1 /* FRV-specific support for 32-bit ELF.
2 Copyright (C) 2002-2023 Free Software Foundation, Inc.
4 This file is part of BFD, the Binary File Descriptor library.
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
19 MA 02110-1301, USA. */
28 #include "libiberty.h"
30 /* Forward declarations. */
33 static reloc_howto_type elf32_frv_howto_table
[] =
35 /* This reloc does nothing. */
36 HOWTO (R_FRV_NONE
, /* type */
40 false, /* pc_relative */
42 complain_overflow_dont
, /* complain_on_overflow */
43 bfd_elf_generic_reloc
, /* special_function */
44 "R_FRV_NONE", /* name */
45 false, /* partial_inplace */
48 false), /* pcrel_offset */
50 /* A 32 bit absolute relocation. */
51 HOWTO (R_FRV_32
, /* type */
55 false, /* pc_relative */
57 complain_overflow_bitfield
, /* complain_on_overflow */
58 bfd_elf_generic_reloc
, /* special_function */
59 "R_FRV_32", /* name */
60 false, /* partial_inplace */
61 0xffffffff, /* src_mask */
62 0xffffffff, /* dst_mask */
63 false), /* pcrel_offset */
65 /* A 16 bit pc-relative relocation. */
66 HOWTO (R_FRV_LABEL16
, /* type */
70 true, /* pc_relative */
72 complain_overflow_signed
, /* complain_on_overflow */
73 bfd_elf_generic_reloc
, /* special_function */
74 "R_FRV_LABEL16", /* name */
75 false, /* partial_inplace */
76 0xffff, /* src_mask */
77 0xffff, /* dst_mask */
78 true), /* pcrel_offset */
80 /* A 24-bit pc-relative relocation. */
81 HOWTO (R_FRV_LABEL24
, /* type */
85 true, /* pc_relative */
87 complain_overflow_bitfield
, /* complain_on_overflow */
88 bfd_elf_generic_reloc
, /* special_function */
89 "R_FRV_LABEL24", /* name */
90 false, /* partial_inplace */
91 0x7e03ffff, /* src_mask */
92 0x7e03ffff, /* dst_mask */
93 true), /* pcrel_offset */
95 HOWTO (R_FRV_LO16
, /* type */
99 false, /* pc_relative */
101 complain_overflow_dont
, /* complain_on_overflow */
102 bfd_elf_generic_reloc
, /* special_function */
103 "R_FRV_LO16", /* name */
104 false, /* partial_inplace */
105 0xffff, /* src_mask */
106 0xffff, /* dst_mask */
107 false), /* pcrel_offset */
109 HOWTO (R_FRV_HI16
, /* type */
113 false, /* pc_relative */
115 complain_overflow_dont
, /* complain_on_overflow */
116 bfd_elf_generic_reloc
, /* special_function */
117 "R_FRV_HI16", /* name */
118 false, /* partial_inplace */
119 0xffff, /* src_mask */
120 0xffff, /* dst_mask */
121 false), /* pcrel_offset */
123 HOWTO (R_FRV_GPREL12
, /* type */
127 false, /* pc_relative */
129 complain_overflow_dont
, /* complain_on_overflow */
130 bfd_elf_generic_reloc
, /* special_function */
131 "R_FRV_GPREL12", /* name */
132 false, /* partial_inplace */
133 0xfff, /* src_mask */
134 0xfff, /* dst_mask */
135 false), /* pcrel_offset */
137 HOWTO (R_FRV_GPRELU12
, /* type */
141 false, /* pc_relative */
143 complain_overflow_dont
, /* complain_on_overflow */
144 bfd_elf_generic_reloc
, /* special_function */
145 "R_FRV_GPRELU12", /* name */
146 false, /* partial_inplace */
147 0xfff, /* src_mask */
148 0x3f03f, /* dst_mask */
149 false), /* pcrel_offset */
151 HOWTO (R_FRV_GPREL32
, /* type */
155 false, /* pc_relative */
157 complain_overflow_dont
, /* complain_on_overflow */
158 bfd_elf_generic_reloc
, /* special_function */
159 "R_FRV_GPREL32", /* name */
160 false, /* partial_inplace */
161 0xffffffff, /* src_mask */
162 0xffffffff, /* dst_mask */
163 false), /* pcrel_offset */
165 HOWTO (R_FRV_GPRELHI
, /* type */
169 false, /* pc_relative */
171 complain_overflow_dont
, /* complain_on_overflow */
172 bfd_elf_generic_reloc
, /* special_function */
173 "R_FRV_GPRELHI", /* name */
174 false, /* partial_inplace */
175 0xffff, /* src_mask */
176 0xffff, /* dst_mask */
177 false), /* pcrel_offset */
179 HOWTO (R_FRV_GPRELLO
, /* type */
183 false, /* pc_relative */
185 complain_overflow_dont
, /* complain_on_overflow */
186 bfd_elf_generic_reloc
, /* special_function */
187 "R_FRV_GPRELLO", /* name */
188 false, /* partial_inplace */
189 0xffff, /* src_mask */
190 0xffff, /* dst_mask */
191 false), /* pcrel_offset */
193 /* A 12-bit signed operand with the GOT offset for the address of
195 HOWTO (R_FRV_GOT12
, /* type */
199 false, /* pc_relative */
201 complain_overflow_signed
, /* complain_on_overflow */
202 bfd_elf_generic_reloc
, /* special_function */
203 "R_FRV_GOT12", /* name */
204 false, /* partial_inplace */
205 0xfff, /* src_mask */
206 0xfff, /* dst_mask */
207 false), /* pcrel_offset */
209 /* The upper 16 bits of the GOT offset for the address of the
211 HOWTO (R_FRV_GOTHI
, /* type */
215 false, /* pc_relative */
217 complain_overflow_dont
, /* complain_on_overflow */
218 bfd_elf_generic_reloc
, /* special_function */
219 "R_FRV_GOTHI", /* name */
220 false, /* partial_inplace */
221 0xffff, /* src_mask */
222 0xffff, /* dst_mask */
223 false), /* pcrel_offset */
225 /* The lower 16 bits of the GOT offset for the address of the
227 HOWTO (R_FRV_GOTLO
, /* type */
231 false, /* pc_relative */
233 complain_overflow_dont
, /* complain_on_overflow */
234 bfd_elf_generic_reloc
, /* special_function */
235 "R_FRV_GOTLO", /* name */
236 false, /* partial_inplace */
237 0xffff, /* src_mask */
238 0xffff, /* dst_mask */
239 false), /* pcrel_offset */
241 /* The 32-bit address of the canonical descriptor of a function. */
242 HOWTO (R_FRV_FUNCDESC
, /* type */
246 false, /* pc_relative */
248 complain_overflow_bitfield
, /* complain_on_overflow */
249 bfd_elf_generic_reloc
, /* special_function */
250 "R_FRV_FUNCDESC", /* name */
251 false, /* partial_inplace */
252 0xffffffff, /* src_mask */
253 0xffffffff, /* dst_mask */
254 false), /* pcrel_offset */
256 /* A 12-bit signed operand with the GOT offset for the address of
257 canonical descriptor of a function. */
258 HOWTO (R_FRV_FUNCDESC_GOT12
, /* type */
262 false, /* pc_relative */
264 complain_overflow_signed
, /* complain_on_overflow */
265 bfd_elf_generic_reloc
, /* special_function */
266 "R_FRV_FUNCDESC_GOT12", /* name */
267 false, /* partial_inplace */
268 0xfff, /* src_mask */
269 0xfff, /* dst_mask */
270 false), /* pcrel_offset */
272 /* The upper 16 bits of the GOT offset for the address of the
273 canonical descriptor of a function. */
274 HOWTO (R_FRV_FUNCDESC_GOTHI
, /* type */
278 false, /* pc_relative */
280 complain_overflow_dont
, /* complain_on_overflow */
281 bfd_elf_generic_reloc
, /* special_function */
282 "R_FRV_FUNCDESC_GOTHI", /* name */
283 false, /* partial_inplace */
284 0xffff, /* src_mask */
285 0xffff, /* dst_mask */
286 false), /* pcrel_offset */
288 /* The lower 16 bits of the GOT offset for the address of the
289 canonical descriptor of a function. */
290 HOWTO (R_FRV_FUNCDESC_GOTLO
, /* type */
294 false, /* pc_relative */
296 complain_overflow_dont
, /* complain_on_overflow */
297 bfd_elf_generic_reloc
, /* special_function */
298 "R_FRV_FUNCDESC_GOTLO", /* name */
299 false, /* partial_inplace */
300 0xffff, /* src_mask */
301 0xffff, /* dst_mask */
302 false), /* pcrel_offset */
304 /* The 64-bit descriptor of a function. */
305 HOWTO (R_FRV_FUNCDESC_VALUE
, /* type */
309 false, /* pc_relative */
311 complain_overflow_bitfield
, /* complain_on_overflow */
312 bfd_elf_generic_reloc
, /* special_function */
313 "R_FRV_FUNCDESC_VALUE", /* name */
314 false, /* partial_inplace */
315 0xffffffff, /* src_mask */
316 0xffffffff, /* dst_mask */
317 false), /* pcrel_offset */
319 /* A 12-bit signed operand with the GOT offset for the address of
320 canonical descriptor of a function. */
321 HOWTO (R_FRV_FUNCDESC_GOTOFF12
, /* type */
325 false, /* pc_relative */
327 complain_overflow_signed
, /* complain_on_overflow */
328 bfd_elf_generic_reloc
, /* special_function */
329 "R_FRV_FUNCDESC_GOTOFF12", /* name */
330 false, /* partial_inplace */
331 0xfff, /* src_mask */
332 0xfff, /* dst_mask */
333 false), /* pcrel_offset */
335 /* The upper 16 bits of the GOT offset for the address of the
336 canonical descriptor of a function. */
337 HOWTO (R_FRV_FUNCDESC_GOTOFFHI
, /* type */
341 false, /* pc_relative */
343 complain_overflow_dont
, /* complain_on_overflow */
344 bfd_elf_generic_reloc
, /* special_function */
345 "R_FRV_FUNCDESC_GOTOFFHI", /* name */
346 false, /* partial_inplace */
347 0xffff, /* src_mask */
348 0xffff, /* dst_mask */
349 false), /* pcrel_offset */
351 /* The lower 16 bits of the GOT offset for the address of the
352 canonical descriptor of a function. */
353 HOWTO (R_FRV_FUNCDESC_GOTOFFLO
, /* type */
357 false, /* pc_relative */
359 complain_overflow_dont
, /* complain_on_overflow */
360 bfd_elf_generic_reloc
, /* special_function */
361 "R_FRV_FUNCDESC_GOTOFFLO", /* name */
362 false, /* partial_inplace */
363 0xffff, /* src_mask */
364 0xffff, /* dst_mask */
365 false), /* pcrel_offset */
367 /* A 12-bit signed operand with the GOT offset for the address of
369 HOWTO (R_FRV_GOTOFF12
, /* type */
373 false, /* pc_relative */
375 complain_overflow_signed
, /* complain_on_overflow */
376 bfd_elf_generic_reloc
, /* special_function */
377 "R_FRV_GOTOFF12", /* name */
378 false, /* partial_inplace */
379 0xfff, /* src_mask */
380 0xfff, /* dst_mask */
381 false), /* pcrel_offset */
383 /* The upper 16 bits of the GOT offset for the address of the
385 HOWTO (R_FRV_GOTOFFHI
, /* type */
389 false, /* pc_relative */
391 complain_overflow_dont
, /* complain_on_overflow */
392 bfd_elf_generic_reloc
, /* special_function */
393 "R_FRV_GOTOFFHI", /* name */
394 false, /* partial_inplace */
395 0xffff, /* src_mask */
396 0xffff, /* dst_mask */
397 false), /* pcrel_offset */
399 /* The lower 16 bits of the GOT offset for the address of the
401 HOWTO (R_FRV_GOTOFFLO
, /* type */
405 false, /* pc_relative */
407 complain_overflow_dont
, /* complain_on_overflow */
408 bfd_elf_generic_reloc
, /* special_function */
409 "R_FRV_GOTOFFLO", /* name */
410 false, /* partial_inplace */
411 0xffff, /* src_mask */
412 0xffff, /* dst_mask */
413 false), /* pcrel_offset */
415 /* A 24-bit pc-relative relocation referencing the TLS PLT entry for
416 a thread-local symbol. If the symbol number is 0, it refers to
418 HOWTO (R_FRV_GETTLSOFF
, /* type */
422 true, /* pc_relative */
424 complain_overflow_bitfield
, /* complain_on_overflow */
425 bfd_elf_generic_reloc
, /* special_function */
426 "R_FRV_GETTLSOFF", /* name */
427 false, /* partial_inplace */
428 0x7e03ffff, /* src_mask */
429 0x7e03ffff, /* dst_mask */
430 true), /* pcrel_offset */
432 /* A 64-bit TLS descriptor for a symbol. This relocation is only
433 valid as a REL, dynamic relocation. */
434 HOWTO (R_FRV_TLSDESC_VALUE
, /* type */
438 false, /* pc_relative */
440 complain_overflow_bitfield
, /* complain_on_overflow */
441 bfd_elf_generic_reloc
, /* special_function */
442 "R_FRV_TLSDESC_VALUE", /* name */
443 false, /* partial_inplace */
444 0xffffffff, /* src_mask */
445 0xffffffff, /* dst_mask */
446 false), /* pcrel_offset */
448 /* A 12-bit signed operand with the GOT offset for the TLS
449 descriptor of the symbol. */
450 HOWTO (R_FRV_GOTTLSDESC12
, /* type */
454 false, /* pc_relative */
456 complain_overflow_signed
, /* complain_on_overflow */
457 bfd_elf_generic_reloc
, /* special_function */
458 "R_FRV_GOTTLSDESC12", /* name */
459 false, /* partial_inplace */
460 0xfff, /* src_mask */
461 0xfff, /* dst_mask */
462 false), /* pcrel_offset */
464 /* The upper 16 bits of the GOT offset for the TLS descriptor of the
466 HOWTO (R_FRV_GOTTLSDESCHI
, /* type */
470 false, /* pc_relative */
472 complain_overflow_dont
, /* complain_on_overflow */
473 bfd_elf_generic_reloc
, /* special_function */
474 "R_FRV_GOTTLSDESCHI", /* name */
475 false, /* partial_inplace */
476 0xffff, /* src_mask */
477 0xffff, /* dst_mask */
478 false), /* pcrel_offset */
480 /* The lower 16 bits of the GOT offset for the TLS descriptor of the
482 HOWTO (R_FRV_GOTTLSDESCLO
, /* type */
486 false, /* pc_relative */
488 complain_overflow_dont
, /* complain_on_overflow */
489 bfd_elf_generic_reloc
, /* special_function */
490 "R_FRV_GOTTLSDESCLO", /* name */
491 false, /* partial_inplace */
492 0xffff, /* src_mask */
493 0xffff, /* dst_mask */
494 false), /* pcrel_offset */
496 /* A 12-bit signed operand with the offset from the module base
497 address to the thread-local symbol address. */
498 HOWTO (R_FRV_TLSMOFF12
, /* type */
502 false, /* pc_relative */
504 complain_overflow_signed
, /* complain_on_overflow */
505 bfd_elf_generic_reloc
, /* special_function */
506 "R_FRV_TLSMOFF12", /* name */
507 false, /* partial_inplace */
508 0xfff, /* src_mask */
509 0xfff, /* dst_mask */
510 false), /* pcrel_offset */
512 /* The upper 16 bits of the offset from the module base address to
513 the thread-local symbol address. */
514 HOWTO (R_FRV_TLSMOFFHI
, /* type */
518 false, /* pc_relative */
520 complain_overflow_dont
, /* complain_on_overflow */
521 bfd_elf_generic_reloc
, /* special_function */
522 "R_FRV_TLSMOFFHI", /* name */
523 false, /* partial_inplace */
524 0xffff, /* src_mask */
525 0xffff, /* dst_mask */
526 false), /* pcrel_offset */
528 /* The lower 16 bits of the offset from the module base address to
529 the thread-local symbol address. */
530 HOWTO (R_FRV_TLSMOFFLO
, /* type */
534 false, /* pc_relative */
536 complain_overflow_dont
, /* complain_on_overflow */
537 bfd_elf_generic_reloc
, /* special_function */
538 "R_FRV_TLSMOFFLO", /* name */
539 false, /* partial_inplace */
540 0xffff, /* src_mask */
541 0xffff, /* dst_mask */
542 false), /* pcrel_offset */
544 /* A 12-bit signed operand with the GOT offset for the TLSOFF entry
546 HOWTO (R_FRV_GOTTLSOFF12
, /* type */
550 false, /* pc_relative */
552 complain_overflow_signed
, /* complain_on_overflow */
553 bfd_elf_generic_reloc
, /* special_function */
554 "R_FRV_GOTTLSOFF12", /* name */
555 false, /* partial_inplace */
556 0xfff, /* src_mask */
557 0xfff, /* dst_mask */
558 false), /* pcrel_offset */
560 /* The upper 16 bits of the GOT offset for the TLSOFF entry for a
562 HOWTO (R_FRV_GOTTLSOFFHI
, /* type */
566 false, /* pc_relative */
568 complain_overflow_dont
, /* complain_on_overflow */
569 bfd_elf_generic_reloc
, /* special_function */
570 "R_FRV_GOTTLSOFFHI", /* name */
571 false, /* partial_inplace */
572 0xffff, /* src_mask */
573 0xffff, /* dst_mask */
574 false), /* pcrel_offset */
576 /* The lower 16 bits of the GOT offset for the TLSOFF entry for a
578 HOWTO (R_FRV_GOTTLSOFFLO
, /* type */
582 false, /* pc_relative */
584 complain_overflow_dont
, /* complain_on_overflow */
585 bfd_elf_generic_reloc
, /* special_function */
586 "R_FRV_GOTTLSOFFLO", /* name */
587 false, /* partial_inplace */
588 0xffff, /* src_mask */
589 0xffff, /* dst_mask */
590 false), /* pcrel_offset */
592 /* The 32-bit offset from the thread pointer (not the module base
593 address) to a thread-local symbol. */
594 HOWTO (R_FRV_TLSOFF
, /* type */
598 false, /* pc_relative */
600 complain_overflow_dont
, /* complain_on_overflow */
601 bfd_elf_generic_reloc
, /* special_function */
602 "R_FRV_TLSOFF", /* name */
603 false, /* partial_inplace */
604 0xffffffff, /* src_mask */
605 0xffffffff, /* dst_mask */
606 false), /* pcrel_offset */
608 /* An annotation for linker relaxation, that denotes the
609 symbol+addend whose TLS descriptor is referenced by the sum of
610 the two input registers of an ldd instruction. */
611 HOWTO (R_FRV_TLSDESC_RELAX
, /* type */
615 false, /* pc_relative */
617 complain_overflow_dont
, /* complain_on_overflow */
618 bfd_elf_generic_reloc
, /* special_function */
619 "R_FRV_TLSDESC_RELAX", /* name */
620 false, /* partial_inplace */
623 false), /* pcrel_offset */
625 /* An annotation for linker relaxation, that denotes the
626 symbol+addend whose TLS resolver entry point is given by the sum
627 of the two register operands of an calll instruction. */
628 HOWTO (R_FRV_GETTLSOFF_RELAX
, /* type */
632 false, /* pc_relative */
634 complain_overflow_dont
, /* complain_on_overflow */
635 bfd_elf_generic_reloc
, /* special_function */
636 "R_FRV_GETTLSOFF_RELAX", /* name */
637 false, /* partial_inplace */
640 false), /* pcrel_offset */
642 /* An annotation for linker relaxation, that denotes the
643 symbol+addend whose TLS offset GOT entry is given by the sum of
644 the two input registers of an ld instruction. */
645 HOWTO (R_FRV_TLSOFF_RELAX
, /* type */
649 false, /* pc_relative */
651 complain_overflow_bitfield
, /* complain_on_overflow */
652 bfd_elf_generic_reloc
, /* special_function */
653 "R_FRV_TLSOFF_RELAX", /* name */
654 false, /* partial_inplace */
657 false), /* pcrel_offset */
659 /* A 32-bit offset from the module base address to
660 the thread-local symbol address. */
661 HOWTO (R_FRV_TLSMOFF
, /* type */
665 false, /* pc_relative */
667 complain_overflow_dont
, /* complain_on_overflow */
668 bfd_elf_generic_reloc
, /* special_function */
669 "R_FRV_TLSMOFF", /* name */
670 false, /* partial_inplace */
671 0xffffffff, /* src_mask */
672 0xffffffff, /* dst_mask */
673 false), /* pcrel_offset */
676 /* GNU extension to record C++ vtable hierarchy. */
677 static reloc_howto_type elf32_frv_vtinherit_howto
=
678 HOWTO (R_FRV_GNU_VTINHERIT
, /* type */
682 false, /* pc_relative */
684 complain_overflow_dont
, /* complain_on_overflow */
685 NULL
, /* special_function */
686 "R_FRV_GNU_VTINHERIT", /* name */
687 false, /* partial_inplace */
690 false); /* pcrel_offset */
692 /* GNU extension to record C++ vtable member usage. */
693 static reloc_howto_type elf32_frv_vtentry_howto
=
694 HOWTO (R_FRV_GNU_VTENTRY
, /* type */
698 false, /* pc_relative */
700 complain_overflow_dont
, /* complain_on_overflow */
701 _bfd_elf_rel_vtable_reloc_fn
, /* special_function */
702 "R_FRV_GNU_VTENTRY", /* name */
703 false, /* partial_inplace */
706 false); /* pcrel_offset */
708 /* The following 3 relocations are REL. The only difference to the
709 entries in the table above are that partial_inplace is true. */
710 static reloc_howto_type elf32_frv_rel_32_howto
=
711 HOWTO (R_FRV_32
, /* type */
715 false, /* pc_relative */
717 complain_overflow_bitfield
, /* complain_on_overflow */
718 bfd_elf_generic_reloc
, /* special_function */
719 "R_FRV_32", /* name */
720 true, /* partial_inplace */
721 0xffffffff, /* src_mask */
722 0xffffffff, /* dst_mask */
723 false); /* pcrel_offset */
725 static reloc_howto_type elf32_frv_rel_funcdesc_howto
=
726 HOWTO (R_FRV_FUNCDESC
, /* type */
730 false, /* pc_relative */
732 complain_overflow_bitfield
, /* complain_on_overflow */
733 bfd_elf_generic_reloc
, /* special_function */
734 "R_FRV_FUNCDESC", /* name */
735 true, /* partial_inplace */
736 0xffffffff, /* src_mask */
737 0xffffffff, /* dst_mask */
738 false); /* pcrel_offset */
740 static reloc_howto_type elf32_frv_rel_funcdesc_value_howto
=
741 HOWTO (R_FRV_FUNCDESC_VALUE
, /* type */
745 false, /* pc_relative */
747 complain_overflow_bitfield
, /* complain_on_overflow */
748 bfd_elf_generic_reloc
, /* special_function */
749 "R_FRV_FUNCDESC_VALUE", /* name */
750 true, /* partial_inplace */
751 0xffffffff, /* src_mask */
752 0xffffffff, /* dst_mask */
753 false); /* pcrel_offset */
755 static reloc_howto_type elf32_frv_rel_tlsdesc_value_howto
=
756 /* A 64-bit TLS descriptor for a symbol. The first word resolves to
757 an entry point, and the second resolves to a special argument.
758 If the symbol turns out to be in static TLS, the entry point is a
759 return instruction, and the special argument is the TLS offset
760 for the symbol. If it's in dynamic TLS, the entry point is a TLS
761 offset resolver, and the special argument is a pointer to a data
762 structure allocated by the dynamic loader, containing the GOT
763 address for the offset resolver, the module id, the offset within
764 the module, and anything else the TLS offset resolver might need
765 to determine the TLS offset for the symbol in the running
767 HOWTO (R_FRV_TLSDESC_VALUE
, /* type */
771 false, /* pc_relative */
773 complain_overflow_bitfield
, /* complain_on_overflow */
774 bfd_elf_generic_reloc
, /* special_function */
775 "R_FRV_TLSDESC_VALUE", /* name */
776 true, /* partial_inplace */
777 0xffffffff, /* src_mask */
778 0xffffffff, /* dst_mask */
779 false); /* pcrel_offset */
781 static reloc_howto_type elf32_frv_rel_tlsoff_howto
=
782 /* The 32-bit offset from the thread pointer (not the module base
783 address) to a thread-local symbol. */
784 HOWTO (R_FRV_TLSOFF
, /* type */
788 false, /* pc_relative */
790 complain_overflow_bitfield
, /* complain_on_overflow */
791 bfd_elf_generic_reloc
, /* special_function */
792 "R_FRV_TLSOFF", /* name */
793 true, /* partial_inplace */
794 0xffffffff, /* src_mask */
795 0xffffffff, /* dst_mask */
796 false); /* pcrel_offset */
800 extern const bfd_target frv_elf32_fdpic_vec
;
801 #define IS_FDPIC(bfd) ((bfd)->xvec == &frv_elf32_fdpic_vec)
803 /* An extension of the elf hash table data structure, containing some
804 additional FRV-specific data. */
805 struct frvfdpic_elf_link_hash_table
807 struct elf_link_hash_table elf
;
809 /* A pointer to the .rofixup section. */
811 /* GOT base offset. */
813 /* Location of the first non-lazy PLT entry, i.e., the number of
814 bytes taken by lazy PLT entries. If locally-bound TLS
815 descriptors require a ret instruction, it will be placed at this
818 /* A hash table holding information about which symbols were
819 referenced with which PIC-related relocations. */
820 struct htab
*relocs_info
;
821 /* Summary reloc information collected by
822 _frvfdpic_count_got_plt_entries. */
823 struct _frvfdpic_dynamic_got_info
*g
;
826 /* Get the FRV ELF linker hash table from a link_info structure. */
828 #define frvfdpic_hash_table(p) \
829 ((is_elf_hash_table ((p)->hash) \
830 && elf_hash_table_id (elf_hash_table (p)) == FRV_ELF_DATA) \
831 ? (struct frvfdpic_elf_link_hash_table *) (p)->hash : NULL)
833 #define frvfdpic_got_section(info) \
834 (frvfdpic_hash_table (info)->elf.sgot)
835 #define frvfdpic_gotrel_section(info) \
836 (frvfdpic_hash_table (info)->elf.srelgot)
837 #define frvfdpic_gotfixup_section(info) \
838 (frvfdpic_hash_table (info)->sgotfixup)
839 #define frvfdpic_plt_section(info) \
840 (frvfdpic_hash_table (info)->elf.splt)
841 #define frvfdpic_pltrel_section(info) \
842 (frvfdpic_hash_table (info)->elf.srelplt)
843 #define frvfdpic_relocs_info(info) \
844 (frvfdpic_hash_table (info)->relocs_info)
845 #define frvfdpic_got_initial_offset(info) \
846 (frvfdpic_hash_table (info)->got0)
847 #define frvfdpic_plt_initial_offset(info) \
848 (frvfdpic_hash_table (info)->plt0)
849 #define frvfdpic_dynamic_got_plt_info(info) \
850 (frvfdpic_hash_table (info)->g)
852 /* Currently it's the same, but if some day we have a reason to change
853 it, we'd better be using a different macro.
855 FIXME: if there's any TLS PLT entry that uses local-exec or
856 initial-exec models, we could use the ret at the end of any of them
857 instead of adding one more. */
858 #define frvfdpic_plt_tls_ret_offset(info) \
859 (frvfdpic_plt_initial_offset (info))
861 /* The name of the dynamic interpreter. This is put in the .interp
864 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
866 #define DEFAULT_STACK_SIZE 0x20000
868 /* This structure is used to collect the number of entries present in
869 each addressable range of the got. */
870 struct _frvfdpic_dynamic_got_info
872 /* Several bits of information about the current link. */
873 struct bfd_link_info
*info
;
874 /* Total GOT size needed for GOT entries within the 12-, 16- or 32-bit
876 bfd_vma got12
, gotlos
, gothilo
;
877 /* Total GOT size needed for function descriptor entries within the 12-,
878 16- or 32-bit ranges. */
879 bfd_vma fd12
, fdlos
, fdhilo
;
880 /* Total GOT size needed by function descriptor entries referenced
881 in PLT entries, that would be profitable to place in offsets
882 close to the PIC register. */
884 /* Total PLT size needed by lazy PLT entries. */
886 /* Total GOT size needed for TLS descriptor entries within the 12-,
887 16- or 32-bit ranges. */
888 bfd_vma tlsd12
, tlsdlos
, tlsdhilo
;
889 /* Total GOT size needed by TLS descriptors referenced in PLT
890 entries, that would be profitable to place in offers close to the
893 /* Total PLT size needed by TLS lazy PLT entries. */
895 /* Number of relocations carried over from input object files. */
896 unsigned long relocs
;
897 /* Number of fixups introduced by relocations in input object files. */
898 unsigned long fixups
;
899 /* The number of fixups that reference the ret instruction added to
900 the PLT for locally-resolved TLS descriptors. */
901 unsigned long tls_ret_refs
;
904 /* This structure is used to assign offsets to got entries, function
905 descriptors, plt entries and lazy plt entries. */
907 struct _frvfdpic_dynamic_got_plt_info
909 /* Summary information collected with _frvfdpic_count_got_plt_entries. */
910 struct _frvfdpic_dynamic_got_info g
;
912 /* For each addressable range, we record a MAX (positive) and MIN
913 (negative) value. CUR is used to assign got entries, and it's
914 incremented from an initial positive value to MAX, then from MIN
915 to FDCUR (unless FDCUR wraps around first). FDCUR is used to
916 assign function descriptors, and it's decreased from an initial
917 non-positive value to MIN, then from MAX down to CUR (unless CUR
918 wraps around first). All of MIN, MAX, CUR and FDCUR always point
919 to even words. ODD, if non-zero, indicates an odd word to be
920 used for the next got entry, otherwise CUR is used and
921 incremented by a pair of words, wrapping around when it reaches
922 MAX. FDCUR is decremented (and wrapped) before the next function
923 descriptor is chosen. FDPLT indicates the number of remaining
924 slots that can be used for function descriptors used only by PLT
927 TMAX, TMIN and TCUR are used to assign TLS descriptors. TCUR
928 starts as MAX, and grows up to TMAX, then wraps around to TMIN
929 and grows up to MIN. TLSDPLT indicates the number of remaining
930 slots that can be used for TLS descriptors used only by TLS PLT
932 struct _frvfdpic_dynamic_got_alloc_data
934 bfd_signed_vma max
, cur
, odd
, fdcur
, min
;
935 bfd_signed_vma tmax
, tcur
, tmin
;
936 bfd_vma fdplt
, tlsdplt
;
937 } got12
, gotlos
, gothilo
;
940 /* Create an FRV ELF linker hash table. */
942 static struct bfd_link_hash_table
*
943 frvfdpic_elf_link_hash_table_create (bfd
*abfd
)
945 struct frvfdpic_elf_link_hash_table
*ret
;
946 size_t amt
= sizeof (struct frvfdpic_elf_link_hash_table
);
948 ret
= bfd_zmalloc (amt
);
952 if (!_bfd_elf_link_hash_table_init (&ret
->elf
, abfd
,
953 _bfd_elf_link_hash_newfunc
,
954 sizeof (struct elf_link_hash_entry
),
961 return &ret
->elf
.root
;
964 /* Decide whether a reference to a symbol can be resolved locally or
965 not. If the symbol is protected, we want the local address, but
966 its function descriptor must be assigned by the dynamic linker. */
967 #define FRVFDPIC_SYM_LOCAL(INFO, H) \
968 (_bfd_elf_symbol_refs_local_p ((H), (INFO), 1) \
969 || ! elf_hash_table (INFO)->dynamic_sections_created)
970 #define FRVFDPIC_FUNCDESC_LOCAL(INFO, H) \
971 ((H)->dynindx == -1 || ! elf_hash_table (INFO)->dynamic_sections_created)
973 /* This structure collects information on what kind of GOT, PLT or
974 function descriptors are required by relocations that reference a
976 struct frvfdpic_relocs_info
978 /* The index of the symbol, as stored in the relocation r_info, if
979 we have a local symbol; -1 otherwise. */
983 /* The input bfd in which the symbol is defined, if it's a local
986 /* If symndx == -1, the hash table entry corresponding to a global
987 symbol (even if it turns out to bind locally, in which case it
988 should ideally be replaced with section's symndx + addend). */
989 struct elf_link_hash_entry
*h
;
991 /* The addend of the relocation that references the symbol. */
994 /* The fields above are used to identify an entry. The fields below
995 contain information on how an entry is used and, later on, which
996 locations it was assigned. */
997 /* The following 3 fields record whether the symbol+addend above was
998 ever referenced with a GOT relocation. The 12 suffix indicates a
999 GOT12 relocation; los is used for GOTLO relocations that are not
1000 matched by a GOTHI relocation; hilo is used for GOTLO/GOTHI
1005 /* Whether a FUNCDESC relocation references symbol+addend. */
1007 /* Whether a FUNCDESC_GOT relocation references symbol+addend. */
1009 unsigned fdgotlos
:1;
1010 unsigned fdgothilo
:1;
1011 /* Whether a FUNCDESC_GOTOFF relocation references symbol+addend. */
1012 unsigned fdgoff12
:1;
1013 unsigned fdgofflos
:1;
1014 unsigned fdgoffhilo
:1;
1015 /* Whether a GETTLSOFF relocation references symbol+addend. */
1017 /* FIXME: we should probably add tlspltdesc, tlspltoff and
1018 tlspltimm, to tell what kind of TLS PLT entry we're generating.
