplt_refcount;
826 /* Actual GOTPLT index for this symbol, if applicable, or zero if not
827 (zero is never used as an index). FIXME: We should be able to fold
828 this with gotplt_refcount in a union, like the got and plt unions in
829 elf_link_hash_entry. */
830 bfd_size_type gotplt_offset;
832 /* The root.got.refcount is the sum of the regular reference counts
833 (this) and those members below. We have to keep a separate count
834 to track when we've found the first (or last) reference to a
835 regular got entry. The offset is in root.got.offset. */
836 bfd_signed_vma reg_got_refcount;
838 /* Similar to the above, the number of reloc references to this
839 symbols that need a R_CRIS_32_TPREL slot. The offset is in
840 root.got.offset, because this and .dtp_refcount can't validly
841 happen when there's also a regular GOT entry; that's invalid
842 input for which an error is emitted. */
843 bfd_signed_vma tprel_refcount;
845 /* Similar to the above, the number of reloc references to this
846 symbols that need a R_CRIS_DTP slot. The offset is in
847 root.got.offset; plus 4 if .tprel_refcount > 0. */
848 bfd_signed_vma dtp_refcount;
851 /* The local_got_refcounts and local_got_offsets are a multiple of
852 LSNUM in size, namely LGOT_ALLOC_NELTS_FOR(LSNUM) (plus one for the
853 refcount for GOT itself, see code), with the summary / group offset
854 for local symbols located at offset N, reference counts for
855 ordinary (address) relocs at offset N + LSNUM, for R_CRIS_DTP
856 relocs at offset N + 2*LSNUM, and for R_CRIS_32_TPREL relocs at N +
859 #define LGOT_REG_NDX(x) ((x) + symtab_hdr->sh_info)
860 #define LGOT_DTP_NDX(x) ((x) + 2 * symtab_hdr->sh_info)
861 #define LGOT_TPREL_NDX(x) ((x) + 3 * symtab_hdr->sh_info)
862 #define LGOT_ALLOC_NELTS_FOR(x) ((x) * 4)
864 /* CRIS ELF linker hash table. */
866 struct elf_cris_link_hash_table
868 struct elf_link_hash_table root;
870 /* We can't use the PLT offset and calculate to get the GOTPLT offset,
871 since we try and avoid creating GOTPLT:s when there's already a GOT.
872 Instead, we keep and update the next available index here. */
873 bfd_size_type next_gotplt_entry;
875 /* The number of R_CRIS_32_DTPREL and R_CRIS_16_DTPREL that have
876 been seen for any input; if != 0, then the constant-offset
877 R_CRIS_DTPMOD is needed for this DSO/executable. This turns
878 negative at relocation, so that we don't need an extra flag for
879 when the reloc is output. */
880 bfd_signed_vma dtpmod_refcount;
883 /* Traverse a CRIS ELF linker hash table. */
885 #define elf_cris_link_hash_traverse(table, func, info) \
886 (elf_link_hash_traverse \
888 (bfd_boolean (*) PARAMS ((struct elf_link_hash_entry *, PTR))) (func), \
891 /* Get the CRIS ELF linker hash table from a link_info structure. */
893 #define elf_cris_hash_table(p) \
894 ((struct elf_cris_link_hash_table *) (p)->hash)
896 /* Get the CRIS ELF linker hash entry from a regular hash entry (the
897 "parent class"). The .root reference is just a simple type
898 check on the argument. */
900 #define elf_cris_hash_entry(p) \
901 ((struct elf_cris_link_hash_entry *) (&(p)->root))
903 /* Create an entry in a CRIS ELF linker hash table. */
905 static struct bfd_hash_entry *
906 elf_cris_link_hash_newfunc (entry, table, string)
907 struct bfd_hash_entry *entry;
908 struct bfd_hash_table *table;
911 struct elf_cris_link_hash_entry *ret =
912 (struct elf_cris_link_hash_entry *) entry;
914 /* Allocate the structure if it has not already been allocated by a
916 if (ret == (struct elf_cris_link_hash_entry *) NULL)
917 ret = ((struct elf_cris_link_hash_entry *)
918 bfd_hash_allocate (table,
919 sizeof (struct elf_cris_link_hash_entry)));
920 if (ret == (struct elf_cris_link_hash_entry *) NULL)
921 return (struct bfd_hash_entry *) ret;
923 /* Call the allocation method of the superclass. */
924 ret = ((struct elf_cris_link_hash_entry *)
925 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
927 if (ret != (struct elf_cris_link_hash_entry *) NULL)
929 ret->pcrel_relocs_copied = NULL;
930 ret->gotplt_refcount = 0;
931 ret->gotplt_offset = 0;
932 ret->dtp_refcount = 0;
933 ret->tprel_refcount = 0;
934 ret->reg_got_refcount = 0;
937 return (struct bfd_hash_entry *) ret;
940 /* Create a CRIS ELF linker hash table. */
942 static struct bfd_link_hash_table *
943 elf_cris_link_hash_table_create (abfd)
946 struct elf_cris_link_hash_table *ret;
947 bfd_size_type amt = sizeof (struct elf_cris_link_hash_table);
949 ret = ((struct elf_cris_link_hash_table *) bfd_malloc (amt));
950 if (ret == (struct elf_cris_link_hash_table *) NULL)
953 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
954 elf_cris_link_hash_newfunc,
955 sizeof (struct elf_cris_link_hash_entry)))
961 /* Initialize to skip over the first three entries in the gotplt; they
962 are used for run-time symbol evaluation. */
963 ret->next_gotplt_entry = 12;
965 /* We haven't seen any R_CRIS_nn_GOT_TPREL initially. */
966 ret->dtpmod_refcount = 0;
968 return &ret->root.root;
971 /* Perform a single relocation. By default we use the standard BFD
972 routines, with a few tweaks. */
974 static bfd_reloc_status_type
975 cris_final_link_relocate (howto, input_bfd, input_section, contents, rel,
977 reloc_howto_type * howto;
979 asection * input_section;
981 Elf_Internal_Rela * rel;
984 bfd_reloc_status_type r;
985 enum elf_cris_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
987 /* PC-relative relocations are relative to the position *after*
988 the reloc. Note that for R_CRIS_8_PCREL the adjustment is
989 not a single byte, since PC must be 16-bit-aligned. */
992 /* Check that the 16-bit GOT relocs are positive. */
993 case R_CRIS_16_GOTPLT:
995 if ((bfd_signed_vma) relocation < 0)
996 return bfd_reloc_overflow;
999 case R_CRIS_32_PLT_PCREL:
1000 case R_CRIS_32_PCREL:
1003 case R_CRIS_8_PCREL:
1004 case R_CRIS_16_PCREL:
1012 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1013 contents, rel->r_offset,
1014 relocation, rel->r_addend);
1019 /* The number of errors left before we stop outputting reloc-specific
1020 explanatory messages. By coincidence, this works nicely together
1021 with the default number of messages you'll get from LD about
1022 "relocation truncated to fit" messages before you get an
1023 "additional relocation overflows omitted from the output". */
1024 static int additional_relocation_error_msg_count = 10;
1026 /* Relocate an CRIS ELF section. See elf32-fr30.c, from where this was
1027 copied, for further comments. */
1030 cris_elf_relocate_section (output_bfd, info, input_bfd, input_section,
1031 contents, relocs, local_syms, local_sections)
1032 bfd *output_bfd ATTRIBUTE_UNUSED;
1033 struct bfd_link_info *info;
1035 asection *input_section;
1037 Elf_Internal_Rela *relocs;
1038 Elf_Internal_Sym *local_syms;
1039 asection **local_sections;
1042 Elf_Internal_Shdr *symtab_hdr;
1043 struct elf_link_hash_entry **sym_hashes;
1044 bfd_vma *local_got_offsets;
1048 Elf_Internal_Rela *rel;
1049 Elf_Internal_Rela *relend;
1052 dynobj = elf_hash_table (info)->dynobj;
1053 local_got_offsets = elf_local_got_offsets (input_bfd);
1054 symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr;
1055 sym_hashes = elf_sym_hashes (input_bfd);
1056 relend = relocs + input_section->reloc_count;
1065 splt = bfd_get_section_by_name (dynobj, ".plt");
1066 sgot = bfd_get_section_by_name (dynobj, ".got");
1069 for (rel = relocs; rel < relend; rel ++)
1071 reloc_howto_type *howto;
1072 unsigned long r_symndx;
1073 Elf_Internal_Sym *sym;
1075 struct elf_link_hash_entry *h;
1077 bfd_reloc_status_type r;
1078 const char *symname = NULL;
1079 enum elf_cris_reloc_type r_type;
1081 r_type = ELF32_R_TYPE (rel->r_info);
1083 if ( r_type == R_CRIS_GNU_VTINHERIT
1084 || r_type == R_CRIS_GNU_VTENTRY)
1087 r_symndx = ELF32_R_SYM (rel->r_info);
1088 howto = cris_elf_howto_table + r_type;
1093 if (r_symndx < symtab_hdr->sh_info)
1095 sym = local_syms + r_symndx;
1096 sec = local_sections [r_symndx];
1097 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
1099 symname = (bfd_elf_string_from_elf_section
1100 (input_bfd, symtab_hdr->sh_link, sym->st_name));
1101 if (symname == NULL)
1102 symname = bfd_section_name (input_bfd, sec);
1107 bfd_boolean unresolved_reloc;
1109 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1110 r_symndx, symtab_hdr, sym_hashes,
1112 unresolved_reloc, warned);
1114 symname = h->root.root.string;
1116 if (unresolved_reloc
1117 /* Perhaps we should detect the cases that
1118 sec->output_section is expected to be NULL like i386 and
1119 m68k, but apparently (and according to elfxx-ia64.c) all
1120 valid cases are where the symbol is defined in a shared
1121 object which we link dynamically against. This includes
1122 PLT relocs for which we've created a PLT entry and other
1123 relocs for which we're prepared to create dynamic
1126 For now, new situations cause us to just err when
1127 sec->output_offset is NULL but the object with the symbol
1128 is *not* dynamically linked against. Thus this will
1129 automatically remind us so we can see if there are other
1130 valid cases we need to revisit. */
1131 && (sec->owner->flags & DYNAMIC) != 0)
1134 else if (h->root.type == bfd_link_hash_defined
1135 || h->root.type == bfd_link_hash_defweak)
1137 /* Here follow the cases where the relocation value must
1138 be zero (or when further handling is simplified when
1139 zero). I can't claim to understand the various
1140 conditions and they weren't described in the files
1141 where I copied them from (elf32-m68k.c and
1142 elf32-i386.c), but let's mention examples of where
1143 they happen. FIXME: Perhaps define and use a
1144 dynamic_symbol_p function like ia64.
