elf32-or1k.c revision 1.5 1 1.1 christos /* Or1k-specific support for 32-bit ELF.
2 1.5 christos Copyright (C) 2001-2017 Free Software Foundation, Inc.
3 1.1 christos Contributed for OR32 by Johan Rydberg, jrydberg (at) opencores.org
4 1.1 christos
5 1.1 christos PIC parts added by Stefan Kristiansson, stefan.kristiansson (at) saunalahti.fi,
6 1.1 christos largely based on elf32-m32r.c and elf32-microblaze.c.
7 1.1 christos
8 1.1 christos This file is part of BFD, the Binary File Descriptor library.
9 1.1 christos
10 1.1 christos This program is free software; you can redistribute it and/or modify
11 1.1 christos it under the terms of the GNU General Public License as published by
12 1.1 christos the Free Software Foundation; either version 3 of the License, or
13 1.1 christos (at your option) any later version.
14 1.1 christos
15 1.1 christos This program is distributed in the hope that it will be useful,
16 1.1 christos but WITHOUT ANY WARRANTY; without even the implied warranty of
17 1.1 christos MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 1.1 christos GNU General Public License for more details.
19 1.1 christos
20 1.1 christos You should have received a copy of the GNU General Public License
21 1.1 christos along with this program; if not, see <http://www.gnu.org/licenses/>. */
22 1.1 christos
23 1.1 christos #include "sysdep.h"
24 1.1 christos #include "bfd.h"
25 1.1 christos #include "libbfd.h"
26 1.1 christos #include "elf-bfd.h"
27 1.1 christos #include "elf/or1k.h"
28 1.1 christos #include "libiberty.h"
29 1.1 christos
30 1.1 christos #define PLT_ENTRY_SIZE 20
31 1.1 christos
32 1.1 christos #define PLT0_ENTRY_WORD0 0x19800000 /* l.movhi r12, 0 <- hi(.got+4) */
33 1.1 christos #define PLT0_ENTRY_WORD1 0xa98c0000 /* l.ori r12, r12, 0 <- lo(.got+4) */
34 1.1 christos #define PLT0_ENTRY_WORD2 0x85ec0004 /* l.lwz r15, 4(r12) <- *(.got+8)*/
35 1.1 christos #define PLT0_ENTRY_WORD3 0x44007800 /* l.jr r15 */
36 1.1 christos #define PLT0_ENTRY_WORD4 0x858c0000 /* l.lwz r12, 0(r12) */
37 1.1 christos
38 1.1 christos #define PLT0_PIC_ENTRY_WORD0 0x85900004 /* l.lwz r12, 4(r16) */
39 1.1 christos #define PLT0_PIC_ENTRY_WORD1 0x85f00008 /* l.lwz r15, 8(r16) */
40 1.1 christos #define PLT0_PIC_ENTRY_WORD2 0x44007800 /* l.jr r15 */
41 1.1 christos #define PLT0_PIC_ENTRY_WORD3 0x15000000 /* l.nop */
42 1.1 christos #define PLT0_PIC_ENTRY_WORD4 0x15000000 /* l.nop */
43 1.1 christos
44 1.1 christos #define PLT_ENTRY_WORD0 0x19800000 /* l.movhi r12, 0 <- hi(got idx addr) */
45 1.1 christos #define PLT_ENTRY_WORD1 0xa98c0000 /* l.ori r12, r12, 0 <- lo(got idx addr) */
46 1.1 christos #define PLT_ENTRY_WORD2 0x858c0000 /* l.lwz r12, 0(r12) */
47 1.1 christos #define PLT_ENTRY_WORD3 0x44006000 /* l.jr r12 */
48 1.1 christos #define PLT_ENTRY_WORD4 0xa9600000 /* l.ori r11, r0, 0 <- reloc offset */
49 1.1 christos
50 1.1 christos #define PLT_PIC_ENTRY_WORD0 0x85900000 /* l.lwz r12, 0(r16) <- index in got */
51 1.1 christos #define PLT_PIC_ENTRY_WORD1 0xa9600000 /* l.ori r11, r0, 0 <- reloc offset */
52 1.1 christos #define PLT_PIC_ENTRY_WORD2 0x44006000 /* l.jr r12 */
53 1.1 christos #define PLT_PIC_ENTRY_WORD3 0x15000000 /* l.nop */
54 1.1 christos #define PLT_PIC_ENTRY_WORD4 0x15000000 /* l.nop */
55 1.1 christos
56 1.1 christos #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
57 1.1 christos
58 1.1 christos static reloc_howto_type or1k_elf_howto_table[] =
59 1.1 christos {
60 1.1 christos /* This reloc does nothing. */
61 1.1 christos HOWTO (R_OR1K_NONE, /* type */
62 1.1 christos 0, /* rightshift */
63 1.3 christos 3, /* size (0 = byte, 1 = short, 2 = long) */
64 1.3 christos 0, /* bitsize */
65 1.1 christos FALSE, /* pc_relative */
66 1.1 christos 0, /* bitpos */
67 1.1 christos complain_overflow_dont, /* complain_on_overflow */
68 1.1 christos bfd_elf_generic_reloc, /* special_function */
69 1.1 christos "R_OR1K_NONE", /* name */
70 1.1 christos FALSE, /* partial_inplace */
71 1.1 christos 0, /* src_mask */
72 1.1 christos 0, /* dst_mask */
73 1.1 christos FALSE), /* pcrel_offset */
74 1.1 christos
75 1.1 christos HOWTO (R_OR1K_32,
76 1.1 christos 0, /* rightshift */
77 1.1 christos 2, /* size (0 = byte, 1 = short, 2 = long) */
78 1.1 christos 32, /* bitsize */
79 1.1 christos FALSE, /* pc_relative */
80 1.1 christos 0, /* bitpos */
81 1.1 christos complain_overflow_unsigned, /* complain_on_overflow */
82 1.1 christos bfd_elf_generic_reloc, /* special_function */
83 1.1 christos "R_OR1K_32", /* name */
84 1.1 christos FALSE, /* partial_inplace */
85 1.1 christos 0, /* src_mask */
86 1.1 christos 0xffffffff, /* dst_mask */
87 1.1 christos FALSE), /* pcrel_offset */
88 1.1 christos
89 1.1 christos HOWTO (R_OR1K_16,
90 1.1 christos 0, /* rightshift */
91 1.1 christos 1, /* size (0 = byte, 1 = short, 2 = long) */
92 1.1 christos 16, /* bitsize */
93 1.1 christos FALSE, /* pc_relative */
94 1.1 christos 0, /* bitpos */
95 1.1 christos complain_overflow_unsigned, /* complain_on_overflow */
96 1.1 christos bfd_elf_generic_reloc, /* special_function */
97 1.1 christos "R_OR1K_16", /* name */
98 1.1 christos FALSE, /* partial_inplace */
99 1.1 christos 0, /* src_mask */
100 1.1 christos 0xffff, /* dst_mask */
101 1.1 christos FALSE), /* pcrel_offset */
102 1.1 christos
103 1.1 christos HOWTO (R_OR1K_8,
104 1.1 christos 0, /* rightshift */
105 1.1 christos 0, /* size (0 = byte, 1 = short, 2 = long) */
106 1.1 christos 8, /* bitsize */
107 1.1 christos FALSE, /* pc_relative */
108 1.1 christos 0, /* bitpos */
109 1.1 christos complain_overflow_unsigned, /* complain_on_overflow */
110 1.1 christos bfd_elf_generic_reloc, /* special_function */
111 1.1 christos "R_OR1K_8", /* name */
112 1.1 christos FALSE, /* partial_inplace */
113 1.1 christos 0, /* src_mask */
114 1.1 christos 0xff, /* dst_mask */
115 1.1 christos FALSE), /* pcrel_offset */
116 1.1 christos
117 1.1 christos HOWTO (R_OR1K_LO_16_IN_INSN, /* type */
118 1.1 christos 0, /* rightshift */
119 1.1 christos 2, /* size (0 = byte, 1 = short, 2 = long) */
120 1.1 christos 16, /* bitsize */
121 1.1 christos FALSE, /* pc_relative */
122 1.1 christos 0, /* bitpos */
123 1.1 christos complain_overflow_dont, /* complain_on_overflow */
124 1.1 christos bfd_elf_generic_reloc, /* special_function */
125 1.1 christos "R_OR1K_LO_16_IN_INSN", /* name */
126 1.1 christos FALSE, /* partial_inplace */
127 1.1 christos 0, /* src_mask */
128 1.1 christos 0x0000ffff, /* dst_mask */
129 1.1 christos FALSE), /* pcrel_offset */
130 1.1 christos
131 1.1 christos HOWTO (R_OR1K_HI_16_IN_INSN, /* type */
132 1.1 christos 16, /* rightshift */
133 1.1 christos 2, /* size (0 = byte, 1 = short, 2 = long) */
134 1.1 christos 16, /* bitsize */
135 1.1 christos FALSE, /* pc_relative */
136 1.1 christos 0, /* bitpos */
137 1.1 christos complain_overflow_dont, /* complain_on_overflow */
138 1.1 christos bfd_elf_generic_reloc, /* special_function */
139 1.1 christos "R_OR1K_HI_16_IN_INSN", /* name */
140 1.1 christos FALSE, /* partial_inplace */
141 1.1 christos 0, /* src_mask */
142 1.1 christos 0x0000ffff, /* dst_mask */
143 1.1 christos FALSE), /* pcrel_offset */
144 1.1 christos
145 1.1 christos /* A PC relative 26 bit relocation, right shifted by 2. */
146 1.1 christos HOWTO (R_OR1K_INSN_REL_26, /* type */
147 1.1 christos 2, /* rightshift */
148 1.1 christos 2, /* size (0 = byte, 1 = short, 2 = long) */
149 1.1 christos 26, /* bitsize */
150 1.1 christos TRUE, /* pc_relative */
151 1.1 christos 0, /* bitpos */
152 1.1 christos complain_overflow_signed, /* complain_on_overflow */
153 1.1 christos bfd_elf_generic_reloc, /* special_function */
154 1.1 christos "R_OR1K_INSN_REL_26", /* name */
155 1.1 christos FALSE, /* partial_inplace */
156 1.1 christos 0, /* src_mask */
157 1.1 christos 0x03ffffff, /* dst_mask */
158 1.1 christos TRUE), /* pcrel_offset */
159 1.1 christos
160 1.1 christos /* GNU extension to record C++ vtable hierarchy. */
161 1.1 christos HOWTO (R_OR1K_GNU_VTINHERIT, /* type */
162 1.1 christos 0, /* rightshift */
163 1.1 christos 2, /* size (0 = byte, 1 = short, 2 = long) */
164 1.1 christos 0, /* bitsize */
165 1.1 christos FALSE, /* pc_relative */
166 1.1 christos 0, /* bitpos */
167 1.1 christos complain_overflow_dont, /* complain_on_overflow */
168 1.1 christos NULL, /* special_function */
169 1.1 christos "R_OR1K_GNU_VTINHERIT", /* name */
170 1.1 christos FALSE, /* partial_inplace */
171 1.1 christos 0, /* src_mask */
172 1.1 christos 0, /* dst_mask */
173 1.1 christos FALSE), /* pcrel_offset */
174 1.1 christos
175 1.1 christos /* GNU extension to record C++ vtable member usage. */
176 1.1 christos HOWTO (R_OR1K_GNU_VTENTRY, /* type */
177 1.1 christos 0, /* rightshift */
178 1.1 christos 2, /* size (0 = byte, 1 = short, 2 = long) */
179 1.1 christos 0, /* bitsize */
180 1.1 christos FALSE, /* pc_relative */
181 1.1 christos 0, /* bitpos */
182 1.1 christos complain_overflow_dont, /* complain_on_overflow */
183 1.1 christos _bfd_elf_rel_vtable_reloc_fn, /* special_function */
184 1.1 christos "R_OR1K_GNU_VTENTRY", /* name */
185 1.1 christos FALSE, /* partial_inplace */
186 1.1 christos 0, /* src_mask */
187 1.1 christos 0, /* dst_mask */
188 1.1 christos FALSE), /* pcrel_offset */
189 1.1 christos
190 1.1 christos HOWTO (R_OR1K_32_PCREL,
191 1.1 christos 0, /* rightshift */
192 1.1 christos 2, /* size (0 = byte, 1 = short, 2 = long) */
193 1.1 christos 32, /* bitsize */
194 1.1 christos TRUE, /* pc_relative */
195 1.1 christos 0, /* bitpos */
196 1.1 christos complain_overflow_signed, /* complain_on_overflow */
197 1.1 christos bfd_elf_generic_reloc, /* special_function */
198 1.1 christos "R_OR1K_32_PCREL", /* name */
199 1.1 christos FALSE, /* partial_inplace */
200 1.1 christos 0, /* src_mask */
201 1.1 christos 0xffffffff, /* dst_mask */
202 1.4 christos TRUE), /* pcrel_offset */
203 1.1 christos
204 1.1 christos HOWTO (R_OR1K_16_PCREL,
205 1.1 christos 0, /* rightshift */
206 1.1 christos 1, /* size (0 = byte, 1 = short, 2 = long) */
207 1.1 christos 16, /* bitsize */
208 1.1 christos TRUE, /* pc_relative */
209 1.1 christos 0, /* bitpos */
210 1.1 christos complain_overflow_signed, /* complain_on_overflow */
211 1.1 christos bfd_elf_generic_reloc, /* special_function */
212 1.1 christos "R_OR1K_16_PCREL", /* name */
213 1.1 christos FALSE, /* partial_inplace */
214 1.1 christos 0, /* src_mask */
215 1.1 christos 0xffff, /* dst_mask */
216 1.4 christos TRUE), /* pcrel_offset */
217 1.1 christos
218 1.1 christos HOWTO (R_OR1K_8_PCREL,
219 1.1 christos 0, /* rightshift */
220 1.1 christos 0, /* size (0 = byte, 1 = short, 2 = long) */
221 1.1 christos 8, /* bitsize */
222 1.1 christos TRUE, /* pc_relative */
223 1.1 christos 0, /* bitpos */
224 1.1 christos complain_overflow_signed, /* complain_on_overflow */
225 1.1 christos bfd_elf_generic_reloc, /* special_function */
226 1.1 christos "R_OR1K_8_PCREL", /* name */
227 1.1 christos FALSE, /* partial_inplace */
228 1.1 christos 0, /* src_mask */
229 1.1 christos 0xff, /* dst_mask */
230 1.4 christos TRUE), /* pcrel_offset */
231 1.1 christos
232 1.1 christos HOWTO (R_OR1K_GOTPC_HI16, /* Type. */
233 1.1 christos 16, /* Rightshift. */
234 1.1 christos 2, /* Size (0 = byte, 1 = short, 2 = long). */
235 1.1 christos 16, /* Bitsize. */
236 1.1 christos TRUE, /* PC_relative. */
237 1.1 christos 0, /* Bitpos. */
238 1.1 christos complain_overflow_dont, /* Complain on overflow. */
239 1.1 christos bfd_elf_generic_reloc, /* Special Function. */
240 1.1 christos "R_OR1K_GOTPC_HI16", /* Name. */
241 1.1 christos FALSE, /* Partial Inplace. */
242 1.1 christos 0, /* Source Mask. */
243 1.1 christos 0xffff, /* Dest Mask. */
244 1.1 christos TRUE), /* PC relative offset? */
245 1.1 christos
246 1.1 christos HOWTO (R_OR1K_GOTPC_LO16, /* Type. */
247 1.1 christos 0, /* Rightshift. */
248 1.1 christos 2, /* Size (0 = byte, 1 = short, 2 = long). */
249 1.1 christos 16, /* Bitsize. */
250 1.1 christos TRUE, /* PC_relative. */
251 1.1 christos 0, /* Bitpos. */
252 1.1 christos complain_overflow_dont, /* Complain on overflow. */
253 1.1 christos bfd_elf_generic_reloc, /* Special Function. */
254 1.1 christos "R_OR1K_GOTPC_LO16", /* Name. */
255 1.1 christos FALSE, /* Partial Inplace. */
256 1.1 christos 0, /* Source Mask. */
257 1.1 christos 0xffff, /* Dest Mask. */
258 1.1 christos TRUE), /* PC relative offset? */
259 1.1 christos
260 1.1 christos HOWTO (R_OR1K_GOT16, /* type */
261 1.1 christos 0, /* rightshift */
262 1.1 christos 2, /* size (0 = byte, 1 = short, 2 = long) */
263 1.1 christos 16, /* bitsize */
264 1.1 christos FALSE, /* pc_relative */
265 1.1 christos 0, /* bitpos */
266 1.1 christos complain_overflow_signed, /* complain_on_overflow */
267 1.1 christos bfd_elf_generic_reloc, /* special_function */
268 1.1 christos "R_OR1K_GOT16", /* name */
269 1.1 christos FALSE, /* partial_inplace */
270 1.1 christos 0, /* src_mask */
271 1.1 christos 0xffff, /* dst_mask */
272 1.1 christos FALSE), /* pcrel_offset */
273 1.1 christos
274 1.1 christos /* A 26 bit PLT relocation. Shifted by 2. */
275 1.1 christos HOWTO (R_OR1K_PLT26, /* Type. */
276 1.1 christos 2, /* Rightshift. */
277 1.1 christos 2, /* Size (0 = byte, 1 = short, 2 = long). */
278 1.1 christos 26, /* Bitsize. */
