diff options
Diffstat (limited to 'bfd')
-rw-r--r-- | bfd/ChangeLog | 17 | ||||
-rw-r--r-- | bfd/Makefile.am | 4 | ||||
-rw-r--r-- | bfd/Makefile.in | 6 | ||||
-rw-r--r-- | bfd/archures.c | 4 | ||||
-rw-r--r-- | bfd/bfd-in2.h | 42 | ||||
-rw-r--r-- | bfd/config.bfd | 5 | ||||
-rwxr-xr-x | bfd/configure | 1 | ||||
-rw-r--r-- | bfd/configure.in | 1 | ||||
-rw-r--r-- | bfd/cpu-metag.c | 41 | ||||
-rw-r--r-- | bfd/elf-bfd.h | 1 | ||||
-rw-r--r-- | bfd/elf32-metag.c | 4313 | ||||
-rw-r--r-- | bfd/elf32-metag.h | 38 | ||||
-rw-r--r-- | bfd/libbfd.h | 38 | ||||
-rw-r--r-- | bfd/reloc.c | 79 | ||||
-rw-r--r-- | bfd/targets.c | 2 |
15 files changed, 4592 insertions, 0 deletions
diff --git a/bfd/ChangeLog b/bfd/ChangeLog index 7abc268..a67dd1d 100644 --- a/bfd/ChangeLog +++ b/bfd/ChangeLog @@ -1,3 +1,20 @@ +2013-01-10 Will Newton <will.newton@imgtec.com> + + * Makefile.am: Add Meta. + * Makefile.in: Regenerate. + * archures.c (bfd_mach_metag): New. + * bfd-in2.h: Regenerate. + * config.bfd: Add Meta. + * configure: Regenerate. + * configure.in: Add Meta. + * cpu-metag.c: New file. + * elf-bfd.h: Add Meta. + * elf32-metag.c: New file. + * elf32-metag.h: New file. + * libbfd.h: Regenerate. + * reloc.c: Add Meta relocations. + * targets.c: Add Meta. + 2013-01-08 Yufeng Zhang <yufeng.zhang@arm.com> * elf-bfd.h (elfcore_write_aarch_tls): Add prototype. diff --git a/bfd/Makefile.am b/bfd/Makefile.am index 6fe6cb2..8098ee4 100644 --- a/bfd/Makefile.am +++ b/bfd/Makefile.am @@ -129,6 +129,7 @@ ALL_MACHINES = \ cpu-m88k.lo \ cpu-mcore.lo \ cpu-mep.lo \ + cpu-metag.lo \ cpu-microblaze.lo \ cpu-mips.lo \ cpu-mmix.lo \ @@ -211,6 +212,7 @@ ALL_MACHINES_CFILES = \ cpu-m88k.c \ cpu-mcore.c \ cpu-mep.c \ + cpu-metag.c \ cpu-microblaze.c \ cpu-mips.c \ cpu-mmix.c \ @@ -340,6 +342,7 @@ BFD32_BACKENDS = \ elf32-m88k.lo \ elf32-mcore.lo \ elf32-mep.lo \ + elf32-metag.lo \ elf32-microblaze.lo \ elf32-mips.lo \ elf32-moxie.lo \ @@ -528,6 +531,7 @@ BFD32_BACKENDS_CFILES = \ elf32-m88k.c \ elf32-mcore.c \ elf32-mep.c \ + elf32-metag.c \ elf32-microblaze.c \ elf32-mips.c \ elf32-moxie.c \ diff --git a/bfd/Makefile.in b/bfd/Makefile.in index c51c342..af4e5ed 100644 --- a/bfd/Makefile.in +++ b/bfd/Makefile.in @@ -430,6 +430,7 @@ ALL_MACHINES = \ cpu-m88k.lo \ cpu-mcore.lo \ cpu-mep.lo \ + cpu-metag.lo \ cpu-microblaze.lo \ cpu-mips.lo \ cpu-mmix.lo \ @@ -512,6 +513,7 @@ ALL_MACHINES_CFILES = \ cpu-m88k.c \ cpu-mcore.c \ cpu-mep.c \ + cpu-metag.c \ cpu-microblaze.c \ cpu-mips.c \ cpu-mmix.c \ @@ -642,6 +644,7 @@ BFD32_BACKENDS = \ elf32-m88k.lo \ elf32-mcore.lo \ elf32-mep.lo \ + elf32-metag.lo \ elf32-microblaze.lo \ elf32-mips.lo \ elf32-moxie.lo \ @@ -830,6 +833,7 @@ BFD32_BACKENDS_CFILES = \ elf32-m88k.c \ elf32-mcore.c \ elf32-mep.c \ + elf32-metag.c \ elf32-microblaze.c \ elf32-mips.c \ elf32-moxie.c \ @@ -1336,6 +1340,7 @@ distclean-compile: @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/cpu-m9s12xg.Plo@am__quote@ @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/cpu-mcore.Plo@am__quote@ @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/cpu-mep.Plo@am__quote@ +@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/cpu-metag.Plo@am__quote@ @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/cpu-microblaze.Plo@am__quote@ @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/cpu-mips.Plo@am__quote@ @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/cpu-mmix.Plo@am__quote@ @@ -1424,6 +1429,7 @@ distclean-compile: @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/elf32-m88k.Plo@am__quote@ @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/elf32-mcore.Plo@am__quote@ @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/elf32-mep.Plo@am__quote@ +@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/elf32-metag.Plo@am__quote@ @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/elf32-microblaze.Plo@am__quote@ @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/elf32-mips.Plo@am__quote@ @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/elf32-moxie.Plo@am__quote@ diff --git a/bfd/archures.c b/bfd/archures.c index 0843f36..66805ca 100644 --- a/bfd/archures.c +++ b/bfd/archures.c @@ -365,6 +365,8 @@ DESCRIPTION .#define bfd_mach_mep 1 .#define bfd_mach_mep_h1 0x6831 .#define bfd_mach_mep_c5 0x6335 +. bfd_arch_metag, +.#define bfd_mach_metag 1 . bfd_arch_ia64, {* HP/Intel ia64 *} .#define bfd_mach_ia64_elf64 64 .#define bfd_mach_ia64_elf32 32 @@ -548,6 +550,7 @@ extern const bfd_arch_info_type bfd_m68k_arch; extern const bfd_arch_info_type bfd_m88k_arch; extern const bfd_arch_info_type bfd_mcore_arch; extern const bfd_arch_info_type bfd_mep_arch; +extern const bfd_arch_info_type bfd_metag_arch; extern const bfd_arch_info_type bfd_mips_arch; extern const bfd_arch_info_type bfd_microblaze_arch; extern const bfd_arch_info_type bfd_mmix_arch; @@ -635,6 +638,7 @@ static const bfd_arch_info_type * const bfd_archures_list[] = &bfd_m88k_arch, &bfd_mcore_arch, &bfd_mep_arch, + &bfd_metag_arch, &bfd_microblaze_arch, &bfd_mips_arch, &bfd_mmix_arch, diff --git a/bfd/bfd-in2.h b/bfd/bfd-in2.h index 20a45b2..3f1128f 100644 --- a/bfd/bfd-in2.h +++ b/bfd/bfd-in2.h @@ -2096,6 +2096,8 @@ enum bfd_architecture #define bfd_mach_mep 1 #define bfd_mach_mep_h1 0x6831 #define bfd_mach_mep_c5 0x6335 + bfd_arch_metag, +#define bfd_mach_metag 1 bfd_arch_ia64, /* HP/Intel ia64 */ #define bfd_mach_ia64_elf64 64 #define bfd_mach_ia64_elf32 32 @@ -3996,6 +3998,46 @@ short offset into 11 bits. */ BFD_RELOC_MEP_GNU_VTENTRY, +/* Imagination Technologies Meta relocations. */ + BFD_RELOC_METAG_HIADDR16, + BFD_RELOC_METAG_LOADDR16, + BFD_RELOC_METAG_RELBRANCH, + BFD_RELOC_METAG_GETSETOFF, + BFD_RELOC_METAG_HIOG, + BFD_RELOC_METAG_LOOG, + BFD_RELOC_METAG_REL8, + BFD_RELOC_METAG_REL16, + BFD_RELOC_METAG_HI16_GOTOFF, + BFD_RELOC_METAG_LO16_GOTOFF, + BFD_RELOC_METAG_GETSET_GOTOFF, + BFD_RELOC_METAG_GETSET_GOT, + BFD_RELOC_METAG_HI16_GOTPC, + BFD_RELOC_METAG_LO16_GOTPC, + BFD_RELOC_METAG_HI16_PLT, + BFD_RELOC_METAG_LO16_PLT, + BFD_RELOC_METAG_RELBRANCH_PLT, + BFD_RELOC_METAG_GOTOFF, + BFD_RELOC_METAG_PLT, + BFD_RELOC_METAG_COPY, + BFD_RELOC_METAG_JMP_SLOT, + BFD_RELOC_METAG_RELATIVE, + BFD_RELOC_METAG_GLOB_DAT, + BFD_RELOC_METAG_TLS_GD, + BFD_RELOC_METAG_TLS_LDM, + BFD_RELOC_METAG_TLS_LDO_HI16, + BFD_RELOC_METAG_TLS_LDO_LO16, + BFD_RELOC_METAG_TLS_LDO, + BFD_RELOC_METAG_TLS_IE, + BFD_RELOC_METAG_TLS_IENONPIC, + BFD_RELOC_METAG_TLS_IENONPIC_HI16, + BFD_RELOC_METAG_TLS_IENONPIC_LO16, + BFD_RELOC_METAG_TLS_TPOFF, + BFD_RELOC_METAG_TLS_DTPMOD, + BFD_RELOC_METAG_TLS_DTPOFF, + BFD_RELOC_METAG_TLS_LE, + BFD_RELOC_METAG_TLS_LE_HI16, + BFD_RELOC_METAG_TLS_LE_LO16, + /* These are relocations for the GETA instruction. */ BFD_RELOC_MMIX_GETA, BFD_RELOC_MMIX_GETA_1, diff --git a/bfd/config.bfd b/bfd/config.bfd index b19abd6..713c3d4 100644 --- a/bfd/config.bfd +++ b/bfd/config.bfd @@ -938,6 +938,11 @@ case "${targ}" in targ_selvecs=bfd_elf32_mep_little_vec ;; + metag-*-*) + targ_defvec=bfd_elf32_metag_vec + targ_underscore=yes + ;; + microblazeel*-*) targ_defvec=bfd_elf32_microblazeel_vec targ_selvecs=bfd_elf32_microblaze_vec diff --git a/bfd/configure b/bfd/configure index 141e76d..1279e56 100755 --- a/bfd/configure +++ b/bfd/configure @@ -15283,6 +15283,7 @@ do bfd_elf32_mcore_little_vec) tb="$tb elf32-mcore.lo elf32.lo $elf" ;; bfd_elf32_mep_vec) tb="$tb elf32-mep.lo elf32.lo $elf" ;; bfd_elf32_mep_little_vec) tb="$tb elf32-mep.lo elf32.lo $elf" ;; + bfd_elf32_metag_vec) tb="$tb elf32-metag.lo elf32.lo $elf" ;; bfd_elf32_microblazeel_vec) tb="$tb elf32-microblaze.lo elf32.lo $elf" ;; bfd_elf32_microblaze_vec) tb="$tb elf32-microblaze.lo elf32.lo $elf" ;; bfd_elf32_mn10200_vec) tb="$tb elf-m10200.lo elf32.lo $elf" ;; diff --git a/bfd/configure.in b/bfd/configure.in index a581021..33f62e3 100644 --- a/bfd/configure.in +++ b/bfd/configure.in @@ -780,6 +780,7 @@ do bfd_elf32_mcore_little_vec) tb="$tb elf32-mcore.lo elf32.lo $elf" ;; bfd_elf32_mep_vec) tb="$tb elf32-mep.lo elf32.lo $elf" ;; bfd_elf32_mep_little_vec) tb="$tb elf32-mep.lo elf32.lo $elf" ;; + bfd_elf32_metag_vec) tb="$tb elf32-metag.lo elf32.lo $elf" ;; bfd_elf32_microblazeel_vec) tb="$tb elf32-microblaze.lo elf32.lo $elf" ;; bfd_elf32_microblaze_vec) tb="$tb elf32-microblaze.lo elf32.lo $elf" ;; bfd_elf32_mn10200_vec) tb="$tb elf-m10200.lo elf32.lo $elf" ;; diff --git a/bfd/cpu-metag.c b/bfd/cpu-metag.c new file mode 100644 index 0000000..a8dbfaa --- /dev/null +++ b/bfd/cpu-metag.c @@ -0,0 +1,41 @@ +/* BFD support for the Imagination Technologies Meta processor. + Copyright (C) 2013 Free Software Foundation, Inc. + Contributed by Imagination Technologies Ltd. + + This file is part of BFD, the Binary File Descriptor library. + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software + Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, + MA 02110-1301, USA. */ + +#include "sysdep.h" +#include "bfd.h" +#include "libbfd.h" + +const bfd_arch_info_type bfd_metag_arch = +{ + 32, /* Bits per word. */ + 32, /* Bits per address. */ + 8, /* Bits per byte. */ + bfd_arch_metag, /* Architecture. */ + bfd_mach_metag, /* Machine. */ + "metag", /* Architecture name. */ + "metag", /* Printable name. */ + 4, /* Section align power. */ + TRUE, /* The default ? */ + bfd_default_compatible, /* Architecture comparison fn. */ + bfd_default_scan, /* String to architecture convert fn. */ + bfd_arch_default_fill, /* Default fill. */ + NULL /* Next in list. */ +}; diff --git a/bfd/elf-bfd.h b/bfd/elf-bfd.h index 533c5d4..43a077c 100644 --- a/bfd/elf-bfd.h +++ b/bfd/elf-bfd.h @@ -417,6 +417,7 @@ enum elf_target_id M32R_ELF_DATA, M68HC11_ELF_DATA, M68K_ELF_DATA, + METAG_ELF_DATA, MICROBLAZE_ELF_DATA, MIPS_ELF_DATA, MN10300_ELF_DATA, diff --git a/bfd/elf32-metag.c b/bfd/elf32-metag.c new file mode 100644 index 0000000..6ae3bc0 --- /dev/null +++ b/bfd/elf32-metag.c @@ -0,0 +1,4313 @@ +/* Meta support for 32-bit ELF + Copyright (C) 2013 Free Software Foundation, Inc. + Contributed by Imagination Technologies Ltd. + + This file is part of BFD, the Binary File Descriptor library. + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software + Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, + MA 02110-1301, USA. */ + +#include "sysdep.h" +#include "bfd.h" +#include "libbfd.h" +#include "elf-bfd.h" +#include "elf32-metag.h" +#include "elf/metag.h" + +#define GOT_ENTRY_SIZE 4 +#define ELF_DYNAMIC_INTERPRETER "/lib/ld-uClibc.so.0" + +/* ABI version: + 0 - original + 1 - with GOT offset */ +#define METAG_ELF_ABI_VERSION 1 + +static const unsigned int plt0_entry[] = + { + 0x02000005, /* MOVT D0Re0, #HI(GOT+4) */ + 0x02000000, /* ADD D0Re0, D0Re0, #LO(GOT+4) */ + 0xb70001e3, /* SETL [A0StP++], D0Re0, D1Re0 */ + 0xc600012a, /* GETD PC, [D0Re0+#4] */ + 0xa0fffffe /* NOP */ + }; + +static const unsigned int plt0_pic_entry[] = + { + 0x82900001, /* ADDT A0.2, CPC0, #0 */ + 0x82100000, /* ADD A0.2, A0.2, #0 */ + 0xa3100c20, /* MOV D0Re0, A0.2 */ + 0xb70001e3, /* SETL [A0StP++], D0Re0, D1Re0 */ + 0xc600012a, /* GETD PC, [D0Re0+#4] */ + }; + +static const unsigned int plt_entry[] = + { + 0x82100005, /* MOVT A0.2, #HI(GOT+off) */ + 0x82100000, /* ADD A0.2, A0.2, #LO(GOT+off) */ + 0xc600806a, /* GETD PC, [A0.2] */ + 0x03000004, /* MOV D1Re0, #LO(offset) */ + 0xa0000000 /* B PLT0 */ + }; + +static const unsigned int plt_pic_entry[] = + { + 0x82900001, /* ADDT A0.2, CPC0, #HI(GOT+off) */ + 0x82100000, /* ADD A0.2, A0.2, #LO(GOT+off) */ + 0xc600806a, /* GETD PC, [A0.2] */ + 0x03000004, /* MOV D1Re0, #LO(offset) */ + 0xa0000000 /* B PLT0 */ + }; + +/* Variable names follow a coding style. + Please follow this (Apps Hungarian) style: + + Structure/Variable Prefix + elf_link_hash_table "etab" + elf_link_hash_entry "eh" + + elf_metag_link_hash_table "htab" + elf_metag_link_hash_entry "hh" + + bfd_link_hash_table "btab" + bfd_link_hash_entry "bh" + + bfd_hash_table containing stubs "bstab" + elf_metag_stub_hash_entry "hsh" + + elf_metag_dyn_reloc_entry "hdh" + + Always remember to use GNU Coding Style. */ + +#define PLT_ENTRY_SIZE sizeof(plt_entry) + +static reloc_howto_type elf_metag_howto_table[] = +{ + /* High order 16 bit absolute. */ + HOWTO (R_METAG_HIADDR16, /* type */ + 16, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 16, /* bitsize */ + FALSE, /* pc_relative */ + 3, /* bitpos */ + complain_overflow_dont, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_HIADDR16", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0x0007fff8, /* dst_mask */ + FALSE), /* pcrel_offset */ + + /* Low order 16 bit absolute. */ + HOWTO (R_METAG_LOADDR16, /* type */ + 0, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 16, /* bitsize */ + FALSE, /* pc_relative */ + 3, /* bitpos */ + complain_overflow_dont,/* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_LOADDR16", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0x0007fff8, /* dst_mask */ + FALSE), /* pcrel_offset */ + + /* 32 bit absolute. */ + HOWTO (R_METAG_ADDR32, /* type */ + 0, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 32, /* bitsize */ + FALSE, /* pc_relative */ + 0, /* bitpos */ + complain_overflow_bitfield, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_ADDR32", /* name */ + FALSE, /* partial_inplace */ + 0x00000000, /* src_mask */ + 0xffffffff, /* dst_mask */ + FALSE), /* pcrel_offset */ + + /* No relocation. */ + HOWTO (R_METAG_NONE, /* type */ + 0, /* rightshift */ + 0, /* size (0 = byte, 1 = short, 2 = long) */ + 0, /* bitsize */ + FALSE, /* pc_relative */ + 0, /* bitpos */ + complain_overflow_dont, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_NONE", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0, /* dst_mask */ + FALSE), /* pcrel_offset */ + + /* 19 bit pc relative */ + HOWTO (R_METAG_RELBRANCH, /* type */ + 2, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 19, /* bitsize */ + TRUE, /* pc_relative */ + 5, /* bitpos */ + complain_overflow_signed, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_RELBRANCH", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0x00ffffe0, /* dst_mask */ + FALSE), /* pcrel_offset */ + + /* GET/SET offset */ + HOWTO (R_METAG_GETSETOFF, /* type */ + 0, /* rightshift */ + 1, /* size (0 = byte, 1 = short, 2 = long) */ + 12, /* bitsize */ + FALSE, /* pc_relative */ + 7, /* bitpos */ + complain_overflow_dont, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_GETSETOFF", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0, /* dst_mask */ + FALSE), /* pcrel_offset */ + + EMPTY_HOWTO (6), + EMPTY_HOWTO (7), + EMPTY_HOWTO (8), + EMPTY_HOWTO (9), + EMPTY_HOWTO (10), + EMPTY_HOWTO (11), + EMPTY_HOWTO (12), + EMPTY_HOWTO (13), + EMPTY_HOWTO (14), + EMPTY_HOWTO (15), + EMPTY_HOWTO (16), + EMPTY_HOWTO (17), + EMPTY_HOWTO (18), + EMPTY_HOWTO (19), + EMPTY_HOWTO (20), + EMPTY_HOWTO (21), + EMPTY_HOWTO (22), + EMPTY_HOWTO (23), + EMPTY_HOWTO (24), + EMPTY_HOWTO (25), + EMPTY_HOWTO (26), + EMPTY_HOWTO (27), + EMPTY_HOWTO (28), + EMPTY_HOWTO (29), + + HOWTO (R_METAG_GNU_VTINHERIT, /* type */ + 0, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 0, /* bitsize */ + FALSE, /* pc_relative */ + 0, /* bitpos */ + complain_overflow_dont, /* complain_on_overflow */ + NULL, /* special_function */ + "R_METAG_GNU_VTINHERIT", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0, /* dst_mask */ + FALSE), /* pcrel_offset */ + + HOWTO (R_METAG_GNU_VTENTRY, /* type */ + 0, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 0, /* bitsize */ + FALSE, /* pc_relative */ + 0, /* bitpos */ + complain_overflow_dont, /* complain_on_overflow */ + _bfd_elf_rel_vtable_reloc_fn, /* special_function */ + "R_METAG_GNU_VTENTRY", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0, /* dst_mask */ + FALSE), /* pcrel_offset */ + + /* High order 16 bit GOT offset */ + HOWTO (R_METAG_HI16_GOTOFF, /* type */ + 16, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 16, /* bitsize */ + FALSE, /* pc_relative */ + 3, /* bitpos */ + complain_overflow_dont, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_HI16_GOTOFF", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0x0007fff8, /* dst_mask */ + FALSE), /* pcrel_offset */ + + /* Low order 16 bit GOT offset */ + HOWTO (R_METAG_LO16_GOTOFF, /* type */ + 0, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 16, /* bitsize */ + FALSE, /* pc_relative */ + 3, /* bitpos */ + complain_overflow_dont, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_LO16_GOTOFF", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0x0007fff8, /* dst_mask */ + FALSE), /* pcrel_offset */ + + /* GET/SET GOT offset */ + HOWTO (R_METAG_GETSET_GOTOFF, /* type */ + 0, /* rightshift */ + 1, /* size (0 = byte, 1 = short, 2 = long) */ + 12, /* bitsize */ + FALSE, /* pc_relative */ + 7, /* bitpos */ + complain_overflow_dont, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_GETSET_GOTOFF", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0, /* dst_mask */ + FALSE), /* pcrel_offset */ + + /* GET/SET GOT relative */ + HOWTO (R_METAG_GETSET_GOT, /* type */ + 0, /* rightshift */ + 1, /* size (0 = byte, 1 = short, 2 = long) */ + 12, /* bitsize */ + FALSE, /* pc_relative */ + 7, /* bitpos */ + complain_overflow_dont, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_GETSET_GOT", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0, /* dst_mask */ + FALSE), /* pcrel_offset */ + + /* High order 16 bit GOT reference */ + HOWTO (R_METAG_HI16_GOTPC, /* type */ + 16, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 16, /* bitsize */ + FALSE, /* pc_relative */ + 3, /* bitpos */ + complain_overflow_dont, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_HI16_GOTPC", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0x0007fff8, /* dst_mask */ + FALSE), /* pcrel_offset */ + + /* Low order 16 bit GOT reference */ + HOWTO (R_METAG_LO16_GOTPC, /* type */ + 0, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 16, /* bitsize */ + FALSE, /* pc_relative */ + 3, /* bitpos */ + complain_overflow_dont, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_LO16_GOTPC", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0x0007fff8, /* dst_mask */ + FALSE), /* pcrel_offset */ + + /* High order 16 bit PLT */ + HOWTO (R_METAG_HI16_PLT, /* type */ + 16, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 16, /* bitsize */ + FALSE, /* pc_relative */ + 3, /* bitpos */ + complain_overflow_dont, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_HI16_PLT", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0x0007fff8, /* dst_mask */ + FALSE), /* pcrel_offset */ + + /* Low order 16 bit PLT */ + HOWTO (R_METAG_LO16_PLT, /* type */ + 0, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 16, /* bitsize */ + FALSE, /* pc_relative */ + 3, /* bitpos */ + complain_overflow_dont, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_LO16_PLT", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0xffffffff, /* dst_mask */ + FALSE), /* pcrel_offset */ + + HOWTO (R_METAG_RELBRANCH_PLT, /* type */ + 2, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 19, /* bitsize */ + TRUE, /* pc_relative */ + 5, /* bitpos */ + complain_overflow_signed, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_RELBRANCH_PLT", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0x00ffffe0, /* dst_mask */ + FALSE), /* pcrel_offset */ + + /* Dummy relocs used by the linker internally. */ + HOWTO (R_METAG_GOTOFF, /* type */ + 0, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 32, /* bitsize */ + FALSE, /* pc_relative */ + 0, /* bitpos */ + complain_overflow_bitfield, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_GOTOFF", /* name */ + FALSE, /* partial_inplace */ + 0xffffffff, /* src_mask */ + 0xffffffff, /* dst_mask */ + FALSE), /* pcrel_offset */ + + HOWTO (R_METAG_PLT, /* type */ + 0, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 32, /* bitsize */ + FALSE, /* pc_relative */ + 0, /* bitpos */ + complain_overflow_bitfield, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_GOTOFF", /* name */ + FALSE, /* partial_inplace */ + 0xffffffff, /* src_mask */ + 0xffffffff, /* dst_mask */ + FALSE), /* pcrel_offset */ + + /* This is used only by the dynamic linker. The symbol should exist + both in the object being run and in some shared library. The + dynamic linker copies the data addressed by the symbol from the + shared library into the object, because the object being + run has to have the data at some particular address. */ + HOWTO (R_METAG_COPY, /* type */ + 0, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 32, /* bitsize */ + FALSE, /* pc_relative */ + 0, /* bitpos */ + complain_overflow_bitfield, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_COPY", /* name */ + FALSE, /* partial_inplace */ + 0xffffffff, /* src_mask */ + 0xffffffff, /* dst_mask */ + FALSE), /* pcrel_offset */ + + /* Marks a procedure linkage table entry for a symbol. */ + HOWTO (R_METAG_JMP_SLOT, /* type */ + 0, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 32, /* bitsize */ + FALSE, /* pc_relative */ + 0, /* bitpos */ + complain_overflow_bitfield, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_JMP_SLOT", /* name */ + FALSE, /* partial_inplace */ + 0xffffffff, /* src_mask */ + 0xffffffff, /* dst_mask */ + FALSE), /* pcrel_offset */ + + /* Used only by the dynamic linker. When the object is run, this + longword is set to the load address of the object, plus the + addend. */ + HOWTO (R_METAG_RELATIVE, /* type */ + 0, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 32, /* bitsize */ + FALSE, /* pc_relative */ + 0, /* bitpos */ + complain_overflow_bitfield, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_RELATIVE", /* name */ + FALSE, /* partial_inplace */ + 0xffffffff, /* src_mask */ + 0xffffffff, /* dst_mask */ + FALSE), /* pcrel_offset */ + + HOWTO (R_METAG_GLOB_DAT, /* type */ + 0, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 32, /* bitsize */ + FALSE, /* pc_relative */ + 0, /* bitpos */ + complain_overflow_bitfield, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_GLOB_DAT", /* name */ + FALSE, /* partial_inplace */ + 0xffffffff, /* src_mask */ + 0xffffffff, /* dst_mask */ + FALSE), /* pcrel_offset */ + + HOWTO (R_METAG_TLS_GD, /* type */ + 0, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 16, /* bitsize */ + FALSE, /* pc_relative */ + 3, /* bitpos */ + complain_overflow_dont, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_TLS_GD", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0x0007fff8, /* dst_mask */ + FALSE), /* pcrel_offset */ + + HOWTO (R_METAG_TLS_LDM, /* type */ + 0, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 16, /* bitsize */ + FALSE, /* pc_relative */ + 3, /* bitpos */ + complain_overflow_bitfield, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_TLS_LDM", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0x0007fff8, /* dst_mask */ + FALSE), /* pcrel_offset */ + + HOWTO (R_METAG_TLS_LDO_HI16, /* type */ + 16, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 16, /* bitsize */ + FALSE, /* pc_relative */ + 3, /* bitpos */ + complain_overflow_bitfield, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_TLS_LDO_HI16", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0x0007fff8, /* dst_mask */ + FALSE), /* pcrel_offset */ + + HOWTO (R_METAG_TLS_LDO_LO16, /* type */ + 0, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 16, /* bitsize */ + FALSE, /* pc_relative */ + 3, /* bitpos */ + complain_overflow_bitfield, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_TLS_LDO_LO16", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0x0007fff8, /* dst_mask */ + FALSE), /* pcrel_offset */ + + /* Dummy reloc used by the linker internally. */ + HOWTO (R_METAG_TLS_LDO, /* type */ + 0, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 16, /* bitsize */ + FALSE, /* pc_relative */ + 3, /* bitpos */ + complain_overflow_bitfield, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_TLS_LDO", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0x0007fff8, /* dst_mask */ + FALSE), /* pcrel_offset */ + + HOWTO (R_METAG_TLS_IE, /* type */ + 2, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 12, /* bitsize */ + FALSE, /* pc_relative */ + 7, /* bitpos */ + complain_overflow_dont, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_TLS_IE", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0x0007ff80, /* dst_mask */ + FALSE), /* pcrel_offset */ + + /* Dummy reloc used by the linker internally. */ + HOWTO (R_METAG_TLS_IENONPIC, /* type */ + 0, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 16, /* bitsize */ + FALSE, /* pc_relative */ + 3, /* bitpos */ + complain_overflow_dont, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_TLS_IENONPIC", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0x0007fff8, /* dst_mask */ + FALSE), /* pcrel_offset */ + + HOWTO (R_METAG_TLS_IENONPIC_HI16,/* type */ + 16, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 16, /* bitsize */ + FALSE, /* pc_relative */ + 3, /* bitpos */ + complain_overflow_dont, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_TLS_IENONPIC_HI16", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0x0007fff8, /* dst_mask */ + FALSE), /* pcrel_offset */ + + HOWTO (R_METAG_TLS_IENONPIC_LO16,/* type */ + 0, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 16, /* bitsize */ + FALSE, /* pc_relative */ + 3, /* bitpos */ + complain_overflow_dont, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_TLS_IENONPIC_LO16", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0x0007fff8, /* dst_mask */ + FALSE), /* pcrel_offset */ + + HOWTO (R_METAG_TLS_TPOFF, /* type */ + 0, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 32, /* bitsize */ + FALSE, /* pc_relative */ + 0, /* bitpos */ + complain_overflow_bitfield, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_TLS_TPOFF", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0xffffffff, /* dst_mask */ + FALSE), /* pcrel_offset */ + + HOWTO (R_METAG_TLS_DTPMOD, /* type */ + 0, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 32, /* bitsize */ + FALSE, /* pc_relative */ + 0, /* bitpos */ + complain_overflow_bitfield, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_TLS_DTPMOD", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0xffffffff, /* dst_mask */ + FALSE), /* pcrel_offset */ + + HOWTO (R_METAG_TLS_DTPOFF, /* type */ + 0, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 32, /* bitsize */ + FALSE, /* pc_relative */ + 0, /* bitpos */ + complain_overflow_bitfield, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_TLS_DTPOFF", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0xffffffff, /* dst_mask */ + FALSE), /* pcrel_offset */ + + /* Dummy reloc used by the linker internally. */ + HOWTO (R_METAG_TLS_LE, /* type */ + 0, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 32, /* bitsize */ + FALSE, /* pc_relative */ + 0, /* bitpos */ + complain_overflow_bitfield, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_TLS_LE", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0xffffffff, /* dst_mask */ + FALSE), /* pcrel_offset */ + + HOWTO (R_METAG_TLS_LE_HI16, /* type */ + 16, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 16, /* bitsize */ + FALSE, /* pc_relative */ + 3, /* bitpos */ + complain_overflow_dont, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_TLS_LE_HI16", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0x0007fff8, /* dst_mask */ + FALSE), /* pcrel_offset */ + + HOWTO (R_METAG_TLS_LE_LO16, /* type */ + 0, /* rightshift */ + 2, /* size (0 = byte, 1 = short, 2 = long) */ + 16, /* bitsize */ + FALSE, /* pc_relative */ + 3, /* bitpos */ + complain_overflow_dont, /* complain_on_overflow */ + bfd_elf_generic_reloc, /* special_function */ + "R_METAG_TLS_LE_LO16", /* name */ + FALSE, /* partial_inplace */ + 0, /* src_mask */ + 0x0007fff8, /* dst_mask */ + FALSE), /* pcrel_offset */ + +}; + +#define BRANCH_BITS 19 + +/* The GOT is typically accessed using a [GS]ETD instruction. The size of the + immediate offset which can be used in such instructions therefore limits + the usable size of the GOT. If the base register for the [GS]ETD (A1LbP) + is pointing to the base of the GOT then the size is limited to the maximum + 11 bits unsigned dword offset, or 2^13 = 0x2000 bytes. However the offset + in a [GS]ETD instruction is signed, so by setting the base address register + to an offset of that 0x2000 byte maximum unsigned offset from the base of + the GOT we can use negative offsets in addition to positive. This + effectively doubles the usable GOT size to 0x4000 bytes. */ +#define GOT_REG_OFFSET 0x2000 + +struct metag_reloc_map +{ + bfd_reloc_code_real_type bfd_reloc_val; + unsigned int metag_reloc_val; +}; + +static const struct metag_reloc_map metag_reloc_map [] = + { + { BFD_RELOC_NONE, R_METAG_NONE }, + { BFD_RELOC_32, R_METAG_ADDR32 }, + { BFD_RELOC_METAG_HIADDR16, R_METAG_HIADDR16 }, + { BFD_RELOC_METAG_LOADDR16, R_METAG_LOADDR16 }, + { BFD_RELOC_METAG_RELBRANCH, R_METAG_RELBRANCH }, + { BFD_RELOC_METAG_GETSETOFF, R_METAG_GETSETOFF }, + { BFD_RELOC_VTABLE_INHERIT, R_METAG_GNU_VTINHERIT }, + { BFD_RELOC_VTABLE_ENTRY, R_METAG_GNU_VTENTRY }, + { BFD_RELOC_METAG_REL8, R_METAG_REL8 }, + { BFD_RELOC_METAG_REL16, R_METAG_REL16 }, + { BFD_RELOC_METAG_HI16_GOTOFF, R_METAG_HI16_GOTOFF }, + { BFD_RELOC_METAG_LO16_GOTOFF, R_METAG_LO16_GOTOFF }, + { BFD_RELOC_METAG_GETSET_GOTOFF, R_METAG_GETSET_GOTOFF }, + { BFD_RELOC_METAG_GETSET_GOT, R_METAG_GETSET_GOT }, + { BFD_RELOC_METAG_HI16_GOTPC, R_METAG_HI16_GOTPC }, + { BFD_RELOC_METAG_LO16_GOTPC, R_METAG_LO16_GOTPC }, + { BFD_RELOC_METAG_HI16_PLT, R_METAG_HI16_PLT }, + { BFD_RELOC_METAG_LO16_PLT, R_METAG_LO16_PLT }, + { BFD_RELOC_METAG_RELBRANCH_PLT, R_METAG_RELBRANCH_PLT }, + { BFD_RELOC_METAG_GOTOFF, R_METAG_GOTOFF }, + { BFD_RELOC_METAG_PLT, R_METAG_PLT }, + { BFD_RELOC_METAG_COPY, R_METAG_COPY }, + { BFD_RELOC_METAG_JMP_SLOT, R_METAG_JMP_SLOT }, + { BFD_RELOC_METAG_RELATIVE, R_METAG_RELATIVE }, + { BFD_RELOC_METAG_GLOB_DAT, R_METAG_GLOB_DAT }, + { BFD_RELOC_METAG_TLS_GD, R_METAG_TLS_GD }, + { BFD_RELOC_METAG_TLS_LDM, R_METAG_TLS_LDM }, + { BFD_RELOC_METAG_TLS_LDO_HI16, R_METAG_TLS_LDO_HI16 }, + { BFD_RELOC_METAG_TLS_LDO_LO16, R_METAG_TLS_LDO_LO16 }, + { BFD_RELOC_METAG_TLS_LDO, R_METAG_TLS_LDO }, + { BFD_RELOC_METAG_TLS_IE, R_METAG_TLS_IE }, + { BFD_RELOC_METAG_TLS_IENONPIC, R_METAG_TLS_IENONPIC }, + { BFD_RELOC_METAG_TLS_IENONPIC_HI16, R_METAG_TLS_IENONPIC_HI16 }, + { BFD_RELOC_METAG_TLS_IENONPIC_LO16, R_METAG_TLS_IENONPIC_LO16 }, + { BFD_RELOC_METAG_TLS_TPOFF, R_METAG_TLS_TPOFF }, + { BFD_RELOC_METAG_TLS_DTPMOD, R_METAG_TLS_DTPMOD }, + { BFD_RELOC_METAG_TLS_DTPOFF, R_METAG_TLS_DTPOFF }, + { BFD_RELOC_METAG_TLS_LE, R_METAG_TLS_LE }, + { BFD_RELOC_METAG_TLS_LE_HI16, R_METAG_TLS_LE_HI16 }, + { BFD_RELOC_METAG_TLS_LE_LO16, R_METAG_TLS_LE_LO16 }, + }; + +enum elf_metag_stub_type +{ + metag_stub_long_branch, + metag_stub_long_branch_shared, + metag_stub_none +}; + +struct elf_metag_stub_hash_entry +{ + /* Base hash table entry structure. */ + struct bfd_hash_entry bh_root; + + /* The stub section. */ + asection *stub_sec; + + /* Offset within stub_sec of the beginning of this stub. */ + bfd_vma stub_offset; + + /* Given the symbol's value and its section we can determine its final + value when building the stubs (so the stub knows where to jump. */ + bfd_vma target_value; + asection *target_section; + + enum elf_metag_stub_type stub_type; + + /* The symbol table entry, if any, that this was derived from. */ + struct elf_metag_link_hash_entry *hh; + + /* And the reloc addend that this was derived from. */ + bfd_vma addend; + + /* Where this stub is being called from, or, in the case of combined + stub sections, the first input section in the group. */ + asection *id_sec; +}; + +struct elf_metag_link_hash_entry +{ + struct elf_link_hash_entry eh; + + /* A pointer to the most recently used stub hash entry against this + symbol. */ + struct elf_metag_stub_hash_entry *hsh_cache; + + /* Used to count relocations for delayed sizing of relocation + sections. */ + struct elf_metag_dyn_reloc_entry { + + /* Next relocation in the chain. */ + struct elf_metag_dyn_reloc_entry *hdh_next; + + /* The input section of the reloc. */ + asection *sec; + + /* Number of relocs copied in this section. */ + bfd_size_type count; + + /* Number of relative relocs copied for the input section. */ + bfd_size_type relative_count; + } *dyn_relocs; + + enum + { + GOT_UNKNOWN = 0, GOT_NORMAL = 1, GOT_TLS_IE = 2, GOT_TLS_LDM = 4, GOT_TLS_GD = 8 + } tls_type; +}; + +struct elf_metag_link_hash_table +{ + /* The main hash table. */ + struct