1146 - When creating a shared library, we can have an
1147 ordinary relocation for a symbol defined in a shared
1148 library (perhaps the one we create). We then make
1149 the relocation value zero, as the value seen now will
1150 be added into the relocation addend in this shared
1151 library, but must be handled only at dynamic-link
1152 time. FIXME: Not sure this example covers the
1153 h->elf_link_hash_flags test, though it's there in
1156 && ((! info->symbolic && h->dynindx != -1)
1158 && (input_section->flags & SEC_ALLOC) != 0
1159 && (r_type == R_CRIS_8
1160 || r_type == R_CRIS_16
1161 || r_type == R_CRIS_32
1162 || r_type == R_CRIS_8_PCREL
1163 || r_type == R_CRIS_16_PCREL
1164 || r_type == R_CRIS_32_PCREL))
1166 else if (!info->relocatable && unresolved_reloc)
1169 (_("%B, section %A: unresolvable relocation %s against symbol `%s'"),
1172 cris_elf_howto_table[r_type].name,
1174 bfd_set_error (bfd_error_bad_value);
1180 if (sec != NULL && elf_discarded_section (sec))
1182 /* For relocs against symbols from removed linkonce sections,
1183 or sections discarded by a linker script, we just want the
1184 section contents zeroed. Avoid any special processing. */
1185 _bfd_clear_contents (howto, input_bfd, contents + rel->r_offset);
1191 if (info->relocatable)
1196 case R_CRIS_16_GOTPLT:
1197 case R_CRIS_32_GOTPLT:
1198 /* This is like the case for R_CRIS_32_GOT and R_CRIS_16_GOT,
1199 but we require a PLT, and the PLT handling will take care of
1200 filling in the PLT-specific GOT entry. For the GOT offset,
1201 calculate it as we do when filling it in for the .got.plt
1202 section. If we don't have a PLT, punt to GOT handling. */
1204 && ((struct elf_cris_link_hash_entry *) h)->gotplt_offset != 0)
1207 = bfd_get_section_by_name (dynobj, ".got.plt");
1210 BFD_ASSERT (h->dynindx != -1);
1211 BFD_ASSERT (sgotplt != NULL);
1214 = ((struct elf_cris_link_hash_entry *) h)->gotplt_offset;
1216 relocation = got_offset;
1220 /* We didn't make a PLT entry for this symbol. Maybe everything is
1221 folded into the GOT. Other than folding, this happens when
1222 statically linking PIC code, or when using -Bsymbolic. Check
1223 that we instead have a GOT entry as done for us by
1224 elf_cris_adjust_dynamic_symbol, and drop through into the
1225 ordinary GOT cases. This must not happen for the
1226 executable, because any reference it does to a function
1227 that is satisfied by a DSO must generate a PLT. We assume
1228 these call-specific relocs don't address non-functions. */
1230 && (h->got.offset == (bfd_vma) -1
1234 && h->root.type == bfd_link_hash_undefweak)))))
1236 (*_bfd_error_handler)
1237 ((h->got.offset == (bfd_vma) -1)
1238 ? _("%B, section %A: No PLT nor GOT for relocation %s"
1239 " against symbol `%s'")
1240 : _("%B, section %A: No PLT for relocation %s"
1241 " against symbol `%s'"),
1244 cris_elf_howto_table[r_type].name,
1245 (symname != NULL && symname[0] != '\0'
1246 ? symname : _("[whose name is lost]")));
1248 /* FIXME: Perhaps blaming input is not the right thing to
1249 do; this is probably an internal error. But it is true
1250 that we didn't like that particular input. */
1251 bfd_set_error (bfd_error_bad_value);
1256 /* The size of the actual relocation is not used here; we only
1257 fill in the GOT table here. */
1263 /* Note that despite using RELA relocations, the .got contents
1264 is always filled in with the link-relative relocation
1265 value; the addend. */
1269 off = h->got.offset;
1270 BFD_ASSERT (off != (bfd_vma) -1);
1272 if (!elf_hash_table (info)->dynamic_sections_created
1275 || h->type == STT_FUNC
1278 && (info->symbolic || h->dynindx == -1)
1281 /* This wasn't checked above for ! info->shared, but
1282 must hold there if we get here; the symbol must
1283 be defined in the regular program or be undefweak
1284 or be a function or otherwise need a PLT. */
1285 BFD_ASSERT (!elf_hash_table (info)->dynamic_sections_created
1288 || h->type == STT_FUNC
1290 || h->root.type == bfd_link_hash_undefweak);
1292 /* This is actually a static link, or it is a
1293 -Bsymbolic link and the symbol is defined locally,
1294 or is undefweak, or the symbol was forced to be
1295 local because of a version file, or we're not
1296 creating a dynamic object. We must initialize this
1297 entry in the global offset table. Since the offset
1298 must always be a multiple of 4, we use the least
1299 significant bit to record whether we have
1300 initialized it already.
1302 If this GOT entry should be runtime-initialized, we
1303 will create a .rela.got relocation entry to
1304 initialize the value. This is done in the
1305 finish_dynamic_symbol routine. */
1310 bfd_put_32 (output_bfd, relocation,
1311 sgot->contents + off);
1318 BFD_ASSERT (local_got_offsets != NULL
1319 && local_got_offsets[r_symndx] != (bfd_vma) -1);
1321 off = local_got_offsets[r_symndx];
1323 /* The offset must always be a multiple of 4. We use
1324 the least significant bit to record whether we have
1325 already generated the necessary reloc. */
1330 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
1334 Elf_Internal_Rela outrel;
1337 if (srelgot == NULL)
1339 = bfd_get_section_by_name (dynobj, ".rela.got");
1340 BFD_ASSERT (srelgot != NULL);
1342 outrel.r_offset = (sgot->output_section->vma
1343 + sgot->output_offset
1345 outrel.r_info = ELF32_R_INFO (0, R_CRIS_RELATIVE);
1346 outrel.r_addend = relocation;
1347 loc = srelgot->contents;
1348 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
1349 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1352 local_got_offsets[r_symndx] |= 1;
1356 relocation = sgot->output_offset + off;
1357 if (rel->r_addend != 0)
1359 /* We can't do anything for a relocation which is against
1360 a symbol *plus offset*. GOT holds relocations for
1361 symbols. Make this an error; the compiler isn't
1362 allowed to pass us these kinds of things. */
1364 (*_bfd_error_handler)
1365 (_("%B, section %A: relocation %s with non-zero addend %d"
1366 " against local symbol"),
1369 cris_elf_howto_table[r_type].name,
1372 (*_bfd_error_handler)
1373 (_("%B, section %A: relocation %s with non-zero addend %d"
1374 " against symbol `%s'"),
1377 cris_elf_howto_table[r_type].name,
1379 symname[0] != '\0' ? symname : _("[whose name is lost]"));
1381 bfd_set_error (bfd_error_bad_value);
1387 case R_CRIS_32_GOTREL:
1388 /* This relocation must only be performed against local symbols.
1389 It's also ok when we link a program and the symbol is either
1390 defined in an ordinary (non-DSO) object or is undefined weak. */
1392 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1396 && h->root.type == bfd_link_hash_undefweak))))
1398 (*_bfd_error_handler)
1399 (_("%B, section %A: relocation %s is"
1400 " not allowed for global symbol: `%s'"),
1403 cris_elf_howto_table[r_type].name,
1405 bfd_set_error (bfd_error_bad_value);
1409 /* This can happen if we get a link error with the input ELF
1410 variant mismatching the output variant. Emit an error so
1411 it's noticed if it happens elsewhere. */
1414 (*_bfd_error_handler)
1415 (_("%B, section %A: relocation %s with no GOT created"),
1418 cris_elf_howto_table[r_type].name);
1419 bfd_set_error (bfd_error_bad_value);
1423 /* This relocation is like a PC-relative one, except the
1424 reference point is the location of GOT. Note that
1425 sgot->output_offset is not involved in this calculation. We
1426 always want the start of entire .got section, not the
1427 position after the reserved header. */
1428 relocation -= sgot->output_section->vma;
1431 case R_CRIS_32_PLT_PCREL:
1432 /* Relocation is to the entry for this symbol in the
1433 procedure linkage table. */
1435 /* Resolve a PLT_PCREL reloc against a local symbol directly,
1436 without using the procedure linkage table. */
1437 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
1440 if (h->plt.offset == (bfd_vma) -1
1443 /* We didn't make a PLT entry for this symbol. This
1444 happens when statically linking PIC code, or when
1445 using -Bsymbolic. */
1449 relocation = (splt->output_section->vma
1450 + splt->output_offset
1454 case R_CRIS_32_PLT_GOTREL:
1455 /* Like R_CRIS_32_PLT_PCREL, but the reference point is the
1456 start of the .got section. See also comment at
1458 relocation -= sgot->output_section->vma;
1460 /* Resolve a PLT_GOTREL reloc against a local symbol directly,
1461 without using the procedure linkage table. */
1462 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
1465 if (h->plt.offset == (bfd_vma) -1
1468 /* We didn't make a PLT entry for this symbol. This
1469 happens when statically linking PIC code, or when
1470 using -Bsymbolic. */
1474 relocation = (splt->output_section->vma
1475 + splt->output_offset
1477 - sgot->output_section->vma);
1480 case R_CRIS_8_PCREL:
1481 case R_CRIS_16_PCREL:
1482 case R_CRIS_32_PCREL:
1483 /* If the symbol was local, we need no shlib-specific handling. */
1484 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1485 || h->dynindx == -1)
1494 && (input_section->flags & SEC_ALLOC) != 0
1495 && ((r_type != R_CRIS_8_PCREL
1496 && r_type != R_CRIS_16_PCREL
1497 && r_type != R_CRIS_32_PCREL)
1499 || (h != NULL && !h->def_regular))))
1501 Elf_Internal_Rela outrel;
1503 bfd_boolean skip, relocate;
1505 /* When generating a shared object, these relocations
1506 are copied into the output file to be resolved at run
1511 sreloc = _bfd_elf_get_dynamic_reloc_section
1512 (input_bfd, input_section, /*rela?*/ TRUE);
1513 /* The section should have been created in cris_elf_check_relocs,
1514 but that function will not be called for objects which fail in
1515 cris_elf_merge_private_bfd_data. */
1518 bfd_set_error (bfd_error_bad_value);
1527 _bfd_elf_section_offset (output_bfd, info, input_section,
1529 if (outrel.r_offset == (bfd_vma) -1)
1531 else if (outrel.r_offset == (bfd_vma) -2
1532 /* For now, undefined weak symbols with non-default
1533 visibility (yielding 0), like exception info for
1534 discarded sections, will get a R_CRIS_NONE
1535 relocation rather than no relocation, because we
1536 notice too late that the symbol doesn't need a
1539 && h->root.type == bfd_link_hash_undefweak
1540 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT))
1541 skip = TRUE, relocate = TRUE;
1542 outrel.r_offset += (input_section->output_section->vma
1543 + input_section->output_offset);
1546 memset (&outrel, 0, sizeof outrel);
1547 /* h->dynindx may be -1 if the symbol was marked to
1550 && ((! info->symbolic && h->dynindx != -1)
1551 || !h->def_regular))
1553 BFD_ASSERT (h->dynindx != -1);
1554 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1555 outrel.r_addend = relocation + rel->r_addend;
1559 outrel.r_addend = relocation + rel->r_addend;
1561 if (r_type == R_CRIS_32)
1564 outrel.r_info = ELF32_R_INFO (0, R_CRIS_RELATIVE);
1570 if (bfd_is_abs_section (sec))
1572 else if (sec == NULL || sec->owner == NULL)
1574 bfd_set_error (bfd_error_bad_value);
1581 /* We are turning this relocation into one
1582 against a section symbol. It would be
1583 proper to subtract the symbol's value,
1584 osec->vma, from the emitted reloc addend,
1585 but ld.so expects buggy relocs. */
1586 osec = sec->output_section;
1587 indx = elf_section_data (osec)->dynindx;
1590 struct elf_cris_link_hash_table *htab;
1591 htab = elf_cris_hash_table (info);
1592 osec = htab->root.text_index_section;
1593 indx = elf_section_data (osec)->dynindx;
1595 BFD_ASSERT (indx != 0);
1598 outrel.r_info = ELF32_R_INFO (indx, r_type);
1602 loc = sreloc->contents;
1603 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1604 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1606 /* This reloc will be computed at runtime, so there's no
1607 need to do anything now, except for R_CRIS_32 relocations
1608 that have been turned into R_CRIS_RELATIVE. */
1615 case R_CRIS_16_DTPREL:
1616 case R_CRIS_32_DTPREL:
1617 /* This relocation must only be performed against local
1618 symbols. It's also ok when we link a program and the
1619 symbol is defined in an ordinary (non-DSO) object (if
1620 it's undefined there, we've already seen an error). */
1622 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1625 && h->root.type != bfd_link_hash_undefined)))
1627 (*_bfd_error_handler)
1628 ((h->root.type == bfd_link_hash_undefined)
1629 /* We shouldn't get here for GCC-emitted code. */
1630 ? _("%B, section %A: relocation %s has an undefined"
1631 " reference to `%s', perhaps a declaration mixup?")