279 1.1 christos TRUE, /* PC_relative. */
280 1.1 christos 0, /* Bitpos. */
281 1.1 christos complain_overflow_dont, /* Complain on overflow. */
282 1.1 christos bfd_elf_generic_reloc,/* Special Function. */
283 1.1 christos "R_OR1K_PLT26", /* Name. */
284 1.1 christos FALSE, /* Partial Inplace. */
285 1.1 christos 0, /* Source Mask. */
286 1.1 christos 0x03ffffff, /* Dest Mask. */
287 1.1 christos TRUE), /* PC relative offset? */
288 1.1 christos
289 1.1 christos HOWTO (R_OR1K_GOTOFF_HI16, /* type */
290 1.1 christos 16, /* rightshift */
291 1.1 christos 2, /* size (0 = byte, 1 = short, 2 = long) */
292 1.1 christos 16, /* bitsize */
293 1.1 christos FALSE, /* pc_relative */
294 1.1 christos 0, /* bitpos */
295 1.1 christos complain_overflow_dont, /* complain_on_overflow */
296 1.1 christos bfd_elf_generic_reloc, /* special_function */
297 1.1 christos "R_OR1K_GOTOFF_HI16", /* name */
298 1.1 christos FALSE, /* partial_inplace */
299 1.1 christos 0x0, /* src_mask */
300 1.1 christos 0xffff, /* dst_mask */
301 1.1 christos FALSE), /* pcrel_offset */
302 1.1 christos
303 1.1 christos HOWTO (R_OR1K_GOTOFF_LO16, /* type */
304 1.1 christos 0, /* rightshift */
305 1.1 christos 2, /* size (0 = byte, 1 = short, 2 = long) */
306 1.1 christos 16, /* bitsize */
307 1.1 christos FALSE, /* pc_relative */
308 1.1 christos 0, /* bitpos */
309 1.1 christos complain_overflow_dont, /* complain_on_overflow */
310 1.1 christos bfd_elf_generic_reloc, /* special_function */
311 1.1 christos "R_OR1K_GOTOFF_LO16", /* name */
312 1.1 christos FALSE, /* partial_inplace */
313 1.1 christos 0x0, /* src_mask */
314 1.1 christos 0xffff, /* dst_mask */
315 1.1 christos FALSE), /* pcrel_offset */
316 1.1 christos
317 1.1 christos HOWTO (R_OR1K_COPY, /* type */
318 1.1 christos 0, /* rightshift */
319 1.1 christos 2, /* size (0 = byte, 1 = short, 2 = long) */
320 1.1 christos 32, /* bitsize */
321 1.1 christos FALSE, /* pc_relative */
322 1.1 christos 0, /* bitpos */
323 1.1 christos complain_overflow_bitfield, /* complain_on_overflow */
324 1.1 christos bfd_elf_generic_reloc, /* special_function */
325 1.1 christos "R_OR1K_COPY", /* name */
326 1.1 christos FALSE, /* partial_inplace */
327 1.1 christos 0xffffffff, /* src_mask */
328 1.1 christos 0xffffffff, /* dst_mask */
329 1.1 christos FALSE), /* pcrel_offset */
330 1.1 christos
331 1.1 christos HOWTO (R_OR1K_GLOB_DAT, /* type */
332 1.1 christos 0, /* rightshift */
333 1.1 christos 2, /* size (0 = byte, 1 = short, 2 = long) */
334 1.1 christos 32, /* bitsize */
335 1.1 christos FALSE, /* pc_relative */
336 1.1 christos 0, /* bitpos */
337 1.1 christos complain_overflow_bitfield, /* complain_on_overflow */
338 1.1 christos bfd_elf_generic_reloc, /* special_function */
339 1.1 christos "R_OR1K_GLOB_DAT", /* name */
340 1.1 christos FALSE, /* partial_inplace */
341 1.1 christos 0xffffffff, /* src_mask */
342 1.1 christos 0xffffffff, /* dst_mask */
343 1.1 christos FALSE), /* pcrel_offset */
344 1.1 christos
345 1.1 christos HOWTO (R_OR1K_JMP_SLOT, /* type */
346 1.1 christos 0, /* rightshift */
347 1.1 christos 2, /* size (0 = byte, 1 = short, 2 = long) */
348 1.1 christos 32, /* bitsize */
349 1.1 christos FALSE, /* pc_relative */
350 1.1 christos 0, /* bitpos */
351 1.1 christos complain_overflow_bitfield, /* complain_on_overflow */
352 1.1 christos bfd_elf_generic_reloc, /* special_function */
353 1.1 christos "R_OR1K_JMP_SLOT", /* name */
354 1.1 christos FALSE, /* partial_inplace */
355 1.1 christos 0xffffffff, /* src_mask */
356 1.1 christos 0xffffffff, /* dst_mask */
357 1.1 christos FALSE), /* pcrel_offset */
358 1.1 christos
359 1.1 christos HOWTO (R_OR1K_RELATIVE, /* type */
360 1.1 christos 0, /* rightshift */
361 1.1 christos 2, /* size (0 = byte, 1 = short, 2 = long) */
362 1.1 christos 32, /* bitsize */
363 1.1 christos FALSE, /* pc_relative */
364 1.1 christos 0, /* bitpos */
365 1.1 christos complain_overflow_bitfield, /* complain_on_overflow */
366 1.1 christos bfd_elf_generic_reloc, /* special_function */
367 1.1 christos "R_OR1K_RELATIVE", /* name */
368 1.1 christos FALSE, /* partial_inplace */
369 1.1 christos 0xffffffff, /* src_mask */
370 1.1 christos 0xffffffff, /* dst_mask */
371 1.1 christos FALSE), /* pcrel_offset */
372 1.1 christos
373 1.1 christos HOWTO (R_OR1K_TLS_GD_HI16, /* type */
374 1.1 christos 16, /* rightshift */
375 1.1 christos 2, /* size (0 = byte, 1 = short, 2 = long) */
376 1.1 christos 16, /* bitsize */
377 1.1 christos FALSE, /* pc_relative */
378 1.1 christos 0, /* bitpos */
379 1.1 christos complain_overflow_dont, /* complain_on_overflow */
380 1.1 christos bfd_elf_generic_reloc, /* special_function */
381 1.1 christos "R_OR1K_TLS_GD_HI16", /* name */
382 1.1 christos FALSE, /* partial_inplace */
383 1.1 christos 0x0, /* src_mask */
384 1.1 christos 0xffff, /* dst_mask */
385 1.1 christos FALSE), /* pcrel_offset */
386 1.1 christos
387 1.1 christos HOWTO (R_OR1K_TLS_GD_LO16, /* type */
388 1.1 christos 0, /* rightshift */
389 1.1 christos 2, /* size (0 = byte, 1 = short, 2 = long) */
390 1.1 christos 16, /* bitsize */
391 1.1 christos FALSE, /* pc_relative */
392 1.1 christos 0, /* bitpos */
393 1.1 christos complain_overflow_dont, /* complain_on_overflow */
394 1.1 christos bfd_elf_generic_reloc, /* special_function */
395 1.1 christos "R_OR1K_TLS_GD_LO16", /* name */
396 1.1 christos FALSE, /* partial_inplace */
397 1.1 christos 0x0, /* src_mask */
398 1.1 christos 0xffff, /* dst_mask */
399 1.1 christos FALSE), /* pcrel_offset */
400 1.1 christos
401 1.1 christos HOWTO (R_OR1K_TLS_LDM_HI16, /* type */
402 1.1 christos 16, /* rightshift */
403 1.1 christos 2, /* size (0 = byte, 1 = short, 2 = long) */
404 1.1 christos 16, /* bitsize */
405 1.1 christos FALSE, /* pc_relative */
406 1.1 christos 0, /* bitpos */
407 1.1 christos complain_overflow_dont, /* complain_on_overflow */
408 1.1 christos bfd_elf_generic_reloc, /* special_function */
409 1.1 christos "R_OR1K_TLS_LDM_HI16", /* name */
410 1.1 christos FALSE, /* partial_inplace */
411 1.1 christos 0x0, /* src_mask */
412 1.1 christos 0xffff, /* dst_mask */
413 1.1 christos FALSE), /* pcrel_offset */
414 1.1 christos
415 1.1 christos HOWTO (R_OR1K_TLS_LDM_LO16, /* type */
416 1.1 christos 0, /* rightshift */
417 1.1 christos 2, /* size (0 = byte, 1 = short, 2 = long) */
418 1.1 christos 16, /* bitsize */
419 1.1 christos FALSE, /* pc_relative */
420 1.1 christos 0, /* bitpos */
421 1.1 christos complain_overflow_dont, /* complain_on_overflow */
422 1.1 christos bfd_elf_generic_reloc, /* special_function */
423 1.1 christos "R_OR1K_TLS_LDM_LO16", /* name */
424 1.1 christos FALSE, /* partial_inplace */
425 1.1 christos 0x0, /* src_mask */
426 1.1 christos 0xffff, /* dst_mask */
427 1.1 christos FALSE), /* pcrel_offset */
428 1.1 christos
429 1.1 christos HOWTO (R_OR1K_TLS_LDO_HI16, /* type */
430 1.1 christos 16, /* rightshift */
431 1.1 christos 2, /* size (0 = byte, 1 = short, 2 = long) */
432 1.1 christos 16, /* bitsize */
433 1.1 christos FALSE, /* pc_relative */
434 1.1 christos 0, /* bitpos */
435 1.1 christos complain_overflow_dont, /* complain_on_overflow */
436 1.1 christos bfd_elf_generic_reloc, /* special_function */
437 1.1 christos "R_OR1K_TLS_LDO_HI16", /* name */
438 1.1 christos FALSE, /* partial_inplace */
439 1.1 christos 0x0, /* src_mask */
440 1.1 christos 0xffff, /* dst_mask */
441 1.1 christos FALSE), /* pcrel_offset */
442 1.1 christos
443 1.1 christos HOWTO (R_OR1K_TLS_LDO_LO16, /* type */
444 1.1 christos 0, /* rightshift */
445 1.1 christos 2, /* size (0 = byte, 1 = short, 2 = long) */
446 1.1 christos 16, /* bitsize */
447 1.1 christos FALSE, /* pc_relative */
448 1.1 christos 0, /* bitpos */
449 1.1 christos complain_overflow_dont, /* complain_on_overflow */
450 1.1 christos bfd_elf_generic_reloc, /* special_function */
451 1.1 christos "R_OR1K_TLS_LDO_LO16", /* name */
452 1.1 christos FALSE, /* partial_inplace */
453 1.1 christos 0x0, /* src_mask */
454 1.1 christos 0xffff, /* dst_mask */
455 1.1 christos FALSE), /* pcrel_offset */
456 1.1 christos
457 1.1 christos HOWTO (R_OR1K_TLS_IE_HI16, /* type */
458 1.1 christos 16, /* rightshift */
459 1.1 christos 2, /* size (0 = byte, 1 = short, 2 = long) */
460 1.1 christos 16, /* bitsize */
461 1.1 christos FALSE, /* pc_relative */
462 1.1 christos 0, /* bitpos */
463 1.1 christos complain_overflow_dont, /* complain_on_overflow */
464 1.1 christos bfd_elf_generic_reloc, /* special_function */
465 1.1 christos "R_OR1K_TLS_IE_HI16", /* name */
466 1.1 christos FALSE, /* partial_inplace */
467 1.1 christos 0x0, /* src_mask */
468 1.1 christos 0xffff, /* dst_mask */
469 1.1 christos FALSE), /* pcrel_offset */
470 1.1 christos
471 1.1 christos HOWTO (R_OR1K_TLS_IE_LO16, /* type */
472 1.1 christos 0, /* rightshift */
473 1.1 christos 2, /* size (0 = byte, 1 = short, 2 = long) */
474 1.1 christos 16, /* bitsize */
475 1.1 christos FALSE, /* pc_relative */
476 1.1 christos 0, /* bitpos */
477 1.1 christos complain_overflow_dont, /* complain_on_overflow */
478 1.1 christos bfd_elf_generic_reloc, /* special_function */
479 1.1 christos "R_OR1K_TLS_IE_LO16", /* name */
480 1.1 christos FALSE, /* partial_inplace */
481 1.1 christos 0x0, /* src_mask */
482 1.1 christos 0xffff, /* dst_mask */
483 1.1 christos FALSE), /* pcrel_offset */
484 1.1 christos
485 1.1 christos HOWTO (R_OR1K_TLS_LE_HI16, /* type */
486 1.1 christos 16, /* rightshift */
487 1.1 christos 2, /* size (0 = byte, 1 = short, 2 = long) */
488 1.1 christos 16, /* bitsize */
489 1.1 christos FALSE, /* pc_relative */
490 1.1 christos 0, /* bitpos */
491 1.1 christos complain_overflow_dont, /* complain_on_overflow */
492 1.1 christos bfd_elf_generic_reloc, /* special_function */
493 1.1 christos "R_OR1K_TLS_LE_HI16", /* name */
494 1.1 christos FALSE, /* partial_inplace */
495 1.1 christos 0x0, /* src_mask */
496 1.1 christos 0xffff, /* dst_mask */
497 1.1 christos FALSE), /* pcrel_offset */
498 1.1 christos
499 1.1 christos HOWTO (R_OR1K_TLS_LE_LO16, /* type */
500 1.1 christos 0, /* rightshift */
501 1.1 christos 2, /* size (0 = byte, 1 = short, 2 = long) */
502 1.1 christos 16, /* bitsize */
503 1.1 christos FALSE, /* pc_relative */
504 1.1 christos 0, /* bitpos */
505 1.1 christos complain_overflow_dont, /* complain_on_overflow */
506 1.1 christos bfd_elf_generic_reloc, /* special_function */
507 1.1 christos "R_OR1K_TLS_LE_LO16", /* name */
508 1.1 christos FALSE, /* partial_inplace */
509 1.1 christos 0x0, /* src_mask */
510 1.1 christos 0xffff, /* dst_mask */
511 1.1 christos FALSE), /* pcrel_offset */
512 1.1 christos
513 1.1 christos };
514 1.1 christos
515 1.1 christos /* Map BFD reloc types to Or1k ELF reloc types. */
516 1.1 christos
517 1.1 christos struct or1k_reloc_map
518 1.1 christos {
519 1.1 christos bfd_reloc_code_real_type bfd_reloc_val;
520 1.1 christos unsigned int or1k_reloc_val;
521 1.1 christos };
522 1.1 christos
523 1.1 christos static const struct or1k_reloc_map or1k_reloc_map[] =
524 1.1 christos {
525 1.1 christos { BFD_RELOC_NONE, R_OR1K_NONE },
526 1.1 christos { BFD_RELOC_32, R_OR1K_32 },
527 1.1 christos { BFD_RELOC_16, R_OR1K_16 },
528 1.1 christos { BFD_RELOC_8, R_OR1K_8 },
529 1.1 christos { BFD_RELOC_LO16, R_OR1K_LO_16_IN_INSN },
530 1.1 christos { BFD_RELOC_HI16, R_OR1K_HI_16_IN_INSN },
531 1.1 christos { BFD_RELOC_OR1K_REL_26, R_OR1K_INSN_REL_26 },
532 1.1 christos { BFD_RELOC_VTABLE_ENTRY, R_OR1K_GNU_VTENTRY },
533 1.1 christos { BFD_RELOC_VTABLE_INHERIT, R_OR1K_GNU_VTINHERIT },
534 1.1 christos { BFD_RELOC_32_PCREL, R_OR1K_32_PCREL },
535 1.1 christos { BFD_RELOC_16_PCREL, R_OR1K_16_PCREL },
536 1.1 christos { BFD_RELOC_8_PCREL, R_OR1K_8_PCREL },
537 1.1 christos { BFD_RELOC_OR1K_GOTPC_HI16, R_OR1K_GOTPC_HI16 },
538 1.1 christos { BFD_RELOC_OR1K_GOTPC_LO16, R_OR1K_GOTPC_LO16 },
539 1.1 christos { BFD_RELOC_OR1K_GOT16, R_OR1K_GOT16 },
540 1.1 christos { BFD_RELOC_OR1K_PLT26, R_OR1K_PLT26 },
541 1.1 christos { BFD_RELOC_OR1K_GOTOFF_HI16, R_OR1K_GOTOFF_HI16 },
542 1.1 christos { BFD_RELOC_OR1K_GOTOFF_LO16, R_OR1K_GOTOFF_LO16 },
543 1.1 christos { BFD_RELOC_OR1K_GLOB_DAT, R_OR1K_GLOB_DAT },
544 1.1 christos { BFD_RELOC_OR1K_COPY, R_OR1K_COPY },
545 1.1 christos { BFD_RELOC_OR1K_JMP_SLOT, R_OR1K_JMP_SLOT },
546 1.1 christos { BFD_RELOC_OR1K_RELATIVE, R_OR1K_RELATIVE },
547 1.1 christos { BFD_RELOC_OR1K_TLS_GD_HI16, R_OR1K_TLS_GD_HI16 },
548 1.1 christos { BFD_RELOC_OR1K_TLS_GD_LO16, R_OR1K_TLS_GD_LO16 },
549 1.1 christos { BFD_RELOC_OR1K_TLS_LDM_HI16, R_OR1K_TLS_LDM_HI16 },
550 1.1 christos { BFD_RELOC_OR1K_TLS_LDM_LO16, R_OR1K_TLS_LDM_LO16 },
551 1.1 christos { BFD_RELOC_OR1K_TLS_LDO_HI16, R_OR1K_TLS_LDO_HI16 },
552 1.1 christos { BFD_RELOC_OR1K_TLS_LDO_LO16, R_OR1K_TLS_LDO_LO16 },
553 1.1 christos { BFD_RELOC_OR1K_TLS_IE_HI16, R_OR1K_TLS_IE_HI16 },
554 1.1 christos { BFD_RELOC_OR1K_TLS_IE_LO16, R_OR1K_TLS_IE_LO16 },
555 1.1 christos { BFD_RELOC_OR1K_TLS_LE_HI16, R_OR1K_TLS_LE_HI16 },
556 1.1 christos { BFD_RELOC_OR1K_TLS_LE_LO16, R_OR1K_TLS_LE_LO16 },
557 1.1 christos };
558 1.1 christos
559 1.1 christos /* The linker needs to keep track of the number of relocs that it
560 1.1 christos decides to copy as dynamic relocs in check_relocs for each symbol.