elf_link_hash_table etab; + + /* The stub hash table. */ + struct bfd_hash_table bstab; + + /* Linker stub bfd. */ + bfd *stub_bfd; + + /* Linker call-backs. */ + asection * (*add_stub_section) (const char *, asection *); + void (*layout_sections_again) (void); + + /* Array to keep track of which stub sections have been created, and + information on stub grouping. */ + struct map_stub + { + /* This is the section to which stubs in the group will be + attached. */ + asection *link_sec; + /* The stub section. */ + asection *stub_sec; + } *stub_group; + + /* Assorted information used by elf_metag_size_stubs. */ + unsigned int bfd_count; + int top_index; + asection **input_list; + Elf_Internal_Sym **all_local_syms; + + /* Short-cuts to get to dynamic linker sections. */ + asection *sgot; + asection *sgotplt; + asection *srelgot; + asection *splt; + asection *srelplt; + asection *sdynbss; + asection *srelbss; + + /* Small local sym cache. */ + struct sym_cache sym_cache; + + /* Data for LDM relocations. */ + union + { + bfd_signed_vma refcount; + bfd_vma offset; + } tls_ldm_got; +}; + +/* Return the base vma address which should be subtracted from the + real address when resolving a dtpoff relocation. This is PT_TLS + segment p_vaddr. */ +static bfd_vma +dtpoff_base (struct bfd_link_info *info) +{ + /* If tls_sec is NULL, we should have signalled an error already. */ + if (elf_hash_table (info)->tls_sec == NULL) + return 0; + return elf_hash_table (info)->tls_sec->vma; +} + +/* Return the relocation value for R_METAG_TLS_IE */ +static bfd_vma +tpoff (struct bfd_link_info *info, bfd_vma address) +{ + /* If tls_sec is NULL, we should have signalled an error already. */ + if (elf_hash_table (info)->tls_sec == NULL) + return 0; + /* METAG TLS ABI is variant I and static TLS blocks start just after + tcbhead structure which has 2 pointer fields. */ + return (address - elf_hash_table (info)->tls_sec->vma + + align_power ((bfd_vma) 8, + elf_hash_table (info)->tls_sec->alignment_power)); +} + +static void +metag_info_to_howto_rela (bfd *abfd ATTRIBUTE_UNUSED, + arelent *cache_ptr, + Elf_Internal_Rela *dst) +{ + unsigned int r_type; + + r_type = ELF32_R_TYPE (dst->r_info); + BFD_ASSERT (r_type < (unsigned int) R_METAG_MAX); + cache_ptr->howto = & elf_metag_howto_table [r_type]; +} + +static reloc_howto_type * +metag_reloc_type_lookup (bfd * abfd ATTRIBUTE_UNUSED, + bfd_reloc_code_real_type code) +{ + unsigned int i; + + for (i = 0; i < sizeof (metag_reloc_map) / sizeof (metag_reloc_map[0]); i++) + if (metag_reloc_map [i].bfd_reloc_val == code) + return & elf_metag_howto_table [metag_reloc_map[i].metag_reloc_val]; + + return NULL; +} + +static reloc_howto_type * +metag_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED, + const char *r_name) +{ + unsigned int i; + + for (i = 0; i < sizeof (elf_metag_howto_table) / sizeof (elf_metag_howto_table[0]); i++) + if (elf_metag_howto_table[i].name != NULL + && strcasecmp (elf_metag_howto_table[i].name, r_name) == 0) + return &elf_metag_howto_table[i]; + + return NULL; +} + +/* Various hash macros and functions. */ +#define metag_link_hash_table(p) \ + (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \ + == METAG_ELF_DATA ? ((struct elf_metag_link_hash_table *) ((p)->hash)) : NULL) + +#define metag_elf_hash_entry(ent) \ + ((struct elf_metag_link_hash_entry *)(ent)) + +#define metag_stub_hash_entry(ent) \ + ((struct elf_metag_stub_hash_entry *)(ent)) + +#define metag_stub_hash_lookup(table, string, create, copy) \ + ((struct elf_metag_stub_hash_entry *) \ + bfd_hash_lookup ((table), (string), (create), (copy))) + +#define metag_elf_local_got_tls_type(abfd) \ + ((char *)(elf_local_got_offsets (abfd) + (elf_tdata (abfd)->symtab_hdr.sh_info))) + +/* Assorted hash table functions. */ + +/* Initialize an entry in the stub hash table. */ + +static struct bfd_hash_entry * +stub_hash_newfunc (struct bfd_hash_entry *entry, + struct bfd_hash_table *table, + const char *string) +{ + /* Allocate the structure if it has not already been allocated by a + subclass. */ + if (entry == NULL) + { + entry = bfd_hash_allocate (table, + sizeof (struct elf_metag_stub_hash_entry)); + if (entry == NULL) + return entry; + } + + /* Call the allocation method of the superclass. */ + entry = bfd_hash_newfunc (entry, table, string); + if (entry != NULL) + { + struct elf_metag_stub_hash_entry *hsh; + + /* Initialize the local fields. */ + hsh = (struct elf_metag_stub_hash_entry *) entry; + hsh->stub_sec = NULL; + hsh->stub_offset = 0; + hsh->target_value = 0; + hsh->target_section = NULL; + hsh->stub_type = metag_stub_long_branch; + hsh->hh = NULL; + hsh->id_sec = NULL; + } + + return entry; +} + +/* Initialize an entry in the link hash table. */ + +static struct bfd_hash_entry * +metag_link_hash_newfunc (struct bfd_hash_entry *entry, + struct bfd_hash_table *table, + const char *string) +{ + /* Allocate the structure if it has not already been allocated by a + subclass. */ + if (entry == NULL) + { + entry = bfd_hash_allocate (table, + sizeof (struct elf_metag_link_hash_entry)); + if (entry == NULL) + return entry; + } + + /* Call the allocation method of the superclass. */ + entry = _bfd_elf_link_hash_newfunc (entry, table, string); + if (entry != NULL) + { + struct elf_metag_link_hash_entry *hh; + + /* Initialize the local fields. */ + hh = (struct elf_metag_link_hash_entry *) entry; + hh->hsh_cache = NULL; + hh->dyn_relocs = NULL; + hh->tls_type = GOT_UNKNOWN; + } + + return entry; +} + +/* Create the derived linker hash table. The Meta ELF port uses the derived + hash table to keep information specific to the Meta ELF linker (without + using static variables). */ + +static struct bfd_link_hash_table * +elf_metag_link_hash_table_create (bfd *abfd) +{ + struct elf_metag_link_hash_table *htab; + bfd_size_type amt = sizeof (*htab); + + htab = bfd_malloc (amt); + if (htab == NULL) + return NULL; + + if (!_bfd_elf_link_hash_table_init (&htab->etab, abfd, + metag_link_hash_newfunc, + sizeof (struct elf_metag_link_hash_entry), + METAG_ELF_DATA)) + { + free (htab); + return NULL; + } + + /* Init the stub hash table too. */ + if (!bfd_hash_table_init (&htab->bstab, stub_hash_newfunc, + sizeof (struct elf_metag_stub_hash_entry))) + return NULL; + + htab->stub_bfd = NULL; + htab->add_stub_section = NULL; + htab->layout_sections_again = NULL; + htab->stub_group = NULL; + htab->sgot = NULL; + htab->sgotplt = NULL; + htab->srelgot = NULL; + htab->splt = NULL; + htab->srelplt = NULL; + htab->sdynbss = NULL; + htab->srelbss = NULL; + htab->sym_cache.abfd = NULL; + htab->tls_ldm_got.refcount = 0; + + return &htab->etab.root; +} + +/* Free the derived linker hash table. */ + +static void +elf_metag_link_hash_table_free (struct bfd_link_hash_table *btab) +{ + struct elf_metag_link_hash_table *htab + = (struct elf_metag_link_hash_table *) btab; + + bfd_hash_table_free (&htab->bstab); + _bfd_generic_link_hash_table_free (btab); +} + +/* Section name for stubs is the associated section name plus this + string. */ +#define STUB_SUFFIX ".stub" + +/* Build a name for an entry in the stub hash table. */ + +static char * +metag_stub_name (const asection *input_section, + const asection *sym_sec, + const struct elf_metag_link_hash_entry *hh, + const Elf_Internal_Rela *rel) +{ + char *stub_name; + bfd_size_type len; + + if (hh) + { + len = 8 + 1 + strlen (hh->eh.root.root.string) + 1 + 8 + 1; + stub_name = bfd_malloc (len); + if (stub_name != NULL) + { + sprintf (stub_name, "%08x_%s+%x", + input_section->id & 0xffffffff, + hh->eh.root.root.string, + (int) rel->r_addend & 0xffffffff); + } + } + else + { + len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1; + stub_name = bfd_malloc (len); + if (stub_name != NULL) + { + sprintf (stub_name, "%08x_%x:%x+%x", + input_section->id & 0xffffffff, + sym_sec->id & 0xffffffff, + (int) ELF32_R_SYM (rel->r_info) & 0xffffffff, + (int) rel->r_addend & 0xffffffff); + } + } + return stub_name; +} + +/* Look up an entry in the stub hash. Stub entries are cached because + creating the stub name takes a bit of time. */ + +static struct elf_metag_stub_hash_entry * +metag_get_stub_entry (const asection *input_section, + const asection *sym_sec, + struct elf_metag_link_hash_entry *hh, + const Elf_Internal_Rela *rel, + struct elf_metag_link_hash_table *htab) +{ + struct elf_metag_stub_hash_entry *hsh; + const asection *id_sec; + + /* If this input section is part of a group of sections sharing one + stub section, then use the id of the first section in the group. + Stub names need to include a section id, as there may well be + more than one stub used to reach say, printf, and we need to + distinguish between them. */ + id_sec = htab->stub_group[input_section->id].link_sec; + + if (hh != NULL && hh->hsh_cache != NULL + && hh->hsh_cache->hh == hh + && hh->hsh_cache->id_sec == id_sec) + { + hsh = hh->hsh_cache; + } + else + { + char *stub_name; + + stub_name = metag_stub_name (id_sec, sym_sec, hh, rel); + if (stub_name == NULL) + return NULL; + + hsh = metag_stub_hash_lookup (&htab->bstab, + stub_name, FALSE, FALSE); + + if (hh != NULL) + hh->hsh_cache = hsh; + + free (stub_name); + } + + return hsh; +} + +/* Add a new stub entry to the stub hash. Not all fields of the new + stub entry are initialised. */ + +static struct elf_metag_stub_hash_entry * +metag_add_stub (const char *stub_name, + asection *section, + struct elf_metag_link_hash_table *htab) +{ + asection *link_sec; + asection *stub_sec; + struct elf_metag_stub_hash_entry *hsh; + + link_sec = htab->stub_group[section->id].link_sec; + stub_sec = htab->stub_group[section->id].stub_sec; + if (stub_sec == NULL) + { + stub_sec = htab->stub_group[link_sec->id].stub_sec; + if (stub_sec == NULL) + { + size_t namelen; + bfd_size_type len; + char *s_name; + + namelen = strlen (link_sec->name); + len = namelen + sizeof (STUB_SUFFIX); + s_name = bfd_alloc (htab->stub_bfd, len); + if (s_name == NULL) + return NULL; + + memcpy (s_name, link_sec->name, namelen); + memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX)); + + stub_sec = (*htab->add_stub_section) (s_name, link_sec); + if (stub_sec == NULL) + return NULL; + htab->stub_group[link_sec->id].stub_sec = stub_sec; + } + htab->stub_group[section->id].stub_sec = stub_sec; + } + + /* Enter this entry into the linker stub hash table. */ + hsh = metag_stub_hash_lookup (&htab->bstab, stub_name, + TRUE, FALSE); + if (hsh == NULL) + { + (*_bfd_error_handler) (_("%B: cannot create stub entry %s"), + section->owner, + stub_name); + return NULL; + } + + hsh->stub_sec = stub_sec; + hsh->stub_offset = 0; + hsh->id_sec = link_sec; + return hsh; +} + +/* Check a signed integer value can be represented in the given number + of bits. */ + +static bfd_boolean +within_signed_range (int value, unsigned int bits) +{ + int min_val = -(1 << (bits - 1)); + int max_val = (1 << (bits - 1)) - 1; + return (value <= max_val) && (value >= min_val); +} + +/* Perform a relocation as part of a final link. */ + +static bfd_reloc_status_type +metag_final_link_relocate (reloc_howto_type *howto, + bfd *input_bfd, + asection *input_section, + bfd_byte *contents, + Elf_Internal_Rela *rel, + bfd_vma relocation, + struct elf_metag_link_hash_entry *hh, + struct elf_metag_link_hash_table *htab, + asection *sym_sec) +{ + bfd_reloc_status_type r = bfd_reloc_ok; + bfd_byte *hit_data = contents + rel->r_offset; + int opcode, op_shift, op_extended, l1, l2; + bfd_signed_vma srel, addend = rel->r_addend; + struct elf_metag_stub_hash_entry *hsh = NULL; + bfd_vma location; + + /* Find out where we are and where we're going. */ + location = (rel->r_offset + + input_section->output_offset + + input_section->output_section->vma); + + switch (howto->type) + { + case R_METAG_RELBRANCH: + case R_METAG_RELBRANCH_PLT: + /* Make it a pc relative offset. */ + relocation -= location; + break; + case R_METAG_TLS_GD: + case R_METAG_TLS_IE: + relocation -= elf_gp (input_section->output_section->owner); + break; + default: + break; + } + + switch (howto->type) + { + case R_METAG_RELBRANCH_PLT: + case R_METAG_RELBRANCH: + opcode = bfd_get_32 (input_bfd, hit_data); + + srel = (bfd_signed_vma) relocation; + srel += addend; + + /* If the branch is out of reach, then redirect the + call to the local stub for this function. */ + if (srel > ((1 << (BRANCH_BITS + 1)) - 1) || + (srel < - (1 << (BRANCH_BITS + 1)))) + { + if (sym_sec == NULL) + break; + + hsh = metag_get_stub_entry (input_section, sym_sec, + hh, rel, htab); + if (hsh == NULL) + return bfd_reloc_undefined; + + /* Munge up the value and addend so that we call the stub + rather than the procedure directly. */ + srel = (hsh->stub_offset + + hsh->stub_sec->output_offset + + hsh->stub_sec->output_section->vma); + srel -= location; + } + + srel = srel >> 2; + + if (!within_signed_range (srel, BRANCH_BITS)) + { + if (hh && hh->eh.root.type == bfd_link_hash_undefweak) + srel = 0; + else + return bfd_reloc_overflow; + } + + opcode &= ~(0x7ffff << 5); + opcode |= ((srel & 0x7ffff) << 5); + + bfd_put_32 (input_bfd, opcode, hit_data); + break; + case R_METAG_GETSETOFF: + case R_METAG_GETSET_GOT: + case R_METAG_GETSET_GOTOFF: + opcode = bfd_get_32 (input_bfd, hit_data); + + srel = (bfd_signed_vma) relocation; + srel += addend; + + /* Is this a standard or extended GET/SET? */ + if ((opcode & 0xf0000000) == 0xa0000000) + { + /* Extended GET/SET. */ + l1 = opcode & 0x2; + l2 = opcode & 0x4; + op_extended = 1; + } + else + { + /* Standard GET/SET. */ + l1 = opcode & 0x01000000; + l2 = opcode & 0x04000000; + op_extended = 0; + } + + /* Calculate the width of the GET/SET and how much we need to + shift the result by. */ + if (l2) + if (l1) + op_shift = 3; + else + op_shift = 2; + else + if (l1) + op_shift = 1; + else + op_shift = 0; + + /* GET/SET offsets are scaled by the width of the transfer. */ + srel = srel >> op_shift; + + /* Extended GET/SET has signed 12 bits of offset, standard has + signed 6 bits. */ + if (op_extended) + { + if (!within_signed_range (srel, 12)) + { + if (hh && hh->eh.root.type == bfd_link_hash_undefweak) + srel = 0; + else + return bfd_reloc_overflow; + } + opcode &= ~(0xfff << 7); + opcode |= ((srel & 0xfff) << 7); + } + else + { + if (!within_signed_range (srel, 5)) + { + if (hh && hh->eh.root.type == bfd_link_hash_undefweak) + srel = 0; + else + return bfd_reloc_overflow; + } + opcode &= ~(0x3f << 8); + opcode |= ((srel & 0x3f) << 8); + } + + bfd_put_32 (input_bfd, opcode, hit_data); + break; + case R_METAG_TLS_GD: + case R_METAG_TLS_LDM: + opcode = bfd_get_32 (input_bfd, hit_data); + + if ((bfd_signed_vma)relocation < 0) + { + /* sign extend immediate */ + if ((opcode & 0xf2000001) == 0x02000000) + { + /* ADD De.e,Dx.r,#I16 */ + /* set SE bit */ + opcode |= (1 << 1); + } else + return bfd_reloc_overflow; + } + + bfd_put_32 (input_bfd, opcode, hit_data); + + r = _bfd_final_link_relocate (howto, input_bfd, input_section, + contents, rel->r_offset, + relocation, rel->r_addend); + break; + default: + r = _bfd_final_link_relocate (howto, input_bfd, input_section, + contents, rel->r_offset, + relocation, rel->r_addend); + } + + return r; +} + +/* This is defined because R_METAG_NONE != 0... + See RELOC_AGAINST_DISCARDED_SECTION for details. */ +#define METAG_RELOC_AGAINST_DISCARDED_SECTION(info, input_bfd, input_section, \ + rel, relend, howto, contents) \ + { \ + _bfd_clear_contents (howto, input_bfd, input_section, \ + contents + rel->r_offset); \ + \ + if (info->relocatable \ + && (input_section->flags & SEC_DEBUGGING)) \ + { \ + /* Only remove relocations in debug sections since other \ + sections may require relocations. */ \ + Elf_Internal_Shdr *rel_hdr; \ + \ + rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section); \ + \ + /* Avoid empty output section. */ \ + if (rel_hdr->sh_size > rel_hdr->sh_entsize) \ + { \ + rel_hdr->sh_size -= rel_hdr->sh_entsize; \ + rel_hdr = _bfd_elf_single_rel_hdr (input_section); \ + rel_hdr->sh_size -= rel_hdr->sh_entsize; \ + \ + memmove (rel, rel + 1, (relend - rel) * sizeof (*rel)); \ + \ + input_section->reloc_count--; \ + relend--; \ + rel--; \ + continue; \ + } \ + } \ + \ + rel->r_info = R_METAG_NONE; \ + rel->r_addend = 0; \ + continue; \ + } + +/* Relocate a META ELF section. + +The RELOCATE_SECTION function is called