1019 We might instead just pre-compute flags telling whether the
1020 object is suitable for local exec, initial exec or general
1021 dynamic addressing, and use that all over the place. We could
1022 also try to do a better job of merging TLSOFF and TLSDESC entries
1023 in main executables, but perhaps we can get rid of TLSDESC
1024 entirely in them instead. */
1025 /* Whether a GOTTLSDESC relocation references symbol+addend. */
1026 unsigned tlsdesc12
:1;
1027 unsigned tlsdesclos
:1;
1028 unsigned tlsdeschilo
:1;
1029 /* Whether a GOTTLSOFF relocation references symbol+addend. */
1030 unsigned tlsoff12
:1;
1031 unsigned tlsofflos
:1;
1032 unsigned tlsoffhilo
:1;
1033 /* Whether symbol+addend is referenced with GOTOFF12, GOTOFFLO or
1034 GOTOFFHI relocations. The addend doesn't really matter, since we
1035 envision that this will only be used to check whether the symbol
1036 is mapped to the same segment as the got. */
1038 /* Whether symbol+addend is referenced by a LABEL24 relocation. */
1040 /* Whether symbol+addend is referenced by a 32 or FUNCDESC_VALUE
1043 /* Whether we need a PLT entry for a symbol. Should be implied by
1045 (call && symndx == -1 && ! FRVFDPIC_SYM_LOCAL (info, d.h)) */
1047 /* Whether a function descriptor should be created in this link unit
1048 for symbol+addend. Should be implied by something like:
1049 (plt || fdgotoff12 || fdgotofflos || fdgotofflohi
1050 || ((fd || fdgot12 || fdgotlos || fdgothilo)
1051 && (symndx != -1 || FRVFDPIC_FUNCDESC_LOCAL (info, d.h)))) */
1053 /* Whether a lazy PLT entry is needed for this symbol+addend.
1054 Should be implied by something like:
1055 (privfd && symndx == -1 && ! FRVFDPIC_SYM_LOCAL (info, d.h)
1056 && ! (info->flags & DF_BIND_NOW)) */
1058 /* Whether we've already emitted GOT relocations and PLT entries as
1059 needed for this symbol. */
1062 /* The number of R_FRV_32, R_FRV_FUNCDESC, R_FRV_FUNCDESC_VALUE and
1063 R_FRV_TLSDESC_VALUE, R_FRV_TLSOFF relocations referencing
1065 unsigned relocs32
, relocsfd
, relocsfdv
, relocstlsd
, relocstlsoff
;
1067 /* The number of .rofixups entries and dynamic relocations allocated
1068 for this symbol, minus any that might have already been used. */
1069 unsigned fixups
, dynrelocs
;
1071 /* The offsets of the GOT entries assigned to symbol+addend, to the
1072 function descriptor's address, and to a function descriptor,
1073 respectively. Should be zero if unassigned. The offsets are
1074 counted from the value that will be assigned to the PIC register,
1075 not from the beginning of the .got section. */
1076 bfd_signed_vma got_entry
, fdgot_entry
, fd_entry
;
1077 /* The offsets of the PLT entries assigned to symbol+addend,
1078 non-lazy and lazy, respectively. If unassigned, should be
1080 bfd_vma plt_entry
, lzplt_entry
;
1081 /* The offsets of the GOT entries for TLS offset and TLS descriptor. */
1082 bfd_signed_vma tlsoff_entry
, tlsdesc_entry
;
1083 /* The offset of the TLS offset PLT entry. */
1084 bfd_vma tlsplt_entry
;
1087 /* Compute a hash with the key fields of an frvfdpic_relocs_info entry. */
1089 frvfdpic_relocs_info_hash (const void *entry_
)
1091 const struct frvfdpic_relocs_info
*entry
= entry_
;
1093 return (entry
->symndx
== -1
1094 ? (long) entry
->d
.h
->root
.root
.hash
1095 : entry
->symndx
+ (long) entry
->d
.abfd
->id
* 257) + entry
->addend
;
1098 /* Test whether the key fields of two frvfdpic_relocs_info entries are
1101 frvfdpic_relocs_info_eq (const void *entry1
, const void *entry2
)
1103 const struct frvfdpic_relocs_info
*e1
= entry1
;
1104 const struct frvfdpic_relocs_info
*e2
= entry2
;
1106 return e1
->symndx
== e2
->symndx
&& e1
->addend
== e2
->addend
1107 && (e1
->symndx
== -1 ? e1
->d
.h
== e2
->d
.h
: e1
->d
.abfd
== e2
->d
.abfd
);
1110 /* Find or create an entry in a hash table HT that matches the key
1111 fields of the given ENTRY. If it's not found, memory for a new
1112 entry is allocated in ABFD's obstack. */
1113 static struct frvfdpic_relocs_info
*
1114 frvfdpic_relocs_info_find (struct htab
*ht
,
1116 const struct frvfdpic_relocs_info
*entry
,
1117 enum insert_option insert
)
1119 struct frvfdpic_relocs_info
**loc
=
1120 (struct frvfdpic_relocs_info
**) htab_find_slot (ht
, entry
, insert
);
1128 *loc
= bfd_zalloc (abfd
, sizeof (**loc
));
1133 (*loc
)->symndx
= entry
->symndx
;
1134 (*loc
)->d
= entry
->d
;
1135 (*loc
)->addend
= entry
->addend
;
1136 (*loc
)->plt_entry
= (bfd_vma
)-1;
1137 (*loc
)->lzplt_entry
= (bfd_vma
)-1;
1138 (*loc
)->tlsplt_entry
= (bfd_vma
)-1;
1143 /* Obtain the address of the entry in HT associated with H's symbol +
1144 addend, creating a new entry if none existed. ABFD is only used
1145 for memory allocation purposes. */
1146 inline static struct frvfdpic_relocs_info
*
1147 frvfdpic_relocs_info_for_global (struct htab
*ht
,
1149 struct elf_link_hash_entry
*h
,
1151 enum insert_option insert
)
1153 struct frvfdpic_relocs_info entry
;
1157 entry
.addend
= addend
;
1159 return frvfdpic_relocs_info_find (ht
, abfd
, &entry
, insert
);
1162 /* Obtain the address of the entry in HT associated with the SYMNDXth
1163 local symbol of the input bfd ABFD, plus the addend, creating a new
1164 entry if none existed. */
1165 inline static struct frvfdpic_relocs_info
*
1166 frvfdpic_relocs_info_for_local (struct htab
*ht
,
1170 enum insert_option insert
)
1172 struct frvfdpic_relocs_info entry
;
1174 entry
.symndx
= symndx
;
1175 entry
.d
.abfd
= abfd
;
1176 entry
.addend
= addend
;
1178 return frvfdpic_relocs_info_find (ht
, abfd
, &entry
, insert
);
1181 /* Merge fields set by check_relocs() of two entries that end up being
1182 mapped to the same (presumably global) symbol. */
1185 frvfdpic_pic_merge_early_relocs_info (struct frvfdpic_relocs_info
*e2
,
1186 struct frvfdpic_relocs_info
const *e1
)
1188 e2
->got12
|= e1
->got12
;
1189 e2
->gotlos
|= e1
->gotlos
;
1190 e2
->gothilo
|= e1
->gothilo
;
1192 e2
->fdgot12
|= e1
->fdgot12
;
1193 e2
->fdgotlos
|= e1
->fdgotlos
;
1194 e2
->fdgothilo
|= e1
->fdgothilo
;
1195 e2
->fdgoff12
|= e1
->fdgoff12
;
1196 e2
->fdgofflos
|= e1
->fdgofflos
;
1197 e2
->fdgoffhilo
|= e1
->fdgoffhilo
;
1198 e2
->tlsplt
|= e1
->tlsplt
;
1199 e2
->tlsdesc12
|= e1
->tlsdesc12
;
1200 e2
->tlsdesclos
|= e1
->tlsdesclos
;
1201 e2
->tlsdeschilo
|= e1
->tlsdeschilo
;
1202 e2
->tlsoff12
|= e1
->tlsoff12
;
1203 e2
->tlsofflos
|= e1
->tlsofflos
;
1204 e2
->tlsoffhilo
|= e1
->tlsoffhilo
;
1205 e2
->gotoff
|= e1
->gotoff
;
1206 e2
->call
|= e1
->call
;
1210 /* Every block of 65535 lazy PLT entries shares a single call to the
1211 resolver, inserted in the 32768th lazy PLT entry (i.e., entry #
1212 32767, counting from 0). All other lazy PLT entries branch to it
1213 in a single instruction. */
1215 #define FRVFDPIC_LZPLT_BLOCK_SIZE ((bfd_vma) 8 * 65535 + 4)
1216 #define FRVFDPIC_LZPLT_RESOLV_LOC (8 * 32767)
1218 /* Add a dynamic relocation to the SRELOC section. */
1220 inline static bfd_vma
1221 _frvfdpic_add_dyn_reloc (bfd
*output_bfd
, asection
*sreloc
, bfd_vma offset
,
1222 int reloc_type
, long dynindx
, bfd_vma addend
,
1223 struct frvfdpic_relocs_info
*entry
)
1225 Elf_Internal_Rela outrel
;
1226 bfd_vma reloc_offset
;
1228 outrel
.r_offset
= offset
;
1229 outrel
.r_info
= ELF32_R_INFO (dynindx
, reloc_type
);
1230 outrel
.r_addend
= addend
;
1232 reloc_offset
= sreloc
->reloc_count
* sizeof (Elf32_External_Rel
);
1233 BFD_ASSERT (reloc_offset
< sreloc
->size
);
1234 bfd_elf32_swap_reloc_out (output_bfd
, &outrel
,
1235 sreloc
->contents
+ reloc_offset
);
1236 sreloc
->reloc_count
++;
1238 /* If the entry's index is zero, this relocation was probably to a
1239 linkonce section that got discarded. We reserved a dynamic
1240 relocation, but it was for another entry than the one we got at
1241 the time of emitting the relocation. Unfortunately there's no
1242 simple way for us to catch this situation, since the relocation
1243 is cleared right before calling relocate_section, at which point
1244 we no longer know what the relocation used to point to. */
1247 BFD_ASSERT (entry
->dynrelocs
> 0);
1251 return reloc_offset
;
1254 /* Add a fixup to the ROFIXUP section. */
1257 _frvfdpic_add_rofixup (bfd
*output_bfd
, asection
*rofixup
, bfd_vma offset
,
1258 struct frvfdpic_relocs_info
*entry
)
1260 bfd_vma fixup_offset
;
1262 if (rofixup
->flags
& SEC_EXCLUDE
)
1265 fixup_offset
= rofixup
->reloc_count
* 4;
1266 if (rofixup
->contents
)
1268 BFD_ASSERT (fixup_offset
< rofixup
->size
);
1269 bfd_put_32 (output_bfd
, offset
, rofixup
->contents
+ fixup_offset
);
1271 rofixup
->reloc_count
++;
1273 if (entry
&& entry
->symndx
)
1275 /* See discussion about symndx == 0 in _frvfdpic_add_dyn_reloc
1277 BFD_ASSERT (entry
->fixups
> 0);
1281 return fixup_offset
;
1284 /* Find the segment number in which OSEC, and output section, is
1288 _frvfdpic_osec_to_segment (bfd
*output_bfd
, asection
*osec
)
1290 Elf_Internal_Phdr
*p
= _bfd_elf_find_segment_containing_section (output_bfd
, osec
);
1292 return (p
!= NULL
) ? p
- elf_tdata (output_bfd
)->phdr
: -1;
1296 _frvfdpic_osec_readonly_p (bfd
*output_bfd
, asection
*osec
)
1298 unsigned seg
= _frvfdpic_osec_to_segment (output_bfd
, osec
);
1300 return ! (elf_tdata (output_bfd
)->phdr
[seg
].p_flags
& PF_W
);
1303 #define FRVFDPIC_TLS_BIAS (2048 - 16)
1305 /* Return the base VMA address which should be subtracted from real addresses
1306 when resolving TLSMOFF relocation.
1307 This is PT_TLS segment p_vaddr, plus the 2048-16 bias. */
1310 tls_biased_base (struct bfd_link_info
*info
)
1312 /* If tls_sec is NULL, we should have signalled an error already. */
1313 if (elf_hash_table (info
)->tls_sec
== NULL
)
1314 return FRVFDPIC_TLS_BIAS
;
1315 return elf_hash_table (info
)->tls_sec
->vma
+ FRVFDPIC_TLS_BIAS
;
1318 /* Generate relocations for GOT entries, function descriptors, and
1319 code for PLT and lazy PLT entries. */
1322 _frvfdpic_emit_got_relocs_plt_entries (struct frvfdpic_relocs_info
*entry
,
1324 struct bfd_link_info
*info
,
1326 Elf_Internal_Sym
*sym
,
1330 bfd_vma fd_lazy_rel_offset
= (bfd_vma
)-1;
1337 if (entry
->got_entry
|| entry
->fdgot_entry
|| entry
->fd_entry
1338 || entry
->tlsoff_entry
|| entry
->tlsdesc_entry
)
1340 /* If the symbol is dynamic, consider it for dynamic
1341 relocations, otherwise decay to section + offset. */
1342 if (entry
->symndx
== -1 && entry
->d
.h
->dynindx
!= -1)
1343 dynindx
= entry
->d
.h
->dynindx
;
1347 && sec
->output_section
1348 && ! bfd_is_abs_section (sec
->output_section
)
1349 && ! bfd_is_und_section (sec
->output_section
))
1350 dynindx
= elf_section_data (sec
->output_section
)->dynindx
;
1356 /* Generate relocation for GOT entry pointing to the symbol. */
1357 if (entry
->got_entry
)
1360 bfd_vma ad
= addend
;
1362 /* If the symbol is dynamic but binds locally, use
1364 if (sec
&& (entry
->symndx
!= -1
1365 || FRVFDPIC_SYM_LOCAL (info
, entry
->d
.h
)))
1367 if (entry
->symndx
== -1)
1368 ad
+= entry
->d
.h
->root
.u
.def
.value
;
1370 ad
+= sym
->st_value
;
1371 ad
+= sec
->output_offset
;
1372 if (sec
->output_section
&& elf_section_data (sec
->output_section
))
1373 idx
= elf_section_data (sec
->output_section
)->dynindx
;
1378 /* If we're linking an executable at a fixed address, we can
1379 omit the dynamic relocation as long as the symbol is local to
1381 if (bfd_link_pde (info
)
1382 && (entry
->symndx
!= -1
1383 || FRVFDPIC_SYM_LOCAL (info
, entry
->d
.h
)))
1386 ad
+= sec
->output_section
->vma
;
1387 if (entry
->symndx
!= -1
1388 || entry
->d
.h
->root
.type
!= bfd_link_hash_undefweak
)
1389 _frvfdpic_add_rofixup (output_bfd
,
1390 frvfdpic_gotfixup_section (info
),
1391 frvfdpic_got_section (info
)->output_section
1393 + frvfdpic_got_section (info
)->output_offset
1394 + frvfdpic_got_initial_offset (info
)
1395 + entry
->got_entry
, entry
);
1398 _frvfdpic_add_dyn_reloc (output_bfd
, frvfdpic_gotrel_section (info
),
1399 _bfd_elf_section_offset
1401 frvfdpic_got_section (info
),
1402 frvfdpic_got_initial_offset (info
)
1404 + frvfdpic_got_section (info
)
1405 ->output_section
->vma
1406 + frvfdpic_got_section (info
)->output_offset
,
1407 R_FRV_32
, idx
, ad
, entry
);
1409 bfd_put_32 (output_bfd
, ad
,
1410 frvfdpic_got_section (info
)->contents
1411 + frvfdpic_got_initial_offset (info
)
1412 + entry
->got_entry
);
1415 /* Generate relocation for GOT entry pointing to a canonical
1416 function descriptor. */
1417 if (entry
->fdgot_entry
)
1422 if (! (entry
->symndx
== -1
1423 && entry
->d
.h
->root
.type
== bfd_link_hash_undefweak
1424 && FRVFDPIC_SYM_LOCAL (info
, entry
->d
.h
)))
1426 /* If the symbol is dynamic and there may be dynamic symbol
1427 resolution because we are, or are linked with, a shared
1428 library, emit a FUNCDESC relocation such that the dynamic
1429 linker will allocate the function descriptor. If the
1430 symbol needs a non-local function descriptor but binds
1431 locally (e.g., its visibility is protected, emit a
1432 dynamic relocation decayed to section+offset. */
1433 if (entry
->symndx
== -1
1434 && ! FRVFDPIC_FUNCDESC_LOCAL (info
, entry
->d
.h
)
1435 && FRVFDPIC_SYM_LOCAL (info
, entry
->d
.h
)
1436 && !bfd_link_pde (info
))
1438 reloc
= R_FRV_FUNCDESC
;
1439 idx
= elf_section_data (entry
->d
.h
->root
.u
.def
.section
1440 ->output_section
)->dynindx
;
1441 ad
= entry
->d
.h
->root
.u
.def
.section
->output_offset
1442 + entry
->d
.h
->root
.u
.def
.value
;
1444 else if (entry
->symndx
== -1
1445 && ! FRVFDPIC_FUNCDESC_LOCAL (info
, entry
->d
.h
))
1447 reloc
= R_FRV_FUNCDESC
;
1452 (*info
->callbacks
->reloc_dangerous
)
1453 (info
, _("relocation requires zero addend"),
1454 elf_hash_table (info
)->dynobj
,
1455 frvfdpic_got_section (info
),
1456 entry
->fdgot_entry
);
1462 /* Otherwise, we know we have a private function descriptor,
1463 so reference it directly. */
1464 if (elf_hash_table (info
)->dynamic_sections_created
)
1465 BFD_ASSERT (entry
->privfd
);
1467 idx
= elf_section_data (frvfdpic_got_section (info
)
1468 ->output_section
)->dynindx
;
1469 ad
= frvfdpic_got_section (info
)->output_offset
1470 + frvfdpic_got_initial_offset (info
) + entry
->fd_entry
;
1473 /* If there is room for dynamic symbol resolution, emit the
1474 dynamic relocation. However, if we're linking an
1475 executable at a fixed location, we won't have emitted a
1476 dynamic symbol entry for the got section, so idx will be
1477 zero, which means we can and should compute the address
1478 of the private descriptor ourselves. */
1479 if (bfd_link_pde (info
)
1480 && (entry
->symndx
!= -1
1481 || FRVFDPIC_FUNCDESC_LOCAL (info
, entry
->d
.h
)))
1483 ad
+= frvfdpic_got_section (info
)->output_section
->vma
;
1484 _frvfdpic_add_rofixup (output_bfd
,
1485 frvfdpic_gotfixup_section (info
),
1486 frvfdpic_got_section (info
)
1487 ->output_section
->vma
1488 + frvfdpic_got_section (info
)
1490 + frvfdpic_got_initial_offset (info
)
1491 + entry
->fdgot_entry
, entry
);
1494 _frvfdpic_add_dyn_reloc (output_bfd
,
1495 frvfdpic_gotrel_section (info
),
1496 _bfd_elf_section_offset
1498 frvfdpic_got_section (info
),
1499 frvfdpic_got_initial_offset (info
)
1500 + entry
->fdgot_entry
)
1501 + frvfdpic_got_section (info
)
1502 ->output_section
->vma
1503 + frvfdpic_got_section (info
)
1505 reloc
, idx
, ad
, entry
);
1508 bfd_put_32 (output_bfd
, ad
,
1509 frvfdpic_got_section (info
)->contents
1510 + frvfdpic_got_initial_offset (info
)
1511 + entry
->fdgot_entry
);
1514 /* Generate relocation to fill in a private function descriptor in
1516 if (entry
->fd_entry
)
1519 bfd_vma ad
= addend
;
1521 long lowword
, highword
;
1523 /* If the symbol is dynamic but binds locally, use
1525 if (sec
&& (entry
->symndx
!= -1
1526 || FRVFDPIC_SYM_LOCAL (info
, entry
->d
.h
)))
1528 if (entry
->symndx
== -1)
1529 ad
+= entry
->d
.h
->root
.u
.def
.value
;
1531 ad
+= sym
->st_value
;
1532 ad
+= sec
->output_offset
;
1533 if (sec
->output_section
&& elf_section_data (sec
->output_section
))
1534 idx
= elf_section_data (sec
->output_section
)->dynindx
;
1539 /* If we're linking an executable at a fixed address, we can
1540 omit the dynamic relocation as long as the symbol is local to
1542 if (bfd_link_pde (info
)
1543 && (entry
->symndx
!= -1 || FRVFDPIC_SYM_LOCAL (info
, entry
->d
.h
)))
1546 ad
+= sec
->output_section
->vma
;
1548 if (entry
->symndx
!= -1
1549 || entry
->d
.h
->root
.type
!= bfd_link_hash_undefweak
)
1551 _frvfdpic_add_rofixup (output_bfd
,
1552 frvfdpic_gotfixup_section (info
),
1553 frvfdpic_got_section (info
)
1554 ->output_section
->vma
1555 + frvfdpic_got_section (info
)
1557 + frvfdpic_got_initial_offset (info
)
1558 + entry
->fd_entry
, entry
);
1559 _frvfdpic_add_rofixup (output_bfd
,
1560 frvfdpic_gotfixup_section (info
),
1561 frvfdpic_got_section (info
)
1562 ->output_section
->vma
1563 + frvfdpic_got_section (info
)
1565 + frvfdpic_got_initial_offset (info
)
1566 + entry
->fd_entry
+ 4, entry
);
1572 _frvfdpic_add_dyn_reloc (output_bfd
,
1574 ? frvfdpic_pltrel_section (info
)
1575 : frvfdpic_gotrel_section (info
),
1576 _bfd_elf_section_offset
1578 frvfdpic_got_section (info
),
1579 frvfdpic_got_initial_offset (info
)
1581 + frvfdpic_got_section (info
)
1582 ->output_section
->vma
1583 + frvfdpic_got_section (info
)
1585 R_FRV_FUNCDESC_VALUE
, idx
, ad
, entry
);
1588 /* If we've omitted the dynamic relocation, just emit the fixed
1589 addresses of the symbol and of the local GOT base offset. */
1590 if (bfd_link_pde (info
)
1592 && sec
->output_section
)
1595 highword
= frvfdpic_got_section (info
)->output_section
->vma
1596 + frvfdpic_got_section (info
)->output_offset
1597 + frvfdpic_got_initial_offset (info
);
1599 else if (entry
->lazyplt
)
1603 (*info
->callbacks
->reloc_dangerous
)
1604 (info
, _("relocation requires zero addend"),
1605 elf_hash_table (info
)->dynobj
,
1606 frvfdpic_got_section (info
),
1611 fd_lazy_rel_offset
= ofst
;
1613 /* A function descriptor used for lazy or local resolving is
1614 initialized such that its high word contains the output
1615 section index in which the PLT entries are located, and
1616 the low word contains the address of the lazy PLT entry
1617 entry point, that must be within the memory region
1618 assigned to that section. */
1619 lowword
= entry
->lzplt_entry
+ 4
1620 + frvfdpic_plt_section (info
)->output_offset
1621 + frvfdpic_plt_section (info
)->output_section
->vma
;
1622 highword
= _frvfdpic_osec_to_segment
1623 (output_bfd
, frvfdpic_plt_section (info
)->output_section
);
1627 /* A function descriptor for a local function gets the index
1628 of the section. For a non-local function, it's
1632 || (entry
->symndx
== -1 && entry
->d
.h
->dynindx
!= -1
1633 && entry
->d
.h
->dynindx
== idx
))
1636 highword
= _frvfdpic_osec_to_segment
1637 (output_bfd
, sec
->output_section
);
1640 bfd_put_32 (output_bfd
, lowword
,
1641 frvfdpic_got_section (info
)->contents
1642 + frvfdpic_got_initial_offset (info
)
1644 bfd_put_32 (output_bfd
, highword
,
1645 frvfdpic_got_section (info
)->contents
1646 + frvfdpic_got_initial_offset (info
)
1647 + entry
->fd_entry
+ 4);
1650 /* Generate code for the PLT entry. */
1651 if (entry
->plt_entry
!= (bfd_vma
) -1)
1653 bfd_byte
*plt_code
= frvfdpic_plt_section (info
)->contents
1656 BFD_ASSERT (entry
->fd_entry
);
1658 /* Figure out what kind of PLT entry we need, depending on the
1659 location of the function descriptor within the GOT. */
1660 if (entry
->fd_entry
>= -(1 << (12 - 1))
1661 && entry
->fd_entry
< (1 << (12 - 1)))
1663 /* lddi @(gr15, fd_entry), gr14 */
1664 bfd_put_32 (output_bfd
,
1665 0x9cccf000 | (entry
->fd_entry
& ((1 << 12) - 1)),
1671 if (entry
->fd_entry
>= -(1 << (16 - 1))
1672 && entry
->fd_entry
< (1 << (16 - 1)))
1674 /* setlos lo(fd_entry), gr14 */
1675 bfd_put_32 (output_bfd
,
1677 | (entry
->fd_entry
& (((bfd_vma
)1 << 16) - 1)),
1683 /* sethi.p hi(fd_entry), gr14
1684 setlo lo(fd_entry), gr14 */
1685 bfd_put_32 (output_bfd
,
1687 | ((entry
->fd_entry
>> 16)
1688 & (((bfd_vma
)1 << 16) - 1)),
1691 bfd_put_32 (output_bfd
,
1693 | (entry
->fd_entry
& (((bfd_vma
)1 << 16) - 1)),
1697 /* ldd @(gr14,gr15),gr14 */
1698 bfd_put_32 (output_bfd
, 0x9c08e14f, plt_code
);
1701 /* jmpl @(gr14,gr0) */
1702 bfd_put_32 (output_bfd
, 0x8030e000, plt_code
);
1705 /* Generate code for the lazy PLT entry. */
1706 if (entry
->lzplt_entry
!= (bfd_vma
) -1)
1708 bfd_byte
*lzplt_code
= frvfdpic_plt_section (info
)->contents
1709 + entry
->lzplt_entry
;
1710 bfd_vma resolverStub_addr
;
1712 bfd_put_32 (output_bfd
, fd_lazy_rel_offset
, lzplt_code
);
1715 resolverStub_addr
= entry
->lzplt_entry
/ FRVFDPIC_LZPLT_BLOCK_SIZE
1716 * FRVFDPIC_LZPLT_BLOCK_SIZE
+ FRVFDPIC_LZPLT_RESOLV_LOC
;
1717 if (resolverStub_addr
>= frvfdpic_plt_initial_offset (info
))
1718 resolverStub_addr
= frvfdpic_plt_initial_offset (info
) - 12;
1720 if (entry
->lzplt_entry
== resolverStub_addr
)
1722 /* This is a lazy PLT entry that includes a resolver call. */
1723 /* ldd @(gr15,gr0), gr4
1725 bfd_put_32 (output_bfd
, 0x8808f140, lzplt_code
);
1726 bfd_put_32 (output_bfd
, 0x80304000, lzplt_code
+ 4);
1730 /* bra resolverStub */
1731 bfd_put_32 (output_bfd
,
1733 | (((resolverStub_addr
- entry
->lzplt_entry
)
1734 / 4) & (((bfd_vma
)1 << 16) - 1)),
1739 /* Generate relocation for GOT entry holding the TLS offset. */
1740 if (entry
->tlsoff_entry
)
1743 bfd_vma ad
= addend
;
1745 if (entry
->symndx
!= -1
1746 || FRVFDPIC_SYM_LOCAL (info
, entry
->d
.h
))
1748 /* If the symbol is dynamic but binds locally, use
1752 if (entry
->symndx
== -1)
1753 ad
+= entry
->d
.h
->root
.u
.def
.value
;
1755 ad
+= sym
->st_value
;
1756 ad
+= sec
->output_offset
;
1757 if (sec
->output_section
1758 && elf_section_data (sec
->output_section
))
1759 idx
= elf_section_data (sec
->output_section
)->dynindx
;
1765 /* *ABS*+addend is special for TLS relocations, use only the
1767 if (bfd_link_executable (info
)
1769 && (bfd_is_abs_section (sec
)
1770 || bfd_is_und_section (sec
)))
1772 /* If we're linking an executable, we can entirely omit the