561 1.1 christos This is so that it can later discard them if they are found to be
562 1.1 christos unnecessary. We store the information in a field extending the
563 1.1 christos regular ELF linker hash table. */
564 1.1 christos
565 1.1 christos struct elf_or1k_dyn_relocs
566 1.1 christos {
567 1.1 christos struct elf_or1k_dyn_relocs *next;
568 1.1 christos
569 1.1 christos /* The input section of the reloc. */
570 1.1 christos asection *sec;
571 1.1 christos
572 1.1 christos /* Total number of relocs copied for the input section. */
573 1.1 christos bfd_size_type count;
574 1.1 christos
575 1.1 christos /* Number of pc-relative relocs copied for the input section. */
576 1.1 christos bfd_size_type pc_count;
577 1.1 christos };
578 1.1 christos
579 1.1 christos #define TLS_UNKNOWN 0
580 1.1 christos #define TLS_NONE 1
581 1.1 christos #define TLS_GD 2
582 1.1 christos #define TLS_LD 3
583 1.1 christos #define TLS_IE 4
584 1.1 christos #define TLS_LE 5
585 1.1 christos
586 1.1 christos /* ELF linker hash entry. */
587 1.1 christos struct elf_or1k_link_hash_entry
588 1.1 christos {
589 1.1 christos struct elf_link_hash_entry root;
590 1.1 christos
591 1.1 christos /* Track dynamic relocs copied for this symbol. */
592 1.1 christos struct elf_or1k_dyn_relocs *dyn_relocs;
593 1.1 christos
594 1.1 christos /* Track type of TLS access. */
595 1.1 christos unsigned char tls_type;
596 1.1 christos };
597 1.1 christos
598 1.1 christos /* ELF object data. */
599 1.1 christos struct elf_or1k_obj_tdata
600 1.1 christos {
601 1.1 christos struct elf_obj_tdata root;
602 1.1 christos
603 1.1 christos /* tls_type for each local got entry. */
604 1.1 christos unsigned char *local_tls_type;
605 1.1 christos };
606 1.1 christos
607 1.1 christos #define elf_or1k_tdata(abfd) \
608 1.1 christos ((struct elf_or1k_obj_tdata *) (abfd)->tdata.any)
609 1.1 christos
610 1.1 christos #define elf_or1k_local_tls_type(abfd) \
611 1.1 christos (elf_or1k_tdata (abfd)->local_tls_type)
612 1.1 christos
613 1.1 christos /* ELF linker hash table. */
614 1.1 christos struct elf_or1k_link_hash_table
615 1.1 christos {
616 1.1 christos struct elf_link_hash_table root;
617 1.1 christos
618 1.1 christos /* Small local sym to section mapping cache. */
619 1.1 christos struct sym_cache sym_sec;
620 1.1 christos };
621 1.1 christos
622 1.1 christos /* Get the ELF linker hash table from a link_info structure. */
623 1.1 christos #define or1k_elf_hash_table(p) \
624 1.1 christos (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
625 1.1 christos == OR1K_ELF_DATA ? ((struct elf_or1k_link_hash_table *) ((p)->hash)) : NULL)
626 1.1 christos
627 1.1 christos static bfd_boolean
628 1.1 christos elf_or1k_mkobject (bfd *abfd)
629 1.1 christos {
630 1.1 christos return bfd_elf_allocate_object (abfd, sizeof (struct elf_or1k_obj_tdata),
631 1.1 christos OR1K_ELF_DATA);
632 1.1 christos }
633 1.1 christos
634 1.1 christos /* Create an entry in an or1k ELF linker hash table. */
635 1.1 christos
636 1.1 christos static struct bfd_hash_entry *
637 1.1 christos or1k_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
638 1.1 christos struct bfd_hash_table *table,
639 1.1 christos const char *string)
640 1.1 christos {
641 1.1 christos struct elf_or1k_link_hash_entry *ret =
642 1.1 christos (struct elf_or1k_link_hash_entry *) entry;
643 1.1 christos
644 1.1 christos /* Allocate the structure if it has not already been allocated by a
645 1.1 christos subclass. */
646 1.1 christos if (ret == NULL)
647 1.1 christos ret = bfd_hash_allocate (table,
648 1.1 christos sizeof (struct elf_or1k_link_hash_entry));
649 1.1 christos if (ret == NULL)
650 1.1 christos return NULL;
651 1.1 christos
652 1.1 christos /* Call the allocation method of the superclass. */
653 1.1 christos ret = ((struct elf_or1k_link_hash_entry *)
654 1.1 christos _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
655 1.1 christos table, string));
656 1.1 christos if (ret != NULL)
657 1.1 christos {
658 1.1 christos struct elf_or1k_link_hash_entry *eh;
659 1.1 christos
660 1.1 christos eh = (struct elf_or1k_link_hash_entry *) ret;
661 1.1 christos eh->dyn_relocs = NULL;
662 1.1 christos eh->tls_type = TLS_UNKNOWN;
663 1.1 christos }
664 1.1 christos
665 1.1 christos return (struct bfd_hash_entry *) ret;
666 1.1 christos }
667 1.1 christos
668 1.1 christos /* Create an or1k ELF linker hash table. */
669 1.1 christos
670 1.1 christos static struct bfd_link_hash_table *
671 1.1 christos or1k_elf_link_hash_table_create (bfd *abfd)
672 1.1 christos {
673 1.1 christos struct elf_or1k_link_hash_table *ret;
674 1.1 christos bfd_size_type amt = sizeof (struct elf_or1k_link_hash_table);
675 1.1 christos
676 1.1 christos ret = bfd_zmalloc (amt);
677 1.1 christos if (ret == NULL)
678 1.1 christos return NULL;
679 1.1 christos
680 1.1 christos if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
681 1.1 christos or1k_elf_link_hash_newfunc,
682 1.1 christos sizeof (struct elf_or1k_link_hash_entry),
683 1.1 christos OR1K_ELF_DATA))
684 1.1 christos {
685 1.1 christos free (ret);
686 1.1 christos return NULL;
687 1.1 christos }
688 1.1 christos
689 1.1 christos return &ret->root.root;
690 1.1 christos }
691 1.1 christos
692 1.1 christos static reloc_howto_type *
693 1.1 christos or1k_reloc_type_lookup (bfd * abfd ATTRIBUTE_UNUSED,
694 1.1 christos bfd_reloc_code_real_type code)
695 1.1 christos {
696 1.1 christos unsigned int i;
697 1.1 christos
698 1.3 christos for (i = ARRAY_SIZE (or1k_reloc_map); i--;)
699 1.1 christos if (or1k_reloc_map[i].bfd_reloc_val == code)
700 1.1 christos return & or1k_elf_howto_table[or1k_reloc_map[i].or1k_reloc_val];
701 1.1 christos
702 1.1 christos return NULL;
703 1.1 christos }
704 1.1 christos
705 1.1 christos static reloc_howto_type *
706 1.1 christos or1k_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
707 1.1 christos const char *r_name)
708 1.1 christos {
709 1.1 christos unsigned int i;
710 1.1 christos
711 1.1 christos for (i = 0;
712 1.1 christos i < (sizeof (or1k_elf_howto_table)
713 1.1 christos / sizeof (or1k_elf_howto_table[0]));
714 1.1 christos i++)
715 1.1 christos if (or1k_elf_howto_table[i].name != NULL
716 1.1 christos && strcasecmp (or1k_elf_howto_table[i].name, r_name) == 0)
717 1.1 christos return &or1k_elf_howto_table[i];
718 1.1 christos
719 1.1 christos return NULL;
720 1.1 christos }
721 1.1 christos
722 1.1 christos /* Set the howto pointer for an Or1k ELF reloc. */
723 1.1 christos
724 1.1 christos static void
725 1.1 christos or1k_info_to_howto_rela (bfd * abfd ATTRIBUTE_UNUSED,
726 1.1 christos arelent * cache_ptr,
727 1.1 christos Elf_Internal_Rela * dst)
728 1.1 christos {
729 1.1 christos unsigned int r_type;
730 1.1 christos
731 1.1 christos r_type = ELF32_R_TYPE (dst->r_info);
732 1.1 christos if (r_type >= (unsigned int) R_OR1K_max)
733 1.1 christos {
734 1.5 christos /* xgettext:c-format */
735 1.3 christos _bfd_error_handler (_("%B: invalid OR1K reloc number: %d"), abfd, r_type);
736 1.1 christos r_type = 0;
737 1.1 christos }
738 1.1 christos cache_ptr->howto = & or1k_elf_howto_table[r_type];
739 1.1 christos }
740 1.1 christos
741 1.1 christos
742 1.1 christos /* Return the relocation value for @tpoff relocations.. */
743 1.1 christos static bfd_vma
744 1.1 christos tpoff (struct bfd_link_info *info, bfd_vma address)
745 1.1 christos {
746 1.1 christos /* If tls_sec is NULL, we should have signalled an error already. */
747 1.1 christos if (elf_hash_table (info)->tls_sec == NULL)
748 1.1 christos return 0;
749 1.1 christos
750 1.1 christos /* The thread pointer on or1k stores the address after the TCB where
751 1.1 christos the data is, just compute the difference. No need to compensate
752 1.1 christos for the size of TCB. */
753 1.1 christos return (address - elf_hash_table (info)->tls_sec->vma);
754 1.1 christos }
755 1.1 christos
756 1.1 christos /* Relocate an Or1k ELF section.
757 1.1 christos
758 1.1 christos The RELOCATE_SECTION function is called by the new ELF backend linker
759 1.1 christos to handle the relocations for a section.
760 1.1 christos
761 1.1 christos The relocs are always passed as Rela structures; if the section
762 1.1 christos actually uses Rel structures, the r_addend field will always be
763 1.1 christos zero.
764 1.1 christos
765 1.1 christos This function is responsible for adjusting the section contents as
766 1.1 christos necessary, and (if using Rela relocs and generating a relocatable
767 1.1 christos output file) adjusting the reloc addend as necessary.
768 1.1 christos
769 1.1 christos This function does not have to worry about setting the reloc
770 1.1 christos address or the reloc symbol index.
771 1.1 christos
772 1.1 christos LOCAL_SYMS is a pointer to the swapped in local symbols.
773 1.1 christos
774 1.1 christos LOCAL_SECTIONS is an array giving the section in the input file
775 1.1 christos corresponding to the st_shndx field of each local symbol.
776 1.1 christos
777 1.1 christos The global hash table entry for the global symbols can be found
778 1.1 christos via elf_sym_hashes (input_bfd).
779 1.1 christos
780 1.1 christos When generating relocatable output, this function must handle
781 1.1 christos STB_LOCAL/STT_SECTION symbols specially. The output symbol is
782 1.1 christos going to be the section symbol corresponding to the output
783 1.1 christos section, which means that the addend must be adjusted
784 1.1 christos accordingly. */
785 1.1 christos
786 1.1 christos static bfd_boolean
787 1.1 christos or1k_elf_relocate_section (bfd *output_bfd,
788 1.1 christos struct bfd_link_info *info,
789 1.1 christos bfd *input_bfd,
790 1.1 christos asection *input_section,
791 1.1 christos bfd_byte *contents,
792 1.1 christos Elf_Internal_Rela *relocs,
793 1.1 christos Elf_Internal_Sym *local_syms,
794 1.1 christos asection **local_sections)
795 1.1 christos {
796 1.1 christos Elf_Internal_Shdr *symtab_hdr;
797 1.1 christos struct elf_link_hash_entry **sym_hashes;
798 1.1 christos Elf_Internal_Rela *rel;
799 1.1 christos Elf_Internal_Rela *relend;
800 1.1 christos struct elf_or1k_link_hash_table *htab = or1k_elf_hash_table (info);
801 1.1 christos bfd *dynobj;
802 1.1 christos asection *sreloc;
803 1.1 christos bfd_vma *local_got_offsets;
804 1.1 christos asection *sgot;
805 1.1 christos
806 1.1 christos if (htab == NULL)
807 1.1 christos return FALSE;
808 1.1 christos
809 1.1 christos dynobj = htab->root.dynobj;
810 1.1 christos local_got_offsets = elf_local_got_offsets (input_bfd);
811 1.1 christos
812 1.1 christos sreloc = elf_section_data (input_section)->sreloc;
813 1.1 christos
814 1.5 christos sgot = htab->root.sgot;
815 1.1 christos
816 1.1 christos symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
817 1.1 christos sym_hashes = elf_sym_hashes (input_bfd);
818 1.1 christos relend = relocs + input_section->reloc_count;
819 1.1 christos
820 1.1 christos for (rel = relocs; rel < relend; rel++)
821 1.1 christos {
822 1.1 christos reloc_howto_type *howto;
823 1.1 christos unsigned long r_symndx;
824 1.1 christos Elf_Internal_Sym *sym;
825 1.1 christos asection *sec;
826 1.1 christos struct elf_link_hash_entry *h;
827 1.1 christos bfd_vma relocation;
828 1.1 christos bfd_reloc_status_type r;
829 1.1 christos const char *name = NULL;
830 1.1 christos int r_type;
831 1.1 christos
832 1.1 christos r_type = ELF32_R_TYPE (rel->r_info);
833 1.1 christos r_symndx = ELF32_R_SYM (rel->r_info);
834 1.1 christos
835 1.1 christos if (r_type == R_OR1K_GNU_VTINHERIT
836 1.1 christos || r_type == R_OR1K_GNU_VTENTRY)
837 1.1 christos continue;
838 1.1 christos
839 1.1 christos if (r_type < 0 || r_type >= (int) R_OR1K_max)
840 1.1 christos {
841 1.1 christos bfd_set_error (bfd_error_bad_value);
842 1.1 christos return FALSE;
843 1.1 christos }
844 1.1 christos
845 1.1 christos howto = or1k_elf_howto_table + ELF32_R_TYPE (rel->r_info);
846 1.1 christos h = NULL;
847 1.1 christos sym = NULL;
848 1.1 christos sec = NULL;
849 1.1 christos
850 1.1 christos if (r_symndx < symtab_hdr->sh_info)
851 1.1 christos {
852 1.1 christos sym = local_syms + r_symndx;
853 1.1 christos sec = local_sections[r_symndx];
854 1.1 christos relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
855 1.1 christos
856 1.1 christos name = bfd_elf_string_from_elf_section
857 1.1 christos (input_bfd, symtab_hdr->sh_link, sym->st_name);
858 1.1 christos name = (name == NULL) ? bfd_section_name (input_bfd, sec) : name;
859 1.1 christos }
860 1.1 christos else
861 1.1 christos {
862 1.1 christos bfd_boolean unresolved_reloc, warned, ignored;
863 1.1 christos
864 1.1 christos RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
865 1.1 christos r_symndx, symtab_hdr, sym_hashes,
866 1.1 christos h, sec, relocation,
867 1.1 christos unresolved_reloc, warned, ignored);
868 1.1 christos }
869 1.1 christos
870 1.1 christos if (sec != NULL && discarded_section (sec))
871 1.1 christos RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
872 1.1 christos rel, 1, relend, howto, 0, contents);
873 1.1 christos
874 1.4 christos if (bfd_link_relocatable (info))
875 1.1 christos continue;
876 1.1 christos
877 1.1 christos switch (howto->type)
878 1.1 christos {
879 1.1 christos case R_OR1K_PLT26:
880 1.1 christos {
881 1.5 christos if (htab->root.splt != NULL && h != NULL
882 1.1 christos && h->plt.offset != (bfd_vma) -1)
883 1.1 christos {
884 1.5 christos relocation = (htab->root.splt->output_section->vma
885 1.5 christos + htab->root.splt->output_offset
886 1.1 christos + h->plt.offset);
887 1.1 christos }
888 1.1 christos break;
889 1.1 christos }
890 1.1 christos
891 1.1 christos case R_OR1K_GOT16:
892 1.1 christos /* Relocation is to the entry for this symbol in the global
893 1.1 christos offset table. */
894 1.1 christos BFD_ASSERT (sgot != NULL);
895 1.1 christos if (h != NULL)
896 1.1 christos {
897 1.1 christos bfd_boolean dyn;
898 1.1 christos bfd_vma off;
899 1.1 christos
900 1.1 christos off = h->got.offset;
901 1.1 christos BFD_ASSERT (off != (bfd_vma) -1);
902 1.1 christos
903 1.1 christos dyn = htab->root.dynamic_sections_created;
904 1.4 christos if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
905 1.4 christos bfd_link_pic (info),
906 1.4 christos h)
907 1.4 christos || (bfd_link_pic (info)
908 1.1 christos && SYMBOL_REFERENCES_LOCAL (info, h)))
909 1.1 christos {
910 1.1 christos /* This is actually a static link, or it is a
911 1.1 christos -Bsymbolic link and the symbol is defined
912 1.1 christos locally, or the symbol was forced to be local
913 1.1 christos because of a version file. We must initialize
914 1.1 christos this entry in the global offset table. Since the
915 1.1 christos offset must always be a multiple of 4, we use the
916 1.1 christos least significant bit to record whether we have
917 1.1 christos initialized it already.