1632 : ("%B, section %A: relocation %s is"
1633 " not allowed for `%s', a global symbol with default"
1634 " visibility, perhaps a declaration mixup?"),
1637 cris_elf_howto_table[r_type].name,
1638 symname != NULL && symname[0] != '\0'
1639 ? symname : _("[whose name is lost]"));
1640 bfd_set_error (bfd_error_bad_value);
1644 BFD_ASSERT (elf_cris_hash_table (info)->dtpmod_refcount != 0);
1646 /* Fill in a R_CRIS_DTPMOD reloc at offset 3 if we haven't
1647 already done so. Note that we do this in .got.plt, not
1648 in .got, as .got.plt contains the first part, still the
1649 reloc is against .got, because the linker script directs
1650 (is required to direct) them both into .got. */
1651 if (elf_cris_hash_table (info)->dtpmod_refcount > 0)
1653 asection *sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
1654 BFD_ASSERT (sgotplt != NULL);
1658 Elf_Internal_Rela outrel;
1661 if (srelgot == NULL)
1662 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1663 BFD_ASSERT (srelgot != NULL);
1664 loc = srelgot->contents;
1665 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
1667 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 12);
1668 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 16);
1669 outrel.r_offset = (sgotplt->output_section->vma
1670 + sgotplt->output_offset
1672 outrel.r_info = ELF32_R_INFO (0, R_CRIS_DTPMOD);
1673 outrel.r_addend = 0;
1674 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1678 /* For an executable, the GOT entry contents is known. */
1679 bfd_put_32 (output_bfd, (bfd_vma) 1, sgotplt->contents + 12);
1680 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 16);
1683 /* Reverse the sign to mark that we've emitted the
1684 required GOT entry. */
1685 elf_cris_hash_table (info)->dtpmod_refcount
1686 = -elf_cris_hash_table (info)->dtpmod_refcount;
1689 /* The thread-based offset to the local symbol is the
1691 For the executable, TLS data begins at the thread pointer plus
1692 the negative size of the TLS data. For a DSO, that's part of
1693 the module TLS offset. */
1694 relocation -= elf_hash_table (info)->tls_sec == NULL
1695 ? 0 : (elf_hash_table (info)->tls_sec->vma
1697 ? 0 : elf_hash_table (info)->tls_size));
1703 bfd_set_error (bfd_error_invalid_operation);
1705 /* We've already informed in cris_elf_check_relocs that
1706 this is an error. */
1711 case R_CRIS_16_GOT_GD:
1712 case R_CRIS_32_GOT_GD:
1713 if (rel->r_addend != 0)
1715 /* We can't do anything for a relocation which is against a
1716 symbol *plus offset*. The GOT holds relocations for
1717 symbols. Make this an error; the compiler isn't allowed
1718 to pass us these kinds of things. */
1719 (*_bfd_error_handler)
1720 (_("%B, section %A: relocation %s with non-zero addend %d"
1721 " against symbol `%s'"),
1724 cris_elf_howto_table[r_type].name,
1726 symname[0] != '\0' ? symname : _("[whose name is lost]"));
1728 bfd_set_error (bfd_error_bad_value);
1732 if (!info->shared && (h == NULL || h->def_regular))
1734 /* Known contents of the GOT. */
1737 /* The symbol is defined in the program, so just write
1738 (1, known_tpoffset) into the GOT. */
1739 relocation -= elf_hash_table (info)->tls_sec->vma;
1743 off = elf_cris_hash_entry (h)->tprel_refcount > 0
1744 ? h->got.offset + 4 : h->got.offset;
1748 off = local_got_offsets[r_symndx];
1749 if (local_got_offsets[LGOT_TPREL_NDX (r_symndx)])
1753 /* We use bit 1 of the offset as a flag for GOT entry with
1754 the R_CRIS_DTP reloc, setting it when we've emitted the
1755 GOT entry and reloc. Bit 0 is used for R_CRIS_32_TPREL
1764 local_got_offsets[r_symndx] |= 2;
1766 bfd_put_32 (output_bfd, 1, sgot->contents + off);
1767 bfd_put_32 (output_bfd, relocation, sgot->contents + off + 4);
1772 relocation = sgot->output_offset + off
1773 + (r_type == R_CRIS_32_GD ? sgot->output_section->vma : 0);
1777 /* Not all parts of the GOT entry are known; emit a real
1782 off = elf_cris_hash_entry (h)->tprel_refcount > 0
1783 ? h->got.offset + 4 : h->got.offset;
1786 off = local_got_offsets[r_symndx];
1787 if (local_got_offsets[LGOT_TPREL_NDX (r_symndx)])
1791 /* See above re bit 1 and bit 0 usage. */
1794 Elf_Internal_Rela outrel;
1802 local_got_offsets[r_symndx] |= 2;
1804 /* Clear the target contents of the GOT (just as a
1805 gesture; it's already cleared on allocation): this
1806 relocation is not like the other dynrelocs. */
1807 bfd_put_32 (output_bfd, 0, sgot->contents + off);
1808 bfd_put_32 (output_bfd, 0, sgot->contents + off + 4);
1810 if (srelgot == NULL)
1811 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1812 BFD_ASSERT (srelgot != NULL);
1814 if (h != NULL && h->dynindx != -1)
1816 outrel.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_DTP);
1821 outrel.r_info = ELF32_R_INFO (0, R_CRIS_DTP);
1823 /* NULL if we had an error. */
1824 relocation -= elf_hash_table (info)->tls_sec == NULL
1825 ? 0 : elf_hash_table (info)->tls_sec->vma;
1828 outrel.r_offset = (sgot->output_section->vma
1829 + sgot->output_offset
1831 outrel.r_addend = relocation;
1832 loc = srelgot->contents;
1833 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
1835 /* NULL if we had an error. */
1836 if (srelgot->contents != NULL)
1837 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1842 relocation = sgot->output_offset + off
1843 + (r_type == R_CRIS_32_GD ? sgot->output_section->vma : 0);
1846 /* The GOT-relative offset to the GOT entry is the
1847 relocation, or for R_CRIS_32_GD, the actual address of
1854 bfd_set_error (bfd_error_invalid_operation);
1856 /* We've already informed in cris_elf_check_relocs that
1857 this is an error. */
1862 case R_CRIS_32_GOT_TPREL:
1863 case R_CRIS_16_GOT_TPREL:
1864 if (rel->r_addend != 0)
1866 /* We can't do anything for a relocation which is
1867 against a symbol *plus offset*. GOT holds
1868 relocations for symbols. Make this an error; the
1869 compiler isn't allowed to pass us these kinds of
1871 (*_bfd_error_handler)
1872 (_("%B, section %A: relocation %s with non-zero addend %d"
1873 " against symbol `%s'"),
1876 cris_elf_howto_table[r_type].name,
1878 symname[0] != '\0' ? symname : _("[whose name is lost]"));
1879 bfd_set_error (bfd_error_bad_value);
1883 if (!info->shared && (h == NULL || h->def_regular))
1885 /* Known contents of the GOT. */
1888 /* The symbol is defined in the program, so just write
1889 the -prog_tls_size+known_tpoffset into the GOT. */
1890 relocation -= elf_hash_table (info)->tls_sec->vma;
1891 relocation -= elf_hash_table (info)->tls_size;
1894 off = h->got.offset;
1896 off = local_got_offsets[r_symndx];
1898 /* Bit 0 is used to mark whether we've emitted the required
1899 entry (and if needed R_CRIS_32_TPREL reloc). Bit 1
1900 is used similarly for R_CRIS_DTP, see above. */
1908 local_got_offsets[r_symndx] |= 1;
1910 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
1915 relocation = sgot->output_offset + off
1916 + (r_type == R_CRIS_32_IE ? sgot->output_section->vma : 0);
1920 /* Emit a real relocation. */
1924 off = h->got.offset;
1926 off = local_got_offsets[r_symndx];
1928 /* See above re usage of bit 0 and 1. */
1931 Elf_Internal_Rela outrel;
1939 local_got_offsets[r_symndx] |= 1;
1941 if (srelgot == NULL)
1942 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1943 BFD_ASSERT (srelgot != NULL);
1945 if (h != NULL && h->dynindx != -1)
1947 outrel.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_32_TPREL);
1952 outrel.r_info = ELF32_R_INFO (0, R_CRIS_32_TPREL);
1954 /* NULL if we had an error. */
1955 relocation -= elf_hash_table (info)->tls_sec == NULL
1956 ? 0 : elf_hash_table (info)->tls_sec->vma;
1959 /* Just "define" the initial contents in some
1960 semi-logical way. */
1961 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
1963 outrel.r_offset = (sgot->output_section->vma
1964 + sgot->output_offset
1966 outrel.r_addend = relocation;
1967 loc = srelgot->contents;
1968 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
1969 /* NULL if we had an error. */
1970 if (srelgot->contents != NULL)
1971 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1976 relocation = sgot->output_offset + off
1977 + (r_type == R_CRIS_32_IE ? sgot->output_section->vma : 0);
1980 /* The GOT-relative offset to the GOT entry is the relocation,
1981 or for R_CRIS_32_GD, the actual address of the GOT entry. */
1984 case R_CRIS_16_TPREL:
1985 case R_CRIS_32_TPREL:
1986 /* This relocation must only be performed against symbols
1987 defined in an ordinary (non-DSO) object. */
1990 bfd_set_error (bfd_error_invalid_operation);
1992 /* We've already informed in cris_elf_check_relocs that
1993 this is an error. */
1998 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2000 /* If it's undefined, then an error message has already
2002 && h->root.type != bfd_link_hash_undefined)
2004 (*_bfd_error_handler)
2005 (_("%B, section %A: relocation %s is"
2006 " not allowed for symbol: `%s'"
2007 " which is defined outside the program,"
2008 " perhaps a declaration mixup?"),
2011 cris_elf_howto_table[r_type].name,
2013 bfd_set_error (bfd_error_bad_value);
2017 /* NULL if we had an error. */
2018 relocation -= elf_hash_table (info)->tls_sec == NULL
2020 : (elf_hash_table (info)->tls_sec->vma
2021 + elf_hash_table (info)->tls_size);
2023 /* The TLS-relative offset is the relocation. */
2031 r = cris_final_link_relocate (howto, input_bfd, input_section,
2032 contents, rel, relocation);
2034 if (r != bfd_reloc_ok)
2036 const char * msg = (const char *) NULL;
2040 case bfd_reloc_overflow:
2041 r = info->callbacks->reloc_overflow
2042 (info, (h ? &h->root : NULL), symname, howto->name,
2043 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
2044 if (additional_relocation_error_msg_count > 0)
2046 additional_relocation_error_msg_count--;
2049 case R_CRIS_16_GOTPLT:
2052 /* Not just TLS is involved here, so we make
2053 generation and message depend on -fPIC/-fpic
2055 case R_CRIS_16_GOT_TPREL:
2056 case R_CRIS_16_GOT_GD:
2057 (*_bfd_error_handler)
2058 (_("(too many global variables for -fpic:"
2059 " recompile with -fPIC)"));
2062 case R_CRIS_16_TPREL:
2063 case R_CRIS_16_DTPREL:
2064 (*_bfd_error_handler)
2065 (_("(thread-local data too big for -fpic or"
2066 " -msmall-tls: recompile with -fPIC or"
2067 " -mno-small-tls)"));
2070 /* No known cause for overflow for other relocs. */
2077 case bfd_reloc_undefined:
2078 r = info->callbacks->undefined_symbol
2079 (info, symname, input_bfd, input_section, rel->r_offset,
2083 case bfd_reloc_outofrange:
2084 msg = _("internal error: out of range error");
2087 case bfd_reloc_notsupported:
2088 msg = _("internal error: unsupported relocation error");
2091 case bfd_reloc_dangerous:
2092 msg = _("internal error: dangerous relocation");
2096 msg = _("internal error: unknown error");
2101 r = info->callbacks->warning
2102 (info, msg, symname, input_bfd, input_section, rel->r_offset);
2112 /* Finish up dynamic symbol handling. We set the contents of various
2113 dynamic sections here. */
2116 elf_cris_finish_dynamic_symbol (output_bfd, info, h, sym)
2118 struct bfd_link_info *info;
2119 struct elf_link_hash_entry *h;
2120 Elf_Internal_Sym *sym;
2124 /* Where in the plt entry to put values. */
2125 int plt_off1 = 2, plt_off2 = 10, plt_off3 = 16;
2127 /* What offset to add to the distance to the first PLT entry for the
2128 value at plt_off3. */
2129 int plt_off3_value_bias = 4;
2131 /* Where in the PLT entry the call-dynlink-stub is (happens to be same
2132 for PIC and non-PIC for v32 and pre-v32). */
2133 int plt_stub_offset = 8;
2134 int plt_entry_size = PLT_ENTRY_SIZE;
2135 const bfd_byte *plt_entry = elf_cris_plt_entry;
2136 const bfd_byte *plt_pic_entry = elf_cris_pic_plt_entry;
2138 /* Adjust the various PLT entry offsets. */
2139 if (bfd_get_mach (output_bfd) == bfd_mach_cris_v32)
2143 plt_off3_value_bias = -2;
2144 plt_stub_offset = 12;
2145 plt_entry_size = PLT_ENTRY_SIZE_V32;
2146 plt_entry = elf_cris_plt_entry_v32;
2147 plt_pic_entry = elf_cris_pic_plt_entry_v32;
2150 dynobj = elf_hash_table (info)->dynobj;
2152 if (h->plt.offset != (bfd_vma) -1)
2160 bfd_vma gotplt_offset
2161 = elf_cris_hash_entry (h)->gotplt_offset;
2162 Elf_Internal_Rela rela;
2164 bfd_boolean has_gotplt = gotplt_offset != 0;
2166 /* Get the index in the .rela.plt relocations for the .got.plt
2167 entry that corresponds to this symbol.
2168 We have to count backwards here, and the result is only valid
2169 as an index into .rela.plt. We also have to undo the effect
2170 of the R_CRIS_DTPMOD entry at .got index 3 (offset 12 into
2171 .got.plt) for which gotplt_offset is adjusted, because while
2172 that entry goes into .got.plt, its relocation goes into
2173 .rela.got, not .rela.plt. (It's not PLT-specific; not to be
2174 processed as part of the runtime lazy .rela.plt relocation).