1773 dynamic relocation if the symbol is local to this module. */
1774 else if (bfd_link_executable (info
)
1775 && (entry
->symndx
!= -1
1776 || FRVFDPIC_SYM_LOCAL (info
, entry
->d
.h
)))
1779 ad
+= sec
->output_section
->vma
- tls_biased_base (info
);
1784 && (bfd_is_abs_section (sec
)
1785 || bfd_is_und_section (sec
)))
1787 if (! elf_hash_table (info
)->tls_sec
)
1789 (*info
->callbacks
->undefined_symbol
)
1790 (info
, "TLS section", elf_hash_table (info
)->dynobj
,
1791 frvfdpic_got_section (info
), entry
->tlsoff_entry
, true);
1794 idx
= elf_section_data (elf_hash_table (info
)->tls_sec
)->dynindx
;
1795 ad
+= FRVFDPIC_TLS_BIAS
;
1797 _frvfdpic_add_dyn_reloc (output_bfd
, frvfdpic_gotrel_section (info
),
1798 _bfd_elf_section_offset
1800 frvfdpic_got_section (info
),
1801 frvfdpic_got_initial_offset (info
)
1802 + entry
->tlsoff_entry
)
1803 + frvfdpic_got_section (info
)
1804 ->output_section
->vma
1805 + frvfdpic_got_section (info
)
1807 R_FRV_TLSOFF
, idx
, ad
, entry
);
1810 bfd_put_32 (output_bfd
, ad
,
1811 frvfdpic_got_section (info
)->contents
1812 + frvfdpic_got_initial_offset (info
)
1813 + entry
->tlsoff_entry
);
1816 if (entry
->tlsdesc_entry
)
1819 bfd_vma ad
= addend
;
1821 /* If the symbol is dynamic but binds locally, use
1823 if (sec
&& (entry
->symndx
!= -1
1824 || FRVFDPIC_SYM_LOCAL (info
, entry
->d
.h
)))
1826 if (entry
->symndx
== -1)
1827 ad
+= entry
->d
.h
->root
.u
.def
.value
;
1829 ad
+= sym
->st_value
;
1830 ad
+= sec
->output_offset
;
1831 if (sec
->output_section
&& elf_section_data (sec
->output_section
))
1832 idx
= elf_section_data (sec
->output_section
)->dynindx
;
1837 /* If we didn't set up a TLS offset entry, but we're linking an
1838 executable and the symbol binds locally, we can use the
1839 module offset in the TLS descriptor in relaxations. */
1840 if (bfd_link_executable (info
) && ! entry
->tlsoff_entry
)
1841 entry
->tlsoff_entry
= entry
->tlsdesc_entry
+ 4;
1843 if (bfd_link_pde (info
)
1845 && (bfd_is_abs_section (sec
)
1846 || bfd_is_und_section (sec
)))
1847 || entry
->symndx
!= -1
1848 || FRVFDPIC_SYM_LOCAL (info
, entry
->d
.h
)))
1850 /* *ABS*+addend is special for TLS relocations, use only the
1851 addend for the TLS offset, and take the module id as
1854 && (bfd_is_abs_section (sec
)
1855 || bfd_is_und_section (sec
)))
1857 /* For other TLS symbols that bind locally, add the section
1858 TLS offset to the addend. */
1860 ad
+= sec
->output_section
->vma
- tls_biased_base (info
);
1862 bfd_put_32 (output_bfd
,
1863 frvfdpic_plt_section (info
)->output_section
->vma
1864 + frvfdpic_plt_section (info
)->output_offset
1865 + frvfdpic_plt_tls_ret_offset (info
),
1866 frvfdpic_got_section (info
)->contents
1867 + frvfdpic_got_initial_offset (info
)
1868 + entry
->tlsdesc_entry
);
1870 _frvfdpic_add_rofixup (output_bfd
,
1871 frvfdpic_gotfixup_section (info
),
1872 frvfdpic_got_section (info
)
1873 ->output_section
->vma
1874 + frvfdpic_got_section (info
)
1876 + frvfdpic_got_initial_offset (info
)
1877 + entry
->tlsdesc_entry
, entry
);
1879 BFD_ASSERT (frvfdpic_dynamic_got_plt_info (info
)->tls_ret_refs
);
1881 /* We've used one of the reserved fixups, so discount it so
1882 that we can check at the end that we've used them
1884 frvfdpic_dynamic_got_plt_info (info
)->tls_ret_refs
--;
1886 /* While at that, make sure the ret instruction makes to the
1887 right location in the PLT. We could do it only when we
1888 got to 0, but since the check at the end will only print
1889 a warning, make sure we have the ret in place in case the
1890 warning is missed. */
1891 bfd_put_32 (output_bfd
, 0xc03a4000,
1892 frvfdpic_plt_section (info
)->contents
1893 + frvfdpic_plt_tls_ret_offset (info
));
1898 && (bfd_is_abs_section (sec
)
1899 || bfd_is_und_section (sec
)))
1901 if (! elf_hash_table (info
)->tls_sec
)
1903 (*info
->callbacks
->undefined_symbol
)
1904 (info
, "TLS section", elf_hash_table (info
)->dynobj
,
1905 frvfdpic_got_section (info
), entry
->tlsdesc_entry
, true);
1908 idx
= elf_section_data (elf_hash_table (info
)->tls_sec
)->dynindx
;
1909 ad
+= FRVFDPIC_TLS_BIAS
;
1912 _frvfdpic_add_dyn_reloc (output_bfd
, frvfdpic_gotrel_section (info
),
1913 _bfd_elf_section_offset
1915 frvfdpic_got_section (info
),
1916 frvfdpic_got_initial_offset (info
)
1917 + entry
->tlsdesc_entry
)
1918 + frvfdpic_got_section (info
)
1919 ->output_section
->vma
1920 + frvfdpic_got_section (info
)
1922 R_FRV_TLSDESC_VALUE
, idx
, ad
, entry
);
1924 bfd_put_32 (output_bfd
, 0,
1925 frvfdpic_got_section (info
)->contents
1926 + frvfdpic_got_initial_offset (info
)
1927 + entry
->tlsdesc_entry
);
1930 bfd_put_32 (output_bfd
, ad
,
1931 frvfdpic_got_section (info
)->contents
1932 + frvfdpic_got_initial_offset (info
)
1933 + entry
->tlsdesc_entry
+ 4);
1936 /* Generate code for the get-TLS-offset PLT entry. */
1937 if (entry
->tlsplt_entry
!= (bfd_vma
) -1)
1939 bfd_byte
*plt_code
= frvfdpic_plt_section (info
)->contents
1940 + entry
->tlsplt_entry
;
1942 if (bfd_link_executable (info
)
1943 && (entry
->symndx
!= -1
1944 || FRVFDPIC_SYM_LOCAL (info
, entry
->d
.h
)))
1947 bfd_vma ad
= addend
;
1949 /* sec may be NULL when referencing an undefweak symbol
1950 while linking a static executable. */
1953 BFD_ASSERT (entry
->symndx
== -1
1954 && entry
->d
.h
->root
.type
== bfd_link_hash_undefweak
);
1958 if (entry
->symndx
== -1)
1959 ad
+= entry
->d
.h
->root
.u
.def
.value
;
1961 ad
+= sym
->st_value
;
1962 ad
+= sec
->output_offset
;
1963 if (sec
->output_section
1964 && elf_section_data (sec
->output_section
))
1965 idx
= elf_section_data (sec
->output_section
)->dynindx
;
1970 /* *ABS*+addend is special for TLS relocations, use only the
1971 addend for the TLS offset, and take the module id as
1974 && (bfd_is_abs_section (sec
)
1975 || bfd_is_und_section (sec
)))
1977 /* For other TLS symbols that bind locally, add the section
1978 TLS offset to the addend. */
1980 ad
+= sec
->output_section
->vma
- tls_biased_base (info
);
1982 if ((bfd_signed_vma
)ad
>= -(1 << (16 - 1))
1983 && (bfd_signed_vma
)ad
< (1 << (16 - 1)))
1985 /* setlos lo(ad), gr9 */
1986 bfd_put_32 (output_bfd
,
1989 & (((bfd_vma
)1 << 16) - 1)),
1995 /* sethi.p hi(ad), gr9
1996 setlo lo(ad), gr9 */
1997 bfd_put_32 (output_bfd
,
2000 & (((bfd_vma
)1 << 16) - 1)),
2003 bfd_put_32 (output_bfd
,
2006 & (((bfd_vma
)1 << 16) - 1)),
2011 bfd_put_32 (output_bfd
, 0xc03a4000, plt_code
);
2013 else if (entry
->tlsoff_entry
)
2015 /* Figure out what kind of PLT entry we need, depending on the
2016 location of the TLS descriptor within the GOT. */
2017 if (entry
->tlsoff_entry
>= -(1 << (12 - 1))
2018 && entry
->tlsoff_entry
< (1 << (12 - 1)))
2020 /* ldi @(gr15, tlsoff_entry), gr9 */
2021 bfd_put_32 (output_bfd
,
2022 0x92c8f000 | (entry
->tlsoff_entry
2029 if (entry
->tlsoff_entry
>= -(1 << (16 - 1))
2030 && entry
->tlsoff_entry
< (1 << (16 - 1)))
2032 /* setlos lo(tlsoff_entry), gr8 */
2033 bfd_put_32 (output_bfd
,
2035 | (entry
->tlsoff_entry
2036 & (((bfd_vma
)1 << 16) - 1)),
2042 /* sethi.p hi(tlsoff_entry), gr8
2043 setlo lo(tlsoff_entry), gr8 */
2044 bfd_put_32 (output_bfd
,
2046 | ((entry
->tlsoff_entry
>> 16)
2047 & (((bfd_vma
)1 << 16) - 1)),
2050 bfd_put_32 (output_bfd
,
2052 | (entry
->tlsoff_entry
2053 & (((bfd_vma
)1 << 16) - 1)),
2057 /* ld @(gr15,gr8),gr9 */
2058 bfd_put_32 (output_bfd
, 0x9008f108, plt_code
);
2062 bfd_put_32 (output_bfd
, 0xc03a4000, plt_code
);
2066 BFD_ASSERT (entry
->tlsdesc_entry
);
2068 /* Figure out what kind of PLT entry we need, depending on the
2069 location of the TLS descriptor within the GOT. */
2070 if (entry
->tlsdesc_entry
>= -(1 << (12 - 1))
2071 && entry
->tlsdesc_entry
< (1 << (12 - 1)))
2073 /* lddi @(gr15, tlsdesc_entry), gr8 */
2074 bfd_put_32 (output_bfd
,
2075 0x90ccf000 | (entry
->tlsdesc_entry
2082 if (entry
->tlsdesc_entry
>= -(1 << (16 - 1))
2083 && entry
->tlsdesc_entry
< (1 << (16 - 1)))
2085 /* setlos lo(tlsdesc_entry), gr8 */
2086 bfd_put_32 (output_bfd
,
2088 | (entry
->tlsdesc_entry
2089 & (((bfd_vma
)1 << 16) - 1)),
2095 /* sethi.p hi(tlsdesc_entry), gr8
2096 setlo lo(tlsdesc_entry), gr8 */
2097 bfd_put_32 (output_bfd
,
2099 | ((entry
->tlsdesc_entry
>> 16)
2100 & (((bfd_vma
)1 << 16) - 1)),
2103 bfd_put_32 (output_bfd
,
2105 | (entry
->tlsdesc_entry
2106 & (((bfd_vma
)1 << 16) - 1)),
2110 /* ldd @(gr15,gr8),gr8 */
2111 bfd_put_32 (output_bfd
, 0x9008f148, plt_code
);
2114 /* jmpl @(gr8,gr0) */
2115 bfd_put_32 (output_bfd
, 0x80308000, plt_code
);
2122 /* Handle an FRV small data reloc. */
2124 static bfd_reloc_status_type
2125 elf32_frv_relocate_gprel12 (struct bfd_link_info
*info
,
2127 asection
*input_section
,
2128 Elf_Internal_Rela
*relocation
,
2134 struct bfd_link_hash_entry
*h
;
2136 h
= bfd_link_hash_lookup (info
->hash
, "_gp", false, false, true);
2138 gp
= (h
->u
.def
.value
2139 + h
->u
.def
.section
->output_section
->vma
2140 + h
->u
.def
.section
->output_offset
);
2142 value
-= input_section
->output_section
->vma
;
2143 value
-= (gp
- input_section
->output_section
->vma
);
2145 insn
= bfd_get_32 (input_bfd
, contents
+ relocation
->r_offset
);
2147 value
+= relocation
->r_addend
;
2149 if ((long) value
> 0x7ff || (long) value
< -0x800)
2150 return bfd_reloc_overflow
;
2152 bfd_put_32 (input_bfd
,
2153 (insn
& 0xfffff000) | (value
& 0xfff),
2154 contents
+ relocation
->r_offset
);
2156 return bfd_reloc_ok
;
2159 /* Handle an FRV small data reloc. for the u12 field. */
2161 static bfd_reloc_status_type
2162 elf32_frv_relocate_gprelu12 (struct bfd_link_info
*info
,
2164 asection
*input_section
,
2165 Elf_Internal_Rela
*relocation
,
2171 struct bfd_link_hash_entry
*h
;
2174 h
= bfd_link_hash_lookup (info
->hash
, "_gp", false, false, true);
2176 gp
= (h
->u
.def
.value
2177 + h
->u
.def
.section
->output_section
->vma
2178 + h
->u
.def
.section
->output_offset
);
2180 value
-= input_section
->output_section
->vma
;
2181 value
-= (gp
- input_section
->output_section
->vma
);
2183 insn
= bfd_get_32 (input_bfd
, contents
+ relocation
->r_offset
);
2185 value
+= relocation
->r_addend
;
2187 if ((long) value
> 0x7ff || (long) value
< -0x800)
2188 return bfd_reloc_overflow
;
2190 /* The high 6 bits go into bits 17-12. The low 6 bits go into bits 5-0. */
2192 insn
= (insn
& ~mask
) | ((value
& 0xfc0) << 12) | (value
& 0x3f);
2194 bfd_put_32 (input_bfd
, insn
, contents
+ relocation
->r_offset
);
2196 return bfd_reloc_ok
;
2199 /* Handle an FRV ELF HI16 reloc. */
2201 static bfd_reloc_status_type
2202 elf32_frv_relocate_hi16 (bfd
*input_bfd
,
2203 Elf_Internal_Rela
*relhi
,
2209 insn
= bfd_get_32 (input_bfd
, contents
+ relhi
->r_offset
);
2211 value
+= relhi
->r_addend
;
2212 value
= ((value
>> 16) & 0xffff);
2214 insn
= (insn
& 0xffff0000) | value
;
2216 if ((long) value
> 0xffff || (long) value
< -0x10000)
2217 return bfd_reloc_overflow
;
2219 bfd_put_32 (input_bfd
, insn
, contents
+ relhi
->r_offset
);
2220 return bfd_reloc_ok
;
2223 static bfd_reloc_status_type
2224 elf32_frv_relocate_lo16 (bfd
*input_bfd
,
2225 Elf_Internal_Rela
*rello
,
2231 insn
= bfd_get_32 (input_bfd
, contents
+ rello
->r_offset
);
2233 value
+= rello
->r_addend
;
2234 value
= value
& 0xffff;
2236 insn
= (insn
& 0xffff0000) | value
;
2238 if ((long) value
> 0xffff || (long) value
< -0x10000)
2239 return bfd_reloc_overflow
;
2241 bfd_put_32 (input_bfd
, insn
, contents
+ rello
->r_offset
);
2242 return bfd_reloc_ok
;
2245 /* Perform the relocation for the CALL label24 instruction. */
2247 static bfd_reloc_status_type
2248 elf32_frv_relocate_label24 (bfd
*input_bfd
,
2249 asection
*input_section
,
2250 Elf_Internal_Rela
*rello
,
2258 /* The format for the call instruction is:
2260 0 000000 0001111 000000000000000000
2261 label6 opcode label18
2263 The branch calculation is: pc + (4*label24)
2264 where label24 is the concatenation of label6 and label18. */
2266 /* Grab the instruction. */
2267 insn
= bfd_get_32 (input_bfd
, contents
+ rello
->r_offset
);
2269 value
-= input_section
->output_section
->vma
+ input_section
->output_offset
;
2270 value
-= rello
->r_offset
;
2271 value
+= rello
->r_addend
;
2275 label6
= value
& 0xfc0000;
2276 label6
= label6
<< 7;
2278 label18
= value
& 0x3ffff;
2280 insn
= insn
& 0x803c0000;
2281 insn
= insn
| label6
;
2282 insn
= insn
| label18
;
2284 bfd_put_32 (input_bfd
, insn
, contents
+ rello
->r_offset
);
2286 return bfd_reloc_ok
;
2289 static bfd_reloc_status_type
2290 elf32_frv_relocate_gprelhi (struct bfd_link_info
*info
,
2292 asection
*input_section
,
2293 Elf_Internal_Rela
*relocation
,
2299 struct bfd_link_hash_entry
*h
;
2301 h
= bfd_link_hash_lookup (info
->hash
, "_gp", false, false, true);
2303 gp
= (h
->u
.def
.value
2304 + h
->u
.def
.section
->output_section
->vma
2305 + h
->u
.def
.section
->output_offset
);
2307 value
-= input_section
->output_section
->vma
;
2308 value
-= (gp
- input_section
->output_section
->vma
);
2309 value
+= relocation
->r_addend
;
2310 value
= ((value
>> 16) & 0xffff);
2312 if ((long) value
> 0xffff || (long) value
< -0x10000)
2313 return bfd_reloc_overflow
;
2315 insn
= bfd_get_32 (input_bfd
, contents
+ relocation
->r_offset
);
2316 insn
= (insn
& 0xffff0000) | value
;
2318 bfd_put_32 (input_bfd
, insn
, contents
+ relocation
->r_offset
);
2319 return bfd_reloc_ok
;
2322 static bfd_reloc_status_type
2323 elf32_frv_relocate_gprello (struct bfd_link_info
*info
,
2325 asection
*input_section
,
2326 Elf_Internal_Rela
*relocation
,
2332 struct bfd_link_hash_entry
*h
;
2334 h
= bfd_link_hash_lookup (info
->hash
, "_gp", false, false, true);
2336 gp
= (h
->u
.def
.value
2337 + h
->u
.def
.section
->output_section
->vma
2338 + h
->u
.def
.section
->output_offset
);
2340 value
-= input_section
->output_section
->vma
;
2341 value
-= (gp
- input_section
->output_section
->vma
);
2342 value
+= relocation
->r_addend
;
2343 value
= value
& 0xffff;
2345 if ((long) value
> 0xffff || (long) value
< -0x10000)
2346 return bfd_reloc_overflow
;
2348 insn
= bfd_get_32 (input_bfd
, contents
+ relocation
->r_offset
);
2349 insn
= (insn
& 0xffff0000) | value
;
2351 bfd_put_32 (input_bfd
, insn
, contents
+ relocation
->r_offset
);
2353 return bfd_reloc_ok
;
2356 static reloc_howto_type
*
2357 frv_reloc_type_lookup (bfd
*abfd ATTRIBUTE_UNUSED
,
2358 bfd_reloc_code_real_type code
)
2365 case BFD_RELOC_NONE
:
2366 return &elf32_frv_howto_table
[ (int) R_FRV_NONE
];
2369 if (elf_elfheader (abfd
)->e_type
== ET_EXEC
2370 || elf_elfheader (abfd
)->e_type
== ET_DYN
)
2371 return &elf32_frv_rel_32_howto
;
2373 case BFD_RELOC_CTOR
:
2374 return &elf32_frv_howto_table
[ (int) R_FRV_32
];
2376 case BFD_RELOC_FRV_LABEL16
:
2377 return &elf32_frv_howto_table
[ (int) R_FRV_LABEL16
];
2379 case BFD_RELOC_FRV_LABEL24
:
2380 return &elf32_frv_howto_table
[ (int) R_FRV_LABEL24
];
2382 case BFD_RELOC_FRV_LO16
:
2383 return &elf32_frv_howto_table
[ (int) R_FRV_LO16
];
2385 case BFD_RELOC_FRV_HI16
:
2386 return &elf32_frv_howto_table
[ (int) R_FRV_HI16
];
2388 case BFD_RELOC_FRV_GPREL12
:
2389 return &elf32_frv_howto_table
[ (int) R_FRV_GPREL12
];
2391 case BFD_RELOC_FRV_GPRELU12
:
2392 return &elf32_frv_howto_table
[ (int) R_FRV_GPRELU12
];
2394 case BFD_RELOC_FRV_GPREL32
:
2395 return &elf32_frv_howto_table
[ (int) R_FRV_GPREL32
];
2397 case BFD_RELOC_FRV_GPRELHI
:
2398 return &elf32_frv_howto_table
[ (int) R_FRV_GPRELHI
];
2400 case BFD_RELOC_FRV_GPRELLO
:
2401 return &elf32_frv_howto_table
[ (int) R_FRV_GPRELLO
];
2403 case BFD_RELOC_FRV_GOT12
:
2404 return &elf32_frv_howto_table
[ (int) R_FRV_GOT12
];
2406 case BFD_RELOC_FRV_GOTHI
:
2407 return &elf32_frv_howto_table
[ (int) R_FRV_GOTHI
];
2409 case BFD_RELOC_FRV_GOTLO
:
2410 return &elf32_frv_howto_table
[ (int) R_FRV_GOTLO
];
2412 case BFD_RELOC_FRV_FUNCDESC
:
2413 if (elf_elfheader (abfd
)->e_type
== ET_EXEC
2414 || elf_elfheader (abfd
)->e_type
== ET_DYN
)
2415 return &elf32_frv_rel_funcdesc_howto
;
2416 return &elf32_frv_howto_table
[ (int) R_FRV_FUNCDESC
];
2418 case BFD_RELOC_FRV_FUNCDESC_GOT12
:
2419 return &elf32_frv_howto_table
[ (int) R_FRV_FUNCDESC_GOT12
];
2421 case BFD_RELOC_FRV_FUNCDESC_GOTHI
:
2422 return &elf32_frv_howto_table
[ (int) R_FRV_FUNCDESC_GOTHI
];
2424 case BFD_RELOC_FRV_FUNCDESC_GOTLO
:
2425 return &elf32_frv_howto_table
[ (int) R_FRV_FUNCDESC_GOTLO
];
2427 case BFD_RELOC_FRV_FUNCDESC_VALUE
:
2428 if (elf_elfheader (abfd
)->e_type
== ET_EXEC
2429 || elf_elfheader (abfd
)->e_type
== ET_DYN
)
2430 return &elf32_frv_rel_funcdesc_value_howto
;
2431 return &elf32_frv_howto_table
[ (int) R_FRV_FUNCDESC_VALUE
];
2433 case BFD_RELOC_FRV_FUNCDESC_GOTOFF12
:
2434 return &elf32_frv_howto_table
[ (int) R_FRV_FUNCDESC_GOTOFF12
];
2436 case BFD_RELOC_FRV_FUNCDESC_GOTOFFHI
:
2437 return &elf32_frv_howto_table
[ (int) R_FRV_FUNCDESC_GOTOFFHI
];
2439 case BFD_RELOC_FRV_FUNCDESC_GOTOFFLO
:
2440 return &elf32_frv_howto_table
[ (int) R_FRV_FUNCDESC_GOTOFFLO
];
2442 case BFD_RELOC_FRV_GOTOFF12
:
2443 return &elf32_frv_howto_table
[ (int) R_FRV_GOTOFF12
];
2445 case BFD_RELOC_FRV_GOTOFFHI
:
2446 return &elf32_frv_howto_table
[ (int) R_FRV_GOTOFFHI
];
2448 case BFD_RELOC_FRV_GOTOFFLO
:
2449 return &elf32_frv_howto_table
[ (int) R_FRV_GOTOFFLO
];
2451 case BFD_RELOC_FRV_GETTLSOFF
:
2452 return &elf32_frv_howto_table
[ (int) R_FRV_GETTLSOFF
];
2454 case BFD_RELOC_FRV_TLSDESC_VALUE
:
2455 if (elf_elfheader (abfd
)->e_type
== ET_EXEC
2456 || elf_elfheader (abfd
)->e_type
== ET_DYN
)
2457 return &elf32_frv_rel_tlsdesc_value_howto
;
2458 return &elf32_frv_howto_table
[ (int) R_FRV_TLSDESC_VALUE
];
2460 case BFD_RELOC_FRV_GOTTLSDESC12
:
2461 return &elf32_frv_howto_table
[ (int) R_FRV_GOTTLSDESC12
];
2463 case BFD_RELOC_FRV_GOTTLSDESCHI
:
2464 return &elf32_frv_howto_table
[ (int) R_FRV_GOTTLSDESCHI
];
2466 case BFD_RELOC_FRV_GOTTLSDESCLO
:
2467 return &elf32_frv_howto_table
[ (int) R_FRV_GOTTLSDESCLO
];
2469 case BFD_RELOC_FRV_TLSMOFF12
:
2470 return &elf32_frv_howto_table
[ (int) R_FRV_TLSMOFF12
];
2472 case BFD_RELOC_FRV_TLSMOFFHI
:
2473 return &elf32_frv_howto_table
[ (int) R_FRV_TLSMOFFHI
];
2475 case BFD_RELOC_FRV_TLSMOFFLO
:
2476 return &elf32_frv_howto_table
[ (int) R_FRV_TLSMOFFLO
];
2478 case BFD_RELOC_FRV_GOTTLSOFF12
:
2479 return &elf32_frv_howto_table
[ (int) R_FRV_GOTTLSOFF12
];
2481 case BFD_RELOC_FRV_GOTTLSOFFHI
:
2482 return &elf32_frv_howto_table
[ (int) R_FRV_GOTTLSOFFHI
];
2484 case BFD_RELOC_FRV_GOTTLSOFFLO
:
2485 return &elf32_frv_howto_table
[ (int) R_FRV_GOTTLSOFFLO
];
2487 case BFD_RELOC_FRV_TLSOFF
:
2488 if (elf_elfheader (abfd
)->e_type
== ET_EXEC
2489 || elf_elfheader (abfd
)->e_type
== ET_DYN
)
2490 return &elf32_frv_rel_tlsoff_howto
;
2491 return &elf32_frv_howto_table
[ (int) R_FRV_TLSOFF
];
2493 case BFD_RELOC_FRV_TLSDESC_RELAX
:
2494 return &elf32_frv_howto_table
[ (int) R_FRV_TLSDESC_RELAX
];
2496 case BFD_RELOC_FRV_GETTLSOFF_RELAX
:
2497 return &elf32_frv_howto_table
[ (int) R_FRV_GETTLSOFF_RELAX
];
2499 case BFD_RELOC_FRV_TLSOFF_RELAX
:
2500 return &elf32_frv_howto_table
[ (int) R_FRV_TLSOFF_RELAX
];
2502 case BFD_RELOC_FRV_TLSMOFF
:
2503 return &elf32_frv_howto_table
[ (int) R_FRV_TLSMOFF
];
2505 case BFD_RELOC_VTABLE_INHERIT
:
2506 return &elf32_frv_vtinherit_howto
;
2508 case BFD_RELOC_VTABLE_ENTRY
:
2509 return &elf32_frv_vtentry_howto
;
2515 static reloc_howto_type
*
2516 frv_reloc_name_lookup (bfd
*abfd ATTRIBUTE_UNUSED
, const char *r_name
)
2521 i
< sizeof (elf32_frv_howto_table
) / sizeof (elf32_frv_howto_table
[0]);
2523 if (elf32_frv_howto_table
[i
].name
!= NULL
2524 && strcasecmp (elf32_frv_howto_table
[i
].name
, r_name
) == 0)
2525 return &elf32_frv_howto_table
[i
];
2527 if (strcasecmp (elf32_frv_vtinherit_howto
.name
, r_name
) == 0)
2528 return &elf32_frv_vtinherit_howto
;
2529 if (strcasecmp (elf32_frv_vtentry_howto
.name
, r_name
) == 0)
2530 return &elf32_frv_vtentry_howto
;
2535 /* Set the howto pointer for an FRV ELF reloc. */
2538 frv_info_to_howto_rela (bfd
*abfd ATTRIBUTE_UNUSED
,
2540 Elf_Internal_Rela
*dst
)
2542 unsigned int r_type
;
2544 r_type
= ELF32_R_TYPE (dst
->r_info
);
2547 case R_FRV_GNU_VTINHERIT
:
2548 cache_ptr
->howto
= &elf32_frv_vtinherit_howto
;
2551 case R_FRV_GNU_VTENTRY
:
2552 cache_ptr
->howto
= &elf32_frv_vtentry_howto
;
2556 if (r_type
>= ARRAY_SIZE (elf32_frv_howto_table
))
2558 /* xgettext:c-format */
2559 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
2561 bfd_set_error (bfd_error_bad_value
);
2564 cache_ptr
->howto
= & elf32_frv_howto_table
[r_type
];
2570 /* Set the howto pointer for an FRV ELF REL reloc. */
2573 frvfdpic_info_to_howto_rel (bfd
*abfd ATTRIBUTE_UNUSED
,
2574 arelent
*cache_ptr
, Elf_Internal_Rela
*dst
)
2576 unsigned int r_type
;
2578 r_type
= ELF32_R_TYPE (dst
->r_info
);
2582 cache_ptr
->howto
= &elf32_frv_rel_32_howto
;
2585 case R_FRV_FUNCDESC
:
2586 cache_ptr
->howto
= &elf32_frv_rel_funcdesc_howto
;
2589 case R_FRV_FUNCDESC_VALUE
:
2590 cache_ptr
->howto
= &elf32_frv_rel_funcdesc_value_howto
;
2593 case R_FRV_TLSDESC_VALUE
:
2594 cache_ptr
->howto
= &elf32_frv_rel_tlsdesc_value_howto
;
2598 cache_ptr
->howto
= &elf32_frv_rel_tlsoff_howto
;
2602 cache_ptr
->howto
= NULL
;
2608 /* Perform a single relocation. By default we use the standard BFD
2609 routines, but a few relocs, we have to do them ourselves. */
2611 static bfd_reloc_status_type
2612 frv_final_link_relocate (reloc_howto_type
*howto
,
2614 asection
*input_section
,
2616 Elf_Internal_Rela
*rel
,
2619 return _bfd_final_link_relocate (howto
, input_bfd
, input_section
,
2620 contents
, rel
->r_offset
, relocation
,
2625 /* Relocate an FRV ELF section.
2627 The RELOCATE_SECTION function is called by the new ELF backend linker
2628 to handle the relocations for a section.
2630 The relocs are always passed as Rela structures; if the section
2631 actually uses Rel structures, the r_addend field will always be
2634 This function is responsible for adjusting the section contents as
2635 necessary, and (if using Rela relocs and generating a relocatable
2636 output file) adjusting the reloc addend as necessary.