918 1.1 christos
919 1.1 christos When doing a dynamic link, we create a .rela.got
920 1.1 christos relocation entry to initialize the value. This
921 1.1 christos is done in the finish_dynamic_symbol routine. */
922 1.1 christos if ((off & 1) != 0)
923 1.1 christos off &= ~1;
924 1.1 christos else
925 1.1 christos {
926 1.1 christos /* Write entry in GOT. */
927 1.1 christos bfd_put_32 (output_bfd, relocation,
928 1.1 christos sgot->contents + off);
929 1.1 christos /* Mark GOT entry as having been written. */
930 1.1 christos h->got.offset |= 1;
931 1.1 christos }
932 1.1 christos }
933 1.1 christos
934 1.1 christos relocation = sgot->output_offset + off;
935 1.1 christos }
936 1.1 christos else
937 1.1 christos {
938 1.1 christos bfd_vma off;
939 1.1 christos bfd_byte *loc;
940 1.1 christos
941 1.1 christos BFD_ASSERT (local_got_offsets != NULL
942 1.1 christos && local_got_offsets[r_symndx] != (bfd_vma) -1);
943 1.1 christos
944 1.1 christos /* Get offset into GOT table. */
945 1.1 christos off = local_got_offsets[r_symndx];
946 1.1 christos
947 1.1 christos /* The offset must always be a multiple of 4. We use
948 1.1 christos the least significant bit to record whether we have
949 1.1 christos already processed this entry. */
950 1.1 christos if ((off & 1) != 0)
951 1.1 christos off &= ~1;
952 1.1 christos else
953 1.1 christos {
954 1.1 christos /* Write entry in GOT. */
955 1.1 christos bfd_put_32 (output_bfd, relocation, sgot->contents + off);
956 1.4 christos if (bfd_link_pic (info))
957 1.1 christos {
958 1.1 christos asection *srelgot;
959 1.1 christos Elf_Internal_Rela outrel;
960 1.1 christos
961 1.1 christos /* We need to generate a R_OR1K_RELATIVE reloc
962 1.1 christos for the dynamic linker. */
963 1.5 christos srelgot = htab->root.srelgot;
964 1.1 christos BFD_ASSERT (srelgot != NULL);
965 1.1 christos
966 1.1 christos outrel.r_offset = (sgot->output_section->vma
967 1.1 christos + sgot->output_offset
968 1.1 christos + off);
969 1.1 christos outrel.r_info = ELF32_R_INFO (0, R_OR1K_RELATIVE);
970 1.1 christos outrel.r_addend = relocation;
971 1.1 christos loc = srelgot->contents;
972 1.1 christos loc += srelgot->reloc_count * sizeof (Elf32_External_Rela);
973 1.1 christos bfd_elf32_swap_reloca_out (output_bfd, &outrel,loc);
974 1.1 christos ++srelgot->reloc_count;
975 1.1 christos }
976 1.1 christos
977 1.1 christos local_got_offsets[r_symndx] |= 1;
978 1.1 christos }
979 1.1 christos relocation = sgot->output_offset + off;
980 1.1 christos }
981 1.1 christos
982 1.1 christos /* Addend should be zero. */
983 1.1 christos if (rel->r_addend != 0)
984 1.5 christos _bfd_error_handler
985 1.1 christos (_("internal error: addend should be zero for R_OR1K_GOT16"));
986 1.1 christos
987 1.1 christos break;
988 1.1 christos
989 1.1 christos case R_OR1K_GOTOFF_LO16:
990 1.1 christos case R_OR1K_GOTOFF_HI16:
991 1.1 christos /* Relocation is offset from GOT. */
992 1.1 christos BFD_ASSERT (sgot != NULL);
993 1.5 christos relocation
994 1.5 christos -= (htab->root.hgot->root.u.def.value
995 1.5 christos + htab->root.hgot->root.u.def.section->output_offset
996 1.5 christos + htab->root.hgot->root.u.def.section->output_section->vma);
997 1.1 christos break;
998 1.1 christos
999 1.1 christos case R_OR1K_INSN_REL_26:
1000 1.1 christos case R_OR1K_HI_16_IN_INSN:
1001 1.1 christos case R_OR1K_LO_16_IN_INSN:
1002 1.1 christos case R_OR1K_32:
1003 1.1 christos /* R_OR1K_16? */
1004 1.1 christos {
1005 1.1 christos /* r_symndx will be STN_UNDEF (zero) only for relocs against symbols
1006 1.1 christos from removed linkonce sections, or sections discarded by
1007 1.1 christos a linker script. */
1008 1.1 christos if (r_symndx == STN_UNDEF
1009 1.1 christos || (input_section->flags & SEC_ALLOC) == 0)
1010 1.1 christos break;
1011 1.1 christos
1012 1.4 christos if ((bfd_link_pic (info)
1013 1.1 christos && (h == NULL
1014 1.1 christos || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1015 1.1 christos || h->root.type != bfd_link_hash_undefweak)
1016 1.1 christos && (howto->type != R_OR1K_INSN_REL_26
1017 1.1 christos || !SYMBOL_CALLS_LOCAL (info, h)))
1018 1.4 christos || (!bfd_link_pic (info)
1019 1.1 christos && h != NULL
1020 1.1 christos && h->dynindx != -1
1021 1.1 christos && !h->non_got_ref
1022 1.1 christos && ((h->def_dynamic
1023 1.1 christos && !h->def_regular)
1024 1.1 christos || h->root.type == bfd_link_hash_undefweak
1025 1.1 christos || h->root.type == bfd_link_hash_undefined)))
1026 1.1 christos {
1027 1.1 christos Elf_Internal_Rela outrel;
1028 1.1 christos bfd_byte *loc;
1029 1.1 christos bfd_boolean skip;
1030 1.1 christos
1031 1.1 christos /* When generating a shared object, these relocations
1032 1.1 christos are copied into the output file to be resolved at run
1033 1.1 christos time. */
1034 1.1 christos
1035 1.1 christos BFD_ASSERT (sreloc != NULL);
1036 1.1 christos
1037 1.1 christos skip = FALSE;
1038 1.1 christos
1039 1.1 christos outrel.r_offset =
1040 1.1 christos _bfd_elf_section_offset (output_bfd, info, input_section,
1041 1.1 christos rel->r_offset);
1042 1.1 christos if (outrel.r_offset == (bfd_vma) -1)
1043 1.1 christos skip = TRUE;
1044 1.1 christos else if (outrel.r_offset == (bfd_vma) -2)
1045 1.1 christos skip = TRUE;
1046 1.1 christos outrel.r_offset += (input_section->output_section->vma
1047 1.1 christos + input_section->output_offset);
1048 1.1 christos
1049 1.1 christos if (skip)
1050 1.1 christos memset (&outrel, 0, sizeof outrel);
1051 1.1 christos /* h->dynindx may be -1 if the symbol was marked to
1052 1.1 christos become local. */
1053 1.1 christos else if (h != NULL
1054 1.1 christos && ((! info->symbolic && h->dynindx != -1)
1055 1.1 christos || !h->def_regular))
1056 1.1 christos {
1057 1.1 christos BFD_ASSERT (h->dynindx != -1);
1058 1.1 christos outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1059 1.1 christos outrel.r_addend = rel->r_addend;
1060 1.1 christos }
1061 1.1 christos else
1062 1.1 christos {
1063 1.1 christos if (r_type == R_OR1K_32)
1064 1.1 christos {
1065 1.1 christos outrel.r_info = ELF32_R_INFO (0, R_OR1K_RELATIVE);
1066 1.1 christos outrel.r_addend = relocation + rel->r_addend;
1067 1.1 christos }
1068 1.1 christos else
1069 1.1 christos {
1070 1.1 christos BFD_FAIL ();
1071 1.5 christos _bfd_error_handler
1072 1.1 christos (_("%B: probably compiled without -fPIC?"),
1073 1.1 christos input_bfd);
1074 1.1 christos bfd_set_error (bfd_error_bad_value);
1075 1.1 christos return FALSE;
1076 1.1 christos }
1077 1.1 christos }
1078 1.1 christos
1079 1.1 christos loc = sreloc->contents;
1080 1.1 christos loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1081 1.1 christos bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1082 1.1 christos break;
1083 1.1 christos }
1084 1.1 christos break;
1085 1.1 christos }
1086 1.1 christos
1087 1.1 christos case R_OR1K_TLS_LDM_HI16:
1088 1.1 christos case R_OR1K_TLS_LDM_LO16:
1089 1.1 christos case R_OR1K_TLS_LDO_HI16:
1090 1.1 christos case R_OR1K_TLS_LDO_LO16:
1091 1.1 christos /* TODO: implement support for local dynamic. */
1092 1.1 christos BFD_FAIL ();
1093 1.5 christos _bfd_error_handler
1094 1.1 christos (_("%B: support for local dynamic not implemented"),
1095 1.1 christos input_bfd);
1096 1.1 christos bfd_set_error (bfd_error_bad_value);
1097 1.1 christos return FALSE;
1098 1.1 christos
1099 1.1 christos
1100 1.1 christos case R_OR1K_TLS_GD_HI16:
1101 1.1 christos case R_OR1K_TLS_GD_LO16:
1102 1.1 christos case R_OR1K_TLS_IE_HI16:
1103 1.1 christos case R_OR1K_TLS_IE_LO16:
1104 1.1 christos {
1105 1.1 christos bfd_vma gotoff;
1106 1.1 christos Elf_Internal_Rela rela;
1107 1.1 christos bfd_byte *loc;
1108 1.1 christos int dynamic;
1109 1.1 christos
1110 1.1 christos sreloc = bfd_get_section_by_name (dynobj, ".rela.got");
1111 1.1 christos
1112 1.1 christos /* Mark as TLS related GOT entry by setting
1113 1.1 christos bit 2 as well as bit 1. */
1114 1.1 christos if (h != NULL)
1115 1.1 christos {
1116 1.1 christos gotoff = h->got.offset;
1117 1.1 christos h->got.offset |= 3;
1118 1.1 christos }
1119 1.1 christos else
1120 1.1 christos {
1121 1.1 christos gotoff = local_got_offsets[r_symndx];
1122 1.1 christos local_got_offsets[r_symndx] |= 3;
1123 1.1 christos }
1124 1.1 christos
1125 1.1 christos /* Only process the relocation once. */
1126 1.1 christos if (gotoff & 1)
1127 1.1 christos {
1128 1.1 christos relocation = sgot->output_offset + (gotoff & ~3);
1129 1.1 christos break;
1130 1.1 christos }
1131 1.1 christos
1132 1.1 christos BFD_ASSERT (elf_hash_table (info)->hgot == NULL
1133 1.1 christos || elf_hash_table (info)->hgot->root.u.def.value == 0);
1134 1.1 christos
1135 1.1 christos /* Dynamic entries will require relocations. if we do not need
1136 1.1 christos them we will just use the default R_OR1K_NONE and
1137 1.1 christos not set anything. */
1138 1.4 christos dynamic = bfd_link_pic (info)
1139 1.1 christos || (sec && (sec->flags & SEC_ALLOC) != 0
1140 1.1 christos && h != NULL
1141 1.1 christos && (h->root.type == bfd_link_hash_defweak || !h->def_regular));
1142 1.1 christos
1143 1.1 christos /* Shared GD. */
1144 1.1 christos if (dynamic && (howto->type == R_OR1K_TLS_GD_HI16
1145 1.1 christos || howto->type == R_OR1K_TLS_GD_LO16))
1146 1.1 christos {
1147 1.1 christos int i;
1148 1.1 christos
1149 1.1 christos /* Add DTPMOD and DTPOFF GOT and rela entries. */
1150 1.1 christos for (i = 0; i < 2; ++i)
1151 1.1 christos {
1152 1.1 christos rela.r_offset = sgot->output_section->vma +
1153 1.1 christos sgot->output_offset + gotoff + i*4;
1154 1.1 christos if (h != NULL && h->dynindx != -1)
1155 1.1 christos {
1156 1.1 christos rela.r_info = ELF32_R_INFO (h->dynindx,
1157 1.1 christos (i == 0 ? R_OR1K_TLS_DTPMOD : R_OR1K_TLS_DTPOFF));
1158 1.1 christos rela.r_addend = 0;
1159 1.1 christos }
1160 1.1 christos else
1161 1.1 christos {
1162 1.1 christos rela.r_info = ELF32_R_INFO (0,
1163 1.1 christos (i == 0 ? R_OR1K_TLS_DTPMOD : R_OR1K_TLS_DTPOFF));
1164 1.1 christos rela.r_addend = tpoff (info, relocation);
1165 1.1 christos }
1166 1.1 christos
1167 1.1 christos loc = sreloc->contents;
1168 1.1 christos loc += sreloc->reloc_count++ *
1169 1.1 christos sizeof (Elf32_External_Rela);
1170 1.1 christos
1171 1.1 christos bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1172 1.1 christos bfd_put_32 (output_bfd, 0, sgot->contents + gotoff + i*4);
1173 1.1 christos }
1174 1.1 christos }
1175 1.1 christos /* Static GD. */
1176 1.1 christos else if (howto->type == R_OR1K_TLS_GD_HI16
1177 1.1 christos || howto->type == R_OR1K_TLS_GD_LO16)
1178 1.1 christos {
1179 1.1 christos bfd_put_32 (output_bfd, 1, sgot->contents + gotoff);
1180 1.1 christos bfd_put_32 (output_bfd, tpoff (info, relocation),
1181 1.1 christos sgot->contents + gotoff + 4);
1182 1.1 christos }
1183 1.1 christos /* Shared IE. */
1184 1.1 christos else if (dynamic)
1185 1.1 christos {
1186 1.1 christos /* Add TPOFF GOT and rela entries. */
1187 1.1 christos rela.r_offset = sgot->output_section->vma +
1188 1.1 christos sgot->output_offset + gotoff;
1189 1.1 christos if (h != NULL && h->dynindx != -1)
1190 1.1 christos {
1191 1.1 christos rela.r_info = ELF32_R_INFO (h->dynindx, R_OR1K_TLS_TPOFF);
1192 1.1 christos rela.r_addend = 0;
1193 1.1 christos }
1194 1.1 christos else
1195 1.1 christos {
1196 1.1 christos rela.r_info = ELF32_R_INFO (0, R_OR1K_TLS_TPOFF);
1197 1.1 christos rela.r_addend = tpoff (info, relocation);
1198 1.1 christos }
1199 1.1 christos
1200 1.1 christos loc = sreloc->contents;
1201 1.1 christos loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1202 1.1 christos
1203 1.1 christos bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1204 1.1 christos bfd_put_32 (output_bfd, 0, sgot->contents + gotoff);
1205 1.1 christos }
1206 1.1 christos /* Static IE. */
1207 1.1 christos else
1208 1.1 christos {
1209 1.1 christos bfd_put_32 (output_bfd, tpoff (info, relocation),
1210 1.1 christos sgot->contents + gotoff);
1211 1.1 christos }
1212 1.1 christos relocation = sgot->output_offset + gotoff;
1213 1.1 christos break;
1214 1.1 christos }
1215 1.1 christos case R_OR1K_TLS_LE_HI16:
1216 1.1 christos case R_OR1K_TLS_LE_LO16:
1217 1.1 christos
1218 1.1 christos /* Relocation is offset from TP. */
1219 1.1 christos relocation = tpoff (info, relocation);
1220 1.1 christos break;
1221 1.1 christos
1222 1.1 christos case R_OR1K_TLS_DTPMOD:
1223 1.1 christos case R_OR1K_TLS_DTPOFF:
1224 1.1 christos case R_OR1K_TLS_TPOFF:
1225 1.1 christos /* These are resolved dynamically on load and shouldn't
1226 1.1 christos be used as linker input. */
1227 1.1 christos BFD_FAIL ();
1228 1.5 christos _bfd_error_handler
1229 1.1 christos (_("%B: will not resolve runtime TLS relocation"),
1230 1.1 christos input_bfd);
1231 1.1 christos bfd_set_error (bfd_error_bad_value);
1232 1.1 christos return FALSE;
1233 1.1 christos
1234 1.1 christos default:
1235 1.1 christos break;
1236 1.1 christos }
1237 1.1 christos r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
1238 1.1 christos rel->r_offset, relocation, rel->r_addend);
1239 1.1 christos
1240 1.1 christos if (r != bfd_reloc_ok)
1241 1.1 christos {
1242 1.1 christos const char *msg = NULL;
1243 1.1 christos
1244 1.1 christos switch (r)
1245 1.1 christos {
1246 1.1 christos case bfd_reloc_overflow:
1247 1.4 christos (*info->callbacks->reloc_overflow)
1248 1.1 christos (info, (h ? &h->root : NULL), name, howto->name,
1249 1.1 christos (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
1250 1.1 christos break;
1251 1.1 christos
1252 1.1 christos case bfd_reloc_undefined:
1253 1.4 christos (*info->callbacks->undefined_symbol)
1254 1.1 christos (info, name, input_bfd, input_section, rel->r_offset, TRUE);
1255 1.1 christos break;
1256 1.1 christos
1257 1.1 christos case bfd_reloc_outofrange:
1258 1.1 christos msg = _("internal error: out of range error");
1259 1.1 christos break;
1260 1.1 christos
1261 1.1 christos case bfd_reloc_notsupported:
1262 1.1 christos msg = _("internal error: unsupported relocation error");
1263 1.1 christos break;
1264 1.1 christos
1265 1.1 christos case bfd_reloc_dangerous:
1266 1.1 christos msg = _("internal error: dangerous relocation");
1267 1.1 christos break;
1268 1.1 christos
1269 1.1 christos default:
1270 1.1 christos msg = _("internal error: unknown error");
1271 1.1 christos break;
1272 1.1 christos }
1273 1.1 christos
1274 1.1 christos if (msg)
1275 1.4 christos (*info->callbacks->warning) (info, msg, name, input_bfd,
1276 1.4 christos input_section, rel->r_offset);
1277 1.1 christos }
1278 1.1 christos }
1279 1.1 christos