2175 FIXME: There be literal constants here... */
2176 bfd_vma rela_plt_index
2177 = (elf_cris_hash_table (info)->dtpmod_refcount != 0
2178 ? gotplt_offset/4 - 2 - 3 : gotplt_offset/4 - 3);
2180 /* Get the offset into the .got table of the entry that corresponds
2181 to this function. Note that we embed knowledge that "incoming"
2182 .got goes after .got.plt in the output without padding (pointer
2183 aligned). However, that knowledge is present in several other
2188 : h->got.offset + elf_cris_hash_table(info)->next_gotplt_entry);
2190 /* This symbol has an entry in the procedure linkage table. Set it
2193 BFD_ASSERT (h->dynindx != -1);
2195 splt = bfd_get_section_by_name (dynobj, ".plt");
2196 sgot = bfd_get_section_by_name (dynobj, ".got");
2197 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
2198 srela = bfd_get_section_by_name (dynobj, ".rela.plt");
2199 BFD_ASSERT (splt != NULL && sgotplt != NULL
2200 && (! has_gotplt || srela != NULL));
2202 got_base = sgotplt->output_section->vma + sgotplt->output_offset;
2204 /* Fill in the entry in the procedure linkage table. */
2207 memcpy (splt->contents + h->plt.offset, plt_entry,
2210 /* We need to enter the absolute address of the GOT entry here. */
2211 bfd_put_32 (output_bfd, got_base + got_offset,
2212 splt->contents + h->plt.offset + plt_off1);
2216 memcpy (splt->contents + h->plt.offset, plt_pic_entry,
2218 bfd_put_32 (output_bfd, got_offset,
2219 splt->contents + h->plt.offset + plt_off1);
2222 /* Fill in the plt entry and make a relocation, if this is a "real"
2226 /* Fill in the offset to the reloc table. */
2227 bfd_put_32 (output_bfd,
2228 rela_plt_index * sizeof (Elf32_External_Rela),
2229 splt->contents + h->plt.offset + plt_off2);
2231 /* Fill in the offset to the first PLT entry, where to "jump". */
2232 bfd_put_32 (output_bfd,
2233 - (h->plt.offset + plt_off3 + plt_off3_value_bias),
2234 splt->contents + h->plt.offset + plt_off3);
2236 /* Fill in the entry in the global offset table with the address of
2237 the relocating stub. */
2238 bfd_put_32 (output_bfd,
2239 (splt->output_section->vma
2240 + splt->output_offset
2243 sgotplt->contents + got_offset);
2245 /* Fill in the entry in the .rela.plt section. */
2246 rela.r_offset = (sgotplt->output_section->vma
2247 + sgotplt->output_offset
2249 rela.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_JUMP_SLOT);
2251 loc = srela->contents + rela_plt_index * sizeof (Elf32_External_Rela);
2252 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
2255 if (!h->def_regular)
2257 /* Mark the symbol as undefined, rather than as defined in
2258 the .plt section. Leave the value alone. */
2259 sym->st_shndx = SHN_UNDEF;
2261 /* FIXME: From elf32-sparc.c 2001-02-19 (1.18). I still don't
2262 know whether resetting the value is significant; if it really
2263 is, rather than a quirk or bug in the sparc port, then I
2264 believe we'd see this elsewhere. */
2265 /* If the symbol is weak, we do need to clear the value.
2266 Otherwise, the PLT entry would provide a definition for
2267 the symbol even if the symbol wasn't defined anywhere,
2268 and so the symbol would never be NULL. */
2269 if (!h->ref_regular_nonweak)
2274 /* For an ordinary program, we emit .got relocs only for symbols that
2275 are in the dynamic-symbols table and are either defined by the
2276 program or are undefined weak symbols, or are function symbols
2277 where we do not output a PLT: the PLT reloc was output above and all
2278 references to the function symbol are redirected to the PLT. */
2279 if (h->got.offset != (bfd_vma) -1
2280 && (elf_cris_hash_entry (h)->reg_got_refcount > 0)
2282 || (h->dynindx != -1
2283 && h->plt.offset == (bfd_vma) -1
2285 && h->root.type != bfd_link_hash_undefweak)))
2289 Elf_Internal_Rela rela;
2293 /* This symbol has an entry in the global offset table. Set it up. */
2295 sgot = bfd_get_section_by_name (dynobj, ".got");
2296 srela = bfd_get_section_by_name (dynobj, ".rela.got");
2297 BFD_ASSERT (sgot != NULL && srela != NULL);
2299 rela.r_offset = (sgot->output_section->vma
2300 + sgot->output_offset
2301 + (h->got.offset &~ (bfd_vma) 1));
2303 /* If this is a static link, or it is a -Bsymbolic link and the
2304 symbol is defined locally or was forced to be local because
2305 of a version file, we just want to emit a RELATIVE reloc.
2306 The entry in the global offset table will already have been
2307 initialized in the relocate_section function. */
2308 where = sgot->contents + (h->got.offset &~ (bfd_vma) 1);
2309 if (! elf_hash_table (info)->dynamic_sections_created
2311 && (info->symbolic || h->dynindx == -1)
2314 rela.r_info = ELF32_R_INFO (0, R_CRIS_RELATIVE);
2315 rela.r_addend = bfd_get_signed_32 (output_bfd, where);
2319 bfd_put_32 (output_bfd, (bfd_vma) 0, where);
2320 rela.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_GLOB_DAT);
2324 loc = srela->contents;
2325 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
2326 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
2332 Elf_Internal_Rela rela;
2335 /* This symbol needs a copy reloc. Set it up. */
2337 BFD_ASSERT (h->dynindx != -1
2338 && (h->root.type == bfd_link_hash_defined
2339 || h->root.type == bfd_link_hash_defweak));
2341 s = bfd_get_section_by_name (h->root.u.def.section->owner,
2343 BFD_ASSERT (s != NULL);
2345 rela.r_offset = (h->root.u.def.value
2346 + h->root.u.def.section->output_section->vma
2347 + h->root.u.def.section->output_offset);
2348 rela.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_COPY);
2350 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
2351 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
2354 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
2355 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
2356 || h == elf_hash_table (info)->hgot)
2357 sym->st_shndx = SHN_ABS;
2362 /* Finish up the dynamic sections. Do *not* emit relocs here, as their
2363 offsets were changed, as part of -z combreloc handling, from those we
2367 elf_cris_finish_dynamic_sections (output_bfd, info)
2369 struct bfd_link_info *info;
2375 dynobj = elf_hash_table (info)->dynobj;
2377 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
2378 BFD_ASSERT (sgot != NULL);
2379 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
2381 if (elf_hash_table (info)->dynamic_sections_created)
2384 Elf32_External_Dyn *dyncon, *dynconend;
2386 splt = bfd_get_section_by_name (dynobj, ".plt");
2387 BFD_ASSERT (splt != NULL && sdyn != NULL);
2389 dyncon = (Elf32_External_Dyn *) sdyn->contents;
2390 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
2391 for (; dyncon < dynconend; dyncon++)
2393 Elf_Internal_Dyn dyn;
2396 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
2404 s = bfd_get_section_by_name (output_bfd, ".got");
2405 BFD_ASSERT (s != NULL);
2406 dyn.d_un.d_ptr = s->vma;
2407 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2411 /* Yes, we *can* have a .plt and no .plt.rela, for instance
2412 if all symbols are found in the .got (not .got.plt). */
2413 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2414 dyn.d_un.d_ptr = s != NULL ? s->vma : 0;
2415 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2419 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2423 dyn.d_un.d_val = s->size;
2424 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2428 /* The procedure linkage table relocs (DT_JMPREL) should
2429 not be included in the overall relocs (DT_RELA).
2430 Therefore, we override the DT_RELASZ entry here to
2431 make it not include the JMPREL relocs. Since the
2432 linker script arranges for .rela.plt to follow all
2433 other relocation sections, we don't have to worry
2434 about changing the DT_RELA entry. */
2435 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2437 dyn.d_un.d_val -= s->size;
2438 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2443 /* Fill in the first entry in the procedure linkage table. */
2446 if (bfd_get_mach (output_bfd) == bfd_mach_cris_v32)
2449 memcpy (splt->contents, elf_cris_pic_plt0_entry_v32,
2450 PLT_ENTRY_SIZE_V32);
2453 memcpy (splt->contents, elf_cris_plt0_entry_v32,
2454 PLT_ENTRY_SIZE_V32);
2455 bfd_put_32 (output_bfd,
2456 sgot->output_section->vma
2457 + sgot->output_offset + 4,
2458 splt->contents + 4);
2460 elf_section_data (splt->output_section)->this_hdr.sh_entsize
2461 = PLT_ENTRY_SIZE_V32;
2467 memcpy (splt->contents, elf_cris_pic_plt0_entry,
2471 memcpy (splt->contents, elf_cris_plt0_entry,
2473 bfd_put_32 (output_bfd,
2474 sgot->output_section->vma
2475 + sgot->output_offset + 4,
2476 splt->contents + 6);
2477 bfd_put_32 (output_bfd,
2478 sgot->output_section->vma
2479 + sgot->output_offset + 8,
2480 splt->contents + 14);
2482 elf_section_data (splt->output_section)->this_hdr.sh_entsize
2489 /* Fill in the first three entries in the global offset table. */
2493 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
2495 bfd_put_32 (output_bfd,
2496 sdyn->output_section->vma + sdyn->output_offset,
2498 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
2499 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
2502 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
2507 /* Return the section that should be marked against GC for a given
2511 cris_elf_gc_mark_hook (asection *sec,
2512 struct bfd_link_info *info,
2513 Elf_Internal_Rela *rel,
2514 struct elf_link_hash_entry *h,
2515 Elf_Internal_Sym *sym)
2517 enum elf_cris_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
2521 case R_CRIS_GNU_VTINHERIT:
2522 case R_CRIS_GNU_VTENTRY:
2529 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2532 /* Update the got entry reference counts for the section being removed. */
2535 cris_elf_gc_sweep_hook (bfd *abfd,
2536 struct bfd_link_info *info,
2538 const Elf_Internal_Rela *relocs)
2540 Elf_Internal_Shdr *symtab_hdr;
2541 struct elf_link_hash_entry **sym_hashes;
2542 bfd_signed_vma *local_got_refcounts;
2543 const Elf_Internal_Rela *rel, *relend;
2548 if (info->relocatable)
2551 dynobj = elf_hash_table (info)->dynobj;
2555 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2556 sym_hashes = elf_sym_hashes (abfd);
2557 local_got_refcounts = elf_local_got_refcounts (abfd);
2559 sgot = bfd_get_section_by_name (dynobj, ".got");
2560 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
2562 relend = relocs + sec->reloc_count;
2563 for (rel = relocs; rel < relend; rel++)
2565 unsigned long r_symndx;
2566 struct elf_link_hash_entry *h = NULL;
2567 bfd_signed_vma got_element_size = 4;
2568 bfd_signed_vma *specific_refcount = NULL;
2569 enum elf_cris_reloc_type r_type;
2571 r_symndx = ELF32_R_SYM (rel->r_info);
2572 if (r_symndx >= symtab_hdr->sh_info)
2574 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2575 while (h->root.type == bfd_link_hash_indirect
2576 || h->root.type == bfd_link_hash_warning)
2577 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2580 r_type = ELF32_R_TYPE (rel->r_info);
2585 case R_CRIS_16_GOTPLT:
2586 case R_CRIS_32_GOTPLT:
2587 specific_refcount = h != NULL
2588 ? &((struct elf_cris_link_hash_entry *) h)->reg_got_refcount
2589 : &local_got_refcounts[LGOT_REG_NDX (r_symndx)];
2593 case R_CRIS_32_GOT_GD:
2594 case R_CRIS_16_GOT_GD:
2595 got_element_size = 8;
2596 specific_refcount = h != NULL
2597 ? &((struct elf_cris_link_hash_entry *) h)->dtp_refcount
2598 : &local_got_refcounts[LGOT_DTP_NDX (r_symndx)];
2602 case R_CRIS_16_GOT_TPREL:
2603 case R_CRIS_32_GOT_TPREL:
2604 specific_refcount = h != NULL
2605 ? &((struct elf_cris_link_hash_entry *) h)->tprel_refcount
2606 : &local_got_refcounts[LGOT_TPREL_NDX (r_symndx)];
2617 case R_CRIS_16_GOT_TPREL:
2618 case R_CRIS_32_GOT_TPREL:
2619 case R_CRIS_32_GOT_GD:
2620 case R_CRIS_16_GOT_GD:
2625 /* If the counters are 0 when we got here, we've
2626 miscounted somehow somewhere, an internal error. */
2627 BFD_ASSERT (h->got.refcount > 0);
2630 BFD_ASSERT (*specific_refcount > 0);
2631 --*specific_refcount;
2632 if (*specific_refcount == 0)
2634 /* We don't need the .got entry any more. */
2635 sgot->size -= got_element_size;
2636 srelgot->size -= sizeof (Elf32_External_Rela);
2642 if (local_got_refcounts != NULL)
2644 /* If the counters are 0 when we got here, we've
2645 miscounted somehow somewhere, an internal error. */
2646 BFD_ASSERT (local_got_refcounts[r_symndx] > 0);
2647 --local_got_refcounts[r_symndx];
2649 BFD_ASSERT (*specific_refcount > 0);
2650 --*specific_refcount;
2651 if (*specific_refcount == 0)
2653 /* We don't need the .got entry any more. */
2654 sgot->size -= got_element_size;
2656 srelgot->size -= sizeof (Elf32_External_Rela);
2661 case R_CRIS_16_GOTPLT:
2662 case R_CRIS_32_GOTPLT:
2663 /* For local symbols, treat these like GOT relocs. */
2665 goto local_got_reloc;
2668 case R_CRIS_32_PLT_GOTREL:
2669 /* FIXME: We don't garbage-collect away the .got section. */
2670 if (local_got_refcounts != NULL)
2671 local_got_refcounts[-1]--;
2674 case R_CRIS_8_PCREL:
2675 case R_CRIS_16_PCREL:
2676 case R_CRIS_32_PCREL:
2677 case R_CRIS_32_PLT_PCREL:
2680 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2681 && h->plt.refcount > 0)
2686 case R_CRIS_32_DTPREL:
2687 case R_CRIS_16_DTPREL:
2688 elf_cris_hash_table (info)->dtpmod_refcount--;
2689 if (elf_cris_hash_table (info)->dtpmod_refcount == 0)
2690 elf_cris_hash_table (info)->next_gotplt_entry -= 8;
2691 BFD_ASSERT (local_got_refcounts != NULL);
2692 local_got_refcounts[-1]--;
2703 /* Make sure we emit a GOT entry if the symbol was supposed to have a PLT
2704 entry but we found we will not create any. Called when we find we will
2705 not have any PLT for this symbol, by for example
2706 elf_cris_adjust_dynamic_symbol when we're doing a proper dynamic link,
2707 or elf_cris_size_dynamic_sections if no dynamic sections will be
2708 created (we're only linking static objects). */
2711 elf_cris_adjust_gotplt_to_got (h, p)
2712 struct elf_cris_link_hash_entry *h;
2715 struct bfd_link_info *info = (struct bfd_link_info *) p;
2717 if (h->root.root.type == bfd_link_hash_warning)
2718 h = (struct elf_cris_link_hash_entry *) h->root.root.u.i.link;
2720 /* If nobody wanted a GOTPLT with this symbol, we're done. */
2721 if (h->gotplt_refcount <= 0)
2724 if (h->reg_got_refcount > 0)
2726 /* There's a GOT entry for this symbol. Just adjust the refcounts.