by the new ELF backend linker +to handle the relocations for a section. + +The relocs are always passed as Rela structures; if the section +actually uses Rel structures, the r_addend field will always be +zero. + +This function is responsible for adjusting the section contents as +necessary, and (if using Rela relocs and generating a relocatable +output file) adjusting the reloc addend as necessary. + +This function does not have to worry about setting the reloc +address or the reloc symbol index. + +LOCAL_SYMS is a pointer to the swapped in local symbols. + +LOCAL_SECTIONS is an array giving the section in the input file +corresponding to the st_shndx field of each local symbol. + +The global hash table entry for the global symbols can be found +via elf_sym_hashes (input_bfd). + +When generating relocatable output, this function must handle +STB_LOCAL/STT_SECTION symbols specially. The output symbol is +going to be the section symbol corresponding to the output +section, which means that the addend must be adjusted +accordingly. */ + +static bfd_boolean +elf_metag_relocate_section (bfd *output_bfd, + struct bfd_link_info *info, + bfd *input_bfd, + asection *input_section, + bfd_byte *contents, + Elf_Internal_Rela *relocs, + Elf_Internal_Sym *local_syms, + asection **local_sections) +{ + bfd_vma *local_got_offsets; + Elf_Internal_Shdr *symtab_hdr; + struct elf_link_hash_entry **eh_syms; + struct elf_metag_link_hash_table *htab; + Elf_Internal_Rela *rel; + Elf_Internal_Rela *relend; + asection *sreloc; + + symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr; + eh_syms = elf_sym_hashes (input_bfd); + relend = relocs + input_section->reloc_count; + + htab = metag_link_hash_table (info); + local_got_offsets = elf_local_got_offsets (input_bfd); + + sreloc = NULL; + + for (rel = relocs; rel < relend; rel ++) + { + reloc_howto_type *howto; + unsigned long r_symndx; + Elf_Internal_Sym *sym; + asection *sec; + struct elf_metag_link_hash_entry *hh; + bfd_vma relocation; + bfd_reloc_status_type r; + const char *name; + int r_type; + + r_type = ELF32_R_TYPE (rel->r_info); + + if (r_type == R_METAG_GNU_VTINHERIT + || r_type == R_METAG_GNU_VTENTRY + || r_type == R_METAG_NONE) + continue; + + r_symndx = ELF32_R_SYM (rel->r_info); + + howto = elf_metag_howto_table + ELF32_R_TYPE (rel->r_info); + hh = NULL; + sym = NULL; + sec = NULL; + + if (r_symndx < symtab_hdr->sh_info) + { + sym = local_syms + r_symndx; + sec = local_sections [r_symndx]; + relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel); + + name = bfd_elf_string_from_elf_section + (input_bfd, symtab_hdr->sh_link, sym->st_name); + name = (name == NULL) ? bfd_section_name (input_bfd, sec) : name; + } + else + { + struct elf_link_hash_entry *eh; + bfd_boolean unresolved_reloc, warned; + + RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel, + r_symndx, symtab_hdr, eh_syms, + eh, sec, relocation, + unresolved_reloc, warned); + + name = eh->root.root.string; + hh = (struct elf_metag_link_hash_entry *) eh; + } + + if (sec != NULL && discarded_section (sec)) + METAG_RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section, + rel, relend, howto, contents); + + if (info->relocatable) + continue; + + switch (r_type) + { + case R_METAG_ADDR32: + case R_METAG_RELBRANCH: + if ((input_section->flags & SEC_ALLOC) == 0) + break; + + if ((info->shared + && r_symndx != STN_UNDEF + && (input_section->flags & SEC_ALLOC) != 0 + && (r_type != R_METAG_RELBRANCH + || !SYMBOL_CALLS_LOCAL (info, &hh->eh))) + || (!info->shared + && hh != NULL + && hh->eh.dynindx != -1 + && !hh->eh.non_got_ref + && ((hh->eh.def_dynamic + && !hh->eh.def_regular) + || hh->eh.root.type == bfd_link_hash_undefweak + || hh->eh.root.type == bfd_link_hash_undefined))) + { + Elf_Internal_Rela outrel; + bfd_boolean skip, relocate; + bfd_byte *loc; + + /* When generating a shared object, these relocations + are copied into the output file to be resolved at run + time. */ + + sreloc = elf_section_data (input_section)->sreloc; + BFD_ASSERT (sreloc != NULL); + + skip = FALSE; + relocate = FALSE; + + outrel.r_offset = _bfd_elf_section_offset (output_bfd, + info, + input_section, + rel->r_offset); + if (outrel.r_offset == (bfd_vma) -1) + skip = TRUE; + else if (outrel.r_offset == (bfd_vma) -2) + skip = TRUE, relocate = TRUE; + outrel.r_offset += (input_section->output_section->vma + + input_section->output_offset); + + if (skip) + { + memset (&outrel, 0, sizeof outrel); + outrel.r_info = ELF32_R_INFO (0, R_METAG_NONE); + } + else if (r_type == R_METAG_RELBRANCH) + { + BFD_ASSERT (hh != NULL && hh->eh.dynindx != -1); + outrel.r_info = ELF32_R_INFO (hh->eh.dynindx, r_type); + outrel.r_addend = rel->r_addend; + } + else + { + /* h->dynindx may be -1 if this symbol was marked to + become local. */ + if (hh == NULL + || ((info->symbolic || hh->eh.dynindx == -1) + && hh->eh.def_regular)) + { + relocate = TRUE; + outrel.r_info = ELF32_R_INFO (0, R_METAG_RELATIVE); + outrel.r_addend = relocation + rel->r_addend; + } + else + { + BFD_ASSERT (hh->eh.dynindx != -1); + outrel.r_info = ELF32_R_INFO (hh->eh.dynindx, r_type); + outrel.r_addend = rel->r_addend; + } + } + + loc = sreloc->contents; + loc += sreloc->reloc_count * sizeof(Elf32_External_Rela); + bfd_elf32_swap_reloca_out (output_bfd, &outrel,loc); + ++sreloc->reloc_count; + + /* If this reloc is against an external symbol, we do + not want to fiddle with the addend. Otherwise, we + need to include the symbol value so that it becomes + an addend for the dynamic reloc. */ + if (! relocate) + continue; + } + break; + + case R_METAG_RELBRANCH_PLT: + /* Relocation is to the entry for this symbol in the + procedure linkage table. */ + + if (hh == NULL) + break; + + if (hh->eh.forced_local) + break; + + if (hh->eh.plt.offset == (bfd_vma) -1 || + htab->splt == NULL) + { + /* We didn't make a PLT entry for this symbol. This + happens when statically linking PIC code, or when + using -Bsymbolic. */ + break; + } + + relocation = (htab->splt->output_section->vma + + htab->splt->output_offset + + hh->eh.plt.offset); + break; + case R_METAG_HI16_GOTPC: + case R_METAG_LO16_GOTPC: + BFD_ASSERT (htab->sgot != NULL); + + relocation = (htab->sgot->output_section->vma + + htab->sgot->output_offset); + relocation += GOT_REG_OFFSET; + relocation -= (input_section->output_section->vma + + input_section->output_offset + + rel->r_offset); + break; + case R_METAG_HI16_GOTOFF: + case R_METAG_LO16_GOTOFF: + case R_METAG_GETSET_GOTOFF: + BFD_ASSERT (htab->sgot != NULL); + + relocation -= (htab->sgot->output_section->vma + + htab->sgot->output_offset); + relocation -= GOT_REG_OFFSET; + break; + case R_METAG_GETSET_GOT: + { + bfd_vma off; + bfd_boolean do_got = 0; + + /* Relocation is to the entry for this symbol in the + global offset table. */ + if (hh != NULL) + { + bfd_boolean dyn; + + off = hh->eh.got.offset; + dyn = htab->etab.dynamic_sections_created; + if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, + &hh->eh)) + { + /* If we aren't going to call finish_dynamic_symbol, + then we need to handle initialisation of the .got + entry and create needed relocs here. Since the + offset must always be a multiple of 4, we use the + least significant bit to record whether we have + initialised it already. */ + if ((off & 1) != 0) + off &= ~1; + else + { + hh->eh.got.offset |= 1; + do_got = 1; + } + } + } + else + { + /* Local symbol case. */ + if (local_got_offsets == NULL) + abort (); + + off = local_got_offsets[r_symndx]; + + /* The offset must always be a multiple of 4. We use + the least significant bit to record whether we have + already generated the necessary reloc. */ + if ((off & 1) != 0) + off &= ~1; + else + { + local_got_offsets[r_symndx] |= 1; + do_got = 1; + } + } + + if (do_got) + { + if (info->shared) + { + /* Output a dynamic relocation for this GOT entry. + In this case it is relative to the base of the + object because the symbol index is zero. */ + Elf_Internal_Rela outrel; + bfd_byte *loc; + asection *s = htab->srelgot; + + outrel.r_offset = (off + + htab->sgot->output_offset + + htab->sgot->output_section->vma); + outrel.r_info = ELF32_R_INFO (0, R_METAG_RELATIVE); + outrel.r_addend = relocation; + loc = s->contents; + loc += s->reloc_count++ * sizeof (Elf32_External_Rela); + bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc); + } + else + bfd_put_32 (output_bfd, relocation, + htab->sgot->contents + off); + } + + if (off >= (bfd_vma) -2) + abort (); + + relocation = off - GOT_REG_OFFSET; + } + break; + case R_METAG_TLS_GD: + case R_METAG_TLS_IE: + { + /* XXXMJF There is room here for optimisations. For example + converting from GD->IE, etc. */ + bfd_vma off; + int indx; + char tls_type; + + if (htab->sgot == NULL) + abort(); + + indx = 0; + if (hh != NULL) + { + bfd_boolean dyn; + dyn = htab->etab.dynamic_sections_created; + + if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, &hh->eh) + && (!info->shared + || !SYMBOL_REFERENCES_LOCAL (info, &hh->eh))) + { + indx = hh->eh.dynindx; + } + off = hh->eh.got.offset; + tls_type = hh->tls_type; + } + else + { + /* Local symbol case. */ + if (local_got_offsets == NULL) + abort (); + + off = local_got_offsets[r_symndx]; + tls_type = metag_elf_local_got_tls_type (input_bfd) [r_symndx]; + } + + if (tls_type == GOT_UNKNOWN) + abort(); + + if ((off & 1) != 0) + off &= ~1; + else + { + bfd_boolean need_relocs = FALSE; + Elf_Internal_Rela outrel; + bfd_byte *loc = NULL; + int cur_off = off; + + /* The GOT entries have not been initialized yet. Do it + now, and emit any relocations. If both an IE GOT and a + GD GOT are necessary, we emit the GD first. */ + + if ((info->shared || indx != 0) + && (hh == NULL + || ELF_ST_VISIBILITY (hh->eh.other) == STV_DEFAULT + || hh->eh.root.type != bfd_link_hash_undefweak)) + { + need_relocs = TRUE; + loc = htab->srelgot->contents; + /* FIXME (CAO): Should this be reloc_count++ ? */ + loc += htab->srelgot->reloc_count * sizeof (Elf32_External_Rela); + } + + if (tls_type & GOT_TLS_GD) + { + if (need_relocs) + { + outrel.r_offset = (cur_off + + htab->sgot->output_section->vma + + htab->sgot->output_offset); + outrel.r_info = ELF32_R_INFO (indx, R_METAG_TLS_DTPMOD); + outrel.r_addend = 0; + bfd_put_32 (output_bfd, 0, htab->sgot->contents + cur_off); + + bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc); + htab->srelgot->reloc_count++; + loc += sizeof (Elf32_External_Rela); + + if (indx == 0) + bfd_put_32 (output_bfd, 0, + htab->sgot->contents + cur_off + 4); + else + { + bfd_put_32 (output_bfd, 0, + htab->sgot->contents + cur_off + 4); + outrel.r_info = ELF32_R_INFO (indx, + R_METAG_TLS_DTPOFF); + outrel.r_offset += 4; + bfd_elf32_swap_reloca_out (output_bfd, + &outrel, loc); + htab->srelgot->reloc_count++; + loc += sizeof (Elf32_External_Rela); + } + } + else + { + /* We don't support changing the TLS model. */ + abort (); + } + + cur_off += 8; + } + + if (tls_type & GOT_TLS_IE) + { + if (need_relocs) + { + outrel.r_offset = (cur_off + + htab->sgot->output_section->vma + + htab->sgot->output_offset); + outrel.r_info = ELF32_R_INFO (indx, R_METAG_TLS_TPOFF); + + if (indx == 0) + outrel.r_addend = relocation - dtpoff_base (info); + else + outrel.r_addend = 0; + + bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc); + htab->srelgot->reloc_count++; + loc += sizeof (Elf32_External_Rela); + } + else + bfd_put_32 (output_bfd, tpoff (info, relocation), + htab->sgot->contents + cur_off); + + cur_off += 4; + } + + if (hh != NULL) + hh->eh.got.offset |= 1; + else + local_got_offsets[r_symndx] |= 1; + } + + /* Add the base of the GOT to the relocation value. */ + relocation = off - GOT_REG_OFFSET; + + break; + } + + case R_METAG_TLS_IENONPIC_HI16: + case R_METAG_TLS_IENONPIC_LO16: + case R_METAG_TLS_LE_HI16: + case R_METAG_TLS_LE_LO16: + if (info->shared) + { + (*_bfd_error_handler) + (_("%B(%A+0x%lx): R_METAG_TLS_LE/IENONPIC relocation not permitted in shared object"), + input_bfd, input_section, + (long) rel->r_offset, howto->name); + return FALSE; + } + else + relocation = tpoff (info, relocation); + break; + case R_METAG_TLS_LDO_HI16: + case R_METAG_TLS_LDO_LO16: + if (! info->shared) + relocation = tpoff (info, relocation); + else + relocation -= dtpoff_base (info); + break; + case R_METAG_TLS_LDM: + { + bfd_vma off; + + if (htab->sgot == NULL) + abort(); + off = htab->tls_ldm_got.offset; + if (off & 1) + off &= ~1; + else + { + Elf_Internal_Rela outrel; + bfd_byte *loc; + + outrel.r_offset = (off + + htab->sgot->output_section->vma + + htab->sgot->output_offset); + + outrel.r_addend = 0; + outrel.r_info = ELF32_R_INFO (0, R_METAG_TLS_DTPMOD); + loc = htab->srelgot->contents; + loc += htab->srelgot->reloc_count++ * sizeof (Elf32_External_Rela); + bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc); + htab->tls_ldm_got.offset |= 1; + } + + relocation = off - GOT_REG_OFFSET; + break; + } + default: + break; + } + + r = metag_final_link_relocate (howto, input_bfd, input_section, + contents, rel, relocation, hh, htab, + sec); + + if (r != bfd_reloc_ok) + { + const char * msg = (const char *) NULL; + + switch (r) + { + case bfd_reloc_overflow: + r = info->callbacks->reloc_overflow + (info, (hh ? &hh->eh.root : NULL), name, howto->name, + (bfd_vma) 0, input_bfd, input_section, rel->r_offset); + break; + + case bfd_reloc_undefined: + r = info->callbacks->undefined_symbol + (info, name, input_bfd, input_section, rel->r_offset, + TRUE); + break; + + case bfd_reloc_outofrange: + msg = _("internal error: out of range error"); + break; + + case bfd_reloc_notsupported: + msg = _("internal error: unsupported relocation error"); + break; + + case bfd_reloc_dangerous: + msg = _("internal error: dangerous relocation"); + break; + + default: + msg = _("internal error: unknown error"); + break; + } + + if (msg) + r = info->callbacks->warning + (info, msg, name, input_bfd, input_section, rel->r_offset); + + if (! r) + return FALSE; + } + } + + return TRUE; +} + +/* Create the .plt and .got sections, and set up our hash table + short-cuts to various dynamic sections. */ + +static bfd_boolean +elf_metag_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info) +{ + struct elf_metag_link_hash_table *htab; + struct elf_link_hash_entry *eh; + struct bfd_link_hash_entry *bh; + const struct elf_backend_data *bed = get_elf_backend_data (abfd); + + /* Don't try to create the .plt and .got twice. */ + htab = metag_link_hash_table (info); + if (htab->splt != NULL) + return TRUE; + + /* Call the generic code to do most of the work. */ + if (! _bfd_elf_create_dynamic_sections (abfd, info)) + return FALSE; + + htab->sgot = bfd_get_section_by_name (abfd, ".got"); + if (! htab->sgot) + return FALSE; + + htab->sgotplt = bfd_make_section_with_flags (abfd, ".got.plt", + (SEC_ALLOC | SEC_LOAD | + SEC_HAS_CONTENTS | + SEC_IN_MEMORY | + SEC_LINKER_CREATED)); + if (htab->sgotplt == NULL + || !bfd_set_section_alignment (abfd, htab->sgotplt, 2)) + return FALSE; + + /* Define the symbol __GLOBAL_OFFSET_TABLE__ at the start of the .got + section. We don't do this in the linker script because we don't want + to define the symbol if we are not creating a global offset table. */ + bh = NULL; + if (!