1280 1.1 christos return TRUE;
1281 1.1 christos }
1282 1.1 christos
1283 1.1 christos /* Return the section that should be marked against GC for a given
1284 1.1 christos relocation. */
1285 1.1 christos
1286 1.1 christos static asection *
1287 1.1 christos or1k_elf_gc_mark_hook (asection *sec,
1288 1.1 christos struct bfd_link_info *info,
1289 1.1 christos Elf_Internal_Rela *rel,
1290 1.1 christos struct elf_link_hash_entry *h,
1291 1.1 christos Elf_Internal_Sym *sym)
1292 1.1 christos {
1293 1.1 christos if (h != NULL)
1294 1.1 christos switch (ELF32_R_TYPE (rel->r_info))
1295 1.1 christos {
1296 1.1 christos case R_OR1K_GNU_VTINHERIT:
1297 1.1 christos case R_OR1K_GNU_VTENTRY:
1298 1.1 christos return NULL;
1299 1.1 christos }
1300 1.1 christos
1301 1.1 christos return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
1302 1.1 christos }
1303 1.1 christos
1304 1.1 christos static bfd_boolean
1305 1.1 christos or1k_elf_gc_sweep_hook (bfd *abfd,
1306 1.1 christos struct bfd_link_info *info ATTRIBUTE_UNUSED,
1307 1.1 christos asection *sec,
1308 1.1 christos const Elf_Internal_Rela *relocs ATTRIBUTE_UNUSED)
1309 1.1 christos {
1310 1.1 christos /* Update the got entry reference counts for the section being removed. */
1311 1.1 christos Elf_Internal_Shdr *symtab_hdr;
1312 1.1 christos struct elf_link_hash_entry **sym_hashes;
1313 1.1 christos bfd_signed_vma *local_got_refcounts;
1314 1.1 christos const Elf_Internal_Rela *rel, *relend;
1315 1.1 christos
1316 1.1 christos elf_section_data (sec)->local_dynrel = NULL;
1317 1.1 christos
1318 1.1 christos symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1319 1.1 christos sym_hashes = elf_sym_hashes (abfd);
1320 1.1 christos local_got_refcounts = elf_local_got_refcounts (abfd);
1321 1.1 christos
1322 1.1 christos relend = relocs + sec->reloc_count;
1323 1.1 christos for (rel = relocs; rel < relend; rel++)
1324 1.1 christos {
1325 1.1 christos unsigned long r_symndx;
1326 1.1 christos struct elf_link_hash_entry *h = NULL;
1327 1.1 christos
1328 1.1 christos r_symndx = ELF32_R_SYM (rel->r_info);
1329 1.1 christos if (r_symndx >= symtab_hdr->sh_info)
1330 1.1 christos {
1331 1.1 christos h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1332 1.1 christos while (h->root.type == bfd_link_hash_indirect
1333 1.1 christos || h->root.type == bfd_link_hash_warning)
1334 1.1 christos h = (struct elf_link_hash_entry *) h->root.u.i.link;
1335 1.1 christos }
1336 1.1 christos
1337 1.1 christos switch (ELF32_R_TYPE (rel->r_info))
1338 1.1 christos {
1339 1.1 christos case R_OR1K_GOT16:
1340 1.1 christos if (h != NULL)
1341 1.1 christos {
1342 1.1 christos if (h->got.refcount > 0)
1343 1.1 christos h->got.refcount--;
1344 1.1 christos }
1345 1.1 christos else
1346 1.1 christos {
1347 1.1 christos if (local_got_refcounts && local_got_refcounts[r_symndx] > 0)
1348 1.1 christos local_got_refcounts[r_symndx]--;
1349 1.1 christos }
1350 1.1 christos break;
1351 1.1 christos
1352 1.1 christos default:
1353 1.1 christos break;
1354 1.1 christos }
1355 1.1 christos }
1356 1.1 christos return TRUE;
1357 1.1 christos }
1358 1.1 christos
1359 1.1 christos /* Look through the relocs for a section during the first phase. */
1360 1.1 christos
1361 1.1 christos static bfd_boolean
1362 1.1 christos or1k_elf_check_relocs (bfd *abfd,
1363 1.1 christos struct bfd_link_info *info,
1364 1.1 christos asection *sec,
1365 1.1 christos const Elf_Internal_Rela *relocs)
1366 1.1 christos {
1367 1.1 christos Elf_Internal_Shdr *symtab_hdr;
1368 1.1 christos struct elf_link_hash_entry **sym_hashes;
1369 1.1 christos const Elf_Internal_Rela *rel;
1370 1.1 christos
1371 1.1 christos const Elf_Internal_Rela *rel_end;
1372 1.1 christos struct elf_or1k_link_hash_table *htab;
1373 1.1 christos bfd *dynobj;
1374 1.1 christos asection *sreloc = NULL;
1375 1.1 christos
1376 1.4 christos if (bfd_link_relocatable (info))
1377 1.1 christos return TRUE;
1378 1.1 christos
1379 1.1 christos symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1380 1.1 christos sym_hashes = elf_sym_hashes (abfd);
1381 1.1 christos
1382 1.1 christos htab = or1k_elf_hash_table (info);
1383 1.1 christos if (htab == NULL)
1384 1.1 christos return FALSE;
1385 1.1 christos
1386 1.1 christos dynobj = htab->root.dynobj;
1387 1.1 christos
1388 1.1 christos rel_end = relocs + sec->reloc_count;
1389 1.1 christos for (rel = relocs; rel < rel_end; rel++)
1390 1.1 christos {
1391 1.1 christos struct elf_link_hash_entry *h;
1392 1.1 christos unsigned long r_symndx;
1393 1.1 christos unsigned char tls_type;
1394 1.1 christos
1395 1.1 christos r_symndx = ELF32_R_SYM (rel->r_info);
1396 1.1 christos if (r_symndx < symtab_hdr->sh_info)
1397 1.1 christos h = NULL;
1398 1.1 christos else
1399 1.1 christos {
1400 1.1 christos h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1401 1.1 christos while (h->root.type == bfd_link_hash_indirect
1402 1.1 christos || h->root.type == bfd_link_hash_warning)
1403 1.1 christos h = (struct elf_link_hash_entry *) h->root.u.i.link;
1404 1.1 christos
1405 1.1 christos /* PR15323, ref flags aren't set for references in the same
1406 1.1 christos object. */
1407 1.1 christos h->root.non_ir_ref = 1;
1408 1.1 christos }
1409 1.1 christos
1410 1.1 christos switch (ELF32_R_TYPE (rel->r_info))
1411 1.1 christos {
1412 1.1 christos case R_OR1K_TLS_GD_HI16:
1413 1.1 christos case R_OR1K_TLS_GD_LO16:
1414 1.1 christos tls_type = TLS_GD;
1415 1.1 christos break;
1416 1.1 christos case R_OR1K_TLS_LDM_HI16:
1417 1.1 christos case R_OR1K_TLS_LDM_LO16:
1418 1.1 christos case R_OR1K_TLS_LDO_HI16:
1419 1.1 christos case R_OR1K_TLS_LDO_LO16:
1420 1.1 christos tls_type = TLS_LD;
1421 1.1 christos break;
1422 1.1 christos case R_OR1K_TLS_IE_HI16:
1423 1.1 christos case R_OR1K_TLS_IE_LO16:
1424 1.1 christos tls_type = TLS_IE;
1425 1.1 christos break;
1426 1.1 christos case R_OR1K_TLS_LE_HI16:
1427 1.1 christos case R_OR1K_TLS_LE_LO16:
1428 1.1 christos tls_type = TLS_LE;
1429 1.1 christos break;
1430 1.1 christos default:
1431 1.1 christos tls_type = TLS_NONE;
1432 1.1 christos }
1433 1.1 christos
1434 1.1 christos /* Record TLS type. */
1435 1.1 christos if (h != NULL)
1436 1.1 christos ((struct elf_or1k_link_hash_entry *) h)->tls_type = tls_type;
1437 1.1 christos else
1438 1.1 christos {
1439 1.1 christos unsigned char *local_tls_type;
1440 1.1 christos
1441 1.1 christos /* This is a TLS type record for a local symbol. */
1442 1.1 christos local_tls_type = (unsigned char *) elf_or1k_local_tls_type (abfd);
1443 1.1 christos if (local_tls_type == NULL)
1444 1.1 christos {
1445 1.1 christos bfd_size_type size;
1446 1.1 christos
1447 1.1 christos size = symtab_hdr->sh_info;
1448 1.1 christos local_tls_type = bfd_zalloc (abfd, size);
1449 1.1 christos if (local_tls_type == NULL)
1450 1.1 christos return FALSE;
1451 1.1 christos elf_or1k_local_tls_type (abfd) = local_tls_type;
1452 1.1 christos }
1453 1.1 christos local_tls_type[r_symndx] = tls_type;
1454 1.1 christos }
1455 1.1 christos
1456 1.1 christos switch (ELF32_R_TYPE (rel->r_info))
1457 1.1 christos {
1458 1.1 christos /* This relocation describes the C++ object vtable hierarchy.
1459 1.1 christos Reconstruct it for later use during GC. */
1460 1.1 christos case R_OR1K_GNU_VTINHERIT:
1461 1.1 christos if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
1462 1.1 christos return FALSE;
1463 1.1 christos break;
1464 1.1 christos
1465 1.1 christos /* This relocation describes which C++ vtable entries are actually
1466 1.1 christos used. Record for later use during GC. */
1467 1.1 christos case R_OR1K_GNU_VTENTRY:
1468 1.1 christos BFD_ASSERT (h != NULL);
1469 1.1 christos if (h != NULL
1470 1.1 christos && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
1471 1.1 christos return FALSE;
1472 1.1 christos break;
1473 1.1 christos
1474 1.1 christos /* This relocation requires .plt entry. */
1475 1.1 christos case R_OR1K_PLT26:
1476 1.1 christos if (h != NULL)
1477 1.1 christos {
1478 1.1 christos h->needs_plt = 1;
1479 1.1 christos h->plt.refcount += 1;
1480 1.1 christos }
1481 1.1 christos break;
1482 1.1 christos
1483 1.1 christos case R_OR1K_GOT16:
1484 1.1 christos case R_OR1K_GOTOFF_HI16:
1485 1.1 christos case R_OR1K_GOTOFF_LO16:
1486 1.1 christos case R_OR1K_TLS_GD_HI16:
1487 1.1 christos case R_OR1K_TLS_GD_LO16:
1488 1.1 christos case R_OR1K_TLS_IE_HI16:
1489 1.1 christos case R_OR1K_TLS_IE_LO16:
1490 1.5 christos if (htab->root.sgot == NULL)
1491 1.1 christos {
1492 1.1 christos if (dynobj == NULL)
1493 1.1 christos htab->root.dynobj = dynobj = abfd;
1494 1.5 christos if (!_bfd_elf_create_got_section (dynobj, info))
1495 1.1 christos return FALSE;
1496 1.1 christos }
1497 1.1 christos
1498 1.1 christos if (ELF32_R_TYPE (rel->r_info) != R_OR1K_GOTOFF_HI16 &&
1499 1.1 christos ELF32_R_TYPE (rel->r_info) != R_OR1K_GOTOFF_LO16)
1500 1.1 christos {
1501 1.1 christos if (h != NULL)
1502 1.1 christos h->got.refcount += 1;
1503 1.1 christos else
1504 1.1 christos {
1505 1.1 christos bfd_signed_vma *local_got_refcounts;
1506 1.1 christos
1507 1.1 christos /* This is a global offset table entry for a local symbol. */
1508 1.1 christos local_got_refcounts = elf_local_got_refcounts (abfd);
1509 1.1 christos if (local_got_refcounts == NULL)
1510 1.1 christos {
1511 1.1 christos bfd_size_type size;
1512 1.1 christos
1513 1.1 christos size = symtab_hdr->sh_info;
1514 1.1 christos size *= sizeof (bfd_signed_vma);
1515 1.1 christos local_got_refcounts = bfd_zalloc (abfd, size);
1516 1.1 christos if (local_got_refcounts == NULL)
1517 1.1 christos return FALSE;
1518 1.1 christos elf_local_got_refcounts (abfd) = local_got_refcounts;
1519 1.1 christos }
1520 1.1 christos local_got_refcounts[r_symndx] += 1;
1521 1.1 christos }
1522 1.1 christos }
1523 1.1 christos break;
1524 1.1 christos
1525 1.1 christos case R_OR1K_INSN_REL_26:
1526 1.1 christos case R_OR1K_HI_16_IN_INSN:
1527 1.1 christos case R_OR1K_LO_16_IN_INSN:
1528 1.1 christos case R_OR1K_32:
1529 1.1 christos /* R_OR1K_16? */
1530 1.1 christos {
1531 1.4 christos if (h != NULL && !bfd_link_pic (info))
1532 1.1 christos {
1533 1.1 christos /* We may need a copy reloc. */
1534 1.1 christos h->non_got_ref = 1;
1535 1.1 christos
1536 1.1 christos /* We may also need a .plt entry. */
1537 1.1 christos h->plt.refcount += 1;
1538 1.1 christos if (ELF32_R_TYPE (rel->r_info) != R_OR1K_INSN_REL_26)
1539 1.1 christos h->pointer_equality_needed = 1;
1540 1.1 christos }
1541 1.1 christos
1542 1.1 christos /* If we are creating a shared library, and this is a reloc
1543 1.1 christos against a global symbol, or a non PC relative reloc
1544 1.1 christos against a local symbol, then we need to copy the reloc
1545 1.1 christos into the shared library. However, if we are linking with
1546 1.1 christos -Bsymbolic, we do not need to copy a reloc against a
1547 1.1 christos global symbol which is defined in an object we are
1548 1.1 christos including in the link (i.e., DEF_REGULAR is set). At
1549 1.1 christos this point we have not seen all the input files, so it is
1550 1.1 christos possible that DEF_REGULAR is not set now but will be set
1551 1.1 christos later (it is never cleared). In case of a weak definition,
1552 1.1 christos DEF_REGULAR may be cleared later by a strong definition in
1553 1.1 christos a shared library. We account for that possibility below by
1554 1.1 christos storing information in the relocs_copied field of the hash
1555 1.1 christos table entry. A similar situation occurs when creating
1556 1.1 christos shared libraries and symbol visibility changes render the
1557 1.1 christos symbol local.
1558 1.1 christos
1559 1.1 christos If on the other hand, we are creating an executable, we
1560 1.1 christos may need to keep relocations for symbols satisfied by a
1561 1.1 christos dynamic library if we manage to avoid copy relocs for the
1562 1.1 christos symbol. */
1563 1.1 christos
1564 1.4 christos if ((bfd_link_pic (info)
1565 1.1 christos && (sec->flags & SEC_ALLOC) != 0
1566 1.1 christos && (ELF32_R_TYPE (rel->r_info) != R_OR1K_INSN_REL_26
1567 1.1 christos || (h != NULL
1568 1.1 christos && (!SYMBOLIC_BIND (info, h)
1569 1.1 christos || h->root.type == bfd_link_hash_defweak
1570 1.1 christos || !h->def_regular))))
1571 1.4 christos || (!bfd_link_pic (info)
1572 1.1 christos && (sec->flags & SEC_ALLOC) != 0
1573 1.1 christos && h != NULL
1574 1.1 christos && (h->root.type == bfd_link_hash_defweak
1575 1.1 christos || !h->def_regular)))
1576 1.1 christos {
1577 1.1 christos struct elf_or1k_dyn_relocs *p;
1578 1.1 christos struct elf_or1k_dyn_relocs **head;
1579 1.1 christos
1580 1.1 christos /* When creating a shared object, we must copy these
1581 1.1 christos relocs into the output file. We create a reloc
1582 1.1 christos section in dynobj and make room for the reloc. */
1583 1.1 christos if (sreloc == NULL)
1584 1.1 christos {
1585 1.1 christos const char *name;
1586 1.1 christos unsigned int strndx = elf_elfheader (abfd)->e_shstrndx;
1587 1.1 christos unsigned int shnam = _bfd_elf_single_rel_hdr (sec)->sh_name;
1588 1.1 christos
1589 1.1 christos name = bfd_elf_string_from_elf_section (abfd, strndx, shnam);
1590 1.1 christos if (name == NULL)
1591 1.1 christos return FALSE;
1592 1.1 christos
1593 1.1 christos if (strncmp (name, ".rela", 5) != 0
1594 1.1 christos || strcmp (bfd_get_section_name (abfd, sec),
1595 1.1 christos name + 5) != 0)
1596 1.1 christos {
1597 1.5 christos _bfd_error_handler
1598 1.5 christos /* xgettext:c-format */
1599 1.1 christos (_("%B: bad relocation section name `%s\'"),
1600 1.1 christos abfd, name);
1601 1.1 christos }
1602 1.1 christos
1603 1.1 christos if (htab->root.dynobj == NULL)
1604 1.1 christos htab->root.dynobj = abfd;
1605 1.1 christos dynobj = htab->root.dynobj;
1606 1.1 christos
1607 1.1 christos sreloc = bfd_get_section_by_name (dynobj, name);
1608 1.1 christos if (sreloc == NULL)
1609 1.1 christos {
1610 1.1 christos sreloc = _bfd_elf_make_dynamic_reloc_section
1611 1.1 christos (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
1612 1.1 christos
1613 1.1 christos if (sreloc == NULL)
1614 1.1 christos return FALSE;
1615 1.1 christos }
1616 1.1 christos elf_section_data (sec)->sreloc = sreloc;
1617 1.1 christos }
1618 1.1 christos
1619 1.1 christos /* If this is a global symbol, we count the number of
1620 1.1 christos relocations we need for this symbol. */
1621 1.1 christos if (h != NULL)
1622 1.1 christos head = &((struct elf_or1k_link_hash_entry *) h)->dyn_relocs;
1623 1.1 christos else
1624 1.1 christos {
1625 1.1 christos /* Track dynamic relocs needed for local syms too.