2727 Probably not necessary at this stage, but keeping them accurate
2728 helps avoiding surprises later. */
2729 h->root.got.refcount += h->gotplt_refcount;
2730 h->reg_got_refcount += h->gotplt_refcount;
2731 h->gotplt_refcount = 0;
2735 /* No GOT entry for this symbol. We need to create one. */
2736 bfd *dynobj = elf_hash_table (info)->dynobj;
2740 BFD_ASSERT (dynobj != NULL);
2741 sgot = bfd_get_section_by_name (dynobj, ".got");
2742 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
2744 /* Put accurate refcounts there. */
2745 h->root.got.refcount += h->gotplt_refcount;
2746 h->reg_got_refcount = h->gotplt_refcount;
2748 h->gotplt_refcount = 0;
2750 /* We always have a .got and a .rela.got section if there were
2751 GOTPLT relocs in input. */
2752 BFD_ASSERT (sgot != NULL && srelgot != NULL);
2754 /* Allocate space in the .got section. */
2757 /* Allocate relocation space. */
2758 srelgot->size += sizeof (Elf32_External_Rela);
2764 /* Try to fold PLT entries with GOT entries. There are two cases when we
2767 - When all PLT references are GOTPLT references, and there are GOT
2768 references, and this is not the executable. We don't have to
2769 generate a PLT at all.
2771 - When there are both (ordinary) PLT references and GOT references,
2772 and this isn't the executable.
2773 We want to make the PLT reference use the ordinary GOT entry rather
2774 than R_CRIS_JUMP_SLOT, a run-time dynamically resolved GOTPLT entry,
2775 since the GOT entry will have to be resolved at startup anyway.
2777 Though the latter case is handled when room for the PLT is allocated,
2780 By folding into the GOT, we may need a round-trip to a PLT in the
2781 executable for calls, a loss in performance. Still, losing a
2782 reloc is a win in size and at least in start-up time.
2784 Note that this function is called before symbols are forced local by
2785 version scripts. The differing cases are handled by
2786 elf_cris_hide_symbol. */
2789 elf_cris_try_fold_plt_to_got (h, p)
2790 struct elf_cris_link_hash_entry *h;
2793 struct bfd_link_info *info = (struct bfd_link_info *) p;
2795 /* If there are no GOT references for this symbol, we can't fold any
2796 other reference so there's nothing to do. Likewise if there are no
2797 PLT references; GOTPLT references included. */
2798 if (h->root.got.refcount <= 0 || h->root.plt.refcount <= 0)
2801 /* GOTPLT relocs are supposed to be included into the PLT refcount. */
2802 BFD_ASSERT (h->gotplt_refcount <= h->root.plt.refcount);
2804 if (h->gotplt_refcount == h->root.plt.refcount)
2806 /* The only PLT references are GOTPLT references, and there are GOT
2807 references. Convert PLT to GOT references. */
2808 if (! elf_cris_adjust_gotplt_to_got (h, info))
2811 /* Clear the PLT references, so no PLT will be created. */
2812 h->root.plt.offset = (bfd_vma) -1;
2818 /* Our own version of hide_symbol, so that we can adjust a GOTPLT reloc
2819 to use a GOT entry (and create one) rather than requiring a GOTPLT
2823 elf_cris_hide_symbol (info, h, force_local)
2824 struct bfd_link_info *info;
2825 struct elf_link_hash_entry *h;
2826 bfd_boolean force_local;
2828 elf_cris_adjust_gotplt_to_got ((struct elf_cris_link_hash_entry *) h, info);
2830 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
2833 /* Adjust a symbol defined by a dynamic object and referenced by a
2834 regular object. The current definition is in some section of the
2835 dynamic object, but we're not including those sections. We have to
2836 change the definition to something the rest of the link can
2840 elf_cris_adjust_dynamic_symbol (info, h)
2841 struct bfd_link_info *info;
2842 struct elf_link_hash_entry *h;
2846 bfd_size_type plt_entry_size;
2848 dynobj = elf_hash_table (info)->dynobj;
2850 /* Make sure we know what is going on here. */
2851 BFD_ASSERT (dynobj != NULL
2853 || h->u.weakdef != NULL
2856 && !h->def_regular)));
2859 = (bfd_get_mach (dynobj) == bfd_mach_cris_v32
2860 ? PLT_ENTRY_SIZE_V32 : PLT_ENTRY_SIZE);
2862 /* If this is a function, put it in the procedure linkage table. We
2863 will fill in the contents of the procedure linkage table later,
2864 when we know the address of the .got section. */
2865 if (h->type == STT_FUNC
2868 /* If we link a program (not a DSO), we'll get rid of unnecessary
2869 PLT entries; we point to the actual symbols -- even for pic
2870 relocs, because a program built with -fpic should have the same
2871 result as one built without -fpic, specifically considering weak
2873 FIXME: m68k and i386 differ here, for unclear reasons. */
2877 /* This case can occur if we saw a PLT reloc in an input file,
2878 but the symbol was not defined by a dynamic object. In such
2879 a case, we don't actually need to build a procedure linkage
2880 table, and we can just do an absolute or PC reloc instead, or
2881 change a .got.plt index to a .got index for GOTPLT relocs. */
2882 BFD_ASSERT (h->needs_plt);
2884 h->plt.offset = (bfd_vma) -1;
2886 elf_cris_adjust_gotplt_to_got ((struct
2887 elf_cris_link_hash_entry *) h,
2891 /* If we had a R_CRIS_GLOB_DAT that didn't have to point to a PLT;
2892 where a pointer-equivalent symbol was unimportant (i.e. more
2893 like R_CRIS_JUMP_SLOT after symbol evaluation) we could get rid
2894 of the PLT. We can't for the executable, because the GOT
2895 entries will point to the PLT there (and be constant). */
2897 && !elf_cris_try_fold_plt_to_got ((struct elf_cris_link_hash_entry*)
2901 /* GC or folding may have rendered this entry unused. */
2902 if (h->plt.refcount <= 0)
2905 h->plt.offset = (bfd_vma) -1;
2909 /* Make sure this symbol is output as a dynamic symbol. */
2910 if (h->dynindx == -1)
2912 if (! bfd_elf_link_record_dynamic_symbol (info, h))
2916 s = bfd_get_section_by_name (dynobj, ".plt");
2917 BFD_ASSERT (s != NULL);
2919 /* If this is the first .plt entry, make room for the special
2922 s->size += plt_entry_size;
2924 /* If this symbol is not defined in a regular file, and we are
2925 not generating a shared library, then set the symbol to this
2926 location in the .plt. */
2930 h->root.u.def.section = s;
2931 h->root.u.def.value = s->size;
2934 /* If there's already a GOT entry, use that, not a .got.plt. A
2935 GOT field still has a reference count when we get here; it's
2936 not yet changed to an offset. We can't do this for an
2937 executable, because then the reloc associated with the PLT
2938 would get a non-PLT reloc pointing to the PLT. FIXME: Move
2939 this to elf_cris_try_fold_plt_to_got. */
2940 if (info->shared && h->got.refcount > 0)
2942 h->got.refcount += h->plt.refcount;
2944 /* Mark the PLT offset to use the GOT entry by setting the low
2945 bit in the plt offset; it is always a multiple of
2946 plt_entry_size (which is at least a multiple of 2). */
2947 BFD_ASSERT ((s->size % plt_entry_size) == 0);
2949 /* Change the PLT refcount to an offset. */
2950 h->plt.offset = s->size;
2952 /* By not setting gotplt_offset (i.e. it remains at 0), we signal
2953 that the got entry should be used instead. */
2954 BFD_ASSERT (((struct elf_cris_link_hash_entry *)
2955 h)->gotplt_offset == 0);
2957 /* Make room for this entry. */
2958 s->size += plt_entry_size;
2963 /* No GOT reference for this symbol; prepare for an ordinary PLT. */
2964 h->plt.offset = s->size;
2966 /* Make room for this entry. */
2967 s->size += plt_entry_size;
2969 /* We also need to make an entry in the .got.plt section, which
2970 will be placed in the .got section by the linker script. */
2971 ((struct elf_cris_link_hash_entry *) h)->gotplt_offset
2972 = elf_cris_hash_table (info)->next_gotplt_entry;
2973 elf_cris_hash_table (info)->next_gotplt_entry += 4;
2975 s = bfd_get_section_by_name (dynobj, ".got.plt");
2976 BFD_ASSERT (s != NULL);
2979 /* We also need to make an entry in the .rela.plt section. */
2981 s = bfd_get_section_by_name (dynobj, ".rela.plt");
2982 BFD_ASSERT (s != NULL);
2983 s->size += sizeof (Elf32_External_Rela);
2988 /* Reinitialize the plt offset now that it is not used as a reference
2990 h->plt.offset = (bfd_vma) -1;
2992 /* If this is a weak symbol, and there is a real definition, the
2993 processor independent code will have arranged for us to see the
2994 real definition first, and we can just use the same value. */
2995 if (h->u.weakdef != NULL)
2997 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
2998 || h->u.weakdef->root.type == bfd_link_hash_defweak);
2999 h->root.u.def.section = h->u.weakdef->root.u.def.section;
3000 h->root.u.def.value = h->u.weakdef->root.u.def.value;
3004 /* This is a reference to a symbol defined by a dynamic object which
3005 is not a function. */
3007 /* If we are creating a shared library, we must presume that the
3008 only references to the symbol are via the global offset table.