2638 This function does not have to worry about setting the reloc
2639 address or the reloc symbol index.
2641 LOCAL_SYMS is a pointer to the swapped in local symbols.
2643 LOCAL_SECTIONS is an array giving the section in the input file
2644 corresponding to the st_shndx field of each local symbol.
2646 The global hash table entry for the global symbols can be found
2647 via elf_sym_hashes (input_bfd).
2649 When generating relocatable output, this function must handle
2650 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
2651 going to be the section symbol corresponding to the output
2652 section, which means that the addend must be adjusted
2656 elf32_frv_relocate_section (bfd
*output_bfd ATTRIBUTE_UNUSED
,
2657 struct bfd_link_info
*info
,
2659 asection
*input_section
,
2661 Elf_Internal_Rela
*relocs
,
2662 Elf_Internal_Sym
*local_syms
,
2663 asection
**local_sections
)
2665 Elf_Internal_Shdr
*symtab_hdr
;
2666 struct elf_link_hash_entry
**sym_hashes
;
2667 Elf_Internal_Rela
*rel
;
2668 Elf_Internal_Rela
*relend
;
2669 unsigned isec_segment
, got_segment
, plt_segment
, gprel_segment
, tls_segment
,
2671 int silence_segment_error
= !bfd_link_pic (info
);
2674 symtab_hdr
= & elf_tdata (input_bfd
)->symtab_hdr
;
2675 sym_hashes
= elf_sym_hashes (input_bfd
);
2676 relend
= relocs
+ input_section
->reloc_count
;
2678 isec_segment
= _frvfdpic_osec_to_segment (output_bfd
,
2679 input_section
->output_section
);
2680 if (IS_FDPIC (output_bfd
) && frvfdpic_got_section (info
))
2681 got_segment
= _frvfdpic_osec_to_segment (output_bfd
,
2682 frvfdpic_got_section (info
)
2686 if (IS_FDPIC (output_bfd
) && frvfdpic_gotfixup_section (info
))
2687 gprel_segment
= _frvfdpic_osec_to_segment (output_bfd
,
2688 frvfdpic_gotfixup_section (info
)
2692 if (IS_FDPIC (output_bfd
) && frvfdpic_plt_section (info
))
2693 plt_segment
= _frvfdpic_osec_to_segment (output_bfd
,
2694 frvfdpic_plt_section (info
)
2698 if (elf_hash_table (info
)->tls_sec
)
2699 tls_segment
= _frvfdpic_osec_to_segment (output_bfd
,
2700 elf_hash_table (info
)->tls_sec
);
2704 for (rel
= relocs
; rel
< relend
; rel
++)
2706 reloc_howto_type
*howto
;
2707 unsigned long r_symndx
;
2708 Elf_Internal_Sym
*sym
;
2710 struct elf_link_hash_entry
*h
;
2712 bfd_reloc_status_type r
;
2716 struct frvfdpic_relocs_info
*picrel
= NULL
;
2717 bfd_vma orig_addend
= rel
->r_addend
;
2719 r_type
= ELF32_R_TYPE (rel
->r_info
);
2721 if ( r_type
== R_FRV_GNU_VTINHERIT
2722 || r_type
== R_FRV_GNU_VTENTRY
)
2725 r_symndx
= ELF32_R_SYM (rel
->r_info
);
2726 howto
= elf32_frv_howto_table
+ ELF32_R_TYPE (rel
->r_info
);
2731 if (r_symndx
< symtab_hdr
->sh_info
)
2733 sym
= local_syms
+ r_symndx
;
2734 osec
= sec
= local_sections
[r_symndx
];
2735 relocation
= _bfd_elf_rela_local_sym (output_bfd
, sym
, &sec
, rel
);
2737 name
= bfd_elf_string_from_elf_section
2738 (input_bfd
, symtab_hdr
->sh_link
, sym
->st_name
);
2739 if (name
== NULL
|| name
[0] == 0)
2740 name
= bfd_section_name (sec
);
2744 bool warned
, ignored
;
2745 bool unresolved_reloc
;
2747 RELOC_FOR_GLOBAL_SYMBOL (info
, input_bfd
, input_section
, rel
,
2748 r_symndx
, symtab_hdr
, sym_hashes
,
2750 unresolved_reloc
, warned
, ignored
);
2752 name
= h
->root
.root
.string
;
2755 if (sec
!= NULL
&& discarded_section (sec
))
2756 RELOC_AGAINST_DISCARDED_SECTION (info
, input_bfd
, input_section
,
2757 rel
, 1, relend
, howto
, 0, contents
);
2759 if (bfd_link_relocatable (info
))
2762 if (r_type
!= R_FRV_TLSMOFF
2764 && (h
->root
.type
== bfd_link_hash_defined
2765 || h
->root
.type
== bfd_link_hash_defweak
)
2766 && !FRVFDPIC_SYM_LOCAL (info
, h
))
2776 if (! IS_FDPIC (output_bfd
))
2783 case R_FRV_FUNCDESC_GOT12
:
2784 case R_FRV_FUNCDESC_GOTHI
:
2785 case R_FRV_FUNCDESC_GOTLO
:
2786 case R_FRV_GOTOFF12
:
2787 case R_FRV_GOTOFFHI
:
2788 case R_FRV_GOTOFFLO
:
2789 case R_FRV_FUNCDESC_GOTOFF12
:
2790 case R_FRV_FUNCDESC_GOTOFFHI
:
2791 case R_FRV_FUNCDESC_GOTOFFLO
:
2792 case R_FRV_FUNCDESC
:
2793 case R_FRV_FUNCDESC_VALUE
:
2794 case R_FRV_GETTLSOFF
:
2795 case R_FRV_TLSDESC_VALUE
:
2796 case R_FRV_GOTTLSDESC12
:
2797 case R_FRV_GOTTLSDESCHI
:
2798 case R_FRV_GOTTLSDESCLO
:
2799 case R_FRV_TLSMOFF12
:
2800 case R_FRV_TLSMOFFHI
:
2801 case R_FRV_TLSMOFFLO
:
2802 case R_FRV_GOTTLSOFF12
:
2803 case R_FRV_GOTTLSOFFHI
:
2804 case R_FRV_GOTTLSOFFLO
:
2806 case R_FRV_TLSDESC_RELAX
:
2807 case R_FRV_GETTLSOFF_RELAX
:
2808 case R_FRV_TLSOFF_RELAX
:
2810 if ((input_section
->flags
& SEC_ALLOC
) == 0)
2814 picrel
= frvfdpic_relocs_info_for_global (frvfdpic_relocs_info
2815 (info
), input_bfd
, h
,
2816 orig_addend
, INSERT
);
2818 /* In order to find the entry we created before, we must
2819 use the original addend, not the one that may have been
2820 modified by _bfd_elf_rela_local_sym(). */
2821 picrel
= frvfdpic_relocs_info_for_local (frvfdpic_relocs_info
2822 (info
), input_bfd
, r_symndx
,
2823 orig_addend
, INSERT
);
2827 if (!_frvfdpic_emit_got_relocs_plt_entries (picrel
, output_bfd
, info
,
2831 info
->callbacks
->einfo
2832 /* xgettext:c-format */
2833 (_("%H: relocation to `%s+%v'"
2834 " may have caused the error above\n"),
2835 input_bfd
, input_section
, rel
->r_offset
, name
, rel
->r_addend
);
2845 && ! FRVFDPIC_SYM_LOCAL (info
, h
)
2846 && _bfd_elf_section_offset (output_bfd
, info
, input_section
,
2847 rel
->r_offset
) != (bfd_vma
) -1)
2849 info
->callbacks
->einfo
2850 (_("%H: relocation references symbol"
2851 " not defined in the module\n"),
2852 input_bfd
, input_section
, rel
->r_offset
);
2860 case R_FRV_GETTLSOFF
:
2861 case R_FRV_TLSDESC_VALUE
:
2862 case R_FRV_GOTTLSDESC12
:
2863 case R_FRV_GOTTLSDESCHI
:
2864 case R_FRV_GOTTLSDESCLO
:
2865 case R_FRV_TLSMOFF12
:
2866 case R_FRV_TLSMOFFHI
:
2867 case R_FRV_TLSMOFFLO
:
2868 case R_FRV_GOTTLSOFF12
:
2869 case R_FRV_GOTTLSOFFHI
:
2870 case R_FRV_GOTTLSOFFLO
:
2872 case R_FRV_TLSDESC_RELAX
:
2873 case R_FRV_GETTLSOFF_RELAX
:
2874 case R_FRV_TLSOFF_RELAX
:
2876 if (sec
&& (bfd_is_abs_section (sec
) || bfd_is_und_section (sec
)))
2877 relocation
+= tls_biased_base (info
);
2884 /* Try to apply TLS relaxations. */
2889 #define LOCAL_EXEC_P(info, picrel) \
2890 (bfd_link_executable (info) \
2891 && (picrel->symndx != -1 || FRVFDPIC_SYM_LOCAL ((info), (picrel)->d.h)))
2892 #define INITIAL_EXEC_P(info, picrel) \
2893 ((bfd_link_executable (info)|| (info)->flags & DF_STATIC_TLS) \
2894 && (picrel)->tlsoff_entry)
2896 #define IN_RANGE_FOR_OFST12_P(value) \
2897 ((bfd_vma)((value) + 2048) < (bfd_vma)4096)
2898 #define IN_RANGE_FOR_SETLOS_P(value) \
2899 ((bfd_vma)((value) + 32768) < (bfd_vma)65536)
2900 #define TLSMOFF_IN_RANGE_FOR_SETLOS_P(value, info) \
2901 (IN_RANGE_FOR_SETLOS_P ((value) - tls_biased_base (info)))
2903 #define RELAX_GETTLSOFF_LOCAL_EXEC_P(info, picrel, value) \
2904 (LOCAL_EXEC_P ((info), (picrel)) \
2905 && TLSMOFF_IN_RANGE_FOR_SETLOS_P((value), (info)))
2906 #define RELAX_GETTLSOFF_INITIAL_EXEC_P(info, picrel) \
2907 (INITIAL_EXEC_P ((info), (picrel)) \
2908 && IN_RANGE_FOR_OFST12_P ((picrel)->tlsoff_entry))
2910 #define RELAX_TLSDESC_LOCAL_EXEC_P(info, picrel, value) \
2911 (LOCAL_EXEC_P ((info), (picrel)))
2912 #define RELAX_TLSDESC_INITIAL_EXEC_P(info, picrel) \
2913 (INITIAL_EXEC_P ((info), (picrel)))
2915 #define RELAX_GOTTLSOFF_LOCAL_EXEC_P(info, picrel, value) \
2916 (LOCAL_EXEC_P ((info), (picrel)) \
2917 && TLSMOFF_IN_RANGE_FOR_SETLOS_P((value), (info)))
2919 case R_FRV_GETTLSOFF
:
2920 insn
= bfd_get_32 (input_bfd
, contents
+ rel
->r_offset
);
2922 /* Is this a call instruction? */
2923 if ((insn
& (unsigned long)0x01fc0000) != 0x003c0000)
2925 info
->callbacks
->einfo
2926 (_("%H: R_FRV_GETTLSOFF not applied to a call instruction\n"),
2927 input_bfd
, input_section
, rel
->r_offset
);
2931 if (RELAX_GETTLSOFF_LOCAL_EXEC_P (info
, picrel
,
2932 relocation
+ rel
->r_addend
))
2934 /* Replace the call instruction (except the packing bit)
2935 with setlos #tlsmofflo(symbol+offset), gr9. */
2936 insn
&= (unsigned long)0x80000000;
2937 insn
|= (unsigned long)0x12fc0000;
2938 bfd_put_32 (input_bfd
, insn
, contents
+ rel
->r_offset
);
2940 r_type
= R_FRV_TLSMOFFLO
;
2941 howto
= elf32_frv_howto_table
+ r_type
;
2942 rel
->r_info
= ELF32_R_INFO (r_symndx
, r_type
);
2945 else if (RELAX_GETTLSOFF_INITIAL_EXEC_P (info
, picrel
))
2947 /* Replace the call instruction (except the packing bit)
2948 with ldi @(gr15, #gottlsoff12(symbol+addend)), gr9. */
2949 insn
&= (unsigned long)0x80000000;
2950 insn
|= (unsigned long)0x12c8f000;
2951 bfd_put_32 (input_bfd
, insn
, contents
+ rel
->r_offset
);
2953 r_type
= R_FRV_GOTTLSOFF12
;
2954 howto
= elf32_frv_howto_table
+ r_type
;
2955 rel
->r_info
= ELF32_R_INFO (r_symndx
, r_type
);
2960 case R_FRV_GOTTLSDESC12
:
2961 insn
= bfd_get_32 (input_bfd
, contents
+ rel
->r_offset
);
2963 /* Is this an lddi instruction? */
2964 if ((insn
& (unsigned long)0x01fc0000) != 0x00cc0000)
2966 info
->callbacks
->einfo
2967 (_("%H: R_FRV_GOTTLSDESC12"
2968 " not applied to an lddi instruction\n"),
2969 input_bfd
, input_section
, rel
->r_offset
);
2973 if (RELAX_TLSDESC_LOCAL_EXEC_P (info
, picrel
,
2974 relocation
+ rel
->r_addend
)
2975 && TLSMOFF_IN_RANGE_FOR_SETLOS_P (relocation
+ rel
->r_addend
,
2978 /* Replace lddi @(grB, #gottlsdesc12(symbol+offset), grC
2979 with setlos #tlsmofflo(symbol+offset), gr<C+1>.
2980 Preserve the packing bit. */
2981 insn
= (insn
& (unsigned long)0x80000000)
2982 | ((insn
+ (unsigned long)0x02000000)
2983 & (unsigned long)0x7e000000);
2984 insn
|= (unsigned long)0x00fc0000;
2985 bfd_put_32 (input_bfd
, insn
, contents
+ rel
->r_offset
);
2987 r_type
= R_FRV_TLSMOFFLO
;
2988 howto
= elf32_frv_howto_table
+ r_type
;
2989 rel
->r_info
= ELF32_R_INFO (r_symndx
, r_type
);
2992 else if (RELAX_TLSDESC_LOCAL_EXEC_P (info
, picrel
,
2993 relocation
+ rel
->r_addend
))
2995 /* Replace lddi @(grB, #gottlsdesc12(symbol+offset), grC
2996 with sethi #tlsmoffhi(symbol+offset), gr<C+1>.
2997 Preserve the packing bit. */
2998 insn
= (insn
& (unsigned long)0x80000000)
2999 | ((insn
+ (unsigned long)0x02000000)
3000 & (unsigned long)0x7e000000);
3001 insn
|= (unsigned long)0x00f80000;
3002 bfd_put_32 (input_bfd
, insn
, contents
+ rel
->r_offset
);
3004 r_type
= R_FRV_TLSMOFFHI
;
3005 howto
= elf32_frv_howto_table
+ r_type
;
3006 rel
->r_info
= ELF32_R_INFO (r_symndx
, r_type
);
3009 else if (RELAX_TLSDESC_INITIAL_EXEC_P (info
, picrel
))
3011 /* Replace lddi @(grB, #gottlsdesc12(symbol+offset), grC
3012 with ldi @(grB, #gottlsoff12(symbol+offset),
3013 gr<C+1>. Preserve the packing bit. If gottlsoff12
3014 overflows, we'll error out, but that's sort-of ok,
3015 since we'd started with gottlsdesc12, that's actually
3016 more demanding. Compiling with -fPIE instead of
3017 -fpie would fix it; linking with --relax should fix
3019 insn
= (insn
& (unsigned long)0x80cbf000)
3020 | ((insn
+ (unsigned long)0x02000000)
3021 & (unsigned long)0x7e000000);
3022 bfd_put_32 (input_bfd
, insn
, contents
+ rel
->r_offset
);
3024 r_type
= R_FRV_GOTTLSOFF12
;
3025 howto
= elf32_frv_howto_table
+ r_type
;
3026 rel
->r_info
= ELF32_R_INFO (r_symndx
, r_type
);
3031 case R_FRV_GOTTLSDESCHI
:
3032 insn
= bfd_get_32 (input_bfd
, contents
+ rel
->r_offset
);
3034 /* Is this a sethi instruction? */
3035 if ((insn
& (unsigned long)0x01ff0000) != 0x00f80000)
3037 info
->callbacks
->einfo
3038 (_("%H: R_FRV_GOTTLSDESCHI"
3039 " not applied to a sethi instruction\n"),
3040 input_bfd
, input_section
, rel
->r_offset
);
3044 if (RELAX_TLSDESC_LOCAL_EXEC_P (info
, picrel
,
3045 relocation
+ rel
->r_addend
)
3046 || (RELAX_TLSDESC_INITIAL_EXEC_P (info
, picrel
)
3047 && IN_RANGE_FOR_SETLOS_P (picrel
->tlsoff_entry
)))
3049 /* Replace sethi with a nop. Preserve the packing bit. */
3050 insn
&= (unsigned long)0x80000000;
3051 insn
|= (unsigned long)0x00880000;
3052 bfd_put_32 (input_bfd
, insn
, contents
+ rel
->r_offset
);
3054 /* Nothing to relocate. */
3058 else if (RELAX_TLSDESC_INITIAL_EXEC_P (info
, picrel
))
3060 /* Simply decay GOTTLSDESC to GOTTLSOFF. */
3061 r_type
= R_FRV_GOTTLSOFFHI
;
3062 howto
= elf32_frv_howto_table
+ r_type
;
3063 rel
->r_info
= ELF32_R_INFO (r_symndx
, r_type
);
3068 case R_FRV_GOTTLSDESCLO
:
3069 insn
= bfd_get_32 (input_bfd
, contents
+ rel
->r_offset
);
3071 /* Is this a setlo or setlos instruction? */
3072 if ((insn
& (unsigned long)0x01f70000) != 0x00f40000)
3074 info
->callbacks
->einfo
3075 (_("%H: R_FRV_GOTTLSDESCLO"
3076 " not applied to a setlo or setlos instruction\n"),
3077 input_bfd
, input_section
, rel
->r_offset
);
3081 if (RELAX_TLSDESC_LOCAL_EXEC_P (info
, picrel
,
3082 relocation
+ rel
->r_addend
)
3083 || (RELAX_TLSDESC_INITIAL_EXEC_P (info
, picrel
)
3084 && IN_RANGE_FOR_OFST12_P (picrel
->tlsoff_entry
)))
3086 /* Replace setlo/setlos with a nop. Preserve the
3088 insn
&= (unsigned long)0x80000000;
3089 insn
|= (unsigned long)0x00880000;
3090 bfd_put_32 (input_bfd
, insn
, contents
+ rel
->r_offset
);
3092 /* Nothing to relocate. */
3096 else if (RELAX_TLSDESC_INITIAL_EXEC_P (info
, picrel
))
3098 /* If the corresponding sethi (if it exists) decayed
3099 to a nop, make sure this becomes (or already is) a
3100 setlos, not setlo. */
3101 if (IN_RANGE_FOR_SETLOS_P (picrel
->tlsoff_entry
))
3103 insn
|= (unsigned long)0x00080000;
3104 bfd_put_32 (input_bfd
, insn
, contents
+ rel
->r_offset
);
3107 /* Simply decay GOTTLSDESC to GOTTLSOFF. */
3108 r_type
= R_FRV_GOTTLSOFFLO
;
3109 howto
= elf32_frv_howto_table
+ r_type
;
3110 rel
->r_info
= ELF32_R_INFO (r_symndx
, r_type
);
3115 case R_FRV_TLSDESC_RELAX
:
3116 insn
= bfd_get_32 (input_bfd
, contents
+ rel
->r_offset
);
3118 /* Is this an ldd instruction? */
3119 if ((insn
& (unsigned long)0x01fc0fc0) != 0x00080140)
3121 info
->callbacks
->einfo
3122 (_("%H: R_FRV_TLSDESC_RELAX"
3123 " not applied to an ldd instruction\n"),
3124 input_bfd
, input_section
, rel
->r_offset
);
3128 if (RELAX_TLSDESC_LOCAL_EXEC_P (info
, picrel
,
3129 relocation
+ rel
->r_addend
)
3130 && TLSMOFF_IN_RANGE_FOR_SETLOS_P (relocation
+ rel
->r_addend
,
3133 /* Replace ldd #tlsdesc(symbol+offset)@(grB, grA), grC
3134 with setlos #tlsmofflo(symbol+offset), gr<C+1>.
3135 Preserve the packing bit. */
3136 insn
= (insn
& (unsigned long)0x80000000)
3137 | ((insn
+ (unsigned long)0x02000000)
3138 & (unsigned long)0x7e000000);
3139 insn
|= (unsigned long)0x00fc0000;
3140 bfd_put_32 (input_bfd
, insn
, contents
+ rel
->r_offset
);
3142 r_type
= R_FRV_TLSMOFFLO
;
3143 howto
= elf32_frv_howto_table
+ r_type
;
3144 rel
->r_info
= ELF32_R_INFO (r_symndx
, r_type
);
3147 else if (RELAX_TLSDESC_LOCAL_EXEC_P (info
, picrel
,
3148 relocation
+ rel
->r_addend
))
3150 /* Replace ldd #tlsdesc(symbol+offset)@(grB, grA), grC
3151 with sethi #tlsmoffhi(symbol+offset), gr<C+1>.
3152 Preserve the packing bit. */
3153 insn
= (insn
& (unsigned long)0x80000000)
3154 | ((insn
+ (unsigned long)0x02000000)
3155 & (unsigned long)0x7e000000);
3156 insn
|= (unsigned long)0x00f80000;
3157 bfd_put_32 (input_bfd
, insn
, contents
+ rel
->r_offset
);
3159 r_type
= R_FRV_TLSMOFFHI
;
3160 howto
= elf32_frv_howto_table
+ r_type
;
3161 rel
->r_info
= ELF32_R_INFO (r_symndx
, r_type
);
3164 else if (RELAX_TLSDESC_INITIAL_EXEC_P (info
, picrel
)
3165 && IN_RANGE_FOR_OFST12_P (picrel
->tlsoff_entry
))
3167 /* Replace ldd #tlsdesc(symbol+offset)@(grB, grA), grC
3168 with ldi @(grB, #gottlsoff12(symbol+offset), gr<C+1>.
3169 Preserve the packing bit. */
3170 insn
= (insn
& (unsigned long)0x8003f000)
3171 | (unsigned long)0x00c80000
3172 | ((insn
+ (unsigned long)0x02000000)
3173 & (unsigned long)0x7e000000);
3174 bfd_put_32 (input_bfd
, insn
, contents
+ rel
->r_offset
);
3176 r_type
= R_FRV_GOTTLSOFF12
;
3177 howto
= elf32_frv_howto_table
+ r_type
;
3178 rel
->r_info
= ELF32_R_INFO (r_symndx
, r_type
);
3181 else if (RELAX_TLSDESC_INITIAL_EXEC_P (info
, picrel
))
3183 /* Replace ldd #tlsdesc(symbol+offset)@(grB, grA), grC
3184 with ld #tlsoff(symbol+offset)@(grB, grA), gr<C+1>.
3185 Preserve the packing bit. */
3186 insn
= (insn
& (unsigned long)0x81ffffbf)
3187 | ((insn
+ (unsigned long)0x02000000)
3188 & (unsigned long)0x7e000000);
3189 bfd_put_32 (input_bfd
, insn
, contents
+ rel
->r_offset
);
3191 /* #tlsoff(symbol+offset) is just a relaxation
3192 annotation, so there's nothing left to
3199 case R_FRV_GETTLSOFF_RELAX
:
3200 insn
= bfd_get_32 (input_bfd
, contents
+ rel
->r_offset
);
3202 /* Is this a calll or callil instruction? */
3203 if ((insn
& (unsigned long)0x7ff80fc0) != 0x02300000)
3205 info
->callbacks
->einfo
3206 (_("%H: R_FRV_GETTLSOFF_RELAX"
3207 " not applied to a calll instruction\n"),
3208 input_bfd
, input_section
, rel
->r_offset
);
3212 if (RELAX_TLSDESC_LOCAL_EXEC_P (info
, picrel
,
3213 relocation
+ rel
->r_addend
)
3214 && TLSMOFF_IN_RANGE_FOR_SETLOS_P (relocation
+ rel
->r_addend
,
3217 /* Replace calll with a nop. Preserve the packing bit. */
3218 insn
&= (unsigned long)0x80000000;
3219 insn
|= (unsigned long)0x00880000;
3220 bfd_put_32 (input_bfd
, insn
, contents
+ rel
->r_offset
);
3222 /* Nothing to relocate. */
3226 else if (RELAX_TLSDESC_LOCAL_EXEC_P (info
, picrel
,
3227 relocation
+ rel
->r_addend
))
3229 /* Replace calll with setlo #tlsmofflo(symbol+offset), gr9.
3230 Preserve the packing bit. */
3231 insn
&= (unsigned long)0x80000000;
3232 insn
|= (unsigned long)0x12f40000;
3233 bfd_put_32 (input_bfd
, insn
, contents
+ rel
->r_offset
);
3235 r_type
= R_FRV_TLSMOFFLO
;
3236 howto
= elf32_frv_howto_table
+ r_type
;
3237 rel
->r_info
= ELF32_R_INFO (r_symndx
, r_type
);
3240 else if (RELAX_TLSDESC_INITIAL_EXEC_P (info
, picrel
))
3242 /* Replace calll with a nop. Preserve the packing bit. */
3243 insn
&= (unsigned long)0x80000000;
3244 insn
|= (unsigned long)0x00880000;
3245 bfd_put_32 (input_bfd
, insn
, contents
+ rel
->r_offset
);
3247 /* Nothing to relocate. */
3253 case R_FRV_GOTTLSOFF12
:
3254 insn
= bfd_get_32 (input_bfd
, contents
+ rel
->r_offset
);
3256 /* Is this an ldi instruction? */
3257 if ((insn
& (unsigned long)0x01fc0000) != 0x00c80000)
3259 info
->callbacks
->einfo
3260 (_("%H: R_FRV_GOTTLSOFF12"
3261 " not applied to an ldi instruction\n"),
3262 input_bfd
, input_section
, rel
->r_offset
);
3266 if (RELAX_GOTTLSOFF_LOCAL_EXEC_P (info
, picrel
,
3267 relocation
+ rel
->r_addend
))
3269 /* Replace ldi @(grB, #gottlsoff12(symbol+offset), grC
3270 with setlos #tlsmofflo(symbol+offset), grC.
3271 Preserve the packing bit. */
3272 insn
&= (unsigned long)0xfe000000;
3273 insn
|= (unsigned long)0x00fc0000;
3274 bfd_put_32 (input_bfd
, insn
, contents
+ rel
->r_offset
);
3276 r_type
= R_FRV_TLSMOFFLO
;
3277 howto
= elf32_frv_howto_table
+ r_type
;
3278 rel
->r_info
= ELF32_R_INFO (r_symndx
, r_type
);
3283 case R_FRV_GOTTLSOFFHI
:
3284 insn
= bfd_get_32 (input_bfd
, contents
+ rel
->r_offset
);
3286 /* Is this a sethi instruction? */
3287 if ((insn
& (unsigned long)0x01ff0000) != 0x00f80000)
3289 info
->callbacks
->einfo
3290 (_("%H: R_FRV_GOTTLSOFFHI"
3291 " not applied to a sethi instruction\n"),
3292 input_bfd
, input_section
, rel
->r_offset
);
3296 if (RELAX_GOTTLSOFF_LOCAL_EXEC_P (info
, picrel
,
3297 relocation
+ rel
->r_addend
)
3298 || (RELAX_TLSDESC_INITIAL_EXEC_P (info
, picrel
)
3299 && IN_RANGE_FOR_OFST12_P (picrel
->tlsoff_entry
)))
3301 /* Replace sethi with a nop. Preserve the packing bit. */
3302 insn
&= (unsigned long)0x80000000;
3303 insn
|= (unsigned long)0x00880000;
3304 bfd_put_32 (input_bfd
, insn
, contents
+ rel
->r_offset
);
3306 /* Nothing to relocate. */
3312 case R_FRV_GOTTLSOFFLO
:
3313 insn
= bfd_get_32 (input_bfd
, contents
+ rel
->r_offset
);
3315 /* Is this a setlo or setlos instruction? */
3316 if ((insn
& (unsigned long)0x01f70000) != 0x00f40000)
3318 info
->callbacks
->einfo
3319 (_("%H: R_FRV_GOTTLSOFFLO"
3320 " not applied to a setlo or setlos instruction\n"),
3321 input_bfd
, input_section
, rel
->r_offset
);
3325 if (RELAX_GOTTLSOFF_LOCAL_EXEC_P (info
, picrel
,
3326 relocation
+ rel
->r_addend
)
3327 || (RELAX_TLSDESC_INITIAL_EXEC_P (info
, picrel
)
3328 && IN_RANGE_FOR_OFST12_P (picrel
->tlsoff_entry
)))
3330 /* Replace setlo/setlos with a nop. Preserve the
3332 insn
&= (unsigned long)0x80000000;
3333 insn
|= (unsigned long)0x00880000;
3334 bfd_put_32 (input_bfd
, insn
, contents
+ rel
->r_offset
);
3336 /* Nothing to relocate. */
3342 case R_FRV_TLSOFF_RELAX
:
3343 insn
= bfd_get_32 (input_bfd
, contents
+ rel
->r_offset
);
3345 /* Is this an ld instruction? */
3346 if ((insn
& (unsigned long)0x01fc0fc0) != 0x00080100)
3348 info
->callbacks
->einfo
3349 (_("%H: R_FRV_TLSOFF_RELAX"
3350 " not applied to an ld instruction\n"),
3351 input_bfd
, input_section
, rel
->r_offset
);
3355 if (RELAX_GOTTLSOFF_LOCAL_EXEC_P (info
, picrel
,
3356 relocation
+ rel
->r_addend
))
3358 /* Replace ld #gottlsoff(symbol+offset)@(grB, grA), grC
3359 with setlos #tlsmofflo(symbol+offset), grC.
3360 Preserve the packing bit. */
3361 insn
&= (unsigned long)0xfe000000;
3362 insn
|= (unsigned long)0x00fc0000;
3363 bfd_put_32 (input_bfd
, insn
, contents
+ rel
->r_offset
);
3365 r_type
= R_FRV_TLSMOFFLO
;
3366 howto
= elf32_frv_howto_table
+ r_type
;
3367 rel
->r_info
= ELF32_R_INFO (r_symndx
, r_type
);
3370 else if (RELAX_TLSDESC_INITIAL_EXEC_P (info
, picrel
)
3371 && IN_RANGE_FOR_OFST12_P (picrel
->tlsoff_entry
))
3373 /* Replace ld #tlsoff(symbol+offset)@(grB, grA), grC
3374 with ldi @(grB, #gottlsoff12(symbol+offset), grC.