1626 1.1 christos We really need local syms available to do this
1627 1.1 christos easily. Oh well. */
1628 1.1 christos
1629 1.1 christos asection *s;
1630 1.1 christos Elf_Internal_Sym *isym;
1631 1.1 christos void *vpp;
1632 1.1 christos
1633 1.1 christos isym = bfd_sym_from_r_symndx (&htab->sym_sec,
1634 1.1 christos abfd, r_symndx);
1635 1.1 christos if (isym == NULL)
1636 1.1 christos return FALSE;
1637 1.1 christos
1638 1.1 christos s = bfd_section_from_elf_index (abfd, isym->st_shndx);
1639 1.1 christos if (s == NULL)
1640 1.1 christos return FALSE;
1641 1.1 christos
1642 1.1 christos vpp = &elf_section_data (s)->local_dynrel;
1643 1.1 christos head = (struct elf_or1k_dyn_relocs **) vpp;
1644 1.1 christos }
1645 1.1 christos
1646 1.1 christos p = *head;
1647 1.1 christos if (p == NULL || p->sec != sec)
1648 1.1 christos {
1649 1.1 christos bfd_size_type amt = sizeof *p;
1650 1.1 christos p = ((struct elf_or1k_dyn_relocs *)
1651 1.1 christos bfd_alloc (htab->root.dynobj, amt));
1652 1.1 christos if (p == NULL)
1653 1.1 christos return FALSE;
1654 1.1 christos p->next = *head;
1655 1.1 christos *head = p;
1656 1.1 christos p->sec = sec;
1657 1.1 christos p->count = 0;
1658 1.1 christos p->pc_count = 0;
1659 1.1 christos }
1660 1.1 christos
1661 1.1 christos p->count += 1;
1662 1.1 christos if (ELF32_R_TYPE (rel->r_info) == R_OR1K_INSN_REL_26)
1663 1.1 christos p->pc_count += 1;
1664 1.1 christos }
1665 1.1 christos }
1666 1.1 christos break;
1667 1.1 christos }
1668 1.1 christos }
1669 1.1 christos
1670 1.1 christos return TRUE;
1671 1.1 christos }
1672 1.1 christos
1673 1.1 christos /* Finish up the dynamic sections. */
1674 1.1 christos
1675 1.1 christos static bfd_boolean
1676 1.1 christos or1k_elf_finish_dynamic_sections (bfd *output_bfd,
1677 1.1 christos struct bfd_link_info *info)
1678 1.1 christos {
1679 1.1 christos bfd *dynobj;
1680 1.1 christos asection *sdyn, *sgot;
1681 1.1 christos struct elf_or1k_link_hash_table *htab;
1682 1.1 christos
1683 1.1 christos htab = or1k_elf_hash_table (info);
1684 1.1 christos if (htab == NULL)
1685 1.1 christos return FALSE;
1686 1.1 christos
1687 1.1 christos dynobj = htab->root.dynobj;
1688 1.1 christos
1689 1.5 christos sgot = htab->root.sgotplt;
1690 1.1 christos sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
1691 1.1 christos
1692 1.1 christos if (htab->root.dynamic_sections_created)
1693 1.1 christos {
1694 1.1 christos asection *splt;
1695 1.1 christos Elf32_External_Dyn *dyncon, *dynconend;
1696 1.1 christos
1697 1.1 christos BFD_ASSERT (sgot != NULL && sdyn != NULL);
1698 1.1 christos
1699 1.1 christos dyncon = (Elf32_External_Dyn *) sdyn->contents;
1700 1.1 christos dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
1701 1.1 christos
1702 1.1 christos for (; dyncon < dynconend; dyncon++)
1703 1.1 christos {
1704 1.1 christos Elf_Internal_Dyn dyn;
1705 1.1 christos asection *s;
1706 1.1 christos
1707 1.1 christos bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1708 1.1 christos
1709 1.1 christos switch (dyn.d_tag)
1710 1.1 christos {
1711 1.1 christos default:
1712 1.1 christos continue;
1713 1.1 christos
1714 1.1 christos case DT_PLTGOT:
1715 1.5 christos s = htab->root.sgotplt;
1716 1.4 christos dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
1717 1.1 christos break;
1718 1.1 christos
1719 1.1 christos case DT_JMPREL:
1720 1.5 christos s = htab->root.srelplt;
1721 1.4 christos dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
1722 1.1 christos break;
1723 1.1 christos
1724 1.1 christos case DT_PLTRELSZ:
1725 1.5 christos s = htab->root.srelplt;
1726 1.1 christos dyn.d_un.d_val = s->size;
1727 1.1 christos break;
1728 1.1 christos }
1729 1.1 christos bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1730 1.1 christos }
1731 1.1 christos
1732 1.1 christos
1733 1.1 christos /* Fill in the first entry in the procedure linkage table. */
1734 1.5 christos splt = htab->root.splt;
1735 1.1 christos if (splt && splt->size > 0)
1736 1.1 christos {
1737 1.4 christos if (bfd_link_pic (info))
1738 1.1 christos {
1739 1.1 christos bfd_put_32 (output_bfd, PLT0_PIC_ENTRY_WORD0,
1740 1.1 christos splt->contents);
1741 1.1 christos bfd_put_32 (output_bfd, PLT0_PIC_ENTRY_WORD1,
1742 1.1 christos splt->contents + 4);
1743 1.1 christos bfd_put_32 (output_bfd, PLT0_PIC_ENTRY_WORD2,
1744 1.1 christos splt->contents + 8);
1745 1.1 christos bfd_put_32 (output_bfd, PLT0_PIC_ENTRY_WORD3,
1746 1.1 christos splt->contents + 12);
1747 1.1 christos bfd_put_32 (output_bfd, PLT0_PIC_ENTRY_WORD4,
1748 1.1 christos splt->contents + 16);
1749 1.1 christos }
1750 1.1 christos else
1751 1.1 christos {
1752 1.1 christos unsigned long addr;
1753 1.1 christos /* addr = .got + 4 */
1754 1.1 christos addr = sgot->output_section->vma + sgot->output_offset + 4;
1755 1.1 christos bfd_put_32 (output_bfd,
1756 1.1 christos PLT0_ENTRY_WORD0 | ((addr >> 16) & 0xffff),
1757 1.1 christos splt->contents);
1758 1.1 christos bfd_put_32 (output_bfd,
1759 1.1 christos PLT0_ENTRY_WORD1 | (addr & 0xffff),
1760 1.1 christos splt->contents + 4);
1761 1.1 christos bfd_put_32 (output_bfd, PLT0_ENTRY_WORD2, splt->contents + 8);
1762 1.1 christos bfd_put_32 (output_bfd, PLT0_ENTRY_WORD3, splt->contents + 12);
1763 1.1 christos bfd_put_32 (output_bfd, PLT0_ENTRY_WORD4, splt->contents + 16);
1764 1.1 christos }
1765 1.1 christos
1766 1.1 christos elf_section_data (splt->output_section)->this_hdr.sh_entsize = 4;
1767 1.1 christos }
1768 1.1 christos }
1769 1.1 christos
1770 1.1 christos /* Set the first entry in the global offset table to the address of
1771 1.1 christos the dynamic section. */
1772 1.1 christos if (sgot && sgot->size > 0)
1773 1.1 christos {
1774 1.1 christos if (sdyn == NULL)
1775 1.1 christos bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
1776 1.1 christos else
1777 1.1 christos bfd_put_32 (output_bfd,
1778 1.1 christos sdyn->output_section->vma + sdyn->output_offset,
1779 1.1 christos sgot->contents);
1780 1.1 christos elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
1781 1.1 christos }
1782 1.1 christos
1783 1.5 christos if (htab->root.sgot && htab->root.sgot->size > 0)
1784 1.5 christos elf_section_data (htab->root.sgot->output_section)->this_hdr.sh_entsize = 4;
1785 1.1 christos
1786 1.1 christos return TRUE;
1787 1.1 christos }
1788 1.1 christos
1789 1.1 christos /* Finish up dynamic symbol handling. We set the contents of various
1790 1.1 christos dynamic sections here. */
1791 1.1 christos
1792 1.1 christos static bfd_boolean
1793 1.1 christos or1k_elf_finish_dynamic_symbol (bfd *output_bfd,
1794 1.1 christos struct bfd_link_info *info,
1795 1.1 christos struct elf_link_hash_entry *h,
1796 1.1 christos Elf_Internal_Sym *sym)
1797 1.1 christos {
1798 1.1 christos struct elf_or1k_link_hash_table *htab;
1799 1.1 christos bfd_byte *loc;
1800 1.1 christos
1801 1.1 christos htab = or1k_elf_hash_table (info);
1802 1.1 christos if (htab == NULL)
1803 1.1 christos return FALSE;
1804 1.1 christos
1805 1.1 christos if (h->plt.offset != (bfd_vma) -1)
1806 1.1 christos {
1807 1.1 christos asection *splt;
1808 1.1 christos asection *sgot;
1809 1.1 christos asection *srela;
1810 1.1 christos
1811 1.1 christos bfd_vma plt_index;
1812 1.1 christos bfd_vma got_offset;
1813 1.1 christos bfd_vma got_addr;
1814 1.1 christos Elf_Internal_Rela rela;
1815 1.1 christos
1816 1.1 christos /* This symbol has an entry in the procedure linkage table. Set
1817 1.1 christos it up. */
1818 1.1 christos BFD_ASSERT (h->dynindx != -1);
1819 1.1 christos
1820 1.5 christos splt = htab->root.splt;
1821 1.5 christos sgot = htab->root.sgotplt;
1822 1.5 christos srela = htab->root.srelplt;
1823 1.1 christos BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1824 1.1 christos
1825 1.1 christos /* Get the index in the procedure linkage table which
1826 1.1 christos corresponds to this symbol. This is the index of this symbol
1827 1.1 christos in all the symbols for which we are making plt entries. The
1828 1.1 christos first entry in the procedure linkage table is reserved. */
1829 1.1 christos plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1830 1.1 christos
1831 1.1 christos /* Get the offset into the .got table of the entry that
1832 1.1 christos corresponds to this function. Each .got entry is 4 bytes.
1833 1.1 christos The first three are reserved. */
1834 1.1 christos got_offset = (plt_index + 3) * 4;
1835 1.1 christos got_addr = got_offset;
1836 1.1 christos
1837 1.1 christos /* Fill in the entry in the procedure linkage table. */
1838 1.4 christos if (! bfd_link_pic (info))
1839 1.1 christos {
1840 1.5 christos got_addr += htab->root.sgotplt->output_section->vma
1841 1.5 christos + htab->root.sgotplt->output_offset;
1842 1.1 christos bfd_put_32 (output_bfd, PLT_ENTRY_WORD0 | ((got_addr >> 16) & 0xffff),
1843 1.1 christos splt->contents + h->plt.offset);
1844 1.1 christos bfd_put_32 (output_bfd, PLT_ENTRY_WORD1 | (got_addr & 0xffff),
1845 1.1 christos splt->contents + h->plt.offset + 4);
1846 1.1 christos bfd_put_32 (output_bfd, (bfd_vma) PLT_ENTRY_WORD2,
1847 1.1 christos splt->contents + h->plt.offset + 8);
1848 1.1 christos bfd_put_32 (output_bfd, (bfd_vma) PLT_ENTRY_WORD3,
1849 1.1 christos splt->contents + h->plt.offset + 12);
1850 1.1 christos bfd_put_32 (output_bfd, PLT_ENTRY_WORD4
1851 1.1 christos | plt_index * sizeof (Elf32_External_Rela),
1852 1.1 christos splt->contents + h->plt.offset + 16);
1853 1.1 christos }
1854 1.1 christos else
1855 1.1 christos {
1856 1.1 christos bfd_put_32 (output_bfd, PLT_PIC_ENTRY_WORD0 | (got_addr & 0xffff),
1857 1.1 christos splt->contents + h->plt.offset);
1858 1.1 christos bfd_put_32 (output_bfd, PLT_PIC_ENTRY_WORD1
1859 1.1 christos | plt_index * sizeof (Elf32_External_Rela),
1860 1.1 christos splt->contents + h->plt.offset + 4);
1861 1.1 christos bfd_put_32 (output_bfd, (bfd_vma) PLT_PIC_ENTRY_WORD2,
1862 1.1 christos splt->contents + h->plt.offset + 8);
1863 1.1 christos bfd_put_32 (output_bfd, (bfd_vma) PLT_PIC_ENTRY_WORD3,
1864 1.1 christos splt->contents + h->plt.offset + 12);
1865 1.1 christos bfd_put_32 (output_bfd, (bfd_vma) PLT_PIC_ENTRY_WORD4,
1866 1.1 christos splt->contents + h->plt.offset + 16);
1867 1.1 christos }
1868 1.1 christos
1869 1.1 christos /* Fill in the entry in the global offset table. */
1870 1.1 christos bfd_put_32 (output_bfd,
1871 1.1 christos (splt->output_section->vma
1872 1.1 christos + splt->output_offset), /* Same offset. */
1873 1.1 christos sgot->contents + got_offset);
1874 1.1 christos
1875 1.1 christos /* Fill in the entry in the .rela.plt section. */
1876 1.1 christos rela.r_offset = (sgot->output_section->vma
1877 1.1 christos + sgot->output_offset
1878 1.1 christos + got_offset);
1879 1.1 christos rela.r_info = ELF32_R_INFO (h->dynindx, R_OR1K_JMP_SLOT);
1880 1.1 christos rela.r_addend = 0;
1881 1.1 christos loc = srela->contents;
1882 1.1 christos loc += plt_index * sizeof (Elf32_External_Rela);
1883 1.1 christos bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1884 1.1 christos
1885 1.1 christos if (!h->def_regular)
1886 1.1 christos {
1887 1.1 christos /* Mark the symbol as undefined, rather than as defined in
1888 1.1 christos the .plt section. Leave the value alone. */
1889 1.1 christos sym->st_shndx = SHN_UNDEF;
1890 1.1 christos }
1891 1.1 christos
1892 1.1 christos }
1893 1.1 christos
1894 1.1 christos if (h->got.offset != (bfd_vma) -1
1895 1.1 christos && (h->got.offset & 2) == 0) /* Homemade TLS check. */
1896 1.1 christos {
1897 1.1 christos asection *sgot;
1898 1.1 christos asection *srela;
1899 1.1 christos Elf_Internal_Rela rela;
1900 1.1 christos
1901 1.1 christos /* This symbol has an entry in the global offset table. Set it
1902 1.1 christos up. */
1903 1.5 christos sgot = htab->root.sgot;
1904 1.5 christos srela = htab->root.srelgot;
1905 1.1 christos BFD_ASSERT (sgot != NULL && srela != NULL);
1906 1.1 christos
1907 1.1 christos rela.r_offset = (sgot->output_section->vma
1908 1.1 christos + sgot->output_offset
1909 1.1 christos + (h->got.offset &~ 1));
1910 1.1 christos
1911 1.1 christos /* If this is a -Bsymbolic link, and the symbol is defined
1912 1.1 christos locally, we just want to emit a RELATIVE reloc. Likewise if
1913 1.1 christos the symbol was forced to be local because of a version file.
1914 1.1 christos The entry in the global offset table will already have been
1915 1.1 christos initialized in the relocate_section function. */
1916 1.4 christos if (bfd_link_pic (info) && SYMBOL_REFERENCES_LOCAL (info, h))
1917 1.1 christos {
1918 1.1 christos rela.r_info = ELF32_R_INFO (0, R_OR1K_RELATIVE);
1919 1.1 christos rela.r_addend = (h->root.u.def.value
1920 1.1 christos + h->root.u.def.section->output_section->vma
1921 1.1 christos + h->root.u.def.section->output_offset);
1922 1.1 christos }
1923 1.1 christos else
1924 1.1 christos {
1925 1.1 christos BFD_ASSERT ((h->got.offset & 1) == 0);
1926 1.1 christos bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset);
1927 1.1 christos rela.r_info = ELF32_R_INFO (h->dynindx, R_OR1K_GLOB_DAT);
1928 1.1 christos rela.r_addend = 0;
1929 1.1 christos }
1930 1.1 christos
1931 1.1 christos loc = srela->contents;
1932 1.1 christos loc += srela->reloc_count * sizeof (Elf32_External_Rela);
1933 1.1 christos bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1934 1.1 christos ++srela->reloc_count;
1935 1.1 christos }
1936 1.1 christos
1937 1.1 christos if (h->needs_copy)
1938 1.1 christos {
1939 1.1 christos asection *s;
1940 1.1 christos Elf_Internal_Rela rela;
1941 1.1 christos
1942 1.1 christos /* This symbols needs a copy reloc. Set it up. */
1943 1.1 christos BFD_ASSERT (h->dynindx != -1
1944 1.1 christos && (h->root.type == bfd_link_hash_defined
1945 1.1 christos || h->root.type == bfd_link_hash_defweak));
1946 1.1 christos
1947 1.1 christos rela.r_offset = (h->root.u.def.value
1948 1.1 christos + h->root.u.def.section->output_section->vma
1949 1.1 christos + h->root.u.def.section->output_offset);
1950 1.1 christos rela.r_info = ELF32_R_INFO (h->dynindx, R_OR1K_COPY);
1951 1.1 christos rela.r_addend = 0;
1952 1.5 christos if (h->root.u.def.section == htab->root.sdynrelro)
1953 1.5 christos s = htab->root.sreldynrelro;
1954 1.5 christos else
1955 1.5 christos s = htab->root.srelbss;
1956 1.5 christos loc = s->contents + s->reloc_count * sizeof (Elf32_External_Rela);
1957 1.1 christos bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1958 1.1 christos ++s->reloc_count;
1959 1.1 christos }
1960 1.1 christos
1961 1.1 christos /* Mark some specially defined symbols as absolute. */
1962 1.1 christos if (strcmp (h->root.root.string, "_DYNAMIC") == 0
1963 1.1 christos || h == htab->root.hgot)
1964 1.1 christos sym->st_shndx = SHN_ABS;
1965 1.1 christos
1966 1.1 christos return TRUE;
1967 1.1 christos }
1968 1.1 christos
1969 1.1 christos static enum elf_reloc_type_class
1970 1.1 christos or1k_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
1971 1.1 christos const asection *rel_sec ATTRIBUTE_UNUSED,
1972 1.1 christos const Elf_Internal_Rela *rela)
1973 1.1 christos {
1974 1.1 christos switch ((int) ELF32_R_TYPE (rela->r_info))
1975 1.1 christos {
1976 1.1 christos case R_OR1K_RELATIVE: return reloc_class_relative;
1977 1.1 christos case R_OR1K_JMP_SLOT: return reloc_class_plt;
1978 1.1 christos case R_OR1K_COPY: return reloc_class_copy;
1979 1.1 christos default: return reloc_class_normal;
1980 1.1 christos }
1981 1.1 christos }
1982 1.1 christos
1983 1.1 christos /* Adjust a symbol defined by a dynamic object and referenced by a
1984 1.1 christos regular object. The current definition is in some section of the
1985 1.1 christos dynamic object, but we're not including those sections. We have to
1986 1.1 christos change the definition to something the rest of the link can
1987 1.1 christos understand. */
1988 1.1 christos
1989 1.1 christos static bfd_boolean
1990 1.1 christos or1k_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
1991 1.1 christos struct elf_link_hash_entry *h)
1992 1.1 christos {
1993 1.1 christos struct elf_or1k_link_hash_table *htab;
1994 1.1 christos struct elf_or1k_link_hash_entry *eh;
1995 1.1 christos struct elf_or1k_dyn_relocs *p;
1996 1.1 christos bfd *dynobj;
1997 1.5 christos asection *s, *srel;
1998 1.1 christos
1999 1.1 christos dynobj = elf_hash_table (info)->dynobj;
2000 1.1 christos
2001 1.1 christos /* Make sure we know what is going on here. */
2002 1.1 christos BFD_ASSERT (dynobj != NULL
2003 1.1 christos && (h->needs_plt
2004 1.1 christos || h->u.weakdef != NULL
2005 1.1 christos || (h->def_dynamic
2006 1.1 christos && h->ref_regular
2007 1.1 christos && !h->def_regular)));
2008 1.1 christos
2009 1.1 christos /* If this is a function, put it in the procedure linkage table. We
2010 1.1 christos will fill in the contents of the procedure linkage table later,
2011 1.1 christos when we know the address of the .got section. */
2012 1.1 christos if (h->type == STT_FUNC
2013 1.1 christos || h->needs_plt)
2014 1.1 christos {
2015 1.4 christos if (! bfd_link_pic (info)
2016 1.1 christos && !h->def_dynamic
2017 1.1 christos && !h->ref_dynamic
2018 1.1 christos && h->root.type != bfd_link_hash_undefweak
2019 1.1 christos && h->root.type != bfd_link_hash_undefined)
2020 1.1 christos {
2021 1.1 christos /* This case can occur if we saw a PLT reloc in an input
2022 1.1 christos file, but the symbol was never referred to by a dynamic
2023 1.1 christos object. In such a case, we don't actually need to build
2024 1.1 christos a procedure linkage table, and we can just do a PCREL
2025 1.1 christos reloc instead. */
2026 1.1 christos h->plt.offset = (bfd_vma) -1;
2027 1.1 christos h->needs_plt = 0;
2028 1.1 christos }
2029 1.1 christos
2030 1.1 christos return TRUE;
2031 1.1 christos }
2032 1.1 christos else
2033 1.1 christos h->plt.offset = (bfd_vma) -1;
2034 1.1 christos
2035 1.1 christos /* If this is a weak symbol, and there is a real definition, the
2036 1.1 christos processor independent code will have arranged for us to see the
2037 1.1 christos real definition first, and we can just use the same value. */
2038 1.1 christos if (h->u.weakdef != NULL)
2039 1.1 christos {
2040 1.1 christos BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
2041 1.1 christos || h->u.weakdef->root.type == bfd_link_hash_defweak);
2042 1.1 christos h->root.u.def.section = h->u.weakdef->root.u.def.section;
2043 1.1 christos h->root.u.def.value = h->u.weakdef->root.u.def.value;
2044 1.1 christos return TRUE;
2045 1.1 christos }
2046 1.1 christos
2047 1.1 christos /* This is a reference to a symbol defined by a dynamic object which
2048 1.1 christos is not a function. */
2049 1.1 christos
2050 1.1 christos /* If we are creating a shared library, we must presume that the
2051 1.1 christos only references to the symbol are via the global offset table.