(_bfd_generic_link_add_one_symbol + (info, abfd, "__GLOBAL_OFFSET_TABLE__", BSF_GLOBAL, htab->sgot, + (bfd_vma) 0, NULL, FALSE, bed->collect, &bh))) + return FALSE; + eh = (struct elf_link_hash_entry *) bh; + eh->def_regular = 1; + eh->type = STT_OBJECT; + eh->other = STV_HIDDEN; + + if (! info->executable + && ! bfd_elf_link_record_dynamic_symbol (info, eh)) + return FALSE; + + elf_hash_table (info)->hgot = eh; + + htab->splt = bfd_get_section_by_name (abfd, ".plt"); + htab->srelplt = bfd_get_section_by_name (abfd, ".rela.plt"); + + htab->srelgot = bfd_get_section_by_name (abfd, ".rela.got"); + + htab->sdynbss = bfd_get_section_by_name (abfd, ".dynbss"); + htab->srelbss = bfd_get_section_by_name (abfd, ".rela.bss"); + + return TRUE; +} + +/* Look through the relocs for a section during the first phase, and + calculate needed space in the global offset table, procedure linkage + table, and dynamic reloc sections. At this point we haven't + necessarily read all the input files. */ + +static bfd_boolean +elf_metag_check_relocs (bfd *abfd, + struct bfd_link_info *info, + asection *sec, + const Elf_Internal_Rela *relocs) +{ + Elf_Internal_Shdr *symtab_hdr; + struct elf_link_hash_entry **eh_syms; + const Elf_Internal_Rela *rel; + const Elf_Internal_Rela *rel_end; + struct elf_metag_link_hash_table *htab; + asection *sreloc; + bfd *dynobj; + int tls_type = GOT_UNKNOWN, old_tls_type = GOT_UNKNOWN; + + if (info->relocatable) + return TRUE; + + htab = metag_link_hash_table (info); + dynobj = htab->etab.dynobj; + symtab_hdr = &elf_tdata (abfd)->symtab_hdr; + eh_syms = elf_sym_hashes (abfd); + sreloc = NULL; + + if (htab == NULL) + return FALSE; + + rel_end = relocs + sec->reloc_count; + for (rel = relocs; rel < rel_end; rel++) + { + int r_type; + struct elf_metag_link_hash_entry *hh; + unsigned long r_symndx; + + r_symndx = ELF32_R_SYM (rel->r_info); + r_type = ELF32_R_TYPE (rel->r_info); + if (r_symndx < symtab_hdr->sh_info) + hh = NULL; + else + { + hh = (struct elf_metag_link_hash_entry *) + eh_syms[r_symndx - symtab_hdr->sh_info]; + while (hh->eh.root.type == bfd_link_hash_indirect + || hh->eh.root.type == bfd_link_hash_warning) + hh = (struct elf_metag_link_hash_entry *) hh->eh.root.u.i.link; + } + + /* Some relocs require a global offset table. */ + if (htab->sgot == NULL) + { + switch (r_type) + { + case R_METAG_TLS_GD: + case R_METAG_TLS_LDM: + case R_METAG_TLS_IE: + if (info->shared) + info->flags |= DF_STATIC_TLS; + /* Fall through. */ + + case R_METAG_HI16_GOTOFF: + case R_METAG_LO16_GOTOFF: + case R_METAG_GETSET_GOTOFF: + case R_METAG_GETSET_GOT: + case R_METAG_HI16_GOTPC: + case R_METAG_LO16_GOTPC: + if (dynobj == NULL) + htab->etab.dynobj = dynobj = abfd; + if (!elf_metag_create_dynamic_sections (dynobj, info)) + return FALSE; + break; + + default: + break; + } + } + + switch (r_type) + { + case R_METAG_TLS_IE: + case R_METAG_TLS_GD: + case R_METAG_GETSET_GOT: + switch (r_type) + { + default: + tls_type = GOT_NORMAL; + break; + case R_METAG_TLS_IE: + tls_type = GOT_TLS_IE; + break; + case R_METAG_TLS_GD: + tls_type = GOT_TLS_GD; + break; + } + + if (hh != NULL) + { + hh->eh.got.refcount += 1; + old_tls_type = hh->tls_type; + } + else + { + bfd_signed_vma *local_got_refcounts; + + /* This is a global offset table entry for a local + symbol. */ + local_got_refcounts = elf_local_got_refcounts (abfd); + if (local_got_refcounts == NULL) + { + bfd_size_type size; + + size = symtab_hdr->sh_info; + size *= sizeof (bfd_signed_vma); + /* Add in space to store the local GOT TLS types. */ + size += symtab_hdr->sh_info; + local_got_refcounts = ((bfd_signed_vma *) + bfd_zalloc (abfd, size)); + if (local_got_refcounts == NULL) + return FALSE; + elf_local_got_refcounts (abfd) = local_got_refcounts; + memset (metag_elf_local_got_tls_type (abfd), + GOT_UNKNOWN, symtab_hdr->sh_info); + } + local_got_refcounts[r_symndx] += 1; + old_tls_type = metag_elf_local_got_tls_type (abfd) [r_symndx]; + } + + if (old_tls_type != tls_type) + { + if (hh != NULL) + { + hh->tls_type = tls_type; + } + else + { + metag_elf_local_got_tls_type (abfd) [r_symndx] = tls_type; + } + } + + break; + + case R_METAG_TLS_LDM: + metag_link_hash_table (info)->tls_ldm_got.refcount += 1; + break; + + case R_METAG_RELBRANCH_PLT: + /* This symbol requires a procedure linkage table entry. We + actually build the entry in adjust_dynamic_symbol, + because this might be a case of linking PIC code without + linking in any dynamic objects, in which case we don't + need to generate a procedure linkage table after all. */ + + /* If this is a local symbol, we resolve it directly without + creating a procedure linkage table entry. */ + if (hh == NULL) + continue; + + if (hh->eh.forced_local) + break; + + hh->eh.needs_plt = 1; + hh->eh.plt.refcount += 1; + break; + + case R_METAG_ADDR32: + case R_METAG_HIADDR16: + case R_METAG_LOADDR16: + case R_METAG_RELBRANCH: + case R_METAG_GETSETOFF: + if (hh != NULL && !info->shared) + { + hh->eh.non_got_ref = 1; + hh->eh.plt.refcount += 1; + } + + /* If we are creating a shared library, and this is a reloc + against a global symbol, or a non PC relative reloc + against a local symbol, then we need to copy the reloc + into the shared library. However, if we are linking with + -Bsymbolic, we do not need to copy a reloc against a + global symbol which is defined in an object we are + including in the link (i.e., DEF_REGULAR is set). At + this point we have not seen all the input files, so it is + possible that DEF_REGULAR is not set now but will be set + later (it is never cleared). We account for that + possibility below by storing information in the + dyn_relocs field of the hash table entry. A similar + situation occurs when creating shared libraries and symbol + visibility changes render the symbol local. + + If on the other hand, we are creating an executable, we + may need to keep relocations for symbols satisfied by a + dynamic library if we manage to avoid copy relocs for the + symbol. */ + if ((info->shared + && (sec->flags & SEC_ALLOC) != 0 + && (r_type != R_METAG_RELBRANCH + || (hh != NULL + && (! info->symbolic + || hh->eh.root.type == bfd_link_hash_defweak + || !hh->eh.def_regular)))) + || (!info->shared + && (sec->flags & SEC_ALLOC) != 0 + && hh != NULL + && (hh->eh.root.type == bfd_link_hash_defweak + || !hh->eh.def_regular))) + { + struct elf_metag_dyn_reloc_entry *hdh_p; + struct elf_metag_dyn_reloc_entry **hdh_head; + + if (dynobj == NULL) + htab->etab.dynobj = dynobj = abfd; + + /* When creating a shared object, we must copy these + relocs into the output file. We create a reloc + section in dynobj and make room for the reloc. */ + if (sreloc == NULL) + { + sreloc = _bfd_elf_make_dynamic_reloc_section + (sec, htab->etab.dynobj, 2, abfd, /*rela?*/ TRUE); + + if (sreloc == NULL) + { + bfd_set_error (bfd_error_bad_value); + return FALSE; + } + + elf_section_data (sec)->sreloc = sreloc; + } + + /* If this is a global symbol, we count the number of + relocations we need for this symbol. */ + if (hh != NULL) + hdh_head = &((struct elf_metag_link_hash_entry *) hh)->dyn_relocs; + else + { + /* Track dynamic relocs needed for local syms too. */ + asection *sr; + void *vpp; + Elf_Internal_Sym *isym; + + isym = bfd_sym_from_r_symndx (&htab->sym_cache, + abfd, r_symndx); + if (isym == NULL) + return FALSE; + + sr = bfd_section_from_elf_index (abfd, isym->st_shndx); + if (sr == NULL) + sr = sec; + + vpp = &elf_section_data (sr)->local_dynrel; + hdh_head = (struct elf_metag_dyn_reloc_entry **) vpp; + } + + hdh_p = *hdh_head; + if (hdh_p == NULL || hdh_p->sec != sec) + { + hdh_p = ((struct elf_metag_dyn_reloc_entry *) + bfd_alloc (dynobj, sizeof *hdh_p)); + if (hdh_p == NULL) + return FALSE; + hdh_p->hdh_next = *hdh_head; + *hdh_head = hdh_p; + hdh_p->sec = sec; + hdh_p->count = 0; + hdh_p->relative_count = 0; + } + + hdh_p->count += 1; + if (ELF32_R_TYPE (rel->r_info) == R_METAG_RELBRANCH) + hdh_p->relative_count += 1; + } + break; + + /* This relocation describes the C++ object vtable hierarchy. + Reconstruct it for later use during GC. */ + case R_METAG_GNU_VTINHERIT: + if (!bfd_elf_gc_record_vtinherit (abfd, sec, &hh->eh, + rel->r_offset)) + return FALSE; + break; + + /* This relocation describes which C++ vtable entries are actually + used. Record for later use during GC. */ + case R_METAG_GNU_VTENTRY: + BFD_ASSERT (hh != NULL); + if (hh != NULL + && !bfd_elf_gc_record_vtentry (abfd, sec, &hh->eh, rel->r_addend)) + return FALSE; + break; + } + } + + return TRUE; +} + +/* Copy the extra info we tack onto an elf_link_hash_entry. */ + +static void +elf_metag_copy_indirect_symbol (struct bfd_link_info *info, + struct elf_link_hash_entry *eh_dir, + struct elf_link_hash_entry *eh_ind) +{ + struct elf_metag_link_hash_entry *hh_dir, *hh_ind; + + hh_dir = metag_elf_hash_entry (eh_dir); + hh_ind = metag_elf_hash_entry (eh_ind); + + if (hh_ind->dyn_relocs != NULL) + { + if (hh_dir->dyn_relocs != NULL) + { + struct elf_metag_dyn_reloc_entry **hdh_pp; + struct elf_metag_dyn_reloc_entry *hdh_p; + + if (eh_ind->root.type == bfd_link_hash_indirect) + abort (); + + /* Add reloc counts against the weak sym to the strong sym + list. Merge any entries against the same section. */ + for (hdh_pp = &hh_ind->dyn_relocs; (hdh_p = *hdh_pp) != NULL; ) + { + struct elf_metag_dyn_reloc_entry *hdh_q; + + for (hdh_q = hh_dir->dyn_relocs; hdh_q != NULL; + hdh_q = hdh_q->hdh_next) + if (hdh_q->sec == hdh_p->sec) + { + hdh_q->relative_count += hdh_p->relative_count; + hdh_q->count += hdh_p->count; + *hdh_pp = hdh_p->hdh_next; + break; + } + if (hdh_q == NULL) + hdh_pp = &hdh_p->hdh_next; + } + *hdh_pp = hh_dir->dyn_relocs; + } + + hh_dir->dyn_relocs = hh_ind->dyn_relocs; + hh_ind->dyn_relocs = NULL; + } + + if (eh_ind->root.type == bfd_link_hash_indirect + && eh_dir->got.refcount <= 0) + { + hh_dir->tls_type = hh_ind->tls_type; + hh_ind->tls_type = GOT_UNKNOWN; + } + + _bfd_elf_link_hash_copy_indirect (info, eh_dir, eh_ind); +} + +/* Adjust a symbol defined by a dynamic object and referenced by a + regular object. The current definition is in some section of the + dynamic object, but we're not including those sections. We have to + change the definition to something the rest of the link can + understand. */ + +static bfd_boolean +elf_metag_adjust_dynamic_symbol (struct bfd_link_info *info, + struct elf_link_hash_entry *eh) +{ + struct elf_metag_link_hash_table *htab; + struct elf_metag_link_hash_entry *hh; + struct elf_metag_dyn_reloc_entry *hdh_p; + asection *s; + + /* If this is a function, put it in the procedure linkage table. We + will fill in the contents of the procedure linkage table later, + when we know the address of the .got section. */ + if (eh->type == STT_FUNC + || eh->needs_plt) + { + if (eh->plt.refcount <= 0 + || SYMBOL_CALLS_LOCAL (info, eh) + || (ELF_ST_VISIBILITY (eh->other) != STV_DEFAULT + && eh->root.type == bfd_link_hash_undefweak)) + { + /* This case can occur if we saw a PLT reloc in an input + file, but the symbol was never referred to by a dynamic + object. In such a case, we don't actually need to build + a procedure linkage table, and we can just do a PCREL + reloc instead. */ + eh->plt.offset = (bfd_vma) -1; + eh->needs_plt = 0; + } + + return TRUE; + } + else + eh->plt.offset = (bfd_vma) -1; + + /* If this is a weak symbol, and there is a real definition, the + processor independent code will have arranged for us to see the + real definition first, and we can just use the same value. */ + if (eh->u.weakdef != NULL) + { + if (eh->u.weakdef->root.type != bfd_link_hash_defined + && eh->u.weakdef->root.type != bfd_link_hash_defweak) + abort (); + eh->root.u.def.section = eh->u.weakdef->root.u.def.section; + eh->root.u.def.value = eh->u.weakdef->root.u.def.value; + eh->non_got_ref = eh->u.weakdef->non_got_ref; + return TRUE; + } + + /* This is a reference to a symbol defined by a dynamic object which + is not a function. */ + + /* If we are creating a shared library, we must presume that the + only references to the symbol are via the global offset table. + For such cases we need not do anything here; the relocations will + be handled correctly by relocate_section. */ + if (info->shared) + return TRUE; + + /* If there are no references to this symbol that do not use the + GOT, we don't need to generate a copy reloc. */ + if (!eh->non_got_ref) + return TRUE; + + /* If -z nocopyreloc was given, we won't generate them either. */ + if (info->nocopyreloc) + { + eh->non_got_ref = 0; + return TRUE; + } + + hh = (struct elf_metag_link_hash_entry *) eh; + for (hdh_p = hh->dyn_relocs; hdh_p != NULL; hdh_p = hdh_p->hdh_next) + { + s = hdh_p->sec->output_section; + if (s != NULL && (s->flags & SEC_READONLY) != 0) + break; + } + + /* If we didn't find any dynamic relocs in read-only sections, then + we'll be keeping the dynamic relocs and avoiding the copy reloc. */ + if (hdh_p == NULL) + { + eh->non_got_ref = 0; + return TRUE; + } + + if (eh->size == 0) + { + (*_bfd_error_handler) (_("dynamic variable `%s' is zero size"), + hh->eh.root.root.string); + return TRUE; + } + + /* We must allocate the symbol in our .dynbss section, which will + become part of the .bss section of the executable. There will be + an entry for this symbol in the .dynsym section. The dynamic + object will contain position independent code, so all references + from the dynamic object to this symbol will go through the global + offset table. The dynamic linker will use the .dynsym entry to + determine the address it must put in the global offset table, so + both the dynamic object and the regular object will refer to the + same memory location for the variable. */ + + htab = metag_link_hash_table (info); + + /* We must generate a COPY reloc to tell the dynamic linker to + copy the initial value out of the dynamic object and into the + runtime process image. */ + if ((eh->root.u.def.section->flags & SEC_ALLOC) != 0) + { + htab->srelbss->size += sizeof (Elf32_External_Rela); + eh->needs_copy = 1; + } + + s = htab->sdynbss; + + return _bfd_elf_adjust_dynamic_copy (eh, s); +} + +/* Allocate space in .plt, .got and associated reloc sections for + global syms. */ + +static bfd_boolean +allocate_dynrelocs (struct elf_link_hash_entry *eh, void *inf) +{ + struct bfd_link_info *info; + struct elf_metag_link_hash_table *htab; + struct elf_metag_link_hash_entry *hh; + struct elf_metag_dyn_reloc_entry *hdh_p; + + if (eh->root.type == bfd_link_hash_indirect) + return TRUE; + + if (eh->root.type == bfd_link_hash_warning) + eh = (struct elf_link_hash_entry *) eh->root.u.i.link; + + info = inf; + htab = metag_link_hash_table (info); + + if (htab->etab.dynamic_sections_created + && eh->plt.refcount > 0) + { + /* Make sure this symbol is output as a dynamic symbol. + Undefined weak syms won't yet be marked as dynamic. */ + if (eh->dynindx == -1 + && !eh->forced_local) + { + if (! bfd_elf_link_record_dynamic_symbol (info, eh)) + return FALSE; + } + + if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info->shared, eh)) + { + asection *s = htab->splt; + + /* If this is the first .plt entry, make room for the special + first entry. */ + if (s->size == 0) + s->size += PLT_ENTRY_SIZE; + + eh->plt.offset = s->size; + + /* If this symbol is not defined in a regular file, and we are + not generating a shared library, then set the symbol to this + location in the .plt. This is required to make function + pointers compare as equal between the normal executable and + the shared library. */ + if (! info->shared + && !eh->def_regular) + { + eh->root.u.def.section = s; + eh->root.u.def.value = eh->plt.offset; + } + + /* Make room for this entry. */ + s->size += PLT_ENTRY_SIZE; + + /* We also need to make an entry in the .got.plt section, which + will be placed in the .got section by the linker script. */ + htab->sgotplt->size += 4; + + /* We also need to make an entry in the .rel.plt section. */ + htab->srelplt->size += sizeof (Elf32_External_Rela); + } + else + { + eh->plt.offset = (bfd_vma) -1; + eh->needs_plt = 0; + } + } + else + { + eh->plt.offset = (bfd_vma) -1; + eh->needs_plt = 0; + } + + if (eh->got.refcount > 0) + { + asection *s; + bfd_boolean dyn; + int tls_type = metag_elf_hash_entry (eh)->tls_type; + + /* Make sure this symbol is output as a dynamic symbol. + Undefined weak syms won't yet be marked as dynamic. */ + if (eh->dynindx == -1 + && !eh->forced_local) + { + if (! bfd_elf_link_record_dynamic_symbol (info, eh)) + return FALSE; + } + + s = htab->sgot; + + eh->got.offset = s->size; + s->size += 4; + /* R_METAG_TLS_GD needs 2 consecutive GOT slots. */ + if (tls_type == GOT_TLS_GD) + s->size += 4; + dyn = htab->etab.dynamic_sections_created; + /* R_METAG_TLS_IE needs one dynamic relocation if dynamic, + R_METAG_TLS_GD needs one if local symbol and two if global. */ + if ((tls_type == GOT_TLS_GD && eh->dynindx == -1) + || (tls_type == GOT_TLS_IE && dyn)) + htab->srelgot->size += sizeof (Elf32_External_Rela); + else if (tls_type == GOT_TLS_GD) + htab->srelgot->size += 2 * sizeof (Elf32_External_Rela); + else if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, eh)) + htab->srelgot->size += sizeof (Elf32_External_Rela); + } + else + eh->got.offset = (bfd_vma) -1; + + hh = (struct elf_metag_link_hash_entry *) eh; + if (hh->dyn_relocs == NULL) + return TRUE; + + /* If this is a -Bsymbolic shared link, then we need to discard