3375 Preserve the packing bit. */
3376 insn
= (insn
& (unsigned long)0xfe03f000)
3377 | (unsigned long)0x00c80000;
3378 bfd_put_32 (input_bfd
, insn
, contents
+ rel
->r_offset
);
3380 r_type
= R_FRV_GOTTLSOFF12
;
3381 howto
= elf32_frv_howto_table
+ r_type
;
3382 rel
->r_info
= ELF32_R_INFO (r_symndx
, r_type
);
3387 case R_FRV_TLSMOFFHI
:
3388 insn
= bfd_get_32 (input_bfd
, contents
+ rel
->r_offset
);
3390 /* Is this a sethi instruction? */
3391 if ((insn
& (unsigned long)0x01ff0000) != 0x00f80000)
3393 info
->callbacks
->einfo
3394 (_("%H: R_FRV_TLSMOFFHI"
3395 " not applied to a sethi instruction\n"),
3396 input_bfd
, input_section
, rel
->r_offset
);
3400 if (TLSMOFF_IN_RANGE_FOR_SETLOS_P (relocation
+ rel
->r_addend
,
3403 /* Replace sethi with a nop. Preserve the packing bit. */
3404 insn
&= (unsigned long)0x80000000;
3405 insn
|= (unsigned long)0x00880000;
3406 bfd_put_32 (input_bfd
, insn
, contents
+ rel
->r_offset
);
3408 /* Nothing to relocate. */
3414 case R_FRV_TLSMOFFLO
:
3415 insn
= bfd_get_32 (input_bfd
, contents
+ rel
->r_offset
);
3417 /* Is this a setlo or setlos instruction? */
3418 if ((insn
& (unsigned long)0x01f70000) != 0x00f40000)
3420 info
->callbacks
->einfo
3421 (_("R_FRV_TLSMOFFLO"
3422 " not applied to a setlo or setlos instruction\n"),
3423 input_bfd
, input_section
, rel
->r_offset
);
3427 if (TLSMOFF_IN_RANGE_FOR_SETLOS_P (relocation
+ rel
->r_addend
,
3429 /* If the corresponding sethi (if it exists) decayed
3430 to a nop, make sure this becomes (or already is) a
3431 setlos, not setlo. */
3433 insn
|= (unsigned long)0x00080000;
3434 bfd_put_32 (input_bfd
, insn
, contents
+ rel
->r_offset
);
3440 There's nothing to relax in these:
3456 check_segment
[0] = isec_segment
;
3457 if (! IS_FDPIC (output_bfd
))
3458 check_segment
[1] = isec_segment
;
3459 else if (picrel
->plt
)
3461 relocation
= frvfdpic_plt_section (info
)->output_section
->vma
3462 + frvfdpic_plt_section (info
)->output_offset
3463 + picrel
->plt_entry
;
3464 check_segment
[1] = plt_segment
;
3466 /* We don't want to warn on calls to undefined weak symbols,
3467 as calls to them must be protected by non-NULL tests
3468 anyway, and unprotected calls would invoke undefined
3470 else if (picrel
->symndx
== -1
3471 && picrel
->d
.h
->root
.type
== bfd_link_hash_undefweak
)
3472 check_segment
[1] = check_segment
[0];
3474 check_segment
[1] = sec
3475 ? _frvfdpic_osec_to_segment (output_bfd
, sec
->output_section
)
3482 relocation
= picrel
->got_entry
;
3483 check_segment
[0] = check_segment
[1] = got_segment
;
3486 case R_FRV_FUNCDESC_GOT12
:
3487 case R_FRV_FUNCDESC_GOTHI
:
3488 case R_FRV_FUNCDESC_GOTLO
:
3489 relocation
= picrel
->fdgot_entry
;
3490 check_segment
[0] = check_segment
[1] = got_segment
;
3493 case R_FRV_GOTOFFHI
:
3494 case R_FRV_GOTOFF12
:
3495 case R_FRV_GOTOFFLO
:
3496 relocation
-= frvfdpic_got_section (info
)->output_section
->vma
3497 + frvfdpic_got_section (info
)->output_offset
3498 + frvfdpic_got_initial_offset (info
);
3499 check_segment
[0] = got_segment
;
3500 check_segment
[1] = sec
3501 ? _frvfdpic_osec_to_segment (output_bfd
, sec
->output_section
)
3505 case R_FRV_FUNCDESC_GOTOFF12
:
3506 case R_FRV_FUNCDESC_GOTOFFHI
:
3507 case R_FRV_FUNCDESC_GOTOFFLO
:
3508 relocation
= picrel
->fd_entry
;
3509 check_segment
[0] = check_segment
[1] = got_segment
;
3512 case R_FRV_FUNCDESC
:
3515 bfd_vma addend
= rel
->r_addend
;
3517 if (! (h
&& h
->root
.type
== bfd_link_hash_undefweak
3518 && FRVFDPIC_SYM_LOCAL (info
, h
)))
3520 /* If the symbol is dynamic and there may be dynamic
3521 symbol resolution because we are or are linked with a
3522 shared library, emit a FUNCDESC relocation such that
3523 the dynamic linker will allocate the function
3524 descriptor. If the symbol needs a non-local function
3525 descriptor but binds locally (e.g., its visibility is
3526 protected, emit a dynamic relocation decayed to
3528 if (h
&& ! FRVFDPIC_FUNCDESC_LOCAL (info
, h
)
3529 && FRVFDPIC_SYM_LOCAL (info
, h
)
3530 && !bfd_link_pde (info
))
3532 dynindx
= elf_section_data (h
->root
.u
.def
.section
3533 ->output_section
)->dynindx
;
3534 addend
+= h
->root
.u
.def
.section
->output_offset
3535 + h
->root
.u
.def
.value
;
3537 else if (h
&& ! FRVFDPIC_FUNCDESC_LOCAL (info
, h
))
3541 info
->callbacks
->einfo
3542 (_("%H: %s references dynamic symbol"
3543 " with nonzero addend\n"),
3544 input_bfd
, input_section
, rel
->r_offset
,
3548 dynindx
= h
->dynindx
;
3552 /* Otherwise, we know we have a private function
3553 descriptor, so reference it directly. */
3554 BFD_ASSERT (picrel
->privfd
);
3556 dynindx
= elf_section_data (frvfdpic_got_section (info
)
3557 ->output_section
)->dynindx
;
3558 addend
= frvfdpic_got_section (info
)->output_offset
3559 + frvfdpic_got_initial_offset (info
)
3563 /* If there is room for dynamic symbol resolution, emit
3564 the dynamic relocation. However, if we're linking an
3565 executable at a fixed location, we won't have emitted a
3566 dynamic symbol entry for the got section, so idx will
3567 be zero, which means we can and should compute the
3568 address of the private descriptor ourselves. */
3569 if (bfd_link_pde (info
)
3570 && (!h
|| FRVFDPIC_FUNCDESC_LOCAL (info
, h
)))
3572 addend
+= frvfdpic_got_section (info
)->output_section
->vma
;
3573 if ((bfd_section_flags (input_section
->output_section
)
3574 & (SEC_ALLOC
| SEC_LOAD
)) == (SEC_ALLOC
| SEC_LOAD
))
3578 if (_frvfdpic_osec_readonly_p (output_bfd
,
3582 info
->callbacks
->einfo
3583 (_("%H: cannot emit fixups"
3584 " in read-only section\n"),
3585 input_bfd
, input_section
, rel
->r_offset
);
3589 offset
= _bfd_elf_section_offset
3591 input_section
, rel
->r_offset
);
3593 if (offset
!= (bfd_vma
)-1)
3594 _frvfdpic_add_rofixup (output_bfd
,
3595 frvfdpic_gotfixup_section
3597 offset
+ input_section
3598 ->output_section
->vma
3599 + input_section
->output_offset
,
3603 else if ((bfd_section_flags (input_section
->output_section
)
3604 & (SEC_ALLOC
| SEC_LOAD
)) == (SEC_ALLOC
| SEC_LOAD
))
3608 if (_frvfdpic_osec_readonly_p (output_bfd
,
3612 info
->callbacks
->einfo
3613 (_("%H: cannot emit dynamic relocations"
3614 " in read-only section\n"),
3615 input_bfd
, input_section
, rel
->r_offset
);
3619 offset
= _bfd_elf_section_offset
3621 input_section
, rel
->r_offset
);
3623 if (offset
!= (bfd_vma
)-1)
3624 _frvfdpic_add_dyn_reloc (output_bfd
,
3625 frvfdpic_gotrel_section (info
),
3626 offset
+ input_section
3627 ->output_section
->vma
3628 + input_section
->output_offset
,
3629 r_type
, dynindx
, addend
, picrel
);
3632 addend
+= frvfdpic_got_section (info
)->output_section
->vma
;
3635 /* We want the addend in-place because dynamic
3636 relocations are REL. Setting relocation to it should
3637 arrange for it to be installed. */
3638 relocation
= addend
- rel
->r_addend
;
3640 check_segment
[0] = check_segment
[1] = got_segment
;
3644 if (! IS_FDPIC (output_bfd
))
3646 check_segment
[0] = check_segment
[1] = -1;
3650 case R_FRV_FUNCDESC_VALUE
:
3653 bfd_vma addend
= rel
->r_addend
;
3655 /* If the symbol is dynamic but binds locally, use
3657 if (h
&& ! FRVFDPIC_SYM_LOCAL (info
, h
))
3659 if (addend
&& r_type
== R_FRV_FUNCDESC_VALUE
)
3661 info
->callbacks
->einfo
3662 (_("%H: %s references dynamic symbol"
3663 " with nonzero addend\n"),
3664 input_bfd
, input_section
, rel
->r_offset
,
3665 "R_FRV_FUNCDESC_VALUE");
3668 dynindx
= h
->dynindx
;
3673 addend
+= h
->root
.u
.def
.value
;
3675 addend
+= sym
->st_value
;
3677 addend
+= osec
->output_offset
;
3678 if (osec
&& osec
->output_section
3679 && ! bfd_is_abs_section (osec
->output_section
)
3680 && ! bfd_is_und_section (osec
->output_section
))
3681 dynindx
= elf_section_data (osec
->output_section
)->dynindx
;
3686 /* If we're linking an executable at a fixed address, we
3687 can omit the dynamic relocation as long as the symbol
3688 is defined in the current link unit (which is implied
3689 by its output section not being NULL). */
3690 if (bfd_link_pde (info
)
3691 && (!h
|| FRVFDPIC_SYM_LOCAL (info
, h
)))
3694 addend
+= osec
->output_section
->vma
;
3695 if (IS_FDPIC (input_bfd
)
3696 && (bfd_section_flags (input_section
->output_section
)
3697 & (SEC_ALLOC
| SEC_LOAD
)) == (SEC_ALLOC
| SEC_LOAD
))
3699 if (_frvfdpic_osec_readonly_p (output_bfd
,
3703 info
->callbacks
->einfo
3704 (_("%H: cannot emit fixups in read-only section\n"),
3705 input_bfd
, input_section
, rel
->r_offset
);
3708 if (!h
|| h
->root
.type
!= bfd_link_hash_undefweak
)
3710 bfd_vma offset
= _bfd_elf_section_offset
3712 input_section
, rel
->r_offset
);
3714 if (offset
!= (bfd_vma
)-1)
3716 _frvfdpic_add_rofixup (output_bfd
,
3717 frvfdpic_gotfixup_section
3719 offset
+ input_section
3720 ->output_section
->vma
3721 + input_section
->output_offset
,
3723 if (r_type
== R_FRV_FUNCDESC_VALUE
)
3724 _frvfdpic_add_rofixup
3726 frvfdpic_gotfixup_section (info
),
3728 + input_section
->output_section
->vma
3729 + input_section
->output_offset
+ 4, picrel
);
3736 if ((bfd_section_flags (input_section
->output_section
)
3737 & (SEC_ALLOC
| SEC_LOAD
)) == (SEC_ALLOC
| SEC_LOAD
))
3741 if (_frvfdpic_osec_readonly_p (output_bfd
,
3745 info
->callbacks
->einfo
3746 (_("%H: cannot emit dynamic relocations"
3747 " in read-only section\n"),
3748 input_bfd
, input_section
, rel
->r_offset
);
3752 offset
= _bfd_elf_section_offset
3754 input_section
, rel
->r_offset
);
3756 if (offset
!= (bfd_vma
)-1)
3757 _frvfdpic_add_dyn_reloc (output_bfd
,
3758 frvfdpic_gotrel_section (info
),
3759 offset
+ input_section
3760 ->output_section
->vma
3761 + input_section
->output_offset
,
3762 r_type
, dynindx
, addend
, picrel
);
3765 addend
+= osec
->output_section
->vma
;
3766 /* We want the addend in-place because dynamic
3767 relocations are REL. Setting relocation to it
3768 should arrange for it to be installed. */
3769 relocation
= addend
- rel
->r_addend
;
3772 if (r_type
== R_FRV_FUNCDESC_VALUE
)
3774 /* If we've omitted the dynamic relocation, just emit
3775 the fixed addresses of the symbol and of the local
3777 if (bfd_link_pde (info
)
3778 && (!h
|| FRVFDPIC_SYM_LOCAL (info
, h
)))
3779 bfd_put_32 (output_bfd
,
3780 frvfdpic_got_section (info
)->output_section
->vma
3781 + frvfdpic_got_section (info
)->output_offset
3782 + frvfdpic_got_initial_offset (info
),
3783 contents
+ rel
->r_offset
+ 4);
3785 /* A function descriptor used for lazy or local
3786 resolving is initialized such that its high word
3787 contains the output section index in which the
3788 PLT entries are located, and the low word
3789 contains the offset of the lazy PLT entry entry
3790 point into that section. */
3791 bfd_put_32 (output_bfd
,
3792 h
&& ! FRVFDPIC_SYM_LOCAL (info
, h
)
3794 : _frvfdpic_osec_to_segment (output_bfd
,
3797 contents
+ rel
->r_offset
+ 4);
3800 check_segment
[0] = check_segment
[1] = got_segment
;
3804 case R_FRV_GPRELU12
:
3808 check_segment
[0] = gprel_segment
;
3809 check_segment
[1] = sec
3810 ? _frvfdpic_osec_to_segment (output_bfd
, sec
->output_section
)
3814 case R_FRV_GETTLSOFF
:
3815 relocation
= frvfdpic_plt_section (info
)->output_section
->vma
3816 + frvfdpic_plt_section (info
)->output_offset
3817 + picrel
->tlsplt_entry
;
3818 BFD_ASSERT (picrel
->tlsplt_entry
!= (bfd_vma
)-1
3819 && picrel
->tlsdesc_entry
);
3820 check_segment
[0] = isec_segment
;
3821 check_segment
[1] = plt_segment
;
3824 case R_FRV_GOTTLSDESC12
:
3825 case R_FRV_GOTTLSDESCHI
:
3826 case R_FRV_GOTTLSDESCLO
:
3827 BFD_ASSERT (picrel
->tlsdesc_entry
);
3828 relocation
= picrel
->tlsdesc_entry
;
3829 check_segment
[0] = tls_segment
;
3830 check_segment
[1] = sec
3831 && ! bfd_is_abs_section (sec
)
3832 && ! bfd_is_und_section (sec
)
3833 ? _frvfdpic_osec_to_segment (output_bfd
, sec
->output_section
)
3837 case R_FRV_TLSMOFF12
:
3838 case R_FRV_TLSMOFFHI
:
3839 case R_FRV_TLSMOFFLO
:
3841 check_segment
[0] = tls_segment
;
3843 check_segment
[1] = -1;
3844 else if (bfd_is_abs_section (sec
)
3845 || bfd_is_und_section (sec
))
3848 check_segment
[1] = tls_segment
;
3850 else if (sec
->output_section
)
3852 relocation
-= tls_biased_base (info
);
3854 _frvfdpic_osec_to_segment (output_bfd
, sec
->output_section
);
3857 check_segment
[1] = -1;
3860 case R_FRV_GOTTLSOFF12
:
3861 case R_FRV_GOTTLSOFFHI
:
3862 case R_FRV_GOTTLSOFFLO
:
3863 BFD_ASSERT (picrel
->tlsoff_entry
);
3864 relocation
= picrel
->tlsoff_entry
;
3865 check_segment
[0] = tls_segment
;
3866 check_segment
[1] = sec
3867 && ! bfd_is_abs_section (sec
)
3868 && ! bfd_is_und_section (sec
)
3869 ? _frvfdpic_osec_to_segment (output_bfd
, sec
->output_section
)
3873 case R_FRV_TLSDESC_VALUE
:
3875 /* These shouldn't be present in input object files. */
3876 check_segment
[0] = check_segment
[1] = isec_segment
;
3879 case R_FRV_TLSDESC_RELAX
:
3880 case R_FRV_GETTLSOFF_RELAX
:
3881 case R_FRV_TLSOFF_RELAX
:
3882 /* These are just annotations for relaxation, nothing to do
3887 check_segment
[0] = isec_segment
;
3888 check_segment
[1] = sec
3889 ? _frvfdpic_osec_to_segment (output_bfd
, sec
->output_section
)
3894 if (check_segment
[0] != check_segment
[1] && IS_FDPIC (output_bfd
))
3896 /* If you take this out, remove the #error from fdpic-static-6.d
3897 in the ld testsuite. */
3898 /* This helps catch problems in GCC while we can't do more
3899 than static linking. The idea is to test whether the
3900 input file basename is crt0.o only once. */
3901 if (silence_segment_error
== 1)
3902 silence_segment_error
=
3903 (strlen (bfd_get_filename (input_bfd
)) == 6
3904 && filename_cmp (bfd_get_filename (input_bfd
), "crt0.o") == 0)
3905 || (strlen (bfd_get_filename (input_bfd
)) > 6
3906 && filename_cmp (bfd_get_filename (input_bfd
)
3907 + strlen (bfd_get_filename (input_bfd
)) - 7,
3910 if (!silence_segment_error
3911 /* We don't want duplicate errors for undefined
3913 && !(picrel
&& picrel
->symndx
== -1
3914 && picrel
->d
.h
->root
.type
== bfd_link_hash_undefined
))
3916 info
->callbacks
->einfo
3917 /* xgettext:c-format */
3918 (_("%H: reloc against `%s' references a different segment\n"),
3919 input_bfd
, input_section
, rel
->r_offset
, name
);
3921 if (!silence_segment_error
&& bfd_link_pic (info
))
3923 elf_elfheader (output_bfd
)->e_flags
|= EF_FRV_PIC
;
3928 case R_FRV_GOTOFFHI
:
3929 case R_FRV_TLSMOFFHI
:
3930 /* We need the addend to be applied before we shift the
3932 relocation
+= rel
->r_addend
;
3935 case R_FRV_FUNCDESC_GOTHI
:
3936 case R_FRV_FUNCDESC_GOTOFFHI
:
3937 case R_FRV_GOTTLSOFFHI
:
3938 case R_FRV_GOTTLSDESCHI
:
3943 case R_FRV_FUNCDESC_GOTLO
:
3944 case R_FRV_GOTOFFLO
:
3945 case R_FRV_FUNCDESC_GOTOFFLO
:
3946 case R_FRV_GOTTLSOFFLO
:
3947 case R_FRV_GOTTLSDESCLO
:
3948 case R_FRV_TLSMOFFLO
:
3949 relocation
&= 0xffff;
3959 if (! IS_FDPIC (output_bfd
) || ! picrel
->plt
)
3963 /* When referencing a GOT entry, a function descriptor or a
3964 PLT, we don't want the addend to apply to the reference,
3965 but rather to the referenced symbol. The actual entry
3966 will have already been created taking the addend into
3967 account, so cancel it out here. */
3971 case R_FRV_FUNCDESC_GOT12
:
3972 case R_FRV_FUNCDESC_GOTHI
:
3973 case R_FRV_FUNCDESC_GOTLO
:
3974 case R_FRV_FUNCDESC_GOTOFF12
:
3975 case R_FRV_FUNCDESC_GOTOFFHI
:
3976 case R_FRV_FUNCDESC_GOTOFFLO
:
3977 case R_FRV_GETTLSOFF
:
3978 case R_FRV_GOTTLSDESC12
:
3979 case R_FRV_GOTTLSDESCHI
:
3980 case R_FRV_GOTTLSDESCLO
:
3981 case R_FRV_GOTTLSOFF12
:
3982 case R_FRV_GOTTLSOFFHI
:
3983 case R_FRV_GOTTLSOFFLO
:
3984 /* Note that we only want GOTOFFHI, not GOTOFFLO or GOTOFF12
3985 here, since we do want to apply the addend to the others.
3986 Note that we've applied the addend to GOTOFFHI before we
3987 shifted it right. */
3988 case R_FRV_GOTOFFHI
:
3989 case R_FRV_TLSMOFFHI
:
3990 relocation
-= rel
->r_addend
;
3997 if (r_type
== R_FRV_HI16
)
3998 r
= elf32_frv_relocate_hi16 (input_bfd
, rel
, contents
, relocation
);
4000 else if (r_type
== R_FRV_LO16
)
4001 r
= elf32_frv_relocate_lo16 (input_bfd
, rel
, contents
, relocation
);
4003 else if (r_type
== R_FRV_LABEL24
|| r_type
== R_FRV_GETTLSOFF
)
4004 r
= elf32_frv_relocate_label24 (input_bfd
, input_section
, rel
,
4005 contents
, relocation
);
4007 else if (r_type
== R_FRV_GPREL12
)
4008 r
= elf32_frv_relocate_gprel12 (info
, input_bfd
, input_section
, rel
,
4009 contents
, relocation
);
4011 else if (r_type
== R_FRV_GPRELU12
)
4012 r
= elf32_frv_relocate_gprelu12 (info
, input_bfd
, input_section
, rel
,
4013 contents
, relocation
);
4015 else if (r_type
== R_FRV_GPRELLO
)
4016 r
= elf32_frv_relocate_gprello (info
, input_bfd
, input_section
, rel
,
4017 contents
, relocation
);
4019 else if (r_type
== R_FRV_GPRELHI
)
4020 r
= elf32_frv_relocate_gprelhi (info
, input_bfd
, input_section
, rel
,
4021 contents
, relocation
);
4023 else if (r_type
== R_FRV_TLSOFF
4024 || r_type
== R_FRV_TLSDESC_VALUE
)
4025 r
= bfd_reloc_notsupported
;
4028 r
= frv_final_link_relocate (howto
, input_bfd
, input_section
, contents
,
4031 if (r
!= bfd_reloc_ok
)
4033 const char * msg
= (const char *) NULL
;
4037 case bfd_reloc_overflow
:
4038 (*info
->callbacks
->reloc_overflow
)
4039 (info
, (h
? &h
->root
: NULL
), name
, howto
->name
,
4040 (bfd_vma
) 0, input_bfd
, input_section
, rel
->r_offset
);
4043 case bfd_reloc_undefined
:
4044 (*info
->callbacks
->undefined_symbol
)
4045 (info
, name
, input_bfd
, input_section
, rel
->r_offset
, true);
4048 case bfd_reloc_outofrange
:
4049 msg
= _("internal error: out of range error");
4052 case bfd_reloc_notsupported
:
4053 msg
= _("internal error: unsupported relocation error");
4056 case bfd_reloc_dangerous
:
4057 msg
= _("internal error: dangerous relocation");
4061 msg
= _("internal error: unknown error");
4067 info
->callbacks
->einfo
4068 /* xgettext:c-format */
4069 (_("%H: reloc against `%s': %s\n"),
4070 input_bfd
, input_section
, rel
->r_offset
, name
, msg
);
4079 /* Return the section that should be marked against GC for a given
4083 elf32_frv_gc_mark_hook (asection
*sec
,
4084 struct bfd_link_info
*info
,
4085 Elf_Internal_Rela
*rel
,
4086 struct elf_link_hash_entry
*h
,
4087 Elf_Internal_Sym
*sym
)
4090 switch (ELF32_R_TYPE (rel
->r_info
))
4092 case R_FRV_GNU_VTINHERIT
:
4093 case R_FRV_GNU_VTENTRY
:
4097 return _bfd_elf_gc_mark_hook (sec
, info
, rel
, h
, sym
);
4100 /* Hook called by the linker routine which adds symbols from an object
4101 file. We use it to put .comm items in .scomm, and not .comm. */
4104 elf32_frv_add_symbol_hook (bfd
*abfd
,
4105 struct bfd_link_info
*info
,
4106 Elf_Internal_Sym
*sym
,
4107 const char **namep ATTRIBUTE_UNUSED
,
4108 flagword
*flagsp ATTRIBUTE_UNUSED
,
4112 if (sym
->st_shndx
== SHN_COMMON
4113 && !bfd_link_relocatable (info
)
4114 && (int)sym
->st_size
<= (int)bfd_get_gp_size (abfd
))
4116 /* Common symbols less than or equal to -G nn bytes are
4117 automatically put into .sbss. */
4119 asection
*scomm
= bfd_get_section_by_name (abfd
, ".scommon");
4123 scomm
= bfd_make_section_with_flags (abfd
, ".scommon",
4127 | SEC_LINKER_CREATED
));
4133 *valp
= sym
->st_size
;
4139 /* We need dynamic symbols for every section, since segments can
4140 relocate independently. */
4142 _frvfdpic_link_omit_section_dynsym (bfd
*output_bfd ATTRIBUTE_UNUSED
,
4143 struct bfd_link_info
*info
4145 asection
*p ATTRIBUTE_UNUSED
)
4147 switch (elf_section_data (p
)->this_hdr
.sh_type
)
4151 /* If sh_type is yet undecided, assume it could be
4152 SHT_PROGBITS/SHT_NOBITS. */
4156 /* There shouldn't be section relative relocations
4157 against any other section. */
4163 /* Create a .got section, as well as its additional info field. This
4164 is almost entirely copied from
4165 elflink.c:_bfd_elf_create_got_section(). */
4168 _frv_create_got_section (bfd
*abfd
, struct bfd_link_info
*info
)
4170 flagword flags
, pltflags
;
4172 struct elf_link_hash_entry
*h
;
4173 struct bfd_link_hash_entry
*bh
;
4174 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
4178 /* This function may be called more than once. */
4179 s
= elf_hash_table (info
)->sgot
;
4183 /* Machine specific: although pointers are 32-bits wide, we want the
4184 GOT to be aligned to a 64-bit boundary, such that function
4185 descriptors in it can be accessed with 64-bit loads and
4189 flags
= (SEC_ALLOC
| SEC_LOAD
| SEC_HAS_CONTENTS
| SEC_IN_MEMORY
4190 | SEC_LINKER_CREATED
);
4193 s
= bfd_make_section_anyway_with_flags (abfd
, ".got", flags
);
4194 elf_hash_table (info
)->sgot
= s
;
4196 || !bfd_set_section_alignment (s
, ptralign
))
4199 if (bed
->want_got_sym
)
4201 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the .got
4202 (or .got.plt) section. We don't do this in the linker script
4203 because we don't want to define the symbol if we are not creating
4204 a global offset table. */
4205 h
= _bfd_elf_define_linkage_sym (abfd
, info
, s
, "_GLOBAL_OFFSET_TABLE_");
4206 elf_hash_table (info
)->hgot
= h
;
4210 /* Machine-specific: we want the symbol for executables as
4212 if (! bfd_elf_link_record_dynamic_symbol (info
, h
))
4216 /* The first bit of the global offset table is the header. */
4217 s
->size
+= bed
->got_header_size
;
4219 /* This is the machine-specific part. Create and initialize section
4220 data for the got. */
4221 if (IS_FDPIC (abfd
))
4223 frvfdpic_relocs_info (info
) = htab_try_create (1,
4224 frvfdpic_relocs_info_hash
,
4225 frvfdpic_relocs_info_eq
,
4227 if (! frvfdpic_relocs_info (info
))
4230 s
= bfd_make_section_anyway_with_flags (abfd
, ".rel.got",
4231 (flags
| SEC_READONLY
));
4232 elf_hash_table (info
)->srelgot
= s
;
4234 || !bfd_set_section_alignment (s
, 2))
4237 /* Machine-specific. */
4238 s
= bfd_make_section_anyway_with_flags (abfd
, ".rofixup",
4239 (flags
| SEC_READONLY
));
4241 || !bfd_set_section_alignment (s
, 2))
4244 frvfdpic_gotfixup_section (info
) = s
;
4251 flags
= BSF_GLOBAL
| BSF_WEAK
;
4254 /* Define _gp in .rofixup, for FDPIC, or .got otherwise. If it
4255 turns out that we're linking with a different linker script, the
4256 linker script will override it. */
4258 if (!(_bfd_generic_link_add_one_symbol
4259 (info
, abfd
, "_gp", flags
, s
, offset
, (const char *) NULL
, false,
4260 bed
->collect
, &bh
)))
4262 h
= (struct elf_link_hash_entry
*) bh
;
4264 h
->type
= STT_OBJECT
;
4265 /* h->other = STV_HIDDEN; */ /* Should we? */
4267 /* Machine-specific: we want the symbol for executables as well. */
4268 if (IS_FDPIC (abfd
) && ! bfd_elf_link_record_dynamic_symbol (info
, h
))
4271 if (!IS_FDPIC (abfd
))
4274 /* FDPIC supports Thread Local Storage, and this may require a
4275 procedure linkage table for TLS PLT entries. */
4277 /* This is mostly copied from
4278 elflink.c:_bfd_elf_create_dynamic_sections(). */
4281 pltflags
|= SEC_CODE
;
4282 if (bed
->plt_not_loaded
)
4283 pltflags
&= ~ (SEC_CODE
| SEC_LOAD
| SEC_HAS_CONTENTS
);
4284 if (bed
->plt_readonly
)
4285 pltflags
|= SEC_READONLY
;
4287 s
= bfd_make_section_anyway_with_flags (abfd
, ".plt", pltflags
);
4289 || !bfd_set_section_alignment (s
, bed
->plt_alignment
))
4291 /* FRV-specific: remember it. */
4292 frvfdpic_plt_section (info
) = s
;
4294 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
4296 if (bed
->want_plt_sym
)
4298 h
= _bfd_elf_define_linkage_sym (abfd
, info
, s
,
4299 "_PROCEDURE_LINKAGE_TABLE_");
4300 elf_hash_table (info
)->hplt
= h
;
4305 /* FRV-specific: we want rel relocations for the plt. */
4306 s
= bfd_make_section_anyway_with_flags (abfd
, ".rel.plt",
4307 flags
| SEC_READONLY
);
4309 || !bfd_set_section_alignment (s
, bed
->s
->log_file_align
))
4311 /* FRV-specific: remember it. */
4312 frvfdpic_pltrel_section (info
) = s
;
4317 /* Make sure the got and plt sections exist, and that our pointers in
4318 the link hash table point to them. */
4321 elf32_frvfdpic_create_dynamic_sections (bfd
*abfd
, struct bfd_link_info