2052 1.1 christos For such cases we need not do anything here; the relocations will
2053 1.1 christos be handled correctly by relocate_section. */
2054 1.4 christos if (bfd_link_pic (info))
2055 1.1 christos return TRUE;
2056 1.1 christos
2057 1.1 christos /* If there are no references to this symbol that do not use the
2058 1.1 christos GOT, we don't need to generate a copy reloc. */
2059 1.1 christos if (!h->non_got_ref)
2060 1.1 christos return TRUE;
2061 1.1 christos
2062 1.1 christos /* If -z nocopyreloc was given, we won't generate them either. */
2063 1.1 christos if (info->nocopyreloc)
2064 1.1 christos {
2065 1.1 christos h->non_got_ref = 0;
2066 1.1 christos return TRUE;
2067 1.1 christos }
2068 1.1 christos
2069 1.1 christos eh = (struct elf_or1k_link_hash_entry *) h;
2070 1.1 christos for (p = eh->dyn_relocs; p != NULL; p = p->next)
2071 1.1 christos {
2072 1.1 christos s = p->sec->output_section;
2073 1.1 christos if (s != NULL && (s->flags & (SEC_READONLY | SEC_HAS_CONTENTS)) != 0)
2074 1.1 christos break;
2075 1.1 christos }
2076 1.1 christos
2077 1.1 christos /* If we didn't find any dynamic relocs in sections which needs the
2078 1.1 christos copy reloc, then we'll be keeping the dynamic relocs and avoiding
2079 1.1 christos the copy reloc. */
2080 1.1 christos if (p == NULL)
2081 1.1 christos {
2082 1.1 christos h->non_got_ref = 0;
2083 1.1 christos return TRUE;
2084 1.1 christos }
2085 1.1 christos
2086 1.1 christos /* We must allocate the symbol in our .dynbss section, which will
2087 1.1 christos become part of the .bss section of the executable. There will be
2088 1.1 christos an entry for this symbol in the .dynsym section. The dynamic
2089 1.1 christos object will contain position independent code, so all references
2090 1.1 christos from the dynamic object to this symbol will go through the global
2091 1.1 christos offset table. The dynamic linker will use the .dynsym entry to
2092 1.1 christos determine the address it must put in the global offset table, so
2093 1.1 christos both the dynamic object and the regular object will refer to the
2094 1.1 christos same memory location for the variable. */
2095 1.1 christos
2096 1.1 christos htab = or1k_elf_hash_table (info);
2097 1.1 christos if (htab == NULL)
2098 1.1 christos return FALSE;
2099 1.1 christos
2100 1.1 christos /* We must generate a R_OR1K_COPY reloc to tell the dynamic linker
2101 1.1 christos to copy the initial value out of the dynamic object and into the
2102 1.1 christos runtime process image. We need to remember the offset into the
2103 1.1 christos .rela.bss section we are going to use. */
2104 1.5 christos if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
2105 1.5 christos {
2106 1.5 christos s = htab->root.sdynrelro;
2107 1.5 christos srel = htab->root.sreldynrelro;
2108 1.5 christos }
2109 1.5 christos else
2110 1.5 christos {
2111 1.5 christos s = htab->root.sdynbss;
2112 1.5 christos srel = htab->root.srelbss;
2113 1.5 christos }
2114 1.1 christos if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
2115 1.1 christos {
2116 1.1 christos srel->size += sizeof (Elf32_External_Rela);
2117 1.1 christos h->needs_copy = 1;
2118 1.1 christos }
2119 1.1 christos
2120 1.1 christos return _bfd_elf_adjust_dynamic_copy (info, h, s);
2121 1.1 christos }
2122 1.1 christos
2123 1.1 christos /* Allocate space in .plt, .got and associated reloc sections for
2124 1.1 christos dynamic relocs. */
2125 1.1 christos
2126 1.1 christos static bfd_boolean
2127 1.1 christos allocate_dynrelocs (struct elf_link_hash_entry *h, void * inf)
2128 1.1 christos {
2129 1.1 christos struct bfd_link_info *info;
2130 1.1 christos struct elf_or1k_link_hash_table *htab;
2131 1.1 christos struct elf_or1k_link_hash_entry *eh;
2132 1.1 christos struct elf_or1k_dyn_relocs *p;
2133 1.1 christos
2134 1.1 christos if (h->root.type == bfd_link_hash_indirect)
2135 1.1 christos return TRUE;
2136 1.1 christos
2137 1.1 christos info = (struct bfd_link_info *) inf;
2138 1.1 christos htab = or1k_elf_hash_table (info);
2139 1.1 christos if (htab == NULL)
2140 1.1 christos return FALSE;
2141 1.1 christos
2142 1.1 christos eh = (struct elf_or1k_link_hash_entry *) h;
2143 1.1 christos
2144 1.1 christos if (htab->root.dynamic_sections_created
2145 1.1 christos && h->plt.refcount > 0)
2146 1.1 christos {
2147 1.1 christos /* Make sure this symbol is output as a dynamic symbol.
2148 1.1 christos Undefined weak syms won't yet be marked as dynamic. */
2149 1.1 christos if (h->dynindx == -1
2150 1.1 christos && !h->forced_local)
2151 1.1 christos {
2152 1.1 christos if (! bfd_elf_link_record_dynamic_symbol (info, h))
2153 1.1 christos return FALSE;
2154 1.1 christos }
2155 1.1 christos
2156 1.4 christos if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, bfd_link_pic (info), h))
2157 1.1 christos {
2158 1.5 christos asection *s = htab->root.splt;
2159 1.1 christos
2160 1.1 christos /* If this is the first .plt entry, make room for the special
2161 1.1 christos first entry. */
2162 1.1 christos if (s->size == 0)
2163 1.1 christos s->size = PLT_ENTRY_SIZE;
2164 1.1 christos
2165 1.1 christos h->plt.offset = s->size;
2166 1.1 christos
2167 1.1 christos /* If this symbol is not defined in a regular file, and we are
2168 1.1 christos not generating a shared library, then set the symbol to this
2169 1.1 christos location in the .plt. This is required to make function
2170 1.1 christos pointers compare as equal between the normal executable and
2171 1.1 christos the shared library. */
2172 1.4 christos if (! bfd_link_pic (info)
2173 1.1 christos && !h->def_regular)
2174 1.1 christos {
2175 1.1 christos h->root.u.def.section = s;
2176 1.1 christos h->root.u.def.value = h->plt.offset;
2177 1.1 christos }
2178 1.1 christos
2179 1.1 christos /* Make room for this entry. */
2180 1.1 christos s->size += PLT_ENTRY_SIZE;
2181 1.1 christos
2182 1.1 christos /* We also need to make an entry in the .got.plt section, which
2183 1.1 christos will be placed in the .got section by the linker script. */
2184 1.5 christos htab->root.sgotplt->size += 4;
2185 1.1 christos
2186 1.1 christos /* We also need to make an entry in the .rel.plt section. */
2187 1.5 christos htab->root.srelplt->size += sizeof (Elf32_External_Rela);
2188 1.1 christos }
2189 1.1 christos else
2190 1.1 christos {
2191 1.1 christos h->plt.offset = (bfd_vma) -1;
2192 1.1 christos h->needs_plt = 0;
2193 1.1 christos }
2194 1.1 christos }
2195 1.1 christos else
2196 1.1 christos {
2197 1.1 christos h->plt.offset = (bfd_vma) -1;
2198 1.1 christos h->needs_plt = 0;
2199 1.1 christos }
2200 1.1 christos
2201 1.1 christos if (h->got.refcount > 0)
2202 1.1 christos {
2203 1.1 christos asection *s;
2204 1.1 christos bfd_boolean dyn;
2205 1.1 christos unsigned char tls_type;
2206 1.1 christos
2207 1.1 christos /* Make sure this symbol is output as a dynamic symbol.
2208 1.1 christos Undefined weak syms won't yet be marked as dynamic. */
2209 1.1 christos if (h->dynindx == -1
2210 1.1 christos && !h->forced_local)
2211 1.1 christos {
2212 1.1 christos if (! bfd_elf_link_record_dynamic_symbol (info, h))
2213 1.1 christos return FALSE;
2214 1.1 christos }
2215 1.1 christos
2216 1.5 christos s = htab->root.sgot;
2217 1.1 christos
2218 1.1 christos h->got.offset = s->size;
2219 1.1 christos
2220 1.1 christos tls_type = ((struct elf_or1k_link_hash_entry *) h)->tls_type;
2221 1.1 christos
2222 1.1 christos /* TLS GD requires two GOT and two relocs. */
2223 1.1 christos if (tls_type == TLS_GD)
2224 1.1 christos s->size += 8;
2225 1.1 christos else
2226 1.1 christos s->size += 4;
2227 1.1 christos dyn = htab->root.dynamic_sections_created;
2228 1.4 christos if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, bfd_link_pic (info), h))
2229 1.1 christos {
2230 1.1 christos if (tls_type == TLS_GD)
2231 1.5 christos htab->root.srelgot->size += 2 * sizeof (Elf32_External_Rela);
2232 1.1 christos else
2233 1.5 christos htab->root.srelgot->size += sizeof (Elf32_External_Rela);
2234 1.1 christos }
2235 1.1 christos }
2236 1.1 christos else
2237 1.1 christos h->got.offset = (bfd_vma) -1;
2238 1.1 christos
2239 1.1 christos if (eh->dyn_relocs == NULL)
2240 1.1 christos return TRUE;
2241 1.1 christos
2242 1.1 christos /* In the shared -Bsymbolic case, discard space allocated for
2243 1.1 christos dynamic pc-relative relocs against symbols which turn out to be
2244 1.1 christos defined in regular objects. For the normal shared case, discard
2245 1.1 christos space for pc-relative relocs that have become local due to symbol
2246 1.1 christos visibility changes. */
2247 1.1 christos
2248 1.4 christos if (bfd_link_pic (info))
2249 1.1 christos {
2250 1.1 christos if (SYMBOL_CALLS_LOCAL (info, h))
2251 1.1 christos {
2252 1.1 christos struct elf_or1k_dyn_relocs **pp;
2253 1.1 christos
2254 1.1 christos for (pp = &eh->dyn_relocs; (p = *pp) != NULL;)
2255 1.1 christos {
2256 1.1 christos p->count -= p->pc_count;
2257 1.1 christos p->pc_count = 0;
2258 1.1 christos if (p->count == 0)
2259 1.1 christos *pp = p->next;
2260 1.1 christos else
2261 1.1 christos pp = &p->next;
2262 1.1 christos }
2263 1.1 christos }
2264 1.1 christos
2265 1.1 christos /* Also discard relocs on undefined weak syms with non-default
2266 1.1 christos visibility. */
2267 1.1 christos if (eh->dyn_relocs != NULL
2268 1.1 christos && h->root.type == bfd_link_hash_undefweak)
2269 1.1 christos {
2270 1.1 christos if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
2271 1.1 christos eh->dyn_relocs = NULL;
2272 1.1 christos
2273 1.1 christos /* Make sure undefined weak symbols are output as a dynamic
2274 1.1 christos symbol in PIEs. */
2275 1.1 christos else if (h->dynindx == -1
2276 1.1 christos && !h->forced_local)
2277 1.1 christos {
2278 1.1 christos if (! bfd_elf_link_record_dynamic_symbol (info, h))
2279 1.1 christos return FALSE;
2280 1.1 christos }
2281 1.1 christos }
2282 1.1 christos }
2283 1.1 christos else
2284 1.1 christos {
2285 1.1 christos /* For the non-shared case, discard space for relocs against
2286 1.1 christos symbols which turn out to need copy relocs or are not
2287 1.1 christos dynamic. */
2288 1.1 christos
2289 1.1 christos if (!h->non_got_ref
2290 1.1 christos && ((h->def_dynamic
2291 1.1 christos && !h->def_regular)
2292 1.1 christos || (htab->root.dynamic_sections_created
2293 1.1 christos && (h->root.type == bfd_link_hash_undefweak
2294 1.1 christos || h->root.type == bfd_link_hash_undefined))))
2295 1.1 christos {
2296 1.1 christos /* Make sure this symbol is output as a dynamic symbol.
2297 1.1 christos Undefined weak syms won't yet be marked as dynamic. */
2298 1.1 christos if (h->dynindx == -1
2299 1.1 christos && !h->forced_local)
2300 1.1 christos {
2301 1.1 christos if (! bfd_elf_link_record_dynamic_symbol (info, h))
2302 1.1 christos return FALSE;
2303 1.1 christos }
2304 1.1 christos
2305 1.1 christos /* If that succeeded, we know we'll be keeping all the
2306 1.1 christos relocs. */
2307 1.1 christos if (h->dynindx != -1)
2308 1.1 christos goto keep;
2309 1.1 christos }
2310 1.1 christos
2311 1.1 christos eh->dyn_relocs = NULL;
2312 1.1 christos
2313 1.1 christos keep: ;
2314 1.1 christos }
2315 1.1 christos
2316 1.1 christos /* Finally, allocate space. */
2317 1.1 christos for (p = eh->dyn_relocs; p != NULL; p = p->next)
2318 1.1 christos {
2319 1.1 christos asection *sreloc = elf_section_data (p->sec)->sreloc;
2320 1.1 christos sreloc->size += p->count * sizeof (Elf32_External_Rela);
2321 1.1 christos }
2322 1.1 christos
2323 1.1 christos return TRUE;
2324 1.1 christos }
2325 1.1 christos
2326 1.1 christos /* Find any dynamic relocs that apply to read-only sections. */
2327 1.1 christos
2328 1.1 christos static bfd_boolean
2329 1.1 christos readonly_dynrelocs (struct elf_link_hash_entry *h, void * inf)
2330 1.1 christos {
2331 1.1 christos struct elf_or1k_link_hash_entry *eh;
2332 1.1 christos struct elf_or1k_dyn_relocs *p;
2333 1.1 christos
2334 1.1 christos eh = (struct elf_or1k_link_hash_entry *) h;
2335 1.1 christos for (p = eh->dyn_relocs; p != NULL; p = p->next)
2336 1.1 christos {
2337 1.1 christos asection *s = p->sec->output_section;
2338 1.1 christos
2339 1.1 christos if (s != NULL && (s->flags & SEC_READONLY) != 0)
2340 1.1 christos {
2341 1.1 christos struct bfd_link_info *info = (struct bfd_link_info *) inf;
2342 1.1 christos
2343 1.1 christos info->flags |= DF_TEXTREL;
2344 1.1 christos
2345 1.1 christos /* Not an error, just cut short the traversal. */
2346 1.1 christos return FALSE;
2347 1.1 christos }
2348 1.1 christos }
2349 1.1 christos return TRUE;
2350 1.1 christos }
2351 1.1 christos
2352 1.1 christos /* Set the sizes of the dynamic sections. */
2353 1.1 christos
2354 1.1 christos static bfd_boolean
2355 1.1 christos or1k_elf_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2356 1.1 christos struct bfd_link_info *info)
2357 1.1 christos {
2358 1.1 christos struct elf_or1k_link_hash_table *htab;
2359 1.1 christos bfd *dynobj;
2360 1.1 christos asection *s;
2361 1.1 christos bfd_boolean relocs;
2362 1.1 christos bfd *ibfd;
2363 1.1 christos
2364 1.1 christos htab = or1k_elf_hash_table (info);
2365 1.1 christos if (htab == NULL)
2366 1.1 christos return FALSE;
2367 1.1 christos
2368 1.1 christos dynobj = htab->root.dynobj;
2369 1.1 christos BFD_ASSERT (dynobj != NULL);
2370 1.1 christos
2371 1.1 christos if (htab->root.dynamic_sections_created)
2372 1.1 christos {
2373 1.1 christos /* Set the contents of the .interp section to the interpreter. */
2374 1.4 christos if (bfd_link_executable (info) && !info->nointerp)
2375 1.1 christos {
2376 1.1 christos s = bfd_get_section_by_name (dynobj, ".interp");
2377 1.1 christos BFD_ASSERT (s != NULL);
2378 1.1 christos s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2379 1.1 christos s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2380 1.1 christos }
2381 1.1 christos }
2382 1.1 christos
2383 1.1 christos /* Set up .got offsets for local syms, and space for local dynamic
2384 1.1 christos relocs. */
2385 1.1 christos for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
2386 1.1 christos {
2387 1.1 christos bfd_signed_vma *local_got;
2388 1.1 christos bfd_signed_vma *end_local_got;
2389 1.1 christos bfd_size_type locsymcount;
2390 1.1 christos Elf_Internal_Shdr *symtab_hdr;
2391 1.1 christos unsigned char *local_tls_type;
2392 1.1 christos asection *srel;
2393 1.1 christos
2394 1.1 christos if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
2395 1.1 christos continue;
2396 1.1 christos
2397 1.1 christos for (s = ibfd->sections; s != NULL; s = s->next)
2398 1.1 christos {
2399 1.1 christos struct elf_or1k_dyn_relocs *p;
2400 1.1 christos
2401 1.1 christos for (p = ((struct elf_or1k_dyn_relocs *)
2402 1.1 christos elf_section_data (s)->local_dynrel);
2403 1.1 christos p != NULL;
2404 1.1 christos p = p->next)
2405 1.1 christos {
2406 1.1 christos if (! bfd_is_abs_section (p->sec)
2407 1.1 christos && bfd_is_abs_section (p->sec->output_section))
2408 1.1 christos {
2409 1.1 christos /* Input section has been discarded, either because
2410 1.1 christos it is a copy of a linkonce section or due to
2411 1.1 christos linker script /DISCARD/, so we'll be discarding
2412 1.1 christos the relocs too. */
2413 1.1 christos }
2414 1.1 christos else if (p->count != 0)
2415 1.1 christos {
2416 1.1 christos srel = elf_section_data (p->sec)->sreloc;
2417 1.1 christos srel->size += p->count * sizeof (Elf32_External_Rela);
2418 1.1 christos if ((p->sec->output_section->flags & SEC_READONLY) != 0)
2419 1.1 christos info->flags |= DF_TEXTREL;
2420 1.1 christos }
2421 1.1 christos }
2422 1.1 christos }
2423 1.1 christos
2424 1.1 christos local_got = elf_local_got_refcounts (ibfd);
2425 1.1 christos if (!local_got)
2426 1.1 christos continue;
2427 1.1 christos
2428 1.1 christos symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
2429 1.1 christos locsymcount = symtab_hdr->sh_info;
2430 1.1 christos end_local_got = local_got + locsymcount;
2431 1.5 christos s = htab->root.sgot;
2432 1.5 christos srel = htab->root.srelgot;
2433 1.1 christos local_tls_type = (unsigned char *) elf_or1k_local_tls_type (ibfd);
2434 1.1 christos for (; local_got < end_local_got; ++local_got)
2435 1.1 christos {
2436 1.1 christos if (*local_got > 0)
2437 1.1 christos {
2438 1.1 christos *local_got = s->size;
2439 1.1 christos
2440 1.1 christos /* TLS GD requires two GOT and two relocs. */
2441 1.1 christos if (local_tls_type != NULL && *local_tls_type == TLS_GD)
2442 1.1 christos s->size += 8;
2443 1.1 christos else
2444 1.1 christos s->size += 4;
2445 1.4 christos if (bfd_link_pic (info))
2446 1.1 christos {
2447 1.1 christos if (local_tls_type != NULL && *local_tls_type == TLS_GD)
2448 1.1 christos srel->size += 2 * sizeof (Elf32_External_Rela);
2449 1.1 christos else
2450 1.1 christos srel->size += sizeof (Elf32_External_Rela);
2451 1.1 christos }
2452 1.1 christos }
2453 1.1 christos else
2454 1.1 christos
2455 1.1 christos *local_got = (bfd_vma) -1;
2456 1.1 christos
2457 1.1 christos if (local_tls_type)
2458 1.1 christos ++local_tls_type;
2459 1.1 christos }
2460 1.1 christos }
2461 1.1 christos
2462 1.1 christos /* Allocate global sym .plt and .got entries, and space for global
2463 1.1 christos sym dynamic relocs. */
2464 1.1 christos elf_link_hash_traverse (&htab->root, allocate_dynrelocs, info);
2465 1.1 christos
2466 1.1 christos /* We now have determined the sizes of the various dynamic sections.