3009 For such cases we need not do anything here; the relocations will
3010 be handled correctly by relocate_section. */
3014 /* If there are no references to this symbol that do not use the
3015 GOT, we don't need to generate a copy reloc. */
3016 if (!h->non_got_ref)
3021 (*_bfd_error_handler) (_("dynamic variable `%s' is zero size"),
3022 h->root.root.string);
3026 /* We must allocate the symbol in our .dynbss section, which will
3027 become part of the .bss section of the executable. There will be
3028 an entry for this symbol in the .dynsym section. The dynamic
3029 object will contain position independent code, so all references
3030 from the dynamic object to this symbol will go through the global
3031 offset table. The dynamic linker will use the .dynsym entry to
3032 determine the address it must put in the global offset table, so
3033 both the dynamic object and the regular object will refer to the
3034 same memory location for the variable. */
3036 s = bfd_get_section_by_name (dynobj, ".dynbss");
3037 BFD_ASSERT (s != NULL);
3039 /* We must generate a R_CRIS_COPY reloc to tell the dynamic linker to
3040 copy the initial value out of the dynamic object and into the
3041 runtime process image. We need to remember the offset into the
3042 .rela.bss section we are going to use. */
3043 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
3047 srel = bfd_get_section_by_name (dynobj, ".rela.bss");
3048 BFD_ASSERT (srel != NULL);
3049 srel->size += sizeof (Elf32_External_Rela);
3053 return _bfd_elf_adjust_dynamic_copy (h, s);
3056 /* Adjust our "subclass" elements for an indirect symbol. */
3059 elf_cris_copy_indirect_symbol (struct bfd_link_info *info,
3060 struct elf_link_hash_entry *dir,
3061 struct elf_link_hash_entry *ind)
3063 struct elf_cris_link_hash_entry *edir, *eind;
3065 edir = (struct elf_cris_link_hash_entry *) dir;
3066 eind = (struct elf_cris_link_hash_entry *) ind;
3068 /* Only indirect symbols are replaced; we're not interested in
3069 updating any of EIND's fields for other symbols. */
3070 if (eind->root.root.type != bfd_link_hash_indirect)
3072 /* Still, we need to copy flags for e.g. weak definitions. */
3073 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
3077 BFD_ASSERT (edir->pcrel_relocs_copied == NULL);
3078 BFD_ASSERT (edir->gotplt_offset == 0 || eind->gotplt_offset == 0);
3080 #define XMOVOPZ(F, OP, Z) edir->F OP eind->F; eind->F = Z
3081 #define XMOVE(F) XMOVOPZ (F, +=, 0)
3082 XMOVOPZ (pcrel_relocs_copied, =, NULL);
3083 XMOVE (gotplt_refcount);
3084 XMOVE (gotplt_offset);
3085 XMOVE (reg_got_refcount);
3086 XMOVE (tprel_refcount);
3087 XMOVE (dtp_refcount);
3091 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
3094 /* Look through the relocs for a section during the first phase. */
3097 cris_elf_check_relocs (abfd, info, sec, relocs)
3099 struct bfd_link_info *info;
3101 const Elf_Internal_Rela *relocs;
3104 Elf_Internal_Shdr *symtab_hdr;
3105 struct elf_link_hash_entry **sym_hashes;
3106 bfd_signed_vma *local_got_refcounts;
3107 const Elf_Internal_Rela *rel;
3108 const Elf_Internal_Rela *rel_end;
3113 if (info->relocatable)
3116 dynobj = elf_hash_table (info)->dynobj;
3117 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3118 sym_hashes = elf_sym_hashes (abfd);
3119 local_got_refcounts = elf_local_got_refcounts (abfd);
3125 rel_end = relocs + sec->reloc_count;
3126 for (rel = relocs; rel < rel_end; rel++)
3128 struct elf_link_hash_entry *h;
3129 unsigned long r_symndx;
3130 enum elf_cris_reloc_type r_type;
3131 bfd_signed_vma got_element_size = 4;
3132 unsigned long r_symndx_lgot = INT_MAX;
3134 r_symndx = ELF32_R_SYM (rel->r_info);
3135 if (r_symndx < symtab_hdr->sh_info)
3138 r_symndx_lgot = LGOT_REG_NDX (r_symndx);
3142 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3143 while (h->root.type == bfd_link_hash_indirect
3144 || h->root.type == bfd_link_hash_warning)
3145 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3148 r_type = ELF32_R_TYPE (rel->r_info);
3150 /* Some relocs require linker-created sections; we need to hang them
3151 on the first input bfd we found that contained dynamic relocs. */
3154 case R_CRIS_16_DTPREL:
3155 case R_CRIS_32_DTPREL:
3156 /* The first .got.plt entry is right after the R_CRIS_DTPMOD
3157 entry at index 3. */
3158 if (elf_cris_hash_table (info)->dtpmod_refcount == 0)
3159 elf_cris_hash_table (info)->next_gotplt_entry += 8;
3160 elf_cris_hash_table (info)->dtpmod_refcount++;
3165 case R_CRIS_16_GOT_GD:
3166 case R_CRIS_32_GOT_GD:
3167 case R_CRIS_32_GOT_TPREL:
3168 case R_CRIS_16_GOT_TPREL:
3171 case R_CRIS_32_GOTREL:
3172 case R_CRIS_32_PLT_GOTREL:
3173 case R_CRIS_32_PLT_PCREL:
3174 case R_CRIS_16_GOTPLT:
3175 case R_CRIS_32_GOTPLT:
3178 elf_hash_table (info)->dynobj = dynobj = abfd;
3180 /* We could handle this if we can get a handle on the
3181 output bfd in elf_cris_adjust_dynamic_symbol. Failing
3182 that, we must insist on dynobj being a specific mach. */
3183 if (bfd_get_mach (dynobj) == bfd_mach_cris_v10_v32)
3185 (*_bfd_error_handler)
3186 (_("%B, section %A:\n v10/v32 compatible object %s"
3187 " must not contain a PIC relocation"),
3192 /* Create the .got section, so we can assume it's always
3193 present whenever there's a dynobj. */
3194 if (!_bfd_elf_create_got_section (dynobj, info))
3199 sgot = bfd_get_section_by_name (dynobj, ".got");
3201 if (local_got_refcounts == NULL)
3205 /* We use index local_got_refcounts[-1] to count all
3206 GOT-relative relocations that do not have explicit
3208 amt = LGOT_ALLOC_NELTS_FOR (symtab_hdr->sh_info) + 1;
3209 amt *= sizeof (bfd_signed_vma);
3210 local_got_refcounts = ((bfd_signed_vma *) bfd_zalloc (abfd, amt));
3211 if (local_got_refcounts == NULL)
3214 local_got_refcounts++;
3215 elf_local_got_refcounts (abfd) = local_got_refcounts;
3223 /* Some relocs require a global offset table (but perhaps not a
3224 specific GOT entry). */
3227 case R_CRIS_16_DTPREL:
3228 case R_CRIS_32_DTPREL:
3229 /* Not requesting .got.rela for an executable: the contents
3230 of the first entry is constant there. For a shared
3231 library, we need .got.rela for the R_CRIS_DTPMOD
3232 relocation at index 3. */
3239 case R_CRIS_16_GOT_GD:
3240 case R_CRIS_32_GOT_GD:
3241 case R_CRIS_32_GOT_TPREL:
3242 case R_CRIS_16_GOT_TPREL:
3245 /* For R_CRIS_16_GOTPLT and R_CRIS_32_GOTPLT, we need a GOT
3246 entry only for local symbols. Unfortunately, we don't know
3247 until later on if there's a version script that forces the
3248 symbol local. We must have the .rela.got section in place
3249 before we know if the symbol looks global now, so we need
3250 to treat the reloc just like for R_CRIS_16_GOT and
3252 case R_CRIS_16_GOTPLT:
3253 case R_CRIS_32_GOTPLT:
3257 && (h != NULL || info->shared))
3259 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
3260 if (srelgot == NULL)
3262 srelgot = bfd_make_section_with_flags (dynobj,
3268 | SEC_LINKER_CREATED
3271 || !bfd_set_section_alignment (dynobj, srelgot, 2))
3281 /* Warn and error for invalid input. */
3285 case R_CRIS_32_TPREL:
3286 case R_CRIS_16_TPREL:
3290 (*_bfd_error_handler)
3291 (_("%B, section %A:\n relocation %s not valid"
3292 " in a shared object;"
3293 " typically an option mixup, recompile with -fPIC"),
3296 cris_elf_howto_table[r_type].name);
3297 /* Don't return FALSE here; we want messages for all of
3298 these and the error behavior is ungraceful
3308 case R_CRIS_16_GOT_GD:
3309 case R_CRIS_32_GOT_GD:
3310 /* These are requests for tls_index entries, run-time R_CRIS_DTP. */
3311 got_element_size = 8;
3312 r_symndx_lgot = LGOT_DTP_NDX (r_symndx);
3315 case R_CRIS_16_DTPREL:
3316 case R_CRIS_32_DTPREL:
3317 /* These two just request for the constant-index
3318 module-local tls_index-sized GOT entry, which we add
3323 case R_CRIS_32_GOT_TPREL:
3324 case R_CRIS_16_GOT_TPREL:
3325 r_symndx_lgot = LGOT_TPREL_NDX (r_symndx);
3327 /* Those relocs also require that a DSO is of type
3328 Initial Exec. Like other targets, we don't reset this
3329 flag even if the relocs are GC:ed away. */
3331 info->flags |= DF_STATIC_TLS;
3334 /* Let's list the other assembler-generated TLS-relocs too,
3335 just to show that they're not forgotten. */
3336 case R_CRIS_16_TPREL:
3337 case R_CRIS_32_TPREL:
3344 case R_CRIS_16_GOTPLT:
3345 case R_CRIS_32_GOTPLT:
3346 /* Mark that we need a GOT entry if the PLT entry (and its GOT
3347 entry) is eliminated. We can only do this for a non-local
3351 elf_cris_hash_entry (h)->gotplt_refcount++;
3352 goto handle_gotplt_reloc;
3354 /* If h is NULL then this is a local symbol, and we must make a
3355 GOT entry for it, so handle it like a GOT reloc. */
3360 case R_CRIS_16_GOT_GD:
3361 case R_CRIS_32_GOT_GD:
3362 case R_CRIS_32_GOT_TPREL:
3363 case R_CRIS_16_GOT_TPREL:
3366 /* This symbol requires a global offset table entry. */
3369 if (h->got.refcount == 0)
3371 /* Make sure this symbol is output as a dynamic symbol. */
3372 if (h->dynindx == -1)
3374 if (!bfd_elf_link_record_dynamic_symbol (info, h))
3379 /* Update the sum of reloc counts for this symbol. */
3386 if (elf_cris_hash_entry (h)->reg_got_refcount == 0)
3388 /* Allocate space in the .got section. */
3389 sgot->size += got_element_size;
3390 /* Allocate relocation space. */
3391 srelgot->size += sizeof (Elf32_External_Rela);
3393 elf_cris_hash_entry (h)->reg_got_refcount++;
3397 case R_CRIS_16_GOT_GD:
3398 case R_CRIS_32_GOT_GD:
3399 if (elf_cris_hash_entry (h)->dtp_refcount == 0)
3401 /* Allocate space in the .got section. */
3402 sgot->size += got_element_size;
3403 /* Allocate relocation space. */
3404 srelgot->size += sizeof (Elf32_External_Rela);
3406 elf_cris_hash_entry (h)->dtp_refcount++;
3410 case R_CRIS_32_GOT_TPREL:
3411 case R_CRIS_16_GOT_TPREL:
3412 if (elf_cris_hash_entry (h)->tprel_refcount == 0)
3414 /* Allocate space in the .got section. */
3415 sgot->size += got_element_size;
3416 /* Allocate relocation space. */
3417 srelgot->size += sizeof (Elf32_External_Rela);
3419 elf_cris_hash_entry (h)->tprel_refcount++;
3429 /* This is a global offset table entry for a local symbol. */
3430 if (local_got_refcounts[r_symndx_lgot] == 0)
3432 sgot->size += got_element_size;
3435 /* If we are generating a shared object, we need
3436 to output a R_CRIS_RELATIVE reloc so that the
3437 dynamic linker can adjust this GOT entry.
3438 Similarly for non-regular got entries. */
3439 srelgot->size += sizeof (Elf32_External_Rela);
3442 /* Update the reloc-specific count. */
3443 local_got_refcounts[r_symndx_lgot]++;
3445 /* This one is the sum of all the others. */
3446 local_got_refcounts[r_symndx]++;
3450 case R_CRIS_16_DTPREL:
3451 case R_CRIS_32_DTPREL:
3452 case R_CRIS_32_GOTREL:
3453 /* This reference requires a global offset table.
3454 FIXME: The actual refcount isn't used currently; the .got
3455 section can't be removed if there were any references in the
3457 local_got_refcounts[-1]++;
3460 handle_gotplt_reloc:
3462 case R_CRIS_32_PLT_GOTREL:
3463 /* This reference requires a global offset table. */
3464 local_got_refcounts[-1]++;
3467 case R_CRIS_32_PLT_PCREL:
3468 /* This symbol requires a procedure linkage table entry. We
3469 actually build the entry in adjust_dynamic_symbol,
3470 because this might be a case of linking PIC code which is
3471 never referenced by a dynamic object, in which case we
3472 don't need to generate a procedure linkage table entry
3475 /* Beware: if we'd check for visibility of the symbol here
3476 (and not marking the need for a PLT when non-visible), we'd
3477 get into trouble with keeping handling consistent with
3478 regards to relocs found before definition and GOTPLT
3479 handling. Eliminable PLT entries will be dealt with later
3491 /* Let's help debug shared library creation. Any of these
3492 relocs *can* be used in shared libs, but pages containing
3493 them cannot be shared, so they're not appropriate for
3494 common use. Don't warn for sections we don't care about,
3495 such as debug sections or non-constant sections. We
3496 can't help tables of (global) function pointers, for
3497 example, though they must be emitted in a (writable) data
3498 section to avoid having impure text sections. */
3500 && (sec->flags & SEC_ALLOC) != 0
3501 && (sec->flags & SEC_READONLY) != 0)
3503 /* FIXME: How do we make this optionally a warning only? */
3504 (*_bfd_error_handler)
3505 (_("%B, section %A:\n relocation %s should not"
3506 " be used in a shared object; recompile with -fPIC"),
3509 cris_elf_howto_table[r_type].name);
3515 /* Make sure a plt entry is created for this symbol if it
3516 turns out to be a function defined by a dynamic object. */
3517 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
3521 /* If we are creating a shared library and this is not a local
3522 symbol, we need to copy the reloc into the shared library.