*info
)
4323 /* This is mostly copied from
4324 elflink.c:_bfd_elf_create_dynamic_sections(). */
4327 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
4329 flags
= (SEC_ALLOC
| SEC_LOAD
| SEC_HAS_CONTENTS
| SEC_IN_MEMORY
4330 | SEC_LINKER_CREATED
);
4332 /* We need to create .plt, .rel[a].plt, .got, .got.plt, .dynbss, and
4333 .rel[a].bss sections. */
4335 /* FRV-specific: we want to create the GOT and the PLT in the FRV
4337 if (! _frv_create_got_section (abfd
, info
))
4340 /* FRV-specific: make sure we created everything we wanted. */
4341 BFD_ASSERT (frvfdpic_got_section (info
) && frvfdpic_gotrel_section (info
)
4342 && frvfdpic_gotfixup_section (info
)
4343 && frvfdpic_plt_section (info
)
4344 && frvfdpic_pltrel_section (info
));
4346 if (bed
->want_dynbss
)
4348 /* The .dynbss section is a place to put symbols which are defined
4349 by dynamic objects, are referenced by regular objects, and are
4350 not functions. We must allocate space for them in the process
4351 image and use a R_*_COPY reloc to tell the dynamic linker to
4352 initialize them at run time. The linker script puts the .dynbss
4353 section into the .bss section of the final image. */
4354 s
= bfd_make_section_anyway_with_flags (abfd
, ".dynbss",
4355 SEC_ALLOC
| SEC_LINKER_CREATED
);
4359 /* The .rel[a].bss section holds copy relocs. This section is not
4360 normally needed. We need to create it here, though, so that the
4361 linker will map it to an output section. We can't just create it
4362 only if we need it, because we will not know whether we need it
4363 until we have seen all the input files, and the first time the
4364 main linker code calls BFD after examining all the input files
4365 (size_dynamic_sections) the input sections have already been
4366 mapped to the output sections. If the section turns out not to
4367 be needed, we can discard it later. We will never need this
4368 section when generating a shared object, since they do not use
4370 if (! bfd_link_pic (info
))
4372 s
= bfd_make_section_anyway_with_flags (abfd
,
4373 (bed
->default_use_rela_p
4374 ? ".rela.bss" : ".rel.bss"),
4375 flags
| SEC_READONLY
);
4377 || !bfd_set_section_alignment (s
, bed
->s
->log_file_align
))
4385 /* Compute the total GOT and PLT size required by each symbol in each
4386 range. Symbols may require up to 4 words in the GOT: an entry
4387 pointing to the symbol, an entry pointing to its function
4388 descriptor, and a private function descriptors taking two
4392 _frvfdpic_count_nontls_entries (struct frvfdpic_relocs_info
*entry
,
4393 struct _frvfdpic_dynamic_got_info
*dinfo
)
4395 /* Allocate space for a GOT entry pointing to the symbol. */
4398 else if (entry
->gotlos
)
4400 else if (entry
->gothilo
)
4401 dinfo
->gothilo
+= 4;
4406 /* Allocate space for a GOT entry pointing to the function
4410 else if (entry
->fdgotlos
)
4412 else if (entry
->fdgothilo
)
4413 dinfo
->gothilo
+= 4;
4418 /* Decide whether we need a PLT entry, a function descriptor in the
4419 GOT, and a lazy PLT entry for this symbol. */
4420 entry
->plt
= entry
->call
4421 && entry
->symndx
== -1 && ! FRVFDPIC_SYM_LOCAL (dinfo
->info
, entry
->d
.h
)
4422 && elf_hash_table (dinfo
->info
)->dynamic_sections_created
;
4423 entry
->privfd
= entry
->plt
4424 || entry
->fdgoff12
|| entry
->fdgofflos
|| entry
->fdgoffhilo
4425 || ((entry
->fd
|| entry
->fdgot12
|| entry
->fdgotlos
|| entry
->fdgothilo
)
4426 && (entry
->symndx
!= -1
4427 || FRVFDPIC_FUNCDESC_LOCAL (dinfo
->info
, entry
->d
.h
)));
4428 entry
->lazyplt
= entry
->privfd
4429 && entry
->symndx
== -1 && ! FRVFDPIC_SYM_LOCAL (dinfo
->info
, entry
->d
.h
)
4430 && ! (dinfo
->info
->flags
& DF_BIND_NOW
)
4431 && elf_hash_table (dinfo
->info
)->dynamic_sections_created
;
4433 /* Allocate space for a function descriptor. */
4434 if (entry
->fdgoff12
)
4436 else if (entry
->fdgofflos
)
4438 else if (entry
->privfd
&& entry
->plt
)
4440 else if (entry
->privfd
)
4450 /* Compute the total GOT size required by each TLS symbol in each
4451 range. Symbols may require up to 5 words in the GOT: an entry
4452 holding the TLS offset for the symbol, and an entry with a full TLS
4453 descriptor taking 4 words. */
4456 _frvfdpic_count_tls_entries (struct frvfdpic_relocs_info
*entry
,
4457 struct _frvfdpic_dynamic_got_info
*dinfo
,
4460 const int l
= subtract
? -1 : 1;
4462 /* Allocate space for a GOT entry with the TLS offset of the
4464 if (entry
->tlsoff12
)
4465 dinfo
->got12
+= 4 * l
;
4466 else if (entry
->tlsofflos
)
4467 dinfo
->gotlos
+= 4 * l
;
4468 else if (entry
->tlsoffhilo
)
4469 dinfo
->gothilo
+= 4 * l
;
4471 entry
->relocstlsoff
-= l
;
4472 entry
->relocstlsoff
+= l
;
4474 /* If there's any TLSOFF relocation, mark the output file as not
4475 suitable for dlopening. This mark will remain even if we relax
4476 all such relocations, but this is not a problem, since we'll only
4477 do so for executables, and we definitely don't want anyone
4478 dlopening executables. */
4479 if (entry
->relocstlsoff
)
4480 dinfo
->info
->flags
|= DF_STATIC_TLS
;
4482 /* Allocate space for a TLS descriptor. */
4483 if (entry
->tlsdesc12
)
4484 dinfo
->tlsd12
+= 8 * l
;
4485 else if (entry
->tlsdesclos
)
4486 dinfo
->tlsdlos
+= 8 * l
;
4487 else if (entry
->tlsplt
)
4488 dinfo
->tlsdplt
+= 8 * l
;
4489 else if (entry
->tlsdeschilo
)
4490 dinfo
->tlsdhilo
+= 8 * l
;
4492 entry
->relocstlsd
-= l
;
4493 entry
->relocstlsd
+= l
;
4496 /* Compute the number of dynamic relocations and fixups that a symbol
4497 requires, and add (or subtract) from the grand and per-symbol
4501 _frvfdpic_count_relocs_fixups (struct frvfdpic_relocs_info
*entry
,
4502 struct _frvfdpic_dynamic_got_info
*dinfo
,
4505 bfd_vma relocs
= 0, fixups
= 0, tlsrets
= 0;
4507 if (!bfd_link_pde (dinfo
->info
))
4509 relocs
= entry
->relocs32
+ entry
->relocsfd
+ entry
->relocsfdv
4510 + entry
->relocstlsd
;
4512 /* In the executable, TLS relocations to symbols that bind
4513 locally (including those that resolve to global TLS offsets)
4514 are resolved immediately, without any need for fixups or
4515 dynamic relocations. In shared libraries, however, we must
4516 emit dynamic relocations even for local symbols, because we
4517 don't know the module id the library is going to get at
4518 run-time, nor its TLS base offset. */
4519 if (!bfd_link_executable (dinfo
->info
)
4520 || (entry
->symndx
== -1
4521 && ! FRVFDPIC_SYM_LOCAL (dinfo
->info
, entry
->d
.h
)))
4522 relocs
+= entry
->relocstlsoff
;
4526 if (entry
->symndx
!= -1 || FRVFDPIC_SYM_LOCAL (dinfo
->info
, entry
->d
.h
))
4528 if (entry
->symndx
!= -1
4529 || entry
->d
.h
->root
.type
!= bfd_link_hash_undefweak
)
4530 fixups
+= entry
->relocs32
+ 2 * entry
->relocsfdv
;
4531 fixups
+= entry
->relocstlsd
;
4532 tlsrets
+= entry
->relocstlsd
;
4536 relocs
+= entry
->relocs32
+ entry
->relocsfdv
4537 + entry
->relocstlsoff
+ entry
->relocstlsd
;
4540 if (entry
->symndx
!= -1
4541 || FRVFDPIC_FUNCDESC_LOCAL (dinfo
->info
, entry
->d
.h
))
4543 if (entry
->symndx
!= -1
4544 || entry
->d
.h
->root
.type
!= bfd_link_hash_undefweak
)
4545 fixups
+= entry
->relocsfd
;
4548 relocs
+= entry
->relocsfd
;
4555 tlsrets
= - tlsrets
;
4558 entry
->dynrelocs
+= relocs
;
4559 entry
->fixups
+= fixups
;
4560 dinfo
->relocs
+= relocs
;
4561 dinfo
->fixups
+= fixups
;
4562 dinfo
->tls_ret_refs
+= tlsrets
;
4565 /* Look for opportunities to relax TLS relocations. We can assume
4566 we're linking the main executable or a static-tls library, since
4567 otherwise we wouldn't have got here. When relaxing, we have to
4568 first undo any previous accounting of TLS uses of fixups, dynamic
4569 relocations, GOT and PLT entries. */
4572 _frvfdpic_relax_tls_entries (struct frvfdpic_relocs_info
*entry
,
4573 struct _frvfdpic_dynamic_got_info
*dinfo
,
4576 bool changed
= ! relaxing
;
4578 BFD_ASSERT (bfd_link_executable (dinfo
->info
)
4579 || (dinfo
->info
->flags
& DF_STATIC_TLS
));
4581 if (entry
->tlsdesc12
|| entry
->tlsdesclos
|| entry
->tlsdeschilo
)
4585 _frvfdpic_count_relocs_fixups (entry
, dinfo
, true);
4586 _frvfdpic_count_tls_entries (entry
, dinfo
, true);
4590 /* When linking an executable, we can always decay GOTTLSDESC to
4591 TLSMOFF, if the symbol is local, or GOTTLSOFF, otherwise.
4592 When linking a static-tls shared library, using TLSMOFF is
4593 not an option, but we can still use GOTTLSOFF. When decaying
4594 to GOTTLSOFF, we must keep the GOT entry in range. We know
4595 it has to fit because we'll be trading the 4 words of hte TLS
4596 descriptor for a single word in the same range. */
4597 if (! bfd_link_executable (dinfo
->info
)
4598 || (entry
->symndx
== -1
4599 && ! FRVFDPIC_SYM_LOCAL (dinfo
->info
, entry
->d
.h
)))
4601 entry
->tlsoff12
|= entry
->tlsdesc12
;
4602 entry
->tlsofflos
|= entry
->tlsdesclos
;
4603 entry
->tlsoffhilo
|= entry
->tlsdeschilo
;
4606 entry
->tlsdesc12
= entry
->tlsdesclos
= entry
->tlsdeschilo
= 0;
4609 /* We can only decay TLSOFFs or call #gettlsoff to TLSMOFF in the
4610 main executable. We have to check whether the symbol's TLSOFF is
4611 in range for a setlos. For symbols with a hash entry, we can
4612 determine exactly what to do; for others locals, we don't have
4613 addresses handy, so we use the size of the TLS section as an
4614 approximation. If we get it wrong, we'll retain a GOT entry
4615 holding the TLS offset (without dynamic relocations or fixups),
4616 but we'll still optimize away the loads from it. Since TLS sizes
4617 are generally very small, it's probably not worth attempting to
4618 do better than this. */
4620 || entry
->tlsoff12
|| entry
->tlsofflos
|| entry
->tlsoffhilo
)
4621 && bfd_link_executable (dinfo
->info
) && relaxing
4622 && ((entry
->symndx
== -1
4623 && FRVFDPIC_SYM_LOCAL (dinfo
->info
, entry
->d
.h
)
4624 /* The above may hold for an undefweak TLS symbol, so make
4625 sure we don't have this case before accessing def.value
4627 && (entry
->d
.h
->root
.type
== bfd_link_hash_undefweak
4628 || (bfd_vma
)(entry
->d
.h
->root
.u
.def
.value
4629 + (entry
->d
.h
->root
.u
.def
.section
4630 ->output_section
->vma
)
4631 + entry
->d
.h
->root
.u
.def
.section
->output_offset
4633 - tls_biased_base (dinfo
->info
)
4634 + 32768) < (bfd_vma
)65536))
4635 || (entry
->symndx
!= -1
4636 && (elf_hash_table (dinfo
->info
)->tls_sec
->size
4637 + entry
->addend
< 32768 + FRVFDPIC_TLS_BIAS
))))
4641 _frvfdpic_count_relocs_fixups (entry
, dinfo
, true);
4642 _frvfdpic_count_tls_entries (entry
, dinfo
, true);
4647 entry
->tlsoff12
= entry
->tlsofflos
= entry
->tlsoffhilo
= 0;
4650 /* We can decay `call #gettlsoff' to a ldi #tlsoff if we already
4651 have a #gottlsoff12 relocation for this entry, or if we can fit
4652 one more in the 12-bit (and 16-bit) ranges. */
4656 && dinfo
->got12
+ dinfo
->fd12
+ dinfo
->tlsd12
<= 4096 - 12 - 4
4657 && (dinfo
->got12
+ dinfo
->fd12
+ dinfo
->tlsd12
4658 + dinfo
->gotlos
+ dinfo
->fdlos
+ dinfo
->tlsdlos
4659 <= 65536 - 12 - 4))))
4663 _frvfdpic_count_relocs_fixups (entry
, dinfo
, true);
4664 _frvfdpic_count_tls_entries (entry
, dinfo
, true);
4668 entry
->tlsoff12
= 1;
4674 _frvfdpic_count_tls_entries (entry
, dinfo
, false);
4675 _frvfdpic_count_relocs_fixups (entry
, dinfo
, false);
4681 /* Compute the total GOT and PLT size required by each symbol in each range. *
4682 Symbols may require up to 4 words in the GOT: an entry pointing to
4683 the symbol, an entry pointing to its function descriptor, and a
4684 private function descriptors taking two words. */
4687 _frvfdpic_count_got_plt_entries (void **entryp
, void *dinfo_
)
4689 struct frvfdpic_relocs_info
*entry
= *entryp
;
4690 struct _frvfdpic_dynamic_got_info
*dinfo
= dinfo_
;
4692 _frvfdpic_count_nontls_entries (entry
, dinfo
);
4694 if (bfd_link_executable (dinfo
->info
)
4695 || (dinfo
->info
->flags
& DF_STATIC_TLS
))
4696 _frvfdpic_relax_tls_entries (entry
, dinfo
, false);
4699 _frvfdpic_count_tls_entries (entry
, dinfo
, false);
4700 _frvfdpic_count_relocs_fixups (entry
, dinfo
, false);
4706 /* Determine the positive and negative ranges to be used by each
4707 offset range in the GOT. FDCUR and CUR, that must be aligned to a
4708 double-word boundary, are the minimum (negative) and maximum
4709 (positive) GOT offsets already used by previous ranges, except for
4710 an ODD entry that may have been left behind. GOT and FD indicate
4711 the size of GOT entries and function descriptors that must be
4712 placed within the range from -WRAP to WRAP. If there's room left,
4713 up to FDPLT bytes should be reserved for additional function
4716 inline static bfd_signed_vma
4717 _frvfdpic_compute_got_alloc_data (struct _frvfdpic_dynamic_got_alloc_data
*gad
,
4718 bfd_signed_vma fdcur
,
4728 bfd_signed_vma wrapmin
= -wrap
;
4729 const bfd_vma tdescsz
= 8;
4731 /* Start at the given initial points. */
4735 /* If we had an incoming odd word and we have any got entries that
4736 are going to use it, consume it, otherwise leave gad->odd at
4737 zero. We might force gad->odd to zero and return the incoming
4738 odd such that it is used by the next range, but then GOT entries
4739 might appear to be out of order and we wouldn't be able to
4740 shorten the GOT by one word if it turns out to end with an
4741 unpaired GOT entry. */
4751 /* If we're left with an unpaired GOT entry, compute its location
4752 such that we can return it. Otherwise, if got doesn't require an
4753 odd number of words here, either odd was already zero in the
4754 block above, or it was set to zero because got was non-zero, or
4755 got was already zero. In the latter case, we want the value of
4756 odd to carry over to the return statement, so we don't want to
4757 reset odd unless the condition below is true. */
4764 /* Compute the tentative boundaries of this range. */
4765 gad
->max
= cur
+ got
;
4766 gad
->min
= fdcur
- fd
;
4769 /* If function descriptors took too much space, wrap some of them
4771 if (gad
->min
< wrapmin
)
4773 gad
->max
+= wrapmin
- gad
->min
;
4774 gad
->tmin
= gad
->min
= wrapmin
;
4777 /* If GOT entries took too much space, wrap some of them around.
4778 This may well cause gad->min to become lower than wrapmin. This
4779 will cause a relocation overflow later on, so we don't have to
4781 if ((bfd_vma
) gad
->max
> wrap
)
4783 gad
->min
-= gad
->max
- wrap
;
4787 /* Add TLS descriptors. */
4788 gad
->tmax
= gad
->max
+ tlsd
;
4789 gad
->tmin
= gad
->min
;
4792 /* If TLS descriptors took too much space, wrap an integral number
4794 if ((bfd_vma
) gad
->tmax
> wrap
)
4796 bfd_vma wrapsize
= gad
->tmax
- wrap
;
4798 wrapsize
+= tdescsz
/ 2;
4799 wrapsize
&= ~ tdescsz
/ 2;
4801 gad
->tmin
-= wrapsize
;
4802 gad
->tmax
-= wrapsize
;
4805 /* If there is space left and we have function descriptors
4806 referenced in PLT entries that could take advantage of shorter
4807 offsets, place them now. */
4808 if (fdplt
&& gad
->tmin
> wrapmin
)
4812 if ((bfd_vma
) (gad
->tmin
- wrapmin
) < fdplt
)
4813 fds
= gad
->tmin
- wrapmin
;
4823 /* If there is more space left, try to place some more function
4824 descriptors for PLT entries. */
4825 if (fdplt
&& (bfd_vma
) gad
->tmax
< wrap
)
4829 if ((bfd_vma
) (wrap
- gad
->tmax
) < fdplt
)
4830 fds
= wrap
- gad
->tmax
;
4840 /* If there is space left and we have TLS descriptors referenced in
4841 PLT entries that could take advantage of shorter offsets, place
4843 if (tlsdplt
&& gad
->tmin
> wrapmin
)
4847 if ((bfd_vma
) (gad
->tmin
- wrapmin
) < tlsdplt
)
4848 tlsds
= (gad
->tmin
- wrapmin
) & ~ (tdescsz
/ 2);
4854 gad
->tlsdplt
+= tlsds
;
4857 /* If there is more space left, try to place some more TLS
4858 descriptors for PLT entries. Although we could try to fit an
4859 additional TLS descriptor with half of it just before before the
4860 wrap point and another right past the wrap point, this might
4861 cause us to run out of space for the next region, so don't do
4863 if (tlsdplt
&& (bfd_vma
) gad
->tmax
< wrap
- tdescsz
/ 2)
4867 if ((bfd_vma
) (wrap
- gad
->tmax
) < tlsdplt
)
4868 tlsds
= (wrap
- gad
->tmax
) & ~ (tdescsz
/ 2);
4874 gad
->tlsdplt
+= tlsds
;
4877 /* If odd was initially computed as an offset past the wrap point,
4880 odd
= gad
->min
+ odd
- gad
->max
;
4882 /* _frvfdpic_get_got_entry() below will always wrap gad->cur if needed
4883 before returning, so do it here too. This guarantees that,
4884 should cur and fdcur meet at the wrap point, they'll both be
4886 if (gad
->cur
== gad
->max
)
4887 gad
->cur
= gad
->min
;
4889 /* Ditto for _frvfdpic_get_tlsdesc_entry(). */
4890 gad
->tcur
= gad
->max
;
4891 if (gad
->tcur
== gad
->tmax
)
4892 gad
->tcur
= gad
->tmin
;
4897 /* Compute the location of the next GOT entry, given the allocation
4898 data for a range. */
4900 inline static bfd_signed_vma
4901 _frvfdpic_get_got_entry (struct _frvfdpic_dynamic_got_alloc_data
*gad
)
4907 /* If there was an odd word left behind, use it. */
4913 /* Otherwise, use the word pointed to by cur, reserve the next
4914 as an odd word, and skip to the next pair of words, possibly
4917 gad
->odd
= gad
->cur
+ 4;
4919 if (gad
->cur
== gad
->max
)
4920 gad
->cur
= gad
->min
;
4926 /* Compute the location of the next function descriptor entry in the
4927 GOT, given the allocation data for a range. */
4929 inline static bfd_signed_vma
4930 _frvfdpic_get_fd_entry (struct _frvfdpic_dynamic_got_alloc_data
*gad
)
4932 /* If we're at the bottom, wrap around, and only then allocate the
4933 next pair of words. */
4934 if (gad
->fdcur
== gad
->min
)
4935 gad
->fdcur
= gad
->max
;
4936 return gad
->fdcur
-= 8;
4939 /* Compute the location of the next TLS descriptor entry in the GOT,
4940 given the allocation data for a range. */
4941 inline static bfd_signed_vma
4942 _frvfdpic_get_tlsdesc_entry (struct _frvfdpic_dynamic_got_alloc_data
*gad
)
4950 /* If we're at the top of the region, wrap around to the bottom. */
4951 if (gad
->tcur
== gad
->tmax
)
4952 gad
->tcur
= gad
->tmin
;
4957 /* Assign GOT offsets for every GOT entry and function descriptor.
4958 Doing everything in a single pass is tricky. */
4961 _frvfdpic_assign_got_entries (void **entryp
, void *info_
)
4963 struct frvfdpic_relocs_info
*entry
= *entryp
;
4964 struct _frvfdpic_dynamic_got_plt_info
*dinfo
= info_
;
4967 entry
->got_entry
= _frvfdpic_get_got_entry (&dinfo
->got12
);
4968 else if (entry
->gotlos
)
4969 entry
->got_entry
= _frvfdpic_get_got_entry (&dinfo
->gotlos
);
4970 else if (entry
->gothilo
)
4971 entry
->got_entry
= _frvfdpic_get_got_entry (&dinfo
->gothilo
);
4974 entry
->fdgot_entry
= _frvfdpic_get_got_entry (&dinfo
->got12
);
4975 else if (entry
->fdgotlos
)
4976 entry
->fdgot_entry
= _frvfdpic_get_got_entry (&dinfo
->gotlos
);
4977 else if (entry
->fdgothilo
)
4978 entry
->fdgot_entry
= _frvfdpic_get_got_entry (&dinfo
->gothilo
);
4980 if (entry
->fdgoff12
)
4981 entry
->fd_entry
= _frvfdpic_get_fd_entry (&dinfo
->got12
);
4982 else if (entry
->plt
&& dinfo
->got12
.fdplt
)
4984 dinfo
->got12
.fdplt
-= 8;
4985 entry
->fd_entry
= _frvfdpic_get_fd_entry (&dinfo
->got12
);
4987 else if (entry
->fdgofflos
)
4988 entry
->fd_entry
= _frvfdpic_get_fd_entry (&dinfo
->gotlos
);
4989 else if (entry
->plt
&& dinfo
->gotlos
.fdplt
)
4991 dinfo
->gotlos
.fdplt
-= 8;
4992 entry
->fd_entry
= _frvfdpic_get_fd_entry (&dinfo
->gotlos
);
4994 else if (entry
->plt
)
4996 dinfo
->gothilo
.fdplt
-= 8;
4997 entry
->fd_entry
= _frvfdpic_get_fd_entry (&dinfo
->gothilo
);
4999 else if (entry
->privfd
)
5000 entry
->fd_entry
= _frvfdpic_get_fd_entry (&dinfo
->gothilo
);
5002 if (entry
->tlsoff12
)
5003 entry
->tlsoff_entry
= _frvfdpic_get_got_entry (&dinfo
->got12
);
5004 else if (entry
->tlsofflos
)
5005 entry
->tlsoff_entry
= _frvfdpic_get_got_entry (&dinfo
->gotlos
);
5006 else if (entry
->tlsoffhilo
)
5007 entry
->tlsoff_entry
= _frvfdpic_get_got_entry (&dinfo
->gothilo
);
5009 if (entry
->tlsdesc12
)
5010 entry
->tlsdesc_entry
= _frvfdpic_get_tlsdesc_entry (&dinfo
->got12
);
5011 else if (entry
->tlsplt
&& dinfo
->got12
.tlsdplt
)
5013 dinfo
->got12
.tlsdplt
-= 8;
5014 entry
->tlsdesc_entry
= _frvfdpic_get_tlsdesc_entry (&dinfo
->got12
);
5016 else if (entry
->tlsdesclos
)
5017 entry
->tlsdesc_entry
= _frvfdpic_get_tlsdesc_entry (&dinfo
->gotlos
);
5018 else if (entry
->tlsplt
&& dinfo
->gotlos
.tlsdplt
)
5020 dinfo
->gotlos
.tlsdplt
-= 8;
5021 entry
->tlsdesc_entry
= _frvfdpic_get_tlsdesc_entry (&dinfo
->gotlos
);
5023 else if (entry
->tlsplt
)
5025 dinfo
->gothilo
.tlsdplt
-= 8;
5026 entry
->tlsdesc_entry
= _frvfdpic_get_tlsdesc_entry (&dinfo
->gothilo
);
5028 else if (entry
->tlsdeschilo
)
5029 entry
->tlsdesc_entry
= _frvfdpic_get_tlsdesc_entry (&dinfo
->gothilo
);
5034 /* Assign GOT offsets to private function descriptors used by PLT
5035 entries (or referenced by 32-bit offsets), as well as PLT entries
5036 and lazy PLT entries. */
5039 _frvfdpic_assign_plt_entries (void **entryp
, void *info_
)
5041 struct frvfdpic_relocs_info
*entry
= *entryp
;
5042 struct _frvfdpic_dynamic_got_plt_info
*dinfo
= info_
;
5045 BFD_ASSERT (entry
->fd_entry
);
5051 /* We use the section's raw size to mark the location of the
5053 entry
->plt_entry
= frvfdpic_plt_section (dinfo
->g
.info
)->size
;
5055 /* Figure out the length of this PLT entry based on the
5056 addressing mode we need to reach the function descriptor. */
5057 BFD_ASSERT (entry
->fd_entry
);
5058 if (entry
->fd_entry
>= -(1 << (12 - 1))
5059 && entry
->fd_entry
< (1 << (12 - 1)))
5061 else if (entry
->fd_entry
>= -(1 << (16 - 1))
5062 && entry
->fd_entry
< (1 << (16 - 1)))
5067 frvfdpic_plt_section (dinfo
->g
.info
)->size
+= size
;
5072 entry
->lzplt_entry
= dinfo
->g
.lzplt
;
5073 dinfo
->g
.lzplt
+= 8;
5074 /* If this entry is the one that gets the resolver stub, account
5075 for the additional instruction. */
5076 if (entry
->lzplt_entry
% FRVFDPIC_LZPLT_BLOCK_SIZE
5077 == FRVFDPIC_LZPLT_RESOLV_LOC
)
5078 dinfo
->g
.lzplt
+= 4;
5086 = frvfdpic_plt_section (dinfo
->g
.info
)->size
;
5088 if (bfd_link_executable (dinfo
->g
.info
)
5089 && (entry
->symndx
!= -1
5090 || FRVFDPIC_SYM_LOCAL (dinfo
->g
.info
, entry
->d
.h
)))
5092 if ((bfd_signed_vma
)entry
->addend
>= -(1 << (16 - 1))
5093 /* FIXME: here we use the size of the TLS section
5094 as an upper bound for the value of the TLS
5095 symbol, because we may not know the exact value
5096 yet. If we get it wrong, we'll just waste a
5097 word in the PLT, and we should never get even
5098 close to 32 KiB of TLS anyway. */
5099 && elf_hash_table (dinfo
->g
.info
)->tls_sec
5100 && (elf_hash_table (dinfo
->g
.info
)->tls_sec
->size
5101 + (bfd_signed_vma
)(entry
->addend
) <= (1 << (16 - 1))))
5106 else if (entry
->tlsoff_entry
)
5108 if (entry
->tlsoff_entry
>= -(1 << (12 - 1))
5109 && entry
->tlsoff_entry
< (1 << (12 - 1)))
5111 else if (entry
->tlsoff_entry
>= -(1 << (16 - 1))
5112 && entry
->tlsoff_entry
< (1 << (16 - 1)))
5119 BFD_ASSERT (entry
->tlsdesc_entry
);
5121 if (entry
->tlsdesc_entry
>= -(1 << (12 - 1))
5122 && entry
->tlsdesc_entry
< (1 << (12 - 1)))
5124 else if (entry
->tlsdesc_entry
>= -(1 << (16 - 1))
5125 && entry
->tlsdesc_entry
< (1 << (16 - 1)))
5131 frvfdpic_plt_section (dinfo
->g
.info
)->size
+= size
;
5137 /* Cancel out any effects of calling _frvfdpic_assign_got_entries and
5138 _frvfdpic_assign_plt_entries. */
5141 _frvfdpic_reset_got_plt_entries (void **entryp
, void *ignore ATTRIBUTE_UNUSED
)
5143 struct frvfdpic_relocs_info
*entry
= *entryp
;
5145 entry
->got_entry
= 0;
5146 entry
->fdgot_entry
= 0;
5147 entry
->fd_entry
= 0;
5148 entry
->plt_entry
= (bfd_vma
)-1;
5149 entry
->lzplt_entry
= (bfd_vma
)-1;
5150 entry
->tlsoff_entry
= 0;
5151 entry
->tlsdesc_entry
= 0;
5152 entry
->tlsplt_entry
= (bfd_vma
)-1;
5157 /* Follow indirect and warning hash entries so that each got entry