2467 1.1 christos Allocate memory for them. */
2468 1.1 christos relocs = FALSE;
2469 1.1 christos for (s = dynobj->sections; s != NULL; s = s->next)
2470 1.1 christos {
2471 1.1 christos if ((s->flags & SEC_LINKER_CREATED) == 0)
2472 1.1 christos continue;
2473 1.1 christos
2474 1.5 christos if (s == htab->root.splt
2475 1.5 christos || s == htab->root.sgot
2476 1.5 christos || s == htab->root.sgotplt
2477 1.5 christos || s == htab->root.sdynbss
2478 1.5 christos || s == htab->root.sdynrelro)
2479 1.1 christos {
2480 1.1 christos /* Strip this section if we don't need it; see the
2481 1.1 christos comment below. */
2482 1.1 christos }
2483 1.1 christos else if (CONST_STRNEQ (bfd_get_section_name (dynobj, s), ".rela"))
2484 1.1 christos {
2485 1.5 christos if (s->size != 0 && s != htab->root.srelplt)
2486 1.1 christos relocs = TRUE;
2487 1.1 christos
2488 1.1 christos /* We use the reloc_count field as a counter if we need
2489 1.1 christos to copy relocs into the output file. */
2490 1.1 christos s->reloc_count = 0;
2491 1.1 christos }
2492 1.1 christos else
2493 1.1 christos /* It's not one of our sections, so don't allocate space. */
2494 1.1 christos continue;
2495 1.1 christos
2496 1.1 christos if (s->size == 0)
2497 1.1 christos {
2498 1.1 christos /* If we don't need this section, strip it from the
2499 1.1 christos output file. This is mostly to handle .rela.bss and
2500 1.1 christos .rela.plt. We must create both sections in
2501 1.1 christos create_dynamic_sections, because they must be created
2502 1.1 christos before the linker maps input sections to output
2503 1.1 christos sections. The linker does that before
2504 1.1 christos adjust_dynamic_symbol is called, and it is that
2505 1.1 christos function which decides whether anything needs to go
2506 1.1 christos into these sections. */
2507 1.1 christos s->flags |= SEC_EXCLUDE;
2508 1.1 christos continue;
2509 1.1 christos }
2510 1.1 christos
2511 1.1 christos if ((s->flags & SEC_HAS_CONTENTS) == 0)
2512 1.1 christos continue;
2513 1.1 christos
2514 1.1 christos /* Allocate memory for the section contents. We use bfd_zalloc
2515 1.1 christos here in case unused entries are not reclaimed before the
2516 1.1 christos section's contents are written out. This should not happen,
2517 1.1 christos but this way if it does, we get a R_OR1K_NONE reloc instead
2518 1.1 christos of garbage. */
2519 1.1 christos s->contents = bfd_zalloc (dynobj, s->size);
2520 1.1 christos
2521 1.1 christos if (s->contents == NULL)
2522 1.1 christos return FALSE;
2523 1.1 christos }
2524 1.1 christos
2525 1.1 christos if (htab->root.dynamic_sections_created)
2526 1.1 christos {
2527 1.1 christos /* Add some entries to the .dynamic section. We fill in the
2528 1.1 christos values later, in or1k_elf_finish_dynamic_sections, but we
2529 1.1 christos must add the entries now so that we get the correct size for
2530 1.1 christos the .dynamic section. The DT_DEBUG entry is filled in by the
2531 1.1 christos dynamic linker and used by the debugger. */
2532 1.1 christos #define add_dynamic_entry(TAG, VAL) \
2533 1.1 christos _bfd_elf_add_dynamic_entry (info, TAG, VAL)
2534 1.1 christos
2535 1.4 christos if (bfd_link_executable (info))
2536 1.1 christos {
2537 1.1 christos if (! add_dynamic_entry (DT_DEBUG, 0))
2538 1.1 christos return FALSE;
2539 1.1 christos }
2540 1.1 christos
2541 1.5 christos if (htab->root.splt->size != 0)
2542 1.1 christos {
2543 1.1 christos if (! add_dynamic_entry (DT_PLTGOT, 0)
2544 1.1 christos || ! add_dynamic_entry (DT_PLTRELSZ, 0)
2545 1.1 christos || ! add_dynamic_entry (DT_PLTREL, DT_RELA)
2546 1.1 christos || ! add_dynamic_entry (DT_JMPREL, 0))
2547 1.1 christos return FALSE;
2548 1.1 christos }
2549 1.1 christos
2550 1.1 christos if (relocs)
2551 1.1 christos {
2552 1.1 christos if (! add_dynamic_entry (DT_RELA, 0)
2553 1.1 christos || ! add_dynamic_entry (DT_RELASZ, 0)
2554 1.1 christos || ! add_dynamic_entry (DT_RELAENT,
2555 1.1 christos sizeof (Elf32_External_Rela)))
2556 1.1 christos return FALSE;
2557 1.1 christos
2558 1.1 christos /* If any dynamic relocs apply to a read-only section,
2559 1.1 christos then we need a DT_TEXTREL entry. */
2560 1.1 christos if ((info->flags & DF_TEXTREL) == 0)
2561 1.1 christos elf_link_hash_traverse (&htab->root, readonly_dynrelocs,
2562 1.1 christos info);
2563 1.1 christos
2564 1.1 christos if ((info->flags & DF_TEXTREL) != 0)
2565 1.1 christos {
2566 1.1 christos if (! add_dynamic_entry (DT_TEXTREL, 0))
2567 1.1 christos return FALSE;
2568 1.1 christos }
2569 1.1 christos }
2570 1.1 christos }
2571 1.1 christos
2572 1.1 christos #undef add_dynamic_entry
2573 1.1 christos return TRUE;
2574 1.1 christos }
2575 1.1 christos
2576 1.1 christos /* Copy the extra info we tack onto an elf_link_hash_entry. */
2577 1.1 christos
2578 1.1 christos static void
2579 1.1 christos or1k_elf_copy_indirect_symbol (struct bfd_link_info *info,
2580 1.1 christos struct elf_link_hash_entry *dir,
2581 1.1 christos struct elf_link_hash_entry *ind)
2582 1.1 christos {
2583 1.1 christos struct elf_or1k_link_hash_entry * edir;
2584 1.1 christos struct elf_or1k_link_hash_entry * eind;
2585 1.1 christos
2586 1.1 christos edir = (struct elf_or1k_link_hash_entry *) dir;
2587 1.1 christos eind = (struct elf_or1k_link_hash_entry *) ind;
2588 1.1 christos
2589 1.1 christos if (eind->dyn_relocs != NULL)
2590 1.1 christos {
2591 1.1 christos if (edir->dyn_relocs != NULL)
2592 1.1 christos {
2593 1.1 christos struct elf_or1k_dyn_relocs **pp;
2594 1.1 christos struct elf_or1k_dyn_relocs *p;
2595 1.1 christos
2596 1.1 christos /* Add reloc counts against the indirect sym to the direct sym
2597 1.1 christos list. Merge any entries against the same section. */
2598 1.1 christos for (pp = &eind->dyn_relocs; (p = *pp) != NULL;)
2599 1.1 christos {
2600 1.1 christos struct elf_or1k_dyn_relocs *q;
2601 1.1 christos
2602 1.1 christos for (q = edir->dyn_relocs; q != NULL; q = q->next)
2603 1.1 christos if (q->sec == p->sec)
2604 1.1 christos {
2605 1.1 christos q->pc_count += p->pc_count;
2606 1.1 christos q->count += p->count;
2607 1.1 christos *pp = p->next;
2608 1.1 christos break;
2609 1.1 christos }
2610 1.1 christos if (q == NULL)
2611 1.1 christos pp = &p->next;
2612 1.1 christos }
2613 1.1 christos *pp = edir->dyn_relocs;
2614 1.1 christos }
2615 1.1 christos
2616 1.1 christos edir->dyn_relocs = eind->dyn_relocs;
2617 1.1 christos eind->dyn_relocs = NULL;
2618 1.1 christos }
2619 1.1 christos
2620 1.1 christos if (ind->root.type == bfd_link_hash_indirect)
2621 1.1 christos {
2622 1.1 christos if (dir->got.refcount <= 0)
2623 1.1 christos {
2624 1.1 christos edir->tls_type = eind->tls_type;
2625 1.1 christos eind->tls_type = TLS_UNKNOWN;
2626 1.1 christos }
2627 1.1 christos }
2628 1.1 christos
2629 1.1 christos _bfd_elf_link_hash_copy_indirect (info, dir, ind);
2630 1.1 christos }
2631 1.1 christos
2632 1.1 christos /* Set the right machine number. */
2633 1.1 christos
2634 1.1 christos static bfd_boolean
2635 1.1 christos or1k_elf_object_p (bfd *abfd)
2636 1.1 christos {
2637 1.1 christos unsigned long mach = bfd_mach_or1k;
2638 1.1 christos
2639 1.1 christos if (elf_elfheader (abfd)->e_flags & EF_OR1K_NODELAY)
2640 1.1 christos mach = bfd_mach_or1knd;
2641 1.1 christos
2642 1.1 christos return bfd_default_set_arch_mach (abfd, bfd_arch_or1k, mach);
2643 1.1 christos }
2644 1.1 christos
2645 1.1 christos /* Store the machine number in the flags field. */
2646 1.1 christos
2647 1.1 christos static void
2648 1.1 christos or1k_elf_final_write_processing (bfd *abfd,
2649 1.1 christos bfd_boolean linker ATTRIBUTE_UNUSED)
2650 1.1 christos {
2651 1.1 christos switch (bfd_get_mach (abfd))
2652 1.1 christos {
2653 1.1 christos default:
2654 1.1 christos case bfd_mach_or1k:
2655 1.1 christos break;
2656 1.1 christos case bfd_mach_or1knd:
2657 1.1 christos elf_elfheader (abfd)->e_flags |= EF_OR1K_NODELAY;
2658 1.1 christos break;
2659 1.1 christos }
2660 1.1 christos }
2661 1.1 christos
2662 1.1 christos static bfd_boolean
2663 1.1 christos or1k_elf_set_private_flags (bfd *abfd, flagword flags)
2664 1.1 christos {
2665 1.1 christos BFD_ASSERT (!elf_flags_init (abfd)
2666 1.1 christos || elf_elfheader (abfd)->e_flags == flags);
2667 1.1 christos
2668 1.1 christos elf_elfheader (abfd)->e_flags = flags;
2669 1.1 christos elf_flags_init (abfd) = TRUE;
2670 1.1 christos return TRUE;
2671 1.1 christos }
2672 1.1 christos
2673 1.1 christos /* Make sure all input files are consistent with respect to
2674 1.1 christos EF_OR1K_NODELAY flag setting. */
2675 1.1 christos
2676 1.1 christos static bfd_boolean
2677 1.5 christos elf32_or1k_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
2678 1.1 christos {
2679 1.5 christos bfd *obfd = info->output_bfd;
2680 1.1 christos flagword out_flags;
2681 1.1 christos flagword in_flags;
2682 1.1 christos
2683 1.1 christos in_flags = elf_elfheader (ibfd)->e_flags;
2684 1.1 christos out_flags = elf_elfheader (obfd)->e_flags;
2685 1.1 christos
2686 1.1 christos if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
2687 1.1 christos || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
2688 1.1 christos return TRUE;
2689 1.1 christos
2690 1.1 christos if (!elf_flags_init (obfd))
2691 1.1 christos {
2692 1.1 christos elf_flags_init (obfd) = TRUE;
2693 1.1 christos elf_elfheader (obfd)->e_flags = in_flags;
2694 1.1 christos
2695 1.1 christos return TRUE;
2696 1.1 christos }
2697 1.1 christos
2698 1.1 christos if (in_flags == out_flags)
2699 1.1 christos return TRUE;
2700 1.1 christos
2701 1.1 christos if ((in_flags & EF_OR1K_NODELAY) != (out_flags & EF_OR1K_NODELAY))
2702 1.1 christos {
2703 1.5 christos _bfd_error_handler
2704 1.1 christos (_("%B: EF_OR1K_NODELAY flag mismatch with previous modules"), ibfd);
2705 1.1 christos
2706 1.1 christos bfd_set_error (bfd_error_bad_value);
2707 1.1 christos return FALSE;
2708 1.1 christos }
2709 1.1 christos
2710 1.1 christos return TRUE;
2711 1.1 christos
2712 1.1 christos }
2713 1.1 christos
2714 1.1 christos #define ELF_ARCH bfd_arch_or1k
2715 1.1 christos #define ELF_MACHINE_CODE EM_OR1K
2716 1.1 christos #define ELF_TARGET_ID OR1K_ELF_DATA
2717 1.1 christos #define ELF_MAXPAGESIZE 0x2000
2718 1.1 christos
2719 1.1 christos #define TARGET_BIG_SYM or1k_elf32_vec
2720 1.1 christos #define TARGET_BIG_NAME "elf32-or1k"
2721 1.1 christos
2722 1.1 christos #define elf_info_to_howto_rel NULL
2723 1.1 christos #define elf_info_to_howto or1k_info_to_howto_rela
2724 1.1 christos #define elf_backend_relocate_section or1k_elf_relocate_section
2725 1.1 christos #define elf_backend_gc_mark_hook or1k_elf_gc_mark_hook
2726 1.1 christos #define elf_backend_gc_sweep_hook or1k_elf_gc_sweep_hook
2727 1.1 christos #define elf_backend_check_relocs or1k_elf_check_relocs
2728 1.1 christos #define elf_backend_reloc_type_class or1k_elf_reloc_type_class
2729 1.1 christos #define elf_backend_can_gc_sections 1
2730 1.1 christos #define elf_backend_rela_normal 1
2731 1.1 christos
2732 1.1 christos #define bfd_elf32_mkobject elf_or1k_mkobject
2733 1.1 christos
2734 1.1 christos #define bfd_elf32_bfd_merge_private_bfd_data elf32_or1k_merge_private_bfd_data
2735 1.1 christos #define bfd_elf32_bfd_set_private_flags or1k_elf_set_private_flags
2736 1.1 christos #define bfd_elf32_bfd_reloc_type_lookup or1k_reloc_type_lookup
2737 1.1 christos #define bfd_elf32_bfd_reloc_name_lookup or1k_reloc_name_lookup
2738 1.1 christos
2739 1.1 christos #define elf_backend_object_p or1k_elf_object_p
2740 1.1 christos #define elf_backend_final_write_processing or1k_elf_final_write_processing
2741 1.1 christos #define elf_backend_can_refcount 1
2742 1.1 christos
2743 1.1 christos #define elf_backend_plt_readonly 1
2744 1.1 christos #define elf_backend_want_got_plt 1
2745 1.1 christos #define elf_backend_want_plt_sym 0
2746 1.1 christos #define elf_backend_got_header_size 12
2747 1.5 christos #define elf_backend_dtrel_excludes_plt 1
2748 1.5 christos #define elf_backend_want_dynrelro 1
2749 1.5 christos
2750 1.1 christos #define bfd_elf32_bfd_link_hash_table_create or1k_elf_link_hash_table_create
2751 1.1 christos #define elf_backend_copy_indirect_symbol or1k_elf_copy_indirect_symbol
2752 1.5 christos #define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
2753 1.1 christos #define elf_backend_finish_dynamic_sections or1k_elf_finish_dynamic_sections
2754 1.1 christos #define elf_backend_size_dynamic_sections or1k_elf_size_dynamic_sections
2755 1.1 christos #define elf_backend_adjust_dynamic_symbol or1k_elf_adjust_dynamic_symbol
2756 1.1 christos #define elf_backend_finish_dynamic_symbol or1k_elf_finish_dynamic_symbol
2757 1.1 christos
2758 1.1 christos #include "elf32-target.h"
2759