all + space allocated for dynamic pc-relative relocs against symbols + defined in a regular object. For the normal shared case, discard + space for relocs that have become local due to symbol visibility + changes. */ + if (info->shared) + { + if (SYMBOL_CALLS_LOCAL (info, eh)) + { + struct elf_metag_dyn_reloc_entry **hdh_pp; + + for (hdh_pp = &hh->dyn_relocs; (hdh_p = *hdh_pp) != NULL; ) + { + hdh_p->count -= hdh_p->relative_count; + hdh_p->relative_count = 0; + if (hdh_p->count == 0) + *hdh_pp = hdh_p->hdh_next; + else + hdh_pp = &hdh_p->hdh_next; + } + } + + /* Also discard relocs on undefined weak syms with non-default + visibility. */ + if (hh->dyn_relocs != NULL + && eh->root.type == bfd_link_hash_undefweak) + { + if (ELF_ST_VISIBILITY (eh->other) != STV_DEFAULT) + hh->dyn_relocs = NULL; + + /* Make sure undefined weak symbols are output as a dynamic + symbol in PIEs. */ + else if (eh->dynindx == -1 + && !eh->forced_local) + { + if (! bfd_elf_link_record_dynamic_symbol (info, eh)) + return FALSE; + } + } + } + else + { + /* For the non-shared case, discard space for relocs against + symbols which turn out to need copy relocs or are not + dynamic. */ + if (!eh->non_got_ref + && ((eh->def_dynamic + && !eh->def_regular) + || (htab->etab.dynamic_sections_created + && (eh->root.type == bfd_link_hash_undefweak + || eh->root.type == bfd_link_hash_undefined)))) + { + /* Make sure this symbol is output as a dynamic symbol. + Undefined weak syms won't yet be marked as dynamic. */ + if (eh->dynindx == -1 + && !eh->forced_local) + { + if (! bfd_elf_link_record_dynamic_symbol (info, eh)) + return FALSE; + } + + /* If that succeeded, we know we'll be keeping all the + relocs. */ + if (eh->dynindx != -1) + goto keep; + } + + hh->dyn_relocs = NULL; + return TRUE; + + keep: ; + } + + /* Finally, allocate space. */ + for (hdh_p = hh->dyn_relocs; hdh_p != NULL; hdh_p = hdh_p->hdh_next) + { + asection *sreloc = elf_section_data (hdh_p->sec)->sreloc; + sreloc->size += hdh_p->count * sizeof (Elf32_External_Rela); + } + + return TRUE; +} + +/* Find any dynamic relocs that apply to read-only sections. */ + +static bfd_boolean +readonly_dynrelocs (struct elf_link_hash_entry *eh, void *inf) +{ + struct elf_metag_link_hash_entry *hh; + struct elf_metag_dyn_reloc_entry *hdh_p; + + if (eh->root.type == bfd_link_hash_warning) + eh = (struct elf_link_hash_entry *) eh->root.u.i.link; + + hh = (struct elf_metag_link_hash_entry *) eh; + for (hdh_p = hh->dyn_relocs; hdh_p != NULL; hdh_p = hdh_p->hdh_next) + { + asection *s = hdh_p->sec->output_section; + + if (s != NULL && (s->flags & SEC_READONLY) != 0) + { + struct bfd_link_info *info = inf; + + info->flags |= DF_TEXTREL; + + /* Not an error, just cut short the traversal. */ + return FALSE; + } + } + return TRUE; +} + +/* Set the sizes of the dynamic sections. */ + +static bfd_boolean +elf_metag_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED, + struct bfd_link_info *info) +{ + struct elf_metag_link_hash_table *htab; + bfd *dynobj; + bfd *ibfd; + asection *s; + bfd_boolean relocs; + + htab = metag_link_hash_table (info); + dynobj = htab->etab.dynobj; + if (dynobj == NULL) + abort (); + + if (htab->etab.dynamic_sections_created) + { + /* Set the contents of the .interp section to the interpreter. */ + if (info->executable) + { + s = bfd_get_section_by_name (dynobj, ".interp"); + if (s == NULL) + abort (); + s->size = sizeof ELF_DYNAMIC_INTERPRETER; + s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER; + } + } + + /* Set up .got offsets for local syms, and space for local dynamic + relocs. */ + for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next) + { + bfd_signed_vma *local_got; + bfd_signed_vma *end_local_got; + bfd_size_type locsymcount; + Elf_Internal_Shdr *symtab_hdr; + asection *srel; + char *local_tls_type; + + if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour) + continue; + + for (s = ibfd->sections; s != NULL; s = s->next) + { + struct elf_metag_dyn_reloc_entry *hdh_p; + + for (hdh_p = ((struct elf_metag_dyn_reloc_entry *) + elf_section_data (s)->local_dynrel); + hdh_p != NULL; + hdh_p = hdh_p->hdh_next) + { + if (!bfd_is_abs_section (hdh_p->sec) + && bfd_is_abs_section (hdh_p->sec->output_section)) + { + /* Input section has been discarded, either because + it is a copy of a linkonce section or due to + linker script /DISCARD/, so we'll be discarding + the relocs too. */ + } + else if (hdh_p->count != 0) + { + srel = elf_section_data (hdh_p->sec)->sreloc; + srel->size += hdh_p->count * sizeof (Elf32_External_Rela); + if ((hdh_p->sec->output_section->flags & SEC_READONLY) != 0) + info->flags |= DF_TEXTREL; + } + } + } + + local_got = elf_local_got_refcounts (ibfd); + if (!local_got) + continue; + + symtab_hdr = &elf_tdata (ibfd)->symtab_hdr; + locsymcount = symtab_hdr->sh_info; + end_local_got = local_got + locsymcount; + local_tls_type = metag_elf_local_got_tls_type (ibfd); + s = htab->sgot; + srel = htab->srelgot; + for (; local_got < end_local_got; ++local_got) + { + if (*local_got > 0) + { + *local_got = s->size; + s->size += GOT_ENTRY_SIZE; + /* R_METAG_TLS_GD relocs need 2 consecutive GOT entries. */ + if (*local_tls_type == GOT_TLS_GD) + s->size += 4; + if (info->shared) + srel->size += sizeof (Elf32_External_Rela); + } + else + *local_got = (bfd_vma) -1; + ++local_tls_type; + } + } + + if (htab->tls_ldm_got.refcount > 0) + { + /* Allocate 2 got entries and 1 dynamic reloc for R_METAG_TLS_LDM + reloc. */ + htab->tls_ldm_got.offset = htab->sgot->size; + htab->sgot->size += 8; + htab->srelgot->size += sizeof (Elf32_External_Rela); + } + else + htab->tls_ldm_got.offset = -1; + + /* Allocate global sym .plt and .got entries, and space for global + sym dynamic relocs. */ + elf_link_hash_traverse (&htab->etab, allocate_dynrelocs, info); + + /* We now have determined the sizes of the various dynamic sections. + Allocate memory for them. */ + relocs = FALSE; + for (s = dynobj->sections; s != NULL; s = s->next) + { + bfd_boolean reloc_section = FALSE; + + if ((s->flags & SEC_LINKER_CREATED) == 0) + continue; + + if (s == htab->splt + || s == htab->sgot + || s == htab->sgotplt + || s == htab->sdynbss) + { + /* Strip this section if we don't need it; see the + comment below. */ + } + else if (CONST_STRNEQ (bfd_get_section_name (dynobj, s), ".rela")) + { + if (s->size != 0 && s != htab->srelplt) + relocs = TRUE; + + /* We use the reloc_count field as a counter if we need + to copy relocs into the output file. */ + s->reloc_count = 0; + reloc_section = TRUE; + } + else + { + /* It's not one of our sections, so don't allocate space. */ + continue; + } + + if (s->size == 0) + { + /* If we don't need this section, strip it from the + output file. This is mostly to handle .rela.bss and + .rela.plt. We must create both sections in + create_dynamic_sections, because they must be created + before the linker maps input sections to output + sections. The linker does that before + adjust_dynamic_symbol is called, and it is that + function which decides whether anything needs to go + into these sections. */ + s->flags |= SEC_EXCLUDE; + continue; + } + + if ((s->flags & SEC_HAS_CONTENTS) == 0) + continue; + + /* Allocate memory for the section contents. */ + s->contents = bfd_zalloc (dynobj, s->size); + if (s->contents == NULL) + return FALSE; + else if (reloc_section) + { + unsigned char *contents = s->contents; + Elf32_External_Rela reloc; + + /* Fill the reloc section with a R_METAG_NONE type reloc. */ + memset(&reloc, 0, sizeof(Elf32_External_Rela)); + reloc.r_info[0] = R_METAG_NONE; + for (; contents < (s->contents + s->size); + contents += sizeof(Elf32_External_Rela)) + { + memcpy(contents, &reloc, sizeof(Elf32_External_Rela)); + } + } + } + + if (htab->etab.dynamic_sections_created) + { + /* Add some entries to the .dynamic section. We fill in the + values later, in elf_metag_finish_dynamic_sections, but we + must add the entries now so that we get the correct size for + the .dynamic section. The DT_DEBUG entry is filled in by the + dynamic linker and used by the debugger. */ +#define add_dynamic_entry(TAG, VAL) \ + _bfd_elf_add_dynamic_entry (info, TAG, VAL) + + if (!add_dynamic_entry (DT_PLTGOT, 0)) + return FALSE; + + if (info->executable) + { + if (!add_dynamic_entry (DT_DEBUG, 0)) + return FALSE; + } + + if (htab->srelplt->size != 0) + { + if (!add_dynamic_entry (DT_PLTRELSZ, 0) + || !add_dynamic_entry (DT_PLTREL, DT_RELA) + || !add_dynamic_entry (DT_JMPREL, 0)) + return FALSE; + } + + if (relocs) + { + if (!add_dynamic_entry (DT_RELA, 0) + || !add_dynamic_entry (DT_RELASZ, 0) + || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela))) + return FALSE; + + /* If any dynamic relocs apply to a read-only section, + then we need a DT_TEXTREL entry. */ + if ((info->flags & DF_TEXTREL) == 0) + elf_link_hash_traverse (&htab->etab, readonly_dynrelocs, info); + + if ((info->flags & DF_TEXTREL) != 0) + { + if (!add_dynamic_entry (DT_TEXTREL, 0)) + return FALSE; + } + } + } +#undef add_dynamic_entry + + return TRUE; +} + +/* Finish up dynamic symbol handling. We set the contents of various + dynamic sections here. */ + +static bfd_boolean +elf_metag_finish_dynamic_symbol (bfd *output_bfd, + struct bfd_link_info *info, + struct elf_link_hash_entry *eh, + Elf_Internal_Sym *sym) +{ + struct elf_metag_link_hash_table *htab; + Elf_Internal_Rela rel; + bfd_byte *loc; + + htab = metag_link_hash_table (info); + + if (eh->plt.offset != (bfd_vma) -1) + { + asection *splt; + asection *sgot; + asection *srela; + + bfd_vma plt_index; + bfd_vma got_offset; + bfd_vma got_entry; + + if (eh->plt.offset & 1) + abort (); + + BFD_ASSERT (eh->dynindx != -1); + + splt = htab->splt; + sgot = htab->sgotplt; + srela = htab->srelplt; + BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL); + + /* Get the index in the procedure linkage table which + corresponds to this symbol. This is the index of this symbol + in all the symbols for which we are making plt entries. The + first entry in the procedure linkage table is reserved. */ + plt_index = eh->plt.offset / PLT_ENTRY_SIZE - 1; + + /* Get the offset into the .got.plt table of the entry that + corresponds to this function. */ + got_offset = plt_index * GOT_ENTRY_SIZE; + + BFD_ASSERT (got_offset < (1 << 16)); + + got_entry = sgot->output_section->vma + + sgot->output_offset + + got_offset; + + BFD_ASSERT (plt_index < (1 << 16)); + + /* Fill in the entry in the procedure linkage table. */ + if (! info->shared) + { + bfd_put_32 (output_bfd, + (plt_entry[0] + | (((got_entry >> 16) & 0xffff) << 3)), + splt->contents + eh->plt.offset); + bfd_put_32 (output_bfd, + (plt_entry[1] + | ((got_entry & 0xffff) << 3)), + splt->contents + eh->plt.offset + 4); + bfd_put_32 (output_bfd, plt_entry[2], + splt->contents + eh->plt.offset + 8); + bfd_put_32 (output_bfd, + (plt_entry[3] | (plt_index << 3)), + splt->contents + eh->plt.offset + 12); + bfd_put_32 (output_bfd, + (plt_entry[4] + | ((((unsigned int) ((- (eh->plt.offset + 16)) >> 2)) & 0x7ffff) << 5)), + splt->contents + eh->plt.offset + 16); + } + else + { + bfd_vma addr = got_entry - (splt->output_section->vma + + splt->output_offset + eh->plt.offset); + + bfd_put_32 (output_bfd, + plt_pic_entry[0] | (((addr >> 16) & 0xffff) << 3), + splt->contents + eh->plt.offset); + bfd_put_32 (output_bfd, + plt_pic_entry[1] | ((addr & 0xffff) << 3), + splt->contents + eh->plt.offset + 4); + bfd_put_32 (output_bfd, plt_pic_entry[2], + splt->contents + eh->plt.offset + 8); + bfd_put_32 (output_bfd, + (plt_pic_entry[3] | (plt_index << 3)), + splt->contents + eh->plt.offset + 12); + bfd_put_32 (output_bfd, + (plt_pic_entry[4] + + ((((unsigned int) ((- (eh->plt.offset + 16)) >> 2)) & 0x7ffff) << 5)), + splt->contents + eh->plt.offset + 16); + } + + /* Fill in the entry in the global offset table. */ + bfd_put_32 (output_bfd, + (splt->output_section->vma + + splt->output_offset + + eh->plt.offset + + 12), /* offset within PLT entry */ + sgot->contents + got_offset); + + /* Fill in the entry in the .rela.plt section. */ + rel.r_offset = (sgot->output_section->vma + + sgot->output_offset + + got_offset); + rel.r_info = ELF32_R_INFO (eh->dynindx, R_METAG_JMP_SLOT); + rel.r_addend = 0; + loc = htab->srelplt->contents; + loc += plt_index * sizeof(Elf32_External_Rela); + bfd_elf32_swap_reloca_out (output_bfd, &rel, loc); + + if (!eh->def_regular) + { + /* Mark the symbol as undefined, rather than as defined in + the .plt section. Leave the value alone. */ + sym->st_shndx = SHN_UNDEF; + } + } + + if (eh->got.offset != (bfd_vma) -1 + && (metag_elf_hash_entry (eh)->tls_type & GOT_TLS_GD) == 0 + && (metag_elf_hash_entry (eh)->tls_type & GOT_TLS_IE) == 0) + { + /* This symbol has an entry in the global offset table. Set it + up. */ + + rel.r_offset = ((eh->got.offset &~ (bfd_vma) 1) + + htab->sgot->output_offset + + htab->sgot->output_section->vma); + + /* If this is a -Bsymbolic link and the symbol is defined + locally or was forced to be local because of a version file, + we just want to emit a RELATIVE reloc. The entry in the + global offset table will already have been initialized in the + relocate_section function. */ + if (info->shared + && (info->symbolic || eh->dynindx == -1) + && eh->def_regular) + { + rel.r_info = ELF32_R_INFO (0, R_METAG_RELATIVE); + rel.r_addend = (eh->root.u.def.value + + eh->root.u.def.section->output_offset + + eh->root.u.def.section->output_section->vma); + } + else + { + if ((eh->got.offset & 1) != 0) + abort (); + bfd_put_32 (output_bfd, 0, htab->sgot->contents + eh->got.offset); + rel.r_info = ELF32_R_INFO (eh->dynindx, R_METAG_GLOB_DAT); + rel.r_addend = 0; + } + + loc = htab->srelgot->contents; + loc += htab->srelgot->reloc_count++ * sizeof (Elf32_External_Rela); + bfd_elf32_swap_reloca_out (output_bfd, &rel, loc); + } + + if (eh->needs_copy) + { + asection *s; + + /* This symbol needs a copy reloc. Set it up. */ + + if (! (eh->dynindx != -1 + && (eh->root.type == bfd_link_hash_defined + || eh->root.type == bfd_link_hash_defweak))) + abort (); + + s = htab->srelbss; + + rel.r_offset = (eh->root.u.def.value + + eh->root.u.def.section->output_offset + + eh->root.u.def.section->output_section->vma); + rel.r_addend = 0; + rel.r_info = ELF32_R_INFO (eh->dynindx, R_METAG_COPY); + loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela); + bfd_elf32_swap_reloca_out (output_bfd, &rel, loc); + } + + /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */ + if (eh->root.root.string[0] == '_' + && (strcmp (eh->root.root.string, "_DYNAMIC") == 0 + || eh == htab->etab.hgot)) + { + sym->st_shndx = SHN_ABS; + } + + return TRUE; +} + +/* Set the Meta ELF ABI version. */ + +static void +elf_metag_post_process_headers (bfd * abfd, struct bfd_link_info * link_info ATTRIBUTE_UNUSED) +{ + Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */ + + i_ehdrp = elf_elfheader (abfd); + i_ehdrp->e_ident[EI_ABIVERSION] = METAG_ELF_ABI_VERSION; +} + +/* Used to decide how to sort relocs in an optimal manner for the + dynamic linker, before writing them out. */ + +static enum elf_reloc_type_class +elf_metag_reloc_type_class (const Elf_Internal_Rela *rela) +{ + switch ((int) ELF32_R_TYPE (rela->r_info)) + { + case R_METAG_RELATIVE: + return reloc_class_relative; + case R_METAG_JMP_SLOT: + return reloc_class_plt; + case R_METAG_COPY: + return reloc_class_copy; + default: + return reloc_class_normal; + } +} + +/* Finish up the dynamic sections. */ + +static bfd_boolean +elf_metag_finish_dynamic_sections (bfd *output_bfd, + struct bfd_link_info *info) +{ + bfd *dynobj; + struct elf_metag_link_hash_table *htab; + asection *sdyn; + + htab = metag_link_hash_table (info); + dynobj = htab->etab.dynobj; + + sdyn = bfd_get_section_by_name (dynobj, ".dynamic"); + + if (htab->etab.dynamic_sections_created) + { + asection *splt; + Elf32_External_Dyn *dyncon, *dynconend; + + if (sdyn == NULL) + abort (); + + dyncon = (Elf32_External_Dyn *) sdyn->contents; + dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size); + for (; dyncon < dynconend; dyncon++) + { + Elf_Internal_Dyn dyn; + asection *s; + + bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn); + + switch (dyn.d_tag) + { + default: + continue; + + case DT_PLTGOT: + s = htab->sgot->output_section; + BFD_ASSERT (s != NULL); + dyn.d_un.d_ptr = s->vma + htab->sgot->output_offset; + bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon); + break; + + case DT_JMPREL: + s = htab->srelplt->output_section; + BFD_ASSERT (s != NULL); + dyn.d_un.d_ptr = s->vma; + bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon); + break; + + case DT_PLTRELSZ: + s = htab->srelplt; + dyn.d_un.d_val = s->size; + bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon); + break; + + case DT_RELASZ: + /* Don't count procedure linkage table relocs in the + overall reloc count. */ + if (htab->srelplt) { + s = htab->srelplt; + dyn.d_un.d_val -= s->size; + } + bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon); + break; + + case DT_RELA: + /* We may not be using the standard ELF linker script. + If .rela.plt is the first .rela section, we adjust + DT_RELA to not include it. */ + if (htab->srelplt) { + s = htab->srelplt; + if (dyn.d_un.d_ptr == s->output_section->vma + s->output_offset) + dyn.d_un.d_ptr += s->size; + } + bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon); + break; + } + + } + + /* Fill in the first entry in the procedure linkage table. */ + splt = htab->splt; + if (splt && splt->size > 0) + { + unsigned long addr; + /* addr = .got + 4 */ + addr = htab->sgot->output_section->vma + + htab->sgot->output_offset + 4; + if (info->shared) + { + addr -= splt->output_section->vma + splt->output_offset; + bfd_put_32 (output_bfd, + plt0_pic_entry[0] | (((addr >> 16) & 0xffff) << 3), + splt->contents); + bfd_put_32 (output_bfd, + plt0_pic_entry[1] | ((addr & 0xffff) << 3), + splt->contents + 4); + bfd_put_32 (output_bfd, plt0_pic_entry[2], splt->contents + 8); + bfd_put_32 (output_bfd, plt0_pic_entry[3], splt->contents + 12); + bfd_put_32 (output_bfd, plt0_pic_entry[4], splt->contents + 16); + } + else + { + bfd_put_32 (output_bfd, + plt0_entry[0] | (((addr >> 16) & 0xffff) << 3), + splt->contents); + bfd_put_32 (output_bfd, + plt0_entry[1] | ((addr & 0xffff) << 3), + splt->contents + 4); + bfd_put_32 (output_bfd, plt0_entry[2], splt->contents + 8); + bfd_put_32 (output_bfd, plt0_entry[3], splt->contents + 12); + bfd_put_32 (output_bfd, plt0_entry[4], splt->contents + 16); + } + + elf_section_data (splt->output_section)->this_hdr.sh_entsize = + PLT_ENTRY_SIZE; + } + } + + if (htab->sgot != NULL && htab->sgot->size != 0) + { + /* Fill in the first entry in the global offset table. + We use it to point to our dynamic section, if we have one. */ + bfd_put_32 (output_bfd, + sdyn ? sdyn->output_section->vma + sdyn->output_offset : 0, + htab->sgot->contents); + + /* The second entry is reserved for use by the dynamic linker. */ + memset (htab->sgot->contents + GOT_ENTRY_SIZE, 0, GOT_ENTRY_SIZE); + + /* Set .got entry size. */ + elf_section_data (htab->sgot->output_section) + ->this_hdr.sh_entsize = GOT_ENTRY_SIZE; + } + + return TRUE; +} + +/* Return the section that should be marked against GC for a given + relocation. */ + +static asection * +elf_metag_gc_mark_hook (asection *sec, + struct bfd_link_info *info, + Elf_Internal_Rela *rela, + struct elf_link_hash_entry *hh, + Elf_Internal_Sym *sym) +{ + if (hh != NULL) + switch ((unsigned int) ELF32_R_TYPE (rela->r_info)) + { + case R_METAG_GNU_VTINHERIT: + case R_METAG_GNU_VTENTRY: + return NULL; + } + + return _bfd_elf_gc_mark_hook (sec, info, rela, hh, sym); +} + +/* Update the got and plt entry reference counts for the section being + removed. */ + +static bfd_boolean +elf_metag_gc_sweep_hook (bfd *abfd ATTRIBUTE_UNUSED, + struct bfd_link_info *info ATTRIBUTE_UNUSED, + asection *sec ATTRIBUTE_UNUSED, + const Elf_Internal_Rela *relocs ATTRIBUTE_UNUSED) +{ + Elf_Internal_Shdr *symtab_hdr; + struct elf_link_hash_entry **eh_syms; + bfd_signed_vma *local_got_refcounts; + bfd_signed_vma *local_plt_refcounts; + const Elf_Internal_Rela *rel, *relend; + + if (info->relocatable) + return TRUE; + + elf_section_data (sec)->local_dynrel = NULL; + + symtab_hdr = &elf_tdata (abfd)->symtab_hdr; + eh_syms = elf_sym_hashes (abfd); + local_got_refcounts = elf_local_got_refcounts (abfd); + local_plt_refcounts = local_got_refcounts; + if (local_plt_refcounts != NULL) + local_plt_refcounts += symtab_hdr->sh_info; + + relend = relocs + sec->reloc_count; + for (rel = relocs; rel < relend; rel++) + { + unsigned long r_symndx; + unsigned int r_type; + struct elf_link_hash_entry *eh = NULL; + + r_symndx = ELF32_R_SYM (rel->r_info); + if (r_symndx >= symtab_hdr->sh_info) + { + struct elf_metag_link_hash_entry *hh; + struct elf_metag_dyn_reloc_entry **hdh_pp; + struct elf_metag_dyn_reloc_entry *hdh_p; + + eh = eh_syms[r_symndx - symtab_hdr->sh_info]; + while (eh->root.type == bfd_link_hash_indirect + || eh->root.type == bfd_link_hash_warning) + eh = (struct elf_link_hash_entry *) eh->root.u.i.link; + hh = (struct elf_metag_link_hash_entry *) eh; + + for (hdh_pp = &hh->dyn_relocs; (hdh_p = *hdh_pp) != NULL; + hdh_pp = &hdh_p->hdh_next) + if (hdh_p->sec == sec) + { + /* Everything must go for SEC. */ + *hdh_pp = hdh_p->hdh_next; + break; + } + } + + r_type = ELF32_R_TYPE (rel->r_info); + switch (r_type) + { + case R_METAG_TLS_LDM: + if (metag_link_hash_table (info)->tls_ldm_got.refcount > 0) + metag_link_hash_table (info)->tls_ldm_got.refcount -= 1; + break; + case R_METAG_TLS_IE: + case R_METAG_TLS_GD: + case R_METAG_GETSET_GOT: + if (eh != NULL) + { + if (eh->got.refcount > 0) + eh->got.refcount -= 1; + } + else if (local_got_refcounts != NULL) + { + if (local_got_refcounts[r_symndx] > 0) + local_got_refcounts[r_symndx] -= 1; + } + break; + + case R_METAG_RELBRANCH_PLT: + if (eh != NULL) + { + if (eh->plt.refcount > 0) + eh->plt.refcount -= 1; + } + break; + + case R_METAG_ADDR32: + case R_METAG_HIADDR16: + case R_METAG_LOADDR16: + case R_METAG_GETSETOFF: + case R_METAG_RELBRANCH: + if (eh != NULL) + { + struct elf_metag_link_hash_entry *hh; + struct elf_metag_dyn_reloc_entry **hdh_pp; + struct elf_metag_dyn_reloc_entry *hdh_p; + + if (!info->shared && eh->plt.refcount > 0) + eh->plt.refcount -= 1; + + hh = (struct elf_metag_link_hash_entry *) eh; + + for (hdh_pp = &hh->dyn_relocs; (hdh_p = *hdh_pp) != NULL; + hdh_pp = &hdh_p->hdh_next) + if (hdh_p->sec == sec) + { + if (ELF32_R_TYPE (rel->r_info) == R_METAG_RELBRANCH) + hdh_p->relative_count -= 1; + hdh_p->count -= 1; + if (hdh_p->count == 0) + *hdh_pp = hdh_p->hdh_next; + break; + } + } + break; + + default: + break; + } + } + + return TRUE; +} + +/* Determine the type of stub needed, if any, for a call. */ + +static enum elf_metag_stub_type +metag_type_of_stub (asection *input_sec, + const Elf_Internal_Rela *rel, + struct elf_metag_link_hash_entry *hh, + bfd_vma destination, + struct bfd_link_info *info ATTRIBUTE_UNUSED) +{ + bfd_vma location; + bfd_vma branch_offset; + bfd_vma max_branch_offset; + + if (hh != NULL && + !(hh->eh.root.type == bfd_link_hash_defined + || hh->eh.root.type == bfd_link_hash_defweak)) + return metag_stub_none; + + /* Determine where the call point is. */ + location = (input_sec->output_offset + + input_sec->output_section->vma + + rel->r_offset); + + branch_offset = destination - location; + + /* Determine if a long branch stub is needed. Meta branch offsets + are signed 19 bits 4 byte aligned. */ + max_branch_offset = (1 << (BRANCH_BITS-1)) << 2; + + if (branch_offset + max_branch_offset >= 2*max_branch_offset) + { + if (info->shared) + return metag_stub_long_branch_shared; + else + return metag_stub_long_branch; + } + + return metag_stub_none; +} + +#define MOVT_A0_3 0x82180005 +#define JUMP_A0_3 0xac180003 + +#define MOVT_A1LBP 0x83080005 +#define ADD_A1LBP 0x83080000 + +#define ADDT_A0_3_CPC 0x82980001 +#define ADD_A0_3_A0_3 0x82180000 +#define MOV_PC_A0_3 0xa3180ca0 + +static bfd_boolean +metag_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg ATTRIBUTE_UNUSED) +{ + struct elf_metag_stub_hash_entry *hsh; + asection *stub_sec; + bfd *stub_bfd; + bfd_byte *loc; + bfd_vma sym_value; + int size; + + /* Massage our args to the form they really have. */ + hsh = (struct elf_metag_stub_hash_entry *) gen_entry; + + stub_sec = hsh->stub_sec; + + /* Make a note of the offset within the stubs for this entry. */ + hsh->stub_offset = stub_sec->size; + loc = stub_sec->contents + hsh->stub_offset; + + stub_bfd = stub_sec->owner; + + switch (hsh->stub_type) + { + case metag_stub_long_branch_shared: + /* A PIC long branch stub is an ADDT and an ADD instruction used to + calculate the jump target using A0.3 as a temporary. Then a MOV + to PC carries out the jump. */ + sym_value = (hsh->target_value + + hsh->target_section->output_offset + + hsh->target_section->output_section->vma + + hsh->addend); + + sym_value -= (hsh->stub_offset + + stub_sec->output_offset + + stub_sec->output_section->vma); + + bfd_put_32 (stub_bfd, ADDT_A0_3_CPC | (((sym_value >> 16) & 0xffff) << 3), + loc); + + bfd_put_32 (stub_bfd, ADD_A0_3_A0_3 | ((sym_value & 0xffff) << 3), + loc + 4); + + bfd_put_32 (stub_bfd, MOV_PC_A0_3, loc + 8); + + size = 12; + break; + case metag_stub_long_branch: + /* A standard long branch stub is a MOVT instruction followed by a + JUMP instruction using the A0.3 register as a temporary. This is + the same method used by the LDLK linker (patch.c). */ + sym_value = (hsh->target_value + + hsh->target_section->output_offset + + hsh->target_section->output_section->vma + + hsh->addend); + + bfd_put_32 (stub_bfd, MOVT_A0_3 | (((sym_value >> 16) & 0xffff) << 3), + loc); + + bfd_put_32 (stub_bfd, JUMP_A0_3 | ((sym_value & 0xffff) << 3), loc + 4); + + size = 8; + break; + default: + BFD_FAIL (); + return FALSE; + } + + stub_sec->size += size; + return TRUE; +} + +/* As above, but don't actually build the stub. Just bump offset so + we know stub section sizes. */ + +static bfd_boolean +metag_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg ATTRIBUTE_UNUSED) +{ + struct elf_metag_stub_hash_entry *hsh; + int size = 0; + + /* Massage our args to the form they really have. */ + hsh = (struct elf_metag_stub_hash_entry *) gen_entry; + + if (hsh->stub_type == metag_stub_long_branch) + size = 8; + else if (hsh->stub_type == metag_stub_long_branch_shared) + size = 12; + + hsh->stub_sec->size += size; + return TRUE; +} + +/* Set up various things so that we can make a list of input sections + for each output section included in the link. Returns -1 on error, + 0 when no stubs will be needed, and 1 on success. */ + +int +elf_metag_setup_section_lists (bfd *output_bfd, struct bfd_link_info *info) +{ + bfd *input_bfd; + unsigned int bfd_count; + int top_id, top_index; + asection *section; + asection **input_list, **list; + bfd_size_type amt; + struct elf_metag_link_hash_table *htab = metag_link_hash_table (info); + + /* Count the number of input BFDs and find the top input section id. */ + for (input_bfd = info->input_bfds, bfd_count = 0, top_id = 0; + input_bfd != NULL; + input_bfd = input_bfd->link_next) + { + bfd_count += 1; + for (section = input_bfd->sections; + section != NULL; + section = section->next) + { + if (top_id < section->id) + top_id = section->id; + } + } + + htab->bfd_count = bfd_count; + + amt = sizeof (struct map_stub) * (top_id + 1); + htab->stub_group = bfd_zmalloc (amt); + if (htab->stub_group == NULL) + return -1; + + /* We can't use output_bfd->section_count here to find the top output + section index as some sections may have been removed, and + strip_excluded_output_sections doesn't renumber the indices. */ + for (section = output_bfd->sections, top_index = 0; + section != NULL; + section = section->next) + { + if (top_index < section->index) + top_index = section->index; + } + + htab->top_index = top_index; + amt = sizeof (asection *) * (top_index + 1); + input_list = bfd_malloc (amt); + htab->input_list = input_list; + if (input_list == NULL) + return -1; + + /* For sections we aren't interested in, mark their entries with a + value we can check later. */ + list = input_list + top_index; + do + *list = bfd_abs_section_ptr; + while (list-- != input_list); + + for (section = output_bfd->sections; + section != NULL; + section = section->next) + { + /* FIXME: This is a bit of hack. Currently our .ctors and .dtors + * have PC relative relocs in them but no code flag set. */ + if (((section->flags & SEC_CODE) != 0) || + strcmp(".ctors", section->name) || + strcmp(".dtors", section->name)) + input_list[section->index] = NULL; + } + + return 1; +} + +/* The linker repeatedly calls this function for each input section, + in the order that input sections are linked into output sections. + Build lists of input sections to determine groupings between which + we may insert linker stubs. */ + +void +elf_metag_next_input_section (struct bfd_link_info *info, asection *isec) +{ + struct elf_metag_link_hash_table *htab = metag_link_hash_table (info); + + if (isec->output_section->index <= htab->top_index) + { + asection **list = htab->input_list + isec->output_section->index; + if (*list != bfd_abs_section_ptr) + { + /* Steal the link_sec pointer for our list. */ +#define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec) + /* This happens to make the list in reverse order, + which is what we want. */ + PREV_SEC (isec) = *list; + *list = isec; + } + } +} + +/* See whether we can group stub sections together. Grouping stub + sections may result in fewer stubs. More importantly, we need to + put all .init* and .fini* stubs at the beginning of the .init or + .fini output sections respectively, because glibc splits the + _init and _fini functions into multiple parts. Putting a stub in + the middle of a function is not a good idea. */ + +static void +group_sections (struct elf_metag_link_hash_table *htab, + bfd_size_type stub_group_size, + bfd_boolean stubs_always_before_branch) +{ + asection **list = htab->input_list + htab->top_index; + do + { + asection *tail = *list; + if (tail == bfd_abs_section_ptr) + continue; + while (tail != NULL) + { + asection *curr; + asection *prev; + bfd_size_type total; + bfd_boolean big_sec; + + curr = tail; + total = tail->size; + big_sec = total >= stub_group_size; + + while ((prev = PREV_SEC (curr)) != NULL + && ((total += curr->output_offset - prev->output_offset) + < stub_group_size)) + curr = prev; + + /* OK, the size from the start of CURR to the end is less + than stub_group_size bytes and thus can be handled by one stub + section. (or the tail section is itself larger than + stub_group_size bytes, in which case we may be toast.) + We should really be keeping track of the total size of + stubs added here, as stubs contribute to the final output + section size. */ + do + { + prev = PREV_SEC (tail); + /* Set up this stub group. */ + htab->stub_group[tail->id].link_sec = curr; + } + while (tail != curr && (tail = prev) != NULL); + + /* But wait, there's more! Input sections up to stub_group_size + bytes before the stub section can be handled by it too. + Don't do this if we have a really large section after the + stubs, as adding more stubs increases the chance that + branches may not reach into the stub section. */ + if (!stubs_always_before_branch && !big_sec) + { + total = 0; + while (prev != NULL + && ((total += tail->output_offset - prev->output_offset) + < stub_group_size)) + { + tail = prev; + prev = PREV_SEC (tail); + htab->stub_group[tail->id].link_sec = curr; + } + } + tail = prev; + } + } + while (list-- != htab->input_list); + free (htab->input_list); +#undef PREV_SEC +} + +/* Read in all local syms for all input bfds. + Returns -1 on error, 0 otherwise. */ + +static int +get_local_syms (bfd *output_bfd ATTRIBUTE_UNUSED, bfd *input_bfd, + struct bfd_link_info *info) +{ + unsigned int bfd_indx; + Elf_Internal_Sym *local_syms, **all_local_syms; + int stub_changed = 0; + struct elf_metag_link_hash_table *htab = metag_link_hash_table (info); + + /* We want to read in symbol extension records only once. To do this + we need to read in the local symbols in parallel and save them for + later use; so hold pointers to the local symbols in an array. */ + bfd_size_type amt = sizeof (Elf_Internal_Sym *) * htab->bfd_count; + all_local_syms = bfd_zmalloc (amt); + htab->all_local_syms = all_local_syms; + if (all_local_syms == NULL) + return -1; + + /* Walk over all the input BFDs, swapping in local symbols. */ + for (bfd_indx = 0; + input_bfd != NULL; + input_bfd = input_bfd->link_next, bfd_indx++) + { + Elf_Internal_Shdr *symtab_hdr; + + /* We'll need the symbol table in a second. */ + symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr; + if (symtab_hdr->sh_info == 0) + continue; + + /* We need an array of the local symbols attached to the input bfd. */ + local_syms = (Elf_Internal_Sym *) symtab_hdr->contents; + if (local_syms == NULL) + { + local_syms = bfd_elf_get_elf_syms (input_bfd, symtab_hdr, + symtab_hdr->sh_info, 0, + NULL, NULL, NULL); + /* Cache them for elf_link_input_bfd. */ + symtab_hdr->contents = (unsigned char *) local_syms; + } + if (local_syms == NULL) + return -1; + + all_local_syms[bfd_indx] = local_syms; + } + + return stub_changed; +} + +/* Determine and set the size of the stub section for a final link. + +The basic idea here is to examine all the relocations looking for +PC-relative calls to a target that is unreachable with a "CALLR" +instruction. */ + +/* See elf32-hppa.c and elf64-ppc.c. */ + +bfd_boolean +elf_metag_size_stubs(bfd *output_bfd, bfd *stub_bfd, + struct bfd_link_info *info, + bfd_signed_vma group_size, + asection * (*add_stub_section) (const char *, asection *), + void (*layout_sections_again) (void)) +{ + bfd_size_type stub_group_size; + bfd_boolean stubs_always_before_branch; + bfd_boolean stub_changed; + struct elf_metag_link_hash_table *htab = metag_link_hash_table (info); + + /* Stash our params away. */ + htab->stub_bfd = stub_bfd; + htab->add_stub_section = add_stub_section; + htab->layout_sections_again = layout_sections_again; + stubs_always_before_branch = group_size < 0; + if (group_size < 0) + stub_group_size = -group_size; + else + stub_group_size = group_size; + if (stub_group_size == 1) + { + /* Default values. */ + /* FIXME: not sure what these values should be */ + if (stubs_always_before_branch) + { + stub_group_size = (1 << BRANCH_BITS); + } + else + { + stub_group_size = (1 << BRANCH_BITS); + } + } + + group_sections (htab, stub_group_size, stubs_always_before_branch); + + switch (get_local_syms (output_bfd, info->input_bfds, info)) + { + default: + if (htab->all_local_syms) + goto error_ret_free_local; + return FALSE; + + case 0: + stub_changed = FALSE; + break; + + case 1: + stub_changed = TRUE; + break; + } + + while (1) + { + bfd *input_bfd; + unsigned int bfd_indx; + asection *stub_sec; + + for (input_bfd = info->input_bfds, bfd_indx = 0; + input_bfd != NULL; + input_bfd = input_bfd->link_next, bfd_indx++) + { + Elf_Internal_Shdr *symtab_hdr; + asection *section; + Elf_Internal_Sym *local_syms; + + /* We'll need the symbol table in a second. */ + symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr; + if (symtab_hdr->sh_info == 0) + continue; + + local_syms = htab->all_local_syms[bfd_indx]; + + /* Walk over each section attached to the input bfd. */ + for (section = input_bfd->sections; + section != NULL; + section = section->next) + { + Elf_Internal_Rela *internal_relocs, *irelaend, *irela; + + /* If there aren't any relocs, then there's nothing more + to do. */ + if ((section->flags & SEC_RELOC) == 0 + || section->reloc_count == 0) + continue; + + /* If this section is a link-once section that will be + discarded, then don't create any stubs. */ + if (section->output_section == NULL + || section->output_section->owner != output_bfd) + continue; + + /* Get the relocs. */ + internal_relocs + = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL, + info->keep_memory); + if (internal_relocs == NULL) + goto error_ret_free_local; + + /* Now examine each relocation. */ + irela = internal_relocs; + irelaend = irela + section->reloc_count; + for (; irela < irelaend; irela++) + { + unsigned int r_type, r_indx; + enum elf_metag_stub_type stub_type; + struct elf_metag_stub_hash_entry *hsh; + asection *sym_sec; + bfd_vma sym_value; + bfd_vma destination; + struct elf_metag_link_hash_entry *hh; + char *stub_name; + const asection *id_sec; + + r_type = ELF32_R_TYPE (irela->r_info); + r_indx = ELF32_R_SYM (irela->r_info); + + if (r_type >= (unsigned int) R_METAG_MAX) + { + bfd_set_error (bfd_error_bad_value); + error_ret_free_internal: + if (elf_section_data (section)->relocs == NULL) + free (internal_relocs); + goto error_ret_free_local; + } + + /* Only look for stubs on CALLR and B instructions. */ + if (!(r_type == (unsigned int) R_METAG_RELBRANCH || + r_type == (unsigned int) R_METAG_RELBRANCH_PLT)) + continue; + + /* Now determine the call target, its name, value, + section. */ + sym_sec = NULL; + sym_value = 0; + destination = 0; + hh = NULL; + if (r_indx < symtab_hdr->sh_info) + { + /* It's a local symbol. */ + Elf_Internal_Sym *sym; + Elf_Internal_Shdr *hdr; + unsigned int shndx; + + sym = local_syms + r_indx; + if (ELF_ST_TYPE (sym->st_info) != STT_SECTION) + sym_value = sym->st_value; + shndx = sym->st_shndx; + if (shndx < elf_numsections (input_bfd)) + { + hdr = elf_elfsections (input_bfd)[shndx]; + sym_sec = hdr->bfd_section; + destination = (sym_value + irela->r_addend + + sym_sec->output_offset + + sym_sec->output_section->vma); + } + } + else + { + /* It's an external symbol. */ + int e_indx; + + e_indx = r_indx - symtab_hdr->sh_info; + hh = ((struct elf_metag_link_hash_entry *) + elf_sym_hashes (input_bfd)[e_indx]); + + while (hh->eh.root.type == bfd_link_hash_indirect + || hh->eh.root.type == bfd_link_hash_warning) + hh = ((struct elf_metag_link_hash_entry *) + hh->eh.root.u.i.link); + + if (hh->eh.root.type == bfd_link_hash_defined + || hh->eh.root.type == bfd_link_hash_defweak) + { + sym_sec = hh->eh.root.u.def.section; + sym_value = hh->eh.root.u.def.value; + if (hh->eh.plt.offset != (bfd_vma) -1 + && hh->eh.dynindx != -1 + && r_type == (unsigned int) R_METAG_RELBRANCH_PLT) + { + sym_sec = htab->splt; + sym_value = hh->eh.plt.offset; + } + + if (sym_sec->output_section != NULL) + destination = (sym_value + irela->r_addend + + sym_sec->output_offset + + sym_sec->output_section->vma); + else + continue; + } + else if (hh->eh.root.type == bfd_link_hash_undefweak) + { + if (! info->shared) + continue; + } + else if (hh->eh.root.type == bfd_link_hash_undefined) + { + if (! (info->unresolved_syms_in_objects == RM_IGNORE + && (ELF_ST_VISIBILITY (hh->eh.other) + == STV_DEFAULT))) + continue; + } + else + { + bfd_set_error (bfd_error_bad_value); + goto error_ret_free_internal; + } + } + + /* Determine what (if any) linker stub is needed. */ + stub_type = metag_type_of_stub (section, irela, hh, + destination, info); + if (stub_type == metag_stub_none) + continue; + + /* Support for grouping stub sections. */ + id_sec = htab->stub_group[section->id].link_sec; + + /* Get the name of this stub. */ + stub_name = metag_stub_name (id_sec, sym_sec, hh, irela); + if (!stub_name) + goto error_ret_free_internal; + + hsh = metag_stub_hash_lookup (&htab->bstab, + stub_name, + FALSE, FALSE); + if (hsh != NULL) + { + /* The proper stub has already been created. */ + free (stub_name); + continue; + } + + hsh = metag_add_stub (stub_name, section, htab); + if (hsh == NULL) + { + free (stub_name); + goto error_ret_free_internal; + } + hsh->target_value = sym_value; + hsh->target_section = sym_sec; + hsh->stub_type = stub_type; + hsh->hh = hh; + hsh->addend = irela->r_addend; + stub_changed = TRUE; + } + + /* We're done with the internal relocs, free them. */ + if (elf_section_data (section)->relocs == NULL) + free (internal_relocs); + } + } + + if (!stub_changed) + break; + + /* OK, we've added some stubs. Find out the new size of the + stub sections. */ + for (stub_sec = htab->stub_bfd->sections; + stub_sec != NULL; + stub_sec = stub_sec->next) + stub_sec->size = 0; + + bfd_hash_traverse (&htab->bstab, metag_size_one_stub, htab); + + /* Ask the linker to do its stuff. */ + (*htab->layout_sections_again) (); + stub_changed = FALSE; + } + + free (htab->all_local_syms); + return TRUE; + + error_ret_free_local: + free (htab->all_local_syms); + return FALSE; +} + +/* Build all the stubs associated with the current output file. The + stubs are kept in a hash table attached to the main linker hash + table. This function is called via metagelf_finish in the linker. */ + +bfd_boolean +elf_metag_build_stubs (struct bfd_link_info *info) +{ + asection *stub_sec; + struct bfd_hash_table *table; + struct elf_metag_link_hash_table *htab; + + htab = metag_link_hash_table (info); + + for (stub_sec = htab->stub_bfd->sections; + stub_sec != NULL; + stub_sec = stub_sec->next) + { + bfd_size_type size; + + /* Allocate memory to hold the linker stubs. */ + size = stub_sec->size; + stub_sec->contents = bfd_zalloc (htab->stub_bfd, size); + if (stub_sec->contents == NULL && size != 0) + return FALSE; + stub_sec->size = 0; + } + + /* Build the stubs as directed by the stub hash table. */ + table = &htab->bstab; + bfd_hash_traverse (table, metag_build_one_stub, info); + + return TRUE; +} + +/* Return TRUE if SYM represents a local label symbol. */ + +static bfd_boolean +elf_metag_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name) +{ + if (name[0] == '$' && name[1] == 'L') + return 1; + return _bfd_elf_is_local_label_name (abfd, name); +} + +/* Return address for Ith PLT stub in section PLT, for relocation REL + or (bfd_vma) -1 if it should not be included. */ + +static bfd_vma +elf_metag_plt_sym_val (bfd_vma i, const asection *plt, + const arelent *rel ATTRIBUTE_UNUSED) +{ + return plt->vma + (i + 1) * PLT_ENTRY_SIZE; +} + +#define ELF_ARCH bfd_arch_metag +#define ELF_TARGET_ID METAG_ELF_DATA +#define ELF_MACHINE_CODE EM_METAG +#define ELF_MINPAGESIZE 0x1000 +#define ELF_MAXPAGESIZE 0x4000 +#define ELF_COMMONPAGESIZE 0x1000 + +#define TARGET_LITTLE_SYM bfd_elf32_metag_vec +#define TARGET_LITTLE_NAME "elf32-metag" + +#define elf_symbol_leading_char '_' + +#define elf_info_to_howto_rel NULL +#define elf_info_to_howto metag_info_to_howto_rela + +#define bfd_elf32_bfd_is_local_label_name elf_metag_is_local_label_name +#define bfd_elf32_bfd_link_hash_table_create \ + elf_metag_link_hash_table_create +#define bfd_elf32_bfd_link_hash_table_free elf_metag_link_hash_table_free +#define elf_backend_relocate_section elf_metag_relocate_section +#define elf_backend_gc_mark_hook elf_metag_gc_mark_hook +#define elf_backend_gc_sweep_hook elf_metag_gc_sweep_hook +#define elf_backend_check_relocs elf_metag_check_relocs +#define elf_backend_create_dynamic_sections elf_metag_create_dynamic_sections +#define elf_backend_adjust_dynamic_symbol elf_metag_adjust_dynamic_symbol +#define elf_backend_finish_dynamic_symbol elf_metag_finish_dynamic_symbol +#define elf_backend_finish_dynamic_sections elf_metag_finish_dynamic_sections +#define elf_backend_size_dynamic_sections elf_metag_size_dynamic_sections +#define elf_backend_omit_section_dynsym \ + ((bfd_boolean (*) (bfd *, struct bfd_link_info *, asection *)) bfd_true) +#define elf_backend_post_process_headers elf_metag_post_process_headers +#define elf_backend_reloc_type_class elf_metag_reloc_type_class +#define elf_backend_copy_indirect_symbol elf_metag_copy_indirect_symbol +#define elf_backend_plt_sym_val elf_metag_plt_sym_val + +#define elf_backend_can_gc_sections 1 +#define elf_backend_can_refcount 1 +#define elf_backend_got_header_size 12 +#define elf_backend_rela_normal 1 +#define elf_backend_want_got_sym 0 +#define elf_backend_want_plt_sym 0 +#define elf_backend_plt_readonly 1 + +#define bfd_elf32_bfd_reloc_type_lookup metag_reloc_type_lookup +#define bfd_elf32_bfd_reloc_name_lookup metag_reloc_name_lookup + +#include "elf32-target.h" diff --git a/bfd/elf32-metag.h b/bfd/elf32-metag.h new file mode 100644 index 0000000..46772e0 --- /dev/null +++ b/bfd/elf32-metag.h @@ -0,0 +1,38 @@ +/* Meta support for 32-bit ELF + Copyright (C) 2013 Free Software Foundation, Inc. + Contributed by Imagination Technologies Ltd. + + This file is part of BFD, the Binary File Descriptor library. + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software + Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, + MA 02110-1301, USA. */ + +#ifndef _ELF32_METAG_H +#define _ELF32_METAG_H + +extern int elf_metag_setup_section_lists + (bfd *, struct bfd_link_info *); + +extern void elf_metag_next_input_section + (struct bfd_link_info *, asection *); + +extern bfd_boolean elf_metag_size_stubs + (bfd *, bfd *, struct bfd_link_info *, bfd_signed_vma, + asection * (*) (const char *, asection *), void (*) (void)); + +extern bfd_boolean elf_metag_build_stubs + (struct bfd_link_info *); + +#endif /* _ELF32_METAG_H */ diff --git a/bfd/libbfd.h b/bfd/libbfd.h index 362e35f..d548143 100644 --- a/bfd/libbfd.h +++ b/bfd/libbfd.h @@ -1844,6 +1844,44 @@ static const char *const bfd_reloc_code_real_names[] = { "@@uninitialized@@", "BFD_RELOC_MEP_GNU_VTINHERIT", "BFD_RELOC_MEP_GNU_VTENTRY", + "BFD_RELOC_METAG_HIADDR16", + "BFD_RELOC_METAG_LOADDR16", + "BFD_RELOC_METAG_RELBRANCH", + "BFD_RELOC_METAG_GETSETOFF", + "BFD_RELOC_METAG_HIOG", + "BFD_RELOC_METAG_LOOG", + "BFD_RELOC_METAG_REL8", + "BFD_RELOC_METAG_REL16", + "BFD_RELOC_METAG_HI16_GOTOFF", + "BFD_RELOC_METAG_LO16_GOTOFF", + "BFD_RELOC_METAG_GETSET_GOTOFF", + "BFD_RELOC_METAG_GETSET_GOT", + "BFD_RELOC_METAG_HI16_GOTPC", + "BFD_RELOC_METAG_LO16_GOTPC", + "BFD_RELOC_METAG_HI16_PLT", + "BFD_RELOC_METAG_LO16_PLT", + "BFD_RELOC_METAG_RELBRANCH_PLT", + "BFD_RELOC_METAG_GOTOFF", + "BFD_RELOC_METAG_PLT", + "BFD_RELOC_METAG_COPY", + "BFD_RELOC_METAG_JMP_SLOT", + "BFD_RELOC_METAG_RELATIVE", + "BFD_RELOC_METAG_GLOB_DAT", + "BFD_RELOC_METAG_TLS_GD", + "BFD_RELOC_METAG_TLS_LDM", + "BFD_RELOC_METAG_TLS_LDO_HI16", + "BFD_RELOC_METAG_TLS_LDO_LO16", + "BFD_RELOC_METAG_TLS_LDO", + "BFD_RELOC_METAG_TLS_IE", + "BFD_RELOC_METAG_TLS_IENONPIC", + "BFD_RELOC_METAG_TLS_IENONPIC_HI16", + "BFD_RELOC_METAG_TLS_IENONPIC_LO16", + "BFD_RELOC_METAG_TLS_TPOFF", + "BFD_RELOC_METAG_TLS_DTPMOD", + "BFD_RELOC_METAG_TLS_DTPOFF", + "BFD_RELOC_METAG_TLS_LE", + "BFD_RELOC_METAG_TLS_LE_HI16", + "BFD_RELOC_METAG_TLS_LE_LO16", "BFD_RELOC_MMIX_GETA", "BFD_RELOC_MMIX_GETA_1", "BFD_RELOC_MMIX_GETA_2", diff --git a/bfd/reloc.c b/bfd/reloc.c index 3f88049..1cc48d7 100644 --- a/bfd/reloc.c +++ b/bfd/reloc.c @@ -4198,6 +4198,85 @@ ENUMDOC COMMENT ENUM + BFD_RELOC_METAG_HIADDR16 +ENUMX + BFD_RELOC_METAG_LOADDR16 +ENUMX + BFD_RELOC_METAG_RELBRANCH +ENUMX + BFD_RELOC_METAG_GETSETOFF +ENUMX + BFD_RELOC_METAG_HIOG +ENUMX + BFD_RELOC_METAG_LOOG +ENUMX + BFD_RELOC_METAG_REL8 +ENUMX + BFD_RELOC_METAG_REL16 +ENUMX + BFD_RELOC_METAG_HI16_GOTOFF +ENUMX + BFD_RELOC_METAG_LO16_GOTOFF +ENUMX + BFD_RELOC_METAG_GETSET_GOTOFF +ENUMX + BFD_RELOC_METAG_GETSET_GOT +ENUMX + BFD_RELOC_METAG_HI16_GOTPC +ENUMX + BFD_RELOC_METAG_LO16_GOTPC +ENUMX + BFD_RELOC_METAG_HI16_PLT +ENUMX + BFD_RELOC_METAG_LO16_PLT +ENUMX + BFD_RELOC_METAG_RELBRANCH_PLT +ENUMX + BFD_RELOC_METAG_GOTOFF +ENUMX + BFD_RELOC_METAG_PLT +ENUMX + BFD_RELOC_METAG_COPY +ENUMX + BFD_RELOC_METAG_JMP_SLOT +ENUMX + BFD_RELOC_METAG_RELATIVE +ENUMX + BFD_RELOC_METAG_GLOB_DAT +ENUMX + BFD_RELOC_METAG_TLS_GD +ENUMX + BFD_RELOC_METAG_TLS_LDM +ENUMX + BFD_RELOC_METAG_TLS_LDO_HI16 +ENUMX + BFD_RELOC_METAG_TLS_LDO_LO16 +ENUMX + BFD_RELOC_METAG_TLS_LDO +ENUMX + BFD_RELOC_METAG_TLS_IE +ENUMX + BFD_RELOC_METAG_TLS_IENONPIC +ENUMX + BFD_RELOC_METAG_TLS_IENONPIC_HI16 +ENUMX + BFD_RELOC_METAG_TLS_IENONPIC_LO16 +ENUMX + BFD_RELOC_METAG_TLS_TPOFF +ENUMX + BFD_RELOC_METAG_TLS_DTPMOD +ENUMX + BFD_RELOC_METAG_TLS_DTPOFF +ENUMX + BFD_RELOC_METAG_TLS_LE +ENUMX + BFD_RELOC_METAG_TLS_LE_HI16 +ENUMX + BFD_RELOC_METAG_TLS_LE_LO16 +ENUMDOC + Imagination Technologies Meta relocations. + +ENUM BFD_RELOC_MMIX_GETA ENUMX BFD_RELOC_MMIX_GETA_1 diff --git a/bfd/targets.c b/bfd/targets.c index 0ca6a1a..17553eb 100644 --- a/bfd/targets.c +++ b/bfd/targets.c @@ -659,6 +659,7 @@ extern const bfd_target bfd_elf32_mcore_big_vec; extern const bfd_target bfd_elf32_mcore_little_vec; extern const bfd_target bfd_elf32_mep_vec; extern const bfd_target bfd_elf32_mep_little_vec; +extern const bfd_target bfd_elf32_metag_vec; extern const bfd_target bfd_elf32_microblazeel_vec; extern const bfd_target bfd_elf32_microblaze_vec; extern const bfd_target bfd_elf32_mn10200_vec; @@ -1036,6 +1037,7 @@ static const bfd_target * const _bfd_target_vector[] = &bfd_elf32_mcore_big_vec, &bfd_elf32_mcore_little_vec, &bfd_elf32_mep_vec, + &bfd_elf32_metag_vec, &bfd_elf32_microblaze_vec, &bfd_elf32_mn10200_vec, &bfd_elf32_mn10300_vec, |