5158 points to the final symbol definition. P must point to a pointer
5159 to the hash table we're traversing. Since this traversal may
5160 modify the hash table, we set this pointer to NULL to indicate
5161 we've made a potentially-destructive change to the hash table, so
5162 the traversal must be restarted. */
5164 _frvfdpic_resolve_final_relocs_info (void **entryp
, void *p
)
5166 struct frvfdpic_relocs_info
*entry
= *entryp
;
5169 if (entry
->symndx
== -1)
5171 struct elf_link_hash_entry
*h
= entry
->d
.h
;
5172 struct frvfdpic_relocs_info
*oentry
;
5174 while (h
->root
.type
== bfd_link_hash_indirect
5175 || h
->root
.type
== bfd_link_hash_warning
)
5176 h
= (struct elf_link_hash_entry
*)h
->root
.u
.i
.link
;
5178 if (entry
->d
.h
== h
)
5181 oentry
= frvfdpic_relocs_info_for_global (*htab
, 0, h
, entry
->addend
,
5186 /* Merge the two entries. */
5187 frvfdpic_pic_merge_early_relocs_info (oentry
, entry
);
5188 htab_clear_slot (*htab
, entryp
);
5194 /* If we can't find this entry with the new bfd hash, re-insert
5195 it, and get the traversal restarted. */
5196 if (! htab_find (*htab
, entry
))
5198 htab_clear_slot (*htab
, entryp
);
5199 entryp
= htab_find_slot (*htab
, entry
, INSERT
);
5202 /* Abort the traversal, since the whole table may have
5203 moved, and leave it up to the parent to restart the
5205 *(htab_t
*)p
= NULL
;
5213 /* Compute the total size of the GOT, the PLT, the dynamic relocations
5214 section and the rofixup section. Assign locations for GOT and PLT
5218 _frvfdpic_size_got_plt (bfd
*output_bfd
,
5219 struct _frvfdpic_dynamic_got_plt_info
*gpinfop
)
5222 bfd_vma limit
, tlslimit
;
5223 struct bfd_link_info
*info
= gpinfop
->g
.info
;
5224 bfd
*dynobj
= elf_hash_table (info
)->dynobj
;
5226 memcpy (frvfdpic_dynamic_got_plt_info (info
), &gpinfop
->g
,
5227 sizeof (gpinfop
->g
));
5230 /* Compute the total size taken by entries in the 12-bit and 16-bit
5231 ranges, to tell how many PLT function descriptors we can bring
5232 into the 12-bit range without causing the 16-bit range to
5234 limit
= odd
+ gpinfop
->g
.got12
+ gpinfop
->g
.gotlos
5235 + gpinfop
->g
.fd12
+ gpinfop
->g
.fdlos
5236 + gpinfop
->g
.tlsd12
+ gpinfop
->g
.tlsdlos
;
5237 if (limit
< (bfd_vma
)1 << 16)
5238 limit
= ((bfd_vma
)1 << 16) - limit
;
5241 if (gpinfop
->g
.fdplt
< limit
)
5243 tlslimit
= (limit
- gpinfop
->g
.fdplt
) & ~ (bfd_vma
) 8;
5244 limit
= gpinfop
->g
.fdplt
;
5248 if (gpinfop
->g
.tlsdplt
< tlslimit
)
5249 tlslimit
= gpinfop
->g
.tlsdplt
;
5251 /* Determine the ranges of GOT offsets that we can use for each
5252 range of addressing modes. */
5253 odd
= _frvfdpic_compute_got_alloc_data (&gpinfop
->got12
,
5262 (bfd_vma
)1 << (12-1));
5263 odd
= _frvfdpic_compute_got_alloc_data (&gpinfop
->gotlos
,
5264 gpinfop
->got12
.tmin
,
5266 gpinfop
->got12
.tmax
,
5270 - gpinfop
->got12
.fdplt
,
5273 - gpinfop
->got12
.tlsdplt
,
5274 (bfd_vma
)1 << (16-1));
5275 odd
= _frvfdpic_compute_got_alloc_data (&gpinfop
->gothilo
,
5276 gpinfop
->gotlos
.tmin
,
5278 gpinfop
->gotlos
.tmax
,
5282 - gpinfop
->got12
.fdplt
5283 - gpinfop
->gotlos
.fdplt
,
5284 gpinfop
->g
.tlsdhilo
,
5286 - gpinfop
->got12
.tlsdplt
5287 - gpinfop
->gotlos
.tlsdplt
,
5288 (bfd_vma
)1 << (32-1));
5290 /* Now assign (most) GOT offsets. */
5291 htab_traverse (frvfdpic_relocs_info (info
), _frvfdpic_assign_got_entries
,
5294 frvfdpic_got_section (info
)->size
= gpinfop
->gothilo
.tmax
5295 - gpinfop
->gothilo
.tmin
5296 /* If an odd word is the last word of the GOT, we don't need this
5297 word to be part of the GOT. */
5298 - (odd
+ 4 == gpinfop
->gothilo
.tmax
? 4 : 0);
5299 if (frvfdpic_got_section (info
)->size
== 0)
5300 frvfdpic_got_section (info
)->flags
|= SEC_EXCLUDE
;
5301 else if (frvfdpic_got_section (info
)->size
== 12
5302 && ! elf_hash_table (info
)->dynamic_sections_created
)
5304 frvfdpic_got_section (info
)->flags
|= SEC_EXCLUDE
;
5305 frvfdpic_got_section (info
)->size
= 0;
5307 /* This will be non-NULL during relaxation. The assumption is that
5308 the size of one of these sections will never grow, only shrink,
5309 so we can use the larger buffer we allocated before. */
5310 else if (frvfdpic_got_section (info
)->contents
== NULL
)
5312 frvfdpic_got_section (info
)->contents
=
5313 (bfd_byte
*) bfd_zalloc (dynobj
,
5314 frvfdpic_got_section (info
)->size
);
5315 if (frvfdpic_got_section (info
)->contents
== NULL
)
5319 if (frvfdpic_gotrel_section (info
))
5320 /* Subtract the number of lzplt entries, since those will generate
5321 relocations in the pltrel section. */
5322 frvfdpic_gotrel_section (info
)->size
=
5323 (gpinfop
->g
.relocs
- gpinfop
->g
.lzplt
/ 8)
5324 * get_elf_backend_data (output_bfd
)->s
->sizeof_rel
;
5326 BFD_ASSERT (gpinfop
->g
.relocs
== 0);
5327 if (frvfdpic_gotrel_section (info
)->size
== 0)
5328 frvfdpic_gotrel_section (info
)->flags
|= SEC_EXCLUDE
;
5329 else if (frvfdpic_gotrel_section (info
)->contents
== NULL
)
5331 frvfdpic_gotrel_section (info
)->contents
=
5332 (bfd_byte
*) bfd_zalloc (dynobj
,
5333 frvfdpic_gotrel_section (info
)->size
);
5334 if (frvfdpic_gotrel_section (info
)->contents
== NULL
)
5338 frvfdpic_gotfixup_section (info
)->size
= (gpinfop
->g
.fixups
+ 1) * 4;
5339 if (frvfdpic_gotfixup_section (info
)->size
== 0)
5340 frvfdpic_gotfixup_section (info
)->flags
|= SEC_EXCLUDE
;
5341 else if (frvfdpic_gotfixup_section (info
)->contents
== NULL
)
5343 frvfdpic_gotfixup_section (info
)->contents
=
5344 (bfd_byte
*) bfd_zalloc (dynobj
,
5345 frvfdpic_gotfixup_section (info
)->size
);
5346 if (frvfdpic_gotfixup_section (info
)->contents
== NULL
)
5350 if (frvfdpic_pltrel_section (info
))
5352 frvfdpic_pltrel_section (info
)->size
=
5353 gpinfop
->g
.lzplt
/ 8
5354 * get_elf_backend_data (output_bfd
)->s
->sizeof_rel
;
5355 if (frvfdpic_pltrel_section (info
)->size
== 0)
5356 frvfdpic_pltrel_section (info
)->flags
|= SEC_EXCLUDE
;
5357 else if (frvfdpic_pltrel_section (info
)->contents
== NULL
)
5359 frvfdpic_pltrel_section (info
)->contents
=
5360 (bfd_byte
*) bfd_zalloc (dynobj
,
5361 frvfdpic_pltrel_section (info
)->size
);
5362 if (frvfdpic_pltrel_section (info
)->contents
== NULL
)
5367 /* Add 4 bytes for every block of at most 65535 lazy PLT entries,
5368 such that there's room for the additional instruction needed to
5369 call the resolver. Since _frvfdpic_assign_got_entries didn't
5370 account for them, our block size is 4 bytes smaller than the real
5372 if (frvfdpic_plt_section (info
))
5374 frvfdpic_plt_section (info
)->size
= gpinfop
->g
.lzplt
5375 + ((gpinfop
->g
.lzplt
+ (FRVFDPIC_LZPLT_BLOCK_SIZE
- 4) - 8)
5376 / (FRVFDPIC_LZPLT_BLOCK_SIZE
- 4) * 4);
5379 /* Reset it, such that _frvfdpic_assign_plt_entries() can use it to
5380 actually assign lazy PLT entries addresses. */
5381 gpinfop
->g
.lzplt
= 0;
5383 /* Save information that we're going to need to generate GOT and PLT
5385 frvfdpic_got_initial_offset (info
) = -gpinfop
->gothilo
.tmin
;
5387 if (get_elf_backend_data (output_bfd
)->want_got_sym
)
5388 elf_hash_table (info
)->hgot
->root
.u
.def
.value
5389 = frvfdpic_got_initial_offset (info
);
5391 if (frvfdpic_plt_section (info
))
5392 frvfdpic_plt_initial_offset (info
) =
5393 frvfdpic_plt_section (info
)->size
;
5395 /* Allocate a ret statement at plt_initial_offset, to be used by
5396 locally-resolved TLS descriptors. */
5397 if (gpinfop
->g
.tls_ret_refs
)
5398 frvfdpic_plt_section (info
)->size
+= 4;
5400 htab_traverse (frvfdpic_relocs_info (info
), _frvfdpic_assign_plt_entries
,
5403 /* Allocate the PLT section contents only after
5404 _frvfdpic_assign_plt_entries has a chance to add the size of the
5405 non-lazy PLT entries. */
5406 if (frvfdpic_plt_section (info
))
5408 if (frvfdpic_plt_section (info
)->size
== 0)
5409 frvfdpic_plt_section (info
)->flags
|= SEC_EXCLUDE
;
5410 else if (frvfdpic_plt_section (info
)->contents
== NULL
)
5412 frvfdpic_plt_section (info
)->contents
=
5413 (bfd_byte
*) bfd_zalloc (dynobj
,
5414 frvfdpic_plt_section (info
)->size
);
5415 if (frvfdpic_plt_section (info
)->contents
== NULL
)
5423 /* Set the sizes of the dynamic sections. */
5426 elf32_frvfdpic_size_dynamic_sections (bfd
*output_bfd
,
5427 struct bfd_link_info
*info
)
5431 struct _frvfdpic_dynamic_got_plt_info gpinfo
;
5433 dynobj
= elf_hash_table (info
)->dynobj
;
5434 BFD_ASSERT (dynobj
!= NULL
);
5436 if (elf_hash_table (info
)->dynamic_sections_created
)
5438 /* Set the contents of the .interp section to the interpreter. */
5439 if (bfd_link_executable (info
) && !info
->nointerp
)
5441 s
= bfd_get_linker_section (dynobj
, ".interp");
5442 BFD_ASSERT (s
!= NULL
);
5443 s
->size
= sizeof ELF_DYNAMIC_INTERPRETER
;
5444 s
->contents
= (bfd_byte
*) ELF_DYNAMIC_INTERPRETER
;
5448 memset (&gpinfo
, 0, sizeof (gpinfo
));
5449 gpinfo
.g
.info
= info
;
5453 htab_t relocs
= frvfdpic_relocs_info (info
);
5455 htab_traverse (relocs
, _frvfdpic_resolve_final_relocs_info
, &relocs
);
5457 if (relocs
== frvfdpic_relocs_info (info
))
5461 htab_traverse (frvfdpic_relocs_info (info
), _frvfdpic_count_got_plt_entries
,
5464 /* Allocate space to save the summary information, we're going to
5465 use it if we're doing relaxations. */
5466 frvfdpic_dynamic_got_plt_info (info
) = bfd_alloc (dynobj
, sizeof (gpinfo
.g
));
5468 if (!_frvfdpic_size_got_plt (output_bfd
, &gpinfo
))
5471 return _bfd_elf_add_dynamic_tags (output_bfd
, info
, true);
5475 elf32_frvfdpic_always_size_sections (bfd
*output_bfd
,
5476 struct bfd_link_info
*info
)
5478 if (!bfd_link_relocatable (info
)
5479 && !bfd_elf_stack_segment_size (output_bfd
, info
,
5480 "__stacksize", DEFAULT_STACK_SIZE
))
5486 /* Check whether any of the relocations was optimized away, and
5487 subtract it from the relocation or fixup count. */
5489 _frvfdpic_check_discarded_relocs (bfd
*abfd
, asection
*sec
,
5490 struct bfd_link_info
*info
,
5493 Elf_Internal_Shdr
*symtab_hdr
;
5494 struct elf_link_hash_entry
**sym_hashes
;
5495 Elf_Internal_Rela
*rel
, *erel
;
5497 if ((sec
->flags
& SEC_RELOC
) == 0
5498 || sec
->reloc_count
== 0)
5501 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
5502 sym_hashes
= elf_sym_hashes (abfd
);
5504 rel
= elf_section_data (sec
)->relocs
;
5506 /* Now examine each relocation. */
5507 for (erel
= rel
+ sec
->reloc_count
; rel
< erel
; rel
++)
5509 struct elf_link_hash_entry
*h
;
5510 unsigned long r_symndx
;
5511 struct frvfdpic_relocs_info
*picrel
;
5512 struct _frvfdpic_dynamic_got_info
*dinfo
;
5514 if (ELF32_R_TYPE (rel
->r_info
) != R_FRV_32
5515 && ELF32_R_TYPE (rel
->r_info
) != R_FRV_FUNCDESC
)
5518 if (_bfd_elf_section_offset (sec
->output_section
->owner
,
5519 info
, sec
, rel
->r_offset
)
5523 r_symndx
= ELF32_R_SYM (rel
->r_info
);
5524 if (r_symndx
< symtab_hdr
->sh_info
)
5528 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
5529 while (h
->root
.type
== bfd_link_hash_indirect
5530 || h
->root
.type
== bfd_link_hash_warning
)
5531 h
= (struct elf_link_hash_entry
*)h
->root
.u
.i
.link
;
5535 picrel
= frvfdpic_relocs_info_for_global (frvfdpic_relocs_info (info
),
5537 rel
->r_addend
, NO_INSERT
);
5539 picrel
= frvfdpic_relocs_info_for_local (frvfdpic_relocs_info (info
),
5541 rel
->r_addend
, NO_INSERT
);
5547 dinfo
= frvfdpic_dynamic_got_plt_info (info
);
5549 _frvfdpic_count_relocs_fixups (picrel
, dinfo
, true);
5550 if (ELF32_R_TYPE (rel
->r_info
) == R_FRV_32
)
5552 else /* we know (ELF32_R_TYPE (rel->r_info) == R_FRV_FUNCDESC) */
5554 _frvfdpic_count_relocs_fixups (picrel
, dinfo
, false);
5561 frvfdpic_elf_discard_info (bfd
*ibfd
,
5562 struct elf_reloc_cookie
*cookie ATTRIBUTE_UNUSED
,
5563 struct bfd_link_info
*info
)
5565 bool changed
= false;
5569 /* Account for relaxation of .eh_frame section. */
5570 for (s
= ibfd
->sections
; s
; s
= s
->next
)
5571 if (s
->sec_info_type
== SEC_INFO_TYPE_EH_FRAME
)
5573 if (!_frvfdpic_check_discarded_relocs (ibfd
, s
, info
, &changed
))
5575 obfd
= s
->output_section
->owner
;
5580 struct _frvfdpic_dynamic_got_plt_info gpinfo
;
5582 memset (&gpinfo
, 0, sizeof (gpinfo
));
5583 memcpy (&gpinfo
.g
, frvfdpic_dynamic_got_plt_info (info
),
5586 /* Clear GOT and PLT assignments. */
5587 htab_traverse (frvfdpic_relocs_info (info
),
5588 _frvfdpic_reset_got_plt_entries
,
5591 if (!_frvfdpic_size_got_plt (obfd
, &gpinfo
))
5598 /* Look for opportunities to relax TLS relocations. We can assume
5599 we're linking the main executable or a static-tls library, since
5600 otherwise we wouldn't have got here. */
5603 _frvfdpic_relax_got_plt_entries (void **entryp
, void *dinfo_
)
5605 struct frvfdpic_relocs_info
*entry
= *entryp
;
5606 struct _frvfdpic_dynamic_got_info
*dinfo
= dinfo_
;
5608 _frvfdpic_relax_tls_entries (entry
, dinfo
, true);
5614 elf32_frvfdpic_relax_section (bfd
*abfd ATTRIBUTE_UNUSED
, asection
*sec
,
5615 struct bfd_link_info
*info
, bool *again
)
5617 struct _frvfdpic_dynamic_got_plt_info gpinfo
;
5619 if (bfd_link_relocatable (info
))
5620 (*info
->callbacks
->einfo
)
5621 (_("%P%F: --relax and -r may not be used together\n"));
5623 /* If we return early, we didn't change anything. */
5626 /* We'll do our thing when requested to relax the GOT section. */
5627 if (sec
!= frvfdpic_got_section (info
))
5630 /* We can only relax when linking the main executable or a library
5631 that can't be dlopened. */
5632 if (! bfd_link_executable (info
) && ! (info
->flags
& DF_STATIC_TLS
))
5635 /* If there isn't a TLS section for this binary, we can't do
5636 anything about its TLS relocations (it probably doesn't have
5638 if (elf_hash_table (info
)->tls_sec
== NULL
)
5641 memset (&gpinfo
, 0, sizeof (gpinfo
));
5642 memcpy (&gpinfo
.g
, frvfdpic_dynamic_got_plt_info (info
), sizeof (gpinfo
.g
));
5644 /* Now look for opportunities to relax, adjusting the GOT usage
5646 htab_traverse (frvfdpic_relocs_info (info
),
5647 _frvfdpic_relax_got_plt_entries
,
5650 /* If we changed anything, reset and re-assign GOT and PLT entries. */
5651 if (memcmp (frvfdpic_dynamic_got_plt_info (info
),
5652 &gpinfo
.g
, sizeof (gpinfo
.g
)) != 0)
5654 /* Clear GOT and PLT assignments. */
5655 htab_traverse (frvfdpic_relocs_info (info
),
5656 _frvfdpic_reset_got_plt_entries
,
5659 /* The owner of the TLS section is the output bfd. There should
5660 be a better way to get to it. */
5661 if (!_frvfdpic_size_got_plt (elf_hash_table (info
)->tls_sec
->owner
,
5665 /* Repeat until we don't make any further changes. We could fail to
5666 introduce changes in a round if, for example, the 12-bit range is
5667 full, but we later release some space by getting rid of TLS
5668 descriptors in it. We have to repeat the whole process because
5669 we might have changed the size of a section processed before this
5677 /* Fill in code and data in dynamic sections. */
5680 elf32_frv_finish_dynamic_sections (bfd
*output_bfd ATTRIBUTE_UNUSED
,
5681 struct bfd_link_info
*info ATTRIBUTE_UNUSED
)
5683 /* Nothing to be done for non-FDPIC. */
5688 elf32_frvfdpic_finish_dynamic_sections (bfd
*output_bfd
,
5689 struct bfd_link_info
*info
)
5694 dynobj
= elf_hash_table (info
)->dynobj
;
5696 if (frvfdpic_dynamic_got_plt_info (info
))
5698 BFD_ASSERT (frvfdpic_dynamic_got_plt_info (info
)->tls_ret_refs
== 0);
5700 if (frvfdpic_got_section (info
))
5702 BFD_ASSERT (frvfdpic_gotrel_section (info
)->size
5703 == (frvfdpic_gotrel_section (info
)->reloc_count
5704 * sizeof (Elf32_External_Rel
)));
5706 if (frvfdpic_gotfixup_section (info
))
5708 struct elf_link_hash_entry
*hgot
= elf_hash_table (info
)->hgot
;
5709 bfd_vma got_value
= hgot
->root
.u
.def
.value
5710 + hgot
->root
.u
.def
.section
->output_section
->vma
5711 + hgot
->root
.u
.def
.section
->output_offset
;
5712 struct bfd_link_hash_entry
*hend
;
5714 _frvfdpic_add_rofixup (output_bfd
, frvfdpic_gotfixup_section (info
),
5717 if (frvfdpic_gotfixup_section (info
)->size
5718 != (frvfdpic_gotfixup_section (info
)->reloc_count
* 4))
5721 info
->callbacks
->einfo
5722 ("LINKER BUG: .rofixup section size mismatch\n");
5726 hend
= bfd_link_hash_lookup (info
->hash
, "__ROFIXUP_END__",
5727 false, false, true);
5729 && (hend
->type
== bfd_link_hash_defined
5730 || hend
->type
== bfd_link_hash_defweak
)
5731 && hend
->u
.def
.section
->output_section
!= NULL
)
5734 frvfdpic_gotfixup_section (info
)->output_section
->vma
5735 + frvfdpic_gotfixup_section (info
)->output_offset
5736 + frvfdpic_gotfixup_section (info
)->size
5737 - hend
->u
.def
.section
->output_section
->vma
5738 - hend
->u
.def
.section
->output_offset
;
5739 BFD_ASSERT (hend
->u
.def
.value
== value
);
5740 if (hend
->u
.def
.value
!= value
)
5745 if (frvfdpic_pltrel_section (info
))
5747 BFD_ASSERT (frvfdpic_pltrel_section (info
)->size
5748 == (frvfdpic_pltrel_section (info
)->reloc_count
5749 * sizeof (Elf32_External_Rel
)));
5753 if (elf_hash_table (info
)->dynamic_sections_created
)
5755 Elf32_External_Dyn
* dyncon
;
5756 Elf32_External_Dyn
* dynconend
;
5758 sdyn
= bfd_get_linker_section (dynobj
, ".dynamic");
5760 BFD_ASSERT (sdyn
!= NULL
);
5762 dyncon
= (Elf32_External_Dyn
*) sdyn
->contents
;
5763 dynconend
= (Elf32_External_Dyn
*) (sdyn
->contents
+ sdyn
->size
);
5765 for (; dyncon
< dynconend
; dyncon
++)
5767 Elf_Internal_Dyn dyn
;
5769 bfd_elf32_swap_dyn_in (dynobj
, dyncon
, &dyn
);
5777 dyn
.d_un
.d_ptr
= frvfdpic_got_section (info
)->output_section
->vma
5778 + frvfdpic_got_section (info
)->output_offset
5779 + frvfdpic_got_initial_offset (info
);
5780 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
5784 dyn
.d_un
.d_ptr
= frvfdpic_pltrel_section (info
)
5785 ->output_section
->vma
5786 + frvfdpic_pltrel_section (info
)->output_offset
;
5787 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
5791 dyn
.d_un
.d_val
= frvfdpic_pltrel_section (info
)->size
;
5792 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
5801 /* Adjust a symbol defined by a dynamic object and referenced by a
5805 elf32_frvfdpic_adjust_dynamic_symbol
5806 (struct bfd_link_info
*info ATTRIBUTE_UNUSED
,
5807 struct elf_link_hash_entry
*h ATTRIBUTE_UNUSED
)
5811 dynobj
= elf_hash_table (info
)->dynobj
;
5813 /* Make sure we know what is going on here. */
5814 BFD_ASSERT (dynobj
!= NULL
5818 && !h
->def_regular
)));
5820 /* If this is a weak symbol, and there is a real definition, the
5821 processor independent code will have arranged for us to see the
5822 real definition first, and we can just use the same value. */
5823 if (h
->is_weakalias
)
5825 struct elf_link_hash_entry
*def
= weakdef (h
);
5826 BFD_ASSERT (def
->root
.type
== bfd_link_hash_defined
);
5827 h
->root
.u
.def
.section
= def
->root
.u
.def
.section
;
5828 h
->root
.u
.def
.value
= def
->root
.u
.def
.value
;
5835 /* Perform any actions needed for dynamic symbols. */
5838 elf32_frvfdpic_finish_dynamic_symbol
5839 (bfd
*output_bfd ATTRIBUTE_UNUSED
,
5840 struct bfd_link_info
*info ATTRIBUTE_UNUSED
,
5841 struct elf_link_hash_entry
*h ATTRIBUTE_UNUSED
,
5842 Elf_Internal_Sym
*sym ATTRIBUTE_UNUSED
)
5847 /* Decide whether to attempt to turn absptr or lsda encodings in
5848 shared libraries into pcrel within the given input section. */
5851 frvfdpic_elf_use_relative_eh_frame
5852 (bfd
*input_bfd ATTRIBUTE_UNUSED
,
5853 struct bfd_link_info
*info ATTRIBUTE_UNUSED
,
5854 asection
*eh_frame_section ATTRIBUTE_UNUSED
)
5856 /* We can't use PC-relative encodings in FDPIC binaries, in general. */
5860 /* Adjust the contents of an eh_frame_hdr section before they're output. */
5863 frvfdpic_elf_encode_eh_address (bfd
*abfd
,
5864 struct bfd_link_info
*info
,
5865 asection
*osec
, bfd_vma offset
,
5866 asection
*loc_sec
, bfd_vma loc_offset
,
5869 struct elf_link_hash_entry
*h
;
5871 h
= elf_hash_table (info
)->hgot
;
5872 BFD_ASSERT (h
&& h
->root
.type
== bfd_link_hash_defined
);
5874 if (! h
|| (_frvfdpic_osec_to_segment (abfd
, osec
)
5875 == _frvfdpic_osec_to_segment (abfd
, loc_sec
->output_section
)))
5876 return _bfd_elf_encode_eh_address (abfd
, info
, osec
, offset
,
5877 loc_sec
, loc_offset
, encoded
);
5879 BFD_ASSERT (_frvfdpic_osec_to_segment (abfd
, osec
)
5880 == (_frvfdpic_osec_to_segment
5881 (abfd
, h
->root
.u
.def
.section
->output_section
)));
5883 *encoded
= osec
->vma
+ offset
5884 - (h
->root
.u
.def
.value
5885 + h
->root
.u
.def
.section
->output_section
->vma
5886 + h
->root
.u
.def
.section
->output_offset
);
5888 return DW_EH_PE_datarel
| DW_EH_PE_sdata4
;
5891 /* Look through the relocs for a section during the first phase.
5893 Besides handling virtual table relocs for gc, we have to deal with
5894 all sorts of PIC-related relocations. We describe below the
5895 general plan on how to handle such relocations, even though we only
5896 collect information at this point, storing them in hash tables for
5897 perusal of later passes.
5899 32 relocations are propagated to the linker output when creating
5900 position-independent output. LO16 and HI16 relocations are not
5901 supposed to be encountered in this case.
5903 LABEL16 should always be resolvable by the linker, since it's only
5906 LABEL24, on the other hand, is used by calls. If it turns out that
5907 the target of a call is a dynamic symbol, a PLT entry must be
5908 created for it, which triggers the creation of a private function
5909 descriptor and, unless lazy binding is disabled, a lazy PLT entry.
5911 GPREL relocations require the referenced symbol to be in the same
5912 segment as _gp, but this can only be checked later.
5914 All GOT, GOTOFF and FUNCDESC relocations require a .got section to
5915 exist. LABEL24 might as well, since it may require a PLT entry,
5916 that will require a got.
5918 Non-FUNCDESC GOT relocations require a GOT entry to be created
5919 regardless of whether the symbol is dynamic. However, since a
5920 global symbol that turns out to not be exported may have the same
5921 address of a non-dynamic symbol, we don't assign GOT entries at
5922 this point, such that we can share them in this case. A relocation
5923 for the GOT entry always has to be created, be it to offset a
5924 private symbol by the section load address, be it to get the symbol
5925 resolved dynamically.
5927 FUNCDESC GOT relocations require a GOT entry to be created, and
5928 handled as if a FUNCDESC relocation was applied to the GOT entry in
5931 FUNCDESC relocations referencing a symbol that turns out to NOT be
5932 dynamic cause a private function descriptor to be created. The
5933 FUNCDESC relocation then decays to a 32 relocation that points at
5934 the private descriptor. If the symbol is dynamic, the FUNCDESC
5935 relocation is propagated to the linker output, such that the
5936 dynamic linker creates the canonical descriptor, pointing to the
5937 dynamically-resolved definition of the function.
5939 Non-FUNCDESC GOTOFF relocations must always refer to non-dynamic
5940 symbols that are assigned to the same segment as the GOT, but we
5941 can only check this later, after we know the complete set of
5942 symbols defined and/or exported.
5944 FUNCDESC GOTOFF relocations require a function descriptor to be
5945 created and, unless lazy binding is disabled or the symbol is not
5946 dynamic, a lazy PLT entry. Since we can't tell at this point
5947 whether a symbol is going to be dynamic, we have to decide later
5948 whether to create a lazy PLT entry or bind the descriptor directly
5949 to the private function.
5951 FUNCDESC_VALUE relocations are not supposed to be present in object
5952 files, but they may very well be simply propagated to the linker
5953 output, since they have no side effect.
5956 A function descriptor always requires a FUNCDESC_VALUE relocation.
5957 Whether it's in .plt.rel or not depends on whether lazy binding is
5958 enabled and on whether the referenced symbol is dynamic.
5960 The existence of a lazy PLT requires the resolverStub lazy PLT
5961 entry to be present.