3523 However when linking with -Bsymbolic and this is a global
3524 symbol which is defined in an object we are including in the
3525 link (i.e., DEF_REGULAR is set), then we can resolve the
3526 reloc directly. At this point we have not seen all the input
3527 files, so it is possible that DEF_REGULAR is not set now but
3528 will be set later (it is never cleared). In case of a weak
3529 definition, DEF_REGULAR may be cleared later by a strong
3530 definition in a shared library. We account for that
3531 possibility below by storing information in the relocs_copied
3532 field of the hash table entry. A similar situation occurs
3533 when creating shared libraries and symbol visibility changes
3534 render the symbol local. */
3536 /* No need to do anything if we're not creating a shared object. */
3540 /* We don't need to handle relocs into sections not going into
3541 the "real" output. */
3542 if ((sec->flags & SEC_ALLOC) == 0)
3545 /* We may need to create a reloc section in the dynobj and made room
3549 sreloc = _bfd_elf_make_dynamic_reloc_section
3550 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
3556 if (sec->flags & SEC_READONLY)
3557 info->flags |= DF_TEXTREL;
3559 sreloc->size += sizeof (Elf32_External_Rela);
3562 case R_CRIS_8_PCREL:
3563 case R_CRIS_16_PCREL:
3564 case R_CRIS_32_PCREL:
3569 /* Make sure a plt entry is created for this symbol if it
3570 turns out to be a function defined by a dynamic object. */
3571 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
3575 /* If we are creating a shared library and this is not a local
3576 symbol, we need to copy the reloc into the shared library.
3577 However when linking with -Bsymbolic and this is a global
3578 symbol which is defined in an object we are including in the
3579 link (i.e., DEF_REGULAR is set), then we can resolve the
3580 reloc directly. At this point we have not seen all the input
3581 files, so it is possible that DEF_REGULAR is not set now but
3582 will be set later (it is never cleared). In case of a weak
3583 definition, DEF_REGULAR may be cleared later by a strong
3584 definition in a shared library. We account for that
3585 possibility below by storing information in the relocs_copied
3586 field of the hash table entry. A similar situation occurs
3587 when creating shared libraries and symbol visibility changes
3588 render the symbol local. */
3590 /* No need to do anything if we're not creating a shared object. */
3594 /* We don't need to handle relocs into sections not going into
3595 the "real" output. */
3596 if ((sec->flags & SEC_ALLOC) == 0)
3599 /* If the symbol is local, then we know already we can
3600 eliminate the reloc. */
3601 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
3604 /* If this is with -Bsymbolic and the symbol isn't weak, and
3605 is defined by an ordinary object (the ones we include in
3606 this shared library) then we can also eliminate the
3607 reloc. See comment above for more eliminable cases which
3608 we can't identify at this time. */
3610 && h->root.type != bfd_link_hash_defweak
3614 /* We may need to create a reloc section in the dynobj and made room
3618 sreloc = _bfd_elf_make_dynamic_reloc_section
3619 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
3625 sreloc->size += sizeof (Elf32_External_Rela);
3627 /* We count the number of PC relative relocations we have
3628 entered for this symbol, so that we can discard them
3629 again if the symbol is later defined by a regular object.
3630 We know that h is really a pointer to an
3631 elf_cris_link_hash_entry. */
3633 struct elf_cris_link_hash_entry *eh;
3634 struct elf_cris_pcrel_relocs_copied *p;
3636 eh = elf_cris_hash_entry (h);
3638 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
3639 if (p->section == sreloc)
3644 p = ((struct elf_cris_pcrel_relocs_copied *)
3645 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
3648 p->next = eh->pcrel_relocs_copied;
3649 eh->pcrel_relocs_copied = p;
3650 p->section = sreloc;
3659 /* This relocation describes the C++ object vtable hierarchy.
3660 Reconstruct it for later use during GC. */
3661 case R_CRIS_GNU_VTINHERIT:
3662 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
3666 /* This relocation describes which C++ vtable entries are actually
3667 used. Record for later use during GC. */
3668 case R_CRIS_GNU_VTENTRY:
3669 BFD_ASSERT (h != NULL);
3671 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
3675 case R_CRIS_16_TPREL:
3676 case R_CRIS_32_TPREL:
3677 /* Already warned above, when necessary. */
3681 /* Other relocs do not appear here. */
3682 bfd_set_error (bfd_error_bad_value);
3690 /* Set the sizes of the dynamic sections. */
3693 elf_cris_size_dynamic_sections (output_bfd, info)
3694 bfd *output_bfd ATTRIBUTE_UNUSED;
3695 struct bfd_link_info *info;
3702 dynobj = elf_hash_table (info)->dynobj;
3703 BFD_ASSERT (dynobj != NULL);
3705 if (elf_hash_table (info)->dynamic_sections_created)
3707 /* Set the contents of the .interp section to the interpreter. */
3708 if (info->executable)
3710 s = bfd_get_section_by_name (dynobj, ".interp");
3711 BFD_ASSERT (s != NULL);
3712 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
3713 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
3718 /* Adjust all expected GOTPLT uses to use a GOT entry instead. */
3719 elf_cris_link_hash_traverse (elf_cris_hash_table (info),
3720 elf_cris_adjust_gotplt_to_got,
3723 /* We may have created entries in the .rela.got section.
3724 However, if we are not creating the dynamic sections, we will
3725 not actually use these entries. Reset the size of .rela.got,
3726 which will cause it to get stripped from the output file
3728 s = bfd_get_section_by_name (dynobj, ".rela.got");
3733 /* If this is a -Bsymbolic shared link, then we need to discard all PC
3734 relative relocs against symbols defined in a regular object. We
3735 allocated space for them in the check_relocs routine, but we will not
3736 fill them in in the relocate_section routine. We also discard space
3737 for relocs that have become for local symbols due to symbol
3738 visibility changes. For programs, we discard space for relocs for
3739 symbols not referenced by any dynamic object. */
3741 elf_cris_link_hash_traverse (elf_cris_hash_table (info),
3742 elf_cris_discard_excess_dso_dynamics,
3745 elf_cris_link_hash_traverse (elf_cris_hash_table (info),
3746 elf_cris_discard_excess_program_dynamics,
3749 /* The check_relocs and adjust_dynamic_symbol entry points have
3750 determined the sizes of the various dynamic sections. Allocate
3754 for (s = dynobj->sections; s != NULL; s = s->next)
3758 if ((s->flags & SEC_LINKER_CREATED) == 0)
3761 /* It's OK to base decisions on the section name, because none
3762 of the dynobj section names depend upon the input files. */
3763 name = bfd_get_section_name (dynobj, s);
3765 if (strcmp (name, ".plt") == 0)
3767 /* Remember whether there is a PLT. */
3770 else if (strcmp (name, ".got.plt") == 0)
3772 /* The .got.plt contains the .got header as well as the
3773 actual .got.plt contents. The .got header may contain a
3774 R_CRIS_DTPMOD entry at index 3. */
3775 s->size += elf_cris_hash_table (info)->dtpmod_refcount != 0
3778 else if (CONST_STRNEQ (name, ".rela"))
3780 if (strcmp (name, ".rela.got") == 0
3781 && elf_cris_hash_table (info)->dtpmod_refcount != 0
3783 s->size += sizeof (Elf32_External_Rela);
3787 /* Remember whether there are any reloc sections other
3789 if (strcmp (name, ".rela.plt") != 0)
3792 /* We use the reloc_count field as a counter if we need
3793 to copy relocs into the output file. */
3797 else if (! CONST_STRNEQ (name, ".got")
3798 && strcmp (name, ".dynbss") != 0)
3800 /* It's not one of our sections, so don't allocate space. */
3806 /* If we don't need this section, strip it from the
3807 output file. This is mostly to handle .rela.bss and
3808 .rela.plt. We must create both sections in
3809 create_dynamic_sections, because they must be created
3810 before the linker maps input sections to output
3811 sections. The linker does that before
3812 adjust_dynamic_symbol is called, and it is that
3813 function which decides whether anything needs to go
3814 into these sections. */
3815 s->flags |= SEC_EXCLUDE;
3819 if ((s->flags & SEC_HAS_CONTENTS) == 0)
3822 /* Allocate memory for the section contents. We use bfd_zalloc here
3823 in case unused entries are not reclaimed before the section's
3824 contents are written out. This should not happen, but this way
3825 if it does, we will not write out garbage. For reloc sections,
3826 this will make entries have the type R_CRIS_NONE. */
3827 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
3828 if (s->contents == NULL)
3832 if (elf_hash_table (info)->dynamic_sections_created)
3834 /* Add some entries to the .dynamic section. We fill in the
3835 values later, in elf_cris_finish_dynamic_sections, but we
3836 must add the entries now so that we get the correct size for
3837 the .dynamic section. The DT_DEBUG entry is filled in by the
3838 dynamic linker and used by the debugger. */
3839 #define add_dynamic_entry(TAG, VAL) \
3840 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
3844 if (!add_dynamic_entry (DT_DEBUG, 0))
3850 if (!add_dynamic_entry (DT_PLTGOT, 0)
3851 || !add_dynamic_entry (DT_PLTRELSZ, 0)
3852 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
3853 || !add_dynamic_entry (DT_JMPREL, 0))
3859 if (!add_dynamic_entry (DT_RELA, 0)
3860 || !add_dynamic_entry (DT_RELASZ, 0)
3861 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
3865 if ((info->flags & DF_TEXTREL) != 0)
3867 if (!add_dynamic_entry (DT_TEXTREL, 0))
3869 info->flags |= DF_TEXTREL;
3872 #undef add_dynamic_entry
3877 /* This function is called via elf_cris_link_hash_traverse if we are
3878 creating a shared object. In the -Bsymbolic case, it discards the
3879 space allocated to copy PC relative relocs against symbols which
3880 are defined in regular objects. For the normal non-symbolic case,
3881 we also discard space for relocs that have become local due to
3882 symbol visibility changes. We allocated space for them in the
3883 check_relocs routine, but we won't fill them in in the
3884 relocate_section routine. */
3887 elf_cris_discard_excess_dso_dynamics (h, inf)
3888 struct elf_cris_link_hash_entry *h;
3891 struct elf_cris_pcrel_relocs_copied *s;
3892 struct bfd_link_info *info = (struct bfd_link_info *) inf;
3894 if (h->root.root.type == bfd_link_hash_warning)
3895 h = (struct elf_cris_link_hash_entry *) h->root.root.u.i.link;
3897 /* If a symbol has been forced local or we have found a regular
3898 definition for the symbolic link case, then we won't be needing
3900 if (h->root.def_regular
3901 && (h->root.forced_local
3904 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
3905 s->section->size -= s->count * sizeof (Elf32_External_Rela);
3910 /* If we have accounted for PC-relative relocs for read-only
3911 sections, now is the time to warn for them. We can't do it in
3912 cris_elf_check_relocs, because we don't know the status of all
3913 symbols at that time (and it's common to force symbols local
3916 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
3918 BFD_ASSERT ((s->section->flags & SEC_READONLY) != 0);
3920 /* FIXME: How do we make this optionally a warning only? */
3921 (*_bfd_error_handler)
3922 (_("%B, section `%A', to symbol `%s':\n"
3923 " relocation %s should not be used"
3924 " in a shared object; recompile with -fPIC"),
3927 h->root.root.root.string,
3928 cris_elf_howto_table[s->r_type].name);
3930 info->flags |= DF_TEXTREL;
3936 /* This function is called via elf_cris_link_hash_traverse if we are *not*
3937 creating a shared object. We discard space for relocs for symbols put
3938 in the .got, but which we found we do not have to resolve at run-time. */
3941 elf_cris_discard_excess_program_dynamics (h, inf)