5964 As for assignment of GOT, PLT and lazy PLT entries, and private
5965 descriptors, we might do them all sequentially, but we can do
5966 better than that. For example, we can place GOT entries and
5967 private function descriptors referenced using 12-bit operands
5968 closer to the PIC register value, such that these relocations don't
5969 overflow. Those that are only referenced with LO16 relocations
5970 could come next, but we may as well place PLT-required function
5971 descriptors in the 12-bit range to make them shorter. Symbols
5972 referenced with LO16/HI16 may come next, but we may place
5973 additional function descriptors in the 16-bit range if we can
5974 reliably tell that we've already placed entries that are ever
5975 referenced with only LO16. PLT entries are therefore generated as
5976 small as possible, while not introducing relocation overflows in
5977 GOT or FUNCDESC_GOTOFF relocations. Lazy PLT entries could be
5978 generated before or after PLT entries, but not intermingled with
5979 them, such that we can have more lazy PLT entries in range for a
5980 branch to the resolverStub. The resolverStub should be emitted at
5981 the most distant location from the first lazy PLT entry such that
5982 it's still in range for a branch, or closer, if there isn't a need
5983 for so many lazy PLT entries. Additional lazy PLT entries may be
5984 emitted after the resolverStub, as long as branches are still in
5985 range. If the branch goes out of range, longer lazy PLT entries
5988 We could further optimize PLT and lazy PLT entries by giving them
5989 priority in assignment to closer-to-gr17 locations depending on the
5990 number of occurrences of references to them (assuming a function
5991 that's called more often is more important for performance, so its
5992 PLT entry should be faster), or taking hints from the compiler.
5993 Given infinite time and money... :-) */
5996 elf32_frv_check_relocs (bfd
*abfd
,
5997 struct bfd_link_info
*info
,
5999 const Elf_Internal_Rela
*relocs
)
6001 Elf_Internal_Shdr
*symtab_hdr
;
6002 struct elf_link_hash_entry
**sym_hashes
;
6003 const Elf_Internal_Rela
*rel
;
6004 const Elf_Internal_Rela
*rel_end
;
6006 struct frvfdpic_relocs_info
*picrel
;
6008 if (bfd_link_relocatable (info
))
6011 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
6012 sym_hashes
= elf_sym_hashes (abfd
);
6014 dynobj
= elf_hash_table (info
)->dynobj
;
6015 rel_end
= relocs
+ sec
->reloc_count
;
6016 for (rel
= relocs
; rel
< rel_end
; rel
++)
6018 struct elf_link_hash_entry
*h
;
6019 unsigned long r_symndx
;
6021 r_symndx
= ELF32_R_SYM (rel
->r_info
);
6022 if (r_symndx
< symtab_hdr
->sh_info
)
6026 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
6027 while (h
->root
.type
== bfd_link_hash_indirect
6028 || h
->root
.type
== bfd_link_hash_warning
)
6029 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
6032 switch (ELF32_R_TYPE (rel
->r_info
))
6034 case R_FRV_GETTLSOFF
:
6035 case R_FRV_TLSDESC_VALUE
:
6036 case R_FRV_GOTTLSDESC12
:
6037 case R_FRV_GOTTLSDESCHI
:
6038 case R_FRV_GOTTLSDESCLO
:
6039 case R_FRV_GOTTLSOFF12
:
6040 case R_FRV_GOTTLSOFFHI
:
6041 case R_FRV_GOTTLSOFFLO
:
6046 case R_FRV_FUNCDESC_GOT12
:
6047 case R_FRV_FUNCDESC_GOTHI
:
6048 case R_FRV_FUNCDESC_GOTLO
:
6049 case R_FRV_GOTOFF12
:
6050 case R_FRV_GOTOFFHI
:
6051 case R_FRV_GOTOFFLO
:
6052 case R_FRV_FUNCDESC_GOTOFF12
:
6053 case R_FRV_FUNCDESC_GOTOFFHI
:
6054 case R_FRV_FUNCDESC_GOTOFFLO
:
6055 case R_FRV_FUNCDESC
:
6056 case R_FRV_FUNCDESC_VALUE
:
6057 case R_FRV_TLSMOFF12
:
6058 case R_FRV_TLSMOFFHI
:
6059 case R_FRV_TLSMOFFLO
:
6061 if (! IS_FDPIC (abfd
))
6065 case R_FRV_GPRELU12
:
6072 elf_hash_table (info
)->dynobj
= dynobj
= abfd
;
6073 if (! _frv_create_got_section (abfd
, info
))
6076 if (! IS_FDPIC (abfd
))
6083 if (h
->dynindx
== -1)
6084 switch (ELF_ST_VISIBILITY (h
->other
))
6090 bfd_elf_link_record_dynamic_symbol (info
, h
);
6094 = frvfdpic_relocs_info_for_global (frvfdpic_relocs_info (info
),
6096 rel
->r_addend
, INSERT
);
6099 picrel
= frvfdpic_relocs_info_for_local (frvfdpic_relocs_info
6100 (info
), abfd
, r_symndx
,
6101 rel
->r_addend
, INSERT
);
6111 switch (ELF32_R_TYPE (rel
->r_info
))
6114 if (IS_FDPIC (abfd
))
6118 case R_FRV_FUNCDESC_VALUE
:
6119 picrel
->relocsfdv
++;
6120 if (bfd_section_flags (sec
) & SEC_ALLOC
)
6125 if (! IS_FDPIC (abfd
))
6129 if (bfd_section_flags (sec
) & SEC_ALLOC
)
6139 picrel
->gothilo
= 1;
6142 case R_FRV_FUNCDESC_GOT12
:
6143 picrel
->fdgot12
= 1;
6146 case R_FRV_FUNCDESC_GOTHI
:
6147 case R_FRV_FUNCDESC_GOTLO
:
6148 picrel
->fdgothilo
= 1;
6151 case R_FRV_GOTOFF12
:
6152 case R_FRV_GOTOFFHI
:
6153 case R_FRV_GOTOFFLO
:
6157 case R_FRV_FUNCDESC_GOTOFF12
:
6158 picrel
->fdgoff12
= 1;
6161 case R_FRV_FUNCDESC_GOTOFFHI
:
6162 case R_FRV_FUNCDESC_GOTOFFLO
:
6163 picrel
->fdgoffhilo
= 1;
6166 case R_FRV_FUNCDESC
:
6171 case R_FRV_GETTLSOFF
:
6175 case R_FRV_TLSDESC_VALUE
:
6176 picrel
->relocstlsd
++;
6179 case R_FRV_GOTTLSDESC12
:
6180 picrel
->tlsdesc12
= 1;
6183 case R_FRV_GOTTLSDESCHI
:
6184 case R_FRV_GOTTLSDESCLO
:
6185 picrel
->tlsdeschilo
= 1;
6188 case R_FRV_TLSMOFF12
:
6189 case R_FRV_TLSMOFFHI
:
6190 case R_FRV_TLSMOFFLO
:
6194 case R_FRV_GOTTLSOFF12
:
6195 picrel
->tlsoff12
= 1;
6196 info
->flags
|= DF_STATIC_TLS
;
6199 case R_FRV_GOTTLSOFFHI
:
6200 case R_FRV_GOTTLSOFFLO
:
6201 picrel
->tlsoffhilo
= 1;
6202 info
->flags
|= DF_STATIC_TLS
;
6206 picrel
->relocstlsoff
++;
6207 info
->flags
|= DF_STATIC_TLS
;
6210 /* This relocation describes the C++ object vtable hierarchy.
6211 Reconstruct it for later use during GC. */
6212 case R_FRV_GNU_VTINHERIT
:
6213 if (!bfd_elf_gc_record_vtinherit (abfd
, sec
, h
, rel
->r_offset
))
6217 /* This relocation describes which C++ vtable entries are actually
6218 used. Record for later use during GC. */
6219 case R_FRV_GNU_VTENTRY
:
6220 if (!bfd_elf_gc_record_vtentry (abfd
, sec
, h
, rel
->r_addend
))
6228 case R_FRV_GPRELU12
:
6232 case R_FRV_TLSDESC_RELAX
:
6233 case R_FRV_GETTLSOFF_RELAX
:
6234 case R_FRV_TLSOFF_RELAX
:
6239 /* xgettext:c-format */
6240 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
6241 abfd
, (unsigned int) ELF32_R_TYPE (rel
->r_info
));
6250 /* Return the machine subcode from the ELF e_flags header. */
6253 elf32_frv_machine (bfd
*abfd
)
6255 switch (elf_elfheader (abfd
)->e_flags
& EF_FRV_CPU_MASK
)
6258 case EF_FRV_CPU_FR550
: return bfd_mach_fr550
;
6259 case EF_FRV_CPU_FR500
: return bfd_mach_fr500
;
6260 case EF_FRV_CPU_FR450
: return bfd_mach_fr450
;
6261 case EF_FRV_CPU_FR405
: return bfd_mach_fr400
;
6262 case EF_FRV_CPU_FR400
: return bfd_mach_fr400
;
6263 case EF_FRV_CPU_FR300
: return bfd_mach_fr300
;
6264 case EF_FRV_CPU_SIMPLE
: return bfd_mach_frvsimple
;
6265 case EF_FRV_CPU_TOMCAT
: return bfd_mach_frvtomcat
;
6268 return bfd_mach_frv
;
6271 /* Set the right machine number for a FRV ELF file. */
6274 elf32_frv_object_p (bfd
*abfd
)
6276 bfd_default_set_arch_mach (abfd
, bfd_arch_frv
, elf32_frv_machine (abfd
));
6277 return (((elf_elfheader (abfd
)->e_flags
& EF_FRV_FDPIC
) != 0)
6278 == (IS_FDPIC (abfd
)));
6281 /* Function to set the ELF flag bits. */
6284 frv_elf_set_private_flags (bfd
*abfd
, flagword flags
)
6286 elf_elfheader (abfd
)->e_flags
= flags
;
6287 elf_flags_init (abfd
) = true;
6291 /* Return true if the architecture described by elf header flag
6292 EXTENSION is an extension of the architecture described by BASE. */
6295 frv_elf_arch_extension_p (flagword base
, flagword extension
)
6297 if (base
== extension
)
6300 /* CPU_GENERIC code can be merged with code for a specific
6301 architecture, in which case the result is marked as being
6302 for the specific architecture. Everything is therefore
6303 an extension of CPU_GENERIC. */
6304 if (base
== EF_FRV_CPU_GENERIC
)
6307 if (extension
== EF_FRV_CPU_FR450
)
6308 if (base
== EF_FRV_CPU_FR400
|| base
== EF_FRV_CPU_FR405
)
6311 if (extension
== EF_FRV_CPU_FR405
)
6312 if (base
== EF_FRV_CPU_FR400
)
6318 /* Merge backend specific data from an object file to the output
6319 object file when linking. */
6322 frv_elf_merge_private_bfd_data (bfd
*ibfd
, struct bfd_link_info
*info
)
6324 bfd
*obfd
= info
->output_bfd
;
6325 flagword old_flags
, old_partial
;
6326 flagword new_flags
, new_partial
;
6331 /* FIXME: What should be checked when linking shared libraries? */
6332 if ((ibfd
->flags
& DYNAMIC
) != 0)
6335 new_opt
[0] = old_opt
[0] = '\0';
6336 new_flags
= elf_elfheader (ibfd
)->e_flags
;
6337 old_flags
= elf_elfheader (obfd
)->e_flags
;
6339 if (new_flags
& EF_FRV_FDPIC
)
6340 new_flags
&= ~EF_FRV_PIC
;
6344 ("old_flags = 0x%.8x, new_flags = 0x%.8x, init = %s, filename = %s",
6345 old_flags
, new_flags
, elf_flags_init (obfd
) ? "yes" : "no",
6346 bfd_get_filename (ibfd
));
6349 if (!elf_flags_init (obfd
)) /* First call, no flags set. */
6351 elf_flags_init (obfd
) = true;
6352 old_flags
= new_flags
;
6355 else if (new_flags
== old_flags
) /* Compatible flags are ok. */
6358 else /* Possibly incompatible flags. */
6360 /* Warn if different # of gprs are used. Note, 0 means nothing is
6361 said about the size of gprs. */
6362 new_partial
= (new_flags
& EF_FRV_GPR_MASK
);
6363 old_partial
= (old_flags
& EF_FRV_GPR_MASK
);
6364 if (new_partial
== old_partial
)
6367 else if (new_partial
== 0)
6370 else if (old_partial
== 0)
6371 old_flags
|= new_partial
;
6375 switch (new_partial
)
6377 default: strcat (new_opt
, " -mgpr-??"); break;
6378 case EF_FRV_GPR_32
: strcat (new_opt
, " -mgpr-32"); break;
6379 case EF_FRV_GPR_64
: strcat (new_opt
, " -mgpr-64"); break;
6382 switch (old_partial
)
6384 default: strcat (old_opt
, " -mgpr-??"); break;
6385 case EF_FRV_GPR_32
: strcat (old_opt
, " -mgpr-32"); break;
6386 case EF_FRV_GPR_64
: strcat (old_opt
, " -mgpr-64"); break;
6390 /* Warn if different # of fprs are used. Note, 0 means nothing is
6391 said about the size of fprs. */
6392 new_partial
= (new_flags
& EF_FRV_FPR_MASK
);
6393 old_partial
= (old_flags
& EF_FRV_FPR_MASK
);
6394 if (new_partial
== old_partial
)
6397 else if (new_partial
== 0)
6400 else if (old_partial
== 0)
6401 old_flags
|= new_partial
;
6405 switch (new_partial
)
6407 default: strcat (new_opt
, " -mfpr-?"); break;
6408 case EF_FRV_FPR_32
: strcat (new_opt
, " -mfpr-32"); break;
6409 case EF_FRV_FPR_64
: strcat (new_opt
, " -mfpr-64"); break;
6410 case EF_FRV_FPR_NONE
: strcat (new_opt
, " -msoft-float"); break;
6413 switch (old_partial
)
6415 default: strcat (old_opt
, " -mfpr-?"); break;
6416 case EF_FRV_FPR_32
: strcat (old_opt
, " -mfpr-32"); break;
6417 case EF_FRV_FPR_64
: strcat (old_opt
, " -mfpr-64"); break;
6418 case EF_FRV_FPR_NONE
: strcat (old_opt
, " -msoft-float"); break;
6422 /* Warn if different dword support was used. Note, 0 means nothing is
6423 said about the dword support. */
6424 new_partial
= (new_flags
& EF_FRV_DWORD_MASK
);
6425 old_partial
= (old_flags
& EF_FRV_DWORD_MASK
);
6426 if (new_partial
== old_partial
)
6429 else if (new_partial
== 0)
6432 else if (old_partial
== 0)
6433 old_flags
|= new_partial
;
6437 switch (new_partial
)
6439 default: strcat (new_opt
, " -mdword-?"); break;
6440 case EF_FRV_DWORD_YES
: strcat (new_opt
, " -mdword"); break;
6441 case EF_FRV_DWORD_NO
: strcat (new_opt
, " -mno-dword"); break;
6444 switch (old_partial
)
6446 default: strcat (old_opt
, " -mdword-?"); break;
6447 case EF_FRV_DWORD_YES
: strcat (old_opt
, " -mdword"); break;
6448 case EF_FRV_DWORD_NO
: strcat (old_opt
, " -mno-dword"); break;
6452 /* Or in flags that accumulate (ie, if one module uses it, mark that the
6454 old_flags
|= new_flags
& (EF_FRV_DOUBLE
6457 | EF_FRV_NON_PIC_RELOCS
);
6459 /* If any module was compiled without -G0, clear the G0 bit. */
6460 old_flags
= ((old_flags
& ~ EF_FRV_G0
)
6461 | (old_flags
& new_flags
& EF_FRV_G0
));
6463 /* If any module was compiled without -mnopack, clear the mnopack bit. */
6464 old_flags
= ((old_flags
& ~ EF_FRV_NOPACK
)
6465 | (old_flags
& new_flags
& EF_FRV_NOPACK
));
6467 /* We don't have to do anything if the pic flags are the same, or the new
6468 module(s) were compiled with -mlibrary-pic. */
6469 new_partial
= (new_flags
& EF_FRV_PIC_FLAGS
);
6470 old_partial
= (old_flags
& EF_FRV_PIC_FLAGS
);
6471 if ((new_partial
== old_partial
) || ((new_partial
& EF_FRV_LIBPIC
) != 0))
6474 /* If the old module(s) were compiled with -mlibrary-pic, copy in the pic
6475 flags if any from the new module. */
6476 else if ((old_partial
& EF_FRV_LIBPIC
) != 0)
6477 old_flags
= (old_flags
& ~ EF_FRV_PIC_FLAGS
) | new_partial
;
6479 /* If we have mixtures of -fpic and -fPIC, or in both bits. */
6480 else if (new_partial
!= 0 && old_partial
!= 0)
6481 old_flags
|= new_partial
;
6483 /* One module was compiled for pic and the other was not, see if we have
6484 had any relocations that are not pic-safe. */
6487 if ((old_flags
& EF_FRV_NON_PIC_RELOCS
) == 0)
6488 old_flags
|= new_partial
;
6491 old_flags
&= ~ EF_FRV_PIC_FLAGS
;
6492 #ifndef FRV_NO_PIC_ERROR
6495 /* xgettext:c-format */
6496 (_("%pB: compiled with %s and linked with modules"
6497 " that use non-pic relocations"),
6498 ibfd
, (new_flags
& EF_FRV_BIGPIC
) ? "-fPIC" : "-fpic");
6503 /* Warn if different cpu is used (allow a specific cpu to override
6504 the generic cpu). */
6505 new_partial
= (new_flags
& EF_FRV_CPU_MASK
);
6506 old_partial
= (old_flags
& EF_FRV_CPU_MASK
);
6507 if (frv_elf_arch_extension_p (new_partial
, old_partial
))
6510 else if (frv_elf_arch_extension_p (old_partial
, new_partial
))
6511 old_flags
= (old_flags
& ~EF_FRV_CPU_MASK
) | new_partial
;
6515 switch (new_partial
)
6517 default: strcat (new_opt
, " -mcpu=?"); break;
6518 case EF_FRV_CPU_GENERIC
: strcat (new_opt
, " -mcpu=frv"); break;
6519 case EF_FRV_CPU_SIMPLE
: strcat (new_opt
, " -mcpu=simple"); break;
6520 case EF_FRV_CPU_FR550
: strcat (new_opt
, " -mcpu=fr550"); break;
6521 case EF_FRV_CPU_FR500
: strcat (new_opt
, " -mcpu=fr500"); break;
6522 case EF_FRV_CPU_FR450
: strcat (new_opt
, " -mcpu=fr450"); break;
6523 case EF_FRV_CPU_FR405
: strcat (new_opt
, " -mcpu=fr405"); break;
6524 case EF_FRV_CPU_FR400
: strcat (new_opt
, " -mcpu=fr400"); break;
6525 case EF_FRV_CPU_FR300
: strcat (new_opt
, " -mcpu=fr300"); break;
6526 case EF_FRV_CPU_TOMCAT
: strcat (new_opt
, " -mcpu=tomcat"); break;
6529 switch (old_partial
)
6531 default: strcat (old_opt
, " -mcpu=?"); break;
6532 case EF_FRV_CPU_GENERIC
: strcat (old_opt
, " -mcpu=frv"); break;
6533 case EF_FRV_CPU_SIMPLE
: strcat (old_opt
, " -mcpu=simple"); break;
6534 case EF_FRV_CPU_FR550
: strcat (old_opt
, " -mcpu=fr550"); break;
6535 case EF_FRV_CPU_FR500
: strcat (old_opt
, " -mcpu=fr500"); break;
6536 case EF_FRV_CPU_FR450
: strcat (old_opt
, " -mcpu=fr450"); break;
6537 case EF_FRV_CPU_FR405
: strcat (old_opt
, " -mcpu=fr405"); break;
6538 case EF_FRV_CPU_FR400
: strcat (old_opt
, " -mcpu=fr400"); break;
6539 case EF_FRV_CPU_FR300
: strcat (old_opt
, " -mcpu=fr300"); break;
6540 case EF_FRV_CPU_TOMCAT
: strcat (old_opt
, " -mcpu=tomcat"); break;
6544 /* Print out any mismatches from above. */
6549 /* xgettext:c-format */
6550 (_("%pB: compiled with %s and linked with modules compiled with %s"),
6551 ibfd
, new_opt
, old_opt
);
6554 /* Warn about any other mismatches */
6555 new_partial
= (new_flags
& ~ EF_FRV_ALL_FLAGS
);
6556 old_partial
= (old_flags
& ~ EF_FRV_ALL_FLAGS
);
6557 if (new_partial
!= old_partial
)
6559 old_flags
|= new_partial
;
6562 /* xgettext:c-format */
6563 (_("%pB: uses different unknown e_flags (%#x) fields"
6564 " than previous modules (%#x)"),
6565 ibfd
, new_partial
, old_partial
);
6569 /* If the cpu is -mcpu=simple, then set the -mnopack bit. */
6570 if ((old_flags
& EF_FRV_CPU_MASK
) == EF_FRV_CPU_SIMPLE
)
6571 old_flags
|= EF_FRV_NOPACK
;
6573 /* Update the old flags now with changes made above. */
6574 old_partial
= elf_elfheader (obfd
)->e_flags
& EF_FRV_CPU_MASK
;
6575 elf_elfheader (obfd
)->e_flags
= old_flags
;
6576 if (old_partial
!= (old_flags
& EF_FRV_CPU_MASK
))
6577 bfd_default_set_arch_mach (obfd
, bfd_arch_frv
, elf32_frv_machine (obfd
));
6579 if (((new_flags
& EF_FRV_FDPIC
) == 0)
6580 != (! IS_FDPIC (ibfd
)))
6583 if (IS_FDPIC (obfd
))
6585 (_("%pB: cannot link non-fdpic object file into fdpic executable"),
6589 (_("%pB: cannot link fdpic object file into non-fdpic executable"),
6594 bfd_set_error (bfd_error_bad_value
);
6601 frv_elf_print_private_bfd_data (bfd
*abfd
, void * ptr
)
6603 FILE *file
= (FILE *) ptr
;
6606 BFD_ASSERT (abfd
!= NULL
&& ptr
!= NULL
);
6608 /* Print normal ELF private data. */
6609 _bfd_elf_print_private_bfd_data (abfd
, ptr
);
6611 flags
= elf_elfheader (abfd
)->e_flags
;
6612 fprintf (file
, _("private flags = 0x%lx:"), (unsigned long) flags
);
6614 switch (flags
& EF_FRV_CPU_MASK
)
6617 case EF_FRV_CPU_SIMPLE
: fprintf (file
, " -mcpu=simple"); break;
6618 case EF_FRV_CPU_FR550
: fprintf (file
, " -mcpu=fr550"); break;
6619 case EF_FRV_CPU_FR500
: fprintf (file
, " -mcpu=fr500"); break;
6620 case EF_FRV_CPU_FR450
: fprintf (file
, " -mcpu=fr450"); break;
6621 case EF_FRV_CPU_FR405
: fprintf (file
, " -mcpu=fr405"); break;
6622 case EF_FRV_CPU_FR400
: fprintf (file
, " -mcpu=fr400"); break;
6623 case EF_FRV_CPU_FR300
: fprintf (file
, " -mcpu=fr300"); break;
6624 case EF_FRV_CPU_TOMCAT
: fprintf (file
, " -mcpu=tomcat"); break;
6627 switch (flags
& EF_FRV_GPR_MASK
)
6630 case EF_FRV_GPR_32
: fprintf (file
, " -mgpr-32"); break;
6631 case EF_FRV_GPR_64
: fprintf (file
, " -mgpr-64"); break;
6634 switch (flags
& EF_FRV_FPR_MASK
)
6637 case EF_FRV_FPR_32
: fprintf (file
, " -mfpr-32"); break;
6638 case EF_FRV_FPR_64
: fprintf (file
, " -mfpr-64"); break;
6639 case EF_FRV_FPR_NONE
: fprintf (file
, " -msoft-float"); break;
6642 switch (flags
& EF_FRV_DWORD_MASK
)
6645 case EF_FRV_DWORD_YES
: fprintf (file
, " -mdword"); break;
6646 case EF_FRV_DWORD_NO
: fprintf (file
, " -mno-dword"); break;
6649 if (flags
& EF_FRV_DOUBLE
)
6650 fprintf (file
, " -mdouble");
6652 if (flags
& EF_FRV_MEDIA
)
6653 fprintf (file
, " -mmedia");
6655 if (flags
& EF_FRV_MULADD
)
6656 fprintf (file
, " -mmuladd");
6658 if (flags
& EF_FRV_PIC
)
6659 fprintf (file
, " -fpic");
6661 if (flags
& EF_FRV_BIGPIC
)
6662 fprintf (file
, " -fPIC");
6664 if (flags
& EF_FRV_LIBPIC
)
6665 fprintf (file
, " -mlibrary-pic");
6667 if (flags
& EF_FRV_FDPIC
)
6668 fprintf (file
, " -mfdpic");
6670 if (flags
& EF_FRV_NON_PIC_RELOCS
)
6671 fprintf (file
, " non-pic relocations");
6673 if (flags
& EF_FRV_G0
)
6674 fprintf (file
, " -G0");
6681 /* Support for core dump NOTE sections. */
6684 elf32_frv_grok_prstatus (bfd
*abfd
, Elf_Internal_Note
*note
)
6687 unsigned int raw_size
;
6689 switch (note
->descsz
)
6694 /* The Linux/FRV elf_prstatus struct is 268 bytes long. The other
6695 hardcoded offsets and sizes listed below (and contained within
6696 this lexical block) refer to fields in the target's elf_prstatus
6699 /* `pr_cursig' is at offset 12. */
6700 elf_tdata (abfd
)->core
->signal
= bfd_get_16 (abfd
, note
->descdata
+ 12);
6702 /* `pr_pid' is at offset 24. */
6703 elf_tdata (abfd
)->core
->lwpid
= bfd_get_32 (abfd
, note
->descdata
+ 24);
6705 /* `pr_reg' is at offset 72. */
6708 /* Most grok_prstatus implementations set `raw_size' to the size
6709 of the pr_reg field. For Linux/FRV, we set `raw_size' to be
6710 the size of `pr_reg' plus the size of `pr_exec_fdpic_loadmap'
6711 and `pr_interp_fdpic_loadmap', both of which (by design)
6712 immediately follow `pr_reg'. This will allow these fields to
6713 be viewed by GDB as registers.
6715 `pr_reg' is 184 bytes long. `pr_exec_fdpic_loadmap' and
6716 `pr_interp_fdpic_loadmap' are 4 bytes each. */
6717 raw_size
= 184 + 4 + 4;
6722 /* Make a ".reg/999" section. */
6723 return _bfd_elfcore_make_pseudosection (abfd
, ".reg", raw_size
,
6724 note
->descpos
+ offset
);
6728 elf32_frv_grok_psinfo (bfd
*abfd
, Elf_Internal_Note
*note
)
6730 switch (note
->descsz
)
6735 /* The Linux/FRV elf_prpsinfo struct is 124 bytes long. */
6738 /* `pr_fname' is found at offset 28 and is 16 bytes long. */
6739 elf_tdata (abfd
)->core
->program
6740 = _bfd_elfcore_strndup (abfd
, note
->descdata
+ 28, 16);
6742 /* `pr_psargs' is found at offset 44 and is 80 bytes long. */
6743 elf_tdata (abfd
)->core
->command
6744 = _bfd_elfcore_strndup (abfd
, note
->descdata
+ 44, 80);
6747 /* Note that for some reason, a spurious space is tacked
6748 onto the end of the args in some (at least one anyway)
6749 implementations, so strip it off if it exists. */
6752 char *command
= elf_tdata (abfd
)->core
->command
;
6753 int n
= strlen (command
);
6755 if (0 < n
&& command
[n
- 1] == ' ')
6756 command
[n
- 1] = '\0';
6761 #define ELF_ARCH bfd_arch_frv
6762 #define ELF_MACHINE_CODE EM_CYGNUS_FRV
6763 #define ELF_MAXPAGESIZE 0x1000
6765 #define TARGET_BIG_SYM frv_elf32_vec
6766 #define TARGET_BIG_NAME "elf32-frv"
6768 #define elf_info_to_howto frv_info_to_howto_rela
6769 #define elf_backend_relocate_section elf32_frv_relocate_section
6770 #define elf_backend_gc_mark_hook elf32_frv_gc_mark_hook
6771 #define elf_backend_check_relocs elf32_frv_check_relocs
6772 #define elf_backend_object_p elf32_frv_object_p
6773 #define elf_backend_add_symbol_hook elf32_frv_add_symbol_hook
6775 #define elf_backend_stack_align 8
6776 #define elf_backend_can_gc_sections 1
6777 #define elf_backend_rela_normal 1
6779 #define bfd_elf32_bfd_reloc_type_lookup frv_reloc_type_lookup
6780 #define bfd_elf32_bfd_reloc_name_lookup frv_reloc_name_lookup
6781 #define bfd_elf32_bfd_set_private_flags frv_elf_set_private_flags
6782 #define bfd_elf32_bfd_merge_private_bfd_data frv_elf_merge_private_bfd_data
6783 #define bfd_elf32_bfd_print_private_bfd_data frv_elf_print_private_bfd_data
6785 #define elf_backend_want_got_sym 1
6786 #define elf_backend_got_header_size 0
6787 #define elf_backend_want_got_plt 0
6788 #define elf_backend_plt_readonly 1
6789 #define elf_backend_want_plt_sym 0
6790 #define elf_backend_plt_header_size 0
6792 #define elf_backend_finish_dynamic_sections \
6793 elf32_frv_finish_dynamic_sections
6795 #define elf_backend_grok_prstatus elf32_frv_grok_prstatus
6796 #define elf_backend_grok_psinfo elf32_frv_grok_psinfo
6798 #define elf_backend_linux_prpsinfo32_ugid16 true
6800 #include "elf32-target.h"
6802 #undef ELF_TARGET_ID
6803 #define ELF_TARGET_ID FRV_ELF_DATA
6804 #undef ELF_MAXPAGESIZE
6805 #define ELF_MAXPAGESIZE 0x4000
6807 #undef TARGET_BIG_SYM
6808 #define TARGET_BIG_SYM frv_elf32_fdpic_vec
6809 #undef TARGET_BIG_NAME
6810 #define TARGET_BIG_NAME "elf32-frvfdpic"
6812 #define elf32_bed elf32_frvfdpic_bed
6814 #undef elf_info_to_howto_rel
6815 #define elf_info_to_howto_rel frvfdpic_info_to_howto_rel
6817 #undef bfd_elf32_bfd_link_hash_table_create
6818 #define bfd_elf32_bfd_link_hash_table_create \
6819 frvfdpic_elf_link_hash_table_create
6820 #undef elf_backend_always_size_sections
6821 #define elf_backend_always_size_sections \
6822 elf32_frvfdpic_always_size_sections
6824 #undef elf_backend_create_dynamic_sections
6825 #define elf_backend_create_dynamic_sections \
6826 elf32_frvfdpic_create_dynamic_sections
6827 #undef elf_backend_adjust_dynamic_symbol
6828 #define elf_backend_adjust_dynamic_symbol \
6829 elf32_frvfdpic_adjust_dynamic_symbol
6830 #undef elf_backend_size_dynamic_sections
6831 #define elf_backend_size_dynamic_sections \
6832 elf32_frvfdpic_size_dynamic_sections
6833 #undef bfd_elf32_bfd_relax_section
6834 #define bfd_elf32_bfd_relax_section \
6835 elf32_frvfdpic_relax_section
6836 #undef elf_backend_finish_dynamic_symbol
6837 #define elf_backend_finish_dynamic_symbol \
6838 elf32_frvfdpic_finish_dynamic_symbol
6839 #undef elf_backend_finish_dynamic_sections
6840 #define elf_backend_finish_dynamic_sections \
6841 elf32_frvfdpic_finish_dynamic_sections
6843 #undef elf_backend_discard_info
6844 #define elf_backend_discard_info \
6845 frvfdpic_elf_discard_info
6846 #undef elf_backend_can_make_relative_eh_frame
6847 #define elf_backend_can_make_relative_eh_frame \
6848 frvfdpic_elf_use_relative_eh_frame
6849 #undef elf_backend_can_make_lsda_relative_eh_frame
6850 #define elf_backend_can_make_lsda_relative_eh_frame \
6851 frvfdpic_elf_use_relative_eh_frame
6852 #undef elf_backend_encode_eh_address
6853 #define elf_backend_encode_eh_address \
6854 frvfdpic_elf_encode_eh_address
6856 #undef elf_backend_may_use_rel_p
6857 #define elf_backend_may_use_rel_p 1
6858 #undef elf_backend_may_use_rela_p
6859 #define elf_backend_may_use_rela_p 1
6860 /* We use REL for dynamic relocations only. */
6861 #undef elf_backend_default_use_rela_p
6862 #define elf_backend_default_use_rela_p 1
6864 #undef elf_backend_omit_section_dynsym
6865 #define elf_backend_omit_section_dynsym _frvfdpic_link_omit_section_dynsym
6867 #include "elf32-target.h"