3942 struct elf_cris_link_hash_entry *h;
3945 struct bfd_link_info *info = (struct bfd_link_info *) inf;
3947 if (h->root.root.type == bfd_link_hash_warning)
3948 h = (struct elf_cris_link_hash_entry *) h->root.root.u.i.link;
3950 /* If we're not creating a shared library and have a symbol which is
3951 referred to by .got references, but the symbol is defined locally,
3952 (or rather, not defined by a DSO) then lose the reloc for the .got
3953 (don't allocate room for it). Likewise for relocs for something
3954 for which we create a PLT. */
3955 if (!h->root.def_dynamic
3956 || h->root.plt.refcount > 0)
3958 if (h->reg_got_refcount > 0
3959 /* The size of this section is only valid and in sync with the
3960 various reference counts if we do dynamic; don't decrement it
3962 && elf_hash_table (info)->dynamic_sections_created)
3964 bfd *dynobj = elf_hash_table (info)->dynobj;
3967 BFD_ASSERT (dynobj != NULL);
3969 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
3971 BFD_ASSERT (srelgot != NULL);
3973 srelgot->size -= sizeof (Elf32_External_Rela);
3976 /* If the locally-defined symbol isn't used by a DSO, then we don't
3977 have to export it as a dynamic symbol. This was already done for
3978 functions; doing this for all symbols would presumably not
3979 introduce new problems. Of course we don't do this if we're
3980 exporting all dynamic symbols. */
3981 if (! info->export_dynamic
3982 && h->root.dynindx != -1
3983 && !h->root.def_dynamic
3984 && !h->root.ref_dynamic)
3986 h->root.dynindx = -1;
3987 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3988 h->root.dynstr_index);
3995 /* Reject a file depending on presence and expectation of prefixed
3996 underscores on symbols. */
3999 cris_elf_object_p (abfd)
4002 if (! cris_elf_set_mach_from_flags (abfd, elf_elfheader (abfd)->e_flags))
4005 if ((elf_elfheader (abfd)->e_flags & EF_CRIS_UNDERSCORE))
4006 return (bfd_get_symbol_leading_char (abfd) == '_');
4008 return (bfd_get_symbol_leading_char (abfd) == 0);
4011 /* Mark presence or absence of leading underscore. Set machine type
4012 flags from mach type. */
4015 cris_elf_final_write_processing (abfd, linker)
4017 bfd_boolean linker ATTRIBUTE_UNUSED;
4019 unsigned long e_flags = elf_elfheader (abfd)->e_flags;
4021 e_flags &= ~EF_CRIS_UNDERSCORE;
4022 if (bfd_get_symbol_leading_char (abfd) == '_')
4023 e_flags |= EF_CRIS_UNDERSCORE;
4025 switch (bfd_get_mach (abfd))
4027 case bfd_mach_cris_v0_v10:
4028 e_flags |= EF_CRIS_VARIANT_ANY_V0_V10;
4031 case bfd_mach_cris_v10_v32:
4032 e_flags |= EF_CRIS_VARIANT_COMMON_V10_V32;
4035 case bfd_mach_cris_v32:
4036 e_flags |= EF_CRIS_VARIANT_V32;
4040 _bfd_abort (__FILE__, __LINE__,
4041 _("Unexpected machine number"));
4044 elf_elfheader (abfd)->e_flags = e_flags;
4047 /* Set the mach type from e_flags value. */
4050 cris_elf_set_mach_from_flags (abfd, flags)
4052 unsigned long flags;
4054 switch (flags & EF_CRIS_VARIANT_MASK)
4056 case EF_CRIS_VARIANT_ANY_V0_V10:
4057 bfd_default_set_arch_mach (abfd, bfd_arch_cris, bfd_mach_cris_v0_v10);
4060 case EF_CRIS_VARIANT_V32:
4061 bfd_default_set_arch_mach (abfd, bfd_arch_cris, bfd_mach_cris_v32);
4064 case EF_CRIS_VARIANT_COMMON_V10_V32:
4065 bfd_default_set_arch_mach (abfd, bfd_arch_cris, bfd_mach_cris_v10_v32);
4069 /* Since we don't recognize them, we obviously can't support them
4070 with this code; we'd have to require that all future handling
4071 would be optional. */
4072 bfd_set_error (bfd_error_wrong_format);
4079 /* Display the flags field. */
4082 cris_elf_print_private_bfd_data (abfd, ptr)
4086 FILE *file = (FILE *) ptr;
4088 BFD_ASSERT (abfd != NULL && ptr != NULL);
4090 _bfd_elf_print_private_bfd_data (abfd, ptr);
4092 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
4094 if (elf_elfheader (abfd)->e_flags & EF_CRIS_UNDERSCORE)
4095 fprintf (file, _(" [symbols have a _ prefix]"));
4096 if ((elf_elfheader (abfd)->e_flags & EF_CRIS_VARIANT_MASK)
4097 == EF_CRIS_VARIANT_COMMON_V10_V32)
4098 fprintf (file, _(" [v10 and v32]"));
4099 if ((elf_elfheader (abfd)->e_flags & EF_CRIS_VARIANT_MASK)
4100 == EF_CRIS_VARIANT_V32)
4101 fprintf (file, _(" [v32]"));
4107 /* Don't mix files with and without a leading underscore. */
4110 cris_elf_merge_private_bfd_data (ibfd, obfd)
4116 if (! _bfd_generic_verify_endian_match (ibfd, obfd))
4119 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
4120 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
4123 imach = bfd_get_mach (ibfd);
4125 if (! elf_flags_init (obfd))
4127 /* This happens when ld starts out with a 'blank' output file. */
4128 elf_flags_init (obfd) = TRUE;
4130 /* We ignore the linker-set mach, and instead set it according to
4131 the first input file. This would also happen if we could
4132 somehow filter out the OUTPUT_ARCH () setting from elf.sc.
4133 This allows us to keep the same linker config across
4134 cris(v0..v10) and crisv32. The drawback is that we can't force
4135 the output type, which might be a sane thing to do for a
4136 v10+v32 compatibility object. */
4137 if (! bfd_set_arch_mach (obfd, bfd_arch_cris, imach))
4141 if (bfd_get_symbol_leading_char (ibfd)
4142 != bfd_get_symbol_leading_char (obfd))
4144 (*_bfd_error_handler)
4145 (bfd_get_symbol_leading_char (ibfd) == '_'
4146 ? _("%B: uses _-prefixed symbols, but writing file with non-prefixed symbols")
4147 : _("%B: uses non-prefixed symbols, but writing file with _-prefixed symbols"),
4149 bfd_set_error (bfd_error_bad_value);
4153 omach = bfd_get_mach (obfd);
4157 /* We can get an incompatible combination only if either is
4158 bfd_mach_cris_v32, and the other one isn't compatible. */
4159 if ((imach == bfd_mach_cris_v32
4160 && omach != bfd_mach_cris_v10_v32)
4161 || (omach == bfd_mach_cris_v32
4162 && imach != bfd_mach_cris_v10_v32))
4164 (*_bfd_error_handler)
4165 ((imach == bfd_mach_cris_v32)
4166 ? _("%B contains CRIS v32 code, incompatible"
4167 " with previous objects")
4168 : _("%B contains non-CRIS-v32 code, incompatible"
4169 " with previous objects"),
4171 bfd_set_error (bfd_error_bad_value);
4175 /* We don't have to check the case where the input is compatible
4176 with v10 and v32, because the output is already known to be set
4177 to the other (compatible) mach. */
4178 if (omach == bfd_mach_cris_v10_v32
4179 && ! bfd_set_arch_mach (obfd, bfd_arch_cris, imach))
4186 /* Do side-effects of e_flags copying to obfd. */
4189 cris_elf_copy_private_bfd_data (ibfd, obfd)
4193 /* Call the base function. */
4194 if (!_bfd_elf_copy_private_bfd_data (ibfd, obfd))
4197 /* If output is big-endian for some obscure reason, stop here. */
4198 if (_bfd_generic_verify_endian_match (ibfd, obfd) == FALSE)
4201 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
4202 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
4205 /* Do what we really came here for. */
4206 return bfd_set_arch_mach (obfd, bfd_arch_cris, bfd_get_mach (ibfd));
4209 static enum elf_reloc_type_class
4210 elf_cris_reloc_type_class (rela)
4211 const Elf_Internal_Rela *rela;
4213 enum elf_cris_reloc_type r_type = ELF32_R_TYPE (rela->r_info);
4216 case R_CRIS_RELATIVE:
4217 return reloc_class_relative;
4218 case R_CRIS_JUMP_SLOT:
4219 return reloc_class_plt;
4221 return reloc_class_copy;
4223 return reloc_class_normal;
4227 /* The elf_backend_got_elt_size worker. For one symbol, we can have up to
4228 two GOT entries from three types with two different sizes. We handle
4229 it as a single entry, so we can use the regular offset-calculation
4233 elf_cris_got_elt_size (bfd *abfd ATTRIBUTE_UNUSED,
4234 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4235 struct elf_link_hash_entry *hr,
4237 unsigned long symndx)
4239 struct elf_link_hash_entry *h = (struct elf_link_hash_entry *) hr;
4242 /* We may have one regular GOT entry or up to two TLS GOT
4246 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
4247 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (ibfd);
4249 BFD_ASSERT (local_got_refcounts != NULL);
4251 if (local_got_refcounts[LGOT_REG_NDX (symndx)] > 0)
4253 /* We can't have a variable referred to both as a regular
4254 variable and through TLS relocs. */
4255 BFD_ASSERT (local_got_refcounts[LGOT_DTP_NDX (symndx)] == 0
4256 && local_got_refcounts[LGOT_TPREL_NDX (symndx)] == 0);
4260 if (local_got_refcounts[LGOT_DTP_NDX (symndx)] > 0)
4263 if (local_got_refcounts[LGOT_TPREL_NDX (symndx)] > 0)
4268 struct elf_cris_link_hash_entry *hh = elf_cris_hash_entry (h);
4269 if (hh->reg_got_refcount > 0)
4271 /* The actual error-on-input is emitted elsewhere. */
4272 BFD_ASSERT (hh->dtp_refcount == 0 && hh->tprel_refcount == 0);
4276 if (hh->dtp_refcount > 0)
4279 if (hh->tprel_refcount > 0)
4283 /* We're only called when h->got.refcount is non-zero, so we must
4284 have a non-zero size. */
4285 BFD_ASSERT (eltsiz != 0);
4289 #define ELF_ARCH bfd_arch_cris
4290 #define ELF_MACHINE_CODE EM_CRIS
4291 #define ELF_MAXPAGESIZE 0x2000
4293 #define TARGET_LITTLE_SYM bfd_elf32_cris_vec
4294 #define TARGET_LITTLE_NAME "elf32-cris"
4295 #define elf_symbol_leading_char 0
4297 #define elf_info_to_howto_rel NULL
4298 #define elf_info_to_howto cris_info_to_howto_rela
4299 #define elf_backend_relocate_section cris_elf_relocate_section
4300 #define elf_backend_gc_mark_hook cris_elf_gc_mark_hook
4301 #define elf_backend_gc_sweep_hook cris_elf_gc_sweep_hook
4302 #define elf_backend_check_relocs cris_elf_check_relocs
4303 #define elf_backend_grok_prstatus cris_elf_grok_prstatus
4304 #define elf_backend_grok_psinfo cris_elf_grok_psinfo
4306 #define elf_backend_can_gc_sections 1
4307 #define elf_backend_can_refcount 1
4309 #define elf_backend_object_p cris_elf_object_p
4310 #define elf_backend_final_write_processing \
4311 cris_elf_final_write_processing
4312 #define bfd_elf32_bfd_print_private_bfd_data \
4313 cris_elf_print_private_bfd_data
4314 #define bfd_elf32_bfd_merge_private_bfd_data \
4315 cris_elf_merge_private_bfd_data
4316 #define bfd_elf32_bfd_copy_private_bfd_data \
4317 cris_elf_copy_private_bfd_data
4319 #define bfd_elf32_bfd_reloc_type_lookup cris_reloc_type_lookup
4320 #define bfd_elf32_bfd_reloc_name_lookup cris_reloc_name_lookup
4322 #define bfd_elf32_bfd_link_hash_table_create \
4323 elf_cris_link_hash_table_create
4324 #define elf_backend_adjust_dynamic_symbol \
4325 elf_cris_adjust_dynamic_symbol
4326 #define elf_backend_copy_indirect_symbol \
4327 elf_cris_copy_indirect_symbol
4328 #define elf_backend_size_dynamic_sections \
4329 elf_cris_size_dynamic_sections
4330 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
4331 #define elf_backend_finish_dynamic_symbol \
4332 elf_cris_finish_dynamic_symbol
4333 #define elf_backend_finish_dynamic_sections \
4334 elf_cris_finish_dynamic_sections
4335 #define elf_backend_create_dynamic_sections \
4336 _bfd_elf_create_dynamic_sections
4337 #define bfd_elf32_bfd_final_link \
4338 bfd_elf_gc_common_final_link
4339 #define elf_backend_hide_symbol elf_cris_hide_symbol
4340 #define elf_backend_reloc_type_class elf_cris_reloc_type_class
4342 #define elf_backend_want_got_plt 1
4343 #define elf_backend_plt_readonly 1
4344 #define elf_backend_want_plt_sym 0
4345 #define elf_backend_got_header_size 12
4346 #define elf_backend_got_elt_size elf_cris_got_elt_size
4348 /* Later, we my want to optimize RELA entries into REL entries for dynamic
4349 linking and libraries (if it's a win of any significance). Until then,
4350 take the easy route. */
4351 #define elf_backend_may_use_rel_p 0
4352 #define elf_backend_may_use_rela_p 1
4353 #define elf_backend_rela_normal 1
4355 #include "elf32-target.h"
4357 #undef TARGET_LITTLE_SYM
4358 #undef TARGET_LITTLE_NAME
4359 #undef elf_symbol_leading_char
4361 #define TARGET_LITTLE_SYM bfd_elf32_us_cris_vec
4362 #define TARGET_LITTLE_NAME "elf32-us-cris"
4363 #define elf_symbol_leading_char '_'
4365 #define elf32_bed elf32_us_cris_bed
4367 #include "elf32-target.h"